PowerPC, use size_t rather than long for indices
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39 #define OCTETS_PER_BYTE(ABFD, SEC) 1
40
41 static bfd_reloc_status_type ppc64_elf_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
47 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
49 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc64_elf_toc_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
55 static bfd_reloc_status_type ppc64_elf_toc64_reloc
56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
57 static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
59 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
61 static bfd_vma opd_entry_value
62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
63
64 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
65 #define TARGET_LITTLE_NAME "elf64-powerpcle"
66 #define TARGET_BIG_SYM powerpc_elf64_vec
67 #define TARGET_BIG_NAME "elf64-powerpc"
68 #define ELF_ARCH bfd_arch_powerpc
69 #define ELF_TARGET_ID PPC64_ELF_DATA
70 #define ELF_MACHINE_CODE EM_PPC64
71 #define ELF_MAXPAGESIZE 0x10000
72 #define ELF_COMMONPAGESIZE 0x1000
73 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
74 #define elf_info_to_howto ppc64_elf_info_to_howto
75
76 #define elf_backend_want_got_sym 0
77 #define elf_backend_want_plt_sym 0
78 #define elf_backend_plt_alignment 3
79 #define elf_backend_plt_not_loaded 1
80 #define elf_backend_got_header_size 8
81 #define elf_backend_want_dynrelro 1
82 #define elf_backend_can_gc_sections 1
83 #define elf_backend_can_refcount 1
84 #define elf_backend_rela_normal 1
85 #define elf_backend_dtrel_excludes_plt 1
86 #define elf_backend_default_execstack 0
87
88 #define bfd_elf64_mkobject ppc64_elf_mkobject
89 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
90 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
91 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
93 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
95 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
96 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
97 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
98
99 #define elf_backend_object_p ppc64_elf_object_p
100 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
102 #define elf_backend_write_core_note ppc64_elf_write_core_note
103 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
104 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
105 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
106 #define elf_backend_check_directives ppc64_elf_before_check_relocs
107 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
108 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
109 #define elf_backend_check_relocs ppc64_elf_check_relocs
110 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
111 #define elf_backend_gc_keep ppc64_elf_gc_keep
112 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
113 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
114 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
116 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
117 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
119 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
120 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
121 #define elf_backend_action_discarded ppc64_elf_action_discarded
122 #define elf_backend_relocate_section ppc64_elf_relocate_section
123 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
126 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
127 #define elf_backend_special_sections ppc64_elf_special_sections
128 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
129 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
130 #define elf_backend_get_reloc_section bfd_get_section_by_name
131
132 /* The name of the dynamic interpreter. This is put in the .interp
133 section. */
134 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
135
136 /* The size in bytes of an entry in the procedure linkage table. */
137 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
138 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
139
140 /* The initial size of the plt reserved for the dynamic linker. */
141 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
142
143 /* Offsets to some stack save slots. */
144 #define STK_LR 16
145 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
146 /* This one is dodgy. ELFv2 does not have a linker word, so use the
147 CR save slot. Used only by optimised __tls_get_addr call stub,
148 relying on __tls_get_addr_opt not saving CR.. */
149 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
150
151 /* TOC base pointers offset from start of TOC. */
152 #define TOC_BASE_OFF 0x8000
153 /* TOC base alignment. */
154 #define TOC_BASE_ALIGN 256
155
156 /* Offset of tp and dtp pointers from start of TLS block. */
157 #define TP_OFFSET 0x7000
158 #define DTP_OFFSET 0x8000
159
160 /* .plt call stub instructions. The normal stub is like this, but
161 sometimes the .plt entry crosses a 64k boundary and we need to
162 insert an addi to adjust r11. */
163 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
164 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
165 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
166 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
167 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
168 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
169 #define BCTR 0x4e800420 /* bctr */
170
171 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
172 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
173 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
174 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
175 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
176
177 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
178 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
179 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
180 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
181 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
182 #define BNECTR 0x4ca20420 /* bnectr+ */
183 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
184
185 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
186 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
187 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
188
189 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
190 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
191 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
192
193 #define LI_R11_0 0x39600000 /* li %r11,0 */
194 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
195 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
196 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
197 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
198 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
199 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
200 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
201 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
202 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
203 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
204 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
205 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
206 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
207 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
208 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
209 #define PADDI_R12_PC 0x0610000039800000ULL
210 #define PLD_R12_PC 0x04100000e5800000ULL
211 #define PNOP 0x0700000000000000ULL
212
213 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
214 #define GLINK_PLTRESOLVE_SIZE(htab) \
215 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
216 /* 0: */
217 /* .quad plt0-1f */
218 /* __glink: */
219 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
220 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
221 /* 1: */
222 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
223 /* ld %2,(0b-1b)(%11) */
224 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
225 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
226 /* ld %12,0(%11) */
227 /* ld %2,8(%11) */
228 /* mtctr %12 */
229 /* ld %11,16(%11) */
230 /* bctr */
231 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
232 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
233 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
234 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
235 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
236
237 /* Pad with this. */
238 #define NOP 0x60000000
239
240 /* Some other nops. */
241 #define CROR_151515 0x4def7b82
242 #define CROR_313131 0x4ffffb82
243
244 /* .glink entries for the first 32k functions are two instructions. */
245 #define LI_R0_0 0x38000000 /* li %r0,0 */
246 #define B_DOT 0x48000000 /* b . */
247
248 /* After that, we need two instructions to load the index, followed by
249 a branch. */
250 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
251 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
252
253 /* Instructions used by the save and restore reg functions. */
254 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
255 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
256 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
257 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
258 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
259 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
260 #define LI_R12_0 0x39800000 /* li %r12,0 */
261 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
262 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
263 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
264 #define BLR 0x4e800020 /* blr */
265
266 /* Since .opd is an array of descriptors and each entry will end up
267 with identical R_PPC64_RELATIVE relocs, there is really no need to
268 propagate .opd relocs; The dynamic linker should be taught to
269 relocate .opd without reloc entries. */
270 #ifndef NO_OPD_RELOCS
271 #define NO_OPD_RELOCS 0
272 #endif
273
274 #ifndef ARRAY_SIZE
275 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
276 #endif
277
278 static inline int
279 abiversion (bfd *abfd)
280 {
281 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
282 }
283
284 static inline void
285 set_abiversion (bfd *abfd, int ver)
286 {
287 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
288 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
289 }
290 \f
291 /* Relocation HOWTO's. */
292 /* Like other ELF RELA targets that don't apply multiple
293 field-altering relocations to the same localation, src_mask is
294 always zero and pcrel_offset is the same as pc_relative.
295 PowerPC can always use a zero bitpos, even when the field is not at
296 the LSB. For example, a REL24 could use rightshift=2, bisize=24
297 and bitpos=2 which matches the ABI description, or as we do here,
298 rightshift=0, bitsize=26 and bitpos=0. */
299 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
300 complain, special_func) \
301 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
302 complain_overflow_ ## complain, special_func, \
303 #type, FALSE, 0, mask, pc_relative)
304
305 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
306
307 static reloc_howto_type ppc64_elf_howto_raw[] =
308 {
309 /* This reloc does nothing. */
310 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
311 bfd_elf_generic_reloc),
312
313 /* A standard 32 bit relocation. */
314 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
315 bfd_elf_generic_reloc),
316
317 /* An absolute 26 bit branch; the lower two bits must be zero.
318 FIXME: we don't check that, we just clear them. */
319 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
320 bfd_elf_generic_reloc),
321
322 /* A standard 16 bit relocation. */
323 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
324 bfd_elf_generic_reloc),
325
326 /* A 16 bit relocation without overflow. */
327 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
328 bfd_elf_generic_reloc),
329
330 /* Bits 16-31 of an address. */
331 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
332 bfd_elf_generic_reloc),
333
334 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
335 bits, treated as a signed number, is negative. */
336 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
337 ppc64_elf_ha_reloc),
338
339 /* An absolute 16 bit branch; the lower two bits must be zero.
340 FIXME: we don't check that, we just clear them. */
341 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
342 ppc64_elf_branch_reloc),
343
344 /* An absolute 16 bit branch, for which bit 10 should be set to
345 indicate that the branch is expected to be taken. The lower two
346 bits must be zero. */
347 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
348 ppc64_elf_brtaken_reloc),
349
350 /* An absolute 16 bit branch, for which bit 10 should be set to
351 indicate that the branch is not expected to be taken. The lower
352 two bits must be zero. */
353 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
354 ppc64_elf_brtaken_reloc),
355
356 /* A relative 26 bit branch; the lower two bits must be zero. */
357 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
358 ppc64_elf_branch_reloc),
359
360 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
361 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
362 ppc64_elf_branch_reloc),
363
364 /* A relative 16 bit branch; the lower two bits must be zero. */
365 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
366 ppc64_elf_branch_reloc),
367
368 /* A relative 16 bit branch. Bit 10 should be set to indicate that
369 the branch is expected to be taken. The lower two bits must be
370 zero. */
371 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
372 ppc64_elf_brtaken_reloc),
373
374 /* A relative 16 bit branch. Bit 10 should be set to indicate that
375 the branch is not expected to be taken. The lower two bits must
376 be zero. */
377 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
378 ppc64_elf_brtaken_reloc),
379
380 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
381 symbol. */
382 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
383 ppc64_elf_unhandled_reloc),
384
385 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
386 the symbol. */
387 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
388 ppc64_elf_unhandled_reloc),
389
390 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
391 the symbol. */
392 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
393 ppc64_elf_unhandled_reloc),
394
395 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
396 the symbol. */
397 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
398 ppc64_elf_unhandled_reloc),
399
400 /* This is used only by the dynamic linker. The symbol should exist
401 both in the object being run and in some shared library. The
402 dynamic linker copies the data addressed by the symbol from the
403 shared library into the object, because the object being
404 run has to have the data at some particular address. */
405 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
406 ppc64_elf_unhandled_reloc),
407
408 /* Like R_PPC64_ADDR64, but used when setting global offset table
409 entries. */
410 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
411 ppc64_elf_unhandled_reloc),
412
413 /* Created by the link editor. Marks a procedure linkage table
414 entry for a symbol. */
415 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
416 ppc64_elf_unhandled_reloc),
417
418 /* Used only by the dynamic linker. When the object is run, this
419 doubleword64 is set to the load address of the object, plus the
420 addend. */
421 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
422 bfd_elf_generic_reloc),
423
424 /* Like R_PPC64_ADDR32, but may be unaligned. */
425 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
426 bfd_elf_generic_reloc),
427
428 /* Like R_PPC64_ADDR16, but may be unaligned. */
429 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
430 bfd_elf_generic_reloc),
431
432 /* 32-bit PC relative. */
433 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
434 bfd_elf_generic_reloc),
435
436 /* 32-bit relocation to the symbol's procedure linkage table. */
437 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
438 ppc64_elf_unhandled_reloc),
439
440 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
441 FIXME: R_PPC64_PLTREL32 not supported. */
442 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
443 ppc64_elf_unhandled_reloc),
444
445 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
446 the symbol. */
447 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
448 ppc64_elf_unhandled_reloc),
449
450 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
451 the symbol. */
452 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
453 ppc64_elf_unhandled_reloc),
454
455 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
456 the symbol. */
457 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
458 ppc64_elf_unhandled_reloc),
459
460 /* 16-bit section relative relocation. */
461 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
462 ppc64_elf_sectoff_reloc),
463
464 /* Like R_PPC64_SECTOFF, but no overflow warning. */
465 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
466 ppc64_elf_sectoff_reloc),
467
468 /* 16-bit upper half section relative relocation. */
469 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
470 ppc64_elf_sectoff_reloc),
471
472 /* 16-bit upper half adjusted section relative relocation. */
473 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
474 ppc64_elf_sectoff_ha_reloc),
475
476 /* Like R_PPC64_REL24 without touching the two least significant bits. */
477 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
478 bfd_elf_generic_reloc),
479
480 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
481
482 /* A standard 64-bit relocation. */
483 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
484 bfd_elf_generic_reloc),
485
486 /* The bits 32-47 of an address. */
487 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
488 bfd_elf_generic_reloc),
489
490 /* The bits 32-47 of an address, plus 1 if the contents of the low
491 16 bits, treated as a signed number, is negative. */
492 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
493 ppc64_elf_ha_reloc),
494
495 /* The bits 48-63 of an address. */
496 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
497 bfd_elf_generic_reloc),
498
499 /* The bits 48-63 of an address, plus 1 if the contents of the low
500 16 bits, treated as a signed number, is negative. */
501 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
502 ppc64_elf_ha_reloc),
503
504 /* Like ADDR64, but may be unaligned. */
505 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
506 bfd_elf_generic_reloc),
507
508 /* 64-bit relative relocation. */
509 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
510 bfd_elf_generic_reloc),
511
512 /* 64-bit relocation to the symbol's procedure linkage table. */
513 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
514 ppc64_elf_unhandled_reloc),
515
516 /* 64-bit PC relative relocation to the symbol's procedure linkage
517 table. */
518 /* FIXME: R_PPC64_PLTREL64 not supported. */
519 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
520 ppc64_elf_unhandled_reloc),
521
522 /* 16 bit TOC-relative relocation. */
523 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
524 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
525 ppc64_elf_toc_reloc),
526
527 /* 16 bit TOC-relative relocation without overflow. */
528 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
529 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
530 ppc64_elf_toc_reloc),
531
532 /* 16 bit TOC-relative relocation, high 16 bits. */
533 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
534 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
535 ppc64_elf_toc_reloc),
536
537 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
538 contents of the low 16 bits, treated as a signed number, is
539 negative. */
540 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
541 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
542 ppc64_elf_toc_ha_reloc),
543
544 /* 64-bit relocation; insert value of TOC base (.TOC.). */
545 /* R_PPC64_TOC 51 doubleword64 .TOC. */
546 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
547 ppc64_elf_toc64_reloc),
548
549 /* Like R_PPC64_GOT16, but also informs the link editor that the
550 value to relocate may (!) refer to a PLT entry which the link
551 editor (a) may replace with the symbol value. If the link editor
552 is unable to fully resolve the symbol, it may (b) create a PLT
553 entry and store the address to the new PLT entry in the GOT.
554 This permits lazy resolution of function symbols at run time.
555 The link editor may also skip all of this and just (c) emit a
556 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
557 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
558 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
559 ppc64_elf_unhandled_reloc),
560
561 /* Like R_PPC64_PLTGOT16, but without overflow. */
562 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
563 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
564 ppc64_elf_unhandled_reloc),
565
566 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
567 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
568 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
569 ppc64_elf_unhandled_reloc),
570
571 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
572 1 if the contents of the low 16 bits, treated as a signed number,
573 is negative. */
574 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
575 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
576 ppc64_elf_unhandled_reloc),
577
578 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
579 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
580 bfd_elf_generic_reloc),
581
582 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
583 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
584 bfd_elf_generic_reloc),
585
586 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
587 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
588 ppc64_elf_unhandled_reloc),
589
590 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
591 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
592 ppc64_elf_unhandled_reloc),
593
594 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
595 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
596 ppc64_elf_unhandled_reloc),
597
598 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
599 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
600 ppc64_elf_sectoff_reloc),
601
602 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
603 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
604 ppc64_elf_sectoff_reloc),
605
606 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
607 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
608 ppc64_elf_toc_reloc),
609
610 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
611 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
612 ppc64_elf_toc_reloc),
613
614 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
615 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
616 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
617 ppc64_elf_unhandled_reloc),
618
619 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
620 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
621 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
622 ppc64_elf_unhandled_reloc),
623
624 /* Marker relocs for TLS. */
625 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
632 bfd_elf_generic_reloc),
633
634 /* Marker reloc for optimizing r2 save in prologue rather than on
635 each plt call stub. */
636 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
637 bfd_elf_generic_reloc),
638
639 /* Marker relocs on inline plt call instructions. */
640 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
642
643 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
644 bfd_elf_generic_reloc),
645
646 /* Computes the load module index of the load module that contains the
647 definition of its TLS sym. */
648 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
649 ppc64_elf_unhandled_reloc),
650
651 /* Computes a dtv-relative displacement, the difference between the value
652 of sym+add and the base address of the thread-local storage block that
653 contains the definition of sym, minus 0x8000. */
654 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
655 ppc64_elf_unhandled_reloc),
656
657 /* A 16 bit dtprel reloc. */
658 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
659 ppc64_elf_unhandled_reloc),
660
661 /* Like DTPREL16, but no overflow. */
662 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
663 ppc64_elf_unhandled_reloc),
664
665 /* Like DTPREL16_LO, but next higher group of 16 bits. */
666 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
667 ppc64_elf_unhandled_reloc),
668
669 /* Like DTPREL16_HI, but adjust for low 16 bits. */
670 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
671 ppc64_elf_unhandled_reloc),
672
673 /* Like DTPREL16_HI, but next higher group of 16 bits. */
674 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
675 ppc64_elf_unhandled_reloc),
676
677 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
678 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
679 ppc64_elf_unhandled_reloc),
680
681 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
682 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
683 ppc64_elf_unhandled_reloc),
684
685 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
686 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
687 ppc64_elf_unhandled_reloc),
688
689 /* Like DTPREL16, but for insns with a DS field. */
690 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
691 ppc64_elf_unhandled_reloc),
692
693 /* Like DTPREL16_DS, but no overflow. */
694 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
695 ppc64_elf_unhandled_reloc),
696
697 /* Computes a tp-relative displacement, the difference between the value of
698 sym+add and the value of the thread pointer (r13). */
699 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
700 ppc64_elf_unhandled_reloc),
701
702 /* A 16 bit tprel reloc. */
703 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
704 ppc64_elf_unhandled_reloc),
705
706 /* Like TPREL16, but no overflow. */
707 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
708 ppc64_elf_unhandled_reloc),
709
710 /* Like TPREL16_LO, but next higher group of 16 bits. */
711 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
712 ppc64_elf_unhandled_reloc),
713
714 /* Like TPREL16_HI, but adjust for low 16 bits. */
715 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
716 ppc64_elf_unhandled_reloc),
717
718 /* Like TPREL16_HI, but next higher group of 16 bits. */
719 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
720 ppc64_elf_unhandled_reloc),
721
722 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
723 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
724 ppc64_elf_unhandled_reloc),
725
726 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
727 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
728 ppc64_elf_unhandled_reloc),
729
730 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
731 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
732 ppc64_elf_unhandled_reloc),
733
734 /* Like TPREL16, but for insns with a DS field. */
735 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
736 ppc64_elf_unhandled_reloc),
737
738 /* Like TPREL16_DS, but no overflow. */
739 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
740 ppc64_elf_unhandled_reloc),
741
742 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
743 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
744 to the first entry relative to the TOC base (r2). */
745 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
746 ppc64_elf_unhandled_reloc),
747
748 /* Like GOT_TLSGD16, but no overflow. */
749 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
750 ppc64_elf_unhandled_reloc),
751
752 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
753 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
754 ppc64_elf_unhandled_reloc),
755
756 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
757 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
758 ppc64_elf_unhandled_reloc),
759
760 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
761 with values (sym+add)@dtpmod and zero, and computes the offset to the
762 first entry relative to the TOC base (r2). */
763 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
764 ppc64_elf_unhandled_reloc),
765
766 /* Like GOT_TLSLD16, but no overflow. */
767 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
768 ppc64_elf_unhandled_reloc),
769
770 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
771 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
772 ppc64_elf_unhandled_reloc),
773
774 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
775 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
776 ppc64_elf_unhandled_reloc),
777
778 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
779 the offset to the entry relative to the TOC base (r2). */
780 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
781 ppc64_elf_unhandled_reloc),
782
783 /* Like GOT_DTPREL16_DS, but no overflow. */
784 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
785 ppc64_elf_unhandled_reloc),
786
787 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
788 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
789 ppc64_elf_unhandled_reloc),
790
791 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
792 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
793 ppc64_elf_unhandled_reloc),
794
795 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
796 offset to the entry relative to the TOC base (r2). */
797 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
798 ppc64_elf_unhandled_reloc),
799
800 /* Like GOT_TPREL16_DS, but no overflow. */
801 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
802 ppc64_elf_unhandled_reloc),
803
804 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
805 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
806 ppc64_elf_unhandled_reloc),
807
808 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
809 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
813 ppc64_elf_unhandled_reloc),
814
815 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
816 bfd_elf_generic_reloc),
817
818 /* A 16 bit relative relocation. */
819 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
820 bfd_elf_generic_reloc),
821
822 /* A 16 bit relative relocation without overflow. */
823 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
824 bfd_elf_generic_reloc),
825
826 /* The high order 16 bits of a relative address. */
827 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
828 bfd_elf_generic_reloc),
829
830 /* The high order 16 bits of a relative address, plus 1 if the contents of
831 the low 16 bits, treated as a signed number, is negative. */
832 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
833 ppc64_elf_ha_reloc),
834
835 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
836 bfd_elf_generic_reloc),
837
838 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
839 ppc64_elf_ha_reloc),
840
841 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
842 bfd_elf_generic_reloc),
843
844 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
845 ppc64_elf_ha_reloc),
846
847 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
848 bfd_elf_generic_reloc),
849
850 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
851 ppc64_elf_ha_reloc),
852
853 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
854 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
855 ppc64_elf_ha_reloc),
856
857 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
858 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
859 ppc64_elf_ha_reloc),
860
861 /* Like R_PPC64_ADDR16_HI, but no overflow. */
862 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
863 bfd_elf_generic_reloc),
864
865 /* Like R_PPC64_ADDR16_HA, but no overflow. */
866 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
867 ppc64_elf_ha_reloc),
868
869 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
870 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
871 ppc64_elf_unhandled_reloc),
872
873 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
874 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
875 ppc64_elf_unhandled_reloc),
876
877 /* Like R_PPC64_TPREL16_HI, but no overflow. */
878 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
879 ppc64_elf_unhandled_reloc),
880
881 /* Like R_PPC64_TPREL16_HA, but no overflow. */
882 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
883 ppc64_elf_unhandled_reloc),
884
885 /* Marker reloc on ELFv2 large-model function entry. */
886 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
887 bfd_elf_generic_reloc),
888
889 /* Like ADDR64, but use local entry point of function. */
890 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
900 bfd_elf_generic_reloc),
901
902 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_prefix_reloc),
916
917 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
923 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
924 ppc64_elf_unhandled_reloc),
925
926 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
941 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
942 ppc64_elf_unhandled_reloc),
943
944 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
945 bfd_elf_generic_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
948 ppc64_elf_ha_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
951 bfd_elf_generic_reloc),
952
953 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
954 ppc64_elf_ha_reloc),
955
956 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
957 bfd_elf_generic_reloc),
958
959 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
960 ppc64_elf_ha_reloc),
961
962 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
963 bfd_elf_generic_reloc),
964
965 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
966 ppc64_elf_ha_reloc),
967
968 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
969 ppc64_elf_prefix_reloc),
970
971 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
972 ppc64_elf_prefix_reloc),
973
974 /* GNU extension to record C++ vtable hierarchy. */
975 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
976 NULL),
977
978 /* GNU extension to record C++ vtable member usage. */
979 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
980 NULL),
981 };
982
983 \f
984 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
985 be done. */
986
987 static void
988 ppc_howto_init (void)
989 {
990 unsigned int i, type;
991
992 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
993 {
994 type = ppc64_elf_howto_raw[i].type;
995 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
996 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
997 }
998 }
999
1000 static reloc_howto_type *
1001 ppc64_elf_reloc_type_lookup (bfd *abfd,
1002 bfd_reloc_code_real_type code)
1003 {
1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
1010 switch (code)
1011 {
1012 default:
1013 /* xgettext:c-format */
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
1016 bfd_set_error (bfd_error_bad_value);
1017 return NULL;
1018
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1034 break;
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1038 break;
1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1040 break;
1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1042 break;
1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1044 break;
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1048 break;
1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1050 break;
1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1052 break;
1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1054 break;
1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1056 break;
1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1058 break;
1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1060 break;
1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1062 break;
1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1064 break;
1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1066 break;
1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1068 break;
1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1070 break;
1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1072 break;
1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1074 break;
1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1076 break;
1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1078 break;
1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1080 break;
1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1082 break;
1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1084 break;
1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1086 break;
1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1088 break;
1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1090 break;
1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1092 break;
1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1094 break;
1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1096 break;
1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1098 break;
1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1100 break;
1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1102 break;
1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1104 break;
1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1106 break;
1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1108 break;
1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1110 break;
1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1112 break;
1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1114 break;
1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1116 break;
1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1118 break;
1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1120 break;
1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1122 break;
1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1124 break;
1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1126 break;
1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1128 break;
1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1130 break;
1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1132 break;
1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1134 break;
1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1136 break;
1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1138 break;
1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1140 break;
1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1142 break;
1143 case BFD_RELOC_PPC64_TLS_PCREL:
1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1145 break;
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1151 break;
1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1153 break;
1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1155 break;
1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1157 break;
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1161 break;
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1165 break;
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
1282 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1283 break;
1284 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1285 break;
1286 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1287 break;
1288 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1289 break;
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1313 break;
1314 }
1315
1316 return ppc64_elf_howto_table[r];
1317 };
1318
1319 static reloc_howto_type *
1320 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1321 const char *r_name)
1322 {
1323 unsigned int i;
1324
1325 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1326 if (ppc64_elf_howto_raw[i].name != NULL
1327 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1328 return &ppc64_elf_howto_raw[i];
1329
1330 return NULL;
1331 }
1332
1333 /* Set the howto pointer for a PowerPC ELF reloc. */
1334
1335 static bfd_boolean
1336 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1337 Elf_Internal_Rela *dst)
1338 {
1339 unsigned int type;
1340
1341 /* Initialize howto table if needed. */
1342 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1343 ppc_howto_init ();
1344
1345 type = ELF64_R_TYPE (dst->r_info);
1346 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1347 {
1348 /* xgettext:c-format */
1349 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1350 abfd, type);
1351 bfd_set_error (bfd_error_bad_value);
1352 return FALSE;
1353 }
1354 cache_ptr->howto = ppc64_elf_howto_table[type];
1355 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1356 {
1357 /* xgettext:c-format */
1358 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1359 abfd, type);
1360 bfd_set_error (bfd_error_bad_value);
1361 return FALSE;
1362 }
1363
1364 return TRUE;
1365 }
1366
1367 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1368
1369 static bfd_reloc_status_type
1370 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1371 void *data, asection *input_section,
1372 bfd *output_bfd, char **error_message)
1373 {
1374 enum elf_ppc64_reloc_type r_type;
1375 long insn;
1376 bfd_size_type octets;
1377 bfd_vma value;
1378
1379 /* If this is a relocatable link (output_bfd test tells us), just
1380 call the generic function. Any adjustment will be done at final
1381 link time. */
1382 if (output_bfd != NULL)
1383 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1384 input_section, output_bfd, error_message);
1385
1386 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1387 We won't actually be using the low bits, so trashing them
1388 doesn't matter. */
1389 r_type = reloc_entry->howto->type;
1390 if (r_type == R_PPC64_ADDR16_HIGHERA34
1391 || r_type == R_PPC64_ADDR16_HIGHESTA34
1392 || r_type == R_PPC64_REL16_HIGHERA34
1393 || r_type == R_PPC64_REL16_HIGHESTA34)
1394 reloc_entry->addend += 1ULL << 33;
1395 else
1396 reloc_entry->addend += 1U << 15;
1397 if (r_type != R_PPC64_REL16DX_HA)
1398 return bfd_reloc_continue;
1399
1400 value = 0;
1401 if (!bfd_is_com_section (symbol->section))
1402 value = symbol->value;
1403 value += (reloc_entry->addend
1404 + symbol->section->output_offset
1405 + symbol->section->output_section->vma);
1406 value -= (reloc_entry->address
1407 + input_section->output_offset
1408 + input_section->output_section->vma);
1409 value = (bfd_signed_vma) value >> 16;
1410
1411 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1412 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1413 insn &= ~0x1fffc1;
1414 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1415 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1416 if (value + 0x8000 > 0xffff)
1417 return bfd_reloc_overflow;
1418 return bfd_reloc_ok;
1419 }
1420
1421 static bfd_reloc_status_type
1422 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1423 void *data, asection *input_section,
1424 bfd *output_bfd, char **error_message)
1425 {
1426 if (output_bfd != NULL)
1427 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1428 input_section, output_bfd, error_message);
1429
1430 if (strcmp (symbol->section->name, ".opd") == 0
1431 && (symbol->section->owner->flags & DYNAMIC) == 0)
1432 {
1433 bfd_vma dest = opd_entry_value (symbol->section,
1434 symbol->value + reloc_entry->addend,
1435 NULL, NULL, FALSE);
1436 if (dest != (bfd_vma) -1)
1437 reloc_entry->addend = dest - (symbol->value
1438 + symbol->section->output_section->vma
1439 + symbol->section->output_offset);
1440 }
1441 else
1442 {
1443 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1444
1445 if (symbol->section->owner != abfd
1446 && symbol->section->owner != NULL
1447 && abiversion (symbol->section->owner) >= 2)
1448 {
1449 unsigned int i;
1450
1451 for (i = 0; i < symbol->section->owner->symcount; ++i)
1452 {
1453 asymbol *symdef = symbol->section->owner->outsymbols[i];
1454
1455 if (strcmp (symdef->name, symbol->name) == 0)
1456 {
1457 elfsym = (elf_symbol_type *) symdef;
1458 break;
1459 }
1460 }
1461 }
1462 reloc_entry->addend
1463 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1464 }
1465 return bfd_reloc_continue;
1466 }
1467
1468 static bfd_reloc_status_type
1469 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1470 void *data, asection *input_section,
1471 bfd *output_bfd, char **error_message)
1472 {
1473 long insn;
1474 enum elf_ppc64_reloc_type r_type;
1475 bfd_size_type octets;
1476 /* Assume 'at' branch hints. */
1477 bfd_boolean is_isa_v2 = TRUE;
1478
1479 /* If this is a relocatable link (output_bfd test tells us), just
1480 call the generic function. Any adjustment will be done at final
1481 link time. */
1482 if (output_bfd != NULL)
1483 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1484 input_section, output_bfd, error_message);
1485
1486 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1487 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1488 insn &= ~(0x01 << 21);
1489 r_type = reloc_entry->howto->type;
1490 if (r_type == R_PPC64_ADDR14_BRTAKEN
1491 || r_type == R_PPC64_REL14_BRTAKEN)
1492 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1493
1494 if (is_isa_v2)
1495 {
1496 /* Set 'a' bit. This is 0b00010 in BO field for branch
1497 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1498 for branch on CTR insns (BO == 1a00t or 1a01t). */
1499 if ((insn & (0x14 << 21)) == (0x04 << 21))
1500 insn |= 0x02 << 21;
1501 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1502 insn |= 0x08 << 21;
1503 else
1504 goto out;
1505 }
1506 else
1507 {
1508 bfd_vma target = 0;
1509 bfd_vma from;
1510
1511 if (!bfd_is_com_section (symbol->section))
1512 target = symbol->value;
1513 target += symbol->section->output_section->vma;
1514 target += symbol->section->output_offset;
1515 target += reloc_entry->addend;
1516
1517 from = (reloc_entry->address
1518 + input_section->output_offset
1519 + input_section->output_section->vma);
1520
1521 /* Invert 'y' bit if not the default. */
1522 if ((bfd_signed_vma) (target - from) < 0)
1523 insn ^= 0x01 << 21;
1524 }
1525 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1526 out:
1527 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1528 input_section, output_bfd, error_message);
1529 }
1530
1531 static bfd_reloc_status_type
1532 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1533 void *data, asection *input_section,
1534 bfd *output_bfd, char **error_message)
1535 {
1536 /* If this is a relocatable link (output_bfd test tells us), just
1537 call the generic function. Any adjustment will be done at final
1538 link time. */
1539 if (output_bfd != NULL)
1540 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1541 input_section, output_bfd, error_message);
1542
1543 /* Subtract the symbol section base address. */
1544 reloc_entry->addend -= symbol->section->output_section->vma;
1545 return bfd_reloc_continue;
1546 }
1547
1548 static bfd_reloc_status_type
1549 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
1552 {
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1558 input_section, output_bfd, error_message);
1559
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
1562
1563 /* Adjust the addend for sign extension of the low 16 bits. */
1564 reloc_entry->addend += 0x8000;
1565 return bfd_reloc_continue;
1566 }
1567
1568 static bfd_reloc_status_type
1569 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1570 void *data, asection *input_section,
1571 bfd *output_bfd, char **error_message)
1572 {
1573 bfd_vma TOCstart;
1574
1575 /* If this is a relocatable link (output_bfd test tells us), just
1576 call the generic function. Any adjustment will be done at final
1577 link time. */
1578 if (output_bfd != NULL)
1579 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1580 input_section, output_bfd, error_message);
1581
1582 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1583 if (TOCstart == 0)
1584 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1585
1586 /* Subtract the TOC base address. */
1587 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1588 return bfd_reloc_continue;
1589 }
1590
1591 static bfd_reloc_status_type
1592 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1593 void *data, asection *input_section,
1594 bfd *output_bfd, char **error_message)
1595 {
1596 bfd_vma TOCstart;
1597
1598 /* If this is a relocatable link (output_bfd test tells us), just
1599 call the generic function. Any adjustment will be done at final
1600 link time. */
1601 if (output_bfd != NULL)
1602 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1603 input_section, output_bfd, error_message);
1604
1605 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1606 if (TOCstart == 0)
1607 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1608
1609 /* Subtract the TOC base address. */
1610 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1611
1612 /* Adjust the addend for sign extension of the low 16 bits. */
1613 reloc_entry->addend += 0x8000;
1614 return bfd_reloc_continue;
1615 }
1616
1617 static bfd_reloc_status_type
1618 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1619 void *data, asection *input_section,
1620 bfd *output_bfd, char **error_message)
1621 {
1622 bfd_vma TOCstart;
1623 bfd_size_type octets;
1624
1625 /* If this is a relocatable link (output_bfd test tells us), just
1626 call the generic function. Any adjustment will be done at final
1627 link time. */
1628 if (output_bfd != NULL)
1629 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1630 input_section, output_bfd, error_message);
1631
1632 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1633 if (TOCstart == 0)
1634 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1635
1636 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1637 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1638 return bfd_reloc_ok;
1639 }
1640
1641 static bfd_reloc_status_type
1642 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1643 void *data, asection *input_section,
1644 bfd *output_bfd, char **error_message)
1645 {
1646 uint64_t insn;
1647 bfd_vma targ;
1648
1649 if (output_bfd != NULL)
1650 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1651 input_section, output_bfd, error_message);
1652
1653 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1654 insn <<= 32;
1655 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1656
1657 targ = (symbol->section->output_section->vma
1658 + symbol->section->output_offset
1659 + reloc_entry->addend);
1660 if (!bfd_is_com_section (symbol->section))
1661 targ += symbol->value;
1662 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1663 targ += 1ULL << 33;
1664 if (reloc_entry->howto->pc_relative)
1665 {
1666 bfd_vma from = (reloc_entry->address
1667 + input_section->output_offset
1668 + input_section->output_section->vma);
1669 targ -=from;
1670 }
1671 targ >>= reloc_entry->howto->rightshift;
1672 insn &= ~reloc_entry->howto->dst_mask;
1673 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1674 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1675 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1676 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1677 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1678 >= 1ULL << reloc_entry->howto->bitsize))
1679 return bfd_reloc_overflow;
1680 return bfd_reloc_ok;
1681 }
1682
1683 static bfd_reloc_status_type
1684 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1685 void *data, asection *input_section,
1686 bfd *output_bfd, char **error_message)
1687 {
1688 /* If this is a relocatable link (output_bfd test tells us), just
1689 call the generic function. Any adjustment will be done at final
1690 link time. */
1691 if (output_bfd != NULL)
1692 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1693 input_section, output_bfd, error_message);
1694
1695 if (error_message != NULL)
1696 {
1697 static char buf[60];
1698 sprintf (buf, "generic linker can't handle %s",
1699 reloc_entry->howto->name);
1700 *error_message = buf;
1701 }
1702 return bfd_reloc_dangerous;
1703 }
1704
1705 /* Track GOT entries needed for a given symbol. We might need more
1706 than one got entry per symbol. */
1707 struct got_entry
1708 {
1709 struct got_entry *next;
1710
1711 /* The symbol addend that we'll be placing in the GOT. */
1712 bfd_vma addend;
1713
1714 /* Unlike other ELF targets, we use separate GOT entries for the same
1715 symbol referenced from different input files. This is to support
1716 automatic multiple TOC/GOT sections, where the TOC base can vary
1717 from one input file to another. After partitioning into TOC groups
1718 we merge entries within the group.
1719
1720 Point to the BFD owning this GOT entry. */
1721 bfd *owner;
1722
1723 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1724 TLS_TPREL or TLS_DTPREL for tls entries. */
1725 unsigned char tls_type;
1726
1727 /* Non-zero if got.ent points to real entry. */
1728 unsigned char is_indirect;
1729
1730 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1731 union
1732 {
1733 bfd_signed_vma refcount;
1734 bfd_vma offset;
1735 struct got_entry *ent;
1736 } got;
1737 };
1738
1739 /* The same for PLT. */
1740 struct plt_entry
1741 {
1742 struct plt_entry *next;
1743
1744 bfd_vma addend;
1745
1746 union
1747 {
1748 bfd_signed_vma refcount;
1749 bfd_vma offset;
1750 } plt;
1751 };
1752
1753 struct ppc64_elf_obj_tdata
1754 {
1755 struct elf_obj_tdata elf;
1756
1757 /* Shortcuts to dynamic linker sections. */
1758 asection *got;
1759 asection *relgot;
1760
1761 /* Used during garbage collection. We attach global symbols defined
1762 on removed .opd entries to this section so that the sym is removed. */
1763 asection *deleted_section;
1764
1765 /* TLS local dynamic got entry handling. Support for multiple GOT
1766 sections means we potentially need one of these for each input bfd. */
1767 struct got_entry tlsld_got;
1768
1769 union
1770 {
1771 /* A copy of relocs before they are modified for --emit-relocs. */
1772 Elf_Internal_Rela *relocs;
1773
1774 /* Section contents. */
1775 bfd_byte *contents;
1776 } opd;
1777
1778 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1779 the reloc to be in the range -32768 to 32767. */
1780 unsigned int has_small_toc_reloc : 1;
1781
1782 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1783 instruction not one we handle. */
1784 unsigned int unexpected_toc_insn : 1;
1785
1786 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1787 this file. */
1788 unsigned int has_optrel : 1;
1789 };
1790
1791 #define ppc64_elf_tdata(bfd) \
1792 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1793
1794 #define ppc64_tlsld_got(bfd) \
1795 (&ppc64_elf_tdata (bfd)->tlsld_got)
1796
1797 #define is_ppc64_elf(bfd) \
1798 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1799 && elf_object_id (bfd) == PPC64_ELF_DATA)
1800
1801 /* Override the generic function because we store some extras. */
1802
1803 static bfd_boolean
1804 ppc64_elf_mkobject (bfd *abfd)
1805 {
1806 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1807 PPC64_ELF_DATA);
1808 }
1809
1810 /* Fix bad default arch selected for a 64 bit input bfd when the
1811 default is 32 bit. Also select arch based on apuinfo. */
1812
1813 static bfd_boolean
1814 ppc64_elf_object_p (bfd *abfd)
1815 {
1816 if (!abfd->arch_info->the_default)
1817 return TRUE;
1818
1819 if (abfd->arch_info->bits_per_word == 32)
1820 {
1821 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1822
1823 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1824 {
1825 /* Relies on arch after 32 bit default being 64 bit default. */
1826 abfd->arch_info = abfd->arch_info->next;
1827 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1828 }
1829 }
1830 return _bfd_elf_ppc_set_arch (abfd);
1831 }
1832
1833 /* Support for core dump NOTE sections. */
1834
1835 static bfd_boolean
1836 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1837 {
1838 size_t offset, size;
1839
1840 if (note->descsz != 504)
1841 return FALSE;
1842
1843 /* pr_cursig */
1844 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1845
1846 /* pr_pid */
1847 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1848
1849 /* pr_reg */
1850 offset = 112;
1851 size = 384;
1852
1853 /* Make a ".reg/999" section. */
1854 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1855 size, note->descpos + offset);
1856 }
1857
1858 static bfd_boolean
1859 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1860 {
1861 if (note->descsz != 136)
1862 return FALSE;
1863
1864 elf_tdata (abfd)->core->pid
1865 = bfd_get_32 (abfd, note->descdata + 24);
1866 elf_tdata (abfd)->core->program
1867 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1868 elf_tdata (abfd)->core->command
1869 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1870
1871 return TRUE;
1872 }
1873
1874 static char *
1875 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1876 ...)
1877 {
1878 switch (note_type)
1879 {
1880 default:
1881 return NULL;
1882
1883 case NT_PRPSINFO:
1884 {
1885 char data[136] ATTRIBUTE_NONSTRING;
1886 va_list ap;
1887
1888 va_start (ap, note_type);
1889 memset (data, 0, sizeof (data));
1890 strncpy (data + 40, va_arg (ap, const char *), 16);
1891 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1892 DIAGNOSTIC_PUSH;
1893 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1894 -Wstringop-truncation:
1895 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1896 */
1897 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1898 #endif
1899 strncpy (data + 56, va_arg (ap, const char *), 80);
1900 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1901 DIAGNOSTIC_POP;
1902 #endif
1903 va_end (ap);
1904 return elfcore_write_note (abfd, buf, bufsiz,
1905 "CORE", note_type, data, sizeof (data));
1906 }
1907
1908 case NT_PRSTATUS:
1909 {
1910 char data[504];
1911 va_list ap;
1912 long pid;
1913 int cursig;
1914 const void *greg;
1915
1916 va_start (ap, note_type);
1917 memset (data, 0, 112);
1918 pid = va_arg (ap, long);
1919 bfd_put_32 (abfd, pid, data + 32);
1920 cursig = va_arg (ap, int);
1921 bfd_put_16 (abfd, cursig, data + 12);
1922 greg = va_arg (ap, const void *);
1923 memcpy (data + 112, greg, 384);
1924 memset (data + 496, 0, 8);
1925 va_end (ap);
1926 return elfcore_write_note (abfd, buf, bufsiz,
1927 "CORE", note_type, data, sizeof (data));
1928 }
1929 }
1930 }
1931
1932 /* Add extra PPC sections. */
1933
1934 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1935 {
1936 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1937 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1938 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1939 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1941 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1942 { NULL, 0, 0, 0, 0 }
1943 };
1944
1945 enum _ppc64_sec_type {
1946 sec_normal = 0,
1947 sec_opd = 1,
1948 sec_toc = 2
1949 };
1950
1951 struct _ppc64_elf_section_data
1952 {
1953 struct bfd_elf_section_data elf;
1954
1955 union
1956 {
1957 /* An array with one entry for each opd function descriptor,
1958 and some spares since opd entries may be either 16 or 24 bytes. */
1959 #define OPD_NDX(OFF) ((OFF) >> 4)
1960 struct _opd_sec_data
1961 {
1962 /* Points to the function code section for local opd entries. */
1963 asection **func_sec;
1964
1965 /* After editing .opd, adjust references to opd local syms. */
1966 long *adjust;
1967 } opd;
1968
1969 /* An array for toc sections, indexed by offset/8. */
1970 struct _toc_sec_data
1971 {
1972 /* Specifies the relocation symbol index used at a given toc offset. */
1973 unsigned *symndx;
1974
1975 /* And the relocation addend. */
1976 bfd_vma *add;
1977 } toc;
1978 } u;
1979
1980 enum _ppc64_sec_type sec_type:2;
1981
1982 /* Flag set when small branches are detected. Used to
1983 select suitable defaults for the stub group size. */
1984 unsigned int has_14bit_branch:1;
1985
1986 /* Flag set when PLTCALL relocs are detected. */
1987 unsigned int has_pltcall:1;
1988
1989 /* Flag set when section has PLT/GOT/TOC relocations that can be
1990 optimised. */
1991 unsigned int has_optrel:1;
1992 };
1993
1994 #define ppc64_elf_section_data(sec) \
1995 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
1996
1997 static bfd_boolean
1998 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
1999 {
2000 if (!sec->used_by_bfd)
2001 {
2002 struct _ppc64_elf_section_data *sdata;
2003 bfd_size_type amt = sizeof (*sdata);
2004
2005 sdata = bfd_zalloc (abfd, amt);
2006 if (sdata == NULL)
2007 return FALSE;
2008 sec->used_by_bfd = sdata;
2009 }
2010
2011 return _bfd_elf_new_section_hook (abfd, sec);
2012 }
2013
2014 static struct _opd_sec_data *
2015 get_opd_info (asection * sec)
2016 {
2017 if (sec != NULL
2018 && ppc64_elf_section_data (sec) != NULL
2019 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2020 return &ppc64_elf_section_data (sec)->u.opd;
2021 return NULL;
2022 }
2023 \f
2024 /* Parameters for the qsort hook. */
2025 static bfd_boolean synthetic_relocatable;
2026 static asection *synthetic_opd;
2027
2028 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2029
2030 static int
2031 compare_symbols (const void *ap, const void *bp)
2032 {
2033 const asymbol *a = *(const asymbol **) ap;
2034 const asymbol *b = *(const asymbol **) bp;
2035
2036 /* Section symbols first. */
2037 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2038 return -1;
2039 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2040 return 1;
2041
2042 /* then .opd symbols. */
2043 if (synthetic_opd != NULL)
2044 {
2045 if (strcmp (a->section->name, ".opd") == 0
2046 && strcmp (b->section->name, ".opd") != 0)
2047 return -1;
2048 if (strcmp (a->section->name, ".opd") != 0
2049 && strcmp (b->section->name, ".opd") == 0)
2050 return 1;
2051 }
2052
2053 /* then other code symbols. */
2054 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2055 == (SEC_CODE | SEC_ALLOC))
2056 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2057 != (SEC_CODE | SEC_ALLOC)))
2058 return -1;
2059
2060 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2061 != (SEC_CODE | SEC_ALLOC))
2062 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2063 == (SEC_CODE | SEC_ALLOC)))
2064 return 1;
2065
2066 if (synthetic_relocatable)
2067 {
2068 if (a->section->id < b->section->id)
2069 return -1;
2070
2071 if (a->section->id > b->section->id)
2072 return 1;
2073 }
2074
2075 if (a->value + a->section->vma < b->value + b->section->vma)
2076 return -1;
2077
2078 if (a->value + a->section->vma > b->value + b->section->vma)
2079 return 1;
2080
2081 /* For syms with the same value, prefer strong dynamic global function
2082 syms over other syms. */
2083 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2084 return -1;
2085
2086 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2087 return 1;
2088
2089 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2090 return -1;
2091
2092 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2093 return 1;
2094
2095 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2096 return -1;
2097
2098 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2099 return 1;
2100
2101 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2102 return -1;
2103
2104 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2105 return 1;
2106
2107 /* Finally, sort on where the symbol is in memory. The symbols will
2108 be in at most two malloc'd blocks, one for static syms, one for
2109 dynamic syms, and we distinguish the two blocks above by testing
2110 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2111 originally in the same order as the symbols (and we're not
2112 sorting the symbols themselves), this ensures a stable sort. */
2113 if (a < b)
2114 return -1;
2115 if (a > b)
2116 return 1;
2117 return 0;
2118 }
2119
2120 /* Search SYMS for a symbol of the given VALUE. */
2121
2122 static asymbol *
2123 sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2124 bfd_vma value)
2125 {
2126 size_t mid;
2127
2128 if (id == (unsigned) -1)
2129 {
2130 while (lo < hi)
2131 {
2132 mid = (lo + hi) >> 1;
2133 if (syms[mid]->value + syms[mid]->section->vma < value)
2134 lo = mid + 1;
2135 else if (syms[mid]->value + syms[mid]->section->vma > value)
2136 hi = mid;
2137 else
2138 return syms[mid];
2139 }
2140 }
2141 else
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->section->id < id)
2147 lo = mid + 1;
2148 else if (syms[mid]->section->id > id)
2149 hi = mid;
2150 else if (syms[mid]->value < value)
2151 lo = mid + 1;
2152 else if (syms[mid]->value > value)
2153 hi = mid;
2154 else
2155 return syms[mid];
2156 }
2157 }
2158 return NULL;
2159 }
2160
2161 static bfd_boolean
2162 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2163 {
2164 bfd_vma vma = *(bfd_vma *) ptr;
2165 return ((section->flags & SEC_ALLOC) != 0
2166 && section->vma <= vma
2167 && vma < section->vma + section->size);
2168 }
2169
2170 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2171 entry syms. Also generate @plt symbols for the glink branch table.
