ubsan: opcodes/csky-opc.h:929 shift exponent 536870912
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
c9405344 117#define elf_backend_always_size_sections ppc64_elf_edit
ad8e1ba5 118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
bf577467 128#define elf_backend_section_flags ppc64_elf_section_flags
6911b7dc 129#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 130#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 131#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 132
5bd4f169
AM
133/* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 138#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 139#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
140
141/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 142#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 143
a078d95a
AM
144/* Offsets to some stack save slots. */
145#define STK_LR 16
146#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 147/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
5bd4f169 152/* TOC base pointers offset from start of TOC. */
411e1bfb 153#define TOC_BASE_OFF 0x8000
a27e685f
AM
154/* TOC base alignment. */
155#define TOC_BASE_ALIGN 256
411e1bfb
AM
156
157/* Offset of tp and dtp pointers from start of TLS block. */
158#define TP_OFFSET 0x7000
159#define DTP_OFFSET 0x8000
5bd4f169 160
ad8e1ba5
AM
161/* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 163 insert an addi to adjust r11. */
a078d95a 164#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
165#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
170#define BCTR 0x4e800420 /* bctr */
171
07d6d2b8 172#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
173#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
175#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183#define BNECTR 0x4ca20420 /* bnectr+ */
184#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 185
71a39c98 186#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 187#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 188#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 189
07d6d2b8
AM
190#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 193
04bdff6a 194#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 195#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 196#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 197#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
198#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 200#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 201#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 202#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 203#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 204#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 205#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 206#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
207#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
210#define PADDI_R12_PC 0x0610000039800000ULL
211#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 212#define PNOP 0x0700000000000000ULL
a345bc8d 213
9e390558
AM
214/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220#define MFLR_R12 0x7d8802a6 /* mflr %12 */
221#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 224 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 225#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
226#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
ee4bf8d2 231 /* bctr */
b9e5796b
AM
232#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
237
238/* Pad with this. */
239#define NOP 0x60000000
240
721956f4
AM
241/* Some other nops. */
242#define CROR_151515 0x4def7b82
243#define CROR_313131 0x4ffffb82
244
cedb70c5 245/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
246#define LI_R0_0 0x38000000 /* li %r0,0 */
247#define B_DOT 0x48000000 /* b . */
248
249/* After that, we need two instructions to load the index, followed by
250 a branch. */
251#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 252#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 253
deb0e272
AM
254/* Instructions used by the save and restore reg functions. */
255#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
259#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
261#define LI_R12_0 0x39800000 /* li %r12,0 */
262#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
265#define BLR 0x4e800020 /* blr */
266
41bd81ab
AM
267/* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 270 relocate .opd without reloc entries. */
41bd81ab
AM
271#ifndef NO_OPD_RELOCS
272#define NO_OPD_RELOCS 0
273#endif
810d4e75 274
a4b6fadd
AM
275#ifndef ARRAY_SIZE
276#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277#endif
278
810d4e75
AM
279static inline int
280abiversion (bfd *abfd)
281{
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283}
284
285static inline void
286set_abiversion (bfd *abfd, int ver)
287{
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290}
5bd4f169
AM
291\f
292/* Relocation HOWTO's. */
46807bf4
AM
293/* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
04c9666a 306static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 307
f3185997
NC
308static reloc_howto_type ppc64_elf_howto_raw[] =
309{
5bd4f169 310 /* This reloc does nothing. */
46807bf4
AM
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A standard 32 bit relocation. */
46807bf4
AM
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
46807bf4
AM
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* A 16 bit relocation without overflow. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address. */
46807bf4
AM
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
5bd4f169
AM
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
46807bf4
AM
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
5bd4f169
AM
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
46807bf4
AM
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
5bd4f169
AM
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
46807bf4
AM
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
5bd4f169
AM
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
5bd4f169
AM
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
5bd4f169 360
05d0e962 361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
05d0e962 364
5bd4f169 365 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
5bd4f169
AM
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
46807bf4
AM
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
5bd4f169
AM
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
46807bf4
AM
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
5bd4f169
AM
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
46807bf4
AM
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
5bd4f169
AM
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
46807bf4
AM
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
46807bf4
AM
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
46807bf4
AM
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
46807bf4
AM
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
5bd4f169
AM
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
46807bf4
AM
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
5bd4f169
AM
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
46807bf4
AM
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
5bd4f169
AM
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
46807bf4
AM
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
5bd4f169
AM
432
433 /* 32-bit PC relative. */
46807bf4
AM
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
5bd4f169 436
10ed1bba 437 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
5bd4f169
AM
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
5bd4f169
AM
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
46807bf4
AM
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
5bd4f169
AM
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
46807bf4
AM
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
5bd4f169
AM
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
46807bf4
AM
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
5bd4f169 460
c061c2d8 461 /* 16-bit section relative relocation. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
5bd4f169 464
c061c2d8 465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
5bd4f169
AM
472
473 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
5bd4f169 476
04c9666a 477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
5bd4f169
AM
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
46807bf4
AM
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address. */
46807bf4
AM
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
5bd4f169
AM
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address. */
46807bf4
AM
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
5bd4f169
AM
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
46807bf4
AM
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
5bd4f169
AM
504
505 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
5bd4f169
AM
508
509 /* 64-bit relative relocation. */
46807bf4
AM
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
5bd4f169 512
cedb70c5 513 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
5bd4f169
AM
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
5bd4f169
AM
522
523 /* 16 bit TOC-relative relocation. */
5bd4f169 524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
5bd4f169
AM
527
528 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
5bd4f169
AM
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
5bd4f169
AM
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
5bd4f169 541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
5bd4f169
AM
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
411e1bfb
AM
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
411e1bfb
AM
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
411e1bfb
AM
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
411e1bfb
AM
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
411e1bfb
AM
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
411e1bfb 624
727fc41e 625 /* Marker relocs for TLS. */
46807bf4
AM
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
727fc41e 634
23cedd1d
AM
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
46807bf4
AM
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
3b421ab3 639
23cedd1d 640 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
23cedd1d 646
411e1bfb
AM
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
46807bf4
AM
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
411e1bfb
AM
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* A 16 bit dtprel reloc. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16, but no overflow. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* A 16 bit tprel reloc. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16, but no overflow. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
411e1bfb
AM
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb 757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
5bd4f169 760
411e1bfb
AM
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb
AM
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
411e1bfb
AM
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
5bd4f169 808
411e1bfb 809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
e054468f 818
25f23106 819 /* A 16 bit relative relocation. */
46807bf4
AM
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address. */
46807bf4
AM
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
25f23106
AM
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
25f23106 835
4a969973
AM
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
a680de9a 854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
a680de9a 857
7ba71655 858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
7ba71655 861
f9c6b907 862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907
AM
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
f9c6b907 885
006589cf 886 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
006589cf 889
45965137 890 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
45965137 893
5663e321
AM
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
c213164a
AM
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
87c69f97 933 HOW (R_PPC64_GOT_TLSGD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
934 ppc64_elf_unhandled_reloc),
935
87c69f97 936 HOW (R_PPC64_GOT_TLSLD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
937 ppc64_elf_unhandled_reloc),
938
87c69f97 939 HOW (R_PPC64_GOT_TPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
940 ppc64_elf_unhandled_reloc),
941
87c69f97 942 HOW (R_PPC64_GOT_DTPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
943 ppc64_elf_unhandled_reloc),
944
5663e321
AM
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
5bd4f169 975 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978
979 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
5bd4f169
AM
982};
983
984\f
985/* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988static void
4ce794b7 989ppc_howto_init (void)
5bd4f169
AM
990{
991 unsigned int i, type;
992
a4b6fadd 993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
994 {
995 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999}
1000
1001static reloc_howto_type *
87c69f97 1002ppc64_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
87c69f97 1282 case BFD_RELOC_PPC64_GOT_TLSGD_PCREL34: r = R_PPC64_GOT_TLSGD_PCREL34;
c213164a 1283 break;
87c69f97 1284 case BFD_RELOC_PPC64_GOT_TLSLD_PCREL34: r = R_PPC64_GOT_TLSLD_PCREL34;
c213164a 1285 break;
87c69f97 1286 case BFD_RELOC_PPC64_GOT_TPREL_PCREL34: r = R_PPC64_GOT_TPREL_PCREL34;
c213164a 1287 break;
87c69f97 1288 case BFD_RELOC_PPC64_GOT_DTPREL_PCREL34: r = R_PPC64_GOT_DTPREL_PCREL34;
c213164a 1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7 1319static reloc_howto_type *
87c69f97 1320ppc64_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
157090f7
AM
1321{
1322 unsigned int i;
87c69f97
AM
1323 static char *compat_map[][2] = {
1324 { "R_PPC64_GOT_TLSGD34", "R_PPC64_GOT_TLSGD_PCREL34" },
1325 { "R_PPC64_GOT_TLSLD34", "R_PPC64_GOT_TLSLD_PCREL34" },
1326 { "R_PPC64_GOT_TPREL34", "R_PPC64_GOT_TPREL_PCREL34" },
1327 { "R_PPC64_GOT_DTPREL34", "R_PPC64_GOT_DTPREL_PCREL34" }
1328 };
157090f7 1329
a4b6fadd 1330 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1331 if (ppc64_elf_howto_raw[i].name != NULL
1332 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1333 return &ppc64_elf_howto_raw[i];
1334
87c69f97
AM
1335 /* Handle old names of relocations in case they were used by
1336 .reloc directives.
1337 FIXME: Remove this soon. Mapping the reloc names is very likely
1338 completely unnecessary. */
1339 for (i = 0; i < ARRAY_SIZE (compat_map); i++)
1340 if (strcasecmp (compat_map[i][0], r_name) == 0)
1341 {
1342 _bfd_error_handler (_("warning: %s should be used rather than %s"),
1343 compat_map[i][1], compat_map[i][0]);
1344 return ppc64_elf_reloc_name_lookup (abfd, compat_map[i][1]);
1345 }
1346
157090f7
AM
1347 return NULL;
1348}
1349
5bd4f169
AM
1350/* Set the howto pointer for a PowerPC ELF reloc. */
1351
f3185997 1352static bfd_boolean
4aef7643 1353ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1354 Elf_Internal_Rela *dst)
5bd4f169 1355{
65f38f15
AM
1356 unsigned int type;
1357
ef60b7ff 1358 /* Initialize howto table if needed. */
5bd4f169 1359 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1360 ppc_howto_init ();
1361
65f38f15 1362 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1363 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1364 {
695344c0 1365 /* xgettext:c-format */
0aa13fee 1366 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1367 abfd, type);
f3185997
NC
1368 bfd_set_error (bfd_error_bad_value);
1369 return FALSE;
d0fb9a8d 1370 }
65f38f15 1371 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1372 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1373 {
1374 /* xgettext:c-format */
1375 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1376 abfd, type);
1377 bfd_set_error (bfd_error_bad_value);
1378 return FALSE;
1379 }
2cdcc330 1380
f3185997 1381 return TRUE;
5bd4f169
AM
1382}
1383
04c9666a 1384/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1385
1386static bfd_reloc_status_type
4ce794b7
AM
1387ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1388 void *data, asection *input_section,
1389 bfd *output_bfd, char **error_message)
5bd4f169 1390{
a680de9a
PB
1391 enum elf_ppc64_reloc_type r_type;
1392 long insn;
1393 bfd_size_type octets;
3de43e7b 1394 bfd_vma value;
a680de9a 1395
805fc799
AM
1396 /* If this is a relocatable link (output_bfd test tells us), just
1397 call the generic function. Any adjustment will be done at final
1398 link time. */
1399 if (output_bfd != NULL)
cedb70c5 1400 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1401 input_section, output_bfd, error_message);
1402
5663e321
AM
1403 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1404 We won't actually be using the low bits, so trashing them
805fc799 1405 doesn't matter. */
a680de9a 1406 r_type = reloc_entry->howto->type;
5663e321
AM
1407 if (r_type == R_PPC64_ADDR16_HIGHERA34
1408 || r_type == R_PPC64_ADDR16_HIGHESTA34
1409 || r_type == R_PPC64_REL16_HIGHERA34
1410 || r_type == R_PPC64_REL16_HIGHESTA34)
1411 reloc_entry->addend += 1ULL << 33;
1412 else
1413 reloc_entry->addend += 1U << 15;
a680de9a
PB
1414 if (r_type != R_PPC64_REL16DX_HA)
1415 return bfd_reloc_continue;
1416
1417 value = 0;
1418 if (!bfd_is_com_section (symbol->section))
1419 value = symbol->value;
1420 value += (reloc_entry->addend
1421 + symbol->section->output_offset
1422 + symbol->section->output_section->vma);
1423 value -= (reloc_entry->address
1424 + input_section->output_offset
1425 + input_section->output_section->vma);
3de43e7b 1426 value = (bfd_signed_vma) value >> 16;
a680de9a 1427
bb294208 1428 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1429 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1430 insn &= ~0x1fffc1;
3de43e7b 1431 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1432 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1433 if (value + 0x8000 > 0xffff)
a680de9a
PB
1434 return bfd_reloc_overflow;
1435 return bfd_reloc_ok;
805fc799 1436}
5bd4f169 1437
2441e016
AM
1438static bfd_reloc_status_type
1439ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1440 void *data, asection *input_section,
1441 bfd *output_bfd, char **error_message)
1442{
1443 if (output_bfd != NULL)
1444 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1445 input_section, output_bfd, error_message);
1446
699733f6
AM
1447 if (strcmp (symbol->section->name, ".opd") == 0
1448 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1449 {
1450 bfd_vma dest = opd_entry_value (symbol->section,
1451 symbol->value + reloc_entry->addend,
aef36ac1 1452 NULL, NULL, FALSE);
2441e016
AM
1453 if (dest != (bfd_vma) -1)
1454 reloc_entry->addend = dest - (symbol->value
1455 + symbol->section->output_section->vma
1456 + symbol->section->output_offset);
1457 }
810d4e75
AM
1458 else
1459 {
1460 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1461
1462 if (symbol->section->owner != abfd
9f284bf9 1463 && symbol->section->owner != NULL
810d4e75
AM
1464 && abiversion (symbol->section->owner) >= 2)
1465 {
1466 unsigned int i;
1467
1468 for (i = 0; i < symbol->section->owner->symcount; ++i)
1469 {
1470 asymbol *symdef = symbol->section->owner->outsymbols[i];
1471
1472 if (strcmp (symdef->name, symbol->name) == 0)
1473 {
1474 elfsym = (elf_symbol_type *) symdef;
1475 break;
1476 }
1477 }
1478 }
1479 reloc_entry->addend
1480 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1481 }
2441e016
AM
1482 return bfd_reloc_continue;
1483}
1484
805fc799 1485static bfd_reloc_status_type
4ce794b7
AM
1486ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1487 void *data, asection *input_section,
1488 bfd *output_bfd, char **error_message)
805fc799
AM
1489{
1490 long insn;
04c9666a 1491 enum elf_ppc64_reloc_type r_type;
805fc799 1492 bfd_size_type octets;
794e51c0
AM
1493 /* Assume 'at' branch hints. */
1494 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1495
1496 /* If this is a relocatable link (output_bfd test tells us), just
1497 call the generic function. Any adjustment will be done at final
1498 link time. */
5bd4f169 1499 if (output_bfd != NULL)
cedb70c5 1500 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1501 input_section, output_bfd, error_message);
1502
bb294208 1503 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1504 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1505 insn &= ~(0x01 << 21);
4ce794b7 1506 r_type = reloc_entry->howto->type;
805fc799
AM
1507 if (r_type == R_PPC64_ADDR14_BRTAKEN
1508 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1509 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1510
794e51c0 1511 if (is_isa_v2)
5bd4f169 1512 {
805fc799
AM
1513 /* Set 'a' bit. This is 0b00010 in BO field for branch
1514 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1515 for branch on CTR insns (BO == 1a00t or 1a01t). */
1516 if ((insn & (0x14 << 21)) == (0x04 << 21))
1517 insn |= 0x02 << 21;
1518 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1519 insn |= 0x08 << 21;
1520 else
2441e016 1521 goto out;
5bd4f169 1522 }
805fc799
AM
1523 else
1524 {
1525 bfd_vma target = 0;
1526 bfd_vma from;
5bd4f169 1527
805fc799
AM
1528 if (!bfd_is_com_section (symbol->section))
1529 target = symbol->value;
1530 target += symbol->section->output_section->vma;
1531 target += symbol->section->output_offset;
1532 target += reloc_entry->addend;
5bd4f169 1533
805fc799
AM
1534 from = (reloc_entry->address
1535 + input_section->output_offset
1536 + input_section->output_section->vma);
5bd4f169 1537
805fc799
AM
1538 /* Invert 'y' bit if not the default. */
1539 if ((bfd_signed_vma) (target - from) < 0)
1540 insn ^= 0x01 << 21;
1541 }
4ce794b7 1542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1543 out:
1544 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1545 input_section, output_bfd, error_message);
805fc799 1546}
5bd4f169 1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1558 input_section, output_bfd, error_message);
5bd4f169 1559
805fc799
AM
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1562 return bfd_reloc_continue;
1563}
1564
805fc799 1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 /* If this is a relocatable link (output_bfd test tells us), just
1571 call the generic function. Any adjustment will be done at final
1572 link time. */
1573 if (output_bfd != NULL)
cedb70c5 1574 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1575 input_section, output_bfd, error_message);
1576
1577 /* Subtract the symbol section base address. */
1578 reloc_entry->addend -= symbol->section->output_section->vma;
1579
1580 /* Adjust the addend for sign extension of the low 16 bits. */
1581 reloc_entry->addend += 0x8000;
1582 return bfd_reloc_continue;
1583}
1584
1585static bfd_reloc_status_type
4ce794b7
AM
1586ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1587 void *data, asection *input_section,
1588 bfd *output_bfd, char **error_message)
805fc799
AM
1589{
1590 bfd_vma TOCstart;
1591
1592 /* If this is a relocatable link (output_bfd test tells us), just
1593 call the generic function. Any adjustment will be done at final
1594 link time. */
1595 if (output_bfd != NULL)
cedb70c5 1596 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1597 input_section, output_bfd, error_message);
1598
1599 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1600 if (TOCstart == 0)
1c865ab2 1601 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1602
1603 /* Subtract the TOC base address. */
1604 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1605 return bfd_reloc_continue;
1606}
1607
1608static bfd_reloc_status_type
4ce794b7
AM
1609ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1610 void *data, asection *input_section,
1611 bfd *output_bfd, char **error_message)
805fc799
AM
1612{
1613 bfd_vma TOCstart;
1614
1615 /* If this is a relocatable link (output_bfd test tells us), just
1616 call the generic function. Any adjustment will be done at final
1617 link time. */
1618 if (output_bfd != NULL)
cedb70c5 1619 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1620 input_section, output_bfd, error_message);
1621
1622 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1623 if (TOCstart == 0)
1c865ab2 1624 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1625
1626 /* Subtract the TOC base address. */
1627 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1628
1629 /* Adjust the addend for sign extension of the low 16 bits. */
1630 reloc_entry->addend += 0x8000;
1631 return bfd_reloc_continue;
1632}
1633
1634static bfd_reloc_status_type
4ce794b7
AM
1635ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1636 void *data, asection *input_section,
1637 bfd *output_bfd, char **error_message)
805fc799
AM
1638{
1639 bfd_vma TOCstart;
1640 bfd_size_type octets;
1641
1642 /* If this is a relocatable link (output_bfd test tells us), just
1643 call the generic function. Any adjustment will be done at final
1644 link time. */
1645 if (output_bfd != NULL)
cedb70c5 1646 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1647 input_section, output_bfd, error_message);
1648
1649 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1650 if (TOCstart == 0)
1c865ab2 1651 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1652
bb294208 1653 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1654 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1655 return bfd_reloc_ok;
1656}
1657
5663e321
AM
1658static bfd_reloc_status_type
1659ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1660 void *data, asection *input_section,
1661 bfd *output_bfd, char **error_message)
1662{
1663 uint64_t insn;
1664 bfd_vma targ;
1665
1666 if (output_bfd != NULL)
1667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1668 input_section, output_bfd, error_message);
1669
1670 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1671 insn <<= 32;
1672 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1673
1674 targ = (symbol->section->output_section->vma
1675 + symbol->section->output_offset
1676 + reloc_entry->addend);
1677 if (!bfd_is_com_section (symbol->section))
1678 targ += symbol->value;
1679 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1680 targ += 1ULL << 33;
1681 if (reloc_entry->howto->pc_relative)
1682 {
1683 bfd_vma from = (reloc_entry->address
1684 + input_section->output_offset
1685 + input_section->output_section->vma);
1686 targ -=from;
1687 }
1688 targ >>= reloc_entry->howto->rightshift;
1689 insn &= ~reloc_entry->howto->dst_mask;
1690 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1691 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1692 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1693 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1694 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1695 >= 1ULL << reloc_entry->howto->bitsize))
1696 return bfd_reloc_overflow;
1697 return bfd_reloc_ok;
1698}
1699
805fc799 1700static bfd_reloc_status_type
4ce794b7
AM
1701ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1702 void *data, asection *input_section,
1703 bfd *output_bfd, char **error_message)
805fc799
AM
1704{
1705 /* If this is a relocatable link (output_bfd test tells us), just
1706 call the generic function. Any adjustment will be done at final
1707 link time. */
1708 if (output_bfd != NULL)
cedb70c5 1709 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1710 input_section, output_bfd, error_message);
1711
1712 if (error_message != NULL)
1713 {
1714 static char buf[60];
1715 sprintf (buf, "generic linker can't handle %s",
1716 reloc_entry->howto->name);
1717 *error_message = buf;
1718 }
1719 return bfd_reloc_dangerous;
1720}
1721
927be08e
AM
1722/* Track GOT entries needed for a given symbol. We might need more
1723 than one got entry per symbol. */
1724struct got_entry
1725{
1726 struct got_entry *next;
1727
1728 /* The symbol addend that we'll be placing in the GOT. */
1729 bfd_vma addend;
1730
1731 /* Unlike other ELF targets, we use separate GOT entries for the same
1732 symbol referenced from different input files. This is to support
1733 automatic multiple TOC/GOT sections, where the TOC base can vary
1734 from one input file to another. After partitioning into TOC groups
1735 we merge entries within the group.
1736
1737 Point to the BFD owning this GOT entry. */
1738 bfd *owner;
1739
1740 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1741 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1742 unsigned char tls_type;
927be08e
AM
1743
1744 /* Non-zero if got.ent points to real entry. */
f961d9dd 1745 unsigned char is_indirect;
927be08e
AM
1746
1747 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1748 union
2cdcc330
AM
1749 {
1750 bfd_signed_vma refcount;
1751 bfd_vma offset;
1752 struct got_entry *ent;
1753 } got;
927be08e
AM
1754};
1755
1756/* The same for PLT. */
1757struct plt_entry
1758{
1759 struct plt_entry *next;
1760
1761 bfd_vma addend;
1762
1763 union
2cdcc330
AM
1764 {
1765 bfd_signed_vma refcount;
1766 bfd_vma offset;
1767 } plt;
927be08e
AM
1768};
1769
e717da7e
AM
1770struct ppc64_elf_obj_tdata
1771{
1772 struct elf_obj_tdata elf;
1773
1774 /* Shortcuts to dynamic linker sections. */
1775 asection *got;
1776 asection *relgot;
1777
b3fac117
AM
1778 /* Used during garbage collection. We attach global symbols defined
1779 on removed .opd entries to this section so that the sym is removed. */
1780 asection *deleted_section;
81688140 1781
927be08e 1782 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1783 sections means we potentially need one of these for each input bfd. */
927be08e 1784 struct got_entry tlsld_got;
8860955f 1785
2cdcc330
AM
1786 union
1787 {
729eabd5
AM
1788 /* A copy of relocs before they are modified for --emit-relocs. */
1789 Elf_Internal_Rela *relocs;
1790
1791 /* Section contents. */
1792 bfd_byte *contents;
1793 } opd;
d77c8a4b
AM
1794
1795 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1796 the reloc to be in the range -32768 to 32767. */
98528052
AM
1797 unsigned int has_small_toc_reloc : 1;
1798
560c8763
AM
1799 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1800 instruction not one we handle. */
1801 unsigned int unexpected_toc_insn : 1;
066f4018 1802
903b777d
AM
1803 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1804 this file. */
1805 unsigned int has_optrel : 1;
e717da7e
AM
1806};
1807
1808#define ppc64_elf_tdata(bfd) \
1809 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1810
1811#define ppc64_tlsld_got(bfd) \
1812 (&ppc64_elf_tdata (bfd)->tlsld_got)
1813
0c8d6e5c
AM
1814#define is_ppc64_elf(bfd) \
1815 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1816 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1817
e717da7e
AM
1818/* Override the generic function because we store some extras. */
1819
1820static bfd_boolean
1821ppc64_elf_mkobject (bfd *abfd)
1822{
0ffa91dd 1823 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1824 PPC64_ELF_DATA);
e717da7e
AM
1825}
1826
feee612b 1827/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1828 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1829
b34976b6 1830static bfd_boolean
4ce794b7 1831ppc64_elf_object_p (bfd *abfd)
feee612b 1832{
14b57c7c
AM
1833 if (!abfd->arch_info->the_default)
1834 return TRUE;
1835
1836 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1837 {
1838 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1839
1840 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1841 {
1842 /* Relies on arch after 32 bit default being 64 bit default. */
1843 abfd->arch_info = abfd->arch_info->next;
1844 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1845 }
1846 }
14b57c7c 1847 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1848}
1849
d37c89e5
AM
1850/* Support for core dump NOTE sections. */
1851
1852static bfd_boolean
1853ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1854{
eea6121a 1855 size_t offset, size;
d37c89e5
AM
1856
1857 if (note->descsz != 504)
1858 return FALSE;
1859
1860 /* pr_cursig */
228e534f 1861 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1862
1863 /* pr_pid */
228e534f 1864 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1865
1866 /* pr_reg */
1867 offset = 112;
eea6121a 1868 size = 384;
d37c89e5
AM
1869
1870 /* Make a ".reg/999" section. */
1871 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1872 size, note->descpos + offset);
d37c89e5
AM
1873}
1874
1875static bfd_boolean
1876ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1877{
1878 if (note->descsz != 136)
1879 return FALSE;
1880
228e534f 1881 elf_tdata (abfd)->core->pid
bc989cdc 1882 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1883 elf_tdata (abfd)->core->program
d37c89e5 1884 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1885 elf_tdata (abfd)->core->command
d37c89e5
AM
1886 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1887
1888 return TRUE;
1889}
1890
183e98be
AM
1891static char *
1892ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1893 ...)
1894{
1895 switch (note_type)
1896 {
1897 default:
1898 return NULL;
1899
1900 case NT_PRPSINFO:
1901 {
9ef6d1e3 1902 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1903 va_list ap;
1904
1905 va_start (ap, note_type);
75cd47ed 1906 memset (data, 0, sizeof (data));
183e98be 1907 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1908#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1909 DIAGNOSTIC_PUSH;
be3e27bb 1910 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1911 -Wstringop-truncation:
1912 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1913 */
95da9854
L
1914 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1915#endif
183e98be 1916 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1917#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1918 DIAGNOSTIC_POP;
fe75810f 1919#endif
183e98be
AM
1920 va_end (ap);
1921 return elfcore_write_note (abfd, buf, bufsiz,
1922 "CORE", note_type, data, sizeof (data));
1923 }
1924
1925 case NT_PRSTATUS:
1926 {
1927 char data[504];
1928 va_list ap;
1929 long pid;
1930 int cursig;
1931 const void *greg;
1932
1933 va_start (ap, note_type);
1934 memset (data, 0, 112);
1935 pid = va_arg (ap, long);
1936 bfd_put_32 (abfd, pid, data + 32);
1937 cursig = va_arg (ap, int);
1938 bfd_put_16 (abfd, cursig, data + 12);
1939 greg = va_arg (ap, const void *);
1940 memcpy (data + 112, greg, 384);
1941 memset (data + 496, 0, 8);
1942 va_end (ap);
1943 return elfcore_write_note (abfd, buf, bufsiz,
1944 "CORE", note_type, data, sizeof (data));
1945 }
1946 }
1947}
1948
5d35169e
AM
1949/* Add extra PPC sections. */
1950
2cdcc330 1951static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1952{
07d6d2b8
AM
1953 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1954 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1955 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1956 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1957 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1958 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1959 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1960};
1961
7c8fe5c4
AM
1962enum _ppc64_sec_type {
1963 sec_normal = 0,
1964 sec_opd = 1,
1965 sec_toc = 2
1966};
1967
f0abc2a1
AM
1968struct _ppc64_elf_section_data
1969{
1970 struct bfd_elf_section_data elf;
411e1bfb 1971
f0abc2a1
AM
1972 union
1973 {
51aecdc5
AM
1974 /* An array with one entry for each opd function descriptor,
1975 and some spares since opd entries may be either 16 or 24 bytes. */
1976#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1977 struct _opd_sec_data
1978 {
1979 /* Points to the function code section for local opd entries. */
1980 asection **func_sec;
1981
1982 /* After editing .opd, adjust references to opd local syms. */
1983 long *adjust;
1984 } opd;
7c8fe5c4 1985
3a71aa26
AM
1986 /* An array for toc sections, indexed by offset/8. */
1987 struct _toc_sec_data
1988 {
1989 /* Specifies the relocation symbol index used at a given toc offset. */
1990 unsigned *symndx;
1991
1992 /* And the relocation addend. */
1993 bfd_vma *add;
1994 } toc;
7c8fe5c4
AM
1995 } u;
1996
1997 enum _ppc64_sec_type sec_type:2;
411e1bfb 1998
7c8fe5c4
AM
1999 /* Flag set when small branches are detected. Used to
2000 select suitable defaults for the stub group size. */
2001 unsigned int has_14bit_branch:1;
3e04d765
AM
2002
2003 /* Flag set when PLTCALL relocs are detected. */
2004 unsigned int has_pltcall:1;
066f4018 2005
903b777d
AM
2006 /* Flag set when section has PLT/GOT/TOC relocations that can be
2007 optimised. */
2008 unsigned int has_optrel:1;
f0abc2a1
AM
2009};
2010
2011#define ppc64_elf_section_data(sec) \
411e1bfb 2012 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2013
2014static bfd_boolean
4ce794b7 2015ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 2016{
f592407e
AM
2017 if (!sec->used_by_bfd)
2018 {
2019 struct _ppc64_elf_section_data *sdata;
986f0783 2020 size_t amt = sizeof (*sdata);
f0abc2a1 2021
f592407e
AM
2022 sdata = bfd_zalloc (abfd, amt);
2023 if (sdata == NULL)
2024 return FALSE;
2025 sec->used_by_bfd = sdata;
2026 }
f0abc2a1
AM
2027
2028 return _bfd_elf_new_section_hook (abfd, sec);
2029}
4025353c 2030
bf577467
AM
2031static bfd_boolean
2032ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2033{
2034 const char *name = hdr->bfd_section->name;
2035
2036 if (strncmp (name, ".sbss", 5) == 0
2037 || strncmp (name, ".sdata", 6) == 0)
2038 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2039
2040 return TRUE;
2041}
2042
74f0fb50 2043static struct _opd_sec_data *
4025353c
AM
2044get_opd_info (asection * sec)
2045{
2046 if (sec != NULL
2047 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2048 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2049 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2050 return NULL;
2051}
90e3cdf2
JJ
2052\f
2053/* Parameters for the qsort hook. */
90e3cdf2 2054static bfd_boolean synthetic_relocatable;
cd285db5 2055static asection *synthetic_opd;
90e3cdf2 2056
699733f6 2057/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2058
2059static int
2060compare_symbols (const void *ap, const void *bp)
2061{
2cdcc330
AM
2062 const asymbol *a = *(const asymbol **) ap;
2063 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2064
699733f6
AM
2065 /* Section symbols first. */
2066 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2067 return -1;
699733f6 2068 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2069 return 1;
2070
699733f6 2071 /* then .opd symbols. */
cd285db5
AM
2072 if (synthetic_opd != NULL)
2073 {
2074 if (strcmp (a->section->name, ".opd") == 0
2075 && strcmp (b->section->name, ".opd") != 0)
2076 return -1;
2077 if (strcmp (a->section->name, ".opd") != 0
2078 && strcmp (b->section->name, ".opd") == 0)
2079 return 1;
2080 }
90e3cdf2 2081
699733f6 2082 /* then other code symbols. */
2cdcc330
AM
2083 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2084 == (SEC_CODE | SEC_ALLOC))
2085 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2086 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2087 return -1;
2088
2cdcc330
AM
2089 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2090 != (SEC_CODE | SEC_ALLOC))
2091 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2092 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2093 return 1;
2094
2095 if (synthetic_relocatable)
2096 {
2097 if (a->section->id < b->section->id)
2098 return -1;
2099
2100 if (a->section->id > b->section->id)
2101 return 1;
2102 }
2103
2104 if (a->value + a->section->vma < b->value + b->section->vma)
2105 return -1;
2106
2107 if (a->value + a->section->vma > b->value + b->section->vma)
2108 return 1;
2109
4d35a0aa
AM
2110 /* For syms with the same value, prefer strong dynamic global function
2111 syms over other syms. */
2112 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2113 return -1;
2114
2115 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2116 return 1;
2117
2118 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2119 return -1;
2120
2121 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2122 return 1;
2123
2124 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2125 return -1;
2126
2127 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2128 return 1;
2129
2130 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2131 return -1;
2132
2133 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2134 return 1;
2135
dcea6a95
AM
2136 /* Finally, sort on where the symbol is in memory. The symbols will
2137 be in at most two malloc'd blocks, one for static syms, one for
2138 dynamic syms, and we distinguish the two blocks above by testing
2139 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2140 originally in the same order as the symbols (and we're not
2141 sorting the symbols themselves), this ensures a stable sort. */
2142 if (a < b)
2143 return -1;
2144 if (a > b)
2145 return 1;
2146 return 0;
90e3cdf2
JJ
2147}
2148
699733f6 2149/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2150
699733f6 2151static asymbol *
9ad9b810
AM
2152sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2153 bfd_vma value)
90e3cdf2 2154{
9ad9b810 2155 size_t mid;
90e3cdf2 2156
7292b3ac 2157 if (id == (unsigned) -1)
699733f6
AM
2158 {
2159 while (lo < hi)
2160 {
2161 mid = (lo + hi) >> 1;
2162 if (syms[mid]->value + syms[mid]->section->vma < value)
2163 lo = mid + 1;
2164 else if (syms[mid]->value + syms[mid]->section->vma > value)
2165 hi = mid;
2166 else
2167 return syms[mid];
2168 }
2169 }
2170 else
2171 {
2172 while (lo < hi)
2173 {
2174 mid = (lo + hi) >> 1;
2175 if (syms[mid]->section->id < id)
2176 lo = mid + 1;
2177 else if (syms[mid]->section->id > id)
2178 hi = mid;
2179 else if (syms[mid]->value < value)
2180 lo = mid + 1;
2181 else if (syms[mid]->value > value)
2182 hi = mid;
2183 else
2184 return syms[mid];
2185 }
2186 }
2187 return NULL;
90e3cdf2
JJ
2188}
2189
468392fb
AM
2190static bfd_boolean
2191section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2192{
2193 bfd_vma vma = *(bfd_vma *) ptr;
2194 return ((section->flags & SEC_ALLOC) != 0
2195 && section->vma <= vma
2196 && vma < section->vma + section->size);
2197}
2198
699733f6 2199/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2200 entry syms. Also generate @plt symbols for the glink branch table.
2201 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2202
2203static long
a7535cf3
AM
2204ppc64_elf_get_synthetic_symtab (bfd *abfd,
2205 long static_count, asymbol **static_syms,
2206 long dyn_count, asymbol **dyn_syms,
c9727e01 2207 asymbol **ret)
90e3cdf2
JJ
2208{
2209 asymbol *s;
0ccf57bd 2210 size_t i, j, count;
90e3cdf2 2211 char *names;
0ccf57bd 2212 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2213 asection *opd = NULL;
90e3cdf2 2214 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2215 asymbol **syms;
ee67d69a 2216 int abi = abiversion (abfd);
90e3cdf2
JJ
2217
2218 *ret = NULL;
2219
ee67d69a
AM
2220 if (abi < 2)
2221 {
2222 opd = bfd_get_section_by_name (abfd, ".opd");
2223 if (opd == NULL && abi == 1)
2224 return 0;
2225 }
90e3cdf2 2226
a5259595
AM
2227 syms = NULL;
2228 codesecsym = 0;
2229 codesecsymend = 0;
2230 secsymend = 0;
2231 opdsymend = 0;
2232 symcount = 0;
2233 if (opd != NULL)
c9727e01 2234 {
a5259595
AM
2235 symcount = static_count;
2236 if (!relocatable)
2237 symcount += dyn_count;
2238 if (symcount == 0)
2239 return 0;
c9727e01 2240
a5259595
AM
2241 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2242 if (syms == NULL)
2243 return -1;
90e3cdf2 2244
a5259595
AM
2245 if (!relocatable && static_count != 0 && dyn_count != 0)
2246 {
2247 /* Use both symbol tables. */
2248 memcpy (syms, static_syms, static_count * sizeof (*syms));
2249 memcpy (syms + static_count, dyn_syms,
2250 (dyn_count + 1) * sizeof (*syms));
2251 }
2252 else if (!relocatable && static_count == 0)
2253 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2254 else
2255 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2256
0ccf57bd
AM
2257 /* Trim uninteresting symbols. Interesting symbols are section,
2258 function, and notype symbols. */
2259 for (i = 0, j = 0; i < symcount; ++i)
2260 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2261 | BSF_RELC | BSF_SRELC)) == 0)
2262 syms[j++] = syms[i];
2263 symcount = j;
2264
a5259595
AM
2265 synthetic_relocatable = relocatable;
2266 synthetic_opd = opd;
2267 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2268
a5259595
AM
2269 if (!relocatable && symcount > 1)
2270 {
bfa5bd2a
PA
2271 /* Trim duplicate syms, since we may have merged the normal
2272 and dynamic symbols. Actually, we only care about syms
2273 that have different values, so trim any with the same
2274 value. Don't consider ifunc and ifunc resolver symbols
2275 duplicates however, because GDB wants to know whether a
2276 text symbol is an ifunc resolver. */
a5259595 2277 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2278 {
2279 const asymbol *s0 = syms[i - 1];
2280 const asymbol *s1 = syms[i];
2281
2282 if ((s0->value + s0->section->vma
2283 != s1->value + s1->section->vma)
2284 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2285 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2286 syms[j++] = syms[i];
2287 }
a5259595
AM
2288 symcount = j;
2289 }
699733f6 2290
a5259595
AM
2291 i = 0;
2292 /* Note that here and in compare_symbols we can't compare opd and
2293 sym->section directly. With separate debug info files, the
2294 symbols will be extracted from the debug file while abfd passed
2295 to this function is the real binary. */
0ccf57bd 2296 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2297 ++i;
2298 codesecsym = i;
2299
2300 for (; i < symcount; ++i)
2301 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2302 | SEC_THREAD_LOCAL))
2303 != (SEC_CODE | SEC_ALLOC))
2304 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2305 break;
2306 codesecsymend = i;
2307
2308 for (; i < symcount; ++i)
2309 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2310 break;
2311 secsymend = i;
2312
2313 for (; i < symcount; ++i)
2314 if (strcmp (syms[i]->section->name, ".opd") != 0)
2315 break;
2316 opdsymend = i;
2317
2318 for (; i < symcount; ++i)
2cdcc330
AM
2319 if (((syms[i]->section->flags
2320 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2321 != (SEC_CODE | SEC_ALLOC))
2322 break;
2323 symcount = i;
2324 }
c9727e01 2325 count = 0;
90e3cdf2 2326
699733f6 2327 if (relocatable)
90e3cdf2 2328 {
699733f6
AM
2329 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2330 arelent *r;
2331 size_t size;
0ccf57bd 2332 size_t relcount;
90e3cdf2 2333
468392fb
AM
2334 if (opdsymend == secsymend)
2335 goto done;
2336
699733f6 2337 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2338 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2339 if (relcount == 0)
c9727e01 2340 goto done;
90e3cdf2 2341
7356fed5
AM
2342 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2343 {
2344 count = -1;
2345 goto done;
2346 }
2347
699733f6 2348 size = 0;
595da8c5 2349 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2350 {
2351 asymbol *sym;
90e3cdf2 2352
595da8c5 2353 while (r < opd->relocation + relcount
699733f6
AM
2354 && r->address < syms[i]->value + opd->vma)
2355 ++r;
90e3cdf2 2356
595da8c5 2357 if (r == opd->relocation + relcount)
699733f6 2358 break;
90e3cdf2 2359
699733f6
AM
2360 if (r->address != syms[i]->value + opd->vma)
2361 continue;
90e3cdf2 2362
699733f6
AM
2363 if (r->howto->type != R_PPC64_ADDR64)
2364 continue;
90e3cdf2 2365
699733f6
AM
2366 sym = *r->sym_ptr_ptr;
2367 if (!sym_exists_at (syms, opdsymend, symcount,
2368 sym->section->id, sym->value + r->addend))
2369 {
2370 ++count;
2371 size += sizeof (asymbol);
2372 size += strlen (syms[i]->name) + 2;
2373 }
2374 }
90e3cdf2 2375
c4b0b099
AM
2376 if (size == 0)
2377 goto done;
699733f6
AM
2378 s = *ret = bfd_malloc (size);
2379 if (s == NULL)
2380 {
7356fed5 2381 count = -1;
c9727e01 2382 goto done;
699733f6 2383 }
90e3cdf2 2384
699733f6 2385 names = (char *) (s + count);
90e3cdf2 2386
595da8c5 2387 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2388 {
699733f6 2389 asymbol *sym;
90e3cdf2 2390
595da8c5 2391 while (r < opd->relocation + relcount
699733f6
AM
2392 && r->address < syms[i]->value + opd->vma)
2393 ++r;
90e3cdf2 2394
595da8c5 2395 if (r == opd->relocation + relcount)
699733f6
AM
2396 break;
2397
2398 if (r->address != syms[i]->value + opd->vma)
2399 continue;
2400
2401 if (r->howto->type != R_PPC64_ADDR64)
2402 continue;
90e3cdf2 2403
699733f6
AM
2404 sym = *r->sym_ptr_ptr;
2405 if (!sym_exists_at (syms, opdsymend, symcount,
2406 sym->section->id, sym->value + r->addend))
2407 {
2408 size_t len;
2409
2410 *s = *syms[i];
6ba2a415 2411 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2412 s->section = sym->section;
2413 s->value = sym->value + r->addend;
2414 s->name = names;
2415 *names++ = '.';
2416 len = strlen (syms[i]->name);
2417 memcpy (names, syms[i]->name, len + 1);
2418 names += len + 1;
6f610d07
UW
2419 /* Have udata.p point back to the original symbol this
2420 synthetic symbol was derived from. */
2421 s->udata.p = syms[i];
699733f6
AM
2422 s++;
2423 }
2424 }
2425 }
2426 else
90e3cdf2 2427 {
468392fb 2428 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2429 bfd_byte *contents = NULL;
699733f6 2430 size_t size;
0ccf57bd 2431 size_t plt_count = 0;
468392fb
AM
2432 bfd_vma glink_vma = 0, resolv_vma = 0;
2433 asection *dynamic, *glink = NULL, *relplt = NULL;
2434 arelent *p;
90e3cdf2 2435
ee67d69a 2436 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2437 {
c4b0b099
AM
2438 free_contents_and_exit_err:
2439 count = -1;
ee67d69a 2440 free_contents_and_exit:
c9594989 2441 free (contents);
c9727e01 2442 goto done;
699733f6 2443 }
90e3cdf2 2444
699733f6
AM
2445 size = 0;
2446 for (i = secsymend; i < opdsymend; ++i)
2447 {
2448 bfd_vma ent;
90e3cdf2 2449
5ef11c02
AM
2450 /* Ignore bogus symbols. */
2451 if (syms[i]->value > opd->size - 8)
2452 continue;
2453
699733f6
AM
2454 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2455 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2456 {
2457 ++count;
2458 size += sizeof (asymbol);
2459 size += strlen (syms[i]->name) + 2;
2460 }
2461 }
90e3cdf2 2462
468392fb 2463 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2464 if (dyn_count != 0
2465 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2466 {
2467 bfd_byte *dynbuf, *extdyn, *extdynend;
2468 size_t extdynsize;
2469 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2470
2471 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2472 goto free_contents_and_exit_err;
468392fb
AM
2473
2474 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2475 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2476
2477 extdyn = dynbuf;
2478 extdynend = extdyn + dynamic->size;
2479 for (; extdyn < extdynend; extdyn += extdynsize)
2480 {
2481 Elf_Internal_Dyn dyn;
2482 (*swap_dyn_in) (abfd, extdyn, &dyn);
2483
2484 if (dyn.d_tag == DT_NULL)
2485 break;
2486
2487 if (dyn.d_tag == DT_PPC64_GLINK)
2488 {
9e390558
AM
2489 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2490 See comment in ppc64_elf_finish_dynamic_sections. */
2491 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2492 /* The .glink section usually does not survive the final
2493 link; search for the section (usually .text) where the
2494 glink stubs now reside. */
2495 glink = bfd_sections_find_if (abfd, section_covers_vma,
2496 &glink_vma);
2497 break;
2498 }
2499 }
2500
2501 free (dynbuf);
2502 }
2503
2504 if (glink != NULL)
2505 {
2506 /* Determine __glink trampoline by reading the relative branch
2507 from the first glink stub. */
2508 bfd_byte buf[4];
b9e5796b
AM
2509 unsigned int off = 0;
2510
2511 while (bfd_get_section_contents (abfd, glink, buf,
2512 glink_vma + off - glink->vma, 4))
468392fb
AM
2513 {
2514 unsigned int insn = bfd_get_32 (abfd, buf);
2515 insn ^= B_DOT;
2516 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2517 {
2cdcc330
AM
2518 resolv_vma
2519 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2520 break;
2521 }
2522 off += 4;
2523 if (off > 4)
2524 break;
468392fb
AM
2525 }
2526
2527 if (resolv_vma)
2528 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2529
066ee829
AM
2530 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2531 if (relplt != NULL)
2532 {
2533 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2534 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2535 goto free_contents_and_exit_err;
68ffbac6 2536
066ee829
AM
2537 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2538 size += plt_count * sizeof (asymbol);
468392fb 2539
066ee829
AM
2540 p = relplt->relocation;
2541 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2542 {
2543 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2544 if (p->addend != 0)
2545 size += sizeof ("+0x") - 1 + 16;
2546 }
066ee829 2547 }
468392fb
AM
2548 }
2549
c4b0b099
AM
2550 if (size == 0)
2551 goto free_contents_and_exit;
699733f6
AM
2552 s = *ret = bfd_malloc (size);
2553 if (s == NULL)
c4b0b099 2554 goto free_contents_and_exit_err;
90e3cdf2 2555
468392fb 2556 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2557
699733f6 2558 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2559 {
699733f6 2560 bfd_vma ent;
90e3cdf2 2561
5ef11c02
AM
2562 if (syms[i]->value > opd->size - 8)
2563 continue;
2564
699733f6
AM
2565 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2566 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2567 {
0ccf57bd 2568 size_t lo, hi;
699733f6 2569 size_t len;
c9727e01 2570 asection *sec = abfd->sections;
90e3cdf2 2571
699733f6
AM
2572 *s = *syms[i];
2573 lo = codesecsym;
2574 hi = codesecsymend;
2575 while (lo < hi)
2576 {
0ccf57bd 2577 size_t mid = (lo + hi) >> 1;
699733f6
AM
2578 if (syms[mid]->section->vma < ent)
2579 lo = mid + 1;
2580 else if (syms[mid]->section->vma > ent)
2581 hi = mid;
2582 else
c9727e01
AM
2583 {
2584 sec = syms[mid]->section;
2585 break;
2586 }
699733f6
AM
2587 }
2588
c9727e01 2589 if (lo >= hi && lo > codesecsym)
699733f6 2590 sec = syms[lo - 1]->section;
699733f6
AM
2591
2592 for (; sec != NULL; sec = sec->next)
2593 {
2594 if (sec->vma > ent)
2595 break;
63524580
JK
2596 /* SEC_LOAD may not be set if SEC is from a separate debug
2597 info file. */
2598 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2599 break;
2600 if ((sec->flags & SEC_CODE) != 0)
2601 s->section = sec;
2602 }
6ba2a415 2603 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2604 s->value = ent - s->section->vma;
2605 s->name = names;
2606 *names++ = '.';
2607 len = strlen (syms[i]->name);
2608 memcpy (names, syms[i]->name, len + 1);
2609 names += len + 1;
6f610d07
UW
2610 /* Have udata.p point back to the original symbol this
2611 synthetic symbol was derived from. */
2612 s->udata.p = syms[i];
699733f6 2613 s++;
90e3cdf2 2614 }
90e3cdf2 2615 }
699733f6 2616 free (contents);
468392fb
AM
2617
2618 if (glink != NULL && relplt != NULL)
2619 {
2620 if (resolv_vma)
2621 {
2622 /* Add a symbol for the main glink trampoline. */
86a4952b 2623 memset (s, 0, sizeof *s);
468392fb 2624 s->the_bfd = abfd;
6ba2a415 2625 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2626 s->section = glink;
2627 s->value = resolv_vma - glink->vma;
2628 s->name = names;
2cdcc330
AM
2629 memcpy (names, "__glink_PLTresolve",
2630 sizeof ("__glink_PLTresolve"));
468392fb
AM
2631 names += sizeof ("__glink_PLTresolve");
2632 s++;
2633 count++;
2634 }
2635
2636 /* FIXME: It would be very much nicer to put sym@plt on the
2637 stub rather than on the glink branch table entry. The
2638 objdump disassembler would then use a sensible symbol
2639 name on plt calls. The difficulty in doing so is
2640 a) finding the stubs, and,
2641 b) matching stubs against plt entries, and,
2642 c) there can be multiple stubs for a given plt entry.
2643
2644 Solving (a) could be done by code scanning, but older
2645 ppc64 binaries used different stubs to current code.
2646 (b) is the tricky one since you need to known the toc
2647 pointer for at least one function that uses a pic stub to
2648 be able to calculate the plt address referenced.
2649 (c) means gdb would need to set multiple breakpoints (or
2650 find the glink branch itself) when setting breakpoints
2651 for pending shared library loads. */
2652 p = relplt->relocation;
2653 for (i = 0; i < plt_count; i++, p++)
2654 {
2655 size_t len;
2656
2657 *s = **p->sym_ptr_ptr;
2658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2659 we are defining a symbol, ensure one of them is set. */
2660 if ((s->flags & BSF_LOCAL) == 0)
2661 s->flags |= BSF_GLOBAL;
6ba2a415 2662 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2663 s->section = glink;
2664 s->value = glink_vma - glink->vma;
2665 s->name = names;
2666 s->udata.p = NULL;
2667 len = strlen ((*p->sym_ptr_ptr)->name);
2668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2669 names += len;
e054468f
AM
2670 if (p->addend != 0)
2671 {
2672 memcpy (names, "+0x", sizeof ("+0x") - 1);
2673 names += sizeof ("+0x") - 1;
2674 bfd_sprintf_vma (abfd, names, p->addend);
2675 names += strlen (names);
2676 }
468392fb
AM
2677 memcpy (names, "@plt", sizeof ("@plt"));
2678 names += sizeof ("@plt");
2679 s++;
b9e5796b
AM
2680 if (abi < 2)
2681 {
2682 glink_vma += 8;
2683 if (i >= 0x8000)
2684 glink_vma += 4;
2685 }
2686 else
468392fb
AM
2687 glink_vma += 4;
2688 }
2689 count += plt_count;
2690 }
90e3cdf2
JJ
2691 }
2692
c9727e01 2693 done:
a7535cf3 2694 free (syms);
90e3cdf2
JJ
2695 return count;
2696}
5bd4f169 2697\f
65f38f15
AM
2698/* The following functions are specific to the ELF linker, while
2699 functions above are used generally. Those named ppc64_elf_* are
2700 called by the main ELF linker code. They appear in this file more
2701 or less in the order in which they are called. eg.
2702 ppc64_elf_check_relocs is called early in the link process,
2703 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2704 called.
2705
2706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2707 functions have both a function code symbol and a function descriptor
2708 symbol. A call to foo in a relocatable object file looks like:
2709
2710 . .text
2711 . x:
2712 . bl .foo
2713 . nop
2714
2715 The function definition in another object file might be:
2716
2717 . .section .opd
2718 . foo: .quad .foo
2719 . .quad .TOC.@tocbase
2720 . .quad 0
2721 .
2722 . .text
2723 . .foo: blr
2724
2725 When the linker resolves the call during a static link, the branch
2726 unsurprisingly just goes to .foo and the .opd information is unused.
2727 If the function definition is in a shared library, things are a little
2728 different: The call goes via a plt call stub, the opd information gets
2729 copied to the plt, and the linker patches the nop.
2730
2731 . x:
2732 . bl .foo_stub
2733 . ld 2,40(1)
2734 .
2735 .
2736 . .foo_stub:
71a39c98
AM
2737 . std 2,40(1) # in practice, the call stub
2738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2739 . addi 11,11,Lfoo@toc@l # this is the general idea
2740 . ld 12,0(11)
2741 . ld 2,8(11)
2742 . mtctr 12
2743 . ld 11,16(11)
e86ce104
AM
2744 . bctr
2745 .
2746 . .section .plt
2747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2748
2749 The "reloc ()" notation is supposed to indicate that the linker emits
2750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2751 copying.
2752
2753 What are the difficulties here? Well, firstly, the relocations
2754 examined by the linker in check_relocs are against the function code
2755 sym .foo, while the dynamic relocation in the plt is emitted against
2756 the function descriptor symbol, foo. Somewhere along the line, we need
2757 to carefully copy dynamic link information from one symbol to the other.
2758 Secondly, the generic part of the elf linker will make .foo a dynamic
2759 symbol as is normal for most other backends. We need foo dynamic
2760 instead, at least for an application final link. However, when
2761 creating a shared library containing foo, we need to have both symbols
2762 dynamic so that references to .foo are satisfied during the early
2763 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2764 definition from some other object, eg. a static library.
2765
2766 Update: As of August 2004, we support a new convention. Function
2767 calls may use the function descriptor symbol, ie. "bl foo". This
2768 behaves exactly as "bl .foo". */
65f38f15 2769
7c8bbca5
AM
2770/* Of those relocs that might be copied as dynamic relocs, this
2771 function selects those that must be copied when linking a shared
2772 library or PIE, even when the symbol is local. */
65f38f15 2773
1d483afe
AM
2774static int
2775must_be_dyn_reloc (struct bfd_link_info *info,
2776 enum elf_ppc64_reloc_type r_type)
2777{
2778 switch (r_type)
2779 {
2780 default:
7c8bbca5
AM
2781 /* Only relative relocs can be resolved when the object load
2782 address isn't fixed. DTPREL64 is excluded because the
2783 dynamic linker needs to differentiate global dynamic from
2784 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2785 return 1;
2786
2787 case R_PPC64_REL32:
2788 case R_PPC64_REL64:
2789 case R_PPC64_REL30:
1bdd8fac
AM
2790 case R_PPC64_TOC16:
2791 case R_PPC64_TOC16_DS:
2792 case R_PPC64_TOC16_LO:
2793 case R_PPC64_TOC16_HI:
2794 case R_PPC64_TOC16_HA:
2795 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2796 return 0;
2797
2798 case R_PPC64_TPREL16:
2799 case R_PPC64_TPREL16_LO:
2800 case R_PPC64_TPREL16_HI:
2801 case R_PPC64_TPREL16_HA:
2802 case R_PPC64_TPREL16_DS:
2803 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2804 case R_PPC64_TPREL16_HIGH:
2805 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2806 case R_PPC64_TPREL16_HIGHER:
2807 case R_PPC64_TPREL16_HIGHERA:
2808 case R_PPC64_TPREL16_HIGHEST:
2809 case R_PPC64_TPREL16_HIGHESTA:
2810 case R_PPC64_TPREL64:
c213164a 2811 case R_PPC64_TPREL34:
7c8bbca5
AM
2812 /* These relocations are relative but in a shared library the
2813 linker doesn't know the thread pointer base. */
2814 return bfd_link_dll (info);
1d483afe
AM
2815 }
2816}
65f38f15 2817
f4656909 2818/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2819 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2820 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2821 shared lib. With code that gcc generates it is vital that this be
2822 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2823 actually the address of a function descriptor which resides in the
2824 .opd section. gcc uses the descriptor directly rather than going
2825 via the GOT as some other ABIs do, which means that initialized
2826 function pointers reference the descriptor. Thus, a function
2827 pointer initialized to the address of a function in a shared
2828 library will either require a .dynbss copy and a copy reloc, or a
2829 dynamic reloc. Using a .dynbss copy redefines the function
2830 descriptor symbol to point to the copy. This presents a problem as
2831 a PLT entry for that function is also initialized from the function
2832 descriptor symbol and the copy may not be initialized first. */
a23b6845 2833#define ELIMINATE_COPY_RELOCS 1
f4656909 2834
721956f4 2835/* Section name for stubs is the associated section name plus this
29942be8
NC
2836 string. */
2837#define STUB_SUFFIX ".stub"
721956f4
AM
2838
2839/* Linker stubs.
2840 ppc_stub_long_branch:
2841 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2842 destination, but a 24 bit branch in a stub section will reach.
2843 . b dest
2844
2845 ppc_stub_plt_branch:
2846 Similar to the above, but a 24 bit branch in the stub section won't
2847 reach its destination.
6df4c9c2
AM
2848 . addis %r12,%r2,xxx@toc@ha
2849 . ld %r12,xxx@toc@l(%r12)
71a39c98 2850 . mtctr %r12
721956f4
AM
2851 . bctr
2852
2853 ppc_stub_plt_call:
2c66dc6c
AM
2854 Used to call a function in a shared library. If it so happens that
2855 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2856 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2857 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2858 . addis %r11,%r2,xxx@toc@ha
2859 . ld %r12,xxx+0@toc@l(%r11)
2860 . mtctr %r12
2861 . ld %r2,xxx+8@toc@l(%r11)
2862 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2863 . bctr
ad8e1ba5
AM
2864
2865 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2866 code to adjust the value and save r2 to support multiple toc sections.
2867 A ppc_stub_long_branch with an r2 offset looks like:
2868 . std %r2,40(%r1)
2869 . addis %r2,%r2,off@ha
2870 . addi %r2,%r2,off@l
2871 . b dest
2872
2873 A ppc_stub_plt_branch with an r2 offset looks like:
2874 . std %r2,40(%r1)
6df4c9c2
AM
2875 . addis %r12,%r2,xxx@toc@ha
2876 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2877 . addis %r2,%r2,off@ha
2878 . addi %r2,%r2,off@l
71a39c98 2879 . mtctr %r12
ad8e1ba5 2880 . bctr
ac2df442 2881
05d0e962
AM
2882 All of the above stubs are shown as their ELFv1 variants. ELFv2
2883 variants exist too, simpler for plt calls since a new toc pointer
2884 and static chain are not loaded by the stub. In addition, ELFv2
2885 has some more complex stubs to handle calls marked with NOTOC
2886 relocs from functions where r2 is not a valid toc pointer. These
2887 come in two flavours, the ones shown below, and _both variants that
2888 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2889 one call is from a function where r2 is used as the toc pointer but
2890 needs a toc adjusting stub for small-model multi-toc, and another
2891 call is from a function where r2 is not valid.
2892 ppc_stub_long_branch_notoc:
2893 . mflr %r12
2894 . bcl 20,31,1f
2895 . 1:
2896 . mflr %r11
2897 . mtlr %r12
2cdcc330
AM
2898 . addis %r12,%r11,dest-1b@ha
2899 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2900 . b dest
2901
2902 ppc_stub_plt_branch_notoc:
2903 . mflr %r12
2904 . bcl 20,31,1f
2905 . 1:
2906 . mflr %r11
2907 . mtlr %r12
2908 . lis %r12,xxx-1b@highest
f891966f 2909 . ori %r12,%r12,xxx-1b@higher
05d0e962 2910 . sldi %r12,%r12,32
f891966f 2911 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2912 . ori %r12,%r12,xxx-1b@l
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916
2917 ppc_stub_plt_call_notoc:
2918 . mflr %r12
2919 . bcl 20,31,1f
2920 . 1:
2921 . mflr %r11
2922 . mtlr %r12
2923 . lis %r12,xxx-1b@highest
f891966f 2924 . ori %r12,%r12,xxx-1b@higher
05d0e962 2925 . sldi %r12,%r12,32
f891966f 2926 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2927 . ori %r12,%r12,xxx-1b@l
2928 . ldx %r12,%r11,%r12
2929 . mtctr %r12
2930 . bctr
2931
7c1f4227 2932 There are also ELFv1 power10 variants of these stubs.
04bdff6a 2933 ppc_stub_long_branch_notoc:
d4b87b1e 2934 . pla %r12,dest@pcrel
04bdff6a
AM
2935 . b dest
2936 ppc_stub_plt_branch_notoc:
2937 . lis %r11,(dest-1f)@highesta34
2938 . ori %r11,%r11,(dest-1f)@highera34
2939 . sldi %r11,%r11,34
d4b87b1e 2940 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2941 . add %r12,%r11,%r12
2942 . mtctr %r12
2943 . bctr
2944 ppc_stub_plt_call_notoc:
2945 . lis %r11,(xxx-1f)@highesta34
2946 . ori %r11,%r11,(xxx-1f)@highera34
2947 . sldi %r11,%r11,34
d4b87b1e 2948 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2949 . ldx %r12,%r11,%r12
2950 . mtctr %r12
2951 . bctr
2952
05d0e962
AM
2953 In cases where the high instructions would add zero, they are
2954 omitted and following instructions modified in some cases.
7c1f4227 2955 For example, a power10 ppc_stub_plt_call_notoc might simplify down
04bdff6a
AM
2956 to
2957 . pld %r12,xxx@pcrel
2958 . mtctr %r12
2959 . bctr
05d0e962
AM
2960
2961 For a given stub group (a set of sections all using the same toc
2962 pointer value) there will be just one stub type used for any
2963 particular function symbol. For example, if printf is called from
2964 code with the tocsave optimization (ie. r2 saved in function
2965 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2966 and from other code without the tocsave optimization requiring a
2967 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2968 type will be created. Calls with the tocsave optimization will
2969 enter this stub after the instruction saving r2. A similar
2970 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2971 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2972 to call an external function like printf. If other calls to printf
2973 require a ppc_stub_plt_call linkage stub then a single
2974 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2975 call. If other calls to printf require a ppc_stub_plt_call_r2save
2976 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2977 be created and calls not requiring r2 to be saved will enter the
2978 stub after the r2 save instruction. There is an analogous
2979 hierarchy of long branch and plt branch stubs for local call
2980 linkage. */
721956f4 2981
2cdcc330
AM
2982enum ppc_stub_type
2983{
721956f4
AM
2984 ppc_stub_none,
2985 ppc_stub_long_branch,
ad8e1ba5 2986 ppc_stub_long_branch_r2off,
05d0e962
AM
2987 ppc_stub_long_branch_notoc,
2988 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2989 ppc_stub_plt_branch,
ad8e1ba5 2990 ppc_stub_plt_branch_r2off,
05d0e962
AM
2991 ppc_stub_plt_branch_notoc,
2992 ppc_stub_plt_branch_both,
794e51c0 2993 ppc_stub_plt_call,
7341d5e2 2994 ppc_stub_plt_call_r2save,
05d0e962
AM
2995 ppc_stub_plt_call_notoc,
2996 ppc_stub_plt_call_both,
a4b6fadd
AM
2997 ppc_stub_global_entry,
2998 ppc_stub_save_res
721956f4
AM
2999};
3000
6f20ed8a
AM
3001/* Information on stub grouping. */
3002struct map_stub
3003{
3004 /* The stub section. */
3005 asection *stub_sec;
3006 /* This is the section to which stubs in the group will be attached. */
3007 asection *link_sec;
a4b6fadd
AM
3008 /* Next group. */
3009 struct map_stub *next;
3010 /* Whether to emit a copy of register save/restore functions in this
3011 group. */
3012 int needs_save_res;
df136d64
AM
3013 /* Current offset within stubs after the insn restoring lr in a
3014 _notoc or _both stub using bcl for pc-relative addressing, or
3015 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3016 unsigned int lr_restore;
3017 /* Accumulated size of EH info emitted to describe return address
3018 if stubs modify lr. Does not include 17 byte FDE header. */
3019 unsigned int eh_size;
3020 /* Offset in glink_eh_frame to the start of EH info for this group. */
3021 unsigned int eh_base;
6f20ed8a
AM
3022};
3023
2cdcc330
AM
3024struct ppc_stub_hash_entry
3025{
721956f4
AM
3026 /* Base hash table entry structure. */
3027 struct bfd_hash_entry root;
3028
ad8e1ba5
AM
3029 enum ppc_stub_type stub_type;
3030
6f20ed8a
AM
3031 /* Group information. */
3032 struct map_stub *group;
721956f4
AM
3033
3034 /* Offset within stub_sec of the beginning of this stub. */
3035 bfd_vma stub_offset;
3036
3037 /* Given the symbol's value and its section we can determine its final
3038 value when building the stubs (so the stub knows where to jump. */
3039 bfd_vma target_value;
3040 asection *target_section;
3041
721956f4
AM
3042 /* The symbol table entry, if any, that this was derived from. */
3043 struct ppc_link_hash_entry *h;
e054468f 3044 struct plt_entry *plt_ent;
721956f4 3045
2d7ad24e
AM
3046 /* Symbol type. */
3047 unsigned char symtype;
3048
6911b7dc
AM
3049 /* Symbol st_other. */
3050 unsigned char other;
721956f4
AM
3051};
3052
2cdcc330
AM
3053struct ppc_branch_hash_entry
3054{
721956f4
AM
3055 /* Base hash table entry structure. */
3056 struct bfd_hash_entry root;
3057
c456f082 3058 /* Offset within branch lookup table. */
721956f4
AM
3059 unsigned int offset;
3060
3061 /* Generation marker. */
3062 unsigned int iter;
3063};
65f38f15 3064
19e08130
AM
3065/* Used to track dynamic relocations for local symbols. */
3066struct ppc_dyn_relocs
3067{
3068 struct ppc_dyn_relocs *next;
3069
3070 /* The input section of the reloc. */
3071 asection *sec;
3072
3073 /* Total number of relocs copied for the input section. */
3074 unsigned int count : 31;
3075
3076 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3077 unsigned int ifunc : 1;
3078};
3079
65f38f15
AM
3080struct ppc_link_hash_entry
3081{
3082 struct elf_link_hash_entry elf;
3083
2cdcc330
AM
3084 union
3085 {
b3fac117
AM
3086 /* A pointer to the most recently used stub hash entry against this
3087 symbol. */
3088 struct ppc_stub_hash_entry *stub_cache;
3089
3090 /* A pointer to the next symbol starting with a '.' */
3091 struct ppc_link_hash_entry *next_dot_sym;
3092 } u;
721956f4 3093
721956f4 3094 /* Link between function code and descriptor symbols. */
34814b9f 3095 struct ppc_link_hash_entry *oh;
721956f4 3096
e86ce104
AM
3097 /* Flag function code and descriptor symbols. */
3098 unsigned int is_func:1;
3099 unsigned int is_func_descriptor:1;
908b32fc 3100 unsigned int fake:1;
411e1bfb 3101
c5614fa4
AM
3102 /* Whether global opd/toc sym has been adjusted or not.
