ELF: Move dyn_relocs to struct elf_link_hash_entry
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39 #define OCTETS_PER_BYTE(ABFD, SEC) 1
40
41 static bfd_reloc_status_type ppc64_elf_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
47 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
49 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc64_elf_toc_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
55 static bfd_reloc_status_type ppc64_elf_toc64_reloc
56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
57 static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
59 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
61 static bfd_vma opd_entry_value
62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
63
64 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
65 #define TARGET_LITTLE_NAME "elf64-powerpcle"
66 #define TARGET_BIG_SYM powerpc_elf64_vec
67 #define TARGET_BIG_NAME "elf64-powerpc"
68 #define ELF_ARCH bfd_arch_powerpc
69 #define ELF_TARGET_ID PPC64_ELF_DATA
70 #define ELF_MACHINE_CODE EM_PPC64
71 #define ELF_MAXPAGESIZE 0x10000
72 #define ELF_COMMONPAGESIZE 0x1000
73 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
74 #define elf_info_to_howto ppc64_elf_info_to_howto
75
76 #define elf_backend_want_got_sym 0
77 #define elf_backend_want_plt_sym 0
78 #define elf_backend_plt_alignment 3
79 #define elf_backend_plt_not_loaded 1
80 #define elf_backend_got_header_size 8
81 #define elf_backend_want_dynrelro 1
82 #define elf_backend_can_gc_sections 1
83 #define elf_backend_can_refcount 1
84 #define elf_backend_rela_normal 1
85 #define elf_backend_dtrel_excludes_plt 1
86 #define elf_backend_default_execstack 0
87
88 #define bfd_elf64_mkobject ppc64_elf_mkobject
89 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
90 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
91 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
93 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
95 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
96 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
97 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
98
99 #define elf_backend_object_p ppc64_elf_object_p
100 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
102 #define elf_backend_write_core_note ppc64_elf_write_core_note
103 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
104 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
105 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
106 #define elf_backend_check_directives ppc64_elf_before_check_relocs
107 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
108 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
109 #define elf_backend_check_relocs ppc64_elf_check_relocs
110 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
111 #define elf_backend_gc_keep ppc64_elf_gc_keep
112 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
113 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
114 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
116 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
117 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
119 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
120 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
121 #define elf_backend_action_discarded ppc64_elf_action_discarded
122 #define elf_backend_relocate_section ppc64_elf_relocate_section
123 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
126 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
127 #define elf_backend_special_sections ppc64_elf_special_sections
128 #define elf_backend_section_flags ppc64_elf_section_flags
129 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
130 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
131 #define elf_backend_get_reloc_section bfd_get_section_by_name
132
133 /* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137 /* The size in bytes of an entry in the procedure linkage table. */
138 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
139 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
140
141 /* The initial size of the plt reserved for the dynamic linker. */
142 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
143
144 /* Offsets to some stack save slots. */
145 #define STK_LR 16
146 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
147 /* This one is dodgy. ELFv2 does not have a linker word, so use the
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
152 /* TOC base pointers offset from start of TOC. */
153 #define TOC_BASE_OFF 0x8000
154 /* TOC base alignment. */
155 #define TOC_BASE_ALIGN 256
156
157 /* Offset of tp and dtp pointers from start of TLS block. */
158 #define TP_OFFSET 0x7000
159 #define DTP_OFFSET 0x8000
160
161 /* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
163 insert an addi to adjust r11. */
164 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
165 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
170 #define BCTR 0x4e800420 /* bctr */
171
172 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
173 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
175 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183 #define BNECTR 0x4ca20420 /* bnectr+ */
184 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
185
186 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
187 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
188 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
189
190 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
193
194 #define LI_R11_0 0x39600000 /* li %r11,0 */
195 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
196 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
197 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
198 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
200 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
201 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
202 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
203 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
204 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
205 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
206 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
207 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
210 #define PADDI_R12_PC 0x0610000039800000ULL
211 #define PLD_R12_PC 0x04100000e5800000ULL
212 #define PNOP 0x0700000000000000ULL
213
214 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215 #define GLINK_PLTRESOLVE_SIZE(htab) \
216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
221 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
224 /* ld %2,(0b-1b)(%11) */
225 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
226 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
231 /* bctr */
232 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
237
238 /* Pad with this. */
239 #define NOP 0x60000000
240
241 /* Some other nops. */
242 #define CROR_151515 0x4def7b82
243 #define CROR_313131 0x4ffffb82
244
245 /* .glink entries for the first 32k functions are two instructions. */
246 #define LI_R0_0 0x38000000 /* li %r0,0 */
247 #define B_DOT 0x48000000 /* b . */
248
249 /* After that, we need two instructions to load the index, followed by
250 a branch. */
251 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
252 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
253
254 /* Instructions used by the save and restore reg functions. */
255 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
259 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
261 #define LI_R12_0 0x39800000 /* li %r12,0 */
262 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
265 #define BLR 0x4e800020 /* blr */
266
267 /* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
270 relocate .opd without reloc entries. */
271 #ifndef NO_OPD_RELOCS
272 #define NO_OPD_RELOCS 0
273 #endif
274
275 #ifndef ARRAY_SIZE
276 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277 #endif
278
279 static inline int
280 abiversion (bfd *abfd)
281 {
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283 }
284
285 static inline void
286 set_abiversion (bfd *abfd, int ver)
287 {
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290 }
291 \f
292 /* Relocation HOWTO's. */
293 /* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
306 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
307
308 static reloc_howto_type ppc64_elf_howto_raw[] =
309 {
310 /* This reloc does nothing. */
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
313
314 /* A standard 32 bit relocation. */
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
322
323 /* A standard 16 bit relocation. */
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
326
327 /* A 16 bit relocation without overflow. */
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
330
331 /* Bits 16-31 of an address. */
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
360
361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
364
365 /* A relative 16 bit branch; the lower two bits must be zero. */
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
432
433 /* 32-bit PC relative. */
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
436
437 /* 32-bit relocation to the symbol's procedure linkage table. */
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
460
461 /* 16-bit section relative relocation. */
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
464
465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
468
469 /* 16-bit upper half section relative relocation. */
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
472
473 /* 16-bit upper half adjusted section relative relocation. */
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
476
477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
486
487 /* The bits 32-47 of an address. */
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
495
496 /* The bits 48-63 of an address. */
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
504
505 /* Like ADDR64, but may be unaligned. */
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
508
509 /* 64-bit relative relocation. */
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
512
513 /* 64-bit relocation to the symbol's procedure linkage table. */
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
522
523 /* 16 bit TOC-relative relocation. */
524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
527
528 /* 16 bit TOC-relative relocation without overflow. */
529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
624
625 /* Marker relocs for TLS. */
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
634
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 /* Marker relocs on inline plt call instructions. */
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
646
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
657
658 /* A 16 bit dtprel reloc. */
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
661
662 /* Like DTPREL16, but no overflow. */
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
689
690 /* Like DTPREL16, but for insns with a DS field. */
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
693
694 /* Like DTPREL16_DS, but no overflow. */
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
702
703 /* A 16 bit tprel reloc. */
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
706
707 /* Like TPREL16, but no overflow. */
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
734
735 /* Like TPREL16, but for insns with a DS field. */
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
738
739 /* Like TPREL16_DS, but no overflow. */
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
748
749 /* Like GOT_TLSGD16, but no overflow. */
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
752
753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
756
757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
760
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
766
767 /* Like GOT_TLSLD16, but no overflow. */
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
770
771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
774
775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
778
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
783
784 /* Like GOT_DTPREL16_DS, but no overflow. */
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
787
788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
791
792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
800
801 /* Like GOT_TPREL16_DS, but no overflow. */
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
804
805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
818
819 /* A 16 bit relative relocation. */
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
822
823 /* A 16 bit relative relocation without overflow. */
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
826
827 /* The high order 16 bits of a relative address. */
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
835
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
857
858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
861
862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
885
886 /* Marker reloc on ELFv2 large-model function entry. */
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
889
890 /* Like ADDR64, but use local entry point of function. */
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
893
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
933 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
934 ppc64_elf_unhandled_reloc),
935
936 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
937 ppc64_elf_unhandled_reloc),
938
939 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
940 ppc64_elf_unhandled_reloc),
941
942 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
943 ppc64_elf_unhandled_reloc),
944
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
975 /* GNU extension to record C++ vtable hierarchy. */
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
978
979 /* GNU extension to record C++ vtable member usage. */
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
982 };
983
984 \f
985 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988 static void
989 ppc_howto_init (void)
990 {
991 unsigned int i, type;
992
993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
994 {
995 type = ppc64_elf_howto_raw[i].type;
996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999 }
1000
1001 static reloc_howto_type *
1002 ppc64_elf_reloc_type_lookup (bfd *abfd,
1003 bfd_reloc_code_real_type code)
1004 {
1005 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1006
1007 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1008 /* Initialize howto table if needed. */
1009 ppc_howto_init ();
1010
1011 switch (code)
1012 {
1013 default:
1014 /* xgettext:c-format */
1015 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1016 (int) code);
1017 bfd_set_error (bfd_error_bad_value);
1018 return NULL;
1019
1020 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1021 break;
1022 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1023 break;
1024 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1025 break;
1026 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1027 break;
1028 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1029 break;
1030 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1031 break;
1032 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1033 break;
1034 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1035 break;
1036 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1037 break;
1038 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1039 break;
1040 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1041 break;
1042 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1043 break;
1044 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1045 break;
1046 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1047 break;
1048 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1049 break;
1050 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1051 break;
1052 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1053 break;
1054 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1055 break;
1056 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1057 break;
1058 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1059 break;
1060 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1061 break;
1062 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1063 break;
1064 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1065 break;
1066 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1067 break;
1068 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1069 break;
1070 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1071 break;
1072 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1073 break;
1074 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1075 break;
1076 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1077 break;
1078 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1079 break;
1080 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1081 break;
1082 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1083 break;
1084 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1085 break;
1086 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1087 break;
1088 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1089 break;
1090 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1091 break;
1092 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1093 break;
1094 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1095 break;
1096 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1097 break;
1098 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1099 break;
1100 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1101 break;
1102 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1103 break;
1104 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1105 break;
1106 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1107 break;
1108 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1109 break;
1110 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1111 break;
1112 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1113 break;
1114 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1115 break;
1116 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1117 break;
1118 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1119 break;
1120 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1121 break;
1122 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1123 break;
1124 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1125 break;
1126 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1127 break;
1128 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1129 break;
1130 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1131 break;
1132 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1133 break;
1134 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1135 break;
1136 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1137 break;
1138 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1139 break;
1140 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1141 break;
1142 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1143 break;
1144 case BFD_RELOC_PPC64_TLS_PCREL:
1145 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1146 break;
1147 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1148 break;
1149 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1150 break;
1151 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1152 break;
1153 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1154 break;
1155 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1156 break;
1157 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1158 break;
1159 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1160 break;
1161 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1162 break;
1163 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1164 break;
1165 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1168 break;
1169 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1170 break;
1171 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1172 break;
1173 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1174 break;
1175 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1176 break;
1177 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1178 break;
1179 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1200 break;
1201 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1202 break;
1203 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1208 break;
1209 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1210 break;
1211 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1220 break;
1221 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1222 break;
1223 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1232 break;
1233 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1234 break;
1235 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1236 break;
1237 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1238 break;
1239 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1240 break;
1241 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1242 break;
1243 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1252 break;
1253 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1254 break;
1255 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1256 break;
1257 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1258 break;
1259 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1260 break;
1261 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1262 break;
1263 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1264 break;
1265 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1266 break;
1267 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1268 break;
1269 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1270 break;
1271 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1272 break;
1273 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1274 break;
1275 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1276 break;
1277 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1278 break;
1279 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1280 break;
1281 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1286 break;
1287 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1288 break;
1289 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1294 break;
1295 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1296 break;
1297 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1302 break;
1303 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1304 break;
1305 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1306 break;
1307 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1308 break;
1309 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1310 break;
1311 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1312 break;
1313 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1314 break;
1315 }
1316
1317 return ppc64_elf_howto_table[r];
1318 };
1319
1320 static reloc_howto_type *
1321 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1322 const char *r_name)
1323 {
1324 unsigned int i;
1325
1326 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1327 if (ppc64_elf_howto_raw[i].name != NULL
1328 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1329 return &ppc64_elf_howto_raw[i];
1330
1331 return NULL;
1332 }
1333
1334 /* Set the howto pointer for a PowerPC ELF reloc. */
1335
1336 static bfd_boolean
1337 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1338 Elf_Internal_Rela *dst)
1339 {
1340 unsigned int type;
1341
1342 /* Initialize howto table if needed. */
1343 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1344 ppc_howto_init ();
1345
1346 type = ELF64_R_TYPE (dst->r_info);
1347 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1348 {
1349 /* xgettext:c-format */
1350 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1351 abfd, type);
1352 bfd_set_error (bfd_error_bad_value);
1353 return FALSE;
1354 }
1355 cache_ptr->howto = ppc64_elf_howto_table[type];
1356 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1357 {
1358 /* xgettext:c-format */
1359 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1360 abfd, type);
1361 bfd_set_error (bfd_error_bad_value);
1362 return FALSE;
1363 }
1364
1365 return TRUE;
1366 }
1367
1368 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1369
1370 static bfd_reloc_status_type
1371 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1372 void *data, asection *input_section,
1373 bfd *output_bfd, char **error_message)
1374 {
1375 enum elf_ppc64_reloc_type r_type;
1376 long insn;
1377 bfd_size_type octets;
1378 bfd_vma value;
1379
1380 /* If this is a relocatable link (output_bfd test tells us), just
1381 call the generic function. Any adjustment will be done at final
1382 link time. */
1383 if (output_bfd != NULL)
1384 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1385 input_section, output_bfd, error_message);
1386
1387 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1388 We won't actually be using the low bits, so trashing them
1389 doesn't matter. */
1390 r_type = reloc_entry->howto->type;
1391 if (r_type == R_PPC64_ADDR16_HIGHERA34
1392 || r_type == R_PPC64_ADDR16_HIGHESTA34
1393 || r_type == R_PPC64_REL16_HIGHERA34
1394 || r_type == R_PPC64_REL16_HIGHESTA34)
1395 reloc_entry->addend += 1ULL << 33;
1396 else
1397 reloc_entry->addend += 1U << 15;
1398 if (r_type != R_PPC64_REL16DX_HA)
1399 return bfd_reloc_continue;
1400
1401 value = 0;
1402 if (!bfd_is_com_section (symbol->section))
1403 value = symbol->value;
1404 value += (reloc_entry->addend
1405 + symbol->section->output_offset
1406 + symbol->section->output_section->vma);
1407 value -= (reloc_entry->address
1408 + input_section->output_offset
1409 + input_section->output_section->vma);
1410 value = (bfd_signed_vma) value >> 16;
1411
1412 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1413 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1414 insn &= ~0x1fffc1;
1415 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1416 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1417 if (value + 0x8000 > 0xffff)
1418 return bfd_reloc_overflow;
1419 return bfd_reloc_ok;
1420 }
1421
1422 static bfd_reloc_status_type
1423 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
1426 {
1427 if (output_bfd != NULL)
1428 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1429 input_section, output_bfd, error_message);
1430
1431 if (strcmp (symbol->section->name, ".opd") == 0
1432 && (symbol->section->owner->flags & DYNAMIC) == 0)
1433 {
1434 bfd_vma dest = opd_entry_value (symbol->section,
1435 symbol->value + reloc_entry->addend,
1436 NULL, NULL, FALSE);
1437 if (dest != (bfd_vma) -1)
1438 reloc_entry->addend = dest - (symbol->value
1439 + symbol->section->output_section->vma
1440 + symbol->section->output_offset);
1441 }
1442 else
1443 {
1444 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1445
1446 if (symbol->section->owner != abfd
1447 && symbol->section->owner != NULL
1448 && abiversion (symbol->section->owner) >= 2)
1449 {
1450 unsigned int i;
1451
1452 for (i = 0; i < symbol->section->owner->symcount; ++i)
1453 {
1454 asymbol *symdef = symbol->section->owner->outsymbols[i];
1455
1456 if (strcmp (symdef->name, symbol->name) == 0)
1457 {
1458 elfsym = (elf_symbol_type *) symdef;
1459 break;
1460 }
1461 }
1462 }
1463 reloc_entry->addend
1464 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1465 }
1466 return bfd_reloc_continue;
1467 }
1468
1469 static bfd_reloc_status_type
1470 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1471 void *data, asection *input_section,
1472 bfd *output_bfd, char **error_message)
1473 {
1474 long insn;
1475 enum elf_ppc64_reloc_type r_type;
1476 bfd_size_type octets;
1477 /* Assume 'at' branch hints. */
1478 bfd_boolean is_isa_v2 = TRUE;
1479
1480 /* If this is a relocatable link (output_bfd test tells us), just
1481 call the generic function. Any adjustment will be done at final
1482 link time. */
1483 if (output_bfd != NULL)
1484 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1485 input_section, output_bfd, error_message);
1486
1487 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1488 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1489 insn &= ~(0x01 << 21);
1490 r_type = reloc_entry->howto->type;
1491 if (r_type == R_PPC64_ADDR14_BRTAKEN
1492 || r_type == R_PPC64_REL14_BRTAKEN)
1493 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1494
1495 if (is_isa_v2)
1496 {
1497 /* Set 'a' bit. This is 0b00010 in BO field for branch
1498 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1499 for branch on CTR insns (BO == 1a00t or 1a01t). */
1500 if ((insn & (0x14 << 21)) == (0x04 << 21))
1501 insn |= 0x02 << 21;
1502 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1503 insn |= 0x08 << 21;
1504 else
1505 goto out;
1506 }
1507 else
1508 {
1509 bfd_vma target = 0;
1510 bfd_vma from;
1511
1512 if (!bfd_is_com_section (symbol->section))
1513 target = symbol->value;
1514 target += symbol->section->output_section->vma;
1515 target += symbol->section->output_offset;
1516 target += reloc_entry->addend;
1517
1518 from = (reloc_entry->address
1519 + input_section->output_offset
1520 + input_section->output_section->vma);
1521
1522 /* Invert 'y' bit if not the default. */
1523 if ((bfd_signed_vma) (target - from) < 0)
1524 insn ^= 0x01 << 21;
1525 }
1526 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1527 out:
1528 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1529 input_section, output_bfd, error_message);
1530 }
1531
1532 static bfd_reloc_status_type
1533 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1534 void *data, asection *input_section,
1535 bfd *output_bfd, char **error_message)
1536 {
1537 /* If this is a relocatable link (output_bfd test tells us), just
1538 call the generic function. Any adjustment will be done at final
1539 link time. */
1540 if (output_bfd != NULL)
1541 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1542 input_section, output_bfd, error_message);
1543
1544 /* Subtract the symbol section base address. */
1545 reloc_entry->addend -= symbol->section->output_section->vma;
1546 return bfd_reloc_continue;
1547 }
1548
1549 static bfd_reloc_status_type
1550 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1551 void *data, asection *input_section,
1552 bfd *output_bfd, char **error_message)
1553 {
1554 /* If this is a relocatable link (output_bfd test tells us), just
1555 call the generic function. Any adjustment will be done at final
1556 link time. */
1557 if (output_bfd != NULL)
1558 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1559 input_section, output_bfd, error_message);
1560
1561 /* Subtract the symbol section base address. */
1562 reloc_entry->addend -= symbol->section->output_section->vma;
1563
1564 /* Adjust the addend for sign extension of the low 16 bits. */
1565 reloc_entry->addend += 0x8000;
1566 return bfd_reloc_continue;
1567 }
1568
1569 static bfd_reloc_status_type
1570 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1571 void *data, asection *input_section,
1572 bfd *output_bfd, char **error_message)
1573 {
1574 bfd_vma TOCstart;
1575
1576 /* If this is a relocatable link (output_bfd test tells us), just
1577 call the generic function. Any adjustment will be done at final
1578 link time. */
1579 if (output_bfd != NULL)
1580 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1581 input_section, output_bfd, error_message);
1582
1583 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1584 if (TOCstart == 0)
1585 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1586
1587 /* Subtract the TOC base address. */
1588 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1589 return bfd_reloc_continue;
1590 }
1591
1592 static bfd_reloc_status_type
1593 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1594 void *data, asection *input_section,
1595 bfd *output_bfd, char **error_message)
1596 {
1597 bfd_vma TOCstart;
1598
1599 /* If this is a relocatable link (output_bfd test tells us), just
1600 call the generic function. Any adjustment will be done at final
1601 link time. */
1602 if (output_bfd != NULL)
1603 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1604 input_section, output_bfd, error_message);
1605
1606 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1607 if (TOCstart == 0)
1608 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1609
1610 /* Subtract the TOC base address. */
1611 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1612
1613 /* Adjust the addend for sign extension of the low 16 bits. */
1614 reloc_entry->addend += 0x8000;
1615 return bfd_reloc_continue;
1616 }
1617
1618 static bfd_reloc_status_type
1619 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1620 void *data, asection *input_section,
1621 bfd *output_bfd, char **error_message)
1622 {
1623 bfd_vma TOCstart;
1624 bfd_size_type octets;
1625
1626 /* If this is a relocatable link (output_bfd test tells us), just
1627 call the generic function. Any adjustment will be done at final
1628 link time. */
1629 if (output_bfd != NULL)
1630 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1631 input_section, output_bfd, error_message);
1632
1633 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1634 if (TOCstart == 0)
1635 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1636
1637 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1638 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1639 return bfd_reloc_ok;
1640 }
1641
1642 static bfd_reloc_status_type
1643 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1644 void *data, asection *input_section,
1645 bfd *output_bfd, char **error_message)
1646 {
1647 uint64_t insn;
1648 bfd_vma targ;
1649
1650 if (output_bfd != NULL)
1651 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1652 input_section, output_bfd, error_message);
1653
1654 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1655 insn <<= 32;
1656 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1657
1658 targ = (symbol->section->output_section->vma
1659 + symbol->section->output_offset
1660 + reloc_entry->addend);
1661 if (!bfd_is_com_section (symbol->section))
1662 targ += symbol->value;
1663 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1664 targ += 1ULL << 33;
1665 if (reloc_entry->howto->pc_relative)
1666 {
1667 bfd_vma from = (reloc_entry->address
1668 + input_section->output_offset
1669 + input_section->output_section->vma);
1670 targ -=from;
1671 }
1672 targ >>= reloc_entry->howto->rightshift;
1673 insn &= ~reloc_entry->howto->dst_mask;
1674 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1675 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1676 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1677 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1678 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1679 >= 1ULL << reloc_entry->howto->bitsize))
1680 return bfd_reloc_overflow;
1681 return bfd_reloc_ok;
1682 }
1683
1684 static bfd_reloc_status_type
1685 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1686 void *data, asection *input_section,
1687 bfd *output_bfd, char **error_message)
1688 {
1689 /* If this is a relocatable link (output_bfd test tells us), just
1690 call the generic function. Any adjustment will be done at final
1691 link time. */
1692 if (output_bfd != NULL)
1693 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1694 input_section, output_bfd, error_message);
1695
1696 if (error_message != NULL)
1697 {
1698 static char buf[60];
1699 sprintf (buf, "generic linker can't handle %s",
1700 reloc_entry->howto->name);
1701 *error_message = buf;
1702 }
1703 return bfd_reloc_dangerous;
1704 }
1705
1706 /* Track GOT entries needed for a given symbol. We might need more
1707 than one got entry per symbol. */
1708 struct got_entry
1709 {
1710 struct got_entry *next;
1711
1712 /* The symbol addend that we'll be placing in the GOT. */
1713 bfd_vma addend;
1714
1715 /* Unlike other ELF targets, we use separate GOT entries for the same
1716 symbol referenced from different input files. This is to support
1717 automatic multiple TOC/GOT sections, where the TOC base can vary
1718 from one input file to another. After partitioning into TOC groups
1719 we merge entries within the group.
1720
1721 Point to the BFD owning this GOT entry. */
1722 bfd *owner;
1723
1724 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1725 TLS_TPREL or TLS_DTPREL for tls entries. */
1726 unsigned char tls_type;
1727
1728 /* Non-zero if got.ent points to real entry. */
1729 unsigned char is_indirect;
1730
1731 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1732 union
1733 {
1734 bfd_signed_vma refcount;
1735 bfd_vma offset;
1736 struct got_entry *ent;
1737 } got;
1738 };
1739
1740 /* The same for PLT. */
1741 struct plt_entry
1742 {
1743 struct plt_entry *next;
1744
1745 bfd_vma addend;
1746
1747 union
1748 {
1749 bfd_signed_vma refcount;
1750 bfd_vma offset;
1751 } plt;
1752 };
1753
1754 struct ppc64_elf_obj_tdata
1755 {
1756 struct elf_obj_tdata elf;
1757
1758 /* Shortcuts to dynamic linker sections. */
1759 asection *got;
1760 asection *relgot;
1761
1762 /* Used during garbage collection. We attach global symbols defined
1763 on removed .opd entries to this section so that the sym is removed. */
1764 asection *deleted_section;
1765
1766 /* TLS local dynamic got entry handling. Support for multiple GOT
1767 sections means we potentially need one of these for each input bfd. */
1768 struct got_entry tlsld_got;
1769
1770 union
1771 {
1772 /* A copy of relocs before they are modified for --emit-relocs. */
1773 Elf_Internal_Rela *relocs;
1774
1775 /* Section contents. */
1776 bfd_byte *contents;
1777 } opd;
1778
1779 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1780 the reloc to be in the range -32768 to 32767. */
1781 unsigned int has_small_toc_reloc : 1;
1782
1783 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1784 instruction not one we handle. */
1785 unsigned int unexpected_toc_insn : 1;
1786
1787 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1788 this file. */
1789 unsigned int has_optrel : 1;
1790 };
1791
1792 #define ppc64_elf_tdata(bfd) \
1793 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1794
1795 #define ppc64_tlsld_got(bfd) \
1796 (&ppc64_elf_tdata (bfd)->tlsld_got)
1797
1798 #define is_ppc64_elf(bfd) \
1799 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1800 && elf_object_id (bfd) == PPC64_ELF_DATA)
1801
1802 /* Override the generic function because we store some extras. */
1803
1804 static bfd_boolean
1805 ppc64_elf_mkobject (bfd *abfd)
1806 {
1807 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1808 PPC64_ELF_DATA);
1809 }
1810
1811 /* Fix bad default arch selected for a 64 bit input bfd when the
1812 default is 32 bit. Also select arch based on apuinfo. */
1813
1814 static bfd_boolean
1815 ppc64_elf_object_p (bfd *abfd)
1816 {
1817 if (!abfd->arch_info->the_default)
1818 return TRUE;
1819
1820 if (abfd->arch_info->bits_per_word == 32)
1821 {
1822 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1823
1824 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1825 {
1826 /* Relies on arch after 32 bit default being 64 bit default. */
1827 abfd->arch_info = abfd->arch_info->next;
1828 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1829 }
1830 }
1831 return _bfd_elf_ppc_set_arch (abfd);
1832 }
1833
1834 /* Support for core dump NOTE sections. */
1835
1836 static bfd_boolean
1837 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1838 {
1839 size_t offset, size;
1840
1841 if (note->descsz != 504)
1842 return FALSE;
1843
1844 /* pr_cursig */
1845 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1846
1847 /* pr_pid */
1848 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1849
1850 /* pr_reg */
1851 offset = 112;
1852 size = 384;
1853
1854 /* Make a ".reg/999" section. */
1855 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1856 size, note->descpos + offset);
1857 }
1858
1859 static bfd_boolean
1860 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1861 {
1862 if (note->descsz != 136)
1863 return FALSE;
1864
1865 elf_tdata (abfd)->core->pid
1866 = bfd_get_32 (abfd, note->descdata + 24);
1867 elf_tdata (abfd)->core->program
1868 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1869 elf_tdata (abfd)->core->command
1870 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1871
1872 return TRUE;
1873 }
1874
1875 static char *
1876 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1877 ...)
1878 {
1879 switch (note_type)
1880 {
1881 default:
1882 return NULL;
1883
1884 case NT_PRPSINFO:
1885 {
1886 char data[136] ATTRIBUTE_NONSTRING;
1887 va_list ap;
1888
1889 va_start (ap, note_type);
1890 memset (data, 0, sizeof (data));
1891 strncpy (data + 40, va_arg (ap, const char *), 16);
1892 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1893 DIAGNOSTIC_PUSH;
1894 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1895 -Wstringop-truncation:
1896 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1897 */
1898 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1899 #endif
1900 strncpy (data + 56, va_arg (ap, const char *), 80);
1901 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1902 DIAGNOSTIC_POP;
1903 #endif
1904 va_end (ap);
1905 return elfcore_write_note (abfd, buf, bufsiz,
1906 "CORE", note_type, data, sizeof (data));
1907 }
1908
1909 case NT_PRSTATUS:
1910 {
1911 char data[504];
1912 va_list ap;
1913 long pid;
1914 int cursig;
1915 const void *greg;
1916
1917 va_start (ap, note_type);
1918 memset (data, 0, 112);
1919 pid = va_arg (ap, long);
1920 bfd_put_32 (abfd, pid, data + 32);
1921 cursig = va_arg (ap, int);
1922 bfd_put_16 (abfd, cursig, data + 12);
1923 greg = va_arg (ap, const void *);
1924 memcpy (data + 112, greg, 384);
1925 memset (data + 496, 0, 8);
1926 va_end (ap);
1927 return elfcore_write_note (abfd, buf, bufsiz,
1928 "CORE", note_type, data, sizeof (data));
1929 }
1930 }
1931 }
1932
1933 /* Add extra PPC sections. */
1934
1935 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1936 {
1937 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1938 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1939 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1941 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1942 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1943 { NULL, 0, 0, 0, 0 }
1944 };
1945
1946 enum _ppc64_sec_type {
1947 sec_normal = 0,
1948 sec_opd = 1,
1949 sec_toc = 2
1950 };
1951
1952 struct _ppc64_elf_section_data
1953 {
1954 struct bfd_elf_section_data elf;
1955
1956 union
1957 {
1958 /* An array with one entry for each opd function descriptor,
1959 and some spares since opd entries may be either 16 or 24 bytes. */
1960 #define OPD_NDX(OFF) ((OFF) >> 4)
1961 struct _opd_sec_data
1962 {
1963 /* Points to the function code section for local opd entries. */
1964 asection **func_sec;
1965
1966 /* After editing .opd, adjust references to opd local syms. */
1967 long *adjust;
1968 } opd;
1969
1970 /* An array for toc sections, indexed by offset/8. */
1971 struct _toc_sec_data
1972 {
1973 /* Specifies the relocation symbol index used at a given toc offset. */
1974 unsigned *symndx;
1975
1976 /* And the relocation addend. */
1977 bfd_vma *add;
1978 } toc;
1979 } u;
1980
1981 enum _ppc64_sec_type sec_type:2;
1982
1983 /* Flag set when small branches are detected. Used to
1984 select suitable defaults for the stub group size. */
1985 unsigned int has_14bit_branch:1;
1986
1987 /* Flag set when PLTCALL relocs are detected. */
1988 unsigned int has_pltcall:1;
1989
1990 /* Flag set when section has PLT/GOT/TOC relocations that can be
1991 optimised. */
1992 unsigned int has_optrel:1;
1993 };
1994
1995 #define ppc64_elf_section_data(sec) \
1996 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
1997
1998 static bfd_boolean
1999 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2000 {
2001 if (!sec->used_by_bfd)
2002 {
2003 struct _ppc64_elf_section_data *sdata;
2004 size_t amt = sizeof (*sdata);
2005
2006 sdata = bfd_zalloc (abfd, amt);
2007 if (sdata == NULL)
2008 return FALSE;
2009 sec->used_by_bfd = sdata;
2010 }
2011
2012 return _bfd_elf_new_section_hook (abfd, sec);
2013 }
2014
2015 static bfd_boolean
2016 ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2017 {
2018 const char *name = hdr->bfd_section->name;
2019
2020 if (strncmp (name, ".sbss", 5) == 0
2021 || strncmp (name, ".sdata", 6) == 0)
2022 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2023
2024 return TRUE;
2025 }
2026
2027 static struct _opd_sec_data *
2028 get_opd_info (asection * sec)
2029 {
2030 if (sec != NULL
2031 && ppc64_elf_section_data (sec) != NULL
2032 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2033 return &ppc64_elf_section_data (sec)->u.opd;
2034 return NULL;
2035 }
2036 \f
2037 /* Parameters for the qsort hook. */
2038 static bfd_boolean synthetic_relocatable;
2039 static asection *synthetic_opd;
2040
2041 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2042
2043 static int
2044 compare_symbols (const void *ap, const void *bp)
2045 {
2046 const asymbol *a = *(const asymbol **) ap;
2047 const asymbol *b = *(const asymbol **) bp;
2048
2049 /* Section symbols first. */
2050 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2051 return -1;
2052 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2053 return 1;
2054
2055 /* then .opd symbols. */
2056 if (synthetic_opd != NULL)
2057 {
2058 if (strcmp (a->section->name, ".opd") == 0
2059 && strcmp (b->section->name, ".opd") != 0)
2060 return -1;
2061 if (strcmp (a->section->name, ".opd") != 0
2062 && strcmp (b->section->name, ".opd") == 0)
2063 return 1;
2064 }
2065
2066 /* then other code symbols. */
2067 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2068 == (SEC_CODE | SEC_ALLOC))
2069 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2070 != (SEC_CODE | SEC_ALLOC)))
2071 return -1;
2072
2073 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2074 != (SEC_CODE | SEC_ALLOC))
2075 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2076 == (SEC_CODE | SEC_ALLOC)))
2077 return 1;
2078
2079 if (synthetic_relocatable)
2080 {
2081 if (a->section->id < b->section->id)
2082 return -1;
2083
2084 if (a->section->id > b->section->id)
2085 return 1;
2086 }
2087
2088 if (a->value + a->section->vma < b->value + b->section->vma)
2089 return -1;
2090
2091 if (a->value + a->section->vma > b->value + b->section->vma)
2092 return 1;
2093
2094 /* For syms with the same value, prefer strong dynamic global function
2095 syms over other syms. */
2096 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2097 return -1;
2098
2099 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2100 return 1;
2101
2102 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2103 return -1;
2104
2105 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2106 return 1;
2107
2108 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2109 return -1;
2110
2111 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2112 return 1;
2113
2114 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2115 return -1;
2116
2117 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2118 return 1;
2119
2120 /* Finally, sort on where the symbol is in memory. The symbols will
2121 be in at most two malloc'd blocks, one for static syms, one for
2122 dynamic syms, and we distinguish the two blocks above by testing
2123 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2124 originally in the same order as the symbols (and we're not
2125 sorting the symbols themselves), this ensures a stable sort. */
2126 if (a < b)
2127 return -1;
2128 if (a > b)
2129 return 1;
2130 return 0;
2131 }
2132
2133 /* Search SYMS for a symbol of the given VALUE. */
2134
2135 static asymbol *
2136 sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2137 bfd_vma value)
2138 {
2139 size_t mid;
2140
2141 if (id == (unsigned) -1)
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->value + syms[mid]->section->vma < value)
2147 lo = mid + 1;
2148 else if (syms[mid]->value + syms[mid]->section->vma > value)
2149 hi = mid;
2150 else
2151 return syms[mid];
2152 }
2153 }
2154 else
2155 {
2156 while (lo < hi)
2157 {
2158 mid = (lo + hi) >> 1;
2159 if (syms[mid]->section->id < id)
2160 lo = mid + 1;
2161 else if (syms[mid]->section->id > id)
2162 hi = mid;
2163 else if (syms[mid]->value < value)
2164 lo = mid + 1;
2165 else if (syms[mid]->value > value)
2166 hi = mid;
2167 else
2168 return syms[mid];
2169 }
2170 }
2171 return NULL;
2172 }
2173
2174 static bfd_boolean
2175 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2176 {
2177 bfd_vma vma = *(bfd_vma *) ptr;
2178 return ((section->flags & SEC_ALLOC) != 0
2179 && section->vma <= vma
2180 && vma < section->vma + section->size);
2181 }
2182
2183 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2184 entry syms. Also generate @plt symbols for the glink branch table.
2185 Returns count of synthetic symbols in RET or -1 on error. */
2186
2187 static long
2188 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2189 long static_count, asymbol **static_syms,
2190 long dyn_count, asymbol **dyn_syms,
2191 asymbol **ret)
2192 {
2193 asymbol *s;
2194 size_t i, j, count;
2195 char *names;
2196 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2197 asection *opd = NULL;
2198 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2199 asymbol **syms;
2200 int abi = abiversion (abfd);
2201
2202 *ret = NULL;
2203
2204 if (abi < 2)
2205 {
2206 opd = bfd_get_section_by_name (abfd, ".opd");
2207 if (opd == NULL && abi == 1)
2208 return 0;
2209 }
2210
2211 syms = NULL;
2212 codesecsym = 0;
2213 codesecsymend = 0;
2214 secsymend = 0;
2215 opdsymend = 0;
2216 symcount = 0;
2217 if (opd != NULL)
2218 {
2219 symcount = static_count;
2220 if (!relocatable)
2221 symcount += dyn_count;
2222 if (symcount == 0)
2223 return 0;
2224
2225 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2226 if (syms == NULL)
2227 return -1;
2228
2229 if (!relocatable && static_count != 0 && dyn_count != 0)
2230 {
2231 /* Use both symbol tables. */
2232 memcpy (syms, static_syms, static_count * sizeof (*syms));
2233 memcpy (syms + static_count, dyn_syms,
2234 (dyn_count + 1) * sizeof (*syms));
2235 }
2236 else if (!relocatable && static_count == 0)
2237 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2238 else
2239 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2240
2241 /* Trim uninteresting symbols. Interesting symbols are section,
2242 function, and notype symbols. */
2243 for (i = 0, j = 0; i < symcount; ++i)
2244 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2245 | BSF_RELC | BSF_SRELC)) == 0)
2246 syms[j++] = syms[i];
2247 symcount = j;
2248
2249 synthetic_relocatable = relocatable;
2250 synthetic_opd = opd;
2251 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2252
2253 if (!relocatable && symcount > 1)
2254 {
2255 /* Trim duplicate syms, since we may have merged the normal
2256 and dynamic symbols. Actually, we only care about syms
2257 that have different values, so trim any with the same
2258 value. Don't consider ifunc and ifunc resolver symbols
2259 duplicates however, because GDB wants to know whether a
2260 text symbol is an ifunc resolver. */
2261 for (i = 1, j = 1; i < symcount; ++i)
2262 {
2263 const asymbol *s0 = syms[i - 1];
2264 const asymbol *s1 = syms[i];
2265
2266 if ((s0->value + s0->section->vma
2267 != s1->value + s1->section->vma)
2268 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2269 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2270 syms[j++] = syms[i];
2271 }
2272 symcount = j;
2273 }
2274
2275 i = 0;
2276 /* Note that here and in compare_symbols we can't compare opd and
2277 sym->section directly. With separate debug info files, the
2278 symbols will be extracted from the debug file while abfd passed
2279 to this function is the real binary. */
2280 if (strcmp (syms[i]->section->name, ".opd") == 0)
2281 ++i;
2282 codesecsym = i;
2283
2284 for (; i < symcount; ++i)
2285 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2286 | SEC_THREAD_LOCAL))
2287 != (SEC_CODE | SEC_ALLOC))
2288 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2289 break;
2290 codesecsymend = i;
2291
2292 for (; i < symcount; ++i)
2293 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2294 break;
2295 secsymend = i;
2296
2297 for (; i < symcount; ++i)
2298 if (strcmp (syms[i]->section->name, ".opd") != 0)
2299 break;
2300 opdsymend = i;
2301
2302 for (; i < symcount; ++i)
2303 if (((syms[i]->section->flags
2304 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2305 != (SEC_CODE | SEC_ALLOC))
2306 break;
2307 symcount = i;
2308 }
2309 count = 0;
2310
2311 if (relocatable)
2312 {
2313 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2314 arelent *r;
2315 size_t size;
2316 size_t relcount;
2317
2318 if (opdsymend == secsymend)
2319 goto done;
2320
2321 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2322 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2323 if (relcount == 0)
2324 goto done;
2325
2326 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2327 {
2328 count = -1;
2329 goto done;
2330 }
2331
2332 size = 0;
2333 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2334 {
2335 asymbol *sym;
2336
2337 while (r < opd->relocation + relcount
2338 && r->address < syms[i]->value + opd->vma)
2339 ++r;
2340
2341 if (r == opd->relocation + relcount)
2342 break;
2343
2344 if (r->address != syms[i]->value + opd->vma)
2345 continue;
2346
2347 if (r->howto->type != R_PPC64_ADDR64)
2348 continue;
2349
2350 sym = *r->sym_ptr_ptr;
2351 if (!sym_exists_at (syms, opdsymend, symcount,
2352 sym->section->id, sym->value + r->addend))
2353 {
2354 ++count;
2355 size += sizeof (asymbol);
2356 size += strlen (syms[i]->name) + 2;
2357 }
2358 }
2359
2360 if (size == 0)
2361 goto done;
2362 s = *ret = bfd_malloc (size);
2363 if (s == NULL)
2364 {
2365 count = -1;
2366 goto done;
2367 }
2368
2369 names = (char *) (s + count);
2370
2371 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2372 {
2373 asymbol *sym;
2374
2375 while (r < opd->relocation + relcount
2376 && r->address < syms[i]->value + opd->vma)
2377 ++r;
2378
2379 if (r == opd->relocation + relcount)
2380 break;
2381
2382 if (r->address != syms[i]->value + opd->vma)
2383 continue;
2384
2385 if (r->howto->type != R_PPC64_ADDR64)
2386 continue;
2387
2388 sym = *r->sym_ptr_ptr;
2389 if (!sym_exists_at (syms, opdsymend, symcount,
2390 sym->section->id, sym->value + r->addend))
2391 {
2392 size_t len;
2393
2394 *s = *syms[i];
2395 s->flags |= BSF_SYNTHETIC;
2396 s->section = sym->section;
2397 s->value = sym->value + r->addend;
2398 s->name = names;
2399 *names++ = '.';
2400 len = strlen (syms[i]->name);
2401 memcpy (names, syms[i]->name, len + 1);
2402 names += len + 1;
2403 /* Have udata.p point back to the original symbol this
2404 synthetic symbol was derived from. */
2405 s->udata.p = syms[i];
2406 s++;
2407 }
2408 }
2409 }
2410 else
2411 {
2412 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2413 bfd_byte *contents = NULL;
2414 size_t size;
2415 size_t plt_count = 0;
2416 bfd_vma glink_vma = 0, resolv_vma = 0;
2417 asection *dynamic, *glink = NULL, *relplt = NULL;
2418 arelent *p;
2419
2420 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2421 {
2422 free_contents_and_exit_err:
2423 count = -1;
2424 free_contents_and_exit:
2425 free (contents);
2426 goto done;
2427 }
2428
2429 size = 0;
2430 for (i = secsymend; i < opdsymend; ++i)
2431 {
2432 bfd_vma ent;
2433
2434 /* Ignore bogus symbols. */
2435 if (syms[i]->value > opd->size - 8)
2436 continue;
2437
2438 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2439 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2440 {
2441 ++count;
2442 size += sizeof (asymbol);
2443 size += strlen (syms[i]->name) + 2;
2444 }
2445 }
2446
2447 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2448 if (dyn_count != 0
2449 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2450 {
2451 bfd_byte *dynbuf, *extdyn, *extdynend;
2452 size_t extdynsize;
2453 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2454
2455 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2456 goto free_contents_and_exit_err;
2457
2458 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2459 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2460
2461 extdyn = dynbuf;
2462 extdynend = extdyn + dynamic->size;
2463 for (; extdyn < extdynend; extdyn += extdynsize)
2464 {
2465 Elf_Internal_Dyn dyn;
2466 (*swap_dyn_in) (abfd, extdyn, &dyn);
2467
2468 if (dyn.d_tag == DT_NULL)
2469 break;
2470
2471 if (dyn.d_tag == DT_PPC64_GLINK)
2472 {
2473 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2474 See comment in ppc64_elf_finish_dynamic_sections. */
2475 glink_vma = dyn.d_un.d_val + 8 * 4;
2476 /* The .glink section usually does not survive the final
2477 link; search for the section (usually .text) where the
2478 glink stubs now reside. */
2479 glink = bfd_sections_find_if (abfd, section_covers_vma,
2480 &glink_vma);
2481 break;
2482 }
2483 }
2484
2485 free (dynbuf);
2486 }
2487
2488 if (glink != NULL)
2489 {
2490 /* Determine __glink trampoline by reading the relative branch
2491 from the first glink stub. */
2492 bfd_byte buf[4];
2493 unsigned int off = 0;
2494
2495 while (bfd_get_section_contents (abfd, glink, buf,
2496 glink_vma + off - glink->vma, 4))
2497 {
2498 unsigned int insn = bfd_get_32 (abfd, buf);
2499 insn ^= B_DOT;
2500 if ((insn & ~0x3fffffc) == 0)
2501 {
2502 resolv_vma
2503 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2504 break;
2505 }
2506 off += 4;
2507 if (off > 4)
2508 break;
2509 }
2510
2511 if (resolv_vma)
2512 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2513
2514 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2515 if (relplt != NULL)
2516 {
2517 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2518 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2519 goto free_contents_and_exit_err;
2520
2521 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2522 size += plt_count * sizeof (asymbol);
2523
2524 p = relplt->relocation;
2525 for (i = 0; i < plt_count; i++, p++)
2526 {
2527 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2528 if (p->addend != 0)
2529 size += sizeof ("+0x") - 1 + 16;
2530 }
2531 }
2532 }
2533
2534 if (size == 0)
2535 goto free_contents_and_exit;
2536 s = *ret = bfd_malloc (size);
2537 if (s == NULL)
2538 goto free_contents_and_exit_err;
2539
2540 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2541
2542 for (i = secsymend; i < opdsymend; ++i)
2543 {
2544 bfd_vma ent;
2545
2546 if (syms[i]->value > opd->size - 8)
2547 continue;
2548
2549 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2550 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2551 {
2552 size_t lo, hi;
2553 size_t len;
2554 asection *sec = abfd->sections;
2555
2556 *s = *syms[i];
2557 lo = codesecsym;
2558 hi = codesecsymend;
2559 while (lo < hi)
2560 {
2561 size_t mid = (lo + hi) >> 1;
2562 if (syms[mid]->section->vma < ent)
2563 lo = mid + 1;
2564 else if (syms[mid]->section->vma > ent)
2565 hi = mid;
2566 else
2567 {
2568 sec = syms[mid]->section;
2569 break;
2570 }
2571 }
2572
2573 if (lo >= hi && lo > codesecsym)
2574 sec = syms[lo - 1]->section;
2575
2576 for (; sec != NULL; sec = sec->next)
2577 {
2578 if (sec->vma > ent)
2579 break;
2580 /* SEC_LOAD may not be set if SEC is from a separate debug
2581 info file. */
2582 if ((sec->flags & SEC_ALLOC) == 0)
2583 break;
2584 if ((sec->flags & SEC_CODE) != 0)
2585 s->section = sec;
2586 }
2587 s->flags |= BSF_SYNTHETIC;
2588 s->value = ent - s->section->vma;
2589 s->name = names;
2590 *names++ = '.';
2591 len = strlen (syms[i]->name);
2592 memcpy (names, syms[i]->name, len + 1);
2593 names += len + 1;
2594 /* Have udata.p point back to the original symbol this
2595 synthetic symbol was derived from. */
2596 s->udata.p = syms[i];
2597 s++;
2598 }
2599 }
2600 free (contents);
2601
2602 if (glink != NULL && relplt != NULL)
2603 {
2604 if (resolv_vma)
2605 {
2606 /* Add a symbol for the main glink trampoline. */
2607 memset (s, 0, sizeof *s);
2608 s->the_bfd = abfd;
2609 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2610 s->section = glink;
2611 s->value = resolv_vma - glink->vma;
2612 s->name = names;
2613 memcpy (names, "__glink_PLTresolve",
2614 sizeof ("__glink_PLTresolve"));
2615 names += sizeof ("__glink_PLTresolve");
2616 s++;
2617 count++;
2618 }
2619
2620 /* FIXME: It would be very much nicer to put sym@plt on the
2621 stub rather than on the glink branch table entry. The
2622 objdump disassembler would then use a sensible symbol
2623 name on plt calls. The difficulty in doing so is
2624 a) finding the stubs, and,
2625 b) matching stubs against plt entries, and,
2626 c) there can be multiple stubs for a given plt entry.
2627
2628 Solving (a) could be done by code scanning, but older
2629 ppc64 binaries used different stubs to current code.
2630 (b) is the tricky one since you need to known the toc
2631 pointer for at least one function that uses a pic stub to
2632 be able to calculate the plt address referenced.
2633 (c) means gdb would need to set multiple breakpoints (or
2634 find the glink branch itself) when setting breakpoints
2635 for pending shared library loads. */
2636 p = relplt->relocation;
2637 for (i = 0; i < plt_count; i++, p++)
2638 {
2639 size_t len;
2640
2641 *s = **p->sym_ptr_ptr;
2642 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2643 we are defining a symbol, ensure one of them is set. */
2644 if ((s->flags & BSF_LOCAL) == 0)
2645 s->flags |= BSF_GLOBAL;
2646 s->flags |= BSF_SYNTHETIC;
2647 s->section = glink;
2648 s->value = glink_vma - glink->vma;
2649 s->name = names;
2650 s->udata.p = NULL;
2651 len = strlen ((*p->sym_ptr_ptr)->name);
2652 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2653 names += len;
2654 if (p->addend != 0)
2655 {
2656 memcpy (names, "+0x", sizeof ("+0x") - 1);
2657 names += sizeof ("+0x") - 1;
2658 bfd_sprintf_vma (abfd, names, p->addend);
2659 names += strlen (names);
2660 }
2661 memcpy (names, "@plt", sizeof ("@plt"));
2662 names += sizeof ("@plt");
2663 s++;
2664 if (abi < 2)
2665 {
2666 glink_vma += 8;
2667 if (i >= 0x8000)
2668 glink_vma += 4;
2669 }
2670 else
2671 glink_vma += 4;
2672 }
2673 count += plt_count;
2674 }
2675 }
2676
2677 done:
2678 free (syms);
2679 return count;
2680 }
2681 \f
2682 /* The following functions are specific to the ELF linker, while
2683 functions above are used generally. Those named ppc64_elf_* are
2684 called by the main ELF linker code. They appear in this file more
2685 or less in the order in which they are called. eg.
2686 ppc64_elf_check_relocs is called early in the link process,
2687 ppc64_elf_finish_dynamic_sections is one of the last functions
2688 called.
2689
2690 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2691 functions have both a function code symbol and a function descriptor
2692 symbol. A call to foo in a relocatable object file looks like:
2693
2694 . .text
2695 . x:
2696 . bl .foo
2697 . nop
2698
2699 The function definition in another object file might be:
2700
2701 . .section .opd
2702 . foo: .quad .foo
2703 . .quad .TOC.@tocbase
2704 . .quad 0
2705 .
2706 . .text
2707 . .foo: blr
2708
2709 When the linker resolves the call during a static link, the branch
2710 unsurprisingly just goes to .foo and the .opd information is unused.
2711 If the function definition is in a shared library, things are a little
2712 different: The call goes via a plt call stub, the opd information gets
2713 copied to the plt, and the linker patches the nop.
2714
2715 . x:
2716 . bl .foo_stub
2717 . ld 2,40(1)
2718 .
2719 .
2720 . .foo_stub:
2721 . std 2,40(1) # in practice, the call stub
2722 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2723 . addi 11,11,Lfoo@toc@l # this is the general idea
2724 . ld 12,0(11)
2725 . ld 2,8(11)
2726 . mtctr 12
2727 . ld 11,16(11)
2728 . bctr
2729 .
2730 . .section .plt
2731 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2732
2733 The "reloc ()" notation is supposed to indicate that the linker emits
2734 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2735 copying.
2736
2737 What are the difficulties here? Well, firstly, the relocations
2738 examined by the linker in check_relocs are against the function code
2739 sym .foo, while the dynamic relocation in the plt is emitted against
2740 the function descriptor symbol, foo. Somewhere along the line, we need
2741 to carefully copy dynamic link information from one symbol to the other.
2742 Secondly, the generic part of the elf linker will make .foo a dynamic
2743 symbol as is normal for most other backends. We need foo dynamic
2744 instead, at least for an application final link. However, when
2745 creating a shared library containing foo, we need to have both symbols
2746 dynamic so that references to .foo are satisfied during the early
2747 stages of linking. Otherwise the linker might decide to pull in a
2748 definition from some other object, eg. a static library.
2749
2750 Update: As of August 2004, we support a new convention. Function
2751 calls may use the function descriptor symbol, ie. "bl foo". This
2752 behaves exactly as "bl .foo". */
2753
2754 /* Of those relocs that might be copied as dynamic relocs, this
2755 function selects those that must be copied when linking a shared
2756 library or PIE, even when the symbol is local. */
2757
2758 static int
2759 must_be_dyn_reloc (struct bfd_link_info *info,
2760 enum elf_ppc64_reloc_type r_type)
2761 {
2762 switch (r_type)
2763 {
2764 default:
2765 /* Only relative relocs can be resolved when the object load
2766 address isn't fixed. DTPREL64 is excluded because the
2767 dynamic linker needs to differentiate global dynamic from
2768 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2769 return 1;
2770
2771 case R_PPC64_REL32:
2772 case R_PPC64_REL64:
2773 case R_PPC64_REL30:
2774 case R_PPC64_TOC16:
2775 case R_PPC64_TOC16_DS:
2776 case R_PPC64_TOC16_LO:
2777 case R_PPC64_TOC16_HI:
2778 case R_PPC64_TOC16_HA:
2779 case R_PPC64_TOC16_LO_DS:
2780 return 0;
2781
2782 case R_PPC64_TPREL16:
2783 case R_PPC64_TPREL16_LO:
2784 case R_PPC64_TPREL16_HI:
2785 case R_PPC64_TPREL16_HA:
2786 case R_PPC64_TPREL16_DS:
2787 case R_PPC64_TPREL16_LO_DS:
2788 case R_PPC64_TPREL16_HIGH:
2789 case R_PPC64_TPREL16_HIGHA:
2790 case R_PPC64_TPREL16_HIGHER:
2791 case R_PPC64_TPREL16_HIGHERA:
2792 case R_PPC64_TPREL16_HIGHEST:
2793 case R_PPC64_TPREL16_HIGHESTA:
2794 case R_PPC64_TPREL64:
2795 case R_PPC64_TPREL34:
2796 /* These relocations are relative but in a shared library the
2797 linker doesn't know the thread pointer base. */
2798 return bfd_link_dll (info);
2799 }
2800 }
2801
2802 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2803 copying dynamic variables from a shared lib into an app's .dynbss
2804 section, and instead use a dynamic relocation to point into the
2805 shared lib. With code that gcc generates it is vital that this be
2806 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2807 actually the address of a function descriptor which resides in the
2808 .opd section. gcc uses the descriptor directly rather than going
2809 via the GOT as some other ABIs do, which means that initialized
2810 function pointers reference the descriptor. Thus, a function
2811 pointer initialized to the address of a function in a shared
2812 library will either require a .dynbss copy and a copy reloc, or a
2813 dynamic reloc. Using a .dynbss copy redefines the function
2814 descriptor symbol to point to the copy. This presents a problem as
2815 a PLT entry for that function is also initialized from the function
2816 descriptor symbol and the copy may not be initialized first. */
2817 #define ELIMINATE_COPY_RELOCS 1
2818
2819 /* Section name for stubs is the associated section name plus this
2820 string. */
2821 #define STUB_SUFFIX ".stub"
2822
2823 /* Linker stubs.
2824 ppc_stub_long_branch:
2825 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2826 destination, but a 24 bit branch in a stub section will reach.
2827 . b dest
2828
2829 ppc_stub_plt_branch:
2830 Similar to the above, but a 24 bit branch in the stub section won't
2831 reach its destination.
2832 . addis %r12,%r2,xxx@toc@ha
2833 . ld %r12,xxx@toc@l(%r12)
2834 . mtctr %r12
2835 . bctr
2836
2837 ppc_stub_plt_call:
2838 Used to call a function in a shared library. If it so happens that
2839 the plt entry referenced crosses a 64k boundary, then an extra
2840 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2841 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2842 . addis %r11,%r2,xxx@toc@ha
2843 . ld %r12,xxx+0@toc@l(%r11)
2844 . mtctr %r12
2845 . ld %r2,xxx+8@toc@l(%r11)
2846 . ld %r11,xxx+16@toc@l(%r11)
2847 . bctr
2848
2849 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2850 code to adjust the value and save r2 to support multiple toc sections.
2851 A ppc_stub_long_branch with an r2 offset looks like:
2852 . std %r2,40(%r1)
2853 . addis %r2,%r2,off@ha
2854 . addi %r2,%r2,off@l
2855 . b dest
2856
2857 A ppc_stub_plt_branch with an r2 offset looks like:
2858 . std %r2,40(%r1)
2859 . addis %r12,%r2,xxx@toc@ha
2860 . ld %r12,xxx@toc@l(%r12)
2861 . addis %r2,%r2,off@ha
2862 . addi %r2,%r2,off@l
2863 . mtctr %r12
2864 . bctr
2865
2866 All of the above stubs are shown as their ELFv1 variants. ELFv2
2867 variants exist too, simpler for plt calls since a new toc pointer
2868 and static chain are not loaded by the stub. In addition, ELFv2
2869 has some more complex stubs to handle calls marked with NOTOC
2870 relocs from functions where r2 is not a valid toc pointer. These
2871 come in two flavours, the ones shown below, and _both variants that
2872 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2873 one call is from a function where r2 is used as the toc pointer but
2874 needs a toc adjusting stub for small-model multi-toc, and another
2875 call is from a function where r2 is not valid.
2876 ppc_stub_long_branch_notoc:
2877 . mflr %r12
2878 . bcl 20,31,1f
2879 . 1:
2880 . mflr %r11
2881 . mtlr %r12
2882 . addis %r12,%r11,dest-1b@ha
2883 . addi %r12,%r12,dest-1b@l
2884 . b dest
2885
2886 ppc_stub_plt_branch_notoc:
2887 . mflr %r12
2888 . bcl 20,31,1f
2889 . 1:
2890 . mflr %r11
2891 . mtlr %r12
2892 . lis %r12,xxx-1b@highest
2893 . ori %r12,%r12,xxx-1b@higher
2894 . sldi %r12,%r12,32
2895 . oris %r12,%r12,xxx-1b@high
2896 . ori %r12,%r12,xxx-1b@l
2897 . add %r12,%r11,%r12
2898 . mtctr %r12
2899 . bctr
2900
2901 ppc_stub_plt_call_notoc:
2902 . mflr %r12
2903 . bcl 20,31,1f
2904 . 1:
2905 . mflr %r11
2906 . mtlr %r12
2907 . lis %r12,xxx-1b@highest
2908 . ori %r12,%r12,xxx-1b@higher
2909 . sldi %r12,%r12,32
2910 . oris %r12,%r12,xxx-1b@high
2911 . ori %r12,%r12,xxx-1b@l
2912 . ldx %r12,%r11,%r12
2913 . mtctr %r12
2914 . bctr
2915
2916 There are also ELFv1 power10 variants of these stubs.
2917 ppc_stub_long_branch_notoc:
2918 . pla %r12,dest@pcrel
2919 . b dest
2920 ppc_stub_plt_branch_notoc:
2921 . lis %r11,(dest-1f)@highesta34
2922 . ori %r11,%r11,(dest-1f)@highera34
2923 . sldi %r11,%r11,34
2924 . 1: pla %r12,dest@pcrel
2925 . add %r12,%r11,%r12
2926 . mtctr %r12
2927 . bctr
2928 ppc_stub_plt_call_notoc:
2929 . lis %r11,(xxx-1f)@highesta34
2930 . ori %r11,%r11,(xxx-1f)@highera34
2931 . sldi %r11,%r11,34
2932 . 1: pla %r12,xxx@pcrel
2933 . ldx %r12,%r11,%r12
2934 . mtctr %r12
2935 . bctr
2936
2937 In cases where the high instructions would add zero, they are
2938 omitted and following instructions modified in some cases.
2939 For example, a power10 ppc_stub_plt_call_notoc might simplify down
2940 to
2941 . pld %r12,xxx@pcrel
2942 . mtctr %r12
2943 . bctr
2944
2945 For a given stub group (a set of sections all using the same toc
2946 pointer value) there will be just one stub type used for any
2947 particular function symbol. For example, if printf is called from
2948 code with the tocsave optimization (ie. r2 saved in function
2949 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2950 and from other code without the tocsave optimization requiring a
2951 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2952 type will be created. Calls with the tocsave optimization will
2953 enter this stub after the instruction saving r2. A similar
2954 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2955 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2956 to call an external function like printf. If other calls to printf
2957 require a ppc_stub_plt_call linkage stub then a single
2958 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2959 call. If other calls to printf require a ppc_stub_plt_call_r2save
2960 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2961 be created and calls not requiring r2 to be saved will enter the
2962 stub after the r2 save instruction. There is an analogous
2963 hierarchy of long branch and plt branch stubs for local call
2964 linkage. */
2965
2966 enum ppc_stub_type
2967 {
2968 ppc_stub_none,
2969 ppc_stub_long_branch,
2970 ppc_stub_long_branch_r2off,
2971 ppc_stub_long_branch_notoc,
2972 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2973 ppc_stub_plt_branch,
2974 ppc_stub_plt_branch_r2off,
2975 ppc_stub_plt_branch_notoc,
2976 ppc_stub_plt_branch_both,
2977 ppc_stub_plt_call,
2978 ppc_stub_plt_call_r2save,
2979 ppc_stub_plt_call_notoc,
2980 ppc_stub_plt_call_both,
2981 ppc_stub_global_entry,
2982 ppc_stub_save_res
2983 };
2984
2985 /* Information on stub grouping. */
2986 struct map_stub
2987 {
2988 /* The stub section. */
2989 asection *stub_sec;
2990 /* This is the section to which stubs in the group will be attached. */
2991 asection *link_sec;
2992 /* Next group. */
2993 struct map_stub *next;
2994 /* Whether to emit a copy of register save/restore functions in this
2995 group. */
2996 int needs_save_res;
2997 /* Current offset within stubs after the insn restoring lr in a
2998 _notoc or _both stub using bcl for pc-relative addressing, or
2999 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3000 unsigned int lr_restore;
3001 /* Accumulated size of EH info emitted to describe return address
3002 if stubs modify lr. Does not include 17 byte FDE header. */
3003 unsigned int eh_size;
3004 /* Offset in glink_eh_frame to the start of EH info for this group. */
3005 unsigned int eh_base;
3006 };
3007
3008 struct ppc_stub_hash_entry
3009 {
3010 /* Base hash table entry structure. */
3011 struct bfd_hash_entry root;
3012
3013 enum ppc_stub_type stub_type;
3014
3015 /* Group information. */
3016 struct map_stub *group;
3017
3018 /* Offset within stub_sec of the beginning of this stub. */
3019 bfd_vma stub_offset;
3020
3021 /* Given the symbol's value and its section we can determine its final
3022 value when building the stubs (so the stub knows where to jump. */
3023 bfd_vma target_value;
3024 asection *target_section;
3025
3026 /* The symbol table entry, if any, that this was derived from. */
3027 struct ppc_link_hash_entry *h;
3028 struct plt_entry *plt_ent;
3029
3030 /* Symbol type. */
3031 unsigned char symtype;
3032
3033 /* Symbol st_other. */
3034 unsigned char other;
3035 };
3036
3037 struct ppc_branch_hash_entry
3038 {
3039 /* Base hash table entry structure. */
3040 struct bfd_hash_entry root;
3041
3042 /* Offset within branch lookup table. */
3043 unsigned int offset;
3044
3045 /* Generation marker. */
3046 unsigned int iter;
3047 };
3048
3049 /* Used to track dynamic relocations for local symbols. */
3050 struct ppc_dyn_relocs
3051 {
3052 struct ppc_dyn_relocs *next;
3053
3054 /* The input section of the reloc. */
3055 asection *sec;
3056
3057 /* Total number of relocs copied for the input section. */
3058 unsigned int count : 31;
3059
3060 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3061 unsigned int ifunc : 1;
3062 };
3063
3064 struct ppc_link_hash_entry
3065 {
3066 struct elf_link_hash_entry elf;
3067
3068 union
3069 {
3070 /* A pointer to the most recently used stub hash entry against this
3071 symbol. */
3072 struct ppc_stub_hash_entry *stub_cache;
3073
3074 /* A pointer to the next symbol starting with a '.' */
3075 struct ppc_link_hash_entry *next_dot_sym;
3076 } u;
3077
3078 /* Link between function code and descriptor symbols. */
3079 struct ppc_link_hash_entry *oh;
3080
3081 /* Flag function code and descriptor symbols. */
3082 unsigned int is_func:1;
3083 unsigned int is_func_descriptor:1;
3084 unsigned int fake:1;
3085
3086 /* Whether global opd/toc sym has been adjusted or not.