2172 Returns count of synthetic symbols in RET or -1 on error. */
2173
2174 static long
2175 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2176 long static_count, asymbol **static_syms,
2177 long dyn_count, asymbol **dyn_syms,
2178 asymbol **ret)
2179 {
2180 asymbol *s;
2181 size_t i, j, count;
2182 char *names;
2183 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2184 asection *opd = NULL;
2185 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2186 asymbol **syms;
2187 int abi = abiversion (abfd);
2188
2189 *ret = NULL;
2190
2191 if (abi < 2)
2192 {
2193 opd = bfd_get_section_by_name (abfd, ".opd");
2194 if (opd == NULL && abi == 1)
2195 return 0;
2196 }
2197
2198 syms = NULL;
2199 codesecsym = 0;
2200 codesecsymend = 0;
2201 secsymend = 0;
2202 opdsymend = 0;
2203 symcount = 0;
2204 if (opd != NULL)
2205 {
2206 symcount = static_count;
2207 if (!relocatable)
2208 symcount += dyn_count;
2209 if (symcount == 0)
2210 return 0;
2211
2212 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2213 if (syms == NULL)
2214 return -1;
2215
2216 if (!relocatable && static_count != 0 && dyn_count != 0)
2217 {
2218 /* Use both symbol tables. */
2219 memcpy (syms, static_syms, static_count * sizeof (*syms));
2220 memcpy (syms + static_count, dyn_syms,
2221 (dyn_count + 1) * sizeof (*syms));
2222 }
2223 else if (!relocatable && static_count == 0)
2224 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2225 else
2226 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2227
2228 /* Trim uninteresting symbols. Interesting symbols are section,
2229 function, and notype symbols. */
2230 for (i = 0, j = 0; i < symcount; ++i)
2231 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2232 | BSF_RELC | BSF_SRELC)) == 0)
2233 syms[j++] = syms[i];
2234 symcount = j;
2235
2236 synthetic_relocatable = relocatable;
2237 synthetic_opd = opd;
2238 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2239
2240 if (!relocatable && symcount > 1)
2241 {
2242 /* Trim duplicate syms, since we may have merged the normal
2243 and dynamic symbols. Actually, we only care about syms
2244 that have different values, so trim any with the same
2245 value. Don't consider ifunc and ifunc resolver symbols
2246 duplicates however, because GDB wants to know whether a
2247 text symbol is an ifunc resolver. */
2248 for (i = 1, j = 1; i < symcount; ++i)
2249 {
2250 const asymbol *s0 = syms[i - 1];
2251 const asymbol *s1 = syms[i];
2252
2253 if ((s0->value + s0->section->vma
2254 != s1->value + s1->section->vma)
2255 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2256 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2257 syms[j++] = syms[i];
2258 }
2259 symcount = j;
2260 }
2261
2262 i = 0;
2263 /* Note that here and in compare_symbols we can't compare opd and
2264 sym->section directly. With separate debug info files, the
2265 symbols will be extracted from the debug file while abfd passed
2266 to this function is the real binary. */
2267 if (strcmp (syms[i]->section->name, ".opd") == 0)
2268 ++i;
2269 codesecsym = i;
2270
2271 for (; i < symcount; ++i)
2272 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2273 | SEC_THREAD_LOCAL))
2274 != (SEC_CODE | SEC_ALLOC))
2275 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2276 break;
2277 codesecsymend = i;
2278
2279 for (; i < symcount; ++i)
2280 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2281 break;
2282 secsymend = i;
2283
2284 for (; i < symcount; ++i)
2285 if (strcmp (syms[i]->section->name, ".opd") != 0)
2286 break;
2287 opdsymend = i;
2288
2289 for (; i < symcount; ++i)
2290 if (((syms[i]->section->flags
2291 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2292 != (SEC_CODE | SEC_ALLOC))
2293 break;
2294 symcount = i;
2295 }
2296 count = 0;
2297
2298 if (relocatable)
2299 {
2300 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2301 arelent *r;
2302 size_t size;
2303 size_t relcount;
2304
2305 if (opdsymend == secsymend)
2306 goto done;
2307
2308 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2309 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2310 if (relcount == 0)
2311 goto done;
2312
2313 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2314 {
2315 count = -1;
2316 goto done;
2317 }
2318
2319 size = 0;
2320 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2321 {
2322 asymbol *sym;
2323
2324 while (r < opd->relocation + relcount
2325 && r->address < syms[i]->value + opd->vma)
2326 ++r;
2327
2328 if (r == opd->relocation + relcount)
2329 break;
2330
2331 if (r->address != syms[i]->value + opd->vma)
2332 continue;
2333
2334 if (r->howto->type != R_PPC64_ADDR64)
2335 continue;
2336
2337 sym = *r->sym_ptr_ptr;
2338 if (!sym_exists_at (syms, opdsymend, symcount,
2339 sym->section->id, sym->value + r->addend))
2340 {
2341 ++count;
2342 size += sizeof (asymbol);
2343 size += strlen (syms[i]->name) + 2;
2344 }
2345 }
2346
2347 if (size == 0)
2348 goto done;
2349 s = *ret = bfd_malloc (size);
2350 if (s == NULL)
2351 {
2352 count = -1;
2353 goto done;
2354 }
2355
2356 names = (char *) (s + count);
2357
2358 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2359 {
2360 asymbol *sym;
2361
2362 while (r < opd->relocation + relcount
2363 && r->address < syms[i]->value + opd->vma)
2364 ++r;
2365
2366 if (r == opd->relocation + relcount)
2367 break;
2368
2369 if (r->address != syms[i]->value + opd->vma)
2370 continue;
2371
2372 if (r->howto->type != R_PPC64_ADDR64)
2373 continue;
2374
2375 sym = *r->sym_ptr_ptr;
2376 if (!sym_exists_at (syms, opdsymend, symcount,
2377 sym->section->id, sym->value + r->addend))
2378 {
2379 size_t len;
2380
2381 *s = *syms[i];
2382 s->flags |= BSF_SYNTHETIC;
2383 s->section = sym->section;
2384 s->value = sym->value + r->addend;
2385 s->name = names;
2386 *names++ = '.';
2387 len = strlen (syms[i]->name);
2388 memcpy (names, syms[i]->name, len + 1);
2389 names += len + 1;
2390 /* Have udata.p point back to the original symbol this
2391 synthetic symbol was derived from. */
2392 s->udata.p = syms[i];
2393 s++;
2394 }
2395 }
2396 }
2397 else
2398 {
2399 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2400 bfd_byte *contents = NULL;
2401 size_t size;
2402 size_t plt_count = 0;
2403 bfd_vma glink_vma = 0, resolv_vma = 0;
2404 asection *dynamic, *glink = NULL, *relplt = NULL;
2405 arelent *p;
2406
2407 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2408 {
2409 free_contents_and_exit_err:
2410 count = -1;
2411 free_contents_and_exit:
2412 if (contents)
2413 free (contents);
2414 goto done;
2415 }
2416
2417 size = 0;
2418 for (i = secsymend; i < opdsymend; ++i)
2419 {
2420 bfd_vma ent;
2421
2422 /* Ignore bogus symbols. */
2423 if (syms[i]->value > opd->size - 8)
2424 continue;
2425
2426 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2427 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2428 {
2429 ++count;
2430 size += sizeof (asymbol);
2431 size += strlen (syms[i]->name) + 2;
2432 }
2433 }
2434
2435 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2436 if (dyn_count != 0
2437 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2438 {
2439 bfd_byte *dynbuf, *extdyn, *extdynend;
2440 size_t extdynsize;
2441 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2442
2443 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2444 goto free_contents_and_exit_err;
2445
2446 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2447 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2448
2449 extdyn = dynbuf;
2450 extdynend = extdyn + dynamic->size;
2451 for (; extdyn < extdynend; extdyn += extdynsize)
2452 {
2453 Elf_Internal_Dyn dyn;
2454 (*swap_dyn_in) (abfd, extdyn, &dyn);
2455
2456 if (dyn.d_tag == DT_NULL)
2457 break;
2458
2459 if (dyn.d_tag == DT_PPC64_GLINK)
2460 {
2461 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2462 See comment in ppc64_elf_finish_dynamic_sections. */
2463 glink_vma = dyn.d_un.d_val + 8 * 4;
2464 /* The .glink section usually does not survive the final
2465 link; search for the section (usually .text) where the
2466 glink stubs now reside. */
2467 glink = bfd_sections_find_if (abfd, section_covers_vma,
2468 &glink_vma);
2469 break;
2470 }
2471 }
2472
2473 free (dynbuf);
2474 }
2475
2476 if (glink != NULL)
2477 {
2478 /* Determine __glink trampoline by reading the relative branch
2479 from the first glink stub. */
2480 bfd_byte buf[4];
2481 unsigned int off = 0;
2482
2483 while (bfd_get_section_contents (abfd, glink, buf,
2484 glink_vma + off - glink->vma, 4))
2485 {
2486 unsigned int insn = bfd_get_32 (abfd, buf);
2487 insn ^= B_DOT;
2488 if ((insn & ~0x3fffffc) == 0)
2489 {
2490 resolv_vma
2491 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2492 break;
2493 }
2494 off += 4;
2495 if (off > 4)
2496 break;
2497 }
2498
2499 if (resolv_vma)
2500 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2501
2502 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2503 if (relplt != NULL)
2504 {
2505 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2506 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2507 goto free_contents_and_exit_err;
2508
2509 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2510 size += plt_count * sizeof (asymbol);
2511
2512 p = relplt->relocation;
2513 for (i = 0; i < plt_count; i++, p++)
2514 {
2515 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2516 if (p->addend != 0)
2517 size += sizeof ("+0x") - 1 + 16;
2518 }
2519 }
2520 }
2521
2522 if (size == 0)
2523 goto free_contents_and_exit;
2524 s = *ret = bfd_malloc (size);
2525 if (s == NULL)
2526 goto free_contents_and_exit_err;
2527
2528 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2529
2530 for (i = secsymend; i < opdsymend; ++i)
2531 {
2532 bfd_vma ent;
2533
2534 if (syms[i]->value > opd->size - 8)
2535 continue;
2536
2537 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2538 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2539 {
2540 size_t lo, hi;
2541 size_t len;
2542 asection *sec = abfd->sections;
2543
2544 *s = *syms[i];
2545 lo = codesecsym;
2546 hi = codesecsymend;
2547 while (lo < hi)
2548 {
2549 size_t mid = (lo + hi) >> 1;
2550 if (syms[mid]->section->vma < ent)
2551 lo = mid + 1;
2552 else if (syms[mid]->section->vma > ent)
2553 hi = mid;
2554 else
2555 {
2556 sec = syms[mid]->section;
2557 break;
2558 }
2559 }
2560
2561 if (lo >= hi && lo > codesecsym)
2562 sec = syms[lo - 1]->section;
2563
2564 for (; sec != NULL; sec = sec->next)
2565 {
2566 if (sec->vma > ent)
2567 break;
2568 /* SEC_LOAD may not be set if SEC is from a separate debug
2569 info file. */
2570 if ((sec->flags & SEC_ALLOC) == 0)
2571 break;
2572 if ((sec->flags & SEC_CODE) != 0)
2573 s->section = sec;
2574 }
2575 s->flags |= BSF_SYNTHETIC;
2576 s->value = ent - s->section->vma;
2577 s->name = names;
2578 *names++ = '.';
2579 len = strlen (syms[i]->name);
2580 memcpy (names, syms[i]->name, len + 1);
2581 names += len + 1;
2582 /* Have udata.p point back to the original symbol this
2583 synthetic symbol was derived from. */
2584 s->udata.p = syms[i];
2585 s++;
2586 }
2587 }
2588 free (contents);
2589
2590 if (glink != NULL && relplt != NULL)
2591 {
2592 if (resolv_vma)
2593 {
2594 /* Add a symbol for the main glink trampoline. */
2595 memset (s, 0, sizeof *s);
2596 s->the_bfd = abfd;
2597 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2598 s->section = glink;
2599 s->value = resolv_vma - glink->vma;
2600 s->name = names;
2601 memcpy (names, "__glink_PLTresolve",
2602 sizeof ("__glink_PLTresolve"));
2603 names += sizeof ("__glink_PLTresolve");
2604 s++;
2605 count++;
2606 }
2607
2608 /* FIXME: It would be very much nicer to put sym@plt on the
2609 stub rather than on the glink branch table entry. The
2610 objdump disassembler would then use a sensible symbol
2611 name on plt calls. The difficulty in doing so is
2612 a) finding the stubs, and,
2613 b) matching stubs against plt entries, and,
2614 c) there can be multiple stubs for a given plt entry.
2615
2616 Solving (a) could be done by code scanning, but older
2617 ppc64 binaries used different stubs to current code.
2618 (b) is the tricky one since you need to known the toc
2619 pointer for at least one function that uses a pic stub to
2620 be able to calculate the plt address referenced.
2621 (c) means gdb would need to set multiple breakpoints (or
2622 find the glink branch itself) when setting breakpoints
2623 for pending shared library loads. */
2624 p = relplt->relocation;
2625 for (i = 0; i < plt_count; i++, p++)
2626 {
2627 size_t len;
2628
2629 *s = **p->sym_ptr_ptr;
2630 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2631 we are defining a symbol, ensure one of them is set. */
2632 if ((s->flags & BSF_LOCAL) == 0)
2633 s->flags |= BSF_GLOBAL;
2634 s->flags |= BSF_SYNTHETIC;
2635 s->section = glink;
2636 s->value = glink_vma - glink->vma;
2637 s->name = names;
2638 s->udata.p = NULL;
2639 len = strlen ((*p->sym_ptr_ptr)->name);
2640 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2641 names += len;
2642 if (p->addend != 0)
2643 {
2644 memcpy (names, "+0x", sizeof ("+0x") - 1);
2645 names += sizeof ("+0x") - 1;
2646 bfd_sprintf_vma (abfd, names, p->addend);
2647 names += strlen (names);
2648 }
2649 memcpy (names, "@plt", sizeof ("@plt"));
2650 names += sizeof ("@plt");
2651 s++;
2652 if (abi < 2)
2653 {
2654 glink_vma += 8;
2655 if (i >= 0x8000)
2656 glink_vma += 4;
2657 }
2658 else
2659 glink_vma += 4;
2660 }
2661 count += plt_count;
2662 }
2663 }
2664
2665 done:
2666 free (syms);
2667 return count;
2668 }
2669 \f
2670 /* The following functions are specific to the ELF linker, while
2671 functions above are used generally. Those named ppc64_elf_* are
2672 called by the main ELF linker code. They appear in this file more
2673 or less in the order in which they are called. eg.
2674 ppc64_elf_check_relocs is called early in the link process,
2675 ppc64_elf_finish_dynamic_sections is one of the last functions
2676 called.
2677
2678 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2679 functions have both a function code symbol and a function descriptor
2680 symbol. A call to foo in a relocatable object file looks like:
2681
2682 . .text
2683 . x:
2684 . bl .foo
2685 . nop
2686
2687 The function definition in another object file might be:
2688
2689 . .section .opd
2690 . foo: .quad .foo
2691 . .quad .TOC.@tocbase
2692 . .quad 0
2693 .
2694 . .text
2695 . .foo: blr
2696
2697 When the linker resolves the call during a static link, the branch
2698 unsurprisingly just goes to .foo and the .opd information is unused.
2699 If the function definition is in a shared library, things are a little
2700 different: The call goes via a plt call stub, the opd information gets
2701 copied to the plt, and the linker patches the nop.
2702
2703 . x:
2704 . bl .foo_stub
2705 . ld 2,40(1)
2706 .
2707 .
2708 . .foo_stub:
2709 . std 2,40(1) # in practice, the call stub
2710 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2711 . addi 11,11,Lfoo@toc@l # this is the general idea
2712 . ld 12,0(11)
2713 . ld 2,8(11)
2714 . mtctr 12
2715 . ld 11,16(11)
2716 . bctr
2717 .
2718 . .section .plt
2719 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2720
2721 The "reloc ()" notation is supposed to indicate that the linker emits
2722 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2723 copying.
2724
2725 What are the difficulties here? Well, firstly, the relocations
2726 examined by the linker in check_relocs are against the function code
2727 sym .foo, while the dynamic relocation in the plt is emitted against
2728 the function descriptor symbol, foo. Somewhere along the line, we need
2729 to carefully copy dynamic link information from one symbol to the other.
2730 Secondly, the generic part of the elf linker will make .foo a dynamic
2731 symbol as is normal for most other backends. We need foo dynamic
2732 instead, at least for an application final link. However, when
2733 creating a shared library containing foo, we need to have both symbols
2734 dynamic so that references to .foo are satisfied during the early
2735 stages of linking. Otherwise the linker might decide to pull in a
2736 definition from some other object, eg. a static library.
2737
2738 Update: As of August 2004, we support a new convention. Function
2739 calls may use the function descriptor symbol, ie. "bl foo". This
2740 behaves exactly as "bl .foo". */
2741
2742 /* Of those relocs that might be copied as dynamic relocs, this
2743 function selects those that must be copied when linking a shared
2744 library or PIE, even when the symbol is local. */
2745
2746 static int
2747 must_be_dyn_reloc (struct bfd_link_info *info,
2748 enum elf_ppc64_reloc_type r_type)
2749 {
2750 switch (r_type)
2751 {
2752 default:
2753 /* Only relative relocs can be resolved when the object load
2754 address isn't fixed. DTPREL64 is excluded because the
2755 dynamic linker needs to differentiate global dynamic from
2756 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2757 return 1;
2758
2759 case R_PPC64_REL32:
2760 case R_PPC64_REL64:
2761 case R_PPC64_REL30:
2762 case R_PPC64_TOC16:
2763 case R_PPC64_TOC16_DS:
2764 case R_PPC64_TOC16_LO:
2765 case R_PPC64_TOC16_HI:
2766 case R_PPC64_TOC16_HA:
2767 case R_PPC64_TOC16_LO_DS:
2768 return 0;
2769
2770 case R_PPC64_TPREL16:
2771 case R_PPC64_TPREL16_LO:
2772 case R_PPC64_TPREL16_HI:
2773 case R_PPC64_TPREL16_HA:
2774 case R_PPC64_TPREL16_DS:
2775 case R_PPC64_TPREL16_LO_DS:
2776 case R_PPC64_TPREL16_HIGH:
2777 case R_PPC64_TPREL16_HIGHA:
2778 case R_PPC64_TPREL16_HIGHER:
2779 case R_PPC64_TPREL16_HIGHERA:
2780 case R_PPC64_TPREL16_HIGHEST:
2781 case R_PPC64_TPREL16_HIGHESTA:
2782 case R_PPC64_TPREL64:
2783 case R_PPC64_TPREL34:
2784 /* These relocations are relative but in a shared library the
2785 linker doesn't know the thread pointer base. */
2786 return bfd_link_dll (info);
2787 }
2788 }
2789
2790 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2791 copying dynamic variables from a shared lib into an app's dynbss
2792 section, and instead use a dynamic relocation to point into the
2793 shared lib. With code that gcc generates, it's vital that this be
2794 enabled; In the PowerPC64 ABI, the address of a function is actually
2795 the address of a function descriptor, which resides in the .opd
2796 section. gcc uses the descriptor directly rather than going via the
2797 GOT as some other ABI's do, which means that initialized function
2798 pointers must reference the descriptor. Thus, a function pointer
2799 initialized to the address of a function in a shared library will
2800 either require a copy reloc, or a dynamic reloc. Using a copy reloc
2801 redefines the function descriptor symbol to point to the copy. This
2802 presents a problem as a plt entry for that function is also
2803 initialized from the function descriptor symbol and the copy reloc
2804 may not be initialized first. */
2805 #define ELIMINATE_COPY_RELOCS 1
2806
2807 /* Section name for stubs is the associated section name plus this
2808 string. */
2809 #define STUB_SUFFIX ".stub"
2810
2811 /* Linker stubs.
2812 ppc_stub_long_branch:
2813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2814 destination, but a 24 bit branch in a stub section will reach.
2815 . b dest
2816
2817 ppc_stub_plt_branch:
2818 Similar to the above, but a 24 bit branch in the stub section won't
2819 reach its destination.
2820 . addis %r11,%r2,xxx@toc@ha
2821 . ld %r12,xxx@toc@l(%r11)
2822 . mtctr %r12
2823 . bctr
2824
2825 ppc_stub_plt_call:
2826 Used to call a function in a shared library. If it so happens that
2827 the plt entry referenced crosses a 64k boundary, then an extra
2828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2829 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2830 . addis %r11,%r2,xxx@toc@ha
2831 . ld %r12,xxx+0@toc@l(%r11)
2832 . mtctr %r12
2833 . ld %r2,xxx+8@toc@l(%r11)
2834 . ld %r11,xxx+16@toc@l(%r11)
2835 . bctr
2836
2837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2838 code to adjust the value and save r2 to support multiple toc sections.
2839 A ppc_stub_long_branch with an r2 offset looks like:
2840 . std %r2,40(%r1)
2841 . addis %r2,%r2,off@ha
2842 . addi %r2,%r2,off@l
2843 . b dest
2844
2845 A ppc_stub_plt_branch with an r2 offset looks like:
2846 . std %r2,40(%r1)
2847 . addis %r11,%r2,xxx@toc@ha
2848 . ld %r12,xxx@toc@l(%r11)
2849 . addis %r2,%r2,off@ha
2850 . addi %r2,%r2,off@l
2851 . mtctr %r12
2852 . bctr
2853
2854 All of the above stubs are shown as their ELFv1 variants. ELFv2
2855 variants exist too, simpler for plt calls since a new toc pointer
2856 and static chain are not loaded by the stub. In addition, ELFv2
2857 has some more complex stubs to handle calls marked with NOTOC
2858 relocs from functions where r2 is not a valid toc pointer. These
2859 come in two flavours, the ones shown below, and _both variants that
2860 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2861 one call is from a function where r2 is used as the toc pointer but
2862 needs a toc adjusting stub for small-model multi-toc, and another
2863 call is from a function where r2 is not valid.
2864 ppc_stub_long_branch_notoc:
2865 . mflr %r12
2866 . bcl 20,31,1f
2867 . 1:
2868 . mflr %r11
2869 . mtlr %r12
2870 . addis %r12,%r11,dest-1b@ha
2871 . addi %r12,%r12,dest-1b@l
2872 . b dest
2873
2874 ppc_stub_plt_branch_notoc:
2875 . mflr %r12
2876 . bcl 20,31,1f
2877 . 1:
2878 . mflr %r11
2879 . mtlr %r12
2880 . lis %r12,xxx-1b@highest
2881 . ori %r12,%r12,xxx-1b@higher
2882 . sldi %r12,%r12,32
2883 . oris %r12,%r12,xxx-1b@high
2884 . ori %r12,%r12,xxx-1b@l
2885 . add %r12,%r11,%r12
2886 . mtctr %r12
2887 . bctr
2888
2889 ppc_stub_plt_call_notoc:
2890 . mflr %r12
2891 . bcl 20,31,1f
2892 . 1:
2893 . mflr %r11
2894 . mtlr %r12
2895 . lis %r12,xxx-1b@highest
2896 . ori %r12,%r12,xxx-1b@higher
2897 . sldi %r12,%r12,32
2898 . oris %r12,%r12,xxx-1b@high
2899 . ori %r12,%r12,xxx-1b@l
2900 . ldx %r12,%r11,%r12
2901 . mtctr %r12
2902 . bctr
2903
2904 There are also ELFv1 powerxx variants of these stubs.
2905 ppc_stub_long_branch_notoc:
2906 . pla %r12,dest@pcrel
2907 . b dest
2908 ppc_stub_plt_branch_notoc:
2909 . lis %r11,(dest-1f)@highesta34
2910 . ori %r11,%r11,(dest-1f)@highera34
2911 . sldi %r11,%r11,34
2912 . 1: pla %r12,dest@pcrel
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916 ppc_stub_plt_call_notoc:
2917 . lis %r11,(xxx-1f)@highesta34
2918 . ori %r11,%r11,(xxx-1f)@highera34
2919 . sldi %r11,%r11,34
2920 . 1: pla %r12,xxx@pcrel
2921 . ldx %r12,%r11,%r12
2922 . mtctr %r12
2923 . bctr
2924
2925 In cases where the high instructions would add zero, they are
2926 omitted and following instructions modified in some cases.
2927 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2928 to
2929 . pld %r12,xxx@pcrel
2930 . mtctr %r12
2931 . bctr
2932
2933 For a given stub group (a set of sections all using the same toc
2934 pointer value) there will be just one stub type used for any
2935 particular function symbol. For example, if printf is called from
2936 code with the tocsave optimization (ie. r2 saved in function
2937 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2938 and from other code without the tocsave optimization requiring a
2939 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2940 type will be created. Calls with the tocsave optimization will
2941 enter this stub after the instruction saving r2. A similar
2942 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2943 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2944 to call an external function like printf. If other calls to printf
2945 require a ppc_stub_plt_call linkage stub then a single
2946 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2947 call. If other calls to printf require a ppc_stub_plt_call_r2save
2948 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2949 be created and calls not requiring r2 to be saved will enter the
2950 stub after the r2 save instruction. There is an analogous
2951 hierarchy of long branch and plt branch stubs for local call
2952 linkage. */
2953
2954 enum ppc_stub_type
2955 {
2956 ppc_stub_none,
2957 ppc_stub_long_branch,
2958 ppc_stub_long_branch_r2off,
2959 ppc_stub_long_branch_notoc,
2960 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2961 ppc_stub_plt_branch,
2962 ppc_stub_plt_branch_r2off,
2963 ppc_stub_plt_branch_notoc,
2964 ppc_stub_plt_branch_both,
2965 ppc_stub_plt_call,
2966 ppc_stub_plt_call_r2save,
2967 ppc_stub_plt_call_notoc,
2968 ppc_stub_plt_call_both,
2969 ppc_stub_global_entry,
2970 ppc_stub_save_res
2971 };
2972
2973 /* Information on stub grouping. */
2974 struct map_stub
2975 {
2976 /* The stub section. */
2977 asection *stub_sec;
2978 /* This is the section to which stubs in the group will be attached. */
2979 asection *link_sec;
2980 /* Next group. */
2981 struct map_stub *next;
2982 /* Whether to emit a copy of register save/restore functions in this
2983 group. */
2984 int needs_save_res;
2985 /* Current offset within stubs after the insn restoring lr in a
2986 _notoc or _both stub using bcl for pc-relative addressing, or
2987 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2988 unsigned int lr_restore;
2989 /* Accumulated size of EH info emitted to describe return address
2990 if stubs modify lr. Does not include 17 byte FDE header. */
2991 unsigned int eh_size;
2992 /* Offset in glink_eh_frame to the start of EH info for this group. */
2993 unsigned int eh_base;
2994 };
2995
2996 struct ppc_stub_hash_entry
2997 {
2998 /* Base hash table entry structure. */
2999 struct bfd_hash_entry root;
3000
3001 enum ppc_stub_type stub_type;
3002
3003 /* Group information. */
3004 struct map_stub *group;
3005
3006 /* Offset within stub_sec of the beginning of this stub. */
3007 bfd_vma stub_offset;
3008
3009 /* Given the symbol's value and its section we can determine its final
3010 value when building the stubs (so the stub knows where to jump. */
3011 bfd_vma target_value;
3012 asection *target_section;
3013
3014 /* The symbol table entry, if any, that this was derived from. */
3015 struct ppc_link_hash_entry *h;
3016 struct plt_entry *plt_ent;
3017
3018 /* Symbol type. */
3019 unsigned char symtype;
3020
3021 /* Symbol st_other. */
3022 unsigned char other;
3023 };
3024
3025 struct ppc_branch_hash_entry
3026 {
3027 /* Base hash table entry structure. */
3028 struct bfd_hash_entry root;
3029
3030 /* Offset within branch lookup table. */
3031 unsigned int offset;
3032
3033 /* Generation marker. */
3034 unsigned int iter;
3035 };
3036
3037 /* Used to track dynamic relocations for local symbols. */
3038 struct ppc_dyn_relocs
3039 {
3040 struct ppc_dyn_relocs *next;
3041
3042 /* The input section of the reloc. */
3043 asection *sec;
3044
3045 /* Total number of relocs copied for the input section. */
3046 unsigned int count : 31;
3047
3048 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3049 unsigned int ifunc : 1;
3050 };
3051
3052 struct ppc_link_hash_entry
3053 {
3054 struct elf_link_hash_entry elf;
3055
3056 union
3057 {
3058 /* A pointer to the most recently used stub hash entry against this
3059 symbol. */
3060 struct ppc_stub_hash_entry *stub_cache;
3061
3062 /* A pointer to the next symbol starting with a '.' */
3063 struct ppc_link_hash_entry *next_dot_sym;
3064 } u;
3065
3066 /* Track dynamic relocs copied for this symbol. */
3067 struct elf_dyn_relocs *dyn_relocs;
3068
3069 /* Link between function code and descriptor symbols. */
3070 struct ppc_link_hash_entry *oh;
3071
3072 /* Flag function code and descriptor symbols. */
3073 unsigned int is_func:1;
3074 unsigned int is_func_descriptor:1;
3075 unsigned int fake:1;
3076
3077 /* Whether global opd/toc sym has been adjusted or not.
3078 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3079 should be set for all globals defined in any opd/toc section. */
3080 unsigned int adjust_done:1;
3081
3082 /* Set if this is an out-of-line register save/restore function,
3083 with non-standard calling convention. */
3084 unsigned int save_res:1;
3085
3086 /* Set if a duplicate symbol with non-zero localentry is detected,
3087 even when the duplicate symbol does not provide a definition. */
3088 unsigned int non_zero_localentry:1;
3089
3090 /* Contexts in which symbol is used in the GOT (or TOC).
3091 Bits are or'd into the mask as the corresponding relocs are
3092 encountered during check_relocs, with TLS_TLS being set when any
3093 of the other TLS bits are set. tls_optimize clears bits when
3094 optimizing to indicate the corresponding GOT entry type is not
3095 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3096 set TLS_GDIE when a GD reloc turns into an IE one.
3097 These flags are also kept for local symbols. */
3098 #define TLS_TLS 1 /* Any TLS reloc. */
3099 #define TLS_GD 2 /* GD reloc. */
3100 #define TLS_LD 4 /* LD reloc. */
3101 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3102 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3103 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3104 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3105 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3106 unsigned char tls_mask;
3107
3108 /* The above field is also used to mark function symbols. In which
3109 case TLS_TLS will be 0. */
3110 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3111 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3112 #define NON_GOT 256 /* local symbol plt, not stored. */
3113 };
3114
3115 /* ppc64 ELF linker hash table. */
3116
3117 struct ppc_link_hash_table
3118 {
3119 struct elf_link_hash_table elf;
3120
3121 /* The stub hash table. */
3122 struct bfd_hash_table stub_hash_table;
3123
3124 /* Another hash table for plt_branch stubs. */
3125 struct bfd_hash_table branch_hash_table;
3126
3127 /* Hash table for function prologue tocsave. */
3128 htab_t tocsave_htab;
3129
3130 /* Various options and other info passed from the linker. */
3131 struct ppc64_elf_params *params;
3132
3133 /* The size of sec_info below. */
3134 unsigned int sec_info_arr_size;
3135
3136 /* Per-section array of extra section info. Done this way rather
3137 than as part of ppc64_elf_section_data so we have the info for
3138 non-ppc64 sections. */
3139 struct
3140 {
3141 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3142 bfd_vma toc_off;
3143
3144 union
3145 {
3146 /* The section group that this section belongs to. */
3147 struct map_stub *group;
3148 /* A temp section list pointer. */
3149 asection *list;
3150 } u;
3151 } *sec_info;
3152
3153 /* Linked list of groups. */
3154 struct map_stub *group;
3155
3156 /* Temp used when calculating TOC pointers. */
3157 bfd_vma toc_curr;
3158 bfd *toc_bfd;
3159 asection *toc_first_sec;
3160
3161 /* Used when adding symbols. */
3162 struct ppc_link_hash_entry *dot_syms;
3163
3164 /* Shortcuts to get to dynamic linker sections. */
3165 asection *glink;
3166 asection *global_entry;
3167 asection *sfpr;
3168 asection *pltlocal;
3169 asection *relpltlocal;
3170 asection *brlt;
3171 asection *relbrlt;
3172 asection *glink_eh_frame;
3173
3174 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3175 struct ppc_link_hash_entry *tls_get_addr;
3176 struct ppc_link_hash_entry *tls_get_addr_fd;
3177
3178 /* The size of reliplt used by got entry relocs. */
3179 bfd_size_type got_reli_size;
3180
3181 /* Statistics. */
3182 unsigned long stub_count[ppc_stub_global_entry];
3183
3184 /* Number of stubs against global syms. */
3185 unsigned long stub_globals;
3186
3187 /* Set if we're linking code with function descriptors. */
3188 unsigned int opd_abi:1;
3189
3190 /* Support for multiple toc sections. */
3191 unsigned int do_multi_toc:1;
3192 unsigned int multi_toc_needed:1;
3193 unsigned int second_toc_pass:1;
3194 unsigned int do_toc_opt:1;
3195
3196 /* Set if tls optimization is enabled. */
3197 unsigned int do_tls_opt:1;
3198
3199 /* Set if inline plt calls should be converted to direct calls. */
3200 unsigned int can_convert_all_inline_plt:1;
3201
3202 /* Set on error. */
3203 unsigned int stub_error:1;
3204
3205 /* Whether func_desc_adjust needs to be run over symbols. */
3206 unsigned int need_func_desc_adj:1;
3207
3208 /* Whether there exist local gnu indirect function resolvers,
3209 referenced by dynamic relocations. */
3210 unsigned int local_ifunc_resolver:1;
3211 unsigned int maybe_local_ifunc_resolver:1;
3212
3213 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3214 unsigned int has_plt_localentry0:1;
3215
3216 /* Whether calls are made via the PLT from NOTOC functions. */
3217 unsigned int notoc_plt:1;
3218
3219 /* Whether to use powerxx instructions in linkage stubs. */
3220 unsigned int powerxx_stubs:1;
3221
3222 /* Incremented every time we size stubs. */
3223 unsigned int stub_iteration;
3224
3225 /* Small local sym cache. */
3226 struct sym_cache sym_cache;
3227 };
3228
3229 /* Rename some of the generic section flags to better document how they
3230 are used here. */
3231
3232 /* Nonzero if this section has TLS related relocations. */
3233 #define has_tls_reloc sec_flg0
3234
3235 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3236 relocations. */
3237 #define nomark_tls_get_addr sec_flg1
3238
3239 /* Nonzero if this section has any toc or got relocs. */
3240 #define has_toc_reloc sec_flg2
3241
3242 /* Nonzero if this section has a call to another section that uses
3243 the toc or got. */
3244 #define makes_toc_func_call sec_flg3
3245
3246 /* Recursion protection when determining above flag. */
3247 #define call_check_in_progress sec_flg4
3248 #define call_check_done sec_flg5
3249
3250 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3251
3252 #define ppc_hash_table(p) \
3253 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3254 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3255
3256 #define ppc_stub_hash_lookup(table, string, create, copy) \
3257 ((struct ppc_stub_hash_entry *) \
3258 bfd_hash_lookup ((table), (string), (create), (copy)))
3259
3260 #define ppc_branch_hash_lookup(table, string, create, copy) \
3261 ((struct ppc_branch_hash_entry *) \
3262 bfd_hash_lookup ((table), (string), (create), (copy)))
3263
3264 /* Create an entry in the stub hash table. */
3265
3266 static struct bfd_hash_entry *
3267 stub_hash_newfunc (struct bfd_hash_entry *entry,
3268 struct bfd_hash_table *table,
3269 const char *string)
3270 {
3271 /* Allocate the structure if it has not already been allocated by a
3272 subclass. */
3273 if (entry == NULL)
3274 {
3275 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3276 if (entry == NULL)
3277 return entry;
3278 }
3279
3280 /* Call the allocation method of the superclass. */
3281 entry = bfd_hash_newfunc (entry, table, string);
3282 if (entry != NULL)
3283 {
3284 struct ppc_stub_hash_entry *eh;
3285
3286 /* Initialize the local fields. */
3287 eh = (struct ppc_stub_hash_entry *) entry;
3288 eh->stub_type = ppc_stub_none;
3289 eh->group = NULL;
3290 eh->stub_offset = 0;
3291 eh->target_value = 0;
3292 eh->target_section = NULL;
3293 eh->h = NULL;
3294 eh->plt_ent = NULL;
3295 eh->other = 0;
3296 }
3297
3298 return entry;
3299 }
3300
3301 /* Create an entry in the branch hash table. */
3302
3303 static struct bfd_hash_entry *
3304 branch_hash_newfunc (struct bfd_hash_entry *entry,
3305 struct bfd_hash_table *table,
3306 const char *string)
3307 {
3308 /* Allocate the structure if it has not already been allocated by a
3309 subclass. */
3310 if (entry == NULL)
3311 {
3312 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3313 if (entry == NULL)
3314 return entry;
3315 }
3316
3317 /* Call the allocation method of the superclass. */
3318 entry = bfd_hash_newfunc (entry, table, string);
3319 if (entry != NULL)
3320 {
3321 struct ppc_branch_hash_entry *eh;
3322
3323 /* Initialize the local fields. */
3324 eh = (struct ppc_branch_hash_entry *) entry;
3325 eh->offset = 0;
3326 eh->iter = 0;
3327 }
3328
3329 return entry;
3330 }
3331
3332 /* Create an entry in a ppc64 ELF linker hash table. */
3333
3334 static struct bfd_hash_entry *
3335 link_hash_newfunc (struct bfd_hash_entry *entry,
3336 struct bfd_hash_table *table,
3337 const char *string)
3338 {
3339 /* Allocate the structure if it has not already been allocated by a
3340 subclass. */
3341 if (entry == NULL)
3342 {
3343 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3344 if (entry == NULL)
3345 return entry;
3346 }
3347
3348 /* Call the allocation method of the superclass. */
3349 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3350 if (entry != NULL)
3351 {
3352 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3353
3354 memset (&eh->u.stub_cache, 0,
3355 (sizeof (struct ppc_link_hash_entry)
3356 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3357
3358 /* When making function calls, old ABI code references function entry
3359 points (dot symbols), while new ABI code references the function
3360 descriptor symbol. We need to make any combination of reference and
3361 definition work together, without breaking archive linking.
3362
3363 For a defined function "foo" and an undefined call to "bar":
3364 An old object defines "foo" and ".foo", references ".bar" (possibly
3365 "bar" too).
3366 A new object defines "foo" and references "bar".
3367
3368 A new object thus has no problem with its undefined symbols being
3369 satisfied by definitions in an old object. On the other hand, the
3370 old object won't have ".bar" satisfied by a new object.
3371
3372 Keep a list of newly added dot-symbols. */
3373
3374 if (string[0] == '.')
3375 {
3376 struct ppc_link_hash_table *htab;
3377
3378 htab = (struct ppc_link_hash_table *) table;
3379 eh->u.next_dot_sym = htab->dot_syms;
3380 htab->dot_syms = eh;
3381 }
3382 }
3383
3384 return entry;
3385 }
3386
3387 struct tocsave_entry
3388 {
3389 asection *sec;
3390 bfd_vma offset;
3391 };
3392
3393 static hashval_t
3394 tocsave_htab_hash (const void *p)
3395 {
3396 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3397 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3398 }
3399
3400 static int
3401 tocsave_htab_eq (const void *p1, const void *p2)
3402 {
3403 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3404 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3405 return e1->sec == e2->sec && e1->offset == e2->offset;
3406 }
3407
3408 /* Destroy a ppc64 ELF linker hash table. */
3409
3410 static void
3411 ppc64_elf_link_hash_table_free (bfd *obfd)
3412 {
3413 struct ppc_link_hash_table *htab;
3414
3415 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3416 if (htab->tocsave_htab)
3417 htab_delete (htab->tocsave_htab);
3418 bfd_hash_table_free (&htab->branch_hash_table);
3419 bfd_hash_table_free (&htab->stub_hash_table);
3420 _bfd_elf_link_hash_table_free (obfd);
3421 }
3422
3423 /* Create a ppc64 ELF linker hash table. */
3424
3425 static struct bfd_link_hash_table *
3426 ppc64_elf_link_hash_table_create (bfd *abfd)
3427 {
3428 struct ppc_link_hash_table *htab;
3429 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3430
3431 htab = bfd_zmalloc (amt);
3432 if (htab == NULL)
3433 return NULL;
3434
3435 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3436 sizeof (struct ppc_link_hash_entry),
3437 PPC64_ELF_DATA))
3438 {
3439 free (htab);
3440 return NULL;
3441 }
3442
3443 /* Init the stub hash table too. */
3444 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3445 sizeof (struct ppc_stub_hash_entry)))
3446 {
3447 _bfd_elf_link_hash_table_free (abfd);
3448 return NULL;
3449 }
3450
3451 /* And the branch hash table. */
3452 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3453 sizeof (struct ppc_branch_hash_entry)))
3454 {
3455 bfd_hash_table_free (&htab->stub_hash_table);
3456 _bfd_elf_link_hash_table_free (abfd);
3457 return NULL;
3458 }
3459
3460 htab->tocsave_htab = htab_try_create (1024,
3461 tocsave_htab_hash,
3462 tocsave_htab_eq,
3463 NULL);
3464 if (htab->tocsave_htab == NULL)
3465 {
3466 ppc64_elf_link_hash_table_free (abfd);
3467 return NULL;
3468 }
3469 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3470
3471 /* Initializing two fields of the union is just cosmetic. We really
3472 only care about glist, but when compiled on a 32-bit host the
3473 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3474 debugger inspection of these fields look nicer. */
3475 htab->elf.init_got_refcount.refcount = 0;
3476 htab->elf.init_got_refcount.glist = NULL;
3477 htab->elf.init_plt_refcount.refcount = 0;
3478 htab->elf.init_plt_refcount.glist = NULL;
3479 htab->elf.init_got_offset.offset = 0;
3480 htab->elf.init_got_offset.glist = NULL;
3481 htab->elf.init_plt_offset.offset = 0;
3482 htab->elf.init_plt_offset.glist = NULL;
3483
3484 return &htab->elf.root;
3485 }
3486
3487 /* Create sections for linker generated code. */
3488
3489 static bfd_boolean
3490 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3491 {
3492 struct ppc_link_hash_table *htab;
3493 flagword flags;
3494
3495 htab = ppc_hash_table (info);
3496
3497 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3498 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3499 if (htab->params->save_restore_funcs)
3500 {
3501 /* Create .sfpr for code to save and restore fp regs. */
3502 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3503 flags);
3504 if (htab->sfpr == NULL
3505 || !bfd_set_section_alignment (htab->sfpr, 2))
3506 return FALSE;
3507 }
3508
3509 if (bfd_link_relocatable (info))
3510 return TRUE;
3511
3512 /* Create .glink for lazy dynamic linking support. */
3513 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3514 flags);
3515 if (htab->glink == NULL
3516 || !bfd_set_section_alignment (htab->glink, 3))
3517 return FALSE;
3518
3519 /* The part of .glink used by global entry stubs, separate so that
3520 it can be aligned appropriately without affecting htab->glink. */
3521 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3522 flags);
3523 if (htab->global_entry == NULL
3524 || !bfd_set_section_alignment (htab->global_entry, 2))
3525 return FALSE;
3526
3527 if (!info->no_ld_generated_unwind_info)
3528 {
3529 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3530 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3531 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3532 ".eh_frame",
3533 flags);
3534 if (htab->glink_eh_frame == NULL
3535 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3536 return FALSE;
3537 }
3538
3539 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3540 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3541 if (htab->elf.iplt == NULL
3542 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3543 return FALSE;
3544
3545 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3546 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3547 htab->elf.irelplt
3548 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3549 if (htab->elf.irelplt == NULL
3550 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3551 return FALSE;
3552
3553 /* Create branch lookup table for plt_branch stubs. */
3554 flags = (SEC_ALLOC | SEC_LOAD
3555 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3556 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3557 flags);
3558 if (htab->brlt == NULL
3559 || !bfd_set_section_alignment (htab->brlt, 3))
3560 return FALSE;
3561
3562 /* Local plt entries, put in .branch_lt but a separate section for
3563 convenience. */
3564 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3565 flags);
3566 if (htab->pltlocal == NULL
3567 || !bfd_set_section_alignment (htab->pltlocal, 3))
3568 return FALSE;
3569
3570 if (!bfd_link_pic (info))
3571 return TRUE;
3572
3573 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3574 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3575 htab->relbrlt
3576 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3577 if (htab->relbrlt == NULL
3578 || !bfd_set_section_alignment (htab->relbrlt, 3))
3579 return FALSE;
3580
3581 htab->relpltlocal
3582 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3583 if (htab->relpltlocal == NULL
3584 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3585 return FALSE;
3586
3587 return TRUE;
3588 }
3589
3590 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3591
3592 bfd_boolean
3593 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3594 struct ppc64_elf_params *params)
3595 {
3596 struct ppc_link_hash_table *htab;
3597
3598 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3599
3600 /* Always hook our dynamic sections into the first bfd, which is the
3601 linker created stub bfd. This ensures that the GOT header is at
3602 the start of the output TOC section. */
3603 htab = ppc_hash_table (info);
3604 htab->elf.dynobj = params->stub_bfd;
3605 htab->params = params;
3606
3607 return create_linkage_sections (htab->elf.dynobj, info);
3608 }
3609
3610 /* Build a name for an entry in the stub hash table. */
3611
3612 static char *
3613 ppc_stub_name (const asection *input_section,
3614 const asection *sym_sec,
3615 const struct ppc_link_hash_entry *h,
3616 const Elf_Internal_Rela *rel)
3617 {
3618 char *stub_name;
3619 ssize_t len;
3620
3621 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3622 offsets from a sym as a branch target? In fact, we could
3623 probably assume the addend is always zero. */
3624 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3625
3626 if (h)
3627 {
3628 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3629 stub_name = bfd_malloc (len);
3630 if (stub_name == NULL)
3631 return stub_name;
3632
3633 len = sprintf (stub_name, "%08x.%s+%x",
3634 input_section->id & 0xffffffff,
3635 h->elf.root.root.string,
3636 (int) rel->r_addend & 0xffffffff);
3637 }
3638 else
3639 {
3640 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3641 stub_name = bfd_malloc (len);
3642 if (stub_name == NULL)
3643 return stub_name;
3644
3645 len = sprintf (stub_name, "%08x.%x:%x+%x",
3646 input_section->id & 0xffffffff,
3647 sym_sec->id & 0xffffffff,
3648 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3649 (int) rel->r_addend & 0xffffffff);
3650 }
3651 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3652 stub_name[len - 2] = 0;
3653 return stub_name;
3654 }
3655
3656 /* Look up an entry in the stub hash. Stub entries are cached because
3657 creating the stub name takes a bit of time. */
3658
3659 static struct ppc_stub_hash_entry *
3660 ppc_get_stub_entry (const asection *input_section,
3661 const asection *sym_sec,
3662 struct ppc_link_hash_entry *h,
3663 const Elf_Internal_Rela *rel,
3664 struct ppc_link_hash_table *htab)
3665 {
3666 struct ppc_stub_hash_entry *stub_entry;
3667 struct map_stub *group;
3668
3669 /* If this input section is part of a group of sections sharing one
3670 stub section, then use the id of the first section in the group.
3671 Stub names need to include a section id, as there may well be
3672 more than one stub used to reach say, printf, and we need to
3673 distinguish between them. */
3674 group = htab->sec_info[input_section->id].u.group;
3675 if (group == NULL)
3676 return NULL;
3677
3678 if (h != NULL && h->u.stub_cache != NULL
3679 && h->u.stub_cache->h == h
3680 && h->u.stub_cache->group == group)
3681 {
3682 stub_entry = h->u.stub_cache;
3683 }
3684 else
3685 {
3686 char *stub_name;
3687
3688 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3689 if (stub_name == NULL)
3690 return NULL;
3691
3692 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3693 stub_name, FALSE, FALSE);
3694 if (h != NULL)
3695 h->u.stub_cache = stub_entry;
3696
3697 free (stub_name);
3698 }
3699
3700 return stub_entry;
3701 }
3702
3703 /* Add a new stub entry to the stub hash. Not all fields of the new
3704 stub entry are initialised. */
3705
3706 static struct ppc_stub_hash_entry *
3707 ppc_add_stub (const char *stub_name,
3708 asection *section,
3709 struct bfd_link_info *info)
3710 {
3711 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3712 struct map_stub *group;
3713 asection *link_sec;
3714 asection *stub_sec;
3715 struct ppc_stub_hash_entry *stub_entry;
3716
3717 group = htab->sec_info[section->id].u.group;
3718 link_sec = group->link_sec;
3719 stub_sec = group->stub_sec;
3720 if (stub_sec == NULL)
3721 {
3722 size_t namelen;
3723 bfd_size_type len;
3724 char *s_name;
3725
3726 namelen = strlen (link_sec->name);
3727 len = namelen + sizeof (STUB_SUFFIX);
3728 s_name = bfd_alloc (htab->params->stub_bfd, len);
3729 if (s_name == NULL)
3730 return NULL;
3731
3732 memcpy (s_name, link_sec->name, namelen);
3733 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3734 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3735 if (stub_sec == NULL)
3736 return NULL;
3737 group->stub_sec = stub_sec;
3738 }
3739
3740 /* Enter this entry into the linker stub hash table. */
3741 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3742 TRUE, FALSE);
3743 if (stub_entry == NULL)
3744 {
3745 /* xgettext:c-format */
3746 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3747 section->owner, stub_name);
3748 return NULL;
3749 }
3750
3751 stub_entry->group = group;
3752 stub_entry->stub_offset = 0;
3753 return stub_entry;
3754 }
3755
3756 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3757 not already done. */
3758
3759 static bfd_boolean
3760 create_got_section (bfd *abfd, struct bfd_link_info *info)
3761 {
3762 asection *got, *relgot;
3763 flagword flags;
3764 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3765
3766 if (!is_ppc64_elf (abfd))
3767 return FALSE;
3768 if (htab == NULL)
3769 return FALSE;
3770
3771 if (!htab->elf.sgot
3772 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3773 return FALSE;
3774
3775 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3776 | SEC_LINKER_CREATED);
3777
3778 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3779 if (!got
3780 || !bfd_set_section_alignment (got, 3))
3781 return FALSE;
3782
3783 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3784 flags | SEC_READONLY);
3785 if (!relgot
3786 || !bfd_set_section_alignment (relgot, 3))
3787 return FALSE;
3788
3789 ppc64_elf_tdata (abfd)->got = got;
3790 ppc64_elf_tdata (abfd)->relgot = relgot;
3791 return TRUE;
3792 }
3793
3794 /* Follow indirect and warning symbol links. */
3795
3796 static inline struct bfd_link_hash_entry *
3797 follow_link (struct bfd_link_hash_entry *h)
3798 {
3799 while (h->type == bfd_link_hash_indirect
3800 || h->type == bfd_link_hash_warning)
3801 h = h->u.i.link;
3802 return h;
3803 }
3804
3805 static inline struct elf_link_hash_entry *
3806 elf_follow_link (struct elf_link_hash_entry *h)
3807 {
3808 return (struct elf_link_hash_entry *) follow_link (&h->root);
3809 }
3810
3811 static inline struct ppc_link_hash_entry *
3812 ppc_follow_link (struct ppc_link_hash_entry *h)
3813 {
3814 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3815 }
3816
3817 /* Merge PLT info on FROM with that on TO. */
3818
3819 static void
3820 move_plt_plist (struct ppc_link_hash_entry *from,
3821 struct ppc_link_hash_entry *to)
3822 {
3823 if (from->elf.plt.plist != NULL)
3824 {
3825 if (to->elf.plt.plist != NULL)
3826 {
3827 struct plt_entry **entp;
3828 struct plt_entry *ent;
3829
3830 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3831 {
3832 struct plt_entry *dent;
3833
3834 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3835 if (dent->addend == ent->addend)
3836 {
3837 dent->plt.refcount += ent->plt.refcount;
3838 *entp = ent->next;
3839 break;
3840 }
3841 if (dent == NULL)
3842 entp = &ent->next;
3843 }
3844 *entp = to->elf.plt.plist;
3845 }
3846
3847 to->elf.plt.plist = from->elf.plt.plist;
3848 from->elf.plt.plist = NULL;
3849 }
3850 }
3851
3852 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3853
3854 static void
3855 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3856 struct elf_link_hash_entry *dir,
3857 struct elf_link_hash_entry *ind)
3858 {
3859 struct ppc_link_hash_entry *edir, *eind;
3860
3861 edir = (struct ppc_link_hash_entry *) dir;
3862 eind = (struct ppc_link_hash_entry *) ind;
3863
3864 edir->is_func |= eind->is_func;
3865 edir->is_func_descriptor |= eind->is_func_descriptor;
3866 edir->tls_mask |= eind->tls_mask;
3867 if (eind->oh != NULL)
3868 edir->oh = ppc_follow_link (eind->oh);
3869
3870 if (edir->elf.versioned != versioned_hidden)
3871 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3872 edir->elf.ref_regular |= eind->elf.ref_regular;
3873 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3874 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3875 edir->elf.needs_plt |= eind->elf.needs_plt;
3876 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3877
3878 /* If we were called to copy over info for a weak sym, don't copy
3879 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3880 in order to simplify readonly_dynrelocs and save a field in the
3881 symbol hash entry, but that means dyn_relocs can't be used in any
3882 tests about a specific symbol, or affect other symbol flags which
3883 are then tested. */
3884 if (eind->elf.root.type != bfd_link_hash_indirect)
3885 return;
3886
3887 /* Copy over any dynamic relocs we may have on the indirect sym. */
3888 if (eind->dyn_relocs != NULL)
3889 {
3890 if (edir->dyn_relocs != NULL)
3891 {
3892 struct elf_dyn_relocs **pp;
3893 struct elf_dyn_relocs *p;
3894
3895 /* Add reloc counts against the indirect sym to the direct sym
3896 list. Merge any entries against the same section. */
3897 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3898 {
3899 struct elf_dyn_relocs *q;
3900
3901 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3902 if (q->sec == p->sec)
3903 {
3904 q->pc_count += p->pc_count;
3905 q->count += p->count;
3906 *pp = p->next;
3907 break;
3908 }
3909 if (q == NULL)
3910 pp = &p->next;
3911 }
3912 *pp = edir->dyn_relocs;
3913 }
3914
3915 edir->dyn_relocs = eind->dyn_relocs;
3916 eind->dyn_relocs = NULL;
3917 }
3918
3919 /* Copy over got entries that we may have already seen to the
3920 symbol which just became indirect. */
3921 if (eind->elf.got.glist != NULL)
3922 {
3923 if (edir->elf.got.glist != NULL)
3924 {
3925 struct got_entry **entp;
3926 struct got_entry *ent;
3927
3928 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3929 {
3930 struct got_entry *dent;
3931
3932 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3933 if (dent->addend == ent->addend
3934 && dent->owner == ent->owner
3935 && dent->tls_type == ent->tls_type)
3936 {
3937 dent->got.refcount += ent->got.refcount;
3938 *entp = ent->next;
3939 break;
3940 }
3941 if (dent == NULL)
3942 entp = &ent->next;
3943 }
3944 *entp = edir->elf.got.glist;
3945 }
3946
3947 edir->elf.got.glist = eind->elf.got.glist;
3948 eind->elf.got.glist = NULL;
3949 }
3950
3951 /* And plt entries. */
3952 move_plt_plist (eind, edir);
3953
3954 if (eind->elf.dynindx != -1)
3955 {
3956 if (edir->elf.dynindx != -1)
3957 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3958 edir->elf.dynstr_index);
3959 edir->elf.dynindx = eind->elf.dynindx;
3960 edir->elf.dynstr_index = eind->elf.dynstr_index;
3961 eind->elf.dynindx = -1;
3962 eind->elf.dynstr_index = 0;
3963 }
3964 }
3965
3966 /* Find the function descriptor hash entry from the given function code
3967 hash entry FH. Link the entries via their OH fields. */
3968
3969 static struct ppc_link_hash_entry *
3970 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3971 {
3972 struct ppc_link_hash_entry *fdh = fh->oh;
3973
3974 if (fdh == NULL)
3975 {
3976 const char *fd_name = fh->elf.root.root.string + 1;
3977
3978 fdh = (struct ppc_link_hash_entry *)
3979 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
3980 if (fdh == NULL)
3981 return fdh;
3982
3983 fdh->is_func_descriptor = 1;
3984 fdh->oh = fh;
3985 fh->is_func = 1;
3986 fh->oh = fdh;
3987 }
3988
3989 fdh = ppc_follow_link (fdh);
3990 fdh->is_func_descriptor = 1;
3991 fdh->oh = fh;
3992 return fdh;
3993 }
3994
3995 /* Make a fake function descriptor sym for the undefined code sym FH. */
3996
3997 static struct ppc_link_hash_entry *
3998 make_fdh (struct bfd_link_info *info,
3999 struct ppc_link_hash_entry *fh)
4000 {
4001 bfd *abfd = fh->elf.root.u.undef.abfd;
4002 struct bfd_link_hash_entry *bh = NULL;
4003 struct ppc_link_hash_entry *fdh;
4004 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4005 ? BSF_WEAK
4006 : BSF_GLOBAL);
4007
4008 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4009 fh->elf.root.root.string + 1,
4010 flags, bfd_und_section_ptr, 0,
4011 NULL, FALSE, FALSE, &bh))
4012 return NULL;
4013
4014 fdh = (struct ppc_link_hash_entry *) bh;
4015 fdh->elf.non_elf = 0;
4016 fdh->fake = 1;
4017 fdh->is_func_descriptor = 1;
4018 fdh->oh = fh;
4019 fh->is_func = 1;
4020 fh->oh = fdh;
4021 return fdh;
4022 }
4023
4024 /* Fix function descriptor symbols defined in .opd sections to be
4025 function type. */
4026
4027 static bfd_boolean
4028 ppc64_elf_add_symbol_hook (bfd *ibfd,
4029 struct bfd_link_info *info,
4030 Elf_Internal_Sym *isym,
4031 const char **name,
4032 flagword *flags ATTRIBUTE_UNUSED,
4033 asection **sec,
4034 bfd_vma *value)
4035 {
4036 if (*sec != NULL
4037 && strcmp ((*sec)->name, ".opd") == 0)
4038 {
4039 asection *code_sec;
4040
4041 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4042 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4043 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4044
4045 /* If the symbol is a function defined in .opd, and the function
4046 code is in a discarded group, let it appear to be undefined. */
4047 if (!bfd_link_relocatable (info)
4048 && (*sec)->reloc_count != 0
4049 && opd_entry_value (*sec, *value, &code_sec, NULL,
4050 FALSE) != (bfd_vma) -1
4051 && discarded_section (code_sec))
4052 {
4053 *sec = bfd_und_section_ptr;
4054 isym->st_shndx = SHN_UNDEF;
4055 }
4056 }
4057 else if (*sec != NULL
4058 && strcmp ((*sec)->name, ".toc") == 0
4059 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4060 {
4061 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4062 if (htab != NULL)
4063 htab->params->object_in_toc = 1;
4064 }
4065
4066 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4067 {
4068 if (abiversion (ibfd) == 0)
4069 set_abiversion (ibfd, 2);
4070 else if (abiversion (ibfd) == 1)
4071 {
4072 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4073 " for ABI version 1"), *name);
4074 bfd_set_error (bfd_error_bad_value);
4075 return FALSE;
4076 }
4077 }
4078
4079 return TRUE;
4080 }
4081
4082 /* Merge non-visibility st_other attributes: local entry point. */
4083
4084 static void
4085 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4086 const Elf_Internal_Sym *isym,
4087 bfd_boolean definition,
4088 bfd_boolean dynamic)
4089 {
4090 if (definition && (!dynamic || !h->def_regular))
4091 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4092 | ELF_ST_VISIBILITY (h->other));
4093 }
4094
4095 /* Hook called on merging a symbol. We use this to clear "fake" since
4096 we now have a real symbol. */
4097
4098 static bfd_boolean
4099 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4100 const Elf_Internal_Sym *isym,
4101 asection **psec ATTRIBUTE_UNUSED,
4102 bfd_boolean newdef ATTRIBUTE_UNUSED,
4103 bfd_boolean olddef ATTRIBUTE_UNUSED,
4104 bfd *oldbfd ATTRIBUTE_UNUSED,
4105 const asection *oldsec ATTRIBUTE_UNUSED)
4106 {
4107 ((struct ppc_link_hash_entry *) h)->fake = 0;
4108 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4109 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
4110 return TRUE;
4111 }
4112
4113 /* This function makes an old ABI object reference to ".bar" cause the
4114 inclusion of a new ABI object archive that defines "bar".