3103 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3104 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3105 unsigned int adjust_done:1;
3106
a4b6fadd
AM
3107 /* Set if this is an out-of-line register save/restore function,
3108 with non-standard calling convention. */
3109 unsigned int save_res:1;
3110
8b5f1ed8
AM
3111 /* Set if a duplicate symbol with non-zero localentry is detected,
3112 even when the duplicate symbol does not provide a definition. */
3113 unsigned int non_zero_localentry:1;
3114
411e1bfb 3115 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3116 Bits are or'd into the mask as the corresponding relocs are
3117 encountered during check_relocs, with TLS_TLS being set when any
3118 of the other TLS bits are set. tls_optimize clears bits when
3119 optimizing to indicate the corresponding GOT entry type is not
3120 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3121 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3122 These flags are also kept for local symbols. */
3123#define TLS_TLS 1 /* Any TLS reloc. */
3124#define TLS_GD 2 /* GD reloc. */
3125#define TLS_LD 4 /* LD reloc. */
3126#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3127#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3128#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3129#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3130#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3131 unsigned char tls_mask;
37da22e5
AM
3132
3133 /* The above field is also used to mark function symbols. In which
3134 case TLS_TLS will be 0. */
3135#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3136#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3137#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3138};
3139
ed7007c1
AM
3140static inline struct ppc_link_hash_entry *
3141ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3142{
3143 return (struct ppc_link_hash_entry *) ent;
3144}
3145
65f38f15
AM
3146/* ppc64 ELF linker hash table. */
3147
3148struct ppc_link_hash_table
3149{
3150 struct elf_link_hash_table elf;
3151
721956f4
AM
3152 /* The stub hash table. */
3153 struct bfd_hash_table stub_hash_table;
3154
3155 /* Another hash table for plt_branch stubs. */
3156 struct bfd_hash_table branch_hash_table;
3157
3b421ab3
AM
3158 /* Hash table for function prologue tocsave. */
3159 htab_t tocsave_htab;
3160
e7d1c40c
AM
3161 /* Various options and other info passed from the linker. */
3162 struct ppc64_elf_params *params;
721956f4 3163
6f20ed8a
AM
3164 /* The size of sec_info below. */
3165 unsigned int sec_info_arr_size;
3166
3167 /* Per-section array of extra section info. Done this way rather
3168 than as part of ppc64_elf_section_data so we have the info for
3169 non-ppc64 sections. */
3170 struct
3171 {
3172 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3173 bfd_vma toc_off;
6f20ed8a
AM
3174
3175 union
3176 {
3177 /* The section group that this section belongs to. */
3178 struct map_stub *group;
3179 /* A temp section list pointer. */
3180 asection *list;
3181 } u;
3182 } *sec_info;
721956f4 3183
a4b6fadd
AM
3184 /* Linked list of groups. */
3185 struct map_stub *group;
3186
ad8e1ba5
AM
3187 /* Temp used when calculating TOC pointers. */
3188 bfd_vma toc_curr;
bf102f86
AM
3189 bfd *toc_bfd;
3190 asection *toc_first_sec;
ad8e1ba5 3191
b3fac117
AM
3192 /* Used when adding symbols. */
3193 struct ppc_link_hash_entry *dot_syms;
3194
33e44f2e 3195 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3196 asection *glink;
9e390558 3197 asection *global_entry;
82bd7b59 3198 asection *sfpr;
2d7ad24e
AM
3199 asection *pltlocal;
3200 asection *relpltlocal;
4ce794b7
AM
3201 asection *brlt;
3202 asection *relbrlt;
58d180e8 3203 asection *glink_eh_frame;
ec338859 3204
8387904d
AM
3205 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3206 struct ppc_link_hash_entry *tls_get_addr;
3207 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3208 struct ppc_link_hash_entry *tga_desc;
3209 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3210 struct map_stub *tga_group;
411e1bfb 3211
927be08e
AM
3212 /* The size of reliplt used by got entry relocs. */
3213 bfd_size_type got_reli_size;
3214
9b5ecbd0 3215 /* Statistics. */
7341d5e2 3216 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3217
ee75fd95
AM
3218 /* Number of stubs against global syms. */
3219 unsigned long stub_globals;
3220
ee67d69a
AM
3221 /* Set if we're linking code with function descriptors. */
3222 unsigned int opd_abi:1;
3223
4c52953f 3224 /* Support for multiple toc sections. */
33c0ec9d 3225 unsigned int do_multi_toc:1;
4c52953f 3226 unsigned int multi_toc_needed:1;
927be08e 3227 unsigned int second_toc_pass:1;
67f0cbdb 3228 unsigned int do_toc_opt:1;
4c52953f 3229
9a23f96e
AM
3230 /* Set if tls optimization is enabled. */
3231 unsigned int do_tls_opt:1;
3232
3e04d765
AM
3233 /* Set if inline plt calls should be converted to direct calls. */
3234 unsigned int can_convert_all_inline_plt:1;
3235
5d1634d7 3236 /* Set on error. */
99877b66 3237 unsigned int stub_error:1;
721956f4 3238
8c5b4e52
AM
3239 /* Whether func_desc_adjust needs to be run over symbols. */
3240 unsigned int need_func_desc_adj:1;
721956f4 3241
f378ab09
AM
3242 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3243 unsigned int has_plt_localentry0:1;
3244
5663e321
AM
3245 /* Whether calls are made via the PLT from NOTOC functions. */
3246 unsigned int notoc_plt:1;
3247
e10a07b3
AM
3248 /* Whether any code linked seems to be Power10. */
3249 unsigned int has_power10_relocs:1;
3250
721956f4
AM
3251 /* Incremented every time we size stubs. */
3252 unsigned int stub_iteration;
65f38f15
AM
3253};
3254
4c52953f
AM
3255/* Rename some of the generic section flags to better document how they
3256 are used here. */
b0dddeec
AM
3257
3258/* Nonzero if this section has TLS related relocations. */
3259#define has_tls_reloc sec_flg0
3260
9737e8af
AM
3261/* Nonzero if this section has a call to __tls_get_addr lacking marker
3262 relocations. */
3263#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3264
3265/* Nonzero if this section has any toc or got relocs. */
3266#define has_toc_reloc sec_flg2
3267
3268/* Nonzero if this section has a call to another section that uses
3269 the toc or got. */
d77c8a4b 3270#define makes_toc_func_call sec_flg3
b0dddeec
AM
3271
3272/* Recursion protection when determining above flag. */
d77c8a4b 3273#define call_check_in_progress sec_flg4
70cc837d 3274#define call_check_done sec_flg5
4c52953f 3275
65f38f15
AM
3276/* Get the ppc64 ELF linker hash table from a link_info structure. */
3277
3278#define ppc_hash_table(p) \
573eb292
AM
3279 ((is_elf_hash_table ((p)->hash) \
3280 && elf_hash_table_id (elf_hash_table (p)) == PPC64_ELF_DATA) \
3281 ? (struct ppc_link_hash_table *) (p)->hash : NULL)
65f38f15 3282
721956f4
AM
3283#define ppc_stub_hash_lookup(table, string, create, copy) \
3284 ((struct ppc_stub_hash_entry *) \
3285 bfd_hash_lookup ((table), (string), (create), (copy)))
3286
3287#define ppc_branch_hash_lookup(table, string, create, copy) \
3288 ((struct ppc_branch_hash_entry *) \
3289 bfd_hash_lookup ((table), (string), (create), (copy)))
3290
3291/* Create an entry in the stub hash table. */
3292
3293static struct bfd_hash_entry *
4ce794b7
AM
3294stub_hash_newfunc (struct bfd_hash_entry *entry,
3295 struct bfd_hash_table *table,
3296 const char *string)
721956f4
AM
3297{
3298 /* Allocate the structure if it has not already been allocated by a
3299 subclass. */
3300 if (entry == NULL)
3301 {
3302 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3303 if (entry == NULL)
3304 return entry;
3305 }
3306
3307 /* Call the allocation method of the superclass. */
3308 entry = bfd_hash_newfunc (entry, table, string);
3309 if (entry != NULL)
3310 {
3311 struct ppc_stub_hash_entry *eh;
3312
3313 /* Initialize the local fields. */
3314 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3315 eh->stub_type = ppc_stub_none;
6f20ed8a 3316 eh->group = NULL;
721956f4
AM
3317 eh->stub_offset = 0;
3318 eh->target_value = 0;
3319 eh->target_section = NULL;
721956f4 3320 eh->h = NULL;
6911b7dc 3321 eh->plt_ent = NULL;
6911b7dc 3322 eh->other = 0;
721956f4
AM
3323 }
3324
3325 return entry;
3326}
3327
3328/* Create an entry in the branch hash table. */
3329
3330static struct bfd_hash_entry *
4ce794b7
AM
3331branch_hash_newfunc (struct bfd_hash_entry *entry,
3332 struct bfd_hash_table *table,
3333 const char *string)
721956f4
AM
3334{
3335 /* Allocate the structure if it has not already been allocated by a
3336 subclass. */
3337 if (entry == NULL)
3338 {
3339 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3340 if (entry == NULL)
3341 return entry;
3342 }
3343
3344 /* Call the allocation method of the superclass. */
3345 entry = bfd_hash_newfunc (entry, table, string);
3346 if (entry != NULL)
3347 {
3348 struct ppc_branch_hash_entry *eh;
3349
3350 /* Initialize the local fields. */
3351 eh = (struct ppc_branch_hash_entry *) entry;
3352 eh->offset = 0;
3353 eh->iter = 0;
3354 }
3355
3356 return entry;
3357}
3358
65f38f15
AM
3359/* Create an entry in a ppc64 ELF linker hash table. */
3360
3361static struct bfd_hash_entry *
4ce794b7
AM
3362link_hash_newfunc (struct bfd_hash_entry *entry,
3363 struct bfd_hash_table *table,
3364 const char *string)
65f38f15
AM
3365{
3366 /* Allocate the structure if it has not already been allocated by a
3367 subclass. */
3368 if (entry == NULL)
3369 {
3370 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3371 if (entry == NULL)
3372 return entry;
3373 }
3374
3375 /* Call the allocation method of the superclass. */
3376 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3377 if (entry != NULL)
3378 {
3379 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3380
b3fac117 3381 memset (&eh->u.stub_cache, 0,
908b32fc 3382 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3383 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3384
3385 /* When making function calls, old ABI code references function entry
3386 points (dot symbols), while new ABI code references the function
3387 descriptor symbol. We need to make any combination of reference and
3388 definition work together, without breaking archive linking.
3389
3390 For a defined function "foo" and an undefined call to "bar":
3391 An old object defines "foo" and ".foo", references ".bar" (possibly
3392 "bar" too).
3393 A new object defines "foo" and references "bar".
3394
3395 A new object thus has no problem with its undefined symbols being
3396 satisfied by definitions in an old object. On the other hand, the
3397 old object won't have ".bar" satisfied by a new object.
3398
3399 Keep a list of newly added dot-symbols. */
3400
3401 if (string[0] == '.')
3402 {
3403 struct ppc_link_hash_table *htab;
3404
3405 htab = (struct ppc_link_hash_table *) table;
3406 eh->u.next_dot_sym = htab->dot_syms;
3407 htab->dot_syms = eh;
3408 }
65f38f15
AM
3409 }
3410
3411 return entry;
3412}
3413
2cdcc330
AM
3414struct tocsave_entry
3415{
3b421ab3
AM
3416 asection *sec;
3417 bfd_vma offset;
3418};
3419
3420static hashval_t
3421tocsave_htab_hash (const void *p)
3422{
3423 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3424 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3425}
3426
3427static int
3428tocsave_htab_eq (const void *p1, const void *p2)
3429{
3430 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3431 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3432 return e1->sec == e2->sec && e1->offset == e2->offset;
3433}
3434
68faa637
AM
3435/* Destroy a ppc64 ELF linker hash table. */
3436
3437static void
d495ab0d 3438ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3439{
d495ab0d 3440 struct ppc_link_hash_table *htab;
68faa637 3441
d495ab0d 3442 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3443 if (htab->tocsave_htab)
3444 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3445 bfd_hash_table_free (&htab->branch_hash_table);
3446 bfd_hash_table_free (&htab->stub_hash_table);
3447 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3448}
3449
65f38f15
AM
3450/* Create a ppc64 ELF linker hash table. */
3451
3452static struct bfd_link_hash_table *
4ce794b7 3453ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3454{
3455 struct ppc_link_hash_table *htab;
986f0783 3456 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3457
4ce794b7 3458 htab = bfd_zmalloc (amt);
65f38f15
AM
3459 if (htab == NULL)
3460 return NULL;
3461
66eb6687 3462 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3463 sizeof (struct ppc_link_hash_entry),
3464 PPC64_ELF_DATA))
65f38f15 3465 {
e2d34d7d 3466 free (htab);
65f38f15
AM
3467 return NULL;
3468 }
3469
721956f4 3470 /* Init the stub hash table too. */
66eb6687
AM
3471 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3472 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3473 {
d495ab0d 3474 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3475 return NULL;
3476 }
721956f4
AM
3477
3478 /* And the branch hash table. */
66eb6687
AM
3479 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3480 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3481 {
3482 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3483 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3484 return NULL;
3485 }
721956f4 3486
3b421ab3
AM
3487 htab->tocsave_htab = htab_try_create (1024,
3488 tocsave_htab_hash,
3489 tocsave_htab_eq,
3490 NULL);
3491 if (htab->tocsave_htab == NULL)
2915c55b 3492 {
d495ab0d 3493 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3494 return NULL;
3495 }
d495ab0d 3496 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3497
3254fd24
AM
3498 /* Initializing two fields of the union is just cosmetic. We really
3499 only care about glist, but when compiled on a 32-bit host the
3500 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3501 debugger inspection of these fields look nicer. */
a6aa5195
AM
3502 htab->elf.init_got_refcount.refcount = 0;
3503 htab->elf.init_got_refcount.glist = NULL;
3504 htab->elf.init_plt_refcount.refcount = 0;
3505 htab->elf.init_plt_refcount.glist = NULL;
3506 htab->elf.init_got_offset.offset = 0;
3507 htab->elf.init_got_offset.glist = NULL;
3508 htab->elf.init_plt_offset.offset = 0;
3509 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3510
65f38f15
AM
3511 return &htab->elf.root;
3512}
3513
bfeb4a28
AM
3514/* Create sections for linker generated code. */
3515
3516static bfd_boolean
3517create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3518{
3519 struct ppc_link_hash_table *htab;
3520 flagword flags;
3521
3522 htab = ppc_hash_table (info);
3523
bfeb4a28
AM
3524 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3525 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3526 if (htab->params->save_restore_funcs)
3527 {
3528 /* Create .sfpr for code to save and restore fp regs. */
3529 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3530 flags);
3531 if (htab->sfpr == NULL
fd361982 3532 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3533 return FALSE;
3534 }
3535
3536 if (bfd_link_relocatable (info))
3537 return TRUE;
bfeb4a28
AM
3538
3539 /* Create .glink for lazy dynamic linking support. */
3540 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3541 flags);
3542 if (htab->glink == NULL
fd361982 3543 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3544 return FALSE;
3545
9e390558
AM
3546 /* The part of .glink used by global entry stubs, separate so that
3547 it can be aligned appropriately without affecting htab->glink. */
3548 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3549 flags);
3550 if (htab->global_entry == NULL
fd361982 3551 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3552 return FALSE;
3553
bfeb4a28
AM
3554 if (!info->no_ld_generated_unwind_info)
3555 {
3556 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3557 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3558 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3559 ".eh_frame",
3560 flags);
3561 if (htab->glink_eh_frame == NULL
fd361982 3562 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3563 return FALSE;
3564 }
3565
3566 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3567 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3568 if (htab->elf.iplt == NULL
fd361982 3569 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3570 return FALSE;
3571
3572 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3573 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3574 htab->elf.irelplt
3575 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3576 if (htab->elf.irelplt == NULL
fd361982 3577 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3578 return FALSE;
3579
3580 /* Create branch lookup table for plt_branch stubs. */
3581 flags = (SEC_ALLOC | SEC_LOAD
3582 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3583 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3584 flags);
3585 if (htab->brlt == NULL
fd361982 3586 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3587 return FALSE;
3588
2d7ad24e
AM
3589 /* Local plt entries, put in .branch_lt but a separate section for
3590 convenience. */
3591 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3592 flags);
3593 if (htab->pltlocal == NULL
fd361982 3594 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3595 return FALSE;
3596
0e1862bb 3597 if (!bfd_link_pic (info))
bfeb4a28
AM
3598 return TRUE;
3599
3600 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3601 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3602 htab->relbrlt
3603 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3604 if (htab->relbrlt == NULL
fd361982 3605 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3606 return FALSE;
3607
2d7ad24e
AM
3608 htab->relpltlocal
3609 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3610 if (htab->relpltlocal == NULL
fd361982 3611 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3612 return FALSE;
3613
bfeb4a28
AM
3614 return TRUE;
3615}
3616
e717da7e
AM
3617/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3618
bfeb4a28 3619bfd_boolean
e7d1c40c
AM
3620ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3621 struct ppc64_elf_params *params)
e717da7e
AM
3622{
3623 struct ppc_link_hash_table *htab;
3624
e7d1c40c 3625 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3626
3627/* Always hook our dynamic sections into the first bfd, which is the
3628 linker created stub bfd. This ensures that the GOT header is at
3629 the start of the output TOC section. */
3630 htab = ppc_hash_table (info);
e7d1c40c
AM
3631 htab->elf.dynobj = params->stub_bfd;
3632 htab->params = params;
bfeb4a28 3633
bfeb4a28 3634 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3635}
3636
721956f4
AM
3637/* Build a name for an entry in the stub hash table. */
3638
3639static char *
4ce794b7
AM
3640ppc_stub_name (const asection *input_section,
3641 const asection *sym_sec,
3642 const struct ppc_link_hash_entry *h,
3643 const Elf_Internal_Rela *rel)
721956f4
AM
3644{
3645 char *stub_name;
bcaa2f82 3646 ssize_t len;
721956f4
AM
3647
3648 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3649 offsets from a sym as a branch target? In fact, we could
3650 probably assume the addend is always zero. */
3651 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3652
3653 if (h)
3654 {
3655 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3656 stub_name = bfd_malloc (len);
46de2a7c
AM
3657 if (stub_name == NULL)
3658 return stub_name;
3659
bcaa2f82
AM
3660 len = sprintf (stub_name, "%08x.%s+%x",
3661 input_section->id & 0xffffffff,
3662 h->elf.root.root.string,
3663 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3664 }
3665 else
3666 {
ad8e1ba5 3667 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3668 stub_name = bfd_malloc (len);
46de2a7c
AM
3669 if (stub_name == NULL)
3670 return stub_name;
3671
bcaa2f82
AM
3672 len = sprintf (stub_name, "%08x.%x:%x+%x",
3673 input_section->id & 0xffffffff,
3674 sym_sec->id & 0xffffffff,
3675 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3676 (int) rel->r_addend & 0xffffffff);
721956f4 3677 }
bcaa2f82 3678 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3679 stub_name[len - 2] = 0;
721956f4
AM
3680 return stub_name;
3681}
3682
e10a07b3
AM
3683/* If mixing power10 with non-power10 code and --power10-stubs is not
3684 specified (or is auto) then calls using @notoc relocations that
3685 need a stub will utilize power10 instructions in the stub, and
3686 calls without @notoc relocations will not use power10 instructions.
3687 The two classes of stubs are stored in separate stub_hash_table
3688 entries having the same key string. The two entries will always be
3689 adjacent on entry->root.next chain, even if hash table resizing
3690 occurs. This function selects the correct entry to use. */
3691
3692static struct ppc_stub_hash_entry *
3693select_alt_stub (struct ppc_stub_hash_entry *entry, bfd_boolean notoc)
3694{
3695 bfd_boolean have_notoc;
3696
3697 have_notoc = (entry->stub_type == ppc_stub_plt_call_notoc
3698 || entry->stub_type == ppc_stub_plt_branch_notoc
3699 || entry->stub_type == ppc_stub_long_branch_notoc);
3700
3701 if (have_notoc != notoc)
3702 {
3703 const char *stub_name = entry->root.string;
3704
3705 entry = (struct ppc_stub_hash_entry *) entry->root.next;
3706 if (entry != NULL
3707 && entry->root.string != stub_name)
3708 entry = NULL;
3709 }
3710
3711 return entry;
3712}
3713
721956f4
AM
3714/* Look up an entry in the stub hash. Stub entries are cached because
3715 creating the stub name takes a bit of time. */
3716
3717static struct ppc_stub_hash_entry *
4ce794b7
AM
3718ppc_get_stub_entry (const asection *input_section,
3719 const asection *sym_sec,
039b3fef 3720 struct ppc_link_hash_entry *h,
4ce794b7
AM
3721 const Elf_Internal_Rela *rel,
3722 struct ppc_link_hash_table *htab)
721956f4
AM
3723{
3724 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3725 struct map_stub *group;
721956f4
AM
3726
3727 /* If this input section is part of a group of sections sharing one
3728 stub section, then use the id of the first section in the group.
3729 Stub names need to include a section id, as there may well be
3730 more than one stub used to reach say, printf, and we need to
3731 distinguish between them. */
6f20ed8a 3732 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3733 if (group == NULL)
3734 return NULL;
721956f4 3735
b3fac117
AM
3736 if (h != NULL && h->u.stub_cache != NULL
3737 && h->u.stub_cache->h == h
6f20ed8a 3738 && h->u.stub_cache->group == group)
721956f4 3739 {
b3fac117 3740 stub_entry = h->u.stub_cache;
721956f4
AM
3741 }
3742 else
3743 {
3744 char *stub_name;
3745
6f20ed8a 3746 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3747 if (stub_name == NULL)
3748 return NULL;
3749
3750 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3751 stub_name, FALSE, FALSE);
721956f4 3752 if (h != NULL)
b3fac117 3753 h->u.stub_cache = stub_entry;
721956f4
AM
3754
3755 free (stub_name);
3756 }
3757
e10a07b3
AM
3758 if (stub_entry != NULL && htab->params->power10_stubs == -1)
3759 {
3760 bfd_boolean notoc = ELF64_R_TYPE (rel->r_info) == R_PPC64_REL24_NOTOC;
3761
3762 stub_entry = select_alt_stub (stub_entry, notoc);
3763 }
3764
721956f4
AM
3765 return stub_entry;
3766}
3767
3768/* Add a new stub entry to the stub hash. Not all fields of the new
3769 stub entry are initialised. */
3770
3771static struct ppc_stub_hash_entry *
4ce794b7
AM
3772ppc_add_stub (const char *stub_name,
3773 asection *section,
25f53a85 3774 struct bfd_link_info *info)
721956f4 3775{
25f53a85 3776 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3777 struct map_stub *group;
721956f4
AM
3778 asection *link_sec;
3779 asection *stub_sec;
3780 struct ppc_stub_hash_entry *stub_entry;
3781
6f20ed8a
AM
3782 group = htab->sec_info[section->id].u.group;
3783 link_sec = group->link_sec;
3784 stub_sec = group->stub_sec;
721956f4
AM
3785 if (stub_sec == NULL)
3786 {
6f20ed8a
AM
3787 size_t namelen;
3788 bfd_size_type len;
3789 char *s_name;
721956f4 3790
6f20ed8a
AM
3791 namelen = strlen (link_sec->name);
3792 len = namelen + sizeof (STUB_SUFFIX);
3793 s_name = bfd_alloc (htab->params->stub_bfd, len);
3794 if (s_name == NULL)
3795 return NULL;
721956f4 3796
6f20ed8a
AM
3797 memcpy (s_name, link_sec->name, namelen);
3798 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3799 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3800 if (stub_sec == NULL)
3801 return NULL;
3802 group->stub_sec = stub_sec;
721956f4
AM
3803 }
3804
3805 /* Enter this entry into the linker stub hash table. */
3806 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3807 TRUE, FALSE);
721956f4
AM
3808 if (stub_entry == NULL)
3809 {
695344c0 3810 /* xgettext:c-format */
cf97bcb0
AM
3811 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3812 section->owner, stub_name);
721956f4
AM
3813 return NULL;
3814 }
3815
6f20ed8a 3816 stub_entry->group = group;
721956f4 3817 stub_entry->stub_offset = 0;
721956f4
AM
3818 return stub_entry;
3819}
3820
e717da7e
AM
3821/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3822 not already done. */
65f38f15 3823
b34976b6 3824static bfd_boolean
e717da7e 3825create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3826{
e717da7e
AM
3827 asection *got, *relgot;
3828 flagword flags;
3829 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3830
0c8d6e5c 3831 if (!is_ppc64_elf (abfd))
0ffa91dd 3832 return FALSE;
4dfe6ac6
NC
3833 if (htab == NULL)
3834 return FALSE;
0ffa91dd 3835
33e44f2e
AM
3836 if (!htab->elf.sgot
3837 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3838 return FALSE;
e717da7e
AM
3839
3840 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3841 | SEC_LINKER_CREATED);
3842
c456f082 3843 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3844 if (!got
fd361982 3845 || !bfd_set_section_alignment (got, 3))
e717da7e 3846 return FALSE;
65f38f15 3847
c456f082
AM
3848 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3849 flags | SEC_READONLY);
e717da7e 3850 if (!relgot
fd361982 3851 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3852 return FALSE;
e717da7e
AM
3853
3854 ppc64_elf_tdata (abfd)->got = got;
3855 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3856 return TRUE;
65f38f15 3857}
5bd4f169 3858
b31867b6
AM
3859/* Follow indirect and warning symbol links. */
3860
3861static inline struct bfd_link_hash_entry *
3862follow_link (struct bfd_link_hash_entry *h)
3863{
3864 while (h->type == bfd_link_hash_indirect
3865 || h->type == bfd_link_hash_warning)
3866 h = h->u.i.link;
3867 return h;
3868}
3869
3870static inline struct elf_link_hash_entry *
3871elf_follow_link (struct elf_link_hash_entry *h)
3872{
3873 return (struct elf_link_hash_entry *) follow_link (&h->root);
3874}
3875
3876static inline struct ppc_link_hash_entry *
3877ppc_follow_link (struct ppc_link_hash_entry *h)
3878{
ed7007c1 3879 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3880}
3881
40d16e0b
AM
3882/* Merge PLT info on FROM with that on TO. */
3883
3884static void
3885move_plt_plist (struct ppc_link_hash_entry *from,
3886 struct ppc_link_hash_entry *to)
3887{
3888 if (from->elf.plt.plist != NULL)
3889 {
3890 if (to->elf.plt.plist != NULL)
3891 {
3892 struct plt_entry **entp;
3893 struct plt_entry *ent;
3894
3895 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3896 {
3897 struct plt_entry *dent;
3898
3899 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3900 if (dent->addend == ent->addend)
3901 {
3902 dent->plt.refcount += ent->plt.refcount;
3903 *entp = ent->next;
3904 break;
3905 }
3906 if (dent == NULL)
3907 entp = &ent->next;
3908 }
3909 *entp = to->elf.plt.plist;
3910 }
3911
3912 to->elf.plt.plist = from->elf.plt.plist;
3913 from->elf.plt.plist = NULL;
3914 }
3915}
3916
65f38f15
AM
3917/* Copy the extra info we tack onto an elf_link_hash_entry. */
3918
3919static void
fcfa13d2
AM
3920ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3921 struct elf_link_hash_entry *dir,
3922 struct elf_link_hash_entry *ind)
65f38f15
AM
3923{
3924 struct ppc_link_hash_entry *edir, *eind;
3925
ed7007c1
AM
3926 edir = ppc_elf_hash_entry (dir);
3927 eind = ppc_elf_hash_entry (ind);
65f38f15 3928
c79d6685
AM
3929 edir->is_func |= eind->is_func;
3930 edir->is_func_descriptor |= eind->is_func_descriptor;
3931 edir->tls_mask |= eind->tls_mask;
3932 if (eind->oh != NULL)
3933 edir->oh = ppc_follow_link (eind->oh);
3934
474436e6 3935 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3936 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3937 edir->elf.ref_regular |= eind->elf.ref_regular;
3938 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3939 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3940 edir->elf.needs_plt |= eind->elf.needs_plt;
3941 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3942
d311bc8b
AM
3943 /* If we were called to copy over info for a weak sym, don't copy
3944 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3945 in order to simplify readonly_dynrelocs and save a field in the
3946 symbol hash entry, but that means dyn_relocs can't be used in any
3947 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3948 are then tested. */
d311bc8b 3949 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3950 return;
d311bc8b 3951
411e1bfb 3952 /* Copy over any dynamic relocs we may have on the indirect sym. */
190eb1dd 3953 if (ind->dyn_relocs != NULL)
65f38f15 3954 {
190eb1dd 3955 if (dir->dyn_relocs != NULL)
bbd7ec4a 3956 {
6061a67d
AM
3957 struct elf_dyn_relocs **pp;
3958 struct elf_dyn_relocs *p;
bbd7ec4a 3959
fcfa13d2 3960 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 3961 list. Merge any entries against the same section. */
190eb1dd 3962 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
bbd7ec4a 3963 {
6061a67d 3964 struct elf_dyn_relocs *q;
bbd7ec4a 3965
190eb1dd 3966 for (q = dir->dyn_relocs; q != NULL; q = q->next)
bbd7ec4a
AM
3967 if (q->sec == p->sec)
3968 {
3969 q->pc_count += p->pc_count;
3970 q->count += p->count;
3971 *pp = p->next;
3972 break;
3973 }
3974 if (q == NULL)
3975 pp = &p->next;
3976 }
190eb1dd 3977 *pp = dir->dyn_relocs;
bbd7ec4a
AM
3978 }
3979
190eb1dd
L
3980 dir->dyn_relocs = ind->dyn_relocs;
3981 ind->dyn_relocs = NULL;
65f38f15 3982 }
65f38f15 3983
81848ca0
AM
3984 /* Copy over got entries that we may have already seen to the
3985 symbol which just became indirect. */
411e1bfb
AM
3986 if (eind->elf.got.glist != NULL)
3987 {
3988 if (edir->elf.got.glist != NULL)
3989 {
3990 struct got_entry **entp;
3991 struct got_entry *ent;
3992
3993 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3994 {
3995 struct got_entry *dent;
3996
3997 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3998 if (dent->addend == ent->addend
e717da7e 3999 && dent->owner == ent->owner
411e1bfb
AM
4000 && dent->tls_type == ent->tls_type)
4001 {
4002 dent->got.refcount += ent->got.refcount;
4003 *entp = ent->next;
4004 break;
4005 }
4006 if (dent == NULL)
4007 entp = &ent->next;
4008 }
4009 *entp = edir->elf.got.glist;
4010 }
4011
4012 edir->elf.got.glist = eind->elf.got.glist;
4013 eind->elf.got.glist = NULL;
4014 }
4015
4016 /* And plt entries. */
40d16e0b 4017 move_plt_plist (eind, edir);
411e1bfb 4018
fcfa13d2 4019 if (eind->elf.dynindx != -1)
411e1bfb 4020 {
fcfa13d2
AM
4021 if (edir->elf.dynindx != -1)
4022 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4023 edir->elf.dynstr_index);
411e1bfb
AM
4024 edir->elf.dynindx = eind->elf.dynindx;
4025 edir->elf.dynstr_index = eind->elf.dynstr_index;
4026 eind->elf.dynindx = -1;
4027 eind->elf.dynstr_index = 0;
4028 }
411e1bfb
AM
4029}
4030
8387904d
AM
4031/* Find the function descriptor hash entry from the given function code
4032 hash entry FH. Link the entries via their OH fields. */
4033
4034static struct ppc_link_hash_entry *
b31867b6 4035lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4036{
4037 struct ppc_link_hash_entry *fdh = fh->oh;
4038
4039 if (fdh == NULL)
4040 {
4041 const char *fd_name = fh->elf.root.root.string + 1;
4042
ed7007c1
AM
4043 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4044 FALSE, FALSE, FALSE));
b31867b6
AM
4045 if (fdh == NULL)
4046 return fdh;
4047
4048 fdh->is_func_descriptor = 1;
4049 fdh->oh = fh;
4050 fh->is_func = 1;
4051 fh->oh = fdh;
8387904d
AM
4052 }
4053
8c5b4e52
AM
4054 fdh = ppc_follow_link (fdh);
4055 fdh->is_func_descriptor = 1;
4056 fdh->oh = fh;
4057 return fdh;
8387904d
AM
4058}
4059
8c5b4e52 4060/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4061
4062static struct ppc_link_hash_entry *
4063make_fdh (struct bfd_link_info *info,
908b32fc 4064 struct ppc_link_hash_entry *fh)
bb700d78 4065{
8c5b4e52
AM
4066 bfd *abfd = fh->elf.root.u.undef.abfd;
4067 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4068 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4069 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4070 ? BSF_WEAK
4071 : BSF_GLOBAL);
4072
4073 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4074 fh->elf.root.root.string + 1,
4075 flags, bfd_und_section_ptr, 0,
4076 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4077 return NULL;
4078
4079 fdh = (struct ppc_link_hash_entry *) bh;
4080 fdh->elf.non_elf = 0;
908b32fc
AM
4081 fdh->fake = 1;
4082 fdh->is_func_descriptor = 1;
4083 fdh->oh = fh;
4084 fh->is_func = 1;
4085 fh->oh = fdh;
bb700d78
AM
4086 return fdh;
4087}
4088
8387904d
AM
4089/* Fix function descriptor symbols defined in .opd sections to be
4090 function type. */
555cd476
AM
4091
4092static bfd_boolean
c16153ae 4093ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4094 struct bfd_link_info *info,
555cd476 4095 Elf_Internal_Sym *isym,
6911b7dc 4096 const char **name,
555cd476
AM
4097 flagword *flags ATTRIBUTE_UNUSED,
4098 asection **sec,
b53dfeb2 4099 bfd_vma *value)
555cd476 4100{
b53dfeb2 4101 if (*sec != NULL
f1885d1e 4102 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4103 {
4104 asection *code_sec;
4105
4106 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4107 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4108 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4109
4110 /* If the symbol is a function defined in .opd, and the function
4111 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4112 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4113 && (*sec)->reloc_count != 0
4114 && opd_entry_value (*sec, *value, &code_sec, NULL,
4115 FALSE) != (bfd_vma) -1
4116 && discarded_section (code_sec))
4117 {
4118 *sec = bfd_und_section_ptr;
4119 isym->st_shndx = SHN_UNDEF;
4120 }
4121 }
dbd1e97e
AM
4122 else if (*sec != NULL
4123 && strcmp ((*sec)->name, ".toc") == 0
4124 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4125 {
4126 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4127 if (htab != NULL)
4128 htab->params->object_in_toc = 1;
4129 }
433817dd 4130
6911b7dc
AM
4131 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4132 {
4133 if (abiversion (ibfd) == 0)
4134 set_abiversion (ibfd, 2);
4135 else if (abiversion (ibfd) == 1)
4136 {
cf97bcb0
AM
4137 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4138 " for ABI version 1"), *name);
6911b7dc
AM
4139 bfd_set_error (bfd_error_bad_value);
4140 return FALSE;
4141 }
4142 }
4143
555cd476
AM
4144 return TRUE;
4145}
4146
6911b7dc
AM
4147/* Merge non-visibility st_other attributes: local entry point. */
4148
4149static void
4150ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4151 const Elf_Internal_Sym *isym,
4152 bfd_boolean definition,
4153 bfd_boolean dynamic)
4154{
f378ab09 4155 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4156 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4157 | ELF_ST_VISIBILITY (h->other));
4158}
4159
8c5b4e52
AM
4160/* Hook called on merging a symbol. We use this to clear "fake" since
4161 we now have a real symbol. */
4162
4163static bfd_boolean
4164ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4165 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4166 asection **psec ATTRIBUTE_UNUSED,
4167 bfd_boolean newdef ATTRIBUTE_UNUSED,
4168 bfd_boolean olddef ATTRIBUTE_UNUSED,
4169 bfd *oldbfd ATTRIBUTE_UNUSED,
4170 const asection *oldsec ATTRIBUTE_UNUSED)
4171{
ed7007c1 4172 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4173 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4174 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4175 return TRUE;
4176}
4177
8387904d 4178/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4179 inclusion of a new ABI object archive that defines "bar".
4180 NAME is a symbol defined in an archive. Return a symbol in the hash
4181 table that might be satisfied by the archive symbols. */
8387904d
AM
4182
4183static struct elf_link_hash_entry *
4184ppc64_elf_archive_symbol_lookup (bfd *abfd,
4185 struct bfd_link_info *info,
4186 const char *name)
4187{
4188 struct elf_link_hash_entry *h;
4189 char *dot_name;
4190 size_t len;
4191
4192 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4193 if (h != NULL
4194 /* Don't return this sym if it is a fake function descriptor
4195 created by add_symbol_adjust. */
ed7007c1 4196 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4197 return h;
4198
4199 if (name[0] == '.')
4200 return h;
4201
4202 len = strlen (name);
4203 dot_name = bfd_alloc (abfd, len + 2);
4204 if (dot_name == NULL)
e99955cd 4205 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4206 dot_name[0] = '.';
4207 memcpy (dot_name + 1, name, len + 1);
4208 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4209 bfd_release (abfd, dot_name);
a804e476
AM
4210 if (h != NULL)
4211 return h;
4212
4213 if (strcmp (name, "__tls_get_addr_opt") == 0)
4214 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4215 return h;
4216}
4217
4218/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4219 new ABI object defines "bar". Well, at least, undefined dot symbols
4220 are made weak. This stops later archive searches from including an
4221 object if we already have a function descriptor definition. It also
35b0ce59
AM
4222 prevents the linker complaining about undefined symbols.
4223 We also check and correct mismatched symbol visibility here. The
4224 most restrictive visibility of the function descriptor and the
4225 function entry symbol is used. */
8387904d
AM
4226
4227static bfd_boolean
b3fac117 4228add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4229{
8387904d
AM
4230 struct ppc_link_hash_table *htab;
4231 struct ppc_link_hash_entry *fdh;
4232
b3fac117
AM
4233 if (eh->elf.root.type == bfd_link_hash_warning)
4234 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4235
8400d40d
AM
4236 if (eh->elf.root.type == bfd_link_hash_indirect)
4237 return TRUE;
4238
b3fac117
AM
4239 if (eh->elf.root.root.string[0] != '.')
4240 abort ();
8387904d 4241
b3fac117 4242 htab = ppc_hash_table (info);
4dfe6ac6
NC
4243 if (htab == NULL)
4244 return FALSE;
4245
b31867b6 4246 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4247 if (fdh == NULL
4248 && !bfd_link_relocatable (info)
4249 && (eh->elf.root.type == bfd_link_hash_undefined
4250 || eh->elf.root.type == bfd_link_hash_undefweak)
4251 && eh->elf.ref_regular)
4252 {
4253 /* Make an undefined function descriptor sym, in order to
4254 pull in an --as-needed shared lib. Archives are handled
4255 elsewhere. */
4256 fdh = make_fdh (info, eh);
4257 if (fdh == NULL)
4258 return FALSE;
bb700d78 4259 }
8c5b4e52
AM
4260
4261 if (fdh != NULL)
8387904d 4262 {
35b0ce59
AM
4263 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4264 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4265
4266 /* Make both descriptor and entry symbol have the most
4267 constraining visibility of either symbol. */
35b0ce59
AM
4268 if (entry_vis < descr_vis)
4269 fdh->elf.other += entry_vis - descr_vis;
4270 else if (entry_vis > descr_vis)
4271 eh->elf.other += descr_vis - entry_vis;
4272
8c5b4e52
AM
4273 /* Propagate reference flags from entry symbol to function
4274 descriptor symbol. */
bc4e12de 4275 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4276 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4277 fdh->elf.ref_regular |= eh->elf.ref_regular;
4278 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4279
4280 if (!fdh->elf.forced_local
4281 && fdh->elf.dynindx == -1
4282 && fdh->elf.versioned != versioned_hidden
4283 && (bfd_link_dll (info)
4284 || fdh->elf.def_dynamic
4285 || fdh->elf.ref_dynamic)
4286 && (eh->elf.ref_regular
4287 || eh->elf.def_regular))
4288 {
2cdcc330 4289 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4290 return FALSE;
35b0ce59 4291 }
8387904d 4292 }
99877b66 4293
8387904d
AM
4294 return TRUE;
4295}
4296
f6c7c3e8
AM
4297/* Set up opd section info and abiversion for IBFD, and process list
4298 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4299
8387904d 4300static bfd_boolean
f6c7c3e8 4301ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4302{
99877b66 4303 struct ppc_link_hash_table *htab;
b3fac117 4304 struct ppc_link_hash_entry **p, *eh;
459609d6 4305 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4306
459609d6 4307 if (opd != NULL && opd->size != 0)
b3fac117 4308 {
b9399fcf
AM
4309 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4310 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4311
459609d6
AM
4312 if (abiversion (ibfd) == 0)
4313 set_abiversion (ibfd, 1);
8a2058b5 4314 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4315 {
695344c0 4316 /* xgettext:c-format */
cf97bcb0
AM
4317 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4318 ibfd, abiversion (ibfd));
459609d6
AM
4319 bfd_set_error (bfd_error_bad_value);
4320 return FALSE;
f6c7c3e8 4321 }
b9399fcf 4322 }
f6c7c3e8 4323
b9399fcf
AM
4324 if (is_ppc64_elf (info->output_bfd))
4325 {
4326 /* For input files without an explicit abiversion in e_flags
4327 we should have flagged any with symbol st_other bits set
4328 as ELFv1 and above flagged those with .opd as ELFv2.
4329 Set the output abiversion if not yet set, and for any input
4330 still ambiguous, take its abiversion from the output.
4331 Differences in ABI are reported later. */
4332 if (abiversion (info->output_bfd) == 0)
4333 set_abiversion (info->output_bfd, abiversion (ibfd));
4334 else if (abiversion (ibfd) == 0)
4335 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4336 }
4337
459609d6
AM
4338 htab = ppc_hash_table (info);
4339 if (htab == NULL)
b9399fcf 4340 return TRUE;
459609d6 4341
b9399fcf
AM
4342 if (opd != NULL && opd->size != 0
4343 && (ibfd->flags & DYNAMIC) == 0
4344 && (opd->flags & SEC_RELOC) != 0
4345 && opd->reloc_count != 0
4346 && !bfd_is_abs_section (opd->output_section)
4347 && info->gc_sections)
4348 {
4349 /* Garbage collection needs some extra help with .opd sections.
4350 We don't want to necessarily keep everything referenced by
4351 relocs in .opd, as that would keep all functions. Instead,
4352 if we reference an .opd symbol (a function descriptor), we
4353 want to keep the function code symbol's section. This is
4354 easy for global symbols, but for local syms we need to keep
4355 information about the associated function section. */
4356 bfd_size_type amt;
4357 asection **opd_sym_map;
4358 Elf_Internal_Shdr *symtab_hdr;
4359 Elf_Internal_Rela *relocs, *rel_end, *rel;
4360
4361 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4362 opd_sym_map = bfd_zalloc (ibfd, amt);
4363 if (opd_sym_map == NULL)
4364 return FALSE;
4365 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4366 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4367 info->keep_memory);
4368 if (relocs == NULL)
4369 return FALSE;
4370 symtab_hdr = &elf_symtab_hdr (ibfd);
4371 rel_end = relocs + opd->reloc_count - 1;
4372 for (rel = relocs; rel < rel_end; rel++)
4373 {
4374 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4375 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4376
4377 if (r_type == R_PPC64_ADDR64
4378 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4379 && r_symndx < symtab_hdr->sh_info)
4380 {
4381 Elf_Internal_Sym *isym;
4382 asection *s;
4383
f1dfbfdb
L
4384 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, ibfd,
4385 r_symndx);
b9399fcf
AM
4386 if (isym == NULL)
4387 {
4388 if (elf_section_data (opd)->relocs != relocs)
4389 free (relocs);
4390 return FALSE;
4391 }
4392
4393 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4394 if (s != NULL && s != opd)
4395 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4396 }
4397 }
4398 if (elf_section_data (opd)->relocs != relocs)
4399 free (relocs);
4400 }
459609d6
AM
4401
4402 p = &htab->dot_syms;
4403 while ((eh = *p) != NULL)
4404 {
4405 *p = NULL;
4406 if (&eh->elf == htab->elf.hgot)
4407 ;
4408 else if (htab->elf.hgot == NULL
4409 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4410 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4411 else if (abiversion (ibfd) <= 1)
4412 {
4413 htab->need_func_desc_adj = 1;
4414 if (!add_symbol_adjust (eh, info))
4415 return FALSE;
4416 }
459609d6
AM
4417 p = &eh->u.next_dot_sym;
4418 }
b3fac117 4419 return TRUE;
8387904d
AM
4420}
4421
97fed1c9
JJ
4422/* Undo hash table changes when an --as-needed input file is determined
4423 not to be needed. */
4424
4425static bfd_boolean
e5034e59
AM
4426ppc64_elf_notice_as_needed (bfd *ibfd,
4427 struct bfd_link_info *info,
4428 enum notice_asneeded_action act)
97fed1c9 4429{
e5034e59
AM
4430 if (act == notice_not_needed)
4431 {
4432 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4433
e5034e59
AM
4434 if (htab == NULL)
4435 return FALSE;
4dfe6ac6 4436
e5034e59
AM
4437 htab->dot_syms = NULL;
4438 }
4439 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4440}
4441
aa374f67
AM
4442/* If --just-symbols against a final linked binary, then assume we need
4443 toc adjusting stubs when calling functions defined there. */
4444
4445static void
4446ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4447{
4448 if ((sec->flags & SEC_CODE) != 0
4449 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4450 && is_ppc64_elf (sec->owner))
4451 {
2c3f079f
AM
4452 if (abiversion (sec->owner) >= 2
4453 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4454 sec->has_toc_reloc = 1;
4455 }
4456 _bfd_elf_link_just_syms (sec, info);
4457}
4458
e054468f 4459static struct plt_entry **
4ce794b7
AM
4460update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4461 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4462{
4463 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4464 struct plt_entry **local_plt;
f961d9dd 4465 unsigned char *local_got_tls_masks;
411e1bfb
AM
4466
4467 if (local_got_ents == NULL)
4468 {
4469 bfd_size_type size = symtab_hdr->sh_info;
4470
e054468f
AM
4471 size *= (sizeof (*local_got_ents)
4472 + sizeof (*local_plt)
4473 + sizeof (*local_got_tls_masks));
4ce794b7 4474 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4475 if (local_got_ents == NULL)
e054468f 4476 return NULL;
411e1bfb
AM
4477 elf_local_got_ents (abfd) = local_got_ents;
4478 }
4479
37da22e5 4480 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4481 {
4482 struct got_entry *ent;
4483
4484 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4485 if (ent->addend == r_addend
4486 && ent->owner == abfd
4487 && ent->tls_type == tls_type)
411e1bfb
AM
4488 break;
4489 if (ent == NULL)
4490 {
986f0783 4491 size_t amt = sizeof (*ent);
4ce794b7 4492 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4493 if (ent == NULL)
4494 return FALSE;
4495 ent->next = local_got_ents[r_symndx];
4496 ent->addend = r_addend;
e717da7e 4497 ent->owner = abfd;
411e1bfb 4498 ent->tls_type = tls_type;
927be08e 4499 ent->is_indirect = FALSE;
411e1bfb
AM
4500 ent->got.refcount = 0;
4501 local_got_ents[r_symndx] = ent;
4502 }
4503 ent->got.refcount += 1;
4504 }
4505
e054468f 4506 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4507 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4508 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4509
4510 return local_plt + r_symndx;
65f38f15
AM
4511}
4512
411e1bfb 4513static bfd_boolean
e054468f 4514update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4515{
411e1bfb 4516 struct plt_entry *ent;
1e2f5b6e 4517
e054468f 4518 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4519 if (ent->addend == addend)
4520 break;
4521 if (ent == NULL)
1e2f5b6e 4522 {
986f0783 4523 size_t amt = sizeof (*ent);
4ce794b7 4524 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4525 if (ent == NULL)
4526 return FALSE;
e054468f 4527 ent->next = *plist;
411e1bfb
AM
4528 ent->addend = addend;
4529 ent->plt.refcount = 0;
e054468f 4530 *plist = ent;
1e2f5b6e 4531 }
411e1bfb 4532 ent->plt.refcount += 1;
b34976b6 4533 return TRUE;
1e2f5b6e
AM
4534}
4535
e054468f
AM
4536static bfd_boolean
4537is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4538{
4539 return (r_type == R_PPC64_REL24
05d0e962 4540 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4541 || r_type == R_PPC64_REL14
4542 || r_type == R_PPC64_REL14_BRTAKEN
4543 || r_type == R_PPC64_REL14_BRNTAKEN
4544 || r_type == R_PPC64_ADDR24
4545 || r_type == R_PPC64_ADDR14
4546 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4547 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4548 || r_type == R_PPC64_PLTCALL
4549 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4550}
4551
4552/* Relocs on inline plt call sequence insns prior to the call. */
4553
4554static bfd_boolean
4555is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4556{
4557 return (r_type == R_PPC64_PLT16_HA
4558 || r_type == R_PPC64_PLT16_HI
4559 || r_type == R_PPC64_PLT16_LO
4560 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4561 || r_type == R_PPC64_PLT_PCREL34
4562 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4563 || r_type == R_PPC64_PLTSEQ
4564 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4565}
4566
5bd4f169 4567/* Look through the relocs for a section during the first phase, and
65f38f15 4568 calculate needed space in the global offset table, procedure
5d1634d7 4569 linkage table, and dynamic reloc sections. */
5bd4f169 4570
b34976b6 4571static bfd_boolean
4ce794b7
AM
4572ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4573 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4574{
65f38f15 4575 struct ppc_link_hash_table *htab;
5bd4f169 4576 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4577 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4578 const Elf_Internal_Rela *rel;
4579 const Elf_Internal_Rela *rel_end;
5bd4f169 4580 asection *sreloc;
3a71aa26 4581 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4582 bfd_boolean is_opd;
5bd4f169 4583
0e1862bb 4584 if (bfd_link_relocatable (info))
b34976b6 4585 return TRUE;
5bd4f169 4586
0c8d6e5c 4587 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4588
65f38f15 4589 htab = ppc_hash_table (info);
4dfe6ac6
NC
4590 if (htab == NULL)
4591 return FALSE;
4592
3a71aa26
AM
4593 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4594 FALSE, FALSE, TRUE);
4595 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4596 FALSE, FALSE, TRUE);
0ffa91dd 4597 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4598 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4599 sreloc = NULL;
b9399fcf 4600 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4601 rel_end = relocs + sec->reloc_count;
4602 for (rel = relocs; rel < rel_end; rel++)
4603 {
4604 unsigned long r_symndx;
4605 struct elf_link_hash_entry *h;
04c9666a 4606 enum elf_ppc64_reloc_type r_type;
727fc41e 4607 int tls_type;
7c8fe5c4 4608 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4609 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4610
4611 r_symndx = ELF64_R_SYM (rel->r_info);
4612 if (r_symndx < symtab_hdr->sh_info)
4613 h = NULL;
4614 else
973a3492
L
4615 {
4616 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4617 h = elf_follow_link (h);
1c865ab2
AM
4618
4619 if (h == htab->elf.hgot)
4620 sec->has_toc_reloc = 1;
973a3492 4621 }
5bd4f169 4622
5663e321
AM
4623 r_type = ELF64_R_TYPE (rel->r_info);
4624 switch (r_type)
4625 {
04bdff6a
AM
4626 case R_PPC64_D34:
4627 case R_PPC64_D34_LO:
4628 case R_PPC64_D34_HI30:
4629 case R_PPC64_D34_HA30:
4630 case R_PPC64_D28:
c213164a
AM
4631 case R_PPC64_TPREL34:
4632 case R_PPC64_DTPREL34:
04bdff6a 4633 case R_PPC64_PCREL34:
5663e321 4634 case R_PPC64_GOT_PCREL34:
87c69f97
AM
4635 case R_PPC64_GOT_TLSGD_PCREL34:
4636 case R_PPC64_GOT_TLSLD_PCREL34:
4637 case R_PPC64_GOT_TPREL_PCREL34:
4638 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
4639 case R_PPC64_PLT_PCREL34:
4640 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a 4641 case R_PPC64_PCREL28:
e10a07b3 4642 htab->has_power10_relocs = 1;
133a1f60
AM
4643 break;
4644 default:
5663e321
AM
4645 break;
4646 }
903b777d
AM
4647
4648 switch (r_type)
4649 {
4650 case R_PPC64_PLT16_HA:
4651 case R_PPC64_GOT_TLSLD16_HA:
4652 case R_PPC64_GOT_TLSGD16_HA:
4653 case R_PPC64_GOT_TPREL16_HA:
4654 case R_PPC64_GOT_DTPREL16_HA:
4655 case R_PPC64_GOT16_HA:
4656 case R_PPC64_TOC16_HA:
4657 case R_PPC64_PLT16_LO:
4658 case R_PPC64_PLT16_LO_DS:
4659 case R_PPC64_GOT_TLSLD16_LO:
4660 case R_PPC64_GOT_TLSGD16_LO:
4661 case R_PPC64_GOT_TPREL16_LO_DS:
4662 case R_PPC64_GOT_DTPREL16_LO_DS:
4663 case R_PPC64_GOT16_LO:
4664 case R_PPC64_GOT16_LO_DS:
4665 case R_PPC64_TOC16_LO:
4666 case R_PPC64_TOC16_LO_DS:
4667 case R_PPC64_GOT_PCREL34:
4668 ppc64_elf_tdata (abfd)->has_optrel = 1;
4669 ppc64_elf_section_data (sec)->has_optrel = 1;
4670 break;
4671 default:
4672 break;
4673 }
4674
f749f26e 4675 ifunc = NULL;
25f23106
AM
4676 if (h != NULL)
4677 {
4678 if (h->type == STT_GNU_IFUNC)
4679 {
4680 h->needs_plt = 1;
4681 ifunc = &h->plt.plist;
4682 }
4683 }
4684 else
4685 {
f1dfbfdb 4686 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
25f23106
AM
4687 abfd, r_symndx);
4688 if (isym == NULL)
4689 return FALSE;
4690
4691 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4692 {
4693 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4694 rel->r_addend,
37da22e5 4695 NON_GOT | PLT_IFUNC);
25f23106
AM
4696 if (ifunc == NULL)
4697 return FALSE;
4698 }
4699 }
727fc41e 4700
f749f26e 4701 tls_type = 0;
a33d1f77 4702 switch (r_type)
5bd4f169 4703 {
727fc41e
AM
4704 case R_PPC64_TLSGD:
4705 case R_PPC64_TLSLD:
4706 /* These special tls relocs tie a call to __tls_get_addr with
4707 its parameter symbol. */
37da22e5 4708 if (h != NULL)
ed7007c1 4709 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4710 else
4711 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4712 rel->r_addend,
37da22e5
AM
4713 NON_GOT | TLS_TLS | TLS_MARK))
4714 return FALSE;
4715 sec->has_tls_reloc = 1;
727fc41e
AM
4716 break;
4717
411e1bfb
AM
4718 case R_PPC64_GOT_TLSLD16:
4719 case R_PPC64_GOT_TLSLD16_LO:
4720 case R_PPC64_GOT_TLSLD16_HI:
4721 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 4722 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 4723 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4724 goto dogottls;
4725
4726 case R_PPC64_GOT_TLSGD16:
4727 case R_PPC64_GOT_TLSGD16_LO:
4728 case R_PPC64_GOT_TLSGD16_HI:
4729 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 4730 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 4731 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4732 goto dogottls;
4733
4734 case R_PPC64_GOT_TPREL16_DS:
4735 case R_PPC64_GOT_TPREL16_LO_DS:
4736 case R_PPC64_GOT_TPREL16_HI:
4737 case R_PPC64_GOT_TPREL16_HA:
87c69f97 4738 case R_PPC64_GOT_TPREL_PCREL34:
7c8bbca5 4739 if (bfd_link_dll (info))
411e1bfb
AM
4740 info->flags |= DF_STATIC_TLS;
4741 tls_type = TLS_TLS | TLS_TPREL;
4742 goto dogottls;
4743
4744 case R_PPC64_GOT_DTPREL16_DS:
4745 case R_PPC64_GOT_DTPREL16_LO_DS:
4746 case R_PPC64_GOT_DTPREL16_HI:
4747 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 4748 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
4749 tls_type = TLS_TLS | TLS_DTPREL;
4750 dogottls:
4751 sec->has_tls_reloc = 1;
066f4018 4752 goto dogot;
411e1bfb 4753
903b777d
AM
4754 case R_PPC64_GOT16:
4755 case R_PPC64_GOT16_LO:
4756 case R_PPC64_GOT16_HI:
65f38f15 4757 case R_PPC64_GOT16_HA:
903b777d 4758 case R_PPC64_GOT16_DS:
066f4018 4759 case R_PPC64_GOT16_LO_DS:
4a421c53 4760 case R_PPC64_GOT_PCREL34:
066f4018 4761 dogot:
65f38f15 4762 /* This symbol requires a global offset table entry. */
4c52953f 4763 sec->has_toc_reloc = 1;
33c0ec9d
AM
4764 if (r_type == R_PPC64_GOT_TLSLD16
4765 || r_type == R_PPC64_GOT_TLSGD16
4766 || r_type == R_PPC64_GOT_TPREL16_DS
4767 || r_type == R_PPC64_GOT_DTPREL16_DS
4768 || r_type == R_PPC64_GOT16
4769 || r_type == R_PPC64_GOT16_DS)
4770 {
4771 htab->do_multi_toc = 1;
d77c8a4b 4772 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4773 }
4774
e717da7e
AM
4775 if (ppc64_elf_tdata (abfd)->got == NULL
4776 && !create_got_section (abfd, info))
b34976b6 4777 return FALSE;
5bd4f169
AM
4778
4779 if (h != NULL)
4780 {
411e1bfb
AM
4781 struct ppc_link_hash_entry *eh;
4782 struct got_entry *ent;
65f38f15 4783
ed7007c1 4784 eh = ppc_elf_hash_entry (h);
411e1bfb 4785 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4786 if (ent->addend == rel->r_addend
e717da7e 4787 && ent->owner == abfd
411e1bfb
AM
4788 && ent->tls_type == tls_type)
4789 break;
4790 if (ent == NULL)
5bd4f169 4791 {
986f0783 4792 size_t amt = sizeof (*ent);
4ce794b7 4793 ent = bfd_alloc (abfd, amt);
411e1bfb 4794 if (ent == NULL)
b34976b6 4795 return FALSE;
411e1bfb 4796 ent->next = eh->elf.got.glist;
133a1f60 4797 ent->addend = rel->r_addend;
e717da7e 4798 ent->owner = abfd;
411e1bfb 4799 ent->tls_type = tls_type;
927be08e 4800 ent->is_indirect = FALSE;
411e1bfb
AM
4801 ent->got.refcount = 0;
4802 eh->elf.got.glist = ent;
5bd4f169 4803 }
411e1bfb 4804 ent->got.refcount += 1;
e7b938ca 4805 eh->tls_mask |= tls_type;
5bd4f169 4806 }
411e1bfb
AM
4807 else
4808 /* This is a global offset table entry for a local symbol. */
4809 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4810 rel->r_addend, tls_type))
411e1bfb 4811 return FALSE;
5bd4f169
AM
4812 break;
4813
5bd4f169 4814 case R_PPC64_PLT16_HA:
65f38f15
AM
4815 case R_PPC64_PLT16_HI:
4816 case R_PPC64_PLT16_LO:
08be3224 4817 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4818 case R_PPC64_PLT_PCREL34:
4819 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4820 case R_PPC64_PLT32:
4821 case R_PPC64_PLT64:
cbf95972
AM
4822 /* This symbol requires a procedure linkage table entry. */
4823 plt_list = ifunc;
4824 if (h != NULL)
e054468f 4825 {
e054468f
AM
4826 h->needs_plt = 1;
4827 if (h->root.root.string[0] == '.'
4828 && h->root.root.string[1] != '\0')
ed7007c1
AM
4829 ppc_elf_hash_entry (h)->is_func = 1;
4830 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4831 plt_list = &h->plt.plist;
4832 }
4833 if (plt_list == NULL)
2d7ad24e 4834 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4835 rel->r_addend,
2d7ad24e 4836 NON_GOT | PLT_KEEP);
133a1f60 4837 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4838 return FALSE;
5bd4f169
AM
4839 break;
4840
4841 /* The following relocations don't need to propagate the
4842 relocation if linking a shared object since they are
4843 section relative. */
4844 case R_PPC64_SECTOFF:
4845 case R_PPC64_SECTOFF_LO:
4846 case R_PPC64_SECTOFF_HI:
4847 case R_PPC64_SECTOFF_HA:
4848 case R_PPC64_SECTOFF_DS:
4849 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4850 case R_PPC64_DTPREL16:
4851 case R_PPC64_DTPREL16_LO:
4852 case R_PPC64_DTPREL16_HI:
4853 case R_PPC64_DTPREL16_HA:
4854 case R_PPC64_DTPREL16_DS:
4855 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4856 case R_PPC64_DTPREL16_HIGH:
4857 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4858 case R_PPC64_DTPREL16_HIGHER:
4859 case R_PPC64_DTPREL16_HIGHERA:
4860 case R_PPC64_DTPREL16_HIGHEST:
4861 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4862 break;
4863
ad8e1ba5 4864 /* Nor do these. */
25f23106
AM
4865 case R_PPC64_REL16:
4866 case R_PPC64_REL16_LO:
4867 case R_PPC64_REL16_HI:
4868 case R_PPC64_REL16_HA:
4a969973
AM
4869 case R_PPC64_REL16_HIGH:
4870 case R_PPC64_REL16_HIGHA:
4871 case R_PPC64_REL16_HIGHER:
4872 case R_PPC64_REL16_HIGHERA:
4873 case R_PPC64_REL16_HIGHEST:
4874 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4875 case R_PPC64_REL16_HIGHER34:
4876 case R_PPC64_REL16_HIGHERA34:
4877 case R_PPC64_REL16_HIGHEST34:
4878 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4879 case R_PPC64_REL16DX_HA:
25f23106
AM
4880 break;
4881
45965137
AM
4882 /* Not supported as a dynamic relocation. */
4883 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4884 if (bfd_link_pic (info))
45965137
AM
4885 {
4886 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4887 ppc_howto_init ();
695344c0 4888 /* xgettext:c-format */
174d0a74 4889 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4890 "in shared libraries and PIEs\n"),
45965137
AM
4891 abfd, sec, rel->r_offset,
4892 ppc64_elf_howto_table[r_type]->name);
4893 bfd_set_error (bfd_error_bad_value);
4894 return FALSE;
4895 }
4896 break;
4897
ad8e1ba5 4898 case R_PPC64_TOC16:
33c0ec9d
AM
4899 case R_PPC64_TOC16_DS:
4900 htab->do_multi_toc = 1;
d77c8a4b 4901 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4902 /* Fall through. */
ad8e1ba5
AM
4903 case R_PPC64_TOC16_LO:
4904 case R_PPC64_TOC16_HI:
4905 case R_PPC64_TOC16_HA:
ad8e1ba5 4906 case R_PPC64_TOC16_LO_DS:
4c52953f 4907 sec->has_toc_reloc = 1;
ec73ddcd 4908 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4909 {
4910 /* We may need a copy reloc. */
4911 h->non_got_ref = 1;
4912 /* Strongly prefer a copy reloc over a dynamic reloc.
4913 glibc ld.so as of 2019-08 will error out if one of
4914 these relocations is emitted. */
4915 h->needs_copy = 1;
4916 goto dodyn;
4917 }
ad8e1ba5
AM
4918 break;
4919
006589cf
AM
4920 /* Marker reloc. */
4921 case R_PPC64_ENTRY:
4922 break;
4923
5bd4f169
AM
4924 /* This relocation describes the C++ object vtable hierarchy.
4925 Reconstruct it for later use during GC. */
4926 case R_PPC64_GNU_VTINHERIT:
c152c796 4927 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4928 return FALSE;
5bd4f169
AM
4929 break;
4930
4931 /* This relocation describes which C++ vtable entries are actually
4932 used. Record for later use during GC. */
4933 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4934 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4935 return FALSE;
5bd4f169
AM
4936 break;
4937
721956f4
AM
4938 case R_PPC64_REL14:
4939 case R_PPC64_REL14_BRTAKEN:
4940 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4941 {
4942 asection *dest = NULL;
4943
4944 /* Heuristic: If jumping outside our section, chances are
4945 we are going to need a stub. */
4946 if (h != NULL)
4947 {
4948 /* If the sym is weak it may be overridden later, so
4949 don't assume we know where a weak sym lives. */
4950 if (h->root.type == bfd_link_hash_defined)
4951 dest = h->root.u.def.section;
4952 }
4953 else
87d72d41
AM
4954 {
4955 Elf_Internal_Sym *isym;
4956
f1dfbfdb 4957 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
4958 abfd, r_symndx);
4959 if (isym == NULL)
4960 return FALSE;
4961
4962 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4963 }
4964
220c76dd 4965 if (dest != sec)
7c8fe5c4 4966 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4967 }
3e04d765
AM
4968 goto rel24;
4969
4970 case R_PPC64_PLTCALL:
5663e321 4971 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4972 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4973 /* Fall through. */
4974
5d1634d7 4975 case R_PPC64_REL24:
05d0e962 4976 case R_PPC64_REL24_NOTOC:
3e04d765 4977 rel24:
cbf95972
AM
4978 plt_list = ifunc;
4979 if (h != NULL)
5d1634d7 4980 {
e054468f
AM
4981 h->needs_plt = 1;
4982 if (h->root.root.string[0] == '.'
4983 && h->root.root.string[1] != '\0')
ed7007c1 4984 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4985
3a71aa26 4986 if (h == tga || h == dottga)
cbf95972
AM
4987 {
4988 sec->has_tls_reloc = 1;
4989 if (rel != relocs
4990 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4991 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4992 /* We have a new-style __tls_get_addr call with
4993 a marker reloc. */
4994 ;
4995 else
4996 /* Mark this section as having an old-style call. */
9737e8af 4997 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4998 }
4999 plt_list = &h->plt.plist;
411e1bfb 5000 }
cbf95972
AM
5001
5002 /* We may need a .plt entry if the function this reloc
5003 refers to is in a shared lib. */
5004 if (plt_list
133a1f60 5005 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 5006 return FALSE;
411e1bfb
AM
5007 break;
5008
cbf95972
AM
5009 case R_PPC64_ADDR14:
5010 case R_PPC64_ADDR14_BRNTAKEN:
5011 case R_PPC64_ADDR14_BRTAKEN:
5012 case R_PPC64_ADDR24:
5013 goto dodyn;
5014
411e1bfb
AM
5015 case R_PPC64_TPREL64:
5016 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 5017 if (bfd_link_dll (info))
411e1bfb
AM
5018 info->flags |= DF_STATIC_TLS;
5019 goto dotlstoc;
5020
5021 case R_PPC64_DTPMOD64:
5022 if (rel + 1 < rel_end
5023 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5024 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5025 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5026 else
951fd09b 5027 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5028 goto dotlstoc;
5029
5030 case R_PPC64_DTPREL64:
5031 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5032 if (rel != relocs
5033 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5034 && rel[-1].r_offset == rel->r_offset - 8)
5035 /* This is the second reloc of a dtpmod, dtprel pair.
5036 Don't mark with TLS_DTPREL. */
5037 goto dodyn;
5038
5039 dotlstoc:
5040 sec->has_tls_reloc = 1;
5041 if (h != NULL)
ed7007c1 5042 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5043 else
5044 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5045 rel->r_addend, tls_type))
411e1bfb
AM
5046 return FALSE;
5047
7c8fe5c4
AM
5048 ppc64_sec = ppc64_elf_section_data (sec);
5049 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5050 {
3a71aa26
AM
5051 bfd_size_type amt;
5052
e7b938ca 5053 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5054 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5055 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5056 if (ppc64_sec->u.toc.symndx == NULL)
5057 return FALSE;
5058 amt = sec->size * sizeof (bfd_vma) / 8;
5059 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5060 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5061 return FALSE;
7c8fe5c4
AM
5062 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5063 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5064 }
5065 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5066 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5067 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5068
5069 /* Mark the second slot of a GD or LD entry.
5070 -1 to indicate GD and -2 to indicate LD. */
5071 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5072 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5073 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5074 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5075 goto dodyn;
5076
411e1bfb
AM
5077 case R_PPC64_TPREL16_HI:
5078 case R_PPC64_TPREL16_HA:
f9c6b907
AM
5079 case R_PPC64_TPREL16_HIGH:
5080 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5081 case R_PPC64_TPREL16_HIGHER:
5082 case R_PPC64_TPREL16_HIGHERA:
5083 case R_PPC64_TPREL16_HIGHEST:
5084 case R_PPC64_TPREL16_HIGHESTA:
252dcdf4
AM
5085 sec->has_tls_reloc = 1;
5086 /* Fall through. */
c213164a 5087 case R_PPC64_TPREL34:
252dcdf4
AM
5088 case R_PPC64_TPREL16:
5089 case R_PPC64_TPREL16_DS:
5090 case R_PPC64_TPREL16_LO:
5091 case R_PPC64_TPREL16_LO_DS:
7c8bbca5
AM
5092 if (bfd_link_dll (info))
5093 info->flags |= DF_STATIC_TLS;
5094 goto dodyn;
5d1634d7 5095
e86ce104 5096 case R_PPC64_ADDR64:
b9399fcf 5097 if (is_opd
1e2f5b6e 5098 && rel + 1 < rel_end
4ce794b7 5099 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5100 {
8387904d 5101 if (h != NULL)
ed7007c1 5102 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5103 }
e86ce104
AM
5104 /* Fall through. */
5105
65f38f15
AM
5106 case R_PPC64_ADDR16:
5107 case R_PPC64_ADDR16_DS:
5108 case R_PPC64_ADDR16_HA:
5109 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5110 case R_PPC64_ADDR16_HIGH:
5111 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5112 case R_PPC64_ADDR16_HIGHER:
5113 case R_PPC64_ADDR16_HIGHERA:
5114 case R_PPC64_ADDR16_HIGHEST:
5115 case R_PPC64_ADDR16_HIGHESTA:
5116 case R_PPC64_ADDR16_LO:
5117 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5118 case R_PPC64_D34:
5119 case R_PPC64_D34_LO:
5120 case R_PPC64_D34_HI30:
5121 case R_PPC64_D34_HA30:
5122 case R_PPC64_ADDR16_HIGHER34:
5123 case R_PPC64_ADDR16_HIGHERA34:
5124 case R_PPC64_ADDR16_HIGHEST34:
5125 case R_PPC64_ADDR16_HIGHESTA34:
5126 case R_PPC64_D28:
0e1862bb 5127 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5128 && rel->r_addend == 0)
5129 {
5130 /* We may need a .plt entry if this reloc refers to a
5131 function in a shared lib. */
5663e321 5132 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5133 return FALSE;
5134 h->pointer_equality_needed = 1;
5135 }
5136 /* Fall through. */
5137
5138 case R_PPC64_REL30:
5139 case R_PPC64_REL32:
5140 case R_PPC64_REL64:
65f38f15 5141 case R_PPC64_ADDR32:
65f38f15
AM
5142 case R_PPC64_UADDR16:
5143 case R_PPC64_UADDR32:
5144 case R_PPC64_UADDR64:
5bd4f169 5145 case R_PPC64_TOC:
ec73ddcd 5146 if (h != NULL && bfd_link_executable (info))
81848ca0 5147 /* We may need a copy reloc. */
f5385ebf 5148 h->non_got_ref = 1;
81848ca0 5149
41bd81ab 5150 /* Don't propagate .opd relocs. */
b9399fcf 5151 if (NO_OPD_RELOCS && is_opd)
e86ce104 5152 break;
e86ce104 5153
65f38f15
AM
5154 /* If we are creating a shared library, and this is a reloc
5155 against a global symbol, or a non PC relative reloc
5156 against a local symbol, then we need to copy the reloc
5157 into the shared library. However, if we are linking with
5158 -Bsymbolic, we do not need to copy a reloc against a
5159 global symbol which is defined in an object we are
5160 including in the link (i.e., DEF_REGULAR is set). At
5161 this point we have not seen all the input files, so it is
5162 possible that DEF_REGULAR is not set now but will be set
5163 later (it is never cleared). In case of a weak definition,
5164 DEF_REGULAR may be cleared later by a strong definition in
5165 a shared library. We account for that possibility below by
f4656909 5166 storing information in the dyn_relocs field of the hash
65f38f15
AM
5167 table entry. A similar situation occurs when creating
5168 shared libraries and symbol visibility changes render the
5169 symbol local.
5170
5171 If on the other hand, we are creating an executable, we
5172 may need to keep relocations for symbols satisfied by a
5173 dynamic library if we manage to avoid copy relocs for the
5174 symbol. */
411e1bfb 5175 dodyn:
ec73ddcd
AM
5176 if ((h != NULL
5177 && (h->root.type == bfd_link_hash_defweak
5178 || !h->def_regular))
5179 || (h != NULL
5180 && !bfd_link_executable (info)
5181 && !SYMBOLIC_BIND (info, h))
5182 || (bfd_link_pic (info)
5183 && must_be_dyn_reloc (info, r_type))
0e1862bb 5184 || (!bfd_link_pic (info)
25f23106 5185 && ifunc != NULL))
5bd4f169 5186 {
65f38f15
AM
5187 /* We must copy these reloc types into the output file.