3087 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3088 should be set for all globals defined in any opd/toc section. */
3089 unsigned int adjust_done:1;
3090
3091 /* Set if this is an out-of-line register save/restore function,
3092 with non-standard calling convention. */
3093 unsigned int save_res:1;
3094
3095 /* Set if a duplicate symbol with non-zero localentry is detected,
3096 even when the duplicate symbol does not provide a definition. */
3097 unsigned int non_zero_localentry:1;
3098
3099 /* Contexts in which symbol is used in the GOT (or TOC).
3100 Bits are or'd into the mask as the corresponding relocs are
3101 encountered during check_relocs, with TLS_TLS being set when any
3102 of the other TLS bits are set. tls_optimize clears bits when
3103 optimizing to indicate the corresponding GOT entry type is not
3104 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3105 set TLS_GDIE when a GD reloc turns into an IE one.
3106 These flags are also kept for local symbols. */
3107 #define TLS_TLS 1 /* Any TLS reloc. */
3108 #define TLS_GD 2 /* GD reloc. */
3109 #define TLS_LD 4 /* LD reloc. */
3110 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3111 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3112 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3113 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3114 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3115 unsigned char tls_mask;
3116
3117 /* The above field is also used to mark function symbols. In which
3118 case TLS_TLS will be 0. */
3119 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3120 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3121 #define NON_GOT 256 /* local symbol plt, not stored. */
3122 };
3123
3124 static inline struct ppc_link_hash_entry *
3125 ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3126 {
3127 return (struct ppc_link_hash_entry *) ent;
3128 }
3129
3130 /* ppc64 ELF linker hash table. */
3131
3132 struct ppc_link_hash_table
3133 {
3134 struct elf_link_hash_table elf;
3135
3136 /* The stub hash table. */
3137 struct bfd_hash_table stub_hash_table;
3138
3139 /* Another hash table for plt_branch stubs. */
3140 struct bfd_hash_table branch_hash_table;
3141
3142 /* Hash table for function prologue tocsave. */
3143 htab_t tocsave_htab;
3144
3145 /* Various options and other info passed from the linker. */
3146 struct ppc64_elf_params *params;
3147
3148 /* The size of sec_info below. */
3149 unsigned int sec_info_arr_size;
3150
3151 /* Per-section array of extra section info. Done this way rather
3152 than as part of ppc64_elf_section_data so we have the info for
3153 non-ppc64 sections. */
3154 struct
3155 {
3156 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3157 bfd_vma toc_off;
3158
3159 union
3160 {
3161 /* The section group that this section belongs to. */
3162 struct map_stub *group;
3163 /* A temp section list pointer. */
3164 asection *list;
3165 } u;
3166 } *sec_info;
3167
3168 /* Linked list of groups. */
3169 struct map_stub *group;
3170
3171 /* Temp used when calculating TOC pointers. */
3172 bfd_vma toc_curr;
3173 bfd *toc_bfd;
3174 asection *toc_first_sec;
3175
3176 /* Used when adding symbols. */
3177 struct ppc_link_hash_entry *dot_syms;
3178
3179 /* Shortcuts to get to dynamic linker sections. */
3180 asection *glink;
3181 asection *global_entry;
3182 asection *sfpr;
3183 asection *pltlocal;
3184 asection *relpltlocal;
3185 asection *brlt;
3186 asection *relbrlt;
3187 asection *glink_eh_frame;
3188
3189 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3190 struct ppc_link_hash_entry *tls_get_addr;
3191 struct ppc_link_hash_entry *tls_get_addr_fd;
3192 struct ppc_link_hash_entry *tga_desc;
3193 struct ppc_link_hash_entry *tga_desc_fd;
3194 struct map_stub *tga_group;
3195
3196 /* The size of reliplt used by got entry relocs. */
3197 bfd_size_type got_reli_size;
3198
3199 /* Statistics. */
3200 unsigned long stub_count[ppc_stub_global_entry];
3201
3202 /* Number of stubs against global syms. */
3203 unsigned long stub_globals;
3204
3205 /* Set if we're linking code with function descriptors. */
3206 unsigned int opd_abi:1;
3207
3208 /* Support for multiple toc sections. */
3209 unsigned int do_multi_toc:1;
3210 unsigned int multi_toc_needed:1;
3211 unsigned int second_toc_pass:1;
3212 unsigned int do_toc_opt:1;
3213
3214 /* Set if tls optimization is enabled. */
3215 unsigned int do_tls_opt:1;
3216
3217 /* Set if inline plt calls should be converted to direct calls. */
3218 unsigned int can_convert_all_inline_plt:1;
3219
3220 /* Set on error. */
3221 unsigned int stub_error:1;
3222
3223 /* Whether func_desc_adjust needs to be run over symbols. */
3224 unsigned int need_func_desc_adj:1;
3225
3226 /* Whether there exist local gnu indirect function resolvers,
3227 referenced by dynamic relocations. */
3228 unsigned int local_ifunc_resolver:1;
3229 unsigned int maybe_local_ifunc_resolver:1;
3230
3231 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3232 unsigned int has_plt_localentry0:1;
3233
3234 /* Whether calls are made via the PLT from NOTOC functions. */
3235 unsigned int notoc_plt:1;
3236
3237 /* Whether to use power10 instructions in linkage stubs. */
3238 unsigned int power10_stubs:1;
3239
3240 /* Incremented every time we size stubs. */
3241 unsigned int stub_iteration;
3242
3243 /* Small local sym cache. */
3244 struct sym_cache sym_cache;
3245 };
3246
3247 /* Rename some of the generic section flags to better document how they
3248 are used here. */
3249
3250 /* Nonzero if this section has TLS related relocations. */
3251 #define has_tls_reloc sec_flg0
3252
3253 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3254 relocations. */
3255 #define nomark_tls_get_addr sec_flg1
3256
3257 /* Nonzero if this section has any toc or got relocs. */
3258 #define has_toc_reloc sec_flg2
3259
3260 /* Nonzero if this section has a call to another section that uses
3261 the toc or got. */
3262 #define makes_toc_func_call sec_flg3
3263
3264 /* Recursion protection when determining above flag. */
3265 #define call_check_in_progress sec_flg4
3266 #define call_check_done sec_flg5
3267
3268 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3269
3270 #define ppc_hash_table(p) \
3271 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3272 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3273
3274 #define ppc_stub_hash_lookup(table, string, create, copy) \
3275 ((struct ppc_stub_hash_entry *) \
3276 bfd_hash_lookup ((table), (string), (create), (copy)))
3277
3278 #define ppc_branch_hash_lookup(table, string, create, copy) \
3279 ((struct ppc_branch_hash_entry *) \
3280 bfd_hash_lookup ((table), (string), (create), (copy)))
3281
3282 /* Create an entry in the stub hash table. */
3283
3284 static struct bfd_hash_entry *
3285 stub_hash_newfunc (struct bfd_hash_entry *entry,
3286 struct bfd_hash_table *table,
3287 const char *string)
3288 {
3289 /* Allocate the structure if it has not already been allocated by a
3290 subclass. */
3291 if (entry == NULL)
3292 {
3293 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3294 if (entry == NULL)
3295 return entry;
3296 }
3297
3298 /* Call the allocation method of the superclass. */
3299 entry = bfd_hash_newfunc (entry, table, string);
3300 if (entry != NULL)
3301 {
3302 struct ppc_stub_hash_entry *eh;
3303
3304 /* Initialize the local fields. */
3305 eh = (struct ppc_stub_hash_entry *) entry;
3306 eh->stub_type = ppc_stub_none;
3307 eh->group = NULL;
3308 eh->stub_offset = 0;
3309 eh->target_value = 0;
3310 eh->target_section = NULL;
3311 eh->h = NULL;
3312 eh->plt_ent = NULL;
3313 eh->other = 0;
3314 }
3315
3316 return entry;
3317 }
3318
3319 /* Create an entry in the branch hash table. */
3320
3321 static struct bfd_hash_entry *
3322 branch_hash_newfunc (struct bfd_hash_entry *entry,
3323 struct bfd_hash_table *table,
3324 const char *string)
3325 {
3326 /* Allocate the structure if it has not already been allocated by a
3327 subclass. */
3328 if (entry == NULL)
3329 {
3330 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3331 if (entry == NULL)
3332 return entry;
3333 }
3334
3335 /* Call the allocation method of the superclass. */
3336 entry = bfd_hash_newfunc (entry, table, string);
3337 if (entry != NULL)
3338 {
3339 struct ppc_branch_hash_entry *eh;
3340
3341 /* Initialize the local fields. */
3342 eh = (struct ppc_branch_hash_entry *) entry;
3343 eh->offset = 0;
3344 eh->iter = 0;
3345 }
3346
3347 return entry;
3348 }
3349
3350 /* Create an entry in a ppc64 ELF linker hash table. */
3351
3352 static struct bfd_hash_entry *
3353 link_hash_newfunc (struct bfd_hash_entry *entry,
3354 struct bfd_hash_table *table,
3355 const char *string)
3356 {
3357 /* Allocate the structure if it has not already been allocated by a
3358 subclass. */
3359 if (entry == NULL)
3360 {
3361 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3362 if (entry == NULL)
3363 return entry;
3364 }
3365
3366 /* Call the allocation method of the superclass. */
3367 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3368 if (entry != NULL)
3369 {
3370 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3371
3372 memset (&eh->u.stub_cache, 0,
3373 (sizeof (struct ppc_link_hash_entry)
3374 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3375
3376 /* When making function calls, old ABI code references function entry
3377 points (dot symbols), while new ABI code references the function
3378 descriptor symbol. We need to make any combination of reference and
3379 definition work together, without breaking archive linking.
3380
3381 For a defined function "foo" and an undefined call to "bar":
3382 An old object defines "foo" and ".foo", references ".bar" (possibly
3383 "bar" too).
3384 A new object defines "foo" and references "bar".
3385
3386 A new object thus has no problem with its undefined symbols being
3387 satisfied by definitions in an old object. On the other hand, the
3388 old object won't have ".bar" satisfied by a new object.
3389
3390 Keep a list of newly added dot-symbols. */
3391
3392 if (string[0] == '.')
3393 {
3394 struct ppc_link_hash_table *htab;
3395
3396 htab = (struct ppc_link_hash_table *) table;
3397 eh->u.next_dot_sym = htab->dot_syms;
3398 htab->dot_syms = eh;
3399 }
3400 }
3401
3402 return entry;
3403 }
3404
3405 struct tocsave_entry
3406 {
3407 asection *sec;
3408 bfd_vma offset;
3409 };
3410
3411 static hashval_t
3412 tocsave_htab_hash (const void *p)
3413 {
3414 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3415 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3416 }
3417
3418 static int
3419 tocsave_htab_eq (const void *p1, const void *p2)
3420 {
3421 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3422 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3423 return e1->sec == e2->sec && e1->offset == e2->offset;
3424 }
3425
3426 /* Destroy a ppc64 ELF linker hash table. */
3427
3428 static void
3429 ppc64_elf_link_hash_table_free (bfd *obfd)
3430 {
3431 struct ppc_link_hash_table *htab;
3432
3433 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3434 if (htab->tocsave_htab)
3435 htab_delete (htab->tocsave_htab);
3436 bfd_hash_table_free (&htab->branch_hash_table);
3437 bfd_hash_table_free (&htab->stub_hash_table);
3438 _bfd_elf_link_hash_table_free (obfd);
3439 }
3440
3441 /* Create a ppc64 ELF linker hash table. */
3442
3443 static struct bfd_link_hash_table *
3444 ppc64_elf_link_hash_table_create (bfd *abfd)
3445 {
3446 struct ppc_link_hash_table *htab;
3447 size_t amt = sizeof (struct ppc_link_hash_table);
3448
3449 htab = bfd_zmalloc (amt);
3450 if (htab == NULL)
3451 return NULL;
3452
3453 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3454 sizeof (struct ppc_link_hash_entry),
3455 PPC64_ELF_DATA))
3456 {
3457 free (htab);
3458 return NULL;
3459 }
3460
3461 /* Init the stub hash table too. */
3462 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3463 sizeof (struct ppc_stub_hash_entry)))
3464 {
3465 _bfd_elf_link_hash_table_free (abfd);
3466 return NULL;
3467 }
3468
3469 /* And the branch hash table. */
3470 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3471 sizeof (struct ppc_branch_hash_entry)))
3472 {
3473 bfd_hash_table_free (&htab->stub_hash_table);
3474 _bfd_elf_link_hash_table_free (abfd);
3475 return NULL;
3476 }
3477
3478 htab->tocsave_htab = htab_try_create (1024,
3479 tocsave_htab_hash,
3480 tocsave_htab_eq,
3481 NULL);
3482 if (htab->tocsave_htab == NULL)
3483 {
3484 ppc64_elf_link_hash_table_free (abfd);
3485 return NULL;
3486 }
3487 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3488
3489 /* Initializing two fields of the union is just cosmetic. We really
3490 only care about glist, but when compiled on a 32-bit host the
3491 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3492 debugger inspection of these fields look nicer. */
3493 htab->elf.init_got_refcount.refcount = 0;
3494 htab->elf.init_got_refcount.glist = NULL;
3495 htab->elf.init_plt_refcount.refcount = 0;
3496 htab->elf.init_plt_refcount.glist = NULL;
3497 htab->elf.init_got_offset.offset = 0;
3498 htab->elf.init_got_offset.glist = NULL;
3499 htab->elf.init_plt_offset.offset = 0;
3500 htab->elf.init_plt_offset.glist = NULL;
3501
3502 return &htab->elf.root;
3503 }
3504
3505 /* Create sections for linker generated code. */
3506
3507 static bfd_boolean
3508 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3509 {
3510 struct ppc_link_hash_table *htab;
3511 flagword flags;
3512
3513 htab = ppc_hash_table (info);
3514
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3516 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 if (htab->params->save_restore_funcs)
3518 {
3519 /* Create .sfpr for code to save and restore fp regs. */
3520 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3521 flags);
3522 if (htab->sfpr == NULL
3523 || !bfd_set_section_alignment (htab->sfpr, 2))
3524 return FALSE;
3525 }
3526
3527 if (bfd_link_relocatable (info))
3528 return TRUE;
3529
3530 /* Create .glink for lazy dynamic linking support. */
3531 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3532 flags);
3533 if (htab->glink == NULL
3534 || !bfd_set_section_alignment (htab->glink, 3))
3535 return FALSE;
3536
3537 /* The part of .glink used by global entry stubs, separate so that
3538 it can be aligned appropriately without affecting htab->glink. */
3539 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3540 flags);
3541 if (htab->global_entry == NULL
3542 || !bfd_set_section_alignment (htab->global_entry, 2))
3543 return FALSE;
3544
3545 if (!info->no_ld_generated_unwind_info)
3546 {
3547 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3548 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3549 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3550 ".eh_frame",
3551 flags);
3552 if (htab->glink_eh_frame == NULL
3553 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3554 return FALSE;
3555 }
3556
3557 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3558 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3559 if (htab->elf.iplt == NULL
3560 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3561 return FALSE;
3562
3563 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3564 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3565 htab->elf.irelplt
3566 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3567 if (htab->elf.irelplt == NULL
3568 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3569 return FALSE;
3570
3571 /* Create branch lookup table for plt_branch stubs. */
3572 flags = (SEC_ALLOC | SEC_LOAD
3573 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3574 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3575 flags);
3576 if (htab->brlt == NULL
3577 || !bfd_set_section_alignment (htab->brlt, 3))
3578 return FALSE;
3579
3580 /* Local plt entries, put in .branch_lt but a separate section for
3581 convenience. */
3582 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3583 flags);
3584 if (htab->pltlocal == NULL
3585 || !bfd_set_section_alignment (htab->pltlocal, 3))
3586 return FALSE;
3587
3588 if (!bfd_link_pic (info))
3589 return TRUE;
3590
3591 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3592 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3593 htab->relbrlt
3594 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3595 if (htab->relbrlt == NULL
3596 || !bfd_set_section_alignment (htab->relbrlt, 3))
3597 return FALSE;
3598
3599 htab->relpltlocal
3600 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3601 if (htab->relpltlocal == NULL
3602 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3603 return FALSE;
3604
3605 return TRUE;
3606 }
3607
3608 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3609
3610 bfd_boolean
3611 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3612 struct ppc64_elf_params *params)
3613 {
3614 struct ppc_link_hash_table *htab;
3615
3616 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3617
3618 /* Always hook our dynamic sections into the first bfd, which is the
3619 linker created stub bfd. This ensures that the GOT header is at
3620 the start of the output TOC section. */
3621 htab = ppc_hash_table (info);
3622 htab->elf.dynobj = params->stub_bfd;
3623 htab->params = params;
3624
3625 return create_linkage_sections (htab->elf.dynobj, info);
3626 }
3627
3628 /* Build a name for an entry in the stub hash table. */
3629
3630 static char *
3631 ppc_stub_name (const asection *input_section,
3632 const asection *sym_sec,
3633 const struct ppc_link_hash_entry *h,
3634 const Elf_Internal_Rela *rel)
3635 {
3636 char *stub_name;
3637 ssize_t len;
3638
3639 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3640 offsets from a sym as a branch target? In fact, we could
3641 probably assume the addend is always zero. */
3642 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3643
3644 if (h)
3645 {
3646 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3647 stub_name = bfd_malloc (len);
3648 if (stub_name == NULL)
3649 return stub_name;
3650
3651 len = sprintf (stub_name, "%08x.%s+%x",
3652 input_section->id & 0xffffffff,
3653 h->elf.root.root.string,
3654 (int) rel->r_addend & 0xffffffff);
3655 }
3656 else
3657 {
3658 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3659 stub_name = bfd_malloc (len);
3660 if (stub_name == NULL)
3661 return stub_name;
3662
3663 len = sprintf (stub_name, "%08x.%x:%x+%x",
3664 input_section->id & 0xffffffff,
3665 sym_sec->id & 0xffffffff,
3666 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3667 (int) rel->r_addend & 0xffffffff);
3668 }
3669 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3670 stub_name[len - 2] = 0;
3671 return stub_name;
3672 }
3673
3674 /* Look up an entry in the stub hash. Stub entries are cached because
3675 creating the stub name takes a bit of time. */
3676
3677 static struct ppc_stub_hash_entry *
3678 ppc_get_stub_entry (const asection *input_section,
3679 const asection *sym_sec,
3680 struct ppc_link_hash_entry *h,
3681 const Elf_Internal_Rela *rel,
3682 struct ppc_link_hash_table *htab)
3683 {
3684 struct ppc_stub_hash_entry *stub_entry;
3685 struct map_stub *group;
3686
3687 /* If this input section is part of a group of sections sharing one
3688 stub section, then use the id of the first section in the group.
3689 Stub names need to include a section id, as there may well be
3690 more than one stub used to reach say, printf, and we need to
3691 distinguish between them. */
3692 group = htab->sec_info[input_section->id].u.group;
3693 if (group == NULL)
3694 return NULL;
3695
3696 if (h != NULL && h->u.stub_cache != NULL
3697 && h->u.stub_cache->h == h
3698 && h->u.stub_cache->group == group)
3699 {
3700 stub_entry = h->u.stub_cache;
3701 }
3702 else
3703 {
3704 char *stub_name;
3705
3706 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3707 if (stub_name == NULL)
3708 return NULL;
3709
3710 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3711 stub_name, FALSE, FALSE);
3712 if (h != NULL)
3713 h->u.stub_cache = stub_entry;
3714
3715 free (stub_name);
3716 }
3717
3718 return stub_entry;
3719 }
3720
3721 /* Add a new stub entry to the stub hash. Not all fields of the new
3722 stub entry are initialised. */
3723
3724 static struct ppc_stub_hash_entry *
3725 ppc_add_stub (const char *stub_name,
3726 asection *section,
3727 struct bfd_link_info *info)
3728 {
3729 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3730 struct map_stub *group;
3731 asection *link_sec;
3732 asection *stub_sec;
3733 struct ppc_stub_hash_entry *stub_entry;
3734
3735 group = htab->sec_info[section->id].u.group;
3736 link_sec = group->link_sec;
3737 stub_sec = group->stub_sec;
3738 if (stub_sec == NULL)
3739 {
3740 size_t namelen;
3741 bfd_size_type len;
3742 char *s_name;
3743
3744 namelen = strlen (link_sec->name);
3745 len = namelen + sizeof (STUB_SUFFIX);
3746 s_name = bfd_alloc (htab->params->stub_bfd, len);
3747 if (s_name == NULL)
3748 return NULL;
3749
3750 memcpy (s_name, link_sec->name, namelen);
3751 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3752 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3753 if (stub_sec == NULL)
3754 return NULL;
3755 group->stub_sec = stub_sec;
3756 }
3757
3758 /* Enter this entry into the linker stub hash table. */
3759 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3760 TRUE, FALSE);
3761 if (stub_entry == NULL)
3762 {
3763 /* xgettext:c-format */
3764 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3765 section->owner, stub_name);
3766 return NULL;
3767 }
3768
3769 stub_entry->group = group;
3770 stub_entry->stub_offset = 0;
3771 return stub_entry;
3772 }
3773
3774 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3775 not already done. */
3776
3777 static bfd_boolean
3778 create_got_section (bfd *abfd, struct bfd_link_info *info)
3779 {
3780 asection *got, *relgot;
3781 flagword flags;
3782 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3783
3784 if (!is_ppc64_elf (abfd))
3785 return FALSE;
3786 if (htab == NULL)
3787 return FALSE;
3788
3789 if (!htab->elf.sgot
3790 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3791 return FALSE;
3792
3793 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3794 | SEC_LINKER_CREATED);
3795
3796 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3797 if (!got
3798 || !bfd_set_section_alignment (got, 3))
3799 return FALSE;
3800
3801 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3802 flags | SEC_READONLY);
3803 if (!relgot
3804 || !bfd_set_section_alignment (relgot, 3))
3805 return FALSE;
3806
3807 ppc64_elf_tdata (abfd)->got = got;
3808 ppc64_elf_tdata (abfd)->relgot = relgot;
3809 return TRUE;
3810 }
3811
3812 /* Follow indirect and warning symbol links. */
3813
3814 static inline struct bfd_link_hash_entry *
3815 follow_link (struct bfd_link_hash_entry *h)
3816 {
3817 while (h->type == bfd_link_hash_indirect
3818 || h->type == bfd_link_hash_warning)
3819 h = h->u.i.link;
3820 return h;
3821 }
3822
3823 static inline struct elf_link_hash_entry *
3824 elf_follow_link (struct elf_link_hash_entry *h)
3825 {
3826 return (struct elf_link_hash_entry *) follow_link (&h->root);
3827 }
3828
3829 static inline struct ppc_link_hash_entry *
3830 ppc_follow_link (struct ppc_link_hash_entry *h)
3831 {
3832 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
3833 }
3834
3835 /* Merge PLT info on FROM with that on TO. */
3836
3837 static void
3838 move_plt_plist (struct ppc_link_hash_entry *from,
3839 struct ppc_link_hash_entry *to)
3840 {
3841 if (from->elf.plt.plist != NULL)
3842 {
3843 if (to->elf.plt.plist != NULL)
3844 {
3845 struct plt_entry **entp;
3846 struct plt_entry *ent;
3847
3848 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3849 {
3850 struct plt_entry *dent;
3851
3852 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3853 if (dent->addend == ent->addend)
3854 {
3855 dent->plt.refcount += ent->plt.refcount;
3856 *entp = ent->next;
3857 break;
3858 }
3859 if (dent == NULL)
3860 entp = &ent->next;
3861 }
3862 *entp = to->elf.plt.plist;
3863 }
3864
3865 to->elf.plt.plist = from->elf.plt.plist;
3866 from->elf.plt.plist = NULL;
3867 }
3868 }
3869
3870 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3871
3872 static void
3873 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3874 struct elf_link_hash_entry *dir,
3875 struct elf_link_hash_entry *ind)
3876 {
3877 struct ppc_link_hash_entry *edir, *eind;
3878
3879 edir = ppc_elf_hash_entry (dir);
3880 eind = ppc_elf_hash_entry (ind);
3881
3882 edir->is_func |= eind->is_func;
3883 edir->is_func_descriptor |= eind->is_func_descriptor;
3884 edir->tls_mask |= eind->tls_mask;
3885 if (eind->oh != NULL)
3886 edir->oh = ppc_follow_link (eind->oh);
3887
3888 if (edir->elf.versioned != versioned_hidden)
3889 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3890 edir->elf.ref_regular |= eind->elf.ref_regular;
3891 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3892 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3893 edir->elf.needs_plt |= eind->elf.needs_plt;
3894 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3895
3896 /* If we were called to copy over info for a weak sym, don't copy
3897 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3898 in order to simplify readonly_dynrelocs and save a field in the
3899 symbol hash entry, but that means dyn_relocs can't be used in any
3900 tests about a specific symbol, or affect other symbol flags which
3901 are then tested. */
3902 if (eind->elf.root.type != bfd_link_hash_indirect)
3903 return;
3904
3905 /* Copy over any dynamic relocs we may have on the indirect sym. */
3906 if (ind->dyn_relocs != NULL)
3907 {
3908 if (dir->dyn_relocs != NULL)
3909 {
3910 struct elf_dyn_relocs **pp;
3911 struct elf_dyn_relocs *p;
3912
3913 /* Add reloc counts against the indirect sym to the direct sym
3914 list. Merge any entries against the same section. */
3915 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3916 {
3917 struct elf_dyn_relocs *q;
3918
3919 for (q = dir->dyn_relocs; q != NULL; q = q->next)
3920 if (q->sec == p->sec)
3921 {
3922 q->pc_count += p->pc_count;
3923 q->count += p->count;
3924 *pp = p->next;
3925 break;
3926 }
3927 if (q == NULL)
3928 pp = &p->next;
3929 }
3930 *pp = dir->dyn_relocs;
3931 }
3932
3933 dir->dyn_relocs = ind->dyn_relocs;
3934 ind->dyn_relocs = NULL;
3935 }
3936
3937 /* Copy over got entries that we may have already seen to the
3938 symbol which just became indirect. */
3939 if (eind->elf.got.glist != NULL)
3940 {
3941 if (edir->elf.got.glist != NULL)
3942 {
3943 struct got_entry **entp;
3944 struct got_entry *ent;
3945
3946 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3947 {
3948 struct got_entry *dent;
3949
3950 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3951 if (dent->addend == ent->addend
3952 && dent->owner == ent->owner
3953 && dent->tls_type == ent->tls_type)
3954 {
3955 dent->got.refcount += ent->got.refcount;
3956 *entp = ent->next;
3957 break;
3958 }
3959 if (dent == NULL)
3960 entp = &ent->next;
3961 }
3962 *entp = edir->elf.got.glist;
3963 }
3964
3965 edir->elf.got.glist = eind->elf.got.glist;
3966 eind->elf.got.glist = NULL;
3967 }
3968
3969 /* And plt entries. */
3970 move_plt_plist (eind, edir);
3971
3972 if (eind->elf.dynindx != -1)
3973 {
3974 if (edir->elf.dynindx != -1)
3975 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3976 edir->elf.dynstr_index);
3977 edir->elf.dynindx = eind->elf.dynindx;
3978 edir->elf.dynstr_index = eind->elf.dynstr_index;
3979 eind->elf.dynindx = -1;
3980 eind->elf.dynstr_index = 0;
3981 }
3982 }
3983
3984 /* Find the function descriptor hash entry from the given function code
3985 hash entry FH. Link the entries via their OH fields. */
3986
3987 static struct ppc_link_hash_entry *
3988 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3989 {
3990 struct ppc_link_hash_entry *fdh = fh->oh;
3991
3992 if (fdh == NULL)
3993 {
3994 const char *fd_name = fh->elf.root.root.string + 1;
3995
3996 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
3997 FALSE, FALSE, FALSE));
3998 if (fdh == NULL)
3999 return fdh;
4000
4001 fdh->is_func_descriptor = 1;
4002 fdh->oh = fh;
4003 fh->is_func = 1;
4004 fh->oh = fdh;
4005 }
4006
4007 fdh = ppc_follow_link (fdh);
4008 fdh->is_func_descriptor = 1;
4009 fdh->oh = fh;
4010 return fdh;
4011 }
4012
4013 /* Make a fake function descriptor sym for the undefined code sym FH. */
4014
4015 static struct ppc_link_hash_entry *
4016 make_fdh (struct bfd_link_info *info,
4017 struct ppc_link_hash_entry *fh)
4018 {
4019 bfd *abfd = fh->elf.root.u.undef.abfd;
4020 struct bfd_link_hash_entry *bh = NULL;
4021 struct ppc_link_hash_entry *fdh;
4022 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4023 ? BSF_WEAK
4024 : BSF_GLOBAL);
4025
4026 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4027 fh->elf.root.root.string + 1,
4028 flags, bfd_und_section_ptr, 0,
4029 NULL, FALSE, FALSE, &bh))
4030 return NULL;
4031
4032 fdh = (struct ppc_link_hash_entry *) bh;
4033 fdh->elf.non_elf = 0;
4034 fdh->fake = 1;
4035 fdh->is_func_descriptor = 1;
4036 fdh->oh = fh;
4037 fh->is_func = 1;
4038 fh->oh = fdh;
4039 return fdh;
4040 }
4041
4042 /* Fix function descriptor symbols defined in .opd sections to be
4043 function type. */
4044
4045 static bfd_boolean
4046 ppc64_elf_add_symbol_hook (bfd *ibfd,
4047 struct bfd_link_info *info,
4048 Elf_Internal_Sym *isym,
4049 const char **name,
4050 flagword *flags ATTRIBUTE_UNUSED,
4051 asection **sec,
4052 bfd_vma *value)
4053 {
4054 if (*sec != NULL
4055 && strcmp ((*sec)->name, ".opd") == 0)
4056 {
4057 asection *code_sec;
4058
4059 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4060 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4061 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4062
4063 /* If the symbol is a function defined in .opd, and the function
4064 code is in a discarded group, let it appear to be undefined. */
4065 if (!bfd_link_relocatable (info)
4066 && (*sec)->reloc_count != 0
4067 && opd_entry_value (*sec, *value, &code_sec, NULL,
4068 FALSE) != (bfd_vma) -1
4069 && discarded_section (code_sec))
4070 {
4071 *sec = bfd_und_section_ptr;
4072 isym->st_shndx = SHN_UNDEF;
4073 }
4074 }
4075 else if (*sec != NULL
4076 && strcmp ((*sec)->name, ".toc") == 0
4077 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4078 {
4079 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4080 if (htab != NULL)
4081 htab->params->object_in_toc = 1;
4082 }
4083
4084 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4085 {
4086 if (abiversion (ibfd) == 0)
4087 set_abiversion (ibfd, 2);
4088 else if (abiversion (ibfd) == 1)
4089 {
4090 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4091 " for ABI version 1"), *name);
4092 bfd_set_error (bfd_error_bad_value);
4093 return FALSE;
4094 }
4095 }
4096
4097 return TRUE;
4098 }
4099
4100 /* Merge non-visibility st_other attributes: local entry point. */
4101
4102 static void
4103 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4104 const Elf_Internal_Sym *isym,
4105 bfd_boolean definition,
4106 bfd_boolean dynamic)
4107 {
4108 if (definition && (!dynamic || !h->def_regular))
4109 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4110 | ELF_ST_VISIBILITY (h->other));
4111 }
4112
4113 /* Hook called on merging a symbol. We use this to clear "fake" since
4114 we now have a real symbol. */
4115
4116 static bfd_boolean
4117 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4118 const Elf_Internal_Sym *isym,
4119 asection **psec ATTRIBUTE_UNUSED,
4120 bfd_boolean newdef ATTRIBUTE_UNUSED,
4121 bfd_boolean olddef ATTRIBUTE_UNUSED,
4122 bfd *oldbfd ATTRIBUTE_UNUSED,
4123 const asection *oldsec ATTRIBUTE_UNUSED)
4124 {
4125 ppc_elf_hash_entry (h)->fake = 0;
4126 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4127 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
4128 return TRUE;
4129 }
4130
4131 /* This function makes an old ABI object reference to ".bar" cause the
4132 inclusion of a new ABI object archive that defines "bar".
4133 NAME is a symbol defined in an archive. Return a symbol in the hash
4134 table that might be satisfied by the archive symbols. */
4135
4136 static struct elf_link_hash_entry *
4137 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4138 struct bfd_link_info *info,
4139 const char *name)
4140 {
4141 struct elf_link_hash_entry *h;
4142 char *dot_name;
4143 size_t len;
4144
4145 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4146 if (h != NULL
4147 /* Don't return this sym if it is a fake function descriptor
4148 created by add_symbol_adjust. */
4149 && !ppc_elf_hash_entry (h)->fake)
4150 return h;
4151
4152 if (name[0] == '.')
4153 return h;
4154
4155 len = strlen (name);
4156 dot_name = bfd_alloc (abfd, len + 2);
4157 if (dot_name == NULL)
4158 return (struct elf_link_hash_entry *) -1;
4159 dot_name[0] = '.';
4160 memcpy (dot_name + 1, name, len + 1);
4161 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4162 bfd_release (abfd, dot_name);
4163 if (h != NULL)
4164 return h;
4165
4166 if (strcmp (name, "__tls_get_addr_opt") == 0)
4167 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
4168 return h;
4169 }
4170
4171 /* This function satisfies all old ABI object references to ".bar" if a
4172 new ABI object defines "bar". Well, at least, undefined dot symbols
4173 are made weak. This stops later archive searches from including an
4174 object if we already have a function descriptor definition. It also
4175 prevents the linker complaining about undefined symbols.
4176 We also check and correct mismatched symbol visibility here. The
4177 most restrictive visibility of the function descriptor and the
4178 function entry symbol is used. */
4179
4180 static bfd_boolean
4181 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4182 {
4183 struct ppc_link_hash_table *htab;
4184 struct ppc_link_hash_entry *fdh;
4185
4186 if (eh->elf.root.type == bfd_link_hash_warning)
4187 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4188
4189 if (eh->elf.root.type == bfd_link_hash_indirect)
4190 return TRUE;
4191
4192 if (eh->elf.root.root.string[0] != '.')
4193 abort ();
4194
4195 htab = ppc_hash_table (info);
4196 if (htab == NULL)
4197 return FALSE;
4198
4199 fdh = lookup_fdh (eh, htab);
4200 if (fdh == NULL
4201 && !bfd_link_relocatable (info)
4202 && (eh->elf.root.type == bfd_link_hash_undefined
4203 || eh->elf.root.type == bfd_link_hash_undefweak)
4204 && eh->elf.ref_regular)
4205 {
4206 /* Make an undefined function descriptor sym, in order to
4207 pull in an --as-needed shared lib. Archives are handled
4208 elsewhere. */
4209 fdh = make_fdh (info, eh);
4210 if (fdh == NULL)
4211 return FALSE;
4212 }
4213
4214 if (fdh != NULL)
4215 {
4216 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4217 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4218
4219 /* Make both descriptor and entry symbol have the most
4220 constraining visibility of either symbol. */
4221 if (entry_vis < descr_vis)
4222 fdh->elf.other += entry_vis - descr_vis;
4223 else if (entry_vis > descr_vis)
4224 eh->elf.other += descr_vis - entry_vis;
4225
4226 /* Propagate reference flags from entry symbol to function
4227 descriptor symbol. */
4228 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4229 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4230 fdh->elf.ref_regular |= eh->elf.ref_regular;
4231 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4232
4233 if (!fdh->elf.forced_local
4234 && fdh->elf.dynindx == -1
4235 && fdh->elf.versioned != versioned_hidden
4236 && (bfd_link_dll (info)
4237 || fdh->elf.def_dynamic
4238 || fdh->elf.ref_dynamic)
4239 && (eh->elf.ref_regular
4240 || eh->elf.def_regular))
4241 {
4242 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4243 return FALSE;
4244 }
4245 }
4246
4247 return TRUE;
4248 }
4249
4250 /* Set up opd section info and abiversion for IBFD, and process list
4251 of dot-symbols we made in link_hash_newfunc. */
4252
4253 static bfd_boolean
4254 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4255 {
4256 struct ppc_link_hash_table *htab;
4257 struct ppc_link_hash_entry **p, *eh;
4258 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4259
4260 if (opd != NULL && opd->size != 0)
4261 {
4262 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4263 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4264
4265 if (abiversion (ibfd) == 0)
4266 set_abiversion (ibfd, 1);
4267 else if (abiversion (ibfd) >= 2)
4268 {
4269 /* xgettext:c-format */
4270 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4271 ibfd, abiversion (ibfd));
4272 bfd_set_error (bfd_error_bad_value);
4273 return FALSE;
4274 }
4275 }
4276
4277 if (is_ppc64_elf (info->output_bfd))
4278 {
4279 /* For input files without an explicit abiversion in e_flags
4280 we should have flagged any with symbol st_other bits set
4281 as ELFv1 and above flagged those with .opd as ELFv2.
4282 Set the output abiversion if not yet set, and for any input
4283 still ambiguous, take its abiversion from the output.
4284 Differences in ABI are reported later. */
4285 if (abiversion (info->output_bfd) == 0)
4286 set_abiversion (info->output_bfd, abiversion (ibfd));
4287 else if (abiversion (ibfd) == 0)
4288 set_abiversion (ibfd, abiversion (info->output_bfd));
4289 }
4290
4291 htab = ppc_hash_table (info);
4292 if (htab == NULL)
4293 return TRUE;
4294
4295 if (opd != NULL && opd->size != 0
4296 && (ibfd->flags & DYNAMIC) == 0
4297 && (opd->flags & SEC_RELOC) != 0
4298 && opd->reloc_count != 0
4299 && !bfd_is_abs_section (opd->output_section)
4300 && info->gc_sections)
4301 {
4302 /* Garbage collection needs some extra help with .opd sections.
4303 We don't want to necessarily keep everything referenced by
4304 relocs in .opd, as that would keep all functions. Instead,
4305 if we reference an .opd symbol (a function descriptor), we
4306 want to keep the function code symbol's section. This is
4307 easy for global symbols, but for local syms we need to keep
4308 information about the associated function section. */
4309 bfd_size_type amt;
4310 asection **opd_sym_map;
4311 Elf_Internal_Shdr *symtab_hdr;
4312 Elf_Internal_Rela *relocs, *rel_end, *rel;
4313
4314 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4315 opd_sym_map = bfd_zalloc (ibfd, amt);
4316 if (opd_sym_map == NULL)
4317 return FALSE;
4318 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4319 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4320 info->keep_memory);
4321 if (relocs == NULL)
4322 return FALSE;
4323 symtab_hdr = &elf_symtab_hdr (ibfd);
4324 rel_end = relocs + opd->reloc_count - 1;
4325 for (rel = relocs; rel < rel_end; rel++)
4326 {
4327 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4328 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4329
4330 if (r_type == R_PPC64_ADDR64
4331 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4332 && r_symndx < symtab_hdr->sh_info)
4333 {
4334 Elf_Internal_Sym *isym;
4335 asection *s;
4336
4337 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4338 if (isym == NULL)
4339 {
4340 if (elf_section_data (opd)->relocs != relocs)
4341 free (relocs);
4342 return FALSE;
4343 }
4344
4345 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4346 if (s != NULL && s != opd)
4347 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4348 }
4349 }
4350 if (elf_section_data (opd)->relocs != relocs)
4351 free (relocs);
4352 }
4353
4354 p = &htab->dot_syms;
4355 while ((eh = *p) != NULL)
4356 {
4357 *p = NULL;
4358 if (&eh->elf == htab->elf.hgot)
4359 ;
4360 else if (htab->elf.hgot == NULL
4361 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4362 htab->elf.hgot = &eh->elf;
4363 else if (abiversion (ibfd) <= 1)
4364 {
4365 htab->need_func_desc_adj = 1;
4366 if (!add_symbol_adjust (eh, info))
4367 return FALSE;
4368 }
4369 p = &eh->u.next_dot_sym;
4370 }
4371 return TRUE;
4372 }
4373
4374 /* Undo hash table changes when an --as-needed input file is determined
4375 not to be needed. */
4376
4377 static bfd_boolean
4378 ppc64_elf_notice_as_needed (bfd *ibfd,
4379 struct bfd_link_info *info,
4380 enum notice_asneeded_action act)
4381 {
4382 if (act == notice_not_needed)
4383 {
4384 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4385
4386 if (htab == NULL)
4387 return FALSE;
4388
4389 htab->dot_syms = NULL;
4390 }
4391 return _bfd_elf_notice_as_needed (ibfd, info, act);
4392 }
4393
4394 /* If --just-symbols against a final linked binary, then assume we need
4395 toc adjusting stubs when calling functions defined there. */
4396
4397 static void
4398 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4399 {
4400 if ((sec->flags & SEC_CODE) != 0
4401 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4402 && is_ppc64_elf (sec->owner))
4403 {
4404 if (abiversion (sec->owner) >= 2
4405 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4406 sec->has_toc_reloc = 1;
4407 }
4408 _bfd_elf_link_just_syms (sec, info);
4409 }
4410
4411 static struct plt_entry **
4412 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4413 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4414 {
4415 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4416 struct plt_entry **local_plt;
4417 unsigned char *local_got_tls_masks;
4418
4419 if (local_got_ents == NULL)
4420 {
4421 bfd_size_type size = symtab_hdr->sh_info;
4422
4423 size *= (sizeof (*local_got_ents)
4424 + sizeof (*local_plt)
4425 + sizeof (*local_got_tls_masks));
4426 local_got_ents = bfd_zalloc (abfd, size);
4427 if (local_got_ents == NULL)
4428 return NULL;
4429 elf_local_got_ents (abfd) = local_got_ents;
4430 }
4431
4432 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4433 {
4434 struct got_entry *ent;
4435
4436 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4437 if (ent->addend == r_addend
4438 && ent->owner == abfd
4439 && ent->tls_type == tls_type)
4440 break;
4441 if (ent == NULL)
4442 {
4443 size_t amt = sizeof (*ent);
4444 ent = bfd_alloc (abfd, amt);
4445 if (ent == NULL)
4446 return FALSE;
4447 ent->next = local_got_ents[r_symndx];
4448 ent->addend = r_addend;
4449 ent->owner = abfd;
4450 ent->tls_type = tls_type;
4451 ent->is_indirect = FALSE;
4452 ent->got.refcount = 0;
4453 local_got_ents[r_symndx] = ent;
4454 }
4455 ent->got.refcount += 1;
4456 }
4457
4458 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4459 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4460 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4461
4462 return local_plt + r_symndx;
4463 }
4464
4465 static bfd_boolean
4466 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4467 {
4468 struct plt_entry *ent;
4469
4470 for (ent = *plist; ent != NULL; ent = ent->next)
4471 if (ent->addend == addend)
4472 break;
4473 if (ent == NULL)
4474 {
4475 size_t amt = sizeof (*ent);
4476 ent = bfd_alloc (abfd, amt);
4477 if (ent == NULL)
4478 return FALSE;
4479 ent->next = *plist;
4480 ent->addend = addend;
4481 ent->plt.refcount = 0;
4482 *plist = ent;
4483 }
4484 ent->plt.refcount += 1;
4485 return TRUE;
4486 }
4487
4488 static bfd_boolean
4489 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4490 {
4491 return (r_type == R_PPC64_REL24
4492 || r_type == R_PPC64_REL24_NOTOC
4493 || r_type == R_PPC64_REL14
4494 || r_type == R_PPC64_REL14_BRTAKEN
4495 || r_type == R_PPC64_REL14_BRNTAKEN
4496 || r_type == R_PPC64_ADDR24
4497 || r_type == R_PPC64_ADDR14
4498 || r_type == R_PPC64_ADDR14_BRTAKEN
4499 || r_type == R_PPC64_ADDR14_BRNTAKEN
4500 || r_type == R_PPC64_PLTCALL
4501 || r_type == R_PPC64_PLTCALL_NOTOC);
4502 }
4503
4504 /* Relocs on inline plt call sequence insns prior to the call. */
4505
4506 static bfd_boolean
4507 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4508 {
4509 return (r_type == R_PPC64_PLT16_HA
4510 || r_type == R_PPC64_PLT16_HI
4511 || r_type == R_PPC64_PLT16_LO
4512 || r_type == R_PPC64_PLT16_LO_DS
4513 || r_type == R_PPC64_PLT_PCREL34
4514 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4515 || r_type == R_PPC64_PLTSEQ
4516 || r_type == R_PPC64_PLTSEQ_NOTOC);
4517 }
4518
4519 /* Look through the relocs for a section during the first phase, and
4520 calculate needed space in the global offset table, procedure
4521 linkage table, and dynamic reloc sections. */
4522
4523 static bfd_boolean
4524 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4525 asection *sec, const Elf_Internal_Rela *relocs)
4526 {
4527 struct ppc_link_hash_table *htab;
4528 Elf_Internal_Shdr *symtab_hdr;
4529 struct elf_link_hash_entry **sym_hashes;
4530 const Elf_Internal_Rela *rel;
4531 const Elf_Internal_Rela *rel_end;
4532 asection *sreloc;
4533 struct elf_link_hash_entry *tga, *dottga;
4534 bfd_boolean is_opd;
4535
4536 if (bfd_link_relocatable (info))
4537 return TRUE;
4538
4539 /* Don't do anything special with non-loaded, non-alloced sections.
4540 In particular, any relocs in such sections should not affect GOT
4541 and PLT reference counting (ie. we don't allow them to create GOT
4542 or PLT entries), there's no possibility or desire to optimize TLS
4543 relocs, and there's not much point in propagating relocs to shared
4544 libs that the dynamic linker won't relocate. */
4545 if ((sec->flags & SEC_ALLOC) == 0)
4546 return TRUE;
4547
4548 BFD_ASSERT (is_ppc64_elf (abfd));
4549
4550 htab = ppc_hash_table (info);
4551 if (htab == NULL)
4552 return FALSE;
4553
4554 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4555 FALSE, FALSE, TRUE);
4556 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4557 FALSE, FALSE, TRUE);
4558 symtab_hdr = &elf_symtab_hdr (abfd);
4559 sym_hashes = elf_sym_hashes (abfd);
4560 sreloc = NULL;
4561 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4562 rel_end = relocs + sec->reloc_count;
4563 for (rel = relocs; rel < rel_end; rel++)
4564 {
4565 unsigned long r_symndx;
4566 struct elf_link_hash_entry *h;
4567 enum elf_ppc64_reloc_type r_type;
4568 int tls_type;
4569 struct _ppc64_elf_section_data *ppc64_sec;
4570 struct plt_entry **ifunc, **plt_list;
4571
4572 r_symndx = ELF64_R_SYM (rel->r_info);
4573 if (r_symndx < symtab_hdr->sh_info)
4574 h = NULL;
4575 else
4576 {
4577 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4578 h = elf_follow_link (h);
4579
4580 if (h == htab->elf.hgot)
4581 sec->has_toc_reloc = 1;
4582 }
4583
4584 r_type = ELF64_R_TYPE (rel->r_info);
4585 switch (r_type)
4586 {
4587 case R_PPC64_D34:
4588 case R_PPC64_D34_LO:
4589 case R_PPC64_D34_HI30:
4590 case R_PPC64_D34_HA30:
4591 case R_PPC64_D28:
4592 case R_PPC64_TPREL34:
4593 case R_PPC64_DTPREL34:
4594 case R_PPC64_PCREL34:
4595 case R_PPC64_GOT_PCREL34:
4596 case R_PPC64_GOT_TLSGD34:
4597 case R_PPC64_GOT_TLSLD34:
4598 case R_PPC64_GOT_TPREL34:
4599 case R_PPC64_GOT_DTPREL34:
4600 case R_PPC64_PLT_PCREL34:
4601 case R_PPC64_PLT_PCREL34_NOTOC:
4602 case R_PPC64_PCREL28:
4603 htab->power10_stubs = 1;
4604 break;
4605 default:
4606 break;
4607 }
4608
4609 switch (r_type)
4610 {
4611 case R_PPC64_PLT16_HA:
4612 case R_PPC64_GOT_TLSLD16_HA:
4613 case R_PPC64_GOT_TLSGD16_HA:
4614 case R_PPC64_GOT_TPREL16_HA:
4615 case R_PPC64_GOT_DTPREL16_HA:
4616 case R_PPC64_GOT16_HA:
4617 case R_PPC64_TOC16_HA:
4618 case R_PPC64_PLT16_LO:
4619 case R_PPC64_PLT16_LO_DS:
4620 case R_PPC64_GOT_TLSLD16_LO:
4621 case R_PPC64_GOT_TLSGD16_LO:
4622 case R_PPC64_GOT_TPREL16_LO_DS:
4623 case R_PPC64_GOT_DTPREL16_LO_DS:
4624 case R_PPC64_GOT16_LO:
4625 case R_PPC64_GOT16_LO_DS:
4626 case R_PPC64_TOC16_LO:
4627 case R_PPC64_TOC16_LO_DS:
4628 case R_PPC64_GOT_PCREL34:
4629 ppc64_elf_tdata (abfd)->has_optrel = 1;
4630 ppc64_elf_section_data (sec)->has_optrel = 1;
4631 break;
4632 default:
4633 break;
4634 }
4635
4636 ifunc = NULL;
4637 if (h != NULL)
4638 {
4639 if (h->type == STT_GNU_IFUNC)
4640 {
4641 h->needs_plt = 1;
4642 ifunc = &h->plt.plist;
4643 }
4644 }
4645 else
4646 {
4647 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4648 abfd, r_symndx);
4649 if (isym == NULL)
4650 return FALSE;
4651
4652 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4653 {
4654 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4655 rel->r_addend,
4656 NON_GOT | PLT_IFUNC);
4657 if (ifunc == NULL)
4658 return FALSE;
4659 }
4660 }
4661
4662 tls_type = 0;
4663 switch (r_type)
4664 {
4665 case R_PPC64_TLSGD:
4666 case R_PPC64_TLSLD:
4667 /* These special tls relocs tie a call to __tls_get_addr with
4668 its parameter symbol. */
4669 if (h != NULL)
4670 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4671 else
4672 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4673 rel->r_addend,
4674 NON_GOT | TLS_TLS | TLS_MARK))
4675 return FALSE;
4676 sec->has_tls_reloc = 1;
4677 break;
4678
4679 case R_PPC64_GOT_TLSLD16:
4680 case R_PPC64_GOT_TLSLD16_LO:
4681 case R_PPC64_GOT_TLSLD16_HI:
4682 case R_PPC64_GOT_TLSLD16_HA:
4683 case R_PPC64_GOT_TLSLD34:
4684 tls_type = TLS_TLS | TLS_LD;
4685 goto dogottls;
4686
4687 case R_PPC64_GOT_TLSGD16:
4688 case R_PPC64_GOT_TLSGD16_LO:
4689 case R_PPC64_GOT_TLSGD16_HI:
4690 case R_PPC64_GOT_TLSGD16_HA:
4691 case R_PPC64_GOT_TLSGD34:
4692 tls_type = TLS_TLS | TLS_GD;
4693 goto dogottls;
4694
4695 case R_PPC64_GOT_TPREL16_DS:
4696 case R_PPC64_GOT_TPREL16_LO_DS:
4697 case R_PPC64_GOT_TPREL16_HI:
4698 case R_PPC64_GOT_TPREL16_HA:
4699 case R_PPC64_GOT_TPREL34:
4700 if (bfd_link_dll (info))
4701 info->flags |= DF_STATIC_TLS;
4702 tls_type = TLS_TLS | TLS_TPREL;
4703 goto dogottls;
4704
4705 case R_PPC64_GOT_DTPREL16_DS:
4706 case R_PPC64_GOT_DTPREL16_LO_DS:
4707 case R_PPC64_GOT_DTPREL16_HI:
4708 case R_PPC64_GOT_DTPREL16_HA:
4709 case R_PPC64_GOT_DTPREL34:
4710 tls_type = TLS_TLS | TLS_DTPREL;
4711 dogottls:
4712 sec->has_tls_reloc = 1;
4713 goto dogot;
4714
4715 case R_PPC64_GOT16:
4716 case R_PPC64_GOT16_LO:
4717 case R_PPC64_GOT16_HI:
4718 case R_PPC64_GOT16_HA:
4719 case R_PPC64_GOT16_DS:
4720 case R_PPC64_GOT16_LO_DS:
4721 case R_PPC64_GOT_PCREL34:
4722 dogot:
4723 /* This symbol requires a global offset table entry. */
4724 sec->has_toc_reloc = 1;
4725 if (r_type == R_PPC64_GOT_TLSLD16
4726 || r_type == R_PPC64_GOT_TLSGD16
4727 || r_type == R_PPC64_GOT_TPREL16_DS
4728 || r_type == R_PPC64_GOT_DTPREL16_DS
4729 || r_type == R_PPC64_GOT16
4730 || r_type == R_PPC64_GOT16_DS)
4731 {
4732 htab->do_multi_toc = 1;
4733 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4734 }
4735
4736 if (ppc64_elf_tdata (abfd)->got == NULL
4737 && !create_got_section (abfd, info))
4738 return FALSE;
4739
4740 if (h != NULL)
4741 {
4742 struct ppc_link_hash_entry *eh;
4743 struct got_entry *ent;
4744
4745 eh = ppc_elf_hash_entry (h);
4746 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4747 if (ent->addend == rel->r_addend
4748 && ent->owner == abfd
4749 && ent->tls_type == tls_type)
4750 break;
4751 if (ent == NULL)
4752 {
4753 size_t amt = sizeof (*ent);
4754 ent = bfd_alloc (abfd, amt);
4755 if (ent == NULL)
4756 return FALSE;
4757 ent->next = eh->elf.got.glist;
4758 ent->addend = rel->r_addend;
4759 ent->owner = abfd;
4760 ent->tls_type = tls_type;
4761 ent->is_indirect = FALSE;
4762 ent->got.refcount = 0;
4763 eh->elf.got.glist = ent;
4764 }
4765 ent->got.refcount += 1;
4766 eh->tls_mask |= tls_type;
4767 }
4768 else
4769 /* This is a global offset table entry for a local symbol. */
4770 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4771 rel->r_addend, tls_type))
4772 return FALSE;
4773 break;
4774
4775 case R_PPC64_PLT16_HA:
4776 case R_PPC64_PLT16_HI:
4777 case R_PPC64_PLT16_LO:
4778 case R_PPC64_PLT16_LO_DS:
4779 case R_PPC64_PLT_PCREL34:
4780 case R_PPC64_PLT_PCREL34_NOTOC:
4781 case R_PPC64_PLT32:
4782 case R_PPC64_PLT64:
4783 /* This symbol requires a procedure linkage table entry. */
4784 plt_list = ifunc;
4785 if (h != NULL)
4786 {
4787 h->needs_plt = 1;
4788 if (h->root.root.string[0] == '.'
4789 && h->root.root.string[1] != '\0')
4790 ppc_elf_hash_entry (h)->is_func = 1;
4791 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
4792 plt_list = &h->plt.plist;
4793 }
4794 if (plt_list == NULL)
4795 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4796 rel->r_addend,
4797 NON_GOT | PLT_KEEP);
4798 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4799 return FALSE;
4800 break;
4801
4802 /* The following relocations don't need to propagate the
4803 relocation if linking a shared object since they are
4804 section relative. */
4805 case R_PPC64_SECTOFF:
4806 case R_PPC64_SECTOFF_LO:
4807 case R_PPC64_SECTOFF_HI:
4808 case R_PPC64_SECTOFF_HA:
4809 case R_PPC64_SECTOFF_DS:
4810 case R_PPC64_SECTOFF_LO_DS:
4811 case R_PPC64_DTPREL16:
4812 case R_PPC64_DTPREL16_LO:
4813 case R_PPC64_DTPREL16_HI:
4814 case R_PPC64_DTPREL16_HA:
4815 case R_PPC64_DTPREL16_DS:
4816 case R_PPC64_DTPREL16_LO_DS:
4817 case R_PPC64_DTPREL16_HIGH:
4818 case R_PPC64_DTPREL16_HIGHA:
4819 case R_PPC64_DTPREL16_HIGHER:
4820 case R_PPC64_DTPREL16_HIGHERA:
4821 case R_PPC64_DTPREL16_HIGHEST:
4822 case R_PPC64_DTPREL16_HIGHESTA:
4823 break;
4824
4825 /* Nor do these. */
4826 case R_PPC64_REL16:
4827 case R_PPC64_REL16_LO:
4828 case R_PPC64_REL16_HI:
4829 case R_PPC64_REL16_HA:
4830 case R_PPC64_REL16_HIGH:
4831 case R_PPC64_REL16_HIGHA:
4832 case R_PPC64_REL16_HIGHER:
4833 case R_PPC64_REL16_HIGHERA:
4834 case R_PPC64_REL16_HIGHEST:
4835 case R_PPC64_REL16_HIGHESTA:
4836 case R_PPC64_REL16_HIGHER34:
4837 case R_PPC64_REL16_HIGHERA34:
4838 case R_PPC64_REL16_HIGHEST34:
4839 case R_PPC64_REL16_HIGHESTA34:
4840 case R_PPC64_REL16DX_HA:
4841 break;
4842
4843 /* Not supported as a dynamic relocation. */
4844 case R_PPC64_ADDR64_LOCAL:
4845 if (bfd_link_pic (info))
4846 {
4847 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4848 ppc_howto_init ();
4849 /* xgettext:c-format */
4850 info->callbacks->einfo (_("%H: %s reloc unsupported "
4851 "in shared libraries and PIEs\n"),
4852 abfd, sec, rel->r_offset,
4853 ppc64_elf_howto_table[r_type]->name);
4854 bfd_set_error (bfd_error_bad_value);
4855 return FALSE;
4856 }
4857 break;
4858
4859 case R_PPC64_TOC16:
4860 case R_PPC64_TOC16_DS:
4861 htab->do_multi_toc = 1;
4862 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4863 /* Fall through. */
4864 case R_PPC64_TOC16_LO:
4865 case R_PPC64_TOC16_HI:
4866 case R_PPC64_TOC16_HA:
4867 case R_PPC64_TOC16_LO_DS:
4868 sec->has_toc_reloc = 1;
4869 if (h != NULL && bfd_link_executable (info))
4870 {
4871 /* We may need a copy reloc. */
4872 h->non_got_ref = 1;
4873 /* Strongly prefer a copy reloc over a dynamic reloc.
4874 glibc ld.so as of 2019-08 will error out if one of
4875 these relocations is emitted. */
4876 h->needs_copy = 1;
4877 goto dodyn;
4878 }
4879 break;
4880
4881 /* Marker reloc. */
4882 case R_PPC64_ENTRY:
4883 break;
4884
4885 /* This relocation describes the C++ object vtable hierarchy.
4886 Reconstruct it for later use during GC. */
4887 case R_PPC64_GNU_VTINHERIT:
4888 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4889 return FALSE;
4890 break;
4891
4892 /* This relocation describes which C++ vtable entries are actually
4893 used. Record for later use during GC. */
4894 case R_PPC64_GNU_VTENTRY:
4895 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4896 return FALSE;
4897 break;
4898
4899 case R_PPC64_REL14:
4900 case R_PPC64_REL14_BRTAKEN:
4901 case R_PPC64_REL14_BRNTAKEN:
4902 {
4903 asection *dest = NULL;
4904
4905 /* Heuristic: If jumping outside our section, chances are
4906 we are going to need a stub. */
4907 if (h != NULL)
4908 {
4909 /* If the sym is weak it may be overridden later, so
4910 don't assume we know where a weak sym lives. */
4911 if (h->root.type == bfd_link_hash_defined)
4912 dest = h->root.u.def.section;
4913 }
4914 else
4915 {
4916 Elf_Internal_Sym *isym;
4917
4918 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4919 abfd, r_symndx);
4920 if (isym == NULL)
4921 return FALSE;
4922
4923 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4924 }
4925
4926 if (dest != sec)
4927 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4928 }
4929 goto rel24;
4930
4931 case R_PPC64_PLTCALL:
4932 case R_PPC64_PLTCALL_NOTOC:
4933 ppc64_elf_section_data (sec)->has_pltcall = 1;
4934 /* Fall through. */
4935
4936 case R_PPC64_REL24:
4937 case R_PPC64_REL24_NOTOC:
4938 rel24:
4939 plt_list = ifunc;
4940 if (h != NULL)
4941 {
4942 h->needs_plt = 1;
4943 if (h->root.root.string[0] == '.'
4944 && h->root.root.string[1] != '\0')
4945 ppc_elf_hash_entry (h)->is_func = 1;
4946
4947 if (h == tga || h == dottga)
4948 {
4949 sec->has_tls_reloc = 1;
4950 if (rel != relocs
4951 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4952 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4953 /* We have a new-style __tls_get_addr call with
4954 a marker reloc. */
4955 ;
4956 else
4957 /* Mark this section as having an old-style call. */
4958 sec->nomark_tls_get_addr = 1;
4959 }
4960 plt_list = &h->plt.plist;
4961 }
4962
4963 /* We may need a .plt entry if the function this reloc
4964 refers to is in a shared lib. */
4965 if (plt_list
4966 && !update_plt_info (abfd, plt_list, rel->r_addend))
4967 return FALSE;
4968 break;
4969
4970 case R_PPC64_ADDR14:
4971 case R_PPC64_ADDR14_BRNTAKEN:
4972 case R_PPC64_ADDR14_BRTAKEN:
4973 case R_PPC64_ADDR24:
4974 goto dodyn;
4975
4976 case R_PPC64_TPREL64:
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4978 if (bfd_link_dll (info))
4979 info->flags |= DF_STATIC_TLS;
4980 goto dotlstoc;
4981
4982 case R_PPC64_DTPMOD64:
4983 if (rel + 1 < rel_end
4984 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4985 && rel[1].r_offset == rel->r_offset + 8)
4986 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4987 else
4988 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4989 goto dotlstoc;
4990
4991 case R_PPC64_DTPREL64:
4992 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4993 if (rel != relocs
4994 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4995 && rel[-1].r_offset == rel->r_offset - 8)
4996 /* This is the second reloc of a dtpmod, dtprel pair.
4997 Don't mark with TLS_DTPREL. */
4998 goto dodyn;
4999
5000 dotlstoc:
5001 sec->has_tls_reloc = 1;
5002 if (h != NULL)
5003 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
5004 else
5005 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5006 rel->r_addend, tls_type))
5007 return FALSE;
5008
5009 ppc64_sec = ppc64_elf_section_data (sec);
5010 if (ppc64_sec->sec_type != sec_toc)
5011 {
5012 bfd_size_type amt;
5013
5014 /* One extra to simplify get_tls_mask. */
5015 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5016 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5017 if (ppc64_sec->u.toc.symndx == NULL)
5018 return FALSE;
5019 amt = sec->size * sizeof (bfd_vma) / 8;
5020 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5021 if (ppc64_sec->u.toc.add == NULL)
5022 return FALSE;
5023 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5024 ppc64_sec->sec_type = sec_toc;
5025 }
5026 BFD_ASSERT (rel->r_offset % 8 == 0);
5027 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5028 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5029
5030 /* Mark the second slot of a GD or LD entry.
5031 -1 to indicate GD and -2 to indicate LD. */
5032 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5033 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5034 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5035 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5036 goto dodyn;
5037
5038 case R_PPC64_TPREL16:
5039 case R_PPC64_TPREL16_LO:
5040 case R_PPC64_TPREL16_HI:
5041 case R_PPC64_TPREL16_HA:
5042 case R_PPC64_TPREL16_DS:
5043 case R_PPC64_TPREL16_LO_DS:
5044 case R_PPC64_TPREL16_HIGH:
5045 case R_PPC64_TPREL16_HIGHA:
5046 case R_PPC64_TPREL16_HIGHER:
5047 case R_PPC64_TPREL16_HIGHERA:
5048 case R_PPC64_TPREL16_HIGHEST:
5049 case R_PPC64_TPREL16_HIGHESTA:
5050 case R_PPC64_TPREL34:
5051 if (bfd_link_dll (info))
5052 info->flags |= DF_STATIC_TLS;
5053 goto dodyn;
5054
5055 case R_PPC64_ADDR64:
5056 if (is_opd
5057 && rel + 1 < rel_end
5058 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5059 {
5060 if (h != NULL)
5061 ppc_elf_hash_entry (h)->is_func = 1;
5062 }
5063 /* Fall through. */
5064
5065 case R_PPC64_ADDR16:
5066 case R_PPC64_ADDR16_DS:
5067 case R_PPC64_ADDR16_HA:
5068 case R_PPC64_ADDR16_HI:
5069 case R_PPC64_ADDR16_HIGH:
5070 case R_PPC64_ADDR16_HIGHA:
5071 case R_PPC64_ADDR16_HIGHER:
5072 case R_PPC64_ADDR16_HIGHERA:
5073 case R_PPC64_ADDR16_HIGHEST:
5074 case R_PPC64_ADDR16_HIGHESTA:
5075 case R_PPC64_ADDR16_LO:
5076 case R_PPC64_ADDR16_LO_DS:
5077 case R_PPC64_D34:
5078 case R_PPC64_D34_LO:
5079 case R_PPC64_D34_HI30:
5080 case R_PPC64_D34_HA30:
5081 case R_PPC64_ADDR16_HIGHER34:
5082 case R_PPC64_ADDR16_HIGHERA34:
5083 case R_PPC64_ADDR16_HIGHEST34:
5084 case R_PPC64_ADDR16_HIGHESTA34:
5085 case R_PPC64_D28:
5086 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5087 && rel->r_addend == 0)
5088 {
5089 /* We may need a .plt entry if this reloc refers to a
5090 function in a shared lib. */
5091 if (!update_plt_info (abfd, &h->plt.plist, 0))
5092 return FALSE;
5093 h->pointer_equality_needed = 1;
5094 }
5095 /* Fall through. */
5096
5097 case R_PPC64_REL30:
5098 case R_PPC64_REL32:
5099 case R_PPC64_REL64:
5100 case R_PPC64_ADDR32:
5101 case R_PPC64_UADDR16:
5102 case R_PPC64_UADDR32:
5103 case R_PPC64_UADDR64:
5104 case R_PPC64_TOC:
5105 if (h != NULL && bfd_link_executable (info))
5106 /* We may need a copy reloc. */
5107 h->non_got_ref = 1;
5108
5109 /* Don't propagate .opd relocs. */
5110 if (NO_OPD_RELOCS && is_opd)
5111 break;
5112
5113 /* If we are creating a shared library, and this is a reloc
5114 against a global symbol, or a non PC relative reloc
5115 against a local symbol, then we need to copy the reloc
5116 into the shared library. However, if we are linking with
5117 -Bsymbolic, we do not need to copy a reloc against a
5118 global symbol which is defined in an object we are
5119 including in the link (i.e., DEF_REGULAR is set). At
5120 this point we have not seen all the input files, so it is
5121 possible that DEF_REGULAR is not set now but will be set
5122 later (it is never cleared). In case of a weak definition,
5123 DEF_REGULAR may be cleared later by a strong definition in
5124 a shared library. We account for that possibility below by
5125 storing information in the dyn_relocs field of the hash
5126 table entry. A similar situation occurs when creating
5127 shared libraries and symbol visibility changes render the
5128 symbol local.