4115 NAME is a symbol defined in an archive. Return a symbol in the hash
4116 table that might be satisfied by the archive symbols. */
4117
4118 static struct elf_link_hash_entry *
4119 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4120 struct bfd_link_info *info,
4121 const char *name)
4122 {
4123 struct elf_link_hash_entry *h;
4124 char *dot_name;
4125 size_t len;
4126
4127 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4128 if (h != NULL
4129 /* Don't return this sym if it is a fake function descriptor
4130 created by add_symbol_adjust. */
4131 && !((struct ppc_link_hash_entry *) h)->fake)
4132 return h;
4133
4134 if (name[0] == '.')
4135 return h;
4136
4137 len = strlen (name);
4138 dot_name = bfd_alloc (abfd, len + 2);
4139 if (dot_name == NULL)
4140 return (struct elf_link_hash_entry *) -1;
4141 dot_name[0] = '.';
4142 memcpy (dot_name + 1, name, len + 1);
4143 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4144 bfd_release (abfd, dot_name);
4145 return h;
4146 }
4147
4148 /* This function satisfies all old ABI object references to ".bar" if a
4149 new ABI object defines "bar". Well, at least, undefined dot symbols
4150 are made weak. This stops later archive searches from including an
4151 object if we already have a function descriptor definition. It also
4152 prevents the linker complaining about undefined symbols.
4153 We also check and correct mismatched symbol visibility here. The
4154 most restrictive visibility of the function descriptor and the
4155 function entry symbol is used. */
4156
4157 static bfd_boolean
4158 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4159 {
4160 struct ppc_link_hash_table *htab;
4161 struct ppc_link_hash_entry *fdh;
4162
4163 if (eh->elf.root.type == bfd_link_hash_warning)
4164 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4165
4166 if (eh->elf.root.type == bfd_link_hash_indirect)
4167 return TRUE;
4168
4169 if (eh->elf.root.root.string[0] != '.')
4170 abort ();
4171
4172 htab = ppc_hash_table (info);
4173 if (htab == NULL)
4174 return FALSE;
4175
4176 fdh = lookup_fdh (eh, htab);
4177 if (fdh == NULL
4178 && !bfd_link_relocatable (info)
4179 && (eh->elf.root.type == bfd_link_hash_undefined
4180 || eh->elf.root.type == bfd_link_hash_undefweak)
4181 && eh->elf.ref_regular)
4182 {
4183 /* Make an undefined function descriptor sym, in order to
4184 pull in an --as-needed shared lib. Archives are handled
4185 elsewhere. */
4186 fdh = make_fdh (info, eh);
4187 if (fdh == NULL)
4188 return FALSE;
4189 }
4190
4191 if (fdh != NULL)
4192 {
4193 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4194 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4195
4196 /* Make both descriptor and entry symbol have the most
4197 constraining visibility of either symbol. */
4198 if (entry_vis < descr_vis)
4199 fdh->elf.other += entry_vis - descr_vis;
4200 else if (entry_vis > descr_vis)
4201 eh->elf.other += descr_vis - entry_vis;
4202
4203 /* Propagate reference flags from entry symbol to function
4204 descriptor symbol. */
4205 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4206 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4207 fdh->elf.ref_regular |= eh->elf.ref_regular;
4208 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4209
4210 if (!fdh->elf.forced_local
4211 && fdh->elf.dynindx == -1
4212 && fdh->elf.versioned != versioned_hidden
4213 && (bfd_link_dll (info)
4214 || fdh->elf.def_dynamic
4215 || fdh->elf.ref_dynamic)
4216 && (eh->elf.ref_regular
4217 || eh->elf.def_regular))
4218 {
4219 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4220 return FALSE;
4221 }
4222 }
4223
4224 return TRUE;
4225 }
4226
4227 /* Set up opd section info and abiversion for IBFD, and process list
4228 of dot-symbols we made in link_hash_newfunc. */
4229
4230 static bfd_boolean
4231 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4232 {
4233 struct ppc_link_hash_table *htab;
4234 struct ppc_link_hash_entry **p, *eh;
4235 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4236
4237 if (opd != NULL && opd->size != 0)
4238 {
4239 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4240 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4241
4242 if (abiversion (ibfd) == 0)
4243 set_abiversion (ibfd, 1);
4244 else if (abiversion (ibfd) >= 2)
4245 {
4246 /* xgettext:c-format */
4247 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4248 ibfd, abiversion (ibfd));
4249 bfd_set_error (bfd_error_bad_value);
4250 return FALSE;
4251 }
4252 }
4253
4254 if (is_ppc64_elf (info->output_bfd))
4255 {
4256 /* For input files without an explicit abiversion in e_flags
4257 we should have flagged any with symbol st_other bits set
4258 as ELFv1 and above flagged those with .opd as ELFv2.
4259 Set the output abiversion if not yet set, and for any input
4260 still ambiguous, take its abiversion from the output.
4261 Differences in ABI are reported later. */
4262 if (abiversion (info->output_bfd) == 0)
4263 set_abiversion (info->output_bfd, abiversion (ibfd));
4264 else if (abiversion (ibfd) == 0)
4265 set_abiversion (ibfd, abiversion (info->output_bfd));
4266 }
4267
4268 htab = ppc_hash_table (info);
4269 if (htab == NULL)
4270 return TRUE;
4271
4272 if (opd != NULL && opd->size != 0
4273 && (ibfd->flags & DYNAMIC) == 0
4274 && (opd->flags & SEC_RELOC) != 0
4275 && opd->reloc_count != 0
4276 && !bfd_is_abs_section (opd->output_section)
4277 && info->gc_sections)
4278 {
4279 /* Garbage collection needs some extra help with .opd sections.
4280 We don't want to necessarily keep everything referenced by
4281 relocs in .opd, as that would keep all functions. Instead,
4282 if we reference an .opd symbol (a function descriptor), we
4283 want to keep the function code symbol's section. This is
4284 easy for global symbols, but for local syms we need to keep
4285 information about the associated function section. */
4286 bfd_size_type amt;
4287 asection **opd_sym_map;
4288 Elf_Internal_Shdr *symtab_hdr;
4289 Elf_Internal_Rela *relocs, *rel_end, *rel;
4290
4291 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4292 opd_sym_map = bfd_zalloc (ibfd, amt);
4293 if (opd_sym_map == NULL)
4294 return FALSE;
4295 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4296 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4297 info->keep_memory);
4298 if (relocs == NULL)
4299 return FALSE;
4300 symtab_hdr = &elf_symtab_hdr (ibfd);
4301 rel_end = relocs + opd->reloc_count - 1;
4302 for (rel = relocs; rel < rel_end; rel++)
4303 {
4304 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4305 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4306
4307 if (r_type == R_PPC64_ADDR64
4308 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4309 && r_symndx < symtab_hdr->sh_info)
4310 {
4311 Elf_Internal_Sym *isym;
4312 asection *s;
4313
4314 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4315 if (isym == NULL)
4316 {
4317 if (elf_section_data (opd)->relocs != relocs)
4318 free (relocs);
4319 return FALSE;
4320 }
4321
4322 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4323 if (s != NULL && s != opd)
4324 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4325 }
4326 }
4327 if (elf_section_data (opd)->relocs != relocs)
4328 free (relocs);
4329 }
4330
4331 p = &htab->dot_syms;
4332 while ((eh = *p) != NULL)
4333 {
4334 *p = NULL;
4335 if (&eh->elf == htab->elf.hgot)
4336 ;
4337 else if (htab->elf.hgot == NULL
4338 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4339 htab->elf.hgot = &eh->elf;
4340 else if (abiversion (ibfd) <= 1)
4341 {
4342 htab->need_func_desc_adj = 1;
4343 if (!add_symbol_adjust (eh, info))
4344 return FALSE;
4345 }
4346 p = &eh->u.next_dot_sym;
4347 }
4348 return TRUE;
4349 }
4350
4351 /* Undo hash table changes when an --as-needed input file is determined
4352 not to be needed. */
4353
4354 static bfd_boolean
4355 ppc64_elf_notice_as_needed (bfd *ibfd,
4356 struct bfd_link_info *info,
4357 enum notice_asneeded_action act)
4358 {
4359 if (act == notice_not_needed)
4360 {
4361 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4362
4363 if (htab == NULL)
4364 return FALSE;
4365
4366 htab->dot_syms = NULL;
4367 }
4368 return _bfd_elf_notice_as_needed (ibfd, info, act);
4369 }
4370
4371 /* If --just-symbols against a final linked binary, then assume we need
4372 toc adjusting stubs when calling functions defined there. */
4373
4374 static void
4375 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4376 {
4377 if ((sec->flags & SEC_CODE) != 0
4378 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4379 && is_ppc64_elf (sec->owner))
4380 {
4381 if (abiversion (sec->owner) >= 2
4382 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4383 sec->has_toc_reloc = 1;
4384 }
4385 _bfd_elf_link_just_syms (sec, info);
4386 }
4387
4388 static struct plt_entry **
4389 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4390 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4391 {
4392 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4393 struct plt_entry **local_plt;
4394 unsigned char *local_got_tls_masks;
4395
4396 if (local_got_ents == NULL)
4397 {
4398 bfd_size_type size = symtab_hdr->sh_info;
4399
4400 size *= (sizeof (*local_got_ents)
4401 + sizeof (*local_plt)
4402 + sizeof (*local_got_tls_masks));
4403 local_got_ents = bfd_zalloc (abfd, size);
4404 if (local_got_ents == NULL)
4405 return NULL;
4406 elf_local_got_ents (abfd) = local_got_ents;
4407 }
4408
4409 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4410 {
4411 struct got_entry *ent;
4412
4413 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4414 if (ent->addend == r_addend
4415 && ent->owner == abfd
4416 && ent->tls_type == tls_type)
4417 break;
4418 if (ent == NULL)
4419 {
4420 bfd_size_type amt = sizeof (*ent);
4421 ent = bfd_alloc (abfd, amt);
4422 if (ent == NULL)
4423 return FALSE;
4424 ent->next = local_got_ents[r_symndx];
4425 ent->addend = r_addend;
4426 ent->owner = abfd;
4427 ent->tls_type = tls_type;
4428 ent->is_indirect = FALSE;
4429 ent->got.refcount = 0;
4430 local_got_ents[r_symndx] = ent;
4431 }
4432 ent->got.refcount += 1;
4433 }
4434
4435 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4436 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4437 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4438
4439 return local_plt + r_symndx;
4440 }
4441
4442 static bfd_boolean
4443 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4444 {
4445 struct plt_entry *ent;
4446
4447 for (ent = *plist; ent != NULL; ent = ent->next)
4448 if (ent->addend == addend)
4449 break;
4450 if (ent == NULL)
4451 {
4452 bfd_size_type amt = sizeof (*ent);
4453 ent = bfd_alloc (abfd, amt);
4454 if (ent == NULL)
4455 return FALSE;
4456 ent->next = *plist;
4457 ent->addend = addend;
4458 ent->plt.refcount = 0;
4459 *plist = ent;
4460 }
4461 ent->plt.refcount += 1;
4462 return TRUE;
4463 }
4464
4465 static bfd_boolean
4466 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4467 {
4468 return (r_type == R_PPC64_REL24
4469 || r_type == R_PPC64_REL24_NOTOC
4470 || r_type == R_PPC64_REL14
4471 || r_type == R_PPC64_REL14_BRTAKEN
4472 || r_type == R_PPC64_REL14_BRNTAKEN
4473 || r_type == R_PPC64_ADDR24
4474 || r_type == R_PPC64_ADDR14
4475 || r_type == R_PPC64_ADDR14_BRTAKEN
4476 || r_type == R_PPC64_ADDR14_BRNTAKEN
4477 || r_type == R_PPC64_PLTCALL
4478 || r_type == R_PPC64_PLTCALL_NOTOC);
4479 }
4480
4481 /* Relocs on inline plt call sequence insns prior to the call. */
4482
4483 static bfd_boolean
4484 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4485 {
4486 return (r_type == R_PPC64_PLT16_HA
4487 || r_type == R_PPC64_PLT16_HI
4488 || r_type == R_PPC64_PLT16_LO
4489 || r_type == R_PPC64_PLT16_LO_DS
4490 || r_type == R_PPC64_PLT_PCREL34
4491 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4492 || r_type == R_PPC64_PLTSEQ
4493 || r_type == R_PPC64_PLTSEQ_NOTOC);
4494 }
4495
4496 /* Look through the relocs for a section during the first phase, and
4497 calculate needed space in the global offset table, procedure
4498 linkage table, and dynamic reloc sections. */
4499
4500 static bfd_boolean
4501 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4502 asection *sec, const Elf_Internal_Rela *relocs)
4503 {
4504 struct ppc_link_hash_table *htab;
4505 Elf_Internal_Shdr *symtab_hdr;
4506 struct elf_link_hash_entry **sym_hashes;
4507 const Elf_Internal_Rela *rel;
4508 const Elf_Internal_Rela *rel_end;
4509 asection *sreloc;
4510 struct elf_link_hash_entry *tga, *dottga;
4511 bfd_boolean is_opd;
4512
4513 if (bfd_link_relocatable (info))
4514 return TRUE;
4515
4516 /* Don't do anything special with non-loaded, non-alloced sections.
4517 In particular, any relocs in such sections should not affect GOT
4518 and PLT reference counting (ie. we don't allow them to create GOT
4519 or PLT entries), there's no possibility or desire to optimize TLS
4520 relocs, and there's not much point in propagating relocs to shared
4521 libs that the dynamic linker won't relocate. */
4522 if ((sec->flags & SEC_ALLOC) == 0)
4523 return TRUE;
4524
4525 BFD_ASSERT (is_ppc64_elf (abfd));
4526
4527 htab = ppc_hash_table (info);
4528 if (htab == NULL)
4529 return FALSE;
4530
4531 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4532 FALSE, FALSE, TRUE);
4533 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4534 FALSE, FALSE, TRUE);
4535 symtab_hdr = &elf_symtab_hdr (abfd);
4536 sym_hashes = elf_sym_hashes (abfd);
4537 sreloc = NULL;
4538 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4539 rel_end = relocs + sec->reloc_count;
4540 for (rel = relocs; rel < rel_end; rel++)
4541 {
4542 unsigned long r_symndx;
4543 struct elf_link_hash_entry *h;
4544 enum elf_ppc64_reloc_type r_type;
4545 int tls_type;
4546 struct _ppc64_elf_section_data *ppc64_sec;
4547 struct plt_entry **ifunc, **plt_list;
4548
4549 r_symndx = ELF64_R_SYM (rel->r_info);
4550 if (r_symndx < symtab_hdr->sh_info)
4551 h = NULL;
4552 else
4553 {
4554 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4555 h = elf_follow_link (h);
4556
4557 if (h == htab->elf.hgot)
4558 sec->has_toc_reloc = 1;
4559 }
4560
4561 r_type = ELF64_R_TYPE (rel->r_info);
4562 switch (r_type)
4563 {
4564 case R_PPC64_D34:
4565 case R_PPC64_D34_LO:
4566 case R_PPC64_D34_HI30:
4567 case R_PPC64_D34_HA30:
4568 case R_PPC64_D28:
4569 case R_PPC64_TPREL34:
4570 case R_PPC64_DTPREL34:
4571 case R_PPC64_PCREL34:
4572 case R_PPC64_GOT_PCREL34:
4573 case R_PPC64_GOT_TLSGD34:
4574 case R_PPC64_GOT_TLSLD34:
4575 case R_PPC64_GOT_TPREL34:
4576 case R_PPC64_GOT_DTPREL34:
4577 case R_PPC64_PLT_PCREL34:
4578 case R_PPC64_PLT_PCREL34_NOTOC:
4579 case R_PPC64_PCREL28:
4580 htab->powerxx_stubs = 1;
4581 break;
4582 default:
4583 break;
4584 }
4585
4586 switch (r_type)
4587 {
4588 case R_PPC64_PLT16_HA:
4589 case R_PPC64_GOT_TLSLD16_HA:
4590 case R_PPC64_GOT_TLSGD16_HA:
4591 case R_PPC64_GOT_TPREL16_HA:
4592 case R_PPC64_GOT_DTPREL16_HA:
4593 case R_PPC64_GOT16_HA:
4594 case R_PPC64_TOC16_HA:
4595 case R_PPC64_PLT16_LO:
4596 case R_PPC64_PLT16_LO_DS:
4597 case R_PPC64_GOT_TLSLD16_LO:
4598 case R_PPC64_GOT_TLSGD16_LO:
4599 case R_PPC64_GOT_TPREL16_LO_DS:
4600 case R_PPC64_GOT_DTPREL16_LO_DS:
4601 case R_PPC64_GOT16_LO:
4602 case R_PPC64_GOT16_LO_DS:
4603 case R_PPC64_TOC16_LO:
4604 case R_PPC64_TOC16_LO_DS:
4605 case R_PPC64_GOT_PCREL34:
4606 ppc64_elf_tdata (abfd)->has_optrel = 1;
4607 ppc64_elf_section_data (sec)->has_optrel = 1;
4608 break;
4609 default:
4610 break;
4611 }
4612
4613 ifunc = NULL;
4614 if (h != NULL)
4615 {
4616 if (h->type == STT_GNU_IFUNC)
4617 {
4618 h->needs_plt = 1;
4619 ifunc = &h->plt.plist;
4620 }
4621 }
4622 else
4623 {
4624 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4625 abfd, r_symndx);
4626 if (isym == NULL)
4627 return FALSE;
4628
4629 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4630 {
4631 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4632 rel->r_addend,
4633 NON_GOT | PLT_IFUNC);
4634 if (ifunc == NULL)
4635 return FALSE;
4636 }
4637 }
4638
4639 tls_type = 0;
4640 switch (r_type)
4641 {
4642 case R_PPC64_TLSGD:
4643 case R_PPC64_TLSLD:
4644 /* These special tls relocs tie a call to __tls_get_addr with
4645 its parameter symbol. */
4646 if (h != NULL)
4647 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4648 else
4649 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4650 rel->r_addend,
4651 NON_GOT | TLS_TLS | TLS_MARK))
4652 return FALSE;
4653 sec->has_tls_reloc = 1;
4654 break;
4655
4656 case R_PPC64_GOT_TLSLD16:
4657 case R_PPC64_GOT_TLSLD16_LO:
4658 case R_PPC64_GOT_TLSLD16_HI:
4659 case R_PPC64_GOT_TLSLD16_HA:
4660 case R_PPC64_GOT_TLSLD34:
4661 tls_type = TLS_TLS | TLS_LD;
4662 goto dogottls;
4663
4664 case R_PPC64_GOT_TLSGD16:
4665 case R_PPC64_GOT_TLSGD16_LO:
4666 case R_PPC64_GOT_TLSGD16_HI:
4667 case R_PPC64_GOT_TLSGD16_HA:
4668 case R_PPC64_GOT_TLSGD34:
4669 tls_type = TLS_TLS | TLS_GD;
4670 goto dogottls;
4671
4672 case R_PPC64_GOT_TPREL16_DS:
4673 case R_PPC64_GOT_TPREL16_LO_DS:
4674 case R_PPC64_GOT_TPREL16_HI:
4675 case R_PPC64_GOT_TPREL16_HA:
4676 case R_PPC64_GOT_TPREL34:
4677 if (bfd_link_dll (info))
4678 info->flags |= DF_STATIC_TLS;
4679 tls_type = TLS_TLS | TLS_TPREL;
4680 goto dogottls;
4681
4682 case R_PPC64_GOT_DTPREL16_DS:
4683 case R_PPC64_GOT_DTPREL16_LO_DS:
4684 case R_PPC64_GOT_DTPREL16_HI:
4685 case R_PPC64_GOT_DTPREL16_HA:
4686 case R_PPC64_GOT_DTPREL34:
4687 tls_type = TLS_TLS | TLS_DTPREL;
4688 dogottls:
4689 sec->has_tls_reloc = 1;
4690 goto dogot;
4691
4692 case R_PPC64_GOT16:
4693 case R_PPC64_GOT16_LO:
4694 case R_PPC64_GOT16_HI:
4695 case R_PPC64_GOT16_HA:
4696 case R_PPC64_GOT16_DS:
4697 case R_PPC64_GOT16_LO_DS:
4698 case R_PPC64_GOT_PCREL34:
4699 dogot:
4700 /* This symbol requires a global offset table entry. */
4701 sec->has_toc_reloc = 1;
4702 if (r_type == R_PPC64_GOT_TLSLD16
4703 || r_type == R_PPC64_GOT_TLSGD16
4704 || r_type == R_PPC64_GOT_TPREL16_DS
4705 || r_type == R_PPC64_GOT_DTPREL16_DS
4706 || r_type == R_PPC64_GOT16
4707 || r_type == R_PPC64_GOT16_DS)
4708 {
4709 htab->do_multi_toc = 1;
4710 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4711 }
4712
4713 if (ppc64_elf_tdata (abfd)->got == NULL
4714 && !create_got_section (abfd, info))
4715 return FALSE;
4716
4717 if (h != NULL)
4718 {
4719 struct ppc_link_hash_entry *eh;
4720 struct got_entry *ent;
4721
4722 eh = (struct ppc_link_hash_entry *) h;
4723 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4724 if (ent->addend == rel->r_addend
4725 && ent->owner == abfd
4726 && ent->tls_type == tls_type)
4727 break;
4728 if (ent == NULL)
4729 {
4730 bfd_size_type amt = sizeof (*ent);
4731 ent = bfd_alloc (abfd, amt);
4732 if (ent == NULL)
4733 return FALSE;
4734 ent->next = eh->elf.got.glist;
4735 ent->addend = rel->r_addend;
4736 ent->owner = abfd;
4737 ent->tls_type = tls_type;
4738 ent->is_indirect = FALSE;
4739 ent->got.refcount = 0;
4740 eh->elf.got.glist = ent;
4741 }
4742 ent->got.refcount += 1;
4743 eh->tls_mask |= tls_type;
4744 }
4745 else
4746 /* This is a global offset table entry for a local symbol. */
4747 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4748 rel->r_addend, tls_type))
4749 return FALSE;
4750
4751 /* We may also need a plt entry if the symbol turns out to be
4752 an ifunc. */
4753 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
4754 {
4755 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4756 return FALSE;
4757 }
4758 break;
4759
4760 case R_PPC64_PLT16_HA:
4761 case R_PPC64_PLT16_HI:
4762 case R_PPC64_PLT16_LO:
4763 case R_PPC64_PLT16_LO_DS:
4764 case R_PPC64_PLT_PCREL34:
4765 case R_PPC64_PLT_PCREL34_NOTOC:
4766 case R_PPC64_PLT32:
4767 case R_PPC64_PLT64:
4768 /* This symbol requires a procedure linkage table entry. */
4769 plt_list = ifunc;
4770 if (h != NULL)
4771 {
4772 h->needs_plt = 1;
4773 if (h->root.root.string[0] == '.'
4774 && h->root.root.string[1] != '\0')
4775 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4776 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
4777 plt_list = &h->plt.plist;
4778 }
4779 if (plt_list == NULL)
4780 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4781 rel->r_addend,
4782 NON_GOT | PLT_KEEP);
4783 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4784 return FALSE;
4785 break;
4786
4787 /* The following relocations don't need to propagate the
4788 relocation if linking a shared object since they are
4789 section relative. */
4790 case R_PPC64_SECTOFF:
4791 case R_PPC64_SECTOFF_LO:
4792 case R_PPC64_SECTOFF_HI:
4793 case R_PPC64_SECTOFF_HA:
4794 case R_PPC64_SECTOFF_DS:
4795 case R_PPC64_SECTOFF_LO_DS:
4796 case R_PPC64_DTPREL16:
4797 case R_PPC64_DTPREL16_LO:
4798 case R_PPC64_DTPREL16_HI:
4799 case R_PPC64_DTPREL16_HA:
4800 case R_PPC64_DTPREL16_DS:
4801 case R_PPC64_DTPREL16_LO_DS:
4802 case R_PPC64_DTPREL16_HIGH:
4803 case R_PPC64_DTPREL16_HIGHA:
4804 case R_PPC64_DTPREL16_HIGHER:
4805 case R_PPC64_DTPREL16_HIGHERA:
4806 case R_PPC64_DTPREL16_HIGHEST:
4807 case R_PPC64_DTPREL16_HIGHESTA:
4808 break;
4809
4810 /* Nor do these. */
4811 case R_PPC64_REL16:
4812 case R_PPC64_REL16_LO:
4813 case R_PPC64_REL16_HI:
4814 case R_PPC64_REL16_HA:
4815 case R_PPC64_REL16_HIGH:
4816 case R_PPC64_REL16_HIGHA:
4817 case R_PPC64_REL16_HIGHER:
4818 case R_PPC64_REL16_HIGHERA:
4819 case R_PPC64_REL16_HIGHEST:
4820 case R_PPC64_REL16_HIGHESTA:
4821 case R_PPC64_REL16_HIGHER34:
4822 case R_PPC64_REL16_HIGHERA34:
4823 case R_PPC64_REL16_HIGHEST34:
4824 case R_PPC64_REL16_HIGHESTA34:
4825 case R_PPC64_REL16DX_HA:
4826 break;
4827
4828 /* Not supported as a dynamic relocation. */
4829 case R_PPC64_ADDR64_LOCAL:
4830 if (bfd_link_pic (info))
4831 {
4832 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4833 ppc_howto_init ();
4834 /* xgettext:c-format */
4835 info->callbacks->einfo (_("%H: %s reloc unsupported "
4836 "in shared libraries and PIEs\n"),
4837 abfd, sec, rel->r_offset,
4838 ppc64_elf_howto_table[r_type]->name);
4839 bfd_set_error (bfd_error_bad_value);
4840 return FALSE;
4841 }
4842 break;
4843
4844 case R_PPC64_TOC16:
4845 case R_PPC64_TOC16_DS:
4846 htab->do_multi_toc = 1;
4847 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4848 /* Fall through. */
4849 case R_PPC64_TOC16_LO:
4850 case R_PPC64_TOC16_HI:
4851 case R_PPC64_TOC16_HA:
4852 case R_PPC64_TOC16_LO_DS:
4853 sec->has_toc_reloc = 1;
4854 if (h != NULL && bfd_link_executable (info))
4855 {
4856 /* We may need a copy reloc. */
4857 h->non_got_ref = 1;
4858 /* Strongly prefer a copy reloc over a dynamic reloc.
4859 glibc ld.so as of 2019-08 will error out if one of
4860 these relocations is emitted. */
4861 h->needs_copy = 1;
4862 goto dodyn;
4863 }
4864 break;
4865
4866 /* Marker reloc. */
4867 case R_PPC64_ENTRY:
4868 break;
4869
4870 /* This relocation describes the C++ object vtable hierarchy.
4871 Reconstruct it for later use during GC. */
4872 case R_PPC64_GNU_VTINHERIT:
4873 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4874 return FALSE;
4875 break;
4876
4877 /* This relocation describes which C++ vtable entries are actually
4878 used. Record for later use during GC. */
4879 case R_PPC64_GNU_VTENTRY:
4880 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4881 return FALSE;
4882 break;
4883
4884 case R_PPC64_REL14:
4885 case R_PPC64_REL14_BRTAKEN:
4886 case R_PPC64_REL14_BRNTAKEN:
4887 {
4888 asection *dest = NULL;
4889
4890 /* Heuristic: If jumping outside our section, chances are
4891 we are going to need a stub. */
4892 if (h != NULL)
4893 {
4894 /* If the sym is weak it may be overridden later, so
4895 don't assume we know where a weak sym lives. */
4896 if (h->root.type == bfd_link_hash_defined)
4897 dest = h->root.u.def.section;
4898 }
4899 else
4900 {
4901 Elf_Internal_Sym *isym;
4902
4903 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4904 abfd, r_symndx);
4905 if (isym == NULL)
4906 return FALSE;
4907
4908 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4909 }
4910
4911 if (dest != sec)
4912 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4913 }
4914 goto rel24;
4915
4916 case R_PPC64_PLTCALL:
4917 case R_PPC64_PLTCALL_NOTOC:
4918 ppc64_elf_section_data (sec)->has_pltcall = 1;
4919 /* Fall through. */
4920
4921 case R_PPC64_REL24:
4922 case R_PPC64_REL24_NOTOC:
4923 rel24:
4924 plt_list = ifunc;
4925 if (h != NULL)
4926 {
4927 h->needs_plt = 1;
4928 if (h->root.root.string[0] == '.'
4929 && h->root.root.string[1] != '\0')
4930 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4931
4932 if (h == tga || h == dottga)
4933 {
4934 sec->has_tls_reloc = 1;
4935 if (rel != relocs
4936 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4937 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4938 /* We have a new-style __tls_get_addr call with
4939 a marker reloc. */
4940 ;
4941 else
4942 /* Mark this section as having an old-style call. */
4943 sec->nomark_tls_get_addr = 1;
4944 }
4945 plt_list = &h->plt.plist;
4946 }
4947
4948 /* We may need a .plt entry if the function this reloc
4949 refers to is in a shared lib. */
4950 if (plt_list
4951 && !update_plt_info (abfd, plt_list, rel->r_addend))
4952 return FALSE;
4953 break;
4954
4955 case R_PPC64_ADDR14:
4956 case R_PPC64_ADDR14_BRNTAKEN:
4957 case R_PPC64_ADDR14_BRTAKEN:
4958 case R_PPC64_ADDR24:
4959 goto dodyn;
4960
4961 case R_PPC64_TPREL64:
4962 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4963 if (bfd_link_dll (info))
4964 info->flags |= DF_STATIC_TLS;
4965 goto dotlstoc;
4966
4967 case R_PPC64_DTPMOD64:
4968 if (rel + 1 < rel_end
4969 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4970 && rel[1].r_offset == rel->r_offset + 8)
4971 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4972 else
4973 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4974 goto dotlstoc;
4975
4976 case R_PPC64_DTPREL64:
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4978 if (rel != relocs
4979 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4980 && rel[-1].r_offset == rel->r_offset - 8)
4981 /* This is the second reloc of a dtpmod, dtprel pair.
4982 Don't mark with TLS_DTPREL. */
4983 goto dodyn;
4984
4985 dotlstoc:
4986 sec->has_tls_reloc = 1;
4987 if (h != NULL)
4988 {
4989 struct ppc_link_hash_entry *eh;
4990 eh = (struct ppc_link_hash_entry *) h;
4991 eh->tls_mask |= tls_type & 0xff;
4992 }
4993 else
4994 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4995 rel->r_addend, tls_type))
4996 return FALSE;
4997
4998 ppc64_sec = ppc64_elf_section_data (sec);
4999 if (ppc64_sec->sec_type != sec_toc)
5000 {
5001 bfd_size_type amt;
5002
5003 /* One extra to simplify get_tls_mask. */
5004 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5005 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5006 if (ppc64_sec->u.toc.symndx == NULL)
5007 return FALSE;
5008 amt = sec->size * sizeof (bfd_vma) / 8;
5009 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5010 if (ppc64_sec->u.toc.add == NULL)
5011 return FALSE;
5012 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5013 ppc64_sec->sec_type = sec_toc;
5014 }
5015 BFD_ASSERT (rel->r_offset % 8 == 0);
5016 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5017 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5018
5019 /* Mark the second slot of a GD or LD entry.
5020 -1 to indicate GD and -2 to indicate LD. */
5021 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5022 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5023 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5024 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5025 goto dodyn;
5026
5027 case R_PPC64_TPREL16:
5028 case R_PPC64_TPREL16_LO:
5029 case R_PPC64_TPREL16_HI:
5030 case R_PPC64_TPREL16_HA:
5031 case R_PPC64_TPREL16_DS:
5032 case R_PPC64_TPREL16_LO_DS:
5033 case R_PPC64_TPREL16_HIGH:
5034 case R_PPC64_TPREL16_HIGHA:
5035 case R_PPC64_TPREL16_HIGHER:
5036 case R_PPC64_TPREL16_HIGHERA:
5037 case R_PPC64_TPREL16_HIGHEST:
5038 case R_PPC64_TPREL16_HIGHESTA:
5039 case R_PPC64_TPREL34:
5040 if (bfd_link_dll (info))
5041 info->flags |= DF_STATIC_TLS;
5042 goto dodyn;
5043
5044 case R_PPC64_ADDR64:
5045 if (is_opd
5046 && rel + 1 < rel_end
5047 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5048 {
5049 if (h != NULL)
5050 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5051 }
5052 /* Fall through. */
5053
5054 case R_PPC64_ADDR16:
5055 case R_PPC64_ADDR16_DS:
5056 case R_PPC64_ADDR16_HA:
5057 case R_PPC64_ADDR16_HI:
5058 case R_PPC64_ADDR16_HIGH:
5059 case R_PPC64_ADDR16_HIGHA:
5060 case R_PPC64_ADDR16_HIGHER:
5061 case R_PPC64_ADDR16_HIGHERA:
5062 case R_PPC64_ADDR16_HIGHEST:
5063 case R_PPC64_ADDR16_HIGHESTA:
5064 case R_PPC64_ADDR16_LO:
5065 case R_PPC64_ADDR16_LO_DS:
5066 case R_PPC64_D34:
5067 case R_PPC64_D34_LO:
5068 case R_PPC64_D34_HI30:
5069 case R_PPC64_D34_HA30:
5070 case R_PPC64_ADDR16_HIGHER34:
5071 case R_PPC64_ADDR16_HIGHERA34:
5072 case R_PPC64_ADDR16_HIGHEST34:
5073 case R_PPC64_ADDR16_HIGHESTA34:
5074 case R_PPC64_D28:
5075 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5076 && rel->r_addend == 0)
5077 {
5078 /* We may need a .plt entry if this reloc refers to a
5079 function in a shared lib. */
5080 if (!update_plt_info (abfd, &h->plt.plist, 0))
5081 return FALSE;
5082 h->pointer_equality_needed = 1;
5083 }
5084 /* Fall through. */
5085
5086 case R_PPC64_REL30:
5087 case R_PPC64_REL32:
5088 case R_PPC64_REL64:
5089 case R_PPC64_ADDR32:
5090 case R_PPC64_UADDR16:
5091 case R_PPC64_UADDR32:
5092 case R_PPC64_UADDR64:
5093 case R_PPC64_TOC:
5094 if (h != NULL && bfd_link_executable (info))
5095 /* We may need a copy reloc. */
5096 h->non_got_ref = 1;
5097
5098 /* Don't propagate .opd relocs. */
5099 if (NO_OPD_RELOCS && is_opd)
5100 break;
5101
5102 /* If we are creating a shared library, and this is a reloc
5103 against a global symbol, or a non PC relative reloc
5104 against a local symbol, then we need to copy the reloc
5105 into the shared library. However, if we are linking with
5106 -Bsymbolic, we do not need to copy a reloc against a
5107 global symbol which is defined in an object we are
5108 including in the link (i.e., DEF_REGULAR is set). At
5109 this point we have not seen all the input files, so it is
5110 possible that DEF_REGULAR is not set now but will be set
5111 later (it is never cleared). In case of a weak definition,
5112 DEF_REGULAR may be cleared later by a strong definition in
5113 a shared library. We account for that possibility below by
5114 storing information in the dyn_relocs field of the hash
5115 table entry. A similar situation occurs when creating
5116 shared libraries and symbol visibility changes render the
5117 symbol local.
5118
5119 If on the other hand, we are creating an executable, we
5120 may need to keep relocations for symbols satisfied by a
5121 dynamic library if we manage to avoid copy relocs for the
5122 symbol. */
5123 dodyn:
5124 if ((h != NULL
5125 && (h->root.type == bfd_link_hash_defweak
5126 || !h->def_regular))
5127 || (h != NULL
5128 && !bfd_link_executable (info)
5129 && !SYMBOLIC_BIND (info, h))
5130 || (bfd_link_pic (info)
5131 && must_be_dyn_reloc (info, r_type))
5132 || (!bfd_link_pic (info)
5133 && ifunc != NULL))
5134 {
5135 /* We must copy these reloc types into the output file.
5136 Create a reloc section in dynobj and make room for
5137 this reloc. */
5138 if (sreloc == NULL)
5139 {
5140 sreloc = _bfd_elf_make_dynamic_reloc_section
5141 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5142
5143 if (sreloc == NULL)
5144 return FALSE;
5145 }
5146
5147 /* If this is a global symbol, we count the number of
5148 relocations we need for this symbol. */
5149 if (h != NULL)
5150 {
5151 struct elf_dyn_relocs *p;
5152 struct elf_dyn_relocs **head;
5153
5154 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5155 p = *head;
5156 if (p == NULL || p->sec != sec)
5157 {
5158 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5159 if (p == NULL)
5160 return FALSE;
5161 p->next = *head;
5162 *head = p;
5163 p->sec = sec;
5164 p->count = 0;
5165 p->pc_count = 0;
5166 }
5167 p->count += 1;
5168 if (!must_be_dyn_reloc (info, r_type))
5169 p->pc_count += 1;
5170 }
5171 else
5172 {
5173 /* Track dynamic relocs needed for local syms too.
5174 We really need local syms available to do this
5175 easily. Oh well. */
5176 struct ppc_dyn_relocs *p;
5177 struct ppc_dyn_relocs **head;
5178 bfd_boolean is_ifunc;
5179 asection *s;
5180 void *vpp;
5181 Elf_Internal_Sym *isym;
5182
5183 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5184 abfd, r_symndx);
5185 if (isym == NULL)
5186 return FALSE;
5187
5188 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5189 if (s == NULL)
5190 s = sec;
5191
5192 vpp = &elf_section_data (s)->local_dynrel;
5193 head = (struct ppc_dyn_relocs **) vpp;
5194 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5195 p = *head;
5196 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5197 p = p->next;
5198 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5199 {
5200 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5201 if (p == NULL)
5202 return FALSE;
5203 p->next = *head;
5204 *head = p;
5205 p->sec = sec;
5206 p->ifunc = is_ifunc;
5207 p->count = 0;
5208 }
5209 p->count += 1;
5210 }
5211 }
5212 break;
5213
5214 default:
5215 break;
5216 }
5217 }
5218
5219 return TRUE;
5220 }
5221
5222 /* Merge backend specific data from an object file to the output
5223 object file when linking. */
5224
5225 static bfd_boolean
5226 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5227 {
5228 bfd *obfd = info->output_bfd;
5229 unsigned long iflags, oflags;
5230
5231 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5232 return TRUE;
5233
5234 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5235 return TRUE;
5236
5237 if (!_bfd_generic_verify_endian_match (ibfd, info))
5238 return FALSE;
5239
5240 iflags = elf_elfheader (ibfd)->e_flags;
5241 oflags = elf_elfheader (obfd)->e_flags;
5242
5243 if (iflags & ~EF_PPC64_ABI)
5244 {
5245 _bfd_error_handler
5246 /* xgettext:c-format */
5247 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5248 bfd_set_error (bfd_error_bad_value);
5249 return FALSE;
5250 }
5251 else if (iflags != oflags && iflags != 0)
5252 {
5253 _bfd_error_handler
5254 /* xgettext:c-format */
5255 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5256 ibfd, iflags, oflags);
5257 bfd_set_error (bfd_error_bad_value);
5258 return FALSE;
5259 }
5260
5261 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5262 return FALSE;
5263
5264 /* Merge Tag_compatibility attributes and any common GNU ones. */
5265 return _bfd_elf_merge_object_attributes (ibfd, info);
5266 }
5267
5268 static bfd_boolean
5269 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5270 {
5271 /* Print normal ELF private data. */
5272 _bfd_elf_print_private_bfd_data (abfd, ptr);
5273
5274 if (elf_elfheader (abfd)->e_flags != 0)
5275 {
5276 FILE *file = ptr;
5277
5278 fprintf (file, _("private flags = 0x%lx:"),
5279 elf_elfheader (abfd)->e_flags);
5280
5281 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5282 fprintf (file, _(" [abiv%ld]"),
5283 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5284 fputc ('\n', file);
5285 }
5286
5287 return TRUE;
5288 }
5289
5290 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5291 of the code entry point, and its section, which must be in the same
5292 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5293
5294 static bfd_vma
5295 opd_entry_value (asection *opd_sec,
5296 bfd_vma offset,
5297 asection **code_sec,
5298 bfd_vma *code_off,
5299 bfd_boolean in_code_sec)
5300 {
5301 bfd *opd_bfd = opd_sec->owner;
5302 Elf_Internal_Rela *relocs;
5303 Elf_Internal_Rela *lo, *hi, *look;
5304 bfd_vma val;
5305
5306 /* No relocs implies we are linking a --just-symbols object, or looking
5307 at a final linked executable with addr2line or somesuch. */
5308 if (opd_sec->reloc_count == 0)
5309 {
5310 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5311
5312 if (contents == NULL)
5313 {
5314 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5315 return (bfd_vma) -1;
5316 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5317 }
5318
5319 /* PR 17512: file: 64b9dfbb. */
5320 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5321 return (bfd_vma) -1;
5322
5323 val = bfd_get_64 (opd_bfd, contents + offset);
5324 if (code_sec != NULL)
5325 {
5326 asection *sec, *likely = NULL;
5327
5328 if (in_code_sec)
5329 {
5330 sec = *code_sec;
5331 if (sec->vma <= val
5332 && val < sec->vma + sec->size)
5333 likely = sec;
5334 else
5335 val = -1;
5336 }
5337 else
5338 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5339 if (sec->vma <= val
5340 && (sec->flags & SEC_LOAD) != 0
5341 && (sec->flags & SEC_ALLOC) != 0)
5342 likely = sec;
5343 if (likely != NULL)
5344 {
5345 *code_sec = likely;
5346 if (code_off != NULL)
5347 *code_off = val - likely->vma;
5348 }
5349 }
5350 return val;
5351 }
5352
5353 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5354
5355 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5356 if (relocs == NULL)
5357 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5358 /* PR 17512: file: df8e1fd6. */
5359 if (relocs == NULL)
5360 return (bfd_vma) -1;
5361
5362 /* Go find the opd reloc at the sym address. */
5363 lo = relocs;
5364 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5365 val = (bfd_vma) -1;
5366 while (lo < hi)
5367 {
5368 look = lo + (hi - lo) / 2;
5369 if (look->r_offset < offset)
5370 lo = look + 1;
5371 else if (look->r_offset > offset)
5372 hi = look;
5373 else
5374 {
5375 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5376
5377 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5378 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5379 {
5380 unsigned long symndx = ELF64_R_SYM (look->r_info);
5381 asection *sec = NULL;
5382
5383 if (symndx >= symtab_hdr->sh_info
5384 && elf_sym_hashes (opd_bfd) != NULL)
5385 {
5386 struct elf_link_hash_entry **sym_hashes;
5387 struct elf_link_hash_entry *rh;
5388
5389 sym_hashes = elf_sym_hashes (opd_bfd);
5390 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5391 if (rh != NULL)
5392 {
5393 rh = elf_follow_link (rh);
5394 if (rh->root.type != bfd_link_hash_defined
5395 && rh->root.type != bfd_link_hash_defweak)
5396 break;
5397 if (rh->root.u.def.section->owner == opd_bfd)
5398 {
5399 val = rh->root.u.def.value;
5400 sec = rh->root.u.def.section;
5401 }
5402 }
5403 }
5404
5405 if (sec == NULL)
5406 {
5407 Elf_Internal_Sym *sym;
5408
5409 if (symndx < symtab_hdr->sh_info)
5410 {
5411 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5412 if (sym == NULL)
5413 {
5414 size_t symcnt = symtab_hdr->sh_info;
5415 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5416 symcnt, 0,
5417 NULL, NULL, NULL);
5418 if (sym == NULL)
5419 break;
5420 symtab_hdr->contents = (bfd_byte *) sym;
5421 }
5422 sym += symndx;
5423 }
5424 else
5425 {
5426 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5427 1, symndx,
5428 NULL, NULL, NULL);
5429 if (sym == NULL)
5430 break;
5431 }
5432 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5433 if (sec == NULL)
5434 break;
5435 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5436 val = sym->st_value;
5437 }
5438
5439 val += look->r_addend;
5440 if (code_off != NULL)
5441 *code_off = val;
5442 if (code_sec != NULL)
5443 {
5444 if (in_code_sec && *code_sec != sec)
5445 return -1;
5446 else
5447 *code_sec = sec;
5448 }
5449 if (sec->output_section != NULL)
5450 val += sec->output_section->vma + sec->output_offset;
5451 }
5452 break;
5453 }
5454 }
5455
5456 return val;
5457 }
5458
5459 /* If the ELF symbol SYM might be a function in SEC, return the
5460 function size and set *CODE_OFF to the function's entry point,
5461 otherwise return zero. */
5462
5463 static bfd_size_type
5464 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5465 bfd_vma *code_off)
5466 {
5467 bfd_size_type size;
5468
5469 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5470 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5471 return 0;
5472
5473 size = 0;
5474 if (!(sym->flags & BSF_SYNTHETIC))
5475 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5476
5477 if (strcmp (sym->section->name, ".opd") == 0)
5478 {
5479 struct _opd_sec_data *opd = get_opd_info (sym->section);
5480 bfd_vma symval = sym->value;
5481
5482 if (opd != NULL
5483 && opd->adjust != NULL
5484 && elf_section_data (sym->section)->relocs != NULL)
5485 {
5486 /* opd_entry_value will use cached relocs that have been
5487 adjusted, but with raw symbols. That means both local
5488 and global symbols need adjusting. */
5489 long adjust = opd->adjust[OPD_NDX (symval)];
5490 if (adjust == -1)
5491 return 0;
5492 symval += adjust;
5493 }
5494
5495 if (opd_entry_value (sym->section, symval,
5496 &sec, code_off, TRUE) == (bfd_vma) -1)
5497 return 0;
5498 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5499 symbol. This size has nothing to do with the code size of the
5500 function, which is what we're supposed to return, but the
5501 code size isn't available without looking up the dot-sym.
5502 However, doing that would be a waste of time particularly
5503 since elf_find_function will look at the dot-sym anyway.
5504 Now, elf_find_function will keep the largest size of any
5505 function sym found at the code address of interest, so return
5506 1 here to avoid it incorrectly caching a larger function size
5507 for a small function. This does mean we return the wrong
5508 size for a new-ABI function of size 24, but all that does is
5509 disable caching for such functions. */
5510 if (size == 24)
5511 size = 1;
5512 }
5513 else
5514 {
5515 if (sym->section != sec)
5516 return 0;
5517 *code_off = sym->value;
5518 }
5519 if (size == 0)
5520 size = 1;
5521 return size;
5522 }
5523
5524 /* Return true if symbol is a strong function defined in an ELFv2
5525 object with st_other localentry bits of zero, ie. its local entry
5526 point coincides with its global entry point. */
5527
5528 static bfd_boolean
5529 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5530 {
5531 return (h != NULL
5532 && h->type == STT_FUNC
5533 && h->root.type == bfd_link_hash_defined
5534 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5535 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
5536 && is_ppc64_elf (h->root.u.def.section->owner)
5537 && abiversion (h->root.u.def.section->owner) >= 2);
5538 }
5539
5540 /* Return true if symbol is defined in a regular object file. */
5541
5542 static bfd_boolean
5543 is_static_defined (struct elf_link_hash_entry *h)
5544 {
5545 return ((h->root.type == bfd_link_hash_defined
5546 || h->root.type == bfd_link_hash_defweak)
5547 && h->root.u.def.section != NULL
5548 && h->root.u.def.section->output_section != NULL);
5549 }
5550
5551 /* If FDH is a function descriptor symbol, return the associated code
5552 entry symbol if it is defined. Return NULL otherwise. */
5553
5554 static struct ppc_link_hash_entry *
5555 defined_code_entry (struct ppc_link_hash_entry *fdh)
5556 {
5557 if (fdh->is_func_descriptor)
5558 {
5559 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5560 if (fh->elf.root.type == bfd_link_hash_defined
5561 || fh->elf.root.type == bfd_link_hash_defweak)
5562 return fh;
5563 }
5564 return NULL;
5565 }
5566
5567 /* If FH is a function code entry symbol, return the associated
5568 function descriptor symbol if it is defined. Return NULL otherwise. */
5569
5570 static struct ppc_link_hash_entry *
5571 defined_func_desc (struct ppc_link_hash_entry *fh)
5572 {
5573 if (fh->oh != NULL
5574 && fh->oh->is_func_descriptor)
5575 {
5576 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5577 if (fdh->elf.root.type == bfd_link_hash_defined
5578 || fdh->elf.root.type == bfd_link_hash_defweak)
5579 return fdh;
5580 }
5581 return NULL;
5582 }
5583
5584 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5585
5586 /* Garbage collect sections, after first dealing with dot-symbols. */
5587
5588 static bfd_boolean
5589 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5590 {
5591 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5592
5593 if (htab != NULL && htab->need_func_desc_adj)
5594 {
5595 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5596 htab->need_func_desc_adj = 0;
5597 }
5598 return bfd_elf_gc_sections (abfd, info);
5599 }
5600
5601 /* Mark all our entry sym sections, both opd and code section. */
5602
5603 static void
5604 ppc64_elf_gc_keep (struct bfd_link_info *info)
5605 {
5606 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5607 struct bfd_sym_chain *sym;
5608
5609 if (htab == NULL)
5610 return;
5611
5612 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5613 {
5614 struct ppc_link_hash_entry *eh, *fh;
5615 asection *sec;
5616
5617 eh = (struct ppc_link_hash_entry *)
5618 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
5619 if (eh == NULL)
5620 continue;
5621 if (eh->elf.root.type != bfd_link_hash_defined
5622 && eh->elf.root.type != bfd_link_hash_defweak)
5623 continue;
5624
5625 fh = defined_code_entry (eh);
5626 if (fh != NULL)
5627 {
5628 sec = fh->elf.root.u.def.section;
5629 sec->flags |= SEC_KEEP;
5630 }
5631 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5632 && opd_entry_value (eh->elf.root.u.def.section,
5633 eh->elf.root.u.def.value,
5634 &sec, NULL, FALSE) != (bfd_vma) -1)
5635 sec->flags |= SEC_KEEP;
5636
5637 sec = eh->elf.root.u.def.section;
5638 sec->flags |= SEC_KEEP;
5639 }
5640 }
5641
5642 /* Mark sections containing dynamically referenced symbols. When
5643 building shared libraries, we must assume that any visible symbol is
5644 referenced. */
5645
5646 static bfd_boolean
5647 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5648 {
5649 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5650 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
5651 struct ppc_link_hash_entry *fdh;
5652 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5653
5654 /* Dynamic linking info is on the func descriptor sym. */
5655 fdh = defined_func_desc (eh);
5656 if (fdh != NULL)
5657 eh = fdh;
5658
5659 if ((eh->elf.root.type == bfd_link_hash_defined
5660 || eh->elf.root.type == bfd_link_hash_defweak)
5661 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5662 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5663 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5664 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5665 && (!bfd_link_executable (info)
5666 || info->gc_keep_exported
5667 || info->export_dynamic
5668 || (eh->elf.dynamic
5669 && d != NULL
5670 && (*d->match) (&d->head, NULL,
5671 eh->elf.root.root.string)))
5672 && (eh->elf.versioned >= versioned
5673 || !bfd_hide_sym_by_version (info->version_info,
5674 eh->elf.root.root.string)))))
5675 {
5676 asection *code_sec;
5677 struct ppc_link_hash_entry *fh;
5678
5679 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5680
5681 /* Function descriptor syms cause the associated
5682 function code sym section to be marked. */
5683 fh = defined_code_entry (eh);
5684 if (fh != NULL)
5685 {
5686 code_sec = fh->elf.root.u.def.section;
5687 code_sec->flags |= SEC_KEEP;
5688 }
5689 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5690 && opd_entry_value (eh->elf.root.u.def.section,
5691 eh->elf.root.u.def.value,
5692 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5693 code_sec->flags |= SEC_KEEP;
5694 }
5695
5696 return TRUE;
5697 }
5698
5699 /* Return the section that should be marked against GC for a given
5700 relocation. */
5701
5702 static asection *
5703 ppc64_elf_gc_mark_hook (asection *sec,
5704 struct bfd_link_info *info,
5705 Elf_Internal_Rela *rel,
5706 struct elf_link_hash_entry *h,
5707 Elf_Internal_Sym *sym)
5708 {
5709 asection *rsec;
5710
5711 /* Syms return NULL if we're marking .opd, so we avoid marking all
5712 function sections, as all functions are referenced in .opd. */
5713 rsec = NULL;
5714 if (get_opd_info (sec) != NULL)
5715 return rsec;
5716
5717 if (h != NULL)
5718 {
5719 enum elf_ppc64_reloc_type r_type;
5720 struct ppc_link_hash_entry *eh, *fh, *fdh;
5721
5722 r_type = ELF64_R_TYPE (rel->r_info);
5723 switch (r_type)
5724 {
5725 case R_PPC64_GNU_VTINHERIT:
5726 case R_PPC64_GNU_VTENTRY:
5727 break;
5728
5729 default:
5730 switch (h->root.type)
5731 {
5732 case bfd_link_hash_defined:
5733 case bfd_link_hash_defweak:
5734 eh = (struct ppc_link_hash_entry *) h;
5735 fdh = defined_func_desc (eh);
5736 if (fdh != NULL)
5737 {
5738 /* -mcall-aixdesc code references the dot-symbol on
5739 a call reloc. Mark the function descriptor too
5740 against garbage collection. */
5741 fdh->elf.mark = 1;
5742 if (fdh->elf.is_weakalias)
5743 weakdef (&fdh->elf)->mark = 1;
5744 eh = fdh;
5745 }
5746
5747 /* Function descriptor syms cause the associated
5748 function code sym section to be marked. */
5749 fh = defined_code_entry (eh);
5750 if (fh != NULL)
5751 {
5752 /* They also mark their opd section. */
5753 eh->elf.root.u.def.section->gc_mark = 1;
5754
5755 rsec = fh->elf.root.u.def.section;
5756 }
5757 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5758 && opd_entry_value (eh->elf.root.u.def.section,
5759 eh->elf.root.u.def.value,
5760 &rsec, NULL, FALSE) != (bfd_vma) -1)
5761 eh->elf.root.u.def.section->gc_mark = 1;
5762 else
5763 rsec = h->root.u.def.section;
5764 break;
5765
5766 case bfd_link_hash_common:
5767 rsec = h->root.u.c.p->section;
5768 break;
5769
5770 default:
5771 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5772 }
5773 }
5774 }
5775 else
5776 {
5777 struct _opd_sec_data *opd;
5778
5779 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5780 opd = get_opd_info (rsec);
5781 if (opd != NULL && opd->func_sec != NULL)
5782 {
5783 rsec->gc_mark = 1;
5784
5785 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5786 }
5787 }
5788
5789 return rsec;
5790 }
5791
5792 /* The maximum size of .sfpr. */
5793 #define SFPR_MAX (218*4)
5794
5795 struct sfpr_def_parms
5796 {
5797 const char name[12];
5798 unsigned char lo, hi;
5799 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5800 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5801 };
5802
5803 /* Auto-generate _save*, _rest* functions in .sfpr.