5188 Create a reloc section in dynobj and make room for
5189 this reloc. */
5bd4f169
AM
5190 if (sreloc == NULL)
5191 {
83bac4b0
NC
5192 sreloc = _bfd_elf_make_dynamic_reloc_section
5193 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5194
5bd4f169 5195 if (sreloc == NULL)
83bac4b0 5196 return FALSE;
5bd4f169
AM
5197 }
5198
65f38f15
AM
5199 /* If this is a global symbol, we count the number of
5200 relocations we need for this symbol. */
5201 if (h != NULL)
5202 {
19e08130
AM
5203 struct elf_dyn_relocs *p;
5204 struct elf_dyn_relocs **head;
5205
190eb1dd 5206 head = &h->dyn_relocs;
19e08130
AM
5207 p = *head;
5208 if (p == NULL || p->sec != sec)
5209 {
5210 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5211 if (p == NULL)
5212 return FALSE;
5213 p->next = *head;
5214 *head = p;
5215 p->sec = sec;
5216 p->count = 0;
5217 p->pc_count = 0;
5218 }
5219 p->count += 1;
5220 if (!must_be_dyn_reloc (info, r_type))
5221 p->pc_count += 1;
65f38f15
AM
5222 }
5223 else
5224 {
ec338859
AM
5225 /* Track dynamic relocs needed for local syms too.
5226 We really need local syms available to do this
5227 easily. Oh well. */
19e08130
AM
5228 struct ppc_dyn_relocs *p;
5229 struct ppc_dyn_relocs **head;
5230 bfd_boolean is_ifunc;
ec338859 5231 asection *s;
6edfbbad 5232 void *vpp;
87d72d41 5233 Elf_Internal_Sym *isym;
6edfbbad 5234
f1dfbfdb 5235 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
5236 abfd, r_symndx);
5237 if (isym == NULL)
b34976b6 5238 return FALSE;
ec338859 5239
87d72d41
AM
5240 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5241 if (s == NULL)
5242 s = sec;
5243
6edfbbad 5244 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5245 head = (struct ppc_dyn_relocs **) vpp;
5246 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5247 p = *head;
5248 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5249 p = p->next;
5250 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5251 {
5252 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5253 if (p == NULL)
5254 return FALSE;
5255 p->next = *head;
5256 *head = p;
5257 p->sec = sec;
5258 p->ifunc = is_ifunc;
5259 p->count = 0;
5260 }
5261 p->count += 1;
ec338859 5262 }
65f38f15 5263 }
5bd4f169 5264 break;
65f38f15
AM
5265
5266 default:
96e0dda4 5267 break;
5bd4f169
AM
5268 }
5269 }
5270
b34976b6 5271 return TRUE;
5bd4f169
AM
5272}
5273
ee67d69a
AM
5274/* Merge backend specific data from an object file to the output
5275 object file when linking. */
5276
5277static bfd_boolean
50e03d47 5278ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5279{
50e03d47 5280 bfd *obfd = info->output_bfd;
ee67d69a
AM
5281 unsigned long iflags, oflags;
5282
5283 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5284 return TRUE;
5285
5286 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5287 return TRUE;
5288
50e03d47 5289 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5290 return FALSE;
5291
5292 iflags = elf_elfheader (ibfd)->e_flags;
5293 oflags = elf_elfheader (obfd)->e_flags;
5294
f6c7c3e8 5295 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5296 {
4eca0228 5297 _bfd_error_handler
695344c0 5298 /* xgettext:c-format */
871b3ab2 5299 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5300 bfd_set_error (bfd_error_bad_value);
5301 return FALSE;
5302 }
f6c7c3e8 5303 else if (iflags != oflags && iflags != 0)
ee67d69a 5304 {
4eca0228 5305 _bfd_error_handler
695344c0 5306 /* xgettext:c-format */
871b3ab2 5307 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5308 ibfd, iflags, oflags);
5309 bfd_set_error (bfd_error_bad_value);
5310 return FALSE;
5311 }
5312
4a91d0ba
AM
5313 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5314 return FALSE;
005d79fd 5315
ee67d69a 5316 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5317 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5318}
5319
5320static bfd_boolean
5321ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5322{
5323 /* Print normal ELF private data. */
5324 _bfd_elf_print_private_bfd_data (abfd, ptr);
5325
5326 if (elf_elfheader (abfd)->e_flags != 0)
5327 {
5328 FILE *file = ptr;
5329
ee67d69a
AM
5330 fprintf (file, _("private flags = 0x%lx:"),
5331 elf_elfheader (abfd)->e_flags);
5332
5333 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5334 fprintf (file, _(" [abiv%ld]"),
5335 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5336 fputc ('\n', file);
5337 }
5338
5339 return TRUE;
5340}
5341
8387904d 5342/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5343 of the code entry point, and its section, which must be in the same
5344 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5345
5346static bfd_vma
5347opd_entry_value (asection *opd_sec,
5348 bfd_vma offset,
5349 asection **code_sec,
aef36ac1
AM
5350 bfd_vma *code_off,
5351 bfd_boolean in_code_sec)
8387904d
AM
5352{
5353 bfd *opd_bfd = opd_sec->owner;
8860955f 5354 Elf_Internal_Rela *relocs;
8387904d 5355 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5356 bfd_vma val;
8387904d 5357
9f296da3
AM
5358 /* No relocs implies we are linking a --just-symbols object, or looking
5359 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5360 if (opd_sec->reloc_count == 0)
5361 {
729eabd5 5362 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5363
729eabd5
AM
5364 if (contents == NULL)
5365 {
5366 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5367 return (bfd_vma) -1;
5368 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5369 }
ee1e4ede 5370
dbb3fbbb 5371 /* PR 17512: file: 64b9dfbb. */
451dfd38 5372 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5373 return (bfd_vma) -1;
5374
729eabd5 5375 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5376 if (code_sec != NULL)
5377 {
5378 asection *sec, *likely = NULL;
ee1e4ede 5379
aef36ac1 5380 if (in_code_sec)
4b85d634 5381 {
aef36ac1
AM
5382 sec = *code_sec;
5383 if (sec->vma <= val
5384 && val < sec->vma + sec->size)
5385 likely = sec;
5386 else
5387 val = -1;
5388 }
5389 else
5390 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5391 if (sec->vma <= val
5392 && (sec->flags & SEC_LOAD) != 0
5393 && (sec->flags & SEC_ALLOC) != 0)
5394 likely = sec;
5395 if (likely != NULL)
5396 {
5397 *code_sec = likely;
5398 if (code_off != NULL)
5399 *code_off = val - likely->vma;
4b85d634
AM
5400 }
5401 }
aef36ac1 5402 return val;
4b85d634
AM
5403 }
5404
0c8d6e5c 5405 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5406
729eabd5 5407 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5408 if (relocs == NULL)
5409 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5410 /* PR 17512: file: df8e1fd6. */
5411 if (relocs == NULL)
5412 return (bfd_vma) -1;
645ea6a9 5413
8387904d 5414 /* Go find the opd reloc at the sym address. */
8860955f 5415 lo = relocs;
8387904d 5416 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5417 val = (bfd_vma) -1;
8387904d
AM
5418 while (lo < hi)
5419 {
5420 look = lo + (hi - lo) / 2;
5421 if (look->r_offset < offset)
5422 lo = look + 1;
5423 else if (look->r_offset > offset)
5424 hi = look;
5425 else
5426 {
0ffa91dd
NC
5427 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5428
8387904d
AM
5429 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5430 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5431 {
5432 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5433 asection *sec = NULL;
8387904d 5434
b53dfeb2
AM
5435 if (symndx >= symtab_hdr->sh_info
5436 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5437 {
5438 struct elf_link_hash_entry **sym_hashes;
5439 struct elf_link_hash_entry *rh;
5440
5441 sym_hashes = elf_sym_hashes (opd_bfd);
5442 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5443 if (rh != NULL)
5444 {
5445 rh = elf_follow_link (rh);
bb854a36
AM
5446 if (rh->root.type != bfd_link_hash_defined
5447 && rh->root.type != bfd_link_hash_defweak)
5448 break;
5449 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5450 {
bb854a36
AM
5451 val = rh->root.u.def.value;
5452 sec = rh->root.u.def.section;
b53dfeb2
AM
5453 }
5454 }
5455 }
5456
5457 if (sec == NULL)
5458 {
5459 Elf_Internal_Sym *sym;
5460
5461 if (symndx < symtab_hdr->sh_info)
5462 {
5463 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5464 if (sym == NULL)
5465 {
5466 size_t symcnt = symtab_hdr->sh_info;
5467 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5468 symcnt, 0,
5469 NULL, NULL, NULL);
5470 if (sym == NULL)
5471 break;
5472 symtab_hdr->contents = (bfd_byte *) sym;
5473 }
5474 sym += symndx;
128205bb
AM
5475 }
5476 else
5477 {
b53dfeb2
AM
5478 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5479 1, symndx,
5480 NULL, NULL, NULL);
128205bb
AM
5481 if (sym == NULL)
5482 break;
128205bb 5483 }
b53dfeb2
AM
5484 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5485 if (sec == NULL)
5486 break;
5487 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5488 val = sym->st_value;
8387904d 5489 }
b53dfeb2 5490
8387904d
AM
5491 val += look->r_addend;
5492 if (code_off != NULL)
5493 *code_off = val;
5494 if (code_sec != NULL)
aef36ac1
AM
5495 {
5496 if (in_code_sec && *code_sec != sec)
5497 return -1;
5498 else
5499 *code_sec = sec;
5500 }
b53dfeb2 5501 if (sec->output_section != NULL)
8387904d 5502 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5503 }
5504 break;
5505 }
5506 }
645ea6a9 5507
645ea6a9 5508 return val;
8387904d
AM
5509}
5510
aef36ac1
AM
5511/* If the ELF symbol SYM might be a function in SEC, return the
5512 function size and set *CODE_OFF to the function's entry point,
5513 otherwise return zero. */
9f296da3 5514
aef36ac1
AM
5515static bfd_size_type
5516ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5517 bfd_vma *code_off)
9f296da3 5518{
aef36ac1
AM
5519 bfd_size_type size;
5520
5521 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5522 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5523 return 0;
5524
5525 size = 0;
5526 if (!(sym->flags & BSF_SYNTHETIC))
5527 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5528
5529 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5530 {
b07bca4e
AM
5531 struct _opd_sec_data *opd = get_opd_info (sym->section);
5532 bfd_vma symval = sym->value;
5533
5534 if (opd != NULL
5535 && opd->adjust != NULL
5536 && elf_section_data (sym->section)->relocs != NULL)
5537 {
5538 /* opd_entry_value will use cached relocs that have been
5539 adjusted, but with raw symbols. That means both local
5540 and global symbols need adjusting. */
5541 long adjust = opd->adjust[OPD_NDX (symval)];
5542 if (adjust == -1)
5543 return 0;
5544 symval += adjust;
5545 }
5546
5547 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5548 &sec, code_off, TRUE) == (bfd_vma) -1)
5549 return 0;
5550 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5551 symbol. This size has nothing to do with the code size of the
5552 function, which is what we're supposed to return, but the
5553 code size isn't available without looking up the dot-sym.
5554 However, doing that would be a waste of time particularly
5555 since elf_find_function will look at the dot-sym anyway.
5556 Now, elf_find_function will keep the largest size of any
5557 function sym found at the code address of interest, so return
5558 1 here to avoid it incorrectly caching a larger function size
5559 for a small function. This does mean we return the wrong
5560 size for a new-ABI function of size 24, but all that does is
5561 disable caching for such functions. */
5562 if (size == 24)
5563 size = 1;
9f296da3 5564 }
aef36ac1
AM
5565 else
5566 {
5567 if (sym->section != sec)
5568 return 0;
5569 *code_off = sym->value;
5570 }
5571 if (size == 0)
5572 size = 1;
5573 return size;
9f296da3
AM
5574}
5575
f378ab09
AM
5576/* Return true if symbol is a strong function defined in an ELFv2
5577 object with st_other localentry bits of zero, ie. its local entry
5578 point coincides with its global entry point. */
5579
5580static bfd_boolean
5581is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5582{
5583 return (h != NULL
5584 && h->type == STT_FUNC
5585 && h->root.type == bfd_link_hash_defined
5586 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5587 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5588 && is_ppc64_elf (h->root.u.def.section->owner)
5589 && abiversion (h->root.u.def.section->owner) >= 2);
5590}
5591
854b41e7
AM
5592/* Return true if symbol is defined in a regular object file. */
5593
5594static bfd_boolean
5595is_static_defined (struct elf_link_hash_entry *h)
5596{
5597 return ((h->root.type == bfd_link_hash_defined
5598 || h->root.type == bfd_link_hash_defweak)
5599 && h->root.u.def.section != NULL
5600 && h->root.u.def.section->output_section != NULL);
5601}
5602
b31867b6
AM
5603/* If FDH is a function descriptor symbol, return the associated code
5604 entry symbol if it is defined. Return NULL otherwise. */
5605
5606static struct ppc_link_hash_entry *
5607defined_code_entry (struct ppc_link_hash_entry *fdh)
5608{
5609 if (fdh->is_func_descriptor)
5610 {
5611 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5612 if (fh->elf.root.type == bfd_link_hash_defined
5613 || fh->elf.root.type == bfd_link_hash_defweak)
5614 return fh;
5615 }
5616 return NULL;
5617}
5618
5619/* If FH is a function code entry symbol, return the associated
5620 function descriptor symbol if it is defined. Return NULL otherwise. */
5621
5622static struct ppc_link_hash_entry *
5623defined_func_desc (struct ppc_link_hash_entry *fh)
5624{
5625 if (fh->oh != NULL
5626 && fh->oh->is_func_descriptor)
5627 {
5628 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5629 if (fdh->elf.root.type == bfd_link_hash_defined
5630 || fdh->elf.root.type == bfd_link_hash_defweak)
5631 return fdh;
5632 }
5633 return NULL;
5634}
5635
ed7007c1
AM
5636/* Given H is a symbol that satisfies is_static_defined, return the
5637 value in the output file. */
5638
5639static bfd_vma
5640defined_sym_val (struct elf_link_hash_entry *h)
5641{
5642 return (h->root.u.def.section->output_section->vma
5643 + h->root.u.def.section->output_offset
5644 + h->root.u.def.value);
5645}
5646
5647/* Return true if H matches __tls_get_addr or one of its variants. */
5648
5649static bfd_boolean
5650is_tls_get_addr (struct elf_link_hash_entry *h,
5651 struct ppc_link_hash_table *htab)
5652{
9e51d549
AM
5653 return (h == (struct elf_link_hash_entry *) htab->tls_get_addr_fd
5654 || h == (struct elf_link_hash_entry *) htab->tga_desc_fd
5655 || h == (struct elf_link_hash_entry *) htab->tls_get_addr
5656 || h == (struct elf_link_hash_entry *) htab->tga_desc);
ed7007c1
AM
5657}
5658
8c5b4e52
AM
5659static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5660
5661/* Garbage collect sections, after first dealing with dot-symbols. */
5662
5663static bfd_boolean
5664ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5665{
5666 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5667
5668 if (htab != NULL && htab->need_func_desc_adj)
5669 {
5670 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5671 htab->need_func_desc_adj = 0;
5672 }
5673 return bfd_elf_gc_sections (abfd, info);
5674}
5675
74f0fb50
AM
5676/* Mark all our entry sym sections, both opd and code section. */
5677
5678static void
5679ppc64_elf_gc_keep (struct bfd_link_info *info)
5680{
5681 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5682 struct bfd_sym_chain *sym;
5683
4dfe6ac6
NC
5684 if (htab == NULL)
5685 return;
5686
74f0fb50
AM
5687 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5688 {
b31867b6 5689 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5690 asection *sec;
5691
ed7007c1
AM
5692 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5693 FALSE, FALSE, TRUE));
74f0fb50
AM
5694 if (eh == NULL)
5695 continue;
5696 if (eh->elf.root.type != bfd_link_hash_defined
5697 && eh->elf.root.type != bfd_link_hash_defweak)
5698 continue;
5699
b31867b6
AM
5700 fh = defined_code_entry (eh);
5701 if (fh != NULL)
74f0fb50 5702 {
b31867b6 5703 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5704 sec->flags |= SEC_KEEP;
5705 }
5706 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5707 && opd_entry_value (eh->elf.root.u.def.section,
5708 eh->elf.root.u.def.value,
aef36ac1 5709 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5710 sec->flags |= SEC_KEEP;
5711
5712 sec = eh->elf.root.u.def.section;
5713 sec->flags |= SEC_KEEP;
5714 }
5715}
5716
64d03ab5
AM
5717/* Mark sections containing dynamically referenced symbols. When
5718 building shared libraries, we must assume that any visible symbol is
5719 referenced. */
5720
5721static bfd_boolean
5722ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5723{
5724 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5725 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5726 struct ppc_link_hash_entry *fdh;
b407645f 5727 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5728
64d03ab5 5729 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5730 fdh = defined_func_desc (eh);
5731 if (fdh != NULL)
5732 eh = fdh;
64d03ab5
AM
5733
5734 if ((eh->elf.root.type == bfd_link_hash_defined
5735 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5736 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5737 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5738 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5739 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5740 && (!bfd_link_executable (info)
e278ae05 5741 || info->gc_keep_exported
b407645f
AM
5742 || info->export_dynamic
5743 || (eh->elf.dynamic
5744 && d != NULL
2cdcc330
AM
5745 && (*d->match) (&d->head, NULL,
5746 eh->elf.root.root.string)))
e278ae05 5747 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5748 || !bfd_hide_sym_by_version (info->version_info,
5749 eh->elf.root.root.string)))))
64d03ab5
AM
5750 {
5751 asection *code_sec;
b31867b6 5752 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5753
5754 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5755
5756 /* Function descriptor syms cause the associated
5757 function code sym section to be marked. */
b31867b6
AM
5758 fh = defined_code_entry (eh);
5759 if (fh != NULL)
5760 {
5761 code_sec = fh->elf.root.u.def.section;
5762 code_sec->flags |= SEC_KEEP;
5763 }
64d03ab5
AM
5764 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5765 && opd_entry_value (eh->elf.root.u.def.section,
5766 eh->elf.root.u.def.value,
aef36ac1 5767 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5768 code_sec->flags |= SEC_KEEP;
5769 }
5770
5771 return TRUE;
5772}
5773
5bd4f169
AM
5774/* Return the section that should be marked against GC for a given
5775 relocation. */
5776
5777static asection *
4ce794b7 5778ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5779 struct bfd_link_info *info,
4ce794b7
AM
5780 Elf_Internal_Rela *rel,
5781 struct elf_link_hash_entry *h,
5782 Elf_Internal_Sym *sym)
5bd4f169 5783{
ccfa59ea
AM
5784 asection *rsec;
5785
ccfa59ea
AM
5786 /* Syms return NULL if we're marking .opd, so we avoid marking all
5787 function sections, as all functions are referenced in .opd. */
5788 rsec = NULL;
5789 if (get_opd_info (sec) != NULL)
5790 return rsec;
1e2f5b6e 5791
5bd4f169
AM
5792 if (h != NULL)
5793 {
04c9666a 5794 enum elf_ppc64_reloc_type r_type;
b31867b6 5795 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5796
4ce794b7 5797 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5798 switch (r_type)
5bd4f169
AM
5799 {
5800 case R_PPC64_GNU_VTINHERIT:
5801 case R_PPC64_GNU_VTENTRY:
5802 break;
5803
5804 default:
5805 switch (h->root.type)
5806 {
5807 case bfd_link_hash_defined:
5808 case bfd_link_hash_defweak:
ed7007c1 5809 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5810 fdh = defined_func_desc (eh);
5811 if (fdh != NULL)
8c5b4e52
AM
5812 {
5813 /* -mcall-aixdesc code references the dot-symbol on
5814 a call reloc. Mark the function descriptor too
5815 against garbage collection. */
5816 fdh->elf.mark = 1;
60d67dc8
AM
5817 if (fdh->elf.is_weakalias)
5818 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5819 eh = fdh;
5820 }
1e2f5b6e
AM
5821
5822 /* Function descriptor syms cause the associated
5823 function code sym section to be marked. */
b31867b6
AM
5824 fh = defined_code_entry (eh);
5825 if (fh != NULL)
ccfa59ea
AM
5826 {
5827 /* They also mark their opd section. */
74f0fb50 5828 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5829
b31867b6 5830 rsec = fh->elf.root.u.def.section;
ccfa59ea 5831 }
8387904d
AM
5832 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5833 && opd_entry_value (eh->elf.root.u.def.section,
5834 eh->elf.root.u.def.value,
aef36ac1 5835 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5836 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5837 else
1e2f5b6e
AM
5838 rsec = h->root.u.def.section;
5839 break;
5bd4f169
AM
5840
5841 case bfd_link_hash_common:
1e2f5b6e
AM
5842 rsec = h->root.u.c.p->section;
5843 break;
5bd4f169
AM
5844
5845 default:
fb34365b 5846 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5847 }
5848 }
5849 }
5850 else
5851 {
74f0fb50 5852 struct _opd_sec_data *opd;
1e2f5b6e
AM
5853
5854 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5855 opd = get_opd_info (rsec);
5856 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5857 {
74f0fb50 5858 rsec->gc_mark = 1;
ccfa59ea 5859
51aecdc5 5860 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5861 }
5bd4f169
AM
5862 }
5863
1e2f5b6e 5864 return rsec;
5bd4f169
AM
5865}
5866
deb0e272
AM
5867/* The maximum size of .sfpr. */
5868#define SFPR_MAX (218*4)
5869
5870struct sfpr_def_parms
5871{
699733f6
AM
5872 const char name[12];
5873 unsigned char lo, hi;
2cdcc330
AM
5874 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5875 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5876};
5877
a4b6fadd
AM
5878/* Auto-generate _save*, _rest* functions in .sfpr.
5879 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5880 instead. */
deb0e272 5881
4dfe6ac6 5882static bfd_boolean
a4b6fadd
AM
5883sfpr_define (struct bfd_link_info *info,
5884 const struct sfpr_def_parms *parm,
5885 asection *stub_sec)
deb0e272
AM
5886{
5887 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5888 unsigned int i;
5889 size_t len = strlen (parm->name);
5890 bfd_boolean writing = FALSE;
699733f6 5891 char sym[16];
deb0e272 5892
4dfe6ac6
NC
5893 if (htab == NULL)
5894 return FALSE;
5895
deb0e272
AM
5896 memcpy (sym, parm->name, len);
5897 sym[len + 2] = 0;
5898
5899 for (i = parm->lo; i <= parm->hi; i++)
5900 {
a4b6fadd 5901 struct ppc_link_hash_entry *h;
deb0e272
AM
5902
5903 sym[len + 0] = i / 10 + '0';
5904 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5905 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5906 writing, TRUE, TRUE));
a4b6fadd 5907 if (stub_sec != NULL)
deb0e272 5908 {
a4b6fadd
AM
5909 if (h != NULL
5910 && h->elf.root.type == bfd_link_hash_defined
5911 && h->elf.root.u.def.section == htab->sfpr)
5912 {
5913 struct elf_link_hash_entry *s;
5914 char buf[32];
5915 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5916 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5917 if (s == NULL)
5918 return FALSE;
779f2ae7 5919 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5920 {
5921 s->root.type = bfd_link_hash_defined;
5922 s->root.u.def.section = stub_sec;
7dda8d3c 5923 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5924 + h->elf.root.u.def.value);
5925 s->ref_regular = 1;
5926 s->def_regular = 1;
5927 s->ref_regular_nonweak = 1;
5928 s->forced_local = 1;
5929 s->non_elf = 0;
5930 s->root.linker_def = 1;
5931 }
5932 }
5933 continue;
5934 }
5935 if (h != NULL)
5936 {
5937 h->save_res = 1;
5938 if (!h->elf.def_regular)
deb0e272 5939 {
a4b6fadd
AM
5940 h->elf.root.type = bfd_link_hash_defined;
5941 h->elf.root.u.def.section = htab->sfpr;
5942 h->elf.root.u.def.value = htab->sfpr->size;
5943 h->elf.type = STT_FUNC;
5944 h->elf.def_regular = 1;
b32547cd 5945 h->elf.non_elf = 0;
a4b6fadd
AM
5946 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5947 writing = TRUE;
deb0e272 5948 if (htab->sfpr->contents == NULL)
a4b6fadd 5949 {
2cdcc330
AM
5950 htab->sfpr->contents
5951 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5952 if (htab->sfpr->contents == NULL)
5953 return FALSE;
5954 }
deb0e272
AM
5955 }
5956 }
5957 if (writing)
5958 {
5959 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5960 if (i != parm->hi)
5961 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5962 else
5963 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5964 htab->sfpr->size = p - htab->sfpr->contents;
5965 }
5966 }
5967
5968 return TRUE;
5969}
5970
5971static bfd_byte *
5972savegpr0 (bfd *abfd, bfd_byte *p, int r)
5973{
5974 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5975 return p + 4;
5976}
5977
5978static bfd_byte *
5979savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5980{
5981 p = savegpr0 (abfd, p, r);
a078d95a 5982 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5983 p = p + 4;
5984 bfd_put_32 (abfd, BLR, p);
5985 return p + 4;
5986}
5987
5988static bfd_byte *
5989restgpr0 (bfd *abfd, bfd_byte *p, int r)
5990{
5991 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5992 return p + 4;
5993}
5994
5995static bfd_byte *
5996restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5997{
a078d95a 5998 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5999 p = p + 4;
6000 p = restgpr0 (abfd, p, r);
6001 bfd_put_32 (abfd, MTLR_R0, p);
6002 p = p + 4;
6003 if (r == 29)
6004 {
6005 p = restgpr0 (abfd, p, 30);
6006 p = restgpr0 (abfd, p, 31);
6007 }
6008 bfd_put_32 (abfd, BLR, p);
6009 return p + 4;
6010}
6011
6012static bfd_byte *
6013savegpr1 (bfd *abfd, bfd_byte *p, int r)
6014{
6015 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6016 return p + 4;
6017}
6018
6019static bfd_byte *
6020savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6021{
6022 p = savegpr1 (abfd, p, r);
6023 bfd_put_32 (abfd, BLR, p);
6024 return p + 4;
6025}
6026
6027static bfd_byte *
6028restgpr1 (bfd *abfd, bfd_byte *p, int r)
6029{
6030 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6031 return p + 4;
6032}
6033
6034static bfd_byte *
6035restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6036{
6037 p = restgpr1 (abfd, p, r);
6038 bfd_put_32 (abfd, BLR, p);
6039 return p + 4;
6040}
6041
6042static bfd_byte *
6043savefpr (bfd *abfd, bfd_byte *p, int r)
6044{
6045 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6046 return p + 4;
6047}
6048
6049static bfd_byte *
6050savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6051{
6052 p = savefpr (abfd, p, r);
a078d95a 6053 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6054 p = p + 4;
6055 bfd_put_32 (abfd, BLR, p);
6056 return p + 4;
6057}
6058
6059static bfd_byte *
6060restfpr (bfd *abfd, bfd_byte *p, int r)
6061{
6062 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6063 return p + 4;
6064}
6065
6066static bfd_byte *
6067restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6068{
a078d95a 6069 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6070 p = p + 4;
6071 p = restfpr (abfd, p, r);
6072 bfd_put_32 (abfd, MTLR_R0, p);
6073 p = p + 4;
6074 if (r == 29)
6075 {
6076 p = restfpr (abfd, p, 30);
6077 p = restfpr (abfd, p, 31);
6078 }
6079 bfd_put_32 (abfd, BLR, p);
6080 return p + 4;
6081}
6082
6083static bfd_byte *
6084savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6085{
6086 p = savefpr (abfd, p, r);
6087 bfd_put_32 (abfd, BLR, p);
6088 return p + 4;
6089}
6090
6091static bfd_byte *
6092restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6093{
6094 p = restfpr (abfd, p, r);
6095 bfd_put_32 (abfd, BLR, p);
6096 return p + 4;
6097}
6098
6099static bfd_byte *
6100savevr (bfd *abfd, bfd_byte *p, int r)
6101{
6102 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6103 p = p + 4;
6104 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6105 return p + 4;
6106}
6107
6108static bfd_byte *
6109savevr_tail (bfd *abfd, bfd_byte *p, int r)
6110{
6111 p = savevr (abfd, p, r);
6112 bfd_put_32 (abfd, BLR, p);
6113 return p + 4;
6114}
6115
6116static bfd_byte *
6117restvr (bfd *abfd, bfd_byte *p, int r)
6118{
6119 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6120 p = p + 4;
6121 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6122 return p + 4;
6123}
6124
6125static bfd_byte *
6126restvr_tail (bfd *abfd, bfd_byte *p, int r)
6127{
6128 p = restvr (abfd, p, r);
6129 bfd_put_32 (abfd, BLR, p);
6130 return p + 4;
6131}
6132
9e7028aa
AM
6133#define STDU_R1_0R1 0xf8210001
6134#define ADDI_R1_R1 0x38210000
6135
6136/* Emit prologue of wrapper preserving regs around a call to
6137 __tls_get_addr_opt. */
6138
6139static bfd_byte *
6140tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6141{
6142 unsigned int i;
6143
6144 bfd_put_32 (obfd, MFLR_R0, p);
6145 p += 4;
6146 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6147 p += 4;
6148
6149 if (htab->opd_abi)
6150 {
6151 for (i = 4; i < 12; i++)
6152 {
6153 bfd_put_32 (obfd,
6154 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6155 p += 4;
6156 }
6157 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6158 p += 4;
6159 }
6160 else
6161 {
6162 for (i = 4; i < 12; i++)
6163 {
6164 bfd_put_32 (obfd,
6165 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6166 p += 4;
6167 }
6168 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6169 p += 4;
6170 }
6171 return p;
6172}
6173
6174/* Emit epilogue of wrapper preserving regs around a call to
6175 __tls_get_addr_opt. */
6176
6177static bfd_byte *
6178tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6179{
6180 unsigned int i;
6181
6182 if (htab->opd_abi)
6183 {
6184 for (i = 4; i < 12; i++)
6185 {
6186 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6187 p += 4;
6188 }
6189 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6190 p += 4;
6191 }
6192 else
6193 {
6194 for (i = 4; i < 12; i++)
6195 {
6196 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6197 p += 4;
6198 }
6199 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6200 p += 4;
6201 }
6202 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6203 p += 4;
6204 bfd_put_32 (obfd, MTLR_R0, p);
6205 p += 4;
6206 bfd_put_32 (obfd, BLR, p);
6207 p += 4;
6208 return p;
6209}
6210
e86ce104
AM
6211/* Called via elf_link_hash_traverse to transfer dynamic linking
6212 information on function code symbol entries to their corresponding
6213 function descriptor symbol entries. */
deb0e272 6214
b34976b6 6215static bfd_boolean
4ce794b7 6216func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6217{
e86ce104 6218 struct bfd_link_info *info;
65f38f15 6219 struct ppc_link_hash_table *htab;
50bc7936
AM
6220 struct ppc_link_hash_entry *fh;
6221 struct ppc_link_hash_entry *fdh;
6222 bfd_boolean force_local;
5bd4f169 6223
ed7007c1 6224 fh = ppc_elf_hash_entry (h);
50bc7936 6225 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6226 return TRUE;
e86ce104 6227
8c5b4e52
AM
6228 if (!fh->is_func)
6229 return TRUE;
6230
6231 if (fh->elf.root.root.string[0] != '.'
6232 || fh->elf.root.root.string[1] == '\0')
6233 return TRUE;
6234
4ce794b7 6235 info = inf;
65f38f15 6236 htab = ppc_hash_table (info);
4dfe6ac6
NC
6237 if (htab == NULL)
6238 return FALSE;
5bd4f169 6239
8c5b4e52
AM
6240 /* Find the corresponding function descriptor symbol. */
6241 fdh = lookup_fdh (fh, htab);
6242
c09bdfe5
AM
6243 /* Resolve undefined references to dot-symbols as the value
6244 in the function descriptor, if we have one in a regular object.
6245 This is to satisfy cases like ".quad .foo". Calls to functions
6246 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6247 if ((fh->elf.root.type == bfd_link_hash_undefined
6248 || fh->elf.root.type == bfd_link_hash_undefweak)
6249 && (fdh->elf.root.type == bfd_link_hash_defined
6250 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6251 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6252 && opd_entry_value (fdh->elf.root.u.def.section,
6253 fdh->elf.root.u.def.value,
c09bdfe5 6254 &fh->elf.root.u.def.section,
aef36ac1 6255 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6256 {
b31867b6 6257 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6258 fh->elf.forced_local = 1;
b31867b6
AM
6259 fh->elf.def_regular = fdh->elf.def_regular;
6260 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6261 }
6262
8c5b4e52
AM
6263 if (!fh->elf.dynamic)
6264 {
6265 struct plt_entry *ent;
5bd4f169 6266
8c5b4e52
AM
6267 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6268 if (ent->plt.refcount > 0)
6269 break;
6270 if (ent == NULL)
6271 return TRUE;
6272 }
5bd4f169 6273
8c5b4e52 6274 /* Create a descriptor as undefined if necessary. */
50bc7936 6275 if (fdh == NULL
0e1862bb 6276 && !bfd_link_executable (info)
50bc7936
AM
6277 && (fh->elf.root.type == bfd_link_hash_undefined
6278 || fh->elf.root.type == bfd_link_hash_undefweak))
6279 {
908b32fc 6280 fdh = make_fdh (info, fh);
bb700d78
AM
6281 if (fdh == NULL)
6282 return FALSE;
50bc7936 6283 }
648cca2c 6284
8c5b4e52 6285 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6286 if (fdh != NULL
6287 && fdh->fake
8c5b4e52
AM
6288 && (fh->elf.root.type == bfd_link_hash_defined
6289 || fh->elf.root.type == bfd_link_hash_defweak))
6290 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6291
8c5b4e52
AM
6292 /* Transfer dynamic linking information to the function descriptor. */
6293 if (fdh != NULL)
6294 {
f5385ebf
AM
6295 fdh->elf.ref_regular |= fh->elf.ref_regular;
6296 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6297 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6298 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6299 fdh->elf.dynamic |= fh->elf.dynamic;
6300 fdh->elf.needs_plt |= (fh->elf.needs_plt
6301 || fh->elf.type == STT_FUNC
6302 || fh->elf.type == STT_GNU_IFUNC);
6303 move_plt_plist (fh, fdh);
6304
6305 if (!fdh->elf.forced_local
6306 && fh->elf.dynindx != -1)
6307 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6308 return FALSE;
e86ce104
AM
6309 }
6310
50bc7936
AM
6311 /* Now that the info is on the function descriptor, clear the
6312 function code sym info. Any function code syms for which we
6313 don't have a definition in a regular file, we force local.
6314 This prevents a shared library from exporting syms that have
6315 been imported from another library. Function code syms that
6316 are really in the library we must leave global to prevent the
6317 linker dragging in a definition from a static library. */
93f3fa99
AM
6318 force_local = (!fh->elf.def_regular
6319 || fdh == NULL
6320 || !fdh->elf.def_regular
6321 || fdh->elf.forced_local);
50bc7936
AM
6322 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6323
b34976b6 6324 return TRUE;
e86ce104 6325}
40b8271b 6326
a4b6fadd
AM
6327static const struct sfpr_def_parms save_res_funcs[] =
6328 {
6329 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6330 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6331 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6332 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6333 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6334 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6335 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6336 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6337 { "._savef", 14, 31, savefpr, savefpr1_tail },
6338 { "._restf", 14, 31, restfpr, restfpr1_tail },
6339 { "_savevr_", 20, 31, savevr, savevr_tail },
6340 { "_restvr_", 20, 31, restvr, restvr_tail }
6341 };
6342
e86ce104 6343/* Called near the start of bfd_elf_size_dynamic_sections. We use
c9405344
AM
6344 this hook to a) run the edit functions in this file, b) provide
6345 some gcc support functions, and c) transfer dynamic linking
6346 information gathered so far on function code symbol entries, to
6347 their corresponding function descriptor symbol entries. */
deb0e272 6348
b34976b6 6349static bfd_boolean
c9405344 6350ppc64_elf_edit (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
e86ce104
AM
6351{
6352 struct ppc_link_hash_table *htab;
6353
6354 htab = ppc_hash_table (info);
4dfe6ac6
NC
6355 if (htab == NULL)
6356 return FALSE;
6357
c9405344
AM
6358 /* Call back into the linker, which then runs the edit functions. */
6359 htab->params->edit ();
6360
b32547cd
AM
6361 /* Provide any missing _save* and _rest* functions. */
6362 if (htab->sfpr != NULL)
6363 {
6364 unsigned int i;
6365
6366 htab->sfpr->size = 0;
6367 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6368 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6369 return FALSE;
6370 if (htab->sfpr->size == 0)
6371 htab->sfpr->flags |= SEC_EXCLUDE;
6372 }
6373
6374 if (bfd_link_relocatable (info))
6375 return TRUE;
6376
6377 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6378 {
6379 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6380 /* Make .TOC. defined so as to prevent it being made dynamic.
6381 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6382 if (!htab->elf.hgot->def_regular
6383 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6384 {
6385 htab->elf.hgot->root.type = bfd_link_hash_defined;
6386 htab->elf.hgot->root.u.def.value = 0;
6387 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6388 htab->elf.hgot->def_regular = 1;
6389 htab->elf.hgot->root.linker_def = 1;
6390 }
dba6fa9b 6391 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6392 htab->elf.hgot->other
6393 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6394 }
c66bb0ee 6395
8c5b4e52
AM
6396 if (htab->need_func_desc_adj)
6397 {
6398 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6399 htab->need_func_desc_adj = 0;
6400 }
805fc799 6401
b34976b6 6402 return TRUE;
e86ce104
AM
6403}
6404
d311bc8b 6405/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6406 aliases, that apply to read-only sections. Cannot be used after
6407 size_dynamic_sections. */
d311bc8b
AM
6408
6409static bfd_boolean
6410alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6411{
ed7007c1 6412 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6413 do
6414 {
5dbc8b37 6415 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
d311bc8b 6416 return TRUE;
ed7007c1 6417 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6418 }
6419 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6420
6421 return FALSE;
6422}
8a2058b5 6423
8a9e8e72
AM
6424/* Return whether EH has pc-relative dynamic relocs. */
6425
6426static bfd_boolean
6427pc_dynrelocs (struct ppc_link_hash_entry *eh)
6428{
6429 struct elf_dyn_relocs *p;
6430
190eb1dd 6431 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
8a9e8e72
AM
6432 if (p->pc_count != 0)
6433 return TRUE;
6434 return FALSE;
6435}
6436
8a2058b5
AM
6437/* Return true if a global entry stub will be created for H. Valid
6438 for ELFv2 before plt entries have been allocated. */
6439
6440static bfd_boolean
6441global_entry_stub (struct elf_link_hash_entry *h)
6442{
6443 struct plt_entry *pent;
6444
6445 if (!h->pointer_equality_needed
6446 || h->def_regular)
6447 return FALSE;
6448
6449 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6450 if (pent->plt.refcount > 0
6451 && pent->addend == 0)
6452 return TRUE;
6453
6454 return FALSE;
6455}
6456
e86ce104
AM
6457/* Adjust a symbol defined by a dynamic object and referenced by a
6458 regular object. The current definition is in some section of the
6459 dynamic object, but we're not including those sections. We have to
6460 change the definition to something the rest of the link can
6461 understand. */
6462
b34976b6 6463static bfd_boolean
4ce794b7
AM
6464ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6465 struct elf_link_hash_entry *h)
e86ce104
AM
6466{
6467 struct ppc_link_hash_table *htab;
5474d94f 6468 asection *s, *srel;
e86ce104
AM
6469
6470 htab = ppc_hash_table (info);
4dfe6ac6
NC
6471 if (htab == NULL)
6472 return FALSE;
e86ce104
AM
6473
6474 /* Deal with function syms. */
6475 if (h->type == STT_FUNC
e054468f 6476 || h->type == STT_GNU_IFUNC
f5385ebf 6477 || h->needs_plt)
e86ce104 6478 {
ed7007c1 6479 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6480 || SYMBOL_CALLS_LOCAL (info, h)
6481 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6482 /* Discard dyn_relocs when non-pic if we've decided that a
6483 function symbol is local and not an ifunc. We keep dynamic
6484 relocs for ifuncs when local rather than always emitting a
6485 plt call stub for them and defining the symbol on the call
6486 stub. We can't do that for ELFv1 anyway (a function symbol
6487 is defined on a descriptor, not code) and it can be faster at
6488 run-time due to not needing to bounce through a stub. The
6489 dyn_relocs for ifuncs will be applied even in a static
6490 executable. */
6491 if (!bfd_link_pic (info)
6492 && h->type != STT_GNU_IFUNC
6493 && local)
190eb1dd 6494 h->dyn_relocs = NULL;
529fe20e 6495
e86ce104
AM
6496 /* Clear procedure linkage table information for any symbol that
6497 won't need a .plt entry. */
411e1bfb
AM
6498 struct plt_entry *ent;
6499 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6500 if (ent->plt.refcount > 0)
6501 break;
8387904d 6502 if (ent == NULL
2d7ad24e
AM
6503 || (h->type != STT_GNU_IFUNC
6504 && local
3e04d765 6505 && (htab->can_convert_all_inline_plt
ed7007c1 6506 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6507 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6508 {
411e1bfb 6509 h->plt.plist = NULL;
f5385ebf 6510 h->needs_plt = 0;
d1eca1e4 6511 h->pointer_equality_needed = 0;
40b8271b 6512 }
8a2058b5 6513 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6514 {
d1eca1e4
AM
6515 /* Taking a function's address in a read/write section
6516 doesn't require us to define the function symbol in the
6517 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6518 be used instead. The reason we prefer a few more dynamic
6519 relocs is that calling via a global entry stub costs a
6520 few more instructions, and pointer_equality_needed causes
6521 extra work in ld.so when resolving these symbols. */
529fe20e 6522 if (global_entry_stub (h))
d1eca1e4 6523 {
5dbc8b37 6524 if (!_bfd_elf_readonly_dynrelocs (h))
529fe20e
AM
6525 {
6526 h->pointer_equality_needed = 0;
04383fd1
AM
6527 /* If we haven't seen a branch reloc and the symbol
6528 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6529 if (!h->needs_plt)
6530 h->plt.plist = NULL;
6531 }
6532 else if (!bfd_link_pic (info))
6533 /* We are going to be defining the function symbol on the
6534 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 6535 h->dyn_relocs = NULL;
d1eca1e4
AM
6536 }
6537
3988aed5
AM
6538 /* ELFv2 function symbols can't have copy relocs. */
6539 return TRUE;
6540 }
6541 else if (!h->needs_plt
5dbc8b37 6542 && !_bfd_elf_readonly_dynrelocs (h))
3988aed5 6543 {
04383fd1
AM
6544 /* If we haven't seen a branch reloc and the symbol isn't an
6545 ifunc then we don't need a plt entry. */
3988aed5
AM
6546 h->plt.plist = NULL;
6547 h->pointer_equality_needed = 0;
a345bc8d
AM
6548 return TRUE;
6549 }
5bd4f169 6550 }
bbd7ec4a 6551 else
411e1bfb 6552 h->plt.plist = NULL;
5bd4f169
AM
6553
6554 /* If this is a weak symbol, and there is a real definition, the
6555 processor independent code will have arranged for us to see the
6556 real definition first, and we can just use the same value. */
60d67dc8 6557 if (h->is_weakalias)
5bd4f169 6558 {
60d67dc8
AM
6559 struct elf_link_hash_entry *def = weakdef (h);
6560 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6561 h->root.u.def.section = def->root.u.def.section;
6562 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6563 if (def->root.u.def.section == htab->elf.sdynbss
6564 || def->root.u.def.section == htab->elf.sdynrelro)
190eb1dd 6565 h->dyn_relocs = NULL;
b34976b6 6566 return TRUE;
5bd4f169
AM
6567 }
6568
5bd4f169
AM
6569 /* If we are creating a shared library, we must presume that the
6570 only references to the symbol are via the global offset table.
6571 For such cases we need not do anything here; the relocations will
6572 be handled correctly by relocate_section. */
ec73ddcd 6573 if (!bfd_link_executable (info))
b34976b6 6574 return TRUE;
5bd4f169 6575
65f38f15
AM
6576 /* If there are no references to this symbol that do not use the
6577 GOT, we don't need to generate a copy reloc. */
f5385ebf 6578 if (!h->non_got_ref)
b34976b6 6579 return TRUE;
65f38f15 6580
b186458a 6581 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6582 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6583
d93d1c80
AM
6584 /* If -z nocopyreloc was given, don't generate them either. */
6585 || info->nocopyreloc
a127494f 6586
dce2246a 6587 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6588 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6589 || (ELIMINATE_COPY_RELOCS
6590 && !h->needs_copy
6591 && !alias_readonly_dynrelocs (h))
65f38f15 6592
d93d1c80
AM
6593 /* Protected variables do not work with .dynbss. The copy in
6594 .dynbss won't be used by the shared library with the protected
6595 definition for the variable. Text relocations are preferable
6596 to an incorrect program. */
6597 || h->protected_def)
529fe20e 6598 return TRUE;
a127494f 6599
e1c6cf61
AM
6600 if (h->type == STT_FUNC
6601 || h->type == STT_GNU_IFUNC)
97b639ba 6602 {
e1c6cf61
AM
6603 /* .dynbss copies of function symbols only work if we have
6604 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6605 use dot-symbols and set the function symbol size to the text
6606 size of the function rather than the size of the descriptor.
6607 That's wrong for copying a descriptor. */
ed7007c1 6608 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6609 || !(h->size == 24 || h->size == 16))
6610 return TRUE;
6611
6612 /* We should never get here, but unfortunately there are old
6613 versions of gcc (circa gcc-3.2) that improperly for the
6614 ELFv1 ABI put initialized function pointers, vtable refs and
6615 suchlike in read-only sections. Allow them to proceed, but
6616 warn that this might break at runtime. */
25f53a85 6617 info->callbacks->einfo
c1c8c1ef 6618 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6619 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6620 h->root.root.string);
6621 }
5d35169e
AM
6622
6623 /* This is a reference to a symbol defined by a dynamic object which
6624 is not a function. */
6625
5bd4f169
AM
6626 /* We must allocate the symbol in our .dynbss section, which will
6627 become part of the .bss section of the executable. There will be
6628 an entry for this symbol in the .dynsym section. The dynamic
6629 object will contain position independent code, so all references
6630 from the dynamic object to this symbol will go through the global
6631 offset table. The dynamic linker will use the .dynsym entry to
6632 determine the address it must put in the global offset table, so
6633 both the dynamic object and the regular object will refer to the
6634 same memory location for the variable. */
5474d94f
AM
6635 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6636 {
6637 s = htab->elf.sdynrelro;
6638 srel = htab->elf.sreldynrelro;
6639 }
6640 else
6641 {
6642 s = htab->elf.sdynbss;
6643 srel = htab->elf.srelbss;
6644 }
1d7e9d18 6645 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6646 {
4a7e5234
AM
6647 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6648 linker to copy the initial value out of the dynamic object
6649 and into the runtime process image. */
5474d94f 6650 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6651 h->needs_copy = 1;
5bd4f169
AM
6652 }
6653
529fe20e 6654 /* We no longer want dyn_relocs. */
190eb1dd 6655 h->dyn_relocs = NULL;
6cabe1ea 6656 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6657}
6658
e86ce104
AM
6659/* If given a function descriptor symbol, hide both the function code
6660 sym and the descriptor. */
6661static void
4ce794b7
AM
6662ppc64_elf_hide_symbol (struct bfd_link_info *info,
6663 struct elf_link_hash_entry *h,
6664 bfd_boolean force_local)
e86ce104 6665{
34814b9f 6666 struct ppc_link_hash_entry *eh;
e86ce104
AM
6667 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6668
87469ba2
AM
6669 if (ppc_hash_table (info) == NULL)
6670 return;
6671
ed7007c1 6672 eh = ppc_elf_hash_entry (h);
34814b9f 6673 if (eh->is_func_descriptor)
e86ce104 6674 {
34814b9f 6675 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6676
721956f4 6677 if (fh == NULL)
d1329ca3
AM
6678 {
6679 const char *p, *q;
b8ac2841 6680 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6681 char save;
6682
6683 /* We aren't supposed to use alloca in BFD because on
6684 systems which do not have alloca the version in libiberty
6685 calls xmalloc, which might cause the program to crash
6686 when it runs out of memory. This function doesn't have a
6687 return status, so there's no way to gracefully return an
6688 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6689 accessed; It's either a string in an ELF string table,
6690 or allocated in an objalloc structure. */
d1329ca3 6691
34814b9f 6692 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6693 save = *p;
6694 *(char *) p = '.';
ed7007c1
AM
6695 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6696 FALSE, FALSE));
d1329ca3
AM
6697 *(char *) p = save;
6698
6699 /* Unfortunately, if it so happens that the string we were
6700 looking for was allocated immediately before this string,
6701 then we overwrote the string terminator. That's the only
6702 reason the lookup should fail. */
6703 if (fh == NULL)
6704 {
34814b9f
AM
6705 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6706 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6707 --q, --p;
34814b9f 6708 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6709 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6710 FALSE, FALSE));
d1329ca3
AM
6711 }
6712 if (fh != NULL)
6713 {
34814b9f
AM
6714 eh->oh = fh;
6715 fh->oh = eh;
d1329ca3
AM
6716 }
6717 }
e86ce104 6718 if (fh != NULL)
34814b9f 6719 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6720 }
6721}
6722
411e1bfb 6723static bfd_boolean
8843416a
AM
6724get_sym_h (struct elf_link_hash_entry **hp,
6725 Elf_Internal_Sym **symp,
6726 asection **symsecp,
f961d9dd 6727 unsigned char **tls_maskp,
8843416a
AM
6728 Elf_Internal_Sym **locsymsp,
6729 unsigned long r_symndx,
6730 bfd *ibfd)
411e1bfb 6731{
0ffa91dd 6732 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6733
6734 if (r_symndx >= symtab_hdr->sh_info)
6735 {
6736 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6737 struct elf_link_hash_entry *h;
6738
6739 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6740 h = elf_follow_link (h);
411e1bfb
AM
6741
6742 if (hp != NULL)
6743 *hp = h;
6744
6745 if (symp != NULL)
6746 *symp = NULL;
6747
6748 if (symsecp != NULL)
6749 {
6750 asection *symsec = NULL;
6751 if (h->root.type == bfd_link_hash_defined
6752 || h->root.type == bfd_link_hash_defweak)
6753 symsec = h->root.u.def.section;
6754 *symsecp = symsec;
6755 }
6756
e7b938ca 6757 if (tls_maskp != NULL)
ed7007c1 6758 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6759 }
6760 else
6761 {
6762 Elf_Internal_Sym *sym;
6763 Elf_Internal_Sym *locsyms = *locsymsp;
6764
6765 if (locsyms == NULL)
6766 {
6767 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6768 if (locsyms == NULL)
6769 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6770 symtab_hdr->sh_info,
6771 0, NULL, NULL, NULL);
6772 if (locsyms == NULL)
6773 return FALSE;
6774 *locsymsp = locsyms;
6775 }
6776 sym = locsyms + r_symndx;
6777
6778 if (hp != NULL)
6779 *hp = NULL;
6780
6781 if (symp != NULL)
6782 *symp = sym;
6783
6784 if (symsecp != NULL)
cb33740c 6785 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6786
e7b938ca 6787 if (tls_maskp != NULL)
411e1bfb
AM
6788 {
6789 struct got_entry **lgot_ents;
f961d9dd 6790 unsigned char *tls_mask;
411e1bfb 6791
e7b938ca 6792 tls_mask = NULL;
411e1bfb
AM
6793 lgot_ents = elf_local_got_ents (ibfd);
6794 if (lgot_ents != NULL)
6795 {
e054468f
AM
6796 struct plt_entry **local_plt = (struct plt_entry **)
6797 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6798 unsigned char *lgot_masks = (unsigned char *)
e054468f 6799 (local_plt + symtab_hdr->sh_info);
e7b938ca 6800 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6801 }
e7b938ca 6802 *tls_maskp = tls_mask;
411e1bfb
AM
6803 }
6804 }
6805 return TRUE;
6806}
6807
e7b938ca 6808/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6809 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6810 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6811
6812static int
f961d9dd 6813get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6814 unsigned long *toc_symndx,
6815 bfd_vma *toc_addend,
0d4792f7 6816 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6817 const Elf_Internal_Rela *rel,
6818 bfd *ibfd)
411e1bfb
AM
6819{
6820 unsigned long r_symndx;
0d4792f7 6821 int next_r;
411e1bfb
AM
6822 struct elf_link_hash_entry *h;
6823 Elf_Internal_Sym *sym;
6824 asection *sec;
6825 bfd_vma off;
6826
6827 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6828 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6829 return 0;
411e1bfb 6830
37da22e5
AM
6831 if ((*tls_maskp != NULL
6832 && (**tls_maskp & TLS_TLS) != 0
6833 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6834 || sec == NULL
6bee8834 6835 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6836 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6837 return 1;
411e1bfb
AM
6838
6839 /* Look inside a TOC section too. */
6840 if (h != NULL)
6841 {
6842 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6843 off = h->root.u.def.value;
6844 }
6845 else
6846 off = sym->st_value;
6847 off += rel->r_addend;
6848 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6849 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6850 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6851 if (toc_symndx != NULL)
6852 *toc_symndx = r_symndx;
3a71aa26
AM
6853 if (toc_addend != NULL)
6854 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6855 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6856 return 0;
854b41e7 6857 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6858 && (next_r == -1 || next_r == -2))
6859 return 1 - next_r;
951fd09b 6860 return 1;
411e1bfb
AM
6861}
6862
3b421ab3
AM
6863/* Find (or create) an entry in the tocsave hash table. */
6864
6865static struct tocsave_entry *
6866tocsave_find (struct ppc_link_hash_table *htab,
6867 enum insert_option insert,
6868 Elf_Internal_Sym **local_syms,
6869 const Elf_Internal_Rela *irela,
6870 bfd *ibfd)
6871{
6872 unsigned long r_indx;
6873 struct elf_link_hash_entry *h;
6874 Elf_Internal_Sym *sym;
6875 struct tocsave_entry ent, *p;
6876 hashval_t hash;
6877 struct tocsave_entry **slot;
6878
6879 r_indx = ELF64_R_SYM (irela->r_info);
6880 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6881 return NULL;
6882 if (ent.sec == NULL || ent.sec->output_section == NULL)
6883 {
4eca0228 6884 _bfd_error_handler
871b3ab2 6885 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6886 return NULL;
6887 }
6888
6889 if (h != NULL)
6890 ent.offset = h->root.u.def.value;
6891 else
6892 ent.offset = sym->st_value;
6893 ent.offset += irela->r_addend;
6894
6895 hash = tocsave_htab_hash (&ent);
6896 slot = ((struct tocsave_entry **)
6897 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6898 if (slot == NULL)
6899 return NULL;
6900
6901 if (*slot == NULL)
6902 {
6903 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6904 if (p == NULL)
6905 return NULL;
6906 *p = ent;
6907 *slot = p;
6908 }
6909 return *slot;
6910}
6911
754021d0 6912/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6913 code for the old ABI, these will already have been done. */
754021d0
AM
6914
6915static bfd_boolean
6916adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6917{
6918 struct ppc_link_hash_entry *eh;
6919 asection *sym_sec;
74f0fb50 6920 struct _opd_sec_data *opd;
754021d0
AM
6921
6922 if (h->root.type == bfd_link_hash_indirect)
6923 return TRUE;
6924
754021d0
AM
6925 if (h->root.type != bfd_link_hash_defined
6926 && h->root.type != bfd_link_hash_defweak)
6927 return TRUE;
6928
ed7007c1 6929 eh = ppc_elf_hash_entry (h);
754021d0
AM
6930 if (eh->adjust_done)
6931 return TRUE;
6932
6933 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6934 opd = get_opd_info (sym_sec);
6935 if (opd != NULL && opd->adjust != NULL)
754021d0 6936 {
51aecdc5 6937 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6938 if (adjust == -1)
6939 {
6940 /* This entry has been deleted. */
b3fac117 6941 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6942 if (dsec == NULL)
6943 {
6944 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6945 if (discarded_section (dsec))
81688140 6946 {
b3fac117 6947 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6948 break;
6949 }
6950 }
4025353c 6951 eh->elf.root.u.def.value = 0;
81688140 6952 eh->elf.root.u.def.section = dsec;
4025353c
AM
6953 }
6954 else
6955 eh->elf.root.u.def.value += adjust;
754021d0
AM
6956 eh->adjust_done = 1;
6957 }
6958 return TRUE;
6959}
6960
8c1d1bb8 6961/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6962 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6963 have already been determined. */
6964
6965static bfd_boolean
6966dec_dynrel_count (bfd_vma r_info,
6967 asection *sec,
6968 struct bfd_link_info *info,
6969 Elf_Internal_Sym **local_syms,
6970 struct elf_link_hash_entry *h,
19e08130 6971 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6972{
6973 enum elf_ppc64_reloc_type r_type;
19e08130 6974 asection *sym_sec = NULL;
8c1d1bb8
AM
6975
6976 /* Can this reloc be dynamic? This switch, and later tests here
6977 should be kept in sync with the code in check_relocs. */
6978 r_type = ELF64_R_TYPE (r_info);
6979 switch (r_type)
6980 {
6981 default:
6982 return TRUE;
6983
1bdd8fac
AM
6984 case R_PPC64_TOC16:
6985 case R_PPC64_TOC16_DS:
6986 case R_PPC64_TOC16_LO:
6987 case R_PPC64_TOC16_HI:
6988 case R_PPC64_TOC16_HA:
6989 case R_PPC64_TOC16_LO_DS:
6990 if (h == NULL)
6991 return TRUE;
6992 break;
6993
8c1d1bb8
AM
6994 case R_PPC64_TPREL16:
6995 case R_PPC64_TPREL16_LO:
6996 case R_PPC64_TPREL16_HI:
6997 case R_PPC64_TPREL16_HA:
6998 case R_PPC64_TPREL16_DS:
6999 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
7000 case R_PPC64_TPREL16_HIGH:
7001 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
7002 case R_PPC64_TPREL16_HIGHER:
7003 case R_PPC64_TPREL16_HIGHERA:
7004 case R_PPC64_TPREL16_HIGHEST:
7005 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 7006 case R_PPC64_TPREL64:
c213164a 7007 case R_PPC64_TPREL34:
8c1d1bb8
AM
7008 case R_PPC64_DTPMOD64:
7009 case R_PPC64_DTPREL64:
7010 case R_PPC64_ADDR64:
7011 case R_PPC64_REL30:
7012 case R_PPC64_REL32:
7013 case R_PPC64_REL64:
7014 case R_PPC64_ADDR14:
7015 case R_PPC64_ADDR14_BRNTAKEN:
7016 case R_PPC64_ADDR14_BRTAKEN:
7017 case R_PPC64_ADDR16:
7018 case R_PPC64_ADDR16_DS:
7019 case R_PPC64_ADDR16_HA:
7020 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7021 case R_PPC64_ADDR16_HIGH:
7022 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7023 case R_PPC64_ADDR16_HIGHER:
7024 case R_PPC64_ADDR16_HIGHERA:
7025 case R_PPC64_ADDR16_HIGHEST:
7026 case R_PPC64_ADDR16_HIGHESTA:
7027 case R_PPC64_ADDR16_LO:
7028 case R_PPC64_ADDR16_LO_DS:
7029 case R_PPC64_ADDR24:
7030 case R_PPC64_ADDR32:
7031 case R_PPC64_UADDR16:
7032 case R_PPC64_UADDR32:
7033 case R_PPC64_UADDR64:
7034 case R_PPC64_TOC:
5663e321
AM
7035 case R_PPC64_D34:
7036 case R_PPC64_D34_LO:
7037 case R_PPC64_D34_HI30:
7038 case R_PPC64_D34_HA30:
7039 case R_PPC64_ADDR16_HIGHER34:
7040 case R_PPC64_ADDR16_HIGHERA34:
7041 case R_PPC64_ADDR16_HIGHEST34:
7042 case R_PPC64_ADDR16_HIGHESTA34:
7043 case R_PPC64_D28:
8c1d1bb8
AM
7044 break;
7045 }
7046
7047 if (local_syms != NULL)
7048 {
7049 unsigned long r_symndx;
8c1d1bb8
AM
7050 bfd *ibfd = sec->owner;
7051
7052 r_symndx = ELF64_R_SYM (r_info);
7053 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7054 return FALSE;
7055 }
7056
ec73ddcd
AM
7057 if ((h != NULL
7058 && (h->root.type == bfd_link_hash_defweak
7059 || !h->def_regular))
7060 || (h != NULL
7061 && !bfd_link_executable (info)
7062 && !SYMBOLIC_BIND (info, h))
7063 || (bfd_link_pic (info)
7064 && must_be_dyn_reloc (info, r_type))
7065 || (!bfd_link_pic (info)
7066 && (h != NULL
7067 ? h->type == STT_GNU_IFUNC
7068 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7069 ;
7070 else
7071 return TRUE;
7072
7073 if (h != NULL)
6edfbbad 7074 {
19e08130
AM
7075 struct elf_dyn_relocs *p;
7076 struct elf_dyn_relocs **pp;
190eb1dd 7077 pp = &h->dyn_relocs;
19e08130
AM
7078
7079 /* elf_gc_sweep may have already removed all dyn relocs associated
7080 with local syms for a given section. Also, symbol flags are
7081 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7082 report a dynreloc miscount. */
7083 if (*pp == NULL && info->gc_sections)
7084 return TRUE;
7085
7086 while ((p = *pp) != NULL)
60124e18 7087 {
19e08130
AM
7088 if (p->sec == sec)
7089 {
7090 if (!must_be_dyn_reloc (info, r_type))
7091 p->pc_count -= 1;
7092 p->count -= 1;
7093 if (p->count == 0)
7094 *pp = p->next;
7095 return TRUE;
7096 }
7097 pp = &p->next;
60124e18 7098 }
6edfbbad 7099 }
19e08130
AM
7100 else
7101 {
7102 struct ppc_dyn_relocs *p;
7103 struct ppc_dyn_relocs **pp;
7104 void *vpp;
7105 bfd_boolean is_ifunc;
8c1d1bb8 7106
19e08130
AM
7107 if (local_syms == NULL)
7108 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7109 if (sym_sec == NULL)
7110 sym_sec = sec;
c57da1a7 7111
19e08130
AM
7112 vpp = &elf_section_data (sym_sec)->local_dynrel;
7113 pp = (struct ppc_dyn_relocs **) vpp;
7114
7115 if (*pp == NULL && info->gc_sections)
7116 return TRUE;
7117
7118 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7119 while ((p = *pp) != NULL)
8c1d1bb8 7120 {
19e08130
AM
7121 if (p->sec == sec && p->ifunc == is_ifunc)
7122 {
7123 p->count -= 1;
7124 if (p->count == 0)
7125 *pp = p->next;
7126 return TRUE;
7127 }
7128 pp = &p->next;
8c1d1bb8 7129 }
8c1d1bb8
AM
7130 }
7131
695344c0 7132 /* xgettext:c-format */
cf97bcb0
AM
7133 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7134 sec->owner, sec);
8c1d1bb8
AM
7135 bfd_set_error (bfd_error_bad_value);
7136 return FALSE;
7137}
7138
754021d0
AM
7139/* Remove unused Official Procedure Descriptor entries. Currently we
7140 only remove those associated with functions in discarded link-once
7141 sections, or weakly defined functions that have been overridden. It
7142 would be possible to remove many more entries for statically linked
7143 applications. */
7144
b34976b6 7145bfd_boolean
e7d1c40c 7146ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7147{
7148 bfd *ibfd;
754021d0 7149 bfd_boolean some_edited = FALSE;
3f764659 7150 asection *need_pad = NULL;
e7d1c40c
AM
7151 struct ppc_link_hash_table *htab;
7152
7153 htab = ppc_hash_table (info);
7154 if (htab == NULL)
7155 return FALSE;
1e2f5b6e 7156
c72f2fb2 7157 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7158 {
7159 asection *sec;
7160 Elf_Internal_Rela *relstart, *rel, *relend;
7161 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7162 Elf_Internal_Sym *local_syms;
74f0fb50 7163 struct _opd_sec_data *opd;
51aecdc5 7164 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7165 bfd_size_type cnt_16b = 0;
1e2f5b6e 7166
854b41e7
AM
7167 if (!is_ppc64_elf (ibfd))
7168 continue;
7169
1e2f5b6e 7170 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7171 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7172 continue;
7173
dbaa2011 7174 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7175 continue;
7176
1e2f5b6e
AM
7177 if (sec->output_section == bfd_abs_section_ptr)
7178 continue;
7179
7180 /* Look through the section relocs. */
7181 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7182 continue;
7183
6cdc0ccc 7184 local_syms = NULL;
0ffa91dd 7185 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7186
7187 /* Read the relocations. */
4ce794b7 7188 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7189 info->keep_memory);
1e2f5b6e 7190 if (relstart == NULL)
b34976b6 7191 return FALSE;
1e2f5b6e
AM
7192
7193 /* First run through the relocs to check they are sane, and to
7194 determine whether we need to edit this opd section. */
b34976b6 7195 need_edit = FALSE;
51aecdc5 7196 broken = FALSE;
3f764659 7197 need_pad = sec;
1e2f5b6e 7198 relend = relstart + sec->reloc_count;
50bc7936 7199 for (rel = relstart; rel < relend; )
1e2f5b6e 7200 {
04c9666a 7201 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7202 unsigned long r_symndx;
7203 asection *sym_sec;
7204 struct elf_link_hash_entry *h;
7205 Elf_Internal_Sym *sym;
51aecdc5 7206 bfd_vma offset;
1e2f5b6e 7207
51aecdc5 7208 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7209 only interested in the reloc pointing to a function entry
7210 point. */
51aecdc5
AM
7211 offset = rel->r_offset;
7212 if (rel + 1 == relend
7213 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7214 {
7215 /* If someone messes with .opd alignment then after a
7216 "ld -r" we might have padding in the middle of .opd.
7217 Also, there's nothing to prevent someone putting
7218 something silly in .opd with the assembler. No .opd
b34976b6 7219 optimization for them! */
3f764659 7220 broken_opd:
4eca0228 7221 _bfd_error_handler
871b3ab2 7222 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7223 broken = TRUE;
1e2f5b6e
AM
7224 break;
7225 }
7226
50bc7936
AM
7227 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7228 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7229 {
4eca0228 7230 _bfd_error_handler
695344c0 7231 /* xgettext:c-format */
871b3ab2 7232 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7233 ibfd, r_type);
51aecdc5 7234 broken = TRUE;
50bc7936
AM
7235 break;
7236 }
7237
1e2f5b6e 7238 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7239 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7240 r_symndx, ibfd))
50bc7936 7241 goto error_ret;
1e2f5b6e
AM
7242
7243 if (sym_sec == NULL || sym_sec->owner == NULL)
7244 {
411e1bfb
AM
7245 const char *sym_name;
7246 if (h != NULL)
7247 sym_name = h->root.root.string;
7248 else
26c61ae5
L
7249 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7250 sym_sec);
411e1bfb 7251
4eca0228 7252 _bfd_error_handler
695344c0 7253 /* xgettext:c-format */
871b3ab2 7254 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7255 ibfd, sym_name);
51aecdc5 7256 broken = TRUE;
1e2f5b6e
AM
7257 break;
7258 }
7259
51020317
AM
7260 /* opd entries are always for functions defined in the
7261 current input bfd. If the symbol isn't defined in the
7262 input bfd, then we won't be using the function in this
7263 bfd; It must be defined in a linkonce section in another
7264 bfd, or is weak. It's also possible that we are
7265 discarding the function due to a linker script /DISCARD/,
7266 which we test for via the output_section. */
7267 if (sym_sec->owner != ibfd
7268 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7269 need_edit = TRUE;
1e2f5b6e 7270
50bc7936 7271 rel += 2;
51aecdc5
AM
7272 if (rel + 1 == relend
7273 || (rel + 2 < relend
7274 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7275 ++rel;
7276
7277 if (rel == relend)
3f764659
JJ
7278 {
7279 if (sec->size == offset + 24)
7280 {
7281 need_pad = NULL;
7282 break;
7283 }
51aecdc5 7284 if (sec->size == offset + 16)
3f764659
JJ
7285 {
7286 cnt_16b++;
7287 break;
7288 }
7289 goto broken_opd;
7290 }
3f764659
JJ
7291 else if (rel + 1 < relend
7292 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7293 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7294 {
51aecdc5
AM
7295 if (rel[0].r_offset == offset + 16)
7296 cnt_16b++;
7297 else if (rel[0].r_offset != offset + 24)
7298 goto broken_opd;
3f764659
JJ
7299 }
7300 else
7301 goto broken_opd;
1e2f5b6e
AM
7302 }
7303
e7d1c40c 7304 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7305
51aecdc5 7306 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7307 {
7308 Elf_Internal_Rela *write_rel;
d4730f92 7309 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7310 bfd_byte *rptr, *wptr;
983bddc8 7311 bfd_byte *new_contents;
74f0fb50
AM
7312 bfd_size_type amt;
7313
983bddc8 7314 new_contents = NULL;
51aecdc5 7315 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7316 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7317 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7318 if (opd->adjust == NULL)
7319 return FALSE;
1e2f5b6e
AM
7320
7321 /* This seems a waste of time as input .opd sections are all
7322 zeros as generated by gcc, but I suppose there's no reason
7323 this will always be so. We might start putting something in
7324 the third word of .opd entries. */
7325 if ((sec->flags & SEC_IN_MEMORY) == 0)
7326 {
eea6121a
AM
7327 bfd_byte *loc;
7328 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7329 {
c9594989 7330 free (loc);
50bc7936 7331 error_ret:
c9594989 7332 if (symtab_hdr->contents != (unsigned char *) local_syms)
6cdc0ccc 7333 free (local_syms);
6cdc0ccc
AM
7334 if (elf_section_data (sec)->relocs != relstart)
7335 free (relstart);
b34976b6 7336 return FALSE;
6cdc0ccc 7337 }
1e2f5b6e
AM
7338 sec->contents = loc;
7339 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7340 }
7341
7342 elf_section_data (sec)->relocs = relstart;
7343
3f764659 7344 new_contents = sec->contents;
3f764659
JJ
7345 if (add_aux_fields)
7346 {
7347 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7348 if (new_contents == NULL)
7349 return FALSE;
51aecdc5 7350 need_pad = NULL;
3f764659 7351 }
b4f4e59f
AM
7352 wptr = new_contents;
7353 rptr = sec->contents;
1e2f5b6e 7354 write_rel = relstart;
51aecdc5 7355 for (rel = relstart; rel < relend; )
1e2f5b6e 7356 {
50bc7936
AM
7357 unsigned long r_symndx;
7358 asection *sym_sec;
7359 struct elf_link_hash_entry *h;
51aecdc5 7360 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7361 Elf_Internal_Sym *sym;
51aecdc5
AM
7362 long opd_ent_size;
7363 Elf_Internal_Rela *next_rel;
7364 bfd_boolean skip;
50bc7936
AM
7365
7366 r_symndx = ELF64_R_SYM (rel->r_info);
7367 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7368 r_symndx, ibfd))
50bc7936
AM
7369 goto error_ret;
7370
51aecdc5
AM
7371 next_rel = rel + 2;
7372 if (next_rel + 1 == relend
7373 || (next_rel + 2 < relend
7374 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7375 ++next_rel;
7376
7377 /* See if the .opd entry is full 24 byte or
7378 16 byte (with fd_aux entry overlapped with next
7379 fd_func). */
7380 opd_ent_size = 24;
7381 if (next_rel == relend)
1e2f5b6e 7382 {
51aecdc5 7383 if (sec->size == rel->r_offset + 16)
3f764659 7384 opd_ent_size = 16;
51aecdc5
AM
7385 }
7386 else if (next_rel->r_offset == rel->r_offset + 16)
7387 opd_ent_size = 16;
3f764659 7388
51aecdc5
AM
7389 if (h != NULL
7390 && h->root.root.string[0] == '.')