5129
5130 If on the other hand, we are creating an executable, we
5131 may need to keep relocations for symbols satisfied by a
5132 dynamic library if we manage to avoid copy relocs for the
5133 symbol. */
5134 dodyn:
5135 if ((h != NULL
5136 && (h->root.type == bfd_link_hash_defweak
5137 || !h->def_regular))
5138 || (h != NULL
5139 && !bfd_link_executable (info)
5140 && !SYMBOLIC_BIND (info, h))
5141 || (bfd_link_pic (info)
5142 && must_be_dyn_reloc (info, r_type))
5143 || (!bfd_link_pic (info)
5144 && ifunc != NULL))
5145 {
5146 /* We must copy these reloc types into the output file.
5147 Create a reloc section in dynobj and make room for
5148 this reloc. */
5149 if (sreloc == NULL)
5150 {
5151 sreloc = _bfd_elf_make_dynamic_reloc_section
5152 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5153
5154 if (sreloc == NULL)
5155 return FALSE;
5156 }
5157
5158 /* If this is a global symbol, we count the number of
5159 relocations we need for this symbol. */
5160 if (h != NULL)
5161 {
5162 struct elf_dyn_relocs *p;
5163 struct elf_dyn_relocs **head;
5164
5165 head = &h->dyn_relocs;
5166 p = *head;
5167 if (p == NULL || p->sec != sec)
5168 {
5169 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5170 if (p == NULL)
5171 return FALSE;
5172 p->next = *head;
5173 *head = p;
5174 p->sec = sec;
5175 p->count = 0;
5176 p->pc_count = 0;
5177 }
5178 p->count += 1;
5179 if (!must_be_dyn_reloc (info, r_type))
5180 p->pc_count += 1;
5181 }
5182 else
5183 {
5184 /* Track dynamic relocs needed for local syms too.
5185 We really need local syms available to do this
5186 easily. Oh well. */
5187 struct ppc_dyn_relocs *p;
5188 struct ppc_dyn_relocs **head;
5189 bfd_boolean is_ifunc;
5190 asection *s;
5191 void *vpp;
5192 Elf_Internal_Sym *isym;
5193
5194 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5195 abfd, r_symndx);
5196 if (isym == NULL)
5197 return FALSE;
5198
5199 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5200 if (s == NULL)
5201 s = sec;
5202
5203 vpp = &elf_section_data (s)->local_dynrel;
5204 head = (struct ppc_dyn_relocs **) vpp;
5205 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5206 p = *head;
5207 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5208 p = p->next;
5209 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5210 {
5211 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5212 if (p == NULL)
5213 return FALSE;
5214 p->next = *head;
5215 *head = p;
5216 p->sec = sec;
5217 p->ifunc = is_ifunc;
5218 p->count = 0;
5219 }
5220 p->count += 1;
5221 }
5222 }
5223 break;
5224
5225 default:
5226 break;
5227 }
5228 }
5229
5230 return TRUE;
5231 }
5232
5233 /* Merge backend specific data from an object file to the output
5234 object file when linking. */
5235
5236 static bfd_boolean
5237 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5238 {
5239 bfd *obfd = info->output_bfd;
5240 unsigned long iflags, oflags;
5241
5242 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5243 return TRUE;
5244
5245 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5246 return TRUE;
5247
5248 if (!_bfd_generic_verify_endian_match (ibfd, info))
5249 return FALSE;
5250
5251 iflags = elf_elfheader (ibfd)->e_flags;
5252 oflags = elf_elfheader (obfd)->e_flags;
5253
5254 if (iflags & ~EF_PPC64_ABI)
5255 {
5256 _bfd_error_handler
5257 /* xgettext:c-format */
5258 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5259 bfd_set_error (bfd_error_bad_value);
5260 return FALSE;
5261 }
5262 else if (iflags != oflags && iflags != 0)
5263 {
5264 _bfd_error_handler
5265 /* xgettext:c-format */
5266 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5267 ibfd, iflags, oflags);
5268 bfd_set_error (bfd_error_bad_value);
5269 return FALSE;
5270 }
5271
5272 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5273 return FALSE;
5274
5275 /* Merge Tag_compatibility attributes and any common GNU ones. */
5276 return _bfd_elf_merge_object_attributes (ibfd, info);
5277 }
5278
5279 static bfd_boolean
5280 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5281 {
5282 /* Print normal ELF private data. */
5283 _bfd_elf_print_private_bfd_data (abfd, ptr);
5284
5285 if (elf_elfheader (abfd)->e_flags != 0)
5286 {
5287 FILE *file = ptr;
5288
5289 fprintf (file, _("private flags = 0x%lx:"),
5290 elf_elfheader (abfd)->e_flags);
5291
5292 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5293 fprintf (file, _(" [abiv%ld]"),
5294 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5295 fputc ('\n', file);
5296 }
5297
5298 return TRUE;
5299 }
5300
5301 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5302 of the code entry point, and its section, which must be in the same
5303 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5304
5305 static bfd_vma
5306 opd_entry_value (asection *opd_sec,
5307 bfd_vma offset,
5308 asection **code_sec,
5309 bfd_vma *code_off,
5310 bfd_boolean in_code_sec)
5311 {
5312 bfd *opd_bfd = opd_sec->owner;
5313 Elf_Internal_Rela *relocs;
5314 Elf_Internal_Rela *lo, *hi, *look;
5315 bfd_vma val;
5316
5317 /* No relocs implies we are linking a --just-symbols object, or looking
5318 at a final linked executable with addr2line or somesuch. */
5319 if (opd_sec->reloc_count == 0)
5320 {
5321 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5322
5323 if (contents == NULL)
5324 {
5325 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5326 return (bfd_vma) -1;
5327 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5328 }
5329
5330 /* PR 17512: file: 64b9dfbb. */
5331 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5332 return (bfd_vma) -1;
5333
5334 val = bfd_get_64 (opd_bfd, contents + offset);
5335 if (code_sec != NULL)
5336 {
5337 asection *sec, *likely = NULL;
5338
5339 if (in_code_sec)
5340 {
5341 sec = *code_sec;
5342 if (sec->vma <= val
5343 && val < sec->vma + sec->size)
5344 likely = sec;
5345 else
5346 val = -1;
5347 }
5348 else
5349 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5350 if (sec->vma <= val
5351 && (sec->flags & SEC_LOAD) != 0
5352 && (sec->flags & SEC_ALLOC) != 0)
5353 likely = sec;
5354 if (likely != NULL)
5355 {
5356 *code_sec = likely;
5357 if (code_off != NULL)
5358 *code_off = val - likely->vma;
5359 }
5360 }
5361 return val;
5362 }
5363
5364 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5365
5366 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5367 if (relocs == NULL)
5368 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5369 /* PR 17512: file: df8e1fd6. */
5370 if (relocs == NULL)
5371 return (bfd_vma) -1;
5372
5373 /* Go find the opd reloc at the sym address. */
5374 lo = relocs;
5375 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5376 val = (bfd_vma) -1;
5377 while (lo < hi)
5378 {
5379 look = lo + (hi - lo) / 2;
5380 if (look->r_offset < offset)
5381 lo = look + 1;
5382 else if (look->r_offset > offset)
5383 hi = look;
5384 else
5385 {
5386 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5387
5388 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5389 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5390 {
5391 unsigned long symndx = ELF64_R_SYM (look->r_info);
5392 asection *sec = NULL;
5393
5394 if (symndx >= symtab_hdr->sh_info
5395 && elf_sym_hashes (opd_bfd) != NULL)
5396 {
5397 struct elf_link_hash_entry **sym_hashes;
5398 struct elf_link_hash_entry *rh;
5399
5400 sym_hashes = elf_sym_hashes (opd_bfd);
5401 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5402 if (rh != NULL)
5403 {
5404 rh = elf_follow_link (rh);
5405 if (rh->root.type != bfd_link_hash_defined
5406 && rh->root.type != bfd_link_hash_defweak)
5407 break;
5408 if (rh->root.u.def.section->owner == opd_bfd)
5409 {
5410 val = rh->root.u.def.value;
5411 sec = rh->root.u.def.section;
5412 }
5413 }
5414 }
5415
5416 if (sec == NULL)
5417 {
5418 Elf_Internal_Sym *sym;
5419
5420 if (symndx < symtab_hdr->sh_info)
5421 {
5422 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5423 if (sym == NULL)
5424 {
5425 size_t symcnt = symtab_hdr->sh_info;
5426 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5427 symcnt, 0,
5428 NULL, NULL, NULL);
5429 if (sym == NULL)
5430 break;
5431 symtab_hdr->contents = (bfd_byte *) sym;
5432 }
5433 sym += symndx;
5434 }
5435 else
5436 {
5437 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5438 1, symndx,
5439 NULL, NULL, NULL);
5440 if (sym == NULL)
5441 break;
5442 }
5443 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5444 if (sec == NULL)
5445 break;
5446 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5447 val = sym->st_value;
5448 }
5449
5450 val += look->r_addend;
5451 if (code_off != NULL)
5452 *code_off = val;
5453 if (code_sec != NULL)
5454 {
5455 if (in_code_sec && *code_sec != sec)
5456 return -1;
5457 else
5458 *code_sec = sec;
5459 }
5460 if (sec->output_section != NULL)
5461 val += sec->output_section->vma + sec->output_offset;
5462 }
5463 break;
5464 }
5465 }
5466
5467 return val;
5468 }
5469
5470 /* If the ELF symbol SYM might be a function in SEC, return the
5471 function size and set *CODE_OFF to the function's entry point,
5472 otherwise return zero. */
5473
5474 static bfd_size_type
5475 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5476 bfd_vma *code_off)
5477 {
5478 bfd_size_type size;
5479
5480 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5481 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5482 return 0;
5483
5484 size = 0;
5485 if (!(sym->flags & BSF_SYNTHETIC))
5486 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5487
5488 if (strcmp (sym->section->name, ".opd") == 0)
5489 {
5490 struct _opd_sec_data *opd = get_opd_info (sym->section);
5491 bfd_vma symval = sym->value;
5492
5493 if (opd != NULL
5494 && opd->adjust != NULL
5495 && elf_section_data (sym->section)->relocs != NULL)
5496 {
5497 /* opd_entry_value will use cached relocs that have been
5498 adjusted, but with raw symbols. That means both local
5499 and global symbols need adjusting. */
5500 long adjust = opd->adjust[OPD_NDX (symval)];
5501 if (adjust == -1)
5502 return 0;
5503 symval += adjust;
5504 }
5505
5506 if (opd_entry_value (sym->section, symval,
5507 &sec, code_off, TRUE) == (bfd_vma) -1)
5508 return 0;
5509 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5510 symbol. This size has nothing to do with the code size of the
5511 function, which is what we're supposed to return, but the
5512 code size isn't available without looking up the dot-sym.
5513 However, doing that would be a waste of time particularly
5514 since elf_find_function will look at the dot-sym anyway.
5515 Now, elf_find_function will keep the largest size of any
5516 function sym found at the code address of interest, so return
5517 1 here to avoid it incorrectly caching a larger function size
5518 for a small function. This does mean we return the wrong
5519 size for a new-ABI function of size 24, but all that does is
5520 disable caching for such functions. */
5521 if (size == 24)
5522 size = 1;
5523 }
5524 else
5525 {
5526 if (sym->section != sec)
5527 return 0;
5528 *code_off = sym->value;
5529 }
5530 if (size == 0)
5531 size = 1;
5532 return size;
5533 }
5534
5535 /* Return true if symbol is a strong function defined in an ELFv2
5536 object with st_other localentry bits of zero, ie. its local entry
5537 point coincides with its global entry point. */
5538
5539 static bfd_boolean
5540 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5541 {
5542 return (h != NULL
5543 && h->type == STT_FUNC
5544 && h->root.type == bfd_link_hash_defined
5545 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5546 && !ppc_elf_hash_entry (h)->non_zero_localentry
5547 && is_ppc64_elf (h->root.u.def.section->owner)
5548 && abiversion (h->root.u.def.section->owner) >= 2);
5549 }
5550
5551 /* Return true if symbol is defined in a regular object file. */
5552
5553 static bfd_boolean
5554 is_static_defined (struct elf_link_hash_entry *h)
5555 {
5556 return ((h->root.type == bfd_link_hash_defined
5557 || h->root.type == bfd_link_hash_defweak)
5558 && h->root.u.def.section != NULL
5559 && h->root.u.def.section->output_section != NULL);
5560 }
5561
5562 /* If FDH is a function descriptor symbol, return the associated code
5563 entry symbol if it is defined. Return NULL otherwise. */
5564
5565 static struct ppc_link_hash_entry *
5566 defined_code_entry (struct ppc_link_hash_entry *fdh)
5567 {
5568 if (fdh->is_func_descriptor)
5569 {
5570 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5571 if (fh->elf.root.type == bfd_link_hash_defined
5572 || fh->elf.root.type == bfd_link_hash_defweak)
5573 return fh;
5574 }
5575 return NULL;
5576 }
5577
5578 /* If FH is a function code entry symbol, return the associated
5579 function descriptor symbol if it is defined. Return NULL otherwise. */
5580
5581 static struct ppc_link_hash_entry *
5582 defined_func_desc (struct ppc_link_hash_entry *fh)
5583 {
5584 if (fh->oh != NULL
5585 && fh->oh->is_func_descriptor)
5586 {
5587 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5588 if (fdh->elf.root.type == bfd_link_hash_defined
5589 || fdh->elf.root.type == bfd_link_hash_defweak)
5590 return fdh;
5591 }
5592 return NULL;
5593 }
5594
5595 /* Given H is a symbol that satisfies is_static_defined, return the
5596 value in the output file. */
5597
5598 static bfd_vma
5599 defined_sym_val (struct elf_link_hash_entry *h)
5600 {
5601 return (h->root.u.def.section->output_section->vma
5602 + h->root.u.def.section->output_offset
5603 + h->root.u.def.value);
5604 }
5605
5606 /* Return true if H matches __tls_get_addr or one of its variants. */
5607
5608 static bfd_boolean
5609 is_tls_get_addr (struct elf_link_hash_entry *h,
5610 struct ppc_link_hash_table *htab)
5611 {
5612 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5613 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
5614 }
5615
5616 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5617
5618 /* Garbage collect sections, after first dealing with dot-symbols. */
5619
5620 static bfd_boolean
5621 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5622 {
5623 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5624
5625 if (htab != NULL && htab->need_func_desc_adj)
5626 {
5627 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5628 htab->need_func_desc_adj = 0;
5629 }
5630 return bfd_elf_gc_sections (abfd, info);
5631 }
5632
5633 /* Mark all our entry sym sections, both opd and code section. */
5634
5635 static void
5636 ppc64_elf_gc_keep (struct bfd_link_info *info)
5637 {
5638 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5639 struct bfd_sym_chain *sym;
5640
5641 if (htab == NULL)
5642 return;
5643
5644 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5645 {
5646 struct ppc_link_hash_entry *eh, *fh;
5647 asection *sec;
5648
5649 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5650 FALSE, FALSE, TRUE));
5651 if (eh == NULL)
5652 continue;
5653 if (eh->elf.root.type != bfd_link_hash_defined
5654 && eh->elf.root.type != bfd_link_hash_defweak)
5655 continue;
5656
5657 fh = defined_code_entry (eh);
5658 if (fh != NULL)
5659 {
5660 sec = fh->elf.root.u.def.section;
5661 sec->flags |= SEC_KEEP;
5662 }
5663 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5664 && opd_entry_value (eh->elf.root.u.def.section,
5665 eh->elf.root.u.def.value,
5666 &sec, NULL, FALSE) != (bfd_vma) -1)
5667 sec->flags |= SEC_KEEP;
5668
5669 sec = eh->elf.root.u.def.section;
5670 sec->flags |= SEC_KEEP;
5671 }
5672 }
5673
5674 /* Mark sections containing dynamically referenced symbols. When
5675 building shared libraries, we must assume that any visible symbol is
5676 referenced. */
5677
5678 static bfd_boolean
5679 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5680 {
5681 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5682 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
5683 struct ppc_link_hash_entry *fdh;
5684 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5685
5686 /* Dynamic linking info is on the func descriptor sym. */
5687 fdh = defined_func_desc (eh);
5688 if (fdh != NULL)
5689 eh = fdh;
5690
5691 if ((eh->elf.root.type == bfd_link_hash_defined
5692 || eh->elf.root.type == bfd_link_hash_defweak)
5693 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5694 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5695 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5696 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5697 && (!bfd_link_executable (info)
5698 || info->gc_keep_exported
5699 || info->export_dynamic
5700 || (eh->elf.dynamic
5701 && d != NULL
5702 && (*d->match) (&d->head, NULL,
5703 eh->elf.root.root.string)))
5704 && (eh->elf.versioned >= versioned
5705 || !bfd_hide_sym_by_version (info->version_info,
5706 eh->elf.root.root.string)))))
5707 {
5708 asection *code_sec;
5709 struct ppc_link_hash_entry *fh;
5710
5711 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5712
5713 /* Function descriptor syms cause the associated
5714 function code sym section to be marked. */
5715 fh = defined_code_entry (eh);
5716 if (fh != NULL)
5717 {
5718 code_sec = fh->elf.root.u.def.section;
5719 code_sec->flags |= SEC_KEEP;
5720 }
5721 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5722 && opd_entry_value (eh->elf.root.u.def.section,
5723 eh->elf.root.u.def.value,
5724 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5725 code_sec->flags |= SEC_KEEP;
5726 }
5727
5728 return TRUE;
5729 }
5730
5731 /* Return the section that should be marked against GC for a given
5732 relocation. */
5733
5734 static asection *
5735 ppc64_elf_gc_mark_hook (asection *sec,
5736 struct bfd_link_info *info,
5737 Elf_Internal_Rela *rel,
5738 struct elf_link_hash_entry *h,
5739 Elf_Internal_Sym *sym)
5740 {
5741 asection *rsec;
5742
5743 /* Syms return NULL if we're marking .opd, so we avoid marking all
5744 function sections, as all functions are referenced in .opd. */
5745 rsec = NULL;
5746 if (get_opd_info (sec) != NULL)
5747 return rsec;
5748
5749 if (h != NULL)
5750 {
5751 enum elf_ppc64_reloc_type r_type;
5752 struct ppc_link_hash_entry *eh, *fh, *fdh;
5753
5754 r_type = ELF64_R_TYPE (rel->r_info);
5755 switch (r_type)
5756 {
5757 case R_PPC64_GNU_VTINHERIT:
5758 case R_PPC64_GNU_VTENTRY:
5759 break;
5760
5761 default:
5762 switch (h->root.type)
5763 {
5764 case bfd_link_hash_defined:
5765 case bfd_link_hash_defweak:
5766 eh = ppc_elf_hash_entry (h);
5767 fdh = defined_func_desc (eh);
5768 if (fdh != NULL)
5769 {
5770 /* -mcall-aixdesc code references the dot-symbol on
5771 a call reloc. Mark the function descriptor too
5772 against garbage collection. */
5773 fdh->elf.mark = 1;
5774 if (fdh->elf.is_weakalias)
5775 weakdef (&fdh->elf)->mark = 1;
5776 eh = fdh;
5777 }
5778
5779 /* Function descriptor syms cause the associated
5780 function code sym section to be marked. */
5781 fh = defined_code_entry (eh);
5782 if (fh != NULL)
5783 {
5784 /* They also mark their opd section. */
5785 eh->elf.root.u.def.section->gc_mark = 1;
5786
5787 rsec = fh->elf.root.u.def.section;
5788 }
5789 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5790 && opd_entry_value (eh->elf.root.u.def.section,
5791 eh->elf.root.u.def.value,
5792 &rsec, NULL, FALSE) != (bfd_vma) -1)
5793 eh->elf.root.u.def.section->gc_mark = 1;
5794 else
5795 rsec = h->root.u.def.section;
5796 break;
5797
5798 case bfd_link_hash_common:
5799 rsec = h->root.u.c.p->section;
5800 break;
5801
5802 default:
5803 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5804 }
5805 }
5806 }
5807 else
5808 {
5809 struct _opd_sec_data *opd;
5810
5811 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5812 opd = get_opd_info (rsec);
5813 if (opd != NULL && opd->func_sec != NULL)
5814 {
5815 rsec->gc_mark = 1;
5816
5817 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5818 }
5819 }
5820
5821 return rsec;
5822 }
5823
5824 /* The maximum size of .sfpr. */
5825 #define SFPR_MAX (218*4)
5826
5827 struct sfpr_def_parms
5828 {
5829 const char name[12];
5830 unsigned char lo, hi;
5831 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5832 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5833 };
5834
5835 /* Auto-generate _save*, _rest* functions in .sfpr.
5836 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5837 instead. */
5838
5839 static bfd_boolean
5840 sfpr_define (struct bfd_link_info *info,
5841 const struct sfpr_def_parms *parm,
5842 asection *stub_sec)
5843 {
5844 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5845 unsigned int i;
5846 size_t len = strlen (parm->name);
5847 bfd_boolean writing = FALSE;
5848 char sym[16];
5849
5850 if (htab == NULL)
5851 return FALSE;
5852
5853 memcpy (sym, parm->name, len);
5854 sym[len + 2] = 0;
5855
5856 for (i = parm->lo; i <= parm->hi; i++)
5857 {
5858 struct ppc_link_hash_entry *h;
5859
5860 sym[len + 0] = i / 10 + '0';
5861 sym[len + 1] = i % 10 + '0';
5862 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5863 writing, TRUE, TRUE));
5864 if (stub_sec != NULL)
5865 {
5866 if (h != NULL
5867 && h->elf.root.type == bfd_link_hash_defined
5868 && h->elf.root.u.def.section == htab->sfpr)
5869 {
5870 struct elf_link_hash_entry *s;
5871 char buf[32];
5872 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5873 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5874 if (s == NULL)
5875 return FALSE;
5876 if (s->root.type == bfd_link_hash_new)
5877 {
5878 s->root.type = bfd_link_hash_defined;
5879 s->root.u.def.section = stub_sec;
5880 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5881 + h->elf.root.u.def.value);
5882 s->ref_regular = 1;
5883 s->def_regular = 1;
5884 s->ref_regular_nonweak = 1;
5885 s->forced_local = 1;
5886 s->non_elf = 0;
5887 s->root.linker_def = 1;
5888 }
5889 }
5890 continue;
5891 }
5892 if (h != NULL)
5893 {
5894 h->save_res = 1;
5895 if (!h->elf.def_regular)
5896 {
5897 h->elf.root.type = bfd_link_hash_defined;
5898 h->elf.root.u.def.section = htab->sfpr;
5899 h->elf.root.u.def.value = htab->sfpr->size;
5900 h->elf.type = STT_FUNC;
5901 h->elf.def_regular = 1;
5902 h->elf.non_elf = 0;
5903 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5904 writing = TRUE;
5905 if (htab->sfpr->contents == NULL)
5906 {
5907 htab->sfpr->contents
5908 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5909 if (htab->sfpr->contents == NULL)
5910 return FALSE;
5911 }
5912 }
5913 }
5914 if (writing)
5915 {
5916 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5917 if (i != parm->hi)
5918 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5919 else
5920 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5921 htab->sfpr->size = p - htab->sfpr->contents;
5922 }
5923 }
5924
5925 return TRUE;
5926 }
5927
5928 static bfd_byte *
5929 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5930 {
5931 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5932 return p + 4;
5933 }
5934
5935 static bfd_byte *
5936 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5937 {
5938 p = savegpr0 (abfd, p, r);
5939 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5940 p = p + 4;
5941 bfd_put_32 (abfd, BLR, p);
5942 return p + 4;
5943 }
5944
5945 static bfd_byte *
5946 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5947 {
5948 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5949 return p + 4;
5950 }
5951
5952 static bfd_byte *
5953 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5954 {
5955 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5956 p = p + 4;
5957 p = restgpr0 (abfd, p, r);
5958 bfd_put_32 (abfd, MTLR_R0, p);
5959 p = p + 4;
5960 if (r == 29)
5961 {
5962 p = restgpr0 (abfd, p, 30);
5963 p = restgpr0 (abfd, p, 31);
5964 }
5965 bfd_put_32 (abfd, BLR, p);
5966 return p + 4;
5967 }
5968
5969 static bfd_byte *
5970 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5971 {
5972 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5973 return p + 4;
5974 }
5975
5976 static bfd_byte *
5977 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5978 {
5979 p = savegpr1 (abfd, p, r);
5980 bfd_put_32 (abfd, BLR, p);
5981 return p + 4;
5982 }
5983
5984 static bfd_byte *
5985 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5986 {
5987 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5988 return p + 4;
5989 }
5990
5991 static bfd_byte *
5992 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5993 {
5994 p = restgpr1 (abfd, p, r);
5995 bfd_put_32 (abfd, BLR, p);
5996 return p + 4;
5997 }
5998
5999 static bfd_byte *
6000 savefpr (bfd *abfd, bfd_byte *p, int r)
6001 {
6002 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6003 return p + 4;
6004 }
6005
6006 static bfd_byte *
6007 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6008 {
6009 p = savefpr (abfd, p, r);
6010 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6011 p = p + 4;
6012 bfd_put_32 (abfd, BLR, p);
6013 return p + 4;
6014 }
6015
6016 static bfd_byte *
6017 restfpr (bfd *abfd, bfd_byte *p, int r)
6018 {
6019 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6020 return p + 4;
6021 }
6022
6023 static bfd_byte *
6024 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6025 {
6026 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6027 p = p + 4;
6028 p = restfpr (abfd, p, r);
6029 bfd_put_32 (abfd, MTLR_R0, p);
6030 p = p + 4;
6031 if (r == 29)
6032 {
6033 p = restfpr (abfd, p, 30);
6034 p = restfpr (abfd, p, 31);
6035 }
6036 bfd_put_32 (abfd, BLR, p);
6037 return p + 4;
6038 }
6039
6040 static bfd_byte *
6041 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6042 {
6043 p = savefpr (abfd, p, r);
6044 bfd_put_32 (abfd, BLR, p);
6045 return p + 4;
6046 }
6047
6048 static bfd_byte *
6049 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6050 {
6051 p = restfpr (abfd, p, r);
6052 bfd_put_32 (abfd, BLR, p);
6053 return p + 4;
6054 }
6055
6056 static bfd_byte *
6057 savevr (bfd *abfd, bfd_byte *p, int r)
6058 {
6059 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6060 p = p + 4;
6061 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6062 return p + 4;
6063 }
6064
6065 static bfd_byte *
6066 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6067 {
6068 p = savevr (abfd, p, r);
6069 bfd_put_32 (abfd, BLR, p);
6070 return p + 4;
6071 }
6072
6073 static bfd_byte *
6074 restvr (bfd *abfd, bfd_byte *p, int r)
6075 {
6076 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6077 p = p + 4;
6078 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6079 return p + 4;
6080 }
6081
6082 static bfd_byte *
6083 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6084 {
6085 p = restvr (abfd, p, r);
6086 bfd_put_32 (abfd, BLR, p);
6087 return p + 4;
6088 }
6089
6090 #define STDU_R1_0R1 0xf8210001
6091 #define ADDI_R1_R1 0x38210000
6092
6093 /* Emit prologue of wrapper preserving regs around a call to
6094 __tls_get_addr_opt. */
6095
6096 static bfd_byte *
6097 tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6098 {
6099 unsigned int i;
6100
6101 bfd_put_32 (obfd, MFLR_R0, p);
6102 p += 4;
6103 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6104 p += 4;
6105
6106 if (htab->opd_abi)
6107 {
6108 for (i = 4; i < 12; i++)
6109 {
6110 bfd_put_32 (obfd,
6111 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6112 p += 4;
6113 }
6114 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6115 p += 4;
6116 }
6117 else
6118 {
6119 for (i = 4; i < 12; i++)
6120 {
6121 bfd_put_32 (obfd,
6122 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6123 p += 4;
6124 }
6125 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6126 p += 4;
6127 }
6128 return p;
6129 }
6130
6131 /* Emit epilogue of wrapper preserving regs around a call to
6132 __tls_get_addr_opt. */
6133
6134 static bfd_byte *
6135 tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6136 {
6137 unsigned int i;
6138
6139 if (htab->opd_abi)
6140 {
6141 for (i = 4; i < 12; i++)
6142 {
6143 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6144 p += 4;
6145 }
6146 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6147 p += 4;
6148 }
6149 else
6150 {
6151 for (i = 4; i < 12; i++)
6152 {
6153 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6154 p += 4;
6155 }
6156 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6157 p += 4;
6158 }
6159 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6160 p += 4;
6161 bfd_put_32 (obfd, MTLR_R0, p);
6162 p += 4;
6163 bfd_put_32 (obfd, BLR, p);
6164 p += 4;
6165 return p;
6166 }
6167
6168 /* Called via elf_link_hash_traverse to transfer dynamic linking
6169 information on function code symbol entries to their corresponding
6170 function descriptor symbol entries. */
6171
6172 static bfd_boolean
6173 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6174 {
6175 struct bfd_link_info *info;
6176 struct ppc_link_hash_table *htab;
6177 struct ppc_link_hash_entry *fh;
6178 struct ppc_link_hash_entry *fdh;
6179 bfd_boolean force_local;
6180
6181 fh = ppc_elf_hash_entry (h);
6182 if (fh->elf.root.type == bfd_link_hash_indirect)
6183 return TRUE;
6184
6185 if (!fh->is_func)
6186 return TRUE;
6187
6188 if (fh->elf.root.root.string[0] != '.'
6189 || fh->elf.root.root.string[1] == '\0')
6190 return TRUE;
6191
6192 info = inf;
6193 htab = ppc_hash_table (info);
6194 if (htab == NULL)
6195 return FALSE;
6196
6197 /* Find the corresponding function descriptor symbol. */
6198 fdh = lookup_fdh (fh, htab);
6199
6200 /* Resolve undefined references to dot-symbols as the value
6201 in the function descriptor, if we have one in a regular object.
6202 This is to satisfy cases like ".quad .foo". Calls to functions
6203 in dynamic objects are handled elsewhere. */
6204 if ((fh->elf.root.type == bfd_link_hash_undefined
6205 || fh->elf.root.type == bfd_link_hash_undefweak)
6206 && (fdh->elf.root.type == bfd_link_hash_defined
6207 || fdh->elf.root.type == bfd_link_hash_defweak)
6208 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6209 && opd_entry_value (fdh->elf.root.u.def.section,
6210 fdh->elf.root.u.def.value,
6211 &fh->elf.root.u.def.section,
6212 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6213 {
6214 fh->elf.root.type = fdh->elf.root.type;
6215 fh->elf.forced_local = 1;
6216 fh->elf.def_regular = fdh->elf.def_regular;
6217 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6218 }
6219
6220 if (!fh->elf.dynamic)
6221 {
6222 struct plt_entry *ent;
6223
6224 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6225 if (ent->plt.refcount > 0)
6226 break;
6227 if (ent == NULL)
6228 return TRUE;
6229 }
6230
6231 /* Create a descriptor as undefined if necessary. */
6232 if (fdh == NULL
6233 && !bfd_link_executable (info)
6234 && (fh->elf.root.type == bfd_link_hash_undefined
6235 || fh->elf.root.type == bfd_link_hash_undefweak))
6236 {
6237 fdh = make_fdh (info, fh);
6238 if (fdh == NULL)
6239 return FALSE;
6240 }
6241
6242 /* We can't support overriding of symbols on a fake descriptor. */
6243 if (fdh != NULL
6244 && fdh->fake
6245 && (fh->elf.root.type == bfd_link_hash_defined
6246 || fh->elf.root.type == bfd_link_hash_defweak))
6247 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6248
6249 /* Transfer dynamic linking information to the function descriptor. */
6250 if (fdh != NULL)
6251 {
6252 fdh->elf.ref_regular |= fh->elf.ref_regular;
6253 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6254 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6255 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6256 fdh->elf.dynamic |= fh->elf.dynamic;
6257 fdh->elf.needs_plt |= (fh->elf.needs_plt
6258 || fh->elf.type == STT_FUNC
6259 || fh->elf.type == STT_GNU_IFUNC);
6260 move_plt_plist (fh, fdh);
6261
6262 if (!fdh->elf.forced_local
6263 && fh->elf.dynindx != -1)
6264 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6265 return FALSE;
6266 }
6267
6268 /* Now that the info is on the function descriptor, clear the
6269 function code sym info. Any function code syms for which we
6270 don't have a definition in a regular file, we force local.
6271 This prevents a shared library from exporting syms that have
6272 been imported from another library. Function code syms that
6273 are really in the library we must leave global to prevent the
6274 linker dragging in a definition from a static library. */
6275 force_local = (!fh->elf.def_regular
6276 || fdh == NULL
6277 || !fdh->elf.def_regular
6278 || fdh->elf.forced_local);
6279 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6280
6281 return TRUE;
6282 }
6283
6284 static const struct sfpr_def_parms save_res_funcs[] =
6285 {
6286 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6287 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6288 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6289 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6290 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6291 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6292 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6293 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6294 { "._savef", 14, 31, savefpr, savefpr1_tail },
6295 { "._restf", 14, 31, restfpr, restfpr1_tail },
6296 { "_savevr_", 20, 31, savevr, savevr_tail },
6297 { "_restvr_", 20, 31, restvr, restvr_tail }
6298 };
6299
6300 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6301 this hook to a) provide some gcc support functions, and b) transfer
6302 dynamic linking information gathered so far on function code symbol
6303 entries, to their corresponding function descriptor symbol entries. */
6304
6305 static bfd_boolean
6306 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6307 struct bfd_link_info *info)
6308 {
6309 struct ppc_link_hash_table *htab;
6310
6311 htab = ppc_hash_table (info);
6312 if (htab == NULL)
6313 return FALSE;
6314
6315 /* Provide any missing _save* and _rest* functions. */
6316 if (htab->sfpr != NULL)
6317 {
6318 unsigned int i;
6319
6320 htab->sfpr->size = 0;
6321 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6322 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6323 return FALSE;
6324 if (htab->sfpr->size == 0)
6325 htab->sfpr->flags |= SEC_EXCLUDE;
6326 }
6327
6328 if (bfd_link_relocatable (info))
6329 return TRUE;
6330
6331 if (htab->elf.hgot != NULL)
6332 {
6333 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6334 /* Make .TOC. defined so as to prevent it being made dynamic.
6335 The wrong value here is fixed later in ppc64_elf_set_toc. */
6336 if (!htab->elf.hgot->def_regular
6337 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6338 {
6339 htab->elf.hgot->root.type = bfd_link_hash_defined;
6340 htab->elf.hgot->root.u.def.value = 0;
6341 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6342 htab->elf.hgot->def_regular = 1;
6343 htab->elf.hgot->root.linker_def = 1;
6344 }
6345 htab->elf.hgot->type = STT_OBJECT;
6346 htab->elf.hgot->other
6347 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6348 }
6349
6350 if (htab->need_func_desc_adj)
6351 {
6352 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6353 htab->need_func_desc_adj = 0;
6354 }
6355
6356 return TRUE;
6357 }
6358
6359 /* Find dynamic relocs for H that apply to read-only sections. */
6360
6361 static asection *
6362 readonly_dynrelocs (struct elf_link_hash_entry *h)
6363 {
6364 struct elf_dyn_relocs *p;
6365
6366 for (p = h->dyn_relocs; p != NULL; p = p->next)
6367 {
6368 asection *s = p->sec->output_section;
6369
6370 if (s != NULL && (s->flags & SEC_READONLY) != 0)
6371 return p->sec;
6372 }
6373 return NULL;
6374 }
6375
6376 /* Return true if we have dynamic relocs against H or any of its weak
6377 aliases, that apply to read-only sections. Cannot be used after
6378 size_dynamic_sections. */
6379
6380 static bfd_boolean
6381 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6382 {
6383 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
6384 do
6385 {
6386 if (readonly_dynrelocs (&eh->elf))
6387 return TRUE;
6388 eh = ppc_elf_hash_entry (eh->elf.u.alias);
6389 }
6390 while (eh != NULL && &eh->elf != h);
6391
6392 return FALSE;
6393 }
6394
6395 /* Return whether EH has pc-relative dynamic relocs. */
6396
6397 static bfd_boolean
6398 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6399 {
6400 struct elf_dyn_relocs *p;
6401
6402 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
6403 if (p->pc_count != 0)
6404 return TRUE;
6405 return FALSE;
6406 }
6407
6408 /* Return true if a global entry stub will be created for H. Valid
6409 for ELFv2 before plt entries have been allocated. */
6410
6411 static bfd_boolean
6412 global_entry_stub (struct elf_link_hash_entry *h)
6413 {
6414 struct plt_entry *pent;
6415
6416 if (!h->pointer_equality_needed
6417 || h->def_regular)
6418 return FALSE;
6419
6420 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6421 if (pent->plt.refcount > 0
6422 && pent->addend == 0)
6423 return TRUE;
6424
6425 return FALSE;
6426 }
6427
6428 /* Adjust a symbol defined by a dynamic object and referenced by a
6429 regular object. The current definition is in some section of the
6430 dynamic object, but we're not including those sections. We have to
6431 change the definition to something the rest of the link can
6432 understand. */
6433
6434 static bfd_boolean
6435 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6436 struct elf_link_hash_entry *h)
6437 {
6438 struct ppc_link_hash_table *htab;
6439 asection *s, *srel;
6440
6441 htab = ppc_hash_table (info);
6442 if (htab == NULL)
6443 return FALSE;
6444
6445 /* Deal with function syms. */
6446 if (h->type == STT_FUNC
6447 || h->type == STT_GNU_IFUNC
6448 || h->needs_plt)
6449 {
6450 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
6451 || SYMBOL_CALLS_LOCAL (info, h)
6452 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6453 /* Discard dyn_relocs when non-pic if we've decided that a
6454 function symbol is local and not an ifunc. We keep dynamic
6455 relocs for ifuncs when local rather than always emitting a
6456 plt call stub for them and defining the symbol on the call
6457 stub. We can't do that for ELFv1 anyway (a function symbol
6458 is defined on a descriptor, not code) and it can be faster at
6459 run-time due to not needing to bounce through a stub. The
6460 dyn_relocs for ifuncs will be applied even in a static
6461 executable. */
6462 if (!bfd_link_pic (info)
6463 && h->type != STT_GNU_IFUNC
6464 && local)
6465 h->dyn_relocs = NULL;
6466
6467 /* Clear procedure linkage table information for any symbol that
6468 won't need a .plt entry. */
6469 struct plt_entry *ent;
6470 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6471 if (ent->plt.refcount > 0)
6472 break;
6473 if (ent == NULL
6474 || (h->type != STT_GNU_IFUNC
6475 && local
6476 && (htab->can_convert_all_inline_plt
6477 || (ppc_elf_hash_entry (h)->tls_mask
6478 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6479 {
6480 h->plt.plist = NULL;
6481 h->needs_plt = 0;
6482 h->pointer_equality_needed = 0;
6483 }
6484 else if (abiversion (info->output_bfd) >= 2)
6485 {
6486 /* Taking a function's address in a read/write section
6487 doesn't require us to define the function symbol in the
6488 executable on a global entry stub. A dynamic reloc can
6489 be used instead. The reason we prefer a few more dynamic
6490 relocs is that calling via a global entry stub costs a
6491 few more instructions, and pointer_equality_needed causes
6492 extra work in ld.so when resolving these symbols. */
6493 if (global_entry_stub (h))
6494 {
6495 if (!readonly_dynrelocs (h))
6496 {
6497 h->pointer_equality_needed = 0;
6498 /* If we haven't seen a branch reloc and the symbol
6499 isn't an ifunc then we don't need a plt entry. */
6500 if (!h->needs_plt)
6501 h->plt.plist = NULL;
6502 }
6503 else if (!bfd_link_pic (info))
6504 /* We are going to be defining the function symbol on the
6505 plt stub, so no dyn_relocs needed when non-pic. */
6506 h->dyn_relocs = NULL;
6507 }
6508
6509 /* ELFv2 function symbols can't have copy relocs. */
6510 return TRUE;
6511 }
6512 else if (!h->needs_plt
6513 && !readonly_dynrelocs (h))
6514 {
6515 /* If we haven't seen a branch reloc and the symbol isn't an
6516 ifunc then we don't need a plt entry. */
6517 h->plt.plist = NULL;
6518 h->pointer_equality_needed = 0;
6519 return TRUE;
6520 }
6521 }
6522 else
6523 h->plt.plist = NULL;
6524
6525 /* If this is a weak symbol, and there is a real definition, the
6526 processor independent code will have arranged for us to see the
6527 real definition first, and we can just use the same value. */
6528 if (h->is_weakalias)
6529 {
6530 struct elf_link_hash_entry *def = weakdef (h);
6531 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6532 h->root.u.def.section = def->root.u.def.section;
6533 h->root.u.def.value = def->root.u.def.value;
6534 if (def->root.u.def.section == htab->elf.sdynbss
6535 || def->root.u.def.section == htab->elf.sdynrelro)
6536 h->dyn_relocs = NULL;
6537 return TRUE;
6538 }
6539
6540 /* If we are creating a shared library, we must presume that the
6541 only references to the symbol are via the global offset table.
6542 For such cases we need not do anything here; the relocations will
6543 be handled correctly by relocate_section. */
6544 if (!bfd_link_executable (info))
6545 return TRUE;
6546
6547 /* If there are no references to this symbol that do not use the
6548 GOT, we don't need to generate a copy reloc. */
6549 if (!h->non_got_ref)
6550 return TRUE;
6551
6552 /* Don't generate a copy reloc for symbols defined in the executable. */
6553 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6554
6555 /* If -z nocopyreloc was given, don't generate them either. */
6556 || info->nocopyreloc
6557
6558 /* If we don't find any dynamic relocs in read-only sections, then
6559 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6560 || (ELIMINATE_COPY_RELOCS
6561 && !h->needs_copy
6562 && !alias_readonly_dynrelocs (h))
6563
6564 /* Protected variables do not work with .dynbss. The copy in
6565 .dynbss won't be used by the shared library with the protected
6566 definition for the variable. Text relocations are preferable
6567 to an incorrect program. */
6568 || h->protected_def)
6569 return TRUE;
6570
6571 if (h->type == STT_FUNC
6572 || h->type == STT_GNU_IFUNC)
6573 {
6574 /* .dynbss copies of function symbols only work if we have
6575 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6576 use dot-symbols and set the function symbol size to the text
6577 size of the function rather than the size of the descriptor.
6578 That's wrong for copying a descriptor. */
6579 if (ppc_elf_hash_entry (h)->oh == NULL
6580 || !(h->size == 24 || h->size == 16))
6581 return TRUE;
6582
6583 /* We should never get here, but unfortunately there are old
6584 versions of gcc (circa gcc-3.2) that improperly for the
6585 ELFv1 ABI put initialized function pointers, vtable refs and
6586 suchlike in read-only sections. Allow them to proceed, but
6587 warn that this might break at runtime. */
6588 info->callbacks->einfo
6589 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6590 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6591 h->root.root.string);
6592 }
6593
6594 /* This is a reference to a symbol defined by a dynamic object which
6595 is not a function. */
6596
6597 /* We must allocate the symbol in our .dynbss section, which will
6598 become part of the .bss section of the executable. There will be
6599 an entry for this symbol in the .dynsym section. The dynamic
6600 object will contain position independent code, so all references
6601 from the dynamic object to this symbol will go through the global
6602 offset table. The dynamic linker will use the .dynsym entry to
6603 determine the address it must put in the global offset table, so
6604 both the dynamic object and the regular object will refer to the
6605 same memory location for the variable. */
6606 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6607 {
6608 s = htab->elf.sdynrelro;
6609 srel = htab->elf.sreldynrelro;
6610 }
6611 else
6612 {
6613 s = htab->elf.sdynbss;
6614 srel = htab->elf.srelbss;
6615 }
6616 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6617 {
6618 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6619 linker to copy the initial value out of the dynamic object
6620 and into the runtime process image. */
6621 srel->size += sizeof (Elf64_External_Rela);
6622 h->needs_copy = 1;
6623 }
6624
6625 /* We no longer want dyn_relocs. */
6626 h->dyn_relocs = NULL;
6627 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6628 }
6629
6630 /* If given a function descriptor symbol, hide both the function code
6631 sym and the descriptor. */
6632 static void
6633 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6634 struct elf_link_hash_entry *h,
6635 bfd_boolean force_local)
6636 {
6637 struct ppc_link_hash_entry *eh;
6638 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6639
6640 if (ppc_hash_table (info) == NULL)
6641 return;
6642
6643 eh = ppc_elf_hash_entry (h);
6644 if (eh->is_func_descriptor)
6645 {
6646 struct ppc_link_hash_entry *fh = eh->oh;
6647
6648 if (fh == NULL)
6649 {
6650 const char *p, *q;
6651 struct elf_link_hash_table *htab = elf_hash_table (info);
6652 char save;
6653
6654 /* We aren't supposed to use alloca in BFD because on
6655 systems which do not have alloca the version in libiberty
6656 calls xmalloc, which might cause the program to crash
6657 when it runs out of memory. This function doesn't have a
6658 return status, so there's no way to gracefully return an
6659 error. So cheat. We know that string[-1] can be safely
6660 accessed; It's either a string in an ELF string table,
6661 or allocated in an objalloc structure. */
6662
6663 p = eh->elf.root.root.string - 1;
6664 save = *p;
6665 *(char *) p = '.';
6666 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6667 FALSE, FALSE));
6668 *(char *) p = save;
6669
6670 /* Unfortunately, if it so happens that the string we were
6671 looking for was allocated immediately before this string,
6672 then we overwrote the string terminator. That's the only
6673 reason the lookup should fail. */
6674 if (fh == NULL)
6675 {
6676 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6677 while (q >= eh->elf.root.root.string && *q == *p)
6678 --q, --p;
6679 if (q < eh->elf.root.root.string && *p == '.')
6680 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6681 FALSE, FALSE));
6682 }
6683 if (fh != NULL)
6684 {
6685 eh->oh = fh;
6686 fh->oh = eh;
6687 }
6688 }
6689 if (fh != NULL)
6690 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6691 }
6692 }
6693
6694 static bfd_boolean
6695 get_sym_h (struct elf_link_hash_entry **hp,
6696 Elf_Internal_Sym **symp,
6697 asection **symsecp,
6698 unsigned char **tls_maskp,
6699 Elf_Internal_Sym **locsymsp,
6700 unsigned long r_symndx,
6701 bfd *ibfd)
6702 {
6703 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6704
6705 if (r_symndx >= symtab_hdr->sh_info)
6706 {
6707 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6708 struct elf_link_hash_entry *h;
6709
6710 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6711 h = elf_follow_link (h);
6712
6713 if (hp != NULL)
6714 *hp = h;
6715
6716 if (symp != NULL)
6717 *symp = NULL;
6718
6719 if (symsecp != NULL)
6720 {
6721 asection *symsec = NULL;
6722 if (h->root.type == bfd_link_hash_defined
6723 || h->root.type == bfd_link_hash_defweak)
6724 symsec = h->root.u.def.section;
6725 *symsecp = symsec;
6726 }
6727
6728 if (tls_maskp != NULL)
6729 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
6730 }
6731 else
6732 {
6733 Elf_Internal_Sym *sym;
6734 Elf_Internal_Sym *locsyms = *locsymsp;
6735
6736 if (locsyms == NULL)
6737 {
6738 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6739 if (locsyms == NULL)
6740 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6741 symtab_hdr->sh_info,
6742 0, NULL, NULL, NULL);
6743 if (locsyms == NULL)
6744 return FALSE;
6745 *locsymsp = locsyms;
6746 }
6747 sym = locsyms + r_symndx;
6748
6749 if (hp != NULL)
6750 *hp = NULL;
6751
6752 if (symp != NULL)
6753 *symp = sym;
6754
6755 if (symsecp != NULL)
6756 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6757
6758 if (tls_maskp != NULL)
6759 {
6760 struct got_entry **lgot_ents;
6761 unsigned char *tls_mask;
6762
6763 tls_mask = NULL;
6764 lgot_ents = elf_local_got_ents (ibfd);
6765 if (lgot_ents != NULL)
6766 {
6767 struct plt_entry **local_plt = (struct plt_entry **)
6768 (lgot_ents + symtab_hdr->sh_info);
6769 unsigned char *lgot_masks = (unsigned char *)
6770 (local_plt + symtab_hdr->sh_info);
6771 tls_mask = &lgot_masks[r_symndx];
6772 }
6773 *tls_maskp = tls_mask;
6774 }
6775 }
6776 return TRUE;
6777 }
6778
6779 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6780 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6781 type suitable for optimization, and 1 otherwise. */
6782
6783 static int
6784 get_tls_mask (unsigned char **tls_maskp,
6785 unsigned long *toc_symndx,
6786 bfd_vma *toc_addend,
6787 Elf_Internal_Sym **locsymsp,
6788 const Elf_Internal_Rela *rel,
6789 bfd *ibfd)
6790 {
6791 unsigned long r_symndx;
6792 int next_r;
6793 struct elf_link_hash_entry *h;
6794 Elf_Internal_Sym *sym;
6795 asection *sec;
6796 bfd_vma off;
6797
6798 r_symndx = ELF64_R_SYM (rel->r_info);
6799 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6800 return 0;
6801
6802 if ((*tls_maskp != NULL
6803 && (**tls_maskp & TLS_TLS) != 0
6804 && **tls_maskp != (TLS_TLS | TLS_MARK))
6805 || sec == NULL
6806 || ppc64_elf_section_data (sec) == NULL
6807 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6808 return 1;
6809
6810 /* Look inside a TOC section too. */
6811 if (h != NULL)
6812 {
6813 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6814 off = h->root.u.def.value;
6815 }
6816 else
6817 off = sym->st_value;
6818 off += rel->r_addend;
6819 BFD_ASSERT (off % 8 == 0);
6820 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6821 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6822 if (toc_symndx != NULL)
6823 *toc_symndx = r_symndx;
6824 if (toc_addend != NULL)
6825 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6826 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6827 return 0;
6828 if ((h == NULL || is_static_defined (h))
6829 && (next_r == -1 || next_r == -2))
6830 return 1 - next_r;
6831 return 1;
6832 }
6833
6834 /* Find (or create) an entry in the tocsave hash table. */
6835
6836 static struct tocsave_entry *
6837 tocsave_find (struct ppc_link_hash_table *htab,
6838 enum insert_option insert,
6839 Elf_Internal_Sym **local_syms,
6840 const Elf_Internal_Rela *irela,
6841 bfd *ibfd)
6842 {
6843 unsigned long r_indx;
6844 struct elf_link_hash_entry *h;
6845 Elf_Internal_Sym *sym;
6846 struct tocsave_entry ent, *p;
6847 hashval_t hash;
6848 struct tocsave_entry **slot;
6849
6850 r_indx = ELF64_R_SYM (irela->r_info);
6851 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6852 return NULL;
6853 if (ent.sec == NULL || ent.sec->output_section == NULL)
6854 {
6855 _bfd_error_handler
6856 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6857 return NULL;
6858 }
6859
6860 if (h != NULL)
6861 ent.offset = h->root.u.def.value;
6862 else
6863 ent.offset = sym->st_value;
6864 ent.offset += irela->r_addend;
6865
6866 hash = tocsave_htab_hash (&ent);
6867 slot = ((struct tocsave_entry **)
6868 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6869 if (slot == NULL)
6870 return NULL;
6871
6872 if (*slot == NULL)
6873 {
6874 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6875 if (p == NULL)
6876 return NULL;
6877 *p = ent;
6878 *slot = p;
6879 }
6880 return *slot;
6881 }
6882
6883 /* Adjust all global syms defined in opd sections. In gcc generated
6884 code for the old ABI, these will already have been done. */
6885
6886 static bfd_boolean
6887 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6888 {
6889 struct ppc_link_hash_entry *eh;
6890 asection *sym_sec;
6891 struct _opd_sec_data *opd;
6892
6893 if (h->root.type == bfd_link_hash_indirect)
6894 return TRUE;
6895
6896 if (h->root.type != bfd_link_hash_defined
6897 && h->root.type != bfd_link_hash_defweak)
6898 return TRUE;
6899
6900 eh = ppc_elf_hash_entry (h);
6901 if (eh->adjust_done)
6902 return TRUE;
6903
6904 sym_sec = eh->elf.root.u.def.section;
6905 opd = get_opd_info (sym_sec);
6906 if (opd != NULL && opd->adjust != NULL)
6907 {
6908 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6909 if (adjust == -1)
6910 {
6911 /* This entry has been deleted. */
6912 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6913 if (dsec == NULL)
6914 {
6915 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6916 if (discarded_section (dsec))
6917 {
6918 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6919 break;
6920 }
6921 }
6922 eh->elf.root.u.def.value = 0;
6923 eh->elf.root.u.def.section = dsec;
6924 }
6925 else
6926 eh->elf.root.u.def.value += adjust;
6927 eh->adjust_done = 1;
6928 }
6929 return TRUE;
6930 }
6931
6932 /* Handles decrementing dynamic reloc counts for the reloc specified by
6933 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6934 have already been determined. */
6935
6936 static bfd_boolean
6937 dec_dynrel_count (bfd_vma r_info,
6938 asection *sec,
6939 struct bfd_link_info *info,
6940 Elf_Internal_Sym **local_syms,
6941 struct elf_link_hash_entry *h,
6942 Elf_Internal_Sym *sym)
6943 {
6944 enum elf_ppc64_reloc_type r_type;
6945 asection *sym_sec = NULL;
6946
6947 /* Can this reloc be dynamic? This switch, and later tests here
6948 should be kept in sync with the code in check_relocs. */
6949 r_type = ELF64_R_TYPE (r_info);
6950 switch (r_type)
6951 {
6952 default:
6953 return TRUE;
6954
6955 case R_PPC64_TOC16:
6956 case R_PPC64_TOC16_DS:
6957 case R_PPC64_TOC16_LO:
6958 case R_PPC64_TOC16_HI:
6959 case R_PPC64_TOC16_HA:
6960 case R_PPC64_TOC16_LO_DS:
6961 if (h == NULL)
6962 return TRUE;
6963 break;
6964
6965 case R_PPC64_TPREL16:
6966 case R_PPC64_TPREL16_LO:
6967 case R_PPC64_TPREL16_HI:
6968 case R_PPC64_TPREL16_HA:
6969 case R_PPC64_TPREL16_DS:
6970 case R_PPC64_TPREL16_LO_DS:
6971 case R_PPC64_TPREL16_HIGH:
6972 case R_PPC64_TPREL16_HIGHA:
6973 case R_PPC64_TPREL16_HIGHER:
6974 case R_PPC64_TPREL16_HIGHERA:
6975 case R_PPC64_TPREL16_HIGHEST:
6976 case R_PPC64_TPREL16_HIGHESTA:
6977 case R_PPC64_TPREL64:
6978 case R_PPC64_TPREL34:
6979 case R_PPC64_DTPMOD64:
6980 case R_PPC64_DTPREL64:
6981 case R_PPC64_ADDR64:
6982 case R_PPC64_REL30:
6983 case R_PPC64_REL32:
6984 case R_PPC64_REL64:
6985 case R_PPC64_ADDR14:
6986 case R_PPC64_ADDR14_BRNTAKEN:
6987 case R_PPC64_ADDR14_BRTAKEN:
6988 case R_PPC64_ADDR16:
6989 case R_PPC64_ADDR16_DS:
6990 case R_PPC64_ADDR16_HA:
6991 case R_PPC64_ADDR16_HI:
6992 case R_PPC64_ADDR16_HIGH:
6993 case R_PPC64_ADDR16_HIGHA:
6994 case R_PPC64_ADDR16_HIGHER:
6995 case R_PPC64_ADDR16_HIGHERA:
6996 case R_PPC64_ADDR16_HIGHEST:
6997 case R_PPC64_ADDR16_HIGHESTA:
6998 case R_PPC64_ADDR16_LO:
6999 case R_PPC64_ADDR16_LO_DS:
7000 case R_PPC64_ADDR24:
7001 case R_PPC64_ADDR32:
7002 case R_PPC64_UADDR16:
7003 case R_PPC64_UADDR32:
7004 case R_PPC64_UADDR64:
7005 case R_PPC64_TOC:
7006 case R_PPC64_D34:
7007 case R_PPC64_D34_LO:
7008 case R_PPC64_D34_HI30:
7009 case R_PPC64_D34_HA30:
7010 case R_PPC64_ADDR16_HIGHER34:
7011 case R_PPC64_ADDR16_HIGHERA34:
7012 case R_PPC64_ADDR16_HIGHEST34:
7013 case R_PPC64_ADDR16_HIGHESTA34:
7014 case R_PPC64_D28:
7015 break;
7016 }
7017
7018 if (local_syms != NULL)
7019 {
7020 unsigned long r_symndx;
7021 bfd *ibfd = sec->owner;
7022
7023 r_symndx = ELF64_R_SYM (r_info);
7024 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7025 return FALSE;
7026 }
7027
7028 if ((h != NULL
7029 && (h->root.type == bfd_link_hash_defweak
7030 || !h->def_regular))
7031 || (h != NULL
7032 && !bfd_link_executable (info)
7033 && !SYMBOLIC_BIND (info, h))
7034 || (bfd_link_pic (info)
7035 && must_be_dyn_reloc (info, r_type))
7036 || (!bfd_link_pic (info)
7037 && (h != NULL
7038 ? h->type == STT_GNU_IFUNC
7039 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
7040 ;
7041 else
7042 return TRUE;
7043
7044 if (h != NULL)
7045 {
7046 struct elf_dyn_relocs *p;
7047 struct elf_dyn_relocs **pp;
7048 pp = &h->dyn_relocs;
7049
7050 /* elf_gc_sweep may have already removed all dyn relocs associated
7051 with local syms for a given section. Also, symbol flags are
7052 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7053 report a dynreloc miscount. */
7054 if (*pp == NULL && info->gc_sections)
7055 return TRUE;
7056
7057 while ((p = *pp) != NULL)
7058 {
7059 if (p->sec == sec)
7060 {
7061 if (!must_be_dyn_reloc (info, r_type))
7062 p->pc_count -= 1;
7063 p->count -= 1;
7064 if (p->count == 0)
7065 *pp = p->next;
7066 return TRUE;
7067 }
7068 pp = &p->next;
7069 }
7070 }
7071 else
7072 {
7073 struct ppc_dyn_relocs *p;
7074 struct ppc_dyn_relocs **pp;
7075 void *vpp;
7076 bfd_boolean is_ifunc;
7077
7078 if (local_syms == NULL)
7079 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7080 if (sym_sec == NULL)
7081 sym_sec = sec;
7082
7083 vpp = &elf_section_data (sym_sec)->local_dynrel;
7084 pp = (struct ppc_dyn_relocs **) vpp;
7085
7086 if (*pp == NULL && info->gc_sections)
7087 return TRUE;
7088
7089 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7090 while ((p = *pp) != NULL)
7091 {
7092 if (p->sec == sec && p->ifunc == is_ifunc)
7093 {
7094 p->count -= 1;
7095 if (p->count == 0)
7096 *pp = p->next;
7097 return TRUE;
7098 }
7099 pp = &p->next;
7100 }
7101 }
7102
7103 /* xgettext:c-format */
7104 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7105 sec->owner, sec);
7106 bfd_set_error (bfd_error_bad_value);
7107 return FALSE;
7108 }
7109
7110 /* Remove unused Official Procedure Descriptor entries. Currently we
7111 only remove those associated with functions in discarded link-once
7112 sections, or weakly defined functions that have been overridden. It
7113 would be possible to remove many more entries for statically linked
7114 applications. */
7115
7116 bfd_boolean
7117 ppc64_elf_edit_opd (struct bfd_link_info *info)
7118 {
7119 bfd *ibfd;
7120 bfd_boolean some_edited = FALSE;
7121 asection *need_pad = NULL;
7122 struct ppc_link_hash_table *htab;
7123
7124 htab = ppc_hash_table (info);
7125 if (htab == NULL)
7126 return FALSE;
7127
7128 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7129 {
7130 asection *sec;
7131 Elf_Internal_Rela *relstart, *rel, *relend;
7132 Elf_Internal_Shdr *symtab_hdr;
7133 Elf_Internal_Sym *local_syms;
7134 struct _opd_sec_data *opd;
7135 bfd_boolean need_edit, add_aux_fields, broken;
7136 bfd_size_type cnt_16b = 0;
7137
7138 if (!is_ppc64_elf (ibfd))
7139 continue;
7140
7141 sec = bfd_get_section_by_name (ibfd, ".opd");
7142 if (sec == NULL || sec->size == 0)
7143 continue;
7144
7145 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7146 continue;
7147
7148 if (sec->output_section == bfd_abs_section_ptr)
7149 continue;
7150
7151 /* Look through the section relocs. */
7152 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7153 continue;
7154
7155 local_syms = NULL;
7156 symtab_hdr = &elf_symtab_hdr (ibfd);
7157
7158 /* Read the relocations. */
7159 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7160 info->keep_memory);
7161 if (relstart == NULL)
7162 return FALSE;
7163
7164 /* First run through the relocs to check they are sane, and to
7165 determine whether we need to edit this opd section. */
7166 need_edit = FALSE;
7167 broken = FALSE;
7168 need_pad = sec;
7169 relend = relstart + sec->reloc_count;
7170 for (rel = relstart; rel < relend; )
7171 {
7172 enum elf_ppc64_reloc_type r_type;
7173 unsigned long r_symndx;
7174 asection *sym_sec;
7175 struct elf_link_hash_entry *h;
7176 Elf_Internal_Sym *sym;
7177 bfd_vma offset;
7178
7179 /* .opd contains an array of 16 or 24 byte entries. We're
7180 only interested in the reloc pointing to a function entry
7181 point. */
7182 offset = rel->r_offset;
7183 if (rel + 1 == relend
7184 || rel[1].r_offset != offset + 8)
7185 {
7186 /* If someone messes with .opd alignment then after a
7187 "ld -r" we might have padding in the middle of .opd.