5804 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5805 instead. */
5806
5807 static bfd_boolean
5808 sfpr_define (struct bfd_link_info *info,
5809 const struct sfpr_def_parms *parm,
5810 asection *stub_sec)
5811 {
5812 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5813 unsigned int i;
5814 size_t len = strlen (parm->name);
5815 bfd_boolean writing = FALSE;
5816 char sym[16];
5817
5818 if (htab == NULL)
5819 return FALSE;
5820
5821 memcpy (sym, parm->name, len);
5822 sym[len + 2] = 0;
5823
5824 for (i = parm->lo; i <= parm->hi; i++)
5825 {
5826 struct ppc_link_hash_entry *h;
5827
5828 sym[len + 0] = i / 10 + '0';
5829 sym[len + 1] = i % 10 + '0';
5830 h = (struct ppc_link_hash_entry *)
5831 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
5832 if (stub_sec != NULL)
5833 {
5834 if (h != NULL
5835 && h->elf.root.type == bfd_link_hash_defined
5836 && h->elf.root.u.def.section == htab->sfpr)
5837 {
5838 struct elf_link_hash_entry *s;
5839 char buf[32];
5840 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5841 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5842 if (s == NULL)
5843 return FALSE;
5844 if (s->root.type == bfd_link_hash_new)
5845 {
5846 s->root.type = bfd_link_hash_defined;
5847 s->root.u.def.section = stub_sec;
5848 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5849 + h->elf.root.u.def.value);
5850 s->ref_regular = 1;
5851 s->def_regular = 1;
5852 s->ref_regular_nonweak = 1;
5853 s->forced_local = 1;
5854 s->non_elf = 0;
5855 s->root.linker_def = 1;
5856 }
5857 }
5858 continue;
5859 }
5860 if (h != NULL)
5861 {
5862 h->save_res = 1;
5863 if (!h->elf.def_regular)
5864 {
5865 h->elf.root.type = bfd_link_hash_defined;
5866 h->elf.root.u.def.section = htab->sfpr;
5867 h->elf.root.u.def.value = htab->sfpr->size;
5868 h->elf.type = STT_FUNC;
5869 h->elf.def_regular = 1;
5870 h->elf.non_elf = 0;
5871 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5872 writing = TRUE;
5873 if (htab->sfpr->contents == NULL)
5874 {
5875 htab->sfpr->contents
5876 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5877 if (htab->sfpr->contents == NULL)
5878 return FALSE;
5879 }
5880 }
5881 }
5882 if (writing)
5883 {
5884 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5885 if (i != parm->hi)
5886 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5887 else
5888 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5889 htab->sfpr->size = p - htab->sfpr->contents;
5890 }
5891 }
5892
5893 return TRUE;
5894 }
5895
5896 static bfd_byte *
5897 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5898 {
5899 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5900 return p + 4;
5901 }
5902
5903 static bfd_byte *
5904 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5905 {
5906 p = savegpr0 (abfd, p, r);
5907 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5908 p = p + 4;
5909 bfd_put_32 (abfd, BLR, p);
5910 return p + 4;
5911 }
5912
5913 static bfd_byte *
5914 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5915 {
5916 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5917 return p + 4;
5918 }
5919
5920 static bfd_byte *
5921 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5922 {
5923 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5924 p = p + 4;
5925 p = restgpr0 (abfd, p, r);
5926 bfd_put_32 (abfd, MTLR_R0, p);
5927 p = p + 4;
5928 if (r == 29)
5929 {
5930 p = restgpr0 (abfd, p, 30);
5931 p = restgpr0 (abfd, p, 31);
5932 }
5933 bfd_put_32 (abfd, BLR, p);
5934 return p + 4;
5935 }
5936
5937 static bfd_byte *
5938 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5939 {
5940 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5941 return p + 4;
5942 }
5943
5944 static bfd_byte *
5945 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5946 {
5947 p = savegpr1 (abfd, p, r);
5948 bfd_put_32 (abfd, BLR, p);
5949 return p + 4;
5950 }
5951
5952 static bfd_byte *
5953 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5954 {
5955 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5956 return p + 4;
5957 }
5958
5959 static bfd_byte *
5960 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5961 {
5962 p = restgpr1 (abfd, p, r);
5963 bfd_put_32 (abfd, BLR, p);
5964 return p + 4;
5965 }
5966
5967 static bfd_byte *
5968 savefpr (bfd *abfd, bfd_byte *p, int r)
5969 {
5970 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5971 return p + 4;
5972 }
5973
5974 static bfd_byte *
5975 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5976 {
5977 p = savefpr (abfd, p, r);
5978 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5979 p = p + 4;
5980 bfd_put_32 (abfd, BLR, p);
5981 return p + 4;
5982 }
5983
5984 static bfd_byte *
5985 restfpr (bfd *abfd, bfd_byte *p, int r)
5986 {
5987 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5988 return p + 4;
5989 }
5990
5991 static bfd_byte *
5992 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5993 {
5994 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5995 p = p + 4;
5996 p = restfpr (abfd, p, r);
5997 bfd_put_32 (abfd, MTLR_R0, p);
5998 p = p + 4;
5999 if (r == 29)
6000 {
6001 p = restfpr (abfd, p, 30);
6002 p = restfpr (abfd, p, 31);
6003 }
6004 bfd_put_32 (abfd, BLR, p);
6005 return p + 4;
6006 }
6007
6008 static bfd_byte *
6009 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6010 {
6011 p = savefpr (abfd, p, r);
6012 bfd_put_32 (abfd, BLR, p);
6013 return p + 4;
6014 }
6015
6016 static bfd_byte *
6017 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6018 {
6019 p = restfpr (abfd, p, r);
6020 bfd_put_32 (abfd, BLR, p);
6021 return p + 4;
6022 }
6023
6024 static bfd_byte *
6025 savevr (bfd *abfd, bfd_byte *p, int r)
6026 {
6027 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6028 p = p + 4;
6029 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6030 return p + 4;
6031 }
6032
6033 static bfd_byte *
6034 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6035 {
6036 p = savevr (abfd, p, r);
6037 bfd_put_32 (abfd, BLR, p);
6038 return p + 4;
6039 }
6040
6041 static bfd_byte *
6042 restvr (bfd *abfd, bfd_byte *p, int r)
6043 {
6044 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6045 p = p + 4;
6046 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6047 return p + 4;
6048 }
6049
6050 static bfd_byte *
6051 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6052 {
6053 p = restvr (abfd, p, r);
6054 bfd_put_32 (abfd, BLR, p);
6055 return p + 4;
6056 }
6057
6058 /* Called via elf_link_hash_traverse to transfer dynamic linking
6059 information on function code symbol entries to their corresponding
6060 function descriptor symbol entries. */
6061
6062 static bfd_boolean
6063 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6064 {
6065 struct bfd_link_info *info;
6066 struct ppc_link_hash_table *htab;
6067 struct ppc_link_hash_entry *fh;
6068 struct ppc_link_hash_entry *fdh;
6069 bfd_boolean force_local;
6070
6071 fh = (struct ppc_link_hash_entry *) h;
6072 if (fh->elf.root.type == bfd_link_hash_indirect)
6073 return TRUE;
6074
6075 if (!fh->is_func)
6076 return TRUE;
6077
6078 if (fh->elf.root.root.string[0] != '.'
6079 || fh->elf.root.root.string[1] == '\0')
6080 return TRUE;
6081
6082 info = inf;
6083 htab = ppc_hash_table (info);
6084 if (htab == NULL)
6085 return FALSE;
6086
6087 /* Find the corresponding function descriptor symbol. */
6088 fdh = lookup_fdh (fh, htab);
6089
6090 /* Resolve undefined references to dot-symbols as the value
6091 in the function descriptor, if we have one in a regular object.
6092 This is to satisfy cases like ".quad .foo". Calls to functions
6093 in dynamic objects are handled elsewhere. */
6094 if ((fh->elf.root.type == bfd_link_hash_undefined
6095 || fh->elf.root.type == bfd_link_hash_undefweak)
6096 && (fdh->elf.root.type == bfd_link_hash_defined
6097 || fdh->elf.root.type == bfd_link_hash_defweak)
6098 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6099 && opd_entry_value (fdh->elf.root.u.def.section,
6100 fdh->elf.root.u.def.value,
6101 &fh->elf.root.u.def.section,
6102 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6103 {
6104 fh->elf.root.type = fdh->elf.root.type;
6105 fh->elf.forced_local = 1;
6106 fh->elf.def_regular = fdh->elf.def_regular;
6107 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6108 }
6109
6110 if (!fh->elf.dynamic)
6111 {
6112 struct plt_entry *ent;
6113
6114 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6115 if (ent->plt.refcount > 0)
6116 break;
6117 if (ent == NULL)
6118 return TRUE;
6119 }
6120
6121 /* Create a descriptor as undefined if necessary. */
6122 if (fdh == NULL
6123 && !bfd_link_executable (info)
6124 && (fh->elf.root.type == bfd_link_hash_undefined
6125 || fh->elf.root.type == bfd_link_hash_undefweak))
6126 {
6127 fdh = make_fdh (info, fh);
6128 if (fdh == NULL)
6129 return FALSE;
6130 }
6131
6132 /* We can't support overriding of symbols on a fake descriptor. */
6133 if (fdh != NULL
6134 && fdh->fake
6135 && (fh->elf.root.type == bfd_link_hash_defined
6136 || fh->elf.root.type == bfd_link_hash_defweak))
6137 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6138
6139 /* Transfer dynamic linking information to the function descriptor. */
6140 if (fdh != NULL)
6141 {
6142 fdh->elf.ref_regular |= fh->elf.ref_regular;
6143 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6144 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6145 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6146 fdh->elf.dynamic |= fh->elf.dynamic;
6147 fdh->elf.needs_plt |= (fh->elf.needs_plt
6148 || fh->elf.type == STT_FUNC
6149 || fh->elf.type == STT_GNU_IFUNC);
6150 move_plt_plist (fh, fdh);
6151
6152 if (!fdh->elf.forced_local
6153 && fh->elf.dynindx != -1)
6154 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6155 return FALSE;
6156 }
6157
6158 /* Now that the info is on the function descriptor, clear the
6159 function code sym info. Any function code syms for which we
6160 don't have a definition in a regular file, we force local.
6161 This prevents a shared library from exporting syms that have
6162 been imported from another library. Function code syms that
6163 are really in the library we must leave global to prevent the
6164 linker dragging in a definition from a static library. */
6165 force_local = (!fh->elf.def_regular
6166 || fdh == NULL
6167 || !fdh->elf.def_regular
6168 || fdh->elf.forced_local);
6169 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6170
6171 return TRUE;
6172 }
6173
6174 static const struct sfpr_def_parms save_res_funcs[] =
6175 {
6176 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6177 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6178 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6179 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6180 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6181 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6182 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6183 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6184 { "._savef", 14, 31, savefpr, savefpr1_tail },
6185 { "._restf", 14, 31, restfpr, restfpr1_tail },
6186 { "_savevr_", 20, 31, savevr, savevr_tail },
6187 { "_restvr_", 20, 31, restvr, restvr_tail }
6188 };
6189
6190 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6191 this hook to a) provide some gcc support functions, and b) transfer
6192 dynamic linking information gathered so far on function code symbol
6193 entries, to their corresponding function descriptor symbol entries. */
6194
6195 static bfd_boolean
6196 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6197 struct bfd_link_info *info)
6198 {
6199 struct ppc_link_hash_table *htab;
6200
6201 htab = ppc_hash_table (info);
6202 if (htab == NULL)
6203 return FALSE;
6204
6205 /* Provide any missing _save* and _rest* functions. */
6206 if (htab->sfpr != NULL)
6207 {
6208 unsigned int i;
6209
6210 htab->sfpr->size = 0;
6211 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6212 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6213 return FALSE;
6214 if (htab->sfpr->size == 0)
6215 htab->sfpr->flags |= SEC_EXCLUDE;
6216 }
6217
6218 if (bfd_link_relocatable (info))
6219 return TRUE;
6220
6221 if (htab->elf.hgot != NULL)
6222 {
6223 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6224 /* Make .TOC. defined so as to prevent it being made dynamic.
6225 The wrong value here is fixed later in ppc64_elf_set_toc. */
6226 if (!htab->elf.hgot->def_regular
6227 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6228 {
6229 htab->elf.hgot->root.type = bfd_link_hash_defined;
6230 htab->elf.hgot->root.u.def.value = 0;
6231 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6232 htab->elf.hgot->def_regular = 1;
6233 htab->elf.hgot->root.linker_def = 1;
6234 }
6235 htab->elf.hgot->type = STT_OBJECT;
6236 htab->elf.hgot->other
6237 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6238 }
6239
6240 if (htab->need_func_desc_adj)
6241 {
6242 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6243 htab->need_func_desc_adj = 0;
6244 }
6245
6246 return TRUE;
6247 }
6248
6249 /* Find dynamic relocs for H that apply to read-only sections. */
6250
6251 static asection *
6252 readonly_dynrelocs (struct elf_link_hash_entry *h)
6253 {
6254 struct ppc_link_hash_entry *eh;
6255 struct elf_dyn_relocs *p;
6256
6257 eh = (struct ppc_link_hash_entry *) h;
6258 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6259 {
6260 asection *s = p->sec->output_section;
6261
6262 if (s != NULL && (s->flags & SEC_READONLY) != 0)
6263 return p->sec;
6264 }
6265 return NULL;
6266 }
6267
6268 /* Return true if we have dynamic relocs against H or any of its weak
6269 aliases, that apply to read-only sections. Cannot be used after
6270 size_dynamic_sections. */
6271
6272 static bfd_boolean
6273 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6274 {
6275 struct ppc_link_hash_entry *eh;
6276
6277 eh = (struct ppc_link_hash_entry *) h;
6278 do
6279 {
6280 if (readonly_dynrelocs (&eh->elf))
6281 return TRUE;
6282 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
6283 }
6284 while (eh != NULL && &eh->elf != h);
6285
6286 return FALSE;
6287 }
6288
6289 /* Return whether EH has pc-relative dynamic relocs. */
6290
6291 static bfd_boolean
6292 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6293 {
6294 struct elf_dyn_relocs *p;
6295
6296 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6297 if (p->pc_count != 0)
6298 return TRUE;
6299 return FALSE;
6300 }
6301
6302 /* Return true if a global entry stub will be created for H. Valid
6303 for ELFv2 before plt entries have been allocated. */
6304
6305 static bfd_boolean
6306 global_entry_stub (struct elf_link_hash_entry *h)
6307 {
6308 struct plt_entry *pent;
6309
6310 if (!h->pointer_equality_needed
6311 || h->def_regular)
6312 return FALSE;
6313
6314 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6315 if (pent->plt.refcount > 0
6316 && pent->addend == 0)
6317 return TRUE;
6318
6319 return FALSE;
6320 }
6321
6322 /* Adjust a symbol defined by a dynamic object and referenced by a
6323 regular object. The current definition is in some section of the
6324 dynamic object, but we're not including those sections. We have to
6325 change the definition to something the rest of the link can
6326 understand. */
6327
6328 static bfd_boolean
6329 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6330 struct elf_link_hash_entry *h)
6331 {
6332 struct ppc_link_hash_table *htab;
6333 asection *s, *srel;
6334
6335 htab = ppc_hash_table (info);
6336 if (htab == NULL)
6337 return FALSE;
6338
6339 /* Deal with function syms. */
6340 if (h->type == STT_FUNC
6341 || h->type == STT_GNU_IFUNC
6342 || h->needs_plt)
6343 {
6344 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6345 || SYMBOL_CALLS_LOCAL (info, h)
6346 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6347 /* Discard dyn_relocs when non-pic if we've decided that a
6348 function symbol is local and not an ifunc. We keep dynamic
6349 relocs for ifuncs when local rather than always emitting a
6350 plt call stub for them and defining the symbol on the call
6351 stub. We can't do that for ELFv1 anyway (a function symbol
6352 is defined on a descriptor, not code) and it can be faster at
6353 run-time due to not needing to bounce through a stub. The
6354 dyn_relocs for ifuncs will be applied even in a static
6355 executable. */
6356 if (!bfd_link_pic (info)
6357 && h->type != STT_GNU_IFUNC
6358 && local)
6359 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6360
6361 /* Clear procedure linkage table information for any symbol that
6362 won't need a .plt entry. */
6363 struct plt_entry *ent;
6364 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6365 if (ent->plt.refcount > 0)
6366 break;
6367 if (ent == NULL
6368 || (h->type != STT_GNU_IFUNC
6369 && local
6370 && (htab->can_convert_all_inline_plt
6371 || (((struct ppc_link_hash_entry *) h)->tls_mask
6372 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6373 {
6374 h->plt.plist = NULL;
6375 h->needs_plt = 0;
6376 h->pointer_equality_needed = 0;
6377 }
6378 else if (abiversion (info->output_bfd) >= 2)
6379 {
6380 /* Taking a function's address in a read/write section
6381 doesn't require us to define the function symbol in the
6382 executable on a global entry stub. A dynamic reloc can
6383 be used instead. The reason we prefer a few more dynamic
6384 relocs is that calling via a global entry stub costs a
6385 few more instructions, and pointer_equality_needed causes
6386 extra work in ld.so when resolving these symbols. */
6387 if (global_entry_stub (h))
6388 {
6389 if (!readonly_dynrelocs (h))
6390 {
6391 h->pointer_equality_needed = 0;
6392 /* If we haven't seen a branch reloc and the symbol
6393 isn't an ifunc then we don't need a plt entry. */
6394 if (!h->needs_plt)
6395 h->plt.plist = NULL;
6396 }
6397 else if (!bfd_link_pic (info))
6398 /* We are going to be defining the function symbol on the
6399 plt stub, so no dyn_relocs needed when non-pic. */
6400 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6401 }
6402
6403 /* ELFv2 function symbols can't have copy relocs. */
6404 return TRUE;
6405 }
6406 else if (!h->needs_plt
6407 && !readonly_dynrelocs (h))
6408 {
6409 /* If we haven't seen a branch reloc and the symbol isn't an
6410 ifunc then we don't need a plt entry. */
6411 h->plt.plist = NULL;
6412 h->pointer_equality_needed = 0;
6413 return TRUE;
6414 }
6415 }
6416 else
6417 h->plt.plist = NULL;
6418
6419 /* If this is a weak symbol, and there is a real definition, the
6420 processor independent code will have arranged for us to see the
6421 real definition first, and we can just use the same value. */
6422 if (h->is_weakalias)
6423 {
6424 struct elf_link_hash_entry *def = weakdef (h);
6425 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6426 h->root.u.def.section = def->root.u.def.section;
6427 h->root.u.def.value = def->root.u.def.value;
6428 if (def->root.u.def.section == htab->elf.sdynbss
6429 || def->root.u.def.section == htab->elf.sdynrelro)
6430 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6431 return TRUE;
6432 }
6433
6434 /* If we are creating a shared library, we must presume that the
6435 only references to the symbol are via the global offset table.
6436 For such cases we need not do anything here; the relocations will
6437 be handled correctly by relocate_section. */
6438 if (!bfd_link_executable (info))
6439 return TRUE;
6440
6441 /* If there are no references to this symbol that do not use the
6442 GOT, we don't need to generate a copy reloc. */
6443 if (!h->non_got_ref)
6444 return TRUE;
6445
6446 /* Don't generate a copy reloc for symbols defined in the executable. */
6447 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6448
6449 /* If -z nocopyreloc was given, don't generate them either. */
6450 || info->nocopyreloc
6451
6452 /* If we don't find any dynamic relocs in read-only sections, then
6453 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6454 || (ELIMINATE_COPY_RELOCS
6455 && !h->needs_copy
6456 && !alias_readonly_dynrelocs (h))
6457
6458 /* Protected variables do not work with .dynbss. The copy in
6459 .dynbss won't be used by the shared library with the protected
6460 definition for the variable. Text relocations are preferable
6461 to an incorrect program. */
6462 || h->protected_def)
6463 return TRUE;
6464
6465 if (h->plt.plist != NULL)
6466 {
6467 /* We should never get here, but unfortunately there are versions
6468 of gcc out there that improperly (for this ABI) put initialized
6469 function pointers, vtable refs and suchlike in read-only
6470 sections. Allow them to proceed, but warn that this might
6471 break at runtime. */
6472 info->callbacks->einfo
6473 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6474 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6475 h->root.root.string);
6476 }
6477
6478 /* This is a reference to a symbol defined by a dynamic object which
6479 is not a function. */
6480
6481 /* We must allocate the symbol in our .dynbss section, which will
6482 become part of the .bss section of the executable. There will be
6483 an entry for this symbol in the .dynsym section. The dynamic
6484 object will contain position independent code, so all references
6485 from the dynamic object to this symbol will go through the global
6486 offset table. The dynamic linker will use the .dynsym entry to
6487 determine the address it must put in the global offset table, so
6488 both the dynamic object and the regular object will refer to the
6489 same memory location for the variable. */
6490 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6491 {
6492 s = htab->elf.sdynrelro;
6493 srel = htab->elf.sreldynrelro;
6494 }
6495 else
6496 {
6497 s = htab->elf.sdynbss;
6498 srel = htab->elf.srelbss;
6499 }
6500 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6501 {
6502 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6503 linker to copy the initial value out of the dynamic object
6504 and into the runtime process image. */
6505 srel->size += sizeof (Elf64_External_Rela);
6506 h->needs_copy = 1;
6507 }
6508
6509 /* We no longer want dyn_relocs. */
6510 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6511 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6512 }
6513
6514 /* If given a function descriptor symbol, hide both the function code
6515 sym and the descriptor. */
6516 static void
6517 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6518 struct elf_link_hash_entry *h,
6519 bfd_boolean force_local)
6520 {
6521 struct ppc_link_hash_entry *eh;
6522 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6523
6524 if (ppc_hash_table (info) == NULL)
6525 return;
6526
6527 eh = (struct ppc_link_hash_entry *) h;
6528 if (eh->is_func_descriptor)
6529 {
6530 struct ppc_link_hash_entry *fh = eh->oh;
6531
6532 if (fh == NULL)
6533 {
6534 const char *p, *q;
6535 struct elf_link_hash_table *htab = elf_hash_table (info);
6536 char save;
6537
6538 /* We aren't supposed to use alloca in BFD because on
6539 systems which do not have alloca the version in libiberty
6540 calls xmalloc, which might cause the program to crash
6541 when it runs out of memory. This function doesn't have a
6542 return status, so there's no way to gracefully return an
6543 error. So cheat. We know that string[-1] can be safely
6544 accessed; It's either a string in an ELF string table,
6545 or allocated in an objalloc structure. */
6546
6547 p = eh->elf.root.root.string - 1;
6548 save = *p;
6549 *(char *) p = '.';
6550 fh = (struct ppc_link_hash_entry *)
6551 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
6552 *(char *) p = save;
6553
6554 /* Unfortunately, if it so happens that the string we were
6555 looking for was allocated immediately before this string,
6556 then we overwrote the string terminator. That's the only
6557 reason the lookup should fail. */
6558 if (fh == NULL)
6559 {
6560 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6561 while (q >= eh->elf.root.root.string && *q == *p)
6562 --q, --p;
6563 if (q < eh->elf.root.root.string && *p == '.')
6564 fh = (struct ppc_link_hash_entry *)
6565 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
6566 }
6567 if (fh != NULL)
6568 {
6569 eh->oh = fh;
6570 fh->oh = eh;
6571 }
6572 }
6573 if (fh != NULL)
6574 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6575 }
6576 }
6577
6578 static bfd_boolean
6579 get_sym_h (struct elf_link_hash_entry **hp,
6580 Elf_Internal_Sym **symp,
6581 asection **symsecp,
6582 unsigned char **tls_maskp,
6583 Elf_Internal_Sym **locsymsp,
6584 unsigned long r_symndx,
6585 bfd *ibfd)
6586 {
6587 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6588
6589 if (r_symndx >= symtab_hdr->sh_info)
6590 {
6591 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6592 struct elf_link_hash_entry *h;
6593
6594 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6595 h = elf_follow_link (h);
6596
6597 if (hp != NULL)
6598 *hp = h;
6599
6600 if (symp != NULL)
6601 *symp = NULL;
6602
6603 if (symsecp != NULL)
6604 {
6605 asection *symsec = NULL;
6606 if (h->root.type == bfd_link_hash_defined
6607 || h->root.type == bfd_link_hash_defweak)
6608 symsec = h->root.u.def.section;
6609 *symsecp = symsec;
6610 }
6611
6612 if (tls_maskp != NULL)
6613 {
6614 struct ppc_link_hash_entry *eh;
6615
6616 eh = (struct ppc_link_hash_entry *) h;
6617 *tls_maskp = &eh->tls_mask;
6618 }
6619 }
6620 else
6621 {
6622 Elf_Internal_Sym *sym;
6623 Elf_Internal_Sym *locsyms = *locsymsp;
6624
6625 if (locsyms == NULL)
6626 {
6627 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6628 if (locsyms == NULL)
6629 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6630 symtab_hdr->sh_info,
6631 0, NULL, NULL, NULL);
6632 if (locsyms == NULL)
6633 return FALSE;
6634 *locsymsp = locsyms;
6635 }
6636 sym = locsyms + r_symndx;
6637
6638 if (hp != NULL)
6639 *hp = NULL;
6640
6641 if (symp != NULL)
6642 *symp = sym;
6643
6644 if (symsecp != NULL)
6645 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6646
6647 if (tls_maskp != NULL)
6648 {
6649 struct got_entry **lgot_ents;
6650 unsigned char *tls_mask;
6651
6652 tls_mask = NULL;
6653 lgot_ents = elf_local_got_ents (ibfd);
6654 if (lgot_ents != NULL)
6655 {
6656 struct plt_entry **local_plt = (struct plt_entry **)
6657 (lgot_ents + symtab_hdr->sh_info);
6658 unsigned char *lgot_masks = (unsigned char *)
6659 (local_plt + symtab_hdr->sh_info);
6660 tls_mask = &lgot_masks[r_symndx];
6661 }
6662 *tls_maskp = tls_mask;
6663 }
6664 }
6665 return TRUE;
6666 }
6667
6668 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6669 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6670 type suitable for optimization, and 1 otherwise. */
6671
6672 static int
6673 get_tls_mask (unsigned char **tls_maskp,
6674 unsigned long *toc_symndx,
6675 bfd_vma *toc_addend,
6676 Elf_Internal_Sym **locsymsp,
6677 const Elf_Internal_Rela *rel,
6678 bfd *ibfd)
6679 {
6680 unsigned long r_symndx;
6681 int next_r;
6682 struct elf_link_hash_entry *h;
6683 Elf_Internal_Sym *sym;
6684 asection *sec;
6685 bfd_vma off;
6686
6687 r_symndx = ELF64_R_SYM (rel->r_info);
6688 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6689 return 0;
6690
6691 if ((*tls_maskp != NULL
6692 && (**tls_maskp & TLS_TLS) != 0
6693 && **tls_maskp != (TLS_TLS | TLS_MARK))
6694 || sec == NULL
6695 || ppc64_elf_section_data (sec) == NULL
6696 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6697 return 1;
6698
6699 /* Look inside a TOC section too. */
6700 if (h != NULL)
6701 {
6702 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6703 off = h->root.u.def.value;
6704 }
6705 else
6706 off = sym->st_value;
6707 off += rel->r_addend;
6708 BFD_ASSERT (off % 8 == 0);
6709 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6710 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6711 if (toc_symndx != NULL)
6712 *toc_symndx = r_symndx;
6713 if (toc_addend != NULL)
6714 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6715 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6716 return 0;
6717 if ((h == NULL || is_static_defined (h))
6718 && (next_r == -1 || next_r == -2))
6719 return 1 - next_r;
6720 return 1;
6721 }
6722
6723 /* Find (or create) an entry in the tocsave hash table. */
6724
6725 static struct tocsave_entry *
6726 tocsave_find (struct ppc_link_hash_table *htab,
6727 enum insert_option insert,
6728 Elf_Internal_Sym **local_syms,
6729 const Elf_Internal_Rela *irela,
6730 bfd *ibfd)
6731 {
6732 unsigned long r_indx;
6733 struct elf_link_hash_entry *h;
6734 Elf_Internal_Sym *sym;
6735 struct tocsave_entry ent, *p;
6736 hashval_t hash;
6737 struct tocsave_entry **slot;
6738
6739 r_indx = ELF64_R_SYM (irela->r_info);
6740 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6741 return NULL;
6742 if (ent.sec == NULL || ent.sec->output_section == NULL)
6743 {
6744 _bfd_error_handler
6745 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6746 return NULL;
6747 }
6748
6749 if (h != NULL)
6750 ent.offset = h->root.u.def.value;
6751 else
6752 ent.offset = sym->st_value;
6753 ent.offset += irela->r_addend;
6754
6755 hash = tocsave_htab_hash (&ent);
6756 slot = ((struct tocsave_entry **)
6757 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6758 if (slot == NULL)
6759 return NULL;
6760
6761 if (*slot == NULL)
6762 {
6763 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6764 if (p == NULL)
6765 return NULL;
6766 *p = ent;
6767 *slot = p;
6768 }
6769 return *slot;
6770 }
6771
6772 /* Adjust all global syms defined in opd sections. In gcc generated
6773 code for the old ABI, these will already have been done. */
6774
6775 static bfd_boolean
6776 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6777 {
6778 struct ppc_link_hash_entry *eh;
6779 asection *sym_sec;
6780 struct _opd_sec_data *opd;
6781
6782 if (h->root.type == bfd_link_hash_indirect)
6783 return TRUE;
6784
6785 if (h->root.type != bfd_link_hash_defined
6786 && h->root.type != bfd_link_hash_defweak)
6787 return TRUE;
6788
6789 eh = (struct ppc_link_hash_entry *) h;
6790 if (eh->adjust_done)
6791 return TRUE;
6792
6793 sym_sec = eh->elf.root.u.def.section;
6794 opd = get_opd_info (sym_sec);
6795 if (opd != NULL && opd->adjust != NULL)
6796 {
6797 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6798 if (adjust == -1)
6799 {
6800 /* This entry has been deleted. */
6801 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6802 if (dsec == NULL)
6803 {
6804 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6805 if (discarded_section (dsec))
6806 {
6807 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6808 break;
6809 }
6810 }
6811 eh->elf.root.u.def.value = 0;
6812 eh->elf.root.u.def.section = dsec;
6813 }
6814 else
6815 eh->elf.root.u.def.value += adjust;
6816 eh->adjust_done = 1;
6817 }
6818 return TRUE;
6819 }
6820
6821 /* Handles decrementing dynamic reloc counts for the reloc specified by
6822 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6823 have already been determined. */
6824
6825 static bfd_boolean
6826 dec_dynrel_count (bfd_vma r_info,
6827 asection *sec,
6828 struct bfd_link_info *info,
6829 Elf_Internal_Sym **local_syms,
6830 struct elf_link_hash_entry *h,
6831 Elf_Internal_Sym *sym)
6832 {
6833 enum elf_ppc64_reloc_type r_type;
6834 asection *sym_sec = NULL;
6835
6836 /* Can this reloc be dynamic? This switch, and later tests here
6837 should be kept in sync with the code in check_relocs. */
6838 r_type = ELF64_R_TYPE (r_info);
6839 switch (r_type)
6840 {
6841 default:
6842 return TRUE;
6843
6844 case R_PPC64_TOC16:
6845 case R_PPC64_TOC16_DS:
6846 case R_PPC64_TOC16_LO:
6847 case R_PPC64_TOC16_HI:
6848 case R_PPC64_TOC16_HA:
6849 case R_PPC64_TOC16_LO_DS:
6850 if (h == NULL)
6851 return TRUE;
6852 break;
6853
6854 case R_PPC64_TPREL16:
6855 case R_PPC64_TPREL16_LO:
6856 case R_PPC64_TPREL16_HI:
6857 case R_PPC64_TPREL16_HA:
6858 case R_PPC64_TPREL16_DS:
6859 case R_PPC64_TPREL16_LO_DS:
6860 case R_PPC64_TPREL16_HIGH:
6861 case R_PPC64_TPREL16_HIGHA:
6862 case R_PPC64_TPREL16_HIGHER:
6863 case R_PPC64_TPREL16_HIGHERA:
6864 case R_PPC64_TPREL16_HIGHEST:
6865 case R_PPC64_TPREL16_HIGHESTA:
6866 case R_PPC64_TPREL64:
6867 case R_PPC64_TPREL34:
6868 case R_PPC64_DTPMOD64:
6869 case R_PPC64_DTPREL64:
6870 case R_PPC64_ADDR64:
6871 case R_PPC64_REL30:
6872 case R_PPC64_REL32:
6873 case R_PPC64_REL64:
6874 case R_PPC64_ADDR14:
6875 case R_PPC64_ADDR14_BRNTAKEN:
6876 case R_PPC64_ADDR14_BRTAKEN:
6877 case R_PPC64_ADDR16:
6878 case R_PPC64_ADDR16_DS:
6879 case R_PPC64_ADDR16_HA:
6880 case R_PPC64_ADDR16_HI:
6881 case R_PPC64_ADDR16_HIGH:
6882 case R_PPC64_ADDR16_HIGHA:
6883 case R_PPC64_ADDR16_HIGHER:
6884 case R_PPC64_ADDR16_HIGHERA:
6885 case R_PPC64_ADDR16_HIGHEST:
6886 case R_PPC64_ADDR16_HIGHESTA:
6887 case R_PPC64_ADDR16_LO:
6888 case R_PPC64_ADDR16_LO_DS:
6889 case R_PPC64_ADDR24:
6890 case R_PPC64_ADDR32:
6891 case R_PPC64_UADDR16:
6892 case R_PPC64_UADDR32:
6893 case R_PPC64_UADDR64:
6894 case R_PPC64_TOC:
6895 case R_PPC64_D34:
6896 case R_PPC64_D34_LO:
6897 case R_PPC64_D34_HI30:
6898 case R_PPC64_D34_HA30:
6899 case R_PPC64_ADDR16_HIGHER34:
6900 case R_PPC64_ADDR16_HIGHERA34:
6901 case R_PPC64_ADDR16_HIGHEST34:
6902 case R_PPC64_ADDR16_HIGHESTA34:
6903 case R_PPC64_D28:
6904 break;
6905 }
6906
6907 if (local_syms != NULL)
6908 {
6909 unsigned long r_symndx;
6910 bfd *ibfd = sec->owner;
6911
6912 r_symndx = ELF64_R_SYM (r_info);
6913 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6914 return FALSE;
6915 }
6916
6917 if ((h != NULL
6918 && (h->root.type == bfd_link_hash_defweak
6919 || !h->def_regular))
6920 || (h != NULL
6921 && !bfd_link_executable (info)
6922 && !SYMBOLIC_BIND (info, h))
6923 || (bfd_link_pic (info)
6924 && must_be_dyn_reloc (info, r_type))
6925 || (!bfd_link_pic (info)
6926 && (h != NULL
6927 ? h->type == STT_GNU_IFUNC
6928 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
6929 ;
6930 else
6931 return TRUE;
6932
6933 if (h != NULL)
6934 {
6935 struct elf_dyn_relocs *p;
6936 struct elf_dyn_relocs **pp;
6937 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6938
6939 /* elf_gc_sweep may have already removed all dyn relocs associated
6940 with local syms for a given section. Also, symbol flags are
6941 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6942 report a dynreloc miscount. */
6943 if (*pp == NULL && info->gc_sections)
6944 return TRUE;
6945
6946 while ((p = *pp) != NULL)
6947 {
6948 if (p->sec == sec)
6949 {
6950 if (!must_be_dyn_reloc (info, r_type))
6951 p->pc_count -= 1;
6952 p->count -= 1;
6953 if (p->count == 0)
6954 *pp = p->next;
6955 return TRUE;
6956 }
6957 pp = &p->next;
6958 }
6959 }
6960 else
6961 {
6962 struct ppc_dyn_relocs *p;
6963 struct ppc_dyn_relocs **pp;
6964 void *vpp;
6965 bfd_boolean is_ifunc;
6966
6967 if (local_syms == NULL)
6968 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6969 if (sym_sec == NULL)
6970 sym_sec = sec;
6971
6972 vpp = &elf_section_data (sym_sec)->local_dynrel;
6973 pp = (struct ppc_dyn_relocs **) vpp;
6974
6975 if (*pp == NULL && info->gc_sections)
6976 return TRUE;
6977
6978 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6979 while ((p = *pp) != NULL)
6980 {
6981 if (p->sec == sec && p->ifunc == is_ifunc)
6982 {
6983 p->count -= 1;
6984 if (p->count == 0)
6985 *pp = p->next;
6986 return TRUE;
6987 }
6988 pp = &p->next;
6989 }
6990 }
6991
6992 /* xgettext:c-format */
6993 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6994 sec->owner, sec);
6995 bfd_set_error (bfd_error_bad_value);
6996 return FALSE;
6997 }
6998
6999 /* Remove unused Official Procedure Descriptor entries. Currently we
7000 only remove those associated with functions in discarded link-once
7001 sections, or weakly defined functions that have been overridden. It
7002 would be possible to remove many more entries for statically linked
7003 applications. */
7004
7005 bfd_boolean
7006 ppc64_elf_edit_opd (struct bfd_link_info *info)
7007 {
7008 bfd *ibfd;
7009 bfd_boolean some_edited = FALSE;
7010 asection *need_pad = NULL;
7011 struct ppc_link_hash_table *htab;
7012
7013 htab = ppc_hash_table (info);
7014 if (htab == NULL)
7015 return FALSE;
7016
7017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7018 {
7019 asection *sec;
7020 Elf_Internal_Rela *relstart, *rel, *relend;
7021 Elf_Internal_Shdr *symtab_hdr;
7022 Elf_Internal_Sym *local_syms;
7023 struct _opd_sec_data *opd;
7024 bfd_boolean need_edit, add_aux_fields, broken;
7025 bfd_size_type cnt_16b = 0;
7026
7027 if (!is_ppc64_elf (ibfd))
7028 continue;
7029
7030 sec = bfd_get_section_by_name (ibfd, ".opd");
7031 if (sec == NULL || sec->size == 0)
7032 continue;
7033
7034 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7035 continue;
7036
7037 if (sec->output_section == bfd_abs_section_ptr)
7038 continue;
7039
7040 /* Look through the section relocs. */
7041 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7042 continue;
7043
7044 local_syms = NULL;
7045 symtab_hdr = &elf_symtab_hdr (ibfd);
7046
7047 /* Read the relocations. */
7048 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7049 info->keep_memory);
7050 if (relstart == NULL)
7051 return FALSE;
7052
7053 /* First run through the relocs to check they are sane, and to
7054 determine whether we need to edit this opd section. */
7055 need_edit = FALSE;
7056 broken = FALSE;
7057 need_pad = sec;
7058 relend = relstart + sec->reloc_count;
7059 for (rel = relstart; rel < relend; )
7060 {
7061 enum elf_ppc64_reloc_type r_type;
7062 unsigned long r_symndx;
7063 asection *sym_sec;
7064 struct elf_link_hash_entry *h;
7065 Elf_Internal_Sym *sym;
7066 bfd_vma offset;
7067
7068 /* .opd contains an array of 16 or 24 byte entries. We're
7069 only interested in the reloc pointing to a function entry
7070 point. */
7071 offset = rel->r_offset;
7072 if (rel + 1 == relend
7073 || rel[1].r_offset != offset + 8)
7074 {
7075 /* If someone messes with .opd alignment then after a
7076 "ld -r" we might have padding in the middle of .opd.
7077 Also, there's nothing to prevent someone putting
7078 something silly in .opd with the assembler. No .opd
7079 optimization for them! */
7080 broken_opd:
7081 _bfd_error_handler
7082 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7083 broken = TRUE;
7084 break;
7085 }
7086
7087 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7088 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7089 {
7090 _bfd_error_handler
7091 /* xgettext:c-format */
7092 (_("%pB: unexpected reloc type %u in .opd section"),
7093 ibfd, r_type);
7094 broken = TRUE;
7095 break;
7096 }
7097
7098 r_symndx = ELF64_R_SYM (rel->r_info);
7099 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7100 r_symndx, ibfd))
7101 goto error_ret;
7102
7103 if (sym_sec == NULL || sym_sec->owner == NULL)
7104 {
7105 const char *sym_name;
7106 if (h != NULL)
7107 sym_name = h->root.root.string;
7108 else
7109 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7110 sym_sec);
7111
7112 _bfd_error_handler
7113 /* xgettext:c-format */
7114 (_("%pB: undefined sym `%s' in .opd section"),
7115 ibfd, sym_name);
7116 broken = TRUE;
7117 break;
7118 }
7119
7120 /* opd entries are always for functions defined in the
7121 current input bfd. If the symbol isn't defined in the
7122 input bfd, then we won't be using the function in this
7123 bfd; It must be defined in a linkonce section in another
7124 bfd, or is weak. It's also possible that we are
7125 discarding the function due to a linker script /DISCARD/,
7126 which we test for via the output_section. */
7127 if (sym_sec->owner != ibfd
7128 || sym_sec->output_section == bfd_abs_section_ptr)
7129 need_edit = TRUE;
7130
7131 rel += 2;
7132 if (rel + 1 == relend
7133 || (rel + 2 < relend
7134 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7135 ++rel;
7136
7137 if (rel == relend)
7138 {
7139 if (sec->size == offset + 24)
7140 {
7141 need_pad = NULL;
7142 break;
7143 }
7144 if (sec->size == offset + 16)
7145 {
7146 cnt_16b++;
7147 break;
7148 }
7149 goto broken_opd;
7150 }
7151 else if (rel + 1 < relend
7152 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7153 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7154 {
7155 if (rel[0].r_offset == offset + 16)
7156 cnt_16b++;
7157 else if (rel[0].r_offset != offset + 24)
7158 goto broken_opd;
7159 }
7160 else
7161 goto broken_opd;
7162 }
7163
7164 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7165
7166 if (!broken && (need_edit || add_aux_fields))
7167 {
7168 Elf_Internal_Rela *write_rel;
7169 Elf_Internal_Shdr *rel_hdr;
7170 bfd_byte *rptr, *wptr;
7171 bfd_byte *new_contents;
7172 bfd_size_type amt;
7173
7174 new_contents = NULL;
7175 amt = OPD_NDX (sec->size) * sizeof (long);
7176 opd = &ppc64_elf_section_data (sec)->u.opd;
7177 opd->adjust = bfd_zalloc (sec->owner, amt);
7178 if (opd->adjust == NULL)
7179 return FALSE;
7180
7181 /* This seems a waste of time as input .opd sections are all
7182 zeros as generated by gcc, but I suppose there's no reason
7183 this will always be so. We might start putting something in
7184 the third word of .opd entries. */
7185 if ((sec->flags & SEC_IN_MEMORY) == 0)
7186 {
7187 bfd_byte *loc;
7188 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7189 {
7190 if (loc != NULL)
7191 free (loc);
7192 error_ret:
7193 if (local_syms != NULL
7194 && symtab_hdr->contents != (unsigned char *) local_syms)
7195 free (local_syms);
7196 if (elf_section_data (sec)->relocs != relstart)
7197 free (relstart);
7198 return FALSE;
7199 }
7200 sec->contents = loc;
7201 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7202 }
7203
7204 elf_section_data (sec)->relocs = relstart;
7205
7206 new_contents = sec->contents;
7207 if (add_aux_fields)
7208 {
7209 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7210 if (new_contents == NULL)
7211 return FALSE;
7212 need_pad = NULL;
7213 }
7214 wptr = new_contents;
7215 rptr = sec->contents;
7216 write_rel = relstart;
7217 for (rel = relstart; rel < relend; )
7218 {
7219 unsigned long r_symndx;
7220 asection *sym_sec;
7221 struct elf_link_hash_entry *h;
7222 struct ppc_link_hash_entry *fdh = NULL;
7223 Elf_Internal_Sym *sym;
7224 long opd_ent_size;
7225 Elf_Internal_Rela *next_rel;
7226 bfd_boolean skip;
7227
7228 r_symndx = ELF64_R_SYM (rel->r_info);
7229 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7230 r_symndx, ibfd))
7231 goto error_ret;
7232
7233 next_rel = rel + 2;
7234 if (next_rel + 1 == relend
7235 || (next_rel + 2 < relend
7236 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7237 ++next_rel;
7238
7239 /* See if the .opd entry is full 24 byte or
7240 16 byte (with fd_aux entry overlapped with next
7241 fd_func). */
7242 opd_ent_size = 24;
7243 if (next_rel == relend)
7244 {
7245 if (sec->size == rel->r_offset + 16)
7246 opd_ent_size = 16;
7247 }
7248 else if (next_rel->r_offset == rel->r_offset + 16)
7249 opd_ent_size = 16;
7250
7251 if (h != NULL
7252 && h->root.root.string[0] == '.')
7253 {
7254 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7255 if (fdh != NULL)
7256 {
7257 fdh = ppc_follow_link (fdh);
7258 if (fdh->elf.root.type != bfd_link_hash_defined
7259 && fdh->elf.root.type != bfd_link_hash_defweak)
7260 fdh = NULL;
7261 }
7262 }
7263
7264 skip = (sym_sec->owner != ibfd
7265 || sym_sec->output_section == bfd_abs_section_ptr);
7266 if (skip)
7267 {
7268 if (fdh != NULL && sym_sec->owner == ibfd)
7269 {
7270 /* Arrange for the function descriptor sym
7271 to be dropped. */
7272 fdh->elf.root.u.def.value = 0;
7273 fdh->elf.root.u.def.section = sym_sec;
7274 }
7275 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7276
7277 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7278 rel = next_rel;
7279 else
7280 while (1)
7281 {
7282 if (!dec_dynrel_count (rel->r_info, sec, info,
7283 NULL, h, sym))
7284 goto error_ret;
7285
7286 if (++rel == next_rel)
7287 break;
7288
7289 r_symndx = ELF64_R_SYM (rel->r_info);
7290 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7291 r_symndx, ibfd))
7292 goto error_ret;
7293 }
7294 }
7295 else
7296 {
7297 /* We'll be keeping this opd entry. */
7298 long adjust;
7299
7300 if (fdh != NULL)
7301 {
7302 /* Redefine the function descriptor symbol to
7303 this location in the opd section. It is
7304 necessary to update the value here rather
7305 than using an array of adjustments as we do
7306 for local symbols, because various places
7307 in the generic ELF code use the value
7308 stored in u.def.value. */
7309 fdh->elf.root.u.def.value = wptr - new_contents;
7310 fdh->adjust_done = 1;
7311 }
7312
7313 /* Local syms are a bit tricky. We could
7314 tweak them as they can be cached, but
7315 we'd need to look through the local syms
7316 for the function descriptor sym which we
7317 don't have at the moment. So keep an
7318 array of adjustments. */
7319 adjust = (wptr - new_contents) - (rptr - sec->contents);
7320 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7321
7322 if (wptr != rptr)
7323 memcpy (wptr, rptr, opd_ent_size);
7324 wptr += opd_ent_size;
7325 if (add_aux_fields && opd_ent_size == 16)
7326 {
7327 memset (wptr, '\0', 8);
7328 wptr += 8;
7329 }
7330
7331 /* We need to adjust any reloc offsets to point to the
7332 new opd entries. */
7333 for ( ; rel != next_rel; ++rel)
7334 {
7335 rel->r_offset += adjust;
7336 if (write_rel != rel)
7337 memcpy (write_rel, rel, sizeof (*rel));
7338 ++write_rel;
7339 }
7340 }
7341
7342 rptr += opd_ent_size;
7343 }
7344
7345 sec->size = wptr - new_contents;
7346 sec->reloc_count = write_rel - relstart;
7347 if (add_aux_fields)
7348 {
7349 free (sec->contents);
7350 sec->contents = new_contents;
7351 }
7352
7353 /* Fudge the header size too, as this is used later in
7354 elf_bfd_final_link if we are emitting relocs. */
7355 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7356 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7357 some_edited = TRUE;
7358 }
7359 else if (elf_section_data (sec)->relocs != relstart)
7360 free (relstart);
7361
7362 if (local_syms != NULL
7363 && symtab_hdr->contents != (unsigned char *) local_syms)
7364 {
7365 if (!info->keep_memory)
7366 free (local_syms);
7367 else
7368 symtab_hdr->contents = (unsigned char *) local_syms;
7369 }
7370 }
7371
7372 if (some_edited)
7373 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7374
7375 /* If we are doing a final link and the last .opd entry is just 16 byte
7376 long, add a 8 byte padding after it. */
7377 if (need_pad != NULL && !bfd_link_relocatable (info))
7378 {
7379 bfd_byte *p;
7380
7381 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7382 {
7383 BFD_ASSERT (need_pad->size > 0);
7384
7385 p = bfd_malloc (need_pad->size + 8);
7386 if (p == NULL)
7387 return FALSE;
7388
7389 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7390 p, 0, need_pad->size))
7391 return FALSE;
7392
7393 need_pad->contents = p;
7394 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7395 }
7396 else
7397 {
7398 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7399 if (p == NULL)
7400 return FALSE;
7401
7402 need_pad->contents = p;
7403 }
7404
7405 memset (need_pad->contents + need_pad->size, 0, 8);
7406 need_pad->size += 8;
7407 }
7408
7409 return TRUE;
7410 }
7411
7412 /* Analyze inline PLT call relocations to see whether calls to locally
7413 defined functions can be converted to direct calls. */
7414
7415 bfd_boolean
7416 ppc64_elf_inline_plt (struct bfd_link_info *info)
7417 {
7418 struct ppc_link_hash_table *htab;
7419 bfd *ibfd;
7420 asection *sec;
7421 bfd_vma low_vma, high_vma, limit;
7422
7423 htab = ppc_hash_table (info);
7424 if (htab == NULL)
7425 return FALSE;
7426
7427 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7428 reduced somewhat to cater for possible stubs that might be added
7429 between the call and its destination. */
7430 if (htab->params->group_size < 0)
7431 {
7432 limit = -htab->params->group_size;
7433 if (limit == 1)
7434 limit = 0x1e00000;
7435 }
7436 else
7437 {
7438 limit = htab->params->group_size;
7439 if (limit == 1)
7440 limit = 0x1c00000;
7441 }
7442
7443 low_vma = -1;
7444 high_vma = 0;
7445 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7446 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7447 {
7448 if (low_vma > sec->vma)
7449 low_vma = sec->vma;
7450 if (high_vma < sec->vma + sec->size)
7451 high_vma = sec->vma + sec->size;
7452 }
7453
7454 /* If a "bl" can reach anywhere in local code sections, then we can
7455 convert all inline PLT sequences to direct calls when the symbol
7456 is local. */
7457 if (high_vma - low_vma < limit)
7458 {
7459 htab->can_convert_all_inline_plt = 1;
7460 return TRUE;
7461 }
7462
7463 /* Otherwise, go looking through relocs for cases where a direct
7464 call won't reach. Mark the symbol on any such reloc to disable
7465 the optimization and keep the PLT entry as it seems likely that
7466 this will be better than creating trampolines. Note that this
7467 will disable the optimization for all inline PLT calls to a
7468 particular symbol, not just those that won't reach. The
7469 difficulty in doing a more precise optimization is that the
7470 linker needs to make a decision depending on whether a
7471 particular R_PPC64_PLTCALL insn can be turned into a direct
7472 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7473 the sequence, and there is nothing that ties those relocs
7474 together except their symbol. */
7475
7476 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7477 {
7478 Elf_Internal_Shdr *symtab_hdr;
7479 Elf_Internal_Sym *local_syms;
7480
7481 if (!is_ppc64_elf (ibfd))
7482 continue;
7483
7484 local_syms = NULL;
7485 symtab_hdr = &elf_symtab_hdr (ibfd);
7486
7487 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7488 if (ppc64_elf_section_data (sec)->has_pltcall
7489 && !bfd_is_abs_section (sec->output_section))
7490 {
7491 Elf_Internal_Rela *relstart, *rel, *relend;
7492
7493 /* Read the relocations. */
7494 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7495 info->keep_memory);
7496 if (relstart == NULL)
7497 return FALSE;
7498
7499 relend = relstart + sec->reloc_count;
7500 for (rel = relstart; rel < relend; )
7501 {
7502 enum elf_ppc64_reloc_type r_type;
7503 unsigned long r_symndx;
7504 asection *sym_sec;
7505 struct elf_link_hash_entry *h;
7506 Elf_Internal_Sym *sym;
7507 unsigned char *tls_maskp;
7508
7509 r_type = ELF64_R_TYPE (rel->r_info);
7510 if (r_type != R_PPC64_PLTCALL
7511 && r_type != R_PPC64_PLTCALL_NOTOC)
7512 continue;
7513
7514 r_symndx = ELF64_R_SYM (rel->r_info);
7515 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7516 r_symndx, ibfd))
7517 {
7518 if (elf_section_data (sec)->relocs != relstart)
7519 free (relstart);
7520 if (local_syms != NULL
7521 && symtab_hdr->contents != (bfd_byte *) local_syms)
7522 free (local_syms);
7523 return FALSE;
7524 }
7525
7526 if (sym_sec != NULL && sym_sec->output_section != NULL)
7527 {
7528 bfd_vma from, to;
7529 if (h != NULL)
7530 to = h->root.u.def.value;
7531 else
7532 to = sym->st_value;
7533 to += (rel->r_addend
7534 + sym_sec->output_offset
7535 + sym_sec->output_section->vma);
7536 from = (rel->r_offset
7537 + sec->output_offset
7538 + sec->output_section->vma);
7539 if (to - from + limit < 2 * limit
7540 && !(r_type == R_PPC64_PLTCALL_NOTOC
7541 && (((h ? h->other : sym->st_other)
7542 & STO_PPC64_LOCAL_MASK)
7543 > 1 << STO_PPC64_LOCAL_BIT)))
7544 *tls_maskp &= ~PLT_KEEP;
7545 }
7546 }
7547 if (elf_section_data (sec)->relocs != relstart)
7548 free (relstart);
7549 }
7550
7551 if (local_syms != NULL
7552 && symtab_hdr->contents != (unsigned char *) local_syms)
7553 {
7554 if (!info->keep_memory)
7555 free (local_syms);
7556 else
7557 symtab_hdr->contents = (unsigned char *) local_syms;
7558 }
7559 }
7560
7561 return TRUE;
7562 }
7563
7564 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7565
7566 asection *
7567 ppc64_elf_tls_setup (struct bfd_link_info *info)
7568 {
7569 struct ppc_link_hash_table *htab;
7570
7571 htab = ppc_hash_table (info);
7572 if (htab == NULL)
7573 return NULL;
7574
7575 if (abiversion (info->output_bfd) == 1)
7576 htab->opd_abi = 1;
7577
7578 if (htab->params->no_multi_toc)
7579 htab->do_multi_toc = 0;
7580 else if (!htab->do_multi_toc)
7581 htab->params->no_multi_toc = 1;
7582
7583 /* Default to --no-plt-localentry, as this option can cause problems
7584 with symbol interposition. For example, glibc libpthread.so and
7585 libc.so duplicate many pthread symbols, with a fallback
7586 implementation in libc.so. In some cases the fallback does more
7587 work than the pthread implementation. __pthread_condattr_destroy
7588 is one such symbol: the libpthread.so implementation is
7589 localentry:0 while the libc.so implementation is localentry:8.