7391 {
ed7007c1 7392 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7393 if (fdh != NULL)
7394 {
7395 fdh = ppc_follow_link (fdh);
7396 if (fdh->elf.root.type != bfd_link_hash_defined
7397 && fdh->elf.root.type != bfd_link_hash_defweak)
7398 fdh = NULL;
7399 }
51aecdc5 7400 }
1e2f5b6e 7401
51aecdc5
AM
7402 skip = (sym_sec->owner != ibfd
7403 || sym_sec->output_section == bfd_abs_section_ptr);
7404 if (skip)
7405 {
7406 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7407 {
51aecdc5
AM
7408 /* Arrange for the function descriptor sym
7409 to be dropped. */
7410 fdh->elf.root.u.def.value = 0;
7411 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7412 }
51aecdc5 7413 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7414
0e1862bb 7415 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7416 rel = next_rel;
7417 else
7418 while (1)
7419 {
7420 if (!dec_dynrel_count (rel->r_info, sec, info,
7421 NULL, h, sym))
7422 goto error_ret;
754021d0 7423
51aecdc5
AM
7424 if (++rel == next_rel)
7425 break;
1e2f5b6e 7426
51aecdc5
AM
7427 r_symndx = ELF64_R_SYM (rel->r_info);
7428 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7429 r_symndx, ibfd))
7430 goto error_ret;
7431 }
50bc7936
AM
7432 }
7433 else
1e2f5b6e 7434 {
51aecdc5
AM
7435 /* We'll be keeping this opd entry. */
7436 long adjust;
7437
7438 if (fdh != NULL)
7439 {
7440 /* Redefine the function descriptor symbol to
7441 this location in the opd section. It is
7442 necessary to update the value here rather
7443 than using an array of adjustments as we do
7444 for local symbols, because various places
7445 in the generic ELF code use the value
7446 stored in u.def.value. */
7447 fdh->elf.root.u.def.value = wptr - new_contents;
7448 fdh->adjust_done = 1;
7449 }
7450
7451 /* Local syms are a bit tricky. We could
7452 tweak them as they can be cached, but
7453 we'd need to look through the local syms
7454 for the function descriptor sym which we
7455 don't have at the moment. So keep an
7456 array of adjustments. */
7457 adjust = (wptr - new_contents) - (rptr - sec->contents);
7458 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7459
7460 if (wptr != rptr)
7461 memcpy (wptr, rptr, opd_ent_size);
7462 wptr += opd_ent_size;
7463 if (add_aux_fields && opd_ent_size == 16)
7464 {
7465 memset (wptr, '\0', 8);
7466 wptr += 8;
7467 }
7468
50bc7936 7469 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7470 new opd entries. */
7471 for ( ; rel != next_rel; ++rel)
7472 {
7473 rel->r_offset += adjust;
7474 if (write_rel != rel)
7475 memcpy (write_rel, rel, sizeof (*rel));
7476 ++write_rel;
7477 }
1e2f5b6e 7478 }
51aecdc5
AM
7479
7480 rptr += opd_ent_size;
1e2f5b6e
AM
7481 }
7482
3f764659 7483 sec->size = wptr - new_contents;
1e2f5b6e 7484 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7485 if (add_aux_fields)
7486 {
7487 free (sec->contents);
7488 sec->contents = new_contents;
7489 }
7490
05bf9422 7491 /* Fudge the header size too, as this is used later in
cdcf6e38 7492 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7493 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7494 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7495 some_edited = TRUE;
1e2f5b6e 7496 }
6cdc0ccc 7497 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7498 free (relstart);
6cdc0ccc 7499
411e1bfb
AM
7500 if (local_syms != NULL
7501 && symtab_hdr->contents != (unsigned char *) local_syms)
7502 {
7503 if (!info->keep_memory)
7504 free (local_syms);
7505 else
7506 symtab_hdr->contents = (unsigned char *) local_syms;
7507 }
7508 }
7509
754021d0
AM
7510 if (some_edited)
7511 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7512
3f764659
JJ
7513 /* If we are doing a final link and the last .opd entry is just 16 byte
7514 long, add a 8 byte padding after it. */
0e1862bb 7515 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7516 {
7517 bfd_byte *p;
7518
7519 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7520 {
7521 BFD_ASSERT (need_pad->size > 0);
7522
7523 p = bfd_malloc (need_pad->size + 8);
7524 if (p == NULL)
7525 return FALSE;
699733f6 7526
2cdcc330
AM
7527 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7528 p, 0, need_pad->size))
3f764659
JJ
7529 return FALSE;
7530
7531 need_pad->contents = p;
7532 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7533 }
7534 else
7535 {
7536 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7537 if (p == NULL)
7538 return FALSE;
7539
7540 need_pad->contents = p;
7541 }
7542
7543 memset (need_pad->contents + need_pad->size, 0, 8);
7544 need_pad->size += 8;
7545 }
7546
411e1bfb
AM
7547 return TRUE;
7548}
7549
3e04d765
AM
7550/* Analyze inline PLT call relocations to see whether calls to locally
7551 defined functions can be converted to direct calls. */
7552
7553bfd_boolean
7554ppc64_elf_inline_plt (struct bfd_link_info *info)
7555{
7556 struct ppc_link_hash_table *htab;
7557 bfd *ibfd;
7558 asection *sec;
7559 bfd_vma low_vma, high_vma, limit;
7560
7561 htab = ppc_hash_table (info);
7562 if (htab == NULL)
7563 return FALSE;
7564
7565 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7566 reduced somewhat to cater for possible stubs that might be added
7567 between the call and its destination. */
7568 if (htab->params->group_size < 0)
7569 {
7570 limit = -htab->params->group_size;
7571 if (limit == 1)
7572 limit = 0x1e00000;
7573 }
7574 else
7575 {
7576 limit = htab->params->group_size;
7577 if (limit == 1)
7578 limit = 0x1c00000;
7579 }
7580
7581 low_vma = -1;
7582 high_vma = 0;
7583 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7584 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7585 {
7586 if (low_vma > sec->vma)
7587 low_vma = sec->vma;
7588 if (high_vma < sec->vma + sec->size)
7589 high_vma = sec->vma + sec->size;
7590 }
7591
7592 /* If a "bl" can reach anywhere in local code sections, then we can
7593 convert all inline PLT sequences to direct calls when the symbol
7594 is local. */
7595 if (high_vma - low_vma < limit)
7596 {
7597 htab->can_convert_all_inline_plt = 1;
7598 return TRUE;
7599 }
7600
7601 /* Otherwise, go looking through relocs for cases where a direct
7602 call won't reach. Mark the symbol on any such reloc to disable
7603 the optimization and keep the PLT entry as it seems likely that
7604 this will be better than creating trampolines. Note that this
7605 will disable the optimization for all inline PLT calls to a
7606 particular symbol, not just those that won't reach. The
7607 difficulty in doing a more precise optimization is that the
7608 linker needs to make a decision depending on whether a
7609 particular R_PPC64_PLTCALL insn can be turned into a direct
7610 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7611 the sequence, and there is nothing that ties those relocs
7612 together except their symbol. */
7613
7614 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7615 {
7616 Elf_Internal_Shdr *symtab_hdr;
7617 Elf_Internal_Sym *local_syms;
7618
7619 if (!is_ppc64_elf (ibfd))
7620 continue;
7621
7622 local_syms = NULL;
7623 symtab_hdr = &elf_symtab_hdr (ibfd);
7624
7625 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7626 if (ppc64_elf_section_data (sec)->has_pltcall
7627 && !bfd_is_abs_section (sec->output_section))
7628 {
7629 Elf_Internal_Rela *relstart, *rel, *relend;
7630
7631 /* Read the relocations. */
7632 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7633 info->keep_memory);
7634 if (relstart == NULL)
7635 return FALSE;
7636
7637 relend = relstart + sec->reloc_count;
435edf0b 7638 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
7639 {
7640 enum elf_ppc64_reloc_type r_type;
7641 unsigned long r_symndx;
7642 asection *sym_sec;
7643 struct elf_link_hash_entry *h;
7644 Elf_Internal_Sym *sym;
7645 unsigned char *tls_maskp;
7646
7647 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7648 if (r_type != R_PPC64_PLTCALL
7649 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7650 continue;
7651
7652 r_symndx = ELF64_R_SYM (rel->r_info);
7653 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7654 r_symndx, ibfd))
7655 {
7656 if (elf_section_data (sec)->relocs != relstart)
7657 free (relstart);
c9594989 7658 if (symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7659 free (local_syms);
7660 return FALSE;
7661 }
7662
7663 if (sym_sec != NULL && sym_sec->output_section != NULL)
7664 {
7665 bfd_vma from, to;
7666 if (h != NULL)
7667 to = h->root.u.def.value;
7668 else
7669 to = sym->st_value;
7670 to += (rel->r_addend
7671 + sym_sec->output_offset
7672 + sym_sec->output_section->vma);
7673 from = (rel->r_offset
7674 + sec->output_offset
7675 + sec->output_section->vma);
5663e321
AM
7676 if (to - from + limit < 2 * limit
7677 && !(r_type == R_PPC64_PLTCALL_NOTOC
7678 && (((h ? h->other : sym->st_other)
7679 & STO_PPC64_LOCAL_MASK)
4a4e7361 7680 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7681 *tls_maskp &= ~PLT_KEEP;
7682 }
7683 }
7684 if (elf_section_data (sec)->relocs != relstart)
7685 free (relstart);
7686 }
7687
7688 if (local_syms != NULL
7689 && symtab_hdr->contents != (unsigned char *) local_syms)
7690 {
7691 if (!info->keep_memory)
7692 free (local_syms);
7693 else
7694 symtab_hdr->contents = (unsigned char *) local_syms;
7695 }
7696 }
7697
7698 return TRUE;
7699}
7700
c9405344
AM
7701/* Set htab->tls_get_addr and various other info specific to TLS.
7702 This needs to run before dynamic symbols are processed in
7703 bfd_elf_size_dynamic_sections. */
411e1bfb 7704
c9405344 7705bfd_boolean
e7d1c40c 7706ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7707{
411e1bfb 7708 struct ppc_link_hash_table *htab;
9e7028aa 7709 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7710
411e1bfb 7711 htab = ppc_hash_table (info);
4dfe6ac6 7712 if (htab == NULL)
c9405344 7713 return FALSE;
4dfe6ac6 7714
ee67d69a
AM
7715 if (abiversion (info->output_bfd) == 1)
7716 htab->opd_abi = 1;
7717
e7d1c40c 7718 if (htab->params->no_multi_toc)
33c0ec9d
AM
7719 htab->do_multi_toc = 0;
7720 else if (!htab->do_multi_toc)
e7d1c40c 7721 htab->params->no_multi_toc = 1;
33c0ec9d 7722
8b5f1ed8
AM
7723 /* Default to --no-plt-localentry, as this option can cause problems
7724 with symbol interposition. For example, glibc libpthread.so and
7725 libc.so duplicate many pthread symbols, with a fallback
7726 implementation in libc.so. In some cases the fallback does more
7727 work than the pthread implementation. __pthread_condattr_destroy
7728 is one such symbol: the libpthread.so implementation is
7729 localentry:0 while the libc.so implementation is localentry:8.
7730 An app that "cleverly" uses dlopen to only load necessary
7731 libraries at runtime may omit loading libpthread.so when not
7732 running multi-threaded, which then results in the libc.so
7733 fallback symbols being used and ld.so complaining. Now there
7734 are workarounds in ld (see non_zero_localentry) to detect the
7735 pthread situation, but that may not be the only case where
7736 --plt-localentry can cause trouble. */
f378ab09 7737 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7738 htab->params->plt_localentry0 = 0;
d44c746a
AM
7739 if (htab->params->plt_localentry0
7740 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7741 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7742 _bfd_error_handler
7743 (_("warning: --plt-localentry is especially dangerous without "
7744 "ld.so support to detect ABI violations"));
f378ab09 7745
9e7028aa
AM
7746 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7747 FALSE, FALSE, TRUE);
7748 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7749
a7f2871e 7750 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7751 if (tga != NULL)
7752 func_desc_adjust (tga, info);
7753 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7754 FALSE, FALSE, TRUE);
7755 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7756
7757 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7758 FALSE, FALSE, TRUE);
7759 htab->tga_desc = ppc_elf_hash_entry (desc);
7760 if (desc != NULL)
7761 func_desc_adjust (desc, info);
7762 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7763 FALSE, FALSE, TRUE);
7764 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7765
7c9cf415 7766 if (htab->params->tls_get_addr_opt)
a7f2871e 7767 {
9e7028aa 7768 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7769
7770 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7771 FALSE, FALSE, TRUE);
7772 if (opt != NULL)
7773 func_desc_adjust (opt, info);
7774 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7775 FALSE, FALSE, TRUE);
7776 if (opt_fd != NULL
7777 && (opt_fd->root.type == bfd_link_hash_defined
7778 || opt_fd->root.type == bfd_link_hash_defweak))
7779 {
7780 /* If glibc supports an optimized __tls_get_addr call stub,
7781 signalled by the presence of __tls_get_addr_opt, and we'll
7782 be calling __tls_get_addr via a plt call stub, then
7783 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7784 if (!(htab->elf.dynamic_sections_created
7785 && tga_fd != NULL
7786 && (tga_fd->type == STT_FUNC
7787 || tga_fd->needs_plt)
7788 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7789 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7790 tga_fd = NULL;
7791 if (!(htab->elf.dynamic_sections_created
7792 && desc_fd != NULL
7793 && (desc_fd->type == STT_FUNC
7794 || desc_fd->needs_plt)
7795 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7796 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7797 desc_fd = NULL;
7798
7799 if (tga_fd != NULL || desc_fd != NULL)
7800 {
7801 struct plt_entry *ent = NULL;
7802
7803 if (tga_fd != NULL)
7804 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7805 if (ent->plt.refcount > 0)
7806 break;
7807 if (ent == NULL && desc_fd != NULL)
7808 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7809 if (ent->plt.refcount > 0)
7810 break;
a7f2871e
AM
7811 if (ent != NULL)
7812 {
9e7028aa
AM
7813 if (tga_fd != NULL)
7814 {
7815 tga_fd->root.type = bfd_link_hash_indirect;
7816 tga_fd->root.u.i.link = &opt_fd->root;
7817 tga_fd->root.u.i.warning = NULL;
7818 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7819 }
7820 if (desc_fd != NULL)
7821 {
7822 desc_fd->root.type = bfd_link_hash_indirect;
7823 desc_fd->root.u.i.link = &opt_fd->root;
7824 desc_fd->root.u.i.warning = NULL;
7825 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7826 }
b531344c 7827 opt_fd->mark = 1;
a7f2871e
AM
7828 if (opt_fd->dynindx != -1)
7829 {
7830 /* Use __tls_get_addr_opt in dynamic relocations. */
7831 opt_fd->dynindx = -1;
7832 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7833 opt_fd->dynstr_index);
7834 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
c9405344 7835 return FALSE;
a7f2871e 7836 }
9e7028aa 7837 if (tga_fd != NULL)
a7f2871e 7838 {
9e7028aa 7839 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
9e51d549 7840 tga = (struct elf_link_hash_entry *) htab->tls_get_addr;
9e7028aa
AM
7841 if (opt != NULL && tga != NULL)
7842 {
7843 tga->root.type = bfd_link_hash_indirect;
7844 tga->root.u.i.link = &opt->root;
7845 tga->root.u.i.warning = NULL;
7846 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7847 opt->mark = 1;
7848 _bfd_elf_link_hash_hide_symbol (info, opt,
7849 tga->forced_local);
7850 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7851 }
7852 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7853 htab->tls_get_addr_fd->is_func_descriptor = 1;
7854 if (htab->tls_get_addr != NULL)
7855 {
7856 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7857 htab->tls_get_addr->is_func = 1;
7858 }
a7f2871e 7859 }
9e7028aa 7860 if (desc_fd != NULL)
a7f2871e 7861 {
9e7028aa
AM
7862 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7863 if (opt != NULL && desc != NULL)
7864 {
7865 desc->root.type = bfd_link_hash_indirect;
7866 desc->root.u.i.link = &opt->root;
7867 desc->root.u.i.warning = NULL;
7868 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7869 opt->mark = 1;
7870 _bfd_elf_link_hash_hide_symbol (info, opt,
7871 desc->forced_local);
7872 htab->tga_desc = ppc_elf_hash_entry (opt);
7873 }
7874 htab->tga_desc_fd->oh = htab->tga_desc;
7875 htab->tga_desc_fd->is_func_descriptor = 1;
7876 if (htab->tga_desc != NULL)
7877 {
7878 htab->tga_desc->oh = htab->tga_desc_fd;
7879 htab->tga_desc->is_func = 1;
7880 }
a7f2871e
AM
7881 }
7882 }
7883 }
7884 }
7c9cf415
AM
7885 else if (htab->params->tls_get_addr_opt < 0)
7886 htab->params->tls_get_addr_opt = 0;
a7f2871e 7887 }
9e7028aa
AM
7888
7889 if (htab->tga_desc_fd != NULL
7890 && htab->params->tls_get_addr_opt
7891 && htab->params->no_tls_get_addr_regsave == -1)
7892 htab->params->no_tls_get_addr_regsave = 0;
7893
c9405344 7894 return TRUE;
3a71aa26 7895}
8387904d 7896
3a71aa26 7897/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7898 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7899
3a71aa26
AM
7900static bfd_boolean
7901branch_reloc_hash_match (const bfd *ibfd,
7902 const Elf_Internal_Rela *rel,
7903 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7904 const struct ppc_link_hash_entry *hash2,
7905 const struct ppc_link_hash_entry *hash3,
7906 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7907{
7908 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7909 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7910 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7911
e054468f 7912 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7913 {
3a71aa26
AM
7914 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7915 struct elf_link_hash_entry *h;
8387904d 7916
3a71aa26 7917 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7918 h = elf_follow_link (h);
9e51d549
AM
7919 if (h == (struct elf_link_hash_entry *) hash1
7920 || h == (struct elf_link_hash_entry *) hash2
7921 || h == (struct elf_link_hash_entry *) hash3
7922 || h == (struct elf_link_hash_entry *) hash4)
3a71aa26 7923 return TRUE;
a48ebf4d 7924 }
3a71aa26 7925 return FALSE;
951fd09b 7926}
411e1bfb 7927
951fd09b
AM
7928/* Run through all the TLS relocs looking for optimization
7929 opportunities. The linker has been hacked (see ppc64elf.em) to do
7930 a preliminary section layout so that we know the TLS segment
7931 offsets. We can't optimize earlier because some optimizations need
7932 to know the tp offset, and we need to optimize before allocating
7933 dynamic relocations. */
7934
7935bfd_boolean
33c0ec9d 7936ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7937{
7938 bfd *ibfd;
7939 asection *sec;
7940 struct ppc_link_hash_table *htab;
663a1470 7941 unsigned char *toc_ref;
102890f0 7942 int pass;
951fd09b 7943
3cbc1e5e 7944 if (!bfd_link_executable (info))
411e1bfb
AM
7945 return TRUE;
7946
951fd09b 7947 htab = ppc_hash_table (info);
4dfe6ac6
NC
7948 if (htab == NULL)
7949 return FALSE;
7950
252dcdf4
AM
7951 htab->do_tls_opt = 1;
7952
663a1470
AM
7953 /* Make two passes over the relocs. On the first pass, mark toc
7954 entries involved with tls relocs, and check that tls relocs
7955 involved in setting up a tls_get_addr call are indeed followed by
7956 such a call. If they are not, we can't do any tls optimization.
7957 On the second pass twiddle tls_mask flags to notify
7958 relocate_section that optimization can be done, and adjust got
7959 and plt refcounts. */
7960 toc_ref = NULL;
7961 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7962 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7963 {
7964 Elf_Internal_Sym *locsyms = NULL;
7965 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7966
102890f0
AM
7967 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7968 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7969 {
7970 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7971 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7972
102890f0
AM
7973 /* Read the relocations. */
7974 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7975 info->keep_memory);
7976 if (relstart == NULL)
2915c55b
JK
7977 {
7978 free (toc_ref);
7979 return FALSE;
7980 }
411e1bfb 7981
102890f0
AM
7982 relend = relstart + sec->reloc_count;
7983 for (rel = relstart; rel < relend; rel++)
7984 {
7985 enum elf_ppc64_reloc_type r_type;
7986 unsigned long r_symndx;
7987 struct elf_link_hash_entry *h;
7988 Elf_Internal_Sym *sym;
7989 asection *sym_sec;
f961d9dd 7990 unsigned char *tls_mask;
46e9995a 7991 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7992 bfd_vma value;
7993 bfd_boolean ok_tprel, is_local;
7994 long toc_ref_index = 0;
7995 int expecting_tls_get_addr = 0;
663a1470 7996 bfd_boolean ret = FALSE;
411e1bfb 7997
102890f0
AM
7998 r_symndx = ELF64_R_SYM (rel->r_info);
7999 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8000 r_symndx, ibfd))
8001 {
8002 err_free_rel:
8003 if (elf_section_data (sec)->relocs != relstart)
8004 free (relstart);
c9594989
AM
8005 free (toc_ref);
8006 if (elf_symtab_hdr (ibfd).contents
8007 != (unsigned char *) locsyms)
102890f0 8008 free (locsyms);
663a1470 8009 return ret;
102890f0 8010 }
411e1bfb 8011
102890f0
AM
8012 if (h != NULL)
8013 {
766bc656
AM
8014 if (h->root.type == bfd_link_hash_defined
8015 || h->root.type == bfd_link_hash_defweak)
8016 value = h->root.u.def.value;
8017 else if (h->root.type == bfd_link_hash_undefweak)
8018 value = 0;
8019 else
663a1470
AM
8020 {
8021 found_tls_get_addr_arg = 0;
8022 continue;
8023 }
102890f0
AM
8024 }
8025 else
8026 /* Symbols referenced by TLS relocs must be of type
8027 STT_TLS. So no need for .opd local sym adjust. */
8028 value = sym->st_value;
8029
8030 ok_tprel = FALSE;
f749f26e
AM
8031 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
8032 if (is_local)
102890f0 8033 {
766bc656
AM
8034 if (h != NULL
8035 && h->root.type == bfd_link_hash_undefweak)
8036 ok_tprel = TRUE;
c27b8c2a
AM
8037 else if (sym_sec != NULL
8038 && sym_sec->output_section != NULL)
766bc656
AM
8039 {
8040 value += sym_sec->output_offset;
8041 value += sym_sec->output_section->vma;
0b147428 8042 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
8043 /* Note that even though the prefix insns
8044 allow a 1<<33 offset we use the same test
8045 as for addis;addi. There may be a mix of
8046 pcrel and non-pcrel code and the decision
8047 to optimise is per symbol, not per TLS
8048 sequence. */
0b147428 8049 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 8050 }
102890f0 8051 }
951fd09b 8052
102890f0 8053 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8054 /* If this section has old-style __tls_get_addr calls
8055 without marker relocs, then check that each
8056 __tls_get_addr call reloc is preceded by a reloc
8057 that conceivably belongs to the __tls_get_addr arg
8058 setup insn. If we don't find matching arg setup
8059 relocs, don't do any tls optimization. */
8060 if (pass == 0
9737e8af 8061 && sec->nomark_tls_get_addr
663a1470 8062 && h != NULL
ed7007c1 8063 && is_tls_get_addr (h, htab)
663a1470
AM
8064 && !found_tls_get_addr_arg
8065 && is_branch_reloc (r_type))
8066 {
25f53a85 8067 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8068 "TLS optimization disabled\n"),
8069 ibfd, sec, rel->r_offset);
8070 ret = TRUE;
8071 goto err_free_rel;
8072 }
8073
8074 found_tls_get_addr_arg = 0;
102890f0
AM
8075 switch (r_type)
8076 {
8077 case R_PPC64_GOT_TLSLD16:
8078 case R_PPC64_GOT_TLSLD16_LO:
87c69f97 8079 case R_PPC64_GOT_TLSLD_PCREL34:
102890f0 8080 expecting_tls_get_addr = 1;
663a1470 8081 found_tls_get_addr_arg = 1;
1a0670f3 8082 /* Fall through. */
102890f0
AM
8083
8084 case R_PPC64_GOT_TLSLD16_HI:
8085 case R_PPC64_GOT_TLSLD16_HA:
8086 /* These relocs should never be against a symbol
8087 defined in a shared lib. Leave them alone if
8088 that turns out to be the case. */
8089 if (!is_local)
8090 continue;
411e1bfb 8091
102890f0 8092 /* LD -> LE */
411e1bfb 8093 tls_set = 0;
102890f0
AM
8094 tls_clear = TLS_LD;
8095 tls_type = TLS_TLS | TLS_LD;
8096 break;
411e1bfb 8097
102890f0
AM
8098 case R_PPC64_GOT_TLSGD16:
8099 case R_PPC64_GOT_TLSGD16_LO:
87c69f97 8100 case R_PPC64_GOT_TLSGD_PCREL34:
102890f0 8101 expecting_tls_get_addr = 1;
663a1470 8102 found_tls_get_addr_arg = 1;
1a0670f3 8103 /* Fall through. */
102890f0
AM
8104
8105 case R_PPC64_GOT_TLSGD16_HI:
8106 case R_PPC64_GOT_TLSGD16_HA:
8107 if (ok_tprel)
8108 /* GD -> LE */
411e1bfb 8109 tls_set = 0;
102890f0
AM
8110 else
8111 /* GD -> IE */
b00a0a86 8112 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8113 tls_clear = TLS_GD;
8114 tls_type = TLS_TLS | TLS_GD;
8115 break;
8116
87c69f97 8117 case R_PPC64_GOT_TPREL_PCREL34:
102890f0
AM
8118 case R_PPC64_GOT_TPREL16_DS:
8119 case R_PPC64_GOT_TPREL16_LO_DS:
8120 case R_PPC64_GOT_TPREL16_HI:
8121 case R_PPC64_GOT_TPREL16_HA:
8122 if (ok_tprel)
8123 {
8124 /* IE -> LE */
8125 tls_set = 0;
8126 tls_clear = TLS_TPREL;
8127 tls_type = TLS_TLS | TLS_TPREL;
8128 break;
8129 }
411e1bfb
AM
8130 continue;
8131
727fc41e 8132 case R_PPC64_TLSLD:
7d04a20a
AM
8133 if (!is_local)
8134 continue;
8135 /* Fall through. */
8136 case R_PPC64_TLSGD:
23cedd1d
AM
8137 if (rel + 1 < relend
8138 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8139 {
8140 if (pass != 0
2cdcc330 8141 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8142 != R_PPC64_PLTSEQ)
8143 && (ELF64_R_TYPE (rel[1].r_info)
8144 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8145 {
8146 r_symndx = ELF64_R_SYM (rel[1].r_info);
8147 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8148 r_symndx, ibfd))
23cedd1d
AM
8149 goto err_free_rel;
8150 if (h != NULL)
8151 {
8152 struct plt_entry *ent = NULL;
8153
8154 for (ent = h->plt.plist;
8155 ent != NULL;
8156 ent = ent->next)
8157 if (ent->addend == rel[1].r_addend)
8158 break;
8159
8160 if (ent != NULL
8161 && ent->plt.refcount > 0)
8162 ent->plt.refcount -= 1;
8163 }
8164 }
8165 continue;
8166 }
663a1470 8167 found_tls_get_addr_arg = 1;
1a0670f3 8168 /* Fall through. */
663a1470
AM
8169
8170 case R_PPC64_TLS:
8171 case R_PPC64_TOC16:
8172 case R_PPC64_TOC16_LO:
102890f0
AM
8173 if (sym_sec == NULL || sym_sec != toc)
8174 continue;
8175
8176 /* Mark this toc entry as referenced by a TLS
8177 code sequence. We can do that now in the
8178 case of R_PPC64_TLS, and after checking for
8179 tls_get_addr for the TOC16 relocs. */
8180 if (toc_ref == NULL)
2cdcc330
AM
8181 toc_ref
8182 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8183 if (toc_ref == NULL)
8184 goto err_free_rel;
8185
102890f0
AM
8186 if (h != NULL)
8187 value = h->root.u.def.value;
8188 else
8189 value = sym->st_value;
8190 value += rel->r_addend;
73242275
AM
8191 if (value % 8 != 0)
8192 continue;
8193 BFD_ASSERT (value < toc->size
8194 && toc->output_offset % 8 == 0);
663a1470 8195 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8196 if (r_type == R_PPC64_TLS
8197 || r_type == R_PPC64_TLSGD
8198 || r_type == R_PPC64_TLSLD)
102890f0
AM
8199 {
8200 toc_ref[toc_ref_index] = 1;
8201 continue;
8202 }
8203
8204 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8205 continue;
8206
8207 tls_set = 0;
8208 tls_clear = 0;
8209 expecting_tls_get_addr = 2;
8210 break;
8211
8212 case R_PPC64_TPREL64:
8213 if (pass == 0
8214 || sec != toc
8215 || toc_ref == NULL
663a1470 8216 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8217 continue;
8218 if (ok_tprel)
8219 {
8220 /* IE -> LE */
8221 tls_set = TLS_EXPLICIT;
8222 tls_clear = TLS_TPREL;
8223 break;
8224 }
8225 continue;
8226
8227 case R_PPC64_DTPMOD64:
8228 if (pass == 0
8229 || sec != toc
8230 || toc_ref == NULL
663a1470 8231 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8232 continue;
8233 if (rel + 1 < relend
8234 && (rel[1].r_info
8235 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8236 && rel[1].r_offset == rel->r_offset + 8)
8237 {
8238 if (ok_tprel)
8239 /* GD -> LE */
8240 tls_set = TLS_EXPLICIT | TLS_GD;
8241 else
8242 /* GD -> IE */
b00a0a86 8243 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8244 tls_clear = TLS_GD;
8245 }
8246 else
8247 {
8248 if (!is_local)
8249 continue;
8250
8251 /* LD -> LE */
8252 tls_set = TLS_EXPLICIT;
8253 tls_clear = TLS_LD;
8254 }
8255 break;
8256
252dcdf4
AM
8257 case R_PPC64_TPREL16_HA:
8258 if (pass == 0)
8259 {
8260 unsigned char buf[4];
8261 unsigned int insn;
8262 bfd_vma off = rel->r_offset & ~3;
8263 if (!bfd_get_section_contents (ibfd, sec, buf,
8264 off, 4))
8265 goto err_free_rel;
8266 insn = bfd_get_32 (ibfd, buf);
8267 /* addis rt,13,imm */
8268 if ((insn & ((0x3fu << 26) | 0x1f << 16))
8269 != ((15u << 26) | (13 << 16)))
8270 {
8271 /* xgettext:c-format */
8272 info->callbacks->minfo
8273 (_("%H: warning: %s unexpected insn %#x.\n"),
8274 ibfd, sec, off, "R_PPC64_TPREL16_HA", insn);
8275 htab->do_tls_opt = 0;
8276 }
8277 }
8278 continue;
8279
8280 case R_PPC64_TPREL16_HI:
8281 case R_PPC64_TPREL16_HIGH:
8282 case R_PPC64_TPREL16_HIGHA:
8283 case R_PPC64_TPREL16_HIGHER:
8284 case R_PPC64_TPREL16_HIGHERA:
8285 case R_PPC64_TPREL16_HIGHEST:
8286 case R_PPC64_TPREL16_HIGHESTA:
8287 /* These can all be used in sequences along with
8288 TPREL16_LO or TPREL16_LO_DS in ways we aren't
8289 able to verify easily. */
8290 htab->do_tls_opt = 0;
8291 continue;
8292
102890f0
AM
8293 default:
8294 continue;
8295 }
8296
8297 if (pass == 0)
8298 {
727fc41e 8299 if (!expecting_tls_get_addr
9737e8af 8300 || !sec->nomark_tls_get_addr)
102890f0
AM
8301 continue;
8302
3a71aa26
AM
8303 if (rel + 1 < relend
8304 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8305 htab->tls_get_addr_fd,
8306 htab->tga_desc_fd,
3a71aa26 8307 htab->tls_get_addr,
9e7028aa 8308 htab->tga_desc))
102890f0 8309 {
3a71aa26 8310 if (expecting_tls_get_addr == 2)
102890f0 8311 {
3a71aa26 8312 /* Check for toc tls entries. */
f961d9dd 8313 unsigned char *toc_tls;
3a71aa26
AM
8314 int retval;
8315
8316 retval = get_tls_mask (&toc_tls, NULL, NULL,
8317 &locsyms,
8318 rel, ibfd);
8319 if (retval == 0)
8320 goto err_free_rel;
663a1470
AM
8321 if (toc_tls != NULL)
8322 {
37da22e5
AM
8323 if ((*toc_tls & TLS_TLS) != 0
8324 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8325 found_tls_get_addr_arg = 1;
8326 if (retval > 1)
8327 toc_ref[toc_ref_index] = 1;
8328 }
102890f0 8329 }
3a71aa26 8330 continue;
102890f0
AM
8331 }
8332
102890f0
AM
8333 /* Uh oh, we didn't find the expected call. We
8334 could just mark this symbol to exclude it
8335 from tls optimization but it's safer to skip
663a1470 8336 the entire optimization. */
695344c0 8337 /* xgettext:c-format */
25f53a85 8338 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8339 "TLS optimization disabled\n"),
8340 ibfd, sec, rel->r_offset);
8341 ret = TRUE;
8342 goto err_free_rel;
102890f0
AM
8343 }
8344
37da22e5
AM
8345 /* If we don't have old-style __tls_get_addr calls
8346 without TLSGD/TLSLD marker relocs, and we haven't
8347 found a new-style __tls_get_addr call with a
8348 marker for this symbol, then we either have a
8349 broken object file or an -mlongcall style
8350 indirect call to __tls_get_addr without a marker.
8351 Disable optimization in this case. */
8352 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8353 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8354 && !sec->nomark_tls_get_addr
37da22e5
AM
8355 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8356 != (TLS_TLS | TLS_MARK)))
8357 continue;
8358
7d04a20a 8359 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8360 {
23cedd1d
AM
8361 struct plt_entry *ent = NULL;
8362
9e7028aa
AM
8363 if (htab->tls_get_addr_fd != NULL)
8364 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8365 ent != NULL;
8366 ent = ent->next)
8367 if (ent->addend == 0)
8368 break;
8369
8370 if (ent == NULL && htab->tga_desc_fd != NULL)
8371 for (ent = htab->tga_desc_fd->elf.plt.plist;
8372 ent != NULL;
8373 ent = ent->next)
8374 if (ent->addend == 0)
8375 break;
8376
8377 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8378 for (ent = htab->tls_get_addr->elf.plt.plist;
8379 ent != NULL;
8380 ent = ent->next)
8381 if (ent->addend == 0)
102890f0 8382 break;
411e1bfb 8383
9e7028aa
AM
8384 if (ent == NULL && htab->tga_desc != NULL)
8385 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8386 ent != NULL;
8387 ent = ent->next)
8388 if (ent->addend == 0)
102890f0 8389 break;
23cedd1d
AM
8390
8391 if (ent != NULL
8392 && ent->plt.refcount > 0)
8393 ent->plt.refcount -= 1;
102890f0 8394 }
411e1bfb 8395
102890f0 8396 if (tls_clear == 0)
30038c59
AM
8397 continue;
8398
102890f0
AM
8399 if ((tls_set & TLS_EXPLICIT) == 0)
8400 {
8401 struct got_entry *ent;
411e1bfb 8402
102890f0
AM
8403 /* Adjust got entry for this reloc. */
8404 if (h != NULL)
8405 ent = h->got.glist;
8406 else
8407 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8408
102890f0
AM
8409 for (; ent != NULL; ent = ent->next)
8410 if (ent->addend == rel->r_addend
8411 && ent->owner == ibfd
8412 && ent->tls_type == tls_type)
8413 break;
8414 if (ent == NULL)
8415 abort ();
411e1bfb 8416
102890f0
AM
8417 if (tls_set == 0)
8418 {
8419 /* We managed to get rid of a got entry. */
8420 if (ent->got.refcount > 0)
8421 ent->got.refcount -= 1;
8422 }
8423 }
8424 else
8425 {
8426 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8427 we'll lose one or two dyn relocs. */
8428 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8429 NULL, h, sym))
102890f0 8430 return FALSE;
411e1bfb 8431
102890f0
AM
8432 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8433 {
8434 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8435 NULL, h, sym))
102890f0
AM
8436 return FALSE;
8437 }
8438 }
411e1bfb 8439
46e9995a 8440 *tls_mask |= tls_set & 0xff;
102890f0
AM
8441 *tls_mask &= ~tls_clear;
8442 }
8c1d1bb8 8443
102890f0
AM
8444 if (elf_section_data (sec)->relocs != relstart)
8445 free (relstart);
8446 }
411e1bfb 8447
663a1470
AM
8448 if (locsyms != NULL
8449 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8450 {
8451 if (!info->keep_memory)
8452 free (locsyms);
8453 else
8454 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8455 }
8456 }
411e1bfb 8457
c9594989 8458 free (toc_ref);
b34976b6 8459 return TRUE;
1e2f5b6e 8460}
b34976b6 8461
c5614fa4
AM
8462/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8463 the values of any global symbols in a toc section that has been
8464 edited. Globals in toc sections should be a rarity, so this function
8465 sets a flag if any are found in toc sections other than the one just
de194d85 8466 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8467
8468struct adjust_toc_info
8469{
8470 asection *toc;
8471 unsigned long *skip;
8472 bfd_boolean global_toc_syms;
8473};
8474
ba761f19
AM
8475enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8476
c5614fa4
AM
8477static bfd_boolean
8478adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8479{
8480 struct ppc_link_hash_entry *eh;
8481 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8482 unsigned long i;
c5614fa4 8483
c5614fa4
AM
8484 if (h->root.type != bfd_link_hash_defined
8485 && h->root.type != bfd_link_hash_defweak)
8486 return TRUE;
8487
ed7007c1 8488 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8489 if (eh->adjust_done)
8490 return TRUE;
8491
8492 if (eh->elf.root.u.def.section == toc_inf->toc)
8493 {
854b41e7
AM
8494 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8495 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8496 else
854b41e7
AM
8497 i = eh->elf.root.u.def.value >> 3;
8498
ba761f19 8499 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8500 {
4eca0228 8501 _bfd_error_handler
854b41e7
AM
8502 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8503 do
8504 ++i;
ba761f19 8505 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8506 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8507 }
854b41e7
AM
8508
8509 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8510 eh->adjust_done = 1;
8511 }
8512 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8513 toc_inf->global_toc_syms = TRUE;
8514
8515 return TRUE;
8516}
8517
39eeab25
AM
8518/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8519 on a _LO variety toc/got reloc. */
560c8763
AM
8520
8521static bfd_boolean
39eeab25 8522ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8523{
2365f8d7
AM
8524 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8525 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8526 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8527 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8528 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8529 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8530 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8531 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8532 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8533 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8534 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8535 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8536 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8537 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8538 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8539 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8540 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8541 /* Exclude lfqu by testing reloc. If relocs are ever
8542 defined for the reduced D field in psq_lu then those
8543 will need testing too. */
8544 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8545 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8546 && (insn & 1) == 0)
2365f8d7
AM
8547 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8548 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8549 /* Exclude stfqu. psq_stu as above for psq_lu. */
8550 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8551 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8552 && (insn & 1) == 0));
560c8763
AM
8553}
8554
4a421c53
AM
8555/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8556 pld ra,symbol@got@pcrel
dd9b12c2 8557 load/store rt,off(ra)
4a421c53 8558 or
d4b87b1e 8559 pla ra,symbol@pcrel
dd9b12c2 8560 load/store rt,off(ra)
4a421c53 8561 may be translated to
dd9b12c2 8562 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8563 nop.
8564 This function returns true if the optimization is possible, placing
dd9b12c2 8565 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8566
8567 On entry to this function, the linker has already determined that
d4b87b1e 8568 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8569 while *PINSN2 is the second instruction. */
8570
8571static bfd_boolean
dd9b12c2 8572xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8573{
77486630
AM
8574 uint64_t insn1 = *pinsn1;
8575 uint64_t insn2 = *pinsn2;
dd9b12c2 8576 bfd_signed_vma off;
4a421c53 8577
77486630
AM
8578 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8579 {
8580 /* Check that regs match. */
8581 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8582 return FALSE;
8583
8584 /* P8LS or PMLS form, non-pcrel. */
8585 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8586 return FALSE;
8587
8588 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8589 *pinsn2 = PNOP;
8590 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8591 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8592 return TRUE;
8593 }
8594
8595 insn2 >>= 32;
8596
4a421c53 8597 /* Check that regs match. */
77486630 8598 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8599 return FALSE;
8600
8601 switch ((insn2 >> 26) & 63)
8602 {
8603 default:
8604 return FALSE;
8605
8606 case 32: /* lwz */
8607 case 34: /* lbz */
8608 case 36: /* stw */
8609 case 38: /* stb */
8610 case 40: /* lhz */
8611 case 42: /* lha */
8612 case 44: /* sth */
8613 case 48: /* lfs */
8614 case 50: /* lfd */
8615 case 52: /* stfs */
8616 case 54: /* stfd */
8617 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8618 on the insn. */
77486630 8619 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8620 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8621 off = insn2 & 0xffff;
4a421c53
AM
8622 break;
8623
8624 case 58: /* lwa, ld */
dd9b12c2 8625 if ((insn2 & 1) != 0)
4a421c53 8626 return FALSE;
77486630 8627 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8628 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8629 | (insn2 & (31ULL << 21)));
dd9b12c2 8630 off = insn2 & 0xfffc;
4a421c53
AM
8631 break;
8632
8633 case 57: /* lxsd, lxssp */
dd9b12c2 8634 if ((insn2 & 3) < 2)
4a421c53 8635 return FALSE;
77486630 8636 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8637 | ((40ULL | (insn2 & 3)) << 26)
8638 | (insn2 & (31ULL << 21)));
dd9b12c2 8639 off = insn2 & 0xfffc;
4a421c53
AM
8640 break;
8641
8642 case 61: /* stxsd, stxssp, lxv, stxv */
8643 if ((insn2 & 3) == 0)
8644 return FALSE;
8645 else if ((insn2 & 3) >= 2)
8646 {
77486630 8647 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8648 | ((44ULL | (insn2 & 3)) << 26)
8649 | (insn2 & (31ULL << 21)));
dd9b12c2 8650 off = insn2 & 0xfffc;
4a421c53
AM
8651 }
8652 else
8653 {
77486630 8654 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8655 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8656 | (insn2 & (31ULL << 21)));
dd9b12c2 8657 off = insn2 & 0xfff0;
4a421c53
AM
8658 }
8659 break;
8660
8661 case 56: /* lq */
77486630 8662 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8663 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8664 off = insn2 & 0xffff;
4a421c53
AM
8665 break;
8666
94ba9882
AM
8667 case 6: /* lxvp, stxvp */
8668 if ((insn2 & 0xe) != 0)
8669 return FALSE;
8670 insn1 = ((1ULL << 58) | (1ULL << 52)
8671 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8672 | (insn2 & (31ULL << 21)));
8673 off = insn2 & 0xfff0;
8674 break;
8675
4a421c53 8676 case 62: /* std, stq */
dd9b12c2 8677 if ((insn2 & 1) != 0)
4a421c53 8678 return FALSE;
77486630 8679 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8680 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8681 | (insn2 & (31ULL << 21)));
dd9b12c2 8682 off = insn2 & 0xfffc;
4a421c53
AM
8683 break;
8684 }
8685
77486630 8686 *pinsn1 = insn1;
4a421c53 8687 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8688 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8689 return TRUE;
8690}
8691
c5614fa4
AM
8692/* Examine all relocs referencing .toc sections in order to remove
8693 unused .toc entries. */
8694
8695bfd_boolean
33c0ec9d 8696ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8697{
8698 bfd *ibfd;
8699 struct adjust_toc_info toc_inf;
67f0cbdb 8700 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8701
67f0cbdb 8702 htab->do_toc_opt = 1;
c5614fa4 8703 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8704 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8705 {
8706 asection *toc, *sec;
8707 Elf_Internal_Shdr *symtab_hdr;
8708 Elf_Internal_Sym *local_syms;
425b145b 8709 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8710 unsigned long *skip, *drop;
8711 unsigned char *used;
8712 unsigned char *keep, last, some_unused;
8713
854b41e7
AM
8714 if (!is_ppc64_elf (ibfd))
8715 continue;
8716
c5614fa4
AM
8717 toc = bfd_get_section_by_name (ibfd, ".toc");
8718 if (toc == NULL
92b7a70f 8719 || toc->size == 0
dbaa2011
AM
8720 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8721 || discarded_section (toc))
c5614fa4
AM
8722 continue;
8723
425b145b 8724 toc_relocs = NULL;
c5614fa4 8725 local_syms = NULL;
0ffa91dd 8726 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8727
8728 /* Look at sections dropped from the final link. */
8729 skip = NULL;
8730 relstart = NULL;
8731 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8732 {
8733 if (sec->reloc_count == 0
dbaa2011 8734 || !discarded_section (sec)
c5614fa4
AM
8735 || get_opd_info (sec)
8736 || (sec->flags & SEC_ALLOC) == 0
8737 || (sec->flags & SEC_DEBUGGING) != 0)
8738 continue;
8739
8740 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8741 if (relstart == NULL)
8742 goto error_ret;
8743
8744 /* Run through the relocs to see which toc entries might be
8745 unused. */
8746 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8747 {
8748 enum elf_ppc64_reloc_type r_type;
8749 unsigned long r_symndx;
8750 asection *sym_sec;
8751 struct elf_link_hash_entry *h;
8752 Elf_Internal_Sym *sym;
8753 bfd_vma val;
8754
8755 r_type = ELF64_R_TYPE (rel->r_info);
8756 switch (r_type)
8757 {
8758 default:
8759 continue;
8760
8761 case R_PPC64_TOC16:
8762 case R_PPC64_TOC16_LO:
8763 case R_PPC64_TOC16_HI:
8764 case R_PPC64_TOC16_HA:
8765 case R_PPC64_TOC16_DS:
8766 case R_PPC64_TOC16_LO_DS:
8767 break;
8768 }
8769
8770 r_symndx = ELF64_R_SYM (rel->r_info);
8771 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8772 r_symndx, ibfd))
8773 goto error_ret;
8774
8775 if (sym_sec != toc)
8776 continue;
8777
8778 if (h != NULL)
8779 val = h->root.u.def.value;
8780 else
8781 val = sym->st_value;
8782 val += rel->r_addend;
8783
8784 if (val >= toc->size)
8785 continue;
8786
8787 /* Anything in the toc ought to be aligned to 8 bytes.
8788 If not, don't mark as unused. */
8789 if (val & 7)
8790 continue;
8791
8792 if (skip == NULL)
8793 {
854b41e7 8794 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8795 if (skip == NULL)
8796 goto error_ret;
8797 }
8798
ba761f19 8799 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8800 }
8801
8802 if (elf_section_data (sec)->relocs != relstart)
8803 free (relstart);
8804 }
8805
ba761f19
AM
8806 /* For largetoc loads of address constants, we can convert
8807 . addis rx,2,addr@got@ha
8808 . ld ry,addr@got@l(rx)
8809 to
8810 . addis rx,2,addr@toc@ha
8811 . addi ry,rx,addr@toc@l
8812 when addr is within 2G of the toc pointer. This then means
8813 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8814
ba761f19
AM
8815 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8816 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8817 && toc->reloc_count != 0)
8818 {
8819 /* Read toc relocs. */
425b145b
AM
8820 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8821 info->keep_memory);
8822 if (toc_relocs == NULL)
ba761f19
AM
8823 goto error_ret;
8824
425b145b 8825 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8826 {
8827 enum elf_ppc64_reloc_type r_type;
8828 unsigned long r_symndx;
8829 asection *sym_sec;
8830 struct elf_link_hash_entry *h;
8831 Elf_Internal_Sym *sym;
8832 bfd_vma val, addr;
8833
8834 r_type = ELF64_R_TYPE (rel->r_info);
8835 if (r_type != R_PPC64_ADDR64)
8836 continue;
8837
8838 r_symndx = ELF64_R_SYM (rel->r_info);
8839 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8840 r_symndx, ibfd))
8841 goto error_ret;
8842
425b145b 8843 if (sym_sec == NULL
c27b8c2a 8844 || sym_sec->output_section == NULL
dbaa2011 8845 || discarded_section (sym_sec))
425b145b
AM
8846 continue;
8847
afe397ea 8848 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8849 continue;
8850
8851 if (h != NULL)
bddc25c9
AM
8852 {
8853 if (h->type == STT_GNU_IFUNC)
8854 continue;
8855 val = h->root.u.def.value;
8856 }
ba761f19 8857 else
bddc25c9
AM
8858 {
8859 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8860 continue;
8861 val = sym->st_value;
8862 }
ba761f19
AM
8863 val += rel->r_addend;
8864 val += sym_sec->output_section->vma + sym_sec->output_offset;
8865
8866 /* We don't yet know the exact toc pointer value, but we
8867 know it will be somewhere in the toc section. Don't
8868 optimize if the difference from any possible toc
8869 pointer is outside [ff..f80008000, 7fff7fff]. */
8870 addr = toc->output_section->vma + TOC_BASE_OFF;
8871 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8872 continue;
8873
8874 addr = toc->output_section->vma + toc->output_section->rawsize;
8875 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8876 continue;
8877
8878 if (skip == NULL)
8879 {
8880 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8881 if (skip == NULL)
8882 goto error_ret;
8883 }
8884
8885 skip[rel->r_offset >> 3]
425b145b 8886 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8887 }
ba761f19
AM
8888 }
8889
c5614fa4
AM
8890 if (skip == NULL)
8891 continue;
8892
8893 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8894 if (used == NULL)
8895 {
8896 error_ret:
c9594989 8897 if (symtab_hdr->contents != (unsigned char *) local_syms)
c5614fa4
AM
8898 free (local_syms);
8899 if (sec != NULL
c5614fa4
AM
8900 && elf_section_data (sec)->relocs != relstart)
8901 free (relstart);
c9594989 8902 if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 8903 free (toc_relocs);
c9594989 8904 free (skip);
c5614fa4
AM
8905 return FALSE;
8906 }
8907
30038c59
AM
8908 /* Now check all kept sections that might reference the toc.
8909 Check the toc itself last. */
8910 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8911 : ibfd->sections);
c5614fa4 8912 sec != NULL;
c5614fa4 8913 sec = (sec == toc ? NULL
c5614fa4 8914 : sec->next == NULL ? toc
30038c59 8915 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8916 : sec->next))
8917 {
8918 int repeat;
8919
8920 if (sec->reloc_count == 0
dbaa2011 8921 || discarded_section (sec)
c5614fa4
AM
8922 || get_opd_info (sec)
8923 || (sec->flags & SEC_ALLOC) == 0
8924 || (sec->flags & SEC_DEBUGGING) != 0)
8925 continue;
8926
854b41e7
AM
8927 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8928 info->keep_memory);
c5614fa4 8929 if (relstart == NULL)
2915c55b
JK
8930 {
8931 free (used);
8932 goto error_ret;
8933 }
c5614fa4
AM
8934
8935 /* Mark toc entries referenced as used. */
c5614fa4 8936 do
d4f1ee75
AM
8937 {
8938 repeat = 0;
8939 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8940 {
8941 enum elf_ppc64_reloc_type r_type;
8942 unsigned long r_symndx;
8943 asection *sym_sec;
8944 struct elf_link_hash_entry *h;
8945 Elf_Internal_Sym *sym;
8946 bfd_vma val;
98528052 8947
d4f1ee75 8948 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8949 switch (r_type)
8950 {
8951 case R_PPC64_TOC16:
8952 case R_PPC64_TOC16_LO:
8953 case R_PPC64_TOC16_HI:
8954 case R_PPC64_TOC16_HA:
8955 case R_PPC64_TOC16_DS:
8956 case R_PPC64_TOC16_LO_DS:
8957 /* In case we're taking addresses of toc entries. */
8958 case R_PPC64_ADDR64:
8959 break;
c5614fa4 8960
d4f1ee75
AM
8961 default:
8962 continue;
8963 }
c5614fa4 8964
d4f1ee75
AM
8965 r_symndx = ELF64_R_SYM (rel->r_info);
8966 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8967 r_symndx, ibfd))
8968 {
8969 free (used);
8970 goto error_ret;
8971 }
c5614fa4 8972
d4f1ee75
AM
8973 if (sym_sec != toc)
8974 continue;
c5614fa4 8975
d4f1ee75
AM
8976 if (h != NULL)
8977 val = h->root.u.def.value;
8978 else
8979 val = sym->st_value;
8980 val += rel->r_addend;
ba761f19 8981
d4f1ee75
AM
8982 if (val >= toc->size)
8983 continue;
ba761f19 8984
d4f1ee75
AM
8985 if ((skip[val >> 3] & can_optimize) != 0)
8986 {
8987 bfd_vma off;
8988 unsigned char opc;
8989
8990 switch (r_type)
8991 {
8992 case R_PPC64_TOC16_HA:
ba761f19 8993 break;
ba761f19 8994
d4f1ee75
AM
8995 case R_PPC64_TOC16_LO_DS:
8996 off = rel->r_offset;
8997 off += (bfd_big_endian (ibfd) ? -2 : 3);
8998 if (!bfd_get_section_contents (ibfd, sec, &opc,
8999 off, 1))
9000 {
9001 free (used);
9002 goto error_ret;
9003 }
9004 if ((opc & (0x3f << 2)) == (58u << 2))
9005 break;
1a0670f3 9006 /* Fall through. */
ba761f19 9007
d4f1ee75
AM
9008 default:
9009 /* Wrong sort of reloc, or not a ld. We may
9010 as well clear ref_from_discarded too. */
9011 skip[val >> 3] = 0;
9012 }
9013 }
9014
9015 if (sec != toc)
9016 used[val >> 3] = 1;
9017 /* For the toc section, we only mark as used if this
9018 entry itself isn't unused. */
9019 else if ((used[rel->r_offset >> 3]
9020 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9021 && !used[val >> 3])
9022 {
9023 /* Do all the relocs again, to catch reference
9024 chains. */
9025 repeat = 1;
9026 used[val >> 3] = 1;
9027 }
9028 }
9029 }
c5614fa4 9030 while (repeat);
854b41e7
AM
9031
9032 if (elf_section_data (sec)->relocs != relstart)
9033 free (relstart);
c5614fa4
AM
9034 }
9035
9036 /* Merge the used and skip arrays. Assume that TOC
9037 doublewords not appearing as either used or unused belong
de194d85 9038 to an entry more than one doubleword in size. */
c5614fa4
AM
9039 for (drop = skip, keep = used, last = 0, some_unused = 0;
9040 drop < skip + (toc->size + 7) / 8;
9041 ++drop, ++keep)
9042 {
9043 if (*keep)
9044 {
ba761f19
AM
9045 *drop &= ~ref_from_discarded;
9046 if ((*drop & can_optimize) != 0)
9047 some_unused = 1;
c5614fa4
AM
9048 last = 0;
9049 }
b140b010 9050 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9051 {
9052 some_unused = 1;
ba761f19 9053 last = ref_from_discarded;
c5614fa4
AM
9054 }
9055 else
9056 *drop = last;
9057 }
9058
9059 free (used);
9060
9061 if (some_unused)
9062 {
9063 bfd_byte *contents, *src;
9064 unsigned long off;
d62b3684 9065 Elf_Internal_Sym *sym;
ba761f19 9066 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9067
9068 /* Shuffle the toc contents, and at the same time convert the
9069 skip array from booleans into offsets. */
9070 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9071 goto error_ret;
9072
9073 elf_section_data (toc)->this_hdr.contents = contents;
9074
9075 for (src = contents, off = 0, drop = skip;
9076 src < contents + toc->size;
9077 src += 8, ++drop)
9078 {
ba761f19
AM
9079 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9080 off += 8;
c5614fa4
AM
9081 else if (off != 0)
9082 {
9083 *drop = off;
9084 memcpy (src - off, src, 8);
9085 }
9086 }
854b41e7 9087 *drop = off;
c5614fa4
AM
9088 toc->rawsize = toc->size;
9089 toc->size = src - contents - off;
9090
ba761f19
AM
9091 /* Adjust addends for relocs against the toc section sym,
9092 and optimize any accesses we can. */
c5614fa4
AM
9093 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9094 {
9095 if (sec->reloc_count == 0
dbaa2011 9096 || discarded_section (sec))
c5614fa4
AM
9097 continue;
9098
9099 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9100 info->keep_memory);
c5614fa4
AM
9101 if (relstart == NULL)
9102 goto error_ret;
9103
9104 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9105 {
9106 enum elf_ppc64_reloc_type r_type;
9107 unsigned long r_symndx;
9108 asection *sym_sec;
9109 struct elf_link_hash_entry *h;
854b41e7 9110 bfd_vma val;
c5614fa4
AM
9111
9112 r_type = ELF64_R_TYPE (rel->r_info);
9113 switch (r_type)
9114 {
9115 default:
9116 continue;
9117
9118 case R_PPC64_TOC16:
9119 case R_PPC64_TOC16_LO:
9120 case R_PPC64_TOC16_HI:
9121 case R_PPC64_TOC16_HA:
9122 case R_PPC64_TOC16_DS:
9123 case R_PPC64_TOC16_LO_DS:
9124 case R_PPC64_ADDR64:
9125 break;
9126 }
9127
9128 r_symndx = ELF64_R_SYM (rel->r_info);
9129 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9130 r_symndx, ibfd))
9131 goto error_ret;
9132
ba761f19 9133 if (sym_sec != toc)
c5614fa4
AM
9134 continue;
9135
ba761f19
AM
9136 if (h != NULL)
9137 val = h->root.u.def.value;
9138 else
9139 {
9140 val = sym->st_value;
9141 if (val != 0)
9142 local_toc_syms = TRUE;
9143 }
9144
9145 val += rel->r_addend;
854b41e7
AM
9146
9147 if (val > toc->rawsize)
9148 val = toc->rawsize;
ba761f19
AM
9149 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9150 continue;
9151 else if ((skip[val >> 3] & can_optimize) != 0)
9152 {
9153 Elf_Internal_Rela *tocrel
425b145b 9154 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9155 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9156
9157 switch (r_type)
9158 {
9159 case R_PPC64_TOC16_HA:
9160 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9161 break;
9162
9163 case R_PPC64_TOC16_LO_DS:
9164 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9165 break;
9166
9167 default:
28942f62
AM
9168 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9169 ppc_howto_init ();
b140b010 9170 info->callbacks->einfo
695344c0 9171 /* xgettext:c-format */
174d0a74 9172 (_("%H: %s references "
b140b010
AM
9173 "optimized away TOC entry\n"),
9174 ibfd, sec, rel->r_offset,
9175 ppc64_elf_howto_table[r_type]->name);
9176 bfd_set_error (bfd_error_bad_value);
9177 goto error_ret;
ba761f19
AM
9178 }
9179 rel->r_addend = tocrel->r_addend;
9180 elf_section_data (sec)->relocs = relstart;
9181 continue;
9182 }
9183
9184 if (h != NULL || sym->st_value != 0)
9185 continue;
854b41e7
AM
9186
9187 rel->r_addend -= skip[val >> 3];
9188 elf_section_data (sec)->relocs = relstart;
c5614fa4 9189 }
854b41e7
AM
9190
9191 if (elf_section_data (sec)->relocs != relstart)
9192 free (relstart);
c5614fa4
AM
9193 }
9194
9195 /* We shouldn't have local or global symbols defined in the TOC,
9196 but handle them anyway. */
df22d223
AM
9197 if (local_syms != NULL)
9198 for (sym = local_syms;
9199 sym < local_syms + symtab_hdr->sh_info;
9200 ++sym)
9201 if (sym->st_value != 0
9202 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9203 {
9204 unsigned long i;
854b41e7 9205
df22d223
AM
9206 if (sym->st_value > toc->rawsize)
9207 i = toc->rawsize >> 3;
9208 else
9209 i = sym->st_value >> 3;
854b41e7 9210
df22d223
AM
9211 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9212 {
9213 if (local_toc_syms)
4eca0228 9214 _bfd_error_handler
df22d223
AM
9215 (_("%s defined on removed toc entry"),
9216 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9217 do
9218 ++i;
9219 while ((skip[i] & (ref_from_discarded | can_optimize)));
9220 sym->st_value = (bfd_vma) i << 3;
9221 }
d62b3684 9222
df22d223
AM
9223 sym->st_value -= skip[i];
9224 symtab_hdr->contents = (unsigned char *) local_syms;
9225 }
c5614fa4 9226
854b41e7 9227 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9228 if (toc_inf.global_toc_syms)
9229 {
9230 toc_inf.toc = toc;
9231 toc_inf.skip = skip;
9232 toc_inf.global_toc_syms = FALSE;
9233 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9234 &toc_inf);
9235 }
854b41e7
AM
9236
9237 if (toc->reloc_count != 0)
9238 {
d4730f92 9239 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9240 Elf_Internal_Rela *wrel;
9241 bfd_size_type sz;
9242
854b41e7 9243 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9244 if (toc_relocs == NULL)
9245 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9246 info->keep_memory);
9247 if (toc_relocs == NULL)
9248 goto error_ret;
9249
425b145b
AM
9250 wrel = toc_relocs;
9251 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9252 if ((skip[rel->r_offset >> 3]
9253 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9254 {
9255 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9256 wrel->r_info = rel->r_info;
9257 wrel->r_addend = rel->r_addend;
9258 ++wrel;
9259 }
9260 else if (!dec_dynrel_count (rel->r_info, toc, info,
9261 &local_syms, NULL, NULL))
9262 goto error_ret;
9263
425b145b
AM
9264 elf_section_data (toc)->relocs = toc_relocs;
9265 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9266 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9267 sz = rel_hdr->sh_entsize;
9268 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9269 }
c5614fa4 9270 }
c9594989 9271 else if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 9272 free (toc_relocs);
c5614fa4
AM
9273
9274 if (local_syms != NULL
9275 && symtab_hdr->contents != (unsigned char *) local_syms)
9276 {
9277 if (!info->keep_memory)
9278 free (local_syms);
9279 else
9280 symtab_hdr->contents = (unsigned char *) local_syms;
9281 }
9282 free (skip);
9283 }
9284
066f4018 9285 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9286 a GOT relative or PC relative access, possibly reducing the
9287 number of GOT entries. */
066f4018
AM
9288 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9289 {
9290 asection *sec;
9291 Elf_Internal_Shdr *symtab_hdr;
9292 Elf_Internal_Sym *local_syms;
9293 Elf_Internal_Rela *relstart, *rel;
9294 bfd_vma got;
9295
9296 if (!is_ppc64_elf (ibfd))
9297 continue;
9298
903b777d 9299 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9300 continue;
9301
9302 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9303 got = 0;
9304 if (sec != NULL)
9305 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9306
9307 local_syms = NULL;
9308 symtab_hdr = &elf_symtab_hdr (ibfd);
9309
9310 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9311 {
9312 if (sec->reloc_count == 0
903b777d 9313 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9314 || discarded_section (sec))
9315 continue;
9316
9317 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9318 info->keep_memory);
9319 if (relstart == NULL)
9320 {
9321 got_error_ret:
c9594989 9322 if (symtab_hdr->contents != (unsigned char *) local_syms)
066f4018
AM
9323 free (local_syms);
9324 if (sec != NULL
066f4018
AM
9325 && elf_section_data (sec)->relocs != relstart)
9326 free (relstart);
9327 return FALSE;
9328 }
9329
9330 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9331 {
9332 enum elf_ppc64_reloc_type r_type;
9333 unsigned long r_symndx;
9334 Elf_Internal_Sym *sym;
9335 asection *sym_sec;
9336 struct elf_link_hash_entry *h;
9337 struct got_entry *ent;
133a1f60 9338 bfd_vma val, pc;
4a421c53 9339 unsigned char buf[8];
066f4018 9340 unsigned int insn;
903b777d 9341 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9342
9343 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9344 switch (r_type)
9345 {
9346 default:
9347 insn_check = no_check;
9348 break;
9349
9350 case R_PPC64_PLT16_HA:
9351 case R_PPC64_GOT_TLSLD16_HA:
9352 case R_PPC64_GOT_TLSGD16_HA:
9353 case R_PPC64_GOT_TPREL16_HA:
9354 case R_PPC64_GOT_DTPREL16_HA:
9355 case R_PPC64_GOT16_HA:
9356 case R_PPC64_TOC16_HA:
9357 insn_check = check_ha;
9358 break;
9359
9360 case R_PPC64_PLT16_LO:
9361 case R_PPC64_PLT16_LO_DS:
9362 case R_PPC64_GOT_TLSLD16_LO:
9363 case R_PPC64_GOT_TLSGD16_LO:
9364 case R_PPC64_GOT_TPREL16_LO_DS:
9365 case R_PPC64_GOT_DTPREL16_LO_DS:
9366 case R_PPC64_GOT16_LO:
9367 case R_PPC64_GOT16_LO_DS:
9368 case R_PPC64_TOC16_LO:
9369 case R_PPC64_TOC16_LO_DS:
9370 insn_check = check_lo;
9371 break;
9372 }
9373
9374 if (insn_check != no_check)
9375 {
9376 bfd_vma off = rel->r_offset & ~3;
9377
9378 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9379 goto got_error_ret;
9380
9381 insn = bfd_get_32 (ibfd, buf);
9382 if (insn_check == check_lo
9383 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9384 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9385 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9386 {
9387 char str[12];
9388
9389 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9390 sprintf (str, "%#08x", insn);
9391 info->callbacks->einfo
9392 /* xgettext:c-format */
9393 (_("%H: got/toc optimization is not supported for"
9394 " %s instruction\n"),
9395 ibfd, sec, rel->r_offset & ~3, str);
9396 continue;
9397 }
9398 }
9399
066f4018
AM
9400 switch (r_type)
9401 {
bb22a418
AM
9402 /* Note that we don't delete GOT entries for
9403 R_PPC64_GOT16_DS since we'd need a lot more
9404 analysis. For starters, the preliminary layout is
9405 before the GOT, PLT, dynamic sections and stubs are
9406 laid out. Then we'd need to allow for changes in
9407 distance between sections caused by alignment. */
066f4018
AM
9408 default:
9409 continue;
9410
066f4018
AM
9411 case R_PPC64_GOT16_HA:
9412 case R_PPC64_GOT16_LO_DS:
4a421c53 9413 case R_PPC64_GOT_PCREL34:
066f4018
AM
9414 break;
9415 }
9416
9417 r_symndx = ELF64_R_SYM (rel->r_info);
9418 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9419 r_symndx, ibfd))
9420 goto got_error_ret;
9421
6d5554a6
AM
9422 if (sym_sec == NULL
9423 || sym_sec->output_section == NULL
9424 || discarded_section (sym_sec))
9425 continue;
9426
06507dab
AM
9427 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9428 continue;
9429
066f4018
AM
9430 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9431 continue;
9432
9433 if (h != NULL)
9434 val = h->root.u.def.value;
9435 else
9436 val = sym->st_value;
133a1f60 9437 val += rel->r_addend;
066f4018
AM
9438 val += sym_sec->output_section->vma + sym_sec->output_offset;
9439
bb22a418
AM
9440/* Fudge factor to allow for the fact that the preliminary layout
9441 isn't exact. Reduce limits by this factor. */
9442#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9443
066f4018
AM
9444 switch (r_type)
9445 {
9446 default:
9447 continue;
9448
066f4018 9449 case R_PPC64_GOT16_HA:
bb22a418
AM
9450 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9451 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9452 continue;
9453
9454 if (!bfd_get_section_contents (ibfd, sec, buf,
9455 rel->r_offset & ~3, 4))
9456 goto got_error_ret;
9457 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9458 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9459 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9460 continue;
9461 break;
9462
9463 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9464 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9465 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9466 continue;
9467 if (!bfd_get_section_contents (ibfd, sec, buf,
9468 rel->r_offset & ~3, 4))
9469 goto got_error_ret;
9470 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9471 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9472 continue;
9473 break;
4a421c53
AM
9474
9475 case R_PPC64_GOT_PCREL34:
9476 pc = rel->r_offset;
9477 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9478 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9479 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9480 continue;
9481 if (!bfd_get_section_contents (ibfd, sec, buf,
9482 rel->r_offset & ~3, 8))
9483 goto got_error_ret;
9484 insn = bfd_get_32 (ibfd, buf);
9485 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9486 continue;
9487 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9488 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9489 continue;
9490 break;
066f4018 9491 }
bb22a418 9492#undef LIMIT_ADJUST
066f4018
AM
9493
9494 if (h != NULL)
9495 ent = h->got.glist;
9496 else
9497 {
9498 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9499 ent = local_got_ents[r_symndx];
9500 }
9501 for (; ent != NULL; ent = ent->next)
133a1f60 9502 if (ent->addend == rel->r_addend
066f4018
AM
9503 && ent->owner == ibfd
9504 && ent->tls_type == 0)
9505 break;
9506 BFD_ASSERT (ent && ent->got.refcount > 0);
9507 ent->got.refcount -= 1;
9508 }
9509
9510 if (elf_section_data (sec)->relocs != relstart)
9511 free (relstart);
9512 }
9513
9514 if (local_syms != NULL
9515 && symtab_hdr->contents != (unsigned char *) local_syms)
9516 {
9517 if (!info->keep_memory)
9518 free (local_syms);
9519 else
9520 symtab_hdr->contents = (unsigned char *) local_syms;
9521 }
9522 }
9523
c5614fa4
AM
9524 return TRUE;
9525}
9526
1bbe0902
AM
9527/* Return true iff input section I references the TOC using
9528 instructions limited to +/-32k offsets. */
9529
9530bfd_boolean
9531ppc64_elf_has_small_toc_reloc (asection *i)
9532{
9533 return (is_ppc64_elf (i->owner)
9534 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9535}
9536
927be08e
AM
9537/* Allocate space for one GOT entry. */
9538
9539static void
9540allocate_got (struct elf_link_hash_entry *h,
9541 struct bfd_link_info *info,
9542 struct got_entry *gent)
9543{
9544 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9545 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9546 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9547 ? 16 : 8);
9548 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9549 ? 2 : 1) * sizeof (Elf64_External_Rela);
9550 asection *got = ppc64_elf_tdata (gent->owner)->got;
9551
9552 gent->got.offset = got->size;
9553 got->size += entsize;
9554
19e08130 9555 if (h->type == STT_GNU_IFUNC)
927be08e 9556 {
33e44f2e 9557 htab->elf.irelplt->size += rentsize;
19e08130 9558 htab->got_reli_size += rentsize;
927be08e 9559 }
f15d0b54 9560 else if (((bfd_link_pic (info)
f749f26e 9561 && !(gent->tls_type != 0
f15d0b54
AM
9562 && bfd_link_executable (info)
9563 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9564 || (htab->elf.dynamic_sections_created
9565 && h->dynindx != -1
9566 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9567 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9568 {
19e08130 9569 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9570 relgot->size += rentsize;
927be08e
AM
9571 }
9572}
9573
7865406b
AM
9574/* This function merges got entries in the same toc group. */
9575
9576static void
9577merge_got_entries (struct got_entry **pent)
9578{
9579 struct got_entry *ent, *ent2;
9580
9581 for (ent = *pent; ent != NULL; ent = ent->next)
9582 if (!ent->is_indirect)
9583 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9584 if (!ent2->is_indirect
9585 && ent2->addend == ent->addend
9586 && ent2->tls_type == ent->tls_type
9587 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9588 {
9589 ent2->is_indirect = TRUE;
9590 ent2->got.ent = ent;
9591 }
9592}
9593
46434633 9594/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9595
9596static bfd_boolean
46434633
AM
9597ensure_undef_dynamic (struct bfd_link_info *info,
9598 struct elf_link_hash_entry *h)
f0158f44
AM
9599{
9600 struct elf_link_hash_table *htab = elf_hash_table (info);
9601
9602 if (htab->dynamic_sections_created
46434633
AM
9603 && ((info->dynamic_undefined_weak != 0
9604 && h->root.type == bfd_link_hash_undefweak)
9605 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9606 && h->dynindx == -1
9607 && !h->forced_local
9608 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9609 return bfd_elf_link_record_dynamic_symbol (info, h);
9610 return TRUE;
9611}
9612
65f38f15
AM
9613/* Allocate space in .plt, .got and associated reloc sections for
9614 dynamic relocs. */
5bd4f169 9615
b34976b6 9616static bfd_boolean
4ce794b7 9617allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9618{
65f38f15
AM
9619 struct bfd_link_info *info;
9620 struct ppc_link_hash_table *htab;
5bd4f169 9621 asection *s;
65f38f15 9622 struct ppc_link_hash_entry *eh;
0b8bcf0d 9623 struct got_entry **pgent, *gent;
5bd4f169 9624
e92d460e 9625 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9626 return TRUE;
5bd4f169 9627
65f38f15
AM
9628 info = (struct bfd_link_info *) inf;
9629 htab = ppc_hash_table (info);
4dfe6ac6
NC
9630 if (htab == NULL)
9631 return FALSE;
5bd4f169 9632
ed7007c1 9633 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9634 /* Run through the TLS GD got entries first if we're changing them
9635 to TPREL. */
b00a0a86 9636 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9637 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9638 if (gent->got.refcount > 0
9639 && (gent->tls_type & TLS_GD) != 0)
9640 {
9641 /* This was a GD entry that has been converted to TPREL. If
9642 there happens to be a TPREL entry we can use that one. */
9643 struct got_entry *ent;
9644 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9645 if (ent->got.refcount > 0
9646 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9647 && ent->addend == gent->addend
9648 && ent->owner == gent->owner)
951fd09b
AM
9649 {
9650 gent->got.refcount = 0;
9651 break;
9652 }
9653
9654 /* If not, then we'll be using our own TPREL entry. */
9655 if (gent->got.refcount != 0)
9656 gent->tls_type = TLS_TLS | TLS_TPREL;
9657 }
9658
7865406b
AM
9659 /* Remove any list entry that won't generate a word in the GOT before
9660 we call merge_got_entries. Otherwise we risk merging to empty
9661 entries. */
0b8bcf0d
AM
9662 pgent = &h->got.glist;
9663 while ((gent = *pgent) != NULL)
411e1bfb 9664 if (gent->got.refcount > 0)
7865406b
AM
9665 {
9666 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9667 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9668 {
9669 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9670 *pgent = gent->next;
9671 }
9672 else
9673 pgent = &gent->next;
9674 }
9675 else
9676 *pgent = gent->next;
9677
9678 if (!htab->do_multi_toc)
9679 merge_got_entries (&h->got.glist);
9680
9681 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9682 if (!gent->is_indirect)
411e1bfb 9683 {
ec73ddcd
AM
9684 /* Ensure we catch all the cases where this symbol should
9685 be made dynamic. */
46434633 9686 if (!ensure_undef_dynamic (info, h))
f0158f44 9687 return FALSE;
65f38f15 9688
0c8d6e5c 9689 if (!is_ppc64_elf (gent->owner))
927be08e 9690 abort ();
0ffa91dd 9691
927be08e 9692 allocate_got (h, info, gent);
411e1bfb 9693 }
65f38f15 9694
954b63d4
AM
9695 /* If no dynamic sections we can't have dynamic relocs, except for
9696 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9697 if (!htab->elf.dynamic_sections_created
9698 && h->type != STT_GNU_IFUNC)
190eb1dd 9699 h->dyn_relocs = NULL;
8a2058b5 9700
529fe20e
AM
9701 /* Discard relocs on undefined symbols that must be local. */
9702 else if (h->root.type == bfd_link_hash_undefined
9703 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 9704 h->dyn_relocs = NULL;
529fe20e 9705
954b63d4
AM
9706 /* Also discard relocs on undefined weak syms with non-default
9707 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9708 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 9709 h->dyn_relocs = NULL;
954b63d4 9710
190eb1dd 9711 if (h->dyn_relocs != NULL)
65f38f15 9712 {
8a2058b5
AM
9713 struct elf_dyn_relocs *p, **pp;
9714
57e7d118
AM
9715 /* In the shared -Bsymbolic case, discard space allocated for
9716 dynamic pc-relative relocs against symbols which turn out to
9717 be defined in regular objects. For the normal shared case,
9718 discard space for relocs that have become local due to symbol
9719 visibility changes. */
57e7d118 9720 if (bfd_link_pic (info))
65f38f15 9721 {
57e7d118
AM
9722 /* Relocs that use pc_count are those that appear on a call
9723 insn, or certain REL relocs (see must_be_dyn_reloc) that
9724 can be generated via assembly. We want calls to
9725 protected symbols to resolve directly to the function
9726 rather than going via the plt. If people want function
9727 pointer comparisons to work as expected then they should
9728 avoid writing weird assembly. */
9729 if (SYMBOL_CALLS_LOCAL (info, h))
9730 {
190eb1dd 9731 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
57e7d118
AM
9732 {
9733 p->count -= p->pc_count;
9734 p->pc_count = 0;
9735 if (p->count == 0)
9736 *pp = p->next;
9737 else
9738 pp = &p->next;
9739 }
9740 }
65f38f15 9741
190eb1dd 9742 if (h->dyn_relocs != NULL)
5bd4f169 9743 {
ec73ddcd
AM
9744 /* Ensure we catch all the cases where this symbol
9745 should be made dynamic. */
46434633 9746 if (!ensure_undef_dynamic (info, h))
f0158f44 9747 return FALSE;
5bd4f169 9748 }
65f38f15 9749 }
ec73ddcd
AM
9750
9751 /* For a fixed position executable, discard space for
9752 relocs against symbols which are not dynamic. */
9753 else if (h->type != STT_GNU_IFUNC)
57e7d118 9754 {
529fe20e
AM
9755 if (h->dynamic_adjusted
9756 && !h->def_regular
9757 && !ELF_COMMON_DEF_P (h))
f0158f44 9758 {
ec73ddcd
AM
9759 /* Ensure we catch all the cases where this symbol
9760 should be made dynamic. */
46434633 9761 if (!ensure_undef_dynamic (info, h))
f0158f44 9762 return FALSE;
dfbb6ac9 9763
ec73ddcd 9764 /* But if that didn't work out, discard dynamic relocs. */
f0158f44 9765 if (h->dynindx == -1)
190eb1dd 9766 h->dyn_relocs = NULL;
f0158f44
AM
9767 }
9768 else
190eb1dd 9769 h->dyn_relocs = NULL;
57e7d118
AM
9770 }
9771
9772 /* Finally, allocate space. */
190eb1dd 9773 for (p = h->dyn_relocs; p != NULL; p = p->next)
57e7d118
AM
9774 {
9775 asection *sreloc = elf_section_data (p->sec)->sreloc;
9776 if (eh->elf.type == STT_GNU_IFUNC)
9777 sreloc = htab->elf.irelplt;
9778 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9779 }
65f38f15 9780 }
57e7d118 9781
2d7ad24e
AM
9782 /* We might need a PLT entry when the symbol
9783 a) is dynamic, or
9784 b) is an ifunc, or
9785 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9786 d) has plt16 relocs and we are linking statically. */
9787 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9788 || h->type == STT_GNU_IFUNC
9789 || (h->needs_plt && h->dynamic_adjusted)
9790 || (h->needs_plt
9791 && h->def_regular
9792 && !htab->elf.dynamic_sections_created
3e04d765 9793 && !htab->can_convert_all_inline_plt
ed7007c1 9794 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9795 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9796 {
57e7d118
AM
9797 struct plt_entry *pent;
9798 bfd_boolean doneone = FALSE;
9799 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9800 if (pent->plt.refcount > 0)
9801 {
9802 if (!htab->elf.dynamic_sections_created
9803 || h->dynindx == -1)
9804 {
2d7ad24e
AM
9805 if (h->type == STT_GNU_IFUNC)
9806 {
9807 s = htab->elf.iplt;
9808 pent->plt.offset = s->size;
9809 s->size += PLT_ENTRY_SIZE (htab);
9810 s = htab->elf.irelplt;
9811 }
9812 else
9813 {
9814 s = htab->pltlocal;
9815 pent->plt.offset = s->size;
9816 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9817 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9818 }
57e7d118
AM
9819 }
9820 else
9821 {
9822 /* If this is the first .plt entry, make room for the special
9823 first entry. */
9824 s = htab->elf.splt;
9825 if (s->size == 0)
9826 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9827
57e7d118 9828 pent->plt.offset = s->size;
65f38f15 9829
57e7d118
AM
9830 /* Make room for this entry. */
9831 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9832
57e7d118
AM
9833 /* Make room for the .glink code. */
9834 s = htab->glink;
9835 if (s->size == 0)
9e390558 9836 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9837 if (htab->opd_abi)
9838 {
9839 /* We need bigger stubs past index 32767. */
9e390558 9840 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9841 s->size += 4;
9842 s->size += 2*4;
9843 }
9844 else
9845 s->size += 4;
65f38f15 9846
57e7d118
AM
9847 /* We also need to make an entry in the .rela.plt section. */
9848 s = htab->elf.srelplt;
9849 }
2d7ad24e
AM
9850 if (s != NULL)
9851 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9852 doneone = TRUE;
9853 }
9854 else
9855 pent->plt.offset = (bfd_vma) -1;
9856 if (!doneone)
9857 {
9858 h->plt.plist = NULL;
9859 h->needs_plt = 0;
9860 }
65f38f15 9861 }
57e7d118 9862 else
65f38f15 9863 {
57e7d118
AM
9864 h->plt.plist = NULL;
9865 h->needs_plt = 0;
65f38f15
AM
9866 }
9867
b34976b6 9868 return TRUE;
65f38f15
AM
9869}
9870
9e390558
AM
9871#define PPC_LO(v) ((v) & 0xffff)
9872#define PPC_HI(v) (((v) >> 16) & 0xffff)
9873#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9874#define D34(v) \
9875 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9876#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9877
a345bc8d
AM
9878/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9879 to set up space for global entry stubs. These are put in glink,
9880 after the branch table. */
65f38f15 9881
b34976b6 9882static bfd_boolean
a345bc8d 9883size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9884{
a345bc8d
AM
9885 struct bfd_link_info *info;
9886 struct ppc_link_hash_table *htab;
9887 struct plt_entry *pent;
9e390558 9888 asection *s, *plt;
65f38f15 9889
a345bc8d
AM
9890 if (h->root.type == bfd_link_hash_indirect)
9891 return TRUE;
65f38f15 9892
a345bc8d
AM
9893 if (!h->pointer_equality_needed)
9894 return TRUE;
65f38f15 9895
a345bc8d
AM
9896 if (h->def_regular)
9897 return TRUE;
65f38f15 9898
a345bc8d
AM
9899 info = inf;
9900 htab = ppc_hash_table (info);
9901 if (htab == NULL)
9902 return FALSE;
9903
9e390558
AM
9904 s = htab->global_entry;
9905 plt = htab->elf.splt;
a345bc8d
AM
9906 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9907 if (pent->plt.offset != (bfd_vma) -1
9908 && pent->addend == 0)
9909 {
afe397ea
AM
9910 /* For ELFv2, if this symbol is not defined in a regular file
9911 and we are not generating a shared library or pie, then we
9912 need to define the symbol in the executable on a call stub.