7188 Also, there's nothing to prevent someone putting
7189 something silly in .opd with the assembler. No .opd
7190 optimization for them! */
7191 broken_opd:
7192 _bfd_error_handler
7193 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7194 broken = TRUE;
7195 break;
7196 }
7197
7198 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7199 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7200 {
7201 _bfd_error_handler
7202 /* xgettext:c-format */
7203 (_("%pB: unexpected reloc type %u in .opd section"),
7204 ibfd, r_type);
7205 broken = TRUE;
7206 break;
7207 }
7208
7209 r_symndx = ELF64_R_SYM (rel->r_info);
7210 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7211 r_symndx, ibfd))
7212 goto error_ret;
7213
7214 if (sym_sec == NULL || sym_sec->owner == NULL)
7215 {
7216 const char *sym_name;
7217 if (h != NULL)
7218 sym_name = h->root.root.string;
7219 else
7220 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7221 sym_sec);
7222
7223 _bfd_error_handler
7224 /* xgettext:c-format */
7225 (_("%pB: undefined sym `%s' in .opd section"),
7226 ibfd, sym_name);
7227 broken = TRUE;
7228 break;
7229 }
7230
7231 /* opd entries are always for functions defined in the
7232 current input bfd. If the symbol isn't defined in the
7233 input bfd, then we won't be using the function in this
7234 bfd; It must be defined in a linkonce section in another
7235 bfd, or is weak. It's also possible that we are
7236 discarding the function due to a linker script /DISCARD/,
7237 which we test for via the output_section. */
7238 if (sym_sec->owner != ibfd
7239 || sym_sec->output_section == bfd_abs_section_ptr)
7240 need_edit = TRUE;
7241
7242 rel += 2;
7243 if (rel + 1 == relend
7244 || (rel + 2 < relend
7245 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7246 ++rel;
7247
7248 if (rel == relend)
7249 {
7250 if (sec->size == offset + 24)
7251 {
7252 need_pad = NULL;
7253 break;
7254 }
7255 if (sec->size == offset + 16)
7256 {
7257 cnt_16b++;
7258 break;
7259 }
7260 goto broken_opd;
7261 }
7262 else if (rel + 1 < relend
7263 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7264 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7265 {
7266 if (rel[0].r_offset == offset + 16)
7267 cnt_16b++;
7268 else if (rel[0].r_offset != offset + 24)
7269 goto broken_opd;
7270 }
7271 else
7272 goto broken_opd;
7273 }
7274
7275 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7276
7277 if (!broken && (need_edit || add_aux_fields))
7278 {
7279 Elf_Internal_Rela *write_rel;
7280 Elf_Internal_Shdr *rel_hdr;
7281 bfd_byte *rptr, *wptr;
7282 bfd_byte *new_contents;
7283 bfd_size_type amt;
7284
7285 new_contents = NULL;
7286 amt = OPD_NDX (sec->size) * sizeof (long);
7287 opd = &ppc64_elf_section_data (sec)->u.opd;
7288 opd->adjust = bfd_zalloc (sec->owner, amt);
7289 if (opd->adjust == NULL)
7290 return FALSE;
7291
7292 /* This seems a waste of time as input .opd sections are all
7293 zeros as generated by gcc, but I suppose there's no reason
7294 this will always be so. We might start putting something in
7295 the third word of .opd entries. */
7296 if ((sec->flags & SEC_IN_MEMORY) == 0)
7297 {
7298 bfd_byte *loc;
7299 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7300 {
7301 free (loc);
7302 error_ret:
7303 if (symtab_hdr->contents != (unsigned char *) local_syms)
7304 free (local_syms);
7305 if (elf_section_data (sec)->relocs != relstart)
7306 free (relstart);
7307 return FALSE;
7308 }
7309 sec->contents = loc;
7310 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7311 }
7312
7313 elf_section_data (sec)->relocs = relstart;
7314
7315 new_contents = sec->contents;
7316 if (add_aux_fields)
7317 {
7318 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7319 if (new_contents == NULL)
7320 return FALSE;
7321 need_pad = NULL;
7322 }
7323 wptr = new_contents;
7324 rptr = sec->contents;
7325 write_rel = relstart;
7326 for (rel = relstart; rel < relend; )
7327 {
7328 unsigned long r_symndx;
7329 asection *sym_sec;
7330 struct elf_link_hash_entry *h;
7331 struct ppc_link_hash_entry *fdh = NULL;
7332 Elf_Internal_Sym *sym;
7333 long opd_ent_size;
7334 Elf_Internal_Rela *next_rel;
7335 bfd_boolean skip;
7336
7337 r_symndx = ELF64_R_SYM (rel->r_info);
7338 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7339 r_symndx, ibfd))
7340 goto error_ret;
7341
7342 next_rel = rel + 2;
7343 if (next_rel + 1 == relend
7344 || (next_rel + 2 < relend
7345 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7346 ++next_rel;
7347
7348 /* See if the .opd entry is full 24 byte or
7349 16 byte (with fd_aux entry overlapped with next
7350 fd_func). */
7351 opd_ent_size = 24;
7352 if (next_rel == relend)
7353 {
7354 if (sec->size == rel->r_offset + 16)
7355 opd_ent_size = 16;
7356 }
7357 else if (next_rel->r_offset == rel->r_offset + 16)
7358 opd_ent_size = 16;
7359
7360 if (h != NULL
7361 && h->root.root.string[0] == '.')
7362 {
7363 fdh = ppc_elf_hash_entry (h)->oh;
7364 if (fdh != NULL)
7365 {
7366 fdh = ppc_follow_link (fdh);
7367 if (fdh->elf.root.type != bfd_link_hash_defined
7368 && fdh->elf.root.type != bfd_link_hash_defweak)
7369 fdh = NULL;
7370 }
7371 }
7372
7373 skip = (sym_sec->owner != ibfd
7374 || sym_sec->output_section == bfd_abs_section_ptr);
7375 if (skip)
7376 {
7377 if (fdh != NULL && sym_sec->owner == ibfd)
7378 {
7379 /* Arrange for the function descriptor sym
7380 to be dropped. */
7381 fdh->elf.root.u.def.value = 0;
7382 fdh->elf.root.u.def.section = sym_sec;
7383 }
7384 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7385
7386 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7387 rel = next_rel;
7388 else
7389 while (1)
7390 {
7391 if (!dec_dynrel_count (rel->r_info, sec, info,
7392 NULL, h, sym))
7393 goto error_ret;
7394
7395 if (++rel == next_rel)
7396 break;
7397
7398 r_symndx = ELF64_R_SYM (rel->r_info);
7399 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7400 r_symndx, ibfd))
7401 goto error_ret;
7402 }
7403 }
7404 else
7405 {
7406 /* We'll be keeping this opd entry. */
7407 long adjust;
7408
7409 if (fdh != NULL)
7410 {
7411 /* Redefine the function descriptor symbol to
7412 this location in the opd section. It is
7413 necessary to update the value here rather
7414 than using an array of adjustments as we do
7415 for local symbols, because various places
7416 in the generic ELF code use the value
7417 stored in u.def.value. */
7418 fdh->elf.root.u.def.value = wptr - new_contents;
7419 fdh->adjust_done = 1;
7420 }
7421
7422 /* Local syms are a bit tricky. We could
7423 tweak them as they can be cached, but
7424 we'd need to look through the local syms
7425 for the function descriptor sym which we
7426 don't have at the moment. So keep an
7427 array of adjustments. */
7428 adjust = (wptr - new_contents) - (rptr - sec->contents);
7429 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7430
7431 if (wptr != rptr)
7432 memcpy (wptr, rptr, opd_ent_size);
7433 wptr += opd_ent_size;
7434 if (add_aux_fields && opd_ent_size == 16)
7435 {
7436 memset (wptr, '\0', 8);
7437 wptr += 8;
7438 }
7439
7440 /* We need to adjust any reloc offsets to point to the
7441 new opd entries. */
7442 for ( ; rel != next_rel; ++rel)
7443 {
7444 rel->r_offset += adjust;
7445 if (write_rel != rel)
7446 memcpy (write_rel, rel, sizeof (*rel));
7447 ++write_rel;
7448 }
7449 }
7450
7451 rptr += opd_ent_size;
7452 }
7453
7454 sec->size = wptr - new_contents;
7455 sec->reloc_count = write_rel - relstart;
7456 if (add_aux_fields)
7457 {
7458 free (sec->contents);
7459 sec->contents = new_contents;
7460 }
7461
7462 /* Fudge the header size too, as this is used later in
7463 elf_bfd_final_link if we are emitting relocs. */
7464 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7465 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7466 some_edited = TRUE;
7467 }
7468 else if (elf_section_data (sec)->relocs != relstart)
7469 free (relstart);
7470
7471 if (local_syms != NULL
7472 && symtab_hdr->contents != (unsigned char *) local_syms)
7473 {
7474 if (!info->keep_memory)
7475 free (local_syms);
7476 else
7477 symtab_hdr->contents = (unsigned char *) local_syms;
7478 }
7479 }
7480
7481 if (some_edited)
7482 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7483
7484 /* If we are doing a final link and the last .opd entry is just 16 byte
7485 long, add a 8 byte padding after it. */
7486 if (need_pad != NULL && !bfd_link_relocatable (info))
7487 {
7488 bfd_byte *p;
7489
7490 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7491 {
7492 BFD_ASSERT (need_pad->size > 0);
7493
7494 p = bfd_malloc (need_pad->size + 8);
7495 if (p == NULL)
7496 return FALSE;
7497
7498 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7499 p, 0, need_pad->size))
7500 return FALSE;
7501
7502 need_pad->contents = p;
7503 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7504 }
7505 else
7506 {
7507 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7508 if (p == NULL)
7509 return FALSE;
7510
7511 need_pad->contents = p;
7512 }
7513
7514 memset (need_pad->contents + need_pad->size, 0, 8);
7515 need_pad->size += 8;
7516 }
7517
7518 return TRUE;
7519 }
7520
7521 /* Analyze inline PLT call relocations to see whether calls to locally
7522 defined functions can be converted to direct calls. */
7523
7524 bfd_boolean
7525 ppc64_elf_inline_plt (struct bfd_link_info *info)
7526 {
7527 struct ppc_link_hash_table *htab;
7528 bfd *ibfd;
7529 asection *sec;
7530 bfd_vma low_vma, high_vma, limit;
7531
7532 htab = ppc_hash_table (info);
7533 if (htab == NULL)
7534 return FALSE;
7535
7536 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7537 reduced somewhat to cater for possible stubs that might be added
7538 between the call and its destination. */
7539 if (htab->params->group_size < 0)
7540 {
7541 limit = -htab->params->group_size;
7542 if (limit == 1)
7543 limit = 0x1e00000;
7544 }
7545 else
7546 {
7547 limit = htab->params->group_size;
7548 if (limit == 1)
7549 limit = 0x1c00000;
7550 }
7551
7552 low_vma = -1;
7553 high_vma = 0;
7554 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7555 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7556 {
7557 if (low_vma > sec->vma)
7558 low_vma = sec->vma;
7559 if (high_vma < sec->vma + sec->size)
7560 high_vma = sec->vma + sec->size;
7561 }
7562
7563 /* If a "bl" can reach anywhere in local code sections, then we can
7564 convert all inline PLT sequences to direct calls when the symbol
7565 is local. */
7566 if (high_vma - low_vma < limit)
7567 {
7568 htab->can_convert_all_inline_plt = 1;
7569 return TRUE;
7570 }
7571
7572 /* Otherwise, go looking through relocs for cases where a direct
7573 call won't reach. Mark the symbol on any such reloc to disable
7574 the optimization and keep the PLT entry as it seems likely that
7575 this will be better than creating trampolines. Note that this
7576 will disable the optimization for all inline PLT calls to a
7577 particular symbol, not just those that won't reach. The
7578 difficulty in doing a more precise optimization is that the
7579 linker needs to make a decision depending on whether a
7580 particular R_PPC64_PLTCALL insn can be turned into a direct
7581 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7582 the sequence, and there is nothing that ties those relocs
7583 together except their symbol. */
7584
7585 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7586 {
7587 Elf_Internal_Shdr *symtab_hdr;
7588 Elf_Internal_Sym *local_syms;
7589
7590 if (!is_ppc64_elf (ibfd))
7591 continue;
7592
7593 local_syms = NULL;
7594 symtab_hdr = &elf_symtab_hdr (ibfd);
7595
7596 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7597 if (ppc64_elf_section_data (sec)->has_pltcall
7598 && !bfd_is_abs_section (sec->output_section))
7599 {
7600 Elf_Internal_Rela *relstart, *rel, *relend;
7601
7602 /* Read the relocations. */
7603 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7604 info->keep_memory);
7605 if (relstart == NULL)
7606 return FALSE;
7607
7608 relend = relstart + sec->reloc_count;
7609 for (rel = relstart; rel < relend; rel++)
7610 {
7611 enum elf_ppc64_reloc_type r_type;
7612 unsigned long r_symndx;
7613 asection *sym_sec;
7614 struct elf_link_hash_entry *h;
7615 Elf_Internal_Sym *sym;
7616 unsigned char *tls_maskp;
7617
7618 r_type = ELF64_R_TYPE (rel->r_info);
7619 if (r_type != R_PPC64_PLTCALL
7620 && r_type != R_PPC64_PLTCALL_NOTOC)
7621 continue;
7622
7623 r_symndx = ELF64_R_SYM (rel->r_info);
7624 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7625 r_symndx, ibfd))
7626 {
7627 if (elf_section_data (sec)->relocs != relstart)
7628 free (relstart);
7629 if (symtab_hdr->contents != (bfd_byte *) local_syms)
7630 free (local_syms);
7631 return FALSE;
7632 }
7633
7634 if (sym_sec != NULL && sym_sec->output_section != NULL)
7635 {
7636 bfd_vma from, to;
7637 if (h != NULL)
7638 to = h->root.u.def.value;
7639 else
7640 to = sym->st_value;
7641 to += (rel->r_addend
7642 + sym_sec->output_offset
7643 + sym_sec->output_section->vma);
7644 from = (rel->r_offset
7645 + sec->output_offset
7646 + sec->output_section->vma);
7647 if (to - from + limit < 2 * limit
7648 && !(r_type == R_PPC64_PLTCALL_NOTOC
7649 && (((h ? h->other : sym->st_other)
7650 & STO_PPC64_LOCAL_MASK)
7651 > 1 << STO_PPC64_LOCAL_BIT)))
7652 *tls_maskp &= ~PLT_KEEP;
7653 }
7654 }
7655 if (elf_section_data (sec)->relocs != relstart)
7656 free (relstart);
7657 }
7658
7659 if (local_syms != NULL
7660 && symtab_hdr->contents != (unsigned char *) local_syms)
7661 {
7662 if (!info->keep_memory)
7663 free (local_syms);
7664 else
7665 symtab_hdr->contents = (unsigned char *) local_syms;
7666 }
7667 }
7668
7669 return TRUE;
7670 }
7671
7672 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7673
7674 asection *
7675 ppc64_elf_tls_setup (struct bfd_link_info *info)
7676 {
7677 struct ppc_link_hash_table *htab;
7678 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
7679
7680 htab = ppc_hash_table (info);
7681 if (htab == NULL)
7682 return NULL;
7683
7684 if (abiversion (info->output_bfd) == 1)
7685 htab->opd_abi = 1;
7686
7687 if (htab->params->no_multi_toc)
7688 htab->do_multi_toc = 0;
7689 else if (!htab->do_multi_toc)
7690 htab->params->no_multi_toc = 1;
7691
7692 /* Default to --no-plt-localentry, as this option can cause problems
7693 with symbol interposition. For example, glibc libpthread.so and
7694 libc.so duplicate many pthread symbols, with a fallback
7695 implementation in libc.so. In some cases the fallback does more
7696 work than the pthread implementation. __pthread_condattr_destroy
7697 is one such symbol: the libpthread.so implementation is
7698 localentry:0 while the libc.so implementation is localentry:8.
7699 An app that "cleverly" uses dlopen to only load necessary
7700 libraries at runtime may omit loading libpthread.so when not
7701 running multi-threaded, which then results in the libc.so
7702 fallback symbols being used and ld.so complaining. Now there
7703 are workarounds in ld (see non_zero_localentry) to detect the
7704 pthread situation, but that may not be the only case where
7705 --plt-localentry can cause trouble. */
7706 if (htab->params->plt_localentry0 < 0)
7707 htab->params->plt_localentry0 = 0;
7708 if (htab->params->plt_localentry0
7709 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7710 FALSE, FALSE, FALSE) == NULL)
7711 _bfd_error_handler
7712 (_("warning: --plt-localentry is especially dangerous without "
7713 "ld.so support to detect ABI violations"));
7714
7715 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7716 FALSE, FALSE, TRUE);
7717 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7718
7719 /* Move dynamic linking info to the function descriptor sym. */
7720 if (tga != NULL)
7721 func_desc_adjust (tga, info);
7722 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7723 FALSE, FALSE, TRUE);
7724 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7725
7726 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7727 FALSE, FALSE, TRUE);
7728 htab->tga_desc = ppc_elf_hash_entry (desc);
7729 if (desc != NULL)
7730 func_desc_adjust (desc, info);
7731 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7732 FALSE, FALSE, TRUE);
7733 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7734
7735 if (htab->params->tls_get_addr_opt)
7736 {
7737 struct elf_link_hash_entry *opt, *opt_fd;
7738
7739 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7740 FALSE, FALSE, TRUE);
7741 if (opt != NULL)
7742 func_desc_adjust (opt, info);
7743 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7744 FALSE, FALSE, TRUE);
7745 if (opt_fd != NULL
7746 && (opt_fd->root.type == bfd_link_hash_defined
7747 || opt_fd->root.type == bfd_link_hash_defweak))
7748 {
7749 /* If glibc supports an optimized __tls_get_addr call stub,
7750 signalled by the presence of __tls_get_addr_opt, and we'll
7751 be calling __tls_get_addr via a plt call stub, then
7752 make __tls_get_addr point to __tls_get_addr_opt. */
7753 if (!(htab->elf.dynamic_sections_created
7754 && tga_fd != NULL
7755 && (tga_fd->type == STT_FUNC
7756 || tga_fd->needs_plt)
7757 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7758 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7759 tga_fd = NULL;
7760 if (!(htab->elf.dynamic_sections_created
7761 && desc_fd != NULL
7762 && (desc_fd->type == STT_FUNC
7763 || desc_fd->needs_plt)
7764 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7765 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7766 desc_fd = NULL;
7767
7768 if (tga_fd != NULL || desc_fd != NULL)
7769 {
7770 struct plt_entry *ent = NULL;
7771
7772 if (tga_fd != NULL)
7773 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7774 if (ent->plt.refcount > 0)
7775 break;
7776 if (ent == NULL && desc_fd != NULL)
7777 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7778 if (ent->plt.refcount > 0)
7779 break;
7780 if (ent != NULL)
7781 {
7782 if (tga_fd != NULL)
7783 {
7784 tga_fd->root.type = bfd_link_hash_indirect;
7785 tga_fd->root.u.i.link = &opt_fd->root;
7786 tga_fd->root.u.i.warning = NULL;
7787 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7788 }
7789 if (desc_fd != NULL)
7790 {
7791 desc_fd->root.type = bfd_link_hash_indirect;
7792 desc_fd->root.u.i.link = &opt_fd->root;
7793 desc_fd->root.u.i.warning = NULL;
7794 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7795 }
7796 opt_fd->mark = 1;
7797 if (opt_fd->dynindx != -1)
7798 {
7799 /* Use __tls_get_addr_opt in dynamic relocations. */
7800 opt_fd->dynindx = -1;
7801 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7802 opt_fd->dynstr_index);
7803 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7804 return NULL;
7805 }
7806 if (tga_fd != NULL)
7807 {
7808 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7809 tga = &htab->tls_get_addr->elf;
7810 if (opt != NULL && tga != NULL)
7811 {
7812 tga->root.type = bfd_link_hash_indirect;
7813 tga->root.u.i.link = &opt->root;
7814 tga->root.u.i.warning = NULL;
7815 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7816 opt->mark = 1;
7817 _bfd_elf_link_hash_hide_symbol (info, opt,
7818 tga->forced_local);
7819 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7820 }
7821 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7822 htab->tls_get_addr_fd->is_func_descriptor = 1;
7823 if (htab->tls_get_addr != NULL)
7824 {
7825 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7826 htab->tls_get_addr->is_func = 1;
7827 }
7828 }
7829 if (desc_fd != NULL)
7830 {
7831 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7832 if (opt != NULL && desc != NULL)
7833 {
7834 desc->root.type = bfd_link_hash_indirect;
7835 desc->root.u.i.link = &opt->root;
7836 desc->root.u.i.warning = NULL;
7837 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7838 opt->mark = 1;
7839 _bfd_elf_link_hash_hide_symbol (info, opt,
7840 desc->forced_local);
7841 htab->tga_desc = ppc_elf_hash_entry (opt);
7842 }
7843 htab->tga_desc_fd->oh = htab->tga_desc;
7844 htab->tga_desc_fd->is_func_descriptor = 1;
7845 if (htab->tga_desc != NULL)
7846 {
7847 htab->tga_desc->oh = htab->tga_desc_fd;
7848 htab->tga_desc->is_func = 1;
7849 }
7850 }
7851 }
7852 }
7853 }
7854 else if (htab->params->tls_get_addr_opt < 0)
7855 htab->params->tls_get_addr_opt = 0;
7856 }
7857
7858 if (htab->tga_desc_fd != NULL
7859 && htab->params->tls_get_addr_opt
7860 && htab->params->no_tls_get_addr_regsave == -1)
7861 htab->params->no_tls_get_addr_regsave = 0;
7862
7863 return _bfd_elf_tls_setup (info->output_bfd, info);
7864 }
7865
7866 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7867 any of HASH1, HASH2, HASH3, or HASH4. */
7868
7869 static bfd_boolean
7870 branch_reloc_hash_match (const bfd *ibfd,
7871 const Elf_Internal_Rela *rel,
7872 const struct ppc_link_hash_entry *hash1,
7873 const struct ppc_link_hash_entry *hash2,
7874 const struct ppc_link_hash_entry *hash3,
7875 const struct ppc_link_hash_entry *hash4)
7876 {
7877 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7878 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7879 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7880
7881 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7882 {
7883 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7884 struct elf_link_hash_entry *h;
7885
7886 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7887 h = elf_follow_link (h);
7888 if (h == &hash1->elf || h == &hash2->elf
7889 || h == &hash3->elf || h == &hash4->elf)
7890 return TRUE;
7891 }
7892 return FALSE;
7893 }
7894
7895 /* Run through all the TLS relocs looking for optimization
7896 opportunities. The linker has been hacked (see ppc64elf.em) to do
7897 a preliminary section layout so that we know the TLS segment
7898 offsets. We can't optimize earlier because some optimizations need
7899 to know the tp offset, and we need to optimize before allocating
7900 dynamic relocations. */
7901
7902 bfd_boolean
7903 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7904 {
7905 bfd *ibfd;
7906 asection *sec;
7907 struct ppc_link_hash_table *htab;
7908 unsigned char *toc_ref;
7909 int pass;
7910
7911 if (!bfd_link_executable (info))
7912 return TRUE;
7913
7914 htab = ppc_hash_table (info);
7915 if (htab == NULL)
7916 return FALSE;
7917
7918 /* Make two passes over the relocs. On the first pass, mark toc
7919 entries involved with tls relocs, and check that tls relocs
7920 involved in setting up a tls_get_addr call are indeed followed by
7921 such a call. If they are not, we can't do any tls optimization.
7922 On the second pass twiddle tls_mask flags to notify
7923 relocate_section that optimization can be done, and adjust got
7924 and plt refcounts. */
7925 toc_ref = NULL;
7926 for (pass = 0; pass < 2; ++pass)
7927 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7928 {
7929 Elf_Internal_Sym *locsyms = NULL;
7930 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7931
7932 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7933 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7934 {
7935 Elf_Internal_Rela *relstart, *rel, *relend;
7936 bfd_boolean found_tls_get_addr_arg = 0;
7937
7938 /* Read the relocations. */
7939 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7940 info->keep_memory);
7941 if (relstart == NULL)
7942 {
7943 free (toc_ref);
7944 return FALSE;
7945 }
7946
7947 relend = relstart + sec->reloc_count;
7948 for (rel = relstart; rel < relend; rel++)
7949 {
7950 enum elf_ppc64_reloc_type r_type;
7951 unsigned long r_symndx;
7952 struct elf_link_hash_entry *h;
7953 Elf_Internal_Sym *sym;
7954 asection *sym_sec;
7955 unsigned char *tls_mask;
7956 unsigned int tls_set, tls_clear, tls_type = 0;
7957 bfd_vma value;
7958 bfd_boolean ok_tprel, is_local;
7959 long toc_ref_index = 0;
7960 int expecting_tls_get_addr = 0;
7961 bfd_boolean ret = FALSE;
7962
7963 r_symndx = ELF64_R_SYM (rel->r_info);
7964 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7965 r_symndx, ibfd))
7966 {
7967 err_free_rel:
7968 if (elf_section_data (sec)->relocs != relstart)
7969 free (relstart);
7970 free (toc_ref);
7971 if (elf_symtab_hdr (ibfd).contents
7972 != (unsigned char *) locsyms)
7973 free (locsyms);
7974 return ret;
7975 }
7976
7977 if (h != NULL)
7978 {
7979 if (h->root.type == bfd_link_hash_defined
7980 || h->root.type == bfd_link_hash_defweak)
7981 value = h->root.u.def.value;
7982 else if (h->root.type == bfd_link_hash_undefweak)
7983 value = 0;
7984 else
7985 {
7986 found_tls_get_addr_arg = 0;
7987 continue;
7988 }
7989 }
7990 else
7991 /* Symbols referenced by TLS relocs must be of type
7992 STT_TLS. So no need for .opd local sym adjust. */
7993 value = sym->st_value;
7994
7995 ok_tprel = FALSE;
7996 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7997 if (is_local)
7998 {
7999 if (h != NULL
8000 && h->root.type == bfd_link_hash_undefweak)
8001 ok_tprel = TRUE;
8002 else if (sym_sec != NULL
8003 && sym_sec->output_section != NULL)
8004 {
8005 value += sym_sec->output_offset;
8006 value += sym_sec->output_section->vma;
8007 value -= htab->elf.tls_sec->vma + TP_OFFSET;
8008 /* Note that even though the prefix insns
8009 allow a 1<<33 offset we use the same test
8010 as for addis;addi. There may be a mix of
8011 pcrel and non-pcrel code and the decision
8012 to optimise is per symbol, not per TLS
8013 sequence. */
8014 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
8015 }
8016 }
8017
8018 r_type = ELF64_R_TYPE (rel->r_info);
8019 /* If this section has old-style __tls_get_addr calls
8020 without marker relocs, then check that each
8021 __tls_get_addr call reloc is preceded by a reloc
8022 that conceivably belongs to the __tls_get_addr arg
8023 setup insn. If we don't find matching arg setup
8024 relocs, don't do any tls optimization. */
8025 if (pass == 0
8026 && sec->nomark_tls_get_addr
8027 && h != NULL
8028 && is_tls_get_addr (h, htab)
8029 && !found_tls_get_addr_arg
8030 && is_branch_reloc (r_type))
8031 {
8032 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8033 "TLS optimization disabled\n"),
8034 ibfd, sec, rel->r_offset);
8035 ret = TRUE;
8036 goto err_free_rel;
8037 }
8038
8039 found_tls_get_addr_arg = 0;
8040 switch (r_type)
8041 {
8042 case R_PPC64_GOT_TLSLD16:
8043 case R_PPC64_GOT_TLSLD16_LO:
8044 case R_PPC64_GOT_TLSLD34:
8045 expecting_tls_get_addr = 1;
8046 found_tls_get_addr_arg = 1;
8047 /* Fall through. */
8048
8049 case R_PPC64_GOT_TLSLD16_HI:
8050 case R_PPC64_GOT_TLSLD16_HA:
8051 /* These relocs should never be against a symbol
8052 defined in a shared lib. Leave them alone if
8053 that turns out to be the case. */
8054 if (!is_local)
8055 continue;
8056
8057 /* LD -> LE */
8058 tls_set = 0;
8059 tls_clear = TLS_LD;
8060 tls_type = TLS_TLS | TLS_LD;
8061 break;
8062
8063 case R_PPC64_GOT_TLSGD16:
8064 case R_PPC64_GOT_TLSGD16_LO:
8065 case R_PPC64_GOT_TLSGD34:
8066 expecting_tls_get_addr = 1;
8067 found_tls_get_addr_arg = 1;
8068 /* Fall through. */
8069
8070 case R_PPC64_GOT_TLSGD16_HI:
8071 case R_PPC64_GOT_TLSGD16_HA:
8072 if (ok_tprel)
8073 /* GD -> LE */
8074 tls_set = 0;
8075 else
8076 /* GD -> IE */
8077 tls_set = TLS_TLS | TLS_GDIE;
8078 tls_clear = TLS_GD;
8079 tls_type = TLS_TLS | TLS_GD;
8080 break;
8081
8082 case R_PPC64_GOT_TPREL34:
8083 case R_PPC64_GOT_TPREL16_DS:
8084 case R_PPC64_GOT_TPREL16_LO_DS:
8085 case R_PPC64_GOT_TPREL16_HI:
8086 case R_PPC64_GOT_TPREL16_HA:
8087 if (ok_tprel)
8088 {
8089 /* IE -> LE */
8090 tls_set = 0;
8091 tls_clear = TLS_TPREL;
8092 tls_type = TLS_TLS | TLS_TPREL;
8093 break;
8094 }
8095 continue;
8096
8097 case R_PPC64_TLSLD:
8098 if (!is_local)
8099 continue;
8100 /* Fall through. */
8101 case R_PPC64_TLSGD:
8102 if (rel + 1 < relend
8103 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8104 {
8105 if (pass != 0
8106 && (ELF64_R_TYPE (rel[1].r_info)
8107 != R_PPC64_PLTSEQ)
8108 && (ELF64_R_TYPE (rel[1].r_info)
8109 != R_PPC64_PLTSEQ_NOTOC))
8110 {
8111 r_symndx = ELF64_R_SYM (rel[1].r_info);
8112 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8113 r_symndx, ibfd))
8114 goto err_free_rel;
8115 if (h != NULL)
8116 {
8117 struct plt_entry *ent = NULL;
8118
8119 for (ent = h->plt.plist;
8120 ent != NULL;
8121 ent = ent->next)
8122 if (ent->addend == rel[1].r_addend)
8123 break;
8124
8125 if (ent != NULL
8126 && ent->plt.refcount > 0)
8127 ent->plt.refcount -= 1;
8128 }
8129 }
8130 continue;
8131 }
8132 found_tls_get_addr_arg = 1;
8133 /* Fall through. */
8134
8135 case R_PPC64_TLS:
8136 case R_PPC64_TOC16:
8137 case R_PPC64_TOC16_LO:
8138 if (sym_sec == NULL || sym_sec != toc)
8139 continue;
8140
8141 /* Mark this toc entry as referenced by a TLS
8142 code sequence. We can do that now in the
8143 case of R_PPC64_TLS, and after checking for
8144 tls_get_addr for the TOC16 relocs. */
8145 if (toc_ref == NULL)
8146 toc_ref
8147 = bfd_zmalloc (toc->output_section->rawsize / 8);
8148 if (toc_ref == NULL)
8149 goto err_free_rel;
8150
8151 if (h != NULL)
8152 value = h->root.u.def.value;
8153 else
8154 value = sym->st_value;
8155 value += rel->r_addend;
8156 if (value % 8 != 0)
8157 continue;
8158 BFD_ASSERT (value < toc->size
8159 && toc->output_offset % 8 == 0);
8160 toc_ref_index = (value + toc->output_offset) / 8;
8161 if (r_type == R_PPC64_TLS
8162 || r_type == R_PPC64_TLSGD
8163 || r_type == R_PPC64_TLSLD)
8164 {
8165 toc_ref[toc_ref_index] = 1;
8166 continue;
8167 }
8168
8169 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8170 continue;
8171
8172 tls_set = 0;
8173 tls_clear = 0;
8174 expecting_tls_get_addr = 2;
8175 break;
8176
8177 case R_PPC64_TPREL64:
8178 if (pass == 0
8179 || sec != toc
8180 || toc_ref == NULL
8181 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8182 continue;
8183 if (ok_tprel)
8184 {
8185 /* IE -> LE */
8186 tls_set = TLS_EXPLICIT;
8187 tls_clear = TLS_TPREL;
8188 break;
8189 }
8190 continue;
8191
8192 case R_PPC64_DTPMOD64:
8193 if (pass == 0
8194 || sec != toc
8195 || toc_ref == NULL
8196 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8197 continue;
8198 if (rel + 1 < relend
8199 && (rel[1].r_info
8200 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8201 && rel[1].r_offset == rel->r_offset + 8)
8202 {
8203 if (ok_tprel)
8204 /* GD -> LE */
8205 tls_set = TLS_EXPLICIT | TLS_GD;
8206 else
8207 /* GD -> IE */
8208 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8209 tls_clear = TLS_GD;
8210 }
8211 else
8212 {
8213 if (!is_local)
8214 continue;
8215
8216 /* LD -> LE */
8217 tls_set = TLS_EXPLICIT;
8218 tls_clear = TLS_LD;
8219 }
8220 break;
8221
8222 default:
8223 continue;
8224 }
8225
8226 if (pass == 0)
8227 {
8228 if (!expecting_tls_get_addr
8229 || !sec->nomark_tls_get_addr)
8230 continue;
8231
8232 if (rel + 1 < relend
8233 && branch_reloc_hash_match (ibfd, rel + 1,
8234 htab->tls_get_addr_fd,
8235 htab->tga_desc_fd,
8236 htab->tls_get_addr,
8237 htab->tga_desc))
8238 {
8239 if (expecting_tls_get_addr == 2)
8240 {
8241 /* Check for toc tls entries. */
8242 unsigned char *toc_tls;
8243 int retval;
8244
8245 retval = get_tls_mask (&toc_tls, NULL, NULL,
8246 &locsyms,
8247 rel, ibfd);
8248 if (retval == 0)
8249 goto err_free_rel;
8250 if (toc_tls != NULL)
8251 {
8252 if ((*toc_tls & TLS_TLS) != 0
8253 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8254 found_tls_get_addr_arg = 1;
8255 if (retval > 1)
8256 toc_ref[toc_ref_index] = 1;
8257 }
8258 }
8259 continue;
8260 }
8261
8262 /* Uh oh, we didn't find the expected call. We
8263 could just mark this symbol to exclude it
8264 from tls optimization but it's safer to skip
8265 the entire optimization. */
8266 /* xgettext:c-format */
8267 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8268 "TLS optimization disabled\n"),
8269 ibfd, sec, rel->r_offset);
8270 ret = TRUE;
8271 goto err_free_rel;
8272 }
8273
8274 /* If we don't have old-style __tls_get_addr calls
8275 without TLSGD/TLSLD marker relocs, and we haven't
8276 found a new-style __tls_get_addr call with a
8277 marker for this symbol, then we either have a
8278 broken object file or an -mlongcall style
8279 indirect call to __tls_get_addr without a marker.
8280 Disable optimization in this case. */
8281 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8282 && (tls_set & TLS_EXPLICIT) == 0
8283 && !sec->nomark_tls_get_addr
8284 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8285 != (TLS_TLS | TLS_MARK)))
8286 continue;
8287
8288 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
8289 {
8290 struct plt_entry *ent = NULL;
8291
8292 if (htab->tls_get_addr_fd != NULL)
8293 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8294 ent != NULL;
8295 ent = ent->next)
8296 if (ent->addend == 0)
8297 break;
8298
8299 if (ent == NULL && htab->tga_desc_fd != NULL)
8300 for (ent = htab->tga_desc_fd->elf.plt.plist;
8301 ent != NULL;
8302 ent = ent->next)
8303 if (ent->addend == 0)
8304 break;
8305
8306 if (ent == NULL && htab->tls_get_addr != NULL)
8307 for (ent = htab->tls_get_addr->elf.plt.plist;
8308 ent != NULL;
8309 ent = ent->next)
8310 if (ent->addend == 0)
8311 break;
8312
8313 if (ent == NULL && htab->tga_desc != NULL)
8314 for (ent = htab->tga_desc->elf.plt.plist;
8315 ent != NULL;
8316 ent = ent->next)
8317 if (ent->addend == 0)
8318 break;
8319
8320 if (ent != NULL
8321 && ent->plt.refcount > 0)
8322 ent->plt.refcount -= 1;
8323 }
8324
8325 if (tls_clear == 0)
8326 continue;
8327
8328 if ((tls_set & TLS_EXPLICIT) == 0)
8329 {
8330 struct got_entry *ent;
8331
8332 /* Adjust got entry for this reloc. */
8333 if (h != NULL)
8334 ent = h->got.glist;
8335 else
8336 ent = elf_local_got_ents (ibfd)[r_symndx];
8337
8338 for (; ent != NULL; ent = ent->next)
8339 if (ent->addend == rel->r_addend
8340 && ent->owner == ibfd
8341 && ent->tls_type == tls_type)
8342 break;
8343 if (ent == NULL)
8344 abort ();
8345
8346 if (tls_set == 0)
8347 {
8348 /* We managed to get rid of a got entry. */
8349 if (ent->got.refcount > 0)
8350 ent->got.refcount -= 1;
8351 }
8352 }
8353 else
8354 {
8355 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8356 we'll lose one or two dyn relocs. */
8357 if (!dec_dynrel_count (rel->r_info, sec, info,
8358 NULL, h, sym))
8359 return FALSE;
8360
8361 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8362 {
8363 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8364 NULL, h, sym))
8365 return FALSE;
8366 }
8367 }
8368
8369 *tls_mask |= tls_set & 0xff;
8370 *tls_mask &= ~tls_clear;
8371 }
8372
8373 if (elf_section_data (sec)->relocs != relstart)
8374 free (relstart);
8375 }
8376
8377 if (locsyms != NULL
8378 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8379 {
8380 if (!info->keep_memory)
8381 free (locsyms);
8382 else
8383 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8384 }
8385 }
8386
8387 free (toc_ref);
8388 htab->do_tls_opt = 1;
8389 return TRUE;
8390 }
8391
8392 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8393 the values of any global symbols in a toc section that has been
8394 edited. Globals in toc sections should be a rarity, so this function
8395 sets a flag if any are found in toc sections other than the one just
8396 edited, so that further hash table traversals can be avoided. */
8397
8398 struct adjust_toc_info
8399 {
8400 asection *toc;
8401 unsigned long *skip;
8402 bfd_boolean global_toc_syms;
8403 };
8404
8405 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8406
8407 static bfd_boolean
8408 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8409 {
8410 struct ppc_link_hash_entry *eh;
8411 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8412 unsigned long i;
8413
8414 if (h->root.type != bfd_link_hash_defined
8415 && h->root.type != bfd_link_hash_defweak)
8416 return TRUE;
8417
8418 eh = ppc_elf_hash_entry (h);
8419 if (eh->adjust_done)
8420 return TRUE;
8421
8422 if (eh->elf.root.u.def.section == toc_inf->toc)
8423 {
8424 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8425 i = toc_inf->toc->rawsize >> 3;
8426 else
8427 i = eh->elf.root.u.def.value >> 3;
8428
8429 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8430 {
8431 _bfd_error_handler
8432 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8433 do
8434 ++i;
8435 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8436 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8437 }
8438
8439 eh->elf.root.u.def.value -= toc_inf->skip[i];
8440 eh->adjust_done = 1;
8441 }
8442 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8443 toc_inf->global_toc_syms = TRUE;
8444
8445 return TRUE;
8446 }
8447
8448 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8449 on a _LO variety toc/got reloc. */
8450
8451 static bfd_boolean
8452 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8453 {
8454 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8455 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8456 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8457 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8458 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8459 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8460 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8461 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8462 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8463 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8464 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8465 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8466 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8467 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8468 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8469 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8470 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8471 /* Exclude lfqu by testing reloc. If relocs are ever
8472 defined for the reduced D field in psq_lu then those
8473 will need testing too. */
8474 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8475 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
8476 && (insn & 1) == 0)
8477 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8478 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8479 /* Exclude stfqu. psq_stu as above for psq_lu. */
8480 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8481 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
8482 && (insn & 1) == 0));
8483 }
8484
8485 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8486 pld ra,symbol@got@pcrel
8487 load/store rt,off(ra)
8488 or
8489 pla ra,symbol@pcrel
8490 load/store rt,off(ra)
8491 may be translated to
8492 pload/pstore rt,symbol+off@pcrel
8493 nop.
8494 This function returns true if the optimization is possible, placing
8495 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8496
8497 On entry to this function, the linker has already determined that
8498 the pld can be replaced with pla: *PINSN1 is that pla insn,
8499 while *PINSN2 is the second instruction. */
8500
8501 static bfd_boolean
8502 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8503 {
8504 uint64_t insn1 = *pinsn1;
8505 uint64_t insn2 = *pinsn2;
8506 bfd_signed_vma off;
8507
8508 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8509 {
8510 /* Check that regs match. */
8511 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8512 return FALSE;
8513
8514 /* P8LS or PMLS form, non-pcrel. */
8515 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8516 return FALSE;
8517
8518 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8519 *pinsn2 = PNOP;
8520 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8521 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8522 return TRUE;
8523 }
8524
8525 insn2 >>= 32;
8526
8527 /* Check that regs match. */
8528 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8529 return FALSE;
8530
8531 switch ((insn2 >> 26) & 63)
8532 {
8533 default:
8534 return FALSE;
8535
8536 case 32: /* lwz */
8537 case 34: /* lbz */
8538 case 36: /* stw */
8539 case 38: /* stb */
8540 case 40: /* lhz */
8541 case 42: /* lha */
8542 case 44: /* sth */
8543 case 48: /* lfs */
8544 case 50: /* lfd */
8545 case 52: /* stfs */
8546 case 54: /* stfd */
8547 /* These are the PMLS cases, where we just need to tack a prefix
8548 on the insn. */
8549 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8550 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8551 off = insn2 & 0xffff;
8552 break;
8553
8554 case 58: /* lwa, ld */
8555 if ((insn2 & 1) != 0)
8556 return FALSE;
8557 insn1 = ((1ULL << 58) | (1ULL << 52)
8558 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8559 | (insn2 & (31ULL << 21)));
8560 off = insn2 & 0xfffc;
8561 break;
8562
8563 case 57: /* lxsd, lxssp */
8564 if ((insn2 & 3) < 2)
8565 return FALSE;
8566 insn1 = ((1ULL << 58) | (1ULL << 52)
8567 | ((40ULL | (insn2 & 3)) << 26)
8568 | (insn2 & (31ULL << 21)));
8569 off = insn2 & 0xfffc;
8570 break;
8571
8572 case 61: /* stxsd, stxssp, lxv, stxv */
8573 if ((insn2 & 3) == 0)
8574 return FALSE;
8575 else if ((insn2 & 3) >= 2)
8576 {
8577 insn1 = ((1ULL << 58) | (1ULL << 52)
8578 | ((44ULL | (insn2 & 3)) << 26)
8579 | (insn2 & (31ULL << 21)));
8580 off = insn2 & 0xfffc;
8581 }
8582 else
8583 {
8584 insn1 = ((1ULL << 58) | (1ULL << 52)
8585 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8586 | (insn2 & (31ULL << 21)));
8587 off = insn2 & 0xfff0;
8588 }
8589 break;
8590
8591 case 56: /* lq */
8592 insn1 = ((1ULL << 58) | (1ULL << 52)
8593 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8594 off = insn2 & 0xffff;
8595 break;
8596
8597 case 6: /* lxvp, stxvp */
8598 if ((insn2 & 0xe) != 0)
8599 return FALSE;
8600 insn1 = ((1ULL << 58) | (1ULL << 52)
8601 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8602 | (insn2 & (31ULL << 21)));
8603 off = insn2 & 0xfff0;
8604 break;
8605
8606 case 62: /* std, stq */
8607 if ((insn2 & 1) != 0)
8608 return FALSE;
8609 insn1 = ((1ULL << 58) | (1ULL << 52)
8610 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8611 | (insn2 & (31ULL << 21)));
8612 off = insn2 & 0xfffc;
8613 break;
8614 }
8615
8616 *pinsn1 = insn1;
8617 *pinsn2 = (uint64_t) NOP << 32;
8618 *poff = (off ^ 0x8000) - 0x8000;
8619 return TRUE;
8620 }
8621
8622 /* Examine all relocs referencing .toc sections in order to remove
8623 unused .toc entries. */
8624
8625 bfd_boolean
8626 ppc64_elf_edit_toc (struct bfd_link_info *info)
8627 {
8628 bfd *ibfd;
8629 struct adjust_toc_info toc_inf;
8630 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8631
8632 htab->do_toc_opt = 1;
8633 toc_inf.global_toc_syms = TRUE;
8634 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8635 {
8636 asection *toc, *sec;
8637 Elf_Internal_Shdr *symtab_hdr;
8638 Elf_Internal_Sym *local_syms;
8639 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8640 unsigned long *skip, *drop;
8641 unsigned char *used;
8642 unsigned char *keep, last, some_unused;
8643
8644 if (!is_ppc64_elf (ibfd))
8645 continue;
8646
8647 toc = bfd_get_section_by_name (ibfd, ".toc");
8648 if (toc == NULL
8649 || toc->size == 0
8650 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8651 || discarded_section (toc))
8652 continue;
8653
8654 toc_relocs = NULL;
8655 local_syms = NULL;
8656 symtab_hdr = &elf_symtab_hdr (ibfd);
8657
8658 /* Look at sections dropped from the final link. */
8659 skip = NULL;
8660 relstart = NULL;
8661 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8662 {
8663 if (sec->reloc_count == 0
8664 || !discarded_section (sec)
8665 || get_opd_info (sec)
8666 || (sec->flags & SEC_ALLOC) == 0
8667 || (sec->flags & SEC_DEBUGGING) != 0)
8668 continue;
8669
8670 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8671 if (relstart == NULL)
8672 goto error_ret;
8673
8674 /* Run through the relocs to see which toc entries might be
8675 unused. */
8676 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8677 {
8678 enum elf_ppc64_reloc_type r_type;
8679 unsigned long r_symndx;
8680 asection *sym_sec;
8681 struct elf_link_hash_entry *h;
8682 Elf_Internal_Sym *sym;
8683 bfd_vma val;
8684
8685 r_type = ELF64_R_TYPE (rel->r_info);
8686 switch (r_type)
8687 {
8688 default:
8689 continue;
8690
8691 case R_PPC64_TOC16:
8692 case R_PPC64_TOC16_LO:
8693 case R_PPC64_TOC16_HI:
8694 case R_PPC64_TOC16_HA:
8695 case R_PPC64_TOC16_DS:
8696 case R_PPC64_TOC16_LO_DS:
8697 break;
8698 }
8699
8700 r_symndx = ELF64_R_SYM (rel->r_info);
8701 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8702 r_symndx, ibfd))
8703 goto error_ret;
8704
8705 if (sym_sec != toc)
8706 continue;
8707
8708 if (h != NULL)
8709 val = h->root.u.def.value;
8710 else
8711 val = sym->st_value;
8712 val += rel->r_addend;
8713
8714 if (val >= toc->size)
8715 continue;
8716
8717 /* Anything in the toc ought to be aligned to 8 bytes.
8718 If not, don't mark as unused. */
8719 if (val & 7)
8720 continue;
8721
8722 if (skip == NULL)
8723 {
8724 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8725 if (skip == NULL)
8726 goto error_ret;
8727 }
8728
8729 skip[val >> 3] = ref_from_discarded;
8730 }
8731
8732 if (elf_section_data (sec)->relocs != relstart)
8733 free (relstart);
8734 }
8735
8736 /* For largetoc loads of address constants, we can convert
8737 . addis rx,2,addr@got@ha
8738 . ld ry,addr@got@l(rx)
8739 to
8740 . addis rx,2,addr@toc@ha
8741 . addi ry,rx,addr@toc@l
8742 when addr is within 2G of the toc pointer. This then means
8743 that the word storing "addr" in the toc is no longer needed. */
8744
8745 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8746 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8747 && toc->reloc_count != 0)
8748 {
8749 /* Read toc relocs. */
8750 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8751 info->keep_memory);
8752 if (toc_relocs == NULL)
8753 goto error_ret;
8754
8755 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8756 {
8757 enum elf_ppc64_reloc_type r_type;
8758 unsigned long r_symndx;
8759 asection *sym_sec;
8760 struct elf_link_hash_entry *h;
8761 Elf_Internal_Sym *sym;
8762 bfd_vma val, addr;
8763
8764 r_type = ELF64_R_TYPE (rel->r_info);
8765 if (r_type != R_PPC64_ADDR64)
8766 continue;
8767
8768 r_symndx = ELF64_R_SYM (rel->r_info);
8769 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8770 r_symndx, ibfd))
8771 goto error_ret;
8772
8773 if (sym_sec == NULL
8774 || sym_sec->output_section == NULL
8775 || discarded_section (sym_sec))
8776 continue;
8777
8778 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8779 continue;
8780
8781 if (h != NULL)
8782 {
8783 if (h->type == STT_GNU_IFUNC)
8784 continue;
8785 val = h->root.u.def.value;
8786 }
8787 else
8788 {
8789 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8790 continue;
8791 val = sym->st_value;
8792 }
8793 val += rel->r_addend;
8794 val += sym_sec->output_section->vma + sym_sec->output_offset;
8795
8796 /* We don't yet know the exact toc pointer value, but we
8797 know it will be somewhere in the toc section. Don't
8798 optimize if the difference from any possible toc
8799 pointer is outside [ff..f80008000, 7fff7fff]. */
8800 addr = toc->output_section->vma + TOC_BASE_OFF;
8801 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8802 continue;
8803
8804 addr = toc->output_section->vma + toc->output_section->rawsize;
8805 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8806 continue;
8807
8808 if (skip == NULL)
8809 {
8810 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8811 if (skip == NULL)
8812 goto error_ret;
8813 }
8814
8815 skip[rel->r_offset >> 3]
8816 |= can_optimize | ((rel - toc_relocs) << 2);
8817 }
8818 }
8819
8820 if (skip == NULL)
8821 continue;
8822
8823 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8824 if (used == NULL)
8825 {
8826 error_ret:
8827 if (symtab_hdr->contents != (unsigned char *) local_syms)
8828 free (local_syms);
8829 if (sec != NULL
8830 && elf_section_data (sec)->relocs != relstart)
8831 free (relstart);
8832 if (elf_section_data (toc)->relocs != toc_relocs)
8833 free (toc_relocs);
8834 free (skip);
8835 return FALSE;
8836 }
8837
8838 /* Now check all kept sections that might reference the toc.
8839 Check the toc itself last. */
8840 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8841 : ibfd->sections);
8842 sec != NULL;
8843 sec = (sec == toc ? NULL
8844 : sec->next == NULL ? toc
8845 : sec->next == toc && toc->next ? toc->next
8846 : sec->next))
8847 {
8848 int repeat;
8849
8850 if (sec->reloc_count == 0
8851 || discarded_section (sec)
8852 || get_opd_info (sec)
8853 || (sec->flags & SEC_ALLOC) == 0
8854 || (sec->flags & SEC_DEBUGGING) != 0)
8855 continue;
8856
8857 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8858 info->keep_memory);
8859 if (relstart == NULL)
8860 {
8861 free (used);
8862 goto error_ret;
8863 }
8864
8865 /* Mark toc entries referenced as used. */
8866 do
8867 {
8868 repeat = 0;
8869 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8870 {
8871 enum elf_ppc64_reloc_type r_type;
8872 unsigned long r_symndx;
8873 asection *sym_sec;
8874 struct elf_link_hash_entry *h;
8875 Elf_Internal_Sym *sym;
8876 bfd_vma val;
8877
8878 r_type = ELF64_R_TYPE (rel->r_info);
8879 switch (r_type)
8880 {
8881 case R_PPC64_TOC16:
8882 case R_PPC64_TOC16_LO:
8883 case R_PPC64_TOC16_HI:
8884 case R_PPC64_TOC16_HA:
8885 case R_PPC64_TOC16_DS:
8886 case R_PPC64_TOC16_LO_DS:
8887 /* In case we're taking addresses of toc entries. */
8888 case R_PPC64_ADDR64:
8889 break;
8890
8891 default:
8892 continue;
8893 }
8894
8895 r_symndx = ELF64_R_SYM (rel->r_info);
8896 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8897 r_symndx, ibfd))
8898 {
8899 free (used);
8900 goto error_ret;
8901 }
8902
8903 if (sym_sec != toc)
8904 continue;
8905
8906 if (h != NULL)
8907 val = h->root.u.def.value;
8908 else
8909 val = sym->st_value;
8910 val += rel->r_addend;
8911
8912 if (val >= toc->size)
8913 continue;
8914
8915 if ((skip[val >> 3] & can_optimize) != 0)
8916 {
8917 bfd_vma off;
8918 unsigned char opc;
8919
8920 switch (r_type)
8921 {
8922 case R_PPC64_TOC16_HA:
8923 break;
8924
8925 case R_PPC64_TOC16_LO_DS:
8926 off = rel->r_offset;
8927 off += (bfd_big_endian (ibfd) ? -2 : 3);
8928 if (!bfd_get_section_contents (ibfd, sec, &opc,
8929 off, 1))
8930 {
8931 free (used);
8932 goto error_ret;
8933 }
8934 if ((opc & (0x3f << 2)) == (58u << 2))
8935 break;
8936 /* Fall through. */
8937
8938 default:
8939 /* Wrong sort of reloc, or not a ld. We may
8940 as well clear ref_from_discarded too. */
8941 skip[val >> 3] = 0;
8942 }
8943 }
8944
8945 if (sec != toc)
8946 used[val >> 3] = 1;
8947 /* For the toc section, we only mark as used if this
8948 entry itself isn't unused. */
8949 else if ((used[rel->r_offset >> 3]
8950 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8951 && !used[val >> 3])
8952 {
8953 /* Do all the relocs again, to catch reference
8954 chains. */
8955 repeat = 1;
8956 used[val >> 3] = 1;
8957 }
8958 }
8959 }
8960 while (repeat);
8961
8962 if (elf_section_data (sec)->relocs != relstart)
8963 free (relstart);
8964 }
8965
8966 /* Merge the used and skip arrays. Assume that TOC
8967 doublewords not appearing as either used or unused belong
8968 to an entry more than one doubleword in size. */
8969 for (drop = skip, keep = used, last = 0, some_unused = 0;
8970 drop < skip + (toc->size + 7) / 8;
8971 ++drop, ++keep)
8972 {
8973 if (*keep)
8974 {
8975 *drop &= ~ref_from_discarded;
8976 if ((*drop & can_optimize) != 0)
8977 some_unused = 1;
8978 last = 0;
8979 }
8980 else if ((*drop & ref_from_discarded) != 0)
8981 {
8982 some_unused = 1;
8983 last = ref_from_discarded;
8984 }
8985 else
8986 *drop = last;
8987 }
8988
8989 free (used);
8990
8991 if (some_unused)
8992 {
8993 bfd_byte *contents, *src;
8994 unsigned long off;
8995 Elf_Internal_Sym *sym;
8996 bfd_boolean local_toc_syms = FALSE;
8997
8998 /* Shuffle the toc contents, and at the same time convert the
8999 skip array from booleans into offsets. */
9000 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9001 goto error_ret;
9002
9003 elf_section_data (toc)->this_hdr.contents = contents;
9004
9005 for (src = contents, off = 0, drop = skip;
9006 src < contents + toc->size;
9007 src += 8, ++drop)
9008 {
9009 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9010 off += 8;
9011 else if (off != 0)
9012 {
9013 *drop = off;
9014 memcpy (src - off, src, 8);
9015 }
9016 }
9017 *drop = off;
9018 toc->rawsize = toc->size;
9019 toc->size = src - contents - off;
9020
9021 /* Adjust addends for relocs against the toc section sym,
9022 and optimize any accesses we can. */
9023 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9024 {
9025 if (sec->reloc_count == 0
9026 || discarded_section (sec))
9027 continue;
9028
9029 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9030 info->keep_memory);
9031 if (relstart == NULL)
9032 goto error_ret;
9033
9034 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9035 {
9036 enum elf_ppc64_reloc_type r_type;
9037 unsigned long r_symndx;
9038 asection *sym_sec;
9039 struct elf_link_hash_entry *h;
9040 bfd_vma val;
9041
9042 r_type = ELF64_R_TYPE (rel->r_info);
9043 switch (r_type)
9044 {
9045 default:
9046 continue;
9047
9048 case R_PPC64_TOC16:
9049 case R_PPC64_TOC16_LO:
9050 case R_PPC64_TOC16_HI:
9051 case R_PPC64_TOC16_HA:
9052 case R_PPC64_TOC16_DS:
9053 case R_PPC64_TOC16_LO_DS:
9054 case R_PPC64_ADDR64:
9055 break;
9056 }
9057
9058 r_symndx = ELF64_R_SYM (rel->r_info);
9059 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9060 r_symndx, ibfd))
9061 goto error_ret;
9062
9063 if (sym_sec != toc)
9064 continue;
9065
9066 if (h != NULL)
9067 val = h->root.u.def.value;
9068 else
9069 {
9070 val = sym->st_value;
9071 if (val != 0)
9072 local_toc_syms = TRUE;
9073 }
9074
9075 val += rel->r_addend;
9076
9077 if (val > toc->rawsize)
9078 val = toc->rawsize;
9079 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9080 continue;
9081 else if ((skip[val >> 3] & can_optimize) != 0)
9082 {
9083 Elf_Internal_Rela *tocrel
9084 = toc_relocs + (skip[val >> 3] >> 2);
9085 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9086
9087 switch (r_type)
9088 {
9089 case R_PPC64_TOC16_HA:
9090 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9091 break;
9092
9093 case R_PPC64_TOC16_LO_DS:
9094 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9095 break;
9096
9097 default:
9098 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9099 ppc_howto_init ();
9100 info->callbacks->einfo
9101 /* xgettext:c-format */
9102 (_("%H: %s references "
9103 "optimized away TOC entry\n"),
9104 ibfd, sec, rel->r_offset,
9105 ppc64_elf_howto_table[r_type]->name);
9106 bfd_set_error (bfd_error_bad_value);
9107 goto error_ret;
9108 }
9109 rel->r_addend = tocrel->r_addend;
9110 elf_section_data (sec)->relocs = relstart;
9111 continue;
9112 }
9113
9114 if (h != NULL || sym->st_value != 0)
9115 continue;
9116
9117 rel->r_addend -= skip[val >> 3];
9118 elf_section_data (sec)->relocs = relstart;
9119 }
9120
9121 if (elf_section_data (sec)->relocs != relstart)
9122 free (relstart);
9123 }
9124
9125 /* We shouldn't have local or global symbols defined in the TOC,
9126 but handle them anyway. */
9127 if (local_syms != NULL)
9128 for (sym = local_syms;
9129 sym < local_syms + symtab_hdr->sh_info;
9130 ++sym)
9131 if (sym->st_value != 0
9132 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9133 {
9134 unsigned long i;
9135
9136 if (sym->st_value > toc->rawsize)
9137 i = toc->rawsize >> 3;
9138 else
9139 i = sym->st_value >> 3;
9140
9141 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9142 {
9143 if (local_toc_syms)
9144 _bfd_error_handler
9145 (_("%s defined on removed toc entry"),
9146 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9147 do
9148 ++i;
9149 while ((skip[i] & (ref_from_discarded | can_optimize)));
9150 sym->st_value = (bfd_vma) i << 3;
9151 }
9152
9153 sym->st_value -= skip[i];
9154 symtab_hdr->contents = (unsigned char *) local_syms;
9155 }
9156
9157 /* Adjust any global syms defined in this toc input section. */
9158 if (toc_inf.global_toc_syms)
9159 {
9160 toc_inf.toc = toc;
9161 toc_inf.skip = skip;
9162 toc_inf.global_toc_syms = FALSE;
9163 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9164 &toc_inf);
9165 }
9166
9167 if (toc->reloc_count != 0)
9168 {
9169 Elf_Internal_Shdr *rel_hdr;
9170 Elf_Internal_Rela *wrel;
9171 bfd_size_type sz;
9172
9173 /* Remove unused toc relocs, and adjust those we keep. */
9174 if (toc_relocs == NULL)
9175 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9176 info->keep_memory);
9177 if (toc_relocs == NULL)
9178 goto error_ret;
9179
9180 wrel = toc_relocs;
9181 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9182 if ((skip[rel->r_offset >> 3]
9183 & (ref_from_discarded | can_optimize)) == 0)
9184 {
9185 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9186 wrel->r_info = rel->r_info;
9187 wrel->r_addend = rel->r_addend;
9188 ++wrel;
9189 }
9190 else if (!dec_dynrel_count (rel->r_info, toc, info,
9191 &local_syms, NULL, NULL))
9192 goto error_ret;
9193
9194 elf_section_data (toc)->relocs = toc_relocs;
9195 toc->reloc_count = wrel - toc_relocs;
9196 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9197 sz = rel_hdr->sh_entsize;
9198 rel_hdr->sh_size = toc->reloc_count * sz;
9199 }
9200 }
9201 else if (elf_section_data (toc)->relocs != toc_relocs)
9202 free (toc_relocs);
9203
9204 if (local_syms != NULL
9205 && symtab_hdr->contents != (unsigned char *) local_syms)
9206 {
9207 if (!info->keep_memory)
9208 free (local_syms);
9209 else
9210 symtab_hdr->contents = (unsigned char *) local_syms;
9211 }
9212 free (skip);
9213 }
9214
9215 /* Look for cases where we can change an indirect GOT access to
9216 a GOT relative or PC relative access, possibly reducing the
9217 number of GOT entries. */
9218 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9219 {
9220 asection *sec;
9221 Elf_Internal_Shdr *symtab_hdr;
9222 Elf_Internal_Sym *local_syms;
9223 Elf_Internal_Rela *relstart, *rel;
9224 bfd_vma got;
9225
9226 if (!is_ppc64_elf (ibfd))
9227 continue;
9228
9229 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9230 continue;
9231
9232 sec = ppc64_elf_tdata (ibfd)->got;
9233 got = 0;
9234 if (sec != NULL)
9235 got = sec->output_section->vma + sec->output_offset + 0x8000;
9236
9237 local_syms = NULL;
9238 symtab_hdr = &elf_symtab_hdr (ibfd);
9239
9240 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9241 {
9242 if (sec->reloc_count == 0
9243 || !ppc64_elf_section_data (sec)->has_optrel
9244 || discarded_section (sec))
9245 continue;
9246
9247 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9248 info->keep_memory);
9249 if (relstart == NULL)
9250 {
9251 got_error_ret:
9252 if (symtab_hdr->contents != (unsigned char *) local_syms)
9253 free (local_syms);
9254 if (sec != NULL
9255 && elf_section_data (sec)->relocs != relstart)
9256 free (relstart);
9257 return FALSE;
9258 }
9259
9260 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9261 {
9262 enum elf_ppc64_reloc_type r_type;
9263 unsigned long r_symndx;
9264 Elf_Internal_Sym *sym;
9265 asection *sym_sec;
9266 struct elf_link_hash_entry *h;
9267 struct got_entry *ent;
9268 bfd_vma val, pc;
9269 unsigned char buf[8];
9270 unsigned int insn;
9271 enum {no_check, check_lo, check_ha} insn_check;
9272
9273 r_type = ELF64_R_TYPE (rel->r_info);
9274 switch (r_type)
9275 {
9276 default:
9277 insn_check = no_check;
9278 break;
9279
9280 case R_PPC64_PLT16_HA:
9281 case R_PPC64_GOT_TLSLD16_HA:
9282 case R_PPC64_GOT_TLSGD16_HA:
9283 case R_PPC64_GOT_TPREL16_HA:
9284 case R_PPC64_GOT_DTPREL16_HA:
9285 case R_PPC64_GOT16_HA:
9286 case R_PPC64_TOC16_HA:
9287 insn_check = check_ha;
9288 break;
9289
9290 case R_PPC64_PLT16_LO:
9291 case R_PPC64_PLT16_LO_DS:
9292 case R_PPC64_GOT_TLSLD16_LO:
9293 case R_PPC64_GOT_TLSGD16_LO:
9294 case R_PPC64_GOT_TPREL16_LO_DS:
9295 case R_PPC64_GOT_DTPREL16_LO_DS:
9296 case R_PPC64_GOT16_LO:
9297 case R_PPC64_GOT16_LO_DS:
9298 case R_PPC64_TOC16_LO:
9299 case R_PPC64_TOC16_LO_DS:
9300 insn_check = check_lo;
9301 break;
9302 }
9303
9304 if (insn_check != no_check)
9305 {
9306 bfd_vma off = rel->r_offset & ~3;
9307
9308 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9309 goto got_error_ret;
9310
9311 insn = bfd_get_32 (ibfd, buf);
9312 if (insn_check == check_lo
9313 ? !ok_lo_toc_insn (insn, r_type)
9314 : ((insn & ((0x3fu << 26) | 0x1f << 16))
9315 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9316 {
9317 char str[12];
9318
9319 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9320 sprintf (str, "%#08x", insn);
9321 info->callbacks->einfo
9322 /* xgettext:c-format */
9323 (_("%H: got/toc optimization is not supported for"
9324 " %s instruction\n"),
9325 ibfd, sec, rel->r_offset & ~3, str);
9326 continue;
9327 }
9328 }
9329
9330 switch (r_type)
9331 {
9332 /* Note that we don't delete GOT entries for
9333 R_PPC64_GOT16_DS since we'd need a lot more
9334 analysis. For starters, the preliminary layout is
9335 before the GOT, PLT, dynamic sections and stubs are
9336 laid out. Then we'd need to allow for changes in
9337 distance between sections caused by alignment. */
9338 default:
9339 continue;
9340
9341 case R_PPC64_GOT16_HA:
9342 case R_PPC64_GOT16_LO_DS:
9343 case R_PPC64_GOT_PCREL34:
9344 break;
9345 }
9346
9347 r_symndx = ELF64_R_SYM (rel->r_info);
9348 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9349 r_symndx, ibfd))
9350 goto got_error_ret;
9351
9352 if (sym_sec == NULL
9353 || sym_sec->output_section == NULL
9354 || discarded_section (sym_sec))
9355 continue;
9356
9357 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9358 continue;
9359
9360 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9361 continue;
9362
9363 if (h != NULL)
9364 val = h->root.u.def.value;
9365 else
9366 val = sym->st_value;
9367 val += rel->r_addend;
9368 val += sym_sec->output_section->vma + sym_sec->output_offset;
9369
9370 /* Fudge factor to allow for the fact that the preliminary layout
9371 isn't exact. Reduce limits by this factor. */
9372 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9373
9374 switch (r_type)
9375 {
9376 default:
9377 continue;
9378
9379 case R_PPC64_GOT16_HA:
9380 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9381 >= LIMIT_ADJUST (0x100000000ULL))
9382 continue;
9383
9384 if (!bfd_get_section_contents (ibfd, sec, buf,
9385 rel->r_offset & ~3, 4))
9386 goto got_error_ret;
9387 insn = bfd_get_32 (ibfd, buf);
9388 if (((insn & ((0x3fu << 26) | 0x1f << 16))
9389 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9390 continue;
9391 break;
9392
9393 case R_PPC64_GOT16_LO_DS:
9394 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9395 >= LIMIT_ADJUST (0x100000000ULL))
9396 continue;
9397 if (!bfd_get_section_contents (ibfd, sec, buf,
9398 rel->r_offset & ~3, 4))
9399 goto got_error_ret;
9400 insn = bfd_get_32 (ibfd, buf);
9401 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
9402 continue;
9403 break;
9404
9405 case R_PPC64_GOT_PCREL34:
9406 pc = rel->r_offset;
9407 pc += sec->output_section->vma + sec->output_offset;
9408 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9409 >= LIMIT_ADJUST (1ULL << 34))
9410 continue;
9411 if (!bfd_get_section_contents (ibfd, sec, buf,
9412 rel->r_offset & ~3, 8))
9413 goto got_error_ret;
9414 insn = bfd_get_32 (ibfd, buf);
9415 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9416 continue;
9417 insn = bfd_get_32 (ibfd, buf + 4);
9418 if ((insn & (0x3fu << 26)) != 57u << 26)
9419 continue;
9420 break;
9421 }
9422 #undef LIMIT_ADJUST
9423
9424 if (h != NULL)
9425 ent = h->got.glist;
9426 else
9427 {
9428 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9429 ent = local_got_ents[r_symndx];
9430 }
9431 for (; ent != NULL; ent = ent->next)
9432 if (ent->addend == rel->r_addend
9433 && ent->owner == ibfd
9434 && ent->tls_type == 0)
9435 break;
9436 BFD_ASSERT (ent && ent->got.refcount > 0);
9437 ent->got.refcount -= 1;
9438 }
9439
9440 if (elf_section_data (sec)->relocs != relstart)
9441 free (relstart);
9442 }
9443
9444 if (local_syms != NULL
9445 && symtab_hdr->contents != (unsigned char *) local_syms)
9446 {
9447 if (!info->keep_memory)
9448 free (local_syms);
9449 else
9450 symtab_hdr->contents = (unsigned char *) local_syms;
9451 }
9452 }
9453
9454 return TRUE;
9455 }
9456
9457 /* Return true iff input section I references the TOC using
9458 instructions limited to +/-32k offsets. */
9459
9460 bfd_boolean
9461 ppc64_elf_has_small_toc_reloc (asection *i)
9462 {
9463 return (is_ppc64_elf (i->owner)
9464 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9465 }
9466
9467 /* Allocate space for one GOT entry. */
9468
9469 static void
9470 allocate_got (struct elf_link_hash_entry *h,
9471 struct bfd_link_info *info,
9472 struct got_entry *gent)
9473 {
9474 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9475 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
9476 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9477 ? 16 : 8);
9478 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9479 ? 2 : 1) * sizeof (Elf64_External_Rela);
9480 asection *got = ppc64_elf_tdata (gent->owner)->got;
9481
9482 gent->got.offset = got->size;
9483 got->size += entsize;
9484
9485 if (h->type == STT_GNU_IFUNC)
9486 {
9487 htab->elf.irelplt->size += rentsize;
9488 htab->got_reli_size += rentsize;
9489 }
9490 else if (((bfd_link_pic (info)
9491 && !(gent->tls_type != 0
9492 && bfd_link_executable (info)
9493 && SYMBOL_REFERENCES_LOCAL (info, h)))
9494 || (htab->elf.dynamic_sections_created
9495 && h->dynindx != -1
9496 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9497 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9498 {
9499 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9500 relgot->size += rentsize;
9501 }
9502 }
9503
9504 /* This function merges got entries in the same toc group. */
9505
9506 static void
9507 merge_got_entries (struct got_entry **pent)
9508 {
9509 struct got_entry *ent, *ent2;
9510
9511 for (ent = *pent; ent != NULL; ent = ent->next)
9512 if (!ent->is_indirect)
9513 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9514 if (!ent2->is_indirect
9515 && ent2->addend == ent->addend
9516 && ent2->tls_type == ent->tls_type
9517 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9518 {
9519 ent2->is_indirect = TRUE;
9520 ent2->got.ent = ent;
9521 }
9522 }
9523
9524 /* If H is undefined, make it dynamic if that makes sense. */
9525
9526 static bfd_boolean
9527 ensure_undef_dynamic (struct bfd_link_info *info,
9528 struct elf_link_hash_entry *h)
9529 {
9530 struct elf_link_hash_table *htab = elf_hash_table (info);
9531
9532 if (htab->dynamic_sections_created
9533 && ((info->dynamic_undefined_weak != 0
9534 && h->root.type == bfd_link_hash_undefweak)
9535 || h->root.type == bfd_link_hash_undefined)
9536 && h->dynindx == -1
9537 && !h->forced_local
9538 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9539 return bfd_elf_link_record_dynamic_symbol (info, h);
9540 return TRUE;
9541 }
9542
9543 /* Allocate space in .plt, .got and associated reloc sections for
9544 dynamic relocs. */
9545
9546 static bfd_boolean
9547 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9548 {
9549 struct bfd_link_info *info;
9550 struct ppc_link_hash_table *htab;
9551 asection *s;
9552 struct ppc_link_hash_entry *eh;
9553 struct got_entry **pgent, *gent;
9554
9555 if (h->root.type == bfd_link_hash_indirect)
9556 return TRUE;
9557
9558 info = (struct bfd_link_info *) inf;
9559 htab = ppc_hash_table (info);
9560 if (htab == NULL)
9561 return FALSE;
9562
9563 eh = ppc_elf_hash_entry (h);
9564 /* Run through the TLS GD got entries first if we're changing them
9565 to TPREL. */
9566 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9567 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9568 if (gent->got.refcount > 0
9569 && (gent->tls_type & TLS_GD) != 0)
9570 {
9571 /* This was a GD entry that has been converted to TPREL. If
9572 there happens to be a TPREL entry we can use that one. */
9573 struct got_entry *ent;
9574 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9575 if (ent->got.refcount > 0
9576 && (ent->tls_type & TLS_TPREL) != 0
9577 && ent->addend == gent->addend
9578 && ent->owner == gent->owner)
9579 {
9580 gent->got.refcount = 0;
9581 break;
9582 }
9583
9584 /* If not, then we'll be using our own TPREL entry. */
9585 if (gent->got.refcount != 0)
9586 gent->tls_type = TLS_TLS | TLS_TPREL;
9587 }
9588
9589 /* Remove any list entry that won't generate a word in the GOT before
9590 we call merge_got_entries. Otherwise we risk merging to empty
9591 entries. */
9592 pgent = &h->got.glist;
9593 while ((gent = *pgent) != NULL)
9594 if (gent->got.refcount > 0)
9595 {
9596 if ((gent->tls_type & TLS_LD) != 0
9597 && SYMBOL_REFERENCES_LOCAL (info, h))
9598 {
9599 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9600 *pgent = gent->next;
9601 }
9602 else
9603 pgent = &gent->next;
9604 }
9605 else
9606 *pgent = gent->next;
9607
9608 if (!htab->do_multi_toc)
9609 merge_got_entries (&h->got.glist);
9610
9611 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9612 if (!gent->is_indirect)
9613 {
9614 /* Ensure we catch all the cases where this symbol should
9615 be made dynamic. */
9616 if (!ensure_undef_dynamic (info, h))
9617 return FALSE;
9618
9619 if (!is_ppc64_elf (gent->owner))
9620 abort ();
9621
9622 allocate_got (h, info, gent);
9623 }
9624
9625 /* If no dynamic sections we can't have dynamic relocs, except for
9626 IFUNCs which are handled even in static executables. */
9627 if (!htab->elf.dynamic_sections_created
9628 && h->type != STT_GNU_IFUNC)
9629 h->dyn_relocs = NULL;
9630
9631 /* Discard relocs on undefined symbols that must be local. */
9632 else if (h->root.type == bfd_link_hash_undefined
9633 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9634 h->dyn_relocs = NULL;
9635
9636 /* Also discard relocs on undefined weak syms with non-default
9637 visibility, or when dynamic_undefined_weak says so. */
9638 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9639 h->dyn_relocs = NULL;
9640
9641 if (h->dyn_relocs != NULL)
9642 {
9643 struct elf_dyn_relocs *p, **pp;
9644
9645 /* In the shared -Bsymbolic case, discard space allocated for
9646 dynamic pc-relative relocs against symbols which turn out to
9647 be defined in regular objects. For the normal shared case,
9648 discard space for relocs that have become local due to symbol
9649 visibility changes. */
9650 if (bfd_link_pic (info))
9651 {
9652 /* Relocs that use pc_count are those that appear on a call
9653 insn, or certain REL relocs (see must_be_dyn_reloc) that
9654 can be generated via assembly. We want calls to
9655 protected symbols to resolve directly to the function
9656 rather than going via the plt. If people want function
9657 pointer comparisons to work as expected then they should
9658 avoid writing weird assembly. */
9659 if (SYMBOL_CALLS_LOCAL (info, h))
9660 {
9661 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
9662 {
9663 p->count -= p->pc_count;
9664 p->pc_count = 0;
9665 if (p->count == 0)
9666 *pp = p->next;
9667 else
9668 pp = &p->next;
9669 }
9670 }
9671
9672 if (h->dyn_relocs != NULL)
9673 {
9674 /* Ensure we catch all the cases where this symbol
9675 should be made dynamic. */
9676 if (!ensure_undef_dynamic (info, h))
9677 return FALSE;
9678 }
9679 }
9680
9681 /* For a fixed position executable, discard space for
9682 relocs against symbols which are not dynamic. */
9683 else if (h->type != STT_GNU_IFUNC)
9684 {
9685 if (h->dynamic_adjusted
9686 && !h->def_regular
9687 && !ELF_COMMON_DEF_P (h))
9688 {
9689 /* Ensure we catch all the cases where this symbol
9690 should be made dynamic. */
9691 if (!ensure_undef_dynamic (info, h))
9692 return FALSE;
9693
9694 /* But if that didn't work out, discard dynamic relocs. */
9695 if (h->dynindx == -1)
9696 h->dyn_relocs = NULL;
9697 }
9698 else
9699 h->dyn_relocs = NULL;
9700 }
9701
9702 /* Finally, allocate space. */
9703 for (p = h->dyn_relocs; p != NULL; p = p->next)
9704 {
9705 asection *sreloc = elf_section_data (p->sec)->sreloc;
9706 if (eh->elf.type == STT_GNU_IFUNC)
9707 sreloc = htab->elf.irelplt;
9708 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9709 }
9710 }
9711
9712 /* We might need a PLT entry when the symbol
9713 a) is dynamic, or
9714 b) is an ifunc, or
9715 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9716 d) has plt16 relocs and we are linking statically. */
9717 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9718 || h->type == STT_GNU_IFUNC
9719 || (h->needs_plt && h->dynamic_adjusted)
9720 || (h->needs_plt
9721 && h->def_regular
9722 && !htab->elf.dynamic_sections_created
9723 && !htab->can_convert_all_inline_plt
9724 && (ppc_elf_hash_entry (h)->tls_mask
9725 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9726 {
9727 struct plt_entry *pent;
9728 bfd_boolean doneone = FALSE;
9729 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9730 if (pent->plt.refcount > 0)
9731 {
9732 if (!htab->elf.dynamic_sections_created
9733 || h->dynindx == -1)
9734 {
9735 if (h->type == STT_GNU_IFUNC)
9736 {
9737 s = htab->elf.iplt;
9738 pent->plt.offset = s->size;
9739 s->size += PLT_ENTRY_SIZE (htab);
9740 s = htab->elf.irelplt;
9741 }
9742 else
9743 {
9744 s = htab->pltlocal;
9745 pent->plt.offset = s->size;
9746 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9747 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9748 }
9749 }
9750 else
9751 {
9752 /* If this is the first .plt entry, make room for the special
9753 first entry. */
9754 s = htab->elf.splt;
9755 if (s->size == 0)
9756 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9757
9758 pent->plt.offset = s->size;
9759
9760 /* Make room for this entry. */
9761 s->size += PLT_ENTRY_SIZE (htab);
9762
9763 /* Make room for the .glink code. */
9764 s = htab->glink;
9765 if (s->size == 0)
9766 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9767 if (htab->opd_abi)
9768 {
9769 /* We need bigger stubs past index 32767. */
9770 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9771 s->size += 4;
9772 s->size += 2*4;
9773 }
9774 else
9775 s->size += 4;
9776
9777 /* We also need to make an entry in the .rela.plt section. */
9778 s = htab->elf.srelplt;
9779 }
9780 if (s != NULL)
9781 s->size += sizeof (Elf64_External_Rela);
9782 doneone = TRUE;
9783 }
9784 else
9785 pent->plt.offset = (bfd_vma) -1;
9786 if (!doneone)
9787 {
9788 h->plt.plist = NULL;
9789 h->needs_plt = 0;
9790 }
9791 }
9792 else
9793 {
9794 h->plt.plist = NULL;
9795 h->needs_plt = 0;
9796 }
9797
9798 return TRUE;
9799 }
9800
9801 #define PPC_LO(v) ((v) & 0xffff)
9802 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9803 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9804 #define D34(v) \
9805 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9806 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9807
9808 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9809 to set up space for global entry stubs. These are put in glink,
9810 after the branch table. */
9811
9812 static bfd_boolean
9813 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9814 {
9815 struct bfd_link_info *info;
9816 struct ppc_link_hash_table *htab;
9817 struct plt_entry *pent;
9818 asection *s, *plt;
9819
9820 if (h->root.type == bfd_link_hash_indirect)
9821 return TRUE;
9822
9823 if (!h->pointer_equality_needed)
9824 return TRUE;
9825
9826 if (h->def_regular)
9827 return TRUE;
9828
9829 info = inf;
9830 htab = ppc_hash_table (info);
9831 if (htab == NULL)
9832 return FALSE;
9833
9834 s = htab->global_entry;
9835 plt = htab->elf.splt;
9836 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9837 if (pent->plt.offset != (bfd_vma) -1
9838 && pent->addend == 0)
9839 {
9840 /* For ELFv2, if this symbol is not defined in a regular file
9841 and we are not generating a shared library or pie, then we
9842 need to define the symbol in the executable on a call stub.