7590 An app that "cleverly" uses dlopen to only load necessary
7591 libraries at runtime may omit loading libpthread.so when not
7592 running multi-threaded, which then results in the libc.so
7593 fallback symbols being used and ld.so complaining. Now there
7594 are workarounds in ld (see non_zero_localentry) to detect the
7595 pthread situation, but that may not be the only case where
7596 --plt-localentry can cause trouble. */
7597 if (htab->params->plt_localentry0 < 0)
7598 htab->params->plt_localentry0 = 0;
7599 if (htab->params->plt_localentry0
7600 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7601 FALSE, FALSE, FALSE) == NULL)
7602 _bfd_error_handler
7603 (_("warning: --plt-localentry is especially dangerous without "
7604 "ld.so support to detect ABI violations"));
7605
7606 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7607 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7608 FALSE, FALSE, TRUE));
7609 /* Move dynamic linking info to the function descriptor sym. */
7610 if (htab->tls_get_addr != NULL)
7611 func_desc_adjust (&htab->tls_get_addr->elf, info);
7612 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7613 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7614 FALSE, FALSE, TRUE));
7615 if (htab->params->tls_get_addr_opt)
7616 {
7617 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7618
7619 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7620 FALSE, FALSE, TRUE);
7621 if (opt != NULL)
7622 func_desc_adjust (opt, info);
7623 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7624 FALSE, FALSE, TRUE);
7625 if (opt_fd != NULL
7626 && (opt_fd->root.type == bfd_link_hash_defined
7627 || opt_fd->root.type == bfd_link_hash_defweak))
7628 {
7629 /* If glibc supports an optimized __tls_get_addr call stub,
7630 signalled by the presence of __tls_get_addr_opt, and we'll
7631 be calling __tls_get_addr via a plt call stub, then
7632 make __tls_get_addr point to __tls_get_addr_opt. */
7633 tga_fd = &htab->tls_get_addr_fd->elf;
7634 if (htab->elf.dynamic_sections_created
7635 && tga_fd != NULL
7636 && (tga_fd->type == STT_FUNC
7637 || tga_fd->needs_plt)
7638 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7639 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
7640 {
7641 struct plt_entry *ent;
7642
7643 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7644 if (ent->plt.refcount > 0)
7645 break;
7646 if (ent != NULL)
7647 {
7648 tga_fd->root.type = bfd_link_hash_indirect;
7649 tga_fd->root.u.i.link = &opt_fd->root;
7650 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7651 opt_fd->mark = 1;
7652 if (opt_fd->dynindx != -1)
7653 {
7654 /* Use __tls_get_addr_opt in dynamic relocations. */
7655 opt_fd->dynindx = -1;
7656 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7657 opt_fd->dynstr_index);
7658 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7659 return NULL;
7660 }
7661 htab->tls_get_addr_fd
7662 = (struct ppc_link_hash_entry *) opt_fd;
7663 tga = &htab->tls_get_addr->elf;
7664 if (opt != NULL && tga != NULL)
7665 {
7666 tga->root.type = bfd_link_hash_indirect;
7667 tga->root.u.i.link = &opt->root;
7668 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7669 opt->mark = 1;
7670 _bfd_elf_link_hash_hide_symbol (info, opt,
7671 tga->forced_local);
7672 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7673 }
7674 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7675 htab->tls_get_addr_fd->is_func_descriptor = 1;
7676 if (htab->tls_get_addr != NULL)
7677 {
7678 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7679 htab->tls_get_addr->is_func = 1;
7680 }
7681 }
7682 }
7683 }
7684 else if (htab->params->tls_get_addr_opt < 0)
7685 htab->params->tls_get_addr_opt = 0;
7686 }
7687 return _bfd_elf_tls_setup (info->output_bfd, info);
7688 }
7689
7690 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7691 HASH1 or HASH2. */
7692
7693 static bfd_boolean
7694 branch_reloc_hash_match (const bfd *ibfd,
7695 const Elf_Internal_Rela *rel,
7696 const struct ppc_link_hash_entry *hash1,
7697 const struct ppc_link_hash_entry *hash2)
7698 {
7699 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7700 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7701 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7702
7703 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7704 {
7705 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7706 struct elf_link_hash_entry *h;
7707
7708 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7709 h = elf_follow_link (h);
7710 if (h == &hash1->elf || h == &hash2->elf)
7711 return TRUE;
7712 }
7713 return FALSE;
7714 }
7715
7716 /* Run through all the TLS relocs looking for optimization
7717 opportunities. The linker has been hacked (see ppc64elf.em) to do
7718 a preliminary section layout so that we know the TLS segment
7719 offsets. We can't optimize earlier because some optimizations need
7720 to know the tp offset, and we need to optimize before allocating
7721 dynamic relocations. */
7722
7723 bfd_boolean
7724 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7725 {
7726 bfd *ibfd;
7727 asection *sec;
7728 struct ppc_link_hash_table *htab;
7729 unsigned char *toc_ref;
7730 int pass;
7731
7732 if (!bfd_link_executable (info))
7733 return TRUE;
7734
7735 htab = ppc_hash_table (info);
7736 if (htab == NULL)
7737 return FALSE;
7738
7739 /* Make two passes over the relocs. On the first pass, mark toc
7740 entries involved with tls relocs, and check that tls relocs
7741 involved in setting up a tls_get_addr call are indeed followed by
7742 such a call. If they are not, we can't do any tls optimization.
7743 On the second pass twiddle tls_mask flags to notify
7744 relocate_section that optimization can be done, and adjust got
7745 and plt refcounts. */
7746 toc_ref = NULL;
7747 for (pass = 0; pass < 2; ++pass)
7748 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7749 {
7750 Elf_Internal_Sym *locsyms = NULL;
7751 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7752
7753 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7754 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7755 {
7756 Elf_Internal_Rela *relstart, *rel, *relend;
7757 bfd_boolean found_tls_get_addr_arg = 0;
7758
7759 /* Read the relocations. */
7760 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7761 info->keep_memory);
7762 if (relstart == NULL)
7763 {
7764 free (toc_ref);
7765 return FALSE;
7766 }
7767
7768 relend = relstart + sec->reloc_count;
7769 for (rel = relstart; rel < relend; rel++)
7770 {
7771 enum elf_ppc64_reloc_type r_type;
7772 unsigned long r_symndx;
7773 struct elf_link_hash_entry *h;
7774 Elf_Internal_Sym *sym;
7775 asection *sym_sec;
7776 unsigned char *tls_mask;
7777 unsigned int tls_set, tls_clear, tls_type = 0;
7778 bfd_vma value;
7779 bfd_boolean ok_tprel, is_local;
7780 long toc_ref_index = 0;
7781 int expecting_tls_get_addr = 0;
7782 bfd_boolean ret = FALSE;
7783
7784 r_symndx = ELF64_R_SYM (rel->r_info);
7785 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7786 r_symndx, ibfd))
7787 {
7788 err_free_rel:
7789 if (elf_section_data (sec)->relocs != relstart)
7790 free (relstart);
7791 if (toc_ref != NULL)
7792 free (toc_ref);
7793 if (locsyms != NULL
7794 && (elf_symtab_hdr (ibfd).contents
7795 != (unsigned char *) locsyms))
7796 free (locsyms);
7797 return ret;
7798 }
7799
7800 if (h != NULL)
7801 {
7802 if (h->root.type == bfd_link_hash_defined
7803 || h->root.type == bfd_link_hash_defweak)
7804 value = h->root.u.def.value;
7805 else if (h->root.type == bfd_link_hash_undefweak)
7806 value = 0;
7807 else
7808 {
7809 found_tls_get_addr_arg = 0;
7810 continue;
7811 }
7812 }
7813 else
7814 /* Symbols referenced by TLS relocs must be of type
7815 STT_TLS. So no need for .opd local sym adjust. */
7816 value = sym->st_value;
7817
7818 ok_tprel = FALSE;
7819 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7820 if (is_local)
7821 {
7822 if (h != NULL
7823 && h->root.type == bfd_link_hash_undefweak)
7824 ok_tprel = TRUE;
7825 else if (sym_sec != NULL
7826 && sym_sec->output_section != NULL)
7827 {
7828 value += sym_sec->output_offset;
7829 value += sym_sec->output_section->vma;
7830 value -= htab->elf.tls_sec->vma + TP_OFFSET;
7831 /* Note that even though the prefix insns
7832 allow a 1<<33 offset we use the same test
7833 as for addis;addi. There may be a mix of
7834 pcrel and non-pcrel code and the decision
7835 to optimise is per symbol, not per TLS
7836 sequence. */
7837 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
7838 }
7839 }
7840
7841 r_type = ELF64_R_TYPE (rel->r_info);
7842 /* If this section has old-style __tls_get_addr calls
7843 without marker relocs, then check that each
7844 __tls_get_addr call reloc is preceded by a reloc
7845 that conceivably belongs to the __tls_get_addr arg
7846 setup insn. If we don't find matching arg setup
7847 relocs, don't do any tls optimization. */
7848 if (pass == 0
7849 && sec->nomark_tls_get_addr
7850 && h != NULL
7851 && (h == &htab->tls_get_addr->elf
7852 || h == &htab->tls_get_addr_fd->elf)
7853 && !found_tls_get_addr_arg
7854 && is_branch_reloc (r_type))
7855 {
7856 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
7857 "TLS optimization disabled\n"),
7858 ibfd, sec, rel->r_offset);
7859 ret = TRUE;
7860 goto err_free_rel;
7861 }
7862
7863 found_tls_get_addr_arg = 0;
7864 switch (r_type)
7865 {
7866 case R_PPC64_GOT_TLSLD16:
7867 case R_PPC64_GOT_TLSLD16_LO:
7868 case R_PPC64_GOT_TLSLD34:
7869 expecting_tls_get_addr = 1;
7870 found_tls_get_addr_arg = 1;
7871 /* Fall through. */
7872
7873 case R_PPC64_GOT_TLSLD16_HI:
7874 case R_PPC64_GOT_TLSLD16_HA:
7875 /* These relocs should never be against a symbol
7876 defined in a shared lib. Leave them alone if
7877 that turns out to be the case. */
7878 if (!is_local)
7879 continue;
7880
7881 /* LD -> LE */
7882 tls_set = 0;
7883 tls_clear = TLS_LD;
7884 tls_type = TLS_TLS | TLS_LD;
7885 break;
7886
7887 case R_PPC64_GOT_TLSGD16:
7888 case R_PPC64_GOT_TLSGD16_LO:
7889 case R_PPC64_GOT_TLSGD34:
7890 expecting_tls_get_addr = 1;
7891 found_tls_get_addr_arg = 1;
7892 /* Fall through. */
7893
7894 case R_PPC64_GOT_TLSGD16_HI:
7895 case R_PPC64_GOT_TLSGD16_HA:
7896 if (ok_tprel)
7897 /* GD -> LE */
7898 tls_set = 0;
7899 else
7900 /* GD -> IE */
7901 tls_set = TLS_TLS | TLS_GDIE;
7902 tls_clear = TLS_GD;
7903 tls_type = TLS_TLS | TLS_GD;
7904 break;
7905
7906 case R_PPC64_GOT_TPREL34:
7907 case R_PPC64_GOT_TPREL16_DS:
7908 case R_PPC64_GOT_TPREL16_LO_DS:
7909 case R_PPC64_GOT_TPREL16_HI:
7910 case R_PPC64_GOT_TPREL16_HA:
7911 if (ok_tprel)
7912 {
7913 /* IE -> LE */
7914 tls_set = 0;
7915 tls_clear = TLS_TPREL;
7916 tls_type = TLS_TLS | TLS_TPREL;
7917 break;
7918 }
7919 continue;
7920
7921 case R_PPC64_TLSLD:
7922 if (!is_local)
7923 continue;
7924 /* Fall through. */
7925 case R_PPC64_TLSGD:
7926 if (rel + 1 < relend
7927 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7928 {
7929 if (pass != 0
7930 && (ELF64_R_TYPE (rel[1].r_info)
7931 != R_PPC64_PLTSEQ)
7932 && (ELF64_R_TYPE (rel[1].r_info)
7933 != R_PPC64_PLTSEQ_NOTOC))
7934 {
7935 r_symndx = ELF64_R_SYM (rel[1].r_info);
7936 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
7937 r_symndx, ibfd))
7938 goto err_free_rel;
7939 if (h != NULL)
7940 {
7941 struct plt_entry *ent = NULL;
7942
7943 for (ent = h->plt.plist;
7944 ent != NULL;
7945 ent = ent->next)
7946 if (ent->addend == rel[1].r_addend)
7947 break;
7948
7949 if (ent != NULL
7950 && ent->plt.refcount > 0)
7951 ent->plt.refcount -= 1;
7952 }
7953 }
7954 continue;
7955 }
7956 found_tls_get_addr_arg = 1;
7957 /* Fall through. */
7958
7959 case R_PPC64_TLS:
7960 case R_PPC64_TOC16:
7961 case R_PPC64_TOC16_LO:
7962 if (sym_sec == NULL || sym_sec != toc)
7963 continue;
7964
7965 /* Mark this toc entry as referenced by a TLS
7966 code sequence. We can do that now in the
7967 case of R_PPC64_TLS, and after checking for
7968 tls_get_addr for the TOC16 relocs. */
7969 if (toc_ref == NULL)
7970 toc_ref
7971 = bfd_zmalloc (toc->output_section->rawsize / 8);
7972 if (toc_ref == NULL)
7973 goto err_free_rel;
7974
7975 if (h != NULL)
7976 value = h->root.u.def.value;
7977 else
7978 value = sym->st_value;
7979 value += rel->r_addend;
7980 if (value % 8 != 0)
7981 continue;
7982 BFD_ASSERT (value < toc->size
7983 && toc->output_offset % 8 == 0);
7984 toc_ref_index = (value + toc->output_offset) / 8;
7985 if (r_type == R_PPC64_TLS
7986 || r_type == R_PPC64_TLSGD
7987 || r_type == R_PPC64_TLSLD)
7988 {
7989 toc_ref[toc_ref_index] = 1;
7990 continue;
7991 }
7992
7993 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7994 continue;
7995
7996 tls_set = 0;
7997 tls_clear = 0;
7998 expecting_tls_get_addr = 2;
7999 break;
8000
8001 case R_PPC64_TPREL64:
8002 if (pass == 0
8003 || sec != toc
8004 || toc_ref == NULL
8005 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8006 continue;
8007 if (ok_tprel)
8008 {
8009 /* IE -> LE */
8010 tls_set = TLS_EXPLICIT;
8011 tls_clear = TLS_TPREL;
8012 break;
8013 }
8014 continue;
8015
8016 case R_PPC64_DTPMOD64:
8017 if (pass == 0
8018 || sec != toc
8019 || toc_ref == NULL
8020 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8021 continue;
8022 if (rel + 1 < relend
8023 && (rel[1].r_info
8024 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8025 && rel[1].r_offset == rel->r_offset + 8)
8026 {
8027 if (ok_tprel)
8028 /* GD -> LE */
8029 tls_set = TLS_EXPLICIT | TLS_GD;
8030 else
8031 /* GD -> IE */
8032 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8033 tls_clear = TLS_GD;
8034 }
8035 else
8036 {
8037 if (!is_local)
8038 continue;
8039
8040 /* LD -> LE */
8041 tls_set = TLS_EXPLICIT;
8042 tls_clear = TLS_LD;
8043 }
8044 break;
8045
8046 default:
8047 continue;
8048 }
8049
8050 if (pass == 0)
8051 {
8052 if (!expecting_tls_get_addr
8053 || !sec->nomark_tls_get_addr)
8054 continue;
8055
8056 if (rel + 1 < relend
8057 && branch_reloc_hash_match (ibfd, rel + 1,
8058 htab->tls_get_addr,
8059 htab->tls_get_addr_fd))
8060 {
8061 if (expecting_tls_get_addr == 2)
8062 {
8063 /* Check for toc tls entries. */
8064 unsigned char *toc_tls;
8065 int retval;
8066
8067 retval = get_tls_mask (&toc_tls, NULL, NULL,
8068 &locsyms,
8069 rel, ibfd);
8070 if (retval == 0)
8071 goto err_free_rel;
8072 if (toc_tls != NULL)
8073 {
8074 if ((*toc_tls & TLS_TLS) != 0
8075 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8076 found_tls_get_addr_arg = 1;
8077 if (retval > 1)
8078 toc_ref[toc_ref_index] = 1;
8079 }
8080 }
8081 continue;
8082 }
8083
8084 /* Uh oh, we didn't find the expected call. We
8085 could just mark this symbol to exclude it
8086 from tls optimization but it's safer to skip
8087 the entire optimization. */
8088 /* xgettext:c-format */
8089 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8090 "TLS optimization disabled\n"),
8091 ibfd, sec, rel->r_offset);
8092 ret = TRUE;
8093 goto err_free_rel;
8094 }
8095
8096 /* If we don't have old-style __tls_get_addr calls
8097 without TLSGD/TLSLD marker relocs, and we haven't
8098 found a new-style __tls_get_addr call with a
8099 marker for this symbol, then we either have a
8100 broken object file or an -mlongcall style
8101 indirect call to __tls_get_addr without a marker.
8102 Disable optimization in this case. */
8103 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8104 && (tls_set & TLS_EXPLICIT) == 0
8105 && !sec->nomark_tls_get_addr
8106 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8107 != (TLS_TLS | TLS_MARK)))
8108 continue;
8109
8110 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
8111 {
8112 struct plt_entry *ent = NULL;
8113
8114 if (htab->tls_get_addr != NULL)
8115 for (ent = htab->tls_get_addr->elf.plt.plist;
8116 ent != NULL;
8117 ent = ent->next)
8118 if (ent->addend == 0)
8119 break;
8120
8121 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8122 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8123 ent != NULL;
8124 ent = ent->next)
8125 if (ent->addend == 0)
8126 break;
8127
8128 if (ent != NULL
8129 && ent->plt.refcount > 0)
8130 ent->plt.refcount -= 1;
8131 }
8132
8133 if (tls_clear == 0)
8134 continue;
8135
8136 if ((tls_set & TLS_EXPLICIT) == 0)
8137 {
8138 struct got_entry *ent;
8139
8140 /* Adjust got entry for this reloc. */
8141 if (h != NULL)
8142 ent = h->got.glist;
8143 else
8144 ent = elf_local_got_ents (ibfd)[r_symndx];
8145
8146 for (; ent != NULL; ent = ent->next)
8147 if (ent->addend == rel->r_addend
8148 && ent->owner == ibfd
8149 && ent->tls_type == tls_type)
8150 break;
8151 if (ent == NULL)
8152 abort ();
8153
8154 if (tls_set == 0)
8155 {
8156 /* We managed to get rid of a got entry. */
8157 if (ent->got.refcount > 0)
8158 ent->got.refcount -= 1;
8159 }
8160 }
8161 else
8162 {
8163 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8164 we'll lose one or two dyn relocs. */
8165 if (!dec_dynrel_count (rel->r_info, sec, info,
8166 NULL, h, sym))
8167 return FALSE;
8168
8169 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8170 {
8171 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8172 NULL, h, sym))
8173 return FALSE;
8174 }
8175 }
8176
8177 *tls_mask |= tls_set & 0xff;
8178 *tls_mask &= ~tls_clear;
8179 }
8180
8181 if (elf_section_data (sec)->relocs != relstart)
8182 free (relstart);
8183 }
8184
8185 if (locsyms != NULL
8186 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8187 {
8188 if (!info->keep_memory)
8189 free (locsyms);
8190 else
8191 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8192 }
8193 }
8194
8195 if (toc_ref != NULL)
8196 free (toc_ref);
8197 htab->do_tls_opt = 1;
8198 return TRUE;
8199 }
8200
8201 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8202 the values of any global symbols in a toc section that has been
8203 edited. Globals in toc sections should be a rarity, so this function
8204 sets a flag if any are found in toc sections other than the one just
8205 edited, so that further hash table traversals can be avoided. */
8206
8207 struct adjust_toc_info
8208 {
8209 asection *toc;
8210 unsigned long *skip;
8211 bfd_boolean global_toc_syms;
8212 };
8213
8214 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8215
8216 static bfd_boolean
8217 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8218 {
8219 struct ppc_link_hash_entry *eh;
8220 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8221 unsigned long i;
8222
8223 if (h->root.type != bfd_link_hash_defined
8224 && h->root.type != bfd_link_hash_defweak)
8225 return TRUE;
8226
8227 eh = (struct ppc_link_hash_entry *) h;
8228 if (eh->adjust_done)
8229 return TRUE;
8230
8231 if (eh->elf.root.u.def.section == toc_inf->toc)
8232 {
8233 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8234 i = toc_inf->toc->rawsize >> 3;
8235 else
8236 i = eh->elf.root.u.def.value >> 3;
8237
8238 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8239 {
8240 _bfd_error_handler
8241 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8242 do
8243 ++i;
8244 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8245 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8246 }
8247
8248 eh->elf.root.u.def.value -= toc_inf->skip[i];
8249 eh->adjust_done = 1;
8250 }
8251 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8252 toc_inf->global_toc_syms = TRUE;
8253
8254 return TRUE;
8255 }
8256
8257 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8258 on a _LO variety toc/got reloc. */
8259
8260 static bfd_boolean
8261 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8262 {
8263 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8264 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8265 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8266 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8267 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8268 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8269 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8270 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8271 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8272 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8273 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8274 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8275 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8276 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8277 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8278 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8279 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8280 /* Exclude lfqu by testing reloc. If relocs are ever
8281 defined for the reduced D field in psq_lu then those
8282 will need testing too. */
8283 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8284 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
8285 && (insn & 1) == 0)
8286 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8287 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8288 /* Exclude stfqu. psq_stu as above for psq_lu. */
8289 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8290 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
8291 && (insn & 1) == 0));
8292 }
8293
8294 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8295 pld ra,symbol@got@pcrel
8296 load/store rt,off(ra)
8297 or
8298 pla ra,symbol@pcrel
8299 load/store rt,off(ra)
8300 may be translated to
8301 pload/pstore rt,symbol+off@pcrel
8302 nop.
8303 This function returns true if the optimization is possible, placing
8304 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8305
8306 On entry to this function, the linker has already determined that
8307 the pld can be replaced with pla: *PINSN1 is that pla insn,
8308 while *PINSN2 is the second instruction. */
8309
8310 static bfd_boolean
8311 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8312 {
8313 uint64_t insn1 = *pinsn1;
8314 uint64_t insn2 = *pinsn2;
8315 bfd_signed_vma off;
8316
8317 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8318 {
8319 /* Check that regs match. */
8320 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8321 return FALSE;
8322
8323 /* P8LS or PMLS form, non-pcrel. */
8324 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8325 return FALSE;
8326
8327 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8328 *pinsn2 = PNOP;
8329 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8330 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8331 return TRUE;
8332 }
8333
8334 insn2 >>= 32;
8335
8336 /* Check that regs match. */
8337 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8338 return FALSE;
8339
8340 switch ((insn2 >> 26) & 63)
8341 {
8342 default:
8343 return FALSE;
8344
8345 case 32: /* lwz */
8346 case 34: /* lbz */
8347 case 36: /* stw */
8348 case 38: /* stb */
8349 case 40: /* lhz */
8350 case 42: /* lha */
8351 case 44: /* sth */
8352 case 48: /* lfs */
8353 case 50: /* lfd */
8354 case 52: /* stfs */
8355 case 54: /* stfd */
8356 /* These are the PMLS cases, where we just need to tack a prefix
8357 on the insn. */
8358 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8359 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8360 off = insn2 & 0xffff;
8361 break;
8362
8363 case 58: /* lwa, ld */
8364 if ((insn2 & 1) != 0)
8365 return FALSE;
8366 insn1 = ((1ULL << 58) | (1ULL << 52)
8367 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8368 | (insn2 & (31ULL << 21)));
8369 off = insn2 & 0xfffc;
8370 break;
8371
8372 case 57: /* lxsd, lxssp */
8373 if ((insn2 & 3) < 2)
8374 return FALSE;
8375 insn1 = ((1ULL << 58) | (1ULL << 52)
8376 | ((40ULL | (insn2 & 3)) << 26)
8377 | (insn2 & (31ULL << 21)));
8378 off = insn2 & 0xfffc;
8379 break;
8380
8381 case 61: /* stxsd, stxssp, lxv, stxv */
8382 if ((insn2 & 3) == 0)
8383 return FALSE;
8384 else if ((insn2 & 3) >= 2)
8385 {
8386 insn1 = ((1ULL << 58) | (1ULL << 52)
8387 | ((44ULL | (insn2 & 3)) << 26)
8388 | (insn2 & (31ULL << 21)));
8389 off = insn2 & 0xfffc;
8390 }
8391 else
8392 {
8393 insn1 = ((1ULL << 58) | (1ULL << 52)
8394 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8395 | (insn2 & (31ULL << 21)));
8396 off = insn2 & 0xfff0;
8397 }
8398 break;
8399
8400 case 56: /* lq */
8401 insn1 = ((1ULL << 58) | (1ULL << 52)
8402 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8403 off = insn2 & 0xffff;
8404 break;
8405
8406 case 62: /* std, stq */
8407 if ((insn2 & 1) != 0)
8408 return FALSE;
8409 insn1 = ((1ULL << 58) | (1ULL << 52)
8410 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8411 | (insn2 & (31ULL << 21)));
8412 off = insn2 & 0xfffc;
8413 break;
8414 }
8415
8416 *pinsn1 = insn1;
8417 *pinsn2 = (uint64_t) NOP << 32;
8418 *poff = (off ^ 0x8000) - 0x8000;
8419 return TRUE;
8420 }
8421
8422 /* Examine all relocs referencing .toc sections in order to remove
8423 unused .toc entries. */
8424
8425 bfd_boolean
8426 ppc64_elf_edit_toc (struct bfd_link_info *info)
8427 {
8428 bfd *ibfd;
8429 struct adjust_toc_info toc_inf;
8430 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8431
8432 htab->do_toc_opt = 1;
8433 toc_inf.global_toc_syms = TRUE;
8434 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8435 {
8436 asection *toc, *sec;
8437 Elf_Internal_Shdr *symtab_hdr;
8438 Elf_Internal_Sym *local_syms;
8439 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8440 unsigned long *skip, *drop;
8441 unsigned char *used;
8442 unsigned char *keep, last, some_unused;
8443
8444 if (!is_ppc64_elf (ibfd))
8445 continue;
8446
8447 toc = bfd_get_section_by_name (ibfd, ".toc");
8448 if (toc == NULL
8449 || toc->size == 0
8450 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8451 || discarded_section (toc))
8452 continue;
8453
8454 toc_relocs = NULL;
8455 local_syms = NULL;
8456 symtab_hdr = &elf_symtab_hdr (ibfd);
8457
8458 /* Look at sections dropped from the final link. */
8459 skip = NULL;
8460 relstart = NULL;
8461 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8462 {
8463 if (sec->reloc_count == 0
8464 || !discarded_section (sec)
8465 || get_opd_info (sec)
8466 || (sec->flags & SEC_ALLOC) == 0
8467 || (sec->flags & SEC_DEBUGGING) != 0)
8468 continue;
8469
8470 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8471 if (relstart == NULL)
8472 goto error_ret;
8473
8474 /* Run through the relocs to see which toc entries might be
8475 unused. */
8476 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8477 {
8478 enum elf_ppc64_reloc_type r_type;
8479 unsigned long r_symndx;
8480 asection *sym_sec;
8481 struct elf_link_hash_entry *h;
8482 Elf_Internal_Sym *sym;
8483 bfd_vma val;
8484
8485 r_type = ELF64_R_TYPE (rel->r_info);
8486 switch (r_type)
8487 {
8488 default:
8489 continue;
8490
8491 case R_PPC64_TOC16:
8492 case R_PPC64_TOC16_LO:
8493 case R_PPC64_TOC16_HI:
8494 case R_PPC64_TOC16_HA:
8495 case R_PPC64_TOC16_DS:
8496 case R_PPC64_TOC16_LO_DS:
8497 break;
8498 }
8499
8500 r_symndx = ELF64_R_SYM (rel->r_info);
8501 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8502 r_symndx, ibfd))
8503 goto error_ret;
8504
8505 if (sym_sec != toc)
8506 continue;
8507
8508 if (h != NULL)
8509 val = h->root.u.def.value;
8510 else
8511 val = sym->st_value;
8512 val += rel->r_addend;
8513
8514 if (val >= toc->size)
8515 continue;
8516
8517 /* Anything in the toc ought to be aligned to 8 bytes.
8518 If not, don't mark as unused. */
8519 if (val & 7)
8520 continue;
8521
8522 if (skip == NULL)
8523 {
8524 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8525 if (skip == NULL)
8526 goto error_ret;
8527 }
8528
8529 skip[val >> 3] = ref_from_discarded;
8530 }
8531
8532 if (elf_section_data (sec)->relocs != relstart)
8533 free (relstart);
8534 }
8535
8536 /* For largetoc loads of address constants, we can convert
8537 . addis rx,2,addr@got@ha
8538 . ld ry,addr@got@l(rx)
8539 to
8540 . addis rx,2,addr@toc@ha
8541 . addi ry,rx,addr@toc@l
8542 when addr is within 2G of the toc pointer. This then means
8543 that the word storing "addr" in the toc is no longer needed. */
8544
8545 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8546 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8547 && toc->reloc_count != 0)
8548 {
8549 /* Read toc relocs. */
8550 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8551 info->keep_memory);
8552 if (toc_relocs == NULL)
8553 goto error_ret;
8554
8555 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8556 {
8557 enum elf_ppc64_reloc_type r_type;
8558 unsigned long r_symndx;
8559 asection *sym_sec;
8560 struct elf_link_hash_entry *h;
8561 Elf_Internal_Sym *sym;
8562 bfd_vma val, addr;
8563
8564 r_type = ELF64_R_TYPE (rel->r_info);
8565 if (r_type != R_PPC64_ADDR64)
8566 continue;
8567
8568 r_symndx = ELF64_R_SYM (rel->r_info);
8569 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8570 r_symndx, ibfd))
8571 goto error_ret;
8572
8573 if (sym_sec == NULL
8574 || sym_sec->output_section == NULL
8575 || discarded_section (sym_sec))
8576 continue;
8577
8578 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8579 continue;
8580
8581 if (h != NULL)
8582 {
8583 if (h->type == STT_GNU_IFUNC)
8584 continue;
8585 val = h->root.u.def.value;
8586 }
8587 else
8588 {
8589 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8590 continue;
8591 val = sym->st_value;
8592 }
8593 val += rel->r_addend;
8594 val += sym_sec->output_section->vma + sym_sec->output_offset;
8595
8596 /* We don't yet know the exact toc pointer value, but we
8597 know it will be somewhere in the toc section. Don't
8598 optimize if the difference from any possible toc
8599 pointer is outside [ff..f80008000, 7fff7fff]. */
8600 addr = toc->output_section->vma + TOC_BASE_OFF;
8601 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8602 continue;
8603
8604 addr = toc->output_section->vma + toc->output_section->rawsize;
8605 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8606 continue;
8607
8608 if (skip == NULL)
8609 {
8610 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8611 if (skip == NULL)
8612 goto error_ret;
8613 }
8614
8615 skip[rel->r_offset >> 3]
8616 |= can_optimize | ((rel - toc_relocs) << 2);
8617 }
8618 }
8619
8620 if (skip == NULL)
8621 continue;
8622
8623 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8624 if (used == NULL)
8625 {
8626 error_ret:
8627 if (local_syms != NULL
8628 && symtab_hdr->contents != (unsigned char *) local_syms)
8629 free (local_syms);
8630 if (sec != NULL
8631 && relstart != NULL
8632 && elf_section_data (sec)->relocs != relstart)
8633 free (relstart);
8634 if (toc_relocs != NULL
8635 && elf_section_data (toc)->relocs != toc_relocs)
8636 free (toc_relocs);
8637 if (skip != NULL)
8638 free (skip);
8639 return FALSE;
8640 }
8641
8642 /* Now check all kept sections that might reference the toc.
8643 Check the toc itself last. */
8644 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8645 : ibfd->sections);
8646 sec != NULL;
8647 sec = (sec == toc ? NULL
8648 : sec->next == NULL ? toc
8649 : sec->next == toc && toc->next ? toc->next
8650 : sec->next))
8651 {
8652 int repeat;
8653
8654 if (sec->reloc_count == 0
8655 || discarded_section (sec)
8656 || get_opd_info (sec)
8657 || (sec->flags & SEC_ALLOC) == 0
8658 || (sec->flags & SEC_DEBUGGING) != 0)
8659 continue;
8660
8661 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8662 info->keep_memory);
8663 if (relstart == NULL)
8664 {
8665 free (used);
8666 goto error_ret;
8667 }
8668
8669 /* Mark toc entries referenced as used. */
8670 do
8671 {
8672 repeat = 0;
8673 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8674 {
8675 enum elf_ppc64_reloc_type r_type;
8676 unsigned long r_symndx;
8677 asection *sym_sec;
8678 struct elf_link_hash_entry *h;
8679 Elf_Internal_Sym *sym;
8680 bfd_vma val;
8681
8682 r_type = ELF64_R_TYPE (rel->r_info);
8683 switch (r_type)
8684 {
8685 case R_PPC64_TOC16:
8686 case R_PPC64_TOC16_LO:
8687 case R_PPC64_TOC16_HI:
8688 case R_PPC64_TOC16_HA:
8689 case R_PPC64_TOC16_DS:
8690 case R_PPC64_TOC16_LO_DS:
8691 /* In case we're taking addresses of toc entries. */
8692 case R_PPC64_ADDR64:
8693 break;
8694
8695 default:
8696 continue;
8697 }
8698
8699 r_symndx = ELF64_R_SYM (rel->r_info);
8700 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8701 r_symndx, ibfd))
8702 {
8703 free (used);
8704 goto error_ret;
8705 }
8706
8707 if (sym_sec != toc)
8708 continue;
8709
8710 if (h != NULL)
8711 val = h->root.u.def.value;
8712 else
8713 val = sym->st_value;
8714 val += rel->r_addend;
8715
8716 if (val >= toc->size)
8717 continue;
8718
8719 if ((skip[val >> 3] & can_optimize) != 0)
8720 {
8721 bfd_vma off;
8722 unsigned char opc;
8723
8724 switch (r_type)
8725 {
8726 case R_PPC64_TOC16_HA:
8727 break;
8728
8729 case R_PPC64_TOC16_LO_DS:
8730 off = rel->r_offset;
8731 off += (bfd_big_endian (ibfd) ? -2 : 3);
8732 if (!bfd_get_section_contents (ibfd, sec, &opc,
8733 off, 1))
8734 {
8735 free (used);
8736 goto error_ret;
8737 }
8738 if ((opc & (0x3f << 2)) == (58u << 2))
8739 break;
8740 /* Fall through. */
8741
8742 default:
8743 /* Wrong sort of reloc, or not a ld. We may
8744 as well clear ref_from_discarded too. */
8745 skip[val >> 3] = 0;
8746 }
8747 }
8748
8749 if (sec != toc)
8750 used[val >> 3] = 1;
8751 /* For the toc section, we only mark as used if this
8752 entry itself isn't unused. */
8753 else if ((used[rel->r_offset >> 3]
8754 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8755 && !used[val >> 3])
8756 {
8757 /* Do all the relocs again, to catch reference
8758 chains. */
8759 repeat = 1;
8760 used[val >> 3] = 1;
8761 }
8762 }
8763 }
8764 while (repeat);
8765
8766 if (elf_section_data (sec)->relocs != relstart)
8767 free (relstart);
8768 }
8769
8770 /* Merge the used and skip arrays. Assume that TOC
8771 doublewords not appearing as either used or unused belong
8772 to an entry more than one doubleword in size. */
8773 for (drop = skip, keep = used, last = 0, some_unused = 0;
8774 drop < skip + (toc->size + 7) / 8;
8775 ++drop, ++keep)
8776 {
8777 if (*keep)
8778 {
8779 *drop &= ~ref_from_discarded;
8780 if ((*drop & can_optimize) != 0)
8781 some_unused = 1;
8782 last = 0;
8783 }
8784 else if ((*drop & ref_from_discarded) != 0)
8785 {
8786 some_unused = 1;
8787 last = ref_from_discarded;
8788 }
8789 else
8790 *drop = last;
8791 }
8792
8793 free (used);
8794
8795 if (some_unused)
8796 {
8797 bfd_byte *contents, *src;
8798 unsigned long off;
8799 Elf_Internal_Sym *sym;
8800 bfd_boolean local_toc_syms = FALSE;
8801
8802 /* Shuffle the toc contents, and at the same time convert the
8803 skip array from booleans into offsets. */
8804 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8805 goto error_ret;
8806
8807 elf_section_data (toc)->this_hdr.contents = contents;
8808
8809 for (src = contents, off = 0, drop = skip;
8810 src < contents + toc->size;
8811 src += 8, ++drop)
8812 {
8813 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8814 off += 8;
8815 else if (off != 0)
8816 {
8817 *drop = off;
8818 memcpy (src - off, src, 8);
8819 }
8820 }
8821 *drop = off;
8822 toc->rawsize = toc->size;
8823 toc->size = src - contents - off;
8824
8825 /* Adjust addends for relocs against the toc section sym,
8826 and optimize any accesses we can. */
8827 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8828 {
8829 if (sec->reloc_count == 0
8830 || discarded_section (sec))
8831 continue;
8832
8833 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8834 info->keep_memory);
8835 if (relstart == NULL)
8836 goto error_ret;
8837
8838 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8839 {
8840 enum elf_ppc64_reloc_type r_type;
8841 unsigned long r_symndx;
8842 asection *sym_sec;
8843 struct elf_link_hash_entry *h;
8844 bfd_vma val;
8845
8846 r_type = ELF64_R_TYPE (rel->r_info);
8847 switch (r_type)
8848 {
8849 default:
8850 continue;
8851
8852 case R_PPC64_TOC16:
8853 case R_PPC64_TOC16_LO:
8854 case R_PPC64_TOC16_HI:
8855 case R_PPC64_TOC16_HA:
8856 case R_PPC64_TOC16_DS:
8857 case R_PPC64_TOC16_LO_DS:
8858 case R_PPC64_ADDR64:
8859 break;
8860 }
8861
8862 r_symndx = ELF64_R_SYM (rel->r_info);
8863 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8864 r_symndx, ibfd))
8865 goto error_ret;
8866
8867 if (sym_sec != toc)
8868 continue;
8869
8870 if (h != NULL)
8871 val = h->root.u.def.value;
8872 else
8873 {
8874 val = sym->st_value;
8875 if (val != 0)
8876 local_toc_syms = TRUE;
8877 }
8878
8879 val += rel->r_addend;
8880
8881 if (val > toc->rawsize)
8882 val = toc->rawsize;
8883 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8884 continue;
8885 else if ((skip[val >> 3] & can_optimize) != 0)
8886 {
8887 Elf_Internal_Rela *tocrel
8888 = toc_relocs + (skip[val >> 3] >> 2);
8889 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8890
8891 switch (r_type)
8892 {
8893 case R_PPC64_TOC16_HA:
8894 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8895 break;
8896
8897 case R_PPC64_TOC16_LO_DS:
8898 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8899 break;
8900
8901 default:
8902 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8903 ppc_howto_init ();
8904 info->callbacks->einfo
8905 /* xgettext:c-format */
8906 (_("%H: %s references "
8907 "optimized away TOC entry\n"),
8908 ibfd, sec, rel->r_offset,
8909 ppc64_elf_howto_table[r_type]->name);
8910 bfd_set_error (bfd_error_bad_value);
8911 goto error_ret;
8912 }
8913 rel->r_addend = tocrel->r_addend;
8914 elf_section_data (sec)->relocs = relstart;
8915 continue;
8916 }
8917
8918 if (h != NULL || sym->st_value != 0)
8919 continue;
8920
8921 rel->r_addend -= skip[val >> 3];
8922 elf_section_data (sec)->relocs = relstart;
8923 }
8924
8925 if (elf_section_data (sec)->relocs != relstart)
8926 free (relstart);
8927 }
8928
8929 /* We shouldn't have local or global symbols defined in the TOC,
8930 but handle them anyway. */
8931 if (local_syms != NULL)
8932 for (sym = local_syms;
8933 sym < local_syms + symtab_hdr->sh_info;
8934 ++sym)
8935 if (sym->st_value != 0
8936 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8937 {
8938 unsigned long i;
8939
8940 if (sym->st_value > toc->rawsize)
8941 i = toc->rawsize >> 3;
8942 else
8943 i = sym->st_value >> 3;
8944
8945 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8946 {
8947 if (local_toc_syms)
8948 _bfd_error_handler
8949 (_("%s defined on removed toc entry"),
8950 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8951 do
8952 ++i;
8953 while ((skip[i] & (ref_from_discarded | can_optimize)));
8954 sym->st_value = (bfd_vma) i << 3;
8955 }
8956
8957 sym->st_value -= skip[i];
8958 symtab_hdr->contents = (unsigned char *) local_syms;
8959 }
8960
8961 /* Adjust any global syms defined in this toc input section. */
8962 if (toc_inf.global_toc_syms)
8963 {
8964 toc_inf.toc = toc;
8965 toc_inf.skip = skip;
8966 toc_inf.global_toc_syms = FALSE;
8967 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8968 &toc_inf);
8969 }
8970
8971 if (toc->reloc_count != 0)
8972 {
8973 Elf_Internal_Shdr *rel_hdr;
8974 Elf_Internal_Rela *wrel;
8975 bfd_size_type sz;
8976
8977 /* Remove unused toc relocs, and adjust those we keep. */
8978 if (toc_relocs == NULL)
8979 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8980 info->keep_memory);
8981 if (toc_relocs == NULL)
8982 goto error_ret;
8983
8984 wrel = toc_relocs;
8985 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8986 if ((skip[rel->r_offset >> 3]
8987 & (ref_from_discarded | can_optimize)) == 0)
8988 {
8989 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8990 wrel->r_info = rel->r_info;
8991 wrel->r_addend = rel->r_addend;
8992 ++wrel;
8993 }
8994 else if (!dec_dynrel_count (rel->r_info, toc, info,
8995 &local_syms, NULL, NULL))
8996 goto error_ret;
8997
8998 elf_section_data (toc)->relocs = toc_relocs;
8999 toc->reloc_count = wrel - toc_relocs;
9000 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9001 sz = rel_hdr->sh_entsize;
9002 rel_hdr->sh_size = toc->reloc_count * sz;
9003 }
9004 }
9005 else if (toc_relocs != NULL
9006 && elf_section_data (toc)->relocs != toc_relocs)
9007 free (toc_relocs);
9008
9009 if (local_syms != NULL
9010 && symtab_hdr->contents != (unsigned char *) local_syms)
9011 {
9012 if (!info->keep_memory)
9013 free (local_syms);
9014 else
9015 symtab_hdr->contents = (unsigned char *) local_syms;
9016 }
9017 free (skip);
9018 }
9019
9020 /* Look for cases where we can change an indirect GOT access to
9021 a GOT relative or PC relative access, possibly reducing the
9022 number of GOT entries. */
9023 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9024 {
9025 asection *sec;
9026 Elf_Internal_Shdr *symtab_hdr;
9027 Elf_Internal_Sym *local_syms;
9028 Elf_Internal_Rela *relstart, *rel;
9029 bfd_vma got;
9030
9031 if (!is_ppc64_elf (ibfd))
9032 continue;
9033
9034 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9035 continue;
9036
9037 sec = ppc64_elf_tdata (ibfd)->got;
9038 got = 0;
9039 if (sec != NULL)
9040 got = sec->output_section->vma + sec->output_offset + 0x8000;
9041
9042 local_syms = NULL;
9043 symtab_hdr = &elf_symtab_hdr (ibfd);
9044
9045 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9046 {
9047 if (sec->reloc_count == 0
9048 || !ppc64_elf_section_data (sec)->has_optrel
9049 || discarded_section (sec))
9050 continue;
9051
9052 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9053 info->keep_memory);
9054 if (relstart == NULL)
9055 {
9056 got_error_ret:
9057 if (local_syms != NULL
9058 && symtab_hdr->contents != (unsigned char *) local_syms)
9059 free (local_syms);
9060 if (sec != NULL
9061 && relstart != NULL
9062 && elf_section_data (sec)->relocs != relstart)
9063 free (relstart);
9064 return FALSE;
9065 }
9066
9067 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9068 {
9069 enum elf_ppc64_reloc_type r_type;
9070 unsigned long r_symndx;
9071 Elf_Internal_Sym *sym;
9072 asection *sym_sec;
9073 struct elf_link_hash_entry *h;
9074 struct got_entry *ent;
9075 bfd_vma val, pc;
9076 unsigned char buf[8];
9077 unsigned int insn;
9078 enum {no_check, check_lo, check_ha} insn_check;
9079
9080 r_type = ELF64_R_TYPE (rel->r_info);
9081 switch (r_type)
9082 {
9083 default:
9084 insn_check = no_check;
9085 break;
9086
9087 case R_PPC64_PLT16_HA:
9088 case R_PPC64_GOT_TLSLD16_HA:
9089 case R_PPC64_GOT_TLSGD16_HA:
9090 case R_PPC64_GOT_TPREL16_HA:
9091 case R_PPC64_GOT_DTPREL16_HA:
9092 case R_PPC64_GOT16_HA:
9093 case R_PPC64_TOC16_HA:
9094 insn_check = check_ha;
9095 break;
9096
9097 case R_PPC64_PLT16_LO:
9098 case R_PPC64_PLT16_LO_DS:
9099 case R_PPC64_GOT_TLSLD16_LO:
9100 case R_PPC64_GOT_TLSGD16_LO:
9101 case R_PPC64_GOT_TPREL16_LO_DS:
9102 case R_PPC64_GOT_DTPREL16_LO_DS:
9103 case R_PPC64_GOT16_LO:
9104 case R_PPC64_GOT16_LO_DS:
9105 case R_PPC64_TOC16_LO:
9106 case R_PPC64_TOC16_LO_DS:
9107 insn_check = check_lo;
9108 break;
9109 }
9110
9111 if (insn_check != no_check)
9112 {
9113 bfd_vma off = rel->r_offset & ~3;
9114
9115 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9116 goto got_error_ret;
9117
9118 insn = bfd_get_32 (ibfd, buf);
9119 if (insn_check == check_lo
9120 ? !ok_lo_toc_insn (insn, r_type)
9121 : ((insn & ((0x3fu << 26) | 0x1f << 16))
9122 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9123 {
9124 char str[12];
9125
9126 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9127 sprintf (str, "%#08x", insn);
9128 info->callbacks->einfo
9129 /* xgettext:c-format */
9130 (_("%H: got/toc optimization is not supported for"
9131 " %s instruction\n"),
9132 ibfd, sec, rel->r_offset & ~3, str);
9133 continue;
9134 }
9135 }
9136
9137 switch (r_type)
9138 {
9139 /* Note that we don't delete GOT entries for
9140 R_PPC64_GOT16_DS since we'd need a lot more
9141 analysis. For starters, the preliminary layout is
9142 before the GOT, PLT, dynamic sections and stubs are
9143 laid out. Then we'd need to allow for changes in
9144 distance between sections caused by alignment. */
9145 default:
9146 continue;
9147
9148 case R_PPC64_GOT16_HA:
9149 case R_PPC64_GOT16_LO_DS:
9150 case R_PPC64_GOT_PCREL34:
9151 break;
9152 }
9153
9154 r_symndx = ELF64_R_SYM (rel->r_info);
9155 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9156 r_symndx, ibfd))
9157 goto got_error_ret;
9158
9159 if (sym_sec == NULL
9160 || sym_sec->output_section == NULL
9161 || discarded_section (sym_sec))
9162 continue;
9163
9164 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9165 continue;
9166
9167 if (h != NULL)
9168 val = h->root.u.def.value;
9169 else
9170 val = sym->st_value;
9171 val += rel->r_addend;
9172 val += sym_sec->output_section->vma + sym_sec->output_offset;
9173
9174 /* Fudge factor to allow for the fact that the preliminary layout
9175 isn't exact. Reduce limits by this factor. */
9176 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9177
9178 switch (r_type)
9179 {
9180 default:
9181 continue;
9182
9183 case R_PPC64_GOT16_HA:
9184 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9185 >= LIMIT_ADJUST (0x100000000ULL))
9186 continue;
9187
9188 if (!bfd_get_section_contents (ibfd, sec, buf,
9189 rel->r_offset & ~3, 4))
9190 goto got_error_ret;
9191 insn = bfd_get_32 (ibfd, buf);
9192 if (((insn & ((0x3fu << 26) | 0x1f << 16))
9193 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9194 continue;
9195 break;
9196
9197 case R_PPC64_GOT16_LO_DS:
9198 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9199 >= LIMIT_ADJUST (0x100000000ULL))
9200 continue;
9201 if (!bfd_get_section_contents (ibfd, sec, buf,
9202 rel->r_offset & ~3, 4))
9203 goto got_error_ret;
9204 insn = bfd_get_32 (ibfd, buf);
9205 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
9206 continue;
9207 break;
9208
9209 case R_PPC64_GOT_PCREL34:
9210 pc = rel->r_offset;
9211 pc += sec->output_section->vma + sec->output_offset;
9212 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9213 >= LIMIT_ADJUST (1ULL << 34))
9214 continue;
9215 if (!bfd_get_section_contents (ibfd, sec, buf,
9216 rel->r_offset & ~3, 8))
9217 goto got_error_ret;
9218 insn = bfd_get_32 (ibfd, buf);
9219 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9220 continue;
9221 insn = bfd_get_32 (ibfd, buf + 4);
9222 if ((insn & (0x3fu << 26)) != 57u << 26)
9223 continue;
9224 break;
9225 }
9226 #undef LIMIT_ADJUST
9227
9228 if (h != NULL)
9229 ent = h->got.glist;
9230 else
9231 {
9232 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9233 ent = local_got_ents[r_symndx];
9234 }
9235 for (; ent != NULL; ent = ent->next)
9236 if (ent->addend == rel->r_addend
9237 && ent->owner == ibfd
9238 && ent->tls_type == 0)
9239 break;
9240 BFD_ASSERT (ent && ent->got.refcount > 0);
9241 ent->got.refcount -= 1;
9242 }
9243
9244 if (elf_section_data (sec)->relocs != relstart)
9245 free (relstart);
9246 }
9247
9248 if (local_syms != NULL
9249 && symtab_hdr->contents != (unsigned char *) local_syms)
9250 {
9251 if (!info->keep_memory)
9252 free (local_syms);
9253 else
9254 symtab_hdr->contents = (unsigned char *) local_syms;
9255 }
9256 }
9257
9258 return TRUE;
9259 }
9260
9261 /* Return true iff input section I references the TOC using
9262 instructions limited to +/-32k offsets. */
9263
9264 bfd_boolean
9265 ppc64_elf_has_small_toc_reloc (asection *i)
9266 {
9267 return (is_ppc64_elf (i->owner)
9268 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9269 }
9270
9271 /* Allocate space for one GOT entry. */
9272
9273 static void
9274 allocate_got (struct elf_link_hash_entry *h,
9275 struct bfd_link_info *info,
9276 struct got_entry *gent)
9277 {
9278 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9279 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9280 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9281 ? 16 : 8);
9282 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9283 ? 2 : 1) * sizeof (Elf64_External_Rela);
9284 asection *got = ppc64_elf_tdata (gent->owner)->got;
9285
9286 gent->got.offset = got->size;
9287 got->size += entsize;
9288
9289 if (h->type == STT_GNU_IFUNC)
9290 {
9291 htab->elf.irelplt->size += rentsize;
9292 htab->got_reli_size += rentsize;
9293 }
9294 else if (((bfd_link_pic (info)
9295 && !(gent->tls_type != 0
9296 && bfd_link_executable (info)
9297 && SYMBOL_REFERENCES_LOCAL (info, h)))
9298 || (htab->elf.dynamic_sections_created
9299 && h->dynindx != -1
9300 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9301 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9302 {
9303 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9304 relgot->size += rentsize;
9305 }
9306 }
9307
9308 /* This function merges got entries in the same toc group. */
9309
9310 static void
9311 merge_got_entries (struct got_entry **pent)
9312 {
9313 struct got_entry *ent, *ent2;
9314
9315 for (ent = *pent; ent != NULL; ent = ent->next)
9316 if (!ent->is_indirect)
9317 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9318 if (!ent2->is_indirect
9319 && ent2->addend == ent->addend
9320 && ent2->tls_type == ent->tls_type
9321 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9322 {
9323 ent2->is_indirect = TRUE;
9324 ent2->got.ent = ent;
9325 }
9326 }
9327
9328 /* If H is undefined, make it dynamic if that makes sense. */
9329
9330 static bfd_boolean
9331 ensure_undef_dynamic (struct bfd_link_info *info,
9332 struct elf_link_hash_entry *h)
9333 {
9334 struct elf_link_hash_table *htab = elf_hash_table (info);
9335
9336 if (htab->dynamic_sections_created
9337 && ((info->dynamic_undefined_weak != 0
9338 && h->root.type == bfd_link_hash_undefweak)
9339 || h->root.type == bfd_link_hash_undefined)
9340 && h->dynindx == -1
9341 && !h->forced_local
9342 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9343 return bfd_elf_link_record_dynamic_symbol (info, h);
9344 return TRUE;
9345 }
9346
9347 /* Allocate space in .plt, .got and associated reloc sections for
9348 dynamic relocs. */
9349
9350 static bfd_boolean
9351 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9352 {
9353 struct bfd_link_info *info;
9354 struct ppc_link_hash_table *htab;
9355 asection *s;
9356 struct ppc_link_hash_entry *eh;
9357 struct got_entry **pgent, *gent;
9358
9359 if (h->root.type == bfd_link_hash_indirect)
9360 return TRUE;
9361
9362 info = (struct bfd_link_info *) inf;
9363 htab = ppc_hash_table (info);
9364 if (htab == NULL)
9365 return FALSE;
9366
9367 eh = (struct ppc_link_hash_entry *) h;
9368 /* Run through the TLS GD got entries first if we're changing them
9369 to TPREL. */
9370 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9371 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9372 if (gent->got.refcount > 0
9373 && (gent->tls_type & TLS_GD) != 0)
9374 {
9375 /* This was a GD entry that has been converted to TPREL. If
9376 there happens to be a TPREL entry we can use that one. */
9377 struct got_entry *ent;
9378 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9379 if (ent->got.refcount > 0
9380 && (ent->tls_type & TLS_TPREL) != 0
9381 && ent->addend == gent->addend
9382 && ent->owner == gent->owner)
9383 {
9384 gent->got.refcount = 0;
9385 break;
9386 }
9387
9388 /* If not, then we'll be using our own TPREL entry. */
9389 if (gent->got.refcount != 0)
9390 gent->tls_type = TLS_TLS | TLS_TPREL;
9391 }
9392
9393 /* Remove any list entry that won't generate a word in the GOT before
9394 we call merge_got_entries. Otherwise we risk merging to empty
9395 entries. */
9396 pgent = &h->got.glist;
9397 while ((gent = *pgent) != NULL)
9398 if (gent->got.refcount > 0)
9399 {
9400 if ((gent->tls_type & TLS_LD) != 0
9401 && SYMBOL_REFERENCES_LOCAL (info, h))
9402 {
9403 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9404 *pgent = gent->next;
9405 }
9406 else
9407 pgent = &gent->next;
9408 }
9409 else
9410 *pgent = gent->next;
9411
9412 if (!htab->do_multi_toc)
9413 merge_got_entries (&h->got.glist);
9414
9415 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9416 if (!gent->is_indirect)
9417 {
9418 /* Ensure we catch all the cases where this symbol should
9419 be made dynamic. */
9420 if (!ensure_undef_dynamic (info, h))
9421 return FALSE;
9422
9423 if (!is_ppc64_elf (gent->owner))
9424 abort ();
9425
9426 allocate_got (h, info, gent);
9427 }
9428
9429 /* If no dynamic sections we can't have dynamic relocs, except for
9430 IFUNCs which are handled even in static executables. */
9431 if (!htab->elf.dynamic_sections_created
9432 && h->type != STT_GNU_IFUNC)
9433 eh->dyn_relocs = NULL;
9434
9435 /* Discard relocs on undefined symbols that must be local. */
9436 else if (h->root.type == bfd_link_hash_undefined
9437 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9438 eh->dyn_relocs = NULL;
9439
9440 /* Also discard relocs on undefined weak syms with non-default
9441 visibility, or when dynamic_undefined_weak says so. */
9442 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9443 eh->dyn_relocs = NULL;
9444
9445 if (eh->dyn_relocs != NULL)
9446 {
9447 struct elf_dyn_relocs *p, **pp;
9448
9449 /* In the shared -Bsymbolic case, discard space allocated for
9450 dynamic pc-relative relocs against symbols which turn out to
9451 be defined in regular objects. For the normal shared case,
9452 discard space for relocs that have become local due to symbol
9453 visibility changes. */
9454 if (bfd_link_pic (info))
9455 {
9456 /* Relocs that use pc_count are those that appear on a call
9457 insn, or certain REL relocs (see must_be_dyn_reloc) that
9458 can be generated via assembly. We want calls to
9459 protected symbols to resolve directly to the function
9460 rather than going via the plt. If people want function
9461 pointer comparisons to work as expected then they should
9462 avoid writing weird assembly. */
9463 if (SYMBOL_CALLS_LOCAL (info, h))
9464 {
9465 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9466 {
9467 p->count -= p->pc_count;
9468 p->pc_count = 0;
9469 if (p->count == 0)
9470 *pp = p->next;
9471 else
9472 pp = &p->next;
9473 }
9474 }
9475
9476 if (eh->dyn_relocs != NULL)
9477 {
9478 /* Ensure we catch all the cases where this symbol
9479 should be made dynamic. */
9480 if (!ensure_undef_dynamic (info, h))
9481 return FALSE;
9482 }
9483 }
9484
9485 /* For a fixed position executable, discard space for
9486 relocs against symbols which are not dynamic. */
9487 else if (h->type != STT_GNU_IFUNC)
9488 {
9489 if (h->dynamic_adjusted
9490 && !h->def_regular
9491 && !ELF_COMMON_DEF_P (h))
9492 {
9493 /* Ensure we catch all the cases where this symbol
9494 should be made dynamic. */
9495 if (!ensure_undef_dynamic (info, h))
9496 return FALSE;
9497
9498 /* But if that didn't work out, discard dynamic relocs. */
9499 if (h->dynindx == -1)
9500 eh->dyn_relocs = NULL;
9501 }
9502 else
9503 eh->dyn_relocs = NULL;
9504 }
9505
9506 /* Finally, allocate space. */
9507 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9508 {
9509 asection *sreloc = elf_section_data (p->sec)->sreloc;
9510 if (eh->elf.type == STT_GNU_IFUNC)
9511 sreloc = htab->elf.irelplt;
9512 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9513 }
9514 }
9515
9516 /* We might need a PLT entry when the symbol
9517 a) is dynamic, or
9518 b) is an ifunc, or
9519 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9520 d) has plt16 relocs and we are linking statically. */
9521 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9522 || h->type == STT_GNU_IFUNC
9523 || (h->needs_plt && h->dynamic_adjusted)
9524 || (h->needs_plt
9525 && h->def_regular
9526 && !htab->elf.dynamic_sections_created
9527 && !htab->can_convert_all_inline_plt
9528 && (((struct ppc_link_hash_entry *) h)->tls_mask
9529 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9530 {
9531 struct plt_entry *pent;
9532 bfd_boolean doneone = FALSE;
9533 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9534 if (pent->plt.refcount > 0)
9535 {
9536 if (!htab->elf.dynamic_sections_created
9537 || h->dynindx == -1)
9538 {
9539 if (h->type == STT_GNU_IFUNC)
9540 {
9541 s = htab->elf.iplt;
9542 pent->plt.offset = s->size;
9543 s->size += PLT_ENTRY_SIZE (htab);
9544 s = htab->elf.irelplt;
9545 }
9546 else
9547 {
9548 s = htab->pltlocal;
9549 pent->plt.offset = s->size;
9550 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9551 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9552 }
9553 }
9554 else
9555 {
9556 /* If this is the first .plt entry, make room for the special
9557 first entry. */
9558 s = htab->elf.splt;
9559 if (s->size == 0)
9560 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9561
9562 pent->plt.offset = s->size;
9563
9564 /* Make room for this entry. */
9565 s->size += PLT_ENTRY_SIZE (htab);
9566
9567 /* Make room for the .glink code. */
9568 s = htab->glink;
9569 if (s->size == 0)
9570 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9571 if (htab->opd_abi)
9572 {
9573 /* We need bigger stubs past index 32767. */
9574 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9575 s->size += 4;
9576 s->size += 2*4;
9577 }
9578 else
9579 s->size += 4;
9580
9581 /* We also need to make an entry in the .rela.plt section. */
9582 s = htab->elf.srelplt;
9583 }
9584 if (s != NULL)
9585 s->size += sizeof (Elf64_External_Rela);
9586 doneone = TRUE;
9587 }
9588 else
9589 pent->plt.offset = (bfd_vma) -1;
9590 if (!doneone)
9591 {
9592 h->plt.plist = NULL;
9593 h->needs_plt = 0;
9594 }
9595 }
9596 else
9597 {
9598 h->plt.plist = NULL;
9599 h->needs_plt = 0;
9600 }
9601
9602 return TRUE;
9603 }
9604
9605 #define PPC_LO(v) ((v) & 0xffff)
9606 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9607 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9608 #define D34(v) \
9609 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9610 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9611
9612 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9613 to set up space for global entry stubs. These are put in glink,
9614 after the branch table. */
9615
9616 static bfd_boolean
9617 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9618 {
9619 struct bfd_link_info *info;
9620 struct ppc_link_hash_table *htab;
9621 struct plt_entry *pent;
9622 asection *s, *plt;
9623
9624 if (h->root.type == bfd_link_hash_indirect)
9625 return TRUE;
9626
9627 if (!h->pointer_equality_needed)
9628 return TRUE;
9629
9630 if (h->def_regular)
9631 return TRUE;
9632
9633 info = inf;
9634 htab = ppc_hash_table (info);
9635 if (htab == NULL)
9636 return FALSE;
9637
9638 s = htab->global_entry;
9639 plt = htab->elf.splt;
9640 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9641 if (pent->plt.offset != (bfd_vma) -1
9642 && pent->addend == 0)
9643 {
9644 /* For ELFv2, if this symbol is not defined in a regular file
9645 and we are not generating a shared library or pie, then we
9646 need to define the symbol in the executable on a call stub.