9913 This is to avoid text relocations. */
9e390558
AM
9914 bfd_vma off, stub_align, stub_off, stub_size;
9915 unsigned int align_power;
9916
9917 stub_size = 16;
9918 stub_off = s->size;
9919 if (htab->params->plt_stub_align >= 0)
9920 align_power = htab->params->plt_stub_align;
9921 else
9922 align_power = -htab->params->plt_stub_align;
9923 /* Setting section alignment is delayed until we know it is
9924 non-empty. Otherwise the .text output section will be
9925 aligned at least to plt_stub_align even when no global
9926 entry stubs are needed. */
9927 if (s->alignment_power < align_power)
9928 s->alignment_power = align_power;
9929 stub_align = (bfd_vma) 1 << align_power;
9930 if (htab->params->plt_stub_align >= 0
9931 || ((((stub_off + stub_size - 1) & -stub_align)
9932 - (stub_off & -stub_align))
9933 > ((stub_size - 1) & -stub_align)))
9934 stub_off = (stub_off + stub_align - 1) & -stub_align;
9935 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9936 off -= stub_off + s->output_offset + s->output_section->vma;
9937 /* Note that for --plt-stub-align negative we have a possible
9938 dependency between stub offset and size. Break that
9939 dependency by assuming the max stub size when calculating
9940 the stub offset. */
9941 if (PPC_HA (off) == 0)
9942 stub_size -= 4;
8a2058b5 9943 h->root.type = bfd_link_hash_defined;
afe397ea 9944 h->root.u.def.section = s;
9e390558
AM
9945 h->root.u.def.value = stub_off;
9946 s->size = stub_off + stub_size;
a345bc8d
AM
9947 break;
9948 }
9949 return TRUE;
9950}
9951
65f38f15
AM
9952/* Set the sizes of the dynamic sections. */
9953
b34976b6 9954static bfd_boolean
ee67d69a 9955ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9956 struct bfd_link_info *info)
65f38f15
AM
9957{
9958 struct ppc_link_hash_table *htab;
9959 bfd *dynobj;
9960 asection *s;
b34976b6 9961 bfd_boolean relocs;
65f38f15 9962 bfd *ibfd;
7865406b 9963 struct got_entry *first_tlsld;
65f38f15
AM
9964
9965 htab = ppc_hash_table (info);
4dfe6ac6
NC
9966 if (htab == NULL)
9967 return FALSE;
9968
65f38f15
AM
9969 dynobj = htab->elf.dynobj;
9970 if (dynobj == NULL)
9971 abort ();
9972
9973 if (htab->elf.dynamic_sections_created)
9974 {
9975 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9976 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9977 {
3d4d4302 9978 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9979 if (s == NULL)
9980 abort ();
eea6121a 9981 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9982 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9983 }
9984 }
9985
9986 /* Set up .got offsets for local syms, and space for local dynamic
9987 relocs. */
c72f2fb2 9988 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9989 {
411e1bfb
AM
9990 struct got_entry **lgot_ents;
9991 struct got_entry **end_lgot_ents;
e054468f
AM
9992 struct plt_entry **local_plt;
9993 struct plt_entry **end_local_plt;
f961d9dd 9994 unsigned char *lgot_masks;
65f38f15
AM
9995 bfd_size_type locsymcount;
9996 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9997
0c8d6e5c 9998 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9999 continue;
10000
10001 for (s = ibfd->sections; s != NULL; s = s->next)
10002 {
19e08130 10003 struct ppc_dyn_relocs *p;
65f38f15 10004
6edfbbad 10005 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 10006 {
ec338859
AM
10007 if (!bfd_is_abs_section (p->sec)
10008 && bfd_is_abs_section (p->sec->output_section))
10009 {
10010 /* Input section has been discarded, either because
10011 it is a copy of a linkonce section or due to
10012 linker script /DISCARD/, so we'll be discarding
10013 the relocs too. */
10014 }
248866a8 10015 else if (p->count != 0)
ec338859 10016 {
19e08130
AM
10017 asection *srel = elf_section_data (p->sec)->sreloc;
10018 if (p->ifunc)
33e44f2e 10019 srel = htab->elf.irelplt;
eea6121a 10020 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
10021 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10022 info->flags |= DF_TEXTREL;
ec338859 10023 }
65f38f15
AM
10024 }
10025 }
10026
411e1bfb
AM
10027 lgot_ents = elf_local_got_ents (ibfd);
10028 if (!lgot_ents)
65f38f15
AM
10029 continue;
10030
0ffa91dd 10031 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 10032 locsymcount = symtab_hdr->sh_info;
411e1bfb 10033 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
10034 local_plt = (struct plt_entry **) end_lgot_ents;
10035 end_local_plt = local_plt + locsymcount;
f961d9dd 10036 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 10037 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 10038 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10039 {
0b8bcf0d 10040 struct got_entry **pent, *ent;
411e1bfb 10041
0b8bcf0d
AM
10042 pent = lgot_ents;
10043 while ((ent = *pent) != NULL)
411e1bfb
AM
10044 if (ent->got.refcount > 0)
10045 {
e7b938ca 10046 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10047 {
927be08e 10048 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10049 *pent = ent->next;
411e1bfb
AM
10050 }
10051 else
10052 {
19e08130
AM
10053 unsigned int ent_size = 8;
10054 unsigned int rel_size = sizeof (Elf64_External_Rela);
10055
eea6121a 10056 ent->got.offset = s->size;
e7b938ca 10057 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10058 {
19e08130
AM
10059 ent_size *= 2;
10060 rel_size *= 2;
10061 }
10062 s->size += ent_size;
37da22e5 10063 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10064 {
33e44f2e 10065 htab->elf.irelplt->size += rel_size;
19e08130
AM
10066 htab->got_reli_size += rel_size;
10067 }
93370e8e
AM
10068 else if (bfd_link_pic (info)
10069 && !(ent->tls_type != 0
10070 && bfd_link_executable (info)))
19e08130
AM
10071 {
10072 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10073 srel->size += rel_size;
927be08e 10074 }
0b8bcf0d 10075 pent = &ent->next;
411e1bfb
AM
10076 }
10077 }
10078 else
0b8bcf0d 10079 *pent = ent->next;
65f38f15 10080 }
e054468f 10081
2d7ad24e
AM
10082 /* Allocate space for plt calls to local syms. */
10083 lgot_masks = (unsigned char *) end_local_plt;
10084 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10085 {
10086 struct plt_entry *ent;
10087
10088 for (ent = *local_plt; ent != NULL; ent = ent->next)
10089 if (ent->plt.refcount > 0)
10090 {
2d7ad24e
AM
10091 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10092 {
10093 s = htab->elf.iplt;
10094 ent->plt.offset = s->size;
10095 s->size += PLT_ENTRY_SIZE (htab);
10096 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10097 }
3e04d765
AM
10098 else if (htab->can_convert_all_inline_plt
10099 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10100 ent->plt.offset = (bfd_vma) -1;
10101 else
10102 {
10103 s = htab->pltlocal;
10104 ent->plt.offset = s->size;
10105 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10106 if (bfd_link_pic (info))
10107 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10108 }
e054468f
AM
10109 }
10110 else
10111 ent->plt.offset = (bfd_vma) -1;
10112 }
65f38f15
AM
10113 }
10114
10115 /* Allocate global sym .plt and .got entries, and space for global
10116 sym dynamic relocs. */
4ce794b7 10117 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10118
0e1862bb 10119 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10120 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10121
7865406b 10122 first_tlsld = NULL;
c72f2fb2 10123 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10124 {
7865406b
AM
10125 struct got_entry *ent;
10126
0c8d6e5c 10127 if (!is_ppc64_elf (ibfd))
102890f0
AM
10128 continue;
10129
7865406b
AM
10130 ent = ppc64_tlsld_got (ibfd);
10131 if (ent->got.refcount > 0)
102890f0 10132 {
7865406b 10133 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10134 {
7865406b
AM
10135 ent->is_indirect = TRUE;
10136 ent->got.ent = first_tlsld;
10137 }
10138 else
10139 {
10140 if (first_tlsld == NULL)
10141 first_tlsld = ent;
10142 s = ppc64_elf_tdata (ibfd)->got;
10143 ent->got.offset = s->size;
10144 ent->owner = ibfd;
10145 s->size += 16;
f749f26e 10146 if (bfd_link_dll (info))
7865406b
AM
10147 {
10148 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10149 srel->size += sizeof (Elf64_External_Rela);
10150 }
102890f0
AM
10151 }
10152 }
10153 else
7865406b 10154 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10155 }
10156
65f38f15
AM
10157 /* We now have determined the sizes of the various dynamic sections.
10158 Allocate memory for them. */
b34976b6 10159 relocs = FALSE;
65f38f15
AM
10160 for (s = dynobj->sections; s != NULL; s = s->next)
10161 {
10162 if ((s->flags & SEC_LINKER_CREATED) == 0)
10163 continue;
10164
4ce794b7 10165 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10166 /* These haven't been allocated yet; don't strip. */
10167 continue;
33e44f2e
AM
10168 else if (s == htab->elf.sgot
10169 || s == htab->elf.splt
10170 || s == htab->elf.iplt
2d7ad24e 10171 || s == htab->pltlocal
c456f082 10172 || s == htab->glink
9e390558 10173 || s == htab->global_entry
5474d94f
AM
10174 || s == htab->elf.sdynbss
10175 || s == htab->elf.sdynrelro)
65f38f15
AM
10176 {
10177 /* Strip this section if we don't need it; see the
10178 comment below. */
5bd4f169 10179 }
58d180e8
AM
10180 else if (s == htab->glink_eh_frame)
10181 {
10182 if (!bfd_is_abs_section (s->output_section))
10183 /* Not sized yet. */
10184 continue;
10185 }
70cc837d 10186 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10187 {
c456f082 10188 if (s->size != 0)
5bd4f169 10189 {
33e44f2e 10190 if (s != htab->elf.srelplt)
b34976b6 10191 relocs = TRUE;
5bd4f169
AM
10192
10193 /* We use the reloc_count field as a counter if we need
10194 to copy relocs into the output file. */
10195 s->reloc_count = 0;
10196 }
10197 }
65f38f15 10198 else
5bd4f169
AM
10199 {
10200 /* It's not one of our sections, so don't allocate space. */
10201 continue;
10202 }
10203
eea6121a 10204 if (s->size == 0)
5bd4f169 10205 {
c456f082
AM
10206 /* If we don't need this section, strip it from the
10207 output file. This is mostly to handle .rela.bss and
10208 .rela.plt. We must create both sections in
10209 create_dynamic_sections, because they must be created
10210 before the linker maps input sections to output
10211 sections. The linker does that before
10212 adjust_dynamic_symbol is called, and it is that
10213 function which decides whether anything needs to go
10214 into these sections. */
8423293d 10215 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10216 continue;
10217 }
10218
06bcf541
AM
10219 if (bfd_is_abs_section (s->output_section))
10220 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10221 s->name);
10222
c456f082 10223 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10224 continue;
10225
65f38f15
AM
10226 /* Allocate memory for the section contents. We use bfd_zalloc
10227 here in case unused entries are not reclaimed before the
10228 section's contents are written out. This should not happen,
411e1bfb
AM
10229 but this way if it does we get a R_PPC64_NONE reloc in .rela
10230 sections instead of garbage.
10231 We also rely on the section contents being zero when writing
5474d94f 10232 the GOT and .dynrelro. */
eea6121a 10233 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10234 if (s->contents == NULL)
b34976b6 10235 return FALSE;
5bd4f169
AM
10236 }
10237
c72f2fb2 10238 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10239 {
0c8d6e5c 10240 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10241 continue;
10242
e717da7e 10243 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10244 if (s != NULL && s != htab->elf.sgot)
e717da7e 10245 {
eea6121a 10246 if (s->size == 0)
8423293d 10247 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10248 else
10249 {
eea6121a 10250 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10251 if (s->contents == NULL)
10252 return FALSE;
10253 }
10254 }
10255 s = ppc64_elf_tdata (ibfd)->relgot;
10256 if (s != NULL)
10257 {
eea6121a 10258 if (s->size == 0)
8423293d 10259 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10260 else
10261 {
eea6121a 10262 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10263 if (s->contents == NULL)
10264 return FALSE;
10265 relocs = TRUE;
10266 s->reloc_count = 0;
10267 }
10268 }
10269 }
10270
e86ce104 10271 if (htab->elf.dynamic_sections_created)
5bd4f169 10272 {
e8910a83
AM
10273 bfd_boolean tls_opt;
10274
5bd4f169
AM
10275 /* Add some entries to the .dynamic section. We fill in the
10276 values later, in ppc64_elf_finish_dynamic_sections, but we
10277 must add the entries now so that we get the correct size for
10278 the .dynamic section. The DT_DEBUG entry is filled in by the
10279 dynamic linker and used by the debugger. */
dc810e39 10280#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10281 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10282
0e1862bb 10283 if (bfd_link_executable (info))
5bd4f169 10284 {
dc810e39 10285 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10286 return FALSE;
5bd4f169
AM
10287 }
10288
33e44f2e 10289 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10290 {
dc810e39
AM
10291 if (!add_dynamic_entry (DT_PLTGOT, 0)
10292 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10293 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10294 || !add_dynamic_entry (DT_JMPREL, 0)
10295 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10296 return FALSE;
5bd4f169
AM
10297 }
10298
ee67d69a 10299 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10300 {
10301 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10302 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10303 return FALSE;
19397422
AM
10304 }
10305
7c9cf415 10306 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10307 && ((htab->tls_get_addr_fd != NULL
10308 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10309 || (htab->tga_desc_fd != NULL
10310 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10311 if (tls_opt || !htab->opd_abi)
10312 {
10313 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10314 return FALSE;
10315 }
a7f2871e 10316
5bd4f169
AM
10317 if (relocs)
10318 {
dc810e39
AM
10319 if (!add_dynamic_entry (DT_RELA, 0)
10320 || !add_dynamic_entry (DT_RELASZ, 0)
10321 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10322 return FALSE;
5bd4f169 10323
65f38f15
AM
10324 /* If any dynamic relocs apply to a read-only section,
10325 then we need a DT_TEXTREL entry. */
248866a8 10326 if ((info->flags & DF_TEXTREL) == 0)
d49e5065
L
10327 elf_link_hash_traverse (&htab->elf,
10328 _bfd_elf_maybe_set_textrel, info);
5bd4f169 10329
65f38f15 10330 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10331 {
65f38f15 10332 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10333 return FALSE;
5bd4f169 10334 }
5bd4f169 10335 }
5bd4f169 10336 }
65f38f15 10337#undef add_dynamic_entry
5bd4f169 10338
b34976b6 10339 return TRUE;
5bd4f169
AM
10340}
10341
a345bc8d
AM
10342/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10343
10344static bfd_boolean
10345ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10346{
10347 if (h->plt.plist != NULL
10348 && !h->def_regular
10349 && !h->pointer_equality_needed)
10350 return FALSE;
10351
10352 return _bfd_elf_hash_symbol (h);
10353}
10354
721956f4 10355/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10356
4ce794b7
AM
10357static inline enum ppc_stub_type
10358ppc_type_of_stub (asection *input_sec,
10359 const Elf_Internal_Rela *rel,
10360 struct ppc_link_hash_entry **hash,
e054468f 10361 struct plt_entry **plt_ent,
6911b7dc
AM
10362 bfd_vma destination,
10363 unsigned long local_off)
5bd4f169 10364{
721956f4
AM
10365 struct ppc_link_hash_entry *h = *hash;
10366 bfd_vma location;
10367 bfd_vma branch_offset;
10368 bfd_vma max_branch_offset;
4ce794b7 10369 enum elf_ppc64_reloc_type r_type;
5bd4f169 10370
721956f4
AM
10371 if (h != NULL)
10372 {
e054468f 10373 struct plt_entry *ent;
7fe2b9a6 10374 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10375 if (h->oh != NULL
10376 && h->oh->is_func_descriptor)
7b8f6675
AM
10377 {
10378 fdh = ppc_follow_link (h->oh);
10379 *hash = fdh;
10380 }
8387904d 10381
e054468f
AM
10382 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10383 if (ent->addend == rel->r_addend
10384 && ent->plt.offset != (bfd_vma) -1)
10385 {
e054468f
AM
10386 *plt_ent = ent;
10387 return ppc_stub_plt_call;
10388 }
5bd4f169 10389
7fe2b9a6
AM
10390 /* Here, we know we don't have a plt entry. If we don't have a
10391 either a defined function descriptor or a defined entry symbol
10392 in a regular object file, then it is pointless trying to make
10393 any other type of stub. */
854b41e7
AM
10394 if (!is_static_defined (&fdh->elf)
10395 && !is_static_defined (&h->elf))
721956f4 10396 return ppc_stub_none;
5d1634d7 10397 }
e054468f
AM
10398 else if (elf_local_got_ents (input_sec->owner) != NULL)
10399 {
10400 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10401 struct plt_entry **local_plt = (struct plt_entry **)
10402 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10403 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10404
10405 if (local_plt[r_symndx] != NULL)
10406 {
10407 struct plt_entry *ent;
10408
10409 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10410 if (ent->addend == rel->r_addend
10411 && ent->plt.offset != (bfd_vma) -1)
10412 {
10413 *plt_ent = ent;
10414 return ppc_stub_plt_call;
10415 }
10416 }
10417 }
5d1634d7 10418
721956f4
AM
10419 /* Determine where the call point is. */
10420 location = (input_sec->output_offset
10421 + input_sec->output_section->vma
10422 + rel->r_offset);
5d1634d7 10423
721956f4
AM
10424 branch_offset = destination - location;
10425 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10426
721956f4
AM
10427 /* Determine if a long branch stub is needed. */
10428 max_branch_offset = 1 << 25;
23cedd1d
AM
10429 if (r_type == R_PPC64_REL14
10430 || r_type == R_PPC64_REL14_BRTAKEN
10431 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10432 max_branch_offset = 1 << 15;
5d1634d7 10433
6911b7dc 10434 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10435 /* We need a stub. Figure out whether a long_branch or plt_branch
10436 is needed later. */
10437 return ppc_stub_long_branch;
5d1634d7 10438
721956f4 10439 return ppc_stub_none;
5d1634d7
AM
10440}
10441
f891966f
AM
10442/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10443 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10444 . mflr %r12
10445 . bcl 20,31,1f
10446 .1: mflr %r11
10447 . mtlr %r12
05d0e962 10448 . lis %r12,xxx-1b@highest
f891966f 10449 . ori %r12,%r12,xxx-1b@higher
05d0e962 10450 . sldi %r12,%r12,32
f891966f 10451 . oris %r12,%r12,xxx-1b@high
05d0e962 10452 . ori %r12,%r12,xxx-1b@l
f891966f 10453 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10454
10455static bfd_byte *
10456build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10457{
f891966f
AM
10458 bfd_put_32 (abfd, MFLR_R12, p);
10459 p += 4;
10460 bfd_put_32 (abfd, BCL_20_31, p);
10461 p += 4;
10462 bfd_put_32 (abfd, MFLR_R11, p);
10463 p += 4;
10464 bfd_put_32 (abfd, MTLR_R12, p);
10465 p += 4;
05d0e962
AM
10466 if (off + 0x8000 < 0x10000)
10467 {
10468 if (load)
10469 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10470 else
10471 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10472 p += 4;
10473 }
10474 else if (off + 0x80008000ULL < 0x100000000ULL)
10475 {
10476 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10477 p += 4;
10478 if (load)
10479 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10480 else
10481 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10482 p += 4;
10483 }
10484 else
10485 {
10486 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10487 {
10488 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10489 p += 4;
10490 }
10491 else
10492 {
10493 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10494 p += 4;
10495 if (((off >> 32) & 0xffff) != 0)
10496 {
10497 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10498 p += 4;
10499 }
10500 }
10501 if (((off >> 32) & 0xffffffffULL) != 0)
10502 {
10503 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10504 p += 4;
10505 }
10506 if (PPC_HI (off) != 0)
10507 {
10508 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10509 p += 4;
10510 }
10511 if (PPC_LO (off) != 0)
10512 {
10513 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10514 p += 4;
10515 }
10516 if (load)
10517 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10518 else
10519 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10520 p += 4;
10521 }
10522 return p;
10523}
10524
10525static unsigned int
10526size_offset (bfd_vma off)
10527{
10528 unsigned int size;
10529 if (off + 0x8000 < 0x10000)
10530 size = 4;
10531 else if (off + 0x80008000ULL < 0x100000000ULL)
10532 size = 8;
10533 else
10534 {
10535 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10536 size = 4;
10537 else
10538 {
10539 size = 4;
10540 if (((off >> 32) & 0xffff) != 0)
10541 size += 4;
10542 }
10543 if (((off >> 32) & 0xffffffffULL) != 0)
10544 size += 4;
10545 if (PPC_HI (off) != 0)
10546 size += 4;
10547 if (PPC_LO (off) != 0)
10548 size += 4;
10549 size += 4;
10550 }
f891966f 10551 return size + 16;
05d0e962
AM
10552}
10553
3d58e1fc
AM
10554static unsigned int
10555num_relocs_for_offset (bfd_vma off)
10556{
10557 unsigned int num_rel;
10558 if (off + 0x8000 < 0x10000)
10559 num_rel = 1;
10560 else if (off + 0x80008000ULL < 0x100000000ULL)
10561 num_rel = 2;
10562 else
10563 {
10564 num_rel = 1;
10565 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10566 && ((off >> 32) & 0xffff) != 0)
10567 num_rel += 1;
10568 if (PPC_HI (off) != 0)
10569 num_rel += 1;
10570 if (PPC_LO (off) != 0)
10571 num_rel += 1;
10572 }
10573 return num_rel;
10574}
10575
10576static Elf_Internal_Rela *
10577emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10578 bfd_vma roff, bfd_vma targ, bfd_vma off)
10579{
10580 bfd_vma relative_targ = targ - (roff - 8);
10581 if (bfd_big_endian (info->output_bfd))
10582 roff += 2;
10583 r->r_offset = roff;
10584 r->r_addend = relative_targ + roff;
10585 if (off + 0x8000 < 0x10000)
10586 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10587 else if (off + 0x80008000ULL < 0x100000000ULL)
10588 {
10589 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10590 ++r;
10591 roff += 4;
10592 r->r_offset = roff;
10593 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10594 r->r_addend = relative_targ + roff;
10595 }
10596 else
10597 {
10598 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10599 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10600 else
10601 {
10602 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10603 if (((off >> 32) & 0xffff) != 0)
10604 {
10605 ++r;
10606 roff += 4;
10607 r->r_offset = roff;
10608 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10609 r->r_addend = relative_targ + roff;
10610 }
10611 }
10612 if (((off >> 32) & 0xffffffffULL) != 0)
10613 roff += 4;
10614 if (PPC_HI (off) != 0)
10615 {
10616 ++r;
10617 roff += 4;
10618 r->r_offset = roff;
10619 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10620 r->r_addend = relative_targ + roff;
10621 }
10622 if (PPC_LO (off) != 0)
10623 {
10624 ++r;
10625 roff += 4;
10626 r->r_offset = roff;
10627 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10628 r->r_addend = relative_targ + roff;
10629 }
10630 }
10631 return r;
10632}
10633
04bdff6a 10634static bfd_byte *
7c1f4227 10635build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
04bdff6a
AM
10636 bfd_boolean load)
10637{
10638 uint64_t insn;
10639 if (off - odd + (1ULL << 33) < 1ULL << 34)
10640 {
10641 off -= odd;
10642 if (odd)
10643 {
10644 bfd_put_32 (abfd, NOP, p);
10645 p += 4;
10646 }
10647 if (load)
10648 insn = PLD_R12_PC;
10649 else
10650 insn = PADDI_R12_PC;
10651 insn |= D34 (off);
10652 bfd_put_32 (abfd, insn >> 32, p);
10653 p += 4;
10654 bfd_put_32 (abfd, insn, p);
10655 }
10656 /* The minimum value for paddi is -0x200000000. The minimum value
10657 for li is -0x8000, which when shifted by 34 and added gives a
10658 minimum value of -0x2000200000000. The maximum value is
10659 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10660 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10661 {
10662 off -= 8 - odd;
10663 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10664 p += 4;
10665 if (!odd)
10666 {
10667 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10668 p += 4;
10669 }
10670 insn = PADDI_R12_PC | D34 (off);
10671 bfd_put_32 (abfd, insn >> 32, p);
10672 p += 4;
10673 bfd_put_32 (abfd, insn, p);
10674 p += 4;
10675 if (odd)
10676 {
10677 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10678 p += 4;
10679 }
10680 if (load)
10681 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10682 else
10683 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10684 }
10685 else
10686 {
10687 off -= odd + 8;
10688 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10689 p += 4;
10690 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10691 p += 4;
10692 if (odd)
10693 {
10694 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10695 p += 4;
10696 }
10697 insn = PADDI_R12_PC | D34 (off);
10698 bfd_put_32 (abfd, insn >> 32, p);
10699 p += 4;
10700 bfd_put_32 (abfd, insn, p);
10701 p += 4;
10702 if (!odd)
10703 {
10704 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10705 p += 4;
10706 }
10707 if (load)
10708 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10709 else
10710 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10711 }
10712 p += 4;
10713 return p;
10714}
10715
10716static unsigned int
7c1f4227 10717size_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10718{
10719 if (off - odd + (1ULL << 33) < 1ULL << 34)
10720 return odd + 8;
10721 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10722 return 20;
10723 else
10724 return 24;
10725}
10726
10727static unsigned int
7c1f4227 10728num_relocs_for_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10729{
10730 if (off - odd + (1ULL << 33) < 1ULL << 34)
10731 return 1;
10732 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10733 return 2;
10734 else
10735 return 3;
10736}
10737
10738static Elf_Internal_Rela *
7c1f4227 10739emit_relocs_for_power10_offset (struct bfd_link_info *info,
04bdff6a
AM
10740 Elf_Internal_Rela *r, bfd_vma roff,
10741 bfd_vma targ, bfd_vma off, int odd)
10742{
10743 if (off - odd + (1ULL << 33) < 1ULL << 34)
10744 roff += odd;
10745 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10746 {
10747 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10748 r->r_offset = roff + d_offset;
10749 r->r_addend = targ + 8 - odd - d_offset;
10750 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10751 ++r;
10752 roff += 8 - odd;
10753 }
10754 else
10755 {
10756 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10757 r->r_offset = roff + d_offset;
10758 r->r_addend = targ + 8 + odd - d_offset;
10759 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10760 ++r;
10761 roff += 4;
10762 r->r_offset = roff + d_offset;
10763 r->r_addend = targ + 4 + odd - d_offset;
10764 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10765 ++r;
10766 roff += 4 + odd;
10767 }
10768 r->r_offset = roff;
10769 r->r_addend = targ;
10770 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10771 return r;
10772}
10773
df136d64
AM
10774/* Emit .eh_frame opcode to advance pc by DELTA. */
10775
10776static bfd_byte *
10777eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10778{
10779 delta /= 4;
10780 if (delta < 64)
10781 *eh++ = DW_CFA_advance_loc + delta;
10782 else if (delta < 256)
10783 {
10784 *eh++ = DW_CFA_advance_loc1;
10785 *eh++ = delta;
10786 }
10787 else if (delta < 65536)
10788 {
10789 *eh++ = DW_CFA_advance_loc2;
10790 bfd_put_16 (abfd, delta, eh);
10791 eh += 2;
10792 }
10793 else
10794 {
10795 *eh++ = DW_CFA_advance_loc4;
10796 bfd_put_32 (abfd, delta, eh);
10797 eh += 4;
10798 }
10799 return eh;
10800}
10801
10802/* Size of required .eh_frame opcode to advance pc by DELTA. */
10803
10804static unsigned int
10805eh_advance_size (unsigned int delta)
10806{
10807 if (delta < 64 * 4)
10808 /* DW_CFA_advance_loc+[1..63]. */
10809 return 1;
10810 if (delta < 256 * 4)
10811 /* DW_CFA_advance_loc1, byte. */
10812 return 2;
10813 if (delta < 65536 * 4)
10814 /* DW_CFA_advance_loc2, 2 bytes. */
10815 return 3;
10816 /* DW_CFA_advance_loc4, 4 bytes. */
10817 return 5;
10818}
10819
794e51c0
AM
10820/* With power7 weakly ordered memory model, it is possible for ld.so
10821 to update a plt entry in one thread and have another thread see a
10822 stale zero toc entry. To avoid this we need some sort of acquire
10823 barrier in the call stub. One solution is to make the load of the
10824 toc word seem to appear to depend on the load of the function entry
10825 word. Another solution is to test for r2 being zero, and branch to
10826 the appropriate glink entry if so.
10827
10828 . fake dep barrier compare
71a39c98
AM
10829 . ld 12,xxx(2) ld 12,xxx(2)
10830 . mtctr 12 mtctr 12
10831 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10832 . add 2,2,11 cmpldi 2,0
10833 . ld 2,xxx+8(2) bnectr+
10834 . bctr b <glink_entry>
10835
10836 The solution involving the compare turns out to be faster, so
10837 that's what we use unless the branch won't reach. */
10838
10839#define ALWAYS_USE_FAKE_DEP 0
10840#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10841
794e51c0
AM
10842static inline unsigned int
10843plt_stub_size (struct ppc_link_hash_table *htab,
10844 struct ppc_stub_hash_entry *stub_entry,
29433886
AM
10845 bfd_vma off,
10846 unsigned int odd)
794e51c0 10847{
05d0e962 10848 unsigned size;
b9e5796b 10849
05d0e962
AM
10850 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10851 {
e10a07b3 10852 if (htab->params->power10_stubs != 0)
29433886 10853 size = 8 + size_power10_offset (off, odd);
04bdff6a
AM
10854 else
10855 size = 8 + size_offset (off - 8);
05d0e962
AM
10856 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10857 size += 4;
05d0e962 10858 }
29433886 10859 else
b9e5796b 10860 {
29433886
AM
10861 size = 12;
10862 if (ALWAYS_EMIT_R2SAVE
10863 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
b9e5796b 10864 size += 4;
29433886 10865 if (PPC_HA (off) != 0)
b9e5796b 10866 size += 4;
29433886
AM
10867 if (htab->opd_abi)
10868 {
10869 size += 4;
10870 if (htab->params->plt_static_chain)
10871 size += 4;
10872 if (htab->params->plt_thread_safe
10873 && htab->elf.dynamic_sections_created
10874 && stub_entry->h != NULL
10875 && stub_entry->h->elf.dynindx != -1)
10876 size += 8;
10877 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain)
10878 != PPC_HA (off))
10879 size += 4;
10880 }
b9e5796b 10881 }
794e51c0 10882 if (stub_entry->h != NULL
ed7007c1 10883 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10884 && htab->params->tls_get_addr_opt)
f378ab09 10885 {
29433886 10886 if (!htab->params->no_tls_get_addr_regsave)
9e7028aa 10887 {
29433886
AM
10888 size += 30 * 4;
10889 if (stub_entry->stub_type == ppc_stub_plt_call_r2save
10890 || stub_entry->stub_type == ppc_stub_plt_call_both)
10891 size += 4;
9e7028aa
AM
10892 }
10893 else
10894 {
29433886
AM
10895 size += 7 * 4;
10896 if (stub_entry->stub_type == ppc_stub_plt_call_r2save
10897 || stub_entry->stub_type == ppc_stub_plt_call_both)
10898 size += 6 * 4;
9e7028aa 10899 }
f378ab09 10900 }
794e51c0
AM
10901 return size;
10902}
10903
2420fff6
AM
10904/* Depending on the sign of plt_stub_align:
10905 If positive, return the padding to align to a 2**plt_stub_align
10906 boundary.
10907 If negative, if this stub would cross fewer 2**plt_stub_align
10908 boundaries if we align, then return the padding needed to do so. */
10909
794e51c0
AM
10910static inline unsigned int
10911plt_stub_pad (struct ppc_link_hash_table *htab,
10912 struct ppc_stub_hash_entry *stub_entry,
29433886
AM
10913 bfd_vma plt_off,
10914 unsigned int odd)
794e51c0 10915{
2420fff6 10916 int stub_align;
1aa42141 10917 unsigned stub_size;
6f20ed8a 10918 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10919
2420fff6
AM
10920 if (htab->params->plt_stub_align >= 0)
10921 {
10922 stub_align = 1 << htab->params->plt_stub_align;
10923 if ((stub_off & (stub_align - 1)) != 0)
10924 return stub_align - (stub_off & (stub_align - 1));
10925 return 0;
10926 }
10927
10928 stub_align = 1 << -htab->params->plt_stub_align;
29433886 10929 stub_size = plt_stub_size (htab, stub_entry, plt_off, odd);
794e51c0 10930 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10931 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10932 return stub_align - (stub_off & (stub_align - 1));
10933 return 0;
10934}
10935
10936/* Build a .plt call stub. */
10937
10938static inline bfd_byte *
10939build_plt_stub (struct ppc_link_hash_table *htab,
10940 struct ppc_stub_hash_entry *stub_entry,
10941 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10942{
e7d1c40c 10943 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10944 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10945 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10946 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10947 && htab->elf.dynamic_sections_created
10948 && stub_entry->h != NULL
10949 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10950 bfd_boolean use_fake_dep = plt_thread_safe;
10951 bfd_vma cmp_branch_off = 0;
10952
10953 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10954 && plt_load_toc
794e51c0 10955 && plt_thread_safe
9e51d549
AM
10956 && !(stub_entry->h != NULL
10957 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10958 && htab->params->tls_get_addr_opt))
794e51c0
AM
10959 {
10960 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10961 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10962 / PLT_ENTRY_SIZE (htab));
9e390558 10963 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10964 bfd_vma to, from;
10965
68d62958
AM
10966 if (pltindex > 32768)
10967 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10968 to = (glinkoff
10969 + htab->glink->output_offset
10970 + htab->glink->output_section->vma);
6f20ed8a 10971 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10972 + 4 * (ALWAYS_EMIT_R2SAVE
10973 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10974 + 4 * (PPC_HA (offset) != 0)
10975 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10976 != PPC_HA (offset))
10977 + 4 * (plt_static_chain != 0)
10978 + 20
6f20ed8a
AM
10979 + stub_entry->group->stub_sec->output_offset
10980 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10981 cmp_branch_off = to - from;
10982 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10983 }
10984
ac2df442
AM
10985 if (PPC_HA (offset) != 0)
10986 {
176a0d42
AM
10987 if (r != NULL)
10988 {
794e51c0
AM
10989 if (ALWAYS_EMIT_R2SAVE
10990 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10991 r[0].r_offset += 4;
176a0d42 10992 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10993 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10994 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10995 r[1].r_addend = r[0].r_addend;
b9e5796b 10996 if (plt_load_toc)
176a0d42 10997 {
b9e5796b 10998 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10999 {
b9e5796b
AM
11000 r[2].r_offset = r[1].r_offset + 4;
11001 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
11002 r[2].r_addend = r[0].r_addend;
11003 }
11004 else
11005 {
11006 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
11007 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11008 r[2].r_addend = r[0].r_addend + 8;
11009 if (plt_static_chain)
11010 {
11011 r[3].r_offset = r[2].r_offset + 4;
11012 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11013 r[3].r_addend = r[0].r_addend + 16;
11014 }
c7131b65 11015 }
176a0d42
AM
11016 }
11017 }
794e51c0
AM
11018 if (ALWAYS_EMIT_R2SAVE
11019 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11020 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
11021 if (plt_load_toc)
11022 {
11023 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
11024 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
11025 }
11026 else
11027 {
11028 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
11029 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
11030 }
b9e5796b
AM
11031 if (plt_load_toc
11032 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 11033 {
71a39c98 11034 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
11035 offset = 0;
11036 }
71a39c98 11037 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11038 if (plt_load_toc)
794e51c0 11039 {
b9e5796b
AM
11040 if (use_fake_dep)
11041 {
11042 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
11043 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
11044 }
11045 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
11046 if (plt_static_chain)
11047 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 11048 }
ac2df442
AM
11049 }
11050 else
11051 {
176a0d42
AM
11052 if (r != NULL)
11053 {
794e51c0
AM
11054 if (ALWAYS_EMIT_R2SAVE
11055 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11056 r[0].r_offset += 4;
176a0d42 11057 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 11058 if (plt_load_toc)
176a0d42 11059 {
b9e5796b 11060 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 11061 {
b9e5796b
AM
11062 r[1].r_offset = r[0].r_offset + 4;
11063 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11064 r[1].r_addend = r[0].r_addend;
11065 }
11066 else
11067 {
11068 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11069 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11070 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11071 if (plt_static_chain)
11072 {
11073 r[2].r_offset = r[1].r_offset + 4;
11074 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11075 r[2].r_addend = r[0].r_addend + 8;
11076 }
c7131b65 11077 }
176a0d42
AM
11078 }
11079 }
794e51c0
AM
11080 if (ALWAYS_EMIT_R2SAVE
11081 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11082 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 11083 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
11084 if (plt_load_toc
11085 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
11086 {
11087 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11088 offset = 0;
11089 }
71a39c98 11090 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11091 if (plt_load_toc)
794e51c0 11092 {
b9e5796b
AM
11093 if (use_fake_dep)
11094 {
11095 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11096 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11097 }
11098 if (plt_static_chain)
11099 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11100 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11101 }
ac2df442 11102 }
b9e5796b 11103 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11104 {
11105 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11106 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11107 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11108 }
11109 else
407aa07c 11110 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11111 return p;
11112}
11113
a7f2871e
AM
11114/* Build a special .plt call stub for __tls_get_addr. */
11115
b9ca1af6 11116#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11117#define LD_R12_0R3 0xe9830000
11118#define MR_R0_R3 0x7c601b78
b9ca1af6 11119#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11120#define ADD_R3_R12_R13 0x7c6c6a14
11121#define BEQLR 0x4d820020
11122#define MR_R3_R0 0x7c030378
a7f2871e 11123#define BCTRL 0x4e800421
a7f2871e 11124
29433886
AM
11125static bfd_byte *
11126build_tls_get_addr_head (struct ppc_link_hash_table *htab,
794e51c0 11127 struct ppc_stub_hash_entry *stub_entry,
29433886 11128 bfd_byte *p)
a7f2871e 11129{
e7d1c40c 11130 bfd *obfd = htab->params->stub_bfd;
794e51c0 11131
b9ca1af6 11132 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11133 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11134 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11135 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11136 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11137 bfd_put_32 (obfd, BEQLR, p), p += 4;
11138 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa 11139
29433886
AM
11140 if (!htab->params->no_tls_get_addr_regsave)
11141 p = tls_get_addr_prologue (obfd, p, htab);
11142 else if (stub_entry->stub_type == ppc_stub_plt_call_r2save
11143 || stub_entry->stub_type == ppc_stub_plt_call_both)
11144 {
9e7028aa
AM
11145 bfd_put_32 (obfd, MFLR_R0, p);
11146 p += 4;
11147 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11148 p += 4;
29433886
AM
11149 }
11150 return p;
11151}
9e7028aa 11152
29433886
AM
11153static bfd_byte *
11154build_tls_get_addr_tail (struct ppc_link_hash_table *htab,
11155 struct ppc_stub_hash_entry *stub_entry,
11156 bfd_byte *p,
11157 bfd_byte *loc)
11158{
11159 bfd *obfd = htab->params->stub_bfd;
11160
11161 if (!htab->params->no_tls_get_addr_regsave)
11162 {
11163 bfd_put_32 (obfd, BCTRL, p - 4);
11164
11165 if (stub_entry->stub_type == ppc_stub_plt_call_r2save
11166 || stub_entry->stub_type == ppc_stub_plt_call_both)
11167 {
11168 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11169 p += 4;
11170 }
11171 p = tls_get_addr_epilogue (obfd, p, htab);
11172 }
11173 else if (stub_entry->stub_type == ppc_stub_plt_call_r2save
11174 || stub_entry->stub_type == ppc_stub_plt_call_both)
11175 {
9e7028aa
AM
11176 bfd_put_32 (obfd, BCTRL, p - 4);
11177
11178 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11179 p += 4;
11180 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11181 p += 4;
11182 bfd_put_32 (obfd, MTLR_R0, p);
11183 p += 4;
11184 bfd_put_32 (obfd, BLR, p);
11185 p += 4;
11186 }
a7f2871e 11187
df136d64
AM
11188 if (htab->glink_eh_frame != NULL
11189 && htab->glink_eh_frame->size != 0)
11190 {
11191 bfd_byte *base, *eh;
df136d64
AM
11192
11193 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11194 eh = base + stub_entry->group->eh_size;
29433886
AM
11195
11196 if (!htab->params->no_tls_get_addr_regsave)
9e7028aa 11197 {
29433886
AM
11198 unsigned int cfa_updt, delta, i;
11199
9e7028aa
AM
11200 /* After the bctrl, lr has been modified so we need to emit
11201 .eh_frame info saying the return address is on the stack. In
11202 fact we must put the EH info at or before the call rather
11203 than after it, because the EH info for a call needs to be
11204 specified by that point.
11205 See libgcc/unwind-dw2.c execute_cfa_program.
11206 Any stack pointer update must be described immediately after
11207 the instruction making the change, and since the stdu occurs
11208 after saving regs we put all the reg saves and the cfa
11209 change there. */
11210 cfa_updt = stub_entry->stub_offset + 18 * 4;
11211 delta = cfa_updt - stub_entry->group->lr_restore;
11212 stub_entry->group->lr_restore
11213 = stub_entry->stub_offset + (p - loc) - 4;
11214 eh = eh_advance (htab->elf.dynobj, eh, delta);
11215 *eh++ = DW_CFA_def_cfa_offset;
11216 if (htab->opd_abi)
11217 {
11218 *eh++ = 128;
11219 *eh++ = 1;
11220 }
11221 else
11222 *eh++ = 96;
11223 *eh++ = DW_CFA_offset_extended_sf;
11224 *eh++ = 65;
11225 *eh++ = (-16 / 8) & 0x7f;
11226 for (i = 4; i < 12; i++)
11227 {
11228 *eh++ = DW_CFA_offset + i;
11229 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11230 }
11231 *eh++ = (DW_CFA_advance_loc
11232 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11233 *eh++ = DW_CFA_def_cfa_offset;
11234 *eh++ = 0;
11235 for (i = 4; i < 12; i++)
11236 *eh++ = DW_CFA_restore + i;
11237 *eh++ = DW_CFA_advance_loc + 2;
29433886
AM
11238 *eh++ = DW_CFA_restore_extended;
11239 *eh++ = 65;
11240 stub_entry->group->eh_size = eh - base;
11241 }
11242 else if (stub_entry->stub_type == ppc_stub_plt_call_r2save
11243 || stub_entry->stub_type == ppc_stub_plt_call_both)
11244 {
11245 unsigned int lr_used, delta;
11246
11247 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11248 delta = lr_used - stub_entry->group->lr_restore;
11249 stub_entry->group->lr_restore = lr_used + 16;
11250 eh = eh_advance (htab->elf.dynobj, eh, delta);
11251 *eh++ = DW_CFA_offset_extended_sf;
11252 *eh++ = 65;
11253 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11254 *eh++ = DW_CFA_advance_loc + 4;
11255 *eh++ = DW_CFA_restore_extended;
11256 *eh++ = 65;
11257 stub_entry->group->eh_size = eh - base;
9e7028aa 11258 }
df136d64 11259 }
a7f2871e
AM
11260 return p;
11261}
11262
176a0d42
AM
11263static Elf_Internal_Rela *
11264get_relocs (asection *sec, int count)
11265{
11266 Elf_Internal_Rela *relocs;
11267 struct bfd_elf_section_data *elfsec_data;
11268
11269 elfsec_data = elf_section_data (sec);
11270 relocs = elfsec_data->relocs;
11271 if (relocs == NULL)
11272 {
11273 bfd_size_type relsize;
11274 relsize = sec->reloc_count * sizeof (*relocs);
11275 relocs = bfd_alloc (sec->owner, relsize);
11276 if (relocs == NULL)
11277 return NULL;
11278 elfsec_data->relocs = relocs;
d4730f92
BS
11279 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11280 sizeof (Elf_Internal_Shdr));
11281 if (elfsec_data->rela.hdr == NULL)
11282 return NULL;
11283 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11284 * sizeof (Elf64_External_Rela));
11285 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11286 sec->reloc_count = 0;
11287 }
11288 relocs += sec->reloc_count;
11289 sec->reloc_count += count;
11290 return relocs;
11291}
11292
3d58e1fc
AM
11293/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11294 forms, to the equivalent relocs against the global symbol given by
11295 STUB_ENTRY->H. */
11296
11297static bfd_boolean
11298use_global_in_relocs (struct ppc_link_hash_table *htab,
11299 struct ppc_stub_hash_entry *stub_entry,
11300 Elf_Internal_Rela *r, unsigned int num_rel)
11301{
11302 struct elf_link_hash_entry **hashes;
11303 unsigned long symndx;
11304 struct ppc_link_hash_entry *h;
11305 bfd_vma symval;
11306
11307 /* Relocs are always against symbols in their own object file. Fake
11308 up global sym hashes for the stub bfd (which has no symbols). */
11309 hashes = elf_sym_hashes (htab->params->stub_bfd);
11310 if (hashes == NULL)
11311 {
11312 bfd_size_type hsize;
11313
11314 /* When called the first time, stub_globals will contain the
11315 total number of symbols seen during stub sizing. After
11316 allocating, stub_globals is used as an index to fill the
11317 hashes array. */
11318 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11319 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11320 if (hashes == NULL)
11321 return FALSE;
11322 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11323 htab->stub_globals = 1;
11324 }
11325 symndx = htab->stub_globals++;
11326 h = stub_entry->h;
11327 hashes[symndx] = &h->elf;
11328 if (h->oh != NULL && h->oh->is_func)
11329 h = ppc_follow_link (h->oh);
11330 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11331 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11332 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11333 while (num_rel-- != 0)
11334 {
11335 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11336 if (h->elf.root.u.def.section != stub_entry->target_section)
11337 {
11338 /* H is an opd symbol. The addend must be zero, and the
11339 branch reloc is the only one we can convert. */
11340 r->r_addend = 0;
11341 break;
11342 }
11343 else
11344 r->r_addend -= symval;
11345 --r;
11346 }
11347 return TRUE;
11348}
11349
aa374f67 11350static bfd_vma
25f53a85 11351get_r2off (struct bfd_link_info *info,
aa374f67
AM
11352 struct ppc_stub_hash_entry *stub_entry)
11353{
25f53a85 11354 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11355 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11356
11357 if (r2off == 0)
11358 {
11359 /* Support linking -R objects. Get the toc pointer from the
11360 opd entry. */
11361 char buf[8];
b9e5796b
AM
11362 if (!htab->opd_abi)
11363 return r2off;
aa374f67
AM
11364 asection *opd = stub_entry->h->elf.root.u.def.section;
11365 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11366
11367 if (strcmp (opd->name, ".opd") != 0
11368 || opd->reloc_count != 0)
11369 {
2cdcc330
AM
11370 info->callbacks->einfo
11371 (_("%P: cannot find opd entry toc for `%pT'\n"),
11372 stub_entry->h->elf.root.root.string);
aa374f67 11373 bfd_set_error (bfd_error_bad_value);
a7c49797 11374 return (bfd_vma) -1;
aa374f67
AM
11375 }
11376 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11377 return (bfd_vma) -1;
aa374f67 11378 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11379 r2off -= elf_gp (info->output_bfd);
aa374f67 11380 }
6f20ed8a 11381 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11382 return r2off;
11383}
11384
b34976b6 11385static bfd_boolean
4ce794b7 11386ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11387{
721956f4
AM
11388 struct ppc_stub_hash_entry *stub_entry;
11389 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11390 struct bfd_link_info *info;
11391 struct ppc_link_hash_table *htab;
29433886 11392 bfd *obfd;
721956f4 11393 bfd_byte *loc;
3d58e1fc 11394 bfd_byte *p, *relp;
1aa42141 11395 bfd_vma targ, off;
176a0d42 11396 Elf_Internal_Rela *r;
e054468f 11397 asection *plt;
3d58e1fc 11398 int num_rel;
04bdff6a 11399 int odd;
29433886 11400 bfd_boolean is_tga;
5d1634d7 11401
721956f4
AM
11402 /* Massage our args to the form they really have. */
11403 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11404 info = in_arg;
5d1634d7 11405
abf874aa
CL
11406 /* Fail if the target section could not be assigned to an output
11407 section. The user should fix his linker script. */
11408 if (stub_entry->target_section != NULL
11409 && stub_entry->target_section->output_section == NULL
11410 && info->non_contiguous_regions)
53215f21
CL
11411 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11412 "Retry without --enable-non-contiguous-regions.\n"),
11413 stub_entry->target_section);
abf874aa
CL
11414
11415 /* Same for the group. */
11416 if (stub_entry->group->stub_sec != NULL
11417 && stub_entry->group->stub_sec->output_section == NULL
11418 && info->non_contiguous_regions)
53215f21
CL
11419 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11420 "output section. Retry without "
11421 "--enable-non-contiguous-regions.\n"),
11422 stub_entry->group->stub_sec,
11423 stub_entry->target_section);
abf874aa 11424
5d1634d7 11425 htab = ppc_hash_table (info);
4dfe6ac6
NC
11426 if (htab == NULL)
11427 return FALSE;
5d1634d7 11428
1aa42141 11429 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11430 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11431
4ce794b7 11432 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11433 switch (stub_entry->stub_type)
5d1634d7 11434 {
721956f4 11435 case ppc_stub_long_branch:
ad8e1ba5 11436 case ppc_stub_long_branch_r2off:
721956f4 11437 /* Branches are relative. This is where we are going to. */
1aa42141 11438 targ = (stub_entry->target_value
6911b7dc
AM
11439 + stub_entry->target_section->output_offset
11440 + stub_entry->target_section->output_section->vma);
1aa42141 11441 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11442
721956f4 11443 /* And this is where we are coming from. */
1aa42141
AM
11444 off = (stub_entry->stub_offset
11445 + stub_entry->group->stub_sec->output_offset
11446 + stub_entry->group->stub_sec->output_section->vma);
11447 off = targ - off;
e86ce104 11448
9e390558 11449 p = loc;
29433886 11450 obfd = htab->params->stub_bfd;
ac2df442 11451 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11452 {
25f53a85 11453 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11454
a7c49797 11455 if (r2off == (bfd_vma) -1)
aa374f67
AM
11456 {
11457 htab->stub_error = TRUE;
11458 return FALSE;
11459 }
29433886 11460 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p);
9e390558 11461 p += 4;
ac2df442
AM
11462 if (PPC_HA (r2off) != 0)
11463 {
29433886 11464 bfd_put_32 (obfd, ADDIS_R2_R2 | PPC_HA (r2off), p);
9e390558 11465 p += 4;
a7c49797
AM
11466 }
11467 if (PPC_LO (r2off) != 0)
11468 {
29433886 11469 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (r2off), p);
9e390558 11470 p += 4;
ac2df442 11471 }
9e390558 11472 off -= p - loc;
ad8e1ba5 11473 }
29433886 11474 bfd_put_32 (obfd, B_DOT | (off & 0x3fffffc), p);
9e390558 11475 p += 4;
ad8e1ba5 11476
5c3dead3
AM
11477 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11478 {
cf97bcb0
AM
11479 _bfd_error_handler
11480 (_("long branch stub `%s' offset overflow"),
bc30df16 11481 stub_entry->root.string);
5c3dead3
AM
11482 htab->stub_error = TRUE;
11483 return FALSE;
11484 }
ee75fd95
AM
11485
11486 if (info->emitrelocations)
11487 {
6f20ed8a 11488 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11489 if (r == NULL)
11490 return FALSE;
9e390558 11491 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11492 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11493 r->r_addend = targ;
3d58e1fc
AM
11494 if (stub_entry->h != NULL
11495 && !use_global_in_relocs (htab, stub_entry, r, 1))
11496 return FALSE;
ee75fd95 11497 }
721956f4 11498 break;
e86ce104 11499
721956f4 11500 case ppc_stub_plt_branch:
ad8e1ba5 11501 case ppc_stub_plt_branch_r2off:
721956f4
AM
11502 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11503 stub_entry->root.string + 9,
b34976b6 11504 FALSE, FALSE);
721956f4
AM
11505 if (br_entry == NULL)
11506 {
cf97bcb0
AM
11507 _bfd_error_handler (_("can't find branch stub `%s'"),
11508 stub_entry->root.string);
b34976b6
AM
11509 htab->stub_error = TRUE;
11510 return FALSE;
721956f4
AM
11511 }
11512
1aa42141 11513 targ = (stub_entry->target_value
176a0d42
AM
11514 + stub_entry->target_section->output_offset
11515 + stub_entry->target_section->output_section->vma);
6911b7dc 11516 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11517 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11518
1aa42141 11519 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11520 htab->brlt->contents + br_entry->offset);
721956f4 11521
f94498ff 11522 if (br_entry->iter == htab->stub_iteration)
721956f4 11523 {
f94498ff 11524 br_entry->iter = 0;
84f5d08e 11525
f94498ff 11526 if (htab->relbrlt != NULL)
84f5d08e 11527 {
f94498ff
AM
11528 /* Create a reloc for the branch lookup table entry. */
11529 Elf_Internal_Rela rela;
11530 bfd_byte *rl;
11531
11532 rela.r_offset = (br_entry->offset
11533 + htab->brlt->output_offset
11534 + htab->brlt->output_section->vma);
11535 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11536 rela.r_addend = targ;
f94498ff
AM
11537
11538 rl = htab->relbrlt->contents;
11539 rl += (htab->relbrlt->reloc_count++
11540 * sizeof (Elf64_External_Rela));
11541 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11542 }
11543 else if (info->emitrelocations)
11544 {
176a0d42
AM
11545 r = get_relocs (htab->brlt, 1);
11546 if (r == NULL)
11547 return FALSE;
11548 /* brlt, being SEC_LINKER_CREATED does not go through the
11549 normal reloc processing. Symbols and offsets are not
11550 translated from input file to output file form, so
11551 set up the offset per the output file. */
f94498ff
AM
11552 r->r_offset = (br_entry->offset
11553 + htab->brlt->output_offset
11554 + htab->brlt->output_section->vma);
11555 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11556 r->r_addend = targ;
84f5d08e 11557 }
84f5d08e 11558 }
721956f4 11559
1aa42141 11560 targ = (br_entry->offset
176a0d42
AM
11561 + htab->brlt->output_offset
11562 + htab->brlt->output_section->vma);
11563
1aa42141
AM
11564 off = (elf_gp (info->output_bfd)
11565 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11566 off = targ - off;
721956f4 11567
ad8e1ba5 11568 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11569 {
25f53a85 11570 info->callbacks->einfo
c1c8c1ef 11571 (_("%P: linkage table error against `%pT'\n"),
721956f4 11572 stub_entry->root.string);
5d1634d7 11573 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11574 htab->stub_error = TRUE;
11575 return FALSE;
5d1634d7 11576 }
41bd81ab 11577
176a0d42
AM
11578 if (info->emitrelocations)
11579 {
6f20ed8a 11580 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11581 if (r == NULL)
11582 return FALSE;
6f20ed8a 11583 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11584 if (bfd_big_endian (info->output_bfd))
11585 r[0].r_offset += 2;
00f412ee 11586 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11587 r[0].r_offset += 4;
11588 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11589 r[0].r_addend = targ;
176a0d42
AM
11590 if (PPC_HA (off) != 0)
11591 {
11592 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11593 r[1].r_offset = r[0].r_offset + 4;
11594 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11595 r[1].r_addend = r[0].r_addend;
11596 }
11597 }
11598
9e390558 11599 p = loc;
29433886 11600 obfd = htab->params->stub_bfd;
00f412ee 11601 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11602 {
176a0d42 11603 if (PPC_HA (off) != 0)
ac2df442 11604 {
29433886 11605 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (off), p);
9e390558 11606 p += 4;
29433886 11607 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11608 }
11609 else
29433886 11610 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11611 }
11612 else
11613 {
25f53a85 11614 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11615
a7c49797 11616 if (r2off == (bfd_vma) -1)
aa374f67
AM
11617 {
11618 htab->stub_error = TRUE;
11619 return FALSE;
11620 }
ad8e1ba5 11621
29433886 11622 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p);
9e390558 11623 p += 4;
176a0d42 11624 if (PPC_HA (off) != 0)
ac2df442 11625 {
29433886 11626 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (off), p);
9e390558 11627 p += 4;
29433886 11628 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11629 }
11630 else
29433886 11631 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11632
11633 if (PPC_HA (r2off) != 0)
11634 {
9e390558 11635 p += 4;
29433886 11636 bfd_put_32 (obfd, ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11637 }
11638 if (PPC_LO (r2off) != 0)
11639 {
9e390558 11640 p += 4;
29433886 11641 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11642 }
ad8e1ba5 11643 }
9e390558 11644 p += 4;
29433886 11645 bfd_put_32 (obfd, MTCTR_R12, p);
9e390558 11646 p += 4;
29433886 11647 bfd_put_32 (obfd, BCTR, p);
407aa07c 11648 p += 4;
721956f4 11649 break;
5d1634d7 11650
05d0e962
AM
11651 case ppc_stub_long_branch_notoc:
11652 case ppc_stub_long_branch_both:
11653 case ppc_stub_plt_branch_notoc:
11654 case ppc_stub_plt_branch_both:
11655 case ppc_stub_plt_call_notoc:
11656 case ppc_stub_plt_call_both:
11657 p = loc;
f891966f 11658 off = (stub_entry->stub_offset
05d0e962
AM
11659 + stub_entry->group->stub_sec->output_offset
11660 + stub_entry->group->stub_sec->output_section->vma);
29433886
AM
11661 obfd = htab->params->stub_bfd;
11662 is_tga = ((stub_entry->stub_type == ppc_stub_plt_call_notoc
11663 || stub_entry->stub_type == ppc_stub_plt_call_both)
11664 && is_tls_get_addr (&stub_entry->h->elf, htab)
11665 && htab->params->tls_get_addr_opt);
11666 if (is_tga)
11667 {
11668 p = build_tls_get_addr_head (htab, stub_entry, p);
11669 off += p - loc;
11670 }
05d0e962
AM
11671 if (stub_entry->stub_type == ppc_stub_long_branch_both
11672 || stub_entry->stub_type == ppc_stub_plt_branch_both
11673 || stub_entry->stub_type == ppc_stub_plt_call_both)
11674 {
11675 off += 4;
29433886 11676 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p);
05d0e962
AM
11677 p += 4;
11678 }
11679 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11680 {
11681 targ = stub_entry->plt_ent->plt.offset & ~1;
11682 if (targ >= (bfd_vma) -2)
11683 abort ();
11684
11685 plt = htab->elf.splt;
11686 if (!htab->elf.dynamic_sections_created
11687 || stub_entry->h == NULL
11688 || stub_entry->h->elf.dynindx == -1)
11689 {
11690 if (stub_entry->symtype == STT_GNU_IFUNC)
11691 plt = htab->elf.iplt;
11692 else
11693 plt = htab->pltlocal;
11694 }
11695 targ += plt->output_offset + plt->output_section->vma;
11696 }
11697 else
11698 targ = (stub_entry->target_value
11699 + stub_entry->target_section->output_offset
11700 + stub_entry->target_section->output_section->vma);
04bdff6a 11701 odd = off & 4;
05d0e962 11702 off = targ - off;
f891966f 11703
3d58e1fc
AM
11704 relp = p;
11705 num_rel = 0;
e10a07b3 11706 if (htab->params->power10_stubs != 0)
04bdff6a
AM
11707 {
11708 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
29433886 11709 p = build_power10_offset (obfd, p, off, odd, load);
04bdff6a
AM
11710 }
11711 else
11712 {
29433886
AM
11713 if (htab->glink_eh_frame != NULL
11714 && htab->glink_eh_frame->size != 0)
11715 {
11716 bfd_byte *base, *eh;
11717 unsigned int lr_used, delta;
11718
11719 base = (htab->glink_eh_frame->contents
11720 + stub_entry->group->eh_base + 17);
11721 eh = base + stub_entry->group->eh_size;
11722 lr_used = stub_entry->stub_offset + (p - loc) + 8;
11723 delta = lr_used - stub_entry->group->lr_restore;
11724 stub_entry->group->lr_restore = lr_used + 8;
11725 eh = eh_advance (htab->elf.dynobj, eh, delta);
11726 *eh++ = DW_CFA_register;
11727 *eh++ = 65;
11728 *eh++ = 12;
11729 *eh++ = DW_CFA_advance_loc + 2;
11730 *eh++ = DW_CFA_restore_extended;
11731 *eh++ = 65;
11732 stub_entry->group->eh_size = eh - base;
11733 }
11734
04bdff6a
AM
11735 /* The notoc stubs calculate their target (either a PLT entry or
11736 the global entry point of a function) relative to the PC
11737 returned by the "bcl" two instructions past the start of the
11738 sequence emitted by build_offset. The offset is therefore 8
11739 less than calculated from the start of the sequence. */
11740 off -= 8;
29433886 11741 p = build_offset (obfd, p, off,
04bdff6a
AM
11742 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11743 }
11744
f891966f 11745 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11746 {
f891966f 11747 bfd_vma from;
3d58e1fc 11748 num_rel = 1;
f891966f
AM
11749 from = (stub_entry->stub_offset
11750 + stub_entry->group->stub_sec->output_offset
11751 + stub_entry->group->stub_sec->output_section->vma
11752 + (p - loc));
29433886 11753 bfd_put_32 (obfd, B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11754 }
11755 else
11756 {
29433886 11757 bfd_put_32 (obfd, MTCTR_R12, p);
05d0e962 11758 p += 4;
29433886 11759 bfd_put_32 (obfd, BCTR, p);
05d0e962
AM
11760 }
11761 p += 4;
df136d64 11762
29433886
AM
11763 if (is_tga)
11764 p = build_tls_get_addr_tail (htab, stub_entry, p, loc);
11765
3d58e1fc
AM
11766 if (info->emitrelocations)
11767 {
04bdff6a 11768 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
e10a07b3 11769 if (htab->params->power10_stubs != 0)
7c1f4227 11770 num_rel += num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
11771 else
11772 {
11773 num_rel += num_relocs_for_offset (off);
11774 roff += 16;
11775 }
3d58e1fc
AM
11776 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11777 if (r == NULL)
11778 return FALSE;
e10a07b3 11779 if (htab->params->power10_stubs != 0)
7c1f4227 11780 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
04bdff6a
AM
11781 else
11782 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11783 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11784 || stub_entry->stub_type == ppc_stub_long_branch_both)
11785 {
11786 ++r;
11787 roff = p - 4 - stub_entry->group->stub_sec->contents;
11788 r->r_offset = roff;
11789 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11790 r->r_addend = targ;
11791 if (stub_entry->h != NULL
11792 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11793 return FALSE;
11794 }
11795 }
05d0e962
AM
11796 break;
11797
721956f4 11798 case ppc_stub_plt_call:
794e51c0 11799 case ppc_stub_plt_call_r2save:
e054468f 11800 if (stub_entry->h != NULL
b31867b6
AM
11801 && stub_entry->h->is_func_descriptor
11802 && stub_entry->h->oh != NULL)
c862ae31 11803 {
b31867b6
AM
11804 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11805
11806 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11807 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11808 if (fh->elf.root.type == bfd_link_hash_undefined
11809 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11810 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11811 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11812 }
11813
721956f4 11814 /* Now build the stub. */
1aa42141
AM
11815 targ = stub_entry->plt_ent->plt.offset & ~1;
11816 if (targ >= (bfd_vma) -2)
721956f4
AM
11817 abort ();
11818
33e44f2e 11819 plt = htab->elf.splt;
25f23106
AM
11820 if (!htab->elf.dynamic_sections_created
11821 || stub_entry->h == NULL
11822 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11823 {
11824 if (stub_entry->symtype == STT_GNU_IFUNC)
11825 plt = htab->elf.iplt;
11826 else
11827 plt = htab->pltlocal;
11828 }
1aa42141 11829 targ += plt->output_offset + plt->output_section->vma;
e054468f 11830
1aa42141
AM
11831 off = (elf_gp (info->output_bfd)
11832 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11833 off = targ - off;
721956f4 11834
ad8e1ba5 11835 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11836 {
25f53a85 11837 info->callbacks->einfo
695344c0 11838 /* xgettext:c-format */
c1c8c1ef 11839 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11840 stub_entry->h != NULL
11841 ? stub_entry->h->elf.root.root.string
11842 : "<local sym>");
721956f4 11843 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11844 htab->stub_error = TRUE;
11845 return FALSE;
721956f4
AM
11846 }
11847
176a0d42
AM
11848 r = NULL;
11849 if (info->emitrelocations)
11850 {
6f20ed8a 11851 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11852 ((PPC_HA (off) != 0)
11853 + (htab->opd_abi
e7d1c40c 11854 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11855 && PPC_HA (off + 16) == PPC_HA (off))
11856 : 1)));
176a0d42
AM
11857 if (r == NULL)
11858 return FALSE;
6f20ed8a 11859 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11860 if (bfd_big_endian (info->output_bfd))
11861 r[0].r_offset += 2;
1aa42141 11862 r[0].r_addend = targ;
176a0d42 11863 }
29433886
AM
11864 p = loc;
11865 obfd = htab->params->stub_bfd;
11866 is_tga = (stub_entry->h != NULL
11867 && is_tls_get_addr (&stub_entry->h->elf, htab)
11868 && htab->params->tls_get_addr_opt);
11869 if (is_tga)
11870 {
11871 p = build_tls_get_addr_head (htab, stub_entry, p);
11872 if (r != NULL)
11873 r[0].r_offset += p - loc;
11874 }
11875 p = build_plt_stub (htab, stub_entry, p, off, r);
11876 if (is_tga)
11877 p = build_tls_get_addr_tail (htab, stub_entry, p, loc);
721956f4
AM
11878 break;
11879
a4b6fadd
AM
11880 case ppc_stub_save_res:
11881 return TRUE;
11882
721956f4
AM
11883 default:
11884 BFD_FAIL ();
b34976b6 11885 return FALSE;
721956f4
AM
11886 }
11887
1aa42141 11888 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11889
e7d1c40c 11890 if (htab->params->emit_stub_syms)
97b639ba
AM
11891 {
11892 struct elf_link_hash_entry *h;
ee75fd95
AM
11893 size_t len1, len2;
11894 char *name;
11895 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11896 "long_branch",
11897 "long_branch",
3f6ff479
AM
11898 "long_branch",
11899 "plt_branch",
ee75fd95 11900 "plt_branch",
05d0e962
AM
11901 "plt_branch",
11902 "plt_branch",
11903 "plt_call",
11904 "plt_call",
794e51c0 11905 "plt_call",
ee75fd95
AM
11906 "plt_call" };
11907
11908 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11909 len2 = strlen (stub_entry->root.string);
11910 name = bfd_malloc (len1 + len2 + 2);
11911 if (name == NULL)
11912 return FALSE;
11913 memcpy (name, stub_entry->root.string, 9);
11914 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11915 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11916 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11917 if (h == NULL)
11918 return FALSE;
11919 if (h->root.type == bfd_link_hash_new)
11920 {
11921 h->root.type = bfd_link_hash_defined;
6f20ed8a 11922 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11923 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11924 h->ref_regular = 1;
11925 h->def_regular = 1;
11926 h->ref_regular_nonweak = 1;
11927 h->forced_local = 1;
11928 h->non_elf = 0;
2ec55de3 11929 h->root.linker_def = 1;
97b639ba
AM
11930 }
11931 }
11932
b34976b6 11933 return TRUE;
721956f4
AM
11934}
11935
11936/* As above, but don't actually build the stub. Just bump offset so
11937 we know stub section sizes, and select plt_branch stubs where
11938 long_branch stubs won't do. */
11939
b34976b6 11940static bfd_boolean
4ce794b7 11941ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11942{
11943 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11944 struct bfd_link_info *info;
721956f4 11945 struct ppc_link_hash_table *htab;
f891966f
AM
11946 asection *plt;
11947 bfd_vma targ, off, r2off;
04bdff6a 11948 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11949
11950 /* Massage our args to the form they really have. */
11951 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11952 info = in_arg;
11953
11954 htab = ppc_hash_table (info);
4dfe6ac6
NC
11955 if (htab == NULL)
11956 return FALSE;
721956f4 11957
abf874aa
CL
11958 /* Fail if the target section could not be assigned to an output
11959 section. The user should fix his linker script. */
11960 if (stub_entry->target_section != NULL
11961 && stub_entry->target_section->output_section == NULL
11962 && info->non_contiguous_regions)
53215f21
CL
11963 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11964 "Retry without --enable-non-contiguous-regions.\n"),
11965 stub_entry->target_section);
abf874aa
CL
11966
11967 /* Same for the group. */
11968 if (stub_entry->group->stub_sec != NULL
11969 && stub_entry->group->stub_sec->output_section == NULL
11970 && info->non_contiguous_regions)
53215f21
CL
11971 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11972 "output section. Retry without "
11973 "--enable-non-contiguous-regions.\n"),
11974 stub_entry->group->stub_sec,
11975 stub_entry->target_section);
abf874aa 11976
1aa42141
AM
11977 /* Make a note of the offset within the stubs for this entry. */
11978 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11979
a4b6fadd
AM
11980 if (stub_entry->h != NULL
11981 && stub_entry->h->save_res
11982 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11983 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11984 {
11985 /* Don't make stubs to out-of-line register save/restore
11986 functions. Instead, emit copies of the functions. */
11987 stub_entry->group->needs_save_res = 1;
11988 stub_entry->stub_type = ppc_stub_save_res;
11989 return TRUE;
11990 }
11991
f891966f 11992 switch (stub_entry->stub_type)
721956f4 11993 {
f891966f
AM
11994 case ppc_stub_plt_branch:
11995 case ppc_stub_plt_branch_r2off:
11996 /* Reset the stub type from the plt branch variant in case we now
11997 can reach with a shorter stub. */
11998 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11999 /* Fall through. */
12000 case ppc_stub_long_branch:
12001 case ppc_stub_long_branch_r2off:
1aa42141
AM
12002 targ = (stub_entry->target_value
12003 + stub_entry->target_section->output_offset
12004 + stub_entry->target_section->output_section->vma);
f891966f 12005 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
12006 off = (stub_entry->stub_offset
12007 + stub_entry->group->stub_sec->output_offset
12008 + stub_entry->group->stub_sec->output_section->vma);
721956f4 12009
ad8e1ba5 12010 size = 4;
f891966f 12011 r2off = 0;
ad8e1ba5
AM
12012 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
12013 {
25f53a85 12014 r2off = get_r2off (info, stub_entry);
a7c49797 12015 if (r2off == (bfd_vma) -1)
aa374f67
AM
12016 {
12017 htab->stub_error = TRUE;
12018 return FALSE;
12019 }
a7c49797 12020 size = 8;
ac2df442 12021 if (PPC_HA (r2off) != 0)
a7c49797
AM
12022 size += 4;
12023 if (PPC_LO (r2off) != 0)
12024 size += 4;
1aa42141 12025 off += size - 4;
ad8e1ba5 12026 }
1aa42141 12027 off = targ - off;
ad8e1ba5 12028
f891966f
AM
12029 /* If the branch offset is too big, use a ppc_stub_plt_branch.