9843 This is to avoid text relocations. */
9844 bfd_vma off, stub_align, stub_off, stub_size;
9845 unsigned int align_power;
9846
9847 stub_size = 16;
9848 stub_off = s->size;
9849 if (htab->params->plt_stub_align >= 0)
9850 align_power = htab->params->plt_stub_align;
9851 else
9852 align_power = -htab->params->plt_stub_align;
9853 /* Setting section alignment is delayed until we know it is
9854 non-empty. Otherwise the .text output section will be
9855 aligned at least to plt_stub_align even when no global
9856 entry stubs are needed. */
9857 if (s->alignment_power < align_power)
9858 s->alignment_power = align_power;
9859 stub_align = (bfd_vma) 1 << align_power;
9860 if (htab->params->plt_stub_align >= 0
9861 || ((((stub_off + stub_size - 1) & -stub_align)
9862 - (stub_off & -stub_align))
9863 > ((stub_size - 1) & -stub_align)))
9864 stub_off = (stub_off + stub_align - 1) & -stub_align;
9865 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9866 off -= stub_off + s->output_offset + s->output_section->vma;
9867 /* Note that for --plt-stub-align negative we have a possible
9868 dependency between stub offset and size. Break that
9869 dependency by assuming the max stub size when calculating
9870 the stub offset. */
9871 if (PPC_HA (off) == 0)
9872 stub_size -= 4;
9873 h->root.type = bfd_link_hash_defined;
9874 h->root.u.def.section = s;
9875 h->root.u.def.value = stub_off;
9876 s->size = stub_off + stub_size;
9877 break;
9878 }
9879 return TRUE;
9880 }
9881
9882 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9883 read-only sections. */
9884
9885 static bfd_boolean
9886 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
9887 {
9888 asection *sec;
9889
9890 if (h->root.type == bfd_link_hash_indirect)
9891 return TRUE;
9892
9893 sec = readonly_dynrelocs (h);
9894 if (sec != NULL)
9895 {
9896 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9897
9898 info->flags |= DF_TEXTREL;
9899 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9900 " in read-only section `%pA'\n"),
9901 sec->owner, h->root.root.string, sec);
9902
9903 /* Not an error, just cut short the traversal. */
9904 return FALSE;
9905 }
9906 return TRUE;
9907 }
9908
9909 /* Set the sizes of the dynamic sections. */
9910
9911 static bfd_boolean
9912 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9913 struct bfd_link_info *info)
9914 {
9915 struct ppc_link_hash_table *htab;
9916 bfd *dynobj;
9917 asection *s;
9918 bfd_boolean relocs;
9919 bfd *ibfd;
9920 struct got_entry *first_tlsld;
9921
9922 htab = ppc_hash_table (info);
9923 if (htab == NULL)
9924 return FALSE;
9925
9926 dynobj = htab->elf.dynobj;
9927 if (dynobj == NULL)
9928 abort ();
9929
9930 if (htab->elf.dynamic_sections_created)
9931 {
9932 /* Set the contents of the .interp section to the interpreter. */
9933 if (bfd_link_executable (info) && !info->nointerp)
9934 {
9935 s = bfd_get_linker_section (dynobj, ".interp");
9936 if (s == NULL)
9937 abort ();
9938 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9939 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9940 }
9941 }
9942
9943 /* Set up .got offsets for local syms, and space for local dynamic
9944 relocs. */
9945 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9946 {
9947 struct got_entry **lgot_ents;
9948 struct got_entry **end_lgot_ents;
9949 struct plt_entry **local_plt;
9950 struct plt_entry **end_local_plt;
9951 unsigned char *lgot_masks;
9952 bfd_size_type locsymcount;
9953 Elf_Internal_Shdr *symtab_hdr;
9954
9955 if (!is_ppc64_elf (ibfd))
9956 continue;
9957
9958 for (s = ibfd->sections; s != NULL; s = s->next)
9959 {
9960 struct ppc_dyn_relocs *p;
9961
9962 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9963 {
9964 if (!bfd_is_abs_section (p->sec)
9965 && bfd_is_abs_section (p->sec->output_section))
9966 {
9967 /* Input section has been discarded, either because
9968 it is a copy of a linkonce section or due to
9969 linker script /DISCARD/, so we'll be discarding
9970 the relocs too. */
9971 }
9972 else if (p->count != 0)
9973 {
9974 asection *srel = elf_section_data (p->sec)->sreloc;
9975 if (p->ifunc)
9976 srel = htab->elf.irelplt;
9977 srel->size += p->count * sizeof (Elf64_External_Rela);
9978 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9979 info->flags |= DF_TEXTREL;
9980 }
9981 }
9982 }
9983
9984 lgot_ents = elf_local_got_ents (ibfd);
9985 if (!lgot_ents)
9986 continue;
9987
9988 symtab_hdr = &elf_symtab_hdr (ibfd);
9989 locsymcount = symtab_hdr->sh_info;
9990 end_lgot_ents = lgot_ents + locsymcount;
9991 local_plt = (struct plt_entry **) end_lgot_ents;
9992 end_local_plt = local_plt + locsymcount;
9993 lgot_masks = (unsigned char *) end_local_plt;
9994 s = ppc64_elf_tdata (ibfd)->got;
9995 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9996 {
9997 struct got_entry **pent, *ent;
9998
9999 pent = lgot_ents;
10000 while ((ent = *pent) != NULL)
10001 if (ent->got.refcount > 0)
10002 {
10003 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
10004 {
10005 ppc64_tlsld_got (ibfd)->got.refcount += 1;
10006 *pent = ent->next;
10007 }
10008 else
10009 {
10010 unsigned int ent_size = 8;
10011 unsigned int rel_size = sizeof (Elf64_External_Rela);
10012
10013 ent->got.offset = s->size;
10014 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
10015 {
10016 ent_size *= 2;
10017 rel_size *= 2;
10018 }
10019 s->size += ent_size;
10020 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10021 {
10022 htab->elf.irelplt->size += rel_size;
10023 htab->got_reli_size += rel_size;
10024 }
10025 else if (bfd_link_pic (info)
10026 && !(ent->tls_type != 0
10027 && bfd_link_executable (info)))
10028 {
10029 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10030 srel->size += rel_size;
10031 }
10032 pent = &ent->next;
10033 }
10034 }
10035 else
10036 *pent = ent->next;
10037 }
10038
10039 /* Allocate space for plt calls to local syms. */
10040 lgot_masks = (unsigned char *) end_local_plt;
10041 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
10042 {
10043 struct plt_entry *ent;
10044
10045 for (ent = *local_plt; ent != NULL; ent = ent->next)
10046 if (ent->plt.refcount > 0)
10047 {
10048 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10049 {
10050 s = htab->elf.iplt;
10051 ent->plt.offset = s->size;
10052 s->size += PLT_ENTRY_SIZE (htab);
10053 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10054 }
10055 else if (htab->can_convert_all_inline_plt
10056 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
10057 ent->plt.offset = (bfd_vma) -1;
10058 else
10059 {
10060 s = htab->pltlocal;
10061 ent->plt.offset = s->size;
10062 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10063 if (bfd_link_pic (info))
10064 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10065 }
10066 }
10067 else
10068 ent->plt.offset = (bfd_vma) -1;
10069 }
10070 }
10071
10072 /* Allocate global sym .plt and .got entries, and space for global
10073 sym dynamic relocs. */
10074 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10075
10076 if (!htab->opd_abi && !bfd_link_pic (info))
10077 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10078
10079 first_tlsld = NULL;
10080 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10081 {
10082 struct got_entry *ent;
10083
10084 if (!is_ppc64_elf (ibfd))
10085 continue;
10086
10087 ent = ppc64_tlsld_got (ibfd);
10088 if (ent->got.refcount > 0)
10089 {
10090 if (!htab->do_multi_toc && first_tlsld != NULL)
10091 {
10092 ent->is_indirect = TRUE;
10093 ent->got.ent = first_tlsld;
10094 }
10095 else
10096 {
10097 if (first_tlsld == NULL)
10098 first_tlsld = ent;
10099 s = ppc64_elf_tdata (ibfd)->got;
10100 ent->got.offset = s->size;
10101 ent->owner = ibfd;
10102 s->size += 16;
10103 if (bfd_link_dll (info))
10104 {
10105 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10106 srel->size += sizeof (Elf64_External_Rela);
10107 }
10108 }
10109 }
10110 else
10111 ent->got.offset = (bfd_vma) -1;
10112 }
10113
10114 /* We now have determined the sizes of the various dynamic sections.
10115 Allocate memory for them. */
10116 relocs = FALSE;
10117 for (s = dynobj->sections; s != NULL; s = s->next)
10118 {
10119 if ((s->flags & SEC_LINKER_CREATED) == 0)
10120 continue;
10121
10122 if (s == htab->brlt || s == htab->relbrlt)
10123 /* These haven't been allocated yet; don't strip. */
10124 continue;
10125 else if (s == htab->elf.sgot
10126 || s == htab->elf.splt
10127 || s == htab->elf.iplt
10128 || s == htab->pltlocal
10129 || s == htab->glink
10130 || s == htab->global_entry
10131 || s == htab->elf.sdynbss
10132 || s == htab->elf.sdynrelro)
10133 {
10134 /* Strip this section if we don't need it; see the
10135 comment below. */
10136 }
10137 else if (s == htab->glink_eh_frame)
10138 {
10139 if (!bfd_is_abs_section (s->output_section))
10140 /* Not sized yet. */
10141 continue;
10142 }
10143 else if (CONST_STRNEQ (s->name, ".rela"))
10144 {
10145 if (s->size != 0)
10146 {
10147 if (s != htab->elf.srelplt)
10148 relocs = TRUE;
10149
10150 /* We use the reloc_count field as a counter if we need
10151 to copy relocs into the output file. */
10152 s->reloc_count = 0;
10153 }
10154 }
10155 else
10156 {
10157 /* It's not one of our sections, so don't allocate space. */
10158 continue;
10159 }
10160
10161 if (s->size == 0)
10162 {
10163 /* If we don't need this section, strip it from the
10164 output file. This is mostly to handle .rela.bss and
10165 .rela.plt. We must create both sections in
10166 create_dynamic_sections, because they must be created
10167 before the linker maps input sections to output
10168 sections. The linker does that before
10169 adjust_dynamic_symbol is called, and it is that
10170 function which decides whether anything needs to go
10171 into these sections. */
10172 s->flags |= SEC_EXCLUDE;
10173 continue;
10174 }
10175
10176 if (bfd_is_abs_section (s->output_section))
10177 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10178 s->name);
10179
10180 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10181 continue;
10182
10183 /* Allocate memory for the section contents. We use bfd_zalloc
10184 here in case unused entries are not reclaimed before the
10185 section's contents are written out. This should not happen,
10186 but this way if it does we get a R_PPC64_NONE reloc in .rela
10187 sections instead of garbage.
10188 We also rely on the section contents being zero when writing
10189 the GOT and .dynrelro. */
10190 s->contents = bfd_zalloc (dynobj, s->size);
10191 if (s->contents == NULL)
10192 return FALSE;
10193 }
10194
10195 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10196 {
10197 if (!is_ppc64_elf (ibfd))
10198 continue;
10199
10200 s = ppc64_elf_tdata (ibfd)->got;
10201 if (s != NULL && s != htab->elf.sgot)
10202 {
10203 if (s->size == 0)
10204 s->flags |= SEC_EXCLUDE;
10205 else
10206 {
10207 s->contents = bfd_zalloc (ibfd, s->size);
10208 if (s->contents == NULL)
10209 return FALSE;
10210 }
10211 }
10212 s = ppc64_elf_tdata (ibfd)->relgot;
10213 if (s != NULL)
10214 {
10215 if (s->size == 0)
10216 s->flags |= SEC_EXCLUDE;
10217 else
10218 {
10219 s->contents = bfd_zalloc (ibfd, s->size);
10220 if (s->contents == NULL)
10221 return FALSE;
10222 relocs = TRUE;
10223 s->reloc_count = 0;
10224 }
10225 }
10226 }
10227
10228 if (htab->elf.dynamic_sections_created)
10229 {
10230 bfd_boolean tls_opt;
10231
10232 /* Add some entries to the .dynamic section. We fill in the
10233 values later, in ppc64_elf_finish_dynamic_sections, but we
10234 must add the entries now so that we get the correct size for
10235 the .dynamic section. The DT_DEBUG entry is filled in by the
10236 dynamic linker and used by the debugger. */
10237 #define add_dynamic_entry(TAG, VAL) \
10238 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10239
10240 if (bfd_link_executable (info))
10241 {
10242 if (!add_dynamic_entry (DT_DEBUG, 0))
10243 return FALSE;
10244 }
10245
10246 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10247 {
10248 if (!add_dynamic_entry (DT_PLTGOT, 0)
10249 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10250 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10251 || !add_dynamic_entry (DT_JMPREL, 0)
10252 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10253 return FALSE;
10254 }
10255
10256 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10257 {
10258 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10259 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10260 return FALSE;
10261 }
10262
10263 tls_opt = (htab->params->tls_get_addr_opt
10264 && ((htab->tls_get_addr_fd != NULL
10265 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10266 || (htab->tga_desc_fd != NULL
10267 && htab->tga_desc_fd->elf.plt.plist != NULL)));
10268 if (tls_opt || !htab->opd_abi)
10269 {
10270 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10271 return FALSE;
10272 }
10273
10274 if (relocs)
10275 {
10276 if (!add_dynamic_entry (DT_RELA, 0)
10277 || !add_dynamic_entry (DT_RELASZ, 0)
10278 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10279 return FALSE;
10280
10281 /* If any dynamic relocs apply to a read-only section,
10282 then we need a DT_TEXTREL entry. */
10283 if ((info->flags & DF_TEXTREL) == 0)
10284 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10285
10286 if ((info->flags & DF_TEXTREL) != 0)
10287 {
10288 if (!add_dynamic_entry (DT_TEXTREL, 0))
10289 return FALSE;
10290 }
10291 }
10292 }
10293 #undef add_dynamic_entry
10294
10295 return TRUE;
10296 }
10297
10298 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10299
10300 static bfd_boolean
10301 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10302 {
10303 if (h->plt.plist != NULL
10304 && !h->def_regular
10305 && !h->pointer_equality_needed)
10306 return FALSE;
10307
10308 return _bfd_elf_hash_symbol (h);
10309 }
10310
10311 /* Determine the type of stub needed, if any, for a call. */
10312
10313 static inline enum ppc_stub_type
10314 ppc_type_of_stub (asection *input_sec,
10315 const Elf_Internal_Rela *rel,
10316 struct ppc_link_hash_entry **hash,
10317 struct plt_entry **plt_ent,
10318 bfd_vma destination,
10319 unsigned long local_off)
10320 {
10321 struct ppc_link_hash_entry *h = *hash;
10322 bfd_vma location;
10323 bfd_vma branch_offset;
10324 bfd_vma max_branch_offset;
10325 enum elf_ppc64_reloc_type r_type;
10326
10327 if (h != NULL)
10328 {
10329 struct plt_entry *ent;
10330 struct ppc_link_hash_entry *fdh = h;
10331 if (h->oh != NULL
10332 && h->oh->is_func_descriptor)
10333 {
10334 fdh = ppc_follow_link (h->oh);
10335 *hash = fdh;
10336 }
10337
10338 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10339 if (ent->addend == rel->r_addend
10340 && ent->plt.offset != (bfd_vma) -1)
10341 {
10342 *plt_ent = ent;
10343 return ppc_stub_plt_call;
10344 }
10345
10346 /* Here, we know we don't have a plt entry. If we don't have a
10347 either a defined function descriptor or a defined entry symbol
10348 in a regular object file, then it is pointless trying to make
10349 any other type of stub. */
10350 if (!is_static_defined (&fdh->elf)
10351 && !is_static_defined (&h->elf))
10352 return ppc_stub_none;
10353 }
10354 else if (elf_local_got_ents (input_sec->owner) != NULL)
10355 {
10356 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10357 struct plt_entry **local_plt = (struct plt_entry **)
10358 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10359 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10360
10361 if (local_plt[r_symndx] != NULL)
10362 {
10363 struct plt_entry *ent;
10364
10365 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10366 if (ent->addend == rel->r_addend
10367 && ent->plt.offset != (bfd_vma) -1)
10368 {
10369 *plt_ent = ent;
10370 return ppc_stub_plt_call;
10371 }
10372 }
10373 }
10374
10375 /* Determine where the call point is. */
10376 location = (input_sec->output_offset
10377 + input_sec->output_section->vma
10378 + rel->r_offset);
10379
10380 branch_offset = destination - location;
10381 r_type = ELF64_R_TYPE (rel->r_info);
10382
10383 /* Determine if a long branch stub is needed. */
10384 max_branch_offset = 1 << 25;
10385 if (r_type == R_PPC64_REL14
10386 || r_type == R_PPC64_REL14_BRTAKEN
10387 || r_type == R_PPC64_REL14_BRNTAKEN)
10388 max_branch_offset = 1 << 15;
10389
10390 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10391 /* We need a stub. Figure out whether a long_branch or plt_branch
10392 is needed later. */
10393 return ppc_stub_long_branch;
10394
10395 return ppc_stub_none;
10396 }
10397
10398 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10399 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10400 . mflr %r12
10401 . bcl 20,31,1f
10402 .1: mflr %r11
10403 . mtlr %r12
10404 . lis %r12,xxx-1b@highest
10405 . ori %r12,%r12,xxx-1b@higher
10406 . sldi %r12,%r12,32
10407 . oris %r12,%r12,xxx-1b@high
10408 . ori %r12,%r12,xxx-1b@l
10409 . add/ldx %r12,%r11,%r12 */
10410
10411 static bfd_byte *
10412 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10413 {
10414 bfd_put_32 (abfd, MFLR_R12, p);
10415 p += 4;
10416 bfd_put_32 (abfd, BCL_20_31, p);
10417 p += 4;
10418 bfd_put_32 (abfd, MFLR_R11, p);
10419 p += 4;
10420 bfd_put_32 (abfd, MTLR_R12, p);
10421 p += 4;
10422 if (off + 0x8000 < 0x10000)
10423 {
10424 if (load)
10425 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10426 else
10427 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10428 p += 4;
10429 }
10430 else if (off + 0x80008000ULL < 0x100000000ULL)
10431 {
10432 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10433 p += 4;
10434 if (load)
10435 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10436 else
10437 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10438 p += 4;
10439 }
10440 else
10441 {
10442 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10443 {
10444 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10445 p += 4;
10446 }
10447 else
10448 {
10449 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10450 p += 4;
10451 if (((off >> 32) & 0xffff) != 0)
10452 {
10453 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10454 p += 4;
10455 }
10456 }
10457 if (((off >> 32) & 0xffffffffULL) != 0)
10458 {
10459 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10460 p += 4;
10461 }
10462 if (PPC_HI (off) != 0)
10463 {
10464 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10465 p += 4;
10466 }
10467 if (PPC_LO (off) != 0)
10468 {
10469 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10470 p += 4;
10471 }
10472 if (load)
10473 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10474 else
10475 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10476 p += 4;
10477 }
10478 return p;
10479 }
10480
10481 static unsigned int
10482 size_offset (bfd_vma off)
10483 {
10484 unsigned int size;
10485 if (off + 0x8000 < 0x10000)
10486 size = 4;
10487 else if (off + 0x80008000ULL < 0x100000000ULL)
10488 size = 8;
10489 else
10490 {
10491 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10492 size = 4;
10493 else
10494 {
10495 size = 4;
10496 if (((off >> 32) & 0xffff) != 0)
10497 size += 4;
10498 }
10499 if (((off >> 32) & 0xffffffffULL) != 0)
10500 size += 4;
10501 if (PPC_HI (off) != 0)
10502 size += 4;
10503 if (PPC_LO (off) != 0)
10504 size += 4;
10505 size += 4;
10506 }
10507 return size + 16;
10508 }
10509
10510 static unsigned int
10511 num_relocs_for_offset (bfd_vma off)
10512 {
10513 unsigned int num_rel;
10514 if (off + 0x8000 < 0x10000)
10515 num_rel = 1;
10516 else if (off + 0x80008000ULL < 0x100000000ULL)
10517 num_rel = 2;
10518 else
10519 {
10520 num_rel = 1;
10521 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10522 && ((off >> 32) & 0xffff) != 0)
10523 num_rel += 1;
10524 if (PPC_HI (off) != 0)
10525 num_rel += 1;
10526 if (PPC_LO (off) != 0)
10527 num_rel += 1;
10528 }
10529 return num_rel;
10530 }
10531
10532 static Elf_Internal_Rela *
10533 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10534 bfd_vma roff, bfd_vma targ, bfd_vma off)
10535 {
10536 bfd_vma relative_targ = targ - (roff - 8);
10537 if (bfd_big_endian (info->output_bfd))
10538 roff += 2;
10539 r->r_offset = roff;
10540 r->r_addend = relative_targ + roff;
10541 if (off + 0x8000 < 0x10000)
10542 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10543 else if (off + 0x80008000ULL < 0x100000000ULL)
10544 {
10545 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10546 ++r;
10547 roff += 4;
10548 r->r_offset = roff;
10549 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10550 r->r_addend = relative_targ + roff;
10551 }
10552 else
10553 {
10554 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10555 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10556 else
10557 {
10558 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10559 if (((off >> 32) & 0xffff) != 0)
10560 {
10561 ++r;
10562 roff += 4;
10563 r->r_offset = roff;
10564 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10565 r->r_addend = relative_targ + roff;
10566 }
10567 }
10568 if (((off >> 32) & 0xffffffffULL) != 0)
10569 roff += 4;
10570 if (PPC_HI (off) != 0)
10571 {
10572 ++r;
10573 roff += 4;
10574 r->r_offset = roff;
10575 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10576 r->r_addend = relative_targ + roff;
10577 }
10578 if (PPC_LO (off) != 0)
10579 {
10580 ++r;
10581 roff += 4;
10582 r->r_offset = roff;
10583 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10584 r->r_addend = relative_targ + roff;
10585 }
10586 }
10587 return r;
10588 }
10589
10590 static bfd_byte *
10591 build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10592 bfd_boolean load)
10593 {
10594 uint64_t insn;
10595 if (off - odd + (1ULL << 33) < 1ULL << 34)
10596 {
10597 off -= odd;
10598 if (odd)
10599 {
10600 bfd_put_32 (abfd, NOP, p);
10601 p += 4;
10602 }
10603 if (load)
10604 insn = PLD_R12_PC;
10605 else
10606 insn = PADDI_R12_PC;
10607 insn |= D34 (off);
10608 bfd_put_32 (abfd, insn >> 32, p);
10609 p += 4;
10610 bfd_put_32 (abfd, insn, p);
10611 }
10612 /* The minimum value for paddi is -0x200000000. The minimum value
10613 for li is -0x8000, which when shifted by 34 and added gives a
10614 minimum value of -0x2000200000000. The maximum value is
10615 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10616 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10617 {
10618 off -= 8 - odd;
10619 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10620 p += 4;
10621 if (!odd)
10622 {
10623 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10624 p += 4;
10625 }
10626 insn = PADDI_R12_PC | D34 (off);
10627 bfd_put_32 (abfd, insn >> 32, p);
10628 p += 4;
10629 bfd_put_32 (abfd, insn, p);
10630 p += 4;
10631 if (odd)
10632 {
10633 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10634 p += 4;
10635 }
10636 if (load)
10637 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10638 else
10639 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10640 }
10641 else
10642 {
10643 off -= odd + 8;
10644 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10645 p += 4;
10646 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10647 p += 4;
10648 if (odd)
10649 {
10650 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10651 p += 4;
10652 }
10653 insn = PADDI_R12_PC | D34 (off);
10654 bfd_put_32 (abfd, insn >> 32, p);
10655 p += 4;
10656 bfd_put_32 (abfd, insn, p);
10657 p += 4;
10658 if (!odd)
10659 {
10660 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10661 p += 4;
10662 }
10663 if (load)
10664 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10665 else
10666 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10667 }
10668 p += 4;
10669 return p;
10670 }
10671
10672 static unsigned int
10673 size_power10_offset (bfd_vma off, int odd)
10674 {
10675 if (off - odd + (1ULL << 33) < 1ULL << 34)
10676 return odd + 8;
10677 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10678 return 20;
10679 else
10680 return 24;
10681 }
10682
10683 static unsigned int
10684 num_relocs_for_power10_offset (bfd_vma off, int odd)
10685 {
10686 if (off - odd + (1ULL << 33) < 1ULL << 34)
10687 return 1;
10688 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10689 return 2;
10690 else
10691 return 3;
10692 }
10693
10694 static Elf_Internal_Rela *
10695 emit_relocs_for_power10_offset (struct bfd_link_info *info,
10696 Elf_Internal_Rela *r, bfd_vma roff,
10697 bfd_vma targ, bfd_vma off, int odd)
10698 {
10699 if (off - odd + (1ULL << 33) < 1ULL << 34)
10700 roff += odd;
10701 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10702 {
10703 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10704 r->r_offset = roff + d_offset;
10705 r->r_addend = targ + 8 - odd - d_offset;
10706 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10707 ++r;
10708 roff += 8 - odd;
10709 }
10710 else
10711 {
10712 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10713 r->r_offset = roff + d_offset;
10714 r->r_addend = targ + 8 + odd - d_offset;
10715 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10716 ++r;
10717 roff += 4;
10718 r->r_offset = roff + d_offset;
10719 r->r_addend = targ + 4 + odd - d_offset;
10720 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10721 ++r;
10722 roff += 4 + odd;
10723 }
10724 r->r_offset = roff;
10725 r->r_addend = targ;
10726 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10727 return r;
10728 }
10729
10730 /* Emit .eh_frame opcode to advance pc by DELTA. */
10731
10732 static bfd_byte *
10733 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10734 {
10735 delta /= 4;
10736 if (delta < 64)
10737 *eh++ = DW_CFA_advance_loc + delta;
10738 else if (delta < 256)
10739 {
10740 *eh++ = DW_CFA_advance_loc1;
10741 *eh++ = delta;
10742 }
10743 else if (delta < 65536)
10744 {
10745 *eh++ = DW_CFA_advance_loc2;
10746 bfd_put_16 (abfd, delta, eh);
10747 eh += 2;
10748 }
10749 else
10750 {
10751 *eh++ = DW_CFA_advance_loc4;
10752 bfd_put_32 (abfd, delta, eh);
10753 eh += 4;
10754 }
10755 return eh;
10756 }
10757
10758 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10759
10760 static unsigned int
10761 eh_advance_size (unsigned int delta)
10762 {
10763 if (delta < 64 * 4)
10764 /* DW_CFA_advance_loc+[1..63]. */
10765 return 1;
10766 if (delta < 256 * 4)
10767 /* DW_CFA_advance_loc1, byte. */
10768 return 2;
10769 if (delta < 65536 * 4)
10770 /* DW_CFA_advance_loc2, 2 bytes. */
10771 return 3;
10772 /* DW_CFA_advance_loc4, 4 bytes. */
10773 return 5;
10774 }
10775
10776 /* With power7 weakly ordered memory model, it is possible for ld.so
10777 to update a plt entry in one thread and have another thread see a
10778 stale zero toc entry. To avoid this we need some sort of acquire
10779 barrier in the call stub. One solution is to make the load of the
10780 toc word seem to appear to depend on the load of the function entry
10781 word. Another solution is to test for r2 being zero, and branch to
10782 the appropriate glink entry if so.
10783
10784 . fake dep barrier compare
10785 . ld 12,xxx(2) ld 12,xxx(2)
10786 . mtctr 12 mtctr 12
10787 . xor 11,12,12 ld 2,xxx+8(2)
10788 . add 2,2,11 cmpldi 2,0
10789 . ld 2,xxx+8(2) bnectr+
10790 . bctr b <glink_entry>
10791
10792 The solution involving the compare turns out to be faster, so
10793 that's what we use unless the branch won't reach. */
10794
10795 #define ALWAYS_USE_FAKE_DEP 0
10796 #define ALWAYS_EMIT_R2SAVE 0
10797
10798 static inline unsigned int
10799 plt_stub_size (struct ppc_link_hash_table *htab,
10800 struct ppc_stub_hash_entry *stub_entry,
10801 bfd_vma off)
10802 {
10803 unsigned size;
10804
10805 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10806 {
10807 if (htab->power10_stubs)
10808 {
10809 bfd_vma start = (stub_entry->stub_offset
10810 + stub_entry->group->stub_sec->output_offset
10811 + stub_entry->group->stub_sec->output_section->vma);
10812 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10813 start += 4;
10814 size = 8 + size_power10_offset (off, start & 4);
10815 }
10816 else
10817 size = 8 + size_offset (off - 8);
10818 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10819 size += 4;
10820 return size;
10821 }
10822
10823 size = 12;
10824 if (ALWAYS_EMIT_R2SAVE
10825 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10826 size += 4;
10827 if (PPC_HA (off) != 0)
10828 size += 4;
10829 if (htab->opd_abi)
10830 {
10831 size += 4;
10832 if (htab->params->plt_static_chain)
10833 size += 4;
10834 if (htab->params->plt_thread_safe
10835 && htab->elf.dynamic_sections_created
10836 && stub_entry->h != NULL
10837 && stub_entry->h->elf.dynindx != -1)
10838 size += 8;
10839 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10840 size += 4;
10841 }
10842 if (stub_entry->h != NULL
10843 && is_tls_get_addr (&stub_entry->h->elf, htab)
10844 && htab->params->tls_get_addr_opt)
10845 {
10846 if (htab->params->no_tls_get_addr_regsave)
10847 {
10848 size += 7 * 4;
10849 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10850 size += 6 * 4;
10851 }
10852 else
10853 {
10854 size += 30 * 4;
10855 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10856 size += 4;
10857 }
10858 }
10859 return size;
10860 }
10861
10862 /* Depending on the sign of plt_stub_align:
10863 If positive, return the padding to align to a 2**plt_stub_align
10864 boundary.
10865 If negative, if this stub would cross fewer 2**plt_stub_align
10866 boundaries if we align, then return the padding needed to do so. */
10867
10868 static inline unsigned int
10869 plt_stub_pad (struct ppc_link_hash_table *htab,
10870 struct ppc_stub_hash_entry *stub_entry,
10871 bfd_vma plt_off)
10872 {
10873 int stub_align;
10874 unsigned stub_size;
10875 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10876
10877 if (htab->params->plt_stub_align >= 0)
10878 {
10879 stub_align = 1 << htab->params->plt_stub_align;
10880 if ((stub_off & (stub_align - 1)) != 0)
10881 return stub_align - (stub_off & (stub_align - 1));
10882 return 0;
10883 }
10884
10885 stub_align = 1 << -htab->params->plt_stub_align;
10886 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10887 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10888 > ((stub_size - 1) & -stub_align))
10889 return stub_align - (stub_off & (stub_align - 1));
10890 return 0;
10891 }
10892
10893 /* Build a .plt call stub. */
10894
10895 static inline bfd_byte *
10896 build_plt_stub (struct ppc_link_hash_table *htab,
10897 struct ppc_stub_hash_entry *stub_entry,
10898 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10899 {
10900 bfd *obfd = htab->params->stub_bfd;
10901 bfd_boolean plt_load_toc = htab->opd_abi;
10902 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10903 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10904 && htab->elf.dynamic_sections_created
10905 && stub_entry->h != NULL
10906 && stub_entry->h->elf.dynindx != -1);
10907 bfd_boolean use_fake_dep = plt_thread_safe;
10908 bfd_vma cmp_branch_off = 0;
10909
10910 if (!ALWAYS_USE_FAKE_DEP
10911 && plt_load_toc
10912 && plt_thread_safe
10913 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
10914 && htab->params->tls_get_addr_opt))
10915 {
10916 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10917 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10918 / PLT_ENTRY_SIZE (htab));
10919 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10920 bfd_vma to, from;
10921
10922 if (pltindex > 32768)
10923 glinkoff += (pltindex - 32768) * 4;
10924 to = (glinkoff
10925 + htab->glink->output_offset
10926 + htab->glink->output_section->vma);
10927 from = (p - stub_entry->group->stub_sec->contents
10928 + 4 * (ALWAYS_EMIT_R2SAVE
10929 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10930 + 4 * (PPC_HA (offset) != 0)
10931 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10932 != PPC_HA (offset))
10933 + 4 * (plt_static_chain != 0)
10934 + 20
10935 + stub_entry->group->stub_sec->output_offset
10936 + stub_entry->group->stub_sec->output_section->vma);
10937 cmp_branch_off = to - from;
10938 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10939 }
10940
10941 if (PPC_HA (offset) != 0)
10942 {
10943 if (r != NULL)
10944 {
10945 if (ALWAYS_EMIT_R2SAVE
10946 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10947 r[0].r_offset += 4;
10948 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10949 r[1].r_offset = r[0].r_offset + 4;
10950 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10951 r[1].r_addend = r[0].r_addend;
10952 if (plt_load_toc)
10953 {
10954 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10955 {
10956 r[2].r_offset = r[1].r_offset + 4;
10957 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10958 r[2].r_addend = r[0].r_addend;
10959 }
10960 else
10961 {
10962 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10963 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10964 r[2].r_addend = r[0].r_addend + 8;
10965 if (plt_static_chain)
10966 {
10967 r[3].r_offset = r[2].r_offset + 4;
10968 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10969 r[3].r_addend = r[0].r_addend + 16;
10970 }
10971 }
10972 }
10973 }
10974 if (ALWAYS_EMIT_R2SAVE
10975 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10976 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10977 if (plt_load_toc)
10978 {
10979 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10980 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10981 }
10982 else
10983 {
10984 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10985 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10986 }
10987 if (plt_load_toc
10988 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10989 {
10990 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10991 offset = 0;
10992 }
10993 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10994 if (plt_load_toc)
10995 {
10996 if (use_fake_dep)
10997 {
10998 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10999 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
11000 }
11001 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
11002 if (plt_static_chain)
11003 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
11004 }
11005 }
11006 else
11007 {
11008 if (r != NULL)
11009 {
11010 if (ALWAYS_EMIT_R2SAVE
11011 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11012 r[0].r_offset += 4;
11013 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11014 if (plt_load_toc)
11015 {
11016 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
11017 {
11018 r[1].r_offset = r[0].r_offset + 4;
11019 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11020 r[1].r_addend = r[0].r_addend;
11021 }
11022 else
11023 {
11024 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11025 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11026 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11027 if (plt_static_chain)
11028 {
11029 r[2].r_offset = r[1].r_offset + 4;
11030 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11031 r[2].r_addend = r[0].r_addend + 8;
11032 }
11033 }
11034 }
11035 }
11036 if (ALWAYS_EMIT_R2SAVE
11037 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11038 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
11039 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
11040 if (plt_load_toc
11041 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
11042 {
11043 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11044 offset = 0;
11045 }
11046 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
11047 if (plt_load_toc)
11048 {
11049 if (use_fake_dep)
11050 {
11051 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11052 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11053 }
11054 if (plt_static_chain)
11055 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11056 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
11057 }
11058 }
11059 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
11060 {
11061 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11062 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
11063 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
11064 }
11065 else
11066 bfd_put_32 (obfd, BCTR, p), p += 4;
11067 return p;
11068 }
11069
11070 /* Build a special .plt call stub for __tls_get_addr. */
11071
11072 #define LD_R0_0R3 0xe8030000
11073 #define LD_R12_0R3 0xe9830000
11074 #define MR_R0_R3 0x7c601b78
11075 #define CMPDI_R0_0 0x2c200000
11076 #define ADD_R3_R12_R13 0x7c6c6a14
11077 #define BEQLR 0x4d820020
11078 #define MR_R3_R0 0x7c030378
11079 #define BCTRL 0x4e800421
11080
11081 static inline bfd_byte *
11082 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11083 struct ppc_stub_hash_entry *stub_entry,
11084 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
11085 {
11086 bfd *obfd = htab->params->stub_bfd;
11087 bfd_byte *loc = p;
11088 unsigned int i;
11089
11090 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
11091 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11092 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
11093 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11094 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11095 bfd_put_32 (obfd, BEQLR, p), p += 4;
11096 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
11097 if (htab->params->no_tls_get_addr_regsave)
11098 {
11099 if (r != NULL)
11100 r[0].r_offset += 7 * 4;
11101 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11102 return build_plt_stub (htab, stub_entry, p, offset, r);
11103
11104 bfd_put_32 (obfd, MFLR_R0, p);
11105 p += 4;
11106 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11107 p += 4;
11108
11109 if (r != NULL)
11110 r[0].r_offset += 2 * 4;
11111 p = build_plt_stub (htab, stub_entry, p, offset, r);
11112 bfd_put_32 (obfd, BCTRL, p - 4);
11113
11114 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11115 p += 4;
11116 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11117 p += 4;
11118 bfd_put_32 (obfd, MTLR_R0, p);
11119 p += 4;
11120 bfd_put_32 (obfd, BLR, p);
11121 p += 4;
11122 }
11123 else
11124 {
11125 p = tls_get_addr_prologue (obfd, p, htab);
11126
11127 if (r != NULL)
11128 r[0].r_offset += 18 * 4;
11129
11130 p = build_plt_stub (htab, stub_entry, p, offset, r);
11131 bfd_put_32 (obfd, BCTRL, p - 4);
11132
11133 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11134 {
11135 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11136 p += 4;
11137 }
11138
11139 p = tls_get_addr_epilogue (obfd, p, htab);
11140 }
11141
11142 if (htab->glink_eh_frame != NULL
11143 && htab->glink_eh_frame->size != 0)
11144 {
11145 bfd_byte *base, *eh;
11146
11147 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11148 eh = base + stub_entry->group->eh_size;
11149 if (htab->params->no_tls_get_addr_regsave)
11150 {
11151 unsigned int lr_used, delta;
11152 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11153 delta = lr_used - stub_entry->group->lr_restore;
11154 stub_entry->group->lr_restore = lr_used + 16;
11155 eh = eh_advance (htab->elf.dynobj, eh, delta);
11156 *eh++ = DW_CFA_offset_extended_sf;
11157 *eh++ = 65;
11158 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11159 *eh++ = DW_CFA_advance_loc + 4;
11160 }
11161 else
11162 {
11163 unsigned int cfa_updt, delta;
11164 /* After the bctrl, lr has been modified so we need to emit
11165 .eh_frame info saying the return address is on the stack. In
11166 fact we must put the EH info at or before the call rather
11167 than after it, because the EH info for a call needs to be
11168 specified by that point.