9647 This is to avoid text relocations. */
9648 bfd_vma off, stub_align, stub_off, stub_size;
9649 unsigned int align_power;
9650
9651 stub_size = 16;
9652 stub_off = s->size;
9653 if (htab->params->plt_stub_align >= 0)
9654 align_power = htab->params->plt_stub_align;
9655 else
9656 align_power = -htab->params->plt_stub_align;
9657 /* Setting section alignment is delayed until we know it is
9658 non-empty. Otherwise the .text output section will be
9659 aligned at least to plt_stub_align even when no global
9660 entry stubs are needed. */
9661 if (s->alignment_power < align_power)
9662 s->alignment_power = align_power;
9663 stub_align = (bfd_vma) 1 << align_power;
9664 if (htab->params->plt_stub_align >= 0
9665 || ((((stub_off + stub_size - 1) & -stub_align)
9666 - (stub_off & -stub_align))
9667 > ((stub_size - 1) & -stub_align)))
9668 stub_off = (stub_off + stub_align - 1) & -stub_align;
9669 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9670 off -= stub_off + s->output_offset + s->output_section->vma;
9671 /* Note that for --plt-stub-align negative we have a possible
9672 dependency between stub offset and size. Break that
9673 dependency by assuming the max stub size when calculating
9674 the stub offset. */
9675 if (PPC_HA (off) == 0)
9676 stub_size -= 4;
9677 h->root.type = bfd_link_hash_defined;
9678 h->root.u.def.section = s;
9679 h->root.u.def.value = stub_off;
9680 s->size = stub_off + stub_size;
9681 break;
9682 }
9683 return TRUE;
9684 }
9685
9686 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9687 read-only sections. */
9688
9689 static bfd_boolean
9690 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
9691 {
9692 asection *sec;
9693
9694 if (h->root.type == bfd_link_hash_indirect)
9695 return TRUE;
9696
9697 sec = readonly_dynrelocs (h);
9698 if (sec != NULL)
9699 {
9700 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9701
9702 info->flags |= DF_TEXTREL;
9703 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9704 " in read-only section `%pA'\n"),
9705 sec->owner, h->root.root.string, sec);
9706
9707 /* Not an error, just cut short the traversal. */
9708 return FALSE;
9709 }
9710 return TRUE;
9711 }
9712
9713 /* Set the sizes of the dynamic sections. */
9714
9715 static bfd_boolean
9716 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9717 struct bfd_link_info *info)
9718 {
9719 struct ppc_link_hash_table *htab;
9720 bfd *dynobj;
9721 asection *s;
9722 bfd_boolean relocs;
9723 bfd *ibfd;
9724 struct got_entry *first_tlsld;
9725
9726 htab = ppc_hash_table (info);
9727 if (htab == NULL)
9728 return FALSE;
9729
9730 dynobj = htab->elf.dynobj;
9731 if (dynobj == NULL)
9732 abort ();
9733
9734 if (htab->elf.dynamic_sections_created)
9735 {
9736 /* Set the contents of the .interp section to the interpreter. */
9737 if (bfd_link_executable (info) && !info->nointerp)
9738 {
9739 s = bfd_get_linker_section (dynobj, ".interp");
9740 if (s == NULL)
9741 abort ();
9742 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9743 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9744 }
9745 }
9746
9747 /* Set up .got offsets for local syms, and space for local dynamic
9748 relocs. */
9749 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9750 {
9751 struct got_entry **lgot_ents;
9752 struct got_entry **end_lgot_ents;
9753 struct plt_entry **local_plt;
9754 struct plt_entry **end_local_plt;
9755 unsigned char *lgot_masks;
9756 bfd_size_type locsymcount;
9757 Elf_Internal_Shdr *symtab_hdr;
9758
9759 if (!is_ppc64_elf (ibfd))
9760 continue;
9761
9762 for (s = ibfd->sections; s != NULL; s = s->next)
9763 {
9764 struct ppc_dyn_relocs *p;
9765
9766 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9767 {
9768 if (!bfd_is_abs_section (p->sec)
9769 && bfd_is_abs_section (p->sec->output_section))
9770 {
9771 /* Input section has been discarded, either because
9772 it is a copy of a linkonce section or due to
9773 linker script /DISCARD/, so we'll be discarding
9774 the relocs too. */
9775 }
9776 else if (p->count != 0)
9777 {
9778 asection *srel = elf_section_data (p->sec)->sreloc;
9779 if (p->ifunc)
9780 srel = htab->elf.irelplt;
9781 srel->size += p->count * sizeof (Elf64_External_Rela);
9782 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9783 info->flags |= DF_TEXTREL;
9784 }
9785 }
9786 }
9787
9788 lgot_ents = elf_local_got_ents (ibfd);
9789 if (!lgot_ents)
9790 continue;
9791
9792 symtab_hdr = &elf_symtab_hdr (ibfd);
9793 locsymcount = symtab_hdr->sh_info;
9794 end_lgot_ents = lgot_ents + locsymcount;
9795 local_plt = (struct plt_entry **) end_lgot_ents;
9796 end_local_plt = local_plt + locsymcount;
9797 lgot_masks = (unsigned char *) end_local_plt;
9798 s = ppc64_elf_tdata (ibfd)->got;
9799 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9800 {
9801 struct got_entry **pent, *ent;
9802
9803 pent = lgot_ents;
9804 while ((ent = *pent) != NULL)
9805 if (ent->got.refcount > 0)
9806 {
9807 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9808 {
9809 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9810 *pent = ent->next;
9811 }
9812 else
9813 {
9814 unsigned int ent_size = 8;
9815 unsigned int rel_size = sizeof (Elf64_External_Rela);
9816
9817 ent->got.offset = s->size;
9818 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9819 {
9820 ent_size *= 2;
9821 rel_size *= 2;
9822 }
9823 s->size += ent_size;
9824 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9825 {
9826 htab->elf.irelplt->size += rel_size;
9827 htab->got_reli_size += rel_size;
9828 }
9829 else if (bfd_link_pic (info)
9830 && !(ent->tls_type != 0
9831 && bfd_link_executable (info)))
9832 {
9833 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9834 srel->size += rel_size;
9835 }
9836 pent = &ent->next;
9837 }
9838 }
9839 else
9840 *pent = ent->next;
9841 }
9842
9843 /* Allocate space for plt calls to local syms. */
9844 lgot_masks = (unsigned char *) end_local_plt;
9845 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
9846 {
9847 struct plt_entry *ent;
9848
9849 for (ent = *local_plt; ent != NULL; ent = ent->next)
9850 if (ent->plt.refcount > 0)
9851 {
9852 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9853 {
9854 s = htab->elf.iplt;
9855 ent->plt.offset = s->size;
9856 s->size += PLT_ENTRY_SIZE (htab);
9857 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9858 }
9859 else if (htab->can_convert_all_inline_plt
9860 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
9861 ent->plt.offset = (bfd_vma) -1;
9862 else
9863 {
9864 s = htab->pltlocal;
9865 ent->plt.offset = s->size;
9866 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9867 if (bfd_link_pic (info))
9868 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9869 }
9870 }
9871 else
9872 ent->plt.offset = (bfd_vma) -1;
9873 }
9874 }
9875
9876 /* Allocate global sym .plt and .got entries, and space for global
9877 sym dynamic relocs. */
9878 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
9879
9880 if (!htab->opd_abi && !bfd_link_pic (info))
9881 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
9882
9883 first_tlsld = NULL;
9884 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9885 {
9886 struct got_entry *ent;
9887
9888 if (!is_ppc64_elf (ibfd))
9889 continue;
9890
9891 ent = ppc64_tlsld_got (ibfd);
9892 if (ent->got.refcount > 0)
9893 {
9894 if (!htab->do_multi_toc && first_tlsld != NULL)
9895 {
9896 ent->is_indirect = TRUE;
9897 ent->got.ent = first_tlsld;
9898 }
9899 else
9900 {
9901 if (first_tlsld == NULL)
9902 first_tlsld = ent;
9903 s = ppc64_elf_tdata (ibfd)->got;
9904 ent->got.offset = s->size;
9905 ent->owner = ibfd;
9906 s->size += 16;
9907 if (bfd_link_dll (info))
9908 {
9909 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9910 srel->size += sizeof (Elf64_External_Rela);
9911 }
9912 }
9913 }
9914 else
9915 ent->got.offset = (bfd_vma) -1;
9916 }
9917
9918 /* We now have determined the sizes of the various dynamic sections.
9919 Allocate memory for them. */
9920 relocs = FALSE;
9921 for (s = dynobj->sections; s != NULL; s = s->next)
9922 {
9923 if ((s->flags & SEC_LINKER_CREATED) == 0)
9924 continue;
9925
9926 if (s == htab->brlt || s == htab->relbrlt)
9927 /* These haven't been allocated yet; don't strip. */
9928 continue;
9929 else if (s == htab->elf.sgot
9930 || s == htab->elf.splt
9931 || s == htab->elf.iplt
9932 || s == htab->pltlocal
9933 || s == htab->glink
9934 || s == htab->global_entry
9935 || s == htab->elf.sdynbss
9936 || s == htab->elf.sdynrelro)
9937 {
9938 /* Strip this section if we don't need it; see the
9939 comment below. */
9940 }
9941 else if (s == htab->glink_eh_frame)
9942 {
9943 if (!bfd_is_abs_section (s->output_section))
9944 /* Not sized yet. */
9945 continue;
9946 }
9947 else if (CONST_STRNEQ (s->name, ".rela"))
9948 {
9949 if (s->size != 0)
9950 {
9951 if (s != htab->elf.srelplt)
9952 relocs = TRUE;
9953
9954 /* We use the reloc_count field as a counter if we need
9955 to copy relocs into the output file. */
9956 s->reloc_count = 0;
9957 }
9958 }
9959 else
9960 {
9961 /* It's not one of our sections, so don't allocate space. */
9962 continue;
9963 }
9964
9965 if (s->size == 0)
9966 {
9967 /* If we don't need this section, strip it from the
9968 output file. This is mostly to handle .rela.bss and
9969 .rela.plt. We must create both sections in
9970 create_dynamic_sections, because they must be created
9971 before the linker maps input sections to output
9972 sections. The linker does that before
9973 adjust_dynamic_symbol is called, and it is that
9974 function which decides whether anything needs to go
9975 into these sections. */
9976 s->flags |= SEC_EXCLUDE;
9977 continue;
9978 }
9979
9980 if (bfd_is_abs_section (s->output_section))
9981 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9982 s->name);
9983
9984 if ((s->flags & SEC_HAS_CONTENTS) == 0)
9985 continue;
9986
9987 /* Allocate memory for the section contents. We use bfd_zalloc
9988 here in case unused entries are not reclaimed before the
9989 section's contents are written out. This should not happen,
9990 but this way if it does we get a R_PPC64_NONE reloc in .rela
9991 sections instead of garbage.
9992 We also rely on the section contents being zero when writing
9993 the GOT and .dynrelro. */
9994 s->contents = bfd_zalloc (dynobj, s->size);
9995 if (s->contents == NULL)
9996 return FALSE;
9997 }
9998
9999 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10000 {
10001 if (!is_ppc64_elf (ibfd))
10002 continue;
10003
10004 s = ppc64_elf_tdata (ibfd)->got;
10005 if (s != NULL && s != htab->elf.sgot)
10006 {
10007 if (s->size == 0)
10008 s->flags |= SEC_EXCLUDE;
10009 else
10010 {
10011 s->contents = bfd_zalloc (ibfd, s->size);
10012 if (s->contents == NULL)
10013 return FALSE;
10014 }
10015 }
10016 s = ppc64_elf_tdata (ibfd)->relgot;
10017 if (s != NULL)
10018 {
10019 if (s->size == 0)
10020 s->flags |= SEC_EXCLUDE;
10021 else
10022 {
10023 s->contents = bfd_zalloc (ibfd, s->size);
10024 if (s->contents == NULL)
10025 return FALSE;
10026 relocs = TRUE;
10027 s->reloc_count = 0;
10028 }
10029 }
10030 }
10031
10032 if (htab->elf.dynamic_sections_created)
10033 {
10034 bfd_boolean tls_opt;
10035
10036 /* Add some entries to the .dynamic section. We fill in the
10037 values later, in ppc64_elf_finish_dynamic_sections, but we
10038 must add the entries now so that we get the correct size for
10039 the .dynamic section. The DT_DEBUG entry is filled in by the
10040 dynamic linker and used by the debugger. */
10041 #define add_dynamic_entry(TAG, VAL) \
10042 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10043
10044 if (bfd_link_executable (info))
10045 {
10046 if (!add_dynamic_entry (DT_DEBUG, 0))
10047 return FALSE;
10048 }
10049
10050 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10051 {
10052 if (!add_dynamic_entry (DT_PLTGOT, 0)
10053 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10054 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10055 || !add_dynamic_entry (DT_JMPREL, 0)
10056 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10057 return FALSE;
10058 }
10059
10060 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10061 {
10062 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10063 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10064 return FALSE;
10065 }
10066
10067 tls_opt = (htab->params->tls_get_addr_opt
10068 && htab->tls_get_addr_fd != NULL
10069 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10070 if (tls_opt || !htab->opd_abi)
10071 {
10072 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10073 return FALSE;
10074 }
10075
10076 if (relocs)
10077 {
10078 if (!add_dynamic_entry (DT_RELA, 0)
10079 || !add_dynamic_entry (DT_RELASZ, 0)
10080 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10081 return FALSE;
10082
10083 /* If any dynamic relocs apply to a read-only section,
10084 then we need a DT_TEXTREL entry. */
10085 if ((info->flags & DF_TEXTREL) == 0)
10086 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10087
10088 if ((info->flags & DF_TEXTREL) != 0)
10089 {
10090 if (!add_dynamic_entry (DT_TEXTREL, 0))
10091 return FALSE;
10092 }
10093 }
10094 }
10095 #undef add_dynamic_entry
10096
10097 return TRUE;
10098 }
10099
10100 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10101
10102 static bfd_boolean
10103 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10104 {
10105 if (h->plt.plist != NULL
10106 && !h->def_regular
10107 && !h->pointer_equality_needed)
10108 return FALSE;
10109
10110 return _bfd_elf_hash_symbol (h);
10111 }
10112
10113 /* Determine the type of stub needed, if any, for a call. */
10114
10115 static inline enum ppc_stub_type
10116 ppc_type_of_stub (asection *input_sec,
10117 const Elf_Internal_Rela *rel,
10118 struct ppc_link_hash_entry **hash,
10119 struct plt_entry **plt_ent,
10120 bfd_vma destination,
10121 unsigned long local_off)
10122 {
10123 struct ppc_link_hash_entry *h = *hash;
10124 bfd_vma location;
10125 bfd_vma branch_offset;
10126 bfd_vma max_branch_offset;
10127 enum elf_ppc64_reloc_type r_type;
10128
10129 if (h != NULL)
10130 {
10131 struct plt_entry *ent;
10132 struct ppc_link_hash_entry *fdh = h;
10133 if (h->oh != NULL
10134 && h->oh->is_func_descriptor)
10135 {
10136 fdh = ppc_follow_link (h->oh);
10137 *hash = fdh;
10138 }
10139
10140 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10141 if (ent->addend == rel->r_addend
10142 && ent->plt.offset != (bfd_vma) -1)
10143 {
10144 *plt_ent = ent;
10145 return ppc_stub_plt_call;
10146 }
10147
10148 /* Here, we know we don't have a plt entry. If we don't have a
10149 either a defined function descriptor or a defined entry symbol
10150 in a regular object file, then it is pointless trying to make
10151 any other type of stub. */
10152 if (!is_static_defined (&fdh->elf)
10153 && !is_static_defined (&h->elf))
10154 return ppc_stub_none;
10155 }
10156 else if (elf_local_got_ents (input_sec->owner) != NULL)
10157 {
10158 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10159 struct plt_entry **local_plt = (struct plt_entry **)
10160 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10161 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10162
10163 if (local_plt[r_symndx] != NULL)
10164 {
10165 struct plt_entry *ent;
10166
10167 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10168 if (ent->addend == rel->r_addend
10169 && ent->plt.offset != (bfd_vma) -1)
10170 {
10171 *plt_ent = ent;
10172 return ppc_stub_plt_call;
10173 }
10174 }
10175 }
10176
10177 /* Determine where the call point is. */
10178 location = (input_sec->output_offset
10179 + input_sec->output_section->vma
10180 + rel->r_offset);
10181
10182 branch_offset = destination - location;
10183 r_type = ELF64_R_TYPE (rel->r_info);
10184
10185 /* Determine if a long branch stub is needed. */
10186 max_branch_offset = 1 << 25;
10187 if (r_type == R_PPC64_REL14
10188 || r_type == R_PPC64_REL14_BRTAKEN
10189 || r_type == R_PPC64_REL14_BRNTAKEN)
10190 max_branch_offset = 1 << 15;
10191
10192 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10193 /* We need a stub. Figure out whether a long_branch or plt_branch
10194 is needed later. */
10195 return ppc_stub_long_branch;
10196
10197 return ppc_stub_none;
10198 }
10199
10200 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10201 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10202 . mflr %r12
10203 . bcl 20,31,1f
10204 .1: mflr %r11
10205 . mtlr %r12
10206 . lis %r12,xxx-1b@highest
10207 . ori %r12,%r12,xxx-1b@higher
10208 . sldi %r12,%r12,32
10209 . oris %r12,%r12,xxx-1b@high
10210 . ori %r12,%r12,xxx-1b@l
10211 . add/ldx %r12,%r11,%r12 */
10212
10213 static bfd_byte *
10214 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10215 {
10216 bfd_put_32 (abfd, MFLR_R12, p);
10217 p += 4;
10218 bfd_put_32 (abfd, BCL_20_31, p);
10219 p += 4;
10220 bfd_put_32 (abfd, MFLR_R11, p);
10221 p += 4;
10222 bfd_put_32 (abfd, MTLR_R12, p);
10223 p += 4;
10224 if (off + 0x8000 < 0x10000)
10225 {
10226 if (load)
10227 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10228 else
10229 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10230 p += 4;
10231 }
10232 else if (off + 0x80008000ULL < 0x100000000ULL)
10233 {
10234 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10235 p += 4;
10236 if (load)
10237 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10238 else
10239 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10240 p += 4;
10241 }
10242 else
10243 {
10244 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10245 {
10246 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10247 p += 4;
10248 }
10249 else
10250 {
10251 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10252 p += 4;
10253 if (((off >> 32) & 0xffff) != 0)
10254 {
10255 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10256 p += 4;
10257 }
10258 }
10259 if (((off >> 32) & 0xffffffffULL) != 0)
10260 {
10261 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10262 p += 4;
10263 }
10264 if (PPC_HI (off) != 0)
10265 {
10266 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10267 p += 4;
10268 }
10269 if (PPC_LO (off) != 0)
10270 {
10271 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10272 p += 4;
10273 }
10274 if (load)
10275 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10276 else
10277 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10278 p += 4;
10279 }
10280 return p;
10281 }
10282
10283 static unsigned int
10284 size_offset (bfd_vma off)
10285 {
10286 unsigned int size;
10287 if (off + 0x8000 < 0x10000)
10288 size = 4;
10289 else if (off + 0x80008000ULL < 0x100000000ULL)
10290 size = 8;
10291 else
10292 {
10293 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10294 size = 4;
10295 else
10296 {
10297 size = 4;
10298 if (((off >> 32) & 0xffff) != 0)
10299 size += 4;
10300 }
10301 if (((off >> 32) & 0xffffffffULL) != 0)
10302 size += 4;
10303 if (PPC_HI (off) != 0)
10304 size += 4;
10305 if (PPC_LO (off) != 0)
10306 size += 4;
10307 size += 4;
10308 }
10309 return size + 16;
10310 }
10311
10312 static unsigned int
10313 num_relocs_for_offset (bfd_vma off)
10314 {
10315 unsigned int num_rel;
10316 if (off + 0x8000 < 0x10000)
10317 num_rel = 1;
10318 else if (off + 0x80008000ULL < 0x100000000ULL)
10319 num_rel = 2;
10320 else
10321 {
10322 num_rel = 1;
10323 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10324 && ((off >> 32) & 0xffff) != 0)
10325 num_rel += 1;
10326 if (PPC_HI (off) != 0)
10327 num_rel += 1;
10328 if (PPC_LO (off) != 0)
10329 num_rel += 1;
10330 }
10331 return num_rel;
10332 }
10333
10334 static Elf_Internal_Rela *
10335 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10336 bfd_vma roff, bfd_vma targ, bfd_vma off)
10337 {
10338 bfd_vma relative_targ = targ - (roff - 8);
10339 if (bfd_big_endian (info->output_bfd))
10340 roff += 2;
10341 r->r_offset = roff;
10342 r->r_addend = relative_targ + roff;
10343 if (off + 0x8000 < 0x10000)
10344 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10345 else if (off + 0x80008000ULL < 0x100000000ULL)
10346 {
10347 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10348 ++r;
10349 roff += 4;
10350 r->r_offset = roff;
10351 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10352 r->r_addend = relative_targ + roff;
10353 }
10354 else
10355 {
10356 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10357 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10358 else
10359 {
10360 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10361 if (((off >> 32) & 0xffff) != 0)
10362 {
10363 ++r;
10364 roff += 4;
10365 r->r_offset = roff;
10366 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10367 r->r_addend = relative_targ + roff;
10368 }
10369 }
10370 if (((off >> 32) & 0xffffffffULL) != 0)
10371 roff += 4;
10372 if (PPC_HI (off) != 0)
10373 {
10374 ++r;
10375 roff += 4;
10376 r->r_offset = roff;
10377 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10378 r->r_addend = relative_targ + roff;
10379 }
10380 if (PPC_LO (off) != 0)
10381 {
10382 ++r;
10383 roff += 4;
10384 r->r_offset = roff;
10385 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10386 r->r_addend = relative_targ + roff;
10387 }
10388 }
10389 return r;
10390 }
10391
10392 static bfd_byte *
10393 build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10394 bfd_boolean load)
10395 {
10396 uint64_t insn;
10397 if (off - odd + (1ULL << 33) < 1ULL << 34)
10398 {
10399 off -= odd;
10400 if (odd)
10401 {
10402 bfd_put_32 (abfd, NOP, p);
10403 p += 4;
10404 }
10405 if (load)
10406 insn = PLD_R12_PC;
10407 else
10408 insn = PADDI_R12_PC;
10409 insn |= D34 (off);
10410 bfd_put_32 (abfd, insn >> 32, p);
10411 p += 4;
10412 bfd_put_32 (abfd, insn, p);
10413 }
10414 /* The minimum value for paddi is -0x200000000. The minimum value
10415 for li is -0x8000, which when shifted by 34 and added gives a
10416 minimum value of -0x2000200000000. The maximum value is
10417 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10418 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10419 {
10420 off -= 8 - odd;
10421 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10422 p += 4;
10423 if (!odd)
10424 {
10425 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10426 p += 4;
10427 }
10428 insn = PADDI_R12_PC | D34 (off);
10429 bfd_put_32 (abfd, insn >> 32, p);
10430 p += 4;
10431 bfd_put_32 (abfd, insn, p);
10432 p += 4;
10433 if (odd)
10434 {
10435 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10436 p += 4;
10437 }
10438 if (load)
10439 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10440 else
10441 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10442 }
10443 else
10444 {
10445 off -= odd + 8;
10446 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10447 p += 4;
10448 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10449 p += 4;
10450 if (odd)
10451 {
10452 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10453 p += 4;
10454 }
10455 insn = PADDI_R12_PC | D34 (off);
10456 bfd_put_32 (abfd, insn >> 32, p);
10457 p += 4;
10458 bfd_put_32 (abfd, insn, p);
10459 p += 4;
10460 if (!odd)
10461 {
10462 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10463 p += 4;
10464 }
10465 if (load)
10466 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10467 else
10468 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10469 }
10470 p += 4;
10471 return p;
10472 }
10473
10474 static unsigned int
10475 size_powerxx_offset (bfd_vma off, int odd)
10476 {
10477 if (off - odd + (1ULL << 33) < 1ULL << 34)
10478 return odd + 8;
10479 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10480 return 20;
10481 else
10482 return 24;
10483 }
10484
10485 static unsigned int
10486 num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10487 {
10488 if (off - odd + (1ULL << 33) < 1ULL << 34)
10489 return 1;
10490 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10491 return 2;
10492 else
10493 return 3;
10494 }
10495
10496 static Elf_Internal_Rela *
10497 emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10498 Elf_Internal_Rela *r, bfd_vma roff,
10499 bfd_vma targ, bfd_vma off, int odd)
10500 {
10501 if (off - odd + (1ULL << 33) < 1ULL << 34)
10502 roff += odd;
10503 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10504 {
10505 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10506 r->r_offset = roff + d_offset;
10507 r->r_addend = targ + 8 - odd - d_offset;
10508 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10509 ++r;
10510 roff += 8 - odd;
10511 }
10512 else
10513 {
10514 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10515 r->r_offset = roff + d_offset;
10516 r->r_addend = targ + 8 + odd - d_offset;
10517 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10518 ++r;
10519 roff += 4;
10520 r->r_offset = roff + d_offset;
10521 r->r_addend = targ + 4 + odd - d_offset;
10522 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10523 ++r;
10524 roff += 4 + odd;
10525 }
10526 r->r_offset = roff;
10527 r->r_addend = targ;
10528 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10529 return r;
10530 }
10531
10532 /* Emit .eh_frame opcode to advance pc by DELTA. */
10533
10534 static bfd_byte *
10535 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10536 {
10537 delta /= 4;
10538 if (delta < 64)
10539 *eh++ = DW_CFA_advance_loc + delta;
10540 else if (delta < 256)
10541 {
10542 *eh++ = DW_CFA_advance_loc1;
10543 *eh++ = delta;
10544 }
10545 else if (delta < 65536)
10546 {
10547 *eh++ = DW_CFA_advance_loc2;
10548 bfd_put_16 (abfd, delta, eh);
10549 eh += 2;
10550 }
10551 else
10552 {
10553 *eh++ = DW_CFA_advance_loc4;
10554 bfd_put_32 (abfd, delta, eh);
10555 eh += 4;
10556 }
10557 return eh;
10558 }
10559
10560 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10561
10562 static unsigned int
10563 eh_advance_size (unsigned int delta)
10564 {
10565 if (delta < 64 * 4)
10566 /* DW_CFA_advance_loc+[1..63]. */
10567 return 1;
10568 if (delta < 256 * 4)
10569 /* DW_CFA_advance_loc1, byte. */
10570 return 2;
10571 if (delta < 65536 * 4)
10572 /* DW_CFA_advance_loc2, 2 bytes. */
10573 return 3;
10574 /* DW_CFA_advance_loc4, 4 bytes. */
10575 return 5;
10576 }
10577
10578 /* With power7 weakly ordered memory model, it is possible for ld.so
10579 to update a plt entry in one thread and have another thread see a
10580 stale zero toc entry. To avoid this we need some sort of acquire
10581 barrier in the call stub. One solution is to make the load of the
10582 toc word seem to appear to depend on the load of the function entry
10583 word. Another solution is to test for r2 being zero, and branch to
10584 the appropriate glink entry if so.
10585
10586 . fake dep barrier compare
10587 . ld 12,xxx(2) ld 12,xxx(2)
10588 . mtctr 12 mtctr 12
10589 . xor 11,12,12 ld 2,xxx+8(2)
10590 . add 2,2,11 cmpldi 2,0
10591 . ld 2,xxx+8(2) bnectr+
10592 . bctr b <glink_entry>
10593
10594 The solution involving the compare turns out to be faster, so
10595 that's what we use unless the branch won't reach. */
10596
10597 #define ALWAYS_USE_FAKE_DEP 0
10598 #define ALWAYS_EMIT_R2SAVE 0
10599
10600 static inline unsigned int
10601 plt_stub_size (struct ppc_link_hash_table *htab,
10602 struct ppc_stub_hash_entry *stub_entry,
10603 bfd_vma off)
10604 {
10605 unsigned size;
10606
10607 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10608 {
10609 if (htab->powerxx_stubs)
10610 {
10611 bfd_vma start = (stub_entry->stub_offset
10612 + stub_entry->group->stub_sec->output_offset
10613 + stub_entry->group->stub_sec->output_section->vma);
10614 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10615 start += 4;
10616 size = 8 + size_powerxx_offset (off, start & 4);
10617 }
10618 else
10619 size = 8 + size_offset (off - 8);
10620 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10621 size += 4;
10622 return size;
10623 }
10624
10625 size = 12;
10626 if (ALWAYS_EMIT_R2SAVE
10627 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10628 size += 4;
10629 if (PPC_HA (off) != 0)
10630 size += 4;
10631 if (htab->opd_abi)
10632 {
10633 size += 4;
10634 if (htab->params->plt_static_chain)
10635 size += 4;
10636 if (htab->params->plt_thread_safe
10637 && htab->elf.dynamic_sections_created
10638 && stub_entry->h != NULL
10639 && stub_entry->h->elf.dynindx != -1)
10640 size += 8;
10641 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10642 size += 4;
10643 }
10644 if (stub_entry->h != NULL
10645 && (stub_entry->h == htab->tls_get_addr_fd
10646 || stub_entry->h == htab->tls_get_addr)
10647 && htab->params->tls_get_addr_opt)
10648 {
10649 size += 7 * 4;
10650 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10651 size += 6 * 4;
10652 }
10653 return size;
10654 }
10655
10656 /* Depending on the sign of plt_stub_align:
10657 If positive, return the padding to align to a 2**plt_stub_align
10658 boundary.