12030 Do the same for -R objects without function descriptors. */
12031 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
12032 && r2off == 0
12033 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
12034 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 12035 {
f891966f 12036 struct ppc_branch_hash_entry *br_entry;
df136d64 12037
f891966f
AM
12038 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
12039 stub_entry->root.string + 9,
12040 TRUE, FALSE);
12041 if (br_entry == NULL)
721956f4 12042 {
f891966f
AM
12043 _bfd_error_handler (_("can't build branch stub `%s'"),
12044 stub_entry->root.string);
12045 htab->stub_error = TRUE;
12046 return FALSE;
721956f4
AM
12047 }
12048
f891966f 12049 if (br_entry->iter != htab->stub_iteration)
721956f4 12050 {
f891966f
AM
12051 br_entry->iter = htab->stub_iteration;
12052 br_entry->offset = htab->brlt->size;
12053 htab->brlt->size += 8;
63bc6f6c 12054
f891966f
AM
12055 if (htab->relbrlt != NULL)
12056 htab->relbrlt->size += sizeof (Elf64_External_Rela);
12057 else if (info->emitrelocations)
84f5d08e 12058 {
f891966f
AM
12059 htab->brlt->reloc_count += 1;
12060 htab->brlt->flags |= SEC_RELOC;
05d0e962 12061 }
f891966f 12062 }
ac2df442 12063
f891966f
AM
12064 targ = (br_entry->offset
12065 + htab->brlt->output_offset
12066 + htab->brlt->output_section->vma);
12067 off = (elf_gp (info->output_bfd)
12068 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12069 off = targ - off;
176a0d42 12070
f891966f
AM
12071 if (info->emitrelocations)
12072 {
12073 stub_entry->group->stub_sec->reloc_count
12074 += 1 + (PPC_HA (off) != 0);
12075 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12076 }
05d0e962 12077
f891966f
AM
12078 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
12079 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12080 {
12081 size = 12;
12082 if (PPC_HA (off) != 0)
12083 size = 16;
ac2df442 12084 }
f891966f 12085 else
ac2df442 12086 {
f891966f
AM
12087 size = 16;
12088 if (PPC_HA (off) != 0)
12089 size += 4;
12090
12091 if (PPC_HA (r2off) != 0)
12092 size += 4;
12093 if (PPC_LO (r2off) != 0)
12094 size += 4;
ac2df442 12095 }
721956f4 12096 }
f891966f
AM
12097 else if (info->emitrelocations)
12098 {
12099 stub_entry->group->stub_sec->reloc_count += 1;
12100 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12101 }
12102 break;
12103
12104 case ppc_stub_plt_branch_notoc:
12105 case ppc_stub_plt_branch_both:
12106 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12107 /* Fall through. */
12108 case ppc_stub_long_branch_notoc:
12109 case ppc_stub_long_branch_both:
12110 off = (stub_entry->stub_offset
12111 + stub_entry->group->stub_sec->output_offset
12112 + stub_entry->group->stub_sec->output_section->vma);
12113 size = 0;
12114 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12115 size = 4;
12116 off += size;
12117 targ = (stub_entry->target_value
12118 + stub_entry->target_section->output_offset
12119 + stub_entry->target_section->output_section->vma);
04bdff6a 12120 odd = off & 4;
f891966f
AM
12121 off = targ - off;
12122
3d58e1fc
AM
12123 if (info->emitrelocations)
12124 {
04bdff6a 12125 unsigned int num_rel;
e10a07b3 12126 if (htab->params->power10_stubs != 0)
7c1f4227 12127 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12128 else
12129 num_rel = num_relocs_for_offset (off - 8);
12130 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12131 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12132 }
12133
e10a07b3 12134 if (htab->params->power10_stubs != 0)
7c1f4227 12135 extra = size_power10_offset (off, odd);
04bdff6a
AM
12136 else
12137 extra = size_offset (off - 8);
f891966f
AM
12138 /* Include branch insn plus those in the offset sequence. */
12139 size += 4 + extra;
12140 /* The branch insn is at the end, or "extra" bytes along. So
12141 its offset will be "extra" bytes less that that already
12142 calculated. */
12143 off -= extra;
12144
e10a07b3 12145 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12146 {
12147 /* After the bcl, lr has been modified so we need to emit
12148 .eh_frame info saying the return address is in r12. */
12149 lr_used = stub_entry->stub_offset + 8;
12150 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12151 lr_used += 4;
12152 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12153 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12154 DW_CFA_restore_extended 65. */
12155 delta = lr_used - stub_entry->group->lr_restore;
12156 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12157 stub_entry->group->lr_restore = lr_used + 8;
12158 }
f891966f
AM
12159
12160 /* If the branch can't reach, use a plt_branch. */
12161 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12162 {
12163 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12164 - ppc_stub_long_branch_notoc);
12165 size += 4;
12166 }
3d58e1fc
AM
12167 else if (info->emitrelocations)
12168 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12169 break;
12170
12171 case ppc_stub_plt_call_notoc:
12172 case ppc_stub_plt_call_both:
29433886
AM
12173 lr_used = 0;
12174 if (is_tls_get_addr (&stub_entry->h->elf, htab)
12175 && htab->params->tls_get_addr_opt)
12176 {
12177 lr_used += 7 * 4;
12178 if (!htab->params->no_tls_get_addr_regsave)
12179 lr_used += 11 * 4;
12180 else if (stub_entry->stub_type == ppc_stub_plt_call_both)
12181 lr_used += 2 * 4;
12182 }
f891966f 12183 if (stub_entry->stub_type == ppc_stub_plt_call_both)
29433886 12184 lr_used += 4;
f891966f
AM
12185 targ = stub_entry->plt_ent->plt.offset & ~1;
12186 if (targ >= (bfd_vma) -2)
12187 abort ();
12188
12189 plt = htab->elf.splt;
12190 if (!htab->elf.dynamic_sections_created
12191 || stub_entry->h == NULL
12192 || stub_entry->h->elf.dynindx == -1)
12193 {
12194 if (stub_entry->symtype == STT_GNU_IFUNC)
12195 plt = htab->elf.iplt;
12196 else
12197 plt = htab->pltlocal;
12198 }
12199 targ += plt->output_offset + plt->output_section->vma;
29433886
AM
12200 off = (stub_entry->stub_offset
12201 + stub_entry->group->stub_sec->output_offset
12202 + stub_entry->group->stub_sec->output_section->vma
12203 + lr_used);
04bdff6a 12204 odd = off & 4;
f891966f
AM
12205 off = targ - off;
12206
12207 if (htab->params->plt_stub_align != 0)
12208 {
29433886 12209 unsigned pad = plt_stub_pad (htab, stub_entry, off, odd);
f891966f
AM
12210
12211 stub_entry->group->stub_sec->size += pad;
12212 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12213 off -= pad;
29433886 12214 odd ^= pad & 4;
f891966f
AM
12215 }
12216
3d58e1fc
AM
12217 if (info->emitrelocations)
12218 {
04bdff6a 12219 unsigned int num_rel;
e10a07b3 12220 if (htab->params->power10_stubs != 0)
7c1f4227 12221 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12222 else
12223 num_rel = num_relocs_for_offset (off - 8);
12224 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12225 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12226 }
12227
29433886 12228 size = plt_stub_size (htab, stub_entry, off, odd);
f891966f 12229
e10a07b3 12230 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12231 {
12232 /* After the bcl, lr has been modified so we need to emit
12233 .eh_frame info saying the return address is in r12. */
29433886 12234 lr_used += stub_entry->stub_offset + 8;
04bdff6a
AM
12235 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12236 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12237 DW_CFA_restore_extended 65. */
12238 delta = lr_used - stub_entry->group->lr_restore;
12239 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12240 stub_entry->group->lr_restore = lr_used + 8;
12241 }
29433886
AM
12242 if ((stub_entry->stub_type == ppc_stub_plt_call_notoc
12243 || stub_entry->stub_type == ppc_stub_plt_call_both)
12244 && is_tls_get_addr (&stub_entry->h->elf, htab)
12245 && htab->params->tls_get_addr_opt)
12246 {
12247 if (!htab->params->no_tls_get_addr_regsave)
12248 {
12249 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12250 delta = cfa_updt - stub_entry->group->lr_restore;
12251 stub_entry->group->eh_size += eh_advance_size (delta);
12252 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12253 stub_entry->group->lr_restore
12254 = stub_entry->stub_offset + size - 4;
12255 }
12256 else if (stub_entry->stub_type == ppc_stub_plt_call_both)
12257 {
12258 lr_used = stub_entry->stub_offset + size - 20;
12259 delta = lr_used - stub_entry->group->lr_restore;
12260 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12261 stub_entry->group->lr_restore
12262 = stub_entry->stub_offset + size - 4;
12263 }
12264 }
f891966f
AM
12265 break;
12266
12267 case ppc_stub_plt_call:
12268 case ppc_stub_plt_call_r2save:
12269 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12270 if (targ >= (bfd_vma) -2)
12271 abort ();
12272 plt = htab->elf.splt;
12273 if (!htab->elf.dynamic_sections_created
12274 || stub_entry->h == NULL
12275 || stub_entry->h->elf.dynindx == -1)
12276 {
12277 if (stub_entry->symtype == STT_GNU_IFUNC)
12278 plt = htab->elf.iplt;
12279 else
12280 plt = htab->pltlocal;
12281 }
12282 targ += plt->output_offset + plt->output_section->vma;
12283
12284 off = (elf_gp (info->output_bfd)
12285 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12286 off = targ - off;
12287
12288 if (htab->params->plt_stub_align != 0)
12289 {
29433886 12290 unsigned pad = plt_stub_pad (htab, stub_entry, off, 0);
f891966f
AM
12291
12292 stub_entry->group->stub_sec->size += pad;
12293 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12294 }
12295
12296 if (info->emitrelocations)
12297 {
12298 stub_entry->group->stub_sec->reloc_count
12299 += ((PPC_HA (off) != 0)
12300 + (htab->opd_abi
12301 ? 2 + (htab->params->plt_static_chain
12302 && PPC_HA (off + 16) == PPC_HA (off))
12303 : 1));
12304 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12305 }
12306
29433886 12307 size = plt_stub_size (htab, stub_entry, off, 0);
f891966f
AM
12308
12309 if (stub_entry->h != NULL
ed7007c1 12310 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12311 && htab->params->tls_get_addr_opt
12312 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12313 {
29433886
AM
12314 if (!htab->params->no_tls_get_addr_regsave)
12315 {
12316 /* Adjustments to r1 need to be described. */
12317 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12318 delta = cfa_updt - stub_entry->group->lr_restore;
12319 stub_entry->group->eh_size += eh_advance_size (delta);
12320 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12321 }
12322 else
9e7028aa
AM
12323 {
12324 lr_used = stub_entry->stub_offset + size - 20;
12325 /* The eh_frame info will consist of a DW_CFA_advance_loc
12326 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12327 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12328 delta = lr_used - stub_entry->group->lr_restore;
12329 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12330 }
29433886 12331 stub_entry->group->lr_restore = stub_entry->stub_offset + size - 4;
f891966f
AM
12332 }
12333 break;
12334
12335 default:
12336 BFD_FAIL ();
12337 return FALSE;
721956f4
AM
12338 }
12339
6f20ed8a 12340 stub_entry->group->stub_sec->size += size;
b34976b6 12341 return TRUE;
721956f4
AM
12342}
12343
12344/* Set up various things so that we can make a list of input sections
12345 for each output section included in the link. Returns -1 on error,
cedb70c5 12346 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12347
12348int
e7d1c40c 12349ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12350{
6f20ed8a 12351 unsigned int id;
986f0783 12352 size_t amt;
721956f4
AM
12353 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12354
4dfe6ac6
NC
12355 if (htab == NULL)
12356 return -1;
4c52953f 12357
7cf7fcc8 12358 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12359 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12360 htab->sec_info = bfd_zmalloc (amt);
12361 if (htab->sec_info == NULL)
721956f4
AM
12362 return -1;
12363
3d6f9012
AM
12364 /* Set toc_off for com, und, abs and ind sections. */
12365 for (id = 0; id < 3; id++)
6f20ed8a 12366 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12367
721956f4
AM
12368 return 1;
12369}
12370
927be08e
AM
12371/* Set up for first pass at multitoc partitioning. */
12372
12373void
12374ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12375{
12376 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12377
1c865ab2 12378 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12379 htab->toc_bfd = NULL;
12380 htab->toc_first_sec = NULL;
12381}
12382
e717da7e
AM
12383/* The linker repeatedly calls this function for each TOC input section
12384 and linker generated GOT section. Group input bfds such that the toc
927be08e 12385 within a group is less than 64k in size. */
ad8e1ba5 12386
927be08e 12387bfd_boolean
4ce794b7 12388ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12389{
12390 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12391 bfd_vma addr, off, limit;
ad8e1ba5 12392
4dfe6ac6
NC
12393 if (htab == NULL)
12394 return FALSE;
12395
927be08e 12396 if (!htab->second_toc_pass)
4c52953f 12397 {
927be08e 12398 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12399 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12400
12401 if (new_bfd)
bf102f86
AM
12402 {
12403 htab->toc_bfd = isec->owner;
12404 htab->toc_first_sec = isec;
12405 }
927be08e 12406
bf102f86
AM
12407 addr = isec->output_offset + isec->output_section->vma;
12408 off = addr - htab->toc_curr;
d77c8a4b
AM
12409 limit = 0x80008000;
12410 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12411 limit = 0x10000;
12412 if (off + isec->size > limit)
bf102f86
AM
12413 {
12414 addr = (htab->toc_first_sec->output_offset
12415 + htab->toc_first_sec->output_section->vma);
12416 htab->toc_curr = addr;
a27e685f 12417 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12418 }
99877b66 12419
927be08e
AM
12420 /* toc_curr is the base address of this toc group. Set elf_gp
12421 for the input section to be the offset relative to the
12422 output toc base plus 0x8000. Making the input elf_gp an
12423 offset allows us to move the toc as a whole without
12424 recalculating input elf_gp. */
06bcf541 12425 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12426 off += TOC_BASE_OFF;
12427
12428 /* Die if someone uses a linker script that doesn't keep input
12429 file .toc and .got together. */
a4fd3de5
AM
12430 if (new_bfd
12431 && elf_gp (isec->owner) != 0
927be08e
AM
12432 && elf_gp (isec->owner) != off)
12433 return FALSE;
12434
12435 elf_gp (isec->owner) = off;
12436 return TRUE;
4c52953f 12437 }
927be08e
AM
12438
12439 /* During the second pass toc_first_sec points to the start of
12440 a toc group, and toc_curr is used to track the old elf_gp.
12441 We use toc_bfd to ensure we only look at each bfd once. */
12442 if (htab->toc_bfd == isec->owner)
12443 return TRUE;
12444 htab->toc_bfd = isec->owner;
12445
12446 if (htab->toc_first_sec == NULL
12447 || htab->toc_curr != elf_gp (isec->owner))
12448 {
12449 htab->toc_curr = elf_gp (isec->owner);
12450 htab->toc_first_sec = isec;
12451 }
12452 addr = (htab->toc_first_sec->output_offset
12453 + htab->toc_first_sec->output_section->vma);
06bcf541 12454 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12455 elf_gp (isec->owner) = off;
12456
12457 return TRUE;
ad8e1ba5
AM
12458}
12459
927be08e
AM
12460/* Called via elf_link_hash_traverse to merge GOT entries for global
12461 symbol H. */
12462
12463static bfd_boolean
12464merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12465{
12466 if (h->root.type == bfd_link_hash_indirect)
12467 return TRUE;
12468
927be08e
AM
12469 merge_got_entries (&h->got.glist);
12470
12471 return TRUE;
12472}
12473
12474/* Called via elf_link_hash_traverse to allocate GOT entries for global
12475 symbol H. */
12476
12477static bfd_boolean
12478reallocate_got (struct elf_link_hash_entry *h, void *inf)
12479{
12480 struct got_entry *gent;
12481
12482 if (h->root.type == bfd_link_hash_indirect)
12483 return TRUE;
12484
927be08e
AM
12485 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12486 if (!gent->is_indirect)
12487 allocate_got (h, (struct bfd_link_info *) inf, gent);
12488 return TRUE;
12489}
12490
12491/* Called on the first multitoc pass after the last call to
12492 ppc64_elf_next_toc_section. This function removes duplicate GOT
12493 entries. */
12494
12495bfd_boolean
12496ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12497{
12498 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12499 struct bfd *ibfd, *ibfd2;
12500 bfd_boolean done_something;
12501
12502 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12503
7865406b
AM
12504 if (!htab->do_multi_toc)
12505 return FALSE;
12506
d0fae19d 12507 /* Merge global sym got entries within a toc group. */
927be08e
AM
12508 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12509
12510 /* And tlsld_got. */
c72f2fb2 12511 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12512 {
12513 struct got_entry *ent, *ent2;
12514
12515 if (!is_ppc64_elf (ibfd))
12516 continue;
12517
12518 ent = ppc64_tlsld_got (ibfd);
12519 if (!ent->is_indirect
12520 && ent->got.offset != (bfd_vma) -1)
12521 {
c72f2fb2 12522 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12523 {
12524 if (!is_ppc64_elf (ibfd2))
12525 continue;
12526
12527 ent2 = ppc64_tlsld_got (ibfd2);
12528 if (!ent2->is_indirect
12529 && ent2->got.offset != (bfd_vma) -1
12530 && elf_gp (ibfd2) == elf_gp (ibfd))
12531 {
12532 ent2->is_indirect = TRUE;
12533 ent2->got.ent = ent;
12534 }
12535 }
12536 }
12537 }
12538
12539 /* Zap sizes of got sections. */
33e44f2e
AM
12540 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12541 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12542 htab->got_reli_size = 0;
12543
c72f2fb2 12544 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12545 {
12546 asection *got, *relgot;
12547
12548 if (!is_ppc64_elf (ibfd))
12549 continue;
12550
12551 got = ppc64_elf_tdata (ibfd)->got;
12552 if (got != NULL)
12553 {
12554 got->rawsize = got->size;
12555 got->size = 0;
12556 relgot = ppc64_elf_tdata (ibfd)->relgot;
12557 relgot->rawsize = relgot->size;
12558 relgot->size = 0;
12559 }
12560 }
12561
12562 /* Now reallocate the got, local syms first. We don't need to
12563 allocate section contents again since we never increase size. */
c72f2fb2 12564 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12565 {
12566 struct got_entry **lgot_ents;
12567 struct got_entry **end_lgot_ents;
12568 struct plt_entry **local_plt;
12569 struct plt_entry **end_local_plt;
f961d9dd 12570 unsigned char *lgot_masks;
927be08e
AM
12571 bfd_size_type locsymcount;
12572 Elf_Internal_Shdr *symtab_hdr;
19e08130 12573 asection *s;
927be08e
AM
12574
12575 if (!is_ppc64_elf (ibfd))
12576 continue;
12577
12578 lgot_ents = elf_local_got_ents (ibfd);
12579 if (!lgot_ents)
12580 continue;
12581
12582 symtab_hdr = &elf_symtab_hdr (ibfd);
12583 locsymcount = symtab_hdr->sh_info;
12584 end_lgot_ents = lgot_ents + locsymcount;
12585 local_plt = (struct plt_entry **) end_lgot_ents;
12586 end_local_plt = local_plt + locsymcount;
f961d9dd 12587 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12588 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12589 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12590 {
12591 struct got_entry *ent;
12592
12593 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12594 {
19e08130
AM
12595 unsigned int ent_size = 8;
12596 unsigned int rel_size = sizeof (Elf64_External_Rela);
12597
d0fae19d
AM
12598 ent->got.offset = s->size;
12599 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12600 {
19e08130
AM
12601 ent_size *= 2;
12602 rel_size *= 2;
12603 }
12604 s->size += ent_size;
37da22e5 12605 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12606 {
33e44f2e 12607 htab->elf.irelplt->size += rel_size;
19e08130
AM
12608 htab->got_reli_size += rel_size;
12609 }
6a3858a6 12610 else if (bfd_link_pic (info)
f749f26e 12611 && !(ent->tls_type != 0
6a3858a6 12612 && bfd_link_executable (info)))
19e08130
AM
12613 {
12614 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12615 srel->size += rel_size;
d0fae19d
AM
12616 }
12617 }
927be08e
AM
12618 }
12619 }
12620
12621 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12622
c72f2fb2 12623 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12624 {
12625 struct got_entry *ent;
12626
12627 if (!is_ppc64_elf (ibfd))
12628 continue;
12629
12630 ent = ppc64_tlsld_got (ibfd);
12631 if (!ent->is_indirect
12632 && ent->got.offset != (bfd_vma) -1)
12633 {
12634 asection *s = ppc64_elf_tdata (ibfd)->got;
12635 ent->got.offset = s->size;
12636 s->size += 16;
f749f26e 12637 if (bfd_link_dll (info))
927be08e
AM
12638 {
12639 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12640 srel->size += sizeof (Elf64_External_Rela);
12641 }
12642 }
12643 }
12644
33e44f2e 12645 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12646 if (!done_something)
c72f2fb2 12647 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12648 {
12649 asection *got;
12650
12651 if (!is_ppc64_elf (ibfd))
12652 continue;
12653
12654 got = ppc64_elf_tdata (ibfd)->got;
12655 if (got != NULL)
12656 {
12657 done_something = got->rawsize != got->size;
12658 if (done_something)
12659 break;
12660 }
12661 }
12662
12663 if (done_something)
e7d1c40c 12664 (*htab->params->layout_sections_again) ();
927be08e
AM
12665
12666 /* Set up for second pass over toc sections to recalculate elf_gp
12667 on input sections. */
12668 htab->toc_bfd = NULL;
12669 htab->toc_first_sec = NULL;
12670 htab->second_toc_pass = TRUE;
12671 return done_something;
12672}
12673
12674/* Called after second pass of multitoc partitioning. */
12675
12676void
12677ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12678{
12679 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12680
12681 /* After the second pass, toc_curr tracks the TOC offset used
12682 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12683 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12684}
12685
9b5ecbd0
AM
12686/* No toc references were found in ISEC. If the code in ISEC makes no
12687 calls, then there's no need to use toc adjusting stubs when branching
12688 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12689 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12690 needed, and 2 if a cyclical call-graph was found but no other reason
12691 for a stub was detected. If called from the top level, a return of
12692 2 means the same as a return of 0. */
9b5ecbd0
AM
12693
12694static int
4ce794b7 12695toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12696{
9b5ecbd0 12697 int ret;
70cc837d
AM
12698
12699 /* Mark this section as checked. */
12700 isec->call_check_done = 1;
9b5ecbd0 12701
772119ce
AM
12702 /* We know none of our code bearing sections will need toc stubs. */
12703 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12704 return 0;
12705
eea6121a 12706 if (isec->size == 0)
082c50f8
AM
12707 return 0;
12708
4c52953f
AM
12709 if (isec->output_section == NULL)
12710 return 0;
12711
4c52953f 12712 ret = 0;
70cc837d 12713 if (isec->reloc_count != 0)
9b5ecbd0 12714 {
70cc837d
AM
12715 Elf_Internal_Rela *relstart, *rel;
12716 Elf_Internal_Sym *local_syms;
12717 struct ppc_link_hash_table *htab;
2917689a 12718
70cc837d
AM
12719 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12720 info->keep_memory);
12721 if (relstart == NULL)
12722 return -1;
90aecf7a 12723
70cc837d
AM
12724 /* Look for branches to outside of this section. */
12725 local_syms = NULL;
12726 htab = ppc_hash_table (info);
12727 if (htab == NULL)
12728 return -1;
4c52953f 12729
70cc837d 12730 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12731 {
70cc837d
AM
12732 enum elf_ppc64_reloc_type r_type;
12733 unsigned long r_symndx;
12734 struct elf_link_hash_entry *h;
12735 struct ppc_link_hash_entry *eh;
12736 Elf_Internal_Sym *sym;
12737 asection *sym_sec;
12738 struct _opd_sec_data *opd;
12739 bfd_vma sym_value;
12740 bfd_vma dest;
12741
12742 r_type = ELF64_R_TYPE (rel->r_info);
12743 if (r_type != R_PPC64_REL24
05d0e962 12744 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12745 && r_type != R_PPC64_REL14
12746 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12747 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12748 && r_type != R_PPC64_PLTCALL
12749 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12750 continue;
4c52953f 12751
70cc837d
AM
12752 r_symndx = ELF64_R_SYM (rel->r_info);
12753 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12754 isec->owner))
4c52953f 12755 {
70cc837d
AM
12756 ret = -1;
12757 break;
12758 }
4c52953f 12759
70cc837d
AM
12760 /* Calls to dynamic lib functions go through a plt call stub
12761 that uses r2. */
ed7007c1 12762 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12763 if (eh != NULL
12764 && (eh->elf.plt.plist != NULL
12765 || (eh->oh != NULL
12766 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12767 {
12768 ret = 1;
12769 break;
4c52953f
AM
12770 }
12771
70cc837d
AM
12772 if (sym_sec == NULL)
12773 /* Ignore other undefined symbols. */
4c52953f 12774 continue;
4c52953f 12775
70cc837d
AM
12776 /* Assume branches to other sections not included in the
12777 link need stubs too, to cover -R and absolute syms. */
12778 if (sym_sec->output_section == NULL)
12779 {
12780 ret = 1;
12781 break;
12782 }
4c52953f 12783
70cc837d
AM
12784 if (h == NULL)
12785 sym_value = sym->st_value;
12786 else
12787 {
12788 if (h->root.type != bfd_link_hash_defined
12789 && h->root.type != bfd_link_hash_defweak)
12790 abort ();
12791 sym_value = h->root.u.def.value;
12792 }
12793 sym_value += rel->r_addend;
4c52953f 12794
70cc837d
AM
12795 /* If this branch reloc uses an opd sym, find the code section. */
12796 opd = get_opd_info (sym_sec);
12797 if (opd != NULL)
12798 {
12799 if (h == NULL && opd->adjust != NULL)
12800 {
12801 long adjust;
4c52953f 12802
92a9c616 12803 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12804 if (adjust == -1)
12805 /* Assume deleted functions won't ever be called. */
12806 continue;
12807 sym_value += adjust;
12808 }
4c52953f 12809
aef36ac1
AM
12810 dest = opd_entry_value (sym_sec, sym_value,
12811 &sym_sec, NULL, FALSE);
70cc837d
AM
12812 if (dest == (bfd_vma) -1)
12813 continue;
12814 }
12815 else
12816 dest = (sym_value
12817 + sym_sec->output_offset
12818 + sym_sec->output_section->vma);
4c52953f 12819
70cc837d
AM
12820 /* Ignore branch to self. */
12821 if (sym_sec == isec)
12822 continue;
4c52953f 12823
70cc837d
AM
12824 /* If the called function uses the toc, we need a stub. */
12825 if (sym_sec->has_toc_reloc
12826 || sym_sec->makes_toc_func_call)
4c52953f 12827 {
70cc837d 12828 ret = 1;
4c52953f
AM
12829 break;
12830 }
70cc837d
AM
12831
12832 /* Assume any branch that needs a long branch stub might in fact
12833 need a plt_branch stub. A plt_branch stub uses r2. */
12834 else if (dest - (isec->output_offset
12835 + isec->output_section->vma
6911b7dc
AM
12836 + rel->r_offset) + (1 << 25)
12837 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12838 ? h->other
12839 : sym->st_other))
4c52953f 12840 {
70cc837d
AM
12841 ret = 1;
12842 break;
12843 }
12844
12845 /* If calling back to a section in the process of being
12846 tested, we can't say for sure that no toc adjusting stubs
12847 are needed, so don't return zero. */
12848 else if (sym_sec->call_check_in_progress)
12849 ret = 2;
12850
12851 /* Branches to another section that itself doesn't have any TOC
12852 references are OK. Recursively call ourselves to check. */
12853 else if (!sym_sec->call_check_done)
12854 {
12855 int recur;
12856
12857 /* Mark current section as indeterminate, so that other
12858 sections that call back to current won't be marked as
12859 known. */
12860 isec->call_check_in_progress = 1;
12861 recur = toc_adjusting_stub_needed (info, sym_sec);
12862 isec->call_check_in_progress = 0;
12863
4c52953f
AM
12864 if (recur != 0)
12865 {
70cc837d
AM
12866 ret = recur;
12867 if (recur != 2)
12868 break;
4c52953f
AM
12869 }
12870 }
4c52953f 12871 }
70cc837d 12872
c9594989
AM
12873 if (elf_symtab_hdr (isec->owner).contents
12874 != (unsigned char *) local_syms)
70cc837d
AM
12875 free (local_syms);
12876 if (elf_section_data (isec)->relocs != relstart)
12877 free (relstart);
9b5ecbd0
AM
12878 }
12879
70cc837d
AM
12880 if ((ret & 1) == 0
12881 && isec->map_head.s != NULL
12882 && (strcmp (isec->output_section->name, ".init") == 0
12883 || strcmp (isec->output_section->name, ".fini") == 0))
12884 {
12885 if (isec->map_head.s->has_toc_reloc
12886 || isec->map_head.s->makes_toc_func_call)
12887 ret = 1;
12888 else if (!isec->map_head.s->call_check_done)
12889 {
12890 int recur;
12891 isec->call_check_in_progress = 1;
12892 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12893 isec->call_check_in_progress = 0;
12894 if (recur != 0)
12895 ret = recur;
12896 }
12897 }
12898
12899 if (ret == 1)
12900 isec->makes_toc_func_call = 1;
4c52953f 12901
9b5ecbd0
AM
12902 return ret;
12903}
12904
721956f4
AM
12905/* The linker repeatedly calls this function for each input section,
12906 in the order that input sections are linked into output sections.
12907 Build lists of input sections to determine groupings between which
12908 we may insert linker stubs. */
12909
9b5ecbd0 12910bfd_boolean
4ce794b7 12911ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12912{
12913 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12914
4dfe6ac6
NC
12915 if (htab == NULL)
12916 return FALSE;
12917
734b6cf9 12918 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12919 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12920 {
3d6f9012
AM
12921 /* This happens to make the list in reverse order,
12922 which is what we want. */
6f20ed8a
AM
12923 htab->sec_info[isec->id].u.list
12924 = htab->sec_info[isec->output_section->id].u.list;
12925 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12926 }
ad8e1ba5 12927
4c52953f 12928 if (htab->multi_toc_needed)
9b5ecbd0 12929 {
8b974ba3
AM
12930 /* Analyse sections that aren't already flagged as needing a
12931 valid toc pointer. Exclude .fixup for the linux kernel.
12932 .fixup contains branches, but only back to the function that
12933 hit an exception. */
12934 if (!(isec->has_toc_reloc
12935 || (isec->flags & SEC_CODE) == 0
12936 || strcmp (isec->name, ".fixup") == 0
12937 || isec->call_check_done))
12938 {
12939 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12940 return FALSE;
8b974ba3
AM
12941 }
12942 /* Make all sections use the TOC assigned for this object file.
12943 This will be wrong for pasted sections; We fix that in
12944 check_pasted_section(). */
12945 if (elf_gp (isec->owner) != 0)
12946 htab->toc_curr = elf_gp (isec->owner);
12947 }
12948
6f20ed8a 12949 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12950 return TRUE;
721956f4
AM
12951}
12952
70cc837d
AM
12953/* Check that all .init and .fini sections use the same toc, if they
12954 have toc relocs. */
12955
12956static bfd_boolean
12957check_pasted_section (struct bfd_link_info *info, const char *name)
12958{
12959 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12960
12961 if (o != NULL)
12962 {
12963 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12964 bfd_vma toc_off = 0;
12965 asection *i;
12966
12967 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12968 if (i->has_toc_reloc)
12969 {
12970 if (toc_off == 0)
6f20ed8a
AM
12971 toc_off = htab->sec_info[i->id].toc_off;
12972 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12973 return FALSE;
12974 }
6683a28d
AM
12975
12976 if (toc_off == 0)
12977 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12978 if (i->makes_toc_func_call)
12979 {
6f20ed8a 12980 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12981 break;
12982 }
12983
70cc837d
AM
12984 /* Make sure the whole pasted function uses the same toc offset. */
12985 if (toc_off != 0)
12986 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12987 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12988 }
12989 return TRUE;
12990}
12991
12992bfd_boolean
12993ppc64_elf_check_init_fini (struct bfd_link_info *info)
12994{
12995 return (check_pasted_section (info, ".init")
12996 & check_pasted_section (info, ".fini"));
12997}
12998
721956f4
AM
12999/* See whether we can group stub sections together. Grouping stub
13000 sections may result in fewer stubs. More importantly, we need to
13001 put all .init* and .fini* stubs at the beginning of the .init or
13002 .fini output sections respectively, because glibc splits the
13003 _init and _fini functions into multiple parts. Putting a stub in
13004 the middle of a function is not a good idea. */
13005
6f20ed8a
AM
13006static bfd_boolean
13007group_sections (struct bfd_link_info *info,
4ce794b7
AM
13008 bfd_size_type stub_group_size,
13009 bfd_boolean stubs_always_before_branch)
721956f4 13010{
6f20ed8a
AM
13011 struct ppc_link_hash_table *htab;
13012 asection *osec;
7c8fe5c4
AM
13013 bfd_boolean suppress_size_errors;
13014
6f20ed8a
AM
13015 htab = ppc_hash_table (info);
13016 if (htab == NULL)
13017 return FALSE;
13018
7c8fe5c4 13019 suppress_size_errors = FALSE;
7c8fe5c4
AM
13020 if (stub_group_size == 1)
13021 {
13022 /* Default values. */
13023 if (stubs_always_before_branch)
09f92717 13024 stub_group_size = 0x1e00000;
7c8fe5c4 13025 else
09f92717 13026 stub_group_size = 0x1c00000;
7c8fe5c4
AM
13027 suppress_size_errors = TRUE;
13028 }
13029
6f20ed8a 13030 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 13031 {
6f20ed8a
AM
13032 asection *tail;
13033
13034 if (osec->id >= htab->sec_info_arr_size)
13035 continue;
13036
13037 tail = htab->sec_info[osec->id].u.list;
734b6cf9 13038 while (tail != NULL)
721956f4 13039 {
734b6cf9
AM
13040 asection *curr;
13041 asection *prev;
13042 bfd_size_type total;
13043 bfd_boolean big_sec;
13044 bfd_vma curr_toc;
6f20ed8a 13045 struct map_stub *group;
09f92717 13046 bfd_size_type group_size;
734b6cf9
AM
13047
13048 curr = tail;
eea6121a 13049 total = tail->size;
09f92717
AM
13050 group_size = (ppc64_elf_section_data (tail) != NULL
13051 && ppc64_elf_section_data (tail)->has_14bit_branch
13052 ? stub_group_size >> 10 : stub_group_size);
13053
13054 big_sec = total > group_size;
7c8fe5c4 13055 if (big_sec && !suppress_size_errors)
695344c0 13056 /* xgettext:c-format */
871b3ab2 13057 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 13058 tail->owner, tail);
6f20ed8a 13059 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 13060
6f20ed8a 13061 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 13062 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
13063 < (ppc64_elf_section_data (prev) != NULL
13064 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 13065 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 13066 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
13067 curr = prev;
13068
13069 /* OK, the size from the start of CURR to the end is less
09f92717 13070 than group_size and thus can be handled by one stub
734b6cf9 13071 section. (or the tail section is itself larger than
09f92717
AM
13072 group_size, in which case we may be toast.) We should
13073 really be keeping track of the total size of stubs added
13074 here, as stubs contribute to the final output section
13075 size. That's a little tricky, and this way will only
13076 break if stubs added make the total size more than 2^25,
13077 ie. for the default stub_group_size, if stubs total more
13078 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
13079 group = bfd_alloc (curr->owner, sizeof (*group));
13080 if (group == NULL)
13081 return FALSE;
13082 group->link_sec = curr;
13083 group->stub_sec = NULL;
a4b6fadd 13084 group->needs_save_res = 0;
df136d64
AM
13085 group->lr_restore = 0;
13086 group->eh_size = 0;
13087 group->eh_base = 0;
a4b6fadd
AM
13088 group->next = htab->group;
13089 htab->group = group;
734b6cf9 13090 do
721956f4 13091 {
6f20ed8a 13092 prev = htab->sec_info[tail->id].u.list;
734b6cf9 13093 /* Set up this stub group. */
6f20ed8a 13094 htab->sec_info[tail->id].u.group = group;
721956f4 13095 }
734b6cf9
AM
13096 while (tail != curr && (tail = prev) != NULL);
13097
09f92717 13098 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
13099 bytes before the stub section can be handled by it too.
13100 Don't do this if we have a really large section after the
13101 stubs, as adding more stubs increases the chance that
13102 branches may not reach into the stub section. */
13103 if (!stubs_always_before_branch && !big_sec)
13104 {
13105 total = 0;
13106 while (prev != NULL
13107 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
13108 < (ppc64_elf_section_data (prev) != NULL
13109 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
13110 ? (group_size = stub_group_size >> 10)
13111 : group_size))
6f20ed8a 13112 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
13113 {
13114 tail = prev;
6f20ed8a
AM
13115 prev = htab->sec_info[tail->id].u.list;
13116 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
13117 }
13118 }
13119 tail = prev;
721956f4
AM
13120 }
13121 }
6f20ed8a 13122 return TRUE;
721956f4
AM
13123}
13124
58d180e8
AM
13125static const unsigned char glink_eh_frame_cie[] =
13126{
13127 0, 0, 0, 16, /* length. */
13128 0, 0, 0, 0, /* id. */
13129 1, /* CIE version. */
13130 'z', 'R', 0, /* Augmentation string. */
13131 4, /* Code alignment. */
13132 0x78, /* Data alignment. */
13133 65, /* RA reg. */
13134 1, /* Augmentation size. */
13135 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 13136 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
13137};
13138
d969d15f
AM
13139/* Stripping output sections is normally done before dynamic section
13140 symbols have been allocated. This function is called later, and
13141 handles cases like htab->brlt which is mapped to its own output
13142 section. */
13143
13144static void
13145maybe_strip_output (struct bfd_link_info *info, asection *isec)
13146{
13147 if (isec->size == 0
13148 && isec->output_section->size == 0
53d8967a 13149 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13150 && !bfd_section_removed_from_list (info->output_bfd,
13151 isec->output_section)
13152 && elf_section_data (isec->output_section)->dynindx == 0)
13153 {
13154 isec->output_section->flags |= SEC_EXCLUDE;
13155 bfd_section_list_remove (info->output_bfd, isec->output_section);
13156 info->output_bfd->section_count--;
13157 }
13158}
13159
721956f4
AM
13160/* Determine and set the size of the stub section for a final link.
13161
13162 The basic idea here is to examine all the relocations looking for
13163 PC-relative calls to a target that is unreachable with a "bl"
13164 instruction. */
13165
b34976b6 13166bfd_boolean
e7d1c40c 13167ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13168{
13169 bfd_size_type stub_group_size;
b34976b6 13170 bfd_boolean stubs_always_before_branch;
721956f4
AM
13171 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13172
4dfe6ac6
NC
13173 if (htab == NULL)
13174 return FALSE;
13175
e10a07b3
AM
13176 if (htab->params->power10_stubs == -1 && !htab->has_power10_relocs)
13177 htab->params->power10_stubs = 0;
13178
0e1862bb 13179 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13180 htab->params->plt_thread_safe = 1;
b9e5796b 13181 if (!htab->opd_abi)
e7d1c40c
AM
13182 htab->params->plt_thread_safe = 0;
13183 else if (htab->params->plt_thread_safe == -1)
794e51c0 13184 {
e2458743 13185 static const char *const thread_starter[] =
794e51c0
AM
13186 {
13187 "pthread_create",
13188 /* libstdc++ */
13189 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13190 /* librt */
13191 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13192 "mq_notify", "create_timer",
13193 /* libanl */
13194 "getaddrinfo_a",
13195 /* libgomp */
2300b5a1 13196 "GOMP_parallel",
794e51c0 13197 "GOMP_parallel_start",
2300b5a1 13198 "GOMP_parallel_loop_static",
794e51c0 13199 "GOMP_parallel_loop_static_start",
2300b5a1 13200 "GOMP_parallel_loop_dynamic",
794e51c0 13201 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13202 "GOMP_parallel_loop_guided",
794e51c0 13203 "GOMP_parallel_loop_guided_start",
2300b5a1 13204 "GOMP_parallel_loop_runtime",
794e51c0 13205 "GOMP_parallel_loop_runtime_start",
2300b5a1 13206 "GOMP_parallel_sections",
68ffbac6 13207 "GOMP_parallel_sections_start",
f9dffbf0
AM
13208 /* libgo */
13209 "__go_go",
794e51c0
AM
13210 };
13211 unsigned i;
13212
a4b6fadd 13213 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13214 {
13215 struct elf_link_hash_entry *h;
13216 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13217 FALSE, FALSE, TRUE);
e7d1c40c
AM
13218 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13219 if (htab->params->plt_thread_safe)
794e51c0
AM
13220 break;
13221 }
13222 }
e7d1c40c
AM
13223 stubs_always_before_branch = htab->params->group_size < 0;
13224 if (htab->params->group_size < 0)
13225 stub_group_size = -htab->params->group_size;
721956f4 13226 else
e7d1c40c 13227 stub_group_size = htab->params->group_size;
721956f4 13228
6f20ed8a
AM
13229 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13230 return FALSE;
721956f4 13231
a804e476
AM
13232 htab->tga_group = NULL;
13233 if (!htab->params->no_tls_get_addr_regsave
13234 && htab->tga_desc_fd != NULL
13235 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13236 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13237 && htab->tls_get_addr_fd != NULL
13238 && is_static_defined (&htab->tls_get_addr_fd->elf))
13239 {
13240 asection *sym_sec, *code_sec, *stub_sec;
13241 bfd_vma sym_value;
13242 struct _opd_sec_data *opd;
13243
13244 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13245 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13246 code_sec = sym_sec;
13247 opd = get_opd_info (sym_sec);
13248 if (opd != NULL)
13249 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13250 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13251 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13252 htab->tga_group->link_sec);
13253 if (stub_sec == NULL)
13254 return FALSE;
13255 htab->tga_group->stub_sec = stub_sec;
13256
13257 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13258 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13259 htab->tga_desc_fd->elf.root.u.def.value = 0;
13260 htab->tga_desc_fd->elf.type = STT_FUNC;
13261 htab->tga_desc_fd->elf.def_regular = 1;
13262 htab->tga_desc_fd->elf.non_elf = 0;
13263 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13264 }
13265
c9301e31
AM
13266#define STUB_SHRINK_ITER 20
13267 /* Loop until no stubs added. After iteration 20 of this loop we may
13268 exit on a stub section shrinking. This is to break out of a
13269 pathological case where adding stubs on one iteration decreases
13270 section gaps (perhaps due to alignment), which then requires
13271 fewer or smaller stubs on the next iteration. */
13272
721956f4
AM
13273 while (1)
13274 {
13275 bfd *input_bfd;
13276 unsigned int bfd_indx;
a4b6fadd 13277 struct map_stub *group;
721956f4
AM
13278
13279 htab->stub_iteration += 1;
721956f4
AM
13280
13281 for (input_bfd = info->input_bfds, bfd_indx = 0;
13282 input_bfd != NULL;
c72f2fb2 13283 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13284 {
13285 Elf_Internal_Shdr *symtab_hdr;
13286 asection *section;
6cdc0ccc 13287 Elf_Internal_Sym *local_syms = NULL;
721956f4 13288
0c8d6e5c 13289 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13290 continue;
13291
721956f4 13292 /* We'll need the symbol table in a second. */
0ffa91dd 13293 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13294 if (symtab_hdr->sh_info == 0)
13295 continue;
13296
721956f4
AM
13297 /* Walk over each section attached to the input bfd. */
13298 for (section = input_bfd->sections;
13299 section != NULL;
13300 section = section->next)
13301 {
721956f4 13302 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13303
13304 /* If there aren't any relocs, then there's nothing more
13305 to do. */
13306 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13307 || (section->flags & SEC_ALLOC) == 0
13308 || (section->flags & SEC_LOAD) == 0
13309 || (section->flags & SEC_CODE) == 0
721956f4
AM
13310 || section->reloc_count == 0)
13311 continue;
13312
13313 /* If this section is a link-once section that will be
13314 discarded, then don't create any stubs. */
13315 if (section->output_section == NULL
927be08e 13316 || section->output_section->owner != info->output_bfd)
721956f4
AM
13317 continue;
13318
1e2f5b6e
AM
13319 /* Get the relocs. */
13320 internal_relocs
4ce794b7 13321 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13322 info->keep_memory);
721956f4 13323 if (internal_relocs == NULL)
1e2f5b6e 13324 goto error_ret_free_local;
721956f4
AM
13325
13326 /* Now examine each relocation. */
13327 irela = internal_relocs;
13328 irelaend = irela + section->reloc_count;
13329 for (; irela < irelaend; irela++)
13330 {
4ce794b7
AM
13331 enum elf_ppc64_reloc_type r_type;
13332 unsigned int r_indx;
721956f4
AM
13333 enum ppc_stub_type stub_type;
13334 struct ppc_stub_hash_entry *stub_entry;
8387904d 13335 asection *sym_sec, *code_sec;
e054468f 13336 bfd_vma sym_value, code_value;
721956f4 13337 bfd_vma destination;
6911b7dc 13338 unsigned long local_off;
8843416a 13339 bfd_boolean ok_dest;
721956f4 13340 struct ppc_link_hash_entry *hash;
8387904d 13341 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13342 struct elf_link_hash_entry *h;
13343 Elf_Internal_Sym *sym;
721956f4
AM
13344 char *stub_name;
13345 const asection *id_sec;
74f0fb50 13346 struct _opd_sec_data *opd;
e054468f 13347 struct plt_entry *plt_ent;
721956f4
AM
13348
13349 r_type = ELF64_R_TYPE (irela->r_info);
13350 r_indx = ELF64_R_SYM (irela->r_info);
13351
4ce794b7 13352 if (r_type >= R_PPC64_max)
721956f4
AM
13353 {
13354 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13355 goto error_ret_free_internal;
721956f4
AM
13356 }
13357
13358 /* Only look for stubs on branch instructions. */
4ce794b7 13359 if (r_type != R_PPC64_REL24
05d0e962 13360 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13361 && r_type != R_PPC64_REL14
13362 && r_type != R_PPC64_REL14_BRTAKEN
13363 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13364 continue;
13365
13366 /* Now determine the call target, its name, value,
13367 section. */
411e1bfb
AM
13368 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13369 r_indx, input_bfd))
13370 goto error_ret_free_internal;
ed7007c1 13371 hash = ppc_elf_hash_entry (h);
411e1bfb 13372
8843416a 13373 ok_dest = FALSE;
8387904d 13374 fdh = NULL;
7fe2b9a6 13375 sym_value = 0;
411e1bfb 13376 if (hash == NULL)
721956f4 13377 {
411e1bfb 13378 sym_value = sym->st_value;
c27b8c2a
AM
13379 if (sym_sec != NULL
13380 && sym_sec->output_section != NULL)
13381 ok_dest = TRUE;
721956f4 13382 }
7fe2b9a6
AM
13383 else if (hash->elf.root.type == bfd_link_hash_defined
13384 || hash->elf.root.type == bfd_link_hash_defweak)
13385 {
13386 sym_value = hash->elf.root.u.def.value;
13387 if (sym_sec->output_section != NULL)
13388 ok_dest = TRUE;
13389 }
13390 else if (hash->elf.root.type == bfd_link_hash_undefweak
13391 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13392 {
99877b66 13393 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13394 use the func descriptor sym instead if it is
13395 defined. */
ceb1f1ef 13396 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13397 && hash->oh != NULL)
8387904d 13398 {
8c5b4e52 13399 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13400 if (fdh->elf.root.type == bfd_link_hash_defined
13401 || fdh->elf.root.type == bfd_link_hash_defweak)
13402 {
13403 sym_sec = fdh->elf.root.u.def.section;
13404 sym_value = fdh->elf.root.u.def.value;
13405 if (sym_sec->output_section != NULL)
13406 ok_dest = TRUE;
13407 }
99877b66
AM
13408 else
13409 fdh = NULL;
8387904d 13410 }
7fe2b9a6
AM
13411 }
13412 else
13413 {
13414 bfd_set_error (bfd_error_bad_value);
13415 goto error_ret_free_internal;
721956f4
AM
13416 }
13417
8843416a 13418 destination = 0;
6911b7dc 13419 local_off = 0;
8843416a
AM
13420 if (ok_dest)
13421 {
13422 sym_value += irela->r_addend;
13423 destination = (sym_value
13424 + sym_sec->output_offset
13425 + sym_sec->output_section->vma);
6911b7dc
AM
13426 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13427 ? hash->elf.other
13428 : sym->st_other);
8843416a
AM
13429 }
13430
8387904d 13431 code_sec = sym_sec;
e054468f 13432 code_value = sym_value;
74f0fb50
AM
13433 opd = get_opd_info (sym_sec);
13434 if (opd != NULL)
8387904d
AM
13435 {
13436 bfd_vma dest;
13437
74f0fb50 13438 if (hash == NULL && opd->adjust != NULL)
8387904d 13439 {
51aecdc5 13440 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13441 if (adjust == -1)
13442 continue;
e054468f 13443 code_value += adjust;
8387904d
AM
13444 sym_value += adjust;
13445 }
13446 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13447 &code_sec, &code_value, FALSE);
8387904d
AM
13448 if (dest != (bfd_vma) -1)
13449 {
13450 destination = dest;
13451 if (fdh != NULL)
13452 {
13453 /* Fixup old ABI sym to point at code
13454 entry. */
99877b66 13455 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13456 hash->elf.root.u.def.section = code_sec;
e054468f 13457 hash->elf.root.u.def.value = code_value;
8387904d
AM
13458 }
13459 }
13460 }
13461
721956f4 13462 /* Determine what (if any) linker stub is needed. */
e054468f 13463 plt_ent = NULL;
721956f4 13464 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13465 &plt_ent, destination,
13466 local_off);
ad8e1ba5 13467
05d0e962
AM
13468 if (r_type == R_PPC64_REL24_NOTOC)
13469 {
13470 if (stub_type == ppc_stub_plt_call)
13471 stub_type = ppc_stub_plt_call_notoc;
13472 else if (stub_type == ppc_stub_long_branch
13473 || (code_sec != NULL
13474 && code_sec->output_section != NULL
13475 && (((hash ? hash->elf.other : sym->st_other)
13476 & STO_PPC64_LOCAL_MASK)
4a4e7361 13477 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13478 stub_type = ppc_stub_long_branch_notoc;
13479 }
13480 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13481 {
13482 /* Check whether we need a TOC adjusting stub.