11169 See libgcc/unwind-dw2.c execute_cfa_program.
11170 Any stack pointer update must be described immediately after
11171 the instruction making the change, and since the stdu occurs
11172 after saving regs we put all the reg saves and the cfa
11173 change there. */
11174 cfa_updt = stub_entry->stub_offset + 18 * 4;
11175 delta = cfa_updt - stub_entry->group->lr_restore;
11176 stub_entry->group->lr_restore
11177 = stub_entry->stub_offset + (p - loc) - 4;
11178 eh = eh_advance (htab->elf.dynobj, eh, delta);
11179 *eh++ = DW_CFA_def_cfa_offset;
11180 if (htab->opd_abi)
11181 {
11182 *eh++ = 128;
11183 *eh++ = 1;
11184 }
11185 else
11186 *eh++ = 96;
11187 *eh++ = DW_CFA_offset_extended_sf;
11188 *eh++ = 65;
11189 *eh++ = (-16 / 8) & 0x7f;
11190 for (i = 4; i < 12; i++)
11191 {
11192 *eh++ = DW_CFA_offset + i;
11193 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11194 }
11195 *eh++ = (DW_CFA_advance_loc
11196 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11197 *eh++ = DW_CFA_def_cfa_offset;
11198 *eh++ = 0;
11199 for (i = 4; i < 12; i++)
11200 *eh++ = DW_CFA_restore + i;
11201 *eh++ = DW_CFA_advance_loc + 2;
11202 }
11203 *eh++ = DW_CFA_restore_extended;
11204 *eh++ = 65;
11205 stub_entry->group->eh_size = eh - base;
11206 }
11207 return p;
11208 }
11209
11210 static Elf_Internal_Rela *
11211 get_relocs (asection *sec, int count)
11212 {
11213 Elf_Internal_Rela *relocs;
11214 struct bfd_elf_section_data *elfsec_data;
11215
11216 elfsec_data = elf_section_data (sec);
11217 relocs = elfsec_data->relocs;
11218 if (relocs == NULL)
11219 {
11220 bfd_size_type relsize;
11221 relsize = sec->reloc_count * sizeof (*relocs);
11222 relocs = bfd_alloc (sec->owner, relsize);
11223 if (relocs == NULL)
11224 return NULL;
11225 elfsec_data->relocs = relocs;
11226 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11227 sizeof (Elf_Internal_Shdr));
11228 if (elfsec_data->rela.hdr == NULL)
11229 return NULL;
11230 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11231 * sizeof (Elf64_External_Rela));
11232 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
11233 sec->reloc_count = 0;
11234 }
11235 relocs += sec->reloc_count;
11236 sec->reloc_count += count;
11237 return relocs;
11238 }
11239
11240 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11241 forms, to the equivalent relocs against the global symbol given by
11242 STUB_ENTRY->H. */
11243
11244 static bfd_boolean
11245 use_global_in_relocs (struct ppc_link_hash_table *htab,
11246 struct ppc_stub_hash_entry *stub_entry,
11247 Elf_Internal_Rela *r, unsigned int num_rel)
11248 {
11249 struct elf_link_hash_entry **hashes;
11250 unsigned long symndx;
11251 struct ppc_link_hash_entry *h;
11252 bfd_vma symval;
11253
11254 /* Relocs are always against symbols in their own object file. Fake
11255 up global sym hashes for the stub bfd (which has no symbols). */
11256 hashes = elf_sym_hashes (htab->params->stub_bfd);
11257 if (hashes == NULL)
11258 {
11259 bfd_size_type hsize;
11260
11261 /* When called the first time, stub_globals will contain the
11262 total number of symbols seen during stub sizing. After
11263 allocating, stub_globals is used as an index to fill the
11264 hashes array. */
11265 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11266 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11267 if (hashes == NULL)
11268 return FALSE;
11269 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11270 htab->stub_globals = 1;
11271 }
11272 symndx = htab->stub_globals++;
11273 h = stub_entry->h;
11274 hashes[symndx] = &h->elf;
11275 if (h->oh != NULL && h->oh->is_func)
11276 h = ppc_follow_link (h->oh);
11277 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11278 || h->elf.root.type == bfd_link_hash_defweak);
11279 symval = defined_sym_val (&h->elf);
11280 while (num_rel-- != 0)
11281 {
11282 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11283 if (h->elf.root.u.def.section != stub_entry->target_section)
11284 {
11285 /* H is an opd symbol. The addend must be zero, and the
11286 branch reloc is the only one we can convert. */
11287 r->r_addend = 0;
11288 break;
11289 }
11290 else
11291 r->r_addend -= symval;
11292 --r;
11293 }
11294 return TRUE;
11295 }
11296
11297 static bfd_vma
11298 get_r2off (struct bfd_link_info *info,
11299 struct ppc_stub_hash_entry *stub_entry)
11300 {
11301 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11302 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11303
11304 if (r2off == 0)
11305 {
11306 /* Support linking -R objects. Get the toc pointer from the
11307 opd entry. */
11308 char buf[8];
11309 if (!htab->opd_abi)
11310 return r2off;
11311 asection *opd = stub_entry->h->elf.root.u.def.section;
11312 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11313
11314 if (strcmp (opd->name, ".opd") != 0
11315 || opd->reloc_count != 0)
11316 {
11317 info->callbacks->einfo
11318 (_("%P: cannot find opd entry toc for `%pT'\n"),
11319 stub_entry->h->elf.root.root.string);
11320 bfd_set_error (bfd_error_bad_value);
11321 return (bfd_vma) -1;
11322 }
11323 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11324 return (bfd_vma) -1;
11325 r2off = bfd_get_64 (opd->owner, buf);
11326 r2off -= elf_gp (info->output_bfd);
11327 }
11328 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11329 return r2off;
11330 }
11331
11332 static bfd_boolean
11333 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11334 {
11335 struct ppc_stub_hash_entry *stub_entry;
11336 struct ppc_branch_hash_entry *br_entry;
11337 struct bfd_link_info *info;
11338 struct ppc_link_hash_table *htab;
11339 bfd_byte *loc;
11340 bfd_byte *p, *relp;
11341 bfd_vma targ, off;
11342 Elf_Internal_Rela *r;
11343 asection *plt;
11344 int num_rel;
11345 int odd;
11346
11347 /* Massage our args to the form they really have. */
11348 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11349 info = in_arg;
11350
11351 /* Fail if the target section could not be assigned to an output
11352 section. The user should fix his linker script. */
11353 if (stub_entry->target_section != NULL
11354 && stub_entry->target_section->output_section == NULL
11355 && info->non_contiguous_regions)
11356 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11357 "Retry without --enable-non-contiguous-regions.\n"),
11358 stub_entry->target_section);
11359
11360 /* Same for the group. */
11361 if (stub_entry->group->stub_sec != NULL
11362 && stub_entry->group->stub_sec->output_section == NULL
11363 && info->non_contiguous_regions)
11364 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11365 "output section. Retry without "
11366 "--enable-non-contiguous-regions.\n"),
11367 stub_entry->group->stub_sec,
11368 stub_entry->target_section);
11369
11370 htab = ppc_hash_table (info);
11371 if (htab == NULL)
11372 return FALSE;
11373
11374 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11375 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11376
11377 htab->stub_count[stub_entry->stub_type - 1] += 1;
11378 switch (stub_entry->stub_type)
11379 {
11380 case ppc_stub_long_branch:
11381 case ppc_stub_long_branch_r2off:
11382 /* Branches are relative. This is where we are going to. */
11383 targ = (stub_entry->target_value
11384 + stub_entry->target_section->output_offset
11385 + stub_entry->target_section->output_section->vma);
11386 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11387
11388 /* And this is where we are coming from. */
11389 off = (stub_entry->stub_offset
11390 + stub_entry->group->stub_sec->output_offset
11391 + stub_entry->group->stub_sec->output_section->vma);
11392 off = targ - off;
11393
11394 p = loc;
11395 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11396 {
11397 bfd_vma r2off = get_r2off (info, stub_entry);
11398
11399 if (r2off == (bfd_vma) -1)
11400 {
11401 htab->stub_error = TRUE;
11402 return FALSE;
11403 }
11404 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11405 p += 4;
11406 if (PPC_HA (r2off) != 0)
11407 {
11408 bfd_put_32 (htab->params->stub_bfd,
11409 ADDIS_R2_R2 | PPC_HA (r2off), p);
11410 p += 4;
11411 }
11412 if (PPC_LO (r2off) != 0)
11413 {
11414 bfd_put_32 (htab->params->stub_bfd,
11415 ADDI_R2_R2 | PPC_LO (r2off), p);
11416 p += 4;
11417 }
11418 off -= p - loc;
11419 }
11420 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11421 p += 4;
11422
11423 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11424 {
11425 _bfd_error_handler
11426 (_("long branch stub `%s' offset overflow"),
11427 stub_entry->root.string);
11428 htab->stub_error = TRUE;
11429 return FALSE;
11430 }
11431
11432 if (info->emitrelocations)
11433 {
11434 r = get_relocs (stub_entry->group->stub_sec, 1);
11435 if (r == NULL)
11436 return FALSE;
11437 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11438 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11439 r->r_addend = targ;
11440 if (stub_entry->h != NULL
11441 && !use_global_in_relocs (htab, stub_entry, r, 1))
11442 return FALSE;
11443 }
11444 break;
11445
11446 case ppc_stub_plt_branch:
11447 case ppc_stub_plt_branch_r2off:
11448 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11449 stub_entry->root.string + 9,
11450 FALSE, FALSE);
11451 if (br_entry == NULL)
11452 {
11453 _bfd_error_handler (_("can't find branch stub `%s'"),
11454 stub_entry->root.string);
11455 htab->stub_error = TRUE;
11456 return FALSE;
11457 }
11458
11459 targ = (stub_entry->target_value
11460 + stub_entry->target_section->output_offset
11461 + stub_entry->target_section->output_section->vma);
11462 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11463 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11464
11465 bfd_put_64 (htab->brlt->owner, targ,
11466 htab->brlt->contents + br_entry->offset);
11467
11468 if (br_entry->iter == htab->stub_iteration)
11469 {
11470 br_entry->iter = 0;
11471
11472 if (htab->relbrlt != NULL)
11473 {
11474 /* Create a reloc for the branch lookup table entry. */
11475 Elf_Internal_Rela rela;
11476 bfd_byte *rl;
11477
11478 rela.r_offset = (br_entry->offset
11479 + htab->brlt->output_offset
11480 + htab->brlt->output_section->vma);
11481 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11482 rela.r_addend = targ;
11483
11484 rl = htab->relbrlt->contents;
11485 rl += (htab->relbrlt->reloc_count++
11486 * sizeof (Elf64_External_Rela));
11487 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11488 }
11489 else if (info->emitrelocations)
11490 {
11491 r = get_relocs (htab->brlt, 1);
11492 if (r == NULL)
11493 return FALSE;
11494 /* brlt, being SEC_LINKER_CREATED does not go through the
11495 normal reloc processing. Symbols and offsets are not
11496 translated from input file to output file form, so
11497 set up the offset per the output file. */
11498 r->r_offset = (br_entry->offset
11499 + htab->brlt->output_offset
11500 + htab->brlt->output_section->vma);
11501 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11502 r->r_addend = targ;
11503 }
11504 }
11505
11506 targ = (br_entry->offset
11507 + htab->brlt->output_offset
11508 + htab->brlt->output_section->vma);
11509
11510 off = (elf_gp (info->output_bfd)
11511 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11512 off = targ - off;
11513
11514 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11515 {
11516 info->callbacks->einfo
11517 (_("%P: linkage table error against `%pT'\n"),
11518 stub_entry->root.string);
11519 bfd_set_error (bfd_error_bad_value);
11520 htab->stub_error = TRUE;
11521 return FALSE;
11522 }
11523
11524 if (info->emitrelocations)
11525 {
11526 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11527 if (r == NULL)
11528 return FALSE;
11529 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11530 if (bfd_big_endian (info->output_bfd))
11531 r[0].r_offset += 2;
11532 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11533 r[0].r_offset += 4;
11534 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11535 r[0].r_addend = targ;
11536 if (PPC_HA (off) != 0)
11537 {
11538 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11539 r[1].r_offset = r[0].r_offset + 4;
11540 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11541 r[1].r_addend = r[0].r_addend;
11542 }
11543 }
11544
11545 p = loc;
11546 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11547 {
11548 if (PPC_HA (off) != 0)
11549 {
11550 bfd_put_32 (htab->params->stub_bfd,
11551 ADDIS_R12_R2 | PPC_HA (off), p);
11552 p += 4;
11553 bfd_put_32 (htab->params->stub_bfd,
11554 LD_R12_0R12 | PPC_LO (off), p);
11555 }
11556 else
11557 bfd_put_32 (htab->params->stub_bfd,
11558 LD_R12_0R2 | PPC_LO (off), p);
11559 }
11560 else
11561 {
11562 bfd_vma r2off = get_r2off (info, stub_entry);
11563
11564 if (r2off == (bfd_vma) -1)
11565 {
11566 htab->stub_error = TRUE;
11567 return FALSE;
11568 }
11569
11570 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11571 p += 4;
11572 if (PPC_HA (off) != 0)
11573 {
11574 bfd_put_32 (htab->params->stub_bfd,
11575 ADDIS_R12_R2 | PPC_HA (off), p);
11576 p += 4;
11577 bfd_put_32 (htab->params->stub_bfd,
11578 LD_R12_0R12 | PPC_LO (off), p);
11579 }
11580 else
11581 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11582
11583 if (PPC_HA (r2off) != 0)
11584 {
11585 p += 4;
11586 bfd_put_32 (htab->params->stub_bfd,
11587 ADDIS_R2_R2 | PPC_HA (r2off), p);
11588 }
11589 if (PPC_LO (r2off) != 0)
11590 {
11591 p += 4;
11592 bfd_put_32 (htab->params->stub_bfd,
11593 ADDI_R2_R2 | PPC_LO (r2off), p);
11594 }
11595 }
11596 p += 4;
11597 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11598 p += 4;
11599 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11600 p += 4;
11601 break;
11602
11603 case ppc_stub_long_branch_notoc:
11604 case ppc_stub_long_branch_both:
11605 case ppc_stub_plt_branch_notoc:
11606 case ppc_stub_plt_branch_both:
11607 case ppc_stub_plt_call_notoc:
11608 case ppc_stub_plt_call_both:
11609 p = loc;
11610 off = (stub_entry->stub_offset
11611 + stub_entry->group->stub_sec->output_offset
11612 + stub_entry->group->stub_sec->output_section->vma);
11613 if (stub_entry->stub_type == ppc_stub_long_branch_both
11614 || stub_entry->stub_type == ppc_stub_plt_branch_both
11615 || stub_entry->stub_type == ppc_stub_plt_call_both)
11616 {
11617 off += 4;
11618 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11619 p += 4;
11620 }
11621 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11622 {
11623 targ = stub_entry->plt_ent->plt.offset & ~1;
11624 if (targ >= (bfd_vma) -2)
11625 abort ();
11626
11627 plt = htab->elf.splt;
11628 if (!htab->elf.dynamic_sections_created
11629 || stub_entry->h == NULL
11630 || stub_entry->h->elf.dynindx == -1)
11631 {
11632 if (stub_entry->symtype == STT_GNU_IFUNC)
11633 plt = htab->elf.iplt;
11634 else
11635 plt = htab->pltlocal;
11636 }
11637 targ += plt->output_offset + plt->output_section->vma;
11638 }
11639 else
11640 targ = (stub_entry->target_value
11641 + stub_entry->target_section->output_offset
11642 + stub_entry->target_section->output_section->vma);
11643 odd = off & 4;
11644 off = targ - off;
11645
11646 relp = p;
11647 num_rel = 0;
11648 if (htab->power10_stubs)
11649 {
11650 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11651 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
11652 }
11653 else
11654 {
11655 /* The notoc stubs calculate their target (either a PLT entry or
11656 the global entry point of a function) relative to the PC
11657 returned by the "bcl" two instructions past the start of the
11658 sequence emitted by build_offset. The offset is therefore 8
11659 less than calculated from the start of the sequence. */
11660 off -= 8;
11661 p = build_offset (htab->params->stub_bfd, p, off,
11662 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11663 }
11664
11665 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11666 {
11667 bfd_vma from;
11668 num_rel = 1;
11669 from = (stub_entry->stub_offset
11670 + stub_entry->group->stub_sec->output_offset
11671 + stub_entry->group->stub_sec->output_section->vma
11672 + (p - loc));
11673 bfd_put_32 (htab->params->stub_bfd,
11674 B_DOT | ((targ - from) & 0x3fffffc), p);
11675 }
11676 else
11677 {
11678 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11679 p += 4;
11680 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11681 }
11682 p += 4;
11683
11684 if (info->emitrelocations)
11685 {
11686 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11687 if (htab->power10_stubs)
11688 num_rel += num_relocs_for_power10_offset (off, odd);
11689 else
11690 {
11691 num_rel += num_relocs_for_offset (off);
11692 roff += 16;
11693 }
11694 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11695 if (r == NULL)
11696 return FALSE;
11697 if (htab->power10_stubs)
11698 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
11699 else
11700 r = emit_relocs_for_offset (info, r, roff, targ, off);
11701 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11702 || stub_entry->stub_type == ppc_stub_long_branch_both)
11703 {
11704 ++r;
11705 roff = p - 4 - stub_entry->group->stub_sec->contents;
11706 r->r_offset = roff;
11707 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11708 r->r_addend = targ;
11709 if (stub_entry->h != NULL
11710 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11711 return FALSE;
11712 }
11713 }
11714
11715 if (!htab->power10_stubs
11716 && htab->glink_eh_frame != NULL
11717 && htab->glink_eh_frame->size != 0)
11718 {
11719 bfd_byte *base, *eh;
11720 unsigned int lr_used, delta;
11721
11722 base = (htab->glink_eh_frame->contents
11723 + stub_entry->group->eh_base + 17);
11724 eh = base + stub_entry->group->eh_size;
11725 lr_used = stub_entry->stub_offset + 8;
11726 if (stub_entry->stub_type == ppc_stub_long_branch_both
11727 || stub_entry->stub_type == ppc_stub_plt_branch_both
11728 || stub_entry->stub_type == ppc_stub_plt_call_both)
11729 lr_used += 4;
11730 delta = lr_used - stub_entry->group->lr_restore;
11731 stub_entry->group->lr_restore = lr_used + 8;
11732 eh = eh_advance (htab->elf.dynobj, eh, delta);
11733 *eh++ = DW_CFA_register;
11734 *eh++ = 65;
11735 *eh++ = 12;
11736 *eh++ = DW_CFA_advance_loc + 2;
11737 *eh++ = DW_CFA_restore_extended;
11738 *eh++ = 65;
11739 stub_entry->group->eh_size = eh - base;
11740 }
11741 break;
11742
11743 case ppc_stub_plt_call:
11744 case ppc_stub_plt_call_r2save:
11745 if (stub_entry->h != NULL
11746 && stub_entry->h->is_func_descriptor
11747 && stub_entry->h->oh != NULL)
11748 {
11749 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11750
11751 /* If the old-ABI "dot-symbol" is undefined make it weak so
11752 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11753 if (fh->elf.root.type == bfd_link_hash_undefined
11754 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11755 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11756 fh->elf.root.type = bfd_link_hash_undefweak;
11757 }
11758
11759 /* Now build the stub. */
11760 targ = stub_entry->plt_ent->plt.offset & ~1;
11761 if (targ >= (bfd_vma) -2)
11762 abort ();
11763
11764 plt = htab->elf.splt;
11765 if (!htab->elf.dynamic_sections_created
11766 || stub_entry->h == NULL
11767 || stub_entry->h->elf.dynindx == -1)
11768 {
11769 if (stub_entry->symtype == STT_GNU_IFUNC)
11770 plt = htab->elf.iplt;
11771 else
11772 plt = htab->pltlocal;
11773 }
11774 targ += plt->output_offset + plt->output_section->vma;
11775
11776 off = (elf_gp (info->output_bfd)
11777 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11778 off = targ - off;
11779
11780 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11781 {
11782 info->callbacks->einfo
11783 /* xgettext:c-format */
11784 (_("%P: linkage table error against `%pT'\n"),
11785 stub_entry->h != NULL
11786 ? stub_entry->h->elf.root.root.string
11787 : "<local sym>");
11788 bfd_set_error (bfd_error_bad_value);
11789 htab->stub_error = TRUE;
11790 return FALSE;
11791 }
11792
11793 r = NULL;
11794 if (info->emitrelocations)
11795 {
11796 r = get_relocs (stub_entry->group->stub_sec,
11797 ((PPC_HA (off) != 0)
11798 + (htab->opd_abi
11799 ? 2 + (htab->params->plt_static_chain
11800 && PPC_HA (off + 16) == PPC_HA (off))
11801 : 1)));
11802 if (r == NULL)
11803 return FALSE;
11804 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11805 if (bfd_big_endian (info->output_bfd))
11806 r[0].r_offset += 2;
11807 r[0].r_addend = targ;
11808 }
11809 if (stub_entry->h != NULL
11810 && is_tls_get_addr (&stub_entry->h->elf, htab)
11811 && htab->params->tls_get_addr_opt)
11812 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11813 else
11814 p = build_plt_stub (htab, stub_entry, loc, off, r);
11815 break;
11816
11817 case ppc_stub_save_res:
11818 return TRUE;
11819
11820 default:
11821 BFD_FAIL ();
11822 return FALSE;
11823 }
11824
11825 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11826
11827 if (htab->params->emit_stub_syms)
11828 {
11829 struct elf_link_hash_entry *h;
11830 size_t len1, len2;
11831 char *name;
11832 const char *const stub_str[] = { "long_branch",
11833 "long_branch",
11834 "long_branch",
11835 "long_branch",
11836 "plt_branch",
11837 "plt_branch",
11838 "plt_branch",
11839 "plt_branch",
11840 "plt_call",
11841 "plt_call",
11842 "plt_call",
11843 "plt_call" };
11844
11845 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11846 len2 = strlen (stub_entry->root.string);
11847 name = bfd_malloc (len1 + len2 + 2);
11848 if (name == NULL)
11849 return FALSE;
11850 memcpy (name, stub_entry->root.string, 9);
11851 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11852 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11853 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11854 if (h == NULL)
11855 return FALSE;
11856 if (h->root.type == bfd_link_hash_new)
11857 {
11858 h->root.type = bfd_link_hash_defined;
11859 h->root.u.def.section = stub_entry->group->stub_sec;
11860 h->root.u.def.value = stub_entry->stub_offset;
11861 h->ref_regular = 1;
11862 h->def_regular = 1;
11863 h->ref_regular_nonweak = 1;
11864 h->forced_local = 1;
11865 h->non_elf = 0;
11866 h->root.linker_def = 1;
11867 }
11868 }
11869
11870 return TRUE;
11871 }
11872
11873 /* As above, but don't actually build the stub. Just bump offset so
11874 we know stub section sizes, and select plt_branch stubs where
11875 long_branch stubs won't do. */
11876
11877 static bfd_boolean
11878 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11879 {
11880 struct ppc_stub_hash_entry *stub_entry;
11881 struct bfd_link_info *info;
11882 struct ppc_link_hash_table *htab;
11883 asection *plt;
11884 bfd_vma targ, off, r2off;
11885 unsigned int size, extra, lr_used, delta, odd;
11886
11887 /* Massage our args to the form they really have. */
11888 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11889 info = in_arg;
11890
11891 htab = ppc_hash_table (info);
11892 if (htab == NULL)
11893 return FALSE;
11894
11895 /* Fail if the target section could not be assigned to an output
11896 section. The user should fix his linker script. */
11897 if (stub_entry->target_section != NULL
11898 && stub_entry->target_section->output_section == NULL
11899 && info->non_contiguous_regions)
11900 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11901 "Retry without --enable-non-contiguous-regions.\n"),
11902 stub_entry->target_section);
11903
11904 /* Same for the group. */
11905 if (stub_entry->group->stub_sec != NULL
11906 && stub_entry->group->stub_sec->output_section == NULL
11907 && info->non_contiguous_regions)
11908 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11909 "output section. Retry without "
11910 "--enable-non-contiguous-regions.\n"),
11911 stub_entry->group->stub_sec,
11912 stub_entry->target_section);
11913
11914 /* Make a note of the offset within the stubs for this entry. */
11915 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11916
11917 if (stub_entry->h != NULL
11918 && stub_entry->h->save_res
11919 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11920 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11921 {
11922 /* Don't make stubs to out-of-line register save/restore
11923 functions. Instead, emit copies of the functions. */
11924 stub_entry->group->needs_save_res = 1;
11925 stub_entry->stub_type = ppc_stub_save_res;
11926 return TRUE;
11927 }
11928
11929 switch (stub_entry->stub_type)
11930 {
11931 case ppc_stub_plt_branch:
11932 case ppc_stub_plt_branch_r2off:
11933 /* Reset the stub type from the plt branch variant in case we now
11934 can reach with a shorter stub. */
11935 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11936 /* Fall through. */
11937 case ppc_stub_long_branch:
11938 case ppc_stub_long_branch_r2off:
11939 targ = (stub_entry->target_value
11940 + stub_entry->target_section->output_offset
11941 + stub_entry->target_section->output_section->vma);
11942 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11943 off = (stub_entry->stub_offset
11944 + stub_entry->group->stub_sec->output_offset
11945 + stub_entry->group->stub_sec->output_section->vma);
11946
11947 size = 4;
11948 r2off = 0;
11949 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11950 {
11951 r2off = get_r2off (info, stub_entry);
11952 if (r2off == (bfd_vma) -1)
11953 {
11954 htab->stub_error = TRUE;
11955 return FALSE;
11956 }
11957 size = 8;
11958 if (PPC_HA (r2off) != 0)
11959 size += 4;
11960 if (PPC_LO (r2off) != 0)
11961 size += 4;
11962 off += size - 4;
11963 }
11964 off = targ - off;
11965
11966 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11967 Do the same for -R objects without function descriptors. */
11968 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11969 && r2off == 0
11970 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11971 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11972 {
11973 struct ppc_branch_hash_entry *br_entry;
11974
11975 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11976 stub_entry->root.string + 9,
11977 TRUE, FALSE);
11978 if (br_entry == NULL)
11979 {
11980 _bfd_error_handler (_("can't build branch stub `%s'"),
11981 stub_entry->root.string);
11982 htab->stub_error = TRUE;
11983 return FALSE;
11984 }
11985
11986 if (br_entry->iter != htab->stub_iteration)
11987 {
11988 br_entry->iter = htab->stub_iteration;
11989 br_entry->offset = htab->brlt->size;
11990 htab->brlt->size += 8;
11991
11992 if (htab->relbrlt != NULL)
11993 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11994 else if (info->emitrelocations)
11995 {
11996 htab->brlt->reloc_count += 1;
11997 htab->brlt->flags |= SEC_RELOC;
11998 }
11999 }
12000
12001 targ = (br_entry->offset
12002 + htab->brlt->output_offset
12003 + htab->brlt->output_section->vma);
12004 off = (elf_gp (info->output_bfd)
12005 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12006 off = targ - off;
12007
12008 if (info->emitrelocations)
12009 {
12010 stub_entry->group->stub_sec->reloc_count
12011 += 1 + (PPC_HA (off) != 0);
12012 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12013 }
12014
12015 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
12016 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12017 {
12018 size = 12;
12019 if (PPC_HA (off) != 0)
12020 size = 16;
12021 }
12022 else
12023 {
12024 size = 16;
12025 if (PPC_HA (off) != 0)
12026 size += 4;
12027
12028 if (PPC_HA (r2off) != 0)
12029 size += 4;
12030 if (PPC_LO (r2off) != 0)
12031 size += 4;
12032 }
12033 }
12034 else if (info->emitrelocations)
12035 {
12036 stub_entry->group->stub_sec->reloc_count += 1;
12037 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12038 }
12039 break;
12040
12041 case ppc_stub_plt_branch_notoc:
12042 case ppc_stub_plt_branch_both:
12043 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12044 /* Fall through. */
12045 case ppc_stub_long_branch_notoc:
12046 case ppc_stub_long_branch_both:
12047 off = (stub_entry->stub_offset
12048 + stub_entry->group->stub_sec->output_offset
12049 + stub_entry->group->stub_sec->output_section->vma);
12050 size = 0;
12051 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12052 size = 4;
12053 off += size;
12054 targ = (stub_entry->target_value
12055 + stub_entry->target_section->output_offset
12056 + stub_entry->target_section->output_section->vma);
12057 odd = off & 4;
12058 off = targ - off;
12059
12060 if (info->emitrelocations)
12061 {
12062 unsigned int num_rel;
12063 if (htab->power10_stubs)
12064 num_rel = num_relocs_for_power10_offset (off, odd);
12065 else
12066 num_rel = num_relocs_for_offset (off - 8);
12067 stub_entry->group->stub_sec->reloc_count += num_rel;
12068 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12069 }
12070
12071 if (htab->power10_stubs)
12072 extra = size_power10_offset (off, odd);
12073 else
12074 extra = size_offset (off - 8);
12075 /* Include branch insn plus those in the offset sequence. */
12076 size += 4 + extra;
12077 /* The branch insn is at the end, or "extra" bytes along. So
12078 its offset will be "extra" bytes less that that already
12079 calculated. */
12080 off -= extra;
12081
12082 if (!htab->power10_stubs)
12083 {
12084 /* After the bcl, lr has been modified so we need to emit
12085 .eh_frame info saying the return address is in r12. */
12086 lr_used = stub_entry->stub_offset + 8;
12087 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12088 lr_used += 4;
12089 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12090 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12091 DW_CFA_restore_extended 65. */
12092 delta = lr_used - stub_entry->group->lr_restore;
12093 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12094 stub_entry->group->lr_restore = lr_used + 8;
12095 }
12096
12097 /* If the branch can't reach, use a plt_branch. */
12098 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12099 {
12100 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12101 - ppc_stub_long_branch_notoc);
12102 size += 4;
12103 }
12104 else if (info->emitrelocations)
12105 stub_entry->group->stub_sec->reloc_count +=1;
12106 break;
12107
12108 case ppc_stub_plt_call_notoc:
12109 case ppc_stub_plt_call_both:
12110 off = (stub_entry->stub_offset
12111 + stub_entry->group->stub_sec->output_offset
12112 + stub_entry->group->stub_sec->output_section->vma);
12113 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12114 off += 4;
12115 targ = stub_entry->plt_ent->plt.offset & ~1;
12116 if (targ >= (bfd_vma) -2)
12117 abort ();
12118
12119 plt = htab->elf.splt;
12120 if (!htab->elf.dynamic_sections_created
12121 || stub_entry->h == NULL
12122 || stub_entry->h->elf.dynindx == -1)
12123 {
12124 if (stub_entry->symtype == STT_GNU_IFUNC)
12125 plt = htab->elf.iplt;
12126 else
12127 plt = htab->pltlocal;
12128 }
12129 targ += plt->output_offset + plt->output_section->vma;
12130 odd = off & 4;
12131 off = targ - off;
12132
12133 if (htab->params->plt_stub_align != 0)
12134 {
12135 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12136
12137 stub_entry->group->stub_sec->size += pad;
12138 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12139 off -= pad;
12140 }
12141
12142 if (info->emitrelocations)
12143 {
12144 unsigned int num_rel;
12145 if (htab->power10_stubs)
12146 num_rel = num_relocs_for_power10_offset (off, odd);
12147 else
12148 num_rel = num_relocs_for_offset (off - 8);
12149 stub_entry->group->stub_sec->reloc_count += num_rel;
12150 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12151 }
12152
12153 size = plt_stub_size (htab, stub_entry, off);
12154
12155 if (!htab->power10_stubs)
12156 {
12157 /* After the bcl, lr has been modified so we need to emit
12158 .eh_frame info saying the return address is in r12. */
12159 lr_used = stub_entry->stub_offset + 8;
12160 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12161 lr_used += 4;
12162 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12163 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12164 DW_CFA_restore_extended 65. */
12165 delta = lr_used - stub_entry->group->lr_restore;
12166 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12167 stub_entry->group->lr_restore = lr_used + 8;
12168 }
12169 break;
12170
12171 case ppc_stub_plt_call:
12172 case ppc_stub_plt_call_r2save:
12173 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12174 if (targ >= (bfd_vma) -2)
12175 abort ();
12176 plt = htab->elf.splt;
12177 if (!htab->elf.dynamic_sections_created
12178 || stub_entry->h == NULL
12179 || stub_entry->h->elf.dynindx == -1)
12180 {
12181 if (stub_entry->symtype == STT_GNU_IFUNC)
12182 plt = htab->elf.iplt;
12183 else
12184 plt = htab->pltlocal;
12185 }
12186 targ += plt->output_offset + plt->output_section->vma;
12187
12188 off = (elf_gp (info->output_bfd)
12189 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12190 off = targ - off;
12191
12192 if (htab->params->plt_stub_align != 0)
12193 {
12194 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12195
12196 stub_entry->group->stub_sec->size += pad;
12197 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12198 }
12199
12200 if (info->emitrelocations)
12201 {
12202 stub_entry->group->stub_sec->reloc_count
12203 += ((PPC_HA (off) != 0)
12204 + (htab->opd_abi
12205 ? 2 + (htab->params->plt_static_chain
12206 && PPC_HA (off + 16) == PPC_HA (off))
12207 : 1));
12208 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12209 }
12210
12211 size = plt_stub_size (htab, stub_entry, off);
12212
12213 if (stub_entry->h != NULL
12214 && is_tls_get_addr (&stub_entry->h->elf, htab)
12215 && htab->params->tls_get_addr_opt
12216 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12217 {
12218 if (htab->params->no_tls_get_addr_regsave)
12219 {
12220 lr_used = stub_entry->stub_offset + size - 20;
12221 /* The eh_frame info will consist of a DW_CFA_advance_loc
12222 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12223 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12224 delta = lr_used - stub_entry->group->lr_restore;
12225 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12226 }
12227 else
12228 {
12229 /* Adjustments to r1 need to be described. */
12230 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12231 delta = cfa_updt - stub_entry->group->lr_restore;
12232 stub_entry->group->eh_size += eh_advance_size (delta);
12233 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12234 }
12235 stub_entry->group->lr_restore = size - 4;
12236 }
12237 break;
12238
12239 default:
12240 BFD_FAIL ();
12241 return FALSE;
12242 }
12243
12244 stub_entry->group->stub_sec->size += size;
12245 return TRUE;
12246 }
12247
12248 /* Set up various things so that we can make a list of input sections
12249 for each output section included in the link. Returns -1 on error,
12250 0 when no stubs will be needed, and 1 on success. */
12251
12252 int
12253 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
12254 {
12255 unsigned int id;
12256 size_t amt;
12257 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12258
12259 if (htab == NULL)
12260 return -1;
12261
12262 htab->sec_info_arr_size = _bfd_section_id;
12263 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12264 htab->sec_info = bfd_zmalloc (amt);
12265 if (htab->sec_info == NULL)
12266 return -1;
12267
12268 /* Set toc_off for com, und, abs and ind sections. */
12269 for (id = 0; id < 3; id++)
12270 htab->sec_info[id].toc_off = TOC_BASE_OFF;
12271
12272 return 1;
12273 }
12274
12275 /* Set up for first pass at multitoc partitioning. */
12276
12277 void
12278 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12279 {
12280 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12281
12282 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
12283 htab->toc_bfd = NULL;
12284 htab->toc_first_sec = NULL;
12285 }
12286
12287 /* The linker repeatedly calls this function for each TOC input section
12288 and linker generated GOT section. Group input bfds such that the toc
12289 within a group is less than 64k in size. */
12290
12291 bfd_boolean
12292 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
12293 {
12294 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12295 bfd_vma addr, off, limit;
12296
12297 if (htab == NULL)
12298 return FALSE;
12299
12300 if (!htab->second_toc_pass)
12301 {
12302 /* Keep track of the first .toc or .got section for this input bfd. */
12303 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12304
12305 if (new_bfd)
12306 {
12307 htab->toc_bfd = isec->owner;
12308 htab->toc_first_sec = isec;
12309 }
12310
12311 addr = isec->output_offset + isec->output_section->vma;
12312 off = addr - htab->toc_curr;
12313 limit = 0x80008000;
12314 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12315 limit = 0x10000;
12316 if (off + isec->size > limit)
12317 {
12318 addr = (htab->toc_first_sec->output_offset
12319 + htab->toc_first_sec->output_section->vma);
12320 htab->toc_curr = addr;
12321 htab->toc_curr &= -TOC_BASE_ALIGN;
12322 }
12323
12324 /* toc_curr is the base address of this toc group. Set elf_gp
12325 for the input section to be the offset relative to the
12326 output toc base plus 0x8000. Making the input elf_gp an
12327 offset allows us to move the toc as a whole without
12328 recalculating input elf_gp. */
12329 off = htab->toc_curr - elf_gp (info->output_bfd);
12330 off += TOC_BASE_OFF;
12331
12332 /* Die if someone uses a linker script that doesn't keep input
12333 file .toc and .got together. */
12334 if (new_bfd
12335 && elf_gp (isec->owner) != 0
12336 && elf_gp (isec->owner) != off)
12337 return FALSE;
12338
12339 elf_gp (isec->owner) = off;
12340 return TRUE;
12341 }
12342
12343 /* During the second pass toc_first_sec points to the start of
12344 a toc group, and toc_curr is used to track the old elf_gp.
12345 We use toc_bfd to ensure we only look at each bfd once. */
12346 if (htab->toc_bfd == isec->owner)
12347 return TRUE;
12348 htab->toc_bfd = isec->owner;
12349
12350 if (htab->toc_first_sec == NULL
12351 || htab->toc_curr != elf_gp (isec->owner))
12352 {
12353 htab->toc_curr = elf_gp (isec->owner);
12354 htab->toc_first_sec = isec;
12355 }
12356 addr = (htab->toc_first_sec->output_offset
12357 + htab->toc_first_sec->output_section->vma);
12358 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12359 elf_gp (isec->owner) = off;
12360
12361 return TRUE;
12362 }
12363
12364 /* Called via elf_link_hash_traverse to merge GOT entries for global
12365 symbol H. */
12366
12367 static bfd_boolean
12368 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12369 {
12370 if (h->root.type == bfd_link_hash_indirect)
12371 return TRUE;
12372
12373 merge_got_entries (&h->got.glist);
12374
12375 return TRUE;
12376 }
12377
12378 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12379 symbol H. */
12380
12381 static bfd_boolean
12382 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12383 {
12384 struct got_entry *gent;
12385
12386 if (h->root.type == bfd_link_hash_indirect)
12387 return TRUE;
12388
12389 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12390 if (!gent->is_indirect)
12391 allocate_got (h, (struct bfd_link_info *) inf, gent);
12392 return TRUE;
12393 }
12394
12395 /* Called on the first multitoc pass after the last call to
12396 ppc64_elf_next_toc_section. This function removes duplicate GOT
12397 entries. */
12398
12399 bfd_boolean
12400 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12401 {
12402 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12403 struct bfd *ibfd, *ibfd2;
12404 bfd_boolean done_something;
12405
12406 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12407
12408 if (!htab->do_multi_toc)
12409 return FALSE;
12410
12411 /* Merge global sym got entries within a toc group. */
12412 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12413
12414 /* And tlsld_got. */
12415 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12416 {
12417 struct got_entry *ent, *ent2;
12418
12419 if (!is_ppc64_elf (ibfd))
12420 continue;
12421
12422 ent = ppc64_tlsld_got (ibfd);
12423 if (!ent->is_indirect
12424 && ent->got.offset != (bfd_vma) -1)
12425 {
12426 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12427 {
12428 if (!is_ppc64_elf (ibfd2))
12429 continue;
12430
12431 ent2 = ppc64_tlsld_got (ibfd2);
12432 if (!ent2->is_indirect
12433 && ent2->got.offset != (bfd_vma) -1
12434 && elf_gp (ibfd2) == elf_gp (ibfd))
12435 {
12436 ent2->is_indirect = TRUE;
12437 ent2->got.ent = ent;
12438 }
12439 }
12440 }
12441 }
12442
12443 /* Zap sizes of got sections. */
12444 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12445 htab->elf.irelplt->size -= htab->got_reli_size;
12446 htab->got_reli_size = 0;
12447
12448 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12449 {
12450 asection *got, *relgot;
12451
12452 if (!is_ppc64_elf (ibfd))
12453 continue;
12454
12455 got = ppc64_elf_tdata (ibfd)->got;
12456 if (got != NULL)
12457 {
12458 got->rawsize = got->size;
12459 got->size = 0;
12460 relgot = ppc64_elf_tdata (ibfd)->relgot;
12461 relgot->rawsize = relgot->size;
12462 relgot->size = 0;
12463 }
12464 }
12465
12466 /* Now reallocate the got, local syms first. We don't need to
12467 allocate section contents again since we never increase size. */
12468 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12469 {
12470 struct got_entry **lgot_ents;
12471 struct got_entry **end_lgot_ents;
12472 struct plt_entry **local_plt;
12473 struct plt_entry **end_local_plt;
12474 unsigned char *lgot_masks;
12475 bfd_size_type locsymcount;
12476 Elf_Internal_Shdr *symtab_hdr;
12477 asection *s;
12478
12479 if (!is_ppc64_elf (ibfd))
12480 continue;
12481
12482 lgot_ents = elf_local_got_ents (ibfd);
12483 if (!lgot_ents)
12484 continue;
12485
12486 symtab_hdr = &elf_symtab_hdr (ibfd);
12487 locsymcount = symtab_hdr->sh_info;
12488 end_lgot_ents = lgot_ents + locsymcount;
12489 local_plt = (struct plt_entry **) end_lgot_ents;
12490 end_local_plt = local_plt + locsymcount;
12491 lgot_masks = (unsigned char *) end_local_plt;
12492 s = ppc64_elf_tdata (ibfd)->got;
12493 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12494 {
12495 struct got_entry *ent;
12496
12497 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12498 {
12499 unsigned int ent_size = 8;
12500 unsigned int rel_size = sizeof (Elf64_External_Rela);
12501
12502 ent->got.offset = s->size;
12503 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12504 {
12505 ent_size *= 2;
12506 rel_size *= 2;
12507 }
12508 s->size += ent_size;
12509 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12510 {
12511 htab->elf.irelplt->size += rel_size;
12512 htab->got_reli_size += rel_size;
12513 }
12514 else if (bfd_link_pic (info)
12515 && !(ent->tls_type != 0
12516 && bfd_link_executable (info)))
12517 {
12518 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12519 srel->size += rel_size;
12520 }
12521 }
12522 }
12523 }
12524
12525 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12526
12527 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12528 {
12529 struct got_entry *ent;
12530
12531 if (!is_ppc64_elf (ibfd))
12532 continue;
12533
12534 ent = ppc64_tlsld_got (ibfd);
12535 if (!ent->is_indirect
12536 && ent->got.offset != (bfd_vma) -1)
12537 {
12538 asection *s = ppc64_elf_tdata (ibfd)->got;
12539 ent->got.offset = s->size;
12540 s->size += 16;
12541 if (bfd_link_dll (info))
12542 {
12543 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12544 srel->size += sizeof (Elf64_External_Rela);
12545 }
12546 }
12547 }
12548
12549 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12550 if (!done_something)
12551 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12552 {
12553 asection *got;
12554
12555 if (!is_ppc64_elf (ibfd))
12556 continue;
12557
12558 got = ppc64_elf_tdata (ibfd)->got;
12559 if (got != NULL)
12560 {
12561 done_something = got->rawsize != got->size;
12562 if (done_something)
12563 break;
12564 }
12565 }
12566
12567 if (done_something)
12568 (*htab->params->layout_sections_again) ();
12569
12570 /* Set up for second pass over toc sections to recalculate elf_gp
12571 on input sections. */
12572 htab->toc_bfd = NULL;
12573 htab->toc_first_sec = NULL;
12574 htab->second_toc_pass = TRUE;
12575 return done_something;
12576 }
12577
12578 /* Called after second pass of multitoc partitioning. */
12579
12580 void
12581 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12582 {
12583 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12584
12585 /* After the second pass, toc_curr tracks the TOC offset used
12586 for code sections below in ppc64_elf_next_input_section. */
12587 htab->toc_curr = TOC_BASE_OFF;
12588 }
12589
12590 /* No toc references were found in ISEC. If the code in ISEC makes no
12591 calls, then there's no need to use toc adjusting stubs when branching
12592 into ISEC. Actually, indirect calls from ISEC are OK as they will
12593 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12594 needed, and 2 if a cyclical call-graph was found but no other reason
12595 for a stub was detected. If called from the top level, a return of
12596 2 means the same as a return of 0. */
12597
12598 static int
12599 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12600 {
12601 int ret;
12602
12603 /* Mark this section as checked. */
12604 isec->call_check_done = 1;
12605
12606 /* We know none of our code bearing sections will need toc stubs. */
12607 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12608 return 0;
12609
12610 if (isec->size == 0)
12611 return 0;
12612
12613 if (isec->output_section == NULL)
12614 return 0;
12615
12616 ret = 0;
12617 if (isec->reloc_count != 0)
12618 {
12619 Elf_Internal_Rela *relstart, *rel;
12620 Elf_Internal_Sym *local_syms;
12621 struct ppc_link_hash_table *htab;
12622
12623 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12624 info->keep_memory);
12625 if (relstart == NULL)
12626 return -1;
12627
12628 /* Look for branches to outside of this section. */
12629 local_syms = NULL;
12630 htab = ppc_hash_table (info);
12631 if (htab == NULL)
12632 return -1;
12633
12634 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12635 {
12636 enum elf_ppc64_reloc_type r_type;
12637 unsigned long r_symndx;
12638 struct elf_link_hash_entry *h;
12639 struct ppc_link_hash_entry *eh;
12640 Elf_Internal_Sym *sym;
12641 asection *sym_sec;
12642 struct _opd_sec_data *opd;
12643 bfd_vma sym_value;
12644 bfd_vma dest;
12645
12646 r_type = ELF64_R_TYPE (rel->r_info);
12647 if (r_type != R_PPC64_REL24
12648 && r_type != R_PPC64_REL24_NOTOC
12649 && r_type != R_PPC64_REL14
12650 && r_type != R_PPC64_REL14_BRTAKEN
12651 && r_type != R_PPC64_REL14_BRNTAKEN
12652 && r_type != R_PPC64_PLTCALL
12653 && r_type != R_PPC64_PLTCALL_NOTOC)
12654 continue;
12655
12656 r_symndx = ELF64_R_SYM (rel->r_info);
12657 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12658 isec->owner))
12659 {
12660 ret = -1;
12661 break;
12662 }
12663
12664 /* Calls to dynamic lib functions go through a plt call stub
12665 that uses r2. */
12666 eh = ppc_elf_hash_entry (h);
12667 if (eh != NULL
12668 && (eh->elf.plt.plist != NULL
12669 || (eh->oh != NULL
12670 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12671 {
12672 ret = 1;
12673 break;
12674 }
12675
12676 if (sym_sec == NULL)
12677 /* Ignore other undefined symbols. */
12678 continue;
12679
12680 /* Assume branches to other sections not included in the
12681 link need stubs too, to cover -R and absolute syms. */
12682 if (sym_sec->output_section == NULL)
12683 {
12684 ret = 1;
12685 break;
12686 }
12687
12688 if (h == NULL)
12689 sym_value = sym->st_value;
12690 else
12691 {
12692 if (h->root.type != bfd_link_hash_defined
12693 && h->root.type != bfd_link_hash_defweak)
12694 abort ();
12695 sym_value = h->root.u.def.value;
12696 }
12697 sym_value += rel->r_addend;
12698
12699 /* If this branch reloc uses an opd sym, find the code section. */
12700 opd = get_opd_info (sym_sec);
12701 if (opd != NULL)
12702 {
12703 if (h == NULL && opd->adjust != NULL)
12704 {
12705 long adjust;
12706
12707 adjust = opd->adjust[OPD_NDX (sym_value)];
12708 if (adjust == -1)
12709 /* Assume deleted functions won't ever be called. */
12710 continue;
12711 sym_value += adjust;
12712 }
12713
12714 dest = opd_entry_value (sym_sec, sym_value,
12715 &sym_sec, NULL, FALSE);
12716 if (dest == (bfd_vma) -1)
12717 continue;
12718 }
12719 else
12720 dest = (sym_value
12721 + sym_sec->output_offset
12722 + sym_sec->output_section->vma);
12723
12724 /* Ignore branch to self. */
12725 if (sym_sec == isec)
12726 continue;
12727
12728 /* If the called function uses the toc, we need a stub. */
12729 if (sym_sec->has_toc_reloc
12730 || sym_sec->makes_toc_func_call)
12731 {
12732 ret = 1;
12733 break;
12734 }
12735
12736 /* Assume any branch that needs a long branch stub might in fact
12737 need a plt_branch stub. A plt_branch stub uses r2. */
12738 else if (dest - (isec->output_offset
12739 + isec->output_section->vma
12740 + rel->r_offset) + (1 << 25)
12741 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12742 ? h->other
12743 : sym->st_other))
12744 {
12745 ret = 1;
12746 break;
12747 }
12748
12749 /* If calling back to a section in the process of being
12750 tested, we can't say for sure that no toc adjusting stubs
12751 are needed, so don't return zero. */
12752 else if (sym_sec->call_check_in_progress)
12753 ret = 2;
12754
12755 /* Branches to another section that itself doesn't have any TOC
12756 references are OK. Recursively call ourselves to check. */
12757 else if (!sym_sec->call_check_done)
12758 {
12759 int recur;
12760
12761 /* Mark current section as indeterminate, so that other
12762 sections that call back to current won't be marked as
12763 known. */
12764 isec->call_check_in_progress = 1;
12765 recur = toc_adjusting_stub_needed (info, sym_sec);
12766 isec->call_check_in_progress = 0;
12767
12768 if (recur != 0)
12769 {
12770 ret = recur;
12771 if (recur != 2)
12772 break;
12773 }
12774 }
12775 }
12776
12777 if (elf_symtab_hdr (isec->owner).contents
12778 != (unsigned char *) local_syms)
12779 free (local_syms);
12780 if (elf_section_data (isec)->relocs != relstart)
12781 free (relstart);
12782 }
12783
12784 if ((ret & 1) == 0
12785 && isec->map_head.s != NULL
12786 && (strcmp (isec->output_section->name, ".init") == 0
12787 || strcmp (isec->output_section->name, ".fini") == 0))
12788 {
12789 if (isec->map_head.s->has_toc_reloc
12790 || isec->map_head.s->makes_toc_func_call)
12791 ret = 1;
12792 else if (!isec->map_head.s->call_check_done)
12793 {
12794 int recur;
12795 isec->call_check_in_progress = 1;
12796 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12797 isec->call_check_in_progress = 0;
12798 if (recur != 0)
12799 ret = recur;
12800 }
12801 }
12802
12803 if (ret == 1)
12804 isec->makes_toc_func_call = 1;
12805
12806 return ret;
12807 }
12808
12809 /* The linker repeatedly calls this function for each input section,
12810 in the order that input sections are linked into output sections.
12811 Build lists of input sections to determine groupings between which
12812 we may insert linker stubs. */
12813
12814 bfd_boolean
12815 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12816 {
12817 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12818
12819 if (htab == NULL)
12820 return FALSE;
12821
12822 if ((isec->output_section->flags & SEC_CODE) != 0
12823 && isec->output_section->id < htab->sec_info_arr_size)
12824 {
12825 /* This happens to make the list in reverse order,
12826 which is what we want. */
12827 htab->sec_info[isec->id].u.list
12828 = htab->sec_info[isec->output_section->id].u.list;
12829 htab->sec_info[isec->output_section->id].u.list = isec;
12830 }
12831
12832 if (htab->multi_toc_needed)
12833 {
12834 /* Analyse sections that aren't already flagged as needing a
12835 valid toc pointer. Exclude .fixup for the linux kernel.
12836 .fixup contains branches, but only back to the function that
12837 hit an exception. */
12838 if (!(isec->has_toc_reloc
12839 || (isec->flags & SEC_CODE) == 0
12840 || strcmp (isec->name, ".fixup") == 0
12841 || isec->call_check_done))
12842 {
12843 if (toc_adjusting_stub_needed (info, isec) < 0)
12844 return FALSE;
12845 }
12846 /* Make all sections use the TOC assigned for this object file.
12847 This will be wrong for pasted sections; We fix that in
12848 check_pasted_section(). */
12849 if (elf_gp (isec->owner) != 0)
12850 htab->toc_curr = elf_gp (isec->owner);
12851 }
12852
12853 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12854 return TRUE;
12855 }
12856
12857 /* Check that all .init and .fini sections use the same toc, if they
12858 have toc relocs. */
12859
12860 static bfd_boolean
12861 check_pasted_section (struct bfd_link_info *info, const char *name)
12862 {
12863 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12864
12865 if (o != NULL)
12866 {
12867 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12868 bfd_vma toc_off = 0;
12869 asection *i;
12870
12871 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12872 if (i->has_toc_reloc)
12873 {
12874 if (toc_off == 0)
12875 toc_off = htab->sec_info[i->id].toc_off;
12876 else if (toc_off != htab->sec_info[i->id].toc_off)
12877 return FALSE;
12878 }
12879
12880 if (toc_off == 0)
12881 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12882 if (i->makes_toc_func_call)
12883 {
12884 toc_off = htab->sec_info[i->id].toc_off;
12885 break;
12886 }
12887
12888 /* Make sure the whole pasted function uses the same toc offset. */
12889 if (toc_off != 0)
12890 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12891 htab->sec_info[i->id].toc_off = toc_off;
12892 }
12893 return TRUE;
12894 }
12895
12896 bfd_boolean
12897 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12898 {
12899 return (check_pasted_section (info, ".init")
12900 & check_pasted_section (info, ".fini"));
12901 }
12902
12903 /* See whether we can group stub sections together. Grouping stub
12904 sections may result in fewer stubs. More importantly, we need to
12905 put all .init* and .fini* stubs at the beginning of the .init or
12906 .fini output sections respectively, because glibc splits the
12907 _init and _fini functions into multiple parts. Putting a stub in
12908 the middle of a function is not a good idea. */
12909
12910 static bfd_boolean
12911 group_sections (struct bfd_link_info *info,
12912 bfd_size_type stub_group_size,
12913 bfd_boolean stubs_always_before_branch)
12914 {
12915 struct ppc_link_hash_table *htab;
12916 asection *osec;
12917 bfd_boolean suppress_size_errors;
12918
12919 htab = ppc_hash_table (info);
12920 if (htab == NULL)
12921 return FALSE;
12922
12923 suppress_size_errors = FALSE;
12924 if (stub_group_size == 1)
12925 {
12926 /* Default values. */
12927 if (stubs_always_before_branch)
12928 stub_group_size = 0x1e00000;
12929 else
12930 stub_group_size = 0x1c00000;
12931 suppress_size_errors = TRUE;
12932 }
12933
12934 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12935 {
12936 asection *tail;
12937
12938 if (osec->id >= htab->sec_info_arr_size)
12939 continue;
12940
12941 tail = htab->sec_info[osec->id].u.list;
12942 while (tail != NULL)
12943 {
12944 asection *curr;
12945 asection *prev;
12946 bfd_size_type total;
12947 bfd_boolean big_sec;
12948 bfd_vma curr_toc;
12949 struct map_stub *group;
12950 bfd_size_type group_size;
12951
12952 curr = tail;
12953 total = tail->size;
12954 group_size = (ppc64_elf_section_data (tail) != NULL
12955 && ppc64_elf_section_data (tail)->has_14bit_branch
12956 ? stub_group_size >> 10 : stub_group_size);
12957
12958 big_sec = total > group_size;
12959 if (big_sec && !suppress_size_errors)
12960 /* xgettext:c-format */
12961 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12962 tail->owner, tail);
12963 curr_toc = htab->sec_info[tail->id].toc_off;
12964
12965 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12966 && ((total += curr->output_offset - prev->output_offset)
12967 < (ppc64_elf_section_data (prev) != NULL
12968 && ppc64_elf_section_data (prev)->has_14bit_branch
12969 ? (group_size = stub_group_size >> 10) : group_size))
12970 && htab->sec_info[prev->id].toc_off == curr_toc)
12971 curr = prev;
12972
12973 /* OK, the size from the start of CURR to the end is less
12974 than group_size and thus can be handled by one stub
12975 section. (or the tail section is itself larger than
12976 group_size, in which case we may be toast.) We should
12977 really be keeping track of the total size of stubs added
12978 here, as stubs contribute to the final output section
12979 size. That's a little tricky, and this way will only
12980 break if stubs added make the total size more than 2^25,
12981 ie. for the default stub_group_size, if stubs total more
12982 than 2097152 bytes, or nearly 75000 plt call stubs. */
12983 group = bfd_alloc (curr->owner, sizeof (*group));
12984 if (group == NULL)
12985 return FALSE;
12986 group->link_sec = curr;
12987 group->stub_sec = NULL;
12988 group->needs_save_res = 0;
12989 group->lr_restore = 0;
12990 group->eh_size = 0;
12991 group->eh_base = 0;
12992 group->next = htab->group;
12993 htab->group = group;
12994 do
12995 {
12996 prev = htab->sec_info[tail->id].u.list;
12997 /* Set up this stub group. */
12998 htab->sec_info[tail->id].u.group = group;
12999 }
13000 while (tail != curr && (tail = prev) != NULL);
13001
13002 /* But wait, there's more! Input sections up to group_size
13003 bytes before the stub section can be handled by it too.
13004 Don't do this if we have a really large section after the
13005 stubs, as adding more stubs increases the chance that
13006 branches may not reach into the stub section. */
13007 if (!stubs_always_before_branch && !big_sec)
13008 {
13009 total = 0;
13010 while (prev != NULL
13011 && ((total += tail->output_offset - prev->output_offset)
13012 < (ppc64_elf_section_data (prev) != NULL
13013 && ppc64_elf_section_data (prev)->has_14bit_branch
13014 ? (group_size = stub_group_size >> 10)
13015 : group_size))
13016 && htab->sec_info[prev->id].toc_off == curr_toc)
13017 {
13018 tail = prev;
13019 prev = htab->sec_info[tail->id].u.list;
13020 htab->sec_info[tail->id].u.group = group;
13021 }
13022 }
13023 tail = prev;
13024 }
13025 }
13026 return TRUE;
13027 }
13028
13029 static const unsigned char glink_eh_frame_cie[] =
13030 {
13031 0, 0, 0, 16, /* length. */
13032 0, 0, 0, 0, /* id. */
13033 1, /* CIE version. */
13034 'z', 'R', 0, /* Augmentation string. */
13035 4, /* Code alignment. */
13036 0x78, /* Data alignment. */
13037 65, /* RA reg. */
13038 1, /* Augmentation size. */
13039 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
13040 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
13041 };
13042
13043 /* Stripping output sections is normally done before dynamic section
13044 symbols have been allocated. This function is called later, and
13045 handles cases like htab->brlt which is mapped to its own output
13046 section. */
13047
13048 static void
13049 maybe_strip_output (struct bfd_link_info *info, asection *isec)
13050 {
13051 if (isec->size == 0
13052 && isec->output_section->size == 0
13053 && !(isec->output_section->flags & SEC_KEEP)
13054 && !bfd_section_removed_from_list (info->output_bfd,
13055 isec->output_section)
13056 && elf_section_data (isec->output_section)->dynindx == 0)
13057 {
13058 isec->output_section->flags |= SEC_EXCLUDE;
13059 bfd_section_list_remove (info->output_bfd, isec->output_section);
13060 info->output_bfd->section_count--;
13061 }
13062 }
13063
13064 /* Determine and set the size of the stub section for a final link.
13065
13066 The basic idea here is to examine all the relocations looking for
13067 PC-relative calls to a target that is unreachable with a "bl"
13068 instruction. */
13069
13070 bfd_boolean
13071 ppc64_elf_size_stubs (struct bfd_link_info *info)
13072 {
13073 bfd_size_type stub_group_size;
13074 bfd_boolean stubs_always_before_branch;
13075 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13076
13077 if (htab == NULL)
13078 return FALSE;
13079
13080 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
13081 htab->params->plt_thread_safe = 1;
13082 if (!htab->opd_abi)
13083 htab->params->plt_thread_safe = 0;
13084 else if (htab->params->plt_thread_safe == -1)
13085 {
13086 static const char *const thread_starter[] =
13087 {
13088 "pthread_create",
13089 /* libstdc++ */
13090 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13091 /* librt */
13092 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13093 "mq_notify", "create_timer",
13094 /* libanl */
13095 "getaddrinfo_a",
13096 /* libgomp */
13097 "GOMP_parallel",
13098 "GOMP_parallel_start",
13099 "GOMP_parallel_loop_static",
13100 "GOMP_parallel_loop_static_start",
13101 "GOMP_parallel_loop_dynamic",
13102 "GOMP_parallel_loop_dynamic_start",
13103 "GOMP_parallel_loop_guided",
13104 "GOMP_parallel_loop_guided_start",
13105 "GOMP_parallel_loop_runtime",
13106 "GOMP_parallel_loop_runtime_start",
13107 "GOMP_parallel_sections",
13108 "GOMP_parallel_sections_start",
13109 /* libgo */
13110 "__go_go",
13111 };
13112 unsigned i;
13113
13114 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
13115 {
13116 struct elf_link_hash_entry *h;
13117 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13118 FALSE, FALSE, TRUE);
13119 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13120 if (htab->params->plt_thread_safe)
13121 break;
13122 }
13123 }
13124 stubs_always_before_branch = htab->params->group_size < 0;
13125 if (htab->params->group_size < 0)
13126 stub_group_size = -htab->params->group_size;
13127 else
13128 stub_group_size = htab->params->group_size;
13129
13130 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13131 return FALSE;
13132
13133 htab->tga_group = NULL;
13134 if (!htab->params->no_tls_get_addr_regsave
13135 && htab->tga_desc_fd != NULL
13136 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13137 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13138 && htab->tls_get_addr_fd != NULL
13139 && is_static_defined (&htab->tls_get_addr_fd->elf))
13140 {
13141 asection *sym_sec, *code_sec, *stub_sec;
13142 bfd_vma sym_value;
13143 struct _opd_sec_data *opd;
13144
13145 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13146 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13147 code_sec = sym_sec;
13148 opd = get_opd_info (sym_sec);
13149 if (opd != NULL)
13150 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13151 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13152 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13153 htab->tga_group->link_sec);
13154 if (stub_sec == NULL)
13155 return FALSE;
13156 htab->tga_group->stub_sec = stub_sec;
13157
13158 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13159 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13160 htab->tga_desc_fd->elf.root.u.def.value = 0;
13161 htab->tga_desc_fd->elf.type = STT_FUNC;
13162 htab->tga_desc_fd->elf.def_regular = 1;
13163 htab->tga_desc_fd->elf.non_elf = 0;
13164 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13165 }
13166
13167 #define STUB_SHRINK_ITER 20
13168 /* Loop until no stubs added. After iteration 20 of this loop we may
13169 exit on a stub section shrinking. This is to break out of a
13170 pathological case where adding stubs on one iteration decreases
13171 section gaps (perhaps due to alignment), which then requires
13172 fewer or smaller stubs on the next iteration. */
13173
13174 while (1)
13175 {
13176 bfd *input_bfd;
13177 unsigned int bfd_indx;
13178 struct map_stub *group;
13179
13180 htab->stub_iteration += 1;
13181
13182 for (input_bfd = info->input_bfds, bfd_indx = 0;
13183 input_bfd != NULL;
13184 input_bfd = input_bfd->link.next, bfd_indx++)
13185 {
13186 Elf_Internal_Shdr *symtab_hdr;
13187 asection *section;
13188 Elf_Internal_Sym *local_syms = NULL;
13189
13190 if (!is_ppc64_elf (input_bfd))
13191 continue;
13192
13193 /* We'll need the symbol table in a second. */
13194 symtab_hdr = &elf_symtab_hdr (input_bfd);
13195 if (symtab_hdr->sh_info == 0)
13196 continue;
13197
13198 /* Walk over each section attached to the input bfd. */
13199 for (section = input_bfd->sections;
13200 section != NULL;
13201 section = section->next)
13202 {
13203 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
13204
13205 /* If there aren't any relocs, then there's nothing more
13206 to do. */
13207 if ((section->flags & SEC_RELOC) == 0
13208 || (section->flags & SEC_ALLOC) == 0
13209 || (section->flags & SEC_LOAD) == 0
13210 || (section->flags & SEC_CODE) == 0
13211 || section->reloc_count == 0)
13212 continue;
13213
13214 /* If this section is a link-once section that will be
13215 discarded, then don't create any stubs. */
13216 if (section->output_section == NULL
13217 || section->output_section->owner != info->output_bfd)
13218 continue;
13219
13220 /* Get the relocs. */
13221 internal_relocs
13222 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
13223 info->keep_memory);
13224 if (internal_relocs == NULL)
13225 goto error_ret_free_local;
13226
13227 /* Now examine each relocation. */
13228 irela = internal_relocs;
13229 irelaend = irela + section->reloc_count;
13230 for (; irela < irelaend; irela++)
13231 {
13232 enum elf_ppc64_reloc_type r_type;
13233 unsigned int r_indx;
13234 enum ppc_stub_type stub_type;
13235 struct ppc_stub_hash_entry *stub_entry;
13236 asection *sym_sec, *code_sec;
13237 bfd_vma sym_value, code_value;
13238 bfd_vma destination;
13239 unsigned long local_off;
13240 bfd_boolean ok_dest;
13241 struct ppc_link_hash_entry *hash;
13242 struct ppc_link_hash_entry *fdh;
13243 struct elf_link_hash_entry *h;
13244 Elf_Internal_Sym *sym;
13245 char *stub_name;
13246 const asection *id_sec;
13247 struct _opd_sec_data *opd;
13248 struct plt_entry *plt_ent;
13249
13250 r_type = ELF64_R_TYPE (irela->r_info);
13251 r_indx = ELF64_R_SYM (irela->r_info);
13252
13253 if (r_type >= R_PPC64_max)
13254 {
13255 bfd_set_error (bfd_error_bad_value);
13256 goto error_ret_free_internal;
13257 }
13258
13259 /* Only look for stubs on branch instructions. */
13260 if (r_type != R_PPC64_REL24
13261 && r_type != R_PPC64_REL24_NOTOC
13262 && r_type != R_PPC64_REL14
13263 && r_type != R_PPC64_REL14_BRTAKEN
13264 && r_type != R_PPC64_REL14_BRNTAKEN)
13265 continue;
13266
13267 /* Now determine the call target, its name, value,
13268 section. */
13269 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13270 r_indx, input_bfd))
13271 goto error_ret_free_internal;
13272 hash = ppc_elf_hash_entry (h);
13273
13274 ok_dest = FALSE;
13275 fdh = NULL;
13276 sym_value = 0;
13277 if (hash == NULL)
13278 {
13279 sym_value = sym->st_value;
13280 if (sym_sec != NULL
13281 && sym_sec->output_section != NULL)
13282 ok_dest = TRUE;
13283 }
13284 else if (hash->elf.root.type == bfd_link_hash_defined
13285 || hash->elf.root.type == bfd_link_hash_defweak)
13286 {
13287 sym_value = hash->elf.root.u.def.value;
13288 if (sym_sec->output_section != NULL)
13289 ok_dest = TRUE;
13290 }
13291 else if (hash->elf.root.type == bfd_link_hash_undefweak
13292 || hash->elf.root.type == bfd_link_hash_undefined)
13293 {
13294 /* Recognise an old ABI func code entry sym, and
13295 use the func descriptor sym instead if it is
13296 defined. */
13297 if (hash->elf.root.root.string[0] == '.'
13298 && hash->oh != NULL)
13299 {
13300 fdh = ppc_follow_link (hash->oh);
13301 if (fdh->elf.root.type == bfd_link_hash_defined
13302 || fdh->elf.root.type == bfd_link_hash_defweak)
13303 {
13304 sym_sec = fdh->elf.root.u.def.section;
13305 sym_value = fdh->elf.root.u.def.value;
13306 if (sym_sec->output_section != NULL)
13307 ok_dest = TRUE;
13308 }
13309 else
13310 fdh = NULL;
13311 }
13312 }
13313 else
13314 {
13315 bfd_set_error (bfd_error_bad_value);
13316 goto error_ret_free_internal;
13317 }
13318
13319 destination = 0;
13320 local_off = 0;
13321 if (ok_dest)
13322 {
13323 sym_value += irela->r_addend;
13324 destination = (sym_value
13325 + sym_sec->output_offset
13326 + sym_sec->output_section->vma);
13327 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13328 ? hash->elf.other
13329 : sym->st_other);
13330 }
13331
13332 code_sec = sym_sec;
13333 code_value = sym_value;
13334 opd = get_opd_info (sym_sec);
13335 if (opd != NULL)
13336 {
13337 bfd_vma dest;
13338
13339 if (hash == NULL && opd->adjust != NULL)
13340 {
13341 long adjust = opd->adjust[OPD_NDX (sym_value)];
13342 if (adjust == -1)
13343 continue;
13344 code_value += adjust;
13345 sym_value += adjust;
13346 }
13347 dest = opd_entry_value (sym_sec, sym_value,
13348 &code_sec, &code_value, FALSE);
13349 if (dest != (bfd_vma) -1)
13350 {
13351 destination = dest;
13352 if (fdh != NULL)
13353 {
13354 /* Fixup old ABI sym to point at code
13355 entry. */
13356 hash->elf.root.type = bfd_link_hash_defweak;
13357 hash->elf.root.u.def.section = code_sec;
13358 hash->elf.root.u.def.value = code_value;
13359 }
13360 }
13361 }
13362
13363 /* Determine what (if any) linker stub is needed. */
13364 plt_ent = NULL;
13365 stub_type = ppc_type_of_stub (section, irela, &hash,
13366 &plt_ent, destination,
13367 local_off);
13368
13369 if (r_type == R_PPC64_REL24_NOTOC)
13370 {
13371 if (stub_type == ppc_stub_plt_call)
13372 stub_type = ppc_stub_plt_call_notoc;
13373 else if (stub_type == ppc_stub_long_branch
13374 || (code_sec != NULL
13375 && code_sec->output_section != NULL
13376 && (((hash ? hash->elf.other : sym->st_other)
13377 & STO_PPC64_LOCAL_MASK)
13378 > 1 << STO_PPC64_LOCAL_BIT)))
13379 stub_type = ppc_stub_long_branch_notoc;
13380 }
13381 else if (stub_type != ppc_stub_plt_call)
13382 {
13383 /* Check whether we need a TOC adjusting stub.