10659 If negative, if this stub would cross fewer 2**plt_stub_align
10660 boundaries if we align, then return the padding needed to do so. */
10661
10662 static inline unsigned int
10663 plt_stub_pad (struct ppc_link_hash_table *htab,
10664 struct ppc_stub_hash_entry *stub_entry,
10665 bfd_vma plt_off)
10666 {
10667 int stub_align;
10668 unsigned stub_size;
10669 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10670
10671 if (htab->params->plt_stub_align >= 0)
10672 {
10673 stub_align = 1 << htab->params->plt_stub_align;
10674 if ((stub_off & (stub_align - 1)) != 0)
10675 return stub_align - (stub_off & (stub_align - 1));
10676 return 0;
10677 }
10678
10679 stub_align = 1 << -htab->params->plt_stub_align;
10680 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10681 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10682 > ((stub_size - 1) & -stub_align))
10683 return stub_align - (stub_off & (stub_align - 1));
10684 return 0;
10685 }
10686
10687 /* Build a .plt call stub. */
10688
10689 static inline bfd_byte *
10690 build_plt_stub (struct ppc_link_hash_table *htab,
10691 struct ppc_stub_hash_entry *stub_entry,
10692 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10693 {
10694 bfd *obfd = htab->params->stub_bfd;
10695 bfd_boolean plt_load_toc = htab->opd_abi;
10696 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10697 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10698 && htab->elf.dynamic_sections_created
10699 && stub_entry->h != NULL
10700 && stub_entry->h->elf.dynindx != -1);
10701 bfd_boolean use_fake_dep = plt_thread_safe;
10702 bfd_vma cmp_branch_off = 0;
10703
10704 if (!ALWAYS_USE_FAKE_DEP
10705 && plt_load_toc
10706 && plt_thread_safe
10707 && !((stub_entry->h == htab->tls_get_addr_fd
10708 || stub_entry->h == htab->tls_get_addr)
10709 && htab->params->tls_get_addr_opt))
10710 {
10711 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10712 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10713 / PLT_ENTRY_SIZE (htab));
10714 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10715 bfd_vma to, from;
10716
10717 if (pltindex > 32768)
10718 glinkoff += (pltindex - 32768) * 4;
10719 to = (glinkoff
10720 + htab->glink->output_offset
10721 + htab->glink->output_section->vma);
10722 from = (p - stub_entry->group->stub_sec->contents
10723 + 4 * (ALWAYS_EMIT_R2SAVE
10724 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10725 + 4 * (PPC_HA (offset) != 0)
10726 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10727 != PPC_HA (offset))
10728 + 4 * (plt_static_chain != 0)
10729 + 20
10730 + stub_entry->group->stub_sec->output_offset
10731 + stub_entry->group->stub_sec->output_section->vma);
10732 cmp_branch_off = to - from;
10733 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10734 }
10735
10736 if (PPC_HA (offset) != 0)
10737 {
10738 if (r != NULL)
10739 {
10740 if (ALWAYS_EMIT_R2SAVE
10741 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10742 r[0].r_offset += 4;
10743 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10744 r[1].r_offset = r[0].r_offset + 4;
10745 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10746 r[1].r_addend = r[0].r_addend;
10747 if (plt_load_toc)
10748 {
10749 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10750 {
10751 r[2].r_offset = r[1].r_offset + 4;
10752 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10753 r[2].r_addend = r[0].r_addend;
10754 }
10755 else
10756 {
10757 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10758 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10759 r[2].r_addend = r[0].r_addend + 8;
10760 if (plt_static_chain)
10761 {
10762 r[3].r_offset = r[2].r_offset + 4;
10763 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10764 r[3].r_addend = r[0].r_addend + 16;
10765 }
10766 }
10767 }
10768 }
10769 if (ALWAYS_EMIT_R2SAVE
10770 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10771 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10772 if (plt_load_toc)
10773 {
10774 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10775 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10776 }
10777 else
10778 {
10779 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10780 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10781 }
10782 if (plt_load_toc
10783 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10784 {
10785 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10786 offset = 0;
10787 }
10788 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10789 if (plt_load_toc)
10790 {
10791 if (use_fake_dep)
10792 {
10793 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10794 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10795 }
10796 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10797 if (plt_static_chain)
10798 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10799 }
10800 }
10801 else
10802 {
10803 if (r != NULL)
10804 {
10805 if (ALWAYS_EMIT_R2SAVE
10806 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10807 r[0].r_offset += 4;
10808 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10809 if (plt_load_toc)
10810 {
10811 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10812 {
10813 r[1].r_offset = r[0].r_offset + 4;
10814 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10815 r[1].r_addend = r[0].r_addend;
10816 }
10817 else
10818 {
10819 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10820 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10821 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10822 if (plt_static_chain)
10823 {
10824 r[2].r_offset = r[1].r_offset + 4;
10825 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10826 r[2].r_addend = r[0].r_addend + 8;
10827 }
10828 }
10829 }
10830 }
10831 if (ALWAYS_EMIT_R2SAVE
10832 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10833 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10834 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10835 if (plt_load_toc
10836 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10837 {
10838 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10839 offset = 0;
10840 }
10841 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10842 if (plt_load_toc)
10843 {
10844 if (use_fake_dep)
10845 {
10846 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10847 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10848 }
10849 if (plt_static_chain)
10850 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10851 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10852 }
10853 }
10854 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10855 {
10856 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10857 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10858 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10859 }
10860 else
10861 bfd_put_32 (obfd, BCTR, p), p += 4;
10862 return p;
10863 }
10864
10865 /* Build a special .plt call stub for __tls_get_addr. */
10866
10867 #define LD_R11_0R3 0xe9630000
10868 #define LD_R12_0R3 0xe9830000
10869 #define MR_R0_R3 0x7c601b78
10870 #define CMPDI_R11_0 0x2c2b0000
10871 #define ADD_R3_R12_R13 0x7c6c6a14
10872 #define BEQLR 0x4d820020
10873 #define MR_R3_R0 0x7c030378
10874 #define STD_R11_0R1 0xf9610000
10875 #define BCTRL 0x4e800421
10876 #define LD_R11_0R1 0xe9610000
10877 #define MTLR_R11 0x7d6803a6
10878
10879 static inline bfd_byte *
10880 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10881 struct ppc_stub_hash_entry *stub_entry,
10882 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10883 {
10884 bfd *obfd = htab->params->stub_bfd;
10885 bfd_byte *loc = p;
10886
10887 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10888 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10889 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10890 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10891 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10892 bfd_put_32 (obfd, BEQLR, p), p += 4;
10893 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10894 if (r != NULL)
10895 r[0].r_offset += 7 * 4;
10896 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
10897 return build_plt_stub (htab, stub_entry, p, offset, r);
10898
10899 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10900 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10901
10902 if (r != NULL)
10903 r[0].r_offset += 2 * 4;
10904 p = build_plt_stub (htab, stub_entry, p, offset, r);
10905 bfd_put_32 (obfd, BCTRL, p - 4);
10906
10907 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10908 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10909 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10910 bfd_put_32 (obfd, BLR, p), p += 4;
10911
10912 if (htab->glink_eh_frame != NULL
10913 && htab->glink_eh_frame->size != 0)
10914 {
10915 bfd_byte *base, *eh;
10916 unsigned int lr_used, delta;
10917
10918 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10919 eh = base + stub_entry->group->eh_size;
10920 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10921 delta = lr_used - stub_entry->group->lr_restore;
10922 stub_entry->group->lr_restore = lr_used + 16;
10923 eh = eh_advance (htab->elf.dynobj, eh, delta);
10924 *eh++ = DW_CFA_offset_extended_sf;
10925 *eh++ = 65;
10926 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10927 *eh++ = DW_CFA_advance_loc + 4;
10928 *eh++ = DW_CFA_restore_extended;
10929 *eh++ = 65;
10930 stub_entry->group->eh_size = eh - base;
10931 }
10932 return p;
10933 }
10934
10935 static Elf_Internal_Rela *
10936 get_relocs (asection *sec, int count)
10937 {
10938 Elf_Internal_Rela *relocs;
10939 struct bfd_elf_section_data *elfsec_data;
10940
10941 elfsec_data = elf_section_data (sec);
10942 relocs = elfsec_data->relocs;
10943 if (relocs == NULL)
10944 {
10945 bfd_size_type relsize;
10946 relsize = sec->reloc_count * sizeof (*relocs);
10947 relocs = bfd_alloc (sec->owner, relsize);
10948 if (relocs == NULL)
10949 return NULL;
10950 elfsec_data->relocs = relocs;
10951 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10952 sizeof (Elf_Internal_Shdr));
10953 if (elfsec_data->rela.hdr == NULL)
10954 return NULL;
10955 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10956 * sizeof (Elf64_External_Rela));
10957 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10958 sec->reloc_count = 0;
10959 }
10960 relocs += sec->reloc_count;
10961 sec->reloc_count += count;
10962 return relocs;
10963 }
10964
10965 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10966 forms, to the equivalent relocs against the global symbol given by
10967 STUB_ENTRY->H. */
10968
10969 static bfd_boolean
10970 use_global_in_relocs (struct ppc_link_hash_table *htab,
10971 struct ppc_stub_hash_entry *stub_entry,
10972 Elf_Internal_Rela *r, unsigned int num_rel)
10973 {
10974 struct elf_link_hash_entry **hashes;
10975 unsigned long symndx;
10976 struct ppc_link_hash_entry *h;
10977 bfd_vma symval;
10978
10979 /* Relocs are always against symbols in their own object file. Fake
10980 up global sym hashes for the stub bfd (which has no symbols). */
10981 hashes = elf_sym_hashes (htab->params->stub_bfd);
10982 if (hashes == NULL)
10983 {
10984 bfd_size_type hsize;
10985
10986 /* When called the first time, stub_globals will contain the
10987 total number of symbols seen during stub sizing. After
10988 allocating, stub_globals is used as an index to fill the
10989 hashes array. */
10990 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10991 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10992 if (hashes == NULL)
10993 return FALSE;
10994 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10995 htab->stub_globals = 1;
10996 }
10997 symndx = htab->stub_globals++;
10998 h = stub_entry->h;
10999 hashes[symndx] = &h->elf;
11000 if (h->oh != NULL && h->oh->is_func)
11001 h = ppc_follow_link (h->oh);
11002 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11003 || h->elf.root.type == bfd_link_hash_defweak);
11004 symval = (h->elf.root.u.def.value
11005 + h->elf.root.u.def.section->output_offset
11006 + h->elf.root.u.def.section->output_section->vma);
11007 while (num_rel-- != 0)
11008 {
11009 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11010 if (h->elf.root.u.def.section != stub_entry->target_section)
11011 {
11012 /* H is an opd symbol. The addend must be zero, and the
11013 branch reloc is the only one we can convert. */
11014 r->r_addend = 0;
11015 break;
11016 }
11017 else
11018 r->r_addend -= symval;
11019 --r;
11020 }
11021 return TRUE;
11022 }
11023
11024 static bfd_vma
11025 get_r2off (struct bfd_link_info *info,
11026 struct ppc_stub_hash_entry *stub_entry)
11027 {
11028 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11029 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11030
11031 if (r2off == 0)
11032 {
11033 /* Support linking -R objects. Get the toc pointer from the
11034 opd entry. */
11035 char buf[8];
11036 if (!htab->opd_abi)
11037 return r2off;
11038 asection *opd = stub_entry->h->elf.root.u.def.section;
11039 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11040
11041 if (strcmp (opd->name, ".opd") != 0
11042 || opd->reloc_count != 0)
11043 {
11044 info->callbacks->einfo
11045 (_("%P: cannot find opd entry toc for `%pT'\n"),
11046 stub_entry->h->elf.root.root.string);
11047 bfd_set_error (bfd_error_bad_value);
11048 return (bfd_vma) -1;
11049 }
11050 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11051 return (bfd_vma) -1;
11052 r2off = bfd_get_64 (opd->owner, buf);
11053 r2off -= elf_gp (info->output_bfd);
11054 }
11055 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11056 return r2off;
11057 }
11058
11059 static bfd_boolean
11060 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11061 {
11062 struct ppc_stub_hash_entry *stub_entry;
11063 struct ppc_branch_hash_entry *br_entry;
11064 struct bfd_link_info *info;
11065 struct ppc_link_hash_table *htab;
11066 bfd_byte *loc;
11067 bfd_byte *p, *relp;
11068 bfd_vma targ, off;
11069 Elf_Internal_Rela *r;
11070 asection *plt;
11071 int num_rel;
11072 int odd;
11073
11074 /* Massage our args to the form they really have. */
11075 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11076 info = in_arg;
11077
11078 htab = ppc_hash_table (info);
11079 if (htab == NULL)
11080 return FALSE;
11081
11082 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11083 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11084
11085 htab->stub_count[stub_entry->stub_type - 1] += 1;
11086 switch (stub_entry->stub_type)
11087 {
11088 case ppc_stub_long_branch:
11089 case ppc_stub_long_branch_r2off:
11090 /* Branches are relative. This is where we are going to. */
11091 targ = (stub_entry->target_value
11092 + stub_entry->target_section->output_offset
11093 + stub_entry->target_section->output_section->vma);
11094 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11095
11096 /* And this is where we are coming from. */
11097 off = (stub_entry->stub_offset
11098 + stub_entry->group->stub_sec->output_offset
11099 + stub_entry->group->stub_sec->output_section->vma);
11100 off = targ - off;
11101
11102 p = loc;
11103 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11104 {
11105 bfd_vma r2off = get_r2off (info, stub_entry);
11106
11107 if (r2off == (bfd_vma) -1)
11108 {
11109 htab->stub_error = TRUE;
11110 return FALSE;
11111 }
11112 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11113 p += 4;
11114 if (PPC_HA (r2off) != 0)
11115 {
11116 bfd_put_32 (htab->params->stub_bfd,
11117 ADDIS_R2_R2 | PPC_HA (r2off), p);
11118 p += 4;
11119 }
11120 if (PPC_LO (r2off) != 0)
11121 {
11122 bfd_put_32 (htab->params->stub_bfd,
11123 ADDI_R2_R2 | PPC_LO (r2off), p);
11124 p += 4;
11125 }
11126 off -= p - loc;
11127 }
11128 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11129 p += 4;
11130
11131 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11132 {
11133 _bfd_error_handler
11134 (_("long branch stub `%s' offset overflow"),
11135 stub_entry->root.string);
11136 htab->stub_error = TRUE;
11137 return FALSE;
11138 }
11139
11140 if (info->emitrelocations)
11141 {
11142 r = get_relocs (stub_entry->group->stub_sec, 1);
11143 if (r == NULL)
11144 return FALSE;
11145 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11146 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11147 r->r_addend = targ;
11148 if (stub_entry->h != NULL
11149 && !use_global_in_relocs (htab, stub_entry, r, 1))
11150 return FALSE;
11151 }
11152 break;
11153
11154 case ppc_stub_plt_branch:
11155 case ppc_stub_plt_branch_r2off:
11156 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11157 stub_entry->root.string + 9,
11158 FALSE, FALSE);
11159 if (br_entry == NULL)
11160 {
11161 _bfd_error_handler (_("can't find branch stub `%s'"),
11162 stub_entry->root.string);
11163 htab->stub_error = TRUE;
11164 return FALSE;
11165 }
11166
11167 targ = (stub_entry->target_value
11168 + stub_entry->target_section->output_offset
11169 + stub_entry->target_section->output_section->vma);
11170 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11171 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11172
11173 bfd_put_64 (htab->brlt->owner, targ,
11174 htab->brlt->contents + br_entry->offset);
11175
11176 if (br_entry->iter == htab->stub_iteration)
11177 {
11178 br_entry->iter = 0;
11179
11180 if (htab->relbrlt != NULL)
11181 {
11182 /* Create a reloc for the branch lookup table entry. */
11183 Elf_Internal_Rela rela;
11184 bfd_byte *rl;
11185
11186 rela.r_offset = (br_entry->offset
11187 + htab->brlt->output_offset
11188 + htab->brlt->output_section->vma);
11189 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11190 rela.r_addend = targ;
11191
11192 rl = htab->relbrlt->contents;
11193 rl += (htab->relbrlt->reloc_count++
11194 * sizeof (Elf64_External_Rela));
11195 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11196 }
11197 else if (info->emitrelocations)
11198 {
11199 r = get_relocs (htab->brlt, 1);
11200 if (r == NULL)
11201 return FALSE;
11202 /* brlt, being SEC_LINKER_CREATED does not go through the
11203 normal reloc processing. Symbols and offsets are not
11204 translated from input file to output file form, so
11205 set up the offset per the output file. */
11206 r->r_offset = (br_entry->offset
11207 + htab->brlt->output_offset
11208 + htab->brlt->output_section->vma);
11209 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11210 r->r_addend = targ;
11211 }
11212 }
11213
11214 targ = (br_entry->offset
11215 + htab->brlt->output_offset
11216 + htab->brlt->output_section->vma);
11217
11218 off = (elf_gp (info->output_bfd)
11219 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11220 off = targ - off;
11221
11222 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11223 {
11224 info->callbacks->einfo
11225 (_("%P: linkage table error against `%pT'\n"),
11226 stub_entry->root.string);
11227 bfd_set_error (bfd_error_bad_value);
11228 htab->stub_error = TRUE;
11229 return FALSE;
11230 }
11231
11232 if (info->emitrelocations)
11233 {
11234 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11235 if (r == NULL)
11236 return FALSE;
11237 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11238 if (bfd_big_endian (info->output_bfd))
11239 r[0].r_offset += 2;
11240 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11241 r[0].r_offset += 4;
11242 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11243 r[0].r_addend = targ;
11244 if (PPC_HA (off) != 0)
11245 {
11246 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11247 r[1].r_offset = r[0].r_offset + 4;
11248 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11249 r[1].r_addend = r[0].r_addend;
11250 }
11251 }
11252
11253 p = loc;
11254 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11255 {
11256 if (PPC_HA (off) != 0)
11257 {
11258 bfd_put_32 (htab->params->stub_bfd,
11259 ADDIS_R12_R2 | PPC_HA (off), p);
11260 p += 4;
11261 bfd_put_32 (htab->params->stub_bfd,
11262 LD_R12_0R12 | PPC_LO (off), p);
11263 }
11264 else
11265 bfd_put_32 (htab->params->stub_bfd,
11266 LD_R12_0R2 | PPC_LO (off), p);
11267 }
11268 else
11269 {
11270 bfd_vma r2off = get_r2off (info, stub_entry);
11271
11272 if (r2off == (bfd_vma) -1)
11273 {
11274 htab->stub_error = TRUE;
11275 return FALSE;
11276 }
11277
11278 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11279 p += 4;
11280 if (PPC_HA (off) != 0)
11281 {
11282 bfd_put_32 (htab->params->stub_bfd,
11283 ADDIS_R12_R2 | PPC_HA (off), p);
11284 p += 4;
11285 bfd_put_32 (htab->params->stub_bfd,
11286 LD_R12_0R12 | PPC_LO (off), p);
11287 }
11288 else
11289 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11290
11291 if (PPC_HA (r2off) != 0)
11292 {
11293 p += 4;
11294 bfd_put_32 (htab->params->stub_bfd,
11295 ADDIS_R2_R2 | PPC_HA (r2off), p);
11296 }
11297 if (PPC_LO (r2off) != 0)
11298 {
11299 p += 4;
11300 bfd_put_32 (htab->params->stub_bfd,
11301 ADDI_R2_R2 | PPC_LO (r2off), p);
11302 }
11303 }
11304 p += 4;
11305 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11306 p += 4;
11307 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11308 p += 4;
11309 break;
11310
11311 case ppc_stub_long_branch_notoc:
11312 case ppc_stub_long_branch_both:
11313 case ppc_stub_plt_branch_notoc:
11314 case ppc_stub_plt_branch_both:
11315 case ppc_stub_plt_call_notoc:
11316 case ppc_stub_plt_call_both:
11317 p = loc;
11318 off = (stub_entry->stub_offset
11319 + stub_entry->group->stub_sec->output_offset
11320 + stub_entry->group->stub_sec->output_section->vma);
11321 if (stub_entry->stub_type == ppc_stub_long_branch_both
11322 || stub_entry->stub_type == ppc_stub_plt_branch_both
11323 || stub_entry->stub_type == ppc_stub_plt_call_both)
11324 {
11325 off += 4;
11326 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11327 p += 4;
11328 }
11329 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11330 {
11331 targ = stub_entry->plt_ent->plt.offset & ~1;
11332 if (targ >= (bfd_vma) -2)
11333 abort ();
11334
11335 plt = htab->elf.splt;
11336 if (!htab->elf.dynamic_sections_created
11337 || stub_entry->h == NULL
11338 || stub_entry->h->elf.dynindx == -1)
11339 {
11340 if (stub_entry->symtype == STT_GNU_IFUNC)
11341 plt = htab->elf.iplt;
11342 else
11343 plt = htab->pltlocal;
11344 }
11345 targ += plt->output_offset + plt->output_section->vma;
11346 }
11347 else
11348 targ = (stub_entry->target_value
11349 + stub_entry->target_section->output_offset
11350 + stub_entry->target_section->output_section->vma);
11351 odd = off & 4;
11352 off = targ - off;
11353
11354 relp = p;
11355 num_rel = 0;
11356 if (htab->powerxx_stubs)
11357 {
11358 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11359 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11360 }
11361 else
11362 {
11363 /* The notoc stubs calculate their target (either a PLT entry or
11364 the global entry point of a function) relative to the PC
11365 returned by the "bcl" two instructions past the start of the
11366 sequence emitted by build_offset. The offset is therefore 8
11367 less than calculated from the start of the sequence. */
11368 off -= 8;
11369 p = build_offset (htab->params->stub_bfd, p, off,
11370 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11371 }
11372
11373 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11374 {
11375 bfd_vma from;
11376 num_rel = 1;
11377 from = (stub_entry->stub_offset
11378 + stub_entry->group->stub_sec->output_offset
11379 + stub_entry->group->stub_sec->output_section->vma
11380 + (p - loc));
11381 bfd_put_32 (htab->params->stub_bfd,
11382 B_DOT | ((targ - from) & 0x3fffffc), p);
11383 }
11384 else
11385 {
11386 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11387 p += 4;
11388 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11389 }
11390 p += 4;
11391
11392 if (info->emitrelocations)
11393 {
11394 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11395 if (htab->powerxx_stubs)
11396 num_rel += num_relocs_for_powerxx_offset (off, odd);
11397 else
11398 {
11399 num_rel += num_relocs_for_offset (off);
11400 roff += 16;
11401 }
11402 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11403 if (r == NULL)
11404 return FALSE;
11405 if (htab->powerxx_stubs)
11406 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11407 else
11408 r = emit_relocs_for_offset (info, r, roff, targ, off);
11409 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11410 || stub_entry->stub_type == ppc_stub_long_branch_both)
11411 {
11412 ++r;
11413 roff = p - 4 - stub_entry->group->stub_sec->contents;
11414 r->r_offset = roff;
11415 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11416 r->r_addend = targ;
11417 if (stub_entry->h != NULL
11418 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11419 return FALSE;
11420 }
11421 }
11422
11423 if (!htab->powerxx_stubs
11424 && htab->glink_eh_frame != NULL
11425 && htab->glink_eh_frame->size != 0)
11426 {
11427 bfd_byte *base, *eh;
11428 unsigned int lr_used, delta;
11429
11430 base = (htab->glink_eh_frame->contents
11431 + stub_entry->group->eh_base + 17);
11432 eh = base + stub_entry->group->eh_size;
11433 lr_used = stub_entry->stub_offset + 8;
11434 if (stub_entry->stub_type == ppc_stub_long_branch_both
11435 || stub_entry->stub_type == ppc_stub_plt_branch_both
11436 || stub_entry->stub_type == ppc_stub_plt_call_both)
11437 lr_used += 4;
11438 delta = lr_used - stub_entry->group->lr_restore;
11439 stub_entry->group->lr_restore = lr_used + 8;
11440 eh = eh_advance (htab->elf.dynobj, eh, delta);
11441 *eh++ = DW_CFA_register;
11442 *eh++ = 65;
11443 *eh++ = 12;
11444 *eh++ = DW_CFA_advance_loc + 2;
11445 *eh++ = DW_CFA_restore_extended;
11446 *eh++ = 65;
11447 stub_entry->group->eh_size = eh - base;
11448 }
11449 break;
11450
11451 case ppc_stub_plt_call:
11452 case ppc_stub_plt_call_r2save:
11453 if (stub_entry->h != NULL
11454 && stub_entry->h->is_func_descriptor
11455 && stub_entry->h->oh != NULL)
11456 {
11457 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11458
11459 /* If the old-ABI "dot-symbol" is undefined make it weak so
11460 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11461 if (fh->elf.root.type == bfd_link_hash_undefined
11462 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11463 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11464 fh->elf.root.type = bfd_link_hash_undefweak;
11465 }
11466
11467 /* Now build the stub. */
11468 targ = stub_entry->plt_ent->plt.offset & ~1;
11469 if (targ >= (bfd_vma) -2)
11470 abort ();
11471
11472 plt = htab->elf.splt;
11473 if (!htab->elf.dynamic_sections_created
11474 || stub_entry->h == NULL
11475 || stub_entry->h->elf.dynindx == -1)
11476 {
11477 if (stub_entry->symtype == STT_GNU_IFUNC)
11478 plt = htab->elf.iplt;
11479 else
11480 plt = htab->pltlocal;
11481 }
11482 targ += plt->output_offset + plt->output_section->vma;
11483
11484 off = (elf_gp (info->output_bfd)
11485 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11486 off = targ - off;
11487
11488 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11489 {
11490 info->callbacks->einfo
11491 /* xgettext:c-format */
11492 (_("%P: linkage table error against `%pT'\n"),
11493 stub_entry->h != NULL
11494 ? stub_entry->h->elf.root.root.string
11495 : "<local sym>");
11496 bfd_set_error (bfd_error_bad_value);
11497 htab->stub_error = TRUE;
11498 return FALSE;
11499 }
11500
11501 r = NULL;
11502 if (info->emitrelocations)
11503 {
11504 r = get_relocs (stub_entry->group->stub_sec,
11505 ((PPC_HA (off) != 0)
11506 + (htab->opd_abi
11507 ? 2 + (htab->params->plt_static_chain
11508 && PPC_HA (off + 16) == PPC_HA (off))
11509 : 1)));
11510 if (r == NULL)
11511 return FALSE;
11512 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11513 if (bfd_big_endian (info->output_bfd))
11514 r[0].r_offset += 2;
11515 r[0].r_addend = targ;
11516 }
11517 if (stub_entry->h != NULL
11518 && (stub_entry->h == htab->tls_get_addr_fd
11519 || stub_entry->h == htab->tls_get_addr)
11520 && htab->params->tls_get_addr_opt)
11521 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11522 else
11523 p = build_plt_stub (htab, stub_entry, loc, off, r);
11524 break;
11525
11526 case ppc_stub_save_res:
11527 return TRUE;
11528
11529 default:
11530 BFD_FAIL ();
11531 return FALSE;
11532 }
11533
11534 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11535
11536 if (htab->params->emit_stub_syms)
11537 {
11538 struct elf_link_hash_entry *h;
11539 size_t len1, len2;
11540 char *name;
11541 const char *const stub_str[] = { "long_branch",
11542 "long_branch",
11543 "long_branch",
11544 "long_branch",
11545 "plt_branch",
11546 "plt_branch",
11547 "plt_branch",
11548 "plt_branch",
11549 "plt_call",
11550 "plt_call",
11551 "plt_call",
11552 "plt_call" };
11553
11554 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11555 len2 = strlen (stub_entry->root.string);
11556 name = bfd_malloc (len1 + len2 + 2);
11557 if (name == NULL)
11558 return FALSE;
11559 memcpy (name, stub_entry->root.string, 9);
11560 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11561 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11562 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11563 if (h == NULL)
11564 return FALSE;
11565 if (h->root.type == bfd_link_hash_new)
11566 {
11567 h->root.type = bfd_link_hash_defined;
11568 h->root.u.def.section = stub_entry->group->stub_sec;
11569 h->root.u.def.value = stub_entry->stub_offset;
11570 h->ref_regular = 1;
11571 h->def_regular = 1;
11572 h->ref_regular_nonweak = 1;
11573 h->forced_local = 1;
11574 h->non_elf = 0;
11575 h->root.linker_def = 1;
11576 }
11577 }
11578
11579 return TRUE;
11580 }
11581
11582 /* As above, but don't actually build the stub. Just bump offset so
11583 we know stub section sizes, and select plt_branch stubs where
11584 long_branch stubs won't do. */
11585
11586 static bfd_boolean
11587 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11588 {
11589 struct ppc_stub_hash_entry *stub_entry;
11590 struct bfd_link_info *info;
11591 struct ppc_link_hash_table *htab;
11592 asection *plt;
11593 bfd_vma targ, off, r2off;
11594 unsigned int size, extra, lr_used, delta, odd;
11595
11596 /* Massage our args to the form they really have. */
11597 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11598 info = in_arg;
11599
11600 htab = ppc_hash_table (info);
11601 if (htab == NULL)
11602 return FALSE;
11603
11604 /* Make a note of the offset within the stubs for this entry. */
11605 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11606
11607 if (stub_entry->h != NULL
11608 && stub_entry->h->save_res
11609 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11610 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11611 {
11612 /* Don't make stubs to out-of-line register save/restore
11613 functions. Instead, emit copies of the functions. */
11614 stub_entry->group->needs_save_res = 1;
11615 stub_entry->stub_type = ppc_stub_save_res;
11616 return TRUE;
11617 }
11618
11619 switch (stub_entry->stub_type)
11620 {
11621 case ppc_stub_plt_branch:
11622 case ppc_stub_plt_branch_r2off:
11623 /* Reset the stub type from the plt branch variant in case we now
11624 can reach with a shorter stub. */
11625 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11626 /* Fall through. */
11627 case ppc_stub_long_branch:
11628 case ppc_stub_long_branch_r2off:
11629 targ = (stub_entry->target_value
11630 + stub_entry->target_section->output_offset
11631 + stub_entry->target_section->output_section->vma);
11632 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11633 off = (stub_entry->stub_offset
11634 + stub_entry->group->stub_sec->output_offset
11635 + stub_entry->group->stub_sec->output_section->vma);
11636
11637 size = 4;
11638 r2off = 0;
11639 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11640 {
11641 r2off = get_r2off (info, stub_entry);
11642 if (r2off == (bfd_vma) -1)
11643 {
11644 htab->stub_error = TRUE;
11645 return FALSE;
11646 }
11647 size = 8;
11648 if (PPC_HA (r2off) != 0)
11649 size += 4;
11650 if (PPC_LO (r2off) != 0)
11651 size += 4;
11652 off += size - 4;
11653 }
11654 off = targ - off;
11655
11656 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11657 Do the same for -R objects without function descriptors. */
11658 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11659 && r2off == 0
11660 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11661 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11662 {
11663 struct ppc_branch_hash_entry *br_entry;
11664
11665 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11666 stub_entry->root.string + 9,
11667 TRUE, FALSE);
11668 if (br_entry == NULL)
11669 {
11670 _bfd_error_handler (_("can't build branch stub `%s'"),
11671 stub_entry->root.string);
11672 htab->stub_error = TRUE;
11673 return FALSE;
11674 }
11675
11676 if (br_entry->iter != htab->stub_iteration)
11677 {
11678 br_entry->iter = htab->stub_iteration;
11679 br_entry->offset = htab->brlt->size;
11680 htab->brlt->size += 8;
11681
11682 if (htab->relbrlt != NULL)
11683 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11684 else if (info->emitrelocations)
11685 {
11686 htab->brlt->reloc_count += 1;
11687 htab->brlt->flags |= SEC_RELOC;
11688 }
11689 }
11690
11691 targ = (br_entry->offset
11692 + htab->brlt->output_offset
11693 + htab->brlt->output_section->vma);
11694 off = (elf_gp (info->output_bfd)
11695 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11696 off = targ - off;
11697
11698 if (info->emitrelocations)
11699 {
11700 stub_entry->group->stub_sec->reloc_count
11701 += 1 + (PPC_HA (off) != 0);
11702 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11703 }
11704
11705 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11706 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11707 {
11708 size = 12;
11709 if (PPC_HA (off) != 0)
11710 size = 16;
11711 }
11712 else
11713 {
11714 size = 16;
11715 if (PPC_HA (off) != 0)
11716 size += 4;
11717
11718 if (PPC_HA (r2off) != 0)
11719 size += 4;
11720 if (PPC_LO (r2off) != 0)
11721 size += 4;
11722 }
11723 }
11724 else if (info->emitrelocations)
11725 {
11726 stub_entry->group->stub_sec->reloc_count += 1;
11727 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11728 }
11729 break;
11730
11731 case ppc_stub_plt_branch_notoc:
11732 case ppc_stub_plt_branch_both:
11733 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11734 /* Fall through. */
11735 case ppc_stub_long_branch_notoc:
11736 case ppc_stub_long_branch_both:
11737 off = (stub_entry->stub_offset
11738 + stub_entry->group->stub_sec->output_offset
11739 + stub_entry->group->stub_sec->output_section->vma);
11740 size = 0;
11741 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11742 size = 4;
11743 off += size;
11744 targ = (stub_entry->target_value
11745 + stub_entry->target_section->output_offset
11746 + stub_entry->target_section->output_section->vma);
11747 odd = off & 4;
11748 off = targ - off;
11749
11750 if (info->emitrelocations)
11751 {
11752 unsigned int num_rel;
11753 if (htab->powerxx_stubs)
11754 num_rel = num_relocs_for_powerxx_offset (off, odd);
11755 else
11756 num_rel = num_relocs_for_offset (off - 8);
11757 stub_entry->group->stub_sec->reloc_count += num_rel;
11758 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11759 }
11760
11761 if (htab->powerxx_stubs)
11762 extra = size_powerxx_offset (off, odd);
11763 else
11764 extra = size_offset (off - 8);
11765 /* Include branch insn plus those in the offset sequence. */
11766 size += 4 + extra;
11767 /* The branch insn is at the end, or "extra" bytes along. So
11768 its offset will be "extra" bytes less that that already
11769 calculated. */
11770 off -= extra;
11771
11772 if (!htab->powerxx_stubs)
11773 {
11774 /* After the bcl, lr has been modified so we need to emit
11775 .eh_frame info saying the return address is in r12. */
11776 lr_used = stub_entry->stub_offset + 8;
11777 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11778 lr_used += 4;
11779 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11780 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11781 DW_CFA_restore_extended 65. */
11782 delta = lr_used - stub_entry->group->lr_restore;
11783 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11784 stub_entry->group->lr_restore = lr_used + 8;
11785 }
11786
11787 /* If the branch can't reach, use a plt_branch. */
11788 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11789 {
11790 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11791 - ppc_stub_long_branch_notoc);
11792 size += 4;
11793 }
11794 else if (info->emitrelocations)
11795 stub_entry->group->stub_sec->reloc_count +=1;
11796 break;
11797
11798 case ppc_stub_plt_call_notoc:
11799 case ppc_stub_plt_call_both:
11800 off = (stub_entry->stub_offset
11801 + stub_entry->group->stub_sec->output_offset
11802 + stub_entry->group->stub_sec->output_section->vma);
11803 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11804 off += 4;
11805 targ = stub_entry->plt_ent->plt.offset & ~1;
11806 if (targ >= (bfd_vma) -2)
11807 abort ();
11808
11809 plt = htab->elf.splt;
11810 if (!htab->elf.dynamic_sections_created
11811 || stub_entry->h == NULL
11812 || stub_entry->h->elf.dynindx == -1)
11813 {
11814 if (stub_entry->symtype == STT_GNU_IFUNC)
11815 plt = htab->elf.iplt;
11816 else
11817 plt = htab->pltlocal;
11818 }
11819 targ += plt->output_offset + plt->output_section->vma;
11820 odd = off & 4;
11821 off = targ - off;
11822
11823 if (htab->params->plt_stub_align != 0)
11824 {
11825 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11826
11827 stub_entry->group->stub_sec->size += pad;
11828 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11829 off -= pad;
11830 }
11831
11832 if (info->emitrelocations)
11833 {
11834 unsigned int num_rel;
11835 if (htab->powerxx_stubs)
11836 num_rel = num_relocs_for_powerxx_offset (off, odd);
11837 else
11838 num_rel = num_relocs_for_offset (off - 8);
11839 stub_entry->group->stub_sec->reloc_count += num_rel;
11840 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11841 }
11842
11843 size = plt_stub_size (htab, stub_entry, off);
11844
11845 if (!htab->powerxx_stubs)
11846 {
11847 /* After the bcl, lr has been modified so we need to emit
11848 .eh_frame info saying the return address is in r12. */
11849 lr_used = stub_entry->stub_offset + 8;
11850 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11851 lr_used += 4;
11852 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11853 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11854 DW_CFA_restore_extended 65. */
11855 delta = lr_used - stub_entry->group->lr_restore;
11856 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11857 stub_entry->group->lr_restore = lr_used + 8;
11858 }
11859 break;
11860
11861 case ppc_stub_plt_call:
11862 case ppc_stub_plt_call_r2save:
11863 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11864 if (targ >= (bfd_vma) -2)
11865 abort ();
11866 plt = htab->elf.splt;
11867 if (!htab->elf.dynamic_sections_created
11868 || stub_entry->h == NULL
11869 || stub_entry->h->elf.dynindx == -1)
11870 {
11871 if (stub_entry->symtype == STT_GNU_IFUNC)
11872 plt = htab->elf.iplt;
11873 else
11874 plt = htab->pltlocal;
11875 }
11876 targ += plt->output_offset + plt->output_section->vma;
11877
11878 off = (elf_gp (info->output_bfd)
11879 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11880 off = targ - off;
11881
11882 if (htab->params->plt_stub_align != 0)
11883 {
11884 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11885
11886 stub_entry->group->stub_sec->size += pad;
11887 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11888 }
11889
11890 if (info->emitrelocations)
11891 {
11892 stub_entry->group->stub_sec->reloc_count
11893 += ((PPC_HA (off) != 0)
11894 + (htab->opd_abi
11895 ? 2 + (htab->params->plt_static_chain
11896 && PPC_HA (off + 16) == PPC_HA (off))
11897 : 1));
11898 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11899 }
11900
11901 size = plt_stub_size (htab, stub_entry, off);
11902
11903 if (stub_entry->h != NULL
11904 && (stub_entry->h == htab->tls_get_addr_fd
11905 || stub_entry->h == htab->tls_get_addr)
11906 && htab->params->tls_get_addr_opt
11907 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11908 {
11909 /* After the bctrl, lr has been modified so we need to
11910 emit .eh_frame info saying the return address is
11911 on the stack. In fact we put the EH info specifying
11912 that the return address is on the stack *at* the
11913 call rather than after it, because the EH info for a
11914 call needs to be specified by that point.
11915 See libgcc/unwind-dw2.c execute_cfa_program. */
11916 lr_used = stub_entry->stub_offset + size - 20;
11917 /* The eh_frame info will consist of a DW_CFA_advance_loc
11918 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11919 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11920 delta = lr_used - stub_entry->group->lr_restore;
11921 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11922 stub_entry->group->lr_restore = size - 4;
11923 }
11924 break;
11925
11926 default:
11927 BFD_FAIL ();
11928 return FALSE;
11929 }
11930
11931 stub_entry->group->stub_sec->size += size;
11932 return TRUE;
11933 }
11934
11935 /* Set up various things so that we can make a list of input sections
11936 for each output section included in the link. Returns -1 on error,
11937 0 when no stubs will be needed, and 1 on success. */
11938
11939 int
11940 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11941 {
11942 unsigned int id;
11943 bfd_size_type amt;
11944 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11945
11946 if (htab == NULL)
11947 return -1;
11948
11949 htab->sec_info_arr_size = _bfd_section_id;
11950 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11951 htab->sec_info = bfd_zmalloc (amt);
11952 if (htab->sec_info == NULL)
11953 return -1;
11954
11955 /* Set toc_off for com, und, abs and ind sections. */
11956 for (id = 0; id < 3; id++)
11957 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11958
11959 return 1;
11960 }
11961
11962 /* Set up for first pass at multitoc partitioning. */
11963
11964 void
11965 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11966 {
11967 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11968
11969 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11970 htab->toc_bfd = NULL;
11971 htab->toc_first_sec = NULL;
11972 }
11973
11974 /* The linker repeatedly calls this function for each TOC input section
11975 and linker generated GOT section. Group input bfds such that the toc
11976 within a group is less than 64k in size. */
11977
11978 bfd_boolean
11979 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11980 {
11981 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11982 bfd_vma addr, off, limit;
11983
11984 if (htab == NULL)
11985 return FALSE;
11986
11987 if (!htab->second_toc_pass)
11988 {
11989 /* Keep track of the first .toc or .got section for this input bfd. */
11990 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11991
11992 if (new_bfd)
11993 {
11994 htab->toc_bfd = isec->owner;
11995 htab->toc_first_sec = isec;
11996 }
11997
11998 addr = isec->output_offset + isec->output_section->vma;
11999 off = addr - htab->toc_curr;
12000 limit = 0x80008000;
12001 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12002 limit = 0x10000;
12003 if (off + isec->size > limit)
12004 {
12005 addr = (htab->toc_first_sec->output_offset
12006 + htab->toc_first_sec->output_section->vma);
12007 htab->toc_curr = addr;
12008 htab->toc_curr &= -TOC_BASE_ALIGN;
12009 }
12010
12011 /* toc_curr is the base address of this toc group. Set elf_gp
12012 for the input section to be the offset relative to the
12013 output toc base plus 0x8000. Making the input elf_gp an
12014 offset allows us to move the toc as a whole without
12015 recalculating input elf_gp. */
12016 off = htab->toc_curr - elf_gp (info->output_bfd);
12017 off += TOC_BASE_OFF;
12018
12019 /* Die if someone uses a linker script that doesn't keep input
12020 file .toc and .got together. */
12021 if (new_bfd
12022 && elf_gp (isec->owner) != 0
12023 && elf_gp (isec->owner) != off)
12024 return FALSE;
12025
12026 elf_gp (isec->owner) = off;
12027 return TRUE;
12028 }
12029
12030 /* During the second pass toc_first_sec points to the start of
12031 a toc group, and toc_curr is used to track the old elf_gp.
12032 We use toc_bfd to ensure we only look at each bfd once. */
12033 if (htab->toc_bfd == isec->owner)
12034 return TRUE;
12035 htab->toc_bfd = isec->owner;
12036
12037 if (htab->toc_first_sec == NULL
12038 || htab->toc_curr != elf_gp (isec->owner))
12039 {
12040 htab->toc_curr = elf_gp (isec->owner);
12041 htab->toc_first_sec = isec;
12042 }
12043 addr = (htab->toc_first_sec->output_offset
12044 + htab->toc_first_sec->output_section->vma);
12045 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12046 elf_gp (isec->owner) = off;
12047
12048 return TRUE;
12049 }
12050
12051 /* Called via elf_link_hash_traverse to merge GOT entries for global
12052 symbol H. */
12053
12054 static bfd_boolean
12055 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12056 {
12057 if (h->root.type == bfd_link_hash_indirect)
12058 return TRUE;
12059
12060 merge_got_entries (&h->got.glist);
12061
12062 return TRUE;
12063 }
12064
12065 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12066 symbol H. */
12067
12068 static bfd_boolean
12069 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12070 {
12071 struct got_entry *gent;
12072
12073 if (h->root.type == bfd_link_hash_indirect)
12074 return TRUE;
12075
12076 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12077 if (!gent->is_indirect)
12078 allocate_got (h, (struct bfd_link_info *) inf, gent);
12079 return TRUE;
12080 }
12081
12082 /* Called on the first multitoc pass after the last call to
12083 ppc64_elf_next_toc_section. This function removes duplicate GOT
12084 entries. */
12085
12086 bfd_boolean
12087 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12088 {
12089 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12090 struct bfd *ibfd, *ibfd2;
12091 bfd_boolean done_something;
12092
12093 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12094
12095 if (!htab->do_multi_toc)
12096 return FALSE;
12097
12098 /* Merge global sym got entries within a toc group. */
12099 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12100
12101 /* And tlsld_got. */
12102 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12103 {
12104 struct got_entry *ent, *ent2;
12105
12106 if (!is_ppc64_elf (ibfd))
12107 continue;
12108
12109 ent = ppc64_tlsld_got (ibfd);
12110 if (!ent->is_indirect
12111 && ent->got.offset != (bfd_vma) -1)
12112 {
12113 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12114 {
12115 if (!is_ppc64_elf (ibfd2))
12116 continue;
12117
12118 ent2 = ppc64_tlsld_got (ibfd2);
12119 if (!ent2->is_indirect
12120 && ent2->got.offset != (bfd_vma) -1
12121 && elf_gp (ibfd2) == elf_gp (ibfd))
12122 {
12123 ent2->is_indirect = TRUE;
12124 ent2->got.ent = ent;
12125 }
12126 }
12127 }
12128 }
12129
12130 /* Zap sizes of got sections. */
12131 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12132 htab->elf.irelplt->size -= htab->got_reli_size;
12133 htab->got_reli_size = 0;
12134
12135 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12136 {
12137 asection *got, *relgot;
12138
12139 if (!is_ppc64_elf (ibfd))
12140 continue;
12141
12142 got = ppc64_elf_tdata (ibfd)->got;
12143 if (got != NULL)
12144 {
12145 got->rawsize = got->size;
12146 got->size = 0;
12147 relgot = ppc64_elf_tdata (ibfd)->relgot;
12148 relgot->rawsize = relgot->size;
12149 relgot->size = 0;
12150 }
12151 }
12152
12153 /* Now reallocate the got, local syms first. We don't need to
12154 allocate section contents again since we never increase size. */
12155 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12156 {
12157 struct got_entry **lgot_ents;
12158 struct got_entry **end_lgot_ents;
12159 struct plt_entry **local_plt;
12160 struct plt_entry **end_local_plt;
12161 unsigned char *lgot_masks;
12162 bfd_size_type locsymcount;
12163 Elf_Internal_Shdr *symtab_hdr;
12164 asection *s;
12165
12166 if (!is_ppc64_elf (ibfd))
12167 continue;
12168
12169 lgot_ents = elf_local_got_ents (ibfd);
12170 if (!lgot_ents)
12171 continue;
12172
12173 symtab_hdr = &elf_symtab_hdr (ibfd);
12174 locsymcount = symtab_hdr->sh_info;
12175 end_lgot_ents = lgot_ents + locsymcount;
12176 local_plt = (struct plt_entry **) end_lgot_ents;
12177 end_local_plt = local_plt + locsymcount;
12178 lgot_masks = (unsigned char *) end_local_plt;
12179 s = ppc64_elf_tdata (ibfd)->got;
12180 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12181 {
12182 struct got_entry *ent;
12183
12184 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12185 {
12186 unsigned int ent_size = 8;
12187 unsigned int rel_size = sizeof (Elf64_External_Rela);
12188
12189 ent->got.offset = s->size;
12190 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12191 {
12192 ent_size *= 2;
12193 rel_size *= 2;
12194 }
12195 s->size += ent_size;
12196 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12197 {
12198 htab->elf.irelplt->size += rel_size;
12199 htab->got_reli_size += rel_size;
12200 }
12201 else if (bfd_link_pic (info)
12202 && !(ent->tls_type != 0
12203 && bfd_link_executable (info)))
12204 {
12205 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12206 srel->size += rel_size;
12207 }
12208 }
12209 }
12210 }
12211
12212 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12213
12214 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12215 {
12216 struct got_entry *ent;
12217
12218 if (!is_ppc64_elf (ibfd))
12219 continue;
12220
12221 ent = ppc64_tlsld_got (ibfd);
12222 if (!ent->is_indirect
12223 && ent->got.offset != (bfd_vma) -1)
12224 {
12225 asection *s = ppc64_elf_tdata (ibfd)->got;
12226 ent->got.offset = s->size;
12227 s->size += 16;
12228 if (bfd_link_dll (info))
12229 {
12230 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12231 srel->size += sizeof (Elf64_External_Rela);
12232 }
12233 }
12234 }
12235
12236 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12237 if (!done_something)
12238 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12239 {
12240 asection *got;
12241
12242 if (!is_ppc64_elf (ibfd))
12243 continue;
12244
12245 got = ppc64_elf_tdata (ibfd)->got;
12246 if (got != NULL)
12247 {
12248 done_something = got->rawsize != got->size;
12249 if (done_something)
12250 break;
12251 }
12252 }
12253
12254 if (done_something)
12255 (*htab->params->layout_sections_again) ();
12256
12257 /* Set up for second pass over toc sections to recalculate elf_gp
12258 on input sections. */
12259 htab->toc_bfd = NULL;
12260 htab->toc_first_sec = NULL;
12261 htab->second_toc_pass = TRUE;
12262 return done_something;
12263 }
12264
12265 /* Called after second pass of multitoc partitioning. */
12266
12267 void
12268 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12269 {
12270 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12271
12272 /* After the second pass, toc_curr tracks the TOC offset used
12273 for code sections below in ppc64_elf_next_input_section. */
12274 htab->toc_curr = TOC_BASE_OFF;
12275 }
12276
12277 /* No toc references were found in ISEC. If the code in ISEC makes no
12278 calls, then there's no need to use toc adjusting stubs when branching
12279 into ISEC. Actually, indirect calls from ISEC are OK as they will
12280 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12281 needed, and 2 if a cyclical call-graph was found but no other reason
12282 for a stub was detected. If called from the top level, a return of
12283 2 means the same as a return of 0. */
12284
12285 static int
12286 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12287 {
12288 int ret;
12289
12290 /* Mark this section as checked. */
12291 isec->call_check_done = 1;
12292
12293 /* We know none of our code bearing sections will need toc stubs. */
12294 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12295 return 0;
12296
12297 if (isec->size == 0)
12298 return 0;
12299
12300 if (isec->output_section == NULL)
12301 return 0;
12302
12303 ret = 0;
12304 if (isec->reloc_count != 0)
12305 {
12306 Elf_Internal_Rela *relstart, *rel;
12307 Elf_Internal_Sym *local_syms;
12308 struct ppc_link_hash_table *htab;
12309
12310 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12311 info->keep_memory);
12312 if (relstart == NULL)
12313 return -1;
12314
12315 /* Look for branches to outside of this section. */
12316 local_syms = NULL;
12317 htab = ppc_hash_table (info);
12318 if (htab == NULL)
12319 return -1;
12320
12321 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12322 {
12323 enum elf_ppc64_reloc_type r_type;
12324 unsigned long r_symndx;
12325 struct elf_link_hash_entry *h;
12326 struct ppc_link_hash_entry *eh;
12327 Elf_Internal_Sym *sym;
12328 asection *sym_sec;
12329 struct _opd_sec_data *opd;
12330 bfd_vma sym_value;
12331 bfd_vma dest;
12332
12333 r_type = ELF64_R_TYPE (rel->r_info);
12334 if (r_type != R_PPC64_REL24
12335 && r_type != R_PPC64_REL24_NOTOC
12336 && r_type != R_PPC64_REL14
12337 && r_type != R_PPC64_REL14_BRTAKEN
12338 && r_type != R_PPC64_REL14_BRNTAKEN
12339 && r_type != R_PPC64_PLTCALL
12340 && r_type != R_PPC64_PLTCALL_NOTOC)
12341 continue;
12342
12343 r_symndx = ELF64_R_SYM (rel->r_info);
12344 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12345 isec->owner))
12346 {
12347 ret = -1;
12348 break;
12349 }
12350
12351 /* Calls to dynamic lib functions go through a plt call stub
12352 that uses r2. */
12353 eh = (struct ppc_link_hash_entry *) h;
12354 if (eh != NULL
12355 && (eh->elf.plt.plist != NULL
12356 || (eh->oh != NULL
12357 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12358 {
12359 ret = 1;
12360 break;
12361 }
12362
12363 if (sym_sec == NULL)
12364 /* Ignore other undefined symbols. */
12365 continue;
12366
12367 /* Assume branches to other sections not included in the
12368 link need stubs too, to cover -R and absolute syms. */
12369 if (sym_sec->output_section == NULL)
12370 {
12371 ret = 1;
12372 break;
12373 }
12374
12375 if (h == NULL)
12376 sym_value = sym->st_value;
12377 else
12378 {
12379 if (h->root.type != bfd_link_hash_defined
12380 && h->root.type != bfd_link_hash_defweak)
12381 abort ();
12382 sym_value = h->root.u.def.value;
12383 }
12384 sym_value += rel->r_addend;
12385
12386 /* If this branch reloc uses an opd sym, find the code section. */
12387 opd = get_opd_info (sym_sec);
12388 if (opd != NULL)
12389 {
12390 if (h == NULL && opd->adjust != NULL)
12391 {
12392 long adjust;
12393
12394 adjust = opd->adjust[OPD_NDX (sym_value)];
12395 if (adjust == -1)
12396 /* Assume deleted functions won't ever be called. */
12397 continue;
12398 sym_value += adjust;
12399 }
12400
12401 dest = opd_entry_value (sym_sec, sym_value,
12402 &sym_sec, NULL, FALSE);
12403 if (dest == (bfd_vma) -1)
12404 continue;
12405 }
12406 else
12407 dest = (sym_value
12408 + sym_sec->output_offset
12409 + sym_sec->output_section->vma);
12410
12411 /* Ignore branch to self. */
12412 if (sym_sec == isec)
12413 continue;
12414
12415 /* If the called function uses the toc, we need a stub. */
12416 if (sym_sec->has_toc_reloc
12417 || sym_sec->makes_toc_func_call)
12418 {
12419 ret = 1;
12420 break;
12421 }
12422
12423 /* Assume any branch that needs a long branch stub might in fact
12424 need a plt_branch stub. A plt_branch stub uses r2. */
12425 else if (dest - (isec->output_offset
12426 + isec->output_section->vma
12427 + rel->r_offset) + (1 << 25)
12428 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12429 ? h->other
12430 : sym->st_other))
12431 {
12432 ret = 1;
12433 break;
12434 }
12435
12436 /* If calling back to a section in the process of being
12437 tested, we can't say for sure that no toc adjusting stubs
12438 are needed, so don't return zero. */
12439 else if (sym_sec->call_check_in_progress)
12440 ret = 2;
12441
12442 /* Branches to another section that itself doesn't have any TOC
12443 references are OK. Recursively call ourselves to check. */
12444 else if (!sym_sec->call_check_done)
12445 {
12446 int recur;
12447
12448 /* Mark current section as indeterminate, so that other
12449 sections that call back to current won't be marked as
12450 known. */
12451 isec->call_check_in_progress = 1;
12452 recur = toc_adjusting_stub_needed (info, sym_sec);
12453 isec->call_check_in_progress = 0;
12454
12455 if (recur != 0)
12456 {
12457 ret = recur;
12458 if (recur != 2)
12459 break;
12460 }
12461 }
12462 }
12463
12464 if (local_syms != NULL
12465 && (elf_symtab_hdr (isec->owner).contents
12466 != (unsigned char *) local_syms))
12467 free (local_syms);
12468 if (elf_section_data (isec)->relocs != relstart)
12469 free (relstart);
12470 }
12471
12472 if ((ret & 1) == 0
12473 && isec->map_head.s != NULL
12474 && (strcmp (isec->output_section->name, ".init") == 0
12475 || strcmp (isec->output_section->name, ".fini") == 0))
12476 {
12477 if (isec->map_head.s->has_toc_reloc
12478 || isec->map_head.s->makes_toc_func_call)
12479 ret = 1;
12480 else if (!isec->map_head.s->call_check_done)
12481 {
12482 int recur;
12483 isec->call_check_in_progress = 1;
12484 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12485 isec->call_check_in_progress = 0;
12486 if (recur != 0)
12487 ret = recur;
12488 }
12489 }
12490
12491 if (ret == 1)
12492 isec->makes_toc_func_call = 1;
12493
12494 return ret;
12495 }
12496
12497 /* The linker repeatedly calls this function for each input section,
12498 in the order that input sections are linked into output sections.
12499 Build lists of input sections to determine groupings between which
12500 we may insert linker stubs. */
12501
12502 bfd_boolean
12503 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12504 {
12505 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12506
12507 if (htab == NULL)
12508 return FALSE;
12509
12510 if ((isec->output_section->flags & SEC_CODE) != 0
12511 && isec->output_section->id < htab->sec_info_arr_size)
12512 {
12513 /* This happens to make the list in reverse order,
12514 which is what we want. */
12515 htab->sec_info[isec->id].u.list
12516 = htab->sec_info[isec->output_section->id].u.list;
12517 htab->sec_info[isec->output_section->id].u.list = isec;
12518 }
12519
12520 if (htab->multi_toc_needed)
12521 {
12522 /* Analyse sections that aren't already flagged as needing a
12523 valid toc pointer. Exclude .fixup for the linux kernel.
12524 .fixup contains branches, but only back to the function that
12525 hit an exception. */
12526 if (!(isec->has_toc_reloc
12527 || (isec->flags & SEC_CODE) == 0
12528 || strcmp (isec->name, ".fixup") == 0
12529 || isec->call_check_done))
12530 {
12531 if (toc_adjusting_stub_needed (info, isec) < 0)
12532 return FALSE;
12533 }
12534 /* Make all sections use the TOC assigned for this object file.
12535 This will be wrong for pasted sections; We fix that in
12536 check_pasted_section(). */
12537 if (elf_gp (isec->owner) != 0)
12538 htab->toc_curr = elf_gp (isec->owner);
12539 }
12540
12541 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12542 return TRUE;
12543 }
12544
12545 /* Check that all .init and .fini sections use the same toc, if they
12546 have toc relocs. */
12547
12548 static bfd_boolean
12549 check_pasted_section (struct bfd_link_info *info, const char *name)
12550 {
12551 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12552
12553 if (o != NULL)
12554 {
12555 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12556 bfd_vma toc_off = 0;
12557 asection *i;
12558
12559 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12560 if (i->has_toc_reloc)
12561 {
12562 if (toc_off == 0)
12563 toc_off = htab->sec_info[i->id].toc_off;
12564 else if (toc_off != htab->sec_info[i->id].toc_off)
12565 return FALSE;
12566 }
12567
12568 if (toc_off == 0)
12569 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12570 if (i->makes_toc_func_call)
12571 {
12572 toc_off = htab->sec_info[i->id].toc_off;
12573 break;
12574 }
12575
12576 /* Make sure the whole pasted function uses the same toc offset. */
12577 if (toc_off != 0)
12578 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12579 htab->sec_info[i->id].toc_off = toc_off;
12580 }
12581 return TRUE;
12582 }
12583
12584 bfd_boolean
12585 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12586 {
12587 return (check_pasted_section (info, ".init")
12588 & check_pasted_section (info, ".fini"));
12589 }
12590
12591 /* See whether we can group stub sections together. Grouping stub
12592 sections may result in fewer stubs. More importantly, we need to
12593 put all .init* and .fini* stubs at the beginning of the .init or
12594 .fini output sections respectively, because glibc splits the
12595 _init and _fini functions into multiple parts. Putting a stub in
12596 the middle of a function is not a good idea. */
12597
12598 static bfd_boolean
12599 group_sections (struct bfd_link_info *info,
12600 bfd_size_type stub_group_size,
12601 bfd_boolean stubs_always_before_branch)
12602 {
12603 struct ppc_link_hash_table *htab;
12604 asection *osec;
12605 bfd_boolean suppress_size_errors;
12606
12607 htab = ppc_hash_table (info);
12608 if (htab == NULL)
12609 return FALSE;
12610
12611 suppress_size_errors = FALSE;
12612 if (stub_group_size == 1)
12613 {
12614 /* Default values. */
12615 if (stubs_always_before_branch)
12616 stub_group_size = 0x1e00000;
12617 else
12618 stub_group_size = 0x1c00000;
12619 suppress_size_errors = TRUE;
12620 }
12621
12622 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12623 {
12624 asection *tail;
12625
12626 if (osec->id >= htab->sec_info_arr_size)
12627 continue;
12628
12629 tail = htab->sec_info[osec->id].u.list;
12630 while (tail != NULL)
12631 {
12632 asection *curr;
12633 asection *prev;
12634 bfd_size_type total;
12635 bfd_boolean big_sec;
12636 bfd_vma curr_toc;
12637 struct map_stub *group;
12638 bfd_size_type group_size;
12639
12640 curr = tail;
12641 total = tail->size;
12642 group_size = (ppc64_elf_section_data (tail) != NULL
12643 && ppc64_elf_section_data (tail)->has_14bit_branch
12644 ? stub_group_size >> 10 : stub_group_size);
12645
12646 big_sec = total > group_size;
12647 if (big_sec && !suppress_size_errors)
12648 /* xgettext:c-format */
12649 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12650 tail->owner, tail);
12651 curr_toc = htab->sec_info[tail->id].toc_off;
12652
12653 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12654 && ((total += curr->output_offset - prev->output_offset)
12655 < (ppc64_elf_section_data (prev) != NULL
12656 && ppc64_elf_section_data (prev)->has_14bit_branch
12657 ? (group_size = stub_group_size >> 10) : group_size))
12658 && htab->sec_info[prev->id].toc_off == curr_toc)
12659 curr = prev;
12660
12661 /* OK, the size from the start of CURR to the end is less
12662 than group_size and thus can be handled by one stub
12663 section. (or the tail section is itself larger than
12664 group_size, in which case we may be toast.) We should
12665 really be keeping track of the total size of stubs added
12666 here, as stubs contribute to the final output section
12667 size. That's a little tricky, and this way will only
12668 break if stubs added make the total size more than 2^25,
12669 ie. for the default stub_group_size, if stubs total more
12670 than 2097152 bytes, or nearly 75000 plt call stubs. */
12671 group = bfd_alloc (curr->owner, sizeof (*group));
12672 if (group == NULL)
12673 return FALSE;
12674 group->link_sec = curr;
12675 group->stub_sec = NULL;
12676 group->needs_save_res = 0;
12677 group->lr_restore = 0;
12678 group->eh_size = 0;
12679 group->eh_base = 0;
12680 group->next = htab->group;
12681 htab->group = group;
12682 do
12683 {
12684 prev = htab->sec_info[tail->id].u.list;
12685 /* Set up this stub group. */
12686 htab->sec_info[tail->id].u.group = group;
12687 }
12688 while (tail != curr && (tail = prev) != NULL);
12689
12690 /* But wait, there's more! Input sections up to group_size
12691 bytes before the stub section can be handled by it too.
12692 Don't do this if we have a really large section after the
12693 stubs, as adding more stubs increases the chance that
12694 branches may not reach into the stub section. */
12695 if (!stubs_always_before_branch && !big_sec)
12696 {
12697 total = 0;
12698 while (prev != NULL
12699 && ((total += tail->output_offset - prev->output_offset)
12700 < (ppc64_elf_section_data (prev) != NULL
12701 && ppc64_elf_section_data (prev)->has_14bit_branch
12702 ? (group_size = stub_group_size >> 10)
12703 : group_size))
12704 && htab->sec_info[prev->id].toc_off == curr_toc)
12705 {
12706 tail = prev;
12707 prev = htab->sec_info[tail->id].u.list;
12708 htab->sec_info[tail->id].u.group = group;
12709 }
12710 }
12711 tail = prev;
12712 }
12713 }
12714 return TRUE;
12715 }
12716
12717 static const unsigned char glink_eh_frame_cie[] =
12718 {
12719 0, 0, 0, 16, /* length. */
12720 0, 0, 0, 0, /* id. */
12721 1, /* CIE version. */
12722 'z', 'R', 0, /* Augmentation string. */
12723 4, /* Code alignment. */
12724 0x78, /* Data alignment. */
12725 65, /* RA reg. */
12726 1, /* Augmentation size. */
12727 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12728 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
12729 };
12730
12731 /* Stripping output sections is normally done before dynamic section
12732 symbols have been allocated. This function is called later, and
12733 handles cases like htab->brlt which is mapped to its own output
12734 section. */
12735
12736 static void
12737 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12738 {
12739 if (isec->size == 0
12740 && isec->output_section->size == 0
12741 && !(isec->output_section->flags & SEC_KEEP)
12742 && !bfd_section_removed_from_list (info->output_bfd,
12743 isec->output_section)
12744 && elf_section_data (isec->output_section)->dynindx == 0)
12745 {
12746 isec->output_section->flags |= SEC_EXCLUDE;
12747 bfd_section_list_remove (info->output_bfd, isec->output_section);
12748 info->output_bfd->section_count--;
12749 }
12750 }
12751
12752 /* Determine and set the size of the stub section for a final link.