13483 Since the linker pastes together pieces from
13484 different object files when creating the
13485 _init and _fini functions, it may be that a
13486 call to what looks like a local sym is in
13487 fact a call needing a TOC adjustment. */
33cb30a1
AM
13488 if ((code_sec != NULL
13489 && code_sec->output_section != NULL
33cb30a1 13490 && (code_sec->has_toc_reloc
918dc783
AM
13491 || code_sec->makes_toc_func_call)
13492 && (htab->sec_info[code_sec->id].toc_off
13493 != htab->sec_info[section->id].toc_off))
33cb30a1
AM
13494 || (((hash ? hash->elf.other : sym->st_other)
13495 & STO_PPC64_LOCAL_MASK)
13496 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13497 stub_type = ppc_stub_long_branch_r2off;
13498 }
13499
721956f4
AM
13500 if (stub_type == ppc_stub_none)
13501 continue;
13502
411e1bfb
AM
13503 /* __tls_get_addr calls might be eliminated. */
13504 if (stub_type != ppc_stub_plt_call
05d0e962 13505 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13506 && hash != NULL
ed7007c1 13507 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13508 && section->has_tls_reloc
13509 && irela != internal_relocs)
13510 {
13511 /* Get tls info. */
f961d9dd 13512 unsigned char *tls_mask;
411e1bfb 13513
3a71aa26 13514 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13515 irela - 1, input_bfd))
13516 goto error_ret_free_internal;
abc489c6
AM
13517 if ((*tls_mask & TLS_TLS) != 0
13518 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13519 continue;
13520 }
13521
f378ab09 13522 if (stub_type == ppc_stub_plt_call)
794e51c0 13523 {
6e1816be
AM
13524 if (!htab->opd_abi
13525 && htab->params->plt_localentry0 != 0
13526 && is_elfv2_localentry0 (&hash->elf))
13527 htab->has_plt_localentry0 = 1;
13528 else if (irela + 1 < irelaend
13529 && irela[1].r_offset == irela->r_offset + 4
13530 && (ELF64_R_TYPE (irela[1].r_info)
13531 == R_PPC64_TOCSAVE))
f378ab09
AM
13532 {
13533 if (!tocsave_find (htab, INSERT,
13534 &local_syms, irela + 1, input_bfd))
13535 goto error_ret_free_internal;
13536 }
f378ab09
AM
13537 else
13538 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13539 }
3b421ab3 13540
721956f4 13541 /* Support for grouping stub sections. */
6f20ed8a 13542 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13543
13544 /* Get the name of this stub. */
13545 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13546 if (!stub_name)
13547 goto error_ret_free_internal;
13548
13549 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13550 stub_name, FALSE, FALSE);
721956f4
AM
13551 if (stub_entry != NULL)
13552 {
05d0e962 13553 enum ppc_stub_type old_type;
e10a07b3 13554
05d0e962
AM
13555 /* A stub has already been created, but it may
13556 not be the required type. We shouldn't be
13557 transitioning from plt_call to long_branch
13558 stubs or vice versa, but we might be
13559 upgrading from plt_call to plt_call_r2save or
13560 from long_branch to long_branch_r2off. */
721956f4 13561 free (stub_name);
e10a07b3
AM
13562 if (htab->params->power10_stubs == -1)
13563 {
13564 /* For --power10-stubs=auto, don't merge _notoc
13565 and other varieties of stubs. (The _both
13566 variety won't be created.) */
13567 bfd_boolean notoc = r_type == R_PPC64_REL24_NOTOC;
13568 struct ppc_stub_hash_entry *alt_stub
13569 = select_alt_stub (stub_entry, notoc);
13570
13571 if (alt_stub == NULL)
13572 {
13573 alt_stub = (struct ppc_stub_hash_entry *)
13574 stub_hash_newfunc (NULL,
13575 &htab->stub_hash_table,
13576 stub_entry->root.string);
13577 if (alt_stub == NULL)
13578 {
13579 /* xgettext:c-format */
13580 _bfd_error_handler
13581 (_("%pB: cannot create stub entry %s"),
13582 section->owner, stub_entry->root.string);
13583 goto error_ret_free_internal;
13584 }
13585 *alt_stub = *stub_entry;
13586 stub_entry->root.next = &alt_stub->root;
13587 if (notoc)
13588 /* Sort notoc stubs first, for no good
13589 reason. */
13590 alt_stub = stub_entry;
13591 alt_stub->stub_type = stub_type;
13592 }
13593 stub_entry = alt_stub;
13594 }
05d0e962
AM
13595 old_type = stub_entry->stub_type;
13596 switch (old_type)
13597 {
13598 default:
13599 abort ();
13600
13601 case ppc_stub_save_res:
13602 continue;
13603
13604 case ppc_stub_plt_call:
13605 case ppc_stub_plt_call_r2save:
13606 case ppc_stub_plt_call_notoc:
13607 case ppc_stub_plt_call_both:
13608 if (stub_type == ppc_stub_plt_call)
13609 continue;
13610 else if (stub_type == ppc_stub_plt_call_r2save)
13611 {
13612 if (old_type == ppc_stub_plt_call_notoc)
13613 stub_type = ppc_stub_plt_call_both;
13614 }
13615 else if (stub_type == ppc_stub_plt_call_notoc)
13616 {
13617 if (old_type == ppc_stub_plt_call_r2save)
13618 stub_type = ppc_stub_plt_call_both;
13619 }
13620 else
13621 abort ();
13622 break;
13623
13624 case ppc_stub_plt_branch:
13625 case ppc_stub_plt_branch_r2off:
13626 case ppc_stub_plt_branch_notoc:
13627 case ppc_stub_plt_branch_both:
13628 old_type += (ppc_stub_long_branch
13629 - ppc_stub_plt_branch);
13630 /* Fall through. */
13631 case ppc_stub_long_branch:
13632 case ppc_stub_long_branch_r2off:
13633 case ppc_stub_long_branch_notoc:
13634 case ppc_stub_long_branch_both:
13635 if (stub_type == ppc_stub_long_branch)
13636 continue;
13637 else if (stub_type == ppc_stub_long_branch_r2off)
13638 {
13639 if (old_type == ppc_stub_long_branch_notoc)
13640 stub_type = ppc_stub_long_branch_both;
13641 }
13642 else if (stub_type == ppc_stub_long_branch_notoc)
13643 {
13644 if (old_type == ppc_stub_long_branch_r2off)
13645 stub_type = ppc_stub_long_branch_both;
13646 }
13647 else
13648 abort ();
13649 break;
13650 }
13651 if (old_type < stub_type)
794e51c0 13652 stub_entry->stub_type = stub_type;
721956f4
AM
13653 continue;
13654 }
13655
25f53a85 13656 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13657 if (stub_entry == NULL)
13658 {
13659 free (stub_name);
6cdc0ccc
AM
13660 error_ret_free_internal:
13661 if (elf_section_data (section)->relocs == NULL)
13662 free (internal_relocs);
13663 error_ret_free_local:
c9594989
AM
13664 if (symtab_hdr->contents
13665 != (unsigned char *) local_syms)
6cdc0ccc 13666 free (local_syms);
b34976b6 13667 return FALSE;
721956f4
AM
13668 }
13669
ad8e1ba5 13670 stub_entry->stub_type = stub_type;
05d0e962
AM
13671 if (stub_type >= ppc_stub_plt_call
13672 && stub_type <= ppc_stub_plt_call_both)
e054468f 13673 {
05d0e962
AM
13674 stub_entry->target_value = sym_value;
13675 stub_entry->target_section = sym_sec;
e054468f
AM
13676 }
13677 else
13678 {
05d0e962
AM
13679 stub_entry->target_value = code_value;
13680 stub_entry->target_section = code_sec;
e054468f 13681 }
721956f4 13682 stub_entry->h = hash;
e054468f 13683 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13684 stub_entry->symtype
13685 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13686 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13687
3d58e1fc
AM
13688 if (hash != NULL
13689 && (hash->elf.root.type == bfd_link_hash_defined
13690 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13691 htab->stub_globals += 1;
721956f4
AM
13692 }
13693
13694 /* We're done with the internal relocs, free them. */
6cdc0ccc 13695 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13696 free (internal_relocs);
721956f4 13697 }
6cdc0ccc
AM
13698
13699 if (local_syms != NULL
13700 && symtab_hdr->contents != (unsigned char *) local_syms)
13701 {
13702 if (!info->keep_memory)
13703 free (local_syms);
13704 else
13705 symtab_hdr->contents = (unsigned char *) local_syms;
13706 }
721956f4
AM
13707 }
13708
5c3dead3 13709 /* We may have added some stubs. Find out the new size of the
721956f4 13710 stub sections. */
d4aaa2a0 13711 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13712 {
13713 group->lr_restore = 0;
13714 group->eh_size = 0;
13715 if (group->stub_sec != NULL)
13716 {
13717 asection *stub_sec = group->stub_sec;
13718
13719 if (htab->stub_iteration <= STUB_SHRINK_ITER
13720 || stub_sec->rawsize < stub_sec->size)
13721 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13722 stub_sec->rawsize = stub_sec->size;
13723 stub_sec->size = 0;
13724 stub_sec->reloc_count = 0;
13725 stub_sec->flags &= ~SEC_RELOC;
13726 }
13727 }
a804e476
AM
13728 if (htab->tga_group != NULL)
13729 {
13730 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13731 htab->tga_group->eh_size
13732 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13733 htab->tga_group->lr_restore = 23 * 4;
13734 htab->tga_group->stub_sec->size = 24 * 4;
13735 }
eea6121a 13736
ba21f564
AM
13737 if (htab->stub_iteration <= STUB_SHRINK_ITER
13738 || htab->brlt->rawsize < htab->brlt->size)
13739 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13740 htab->brlt->size = 0;
84f5d08e
AM
13741 htab->brlt->reloc_count = 0;
13742 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13743 if (htab->relbrlt != NULL)
eea6121a 13744 htab->relbrlt->size = 0;
721956f4 13745
63bc6f6c 13746 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13747
a4b6fadd
AM
13748 for (group = htab->group; group != NULL; group = group->next)
13749 if (group->needs_save_res)
13750 group->stub_sec->size += htab->sfpr->size;
13751
176a0d42
AM
13752 if (info->emitrelocations
13753 && htab->glink != NULL && htab->glink->size != 0)
13754 {
13755 htab->glink->reloc_count = 1;
13756 htab->glink->flags |= SEC_RELOC;
13757 }
13758
58d180e8
AM
13759 if (htab->glink_eh_frame != NULL
13760 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13761 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13762 {
2e0ce1c8 13763 size_t size = 0, align = 4;
58d180e8 13764
d4aaa2a0 13765 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13766 if (group->eh_size != 0)
13767 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13768 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13769 size += (24 + align - 1) & -align;
58d180e8 13770 if (size != 0)
2e0ce1c8
AM
13771 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13772 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13773 size = (size + align - 1) & -align;
58d180e8
AM
13774 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13775 htab->glink_eh_frame->size = size;
13776 }
13777
e7d1c40c 13778 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13779 for (group = htab->group; group != NULL; group = group->next)
13780 if (group->stub_sec != NULL)
691d2e9a
AM
13781 {
13782 int align = abs (htab->params->plt_stub_align);
13783 group->stub_sec->size
13784 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13785 }
d4aaa2a0
AM
13786
13787 for (group = htab->group; group != NULL; group = group->next)
13788 if (group->stub_sec != NULL
13789 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13790 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13791 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13792 break;
13793
d4aaa2a0 13794 if (group == NULL
ba21f564
AM
13795 && (htab->brlt->rawsize == htab->brlt->size
13796 || (htab->stub_iteration > STUB_SHRINK_ITER
13797 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13798 && (htab->glink_eh_frame == NULL
a804e476
AM
13799 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13800 && (htab->tga_group == NULL
13801 || htab->stub_iteration > 1))
5c3dead3
AM
13802 break;
13803
721956f4 13804 /* Ask the linker to do its stuff. */
e7d1c40c 13805 (*htab->params->layout_sections_again) ();
721956f4
AM
13806 }
13807
da44f4e5
AM
13808 if (htab->glink_eh_frame != NULL
13809 && htab->glink_eh_frame->size != 0)
13810 {
13811 bfd_vma val;
13812 bfd_byte *p, *last_fde;
13813 size_t last_fde_len, size, align, pad;
d4aaa2a0 13814 struct map_stub *group;
da44f4e5 13815
df136d64
AM
13816 /* It is necessary to at least have a rough outline of the
13817 linker generated CIEs and FDEs written before
13818 bfd_elf_discard_info is run, in order for these FDEs to be
13819 indexed in .eh_frame_hdr. */
da44f4e5
AM
13820 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13821 if (p == NULL)
13822 return FALSE;
13823 htab->glink_eh_frame->contents = p;
13824 last_fde = p;
2e0ce1c8 13825 align = 4;
da44f4e5
AM
13826
13827 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13828 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13829 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13830 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13831 p += last_fde_len + 4;
da44f4e5 13832
d4aaa2a0 13833 for (group = htab->group; group != NULL; group = group->next)
df136d64 13834 if (group->eh_size != 0)
da44f4e5 13835 {
df136d64 13836 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13837 last_fde = p;
df136d64 13838 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13839 /* FDE length. */
2e0ce1c8 13840 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13841 p += 4;
13842 /* CIE pointer. */
13843 val = p - htab->glink_eh_frame->contents;
13844 bfd_put_32 (htab->elf.dynobj, val, p);
13845 p += 4;
13846 /* Offset to stub section, written later. */
13847 p += 4;
13848 /* stub section size. */
d4aaa2a0 13849 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13850 p += 4;
13851 /* Augmentation. */
13852 p += 1;
df136d64
AM
13853 /* Make sure we don't have all nops. This is enough for
13854 elf-eh-frame.c to detect the last non-nop opcode. */
13855 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13856 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13857 }
13858 if (htab->glink != NULL && htab->glink->size != 0)
13859 {
13860 last_fde = p;
2e0ce1c8 13861 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13862 /* FDE length. */
2e0ce1c8 13863 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13864 p += 4;
13865 /* CIE pointer. */
13866 val = p - htab->glink_eh_frame->contents;
13867 bfd_put_32 (htab->elf.dynobj, val, p);
13868 p += 4;
13869 /* Offset to .glink, written later. */
13870 p += 4;
13871 /* .glink size. */
13872 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13873 p += 4;
13874 /* Augmentation. */
13875 p += 1;
13876
13877 *p++ = DW_CFA_advance_loc + 1;
13878 *p++ = DW_CFA_register;
13879 *p++ = 65;
9f08fa5c 13880 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13881 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13882 *p++ = DW_CFA_restore_extended;
13883 *p++ = 65;
2e0ce1c8 13884 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13885 }
13886 /* Subsume any padding into the last FDE if user .eh_frame
13887 sections are aligned more than glink_eh_frame. Otherwise any
13888 zero padding will be seen as a terminator. */
2e0ce1c8 13889 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13890 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13891 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13892 htab->glink_eh_frame->size = size + pad;
13893 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13894 }
13895
d969d15f 13896 maybe_strip_output (info, htab->brlt);
2efec98b
AM
13897 if (htab->relbrlt != NULL)
13898 maybe_strip_output (info, htab->relbrlt);
d969d15f
AM
13899 if (htab->glink_eh_frame != NULL)
13900 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13901
b34976b6 13902 return TRUE;
721956f4
AM
13903}
13904
13905/* Called after we have determined section placement. If sections
805fc799 13906 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13907
805fc799 13908bfd_vma
1c865ab2 13909ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13910{
805fc799 13911 asection *s;
a27e685f 13912 bfd_vma TOCstart, adjust;
721956f4 13913
43417696
AM
13914 if (info != NULL)
13915 {
13916 struct elf_link_hash_entry *h;
13917 struct elf_link_hash_table *htab = elf_hash_table (info);
13918
13919 if (is_elf_hash_table (htab)
13920 && htab->hgot != NULL)
13921 h = htab->hgot;
13922 else
13923 {
13924 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13925 if (is_elf_hash_table (htab))
13926 htab->hgot = h;
13927 }
13928 if (h != NULL
13929 && h->root.type == bfd_link_hash_defined
13930 && !h->root.linker_def
13931 && (!is_elf_hash_table (htab)
13932 || h->def_regular))
13933 {
ed7007c1 13934 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13935 _bfd_set_gp_value (obfd, TOCstart);
13936 return TOCstart;
13937 }
13938 }
13939
805fc799
AM
13940 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13941 order. The TOC starts where the first of these sections starts. */
13942 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13943 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13944 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13945 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13946 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13947 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13948 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13949 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13950 {
13951 /* This may happen for
13952 o references to TOC base (SYM@toc / TOC[tc0]) without a
13953 .toc directive
13954 o bad linker script
13955 o --gc-sections and empty TOC sections
13956
13957 FIXME: Warn user? */
13958
13959 /* Look for a likely section. We probably won't even be
13960 using TOCstart. */
13961 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13962 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13963 | SEC_EXCLUDE))
805fc799
AM
13964 == (SEC_ALLOC | SEC_SMALL_DATA))
13965 break;
721956f4 13966 if (s == NULL)
805fc799 13967 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13968 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13969 == (SEC_ALLOC | SEC_SMALL_DATA))
13970 break;
721956f4 13971 if (s == NULL)
805fc799 13972 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13973 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13974 == SEC_ALLOC)
805fc799 13975 break;
721956f4 13976 if (s == NULL)
805fc799 13977 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13978 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13979 break;
13980 }
721956f4 13981
805fc799
AM
13982 TOCstart = 0;
13983 if (s != NULL)
13984 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13985
a27e685f
AM
13986 /* Force alignment. */
13987 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13988 TOCstart -= adjust;
1c865ab2
AM
13989 _bfd_set_gp_value (obfd, TOCstart);
13990
810d4e75 13991 if (info != NULL && s != NULL)
1c865ab2
AM
13992 {
13993 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13994
810d4e75
AM
13995 if (htab != NULL)
13996 {
13997 if (htab->elf.hgot != NULL)
13998 {
a27e685f 13999 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
14000 htab->elf.hgot->root.u.def.section = s;
14001 }
14002 }
14003 else
1c865ab2 14004 {
810d4e75
AM
14005 struct bfd_link_hash_entry *bh = NULL;
14006 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
14007 s, TOC_BASE_OFF - adjust,
14008 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
14009 }
14010 }
805fc799 14011 return TOCstart;
721956f4
AM
14012}
14013
a345bc8d 14014/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 14015 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
14016
14017static bfd_boolean
49c09209 14018build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
14019{
14020 struct bfd_link_info *info;
14021 struct ppc_link_hash_table *htab;
49c09209 14022 struct plt_entry *ent;
a345bc8d
AM
14023 asection *s;
14024
14025 if (h->root.type == bfd_link_hash_indirect)
14026 return TRUE;
14027
49c09209
AM
14028 info = inf;
14029 htab = ppc_hash_table (info);
14030 if (htab == NULL)
14031 return FALSE;
14032
14033 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
14034 if (ent->plt.offset != (bfd_vma) -1)
14035 {
14036 /* This symbol has an entry in the procedure linkage
14037 table. Set it up. */
14038 Elf_Internal_Rela rela;
2d7ad24e 14039 asection *plt, *relplt;
49c09209
AM
14040 bfd_byte *loc;
14041
14042 if (!htab->elf.dynamic_sections_created
14043 || h->dynindx == -1)
14044 {
14045 if (!(h->def_regular
14046 && (h->root.type == bfd_link_hash_defined
14047 || h->root.type == bfd_link_hash_defweak)))
14048 continue;
2d7ad24e
AM
14049 if (h->type == STT_GNU_IFUNC)
14050 {
14051 plt = htab->elf.iplt;
14052 relplt = htab->elf.irelplt;
cebd6b8a 14053 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
14054 if (htab->opd_abi)
14055 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14056 else
14057 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14058 }
49c09209 14059 else
2d7ad24e
AM
14060 {
14061 plt = htab->pltlocal;
14062 if (bfd_link_pic (info))
14063 {
14064 relplt = htab->relpltlocal;
14065 if (htab->opd_abi)
14066 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14067 else
14068 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14069 }
14070 else
14071 relplt = NULL;
14072 }
ed7007c1 14073 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
14074
14075 if (relplt == NULL)
14076 {
14077 loc = plt->contents + ent->plt.offset;
14078 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
14079 if (htab->opd_abi)
14080 {
14081 bfd_vma toc = elf_gp (info->output_bfd);
14082 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
14083 bfd_put_64 (info->output_bfd, toc, loc + 8);
14084 }
14085 }
14086 else
14087 {
14088 rela.r_offset = (plt->output_section->vma
14089 + plt->output_offset
14090 + ent->plt.offset);
14091 loc = relplt->contents + (relplt->reloc_count++
14092 * sizeof (Elf64_External_Rela));
14093 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14094 }
49c09209
AM
14095 }
14096 else
14097 {
14098 rela.r_offset = (htab->elf.splt->output_section->vma
14099 + htab->elf.splt->output_offset
14100 + ent->plt.offset);
14101 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
14102 rela.r_addend = ent->addend;
14103 loc = (htab->elf.srelplt->contents
14104 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
14105 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
14106 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
cebd6b8a 14107 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e 14108 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 14109 }
49c09209
AM
14110 }
14111
a345bc8d
AM
14112 if (!h->pointer_equality_needed)
14113 return TRUE;
14114
14115 if (h->def_regular)
14116 return TRUE;
14117
9e390558 14118 s = htab->global_entry;
49c09209
AM
14119 if (s == NULL || s->size == 0)
14120 return TRUE;
14121
14122 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
14123 if (ent->plt.offset != (bfd_vma) -1
14124 && ent->addend == 0)
a345bc8d
AM
14125 {
14126 bfd_byte *p;
14127 asection *plt;
14128 bfd_vma off;
14129
a345bc8d 14130 p = s->contents + h->root.u.def.value;
33e44f2e 14131 plt = htab->elf.splt;
a345bc8d
AM
14132 if (!htab->elf.dynamic_sections_created
14133 || h->dynindx == -1)
2d7ad24e
AM
14134 {
14135 if (h->type == STT_GNU_IFUNC)
14136 plt = htab->elf.iplt;
14137 else
14138 plt = htab->pltlocal;
14139 }
49c09209 14140 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
14141 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
14142
14143 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
14144 {
14145 info->callbacks->einfo
c1c8c1ef 14146 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
14147 h->root.root.string);
14148 bfd_set_error (bfd_error_bad_value);
14149 htab->stub_error = TRUE;
14150 }
14151
7341d5e2
AM
14152 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14153 if (htab->params->emit_stub_syms)
14154 {
14155 size_t len = strlen (h->root.root.string);
14156 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14157
14158 if (name == NULL)
14159 return FALSE;
14160
14161 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14162 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14163 if (h == NULL)
14164 return FALSE;
14165 if (h->root.type == bfd_link_hash_new)
14166 {
14167 h->root.type = bfd_link_hash_defined;
14168 h->root.u.def.section = s;
14169 h->root.u.def.value = p - s->contents;
14170 h->ref_regular = 1;
14171 h->def_regular = 1;
14172 h->ref_regular_nonweak = 1;
14173 h->forced_local = 1;
14174 h->non_elf = 0;
2ec55de3 14175 h->root.linker_def = 1;
7341d5e2
AM
14176 }
14177 }
14178
a345bc8d
AM
14179 if (PPC_HA (off) != 0)
14180 {
14181 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14182 p += 4;
14183 }
14184 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14185 p += 4;
14186 bfd_put_32 (s->owner, MTCTR_R12, p);
14187 p += 4;
407aa07c 14188 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14189 break;
14190 }
14191 return TRUE;
14192}
14193
49c09209
AM
14194/* Write PLT relocs for locals. */
14195
14196static bfd_boolean
14197write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14198{
14199 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14200 bfd *ibfd;
14201
14202 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14203 {
14204 struct got_entry **lgot_ents, **end_lgot_ents;
14205 struct plt_entry **local_plt, **lplt, **end_local_plt;
14206 Elf_Internal_Shdr *symtab_hdr;
14207 bfd_size_type locsymcount;
14208 Elf_Internal_Sym *local_syms = NULL;
14209 struct plt_entry *ent;
14210
14211 if (!is_ppc64_elf (ibfd))
14212 continue;
14213
14214 lgot_ents = elf_local_got_ents (ibfd);
14215 if (!lgot_ents)
14216 continue;
14217
14218 symtab_hdr = &elf_symtab_hdr (ibfd);
14219 locsymcount = symtab_hdr->sh_info;
14220 end_lgot_ents = lgot_ents + locsymcount;
14221 local_plt = (struct plt_entry **) end_lgot_ents;
14222 end_local_plt = local_plt + locsymcount;
14223 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14224 for (ent = *lplt; ent != NULL; ent = ent->next)
14225 if (ent->plt.offset != (bfd_vma) -1)
14226 {
14227 Elf_Internal_Sym *sym;
14228 asection *sym_sec;
14229 asection *plt, *relplt;
14230 bfd_byte *loc;
14231 bfd_vma val;
49c09209
AM
14232
14233 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14234 lplt - local_plt, ibfd))
14235 {
c9594989 14236 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
14237 free (local_syms);
14238 return FALSE;
14239 }
14240
14241 val = sym->st_value + ent->addend;
ba85c15d
AM
14242 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14243 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14244 if (sym_sec != NULL && sym_sec->output_section != NULL)
14245 val += sym_sec->output_offset + sym_sec->output_section->vma;
14246
2d7ad24e
AM
14247 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14248 {
cebd6b8a 14249 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
14250 plt = htab->elf.iplt;
14251 relplt = htab->elf.irelplt;
14252 }
14253 else
14254 {
14255 plt = htab->pltlocal;
14256 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14257 }
49c09209 14258
2d7ad24e
AM
14259 if (relplt == NULL)
14260 {
14261 loc = plt->contents + ent->plt.offset;
14262 bfd_put_64 (info->output_bfd, val, loc);
14263 if (htab->opd_abi)
14264 {
14265 bfd_vma toc = elf_gp (ibfd);
14266 bfd_put_64 (info->output_bfd, toc, loc + 8);
14267 }
14268 }
49c09209 14269 else
2d7ad24e
AM
14270 {
14271 Elf_Internal_Rela rela;
14272 rela.r_offset = (ent->plt.offset
14273 + plt->output_offset
14274 + plt->output_section->vma);
14275 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14276 {
14277 if (htab->opd_abi)
14278 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14279 else
14280 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14281 }
14282 else
14283 {
14284 if (htab->opd_abi)
14285 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14286 else
14287 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14288 }
14289 rela.r_addend = val;
14290 loc = relplt->contents + (relplt->reloc_count++
14291 * sizeof (Elf64_External_Rela));
14292 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14293 }
49c09209
AM
14294 }
14295
14296 if (local_syms != NULL
14297 && symtab_hdr->contents != (unsigned char *) local_syms)
14298 {
14299 if (!info->keep_memory)
14300 free (local_syms);
14301 else
14302 symtab_hdr->contents = (unsigned char *) local_syms;
14303 }
14304 }
14305 return TRUE;
14306}
14307
a804e476
AM
14308/* Emit the static wrapper function preserving registers around a
14309 __tls_get_addr_opt call. */
14310
14311static bfd_boolean
14312emit_tga_desc (struct ppc_link_hash_table *htab)
14313{
14314 asection *stub_sec = htab->tga_group->stub_sec;
14315 unsigned int cfa_updt = 11 * 4;
14316 bfd_byte *p;
14317 bfd_vma to, from, delta;
14318
14319 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14320 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14321 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14322 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14323 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14324 delta = to - from;
14325 if (delta + (1 << 25) >= 1 << 26)
14326 {
14327 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14328 htab->stub_error = TRUE;
14329 return FALSE;
14330 }
14331
14332 p = stub_sec->contents;
14333 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14334 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14335 p += 4;
14336 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14337 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14338}
14339
14340/* Emit eh_frame describing the static wrapper function. */
14341
14342static bfd_byte *
14343emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14344{
14345 unsigned int cfa_updt = 11 * 4;
14346 unsigned int i;
14347
14348 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14349 *p++ = DW_CFA_def_cfa_offset;
14350 if (htab->opd_abi)
14351 {
14352 *p++ = 128;
14353 *p++ = 1;
14354 }
14355 else
14356 *p++ = 96;
14357 *p++ = DW_CFA_offset_extended_sf;
14358 *p++ = 65;
14359 *p++ = (-16 / 8) & 0x7f;
14360 for (i = 4; i < 12; i++)
14361 {
14362 *p++ = DW_CFA_offset + i;
14363 *p++ = (htab->opd_abi ? 13 : 12) - i;
14364 }
14365 *p++ = DW_CFA_advance_loc + 10;
14366 *p++ = DW_CFA_def_cfa_offset;
14367 *p++ = 0;
14368 for (i = 4; i < 12; i++)
14369 *p++ = DW_CFA_restore + i;
14370 *p++ = DW_CFA_advance_loc + 2;
14371 *p++ = DW_CFA_restore_extended;
14372 *p++ = 65;
14373 return p;
14374}
14375
721956f4
AM
14376/* Build all the stubs associated with the current output file.
14377 The stubs are kept in a hash table attached to the main linker
14378 hash table. This function is called via gldelf64ppc_finish. */
14379
b34976b6 14380bfd_boolean
e7d1c40c 14381ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14382 char **stats)
5d1634d7
AM
14383{
14384 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14385 struct map_stub *group;
721956f4 14386 asection *stub_sec;
5d1634d7 14387 bfd_byte *p;
e717da7e 14388 int stub_sec_count = 0;
5d1634d7 14389
4dfe6ac6
NC
14390 if (htab == NULL)
14391 return FALSE;
14392
eea6121a 14393 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14394 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14395 {
14396 group->eh_size = 0;
14397 group->lr_restore = 0;
14398 if ((stub_sec = group->stub_sec) != NULL
14399 && stub_sec->size != 0)
14400 {
14401 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14402 stub_sec->size);
14403 if (stub_sec->contents == NULL)
14404 return FALSE;
14405 stub_sec->size = 0;
14406 }
14407 }
5d1634d7 14408
23eb7e01 14409 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14410 {
9f951329 14411 unsigned int indx;
ad8e1ba5 14412 bfd_vma plt0;
9f951329 14413
721956f4 14414 /* Build the .glink plt call stub. */
e7d1c40c 14415 if (htab->params->emit_stub_syms)
97b639ba
AM
14416 {
14417 struct elf_link_hash_entry *h;
468392fb
AM
14418 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14419 TRUE, FALSE, FALSE);
97b639ba
AM
14420 if (h == NULL)
14421 return FALSE;
14422 if (h->root.type == bfd_link_hash_new)
14423 {
14424 h->root.type = bfd_link_hash_defined;
14425 h->root.u.def.section = htab->glink;
ee4bf8d2 14426 h->root.u.def.value = 8;
f5385ebf
AM
14427 h->ref_regular = 1;
14428 h->def_regular = 1;
14429 h->ref_regular_nonweak = 1;
14430 h->forced_local = 1;
14431 h->non_elf = 0;
2ec55de3 14432 h->root.linker_def = 1;
97b639ba
AM
14433 }
14434 }
33e44f2e
AM
14435 plt0 = (htab->elf.splt->output_section->vma
14436 + htab->elf.splt->output_offset
14437 - 16);
176a0d42
AM
14438 if (info->emitrelocations)
14439 {
14440 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14441 if (r == NULL)
14442 return FALSE;
14443 r->r_offset = (htab->glink->output_offset
14444 + htab->glink->output_section->vma);
14445 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14446 r->r_addend = plt0;
14447 }
4ce794b7 14448 p = htab->glink->contents;
176a0d42 14449 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14450 bfd_put_64 (htab->glink->owner, plt0, p);
14451 p += 8;
b9e5796b
AM
14452 if (htab->opd_abi)
14453 {
14454 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14455 p += 4;
14456 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14457 p += 4;
14458 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14459 p += 4;
14460 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14461 p += 4;
14462 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14463 p += 4;
14464 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14465 p += 4;
14466 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14467 p += 4;
14468 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14469 p += 4;
14470 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14471 p += 4;
14472 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14473 p += 4;
14474 }
14475 else
14476 {
14477 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14478 p += 4;
14479 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14480 p += 4;
14481 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14482 p += 4;
f378ab09
AM
14483 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14484 p += 4;
b9e5796b
AM
14485 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14486 p += 4;
14487 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14488 p += 4;
14489 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14490 p += 4;
14491 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14492 p += 4;
14493 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14494 p += 4;
14495 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14496 p += 4;
14497 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14498 p += 4;
14499 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14500 p += 4;
14501 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14502 p += 4;
14503 }
407aa07c
AM
14504 bfd_put_32 (htab->glink->owner, BCTR, p);
14505 p += 4;
c75bc4f7 14506 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14507
9f951329
AM
14508 /* Build the .glink lazy link call stubs. */
14509 indx = 0;
9e390558 14510 while (p < htab->glink->contents + htab->glink->size)
9f951329 14511 {
b9e5796b 14512 if (htab->opd_abi)
9f951329 14513 {
b9e5796b
AM
14514 if (indx < 0x8000)
14515 {
14516 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14517 p += 4;
14518 }
14519 else
14520 {
14521 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14522 p += 4;
14523 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14524 p);
14525 p += 4;
14526 }
9f951329 14527 }
4ce794b7 14528 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14529 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14530 indx++;
9f951329
AM
14531 p += 4;
14532 }
5d1634d7 14533 }
5d1634d7 14534
a804e476
AM
14535 if (htab->tga_group != NULL)
14536 {
14537 htab->tga_group->lr_restore = 23 * 4;
14538 htab->tga_group->stub_sec->size = 24 * 4;
14539 if (!emit_tga_desc (htab))
14540 return FALSE;
14541 if (htab->glink_eh_frame != NULL
14542 && htab->glink_eh_frame->size != 0)
14543 {
14544 size_t align = 4;
14545
14546 p = htab->glink_eh_frame->contents;
14547 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14548 p += 17;
14549 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14550 }
14551 }
14552
49c09209
AM
14553 /* Build .glink global entry stubs, and PLT relocs for globals. */
14554 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14555
14556 if (!write_plt_relocs_for_local_syms (info))
14557 return FALSE;
9e390558 14558
7341d5e2 14559 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14560 {
4ce794b7 14561 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14562 htab->brlt->size);
4ce794b7 14563 if (htab->brlt->contents == NULL)
b34976b6 14564 return FALSE;
721956f4 14565 }
ee75fd95 14566 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14567 {
14568 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14569 htab->relbrlt->size);
63bc6f6c
AM
14570 if (htab->relbrlt->contents == NULL)
14571 return FALSE;
14572 }
5d1634d7 14573
721956f4
AM
14574 /* Build the stubs as directed by the stub hash table. */
14575 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14576
a4b6fadd
AM
14577 for (group = htab->group; group != NULL; group = group->next)
14578 if (group->needs_save_res)
7dda8d3c 14579 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14580
aa8a7074
AM
14581 if (htab->relbrlt != NULL)
14582 htab->relbrlt->reloc_count = 0;
14583
e7d1c40c 14584 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14585 for (group = htab->group; group != NULL; group = group->next)
14586 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14587 {
14588 int align = abs (htab->params->plt_stub_align);
14589 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14590 }
794e51c0 14591
7dda8d3c
AM
14592 for (group = htab->group; group != NULL; group = group->next)
14593 if (group->needs_save_res)
14594 {
14595 stub_sec = group->stub_sec;
14596 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14597 htab->sfpr->contents, htab->sfpr->size);
14598 if (htab->params->emit_stub_syms)
14599 {
14600 unsigned int i;
14601
14602 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14603 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14604 return FALSE;
14605 }
14606 }
14607
df136d64
AM
14608 if (htab->glink_eh_frame != NULL
14609 && htab->glink_eh_frame->size != 0)
14610 {
14611 bfd_vma val;
14612 size_t align = 4;
14613
14614 p = htab->glink_eh_frame->contents;
14615 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14616
14617 for (group = htab->group; group != NULL; group = group->next)
14618 if (group->eh_size != 0)
14619 {
14620 /* Offset to stub section. */
14621 val = (group->stub_sec->output_section->vma
14622 + group->stub_sec->output_offset);
14623 val -= (htab->glink_eh_frame->output_section->vma
14624 + htab->glink_eh_frame->output_offset
14625 + (p + 8 - htab->glink_eh_frame->contents));
14626 if (val + 0x80000000 > 0xffffffff)
14627 {
14628 _bfd_error_handler
14629 (_("%s offset too large for .eh_frame sdata4 encoding"),
14630 group->stub_sec->name);
14631 return FALSE;
14632 }
14633 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14634 p += (group->eh_size + 17 + 3) & -4;
14635 }
14636 if (htab->glink != NULL && htab->glink->size != 0)
14637 {
14638 /* Offset to .glink. */
14639 val = (htab->glink->output_section->vma
14640 + htab->glink->output_offset
14641 + 8);
14642 val -= (htab->glink_eh_frame->output_section->vma
14643 + htab->glink_eh_frame->output_offset
14644 + (p + 8 - htab->glink_eh_frame->contents));
14645 if (val + 0x80000000 > 0xffffffff)
14646 {
14647 _bfd_error_handler
14648 (_("%s offset too large for .eh_frame sdata4 encoding"),
14649 htab->glink->name);
14650 return FALSE;
14651 }
14652 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14653 p += (24 + align - 1) & -align;
14654 }
14655 }
14656
d4aaa2a0
AM
14657 for (group = htab->group; group != NULL; group = group->next)
14658 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14659 {
14660 stub_sec_count += 1;
c9301e31
AM
14661 if (stub_sec->rawsize != stub_sec->size
14662 && (htab->stub_iteration <= STUB_SHRINK_ITER
14663 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14664 break;
14665 }
5d1634d7 14666
25516cc5 14667 if (group != NULL)
5d1634d7 14668 {
b34976b6 14669 htab->stub_error = TRUE;
cf97bcb0 14670 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14671 }
721956f4 14672
d2a300cf
AM
14673 if (htab->stub_error)
14674 return FALSE;
14675
14676 if (stats != NULL)
14677 {
988b7300
AM
14678 char *groupmsg;
14679 if (asprintf (&groupmsg,
14680 ngettext ("linker stubs in %u group\n",
14681 "linker stubs in %u groups\n",
14682 stub_sec_count),
14683 stub_sec_count) < 0)
14684 *stats = NULL;
14685 else
14686 {
14687 if (asprintf (stats, _("%s"
14688 " branch %lu\n"
14689 " branch toc adj %lu\n"
14690 " branch notoc %lu\n"
14691 " branch both %lu\n"
14692 " long branch %lu\n"
14693 " long toc adj %lu\n"
14694 " long notoc %lu\n"
14695 " long both %lu\n"
14696 " plt call %lu\n"
14697 " plt call save %lu\n"
14698 " plt call notoc %lu\n"
14699 " plt call both %lu\n"
14700 " global entry %lu"),
14701 groupmsg,
14702 htab->stub_count[ppc_stub_long_branch - 1],
14703 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14704 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14705 htab->stub_count[ppc_stub_long_branch_both - 1],
14706 htab->stub_count[ppc_stub_plt_branch - 1],
14707 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14708 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14709 htab->stub_count[ppc_stub_plt_branch_both - 1],
14710 htab->stub_count[ppc_stub_plt_call - 1],
14711 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14712 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14713 htab->stub_count[ppc_stub_plt_call_both - 1],
14714 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14715 *stats = NULL;
14716 free (groupmsg);
14717 }
d2a300cf
AM
14718 }
14719 return TRUE;
5bd4f169
AM
14720}
14721
60124e18
AM
14722/* What to do when ld finds relocations against symbols defined in
14723 discarded sections. */
14724
14725static unsigned int
14726ppc64_elf_action_discarded (asection *sec)
14727{
14728 if (strcmp (".opd", sec->name) == 0)
14729 return 0;
14730
14731 if (strcmp (".toc", sec->name) == 0)
14732 return 0;
14733
bce50a28
JJ
14734 if (strcmp (".toc1", sec->name) == 0)
14735 return 0;
14736
60124e18
AM
14737 return _bfd_elf_default_action_discarded (sec);
14738}
14739
e59a1001
AM
14740/* These are the dynamic relocations supported by glibc. */
14741
14742static bfd_boolean
14743ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14744{
14745 switch (r_type)
14746 {
14747 case R_PPC64_RELATIVE:
14748 case R_PPC64_NONE:
14749 case R_PPC64_ADDR64:
14750 case R_PPC64_GLOB_DAT:
14751 case R_PPC64_IRELATIVE:
14752 case R_PPC64_JMP_IREL:
14753 case R_PPC64_JMP_SLOT:
14754 case R_PPC64_DTPMOD64:
14755 case R_PPC64_DTPREL64:
14756 case R_PPC64_TPREL64:
14757 case R_PPC64_TPREL16_LO_DS:
14758 case R_PPC64_TPREL16_DS:
14759 case R_PPC64_TPREL16:
14760 case R_PPC64_TPREL16_LO:
14761 case R_PPC64_TPREL16_HI:
14762 case R_PPC64_TPREL16_HIGH:
14763 case R_PPC64_TPREL16_HA:
14764 case R_PPC64_TPREL16_HIGHA:
14765 case R_PPC64_TPREL16_HIGHER:
14766 case R_PPC64_TPREL16_HIGHEST:
14767 case R_PPC64_TPREL16_HIGHERA:
14768 case R_PPC64_TPREL16_HIGHESTA:
14769 case R_PPC64_ADDR16_LO_DS:
14770 case R_PPC64_ADDR16_LO:
14771 case R_PPC64_ADDR16_HI:
14772 case R_PPC64_ADDR16_HIGH:
14773 case R_PPC64_ADDR16_HA:
14774 case R_PPC64_ADDR16_HIGHA:
14775 case R_PPC64_REL30:
14776 case R_PPC64_COPY:
14777 case R_PPC64_UADDR64:
14778 case R_PPC64_UADDR32:
14779 case R_PPC64_ADDR32:
14780 case R_PPC64_ADDR24:
14781 case R_PPC64_ADDR16:
14782 case R_PPC64_UADDR16:
14783 case R_PPC64_ADDR16_DS:
14784 case R_PPC64_ADDR16_HIGHER:
14785 case R_PPC64_ADDR16_HIGHEST:
14786 case R_PPC64_ADDR16_HIGHERA:
14787 case R_PPC64_ADDR16_HIGHESTA:
14788 case R_PPC64_ADDR14:
14789 case R_PPC64_ADDR14_BRTAKEN:
14790 case R_PPC64_ADDR14_BRNTAKEN:
14791 case R_PPC64_REL32:
14792 case R_PPC64_REL64:
14793 return TRUE;
14794
14795 default:
14796 return FALSE;
14797 }
14798}
14799
5bd4f169
AM
14800/* The RELOCATE_SECTION function is called by the ELF backend linker
14801 to handle the relocations for a section.
14802
14803 The relocs are always passed as Rela structures; if the section
14804 actually uses Rel structures, the r_addend field will always be
14805 zero.
14806
14807 This function is responsible for adjust the section contents as
14808 necessary, and (if using Rela relocs and generating a
1049f94e 14809 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14810 necessary.
14811
14812 This function does not have to worry about setting the reloc
14813 address or the reloc symbol index.
14814
14815 LOCAL_SYMS is a pointer to the swapped in local symbols.
14816
14817 LOCAL_SECTIONS is an array giving the section in the input file
14818 corresponding to the st_shndx field of each local symbol.
14819
14820 The global hash table entry for the global symbols can be found
14821 via elf_sym_hashes (input_bfd).
14822
1049f94e 14823 When generating relocatable output, this function must handle
5bd4f169
AM
14824 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14825 going to be the section symbol corresponding to the output
14826 section, which means that the addend must be adjusted
14827 accordingly. */
14828
b34976b6 14829static bfd_boolean
4ce794b7
AM
14830ppc64_elf_relocate_section (bfd *output_bfd,
14831 struct bfd_link_info *info,
14832 bfd *input_bfd,
14833 asection *input_section,
14834 bfd_byte *contents,
14835 Elf_Internal_Rela *relocs,
14836 Elf_Internal_Sym *local_syms,
14837 asection **local_sections)
5bd4f169 14838{
65f38f15 14839 struct ppc_link_hash_table *htab;
5bd4f169
AM
14840 Elf_Internal_Shdr *symtab_hdr;
14841 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14842 Elf_Internal_Rela *rel;
c316a17c 14843 Elf_Internal_Rela *wrel;
5bd4f169 14844 Elf_Internal_Rela *relend;
411e1bfb
AM
14845 Elf_Internal_Rela outrel;
14846 bfd_byte *loc;
411e1bfb 14847 struct got_entry **local_got_ents;
5bd4f169 14848 bfd_vma TOCstart;
b34976b6
AM
14849 bfd_boolean ret = TRUE;
14850 bfd_boolean is_opd;
794e51c0
AM
14851 /* Assume 'at' branch hints. */
14852 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14853 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14854 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14855
65f38f15 14856 /* Initialize howto table if needed. */
5bd4f169 14857 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14858 ppc_howto_init ();
14859
65f38f15 14860 htab = ppc_hash_table (info);
4dfe6ac6
NC
14861 if (htab == NULL)
14862 return FALSE;
ee75fd95
AM
14863
14864 /* Don't relocate stub sections. */
e7d1c40c 14865 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14866 return TRUE;
14867
7af5d5c4
AM
14868 if (!is_ppc64_elf (input_bfd))
14869 {
14870 bfd_set_error (bfd_error_wrong_format);
14871 return FALSE;
14872 }
0ffa91dd 14873
411e1bfb 14874 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14875 TOCstart = elf_gp (output_bfd);
0ffa91dd 14876 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14877 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14878 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14879
c316a17c 14880 rel = wrel = relocs;
5bd4f169 14881 relend = relocs + input_section->reloc_count;
c316a17c 14882 for (; rel < relend; wrel++, rel++)
5bd4f169 14883 {
04c9666a 14884 enum elf_ppc64_reloc_type r_type;
31c76678 14885 bfd_vma addend;
5bd4f169
AM
14886 bfd_reloc_status_type r;
14887 Elf_Internal_Sym *sym;
14888 asection *sec;
039b3fef
AM
14889 struct elf_link_hash_entry *h_elf;
14890 struct ppc_link_hash_entry *h;
14891 struct ppc_link_hash_entry *fdh;
5bd4f169 14892 const char *sym_name;
0d4792f7 14893 unsigned long r_symndx, toc_symndx;
3a71aa26 14894 bfd_vma toc_addend;
f961d9dd
AM
14895 unsigned char tls_mask, tls_gd, tls_type;
14896 unsigned char sym_type;
5bd4f169 14897 bfd_vma relocation;
23cedd1d 14898 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14899 bfd_boolean warned;
bc30df16 14900 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14901 unsigned int insn;
e11840f9 14902 unsigned int mask;
721956f4
AM
14903 struct ppc_stub_hash_entry *stub_entry;
14904 bfd_vma max_br_offset;
14905 bfd_vma from;
c316a17c 14906 Elf_Internal_Rela orig_rel;
b80eed39
AM
14907 reloc_howto_type *howto;
14908 struct reloc_howto_struct alt_howto;
4a421c53
AM
14909 uint64_t pinsn;
14910 bfd_vma offset;
5bd4f169 14911
c316a17c
AM
14912 again:
14913 orig_rel = *rel;
14914
4ce794b7 14915 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14916 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14917
14918 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14919 symbol of the previous ADDR64 reloc. The symbol gives us the
14920 proper TOC base to use. */
14921 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14922 && wrel != relocs
14923 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14924 && is_opd)
c316a17c 14925 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14926
4ce794b7
AM
14927 sym = NULL;
14928 sec = NULL;
039b3fef 14929 h_elf = NULL;
4ce794b7 14930 sym_name = NULL;
b34976b6
AM
14931 unresolved_reloc = FALSE;
14932 warned = FALSE;
65f38f15 14933
0b13192e 14934 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14935 {
14936 /* It's a local symbol. */
74f0fb50 14937 struct _opd_sec_data *opd;
4025353c 14938
5bd4f169
AM
14939 sym = local_syms + r_symndx;
14940 sec = local_sections[r_symndx];
26c61ae5 14941 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14942 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14943 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14944 opd = get_opd_info (sec);
14945 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14946 {
51aecdc5
AM
14947 long adjust = opd->adjust[OPD_NDX (sym->st_value
14948 + rel->r_addend)];
4025353c
AM
14949 if (adjust == -1)
14950 relocation = 0;
14951 else
4cc603a5
AM
14952 {
14953 /* If this is a relocation against the opd section sym
14954 and we have edited .opd, adjust the reloc addend so
14955 that ld -r and ld --emit-relocs output is correct.
14956 If it is a reloc against some other .opd symbol,
14957 then the symbol value will be adjusted later. */
14958 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14959 rel->r_addend += adjust;
14960 else
14961 relocation += adjust;
14962 }
1e2f5b6e 14963 }
5bd4f169
AM
14964 }
14965 else
14966 {
62d887d4
L
14967 bfd_boolean ignored;
14968
b2a8e766
AM
14969 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14970 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14971 h_elf, sec, relocation,
62d887d4 14972 unresolved_reloc, warned, ignored);
039b3fef
AM
14973 sym_name = h_elf->root.root.string;
14974 sym_type = h_elf->type;
b69fdb4e
AM
14975 if (sec != NULL
14976 && sec->owner == output_bfd
14977 && strcmp (sec->name, ".opd") == 0)
14978 {
14979 /* This is a symbol defined in a linker script. All
14980 such are defined in output sections, even those
14981 defined by simple assignment from a symbol defined in
14982 an input section. Transfer the symbol to an
14983 appropriate input .opd section, so that a branch to
14984 this symbol will be mapped to the location specified
14985 by the opd entry. */
14986 struct bfd_link_order *lo;
14987 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14988 if (lo->type == bfd_indirect_link_order)
14989 {
14990 asection *isec = lo->u.indirect.section;
14991 if (h_elf->root.u.def.value >= isec->output_offset
14992 && h_elf->root.u.def.value < (isec->output_offset
14993 + isec->size))
14994 {
14995 h_elf->root.u.def.value -= isec->output_offset;
14996 h_elf->root.u.def.section = isec;
14997 sec = isec;
14998 break;
14999 }
15000 }
15001 }
5bd4f169 15002 }
ed7007c1 15003 h = ppc_elf_hash_entry (h_elf);
5bd4f169 15004
dbaa2011 15005 if (sec != NULL && discarded_section (sec))
c316a17c
AM
15006 {
15007 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
15008 input_bfd, input_section,
0930cb30 15009 contents, rel->r_offset);
c316a17c
AM
15010 wrel->r_offset = rel->r_offset;
15011 wrel->r_info = 0;
15012 wrel->r_addend = 0;
15013
15014 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 15015 symbols defined in discarded sections. Not done for
c316a17c
AM
15016 non-debug to preserve relocs in .eh_frame which the
15017 eh_frame editing code expects to be present. */
15018 if (bfd_link_relocatable (info)
15019 && (input_section->flags & SEC_DEBUGGING))
15020 wrel--;
15021
15022 continue;
15023 }
ab96bf03 15024
0e1862bb 15025 if (bfd_link_relocatable (info))
c316a17c 15026 goto copy_reloc;
ab96bf03 15027
f40da81b
AM
15028 if (h != NULL && &h->elf == htab->elf.hgot)
15029 {
6f20ed8a 15030 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
15031 sec = bfd_abs_section_ptr;
15032 unresolved_reloc = FALSE;
15033 }
15034
951fd09b
AM
15035 /* TLS optimizations. Replace instruction sequences and relocs
15036 based on information we collected in tls_optimize. We edit
15037 RELOCS so that --emit-relocs will output something sensible
15038 for the final instruction stream. */
15039 tls_mask = 0;
15040 tls_gd = 0;
0d4792f7 15041 toc_symndx = 0;
727fc41e
AM
15042 if (h != NULL)
15043 tls_mask = h->tls_mask;
15044 else if (local_got_ents != NULL)
411e1bfb 15045 {
e054468f
AM
15046 struct plt_entry **local_plt = (struct plt_entry **)
15047 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 15048 unsigned char *lgot_masks = (unsigned char *)
e054468f 15049 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
15050 tls_mask = lgot_masks[r_symndx];
15051 }
37da22e5 15052 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
15053 && (r_type == R_PPC64_TLS
15054 || r_type == R_PPC64_TLSGD
15055 || r_type == R_PPC64_TLSLD))
15056 {
15057 /* Check for toc tls entries. */
f961d9dd 15058 unsigned char *toc_tls;
0d4792f7 15059
727fc41e
AM
15060 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15061 &local_syms, rel, input_bfd))
15062 return FALSE;
0d4792f7 15063
727fc41e
AM
15064 if (toc_tls)
15065 tls_mask = *toc_tls;
0d4792f7
AM
15066 }
15067
15068 /* Check that tls relocs are used with tls syms, and non-tls
15069 relocs are used with non-tls syms. */
cf35638d 15070 if (r_symndx != STN_UNDEF
0d4792f7
AM
15071 && r_type != R_PPC64_NONE
15072 && (h == NULL
039b3fef
AM
15073 || h->elf.root.type == bfd_link_hash_defined
15074 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 15075 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 15076 {
37da22e5 15077 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
15078 && (r_type == R_PPC64_TLS
15079 || r_type == R_PPC64_TLSGD
15080 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
15081 /* R_PPC64_TLS is OK against a symbol in the TOC. */
15082 ;
15083 else
25f53a85 15084 info->callbacks->einfo
1d483afe 15085 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 15086 /* xgettext:c-format */
c1c8c1ef 15087 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 15088 /* xgettext:c-format */
c1c8c1ef 15089 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 15090 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
15091 ppc64_elf_howto_table[r_type]->name,
15092 sym_name);
411e1bfb
AM
15093 }
15094
15095 /* Ensure reloc mapping code below stays sane. */
15096 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
15097 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
15098 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
15099 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
15100 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
15101 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
15102 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
15103 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
15104 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
15105 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
15106 abort ();
0d4792f7 15107
411e1bfb
AM
15108 switch (r_type)
15109 {
15110 default:
411e1bfb
AM
15111 break;
15112
ba761f19 15113 case R_PPC64_LO_DS_OPT:
95f0d0d2 15114 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 15115 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
15116 abort ();
15117 insn += (14u << 26) - (58u << 26);
95f0d0d2 15118 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
15119 r_type = R_PPC64_TOC16_LO;
15120 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15121 break;
15122
411e1bfb
AM
15123 case R_PPC64_TOC16:
15124 case R_PPC64_TOC16_LO:
15125 case R_PPC64_TOC16_DS:
15126 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
15127 {
15128 /* Check for toc tls entries. */
f961d9dd 15129 unsigned char *toc_tls;
951fd09b 15130 int retval;
411e1bfb 15131
3a71aa26
AM
15132 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15133 &local_syms, rel, input_bfd);
951fd09b 15134 if (retval == 0)
411e1bfb
AM
15135 return FALSE;
15136
15137 if (toc_tls)
15138 {
951fd09b 15139 tls_mask = *toc_tls;
411e1bfb
AM
15140 if (r_type == R_PPC64_TOC16_DS
15141 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 15142 {
37da22e5 15143 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
15144 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
15145 goto toctprel;
15146 }
411e1bfb 15147 else
951fd09b
AM
15148 {
15149 /* If we found a GD reloc pair, then we might be
15150 doing a GD->IE transition. */
15151 if (retval == 2)
15152 {
b00a0a86 15153 tls_gd = TLS_GDIE;
37da22e5
AM
15154 if ((tls_mask & TLS_TLS) != 0
15155 && (tls_mask & TLS_GD) == 0)
102890f0 15156 goto tls_ldgd_opt;
951fd09b
AM
15157 }
15158 else if (retval == 3)
15159 {
37da22e5
AM
15160 if ((tls_mask & TLS_TLS) != 0
15161 && (tls_mask & TLS_LD) == 0)
102890f0 15162 goto tls_ldgd_opt;
951fd09b
AM
15163 }
15164 }
411e1bfb
AM
15165 }
15166 }
15167 break;
15168
9d6ded02
AM
15169 case R_PPC64_GOT_TPREL16_HI:
15170 case R_PPC64_GOT_TPREL16_HA:
37da22e5 15171 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
15172 && (tls_mask & TLS_TPREL) == 0)
15173 {
15174 rel->r_offset -= d_offset;
95f0d0d2 15175 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15176 r_type = R_PPC64_NONE;
15177 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15178 }
15179 break;
15180
411e1bfb
AM
15181 case R_PPC64_GOT_TPREL16_DS:
15182 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15183 if ((tls_mask & TLS_TLS) != 0
951fd09b 15184 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15185 {
81407a69 15186 toctprel:
95f0d0d2 15187 insn = bfd_get_32 (input_bfd,
c316a17c 15188 contents + rel->r_offset - d_offset);
411e1bfb
AM
15189 insn &= 31 << 21;
15190 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15191 bfd_put_32 (input_bfd, insn,
c316a17c 15192 contents + rel->r_offset - d_offset);
411e1bfb 15193 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15194 if (toc_symndx != 0)
15195 {
15196 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15197 rel->r_addend = toc_addend;
0d4792f7
AM
15198 /* We changed the symbol. Start over in order to
15199 get h, sym, sec etc. right. */
c316a17c 15200 goto again;
0d4792f7
AM
15201 }
15202 else
15203 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15204 }
15205 break;
15206
87c69f97 15207 case R_PPC64_GOT_TPREL_PCREL34:
c213164a
AM
15208 if ((tls_mask & TLS_TLS) != 0
15209 && (tls_mask & TLS_TPREL) == 0)
15210 {
15211 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15212 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15213 pinsn <<= 32;
15214 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15215 pinsn += ((2ULL << 56) + (-1ULL << 52)
15216 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15217 bfd_put_32 (input_bfd, pinsn >> 32,
15218 contents + rel->r_offset);
15219 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15220 contents + rel->r_offset + 4);
15221 r_type = R_PPC64_TPREL34;
15222 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15223 }
15224 break;
15225
411e1bfb 15226 case R_PPC64_TLS:
37da22e5 15227 if ((tls_mask & TLS_TLS) != 0
951fd09b 15228 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15229 {
c213164a 15230 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15231 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15232 if (insn == 0)
c213164a
AM
15233 break;
15234 if ((rel->r_offset & 3) == 0)
0d4792f7 15235 {
c213164a
AM
15236 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15237 /* Was PPC64_TLS which sits on insn boundary, now
15238 PPC64_TPREL16_LO which is at low-order half-word. */
15239 rel->r_offset += d_offset;
15240 r_type = R_PPC64_TPREL16_LO;
15241 if (toc_symndx != 0)
15242 {
15243 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15244 rel->r_addend = toc_addend;
15245 /* We changed the symbol. Start over in order to
15246 get h, sym, sec etc. right. */
15247 goto again;
15248 }
15249 else
15250 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15251 }
15252 else if ((rel->r_offset & 3) == 1)
15253 {
15254 /* For pcrel IE to LE we already have the full
15255 offset and thus don't need an addi here. A nop
15256 or mr will do. */
2365f8d7 15257 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15258 {
15259 /* Extract regs from addi rt,ra,si. */
15260 unsigned int rt = (insn >> 21) & 0x1f;
15261 unsigned int ra = (insn >> 16) & 0x1f;
15262 if (rt == ra)
15263 insn = NOP;
15264 else
15265 {
15266 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15267 insn = (rt << 16) | (ra << 21) | (ra << 11);
15268 insn |= (31u << 26) | (444u << 1);
15269 }
15270 }
15271 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15272 }
411e1bfb
AM
15273 }
15274 break;
15275
411e1bfb
AM
15276 case R_PPC64_GOT_TLSGD16_HI:
15277 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15278 tls_gd = TLS_GDIE;
37da22e5 15279 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15280 goto tls_gdld_hi;
15281 break;
15282
411e1bfb
AM
15283 case R_PPC64_GOT_TLSLD16_HI:
15284 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15285 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15286 {
951fd09b
AM
15287 tls_gdld_hi:
15288 if ((tls_mask & tls_gd) != 0)
15289 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15290 + R_PPC64_GOT_TPREL16_DS);
15291 else
411e1bfb 15292 {
4fe5ca5b 15293 rel->r_offset -= d_offset;
95f0d0d2 15294 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15295 r_type = R_PPC64_NONE;
411e1bfb 15296 }
951fd09b 15297 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15298 }
15299 break;
15300
951fd09b
AM
15301 case R_PPC64_GOT_TLSGD16:
15302 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15303 tls_gd = TLS_GDIE;
37da22e5 15304 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15305 goto tls_ldgd_opt;
951fd09b 15306 break;
411e1bfb 15307
951fd09b
AM
15308 case R_PPC64_GOT_TLSLD16:
15309 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15310 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15311 {
b9f04fe0 15312 unsigned int insn1, insn2;
102890f0
AM
15313
15314 tls_ldgd_opt:
727fc41e
AM
15315 offset = (bfd_vma) -1;
15316 /* If not using the newer R_PPC64_TLSGD/LD to mark
15317 __tls_get_addr calls, we must trust that the call
15318 stays with its arg setup insns, ie. that the next
15319 reloc is the __tls_get_addr call associated with
15320 the current reloc. Edit both insns. */
9737e8af 15321 if (input_section->nomark_tls_get_addr
727fc41e
AM
15322 && rel + 1 < relend
15323 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15324 htab->tls_get_addr_fd,
15325 htab->tga_desc_fd,
727fc41e 15326 htab->tls_get_addr,
9e7028aa 15327 htab->tga_desc))
727fc41e 15328 offset = rel[1].r_offset;
b86ac8e3
AM
15329 /* We read the low GOT_TLS (or TOC16) insn because we
15330 need to keep the destination reg. It may be
15331 something other than the usual r3, and moved to r3
15332 before the call by intervening code. */
95f0d0d2 15333 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15334 contents + rel->r_offset - d_offset);
102890f0 15335 if ((tls_mask & tls_gd) != 0)
411e1bfb 15336 {
102890f0 15337 /* IE */
b86ac8e3 15338 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15339 insn1 |= 58u << 26; /* ld */
102890f0 15340 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15341 if (offset != (bfd_vma) -1)
f58d5a2d 15342 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15343 if (r_type == R_PPC64_TOC16
15344 || r_type == R_PPC64_TOC16_LO)
102890f0 15345 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15346 else
15347 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15348 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15349 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15350 }
15351 else
15352 {
15353 /* LE */
b86ac8e3
AM
15354 insn1 &= 0x1f << 21;
15355 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15356 insn2 = 0x38630000; /* addi 3,3,0 */
15357 if (tls_gd == 0)
951fd09b 15358 {
102890f0 15359 /* Was an LD reloc. */
71c4e95a 15360 r_symndx = STN_UNDEF;
102890f0 15361 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15362 }
102890f0 15363 else if (toc_symndx != 0)
3a71aa26
AM
15364 {
15365 r_symndx = toc_symndx;
15366 rel->r_addend = toc_addend;
15367 }
102890f0
AM
15368 r_type = R_PPC64_TPREL16_HA;
15369 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15370 if (offset != (bfd_vma) -1)
15371 {
15372 rel[1].r_info = ELF64_R_INFO (r_symndx,
15373 R_PPC64_TPREL16_LO);
15374 rel[1].r_offset = offset + d_offset;
15375 rel[1].r_addend = rel->r_addend;
15376 }
102890f0 15377 }
95f0d0d2 15378 bfd_put_32 (input_bfd, insn1,
3a71aa26 15379 contents + rel->r_offset - d_offset);
727fc41e 15380 if (offset != (bfd_vma) -1)
c96e0573
AM
15381 {
15382 bfd_put_32 (input_bfd, insn2, contents + offset);
15383 if (offset + 8 <= input_section->size)
15384 {
15385 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15386 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15387 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15388 }
15389 }
727fc41e
AM
15390 if ((tls_mask & tls_gd) == 0
15391 && (tls_gd == 0 || toc_symndx != 0))
15392 {
15393 /* We changed the symbol. Start over in order
15394 to get h, sym, sec etc. right. */
c316a17c 15395 goto again;
727fc41e
AM
15396 }
15397 }
15398 break;
15399
87c69f97 15400 case R_PPC64_GOT_TLSGD_PCREL34:
c213164a
AM
15401 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15402 {
15403 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15404 pinsn <<= 32;
15405 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15406 if ((tls_mask & TLS_GDIE) != 0)
15407 {
15408 /* IE, pla -> pld */
15409 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
87c69f97 15410 r_type = R_PPC64_GOT_TPREL_PCREL34;
c213164a
AM
15411 }
15412 else
15413 {
15414 /* LE, pla pcrel -> paddi r13 */
15415 pinsn += (-1ULL << 52) + (13ULL << 16);
15416 r_type = R_PPC64_TPREL34;
15417 }
15418 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15419 bfd_put_32 (input_bfd, pinsn >> 32,
15420 contents + rel->r_offset);
15421 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15422 contents + rel->r_offset + 4);
15423 }
15424 break;
15425
87c69f97 15426 case R_PPC64_GOT_TLSLD_PCREL34:
c213164a
AM
15427 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15428 {
15429 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15430 pinsn <<= 32;
15431 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15432 pinsn += (-1ULL << 52) + (13ULL << 16);
15433 bfd_put_32 (input_bfd, pinsn >> 32,
15434 contents + rel->r_offset);
15435 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15436 contents + rel->r_offset + 4);
15437 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15438 r_symndx = STN_UNDEF;
15439 r_type = R_PPC64_TPREL34;
15440 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15441 goto again;
15442 }
15443 break;
15444
727fc41e 15445 case R_PPC64_TLSGD:
37da22e5 15446 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15447 && rel + 1 < relend)
727fc41e 15448 {
b9f04fe0 15449 unsigned int insn2;
5663e321 15450 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15451
4a421c53 15452 offset = rel->r_offset;
5663e321 15453 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15454 {
15455 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15456 if (r_type1 == R_PPC64_PLT_PCREL34
15457 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15458 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15459 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15460 break;
15461 }
15462
15463 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15464 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15465
b00a0a86 15466 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15467 {
15468 /* IE */
15469 r_type = R_PPC64_NONE;
15470 insn2 = 0x7c636a14; /* add 3,3,13 */
15471 }
15472 else
15473 {
15474 /* LE */
15475 if (toc_symndx != 0)
15476 {
15477 r_symndx = toc_symndx;
15478 rel->r_addend = toc_addend;
15479 }
c213164a
AM
15480 if (r_type1 == R_PPC64_REL24_NOTOC
15481 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15482 {
15483 r_type = R_PPC64_NONE;
15484 insn2 = NOP;
15485 }
15486 else
15487 {
15488 rel->r_offset = offset + d_offset;
15489 r_type = R_PPC64_TPREL16_LO;
15490 insn2 = 0x38630000; /* addi 3,3,0 */
15491 }
727fc41e
AM
15492 }
15493 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15494 /* Zap the reloc on the _tls_get_addr call too. */
15495 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15496 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15497 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15498 if ((tls_mask & TLS_GDIE) == 0
15499 && toc_symndx != 0
15500 && r_type != R_PPC64_NONE)
c316a17c 15501 goto again;
411e1bfb 15502 }
411e1bfb
AM
15503 break;
15504
727fc41e 15505 case R_PPC64_TLSLD:
37da22e5 15506 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15507 && rel + 1 < relend)
727fc41e 15508 {
b9f04fe0 15509 unsigned int insn2;
5663e321 15510 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15511
4a421c53 15512 offset = rel->r_offset;
5663e321 15513 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15514 {
15515 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15516 if (r_type1 == R_PPC64_PLT_PCREL34
15517 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15518 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15519 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15520 break;
15521 }
15522
15523 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15524 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15525
c213164a
AM
15526 if (r_type1 == R_PPC64_REL24_NOTOC
15527 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15528 {
15529 r_type = R_PPC64_NONE;
15530 insn2 = NOP;
15531 }
15532 else
15533 {
15534 rel->r_offset = offset + d_offset;
15535 r_symndx = STN_UNDEF;
15536 r_type = R_PPC64_TPREL16_LO;
15537 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15538 insn2 = 0x38630000; /* addi 3,3,0 */
15539 }
727fc41e 15540 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15541 /* Zap the reloc on the _tls_get_addr call too. */
15542 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15543 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15544 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15545 if (r_type != R_PPC64_NONE)
15546 goto again;
727fc41e
AM
15547 }
15548 break;
15549
411e1bfb 15550 case R_PPC64_DTPMOD64:
951fd09b
AM
15551 if (rel + 1 < relend
15552 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15553 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15554 {
951fd09b
AM
15555 if ((tls_mask & TLS_GD) == 0)
15556 {
15557 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15558 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15559 r_type = R_PPC64_TPREL64;
15560 else
15561 {
4ce794b7 15562 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15563 r_type = R_PPC64_NONE;
15564 }
15565 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15566 }
15567 }
15568 else
15569 {
15570 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15571 {
4ce794b7 15572 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15573 r_type = R_PPC64_NONE;
951fd09b 15574 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15575 }
411e1bfb
AM
15576 }
15577 break;
15578
15579 case R_PPC64_TPREL64:
951fd09b 15580 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15581 {
15582 r_type = R_PPC64_NONE;
15583 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15584 }
15585 break;
52a82034 15586
006589cf
AM
15587 case R_PPC64_ENTRY:
15588 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15589 if (!bfd_link_pic (info)
15590 && !info->traditional_format
15591 && relocation + 0x80008000 <= 0xffffffff)
15592 {
15593 unsigned int insn1, insn2;
15594
15595 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15596 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15597 if ((insn1 & ~0xfffc) == LD_R2_0R12
15598 && insn2 == ADD_R2_R2_R12)
15599 {
95f0d0d2 15600 bfd_put_32 (input_bfd,
006589cf
AM
15601 LIS_R2 + PPC_HA (relocation),
15602 contents + rel->r_offset);
95f0d0d2 15603 bfd_put_32 (input_bfd,
006589cf
AM
15604 ADDI_R2_R2 + PPC_LO (relocation),
15605 contents + rel->r_offset + 4);
15606 }
15607 }
15608 else
15609 {
15610 relocation -= (rel->r_offset
15611 + input_section->output_offset
15612 + input_section->output_section->vma);
15613 if (relocation + 0x80008000 <= 0xffffffff)
15614 {
15615 unsigned int insn1, insn2;
15616
15617 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15618 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15619 if ((insn1 & ~0xfffc) == LD_R2_0R12
15620 && insn2 == ADD_R2_R2_R12)
15621 {
95f0d0d2 15622 bfd_put_32 (input_bfd,
006589cf
AM
15623 ADDIS_R2_R12 + PPC_HA (relocation),
15624 contents + rel->r_offset);
95f0d0d2 15625 bfd_put_32 (input_bfd,
006589cf
AM
15626 ADDI_R2_R2 + PPC_LO (relocation),
15627 contents + rel->r_offset + 4);
15628 }
15629 }
15630 }
15631 break;
15632
52a82034
AM
15633 case R_PPC64_REL16_HA:
15634 /* If we are generating a non-PIC executable, edit
15635 . 0: addis 2,12,.TOC.-0b@ha
15636 . addi 2,2,.TOC.-0b@l
15637 used by ELFv2 global entry points to set up r2, to
15638 . lis 2,.TOC.@ha
15639 . addi 2,2,.TOC.@l
15640 if .TOC. is in range. */
0e1862bb 15641 if (!bfd_link_pic (info)
810d4e75 15642 && !info->traditional_format
006589cf 15643 && !htab->opd_abi
4f038ee5 15644 && rel->r_addend == d_offset
52a82034
AM
15645 && h != NULL && &h->elf == htab->elf.hgot
15646 && rel + 1 < relend
15647 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15648 && rel[1].r_offset == rel->r_offset + 4
15649 && rel[1].r_addend == rel->r_addend + 4
15650 && relocation + 0x80008000 <= 0xffffffff)
15651 {
15652 unsigned int insn1, insn2;
4a421c53 15653 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15654 insn1 = bfd_get_32 (input_bfd, contents + offset);
15655 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15656 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15657 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15658 {
15659 r_type = R_PPC64_ADDR16_HA;
15660 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15661 rel->r_addend -= d_offset;
15662 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15663 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15664 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15665 }
15666 }
15667 break;
411e1bfb
AM
15668 }
15669
15670 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15671 insn = 0;
b25116a9
AM
15672 max_br_offset = 1 << 25;
15673 addend = rel->r_addend;
bc30df16 15674 reloc_dest = DEST_NORMAL;
65f38f15 15675 switch (r_type)
5bd4f169
AM
15676 {
15677 default:
65f38f15 15678 break;
5bd4f169 15679
3b421ab3
AM
15680 case R_PPC64_TOCSAVE:
15681 if (relocation + addend == (rel->r_offset
15682 + input_section->output_offset
15683 + input_section->output_section->vma)
15684 && tocsave_find (htab, NO_INSERT,
15685 &local_syms, rel, input_bfd))
15686 {
15687 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15688 if (insn == NOP
15689 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15690 bfd_put_32 (input_bfd,
15691 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15692 contents + rel->r_offset);
15693 }
15694 break;
15695
65f38f15
AM
15696 /* Branch taken prediction relocations. */
15697 case R_PPC64_ADDR14_BRTAKEN:
15698 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15699 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15700 /* Fall through. */
65f38f15 15701
86c76c7b 15702 /* Branch not taken prediction relocations. */
65f38f15
AM
15703 case R_PPC64_ADDR14_BRNTAKEN:
15704 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15705 insn |= bfd_get_32 (input_bfd,
411e1bfb 15706 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15707 /* Fall through. */
86c76c7b 15708
b25116a9
AM
15709 case R_PPC64_REL14:
15710 max_br_offset = 1 << 15;
1a0670f3 15711 /* Fall through. */
5bd4f169 15712
65f38f15 15713 case R_PPC64_REL24:
05d0e962 15714 case R_PPC64_REL24_NOTOC:
23cedd1d 15715 case R_PPC64_PLTCALL:
5663e321 15716 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15717 /* Calls to functions with a different TOC, such as calls to
15718 shared objects, need to alter the TOC pointer. This is
15719 done using a linkage stub. A REL24 branching to these
15720 linkage stubs needs to be followed by a nop, as the nop
15721 will be replaced with an instruction to restore the TOC
15722 base pointer. */
8387904d 15723 fdh = h;
b31867b6
AM
15724 if (h != NULL
15725 && h->oh != NULL
15726 && h->oh->is_func_descriptor)
15727 fdh = ppc_follow_link (h->oh);
31c76678
DK
15728 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15729 htab);
5663e321
AM
15730 if ((r_type == R_PPC64_PLTCALL
15731 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15732 && stub_entry != NULL
05d0e962
AM
15733 && stub_entry->stub_type >= ppc_stub_plt_call
15734 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15735 stub_entry = NULL;
15736
6abec6bc 15737 if (stub_entry != NULL
d0abeec8
AM
15738 && ((stub_entry->stub_type >= ppc_stub_plt_call
15739 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15740 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15741 || stub_entry->stub_type == ppc_stub_plt_branch_both
15742 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15743 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15744 {
b25116a9 15745 bfd_boolean can_plt_call = FALSE;
721956f4 15746
6e1816be
AM
15747 if (stub_entry->stub_type == ppc_stub_plt_call
15748 && !htab->opd_abi
15749 && htab->params->plt_localentry0 != 0
9e51d549 15750 && h != NULL
6e1816be
AM
15751 && is_elfv2_localentry0 (&h->elf))
15752 {
15753 /* The function doesn't use or change r2. */
15754 can_plt_call = TRUE;
15755 }
05d0e962
AM
15756 else if (r_type == R_PPC64_REL24_NOTOC)
15757 {
15758 /* NOTOC calls don't need to restore r2. */
15759 can_plt_call = TRUE;
15760 }
6e1816be 15761
f378ab09 15762 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15763 branch and link followed by a nop. The nop is
15764 replaced by an insn to restore r2. */
6e1816be 15765 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15766 {
ba8ca3e7
AM
15767 unsigned long br;
15768
15769 br = bfd_get_32 (input_bfd,
15770 contents + rel->r_offset);
15771 if ((br & 1) != 0)
41bd81ab 15772 {
ba8ca3e7
AM
15773 unsigned long nop;
15774
15775 nop = bfd_get_32 (input_bfd,
15776 contents + rel->r_offset + 4);
23cedd1d
AM
15777 if (nop == LD_R2_0R1 + STK_TOC (htab))
15778 can_plt_call = TRUE;
15779 else if (nop == NOP
15780 || nop == CROR_151515
15781 || nop == CROR_313131)
a7f2871e 15782 {
ba8ca3e7 15783 if (h != NULL
ed7007c1 15784 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15785 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15786 {
15787 /* Special stub used, leave nop alone. */
15788 }
15789 else
a078d95a
AM
15790 bfd_put_32 (input_bfd,
15791 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15792 contents + rel->r_offset + 4);
15793 can_plt_call = TRUE;
a7f2871e 15794 }
41bd81ab 15795 }
5bd4f169 15796 }
721956f4 15797
ba8ca3e7 15798 if (!can_plt_call && h != NULL)
721956f4 15799 {
ba8ca3e7
AM
15800 const char *name = h->elf.root.root.string;
15801
15802 if (*name == '.')