13384 Since the linker pastes together pieces from
13385 different object files when creating the
13386 _init and _fini functions, it may be that a
13387 call to what looks like a local sym is in
13388 fact a call needing a TOC adjustment. */
13389 if ((code_sec != NULL
13390 && code_sec->output_section != NULL
13391 && (htab->sec_info[code_sec->id].toc_off
13392 != htab->sec_info[section->id].toc_off)
13393 && (code_sec->has_toc_reloc
13394 || code_sec->makes_toc_func_call))
13395 || (((hash ? hash->elf.other : sym->st_other)
13396 & STO_PPC64_LOCAL_MASK)
13397 == 1 << STO_PPC64_LOCAL_BIT))
13398 stub_type = ppc_stub_long_branch_r2off;
13399 }
13400
13401 if (stub_type == ppc_stub_none)
13402 continue;
13403
13404 /* __tls_get_addr calls might be eliminated. */
13405 if (stub_type != ppc_stub_plt_call
13406 && stub_type != ppc_stub_plt_call_notoc
13407 && hash != NULL
13408 && is_tls_get_addr (&hash->elf, htab)
13409 && section->has_tls_reloc
13410 && irela != internal_relocs)
13411 {
13412 /* Get tls info. */
13413 unsigned char *tls_mask;
13414
13415 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13416 irela - 1, input_bfd))
13417 goto error_ret_free_internal;
13418 if ((*tls_mask & TLS_TLS) != 0
13419 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
13420 continue;
13421 }
13422
13423 if (stub_type == ppc_stub_plt_call)
13424 {
13425 if (!htab->opd_abi
13426 && htab->params->plt_localentry0 != 0
13427 && is_elfv2_localentry0 (&hash->elf))
13428 htab->has_plt_localentry0 = 1;
13429 else if (irela + 1 < irelaend
13430 && irela[1].r_offset == irela->r_offset + 4
13431 && (ELF64_R_TYPE (irela[1].r_info)
13432 == R_PPC64_TOCSAVE))
13433 {
13434 if (!tocsave_find (htab, INSERT,
13435 &local_syms, irela + 1, input_bfd))
13436 goto error_ret_free_internal;
13437 }
13438 else
13439 stub_type = ppc_stub_plt_call_r2save;
13440 }
13441
13442 /* Support for grouping stub sections. */
13443 id_sec = htab->sec_info[section->id].u.group->link_sec;
13444
13445 /* Get the name of this stub. */
13446 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13447 if (!stub_name)
13448 goto error_ret_free_internal;
13449
13450 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13451 stub_name, FALSE, FALSE);
13452 if (stub_entry != NULL)
13453 {
13454 enum ppc_stub_type old_type;
13455 /* A stub has already been created, but it may
13456 not be the required type. We shouldn't be
13457 transitioning from plt_call to long_branch
13458 stubs or vice versa, but we might be
13459 upgrading from plt_call to plt_call_r2save or
13460 from long_branch to long_branch_r2off. */
13461 free (stub_name);
13462 old_type = stub_entry->stub_type;
13463 switch (old_type)
13464 {
13465 default:
13466 abort ();
13467
13468 case ppc_stub_save_res:
13469 continue;
13470
13471 case ppc_stub_plt_call:
13472 case ppc_stub_plt_call_r2save:
13473 case ppc_stub_plt_call_notoc:
13474 case ppc_stub_plt_call_both:
13475 if (stub_type == ppc_stub_plt_call)
13476 continue;
13477 else if (stub_type == ppc_stub_plt_call_r2save)
13478 {
13479 if (old_type == ppc_stub_plt_call_notoc)
13480 stub_type = ppc_stub_plt_call_both;
13481 }
13482 else if (stub_type == ppc_stub_plt_call_notoc)
13483 {
13484 if (old_type == ppc_stub_plt_call_r2save)
13485 stub_type = ppc_stub_plt_call_both;
13486 }
13487 else
13488 abort ();
13489 break;
13490
13491 case ppc_stub_plt_branch:
13492 case ppc_stub_plt_branch_r2off:
13493 case ppc_stub_plt_branch_notoc:
13494 case ppc_stub_plt_branch_both:
13495 old_type += (ppc_stub_long_branch
13496 - ppc_stub_plt_branch);
13497 /* Fall through. */
13498 case ppc_stub_long_branch:
13499 case ppc_stub_long_branch_r2off:
13500 case ppc_stub_long_branch_notoc:
13501 case ppc_stub_long_branch_both:
13502 if (stub_type == ppc_stub_long_branch)
13503 continue;
13504 else if (stub_type == ppc_stub_long_branch_r2off)
13505 {
13506 if (old_type == ppc_stub_long_branch_notoc)
13507 stub_type = ppc_stub_long_branch_both;
13508 }
13509 else if (stub_type == ppc_stub_long_branch_notoc)
13510 {
13511 if (old_type == ppc_stub_long_branch_r2off)
13512 stub_type = ppc_stub_long_branch_both;
13513 }
13514 else
13515 abort ();
13516 break;
13517 }
13518 if (old_type < stub_type)
13519 stub_entry->stub_type = stub_type;
13520 continue;
13521 }
13522
13523 stub_entry = ppc_add_stub (stub_name, section, info);
13524 if (stub_entry == NULL)
13525 {
13526 free (stub_name);
13527 error_ret_free_internal:
13528 if (elf_section_data (section)->relocs == NULL)
13529 free (internal_relocs);
13530 error_ret_free_local:
13531 if (symtab_hdr->contents
13532 != (unsigned char *) local_syms)
13533 free (local_syms);
13534 return FALSE;
13535 }
13536
13537 stub_entry->stub_type = stub_type;
13538 if (stub_type >= ppc_stub_plt_call
13539 && stub_type <= ppc_stub_plt_call_both)
13540 {
13541 stub_entry->target_value = sym_value;
13542 stub_entry->target_section = sym_sec;
13543 }
13544 else
13545 {
13546 stub_entry->target_value = code_value;
13547 stub_entry->target_section = code_sec;
13548 }
13549 stub_entry->h = hash;
13550 stub_entry->plt_ent = plt_ent;
13551 stub_entry->symtype
13552 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13553 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13554
13555 if (hash != NULL
13556 && (hash->elf.root.type == bfd_link_hash_defined
13557 || hash->elf.root.type == bfd_link_hash_defweak))
13558 htab->stub_globals += 1;
13559 }
13560
13561 /* We're done with the internal relocs, free them. */
13562 if (elf_section_data (section)->relocs != internal_relocs)
13563 free (internal_relocs);
13564 }
13565
13566 if (local_syms != NULL
13567 && symtab_hdr->contents != (unsigned char *) local_syms)
13568 {
13569 if (!info->keep_memory)
13570 free (local_syms);
13571 else
13572 symtab_hdr->contents = (unsigned char *) local_syms;
13573 }
13574 }
13575
13576 /* We may have added some stubs. Find out the new size of the
13577 stub sections. */
13578 for (group = htab->group; group != NULL; group = group->next)
13579 {
13580 group->lr_restore = 0;
13581 group->eh_size = 0;
13582 if (group->stub_sec != NULL)
13583 {
13584 asection *stub_sec = group->stub_sec;
13585
13586 if (htab->stub_iteration <= STUB_SHRINK_ITER
13587 || stub_sec->rawsize < stub_sec->size)
13588 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13589 stub_sec->rawsize = stub_sec->size;
13590 stub_sec->size = 0;
13591 stub_sec->reloc_count = 0;
13592 stub_sec->flags &= ~SEC_RELOC;
13593 }
13594 }
13595 if (htab->tga_group != NULL)
13596 {
13597 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13598 htab->tga_group->eh_size
13599 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13600 htab->tga_group->lr_restore = 23 * 4;
13601 htab->tga_group->stub_sec->size = 24 * 4;
13602 }
13603
13604 if (htab->stub_iteration <= STUB_SHRINK_ITER
13605 || htab->brlt->rawsize < htab->brlt->size)
13606 htab->brlt->rawsize = htab->brlt->size;
13607 htab->brlt->size = 0;
13608 htab->brlt->reloc_count = 0;
13609 htab->brlt->flags &= ~SEC_RELOC;
13610 if (htab->relbrlt != NULL)
13611 htab->relbrlt->size = 0;
13612
13613 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13614
13615 for (group = htab->group; group != NULL; group = group->next)
13616 if (group->needs_save_res)
13617 group->stub_sec->size += htab->sfpr->size;
13618
13619 if (info->emitrelocations
13620 && htab->glink != NULL && htab->glink->size != 0)
13621 {
13622 htab->glink->reloc_count = 1;
13623 htab->glink->flags |= SEC_RELOC;
13624 }
13625
13626 if (htab->glink_eh_frame != NULL
13627 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13628 && htab->glink_eh_frame->output_section->size > 8)
13629 {
13630 size_t size = 0, align = 4;
13631
13632 for (group = htab->group; group != NULL; group = group->next)
13633 if (group->eh_size != 0)
13634 size += (group->eh_size + 17 + align - 1) & -align;
13635 if (htab->glink != NULL && htab->glink->size != 0)
13636 size += (24 + align - 1) & -align;
13637 if (size != 0)
13638 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13639 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13640 size = (size + align - 1) & -align;
13641 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13642 htab->glink_eh_frame->size = size;
13643 }
13644
13645 if (htab->params->plt_stub_align != 0)
13646 for (group = htab->group; group != NULL; group = group->next)
13647 if (group->stub_sec != NULL)
13648 {
13649 int align = abs (htab->params->plt_stub_align);
13650 group->stub_sec->size
13651 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13652 }
13653
13654 for (group = htab->group; group != NULL; group = group->next)
13655 if (group->stub_sec != NULL
13656 && group->stub_sec->rawsize != group->stub_sec->size
13657 && (htab->stub_iteration <= STUB_SHRINK_ITER
13658 || group->stub_sec->rawsize < group->stub_sec->size))
13659 break;
13660
13661 if (group == NULL
13662 && (htab->brlt->rawsize == htab->brlt->size
13663 || (htab->stub_iteration > STUB_SHRINK_ITER
13664 && htab->brlt->rawsize > htab->brlt->size))
13665 && (htab->glink_eh_frame == NULL
13666 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13667 && (htab->tga_group == NULL
13668 || htab->stub_iteration > 1))
13669 break;
13670
13671 /* Ask the linker to do its stuff. */
13672 (*htab->params->layout_sections_again) ();
13673 }
13674
13675 if (htab->glink_eh_frame != NULL
13676 && htab->glink_eh_frame->size != 0)
13677 {
13678 bfd_vma val;
13679 bfd_byte *p, *last_fde;
13680 size_t last_fde_len, size, align, pad;
13681 struct map_stub *group;
13682
13683 /* It is necessary to at least have a rough outline of the
13684 linker generated CIEs and FDEs written before
13685 bfd_elf_discard_info is run, in order for these FDEs to be
13686 indexed in .eh_frame_hdr. */
13687 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13688 if (p == NULL)
13689 return FALSE;
13690 htab->glink_eh_frame->contents = p;
13691 last_fde = p;
13692 align = 4;
13693
13694 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13695 /* CIE length (rewrite in case little-endian). */
13696 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13697 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13698 p += last_fde_len + 4;
13699
13700 for (group = htab->group; group != NULL; group = group->next)
13701 if (group->eh_size != 0)
13702 {
13703 group->eh_base = p - htab->glink_eh_frame->contents;
13704 last_fde = p;
13705 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13706 /* FDE length. */
13707 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13708 p += 4;
13709 /* CIE pointer. */
13710 val = p - htab->glink_eh_frame->contents;
13711 bfd_put_32 (htab->elf.dynobj, val, p);
13712 p += 4;
13713 /* Offset to stub section, written later. */
13714 p += 4;
13715 /* stub section size. */
13716 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13717 p += 4;
13718 /* Augmentation. */
13719 p += 1;
13720 /* Make sure we don't have all nops. This is enough for
13721 elf-eh-frame.c to detect the last non-nop opcode. */
13722 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13723 p = last_fde + last_fde_len + 4;
13724 }
13725 if (htab->glink != NULL && htab->glink->size != 0)
13726 {
13727 last_fde = p;
13728 last_fde_len = ((24 + align - 1) & -align) - 4;
13729 /* FDE length. */
13730 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13731 p += 4;
13732 /* CIE pointer. */
13733 val = p - htab->glink_eh_frame->contents;
13734 bfd_put_32 (htab->elf.dynobj, val, p);
13735 p += 4;
13736 /* Offset to .glink, written later. */
13737 p += 4;
13738 /* .glink size. */
13739 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13740 p += 4;
13741 /* Augmentation. */
13742 p += 1;
13743
13744 *p++ = DW_CFA_advance_loc + 1;
13745 *p++ = DW_CFA_register;
13746 *p++ = 65;
13747 *p++ = htab->opd_abi ? 12 : 0;
13748 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13749 *p++ = DW_CFA_restore_extended;
13750 *p++ = 65;
13751 p += ((24 + align - 1) & -align) - 24;
13752 }
13753 /* Subsume any padding into the last FDE if user .eh_frame
13754 sections are aligned more than glink_eh_frame. Otherwise any
13755 zero padding will be seen as a terminator. */
13756 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13757 size = p - htab->glink_eh_frame->contents;
13758 pad = ((size + align - 1) & -align) - size;
13759 htab->glink_eh_frame->size = size + pad;
13760 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13761 }
13762
13763 maybe_strip_output (info, htab->brlt);
13764 if (htab->relbrlt != NULL)
13765 maybe_strip_output (info, htab->relbrlt);
13766 if (htab->glink_eh_frame != NULL)
13767 maybe_strip_output (info, htab->glink_eh_frame);
13768
13769 return TRUE;
13770 }
13771
13772 /* Called after we have determined section placement. If sections
13773 move, we'll be called again. Provide a value for TOCstart. */
13774
13775 bfd_vma
13776 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13777 {
13778 asection *s;
13779 bfd_vma TOCstart, adjust;
13780
13781 if (info != NULL)
13782 {
13783 struct elf_link_hash_entry *h;
13784 struct elf_link_hash_table *htab = elf_hash_table (info);
13785
13786 if (is_elf_hash_table (htab)
13787 && htab->hgot != NULL)
13788 h = htab->hgot;
13789 else
13790 {
13791 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13792 if (is_elf_hash_table (htab))
13793 htab->hgot = h;
13794 }
13795 if (h != NULL
13796 && h->root.type == bfd_link_hash_defined
13797 && !h->root.linker_def
13798 && (!is_elf_hash_table (htab)
13799 || h->def_regular))
13800 {
13801 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
13802 _bfd_set_gp_value (obfd, TOCstart);
13803 return TOCstart;
13804 }
13805 }
13806
13807 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13808 order. The TOC starts where the first of these sections starts. */
13809 s = bfd_get_section_by_name (obfd, ".got");
13810 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13811 s = bfd_get_section_by_name (obfd, ".toc");
13812 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13813 s = bfd_get_section_by_name (obfd, ".tocbss");
13814 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13815 s = bfd_get_section_by_name (obfd, ".plt");
13816 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13817 {
13818 /* This may happen for
13819 o references to TOC base (SYM@toc / TOC[tc0]) without a
13820 .toc directive
13821 o bad linker script
13822 o --gc-sections and empty TOC sections
13823
13824 FIXME: Warn user? */
13825
13826 /* Look for a likely section. We probably won't even be
13827 using TOCstart. */
13828 for (s = obfd->sections; s != NULL; s = s->next)
13829 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13830 | SEC_EXCLUDE))
13831 == (SEC_ALLOC | SEC_SMALL_DATA))
13832 break;
13833 if (s == NULL)
13834 for (s = obfd->sections; s != NULL; s = s->next)
13835 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13836 == (SEC_ALLOC | SEC_SMALL_DATA))
13837 break;
13838 if (s == NULL)
13839 for (s = obfd->sections; s != NULL; s = s->next)
13840 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13841 == SEC_ALLOC)
13842 break;
13843 if (s == NULL)
13844 for (s = obfd->sections; s != NULL; s = s->next)
13845 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13846 break;
13847 }
13848
13849 TOCstart = 0;
13850 if (s != NULL)
13851 TOCstart = s->output_section->vma + s->output_offset;
13852
13853 /* Force alignment. */
13854 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13855 TOCstart -= adjust;
13856 _bfd_set_gp_value (obfd, TOCstart);
13857
13858 if (info != NULL && s != NULL)
13859 {
13860 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13861
13862 if (htab != NULL)
13863 {
13864 if (htab->elf.hgot != NULL)
13865 {
13866 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13867 htab->elf.hgot->root.u.def.section = s;
13868 }
13869 }
13870 else
13871 {
13872 struct bfd_link_hash_entry *bh = NULL;
13873 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13874 s, TOC_BASE_OFF - adjust,
13875 NULL, FALSE, FALSE, &bh);
13876 }
13877 }
13878 return TOCstart;
13879 }
13880
13881 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13882 write out any global entry stubs, and PLT relocations. */
13883
13884 static bfd_boolean
13885 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13886 {
13887 struct bfd_link_info *info;
13888 struct ppc_link_hash_table *htab;
13889 struct plt_entry *ent;
13890 asection *s;
13891
13892 if (h->root.type == bfd_link_hash_indirect)
13893 return TRUE;
13894
13895 info = inf;
13896 htab = ppc_hash_table (info);
13897 if (htab == NULL)
13898 return FALSE;
13899
13900 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13901 if (ent->plt.offset != (bfd_vma) -1)
13902 {
13903 /* This symbol has an entry in the procedure linkage
13904 table. Set it up. */
13905 Elf_Internal_Rela rela;
13906 asection *plt, *relplt;
13907 bfd_byte *loc;
13908
13909 if (!htab->elf.dynamic_sections_created
13910 || h->dynindx == -1)
13911 {
13912 if (!(h->def_regular
13913 && (h->root.type == bfd_link_hash_defined
13914 || h->root.type == bfd_link_hash_defweak)))
13915 continue;
13916 if (h->type == STT_GNU_IFUNC)
13917 {
13918 plt = htab->elf.iplt;
13919 relplt = htab->elf.irelplt;
13920 htab->local_ifunc_resolver = 1;
13921 if (htab->opd_abi)
13922 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13923 else
13924 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13925 }
13926 else
13927 {
13928 plt = htab->pltlocal;
13929 if (bfd_link_pic (info))
13930 {
13931 relplt = htab->relpltlocal;
13932 if (htab->opd_abi)
13933 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13934 else
13935 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13936 }
13937 else
13938 relplt = NULL;
13939 }
13940 rela.r_addend = defined_sym_val (h) + ent->addend;
13941
13942 if (relplt == NULL)
13943 {
13944 loc = plt->contents + ent->plt.offset;
13945 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13946 if (htab->opd_abi)
13947 {
13948 bfd_vma toc = elf_gp (info->output_bfd);
13949 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13950 bfd_put_64 (info->output_bfd, toc, loc + 8);
13951 }
13952 }
13953 else
13954 {
13955 rela.r_offset = (plt->output_section->vma
13956 + plt->output_offset
13957 + ent->plt.offset);
13958 loc = relplt->contents + (relplt->reloc_count++
13959 * sizeof (Elf64_External_Rela));
13960 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13961 }
13962 }
13963 else
13964 {
13965 rela.r_offset = (htab->elf.splt->output_section->vma
13966 + htab->elf.splt->output_offset
13967 + ent->plt.offset);
13968 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13969 rela.r_addend = ent->addend;
13970 loc = (htab->elf.srelplt->contents
13971 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13972 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13973 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13974 htab->maybe_local_ifunc_resolver = 1;
13975 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13976 }
13977 }
13978
13979 if (!h->pointer_equality_needed)
13980 return TRUE;
13981
13982 if (h->def_regular)
13983 return TRUE;
13984
13985 s = htab->global_entry;
13986 if (s == NULL || s->size == 0)
13987 return TRUE;
13988
13989 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13990 if (ent->plt.offset != (bfd_vma) -1
13991 && ent->addend == 0)
13992 {
13993 bfd_byte *p;
13994 asection *plt;
13995 bfd_vma off;
13996
13997 p = s->contents + h->root.u.def.value;
13998 plt = htab->elf.splt;
13999 if (!htab->elf.dynamic_sections_created
14000 || h->dynindx == -1)
14001 {
14002 if (h->type == STT_GNU_IFUNC)
14003 plt = htab->elf.iplt;
14004 else
14005 plt = htab->pltlocal;
14006 }
14007 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
14008 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
14009
14010 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
14011 {
14012 info->callbacks->einfo
14013 (_("%P: linkage table error against `%pT'\n"),
14014 h->root.root.string);
14015 bfd_set_error (bfd_error_bad_value);
14016 htab->stub_error = TRUE;
14017 }
14018
14019 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14020 if (htab->params->emit_stub_syms)
14021 {
14022 size_t len = strlen (h->root.root.string);
14023 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14024
14025 if (name == NULL)
14026 return FALSE;
14027
14028 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14029 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14030 if (h == NULL)
14031 return FALSE;
14032 if (h->root.type == bfd_link_hash_new)
14033 {
14034 h->root.type = bfd_link_hash_defined;
14035 h->root.u.def.section = s;
14036 h->root.u.def.value = p - s->contents;
14037 h->ref_regular = 1;
14038 h->def_regular = 1;
14039 h->ref_regular_nonweak = 1;
14040 h->forced_local = 1;
14041 h->non_elf = 0;
14042 h->root.linker_def = 1;
14043 }
14044 }
14045
14046 if (PPC_HA (off) != 0)
14047 {
14048 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14049 p += 4;
14050 }
14051 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14052 p += 4;
14053 bfd_put_32 (s->owner, MTCTR_R12, p);
14054 p += 4;
14055 bfd_put_32 (s->owner, BCTR, p);
14056 break;
14057 }
14058 return TRUE;
14059 }
14060
14061 /* Write PLT relocs for locals. */
14062
14063 static bfd_boolean
14064 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14065 {
14066 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14067 bfd *ibfd;
14068
14069 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14070 {
14071 struct got_entry **lgot_ents, **end_lgot_ents;
14072 struct plt_entry **local_plt, **lplt, **end_local_plt;
14073 Elf_Internal_Shdr *symtab_hdr;
14074 bfd_size_type locsymcount;
14075 Elf_Internal_Sym *local_syms = NULL;
14076 struct plt_entry *ent;
14077
14078 if (!is_ppc64_elf (ibfd))
14079 continue;
14080
14081 lgot_ents = elf_local_got_ents (ibfd);
14082 if (!lgot_ents)
14083 continue;
14084
14085 symtab_hdr = &elf_symtab_hdr (ibfd);
14086 locsymcount = symtab_hdr->sh_info;
14087 end_lgot_ents = lgot_ents + locsymcount;
14088 local_plt = (struct plt_entry **) end_lgot_ents;
14089 end_local_plt = local_plt + locsymcount;
14090 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14091 for (ent = *lplt; ent != NULL; ent = ent->next)
14092 if (ent->plt.offset != (bfd_vma) -1)
14093 {
14094 Elf_Internal_Sym *sym;
14095 asection *sym_sec;
14096 asection *plt, *relplt;
14097 bfd_byte *loc;
14098 bfd_vma val;
14099
14100 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14101 lplt - local_plt, ibfd))
14102 {
14103 if (symtab_hdr->contents != (unsigned char *) local_syms)
14104 free (local_syms);
14105 return FALSE;
14106 }
14107
14108 val = sym->st_value + ent->addend;
14109 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14110 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
14111 if (sym_sec != NULL && sym_sec->output_section != NULL)
14112 val += sym_sec->output_offset + sym_sec->output_section->vma;
14113
14114 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14115 {
14116 htab->local_ifunc_resolver = 1;
14117 plt = htab->elf.iplt;
14118 relplt = htab->elf.irelplt;
14119 }
14120 else
14121 {
14122 plt = htab->pltlocal;
14123 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14124 }
14125
14126 if (relplt == NULL)
14127 {
14128 loc = plt->contents + ent->plt.offset;
14129 bfd_put_64 (info->output_bfd, val, loc);
14130 if (htab->opd_abi)
14131 {
14132 bfd_vma toc = elf_gp (ibfd);
14133 bfd_put_64 (info->output_bfd, toc, loc + 8);
14134 }
14135 }
14136 else
14137 {
14138 Elf_Internal_Rela rela;
14139 rela.r_offset = (ent->plt.offset
14140 + plt->output_offset
14141 + plt->output_section->vma);
14142 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14143 {
14144 if (htab->opd_abi)
14145 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14146 else
14147 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14148 }
14149 else
14150 {
14151 if (htab->opd_abi)
14152 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14153 else
14154 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14155 }
14156 rela.r_addend = val;
14157 loc = relplt->contents + (relplt->reloc_count++
14158 * sizeof (Elf64_External_Rela));
14159 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14160 }
14161 }
14162
14163 if (local_syms != NULL
14164 && symtab_hdr->contents != (unsigned char *) local_syms)
14165 {
14166 if (!info->keep_memory)
14167 free (local_syms);
14168 else
14169 symtab_hdr->contents = (unsigned char *) local_syms;
14170 }
14171 }
14172 return TRUE;
14173 }
14174
14175 /* Emit the static wrapper function preserving registers around a
14176 __tls_get_addr_opt call. */
14177
14178 static bfd_boolean
14179 emit_tga_desc (struct ppc_link_hash_table *htab)
14180 {
14181 asection *stub_sec = htab->tga_group->stub_sec;
14182 unsigned int cfa_updt = 11 * 4;
14183 bfd_byte *p;
14184 bfd_vma to, from, delta;
14185
14186 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14187 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14188 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14189 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14190 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14191 delta = to - from;
14192 if (delta + (1 << 25) >= 1 << 26)
14193 {
14194 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14195 htab->stub_error = TRUE;
14196 return FALSE;
14197 }
14198
14199 p = stub_sec->contents;
14200 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14201 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14202 p += 4;
14203 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14204 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14205 }
14206
14207 /* Emit eh_frame describing the static wrapper function. */
14208
14209 static bfd_byte *
14210 emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14211 {
14212 unsigned int cfa_updt = 11 * 4;
14213 unsigned int i;
14214
14215 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14216 *p++ = DW_CFA_def_cfa_offset;
14217 if (htab->opd_abi)
14218 {
14219 *p++ = 128;
14220 *p++ = 1;
14221 }
14222 else
14223 *p++ = 96;
14224 *p++ = DW_CFA_offset_extended_sf;
14225 *p++ = 65;
14226 *p++ = (-16 / 8) & 0x7f;
14227 for (i = 4; i < 12; i++)
14228 {
14229 *p++ = DW_CFA_offset + i;
14230 *p++ = (htab->opd_abi ? 13 : 12) - i;
14231 }
14232 *p++ = DW_CFA_advance_loc + 10;
14233 *p++ = DW_CFA_def_cfa_offset;
14234 *p++ = 0;
14235 for (i = 4; i < 12; i++)
14236 *p++ = DW_CFA_restore + i;
14237 *p++ = DW_CFA_advance_loc + 2;
14238 *p++ = DW_CFA_restore_extended;
14239 *p++ = 65;
14240 return p;
14241 }
14242
14243 /* Build all the stubs associated with the current output file.
14244 The stubs are kept in a hash table attached to the main linker
14245 hash table. This function is called via gldelf64ppc_finish. */
14246
14247 bfd_boolean
14248 ppc64_elf_build_stubs (struct bfd_link_info *info,
14249 char **stats)
14250 {
14251 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14252 struct map_stub *group;
14253 asection *stub_sec;
14254 bfd_byte *p;
14255 int stub_sec_count = 0;
14256
14257 if (htab == NULL)
14258 return FALSE;
14259
14260 /* Allocate memory to hold the linker stubs. */
14261 for (group = htab->group; group != NULL; group = group->next)
14262 {
14263 group->eh_size = 0;
14264 group->lr_restore = 0;
14265 if ((stub_sec = group->stub_sec) != NULL
14266 && stub_sec->size != 0)
14267 {
14268 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14269 stub_sec->size);
14270 if (stub_sec->contents == NULL)
14271 return FALSE;
14272 stub_sec->size = 0;
14273 }
14274 }
14275
14276 if (htab->glink != NULL && htab->glink->size != 0)
14277 {
14278 unsigned int indx;
14279 bfd_vma plt0;
14280
14281 /* Build the .glink plt call stub. */
14282 if (htab->params->emit_stub_syms)
14283 {
14284 struct elf_link_hash_entry *h;
14285 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14286 TRUE, FALSE, FALSE);
14287 if (h == NULL)
14288 return FALSE;
14289 if (h->root.type == bfd_link_hash_new)
14290 {
14291 h->root.type = bfd_link_hash_defined;
14292 h->root.u.def.section = htab->glink;
14293 h->root.u.def.value = 8;
14294 h->ref_regular = 1;
14295 h->def_regular = 1;
14296 h->ref_regular_nonweak = 1;
14297 h->forced_local = 1;
14298 h->non_elf = 0;
14299 h->root.linker_def = 1;
14300 }
14301 }
14302 plt0 = (htab->elf.splt->output_section->vma
14303 + htab->elf.splt->output_offset
14304 - 16);
14305 if (info->emitrelocations)
14306 {
14307 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14308 if (r == NULL)
14309 return FALSE;
14310 r->r_offset = (htab->glink->output_offset
14311 + htab->glink->output_section->vma);
14312 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14313 r->r_addend = plt0;
14314 }
14315 p = htab->glink->contents;
14316 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
14317 bfd_put_64 (htab->glink->owner, plt0, p);
14318 p += 8;
14319 if (htab->opd_abi)
14320 {
14321 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14322 p += 4;
14323 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14324 p += 4;
14325 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14326 p += 4;
14327 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14328 p += 4;
14329 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14330 p += 4;
14331 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14332 p += 4;
14333 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14334 p += 4;
14335 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14336 p += 4;
14337 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14338 p += 4;
14339 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14340 p += 4;
14341 }
14342 else
14343 {
14344 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14345 p += 4;
14346 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14347 p += 4;
14348 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14349 p += 4;
14350 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14351 p += 4;
14352 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14353 p += 4;
14354 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14355 p += 4;
14356 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14357 p += 4;
14358 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14359 p += 4;
14360 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14361 p += 4;
14362 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14363 p += 4;
14364 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14365 p += 4;
14366 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14367 p += 4;
14368 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14369 p += 4;
14370 }
14371 bfd_put_32 (htab->glink->owner, BCTR, p);
14372 p += 4;
14373 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
14374
14375 /* Build the .glink lazy link call stubs. */
14376 indx = 0;
14377 while (p < htab->glink->contents + htab->glink->size)
14378 {
14379 if (htab->opd_abi)
14380 {
14381 if (indx < 0x8000)
14382 {
14383 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14384 p += 4;
14385 }
14386 else
14387 {
14388 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14389 p += 4;
14390 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14391 p);
14392 p += 4;
14393 }
14394 }
14395 bfd_put_32 (htab->glink->owner,
14396 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
14397 indx++;
14398 p += 4;
14399 }
14400 }
14401
14402 if (htab->tga_group != NULL)
14403 {
14404 htab->tga_group->lr_restore = 23 * 4;
14405 htab->tga_group->stub_sec->size = 24 * 4;
14406 if (!emit_tga_desc (htab))
14407 return FALSE;
14408 if (htab->glink_eh_frame != NULL
14409 && htab->glink_eh_frame->size != 0)
14410 {
14411 size_t align = 4;
14412
14413 p = htab->glink_eh_frame->contents;
14414 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14415 p += 17;
14416 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14417 }
14418 }
14419
14420 /* Build .glink global entry stubs, and PLT relocs for globals. */
14421 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14422
14423 if (!write_plt_relocs_for_local_syms (info))
14424 return FALSE;
14425
14426 if (htab->brlt != NULL && htab->brlt->size != 0)
14427 {
14428 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
14429 htab->brlt->size);
14430 if (htab->brlt->contents == NULL)
14431 return FALSE;
14432 }
14433 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
14434 {
14435 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
14436 htab->relbrlt->size);
14437 if (htab->relbrlt->contents == NULL)
14438 return FALSE;
14439 }
14440
14441 /* Build the stubs as directed by the stub hash table. */
14442 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
14443
14444 for (group = htab->group; group != NULL; group = group->next)
14445 if (group->needs_save_res)
14446 group->stub_sec->size += htab->sfpr->size;
14447
14448 if (htab->relbrlt != NULL)
14449 htab->relbrlt->reloc_count = 0;
14450
14451 if (htab->params->plt_stub_align != 0)
14452 for (group = htab->group; group != NULL; group = group->next)
14453 if ((stub_sec = group->stub_sec) != NULL)
14454 {
14455 int align = abs (htab->params->plt_stub_align);
14456 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14457 }
14458
14459 for (group = htab->group; group != NULL; group = group->next)
14460 if (group->needs_save_res)
14461 {
14462 stub_sec = group->stub_sec;
14463 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14464 htab->sfpr->contents, htab->sfpr->size);
14465 if (htab->params->emit_stub_syms)
14466 {
14467 unsigned int i;
14468
14469 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14470 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14471 return FALSE;
14472 }
14473 }
14474
14475 if (htab->glink_eh_frame != NULL
14476 && htab->glink_eh_frame->size != 0)
14477 {
14478 bfd_vma val;
14479 size_t align = 4;
14480
14481 p = htab->glink_eh_frame->contents;
14482 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14483
14484 for (group = htab->group; group != NULL; group = group->next)
14485 if (group->eh_size != 0)
14486 {
14487 /* Offset to stub section. */
14488 val = (group->stub_sec->output_section->vma
14489 + group->stub_sec->output_offset);
14490 val -= (htab->glink_eh_frame->output_section->vma
14491 + htab->glink_eh_frame->output_offset
14492 + (p + 8 - htab->glink_eh_frame->contents));
14493 if (val + 0x80000000 > 0xffffffff)
14494 {
14495 _bfd_error_handler
14496 (_("%s offset too large for .eh_frame sdata4 encoding"),
14497 group->stub_sec->name);
14498 return FALSE;
14499 }
14500 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14501 p += (group->eh_size + 17 + 3) & -4;
14502 }
14503 if (htab->glink != NULL && htab->glink->size != 0)
14504 {
14505 /* Offset to .glink. */
14506 val = (htab->glink->output_section->vma
14507 + htab->glink->output_offset
14508 + 8);
14509 val -= (htab->glink_eh_frame->output_section->vma
14510 + htab->glink_eh_frame->output_offset
14511 + (p + 8 - htab->glink_eh_frame->contents));
14512 if (val + 0x80000000 > 0xffffffff)
14513 {
14514 _bfd_error_handler
14515 (_("%s offset too large for .eh_frame sdata4 encoding"),
14516 htab->glink->name);
14517 return FALSE;
14518 }
14519 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14520 p += (24 + align - 1) & -align;
14521 }
14522 }
14523
14524 for (group = htab->group; group != NULL; group = group->next)
14525 if ((stub_sec = group->stub_sec) != NULL)
14526 {
14527 stub_sec_count += 1;
14528 if (stub_sec->rawsize != stub_sec->size
14529 && (htab->stub_iteration <= STUB_SHRINK_ITER
14530 || stub_sec->rawsize < stub_sec->size))
14531 break;
14532 }
14533
14534 if (group != NULL)
14535 {
14536 htab->stub_error = TRUE;
14537 _bfd_error_handler (_("stubs don't match calculated size"));
14538 }
14539
14540 if (htab->stub_error)
14541 return FALSE;
14542
14543 if (stats != NULL)
14544 {
14545 char *groupmsg;
14546 if (asprintf (&groupmsg,
14547 ngettext ("linker stubs in %u group\n",
14548 "linker stubs in %u groups\n",
14549 stub_sec_count),
14550 stub_sec_count) < 0)
14551 *stats = NULL;
14552 else
14553 {
14554 if (asprintf (stats, _("%s"
14555 " branch %lu\n"
14556 " branch toc adj %lu\n"
14557 " branch notoc %lu\n"
14558 " branch both %lu\n"
14559 " long branch %lu\n"
14560 " long toc adj %lu\n"
14561 " long notoc %lu\n"
14562 " long both %lu\n"
14563 " plt call %lu\n"
14564 " plt call save %lu\n"
14565 " plt call notoc %lu\n"
14566 " plt call both %lu\n"
14567 " global entry %lu"),
14568 groupmsg,
14569 htab->stub_count[ppc_stub_long_branch - 1],
14570 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14571 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14572 htab->stub_count[ppc_stub_long_branch_both - 1],
14573 htab->stub_count[ppc_stub_plt_branch - 1],
14574 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14575 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14576 htab->stub_count[ppc_stub_plt_branch_both - 1],
14577 htab->stub_count[ppc_stub_plt_call - 1],
14578 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14579 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14580 htab->stub_count[ppc_stub_plt_call_both - 1],
14581 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14582 *stats = NULL;
14583 free (groupmsg);
14584 }
14585 }
14586 return TRUE;
14587 }
14588
14589 /* What to do when ld finds relocations against symbols defined in
14590 discarded sections. */
14591
14592 static unsigned int
14593 ppc64_elf_action_discarded (asection *sec)
14594 {
14595 if (strcmp (".opd", sec->name) == 0)
14596 return 0;
14597
14598 if (strcmp (".toc", sec->name) == 0)
14599 return 0;
14600
14601 if (strcmp (".toc1", sec->name) == 0)
14602 return 0;
14603
14604 return _bfd_elf_default_action_discarded (sec);
14605 }
14606
14607 /* These are the dynamic relocations supported by glibc. */
14608
14609 static bfd_boolean
14610 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14611 {
14612 switch (r_type)
14613 {
14614 case R_PPC64_RELATIVE:
14615 case R_PPC64_NONE:
14616 case R_PPC64_ADDR64:
14617 case R_PPC64_GLOB_DAT:
14618 case R_PPC64_IRELATIVE:
14619 case R_PPC64_JMP_IREL:
14620 case R_PPC64_JMP_SLOT:
14621 case R_PPC64_DTPMOD64:
14622 case R_PPC64_DTPREL64:
14623 case R_PPC64_TPREL64:
14624 case R_PPC64_TPREL16_LO_DS:
14625 case R_PPC64_TPREL16_DS:
14626 case R_PPC64_TPREL16:
14627 case R_PPC64_TPREL16_LO:
14628 case R_PPC64_TPREL16_HI:
14629 case R_PPC64_TPREL16_HIGH:
14630 case R_PPC64_TPREL16_HA:
14631 case R_PPC64_TPREL16_HIGHA:
14632 case R_PPC64_TPREL16_HIGHER:
14633 case R_PPC64_TPREL16_HIGHEST:
14634 case R_PPC64_TPREL16_HIGHERA:
14635 case R_PPC64_TPREL16_HIGHESTA:
14636 case R_PPC64_ADDR16_LO_DS:
14637 case R_PPC64_ADDR16_LO:
14638 case R_PPC64_ADDR16_HI:
14639 case R_PPC64_ADDR16_HIGH:
14640 case R_PPC64_ADDR16_HA:
14641 case R_PPC64_ADDR16_HIGHA:
14642 case R_PPC64_REL30:
14643 case R_PPC64_COPY:
14644 case R_PPC64_UADDR64:
14645 case R_PPC64_UADDR32:
14646 case R_PPC64_ADDR32:
14647 case R_PPC64_ADDR24:
14648 case R_PPC64_ADDR16:
14649 case R_PPC64_UADDR16:
14650 case R_PPC64_ADDR16_DS:
14651 case R_PPC64_ADDR16_HIGHER:
14652 case R_PPC64_ADDR16_HIGHEST:
14653 case R_PPC64_ADDR16_HIGHERA:
14654 case R_PPC64_ADDR16_HIGHESTA:
14655 case R_PPC64_ADDR14:
14656 case R_PPC64_ADDR14_BRTAKEN:
14657 case R_PPC64_ADDR14_BRNTAKEN:
14658 case R_PPC64_REL32:
14659 case R_PPC64_REL64:
14660 return TRUE;
14661
14662 default:
14663 return FALSE;
14664 }
14665 }
14666
14667 /* The RELOCATE_SECTION function is called by the ELF backend linker
14668 to handle the relocations for a section.
14669
14670 The relocs are always passed as Rela structures; if the section
14671 actually uses Rel structures, the r_addend field will always be
14672 zero.
14673
14674 This function is responsible for adjust the section contents as
14675 necessary, and (if using Rela relocs and generating a
14676 relocatable output file) adjusting the reloc addend as
14677 necessary.
14678
14679 This function does not have to worry about setting the reloc
14680 address or the reloc symbol index.
14681
14682 LOCAL_SYMS is a pointer to the swapped in local symbols.
14683
14684 LOCAL_SECTIONS is an array giving the section in the input file
14685 corresponding to the st_shndx field of each local symbol.
14686
14687 The global hash table entry for the global symbols can be found
14688 via elf_sym_hashes (input_bfd).
14689
14690 When generating relocatable output, this function must handle
14691 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14692 going to be the section symbol corresponding to the output
14693 section, which means that the addend must be adjusted
14694 accordingly. */
14695
14696 static bfd_boolean
14697 ppc64_elf_relocate_section (bfd *output_bfd,
14698 struct bfd_link_info *info,
14699 bfd *input_bfd,
14700 asection *input_section,
14701 bfd_byte *contents,
14702 Elf_Internal_Rela *relocs,
14703 Elf_Internal_Sym *local_syms,
14704 asection **local_sections)
14705 {
14706 struct ppc_link_hash_table *htab;
14707 Elf_Internal_Shdr *symtab_hdr;
14708 struct elf_link_hash_entry **sym_hashes;
14709 Elf_Internal_Rela *rel;
14710 Elf_Internal_Rela *wrel;
14711 Elf_Internal_Rela *relend;
14712 Elf_Internal_Rela outrel;
14713 bfd_byte *loc;
14714 struct got_entry **local_got_ents;
14715 bfd_vma TOCstart;
14716 bfd_boolean ret = TRUE;
14717 bfd_boolean is_opd;
14718 /* Assume 'at' branch hints. */
14719 bfd_boolean is_isa_v2 = TRUE;
14720 bfd_boolean warned_dynamic = FALSE;
14721 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14722
14723 /* Initialize howto table if needed. */
14724 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14725 ppc_howto_init ();
14726
14727 htab = ppc_hash_table (info);
14728 if (htab == NULL)
14729 return FALSE;
14730
14731 /* Don't relocate stub sections. */
14732 if (input_section->owner == htab->params->stub_bfd)
14733 return TRUE;
14734
14735 if (!is_ppc64_elf (input_bfd))
14736 {
14737 bfd_set_error (bfd_error_wrong_format);
14738 return FALSE;
14739 }
14740
14741 local_got_ents = elf_local_got_ents (input_bfd);
14742 TOCstart = elf_gp (output_bfd);
14743 symtab_hdr = &elf_symtab_hdr (input_bfd);
14744 sym_hashes = elf_sym_hashes (input_bfd);
14745 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14746
14747 rel = wrel = relocs;
14748 relend = relocs + input_section->reloc_count;
14749 for (; rel < relend; wrel++, rel++)
14750 {
14751 enum elf_ppc64_reloc_type r_type;
14752 bfd_vma addend;
14753 bfd_reloc_status_type r;
14754 Elf_Internal_Sym *sym;
14755 asection *sec;
14756 struct elf_link_hash_entry *h_elf;
14757 struct ppc_link_hash_entry *h;
14758 struct ppc_link_hash_entry *fdh;
14759 const char *sym_name;
14760 unsigned long r_symndx, toc_symndx;
14761 bfd_vma toc_addend;
14762 unsigned char tls_mask, tls_gd, tls_type;
14763 unsigned char sym_type;
14764 bfd_vma relocation;
14765 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14766 bfd_boolean warned;
14767 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14768 unsigned int insn;
14769 unsigned int mask;
14770 struct ppc_stub_hash_entry *stub_entry;
14771 bfd_vma max_br_offset;
14772 bfd_vma from;
14773 Elf_Internal_Rela orig_rel;
14774 reloc_howto_type *howto;
14775 struct reloc_howto_struct alt_howto;
14776 uint64_t pinsn;
14777 bfd_vma offset;
14778
14779 again:
14780 orig_rel = *rel;
14781
14782 r_type = ELF64_R_TYPE (rel->r_info);
14783 r_symndx = ELF64_R_SYM (rel->r_info);
14784
14785 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14786 symbol of the previous ADDR64 reloc. The symbol gives us the
14787 proper TOC base to use. */
14788 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14789 && wrel != relocs
14790 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14791 && is_opd)
14792 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14793
14794 sym = NULL;
14795 sec = NULL;
14796 h_elf = NULL;
14797 sym_name = NULL;
14798 unresolved_reloc = FALSE;
14799 warned = FALSE;
14800
14801 if (r_symndx < symtab_hdr->sh_info)
14802 {
14803 /* It's a local symbol. */
14804 struct _opd_sec_data *opd;
14805
14806 sym = local_syms + r_symndx;
14807 sec = local_sections[r_symndx];
14808 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14809 sym_type = ELF64_ST_TYPE (sym->st_info);
14810 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14811 opd = get_opd_info (sec);
14812 if (opd != NULL && opd->adjust != NULL)
14813 {
14814 long adjust = opd->adjust[OPD_NDX (sym->st_value
14815 + rel->r_addend)];
14816 if (adjust == -1)
14817 relocation = 0;
14818 else
14819 {
14820 /* If this is a relocation against the opd section sym
14821 and we have edited .opd, adjust the reloc addend so
14822 that ld -r and ld --emit-relocs output is correct.
14823 If it is a reloc against some other .opd symbol,
14824 then the symbol value will be adjusted later. */
14825 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14826 rel->r_addend += adjust;
14827 else
14828 relocation += adjust;
14829 }
14830 }
14831 }
14832 else
14833 {
14834 bfd_boolean ignored;
14835
14836 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14837 r_symndx, symtab_hdr, sym_hashes,
14838 h_elf, sec, relocation,
14839 unresolved_reloc, warned, ignored);
14840 sym_name = h_elf->root.root.string;
14841 sym_type = h_elf->type;
14842 if (sec != NULL
14843 && sec->owner == output_bfd
14844 && strcmp (sec->name, ".opd") == 0)
14845 {
14846 /* This is a symbol defined in a linker script. All
14847 such are defined in output sections, even those
14848 defined by simple assignment from a symbol defined in
14849 an input section. Transfer the symbol to an
14850 appropriate input .opd section, so that a branch to
14851 this symbol will be mapped to the location specified
14852 by the opd entry. */
14853 struct bfd_link_order *lo;
14854 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14855 if (lo->type == bfd_indirect_link_order)
14856 {
14857 asection *isec = lo->u.indirect.section;
14858 if (h_elf->root.u.def.value >= isec->output_offset
14859 && h_elf->root.u.def.value < (isec->output_offset
14860 + isec->size))
14861 {
14862 h_elf->root.u.def.value -= isec->output_offset;
14863 h_elf->root.u.def.section = isec;
14864 sec = isec;
14865 break;
14866 }
14867 }
14868 }
14869 }
14870 h = ppc_elf_hash_entry (h_elf);
14871
14872 if (sec != NULL && discarded_section (sec))
14873 {
14874 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14875 input_bfd, input_section,
14876 contents, rel->r_offset);
14877 wrel->r_offset = rel->r_offset;
14878 wrel->r_info = 0;
14879 wrel->r_addend = 0;
14880
14881 /* For ld -r, remove relocations in debug sections against
14882 symbols defined in discarded sections. Not done for
14883 non-debug to preserve relocs in .eh_frame which the
14884 eh_frame editing code expects to be present. */
14885 if (bfd_link_relocatable (info)
14886 && (input_section->flags & SEC_DEBUGGING))
14887 wrel--;
14888
14889 continue;
14890 }
14891
14892 if (bfd_link_relocatable (info))
14893 goto copy_reloc;
14894
14895 if (h != NULL && &h->elf == htab->elf.hgot)
14896 {
14897 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14898 sec = bfd_abs_section_ptr;
14899 unresolved_reloc = FALSE;
14900 }
14901
14902 /* TLS optimizations. Replace instruction sequences and relocs
14903 based on information we collected in tls_optimize. We edit
14904 RELOCS so that --emit-relocs will output something sensible
14905 for the final instruction stream. */
14906 tls_mask = 0;
14907 tls_gd = 0;
14908 toc_symndx = 0;
14909 if (h != NULL)
14910 tls_mask = h->tls_mask;
14911 else if (local_got_ents != NULL)
14912 {
14913 struct plt_entry **local_plt = (struct plt_entry **)
14914 (local_got_ents + symtab_hdr->sh_info);
14915 unsigned char *lgot_masks = (unsigned char *)
14916 (local_plt + symtab_hdr->sh_info);
14917 tls_mask = lgot_masks[r_symndx];
14918 }
14919 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14920 && (r_type == R_PPC64_TLS
14921 || r_type == R_PPC64_TLSGD
14922 || r_type == R_PPC64_TLSLD))
14923 {
14924 /* Check for toc tls entries. */
14925 unsigned char *toc_tls;
14926
14927 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14928 &local_syms, rel, input_bfd))
14929 return FALSE;
14930
14931 if (toc_tls)
14932 tls_mask = *toc_tls;
14933 }
14934
14935 /* Check that tls relocs are used with tls syms, and non-tls
14936 relocs are used with non-tls syms. */
14937 if (r_symndx != STN_UNDEF
14938 && r_type != R_PPC64_NONE
14939 && (h == NULL
14940 || h->elf.root.type == bfd_link_hash_defined
14941 || h->elf.root.type == bfd_link_hash_defweak)
14942 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14943 {
14944 if ((tls_mask & TLS_TLS) != 0
14945 && (r_type == R_PPC64_TLS
14946 || r_type == R_PPC64_TLSGD
14947 || r_type == R_PPC64_TLSLD))
14948 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14949 ;
14950 else
14951 info->callbacks->einfo
14952 (!IS_PPC64_TLS_RELOC (r_type)
14953 /* xgettext:c-format */
14954 ? _("%H: %s used with TLS symbol `%pT'\n")
14955 /* xgettext:c-format */
14956 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14957 input_bfd, input_section, rel->r_offset,
14958 ppc64_elf_howto_table[r_type]->name,
14959 sym_name);
14960 }
14961
14962 /* Ensure reloc mapping code below stays sane. */
14963 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14964 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14965 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14966 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14967 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14968 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14969 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14970 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14971 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14972 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14973 abort ();
14974
14975 switch (r_type)
14976 {
14977 default:
14978 break;
14979
14980 case R_PPC64_LO_DS_OPT:
14981 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14982 if ((insn & (0x3fu << 26)) != 58u << 26)
14983 abort ();
14984 insn += (14u << 26) - (58u << 26);
14985 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14986 r_type = R_PPC64_TOC16_LO;
14987 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14988 break;
14989
14990 case R_PPC64_TOC16:
14991 case R_PPC64_TOC16_LO:
14992 case R_PPC64_TOC16_DS:
14993 case R_PPC64_TOC16_LO_DS:
14994 {
14995 /* Check for toc tls entries. */
14996 unsigned char *toc_tls;
14997 int retval;
14998
14999 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15000 &local_syms, rel, input_bfd);
15001 if (retval == 0)
15002 return FALSE;
15003
15004 if (toc_tls)
15005 {
15006 tls_mask = *toc_tls;
15007 if (r_type == R_PPC64_TOC16_DS
15008 || r_type == R_PPC64_TOC16_LO_DS)
15009 {
15010 if ((tls_mask & TLS_TLS) != 0
15011 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
15012 goto toctprel;
15013 }
15014 else
15015 {
15016 /* If we found a GD reloc pair, then we might be
15017 doing a GD->IE transition. */
15018 if (retval == 2)
15019 {
15020 tls_gd = TLS_GDIE;
15021 if ((tls_mask & TLS_TLS) != 0
15022 && (tls_mask & TLS_GD) == 0)
15023 goto tls_ldgd_opt;
15024 }
15025 else if (retval == 3)
15026 {
15027 if ((tls_mask & TLS_TLS) != 0
15028 && (tls_mask & TLS_LD) == 0)
15029 goto tls_ldgd_opt;
15030 }
15031 }
15032 }
15033 }
15034 break;
15035
15036 case R_PPC64_GOT_TPREL16_HI:
15037 case R_PPC64_GOT_TPREL16_HA:
15038 if ((tls_mask & TLS_TLS) != 0
15039 && (tls_mask & TLS_TPREL) == 0)
15040 {
15041 rel->r_offset -= d_offset;
15042 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15043 r_type = R_PPC64_NONE;
15044 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15045 }
15046 break;
15047
15048 case R_PPC64_GOT_TPREL16_DS:
15049 case R_PPC64_GOT_TPREL16_LO_DS:
15050 if ((tls_mask & TLS_TLS) != 0
15051 && (tls_mask & TLS_TPREL) == 0)
15052 {
15053 toctprel:
15054 insn = bfd_get_32 (input_bfd,
15055 contents + rel->r_offset - d_offset);
15056 insn &= 31 << 21;
15057 insn |= 0x3c0d0000; /* addis 0,13,0 */
15058 bfd_put_32 (input_bfd, insn,
15059 contents + rel->r_offset - d_offset);
15060 r_type = R_PPC64_TPREL16_HA;
15061 if (toc_symndx != 0)
15062 {
15063 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15064 rel->r_addend = toc_addend;
15065 /* We changed the symbol. Start over in order to
15066 get h, sym, sec etc. right. */
15067 goto again;
15068 }
15069 else
15070 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15071 }
15072 break;
15073
15074 case R_PPC64_GOT_TPREL34:
15075 if ((tls_mask & TLS_TLS) != 0
15076 && (tls_mask & TLS_TPREL) == 0)
15077 {
15078 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15079 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15080 pinsn <<= 32;
15081 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15082 pinsn += ((2ULL << 56) + (-1ULL << 52)
15083 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15084 bfd_put_32 (input_bfd, pinsn >> 32,
15085 contents + rel->r_offset);
15086 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15087 contents + rel->r_offset + 4);
15088 r_type = R_PPC64_TPREL34;
15089 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15090 }
15091 break;
15092
15093 case R_PPC64_TLS:
15094 if ((tls_mask & TLS_TLS) != 0
15095 && (tls_mask & TLS_TPREL) == 0)
15096 {
15097 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15098 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15099 if (insn == 0)
15100 break;
15101 if ((rel->r_offset & 3) == 0)
15102 {
15103 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15104 /* Was PPC64_TLS which sits on insn boundary, now
15105 PPC64_TPREL16_LO which is at low-order half-word. */
15106 rel->r_offset += d_offset;
15107 r_type = R_PPC64_TPREL16_LO;
15108 if (toc_symndx != 0)
15109 {
15110 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15111 rel->r_addend = toc_addend;
15112 /* We changed the symbol. Start over in order to
15113 get h, sym, sec etc. right. */
15114 goto again;
15115 }
15116 else
15117 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15118 }
15119 else if ((rel->r_offset & 3) == 1)
15120 {
15121 /* For pcrel IE to LE we already have the full
15122 offset and thus don't need an addi here. A nop
15123 or mr will do. */
15124 if ((insn & (0x3fu << 26)) == 14 << 26)
15125 {
15126 /* Extract regs from addi rt,ra,si. */
15127 unsigned int rt = (insn >> 21) & 0x1f;
15128 unsigned int ra = (insn >> 16) & 0x1f;
15129 if (rt == ra)
15130 insn = NOP;
15131 else
15132 {
15133 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15134 insn = (rt << 16) | (ra << 21) | (ra << 11);
15135 insn |= (31u << 26) | (444u << 1);
15136 }
15137 }
15138 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
15139 }
15140 }
15141 break;
15142
15143 case R_PPC64_GOT_TLSGD16_HI:
15144 case R_PPC64_GOT_TLSGD16_HA:
15145 tls_gd = TLS_GDIE;
15146 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15147 goto tls_gdld_hi;
15148 break;
15149
15150 case R_PPC64_GOT_TLSLD16_HI:
15151 case R_PPC64_GOT_TLSLD16_HA:
15152 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15153 {
15154 tls_gdld_hi:
15155 if ((tls_mask & tls_gd) != 0)
15156 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15157 + R_PPC64_GOT_TPREL16_DS);
15158 else
15159 {
15160 rel->r_offset -= d_offset;
15161 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15162 r_type = R_PPC64_NONE;
15163 }
15164 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15165 }
15166 break;
15167
15168 case R_PPC64_GOT_TLSGD16:
15169 case R_PPC64_GOT_TLSGD16_LO:
15170 tls_gd = TLS_GDIE;
15171 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15172 goto tls_ldgd_opt;
15173 break;
15174
15175 case R_PPC64_GOT_TLSLD16:
15176 case R_PPC64_GOT_TLSLD16_LO:
15177 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15178 {
15179 unsigned int insn1, insn2;
15180
15181 tls_ldgd_opt:
15182 offset = (bfd_vma) -1;
15183 /* If not using the newer R_PPC64_TLSGD/LD to mark
15184 __tls_get_addr calls, we must trust that the call
15185 stays with its arg setup insns, ie. that the next
15186 reloc is the __tls_get_addr call associated with
15187 the current reloc. Edit both insns. */
15188 if (input_section->nomark_tls_get_addr
15189 && rel + 1 < relend
15190 && branch_reloc_hash_match (input_bfd, rel + 1,
15191 htab->tls_get_addr_fd,
15192 htab->tga_desc_fd,
15193 htab->tls_get_addr,
15194 htab->tga_desc))
15195 offset = rel[1].r_offset;
15196 /* We read the low GOT_TLS (or TOC16) insn because we
15197 need to keep the destination reg. It may be
15198 something other than the usual r3, and moved to r3
15199 before the call by intervening code. */
15200 insn1 = bfd_get_32 (input_bfd,
15201 contents + rel->r_offset - d_offset);
15202 if ((tls_mask & tls_gd) != 0)
15203 {
15204 /* IE */
15205 insn1 &= (0x1f << 21) | (0x1f << 16);
15206 insn1 |= 58u << 26; /* ld */
15207 insn2 = 0x7c636a14; /* add 3,3,13 */
15208 if (offset != (bfd_vma) -1)
15209 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15210 if (r_type == R_PPC64_TOC16
15211 || r_type == R_PPC64_TOC16_LO)
15212 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
15213 else
15214 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15215 + R_PPC64_GOT_TPREL16_DS);
15216 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15217 }
15218 else
15219 {
15220 /* LE */
15221 insn1 &= 0x1f << 21;
15222 insn1 |= 0x3c0d0000; /* addis r,13,0 */
15223 insn2 = 0x38630000; /* addi 3,3,0 */
15224 if (tls_gd == 0)
15225 {
15226 /* Was an LD reloc. */
15227 r_symndx = STN_UNDEF;
15228 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15229 }
15230 else if (toc_symndx != 0)
15231 {
15232 r_symndx = toc_symndx;
15233 rel->r_addend = toc_addend;
15234 }
15235 r_type = R_PPC64_TPREL16_HA;
15236 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15237 if (offset != (bfd_vma) -1)
15238 {
15239 rel[1].r_info = ELF64_R_INFO (r_symndx,
15240 R_PPC64_TPREL16_LO);
15241 rel[1].r_offset = offset + d_offset;
15242 rel[1].r_addend = rel->r_addend;
15243 }
15244 }
15245 bfd_put_32 (input_bfd, insn1,
15246 contents + rel->r_offset - d_offset);
15247 if (offset != (bfd_vma) -1)
15248 {
15249 bfd_put_32 (input_bfd, insn2, contents + offset);
15250 if (offset + 8 <= input_section->size)
15251 {
15252 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15253 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15254 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15255 }
15256 }
15257 if ((tls_mask & tls_gd) == 0
15258 && (tls_gd == 0 || toc_symndx != 0))
15259 {
15260 /* We changed the symbol. Start over in order
15261 to get h, sym, sec etc. right. */
15262 goto again;
15263 }
15264 }
15265 break;
15266
15267 case R_PPC64_GOT_TLSGD34:
15268 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15269 {
15270 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15271 pinsn <<= 32;
15272 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15273 if ((tls_mask & TLS_GDIE) != 0)
15274 {
15275 /* IE, pla -> pld */
15276 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15277 r_type = R_PPC64_GOT_TPREL34;
15278 }
15279 else
15280 {
15281 /* LE, pla pcrel -> paddi r13 */
15282 pinsn += (-1ULL << 52) + (13ULL << 16);
15283 r_type = R_PPC64_TPREL34;
15284 }
15285 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15286 bfd_put_32 (input_bfd, pinsn >> 32,
15287 contents + rel->r_offset);
15288 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15289 contents + rel->r_offset + 4);
15290 }
15291 break;
15292
15293 case R_PPC64_GOT_TLSLD34:
15294 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15295 {
15296 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15297 pinsn <<= 32;
15298 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15299 pinsn += (-1ULL << 52) + (13ULL << 16);
15300 bfd_put_32 (input_bfd, pinsn >> 32,
15301 contents + rel->r_offset);
15302 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15303 contents + rel->r_offset + 4);
15304 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15305 r_symndx = STN_UNDEF;
15306 r_type = R_PPC64_TPREL34;
15307 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15308 goto again;
15309 }
15310 break;
15311
15312 case R_PPC64_TLSGD:
15313 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
15314 && rel + 1 < relend)
15315 {
15316 unsigned int insn2;
15317 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15318
15319 offset = rel->r_offset;
15320 if (is_plt_seq_reloc (r_type1))
15321 {
15322 bfd_put_32 (output_bfd, NOP, contents + offset);
15323 if (r_type1 == R_PPC64_PLT_PCREL34
15324 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15325 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15326 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15327 break;
15328 }
15329
15330 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15331 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15332
15333 if ((tls_mask & TLS_GDIE) != 0)
15334 {
15335 /* IE */
15336 r_type = R_PPC64_NONE;
15337 insn2 = 0x7c636a14; /* add 3,3,13 */
15338 }
15339 else
15340 {
15341 /* LE */
15342 if (toc_symndx != 0)
15343 {
15344 r_symndx = toc_symndx;
15345 rel->r_addend = toc_addend;
15346 }
15347 if (r_type1 == R_PPC64_REL24_NOTOC
15348 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15349 {
15350 r_type = R_PPC64_NONE;
15351 insn2 = NOP;
15352 }
15353 else
15354 {
15355 rel->r_offset = offset + d_offset;
15356 r_type = R_PPC64_TPREL16_LO;
15357 insn2 = 0x38630000; /* addi 3,3,0 */
15358 }
15359 }
15360 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15361 /* Zap the reloc on the _tls_get_addr call too. */
15362 BFD_ASSERT (offset == rel[1].r_offset);
15363 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15364 bfd_put_32 (input_bfd, insn2, contents + offset);
15365 if ((tls_mask & TLS_GDIE) == 0
15366 && toc_symndx != 0
15367 && r_type != R_PPC64_NONE)
15368 goto again;
15369 }
15370 break;
15371
15372 case R_PPC64_TLSLD:
15373 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
15374 && rel + 1 < relend)
15375 {
15376 unsigned int insn2;
15377 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15378
15379 offset = rel->r_offset;
15380 if (is_plt_seq_reloc (r_type1))
15381 {
15382 bfd_put_32 (output_bfd, NOP, contents + offset);
15383 if (r_type1 == R_PPC64_PLT_PCREL34
15384 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15385 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15386 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15387 break;
15388 }
15389
15390 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15391 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15392
15393 if (r_type1 == R_PPC64_REL24_NOTOC
15394 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15395 {
15396 r_type = R_PPC64_NONE;
15397 insn2 = NOP;
15398 }
15399 else
15400 {
15401 rel->r_offset = offset + d_offset;
15402 r_symndx = STN_UNDEF;
15403 r_type = R_PPC64_TPREL16_LO;
15404 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15405 insn2 = 0x38630000; /* addi 3,3,0 */
15406 }
15407 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15408 /* Zap the reloc on the _tls_get_addr call too. */
15409 BFD_ASSERT (offset == rel[1].r_offset);
15410 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15411 bfd_put_32 (input_bfd, insn2, contents + offset);
15412 if (r_type != R_PPC64_NONE)
15413 goto again;
15414 }
15415 break;
15416
15417 case R_PPC64_DTPMOD64:
15418 if (rel + 1 < relend
15419 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15420 && rel[1].r_offset == rel->r_offset + 8)
15421 {
15422 if ((tls_mask & TLS_GD) == 0)
15423 {
15424 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
15425 if ((tls_mask & TLS_GDIE) != 0)
15426 r_type = R_PPC64_TPREL64;
15427 else
15428 {
15429 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15430 r_type = R_PPC64_NONE;
15431 }
15432 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15433 }
15434 }
15435 else
15436 {
15437 if ((tls_mask & TLS_LD) == 0)
15438 {
15439 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15440 r_type = R_PPC64_NONE;
15441 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15442 }
15443 }
15444 break;
15445
15446 case R_PPC64_TPREL64:
15447 if ((tls_mask & TLS_TPREL) == 0)
15448 {
15449 r_type = R_PPC64_NONE;
15450 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15451 }
15452 break;
15453
15454 case R_PPC64_ENTRY:
15455 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15456 if (!bfd_link_pic (info)
15457 && !info->traditional_format
15458 && relocation + 0x80008000 <= 0xffffffff)
15459 {
15460 unsigned int insn1, insn2;
15461
15462 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15463 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15464 if ((insn1 & ~0xfffc) == LD_R2_0R12
15465 && insn2 == ADD_R2_R2_R12)
15466 {
15467 bfd_put_32 (input_bfd,
15468 LIS_R2 + PPC_HA (relocation),
15469 contents + rel->r_offset);
15470 bfd_put_32 (input_bfd,
15471 ADDI_R2_R2 + PPC_LO (relocation),
15472 contents + rel->r_offset + 4);
15473 }
15474 }
15475 else
15476 {
15477 relocation -= (rel->r_offset
15478 + input_section->output_offset
15479 + input_section->output_section->vma);
15480 if (relocation + 0x80008000 <= 0xffffffff)
15481 {
15482 unsigned int insn1, insn2;
15483
15484 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15485 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15486 if ((insn1 & ~0xfffc) == LD_R2_0R12
15487 && insn2 == ADD_R2_R2_R12)
15488 {
15489 bfd_put_32 (input_bfd,
15490 ADDIS_R2_R12 + PPC_HA (relocation),
15491 contents + rel->r_offset);
15492 bfd_put_32 (input_bfd,
15493 ADDI_R2_R2 + PPC_LO (relocation),
15494 contents + rel->r_offset + 4);
15495 }
15496 }
15497 }
15498 break;
15499
15500 case R_PPC64_REL16_HA:
15501 /* If we are generating a non-PIC executable, edit
15502 . 0: addis 2,12,.TOC.-0b@ha
15503 . addi 2,2,.TOC.-0b@l
15504 used by ELFv2 global entry points to set up r2, to
15505 . lis 2,.TOC.@ha
15506 . addi 2,2,.TOC.@l
15507 if .TOC. is in range. */
15508 if (!bfd_link_pic (info)
15509 && !info->traditional_format
15510 && !htab->opd_abi
15511 && rel->r_addend == d_offset
15512 && h != NULL && &h->elf == htab->elf.hgot
15513 && rel + 1 < relend
15514 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15515 && rel[1].r_offset == rel->r_offset + 4
15516 && rel[1].r_addend == rel->r_addend + 4
15517 && relocation + 0x80008000 <= 0xffffffff)
15518 {
15519 unsigned int insn1, insn2;
15520 offset = rel->r_offset - d_offset;
15521 insn1 = bfd_get_32 (input_bfd, contents + offset);
15522 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15523 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15524 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15525 {
15526 r_type = R_PPC64_ADDR16_HA;
15527 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15528 rel->r_addend -= d_offset;
15529 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15530 rel[1].r_addend -= d_offset + 4;
15531 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15532 }
15533 }
15534 break;
15535 }
15536
15537 /* Handle other relocations that tweak non-addend part of insn. */
15538 insn = 0;
15539 max_br_offset = 1 << 25;
15540 addend = rel->r_addend;
15541 reloc_dest = DEST_NORMAL;
15542 switch (r_type)
15543 {
15544 default:
15545 break;
15546
15547 case R_PPC64_TOCSAVE:
15548 if (relocation + addend == (rel->r_offset
15549 + input_section->output_offset
15550 + input_section->output_section->vma)
15551 && tocsave_find (htab, NO_INSERT,
15552 &local_syms, rel, input_bfd))
15553 {
15554 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15555 if (insn == NOP
15556 || insn == CROR_151515 || insn == CROR_313131)
15557 bfd_put_32 (input_bfd,
15558 STD_R2_0R1 + STK_TOC (htab),
15559 contents + rel->r_offset);
15560 }
15561 break;
15562
15563 /* Branch taken prediction relocations. */
15564 case R_PPC64_ADDR14_BRTAKEN:
15565 case R_PPC64_REL14_BRTAKEN:
15566 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15567 /* Fall through. */
15568
15569 /* Branch not taken prediction relocations. */
15570 case R_PPC64_ADDR14_BRNTAKEN:
15571 case R_PPC64_REL14_BRNTAKEN:
15572 insn |= bfd_get_32 (input_bfd,
15573 contents + rel->r_offset) & ~(0x01 << 21);
15574 /* Fall through. */
15575
15576 case R_PPC64_REL14:
15577 max_br_offset = 1 << 15;
15578 /* Fall through. */
15579
15580 case R_PPC64_REL24:
15581 case R_PPC64_REL24_NOTOC:
15582 case R_PPC64_PLTCALL:
15583 case R_PPC64_PLTCALL_NOTOC:
15584 /* Calls to functions with a different TOC, such as calls to
15585 shared objects, need to alter the TOC pointer. This is
15586 done using a linkage stub. A REL24 branching to these
15587 linkage stubs needs to be followed by a nop, as the nop
15588 will be replaced with an instruction to restore the TOC
15589 base pointer. */
15590 fdh = h;
15591 if (h != NULL
15592 && h->oh != NULL
15593 && h->oh->is_func_descriptor)
15594 fdh = ppc_follow_link (h->oh);
15595 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15596 htab);
15597 if ((r_type == R_PPC64_PLTCALL
15598 || r_type == R_PPC64_PLTCALL_NOTOC)
15599 && stub_entry != NULL
15600 && stub_entry->stub_type >= ppc_stub_plt_call
15601 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15602 stub_entry = NULL;
15603
15604 if (stub_entry != NULL
15605 && ((stub_entry->stub_type >= ppc_stub_plt_call
15606 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15607 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15608 || stub_entry->stub_type == ppc_stub_plt_branch_both
15609 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15610 || stub_entry->stub_type == ppc_stub_long_branch_both))
15611 {
15612 bfd_boolean can_plt_call = FALSE;
15613
15614 if (stub_entry->stub_type == ppc_stub_plt_call
15615 && !htab->opd_abi
15616 && htab->params->plt_localentry0 != 0
15617 && is_elfv2_localentry0 (&h->elf))
15618 {
15619 /* The function doesn't use or change r2. */
15620 can_plt_call = TRUE;
15621 }
15622 else if (r_type == R_PPC64_REL24_NOTOC)
15623 {
15624 /* NOTOC calls don't need to restore r2. */
15625 can_plt_call = TRUE;
15626 }
15627
15628 /* All of these stubs may modify r2, so there must be a
15629 branch and link followed by a nop. The nop is
15630 replaced by an insn to restore r2. */
15631 else if (rel->r_offset + 8 <= input_section->size)
15632 {
15633 unsigned long br;
15634
15635 br = bfd_get_32 (input_bfd,
15636 contents + rel->r_offset);
15637 if ((br & 1) != 0)
15638 {
15639 unsigned long nop;
15640
15641 nop = bfd_get_32 (input_bfd,
15642 contents + rel->r_offset + 4);
15643 if (nop == LD_R2_0R1 + STK_TOC (htab))
15644 can_plt_call = TRUE;
15645 else if (nop == NOP
15646 || nop == CROR_151515
15647 || nop == CROR_313131)
15648 {
15649 if (h != NULL
15650 && is_tls_get_addr (&h->elf, htab)
15651 && htab->params->tls_get_addr_opt)
15652 {
15653 /* Special stub used, leave nop alone. */
15654 }
15655 else
15656 bfd_put_32 (input_bfd,
15657 LD_R2_0R1 + STK_TOC (htab),
15658 contents + rel->r_offset + 4);
15659 can_plt_call = TRUE;
15660 }
15661 }
15662 }
15663
15664 if (!can_plt_call && h != NULL)
15665 {
15666 const char *name = h->elf.root.root.string;
15667
15668 if (*name == '.')