15803 ++name;
15804
15805 if (strncmp (name, "__libc_start_main", 17) == 0
15806 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15807 {
ba8ca3e7
AM
15808 /* Allow crt1 branch to go via a toc adjusting
15809 stub. Other calls that never return could do
15810 the same, if we could detect such. */
b25116a9 15811 can_plt_call = TRUE;
6ab189d5 15812 }
ba8ca3e7
AM
15813 }
15814
15815 if (!can_plt_call)
15816 {
15817 /* g++ as of 20130507 emits self-calls without a
15818 following nop. This is arguably wrong since we
15819 have conflicting information. On the one hand a
15820 global symbol and on the other a local call
15821 sequence, but don't error for this special case.
15822 It isn't possible to cheaply verify we have
15823 exactly such a call. Allow all calls to the same
15824 section. */
15825 asection *code_sec = sec;
15826
15827 if (get_opd_info (sec) != NULL)
ad8e1ba5 15828 {
ba8ca3e7
AM
15829 bfd_vma off = (relocation + addend
15830 - sec->output_section->vma
15831 - sec->output_offset);
bc30df16 15832
ba8ca3e7 15833 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15834 }
ba8ca3e7
AM
15835 if (code_sec == input_section)
15836 can_plt_call = TRUE;
15837 }
15838
15839 if (!can_plt_call)
15840 {
05d0e962
AM
15841 if (stub_entry->stub_type >= ppc_stub_plt_call
15842 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15843 info->callbacks->einfo
695344c0 15844 /* xgettext:c-format */
c1c8c1ef 15845 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15846 "(plt call stub)\n"),
4805fc55
AM
15847 input_bfd, input_section, rel->r_offset, sym_name);
15848 else
15849 info->callbacks->einfo
695344c0 15850 /* xgettext:c-format */
c1c8c1ef 15851 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15852 "(toc save/adjust stub)\n"),
4805fc55 15853 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15854
15855 bfd_set_error (bfd_error_bad_value);
15856 ret = FALSE;
721956f4
AM
15857 }
15858
b25116a9 15859 if (can_plt_call
05d0e962
AM
15860 && stub_entry->stub_type >= ppc_stub_plt_call
15861 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15862 unresolved_reloc = FALSE;
15863 }
15864
6abec6bc
AM
15865 if ((stub_entry == NULL
15866 || stub_entry->stub_type == ppc_stub_long_branch
15867 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15868 && get_opd_info (sec) != NULL)
15869 {
15870 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15871 bfd_vma off = (relocation + addend
15872 - sec->output_section->vma
15873 - sec->output_offset);
aef36ac1 15874 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15875 if (dest != (bfd_vma) -1)
15876 {
15877 relocation = dest;
15878 addend = 0;
bc30df16 15879 reloc_dest = DEST_OPD;
8387904d
AM
15880 }
15881 }
15882
b25116a9
AM
15883 /* If the branch is out of reach we ought to have a long
15884 branch stub. */
15885 from = (rel->r_offset
15886 + input_section->output_offset
15887 + input_section->output_section->vma);
15888
6911b7dc
AM
15889 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15890 ? fdh->elf.other
15891 : sym->st_other);
15892
6abec6bc
AM
15893 if (stub_entry != NULL
15894 && (stub_entry->stub_type == ppc_stub_long_branch
15895 || stub_entry->stub_type == ppc_stub_plt_branch)
15896 && (r_type == R_PPC64_ADDR14_BRTAKEN
15897 || r_type == R_PPC64_ADDR14_BRNTAKEN
15898 || (relocation + addend - from + max_br_offset
15899 < 2 * max_br_offset)))
15900 /* Don't use the stub if this branch is in range. */
15901 stub_entry = NULL;
b25116a9 15902
05d0e962
AM
15903 if (stub_entry != NULL
15904 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15905 || stub_entry->stub_type == ppc_stub_long_branch_both
15906 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15907 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15908 && (r_type != R_PPC64_REL24_NOTOC
15909 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15910 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15911 && (relocation + addend - from + max_br_offset
15912 < 2 * max_br_offset))
15913 stub_entry = NULL;
15914
15915 if (stub_entry != NULL
15916 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15917 || stub_entry->stub_type == ppc_stub_long_branch_both
15918 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15919 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15920 && r_type == R_PPC64_REL24_NOTOC
15921 && (relocation + addend - from + max_br_offset
15922 < 2 * max_br_offset))
15923 stub_entry = NULL;
15924
b25116a9
AM
15925 if (stub_entry != NULL)
15926 {
15927 /* Munge up the value and addend so that we call the stub
15928 rather than the procedure directly. */
a4b6fadd
AM
15929 asection *stub_sec = stub_entry->group->stub_sec;
15930
15931 if (stub_entry->stub_type == ppc_stub_save_res)
15932 relocation += (stub_sec->output_offset
15933 + stub_sec->output_section->vma
15934 + stub_sec->size - htab->sfpr->size
15935 - htab->sfpr->output_offset
15936 - htab->sfpr->output_section->vma);
15937 else
15938 relocation = (stub_entry->stub_offset
15939 + stub_sec->output_offset
15940 + stub_sec->output_section->vma);
b25116a9 15941 addend = 0;
bc30df16 15942 reloc_dest = DEST_STUB;
3b421ab3 15943
29433886
AM
15944 if ((((stub_entry->stub_type == ppc_stub_plt_call
15945 && ALWAYS_EMIT_R2SAVE)
15946 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15947 || stub_entry->stub_type == ppc_stub_plt_call_both)
15948 && rel + 1 < relend
15949 && rel[1].r_offset == rel->r_offset + 4
15950 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15951 || ((stub_entry->stub_type == ppc_stub_long_branch_both
15952 || stub_entry->stub_type == ppc_stub_plt_branch_both
15953 || stub_entry->stub_type == ppc_stub_plt_call_both)
15954 && r_type == R_PPC64_REL24_NOTOC))
15955 {
15956 /* Skip over the r2 store at the start of the stub. */
15957 if (!(stub_entry->stub_type >= ppc_stub_plt_call
15958 && htab->params->tls_get_addr_opt
15959 && h != NULL
15960 && is_tls_get_addr (&h->elf, htab)))
15961 relocation += 4;
15962 }
5663e321
AM
15963
15964 if (r_type == R_PPC64_REL24_NOTOC
15965 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15966 || stub_entry->stub_type == ppc_stub_plt_call_both))
15967 htab->notoc_plt = 1;
b25116a9
AM
15968 }
15969
15970 if (insn != 0)
15971 {
794e51c0 15972 if (is_isa_v2)
721956f4 15973 {
b25116a9
AM
15974 /* Set 'a' bit. This is 0b00010 in BO field for branch
15975 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15976 for branch on CTR insns (BO == 1a00t or 1a01t). */
15977 if ((insn & (0x14 << 21)) == (0x04 << 21))
15978 insn |= 0x02 << 21;
15979 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15980 insn |= 0x08 << 21;
15981 else
15982 break;
15983 }
15984 else
15985 {
15986 /* Invert 'y' bit if not the default. */
4cc603a5 15987 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15988 insn ^= 0x01 << 21;
721956f4 15989 }
b25116a9 15990
95f0d0d2 15991 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15992 }
e86ce104 15993
06da1e8e
AM
15994 /* NOP out calls to undefined weak functions.
15995 We can thus call a weak function without first
15996 checking whether the function is defined. */
b25116a9 15997 else if (h != NULL
039b3fef 15998 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15999 && h->elf.dynindx == -1
05d0e962
AM
16000 && (r_type == R_PPC64_REL24
16001 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 16002 && relocation == 0
4cc603a5 16003 && addend == 0)
e86ce104 16004 {
95f0d0d2 16005 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 16006 goto copy_reloc;
e86ce104 16007 }
65f38f15 16008 break;
066f4018
AM
16009
16010 case R_PPC64_GOT16_DS:
6738c8a7
AM
16011 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
16012 || !htab->do_toc_opt)
06507dab 16013 break;
066f4018
AM
16014 from = TOCstart + htab->sec_info[input_section->id].toc_off;
16015 if (relocation + addend - from + 0x8000 < 0x10000
9e51d549 16016 && (h == NULL || SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
066f4018
AM
16017 {
16018 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 16019 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
16020 {
16021 insn += (14u << 26) - (58u << 26);
16022 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
16023 r_type = R_PPC64_TOC16;
16024 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
16025 }
16026 }
16027 break;
16028
16029 case R_PPC64_GOT16_LO_DS:
16030 case R_PPC64_GOT16_HA:
6738c8a7
AM
16031 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
16032 || !htab->do_toc_opt)
06507dab 16033 break;
066f4018
AM
16034 from = TOCstart + htab->sec_info[input_section->id].toc_off;
16035 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
9e51d549 16036 && (h == NULL || SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
066f4018
AM
16037 {
16038 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 16039 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
16040 {
16041 insn += (14u << 26) - (58u << 26);
16042 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
16043 r_type = R_PPC64_TOC16_LO;
16044 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
16045 }
2365f8d7 16046 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
16047 {
16048 r_type = R_PPC64_TOC16_HA;
16049 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
16050 }
16051 }
16052 break;
4a421c53
AM
16053
16054 case R_PPC64_GOT_PCREL34:
6738c8a7
AM
16055 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
16056 || !htab->do_toc_opt)
06507dab 16057 break;
4a421c53
AM
16058 from = (rel->r_offset
16059 + input_section->output_section->vma
16060 + input_section->output_offset);
6738c8a7 16061 if (!(relocation - from + (1ULL << 33) < 1ULL << 34
9e51d549 16062 && (h == NULL || SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
6738c8a7
AM
16063 break;
16064
16065 offset = rel->r_offset;
16066 pinsn = bfd_get_32 (input_bfd, contents + offset);
16067 pinsn <<= 32;
16068 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
16069 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
16070 != ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
16071 break;
16072
16073 /* Replace with paddi. */
16074 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
16075 r_type = R_PPC64_PCREL34;
16076 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
16077 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
16078 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
16079 /* Fall through. */
4a421c53
AM
16080
16081 case R_PPC64_PCREL34:
6738c8a7
AM
16082 if (!htab->params->no_pcrel_opt
16083 && rel + 1 < relend
16084 && rel[1].r_offset == rel->r_offset
16085 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT)
9e51d549 16086 && (h == NULL || SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
4a421c53
AM
16087 {
16088 offset = rel->r_offset;
16089 pinsn = bfd_get_32 (input_bfd, contents + offset);
16090 pinsn <<= 32;
16091 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
16092 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
16093 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
16094 | (14ULL << 26) /* paddi */))
16095 {
6738c8a7
AM
16096 bfd_vma off2 = rel[1].r_addend;
16097 if (off2 == 0)
16098 /* zero means next insn. */
16099 off2 = 8;
16100 off2 += offset;
16101 if (off2 + 4 <= input_section->size)
4a421c53 16102 {
6738c8a7
AM
16103 uint64_t pinsn2;
16104 bfd_signed_vma addend_off;
16105 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
16106 pinsn2 <<= 32;
16107 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
4a421c53 16108 {
6738c8a7
AM
16109 if (off2 + 8 > input_section->size)
16110 break;
16111 pinsn2 |= bfd_get_32 (input_bfd,
16112 contents + off2 + 4);
16113 }
16114 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
16115 {
16116 addend += addend_off;
16117 rel->r_addend = addend;
16118 bfd_put_32 (input_bfd, pinsn >> 32,
16119 contents + offset);
16120 bfd_put_32 (input_bfd, pinsn,
16121 contents + offset + 4);
16122 bfd_put_32 (input_bfd, pinsn2 >> 32,
16123 contents + off2);
4a421c53 16124 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
6738c8a7
AM
16125 bfd_put_32 (input_bfd, pinsn2,
16126 contents + off2 + 4);
4a421c53
AM
16127 }
16128 }
16129 }
16130 }
16131 break;
65f38f15 16132 }
5bd4f169 16133
411e1bfb 16134 tls_type = 0;
23cedd1d 16135 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
16136 switch (r_type)
16137 {
16138 default:
cf97bcb0
AM
16139 /* xgettext:c-format */
16140 _bfd_error_handler (_("%pB: %s unsupported"),
16141 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 16142
65f38f15 16143 bfd_set_error (bfd_error_bad_value);
b34976b6 16144 ret = FALSE;
c316a17c 16145 goto copy_reloc;
5bd4f169 16146
65f38f15 16147 case R_PPC64_NONE:
411e1bfb 16148 case R_PPC64_TLS:
727fc41e
AM
16149 case R_PPC64_TLSGD:
16150 case R_PPC64_TLSLD:
3b421ab3 16151 case R_PPC64_TOCSAVE:
04c9666a
AM
16152 case R_PPC64_GNU_VTINHERIT:
16153 case R_PPC64_GNU_VTENTRY:
006589cf 16154 case R_PPC64_ENTRY:
4a421c53 16155 case R_PPC64_PCREL_OPT:
c316a17c 16156 goto copy_reloc;
5bd4f169
AM
16157
16158 /* GOT16 relocations. Like an ADDR16 using the symbol's
16159 address in the GOT as relocation value instead of the
411e1bfb 16160 symbol's value itself. Also, create a GOT entry for the
5bd4f169 16161 symbol and put the symbol value there. */
411e1bfb
AM
16162 case R_PPC64_GOT_TLSGD16:
16163 case R_PPC64_GOT_TLSGD16_LO:
16164 case R_PPC64_GOT_TLSGD16_HI:
16165 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 16166 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 16167 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
16168 goto dogot;
16169
16170 case R_PPC64_GOT_TLSLD16:
16171 case R_PPC64_GOT_TLSLD16_LO:
16172 case R_PPC64_GOT_TLSLD16_HI:
16173 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 16174 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 16175 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
16176 goto dogot;
16177
16178 case R_PPC64_GOT_TPREL16_DS:
16179 case R_PPC64_GOT_TPREL16_LO_DS:
16180 case R_PPC64_GOT_TPREL16_HI:
16181 case R_PPC64_GOT_TPREL16_HA:
87c69f97 16182 case R_PPC64_GOT_TPREL_PCREL34:
411e1bfb
AM
16183 tls_type = TLS_TLS | TLS_TPREL;
16184 goto dogot;
16185
16186 case R_PPC64_GOT_DTPREL16_DS:
16187 case R_PPC64_GOT_DTPREL16_LO_DS:
16188 case R_PPC64_GOT_DTPREL16_HI:
16189 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 16190 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
16191 tls_type = TLS_TLS | TLS_DTPREL;
16192 goto dogot;
16193
65f38f15
AM
16194 case R_PPC64_GOT16:
16195 case R_PPC64_GOT16_LO:
16196 case R_PPC64_GOT16_HI:
16197 case R_PPC64_GOT16_HA:
16198 case R_PPC64_GOT16_DS:
16199 case R_PPC64_GOT16_LO_DS:
5663e321 16200 case R_PPC64_GOT_PCREL34:
411e1bfb 16201 dogot:
5bd4f169
AM
16202 {
16203 /* Relocation is to the entry for this symbol in the global
16204 offset table. */
e717da7e 16205 asection *got;
d881513a 16206 bfd_vma *offp;
5bd4f169 16207 bfd_vma off;
d881513a 16208 unsigned long indx = 0;
927be08e 16209 struct got_entry *ent;
65f38f15 16210
d881513a 16211 if (tls_type == (TLS_TLS | TLS_LD)
9e51d549 16212 && (h == NULL || SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
927be08e 16213 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16214 else
5bd4f169 16215 {
d881513a
AM
16216 if (h != NULL)
16217 {
f0158f44
AM
16218 if (!htab->elf.dynamic_sections_created
16219 || h->elf.dynindx == -1
16220 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16221 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16222 /* This is actually a static link, or it is a
16223 -Bsymbolic link and the symbol is defined
16224 locally, or the symbol was forced to be local
16225 because of a version file. */
16226 ;
16227 else
16228 {
039b3fef 16229 indx = h->elf.dynindx;
d881513a
AM
16230 unresolved_reloc = FALSE;
16231 }
039b3fef 16232 ent = h->elf.got.glist;
d881513a 16233 }
411e1bfb 16234 else
5bd4f169 16235 {
d881513a
AM
16236 if (local_got_ents == NULL)
16237 abort ();
16238 ent = local_got_ents[r_symndx];
5bd4f169 16239 }
d881513a
AM
16240
16241 for (; ent != NULL; ent = ent->next)
133a1f60 16242 if (ent->addend == orig_rel.r_addend
e717da7e 16243 && ent->owner == input_bfd
d881513a
AM
16244 && ent->tls_type == tls_type)
16245 break;
5bd4f169 16246 }
411e1bfb 16247
927be08e
AM
16248 if (ent == NULL)
16249 abort ();
16250 if (ent->is_indirect)
16251 ent = ent->got.ent;
16252 offp = &ent->got.offset;
16253 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16254 if (got == NULL)
16255 abort ();
16256
411e1bfb
AM
16257 /* The offset must always be a multiple of 8. We use the
16258 least significant bit to record whether we have already
16259 processed this entry. */
d881513a 16260 off = *offp;
411e1bfb
AM
16261 if ((off & 1) != 0)
16262 off &= ~1;
5bd4f169
AM
16263 else
16264 {
411e1bfb
AM
16265 /* Generate relocs for the dynamic linker, except in
16266 the case of TLSLD where we'll use one entry per
16267 module. */
25f23106
AM
16268 asection *relgot;
16269 bfd_boolean ifunc;
e717da7e 16270
d881513a 16271 *offp = off | 1;
25f23106
AM
16272 relgot = NULL;
16273 ifunc = (h != NULL
16274 ? h->elf.type == STT_GNU_IFUNC
16275 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16276 if (ifunc)
82e66161
AM
16277 {
16278 relgot = htab->elf.irelplt;
efb2a7b4 16279 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16280 htab->elf.ifunc_resolvers = TRUE;
82e66161 16281 }
f0158f44
AM
16282 else if (indx != 0
16283 || (bfd_link_pic (info)
16284 && (h == NULL
f749f26e
AM
16285 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16286 && !(tls_type != 0
f15d0b54 16287 && bfd_link_executable (info)
9e51d549
AM
16288 && (h == NULL
16289 || SYMBOL_REFERENCES_LOCAL (info,
16290 &h->elf)))))
19e08130 16291 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16292 if (relgot != NULL)
5bd4f169 16293 {
e717da7e
AM
16294 outrel.r_offset = (got->output_section->vma
16295 + got->output_offset
411e1bfb 16296 + off);
133a1f60 16297 outrel.r_addend = orig_rel.r_addend;
d881513a 16298 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16299 {
411e1bfb 16300 outrel.r_addend = 0;
e515b051 16301 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16302 if (tls_type == (TLS_TLS | TLS_GD))
16303 {
e717da7e
AM
16304 loc = relgot->contents;
16305 loc += (relgot->reloc_count++
d881513a
AM
16306 * sizeof (Elf64_External_Rela));
16307 bfd_elf64_swap_reloca_out (output_bfd,
16308 &outrel, loc);
e515b051 16309 outrel.r_offset += 8;
133a1f60 16310 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16311 outrel.r_info
16312 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16313 }
411e1bfb 16314 }
951fd09b 16315 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16316 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16317 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16318 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16319 else if (indx != 0)
16320 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16321 else
81407a69 16322 {
25f23106
AM
16323 if (ifunc)
16324 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16325 else
16326 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16327
16328 /* Write the .got section contents for the sake
16329 of prelink. */
e717da7e 16330 loc = got->contents + off;
23fbd6fa
JJ
16331 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16332 loc);
81407a69 16333 }
81407a69
AM
16334
16335 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16336 {
16337 outrel.r_addend += relocation;
16338 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16339 {
16340 if (htab->elf.tls_sec == NULL)
16341 outrel.r_addend = 0;
16342 else
16343 outrel.r_addend -= htab->elf.tls_sec->vma;
16344 }
e515b051 16345 }
e717da7e
AM
16346 loc = relgot->contents;
16347 loc += (relgot->reloc_count++
411e1bfb
AM
16348 * sizeof (Elf64_External_Rela));
16349 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16350 }
16351
ad8e1ba5 16352 /* Init the .got section contents here if we're not
81407a69 16353 emitting a reloc. */
d881513a 16354 else
411e1bfb 16355 {
133a1f60 16356 relocation += orig_rel.r_addend;
f0158f44 16357 if (tls_type != 0)
411e1bfb 16358 {
989f9879
AM
16359 if (htab->elf.tls_sec == NULL)
16360 relocation = 0;
16361 else
16362 {
f0158f44
AM
16363 if (tls_type & TLS_LD)
16364 relocation = 0;
16365 else
16366 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16367 if (tls_type & TLS_TPREL)
989f9879
AM
16368 relocation += DTP_OFFSET - TP_OFFSET;
16369 }
5bd4f169 16370
f0158f44 16371 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16372 {
16373 bfd_put_64 (output_bfd, relocation,
e717da7e 16374 got->contents + off + 8);
676ee2b5 16375 relocation = 1;
7b609f53 16376 }
411e1bfb
AM
16377 }
16378 bfd_put_64 (output_bfd, relocation,
e717da7e 16379 got->contents + off);
5bd4f169
AM
16380 }
16381 }
16382
65f38f15
AM
16383 if (off >= (bfd_vma) -2)
16384 abort ();
16385
bf102f86 16386 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16387 addend = 0;
c213164a 16388 if (!(r_type == R_PPC64_GOT_PCREL34
87c69f97
AM
16389 || r_type == R_PPC64_GOT_TLSGD_PCREL34
16390 || r_type == R_PPC64_GOT_TLSLD_PCREL34
16391 || r_type == R_PPC64_GOT_TPREL_PCREL34
16392 || r_type == R_PPC64_GOT_DTPREL_PCREL34))
5663e321 16393 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16394 }
65f38f15
AM
16395 break;
16396
16397 case R_PPC64_PLT16_HA:
16398 case R_PPC64_PLT16_HI:
16399 case R_PPC64_PLT16_LO:
08be3224 16400 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16401 case R_PPC64_PLT_PCREL34:
16402 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16403 case R_PPC64_PLT32:
16404 case R_PPC64_PLT64:
23cedd1d 16405 case R_PPC64_PLTSEQ:
5663e321 16406 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16407 case R_PPC64_PLTCALL:
5663e321 16408 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16409 /* Relocation is to the entry for this symbol in the
16410 procedure linkage table. */
23cedd1d 16411 unresolved_reloc = TRUE;
cbf95972
AM
16412 {
16413 struct plt_entry **plt_list = NULL;
16414 if (h != NULL)
16415 plt_list = &h->elf.plt.plist;
16416 else if (local_got_ents != NULL)
16417 {
16418 struct plt_entry **local_plt = (struct plt_entry **)
16419 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16420 plt_list = local_plt + r_symndx;
cbf95972
AM
16421 }
16422 if (plt_list)
16423 {
16424 struct plt_entry *ent;
65f38f15 16425
cbf95972
AM
16426 for (ent = *plt_list; ent != NULL; ent = ent->next)
16427 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16428 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16429 {
16430 asection *plt;
08be3224 16431 bfd_vma got;
cbf95972
AM
16432
16433 plt = htab->elf.splt;
16434 if (!htab->elf.dynamic_sections_created
16435 || h == NULL
16436 || h->elf.dynindx == -1)
2d7ad24e
AM
16437 {
16438 if (h != NULL
16439 ? h->elf.type == STT_GNU_IFUNC
16440 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16441 plt = htab->elf.iplt;
16442 else
16443 plt = htab->pltlocal;
16444 }
16445 relocation = (plt->output_section->vma
16446 + plt->output_offset
16447 + ent->plt.offset);
08be3224 16448 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16449 || r_type == R_PPC64_PLT16_HI
16450 || r_type == R_PPC64_PLT16_LO
16451 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16452 {
16453 got = (elf_gp (output_bfd)
16454 + htab->sec_info[input_section->id].toc_off);
16455 relocation -= got;
16456 }
133a1f60 16457 addend = 0;
cbf95972
AM
16458 unresolved_reloc = FALSE;
16459 break;
16460 }
16461 }
16462 }
65f38f15 16463 break;
5bd4f169 16464
0b13192e
AM
16465 case R_PPC64_TOC:
16466 /* Relocation value is TOC base. */
16467 relocation = TOCstart;
cf35638d 16468 if (r_symndx == STN_UNDEF)
6f20ed8a 16469 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16470 else if (unresolved_reloc)
16471 ;
6f20ed8a
AM
16472 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16473 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16474 else
16475 unresolved_reloc = TRUE;
ab96bf03 16476 goto dodyn;
0b13192e 16477
5bd4f169
AM
16478 /* TOC16 relocs. We want the offset relative to the TOC base,
16479 which is the address of the start of the TOC plus 0x8000.
16480 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16481 in this order. */
65f38f15
AM
16482 case R_PPC64_TOC16:
16483 case R_PPC64_TOC16_LO:
16484 case R_PPC64_TOC16_HI:
16485 case R_PPC64_TOC16_DS:
16486 case R_PPC64_TOC16_LO_DS:
16487 case R_PPC64_TOC16_HA:
6f20ed8a 16488 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16489 if (h != NULL)
16490 goto dodyn;
5bd4f169
AM
16491 break;
16492
16493 /* Relocate against the beginning of the section. */
65f38f15
AM
16494 case R_PPC64_SECTOFF:
16495 case R_PPC64_SECTOFF_LO:
16496 case R_PPC64_SECTOFF_HI:
16497 case R_PPC64_SECTOFF_DS:
16498 case R_PPC64_SECTOFF_LO_DS:
16499 case R_PPC64_SECTOFF_HA:
4ce794b7 16500 if (sec != NULL)
65f38f15 16501 addend -= sec->output_section->vma;
5bd4f169
AM
16502 break;
16503
25f23106
AM
16504 case R_PPC64_REL16:
16505 case R_PPC64_REL16_LO:
16506 case R_PPC64_REL16_HI:
16507 case R_PPC64_REL16_HA:
4a969973
AM
16508 case R_PPC64_REL16_HIGH:
16509 case R_PPC64_REL16_HIGHA:
16510 case R_PPC64_REL16_HIGHER:
16511 case R_PPC64_REL16_HIGHERA:
16512 case R_PPC64_REL16_HIGHEST:
16513 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16514 case R_PPC64_REL16_HIGHER34:
16515 case R_PPC64_REL16_HIGHERA34:
16516 case R_PPC64_REL16_HIGHEST34:
16517 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16518 case R_PPC64_REL16DX_HA:
721956f4
AM
16519 case R_PPC64_REL14:
16520 case R_PPC64_REL14_BRNTAKEN:
16521 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16522 case R_PPC64_REL24:
05d0e962 16523 case R_PPC64_REL24_NOTOC:
5663e321
AM
16524 case R_PPC64_PCREL34:
16525 case R_PPC64_PCREL28:
5d1634d7
AM
16526 break;
16527
411e1bfb
AM
16528 case R_PPC64_TPREL16:
16529 case R_PPC64_TPREL16_LO:
16530 case R_PPC64_TPREL16_HI:
16531 case R_PPC64_TPREL16_HA:
16532 case R_PPC64_TPREL16_DS:
16533 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16534 case R_PPC64_TPREL16_HIGH:
16535 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16536 case R_PPC64_TPREL16_HIGHER:
16537 case R_PPC64_TPREL16_HIGHERA:
16538 case R_PPC64_TPREL16_HIGHEST:
16539 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16540 case R_PPC64_TPREL34:
766bc656
AM
16541 if (h != NULL
16542 && h->elf.root.type == bfd_link_hash_undefweak
16543 && h->elf.dynindx == -1)
16544 {
16545 /* Make this relocation against an undefined weak symbol
16546 resolve to zero. This is really just a tweak, since
16547 code using weak externs ought to check that they are
16548 defined before using them. */
16549 bfd_byte *p = contents + rel->r_offset - d_offset;
16550
95f0d0d2 16551 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16552 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16553 if (insn != 0)
95f0d0d2 16554 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16555 break;
16556 }
989f9879
AM
16557 if (htab->elf.tls_sec != NULL)
16558 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16559 /* The TPREL16 relocs shouldn't really be used in shared
16560 libs or with non-local symbols as that will result in
16561 DT_TEXTREL being set, but support them anyway. */
16562 goto dodyn;
411e1bfb
AM
16563
16564 case R_PPC64_DTPREL16:
16565 case R_PPC64_DTPREL16_LO:
16566 case R_PPC64_DTPREL16_HI:
16567 case R_PPC64_DTPREL16_HA:
16568 case R_PPC64_DTPREL16_DS:
16569 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16570 case R_PPC64_DTPREL16_HIGH:
16571 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16572 case R_PPC64_DTPREL16_HIGHER:
16573 case R_PPC64_DTPREL16_HIGHERA:
16574 case R_PPC64_DTPREL16_HIGHEST:
16575 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16576 case R_PPC64_DTPREL34:
989f9879
AM
16577 if (htab->elf.tls_sec != NULL)
16578 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16579 break;
16580
45965137
AM
16581 case R_PPC64_ADDR64_LOCAL:
16582 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16583 ? h->elf.other
16584 : sym->st_other);
16585 break;
16586
e515b051
AM
16587 case R_PPC64_DTPMOD64:
16588 relocation = 1;
16589 addend = 0;
16590 goto dodyn;
16591
411e1bfb 16592 case R_PPC64_TPREL64:
989f9879
AM
16593 if (htab->elf.tls_sec != NULL)
16594 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16595 goto dodyn;
16596
16597 case R_PPC64_DTPREL64:
989f9879
AM
16598 if (htab->elf.tls_sec != NULL)
16599 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16600 /* Fall through. */
411e1bfb 16601
65f38f15
AM
16602 /* Relocations that may need to be propagated if this is a
16603 dynamic object. */
04c9666a 16604 case R_PPC64_REL30:
65f38f15
AM
16605 case R_PPC64_REL32:
16606 case R_PPC64_REL64:
16607 case R_PPC64_ADDR14:
16608 case R_PPC64_ADDR14_BRNTAKEN:
16609 case R_PPC64_ADDR14_BRTAKEN:
16610 case R_PPC64_ADDR16:
16611 case R_PPC64_ADDR16_DS:
16612 case R_PPC64_ADDR16_HA:
16613 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16614 case R_PPC64_ADDR16_HIGH:
16615 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16616 case R_PPC64_ADDR16_HIGHER:
16617 case R_PPC64_ADDR16_HIGHERA:
16618 case R_PPC64_ADDR16_HIGHEST:
16619 case R_PPC64_ADDR16_HIGHESTA:
16620 case R_PPC64_ADDR16_LO:
16621 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16622 case R_PPC64_ADDR16_HIGHER34:
16623 case R_PPC64_ADDR16_HIGHERA34:
16624 case R_PPC64_ADDR16_HIGHEST34:
16625 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16626 case R_PPC64_ADDR24:
65f38f15
AM
16627 case R_PPC64_ADDR32:
16628 case R_PPC64_ADDR64:
16629 case R_PPC64_UADDR16:
16630 case R_PPC64_UADDR32:
16631 case R_PPC64_UADDR64:
5663e321
AM
16632 case R_PPC64_D34:
16633 case R_PPC64_D34_LO:
16634 case R_PPC64_D34_HI30:
16635 case R_PPC64_D34_HA30:
16636 case R_PPC64_D28:
411e1bfb 16637 dodyn:
5d1634d7 16638 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16639 break;
16640
41bd81ab
AM
16641 if (NO_OPD_RELOCS && is_opd)
16642 break;
16643
8a9e8e72 16644 if (bfd_link_pic (info)
b1b07054 16645 ? ((h == NULL
190eb1dd 16646 || h->elf.dyn_relocs != NULL)
b1b07054
AM
16647 && ((h != NULL && pc_dynrelocs (h))
16648 || must_be_dyn_reloc (info, r_type)))
8a9e8e72 16649 : (h != NULL
190eb1dd 16650 ? h->elf.dyn_relocs != NULL
d311bc8b 16651 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16652 {
b34976b6 16653 bfd_boolean skip, relocate;
65f38f15 16654 asection *sreloc;
1cf1f670 16655 bfd_vma out_off;
82e66161 16656 long indx = 0;
65f38f15
AM
16657
16658 /* When generating a dynamic object, these relocations
16659 are copied into the output file to be resolved at run
16660 time. */
16661
b34976b6
AM
16662 skip = FALSE;
16663 relocate = FALSE;
65f38f15 16664
1cf1f670
AM
16665 out_off = _bfd_elf_section_offset (output_bfd, info,
16666 input_section, rel->r_offset);
16667 if (out_off == (bfd_vma) -1)
b34976b6 16668 skip = TRUE;
1cf1f670 16669 else if (out_off == (bfd_vma) -2)
b34976b6 16670 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16671 out_off += (input_section->output_section->vma
16672 + input_section->output_offset);
16673 outrel.r_offset = out_off;
411e1bfb 16674 outrel.r_addend = rel->r_addend;
65f38f15 16675
1cf1f670
AM
16676 /* Optimize unaligned reloc use. */
16677 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16678 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16679 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16680 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16681 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16682 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16683 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16684 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16685 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16686
65f38f15 16687 if (skip)
0bb2d96a 16688 memset (&outrel, 0, sizeof outrel);
9e51d549
AM
16689 else if (h != NULL
16690 && !SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16691 && !is_opd
16692 && r_type != R_PPC64_TOC)
14acf4dc 16693 {
82e66161
AM
16694 indx = h->elf.dynindx;
16695 BFD_ASSERT (indx != -1);
16696 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16697 }
65f38f15
AM
16698 else
16699 {
41bd81ab
AM
16700 /* This symbol is local, or marked to become local,
16701 or this is an opd section reloc which must point
16702 at a local function. */
65f38f15 16703 outrel.r_addend += relocation;
e86ce104 16704 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16705 {
3fad3c7c 16706 if (is_opd && h != NULL)
afbe61cf
AM
16707 {
16708 /* Lie about opd entries. This case occurs
16709 when building shared libraries and we
16710 reference a function in another shared
3fad3c7c
AM
16711 lib. The same thing happens for a weak
16712 definition in an application that's
16713 overridden by a strong definition in a
16714 shared lib. (I believe this is a generic
16715 bug in binutils handling of weak syms.)
16716 In these cases we won't use the opd
1e2f5b6e 16717 entry in this lib. */
b34976b6 16718 unresolved_reloc = FALSE;
afbe61cf 16719 }
25f23106
AM
16720 if (!is_opd
16721 && r_type == R_PPC64_ADDR64
16722 && (h != NULL
16723 ? h->elf.type == STT_GNU_IFUNC
16724 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16725 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16726 else
16727 {
16728 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16729
25f23106
AM
16730 /* We need to relocate .opd contents for ld.so.
16731 Prelink also wants simple and consistent rules
16732 for relocs. This make all RELATIVE relocs have
16733 *r_offset equal to r_addend. */
16734 relocate = TRUE;
16735 }
65f38f15
AM
16736 }
16737 else
16738 {
25f23106
AM
16739 if (h != NULL
16740 ? h->elf.type == STT_GNU_IFUNC
16741 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16742 {
25f53a85 16743 info->callbacks->einfo
695344c0 16744 /* xgettext:c-format */
174d0a74 16745 (_("%H: %s for indirect "
c1c8c1ef 16746 "function `%pT' unsupported\n"),
25f53a85 16747 input_bfd, input_section, rel->r_offset,
25f23106
AM
16748 ppc64_elf_howto_table[r_type]->name,
16749 sym_name);
16750 ret = FALSE;
16751 }
cf35638d 16752 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16753 ;
16754 else if (sec == NULL || sec->owner == NULL)
16755 {
16756 bfd_set_error (bfd_error_bad_value);
b34976b6 16757 return FALSE;
65f38f15
AM
16758 }
16759 else
16760 {
f26a3287 16761 asection *osec = sec->output_section;
65f38f15 16762
f26a3287
AM
16763 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16764 {
16765 /* TLS symbol values are relative to the
16766 TLS segment. Dynamic relocations for
16767 local TLS symbols therefore can't be
16768 reduced to a relocation against their
16769 section symbol because it holds the
16770 address of the section, not a value
16771 relative to the TLS segment. We could
16772 change the .tdata dynamic section symbol
16773 to be zero value but STN_UNDEF works
16774 and is used elsewhere, eg. for TPREL64
16775 GOT relocs against local TLS symbols. */
16776 osec = htab->elf.tls_sec;
16777 indx = 0;
16778 }
16779 else
74541ad4 16780 {
74541ad4 16781 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16782 if (indx == 0)
16783 {
16784 if ((osec->flags & SEC_READONLY) == 0
16785 && htab->elf.data_index_section != NULL)
16786 osec = htab->elf.data_index_section;
16787 else
16788 osec = htab->elf.text_index_section;
16789 indx = elf_section_data (osec)->dynindx;
16790 }
16791 BFD_ASSERT (indx != 0);
74541ad4 16792 }
74541ad4 16793
65f38f15
AM
16794 /* We are turning this relocation into one
16795 against a section symbol, so subtract out
16796 the output section's address but not the
16797 offset of the input section in the output
16798 section. */
16799 outrel.r_addend -= osec->vma;
16800 }
16801
16802 outrel.r_info = ELF64_R_INFO (indx, r_type);
16803 }
16804 }
16805
16806 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16807 if (h != NULL
16808 ? h->elf.type == STT_GNU_IFUNC
16809 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16810 {
16811 sreloc = htab->elf.irelplt;
efb2a7b4 16812 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16813 htab->elf.ifunc_resolvers = TRUE;
82e66161 16814 }
65f38f15
AM
16815 if (sreloc == NULL)
16816 abort ();
16817
dfbb6ac9
AM
16818 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16819 >= sreloc->size)
16820 abort ();
947216bf
AM
16821 loc = sreloc->contents;
16822 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16823 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16824
e59a1001
AM
16825 if (!warned_dynamic
16826 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16827 {
16828 info->callbacks->einfo
16829 /* xgettext:c-format */
16830 (_("%X%P: %pB: %s against %pT "
16831 "is not supported by glibc as a dynamic relocation\n"),
16832 input_bfd,
16833 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16834 sym_name);
16835 warned_dynamic = TRUE;
16836 }
16837
65f38f15
AM
16838 /* If this reloc is against an external symbol, it will
16839 be computed at runtime, so there's no need to do
81407a69
AM
16840 anything now. However, for the sake of prelink ensure
16841 that the section contents are a known value. */
2cdcc330 16842 if (!relocate)
81407a69
AM
16843 {
16844 unresolved_reloc = FALSE;
16845 /* The value chosen here is quite arbitrary as ld.so
16846 ignores section contents except for the special
16847 case of .opd where the contents might be accessed
16848 before relocation. Choose zero, as that won't
16849 cause reloc overflow. */
16850 relocation = 0;
16851 addend = 0;
16852 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16853 to improve backward compatibility with older
16854 versions of ld. */
16855 if (r_type == R_PPC64_ADDR64)
16856 addend = outrel.r_addend;
16857 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16858 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16859 addend = outrel.r_offset;
81407a69 16860 }
65f38f15 16861 }
5bd4f169
AM
16862 break;
16863
65f38f15
AM
16864 case R_PPC64_COPY:
16865 case R_PPC64_GLOB_DAT:
16866 case R_PPC64_JMP_SLOT:
25f23106 16867 case R_PPC64_JMP_IREL:
65f38f15
AM
16868 case R_PPC64_RELATIVE:
16869 /* We shouldn't ever see these dynamic relocs in relocatable
16870 files. */
ae9a127f 16871 /* Fall through. */
65f38f15
AM
16872
16873 case R_PPC64_PLTGOT16:
16874 case R_PPC64_PLTGOT16_DS:
16875 case R_PPC64_PLTGOT16_HA:
16876 case R_PPC64_PLTGOT16_HI:
16877 case R_PPC64_PLTGOT16_LO:
16878 case R_PPC64_PLTGOT16_LO_DS:
16879 case R_PPC64_PLTREL32:
16880 case R_PPC64_PLTREL64:
16881 /* These ones haven't been implemented yet. */
16882
25f53a85 16883 info->callbacks->einfo
695344c0 16884 /* xgettext:c-format */
c1c8c1ef 16885 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16886 input_bfd,
4ce794b7 16887 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16888
16889 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16890 ret = FALSE;
c316a17c 16891 goto copy_reloc;
65f38f15 16892 }
5bd4f169 16893
67f0cbdb
AM
16894 /* Multi-instruction sequences that access the TOC can be
16895 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16896 to nop; addi rb,r2,x; */
67f0cbdb
AM
16897 switch (r_type)
16898 {
16899 default:
16900 break;
16901
16902 case R_PPC64_GOT_TLSLD16_HI:
16903 case R_PPC64_GOT_TLSGD16_HI:
16904 case R_PPC64_GOT_TPREL16_HI:
16905 case R_PPC64_GOT_DTPREL16_HI:
16906 case R_PPC64_GOT16_HI:
16907 case R_PPC64_TOC16_HI:
16908 /* These relocs would only be useful if building up an
16909 offset to later add to r2, perhaps in an indexed
16910 addressing mode instruction. Don't try to optimize.
16911 Unfortunately, the possibility of someone building up an
16912 offset like this or even with the HA relocs, means that
16913 we need to check the high insn when optimizing the low
16914 insn. */
16915 break;
16916
5663e321
AM
16917 case R_PPC64_PLTCALL_NOTOC:
16918 if (!unresolved_reloc)
16919 htab->notoc_plt = 1;
16920 /* Fall through. */
23cedd1d
AM
16921 case R_PPC64_PLTCALL:
16922 if (unresolved_reloc)
16923 {
16924 /* No plt entry. Make this into a direct call. */
16925 bfd_byte *p = contents + rel->r_offset;
16926 insn = bfd_get_32 (input_bfd, p);
16927 insn &= 1;
16928 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16929 if (r_type == R_PPC64_PLTCALL)
16930 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16931 unresolved_reloc = save_unresolved_reloc;
16932 r_type = R_PPC64_REL24;
16933 }
16934 break;
16935
5663e321 16936 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16937 case R_PPC64_PLTSEQ:
16938 if (unresolved_reloc)
16939 {
16940 unresolved_reloc = FALSE;
16941 goto nop_it;
16942 }
16943 break;
16944
5663e321
AM
16945 case R_PPC64_PLT_PCREL34_NOTOC:
16946 if (!unresolved_reloc)
16947 htab->notoc_plt = 1;
16948 /* Fall through. */
16949 case R_PPC64_PLT_PCREL34:
16950 if (unresolved_reloc)
16951 {
16952 bfd_byte *p = contents + rel->r_offset;
16953 bfd_put_32 (input_bfd, PNOP >> 32, p);
16954 bfd_put_32 (input_bfd, PNOP, p + 4);
16955 unresolved_reloc = FALSE;
16956 goto copy_reloc;
16957 }
16958 break;
16959
23cedd1d
AM
16960 case R_PPC64_PLT16_HA:
16961 if (unresolved_reloc)
16962 {
16963 unresolved_reloc = FALSE;
16964 goto nop_it;
16965 }
16966 /* Fall through. */
67f0cbdb
AM
16967 case R_PPC64_GOT_TLSLD16_HA:
16968 case R_PPC64_GOT_TLSGD16_HA:
16969 case R_PPC64_GOT_TPREL16_HA:
16970 case R_PPC64_GOT_DTPREL16_HA:
16971 case R_PPC64_GOT16_HA:
16972 case R_PPC64_TOC16_HA:
98528052 16973 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16974 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16975 {
23cedd1d
AM
16976 bfd_byte *p;
16977 nop_it:
16978 p = contents + (rel->r_offset & ~3);
98528052 16979 bfd_put_32 (input_bfd, NOP, p);
d830549d 16980 goto copy_reloc;
98528052 16981 }
67f0cbdb
AM
16982 break;
16983
23cedd1d
AM
16984 case R_PPC64_PLT16_LO:
16985 case R_PPC64_PLT16_LO_DS:
16986 if (unresolved_reloc)
16987 {
16988 unresolved_reloc = FALSE;
16989 goto nop_it;
16990 }
16991 /* Fall through. */
67f0cbdb
AM
16992 case R_PPC64_GOT_TLSLD16_LO:
16993 case R_PPC64_GOT_TLSGD16_LO:
16994 case R_PPC64_GOT_TPREL16_LO_DS:
16995 case R_PPC64_GOT_DTPREL16_LO_DS:
16996 case R_PPC64_GOT16_LO:
16997 case R_PPC64_GOT16_LO_DS:
16998 case R_PPC64_TOC16_LO:
16999 case R_PPC64_TOC16_LO_DS:
98528052 17000 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 17001 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
17002 {
17003 bfd_byte *p = contents + (rel->r_offset & ~3);
17004 insn = bfd_get_32 (input_bfd, p);
2365f8d7 17005 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
17006 {
17007 /* Transform addic to addi when we change reg. */
2365f8d7 17008 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
17009 insn |= (14u << 26) | (2 << 16);
17010 }
17011 else
67f0cbdb 17012 {
98528052
AM
17013 insn &= ~(0x1f << 16);
17014 insn |= 2 << 16;
67f0cbdb 17015 }
560c8763 17016 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
17017 }
17018 break;
9a23f96e
AM
17019
17020 case R_PPC64_TPREL16_HA:
17021 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
17022 {
17023 bfd_byte *p = contents + (rel->r_offset & ~3);
252dcdf4
AM
17024 bfd_put_32 (input_bfd, NOP, p);
17025 goto copy_reloc;
9a23f96e
AM
17026 }
17027 break;
17028
17029 case R_PPC64_TPREL16_LO:
17030 case R_PPC64_TPREL16_LO_DS:
17031 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
17032 {
17033 bfd_byte *p = contents + (rel->r_offset & ~3);
17034 insn = bfd_get_32 (input_bfd, p);
17035 insn &= ~(0x1f << 16);
17036 insn |= 13 << 16;
17037 bfd_put_32 (input_bfd, insn, p);
17038 }
17039 break;
67f0cbdb
AM
17040 }
17041
65f38f15
AM
17042 /* Do any further special processing. */
17043 switch (r_type)
17044 {
17045 default:
17046 break;
17047
25f23106 17048 case R_PPC64_REL16_HA:
4a969973
AM
17049 case R_PPC64_REL16_HIGHA:
17050 case R_PPC64_REL16_HIGHERA:
17051 case R_PPC64_REL16_HIGHESTA:
a680de9a 17052 case R_PPC64_REL16DX_HA:
f9c6b907
AM
17053 case R_PPC64_ADDR16_HA:
17054 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
17055 case R_PPC64_ADDR16_HIGHERA:
17056 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
17057 case R_PPC64_TOC16_HA:
17058 case R_PPC64_SECTOFF_HA:
411e1bfb 17059 case R_PPC64_TPREL16_HA:
f9c6b907 17060 case R_PPC64_TPREL16_HIGHA:
411e1bfb 17061 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 17062 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
17063 case R_PPC64_DTPREL16_HA:
17064 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 17065 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 17066 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
17067 /* It's just possible that this symbol is a weak symbol
17068 that's not actually defined anywhere. In that case,
17069 'sec' would be NULL, and we should leave the symbol
17070 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
17071 if (sec == NULL)
17072 break;
1a0670f3 17073 /* Fall through. */
5c5f6e17
AM
17074
17075 case R_PPC64_GOT16_HA:
17076 case R_PPC64_PLTGOT16_HA:
17077 case R_PPC64_PLT16_HA:
17078 case R_PPC64_GOT_TLSGD16_HA:
17079 case R_PPC64_GOT_TLSLD16_HA:
17080 case R_PPC64_GOT_TPREL16_HA:
17081 case R_PPC64_GOT_DTPREL16_HA:
17082 /* Add 0x10000 if sign bit in 0:15 is set.
17083 Bits 0:15 are not used. */
17084 addend += 0x8000;
65f38f15
AM
17085 break;
17086
5663e321
AM
17087 case R_PPC64_D34_HA30:
17088 case R_PPC64_ADDR16_HIGHERA34:
17089 case R_PPC64_ADDR16_HIGHESTA34:
17090 case R_PPC64_REL16_HIGHERA34:
17091 case R_PPC64_REL16_HIGHESTA34:
17092 if (sec != NULL)
17093 addend += 1ULL << 33;
17094 break;
17095
65f38f15
AM
17096 case R_PPC64_ADDR16_DS:
17097 case R_PPC64_ADDR16_LO_DS:
17098 case R_PPC64_GOT16_DS:
17099 case R_PPC64_GOT16_LO_DS:
17100 case R_PPC64_PLT16_LO_DS:
17101 case R_PPC64_SECTOFF_DS:
17102 case R_PPC64_SECTOFF_LO_DS:
17103 case R_PPC64_TOC16_DS:
17104 case R_PPC64_TOC16_LO_DS:
17105 case R_PPC64_PLTGOT16_DS:
17106 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
17107 case R_PPC64_GOT_TPREL16_DS:
17108 case R_PPC64_GOT_TPREL16_LO_DS:
17109 case R_PPC64_GOT_DTPREL16_DS:
17110 case R_PPC64_GOT_DTPREL16_LO_DS:
17111 case R_PPC64_TPREL16_DS:
17112 case R_PPC64_TPREL16_LO_DS:
17113 case R_PPC64_DTPREL16_DS:
17114 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
17115 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17116 mask = 3;
a680de9a
PB
17117 /* If this reloc is against an lq, lxv, or stxv insn, then
17118 the value must be a multiple of 16. This is somewhat of
17119 a hack, but the "correct" way to do this by defining _DQ
17120 forms of all the _DS relocs bloats all reloc switches in
17121 this file. It doesn't make much sense to use these
17122 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
17123 if ((insn & (0x3fu << 26)) == (56u << 26)
17124 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 17125 mask = 15;
a680de9a
PB
17126 relocation += addend;
17127 addend = insn & (mask ^ 3);
17128 if ((relocation & mask) != 0)
65f38f15 17129 {
a680de9a 17130 relocation ^= relocation & mask;
25f53a85 17131 info->callbacks->einfo
695344c0 17132 /* xgettext:c-format */
174d0a74 17133 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 17134 input_bfd, input_section, rel->r_offset,
d830549d 17135 ppc64_elf_howto_table[r_type]->name,
adadcc0c 17136 mask + 1);
65f38f15 17137 bfd_set_error (bfd_error_bad_value);
b34976b6 17138 ret = FALSE;
c316a17c 17139 goto copy_reloc;
65f38f15
AM
17140 }
17141 break;
5bd4f169
AM
17142 }
17143
239e1f3a
AM
17144 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17145 because such sections are not SEC_ALLOC and thus ld.so will
17146 not process them. */
d830549d 17147 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 17148 if (unresolved_reloc
239e1f3a 17149 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
17150 && h->elf.def_dynamic)
17151 && _bfd_elf_section_offset (output_bfd, info, input_section,
17152 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 17153 {
25f53a85 17154 info->callbacks->einfo
695344c0 17155 /* xgettext:c-format */
c1c8c1ef 17156 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 17157 input_bfd, input_section, rel->r_offset,
b80eed39 17158 howto->name,
039b3fef 17159 h->elf.root.root.string);
b34976b6 17160 ret = FALSE;
9c07fe7c 17161 }
5bd4f169 17162
b80eed39
AM
17163 /* 16-bit fields in insns mostly have signed values, but a
17164 few insns have 16-bit unsigned values. Really, we should
17165 have different reloc types. */
17166 if (howto->complain_on_overflow != complain_overflow_dont
17167 && howto->dst_mask == 0xffff
17168 && (input_section->flags & SEC_CODE) != 0)
17169 {
17170 enum complain_overflow complain = complain_overflow_signed;
17171
17172 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17173 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17174 complain = complain_overflow_bitfield;
17175 else if (howto->rightshift == 0
2365f8d7
AM
17176 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17177 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17178 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17179 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17180 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17181 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17182 complain = complain_overflow_unsigned;
17183 if (howto->complain_on_overflow != complain)
17184 {
17185 alt_howto = *howto;
17186 alt_howto.complain_on_overflow = complain;
17187 howto = &alt_howto;
17188 }
17189 }
17190
5663e321 17191 switch (r_type)
a680de9a 17192 {
5663e321
AM
17193 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17194 case R_PPC64_D34:
17195 case R_PPC64_D34_LO:
17196 case R_PPC64_D34_HI30:
17197 case R_PPC64_D34_HA30:
17198 case R_PPC64_PCREL34:
17199 case R_PPC64_GOT_PCREL34:
c213164a
AM
17200 case R_PPC64_TPREL34:
17201 case R_PPC64_DTPREL34:
87c69f97
AM
17202 case R_PPC64_GOT_TLSGD_PCREL34:
17203 case R_PPC64_GOT_TLSLD_PCREL34:
17204 case R_PPC64_GOT_TPREL_PCREL34:
17205 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
17206 case R_PPC64_PLT_PCREL34:
17207 case R_PPC64_PLT_PCREL34_NOTOC:
17208 case R_PPC64_D28:
17209 case R_PPC64_PCREL28:
17210 if (rel->r_offset + 8 > input_section->size)
17211 r = bfd_reloc_outofrange;
17212 else
17213 {
5663e321
AM
17214 relocation += addend;
17215 if (howto->pc_relative)
17216 relocation -= (rel->r_offset
17217 + input_section->output_offset
17218 + input_section->output_section->vma);
17219 relocation >>= howto->rightshift;
17220
17221 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17222 pinsn <<= 32;
17223 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17224
17225 pinsn &= ~howto->dst_mask;
17226 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17227 & howto->dst_mask);
17228 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17229 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17230 r = bfd_reloc_ok;
17231 if (howto->complain_on_overflow == complain_overflow_signed
17232 && (relocation + (1ULL << (howto->bitsize - 1))
17233 >= 1ULL << howto->bitsize))
17234 r = bfd_reloc_overflow;
17235 }
17236 break;
17237
17238 case R_PPC64_REL16DX_HA:
a680de9a
PB
17239 if (rel->r_offset + 4 > input_section->size)
17240 r = bfd_reloc_outofrange;
17241 else
17242 {
17243 relocation += addend;
17244 relocation -= (rel->r_offset
17245 + input_section->output_offset
17246 + input_section->output_section->vma);
3de43e7b 17247 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17248 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17249 insn &= ~0x1fffc1;
3de43e7b 17250 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17251 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17252 r = bfd_reloc_ok;
3de43e7b 17253 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17254 r = bfd_reloc_overflow;
17255 }
5663e321
AM
17256 break;
17257
17258 default:
17259 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17260 contents, rel->r_offset,
17261 relocation, addend);
a680de9a 17262 }
5bd4f169 17263
ef60b7ff 17264 if (r != bfd_reloc_ok)
5bd4f169 17265 {
bc30df16 17266 char *more_info = NULL;
b80eed39 17267 const char *reloc_name = howto->name;
bc30df16
AM
17268
17269 if (reloc_dest != DEST_NORMAL)
17270 {
17271 more_info = bfd_malloc (strlen (reloc_name) + 8);
17272 if (more_info != NULL)
17273 {
17274 strcpy (more_info, reloc_name);
17275 strcat (more_info, (reloc_dest == DEST_OPD
17276 ? " (OPD)" : " (stub)"));
17277 reloc_name = more_info;
17278 }
17279 }
17280
cd27b276 17281 if (r == bfd_reloc_overflow)
5bd4f169 17282 {
8131c122
AM
17283 /* On code like "if (foo) foo();" don't report overflow
17284 on a branch to zero when foo is undefined. */
17285 if (!warned
17286 && (reloc_dest == DEST_STUB
17287 || !(h != NULL
17288 && (h->elf.root.type == bfd_link_hash_undefweak
17289 || h->elf.root.type == bfd_link_hash_undefined)
17290 && is_branch_reloc (r_type))))
9e51d549
AM
17291 info->callbacks->reloc_overflow
17292 (info, (struct bfd_link_hash_entry *) h, sym_name,
17293 reloc_name, orig_rel.r_addend, input_bfd, input_section,
17294 rel->r_offset);
ef60b7ff
AM
17295 }
17296 else
17297 {
25f53a85 17298 info->callbacks->einfo
695344c0 17299 /* xgettext:c-format */
c1c8c1ef 17300 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17301 input_bfd, input_section, rel->r_offset,
bc30df16 17302 reloc_name, sym_name, (int) r);
b34976b6 17303 ret = FALSE;
ef60b7ff 17304 }
c9594989 17305 free (more_info);
5bd4f169 17306 }
c316a17c
AM
17307 copy_reloc:
17308 if (wrel != rel)
17309 *wrel = *rel;
17310 }
17311
17312 if (wrel != rel)
17313 {
17314 Elf_Internal_Shdr *rel_hdr;
17315 size_t deleted = rel - wrel;
17316
17317 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17318 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17319 if (rel_hdr->sh_size == 0)
17320 {
17321 /* It is too late to remove an empty reloc section. Leave
17322 one NONE reloc.
17323 ??? What is wrong with an empty section??? */
17324 rel_hdr->sh_size = rel_hdr->sh_entsize;
17325 deleted -= 1;
17326 }
17327 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17328 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17329 input_section->reloc_count -= deleted;
5bd4f169
AM
17330 }
17331
645ea6a9
AM
17332 /* If we're emitting relocations, then shortly after this function
17333 returns, reloc offsets and addends for this section will be
17334 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17335 file rather than the input. Save a copy of the relocs for
17336 opd_entry_value. */
0e1862bb 17337 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17338 {
17339 bfd_size_type amt;
17340 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17341 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17342 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17343 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17344 if (rel == NULL)
17345 return FALSE;
17346 memcpy (rel, relocs, amt);
17347 }
5bd4f169
AM
17348 return ret;
17349}
17350
754021d0
AM
17351/* Adjust the value of any local symbols in opd sections. */
17352
6e0b88f1 17353static int
754021d0
AM
17354ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17355 const char *name ATTRIBUTE_UNUSED,
17356 Elf_Internal_Sym *elfsym,
17357 asection *input_sec,
17358 struct elf_link_hash_entry *h)
17359{
74f0fb50
AM
17360 struct _opd_sec_data *opd;
17361 long adjust;
754021d0
AM
17362 bfd_vma value;
17363
4025353c 17364 if (h != NULL)
6e0b88f1 17365 return 1;
4025353c 17366
74f0fb50
AM
17367 opd = get_opd_info (input_sec);
17368 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17369 return 1;
754021d0
AM
17370
17371 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17372 if (!bfd_link_relocatable (info))
754021d0
AM
17373 value -= input_sec->output_section->vma;
17374
51aecdc5 17375 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17376 if (adjust == -1)
6e0b88f1
AM
17377 return 2;
17378
17379 elfsym->st_value += adjust;
17380 return 1;
754021d0
AM
17381}
17382
5bd4f169
AM
17383/* Finish up dynamic symbol handling. We set the contents of various
17384 dynamic sections here. */
17385
b34976b6 17386static bfd_boolean
4ce794b7
AM
17387ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17388 struct bfd_link_info *info,
17389 struct elf_link_hash_entry *h,
4aef7643 17390 Elf_Internal_Sym *sym)
5bd4f169 17391{
65f38f15 17392 struct ppc_link_hash_table *htab;
8387904d 17393 struct plt_entry *ent;
5bd4f169 17394
65f38f15 17395 htab = ppc_hash_table (info);
4dfe6ac6
NC
17396 if (htab == NULL)
17397 return FALSE;
5bd4f169 17398
49c09209
AM
17399 if (!htab->opd_abi && !h->def_regular)
17400 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17401 if (ent->plt.offset != (bfd_vma) -1)
17402 {
17403 /* Mark the symbol as undefined, rather than as
17404 defined in glink. Leave the value if there were
17405 any relocations where pointer equality matters
17406 (this is a clue for the dynamic linker, to make
17407 function pointer comparisons work between an
17408 application and shared library), otherwise set it
17409 to zero. */
17410 sym->st_shndx = SHN_UNDEF;
17411 if (!h->pointer_equality_needed)
17412 sym->st_value = 0;
17413 else if (!h->ref_regular_nonweak)
17414 {
17415 /* This breaks function pointer comparisons, but
17416 that is better than breaking tests for a NULL
17417 function pointer. */
17418 sym->st_value = 0;
17419 }
17420 break;
17421 }
5bd4f169 17422
1bdd8fac
AM
17423 if (h->needs_copy
17424 && (h->root.type == bfd_link_hash_defined
17425 || h->root.type == bfd_link_hash_defweak)
17426 && (h->root.u.def.section == htab->elf.sdynbss
17427 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17428 {
65f38f15 17429 /* This symbol needs a copy reloc. Set it up. */
49c09209 17430 Elf_Internal_Rela rela;
5474d94f 17431 asection *srel;
49c09209 17432 bfd_byte *loc;
5bd4f169 17433
1bdd8fac 17434 if (h->dynindx == -1)
65f38f15 17435 abort ();
5bd4f169 17436
ed7007c1 17437 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17438 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17439 rela.r_addend = 0;
afbf7e8e 17440 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17441 srel = htab->elf.sreldynrelro;
17442 else
17443 srel = htab->elf.srelbss;
17444 loc = srel->contents;
17445 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17446 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17447 }
17448
b34976b6 17449 return TRUE;
5bd4f169
AM
17450}
17451
65f38f15
AM
17452/* Used to decide how to sort relocs in an optimal manner for the
17453 dynamic linker, before writing them out. */
17454
17455static enum elf_reloc_type_class
7e612e98
AM
17456ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17457 const asection *rel_sec,
17458 const Elf_Internal_Rela *rela)
65f38f15 17459{
04c9666a 17460 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17461 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17462
33e44f2e 17463 if (rel_sec == htab->elf.irelplt)
7e612e98 17464 return reloc_class_ifunc;
a33d1f77 17465
4ce794b7 17466 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17467 switch (r_type)
65f38f15
AM
17468 {
17469 case R_PPC64_RELATIVE:
17470 return reloc_class_relative;
17471 case R_PPC64_JMP_SLOT:
17472 return reloc_class_plt;
17473 case R_PPC64_COPY:
17474 return reloc_class_copy;
17475 default:
17476 return reloc_class_normal;
17477 }
17478}
17479
5bd4f169
AM
17480/* Finish up the dynamic sections. */
17481
b34976b6 17482static bfd_boolean
4ce794b7
AM
17483ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17484 struct bfd_link_info *info)
5bd4f169 17485{
65f38f15
AM
17486 struct ppc_link_hash_table *htab;
17487 bfd *dynobj;
5bd4f169 17488 asection *sdyn;
5bd4f169 17489
65f38f15 17490 htab = ppc_hash_table (info);
4dfe6ac6
NC
17491 if (htab == NULL)
17492 return FALSE;
17493
65f38f15 17494 dynobj = htab->elf.dynobj;
3d4d4302 17495 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17496
65f38f15 17497 if (htab->elf.dynamic_sections_created)
5bd4f169 17498 {
5bd4f169
AM
17499 Elf64_External_Dyn *dyncon, *dynconend;
17500
33e44f2e 17501 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17502 abort ();
5bd4f169
AM
17503
17504 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17505 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17506 for (; dyncon < dynconend; dyncon++)
17507 {
17508 Elf_Internal_Dyn dyn;
19397422 17509 asection *s;
5bd4f169
AM
17510
17511 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17512
17513 switch (dyn.d_tag)
17514 {
65f38f15
AM
17515 default:
17516 continue;
5bd4f169 17517
5d1634d7 17518 case DT_PPC64_GLINK:
4ce794b7 17519 s = htab->glink;
6348e046 17520 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17521 /* We stupidly defined DT_PPC64_GLINK to be the start
17522 of glink rather than the first entry point, which is
17523 what ld.so needs, and now have a bigger stub to
17524 support automatic multiple TOCs. */
9e390558 17525 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17526 break;
17527
19397422
AM
17528 case DT_PPC64_OPD:
17529 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17530 if (s == NULL)
17531 continue;
17532 dyn.d_un.d_ptr = s->vma;
19397422
AM
17533 break;
17534
e8910a83 17535 case DT_PPC64_OPT:
5663e321
AM
17536 if ((htab->do_multi_toc && htab->multi_toc_needed)
17537 || htab->notoc_plt)
e8910a83 17538 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17539 if (htab->has_plt_localentry0)
17540 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17541 break;
17542
19397422
AM
17543 case DT_PPC64_OPDSZ:
17544 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17545 if (s == NULL)
17546 continue;
eea6121a 17547 dyn.d_un.d_val = s->size;
19397422
AM
17548 break;
17549
65f38f15 17550 case DT_PLTGOT:
33e44f2e 17551 s = htab->elf.splt;
6348e046 17552 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17553 break;
17554
17555 case DT_JMPREL:
33e44f2e 17556 s = htab->elf.srelplt;
6348e046 17557 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17558 break;
5bd4f169 17559
65f38f15 17560 case DT_PLTRELSZ:
33e44f2e 17561 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17562 break;
82e66161
AM
17563
17564 case DT_TEXTREL:
cebd6b8a 17565 if (htab->elf.ifunc_resolvers)
82e66161
AM
17566 info->callbacks->einfo
17567 (_("%P: warning: text relocations and GNU indirect "
17568 "functions may result in a segfault at runtime\n"));
17569 continue;
5bd4f169 17570 }
5bd4f169 17571
65f38f15 17572 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17573 }
5bd4f169
AM
17574 }
17575
6528b6eb
AM
17576 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17577 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17578 {
17579 /* Fill in the first entry in the global offset table.
17580 We use it to hold the link-time TOCbase. */
17581 bfd_put_64 (output_bfd,
60ee0d4a 17582 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17583 htab->elf.sgot->contents);
5d1634d7
AM
17584
17585 /* Set .got entry size. */
2cdcc330
AM
17586 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17587 = 8;
5d1634d7
AM
17588 }
17589
6528b6eb
AM
17590 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17591 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17592 {
17593 /* Set .plt entry size. */
33e44f2e 17594 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17595 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17596 }
17597
84f5d08e
AM
17598 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17599 brlt ourselves if emitrelocations. */
17600 if (htab->brlt != NULL
17601 && htab->brlt->reloc_count != 0
17602 && !_bfd_elf_link_output_relocs (output_bfd,
17603 htab->brlt,
d4730f92 17604 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17605 elf_section_data (htab->brlt)->relocs,
17606 NULL))
17607 return FALSE;
17608
176a0d42
AM
17609 if (htab->glink != NULL
17610 && htab->glink->reloc_count != 0
17611 && !_bfd_elf_link_output_relocs (output_bfd,
17612 htab->glink,
d4730f92 17613 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17614 elf_section_data (htab->glink)->relocs,
17615 NULL))
17616 return FALSE;
17617
da44f4e5 17618
df136d64
AM
17619 if (htab->glink_eh_frame != NULL
17620 && htab->glink_eh_frame->size != 0
17621 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17622 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17623 htab->glink_eh_frame,
17624 htab->glink_eh_frame->contents))
17625 return FALSE;
58d180e8 17626
e717da7e 17627 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17628 since we didn't add them to DYNOBJ. We know dynobj is the first
17629 bfd. */
c72f2fb2 17630 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17631 {
17632 asection *s;
7b53ace3 17633
0c8d6e5c 17634 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17635 continue;
17636
e717da7e
AM
17637 s = ppc64_elf_tdata (dynobj)->got;
17638 if (s != NULL
eea6121a 17639 && s->size != 0
e717da7e
AM
17640 && s->output_section != bfd_abs_section_ptr
17641 && !bfd_set_section_contents (output_bfd, s->output_section,
17642 s->contents, s->output_offset,
eea6121a 17643 s->size))
e717da7e
AM
17644 return FALSE;
17645 s = ppc64_elf_tdata (dynobj)->relgot;
17646 if (s != NULL
eea6121a 17647 && s->size != 0
e717da7e
AM
17648 && s->output_section != bfd_abs_section_ptr
17649 && !bfd_set_section_contents (output_bfd, s->output_section,
17650 s->contents, s->output_offset,
eea6121a 17651 s->size))
e717da7e
AM
17652 return FALSE;
17653 }
f6c52c13 17654
b34976b6 17655 return TRUE;
5bd4f169
AM
17656}
17657
5bd4f169 17658#include "elf64-target.h"
7b8e7dad
AM
17659
17660/* FreeBSD support */
17661
17662#undef TARGET_LITTLE_SYM
17663#undef TARGET_LITTLE_NAME
17664
17665#undef TARGET_BIG_SYM
6d00b590 17666#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17667#undef TARGET_BIG_NAME
17668#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17669
17670#undef ELF_OSABI
17671#define ELF_OSABI ELFOSABI_FREEBSD
17672
17673#undef elf64_bed
17674#define elf64_bed elf64_powerpc_fbsd_bed
17675
17676#include "elf64-target.h"
This page took 3.284546 seconds and 4 git commands to generate.