15669 ++name;
15670
15671 if (strncmp (name, "__libc_start_main", 17) == 0
15672 && (name[17] == 0 || name[17] == '@'))
15673 {
15674 /* Allow crt1 branch to go via a toc adjusting
15675 stub. Other calls that never return could do
15676 the same, if we could detect such. */
15677 can_plt_call = TRUE;
15678 }
15679 }
15680
15681 if (!can_plt_call)
15682 {
15683 /* g++ as of 20130507 emits self-calls without a
15684 following nop. This is arguably wrong since we
15685 have conflicting information. On the one hand a
15686 global symbol and on the other a local call
15687 sequence, but don't error for this special case.
15688 It isn't possible to cheaply verify we have
15689 exactly such a call. Allow all calls to the same
15690 section. */
15691 asection *code_sec = sec;
15692
15693 if (get_opd_info (sec) != NULL)
15694 {
15695 bfd_vma off = (relocation + addend
15696 - sec->output_section->vma
15697 - sec->output_offset);
15698
15699 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15700 }
15701 if (code_sec == input_section)
15702 can_plt_call = TRUE;
15703 }
15704
15705 if (!can_plt_call)
15706 {
15707 if (stub_entry->stub_type >= ppc_stub_plt_call
15708 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15709 info->callbacks->einfo
15710 /* xgettext:c-format */
15711 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15712 "(plt call stub)\n"),
15713 input_bfd, input_section, rel->r_offset, sym_name);
15714 else
15715 info->callbacks->einfo
15716 /* xgettext:c-format */
15717 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15718 "(toc save/adjust stub)\n"),
15719 input_bfd, input_section, rel->r_offset, sym_name);
15720
15721 bfd_set_error (bfd_error_bad_value);
15722 ret = FALSE;
15723 }
15724
15725 if (can_plt_call
15726 && stub_entry->stub_type >= ppc_stub_plt_call
15727 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15728 unresolved_reloc = FALSE;
15729 }
15730
15731 if ((stub_entry == NULL
15732 || stub_entry->stub_type == ppc_stub_long_branch
15733 || stub_entry->stub_type == ppc_stub_plt_branch)
15734 && get_opd_info (sec) != NULL)
15735 {
15736 /* The branch destination is the value of the opd entry. */
15737 bfd_vma off = (relocation + addend
15738 - sec->output_section->vma
15739 - sec->output_offset);
15740 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15741 if (dest != (bfd_vma) -1)
15742 {
15743 relocation = dest;
15744 addend = 0;
15745 reloc_dest = DEST_OPD;
15746 }
15747 }
15748
15749 /* If the branch is out of reach we ought to have a long
15750 branch stub. */
15751 from = (rel->r_offset
15752 + input_section->output_offset
15753 + input_section->output_section->vma);
15754
15755 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15756 ? fdh->elf.other
15757 : sym->st_other);
15758
15759 if (stub_entry != NULL
15760 && (stub_entry->stub_type == ppc_stub_long_branch
15761 || stub_entry->stub_type == ppc_stub_plt_branch)
15762 && (r_type == R_PPC64_ADDR14_BRTAKEN
15763 || r_type == R_PPC64_ADDR14_BRNTAKEN
15764 || (relocation + addend - from + max_br_offset
15765 < 2 * max_br_offset)))
15766 /* Don't use the stub if this branch is in range. */
15767 stub_entry = NULL;
15768
15769 if (stub_entry != NULL
15770 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15771 || stub_entry->stub_type == ppc_stub_long_branch_both
15772 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15773 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15774 && (r_type != R_PPC64_REL24_NOTOC
15775 || ((fdh ? fdh->elf.other : sym->st_other)
15776 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15777 && (relocation + addend - from + max_br_offset
15778 < 2 * max_br_offset))
15779 stub_entry = NULL;
15780
15781 if (stub_entry != NULL
15782 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15783 || stub_entry->stub_type == ppc_stub_long_branch_both
15784 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15785 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15786 && r_type == R_PPC64_REL24_NOTOC
15787 && (relocation + addend - from + max_br_offset
15788 < 2 * max_br_offset))
15789 stub_entry = NULL;
15790
15791 if (stub_entry != NULL)
15792 {
15793 /* Munge up the value and addend so that we call the stub
15794 rather than the procedure directly. */
15795 asection *stub_sec = stub_entry->group->stub_sec;
15796
15797 if (stub_entry->stub_type == ppc_stub_save_res)
15798 relocation += (stub_sec->output_offset
15799 + stub_sec->output_section->vma
15800 + stub_sec->size - htab->sfpr->size
15801 - htab->sfpr->output_offset
15802 - htab->sfpr->output_section->vma);
15803 else
15804 relocation = (stub_entry->stub_offset
15805 + stub_sec->output_offset
15806 + stub_sec->output_section->vma);
15807 addend = 0;
15808 reloc_dest = DEST_STUB;
15809
15810 if (((stub_entry->stub_type == ppc_stub_plt_call
15811 && ALWAYS_EMIT_R2SAVE)
15812 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15813 || stub_entry->stub_type == ppc_stub_plt_call_both)
15814 && !(h != NULL
15815 && is_tls_get_addr (&h->elf, htab)
15816 && htab->params->tls_get_addr_opt)
15817 && rel + 1 < relend
15818 && rel[1].r_offset == rel->r_offset + 4
15819 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15820 relocation += 4;
15821 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15822 || stub_entry->stub_type == ppc_stub_plt_branch_both
15823 || stub_entry->stub_type == ppc_stub_plt_call_both)
15824 && r_type == R_PPC64_REL24_NOTOC)
15825 relocation += 4;
15826
15827 if (r_type == R_PPC64_REL24_NOTOC
15828 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15829 || stub_entry->stub_type == ppc_stub_plt_call_both))
15830 htab->notoc_plt = 1;
15831 }
15832
15833 if (insn != 0)
15834 {
15835 if (is_isa_v2)
15836 {
15837 /* Set 'a' bit. This is 0b00010 in BO field for branch
15838 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15839 for branch on CTR insns (BO == 1a00t or 1a01t). */
15840 if ((insn & (0x14 << 21)) == (0x04 << 21))
15841 insn |= 0x02 << 21;
15842 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15843 insn |= 0x08 << 21;
15844 else
15845 break;
15846 }
15847 else
15848 {
15849 /* Invert 'y' bit if not the default. */
15850 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15851 insn ^= 0x01 << 21;
15852 }
15853
15854 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15855 }
15856
15857 /* NOP out calls to undefined weak functions.
15858 We can thus call a weak function without first
15859 checking whether the function is defined. */
15860 else if (h != NULL
15861 && h->elf.root.type == bfd_link_hash_undefweak
15862 && h->elf.dynindx == -1
15863 && (r_type == R_PPC64_REL24
15864 || r_type == R_PPC64_REL24_NOTOC)
15865 && relocation == 0
15866 && addend == 0)
15867 {
15868 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15869 goto copy_reloc;
15870 }
15871 break;
15872
15873 case R_PPC64_GOT16_DS:
15874 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15875 break;
15876 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15877 if (relocation + addend - from + 0x8000 < 0x10000
15878 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15879 {
15880 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15881 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15882 {
15883 insn += (14u << 26) - (58u << 26);
15884 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15885 r_type = R_PPC64_TOC16;
15886 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15887 }
15888 }
15889 break;
15890
15891 case R_PPC64_GOT16_LO_DS:
15892 case R_PPC64_GOT16_HA:
15893 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15894 break;
15895 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15896 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15897 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15898 {
15899 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15900 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15901 {
15902 insn += (14u << 26) - (58u << 26);
15903 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15904 r_type = R_PPC64_TOC16_LO;
15905 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15906 }
15907 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
15908 {
15909 r_type = R_PPC64_TOC16_HA;
15910 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15911 }
15912 }
15913 break;
15914
15915 case R_PPC64_GOT_PCREL34:
15916 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15917 break;
15918 from = (rel->r_offset
15919 + input_section->output_section->vma
15920 + input_section->output_offset);
15921 if (relocation - from + (1ULL << 33) < 1ULL << 34
15922 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15923 {
15924 offset = rel->r_offset;
15925 pinsn = bfd_get_32 (input_bfd, contents + offset);
15926 pinsn <<= 32;
15927 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15928 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15929 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15930 {
15931 /* Replace with paddi. */
15932 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15933 r_type = R_PPC64_PCREL34;
15934 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15935 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15936 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15937 goto pcrelopt;
15938 }
15939 }
15940 break;
15941
15942 case R_PPC64_PCREL34:
15943 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15944 {
15945 offset = rel->r_offset;
15946 pinsn = bfd_get_32 (input_bfd, contents + offset);
15947 pinsn <<= 32;
15948 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15949 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15950 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15951 | (14ULL << 26) /* paddi */))
15952 {
15953 pcrelopt:
15954 if (rel + 1 < relend
15955 && rel[1].r_offset == offset
15956 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15957 {
15958 bfd_vma off2 = rel[1].r_addend;
15959 if (off2 == 0)
15960 /* zero means next insn. */
15961 off2 = 8;
15962 off2 += offset;
15963 if (off2 + 4 <= input_section->size)
15964 {
15965 uint64_t pinsn2;
15966 bfd_signed_vma addend_off;
15967 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15968 pinsn2 <<= 32;
15969 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15970 {
15971 if (off2 + 8 > input_section->size)
15972 break;
15973 pinsn2 |= bfd_get_32 (input_bfd,
15974 contents + off2 + 4);
15975 }
15976 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15977 {
15978 addend += addend_off;
15979 rel->r_addend = addend;
15980 bfd_put_32 (input_bfd, pinsn >> 32,
15981 contents + offset);
15982 bfd_put_32 (input_bfd, pinsn,
15983 contents + offset + 4);
15984 bfd_put_32 (input_bfd, pinsn2 >> 32,
15985 contents + off2);
15986 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15987 bfd_put_32 (input_bfd, pinsn2,
15988 contents + off2 + 4);
15989 }
15990 }
15991 }
15992 }
15993 }
15994 break;
15995 }
15996
15997 tls_type = 0;
15998 save_unresolved_reloc = unresolved_reloc;
15999 switch (r_type)
16000 {
16001 default:
16002 /* xgettext:c-format */
16003 _bfd_error_handler (_("%pB: %s unsupported"),
16004 input_bfd, ppc64_elf_howto_table[r_type]->name);
16005
16006 bfd_set_error (bfd_error_bad_value);
16007 ret = FALSE;
16008 goto copy_reloc;
16009
16010 case R_PPC64_NONE:
16011 case R_PPC64_TLS:
16012 case R_PPC64_TLSGD:
16013 case R_PPC64_TLSLD:
16014 case R_PPC64_TOCSAVE:
16015 case R_PPC64_GNU_VTINHERIT:
16016 case R_PPC64_GNU_VTENTRY:
16017 case R_PPC64_ENTRY:
16018 case R_PPC64_PCREL_OPT:
16019 goto copy_reloc;
16020
16021 /* GOT16 relocations. Like an ADDR16 using the symbol's
16022 address in the GOT as relocation value instead of the
16023 symbol's value itself. Also, create a GOT entry for the
16024 symbol and put the symbol value there. */
16025 case R_PPC64_GOT_TLSGD16:
16026 case R_PPC64_GOT_TLSGD16_LO:
16027 case R_PPC64_GOT_TLSGD16_HI:
16028 case R_PPC64_GOT_TLSGD16_HA:
16029 case R_PPC64_GOT_TLSGD34:
16030 tls_type = TLS_TLS | TLS_GD;
16031 goto dogot;
16032
16033 case R_PPC64_GOT_TLSLD16:
16034 case R_PPC64_GOT_TLSLD16_LO:
16035 case R_PPC64_GOT_TLSLD16_HI:
16036 case R_PPC64_GOT_TLSLD16_HA:
16037 case R_PPC64_GOT_TLSLD34:
16038 tls_type = TLS_TLS | TLS_LD;
16039 goto dogot;
16040
16041 case R_PPC64_GOT_TPREL16_DS:
16042 case R_PPC64_GOT_TPREL16_LO_DS:
16043 case R_PPC64_GOT_TPREL16_HI:
16044 case R_PPC64_GOT_TPREL16_HA:
16045 case R_PPC64_GOT_TPREL34:
16046 tls_type = TLS_TLS | TLS_TPREL;
16047 goto dogot;
16048
16049 case R_PPC64_GOT_DTPREL16_DS:
16050 case R_PPC64_GOT_DTPREL16_LO_DS:
16051 case R_PPC64_GOT_DTPREL16_HI:
16052 case R_PPC64_GOT_DTPREL16_HA:
16053 case R_PPC64_GOT_DTPREL34:
16054 tls_type = TLS_TLS | TLS_DTPREL;
16055 goto dogot;
16056
16057 case R_PPC64_GOT16:
16058 case R_PPC64_GOT16_LO:
16059 case R_PPC64_GOT16_HI:
16060 case R_PPC64_GOT16_HA:
16061 case R_PPC64_GOT16_DS:
16062 case R_PPC64_GOT16_LO_DS:
16063 case R_PPC64_GOT_PCREL34:
16064 dogot:
16065 {
16066 /* Relocation is to the entry for this symbol in the global
16067 offset table. */
16068 asection *got;
16069 bfd_vma *offp;
16070 bfd_vma off;
16071 unsigned long indx = 0;
16072 struct got_entry *ent;
16073
16074 if (tls_type == (TLS_TLS | TLS_LD)
16075 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
16076 ent = ppc64_tlsld_got (input_bfd);
16077 else
16078 {
16079 if (h != NULL)
16080 {
16081 if (!htab->elf.dynamic_sections_created
16082 || h->elf.dynindx == -1
16083 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16084 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16085 /* This is actually a static link, or it is a
16086 -Bsymbolic link and the symbol is defined
16087 locally, or the symbol was forced to be local
16088 because of a version file. */
16089 ;
16090 else
16091 {
16092 indx = h->elf.dynindx;
16093 unresolved_reloc = FALSE;
16094 }
16095 ent = h->elf.got.glist;
16096 }
16097 else
16098 {
16099 if (local_got_ents == NULL)
16100 abort ();
16101 ent = local_got_ents[r_symndx];
16102 }
16103
16104 for (; ent != NULL; ent = ent->next)
16105 if (ent->addend == orig_rel.r_addend
16106 && ent->owner == input_bfd
16107 && ent->tls_type == tls_type)
16108 break;
16109 }
16110
16111 if (ent == NULL)
16112 abort ();
16113 if (ent->is_indirect)
16114 ent = ent->got.ent;
16115 offp = &ent->got.offset;
16116 got = ppc64_elf_tdata (ent->owner)->got;
16117 if (got == NULL)
16118 abort ();
16119
16120 /* The offset must always be a multiple of 8. We use the
16121 least significant bit to record whether we have already
16122 processed this entry. */
16123 off = *offp;
16124 if ((off & 1) != 0)
16125 off &= ~1;
16126 else
16127 {
16128 /* Generate relocs for the dynamic linker, except in
16129 the case of TLSLD where we'll use one entry per
16130 module. */
16131 asection *relgot;
16132 bfd_boolean ifunc;
16133
16134 *offp = off | 1;
16135 relgot = NULL;
16136 ifunc = (h != NULL
16137 ? h->elf.type == STT_GNU_IFUNC
16138 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
16139 if (ifunc)
16140 {
16141 relgot = htab->elf.irelplt;
16142 if (indx == 0)
16143 htab->local_ifunc_resolver = 1;
16144 else if (is_static_defined (&h->elf))
16145 htab->maybe_local_ifunc_resolver = 1;
16146 }
16147 else if (indx != 0
16148 || (bfd_link_pic (info)
16149 && (h == NULL
16150 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16151 && !(tls_type != 0
16152 && bfd_link_executable (info)
16153 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
16154 relgot = ppc64_elf_tdata (ent->owner)->relgot;
16155 if (relgot != NULL)
16156 {
16157 outrel.r_offset = (got->output_section->vma
16158 + got->output_offset
16159 + off);
16160 outrel.r_addend = orig_rel.r_addend;
16161 if (tls_type & (TLS_LD | TLS_GD))
16162 {
16163 outrel.r_addend = 0;
16164 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
16165 if (tls_type == (TLS_TLS | TLS_GD))
16166 {
16167 loc = relgot->contents;
16168 loc += (relgot->reloc_count++
16169 * sizeof (Elf64_External_Rela));
16170 bfd_elf64_swap_reloca_out (output_bfd,
16171 &outrel, loc);
16172 outrel.r_offset += 8;
16173 outrel.r_addend = orig_rel.r_addend;
16174 outrel.r_info
16175 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16176 }
16177 }
16178 else if (tls_type == (TLS_TLS | TLS_DTPREL))
16179 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16180 else if (tls_type == (TLS_TLS | TLS_TPREL))
16181 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
16182 else if (indx != 0)
16183 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16184 else
16185 {
16186 if (ifunc)
16187 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16188 else
16189 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16190
16191 /* Write the .got section contents for the sake
16192 of prelink. */
16193 loc = got->contents + off;
16194 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16195 loc);
16196 }
16197
16198 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
16199 {
16200 outrel.r_addend += relocation;
16201 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
16202 {
16203 if (htab->elf.tls_sec == NULL)
16204 outrel.r_addend = 0;
16205 else
16206 outrel.r_addend -= htab->elf.tls_sec->vma;
16207 }
16208 }
16209 loc = relgot->contents;
16210 loc += (relgot->reloc_count++
16211 * sizeof (Elf64_External_Rela));
16212 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16213 }
16214
16215 /* Init the .got section contents here if we're not
16216 emitting a reloc. */
16217 else
16218 {
16219 relocation += orig_rel.r_addend;
16220 if (tls_type != 0)
16221 {
16222 if (htab->elf.tls_sec == NULL)
16223 relocation = 0;
16224 else
16225 {
16226 if (tls_type & TLS_LD)
16227 relocation = 0;
16228 else
16229 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
16230 if (tls_type & TLS_TPREL)
16231 relocation += DTP_OFFSET - TP_OFFSET;
16232 }
16233
16234 if (tls_type & (TLS_GD | TLS_LD))
16235 {
16236 bfd_put_64 (output_bfd, relocation,
16237 got->contents + off + 8);
16238 relocation = 1;
16239 }
16240 }
16241 bfd_put_64 (output_bfd, relocation,
16242 got->contents + off);
16243 }
16244 }
16245
16246 if (off >= (bfd_vma) -2)
16247 abort ();
16248
16249 relocation = got->output_section->vma + got->output_offset + off;
16250 addend = 0;
16251 if (!(r_type == R_PPC64_GOT_PCREL34
16252 || r_type == R_PPC64_GOT_TLSGD34
16253 || r_type == R_PPC64_GOT_TLSLD34
16254 || r_type == R_PPC64_GOT_TPREL34
16255 || r_type == R_PPC64_GOT_DTPREL34))
16256 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
16257 }
16258 break;
16259
16260 case R_PPC64_PLT16_HA:
16261 case R_PPC64_PLT16_HI:
16262 case R_PPC64_PLT16_LO:
16263 case R_PPC64_PLT16_LO_DS:
16264 case R_PPC64_PLT_PCREL34:
16265 case R_PPC64_PLT_PCREL34_NOTOC:
16266 case R_PPC64_PLT32:
16267 case R_PPC64_PLT64:
16268 case R_PPC64_PLTSEQ:
16269 case R_PPC64_PLTSEQ_NOTOC:
16270 case R_PPC64_PLTCALL:
16271 case R_PPC64_PLTCALL_NOTOC:
16272 /* Relocation is to the entry for this symbol in the
16273 procedure linkage table. */
16274 unresolved_reloc = TRUE;
16275 {
16276 struct plt_entry **plt_list = NULL;
16277 if (h != NULL)
16278 plt_list = &h->elf.plt.plist;
16279 else if (local_got_ents != NULL)
16280 {
16281 struct plt_entry **local_plt = (struct plt_entry **)
16282 (local_got_ents + symtab_hdr->sh_info);
16283 plt_list = local_plt + r_symndx;
16284 }
16285 if (plt_list)
16286 {
16287 struct plt_entry *ent;
16288
16289 for (ent = *plt_list; ent != NULL; ent = ent->next)
16290 if (ent->plt.offset != (bfd_vma) -1
16291 && ent->addend == orig_rel.r_addend)
16292 {
16293 asection *plt;
16294 bfd_vma got;
16295
16296 plt = htab->elf.splt;
16297 if (!htab->elf.dynamic_sections_created
16298 || h == NULL
16299 || h->elf.dynindx == -1)
16300 {
16301 if (h != NULL
16302 ? h->elf.type == STT_GNU_IFUNC
16303 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16304 plt = htab->elf.iplt;
16305 else
16306 plt = htab->pltlocal;
16307 }
16308 relocation = (plt->output_section->vma
16309 + plt->output_offset
16310 + ent->plt.offset);
16311 if (r_type == R_PPC64_PLT16_HA
16312 || r_type == R_PPC64_PLT16_HI
16313 || r_type == R_PPC64_PLT16_LO
16314 || r_type == R_PPC64_PLT16_LO_DS)
16315 {
16316 got = (elf_gp (output_bfd)
16317 + htab->sec_info[input_section->id].toc_off);
16318 relocation -= got;
16319 }
16320 addend = 0;
16321 unresolved_reloc = FALSE;
16322 break;
16323 }
16324 }
16325 }
16326 break;
16327
16328 case R_PPC64_TOC:
16329 /* Relocation value is TOC base. */
16330 relocation = TOCstart;
16331 if (r_symndx == STN_UNDEF)
16332 relocation += htab->sec_info[input_section->id].toc_off;
16333 else if (unresolved_reloc)
16334 ;
16335 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16336 relocation += htab->sec_info[sec->id].toc_off;
16337 else
16338 unresolved_reloc = TRUE;
16339 goto dodyn;
16340
16341 /* TOC16 relocs. We want the offset relative to the TOC base,
16342 which is the address of the start of the TOC plus 0x8000.
16343 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16344 in this order. */
16345 case R_PPC64_TOC16:
16346 case R_PPC64_TOC16_LO:
16347 case R_PPC64_TOC16_HI:
16348 case R_PPC64_TOC16_DS:
16349 case R_PPC64_TOC16_LO_DS:
16350 case R_PPC64_TOC16_HA:
16351 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
16352 if (h != NULL)
16353 goto dodyn;
16354 break;
16355
16356 /* Relocate against the beginning of the section. */
16357 case R_PPC64_SECTOFF:
16358 case R_PPC64_SECTOFF_LO:
16359 case R_PPC64_SECTOFF_HI:
16360 case R_PPC64_SECTOFF_DS:
16361 case R_PPC64_SECTOFF_LO_DS:
16362 case R_PPC64_SECTOFF_HA:
16363 if (sec != NULL)
16364 addend -= sec->output_section->vma;
16365 break;
16366
16367 case R_PPC64_REL16:
16368 case R_PPC64_REL16_LO:
16369 case R_PPC64_REL16_HI:
16370 case R_PPC64_REL16_HA:
16371 case R_PPC64_REL16_HIGH:
16372 case R_PPC64_REL16_HIGHA:
16373 case R_PPC64_REL16_HIGHER:
16374 case R_PPC64_REL16_HIGHERA:
16375 case R_PPC64_REL16_HIGHEST:
16376 case R_PPC64_REL16_HIGHESTA:
16377 case R_PPC64_REL16_HIGHER34:
16378 case R_PPC64_REL16_HIGHERA34:
16379 case R_PPC64_REL16_HIGHEST34:
16380 case R_PPC64_REL16_HIGHESTA34:
16381 case R_PPC64_REL16DX_HA:
16382 case R_PPC64_REL14:
16383 case R_PPC64_REL14_BRNTAKEN:
16384 case R_PPC64_REL14_BRTAKEN:
16385 case R_PPC64_REL24:
16386 case R_PPC64_REL24_NOTOC:
16387 case R_PPC64_PCREL34:
16388 case R_PPC64_PCREL28:
16389 break;
16390
16391 case R_PPC64_TPREL16:
16392 case R_PPC64_TPREL16_LO:
16393 case R_PPC64_TPREL16_HI:
16394 case R_PPC64_TPREL16_HA:
16395 case R_PPC64_TPREL16_DS:
16396 case R_PPC64_TPREL16_LO_DS:
16397 case R_PPC64_TPREL16_HIGH:
16398 case R_PPC64_TPREL16_HIGHA:
16399 case R_PPC64_TPREL16_HIGHER:
16400 case R_PPC64_TPREL16_HIGHERA:
16401 case R_PPC64_TPREL16_HIGHEST:
16402 case R_PPC64_TPREL16_HIGHESTA:
16403 case R_PPC64_TPREL34:
16404 if (h != NULL
16405 && h->elf.root.type == bfd_link_hash_undefweak
16406 && h->elf.dynindx == -1)
16407 {
16408 /* Make this relocation against an undefined weak symbol
16409 resolve to zero. This is really just a tweak, since
16410 code using weak externs ought to check that they are
16411 defined before using them. */
16412 bfd_byte *p = contents + rel->r_offset - d_offset;
16413
16414 insn = bfd_get_32 (input_bfd, p);
16415 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16416 if (insn != 0)
16417 bfd_put_32 (input_bfd, insn, p);
16418 break;
16419 }
16420 if (htab->elf.tls_sec != NULL)
16421 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16422 /* The TPREL16 relocs shouldn't really be used in shared
16423 libs or with non-local symbols as that will result in
16424 DT_TEXTREL being set, but support them anyway. */
16425 goto dodyn;
16426
16427 case R_PPC64_DTPREL16:
16428 case R_PPC64_DTPREL16_LO:
16429 case R_PPC64_DTPREL16_HI:
16430 case R_PPC64_DTPREL16_HA:
16431 case R_PPC64_DTPREL16_DS:
16432 case R_PPC64_DTPREL16_LO_DS:
16433 case R_PPC64_DTPREL16_HIGH:
16434 case R_PPC64_DTPREL16_HIGHA:
16435 case R_PPC64_DTPREL16_HIGHER:
16436 case R_PPC64_DTPREL16_HIGHERA:
16437 case R_PPC64_DTPREL16_HIGHEST:
16438 case R_PPC64_DTPREL16_HIGHESTA:
16439 case R_PPC64_DTPREL34:
16440 if (htab->elf.tls_sec != NULL)
16441 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16442 break;
16443
16444 case R_PPC64_ADDR64_LOCAL:
16445 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16446 ? h->elf.other
16447 : sym->st_other);
16448 break;
16449
16450 case R_PPC64_DTPMOD64:
16451 relocation = 1;
16452 addend = 0;
16453 goto dodyn;
16454
16455 case R_PPC64_TPREL64:
16456 if (htab->elf.tls_sec != NULL)
16457 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16458 goto dodyn;
16459
16460 case R_PPC64_DTPREL64:
16461 if (htab->elf.tls_sec != NULL)
16462 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16463 /* Fall through. */
16464
16465 /* Relocations that may need to be propagated if this is a
16466 dynamic object. */
16467 case R_PPC64_REL30:
16468 case R_PPC64_REL32:
16469 case R_PPC64_REL64:
16470 case R_PPC64_ADDR14:
16471 case R_PPC64_ADDR14_BRNTAKEN:
16472 case R_PPC64_ADDR14_BRTAKEN:
16473 case R_PPC64_ADDR16:
16474 case R_PPC64_ADDR16_DS:
16475 case R_PPC64_ADDR16_HA:
16476 case R_PPC64_ADDR16_HI:
16477 case R_PPC64_ADDR16_HIGH:
16478 case R_PPC64_ADDR16_HIGHA:
16479 case R_PPC64_ADDR16_HIGHER:
16480 case R_PPC64_ADDR16_HIGHERA:
16481 case R_PPC64_ADDR16_HIGHEST:
16482 case R_PPC64_ADDR16_HIGHESTA:
16483 case R_PPC64_ADDR16_LO:
16484 case R_PPC64_ADDR16_LO_DS:
16485 case R_PPC64_ADDR16_HIGHER34:
16486 case R_PPC64_ADDR16_HIGHERA34:
16487 case R_PPC64_ADDR16_HIGHEST34:
16488 case R_PPC64_ADDR16_HIGHESTA34:
16489 case R_PPC64_ADDR24:
16490 case R_PPC64_ADDR32:
16491 case R_PPC64_ADDR64:
16492 case R_PPC64_UADDR16:
16493 case R_PPC64_UADDR32:
16494 case R_PPC64_UADDR64:
16495 case R_PPC64_D34:
16496 case R_PPC64_D34_LO:
16497 case R_PPC64_D34_HI30:
16498 case R_PPC64_D34_HA30:
16499 case R_PPC64_D28:
16500 dodyn:
16501 if ((input_section->flags & SEC_ALLOC) == 0)
16502 break;
16503
16504 if (NO_OPD_RELOCS && is_opd)
16505 break;
16506
16507 if (bfd_link_pic (info)
16508 ? ((h == NULL
16509 || h->elf.dyn_relocs != NULL)
16510 && ((h != NULL && pc_dynrelocs (h))
16511 || must_be_dyn_reloc (info, r_type)))
16512 : (h != NULL
16513 ? h->elf.dyn_relocs != NULL
16514 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16515 {
16516 bfd_boolean skip, relocate;
16517 asection *sreloc;
16518 bfd_vma out_off;
16519 long indx = 0;
16520
16521 /* When generating a dynamic object, these relocations
16522 are copied into the output file to be resolved at run
16523 time. */
16524
16525 skip = FALSE;
16526 relocate = FALSE;
16527
16528 out_off = _bfd_elf_section_offset (output_bfd, info,
16529 input_section, rel->r_offset);
16530 if (out_off == (bfd_vma) -1)
16531 skip = TRUE;
16532 else if (out_off == (bfd_vma) -2)
16533 skip = TRUE, relocate = TRUE;
16534 out_off += (input_section->output_section->vma
16535 + input_section->output_offset);
16536 outrel.r_offset = out_off;
16537 outrel.r_addend = rel->r_addend;
16538
16539 /* Optimize unaligned reloc use. */
16540 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16541 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16542 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16543 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16544 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16545 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16546 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16547 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16548 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16549
16550 if (skip)
16551 memset (&outrel, 0, sizeof outrel);
16552 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16553 && !is_opd
16554 && r_type != R_PPC64_TOC)
16555 {
16556 indx = h->elf.dynindx;
16557 BFD_ASSERT (indx != -1);
16558 outrel.r_info = ELF64_R_INFO (indx, r_type);
16559 }
16560 else
16561 {
16562 /* This symbol is local, or marked to become local,
16563 or this is an opd section reloc which must point
16564 at a local function. */
16565 outrel.r_addend += relocation;
16566 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16567 {
16568 if (is_opd && h != NULL)
16569 {
16570 /* Lie about opd entries. This case occurs
16571 when building shared libraries and we
16572 reference a function in another shared
16573 lib. The same thing happens for a weak
16574 definition in an application that's
16575 overridden by a strong definition in a
16576 shared lib. (I believe this is a generic
16577 bug in binutils handling of weak syms.)
16578 In these cases we won't use the opd
16579 entry in this lib. */
16580 unresolved_reloc = FALSE;
16581 }
16582 if (!is_opd
16583 && r_type == R_PPC64_ADDR64
16584 && (h != NULL
16585 ? h->elf.type == STT_GNU_IFUNC
16586 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16587 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16588 else
16589 {
16590 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16591
16592 /* We need to relocate .opd contents for ld.so.
16593 Prelink also wants simple and consistent rules
16594 for relocs. This make all RELATIVE relocs have
16595 *r_offset equal to r_addend. */
16596 relocate = TRUE;
16597 }
16598 }
16599 else
16600 {
16601 if (h != NULL
16602 ? h->elf.type == STT_GNU_IFUNC
16603 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16604 {
16605 info->callbacks->einfo
16606 /* xgettext:c-format */
16607 (_("%H: %s for indirect "
16608 "function `%pT' unsupported\n"),
16609 input_bfd, input_section, rel->r_offset,
16610 ppc64_elf_howto_table[r_type]->name,
16611 sym_name);
16612 ret = FALSE;
16613 }
16614 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16615 ;
16616 else if (sec == NULL || sec->owner == NULL)
16617 {
16618 bfd_set_error (bfd_error_bad_value);
16619 return FALSE;
16620 }
16621 else
16622 {
16623 asection *osec = sec->output_section;
16624
16625 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16626 {
16627 /* TLS symbol values are relative to the
16628 TLS segment. Dynamic relocations for
16629 local TLS symbols therefore can't be
16630 reduced to a relocation against their
16631 section symbol because it holds the
16632 address of the section, not a value
16633 relative to the TLS segment. We could
16634 change the .tdata dynamic section symbol
16635 to be zero value but STN_UNDEF works
16636 and is used elsewhere, eg. for TPREL64
16637 GOT relocs against local TLS symbols. */
16638 osec = htab->elf.tls_sec;
16639 indx = 0;
16640 }
16641 else
16642 {
16643 indx = elf_section_data (osec)->dynindx;
16644 if (indx == 0)
16645 {
16646 if ((osec->flags & SEC_READONLY) == 0
16647 && htab->elf.data_index_section != NULL)
16648 osec = htab->elf.data_index_section;
16649 else
16650 osec = htab->elf.text_index_section;
16651 indx = elf_section_data (osec)->dynindx;
16652 }
16653 BFD_ASSERT (indx != 0);
16654 }
16655
16656 /* We are turning this relocation into one
16657 against a section symbol, so subtract out
16658 the output section's address but not the
16659 offset of the input section in the output
16660 section. */
16661 outrel.r_addend -= osec->vma;
16662 }
16663
16664 outrel.r_info = ELF64_R_INFO (indx, r_type);
16665 }
16666 }
16667
16668 sreloc = elf_section_data (input_section)->sreloc;
16669 if (h != NULL
16670 ? h->elf.type == STT_GNU_IFUNC
16671 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16672 {
16673 sreloc = htab->elf.irelplt;
16674 if (indx == 0)
16675 htab->local_ifunc_resolver = 1;
16676 else if (is_static_defined (&h->elf))
16677 htab->maybe_local_ifunc_resolver = 1;
16678 }
16679 if (sreloc == NULL)
16680 abort ();
16681
16682 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16683 >= sreloc->size)
16684 abort ();
16685 loc = sreloc->contents;
16686 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16687 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16688
16689 if (!warned_dynamic
16690 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16691 {
16692 info->callbacks->einfo
16693 /* xgettext:c-format */
16694 (_("%X%P: %pB: %s against %pT "
16695 "is not supported by glibc as a dynamic relocation\n"),
16696 input_bfd,
16697 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16698 sym_name);
16699 warned_dynamic = TRUE;
16700 }
16701
16702 /* If this reloc is against an external symbol, it will
16703 be computed at runtime, so there's no need to do
16704 anything now. However, for the sake of prelink ensure
16705 that the section contents are a known value. */
16706 if (!relocate)
16707 {
16708 unresolved_reloc = FALSE;
16709 /* The value chosen here is quite arbitrary as ld.so
16710 ignores section contents except for the special
16711 case of .opd where the contents might be accessed
16712 before relocation. Choose zero, as that won't
16713 cause reloc overflow. */
16714 relocation = 0;
16715 addend = 0;
16716 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16717 to improve backward compatibility with older
16718 versions of ld. */
16719 if (r_type == R_PPC64_ADDR64)
16720 addend = outrel.r_addend;
16721 /* Adjust pc_relative relocs to have zero in *r_offset. */
16722 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16723 addend = outrel.r_offset;
16724 }
16725 }
16726 break;
16727
16728 case R_PPC64_COPY:
16729 case R_PPC64_GLOB_DAT:
16730 case R_PPC64_JMP_SLOT:
16731 case R_PPC64_JMP_IREL:
16732 case R_PPC64_RELATIVE:
16733 /* We shouldn't ever see these dynamic relocs in relocatable
16734 files. */
16735 /* Fall through. */
16736
16737 case R_PPC64_PLTGOT16:
16738 case R_PPC64_PLTGOT16_DS:
16739 case R_PPC64_PLTGOT16_HA:
16740 case R_PPC64_PLTGOT16_HI:
16741 case R_PPC64_PLTGOT16_LO:
16742 case R_PPC64_PLTGOT16_LO_DS:
16743 case R_PPC64_PLTREL32:
16744 case R_PPC64_PLTREL64:
16745 /* These ones haven't been implemented yet. */
16746
16747 info->callbacks->einfo
16748 /* xgettext:c-format */
16749 (_("%P: %pB: %s is not supported for `%pT'\n"),
16750 input_bfd,
16751 ppc64_elf_howto_table[r_type]->name, sym_name);
16752
16753 bfd_set_error (bfd_error_invalid_operation);
16754 ret = FALSE;
16755 goto copy_reloc;
16756 }
16757
16758 /* Multi-instruction sequences that access the TOC can be
16759 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16760 to nop; addi rb,r2,x; */
16761 switch (r_type)
16762 {
16763 default:
16764 break;
16765
16766 case R_PPC64_GOT_TLSLD16_HI:
16767 case R_PPC64_GOT_TLSGD16_HI:
16768 case R_PPC64_GOT_TPREL16_HI:
16769 case R_PPC64_GOT_DTPREL16_HI:
16770 case R_PPC64_GOT16_HI:
16771 case R_PPC64_TOC16_HI:
16772 /* These relocs would only be useful if building up an
16773 offset to later add to r2, perhaps in an indexed
16774 addressing mode instruction. Don't try to optimize.
16775 Unfortunately, the possibility of someone building up an
16776 offset like this or even with the HA relocs, means that
16777 we need to check the high insn when optimizing the low
16778 insn. */
16779 break;
16780
16781 case R_PPC64_PLTCALL_NOTOC:
16782 if (!unresolved_reloc)
16783 htab->notoc_plt = 1;
16784 /* Fall through. */
16785 case R_PPC64_PLTCALL:
16786 if (unresolved_reloc)
16787 {
16788 /* No plt entry. Make this into a direct call. */
16789 bfd_byte *p = contents + rel->r_offset;
16790 insn = bfd_get_32 (input_bfd, p);
16791 insn &= 1;
16792 bfd_put_32 (input_bfd, B_DOT | insn, p);
16793 if (r_type == R_PPC64_PLTCALL)
16794 bfd_put_32 (input_bfd, NOP, p + 4);
16795 unresolved_reloc = save_unresolved_reloc;
16796 r_type = R_PPC64_REL24;
16797 }
16798 break;
16799
16800 case R_PPC64_PLTSEQ_NOTOC:
16801 case R_PPC64_PLTSEQ:
16802 if (unresolved_reloc)
16803 {
16804 unresolved_reloc = FALSE;
16805 goto nop_it;
16806 }
16807 break;
16808
16809 case R_PPC64_PLT_PCREL34_NOTOC:
16810 if (!unresolved_reloc)
16811 htab->notoc_plt = 1;
16812 /* Fall through. */
16813 case R_PPC64_PLT_PCREL34:
16814 if (unresolved_reloc)
16815 {
16816 bfd_byte *p = contents + rel->r_offset;
16817 bfd_put_32 (input_bfd, PNOP >> 32, p);
16818 bfd_put_32 (input_bfd, PNOP, p + 4);
16819 unresolved_reloc = FALSE;
16820 goto copy_reloc;
16821 }
16822 break;
16823
16824 case R_PPC64_PLT16_HA:
16825 if (unresolved_reloc)
16826 {
16827 unresolved_reloc = FALSE;
16828 goto nop_it;
16829 }
16830 /* Fall through. */
16831 case R_PPC64_GOT_TLSLD16_HA:
16832 case R_PPC64_GOT_TLSGD16_HA:
16833 case R_PPC64_GOT_TPREL16_HA:
16834 case R_PPC64_GOT_DTPREL16_HA:
16835 case R_PPC64_GOT16_HA:
16836 case R_PPC64_TOC16_HA:
16837 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16838 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16839 {
16840 bfd_byte *p;
16841 nop_it:
16842 p = contents + (rel->r_offset & ~3);
16843 bfd_put_32 (input_bfd, NOP, p);
16844 goto copy_reloc;
16845 }
16846 break;
16847
16848 case R_PPC64_PLT16_LO:
16849 case R_PPC64_PLT16_LO_DS:
16850 if (unresolved_reloc)
16851 {
16852 unresolved_reloc = FALSE;
16853 goto nop_it;
16854 }
16855 /* Fall through. */
16856 case R_PPC64_GOT_TLSLD16_LO:
16857 case R_PPC64_GOT_TLSGD16_LO:
16858 case R_PPC64_GOT_TPREL16_LO_DS:
16859 case R_PPC64_GOT_DTPREL16_LO_DS:
16860 case R_PPC64_GOT16_LO:
16861 case R_PPC64_GOT16_LO_DS:
16862 case R_PPC64_TOC16_LO:
16863 case R_PPC64_TOC16_LO_DS:
16864 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16865 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16866 {
16867 bfd_byte *p = contents + (rel->r_offset & ~3);
16868 insn = bfd_get_32 (input_bfd, p);
16869 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
16870 {
16871 /* Transform addic to addi when we change reg. */
16872 insn &= ~((0x3fu << 26) | (0x1f << 16));
16873 insn |= (14u << 26) | (2 << 16);
16874 }
16875 else
16876 {
16877 insn &= ~(0x1f << 16);
16878 insn |= 2 << 16;
16879 }
16880 bfd_put_32 (input_bfd, insn, p);
16881 }
16882 break;
16883
16884 case R_PPC64_TPREL16_HA:
16885 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16886 {
16887 bfd_byte *p = contents + (rel->r_offset & ~3);
16888 insn = bfd_get_32 (input_bfd, p);
16889 if ((insn & ((0x3fu << 26) | 0x1f << 16))
16890 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16891 /* xgettext:c-format */
16892 info->callbacks->minfo
16893 (_("%H: warning: %s unexpected insn %#x.\n"),
16894 input_bfd, input_section, rel->r_offset,
16895 ppc64_elf_howto_table[r_type]->name, insn);
16896 else
16897 {
16898 bfd_put_32 (input_bfd, NOP, p);
16899 goto copy_reloc;
16900 }
16901 }
16902 break;
16903
16904 case R_PPC64_TPREL16_LO:
16905 case R_PPC64_TPREL16_LO_DS:
16906 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16907 {
16908 bfd_byte *p = contents + (rel->r_offset & ~3);
16909 insn = bfd_get_32 (input_bfd, p);
16910 insn &= ~(0x1f << 16);
16911 insn |= 13 << 16;
16912 bfd_put_32 (input_bfd, insn, p);
16913 }
16914 break;
16915 }
16916
16917 /* Do any further special processing. */
16918 switch (r_type)
16919 {
16920 default:
16921 break;
16922
16923 case R_PPC64_REL16_HA:
16924 case R_PPC64_REL16_HIGHA:
16925 case R_PPC64_REL16_HIGHERA:
16926 case R_PPC64_REL16_HIGHESTA:
16927 case R_PPC64_REL16DX_HA:
16928 case R_PPC64_ADDR16_HA:
16929 case R_PPC64_ADDR16_HIGHA:
16930 case R_PPC64_ADDR16_HIGHERA:
16931 case R_PPC64_ADDR16_HIGHESTA:
16932 case R_PPC64_TOC16_HA:
16933 case R_PPC64_SECTOFF_HA:
16934 case R_PPC64_TPREL16_HA:
16935 case R_PPC64_TPREL16_HIGHA:
16936 case R_PPC64_TPREL16_HIGHERA:
16937 case R_PPC64_TPREL16_HIGHESTA:
16938 case R_PPC64_DTPREL16_HA:
16939 case R_PPC64_DTPREL16_HIGHA:
16940 case R_PPC64_DTPREL16_HIGHERA:
16941 case R_PPC64_DTPREL16_HIGHESTA:
16942 /* It's just possible that this symbol is a weak symbol
16943 that's not actually defined anywhere. In that case,
16944 'sec' would be NULL, and we should leave the symbol
16945 alone (it will be set to zero elsewhere in the link). */
16946 if (sec == NULL)
16947 break;
16948 /* Fall through. */
16949
16950 case R_PPC64_GOT16_HA:
16951 case R_PPC64_PLTGOT16_HA:
16952 case R_PPC64_PLT16_HA:
16953 case R_PPC64_GOT_TLSGD16_HA:
16954 case R_PPC64_GOT_TLSLD16_HA:
16955 case R_PPC64_GOT_TPREL16_HA:
16956 case R_PPC64_GOT_DTPREL16_HA:
16957 /* Add 0x10000 if sign bit in 0:15 is set.
16958 Bits 0:15 are not used. */
16959 addend += 0x8000;
16960 break;
16961
16962 case R_PPC64_D34_HA30:
16963 case R_PPC64_ADDR16_HIGHERA34:
16964 case R_PPC64_ADDR16_HIGHESTA34:
16965 case R_PPC64_REL16_HIGHERA34:
16966 case R_PPC64_REL16_HIGHESTA34:
16967 if (sec != NULL)
16968 addend += 1ULL << 33;
16969 break;
16970
16971 case R_PPC64_ADDR16_DS:
16972 case R_PPC64_ADDR16_LO_DS:
16973 case R_PPC64_GOT16_DS:
16974 case R_PPC64_GOT16_LO_DS:
16975 case R_PPC64_PLT16_LO_DS:
16976 case R_PPC64_SECTOFF_DS:
16977 case R_PPC64_SECTOFF_LO_DS:
16978 case R_PPC64_TOC16_DS:
16979 case R_PPC64_TOC16_LO_DS:
16980 case R_PPC64_PLTGOT16_DS:
16981 case R_PPC64_PLTGOT16_LO_DS:
16982 case R_PPC64_GOT_TPREL16_DS:
16983 case R_PPC64_GOT_TPREL16_LO_DS:
16984 case R_PPC64_GOT_DTPREL16_DS:
16985 case R_PPC64_GOT_DTPREL16_LO_DS:
16986 case R_PPC64_TPREL16_DS:
16987 case R_PPC64_TPREL16_LO_DS:
16988 case R_PPC64_DTPREL16_DS:
16989 case R_PPC64_DTPREL16_LO_DS:
16990 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16991 mask = 3;
16992 /* If this reloc is against an lq, lxv, or stxv insn, then
16993 the value must be a multiple of 16. This is somewhat of
16994 a hack, but the "correct" way to do this by defining _DQ
16995 forms of all the _DS relocs bloats all reloc switches in
16996 this file. It doesn't make much sense to use these
16997 relocs in data, so testing the insn should be safe. */
16998 if ((insn & (0x3fu << 26)) == (56u << 26)
16999 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
17000 mask = 15;
17001 relocation += addend;
17002 addend = insn & (mask ^ 3);
17003 if ((relocation & mask) != 0)
17004 {
17005 relocation ^= relocation & mask;
17006 info->callbacks->einfo
17007 /* xgettext:c-format */
17008 (_("%H: error: %s not a multiple of %u\n"),
17009 input_bfd, input_section, rel->r_offset,
17010 ppc64_elf_howto_table[r_type]->name,
17011 mask + 1);
17012 bfd_set_error (bfd_error_bad_value);
17013 ret = FALSE;
17014 goto copy_reloc;
17015 }
17016 break;
17017 }
17018
17019 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17020 because such sections are not SEC_ALLOC and thus ld.so will
17021 not process them. */
17022 howto = ppc64_elf_howto_table[(int) r_type];
17023 if (unresolved_reloc
17024 && !((input_section->flags & SEC_DEBUGGING) != 0
17025 && h->elf.def_dynamic)
17026 && _bfd_elf_section_offset (output_bfd, info, input_section,
17027 rel->r_offset) != (bfd_vma) -1)
17028 {
17029 info->callbacks->einfo
17030 /* xgettext:c-format */
17031 (_("%H: unresolvable %s against `%pT'\n"),
17032 input_bfd, input_section, rel->r_offset,
17033 howto->name,
17034 h->elf.root.root.string);
17035 ret = FALSE;
17036 }
17037
17038 /* 16-bit fields in insns mostly have signed values, but a
17039 few insns have 16-bit unsigned values. Really, we should
17040 have different reloc types. */
17041 if (howto->complain_on_overflow != complain_overflow_dont
17042 && howto->dst_mask == 0xffff
17043 && (input_section->flags & SEC_CODE) != 0)
17044 {
17045 enum complain_overflow complain = complain_overflow_signed;
17046
17047 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17048 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
17049 complain = complain_overflow_bitfield;
17050 else if (howto->rightshift == 0
17051 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17052 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17053 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17054 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17055 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17056 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
17057 complain = complain_overflow_unsigned;
17058 if (howto->complain_on_overflow != complain)
17059 {
17060 alt_howto = *howto;
17061 alt_howto.complain_on_overflow = complain;
17062 howto = &alt_howto;
17063 }
17064 }
17065
17066 switch (r_type)
17067 {
17068 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17069 case R_PPC64_D34:
17070 case R_PPC64_D34_LO:
17071 case R_PPC64_D34_HI30:
17072 case R_PPC64_D34_HA30:
17073 case R_PPC64_PCREL34:
17074 case R_PPC64_GOT_PCREL34:
17075 case R_PPC64_TPREL34:
17076 case R_PPC64_DTPREL34:
17077 case R_PPC64_GOT_TLSGD34:
17078 case R_PPC64_GOT_TLSLD34:
17079 case R_PPC64_GOT_TPREL34:
17080 case R_PPC64_GOT_DTPREL34:
17081 case R_PPC64_PLT_PCREL34:
17082 case R_PPC64_PLT_PCREL34_NOTOC:
17083 case R_PPC64_D28:
17084 case R_PPC64_PCREL28:
17085 if (rel->r_offset + 8 > input_section->size)
17086 r = bfd_reloc_outofrange;
17087 else
17088 {
17089 relocation += addend;
17090 if (howto->pc_relative)
17091 relocation -= (rel->r_offset
17092 + input_section->output_offset
17093 + input_section->output_section->vma);
17094 relocation >>= howto->rightshift;
17095
17096 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17097 pinsn <<= 32;
17098 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17099
17100 pinsn &= ~howto->dst_mask;
17101 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17102 & howto->dst_mask);
17103 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17104 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17105 r = bfd_reloc_ok;
17106 if (howto->complain_on_overflow == complain_overflow_signed
17107 && (relocation + (1ULL << (howto->bitsize - 1))
17108 >= 1ULL << howto->bitsize))
17109 r = bfd_reloc_overflow;
17110 }
17111 break;
17112
17113 case R_PPC64_REL16DX_HA:
17114 if (rel->r_offset + 4 > input_section->size)
17115 r = bfd_reloc_outofrange;
17116 else
17117 {
17118 relocation += addend;
17119 relocation -= (rel->r_offset
17120 + input_section->output_offset
17121 + input_section->output_section->vma);
17122 relocation = (bfd_signed_vma) relocation >> 16;
17123 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17124 insn &= ~0x1fffc1;
17125 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
17126 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17127 r = bfd_reloc_ok;
17128 if (relocation + 0x8000 > 0xffff)
17129 r = bfd_reloc_overflow;
17130 }
17131 break;
17132
17133 default:
17134 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17135 contents, rel->r_offset,
17136 relocation, addend);
17137 }
17138
17139 if (r != bfd_reloc_ok)
17140 {
17141 char *more_info = NULL;
17142 const char *reloc_name = howto->name;
17143
17144 if (reloc_dest != DEST_NORMAL)
17145 {
17146 more_info = bfd_malloc (strlen (reloc_name) + 8);
17147 if (more_info != NULL)
17148 {
17149 strcpy (more_info, reloc_name);
17150 strcat (more_info, (reloc_dest == DEST_OPD
17151 ? " (OPD)" : " (stub)"));
17152 reloc_name = more_info;
17153 }
17154 }
17155
17156 if (r == bfd_reloc_overflow)
17157 {
17158 /* On code like "if (foo) foo();" don't report overflow
17159 on a branch to zero when foo is undefined. */
17160 if (!warned
17161 && (reloc_dest == DEST_STUB
17162 || !(h != NULL
17163 && (h->elf.root.type == bfd_link_hash_undefweak
17164 || h->elf.root.type == bfd_link_hash_undefined)
17165 && is_branch_reloc (r_type))))
17166 info->callbacks->reloc_overflow (info, &h->elf.root,
17167 sym_name, reloc_name,
17168 orig_rel.r_addend,
17169 input_bfd, input_section,
17170 rel->r_offset);
17171 }
17172 else
17173 {
17174 info->callbacks->einfo
17175 /* xgettext:c-format */
17176 (_("%H: %s against `%pT': error %d\n"),
17177 input_bfd, input_section, rel->r_offset,
17178 reloc_name, sym_name, (int) r);
17179 ret = FALSE;
17180 }
17181 free (more_info);
17182 }
17183 copy_reloc:
17184 if (wrel != rel)
17185 *wrel = *rel;
17186 }
17187
17188 if (wrel != rel)
17189 {
17190 Elf_Internal_Shdr *rel_hdr;
17191 size_t deleted = rel - wrel;
17192
17193 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17194 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17195 if (rel_hdr->sh_size == 0)
17196 {
17197 /* It is too late to remove an empty reloc section. Leave
17198 one NONE reloc.
17199 ??? What is wrong with an empty section??? */
17200 rel_hdr->sh_size = rel_hdr->sh_entsize;
17201 deleted -= 1;
17202 }
17203 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17204 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17205 input_section->reloc_count -= deleted;
17206 }
17207
17208 /* If we're emitting relocations, then shortly after this function
17209 returns, reloc offsets and addends for this section will be
17210 adjusted. Worse, reloc symbol indices will be for the output
17211 file rather than the input. Save a copy of the relocs for
17212 opd_entry_value. */
17213 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
17214 {
17215 bfd_size_type amt;
17216 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17217 rel = bfd_alloc (input_bfd, amt);
17218 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17219 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
17220 if (rel == NULL)
17221 return FALSE;
17222 memcpy (rel, relocs, amt);
17223 }
17224 return ret;
17225 }
17226
17227 /* Adjust the value of any local symbols in opd sections. */
17228
17229 static int
17230 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17231 const char *name ATTRIBUTE_UNUSED,
17232 Elf_Internal_Sym *elfsym,
17233 asection *input_sec,
17234 struct elf_link_hash_entry *h)
17235 {
17236 struct _opd_sec_data *opd;
17237 long adjust;
17238 bfd_vma value;
17239
17240 if (h != NULL)
17241 return 1;
17242
17243 opd = get_opd_info (input_sec);
17244 if (opd == NULL || opd->adjust == NULL)
17245 return 1;
17246
17247 value = elfsym->st_value - input_sec->output_offset;
17248 if (!bfd_link_relocatable (info))
17249 value -= input_sec->output_section->vma;
17250
17251 adjust = opd->adjust[OPD_NDX (value)];
17252 if (adjust == -1)
17253 return 2;
17254
17255 elfsym->st_value += adjust;
17256 return 1;
17257 }
17258
17259 /* Finish up dynamic symbol handling. We set the contents of various
17260 dynamic sections here. */
17261
17262 static bfd_boolean
17263 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17264 struct bfd_link_info *info,
17265 struct elf_link_hash_entry *h,
17266 Elf_Internal_Sym *sym)
17267 {
17268 struct ppc_link_hash_table *htab;
17269 struct plt_entry *ent;
17270
17271 htab = ppc_hash_table (info);
17272 if (htab == NULL)
17273 return FALSE;
17274
17275 if (!htab->opd_abi && !h->def_regular)
17276 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17277 if (ent->plt.offset != (bfd_vma) -1)
17278 {
17279 /* Mark the symbol as undefined, rather than as
17280 defined in glink. Leave the value if there were
17281 any relocations where pointer equality matters
17282 (this is a clue for the dynamic linker, to make
17283 function pointer comparisons work between an
17284 application and shared library), otherwise set it
17285 to zero. */
17286 sym->st_shndx = SHN_UNDEF;
17287 if (!h->pointer_equality_needed)
17288 sym->st_value = 0;
17289 else if (!h->ref_regular_nonweak)
17290 {
17291 /* This breaks function pointer comparisons, but
17292 that is better than breaking tests for a NULL
17293 function pointer. */
17294 sym->st_value = 0;
17295 }
17296 break;
17297 }
17298
17299 if (h->needs_copy
17300 && (h->root.type == bfd_link_hash_defined
17301 || h->root.type == bfd_link_hash_defweak)
17302 && (h->root.u.def.section == htab->elf.sdynbss
17303 || h->root.u.def.section == htab->elf.sdynrelro))
17304 {
17305 /* This symbol needs a copy reloc. Set it up. */
17306 Elf_Internal_Rela rela;
17307 asection *srel;
17308 bfd_byte *loc;
17309
17310 if (h->dynindx == -1)
17311 abort ();
17312
17313 rela.r_offset = defined_sym_val (h);
17314 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17315 rela.r_addend = 0;
17316 if (h->root.u.def.section == htab->elf.sdynrelro)
17317 srel = htab->elf.sreldynrelro;
17318 else
17319 srel = htab->elf.srelbss;
17320 loc = srel->contents;
17321 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
17322 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
17323 }
17324
17325 return TRUE;
17326 }
17327
17328 /* Used to decide how to sort relocs in an optimal manner for the
17329 dynamic linker, before writing them out. */
17330
17331 static enum elf_reloc_type_class
17332 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17333 const asection *rel_sec,
17334 const Elf_Internal_Rela *rela)
17335 {
17336 enum elf_ppc64_reloc_type r_type;
17337 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17338
17339 if (rel_sec == htab->elf.irelplt)
17340 return reloc_class_ifunc;
17341
17342 r_type = ELF64_R_TYPE (rela->r_info);
17343 switch (r_type)
17344 {
17345 case R_PPC64_RELATIVE:
17346 return reloc_class_relative;
17347 case R_PPC64_JMP_SLOT:
17348 return reloc_class_plt;
17349 case R_PPC64_COPY:
17350 return reloc_class_copy;
17351 default:
17352 return reloc_class_normal;
17353 }
17354 }
17355
17356 /* Finish up the dynamic sections. */
17357
17358 static bfd_boolean
17359 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17360 struct bfd_link_info *info)
17361 {
17362 struct ppc_link_hash_table *htab;
17363 bfd *dynobj;
17364 asection *sdyn;
17365
17366 htab = ppc_hash_table (info);
17367 if (htab == NULL)
17368 return FALSE;
17369
17370 dynobj = htab->elf.dynobj;
17371 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
17372
17373 if (htab->elf.dynamic_sections_created)
17374 {
17375 Elf64_External_Dyn *dyncon, *dynconend;
17376
17377 if (sdyn == NULL || htab->elf.sgot == NULL)
17378 abort ();
17379
17380 dyncon = (Elf64_External_Dyn *) sdyn->contents;
17381 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
17382 for (; dyncon < dynconend; dyncon++)
17383 {
17384 Elf_Internal_Dyn dyn;
17385 asection *s;
17386
17387 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17388
17389 switch (dyn.d_tag)
17390 {
17391 default:
17392 continue;
17393
17394 case DT_PPC64_GLINK:
17395 s = htab->glink;
17396 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17397 /* We stupidly defined DT_PPC64_GLINK to be the start
17398 of glink rather than the first entry point, which is
17399 what ld.so needs, and now have a bigger stub to
17400 support automatic multiple TOCs. */
17401 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
17402 break;
17403
17404 case DT_PPC64_OPD:
17405 s = bfd_get_section_by_name (output_bfd, ".opd");
17406 if (s == NULL)
17407 continue;
17408 dyn.d_un.d_ptr = s->vma;
17409 break;
17410
17411 case DT_PPC64_OPT:
17412 if ((htab->do_multi_toc && htab->multi_toc_needed)
17413 || htab->notoc_plt)
17414 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
17415 if (htab->has_plt_localentry0)
17416 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
17417 break;
17418
17419 case DT_PPC64_OPDSZ:
17420 s = bfd_get_section_by_name (output_bfd, ".opd");
17421 if (s == NULL)
17422 continue;
17423 dyn.d_un.d_val = s->size;
17424 break;
17425
17426 case DT_PLTGOT:
17427 s = htab->elf.splt;
17428 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17429 break;
17430
17431 case DT_JMPREL:
17432 s = htab->elf.srelplt;
17433 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17434 break;
17435
17436 case DT_PLTRELSZ:
17437 dyn.d_un.d_val = htab->elf.srelplt->size;
17438 break;
17439
17440 case DT_TEXTREL:
17441 if (htab->local_ifunc_resolver)
17442 info->callbacks->einfo
17443 (_("%X%P: text relocations and GNU indirect "
17444 "functions will result in a segfault at runtime\n"));
17445 else if (htab->maybe_local_ifunc_resolver)
17446 info->callbacks->einfo
17447 (_("%P: warning: text relocations and GNU indirect "
17448 "functions may result in a segfault at runtime\n"));
17449 continue;
17450 }
17451
17452 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
17453 }
17454 }
17455
17456 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17457 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
17458 {
17459 /* Fill in the first entry in the global offset table.
17460 We use it to hold the link-time TOCbase. */
17461 bfd_put_64 (output_bfd,
17462 elf_gp (output_bfd) + TOC_BASE_OFF,
17463 htab->elf.sgot->contents);
17464
17465 /* Set .got entry size. */
17466 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17467 = 8;
17468 }
17469
17470 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17471 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17472 {
17473 /* Set .plt entry size. */
17474 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17475 = PLT_ENTRY_SIZE (htab);
17476 }
17477
17478 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17479 brlt ourselves if emitrelocations. */
17480 if (htab->brlt != NULL
17481 && htab->brlt->reloc_count != 0
17482 && !_bfd_elf_link_output_relocs (output_bfd,
17483 htab->brlt,
17484 elf_section_data (htab->brlt)->rela.hdr,
17485 elf_section_data (htab->brlt)->relocs,
17486 NULL))
17487 return FALSE;
17488
17489 if (htab->glink != NULL
17490 && htab->glink->reloc_count != 0
17491 && !_bfd_elf_link_output_relocs (output_bfd,
17492 htab->glink,
17493 elf_section_data (htab->glink)->rela.hdr,
17494 elf_section_data (htab->glink)->relocs,
17495 NULL))
17496 return FALSE;
17497
17498
17499 if (htab->glink_eh_frame != NULL
17500 && htab->glink_eh_frame->size != 0
17501 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17502 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17503 htab->glink_eh_frame,
17504 htab->glink_eh_frame->contents))
17505 return FALSE;
17506
17507 /* We need to handle writing out multiple GOT sections ourselves,
17508 since we didn't add them to DYNOBJ. We know dynobj is the first
17509 bfd. */
17510 while ((dynobj = dynobj->link.next) != NULL)
17511 {
17512 asection *s;
17513
17514 if (!is_ppc64_elf (dynobj))
17515 continue;
17516
17517 s = ppc64_elf_tdata (dynobj)->got;
17518 if (s != NULL
17519 && s->size != 0
17520 && s->output_section != bfd_abs_section_ptr
17521 && !bfd_set_section_contents (output_bfd, s->output_section,
17522 s->contents, s->output_offset,
17523 s->size))
17524 return FALSE;
17525 s = ppc64_elf_tdata (dynobj)->relgot;
17526 if (s != NULL
17527 && s->size != 0
17528 && s->output_section != bfd_abs_section_ptr
17529 && !bfd_set_section_contents (output_bfd, s->output_section,
17530 s->contents, s->output_offset,
17531 s->size))
17532 return FALSE;
17533 }
17534
17535 return TRUE;
17536 }
17537
17538 #include "elf64-target.h"
17539
17540 /* FreeBSD support */
17541
17542 #undef TARGET_LITTLE_SYM
17543 #undef TARGET_LITTLE_NAME
17544
17545 #undef TARGET_BIG_SYM
17546 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17547 #undef TARGET_BIG_NAME
17548 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17549
17550 #undef ELF_OSABI
17551 #define ELF_OSABI ELFOSABI_FREEBSD
17552
17553 #undef elf64_bed
17554 #define elf64_bed elf64_powerpc_fbsd_bed
17555
17556 #include "elf64-target.h"
This page took 0.409741 seconds and 5 git commands to generate.