12753
12754 The basic idea here is to examine all the relocations looking for
12755 PC-relative calls to a target that is unreachable with a "bl"
12756 instruction. */
12757
12758 bfd_boolean
12759 ppc64_elf_size_stubs (struct bfd_link_info *info)
12760 {
12761 bfd_size_type stub_group_size;
12762 bfd_boolean stubs_always_before_branch;
12763 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12764
12765 if (htab == NULL)
12766 return FALSE;
12767
12768 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12769 htab->params->plt_thread_safe = 1;
12770 if (!htab->opd_abi)
12771 htab->params->plt_thread_safe = 0;
12772 else if (htab->params->plt_thread_safe == -1)
12773 {
12774 static const char *const thread_starter[] =
12775 {
12776 "pthread_create",
12777 /* libstdc++ */
12778 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12779 /* librt */
12780 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12781 "mq_notify", "create_timer",
12782 /* libanl */
12783 "getaddrinfo_a",
12784 /* libgomp */
12785 "GOMP_parallel",
12786 "GOMP_parallel_start",
12787 "GOMP_parallel_loop_static",
12788 "GOMP_parallel_loop_static_start",
12789 "GOMP_parallel_loop_dynamic",
12790 "GOMP_parallel_loop_dynamic_start",
12791 "GOMP_parallel_loop_guided",
12792 "GOMP_parallel_loop_guided_start",
12793 "GOMP_parallel_loop_runtime",
12794 "GOMP_parallel_loop_runtime_start",
12795 "GOMP_parallel_sections",
12796 "GOMP_parallel_sections_start",
12797 /* libgo */
12798 "__go_go",
12799 };
12800 unsigned i;
12801
12802 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12803 {
12804 struct elf_link_hash_entry *h;
12805 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12806 FALSE, FALSE, TRUE);
12807 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12808 if (htab->params->plt_thread_safe)
12809 break;
12810 }
12811 }
12812 stubs_always_before_branch = htab->params->group_size < 0;
12813 if (htab->params->group_size < 0)
12814 stub_group_size = -htab->params->group_size;
12815 else
12816 stub_group_size = htab->params->group_size;
12817
12818 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12819 return FALSE;
12820
12821 #define STUB_SHRINK_ITER 20
12822 /* Loop until no stubs added. After iteration 20 of this loop we may
12823 exit on a stub section shrinking. This is to break out of a
12824 pathological case where adding stubs on one iteration decreases
12825 section gaps (perhaps due to alignment), which then requires
12826 fewer or smaller stubs on the next iteration. */
12827
12828 while (1)
12829 {
12830 bfd *input_bfd;
12831 unsigned int bfd_indx;
12832 struct map_stub *group;
12833
12834 htab->stub_iteration += 1;
12835
12836 for (input_bfd = info->input_bfds, bfd_indx = 0;
12837 input_bfd != NULL;
12838 input_bfd = input_bfd->link.next, bfd_indx++)
12839 {
12840 Elf_Internal_Shdr *symtab_hdr;
12841 asection *section;
12842 Elf_Internal_Sym *local_syms = NULL;
12843
12844 if (!is_ppc64_elf (input_bfd))
12845 continue;
12846
12847 /* We'll need the symbol table in a second. */
12848 symtab_hdr = &elf_symtab_hdr (input_bfd);
12849 if (symtab_hdr->sh_info == 0)
12850 continue;
12851
12852 /* Walk over each section attached to the input bfd. */
12853 for (section = input_bfd->sections;
12854 section != NULL;
12855 section = section->next)
12856 {
12857 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12858
12859 /* If there aren't any relocs, then there's nothing more
12860 to do. */
12861 if ((section->flags & SEC_RELOC) == 0
12862 || (section->flags & SEC_ALLOC) == 0
12863 || (section->flags & SEC_LOAD) == 0
12864 || (section->flags & SEC_CODE) == 0
12865 || section->reloc_count == 0)
12866 continue;
12867
12868 /* If this section is a link-once section that will be
12869 discarded, then don't create any stubs. */
12870 if (section->output_section == NULL
12871 || section->output_section->owner != info->output_bfd)
12872 continue;
12873
12874 /* Get the relocs. */
12875 internal_relocs
12876 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12877 info->keep_memory);
12878 if (internal_relocs == NULL)
12879 goto error_ret_free_local;
12880
12881 /* Now examine each relocation. */
12882 irela = internal_relocs;
12883 irelaend = irela + section->reloc_count;
12884 for (; irela < irelaend; irela++)
12885 {
12886 enum elf_ppc64_reloc_type r_type;
12887 unsigned int r_indx;
12888 enum ppc_stub_type stub_type;
12889 struct ppc_stub_hash_entry *stub_entry;
12890 asection *sym_sec, *code_sec;
12891 bfd_vma sym_value, code_value;
12892 bfd_vma destination;
12893 unsigned long local_off;
12894 bfd_boolean ok_dest;
12895 struct ppc_link_hash_entry *hash;
12896 struct ppc_link_hash_entry *fdh;
12897 struct elf_link_hash_entry *h;
12898 Elf_Internal_Sym *sym;
12899 char *stub_name;
12900 const asection *id_sec;
12901 struct _opd_sec_data *opd;
12902 struct plt_entry *plt_ent;
12903
12904 r_type = ELF64_R_TYPE (irela->r_info);
12905 r_indx = ELF64_R_SYM (irela->r_info);
12906
12907 if (r_type >= R_PPC64_max)
12908 {
12909 bfd_set_error (bfd_error_bad_value);
12910 goto error_ret_free_internal;
12911 }
12912
12913 /* Only look for stubs on branch instructions. */
12914 if (r_type != R_PPC64_REL24
12915 && r_type != R_PPC64_REL24_NOTOC
12916 && r_type != R_PPC64_REL14
12917 && r_type != R_PPC64_REL14_BRTAKEN
12918 && r_type != R_PPC64_REL14_BRNTAKEN)
12919 continue;
12920
12921 /* Now determine the call target, its name, value,
12922 section. */
12923 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12924 r_indx, input_bfd))
12925 goto error_ret_free_internal;
12926 hash = (struct ppc_link_hash_entry *) h;
12927
12928 ok_dest = FALSE;
12929 fdh = NULL;
12930 sym_value = 0;
12931 if (hash == NULL)
12932 {
12933 sym_value = sym->st_value;
12934 if (sym_sec != NULL
12935 && sym_sec->output_section != NULL)
12936 ok_dest = TRUE;
12937 }
12938 else if (hash->elf.root.type == bfd_link_hash_defined
12939 || hash->elf.root.type == bfd_link_hash_defweak)
12940 {
12941 sym_value = hash->elf.root.u.def.value;
12942 if (sym_sec->output_section != NULL)
12943 ok_dest = TRUE;
12944 }
12945 else if (hash->elf.root.type == bfd_link_hash_undefweak
12946 || hash->elf.root.type == bfd_link_hash_undefined)
12947 {
12948 /* Recognise an old ABI func code entry sym, and
12949 use the func descriptor sym instead if it is
12950 defined. */
12951 if (hash->elf.root.root.string[0] == '.'
12952 && hash->oh != NULL)
12953 {
12954 fdh = ppc_follow_link (hash->oh);
12955 if (fdh->elf.root.type == bfd_link_hash_defined
12956 || fdh->elf.root.type == bfd_link_hash_defweak)
12957 {
12958 sym_sec = fdh->elf.root.u.def.section;
12959 sym_value = fdh->elf.root.u.def.value;
12960 if (sym_sec->output_section != NULL)
12961 ok_dest = TRUE;
12962 }
12963 else
12964 fdh = NULL;
12965 }
12966 }
12967 else
12968 {
12969 bfd_set_error (bfd_error_bad_value);
12970 goto error_ret_free_internal;
12971 }
12972
12973 destination = 0;
12974 local_off = 0;
12975 if (ok_dest)
12976 {
12977 sym_value += irela->r_addend;
12978 destination = (sym_value
12979 + sym_sec->output_offset
12980 + sym_sec->output_section->vma);
12981 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12982 ? hash->elf.other
12983 : sym->st_other);
12984 }
12985
12986 code_sec = sym_sec;
12987 code_value = sym_value;
12988 opd = get_opd_info (sym_sec);
12989 if (opd != NULL)
12990 {
12991 bfd_vma dest;
12992
12993 if (hash == NULL && opd->adjust != NULL)
12994 {
12995 long adjust = opd->adjust[OPD_NDX (sym_value)];
12996 if (adjust == -1)
12997 continue;
12998 code_value += adjust;
12999 sym_value += adjust;
13000 }
13001 dest = opd_entry_value (sym_sec, sym_value,
13002 &code_sec, &code_value, FALSE);
13003 if (dest != (bfd_vma) -1)
13004 {
13005 destination = dest;
13006 if (fdh != NULL)
13007 {
13008 /* Fixup old ABI sym to point at code
13009 entry. */
13010 hash->elf.root.type = bfd_link_hash_defweak;
13011 hash->elf.root.u.def.section = code_sec;
13012 hash->elf.root.u.def.value = code_value;
13013 }
13014 }
13015 }
13016
13017 /* Determine what (if any) linker stub is needed. */
13018 plt_ent = NULL;
13019 stub_type = ppc_type_of_stub (section, irela, &hash,
13020 &plt_ent, destination,
13021 local_off);
13022
13023 if (r_type == R_PPC64_REL24_NOTOC)
13024 {
13025 if (stub_type == ppc_stub_plt_call)
13026 stub_type = ppc_stub_plt_call_notoc;
13027 else if (stub_type == ppc_stub_long_branch
13028 || (code_sec != NULL
13029 && code_sec->output_section != NULL
13030 && (((hash ? hash->elf.other : sym->st_other)
13031 & STO_PPC64_LOCAL_MASK)
13032 > 1 << STO_PPC64_LOCAL_BIT)))
13033 stub_type = ppc_stub_long_branch_notoc;
13034 }
13035 else if (stub_type != ppc_stub_plt_call)
13036 {
13037 /* Check whether we need a TOC adjusting stub.
13038 Since the linker pastes together pieces from
13039 different object files when creating the
13040 _init and _fini functions, it may be that a
13041 call to what looks like a local sym is in
13042 fact a call needing a TOC adjustment. */
13043 if ((code_sec != NULL
13044 && code_sec->output_section != NULL
13045 && (htab->sec_info[code_sec->id].toc_off
13046 != htab->sec_info[section->id].toc_off)
13047 && (code_sec->has_toc_reloc
13048 || code_sec->makes_toc_func_call))
13049 || (((hash ? hash->elf.other : sym->st_other)
13050 & STO_PPC64_LOCAL_MASK)
13051 == 1 << STO_PPC64_LOCAL_BIT))
13052 stub_type = ppc_stub_long_branch_r2off;
13053 }
13054
13055 if (stub_type == ppc_stub_none)
13056 continue;
13057
13058 /* __tls_get_addr calls might be eliminated. */
13059 if (stub_type != ppc_stub_plt_call
13060 && stub_type != ppc_stub_plt_call_notoc
13061 && hash != NULL
13062 && (hash == htab->tls_get_addr
13063 || hash == htab->tls_get_addr_fd)
13064 && section->has_tls_reloc
13065 && irela != internal_relocs)
13066 {
13067 /* Get tls info. */
13068 unsigned char *tls_mask;
13069
13070 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13071 irela - 1, input_bfd))
13072 goto error_ret_free_internal;
13073 if ((*tls_mask & TLS_TLS) != 0)
13074 continue;
13075 }
13076
13077 if (stub_type == ppc_stub_plt_call)
13078 {
13079 if (!htab->opd_abi
13080 && htab->params->plt_localentry0 != 0
13081 && is_elfv2_localentry0 (&hash->elf))
13082 htab->has_plt_localentry0 = 1;
13083 else if (irela + 1 < irelaend
13084 && irela[1].r_offset == irela->r_offset + 4
13085 && (ELF64_R_TYPE (irela[1].r_info)
13086 == R_PPC64_TOCSAVE))
13087 {
13088 if (!tocsave_find (htab, INSERT,
13089 &local_syms, irela + 1, input_bfd))
13090 goto error_ret_free_internal;
13091 }
13092 else
13093 stub_type = ppc_stub_plt_call_r2save;
13094 }
13095
13096 /* Support for grouping stub sections. */
13097 id_sec = htab->sec_info[section->id].u.group->link_sec;
13098
13099 /* Get the name of this stub. */
13100 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13101 if (!stub_name)
13102 goto error_ret_free_internal;
13103
13104 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13105 stub_name, FALSE, FALSE);
13106 if (stub_entry != NULL)
13107 {
13108 enum ppc_stub_type old_type;
13109 /* A stub has already been created, but it may
13110 not be the required type. We shouldn't be
13111 transitioning from plt_call to long_branch
13112 stubs or vice versa, but we might be
13113 upgrading from plt_call to plt_call_r2save or
13114 from long_branch to long_branch_r2off. */
13115 free (stub_name);
13116 old_type = stub_entry->stub_type;
13117 switch (old_type)
13118 {
13119 default:
13120 abort ();
13121
13122 case ppc_stub_save_res:
13123 continue;
13124
13125 case ppc_stub_plt_call:
13126 case ppc_stub_plt_call_r2save:
13127 case ppc_stub_plt_call_notoc:
13128 case ppc_stub_plt_call_both:
13129 if (stub_type == ppc_stub_plt_call)
13130 continue;
13131 else if (stub_type == ppc_stub_plt_call_r2save)
13132 {
13133 if (old_type == ppc_stub_plt_call_notoc)
13134 stub_type = ppc_stub_plt_call_both;
13135 }
13136 else if (stub_type == ppc_stub_plt_call_notoc)
13137 {
13138 if (old_type == ppc_stub_plt_call_r2save)
13139 stub_type = ppc_stub_plt_call_both;
13140 }
13141 else
13142 abort ();
13143 break;
13144
13145 case ppc_stub_plt_branch:
13146 case ppc_stub_plt_branch_r2off:
13147 case ppc_stub_plt_branch_notoc:
13148 case ppc_stub_plt_branch_both:
13149 old_type += (ppc_stub_long_branch
13150 - ppc_stub_plt_branch);
13151 /* Fall through. */
13152 case ppc_stub_long_branch:
13153 case ppc_stub_long_branch_r2off:
13154 case ppc_stub_long_branch_notoc:
13155 case ppc_stub_long_branch_both:
13156 if (stub_type == ppc_stub_long_branch)
13157 continue;
13158 else if (stub_type == ppc_stub_long_branch_r2off)
13159 {
13160 if (old_type == ppc_stub_long_branch_notoc)
13161 stub_type = ppc_stub_long_branch_both;
13162 }
13163 else if (stub_type == ppc_stub_long_branch_notoc)
13164 {
13165 if (old_type == ppc_stub_long_branch_r2off)
13166 stub_type = ppc_stub_long_branch_both;
13167 }
13168 else
13169 abort ();
13170 break;
13171 }
13172 if (old_type < stub_type)
13173 stub_entry->stub_type = stub_type;
13174 continue;
13175 }
13176
13177 stub_entry = ppc_add_stub (stub_name, section, info);
13178 if (stub_entry == NULL)
13179 {
13180 free (stub_name);
13181 error_ret_free_internal:
13182 if (elf_section_data (section)->relocs == NULL)
13183 free (internal_relocs);
13184 error_ret_free_local:
13185 if (local_syms != NULL
13186 && (symtab_hdr->contents
13187 != (unsigned char *) local_syms))
13188 free (local_syms);
13189 return FALSE;
13190 }
13191
13192 stub_entry->stub_type = stub_type;
13193 if (stub_type >= ppc_stub_plt_call
13194 && stub_type <= ppc_stub_plt_call_both)
13195 {
13196 stub_entry->target_value = sym_value;
13197 stub_entry->target_section = sym_sec;
13198 }
13199 else
13200 {
13201 stub_entry->target_value = code_value;
13202 stub_entry->target_section = code_sec;
13203 }
13204 stub_entry->h = hash;
13205 stub_entry->plt_ent = plt_ent;
13206 stub_entry->symtype
13207 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13208 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13209
13210 if (hash != NULL
13211 && (hash->elf.root.type == bfd_link_hash_defined
13212 || hash->elf.root.type == bfd_link_hash_defweak))
13213 htab->stub_globals += 1;
13214 }
13215
13216 /* We're done with the internal relocs, free them. */
13217 if (elf_section_data (section)->relocs != internal_relocs)
13218 free (internal_relocs);
13219 }
13220
13221 if (local_syms != NULL
13222 && symtab_hdr->contents != (unsigned char *) local_syms)
13223 {
13224 if (!info->keep_memory)
13225 free (local_syms);
13226 else
13227 symtab_hdr->contents = (unsigned char *) local_syms;
13228 }
13229 }
13230
13231 /* We may have added some stubs. Find out the new size of the
13232 stub sections. */
13233 for (group = htab->group; group != NULL; group = group->next)
13234 {
13235 group->lr_restore = 0;
13236 group->eh_size = 0;
13237 if (group->stub_sec != NULL)
13238 {
13239 asection *stub_sec = group->stub_sec;
13240
13241 if (htab->stub_iteration <= STUB_SHRINK_ITER
13242 || stub_sec->rawsize < stub_sec->size)
13243 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13244 stub_sec->rawsize = stub_sec->size;
13245 stub_sec->size = 0;
13246 stub_sec->reloc_count = 0;
13247 stub_sec->flags &= ~SEC_RELOC;
13248 }
13249 }
13250
13251 if (htab->stub_iteration <= STUB_SHRINK_ITER
13252 || htab->brlt->rawsize < htab->brlt->size)
13253 htab->brlt->rawsize = htab->brlt->size;
13254 htab->brlt->size = 0;
13255 htab->brlt->reloc_count = 0;
13256 htab->brlt->flags &= ~SEC_RELOC;
13257 if (htab->relbrlt != NULL)
13258 htab->relbrlt->size = 0;
13259
13260 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13261
13262 for (group = htab->group; group != NULL; group = group->next)
13263 if (group->needs_save_res)
13264 group->stub_sec->size += htab->sfpr->size;
13265
13266 if (info->emitrelocations
13267 && htab->glink != NULL && htab->glink->size != 0)
13268 {
13269 htab->glink->reloc_count = 1;
13270 htab->glink->flags |= SEC_RELOC;
13271 }
13272
13273 if (htab->glink_eh_frame != NULL
13274 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13275 && htab->glink_eh_frame->output_section->size > 8)
13276 {
13277 size_t size = 0, align = 4;
13278
13279 for (group = htab->group; group != NULL; group = group->next)
13280 if (group->eh_size != 0)
13281 size += (group->eh_size + 17 + align - 1) & -align;
13282 if (htab->glink != NULL && htab->glink->size != 0)
13283 size += (24 + align - 1) & -align;
13284 if (size != 0)
13285 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13286 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13287 size = (size + align - 1) & -align;
13288 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13289 htab->glink_eh_frame->size = size;
13290 }
13291
13292 if (htab->params->plt_stub_align != 0)
13293 for (group = htab->group; group != NULL; group = group->next)
13294 if (group->stub_sec != NULL)
13295 {
13296 int align = abs (htab->params->plt_stub_align);
13297 group->stub_sec->size
13298 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13299 }
13300
13301 for (group = htab->group; group != NULL; group = group->next)
13302 if (group->stub_sec != NULL
13303 && group->stub_sec->rawsize != group->stub_sec->size
13304 && (htab->stub_iteration <= STUB_SHRINK_ITER
13305 || group->stub_sec->rawsize < group->stub_sec->size))
13306 break;
13307
13308 if (group == NULL
13309 && (htab->brlt->rawsize == htab->brlt->size
13310 || (htab->stub_iteration > STUB_SHRINK_ITER
13311 && htab->brlt->rawsize > htab->brlt->size))
13312 && (htab->glink_eh_frame == NULL
13313 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
13314 break;
13315
13316 /* Ask the linker to do its stuff. */
13317 (*htab->params->layout_sections_again) ();
13318 }
13319
13320 if (htab->glink_eh_frame != NULL
13321 && htab->glink_eh_frame->size != 0)
13322 {
13323 bfd_vma val;
13324 bfd_byte *p, *last_fde;
13325 size_t last_fde_len, size, align, pad;
13326 struct map_stub *group;
13327
13328 /* It is necessary to at least have a rough outline of the
13329 linker generated CIEs and FDEs written before
13330 bfd_elf_discard_info is run, in order for these FDEs to be
13331 indexed in .eh_frame_hdr. */
13332 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13333 if (p == NULL)
13334 return FALSE;
13335 htab->glink_eh_frame->contents = p;
13336 last_fde = p;
13337 align = 4;
13338
13339 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13340 /* CIE length (rewrite in case little-endian). */
13341 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13342 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13343 p += last_fde_len + 4;
13344
13345 for (group = htab->group; group != NULL; group = group->next)
13346 if (group->eh_size != 0)
13347 {
13348 group->eh_base = p - htab->glink_eh_frame->contents;
13349 last_fde = p;
13350 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13351 /* FDE length. */
13352 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13353 p += 4;
13354 /* CIE pointer. */
13355 val = p - htab->glink_eh_frame->contents;
13356 bfd_put_32 (htab->elf.dynobj, val, p);
13357 p += 4;
13358 /* Offset to stub section, written later. */
13359 p += 4;
13360 /* stub section size. */
13361 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13362 p += 4;
13363 /* Augmentation. */
13364 p += 1;
13365 /* Make sure we don't have all nops. This is enough for
13366 elf-eh-frame.c to detect the last non-nop opcode. */
13367 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13368 p = last_fde + last_fde_len + 4;
13369 }
13370 if (htab->glink != NULL && htab->glink->size != 0)
13371 {
13372 last_fde = p;
13373 last_fde_len = ((24 + align - 1) & -align) - 4;
13374 /* FDE length. */
13375 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13376 p += 4;
13377 /* CIE pointer. */
13378 val = p - htab->glink_eh_frame->contents;
13379 bfd_put_32 (htab->elf.dynobj, val, p);
13380 p += 4;
13381 /* Offset to .glink, written later. */
13382 p += 4;
13383 /* .glink size. */
13384 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13385 p += 4;
13386 /* Augmentation. */
13387 p += 1;
13388
13389 *p++ = DW_CFA_advance_loc + 1;
13390 *p++ = DW_CFA_register;
13391 *p++ = 65;
13392 *p++ = htab->opd_abi ? 12 : 0;
13393 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13394 *p++ = DW_CFA_restore_extended;
13395 *p++ = 65;
13396 p += ((24 + align - 1) & -align) - 24;
13397 }
13398 /* Subsume any padding into the last FDE if user .eh_frame
13399 sections are aligned more than glink_eh_frame. Otherwise any
13400 zero padding will be seen as a terminator. */
13401 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13402 size = p - htab->glink_eh_frame->contents;
13403 pad = ((size + align - 1) & -align) - size;
13404 htab->glink_eh_frame->size = size + pad;
13405 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13406 }
13407
13408 maybe_strip_output (info, htab->brlt);
13409 if (htab->glink_eh_frame != NULL)
13410 maybe_strip_output (info, htab->glink_eh_frame);
13411
13412 return TRUE;
13413 }
13414
13415 /* Called after we have determined section placement. If sections
13416 move, we'll be called again. Provide a value for TOCstart. */
13417
13418 bfd_vma
13419 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13420 {
13421 asection *s;
13422 bfd_vma TOCstart, adjust;
13423
13424 if (info != NULL)
13425 {
13426 struct elf_link_hash_entry *h;
13427 struct elf_link_hash_table *htab = elf_hash_table (info);
13428
13429 if (is_elf_hash_table (htab)
13430 && htab->hgot != NULL)
13431 h = htab->hgot;
13432 else
13433 {
13434 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13435 if (is_elf_hash_table (htab))
13436 htab->hgot = h;
13437 }
13438 if (h != NULL
13439 && h->root.type == bfd_link_hash_defined
13440 && !h->root.linker_def
13441 && (!is_elf_hash_table (htab)
13442 || h->def_regular))
13443 {
13444 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13445 + h->root.u.def.section->output_offset
13446 + h->root.u.def.section->output_section->vma);
13447 _bfd_set_gp_value (obfd, TOCstart);
13448 return TOCstart;
13449 }
13450 }
13451
13452 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13453 order. The TOC starts where the first of these sections starts. */
13454 s = bfd_get_section_by_name (obfd, ".got");
13455 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13456 s = bfd_get_section_by_name (obfd, ".toc");
13457 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13458 s = bfd_get_section_by_name (obfd, ".tocbss");
13459 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13460 s = bfd_get_section_by_name (obfd, ".plt");
13461 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13462 {
13463 /* This may happen for
13464 o references to TOC base (SYM@toc / TOC[tc0]) without a
13465 .toc directive
13466 o bad linker script
13467 o --gc-sections and empty TOC sections
13468
13469 FIXME: Warn user? */
13470
13471 /* Look for a likely section. We probably won't even be
13472 using TOCstart. */
13473 for (s = obfd->sections; s != NULL; s = s->next)
13474 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13475 | SEC_EXCLUDE))
13476 == (SEC_ALLOC | SEC_SMALL_DATA))
13477 break;
13478 if (s == NULL)
13479 for (s = obfd->sections; s != NULL; s = s->next)
13480 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13481 == (SEC_ALLOC | SEC_SMALL_DATA))
13482 break;
13483 if (s == NULL)
13484 for (s = obfd->sections; s != NULL; s = s->next)
13485 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13486 == SEC_ALLOC)
13487 break;
13488 if (s == NULL)
13489 for (s = obfd->sections; s != NULL; s = s->next)
13490 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13491 break;
13492 }
13493
13494 TOCstart = 0;
13495 if (s != NULL)
13496 TOCstart = s->output_section->vma + s->output_offset;
13497
13498 /* Force alignment. */
13499 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13500 TOCstart -= adjust;
13501 _bfd_set_gp_value (obfd, TOCstart);
13502
13503 if (info != NULL && s != NULL)
13504 {
13505 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13506
13507 if (htab != NULL)
13508 {
13509 if (htab->elf.hgot != NULL)
13510 {
13511 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13512 htab->elf.hgot->root.u.def.section = s;
13513 }
13514 }
13515 else
13516 {
13517 struct bfd_link_hash_entry *bh = NULL;
13518 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13519 s, TOC_BASE_OFF - adjust,
13520 NULL, FALSE, FALSE, &bh);
13521 }
13522 }
13523 return TOCstart;
13524 }
13525
13526 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13527 write out any global entry stubs, and PLT relocations. */
13528
13529 static bfd_boolean
13530 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13531 {
13532 struct bfd_link_info *info;
13533 struct ppc_link_hash_table *htab;
13534 struct plt_entry *ent;
13535 asection *s;
13536
13537 if (h->root.type == bfd_link_hash_indirect)
13538 return TRUE;
13539
13540 info = inf;
13541 htab = ppc_hash_table (info);
13542 if (htab == NULL)
13543 return FALSE;
13544
13545 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13546 if (ent->plt.offset != (bfd_vma) -1)
13547 {
13548 /* This symbol has an entry in the procedure linkage
13549 table. Set it up. */
13550 Elf_Internal_Rela rela;
13551 asection *plt, *relplt;
13552 bfd_byte *loc;
13553
13554 if (!htab->elf.dynamic_sections_created
13555 || h->dynindx == -1)
13556 {
13557 if (!(h->def_regular
13558 && (h->root.type == bfd_link_hash_defined
13559 || h->root.type == bfd_link_hash_defweak)))
13560 continue;
13561 if (h->type == STT_GNU_IFUNC)
13562 {
13563 plt = htab->elf.iplt;
13564 relplt = htab->elf.irelplt;
13565 htab->local_ifunc_resolver = 1;
13566 if (htab->opd_abi)
13567 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13568 else
13569 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13570 }
13571 else
13572 {
13573 plt = htab->pltlocal;
13574 if (bfd_link_pic (info))
13575 {
13576 relplt = htab->relpltlocal;
13577 if (htab->opd_abi)
13578 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13579 else
13580 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13581 }
13582 else
13583 relplt = NULL;
13584 }
13585 rela.r_addend = (h->root.u.def.value
13586 + h->root.u.def.section->output_offset
13587 + h->root.u.def.section->output_section->vma
13588 + ent->addend);
13589
13590 if (relplt == NULL)
13591 {
13592 loc = plt->contents + ent->plt.offset;
13593 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13594 if (htab->opd_abi)
13595 {
13596 bfd_vma toc = elf_gp (info->output_bfd);
13597 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13598 bfd_put_64 (info->output_bfd, toc, loc + 8);
13599 }
13600 }
13601 else
13602 {
13603 rela.r_offset = (plt->output_section->vma
13604 + plt->output_offset
13605 + ent->plt.offset);
13606 loc = relplt->contents + (relplt->reloc_count++
13607 * sizeof (Elf64_External_Rela));
13608 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13609 }
13610 }
13611 else
13612 {
13613 rela.r_offset = (htab->elf.splt->output_section->vma
13614 + htab->elf.splt->output_offset
13615 + ent->plt.offset);
13616 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13617 rela.r_addend = ent->addend;
13618 loc = (htab->elf.srelplt->contents
13619 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13620 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13621 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13622 htab->maybe_local_ifunc_resolver = 1;
13623 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13624 }
13625 }
13626
13627 if (!h->pointer_equality_needed)
13628 return TRUE;
13629
13630 if (h->def_regular)
13631 return TRUE;
13632
13633 s = htab->global_entry;
13634 if (s == NULL || s->size == 0)
13635 return TRUE;
13636
13637 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13638 if (ent->plt.offset != (bfd_vma) -1
13639 && ent->addend == 0)
13640 {
13641 bfd_byte *p;
13642 asection *plt;
13643 bfd_vma off;
13644
13645 p = s->contents + h->root.u.def.value;
13646 plt = htab->elf.splt;
13647 if (!htab->elf.dynamic_sections_created
13648 || h->dynindx == -1)
13649 {
13650 if (h->type == STT_GNU_IFUNC)
13651 plt = htab->elf.iplt;
13652 else
13653 plt = htab->pltlocal;
13654 }
13655 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13656 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13657
13658 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13659 {
13660 info->callbacks->einfo
13661 (_("%P: linkage table error against `%pT'\n"),
13662 h->root.root.string);
13663 bfd_set_error (bfd_error_bad_value);
13664 htab->stub_error = TRUE;
13665 }
13666
13667 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13668 if (htab->params->emit_stub_syms)
13669 {
13670 size_t len = strlen (h->root.root.string);
13671 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13672
13673 if (name == NULL)
13674 return FALSE;
13675
13676 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13677 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13678 if (h == NULL)
13679 return FALSE;
13680 if (h->root.type == bfd_link_hash_new)
13681 {
13682 h->root.type = bfd_link_hash_defined;
13683 h->root.u.def.section = s;
13684 h->root.u.def.value = p - s->contents;
13685 h->ref_regular = 1;
13686 h->def_regular = 1;
13687 h->ref_regular_nonweak = 1;
13688 h->forced_local = 1;
13689 h->non_elf = 0;
13690 h->root.linker_def = 1;
13691 }
13692 }
13693
13694 if (PPC_HA (off) != 0)
13695 {
13696 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13697 p += 4;
13698 }
13699 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13700 p += 4;
13701 bfd_put_32 (s->owner, MTCTR_R12, p);
13702 p += 4;
13703 bfd_put_32 (s->owner, BCTR, p);
13704 break;
13705 }
13706 return TRUE;
13707 }
13708
13709 /* Write PLT relocs for locals. */
13710
13711 static bfd_boolean
13712 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13713 {
13714 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13715 bfd *ibfd;
13716
13717 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13718 {
13719 struct got_entry **lgot_ents, **end_lgot_ents;
13720 struct plt_entry **local_plt, **lplt, **end_local_plt;
13721 Elf_Internal_Shdr *symtab_hdr;
13722 bfd_size_type locsymcount;
13723 Elf_Internal_Sym *local_syms = NULL;
13724 struct plt_entry *ent;
13725
13726 if (!is_ppc64_elf (ibfd))
13727 continue;
13728
13729 lgot_ents = elf_local_got_ents (ibfd);
13730 if (!lgot_ents)
13731 continue;
13732
13733 symtab_hdr = &elf_symtab_hdr (ibfd);
13734 locsymcount = symtab_hdr->sh_info;
13735 end_lgot_ents = lgot_ents + locsymcount;
13736 local_plt = (struct plt_entry **) end_lgot_ents;
13737 end_local_plt = local_plt + locsymcount;
13738 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13739 for (ent = *lplt; ent != NULL; ent = ent->next)
13740 if (ent->plt.offset != (bfd_vma) -1)
13741 {
13742 Elf_Internal_Sym *sym;
13743 asection *sym_sec;
13744 asection *plt, *relplt;
13745 bfd_byte *loc;
13746 bfd_vma val;
13747
13748 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13749 lplt - local_plt, ibfd))
13750 {
13751 if (local_syms != NULL
13752 && symtab_hdr->contents != (unsigned char *) local_syms)
13753 free (local_syms);
13754 return FALSE;
13755 }
13756
13757 val = sym->st_value + ent->addend;
13758 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13759 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
13760 if (sym_sec != NULL && sym_sec->output_section != NULL)
13761 val += sym_sec->output_offset + sym_sec->output_section->vma;
13762
13763 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13764 {
13765 htab->local_ifunc_resolver = 1;
13766 plt = htab->elf.iplt;
13767 relplt = htab->elf.irelplt;
13768 }
13769 else
13770 {
13771 plt = htab->pltlocal;
13772 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13773 }
13774
13775 if (relplt == NULL)
13776 {
13777 loc = plt->contents + ent->plt.offset;
13778 bfd_put_64 (info->output_bfd, val, loc);
13779 if (htab->opd_abi)
13780 {
13781 bfd_vma toc = elf_gp (ibfd);
13782 bfd_put_64 (info->output_bfd, toc, loc + 8);
13783 }
13784 }
13785 else
13786 {
13787 Elf_Internal_Rela rela;
13788 rela.r_offset = (ent->plt.offset
13789 + plt->output_offset
13790 + plt->output_section->vma);
13791 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13792 {
13793 if (htab->opd_abi)
13794 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13795 else
13796 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13797 }
13798 else
13799 {
13800 if (htab->opd_abi)
13801 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13802 else
13803 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13804 }
13805 rela.r_addend = val;
13806 loc = relplt->contents + (relplt->reloc_count++
13807 * sizeof (Elf64_External_Rela));
13808 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13809 }
13810 }
13811
13812 if (local_syms != NULL
13813 && symtab_hdr->contents != (unsigned char *) local_syms)
13814 {
13815 if (!info->keep_memory)
13816 free (local_syms);
13817 else
13818 symtab_hdr->contents = (unsigned char *) local_syms;
13819 }
13820 }
13821 return TRUE;
13822 }
13823
13824 /* Build all the stubs associated with the current output file.
13825 The stubs are kept in a hash table attached to the main linker
13826 hash table. This function is called via gldelf64ppc_finish. */
13827
13828 bfd_boolean
13829 ppc64_elf_build_stubs (struct bfd_link_info *info,
13830 char **stats)
13831 {
13832 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13833 struct map_stub *group;
13834 asection *stub_sec;
13835 bfd_byte *p;
13836 int stub_sec_count = 0;
13837
13838 if (htab == NULL)
13839 return FALSE;
13840
13841 /* Allocate memory to hold the linker stubs. */
13842 for (group = htab->group; group != NULL; group = group->next)
13843 {
13844 group->eh_size = 0;
13845 group->lr_restore = 0;
13846 if ((stub_sec = group->stub_sec) != NULL
13847 && stub_sec->size != 0)
13848 {
13849 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13850 stub_sec->size);
13851 if (stub_sec->contents == NULL)
13852 return FALSE;
13853 stub_sec->size = 0;
13854 }
13855 }
13856
13857 if (htab->glink != NULL && htab->glink->size != 0)
13858 {
13859 unsigned int indx;
13860 bfd_vma plt0;
13861
13862 /* Build the .glink plt call stub. */
13863 if (htab->params->emit_stub_syms)
13864 {
13865 struct elf_link_hash_entry *h;
13866 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13867 TRUE, FALSE, FALSE);
13868 if (h == NULL)
13869 return FALSE;
13870 if (h->root.type == bfd_link_hash_new)
13871 {
13872 h->root.type = bfd_link_hash_defined;
13873 h->root.u.def.section = htab->glink;
13874 h->root.u.def.value = 8;
13875 h->ref_regular = 1;
13876 h->def_regular = 1;
13877 h->ref_regular_nonweak = 1;
13878 h->forced_local = 1;
13879 h->non_elf = 0;
13880 h->root.linker_def = 1;
13881 }
13882 }
13883 plt0 = (htab->elf.splt->output_section->vma
13884 + htab->elf.splt->output_offset
13885 - 16);
13886 if (info->emitrelocations)
13887 {
13888 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13889 if (r == NULL)
13890 return FALSE;
13891 r->r_offset = (htab->glink->output_offset
13892 + htab->glink->output_section->vma);
13893 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13894 r->r_addend = plt0;
13895 }
13896 p = htab->glink->contents;
13897 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
13898 bfd_put_64 (htab->glink->owner, plt0, p);
13899 p += 8;
13900 if (htab->opd_abi)
13901 {
13902 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13903 p += 4;
13904 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13905 p += 4;
13906 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13907 p += 4;
13908 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13909 p += 4;
13910 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13911 p += 4;
13912 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13913 p += 4;
13914 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13915 p += 4;
13916 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13917 p += 4;
13918 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13919 p += 4;
13920 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13921 p += 4;
13922 }
13923 else
13924 {
13925 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13926 p += 4;
13927 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13928 p += 4;
13929 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13930 p += 4;
13931 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13932 p += 4;
13933 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13934 p += 4;
13935 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13936 p += 4;
13937 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13938 p += 4;
13939 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13940 p += 4;
13941 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13942 p += 4;
13943 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13944 p += 4;
13945 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13946 p += 4;
13947 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13948 p += 4;
13949 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13950 p += 4;
13951 }
13952 bfd_put_32 (htab->glink->owner, BCTR, p);
13953 p += 4;
13954 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
13955
13956 /* Build the .glink lazy link call stubs. */
13957 indx = 0;
13958 while (p < htab->glink->contents + htab->glink->size)
13959 {
13960 if (htab->opd_abi)
13961 {
13962 if (indx < 0x8000)
13963 {
13964 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13965 p += 4;
13966 }
13967 else
13968 {
13969 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13970 p += 4;
13971 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13972 p);
13973 p += 4;
13974 }
13975 }
13976 bfd_put_32 (htab->glink->owner,
13977 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13978 indx++;
13979 p += 4;
13980 }
13981 }
13982
13983 /* Build .glink global entry stubs, and PLT relocs for globals. */
13984 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13985
13986 if (!write_plt_relocs_for_local_syms (info))
13987 return FALSE;
13988
13989 if (htab->brlt != NULL && htab->brlt->size != 0)
13990 {
13991 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13992 htab->brlt->size);
13993 if (htab->brlt->contents == NULL)
13994 return FALSE;
13995 }
13996 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13997 {
13998 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13999 htab->relbrlt->size);
14000 if (htab->relbrlt->contents == NULL)
14001 return FALSE;
14002 }
14003
14004 /* Build the stubs as directed by the stub hash table. */
14005 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
14006
14007 for (group = htab->group; group != NULL; group = group->next)
14008 if (group->needs_save_res)
14009 group->stub_sec->size += htab->sfpr->size;
14010
14011 if (htab->relbrlt != NULL)
14012 htab->relbrlt->reloc_count = 0;
14013
14014 if (htab->params->plt_stub_align != 0)
14015 for (group = htab->group; group != NULL; group = group->next)
14016 if ((stub_sec = group->stub_sec) != NULL)
14017 {
14018 int align = abs (htab->params->plt_stub_align);
14019 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14020 }
14021
14022 for (group = htab->group; group != NULL; group = group->next)
14023 if (group->needs_save_res)
14024 {
14025 stub_sec = group->stub_sec;
14026 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14027 htab->sfpr->contents, htab->sfpr->size);
14028 if (htab->params->emit_stub_syms)
14029 {
14030 unsigned int i;
14031
14032 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14033 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14034 return FALSE;
14035 }
14036 }
14037
14038 if (htab->glink_eh_frame != NULL
14039 && htab->glink_eh_frame->size != 0)
14040 {
14041 bfd_vma val;
14042 size_t align = 4;
14043
14044 p = htab->glink_eh_frame->contents;
14045 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14046
14047 for (group = htab->group; group != NULL; group = group->next)
14048 if (group->eh_size != 0)
14049 {
14050 /* Offset to stub section. */
14051 val = (group->stub_sec->output_section->vma
14052 + group->stub_sec->output_offset);
14053 val -= (htab->glink_eh_frame->output_section->vma
14054 + htab->glink_eh_frame->output_offset
14055 + (p + 8 - htab->glink_eh_frame->contents));
14056 if (val + 0x80000000 > 0xffffffff)
14057 {
14058 _bfd_error_handler
14059 (_("%s offset too large for .eh_frame sdata4 encoding"),
14060 group->stub_sec->name);
14061 return FALSE;
14062 }
14063 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14064 p += (group->eh_size + 17 + 3) & -4;
14065 }
14066 if (htab->glink != NULL && htab->glink->size != 0)
14067 {
14068 /* Offset to .glink. */
14069 val = (htab->glink->output_section->vma
14070 + htab->glink->output_offset
14071 + 8);
14072 val -= (htab->glink_eh_frame->output_section->vma
14073 + htab->glink_eh_frame->output_offset
14074 + (p + 8 - htab->glink_eh_frame->contents));
14075 if (val + 0x80000000 > 0xffffffff)
14076 {
14077 _bfd_error_handler
14078 (_("%s offset too large for .eh_frame sdata4 encoding"),
14079 htab->glink->name);
14080 return FALSE;
14081 }
14082 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14083 p += (24 + align - 1) & -align;
14084 }
14085 }
14086
14087 for (group = htab->group; group != NULL; group = group->next)
14088 if ((stub_sec = group->stub_sec) != NULL)
14089 {
14090 stub_sec_count += 1;
14091 if (stub_sec->rawsize != stub_sec->size
14092 && (htab->stub_iteration <= STUB_SHRINK_ITER
14093 || stub_sec->rawsize < stub_sec->size))
14094 break;
14095 }
14096
14097 if (group != NULL)
14098 {
14099 htab->stub_error = TRUE;
14100 _bfd_error_handler (_("stubs don't match calculated size"));
14101 }
14102
14103 if (htab->stub_error)
14104 return FALSE;
14105
14106 if (stats != NULL)
14107 {
14108 size_t len;
14109 *stats = bfd_malloc (500);
14110 if (*stats == NULL)
14111 return FALSE;
14112
14113 len = sprintf (*stats,
14114 ngettext ("linker stubs in %u group\n",
14115 "linker stubs in %u groups\n",
14116 stub_sec_count),
14117 stub_sec_count);
14118 sprintf (*stats + len, _(" branch %lu\n"
14119 " branch toc adj %lu\n"
14120 " branch notoc %lu\n"
14121 " branch both %lu\n"
14122 " long branch %lu\n"
14123 " long toc adj %lu\n"
14124 " long notoc %lu\n"
14125 " long both %lu\n"
14126 " plt call %lu\n"
14127 " plt call save %lu\n"
14128 " plt call notoc %lu\n"
14129 " plt call both %lu\n"
14130 " global entry %lu"),
14131 htab->stub_count[ppc_stub_long_branch - 1],
14132 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14133 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14134 htab->stub_count[ppc_stub_long_branch_both - 1],
14135 htab->stub_count[ppc_stub_plt_branch - 1],
14136 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14137 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14138 htab->stub_count[ppc_stub_plt_branch_both - 1],
14139 htab->stub_count[ppc_stub_plt_call - 1],
14140 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14141 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14142 htab->stub_count[ppc_stub_plt_call_both - 1],
14143 htab->stub_count[ppc_stub_global_entry - 1]);
14144 }
14145 return TRUE;
14146 }
14147
14148 /* What to do when ld finds relocations against symbols defined in
14149 discarded sections. */
14150
14151 static unsigned int
14152 ppc64_elf_action_discarded (asection *sec)
14153 {
14154 if (strcmp (".opd", sec->name) == 0)
14155 return 0;
14156
14157 if (strcmp (".toc", sec->name) == 0)
14158 return 0;
14159
14160 if (strcmp (".toc1", sec->name) == 0)
14161 return 0;
14162
14163 return _bfd_elf_default_action_discarded (sec);
14164 }
14165
14166 /* These are the dynamic relocations supported by glibc. */
14167
14168 static bfd_boolean
14169 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14170 {
14171 switch (r_type)
14172 {
14173 case R_PPC64_RELATIVE:
14174 case R_PPC64_NONE:
14175 case R_PPC64_ADDR64:
14176 case R_PPC64_GLOB_DAT:
14177 case R_PPC64_IRELATIVE:
14178 case R_PPC64_JMP_IREL:
14179 case R_PPC64_JMP_SLOT:
14180 case R_PPC64_DTPMOD64:
14181 case R_PPC64_DTPREL64:
14182 case R_PPC64_TPREL64:
14183 case R_PPC64_TPREL16_LO_DS:
14184 case R_PPC64_TPREL16_DS:
14185 case R_PPC64_TPREL16:
14186 case R_PPC64_TPREL16_LO:
14187 case R_PPC64_TPREL16_HI:
14188 case R_PPC64_TPREL16_HIGH:
14189 case R_PPC64_TPREL16_HA:
14190 case R_PPC64_TPREL16_HIGHA:
14191 case R_PPC64_TPREL16_HIGHER:
14192 case R_PPC64_TPREL16_HIGHEST:
14193 case R_PPC64_TPREL16_HIGHERA:
14194 case R_PPC64_TPREL16_HIGHESTA:
14195 case R_PPC64_ADDR16_LO_DS:
14196 case R_PPC64_ADDR16_LO:
14197 case R_PPC64_ADDR16_HI:
14198 case R_PPC64_ADDR16_HIGH:
14199 case R_PPC64_ADDR16_HA:
14200 case R_PPC64_ADDR16_HIGHA:
14201 case R_PPC64_REL30:
14202 case R_PPC64_COPY:
14203 case R_PPC64_UADDR64:
14204 case R_PPC64_UADDR32:
14205 case R_PPC64_ADDR32:
14206 case R_PPC64_ADDR24:
14207 case R_PPC64_ADDR16:
14208 case R_PPC64_UADDR16:
14209 case R_PPC64_ADDR16_DS:
14210 case R_PPC64_ADDR16_HIGHER:
14211 case R_PPC64_ADDR16_HIGHEST:
14212 case R_PPC64_ADDR16_HIGHERA:
14213 case R_PPC64_ADDR16_HIGHESTA:
14214 case R_PPC64_ADDR14:
14215 case R_PPC64_ADDR14_BRTAKEN:
14216 case R_PPC64_ADDR14_BRNTAKEN:
14217 case R_PPC64_REL32:
14218 case R_PPC64_REL64:
14219 return TRUE;
14220
14221 default:
14222 return FALSE;
14223 }
14224 }
14225
14226 /* The RELOCATE_SECTION function is called by the ELF backend linker
14227 to handle the relocations for a section.
14228
14229 The relocs are always passed as Rela structures; if the section
14230 actually uses Rel structures, the r_addend field will always be
14231 zero.
14232
14233 This function is responsible for adjust the section contents as
14234 necessary, and (if using Rela relocs and generating a
14235 relocatable output file) adjusting the reloc addend as
14236 necessary.
14237
14238 This function does not have to worry about setting the reloc
14239 address or the reloc symbol index.
14240
14241 LOCAL_SYMS is a pointer to the swapped in local symbols.
14242
14243 LOCAL_SECTIONS is an array giving the section in the input file
14244 corresponding to the st_shndx field of each local symbol.
14245
14246 The global hash table entry for the global symbols can be found
14247 via elf_sym_hashes (input_bfd).
14248
14249 When generating relocatable output, this function must handle
14250 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14251 going to be the section symbol corresponding to the output
14252 section, which means that the addend must be adjusted
14253 accordingly. */
14254
14255 static bfd_boolean
14256 ppc64_elf_relocate_section (bfd *output_bfd,
14257 struct bfd_link_info *info,
14258 bfd *input_bfd,
14259 asection *input_section,
14260 bfd_byte *contents,
14261 Elf_Internal_Rela *relocs,
14262 Elf_Internal_Sym *local_syms,
14263 asection **local_sections)
14264 {
14265 struct ppc_link_hash_table *htab;
14266 Elf_Internal_Shdr *symtab_hdr;
14267 struct elf_link_hash_entry **sym_hashes;
14268 Elf_Internal_Rela *rel;
14269 Elf_Internal_Rela *wrel;
14270 Elf_Internal_Rela *relend;
14271 Elf_Internal_Rela outrel;
14272 bfd_byte *loc;
14273 struct got_entry **local_got_ents;
14274 bfd_vma TOCstart;
14275 bfd_boolean ret = TRUE;
14276 bfd_boolean is_opd;
14277 /* Assume 'at' branch hints. */
14278 bfd_boolean is_isa_v2 = TRUE;
14279 bfd_boolean warned_dynamic = FALSE;
14280 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14281
14282 /* Initialize howto table if needed. */
14283 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14284 ppc_howto_init ();
14285
14286 htab = ppc_hash_table (info);
14287 if (htab == NULL)
14288 return FALSE;
14289
14290 /* Don't relocate stub sections. */
14291 if (input_section->owner == htab->params->stub_bfd)
14292 return TRUE;
14293
14294 if (!is_ppc64_elf (input_bfd))
14295 {
14296 bfd_set_error (bfd_error_wrong_format);
14297 return FALSE;
14298 }
14299
14300 local_got_ents = elf_local_got_ents (input_bfd);
14301 TOCstart = elf_gp (output_bfd);
14302 symtab_hdr = &elf_symtab_hdr (input_bfd);
14303 sym_hashes = elf_sym_hashes (input_bfd);
14304 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14305
14306 rel = wrel = relocs;
14307 relend = relocs + input_section->reloc_count;
14308 for (; rel < relend; wrel++, rel++)
14309 {
14310 enum elf_ppc64_reloc_type r_type;
14311 bfd_vma addend;
14312 bfd_reloc_status_type r;
14313 Elf_Internal_Sym *sym;
14314 asection *sec;
14315 struct elf_link_hash_entry *h_elf;
14316 struct ppc_link_hash_entry *h;
14317 struct ppc_link_hash_entry *fdh;
14318 const char *sym_name;
14319 unsigned long r_symndx, toc_symndx;
14320 bfd_vma toc_addend;
14321 unsigned char tls_mask, tls_gd, tls_type;
14322 unsigned char sym_type;
14323 bfd_vma relocation;
14324 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14325 bfd_boolean warned;
14326 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14327 unsigned int insn;
14328 unsigned int mask;
14329 struct ppc_stub_hash_entry *stub_entry;
14330 bfd_vma max_br_offset;
14331 bfd_vma from;
14332 Elf_Internal_Rela orig_rel;
14333 reloc_howto_type *howto;
14334 struct reloc_howto_struct alt_howto;
14335 uint64_t pinsn;
14336 bfd_vma offset;
14337
14338 again:
14339 orig_rel = *rel;
14340
14341 r_type = ELF64_R_TYPE (rel->r_info);
14342 r_symndx = ELF64_R_SYM (rel->r_info);
14343
14344 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14345 symbol of the previous ADDR64 reloc. The symbol gives us the
14346 proper TOC base to use. */
14347 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14348 && wrel != relocs
14349 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14350 && is_opd)
14351 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14352
14353 sym = NULL;
14354 sec = NULL;
14355 h_elf = NULL;
14356 sym_name = NULL;
14357 unresolved_reloc = FALSE;
14358 warned = FALSE;
14359
14360 if (r_symndx < symtab_hdr->sh_info)
14361 {
14362 /* It's a local symbol. */
14363 struct _opd_sec_data *opd;
14364
14365 sym = local_syms + r_symndx;
14366 sec = local_sections[r_symndx];
14367 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14368 sym_type = ELF64_ST_TYPE (sym->st_info);
14369 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14370 opd = get_opd_info (sec);
14371 if (opd != NULL && opd->adjust != NULL)
14372 {
14373 long adjust = opd->adjust[OPD_NDX (sym->st_value
14374 + rel->r_addend)];
14375 if (adjust == -1)
14376 relocation = 0;
14377 else
14378 {
14379 /* If this is a relocation against the opd section sym
14380 and we have edited .opd, adjust the reloc addend so
14381 that ld -r and ld --emit-relocs output is correct.
14382 If it is a reloc against some other .opd symbol,
14383 then the symbol value will be adjusted later. */
14384 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14385 rel->r_addend += adjust;
14386 else
14387 relocation += adjust;
14388 }
14389 }
14390 }
14391 else
14392 {
14393 bfd_boolean ignored;
14394
14395 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14396 r_symndx, symtab_hdr, sym_hashes,
14397 h_elf, sec, relocation,
14398 unresolved_reloc, warned, ignored);
14399 sym_name = h_elf->root.root.string;
14400 sym_type = h_elf->type;
14401 if (sec != NULL
14402 && sec->owner == output_bfd
14403 && strcmp (sec->name, ".opd") == 0)
14404 {
14405 /* This is a symbol defined in a linker script. All
14406 such are defined in output sections, even those
14407 defined by simple assignment from a symbol defined in
14408 an input section. Transfer the symbol to an
14409 appropriate input .opd section, so that a branch to
14410 this symbol will be mapped to the location specified
14411 by the opd entry. */
14412 struct bfd_link_order *lo;
14413 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14414 if (lo->type == bfd_indirect_link_order)
14415 {
14416 asection *isec = lo->u.indirect.section;
14417 if (h_elf->root.u.def.value >= isec->output_offset
14418 && h_elf->root.u.def.value < (isec->output_offset
14419 + isec->size))
14420 {
14421 h_elf->root.u.def.value -= isec->output_offset;
14422 h_elf->root.u.def.section = isec;
14423 sec = isec;
14424 break;
14425 }
14426 }
14427 }
14428 }
14429 h = (struct ppc_link_hash_entry *) h_elf;
14430
14431 if (sec != NULL && discarded_section (sec))
14432 {
14433 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14434 input_bfd, input_section,
14435 contents, rel->r_offset);
14436 wrel->r_offset = rel->r_offset;
14437 wrel->r_info = 0;
14438 wrel->r_addend = 0;
14439
14440 /* For ld -r, remove relocations in debug sections against
14441 symbols defined in discarded sections. Not done for
14442 non-debug to preserve relocs in .eh_frame which the
14443 eh_frame editing code expects to be present. */
14444 if (bfd_link_relocatable (info)
14445 && (input_section->flags & SEC_DEBUGGING))
14446 wrel--;
14447
14448 continue;
14449 }
14450
14451 if (bfd_link_relocatable (info))
14452 goto copy_reloc;
14453
14454 if (h != NULL && &h->elf == htab->elf.hgot)
14455 {
14456 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14457 sec = bfd_abs_section_ptr;
14458 unresolved_reloc = FALSE;
14459 }
14460
14461 /* TLS optimizations. Replace instruction sequences and relocs
14462 based on information we collected in tls_optimize. We edit
14463 RELOCS so that --emit-relocs will output something sensible
14464 for the final instruction stream. */
14465 tls_mask = 0;
14466 tls_gd = 0;
14467 toc_symndx = 0;
14468 if (h != NULL)
14469 tls_mask = h->tls_mask;
14470 else if (local_got_ents != NULL)
14471 {
14472 struct plt_entry **local_plt = (struct plt_entry **)
14473 (local_got_ents + symtab_hdr->sh_info);
14474 unsigned char *lgot_masks = (unsigned char *)
14475 (local_plt + symtab_hdr->sh_info);
14476 tls_mask = lgot_masks[r_symndx];
14477 }
14478 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14479 && (r_type == R_PPC64_TLS
14480 || r_type == R_PPC64_TLSGD
14481 || r_type == R_PPC64_TLSLD))
14482 {
14483 /* Check for toc tls entries. */
14484 unsigned char *toc_tls;
14485
14486 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14487 &local_syms, rel, input_bfd))
14488 return FALSE;
14489
14490 if (toc_tls)
14491 tls_mask = *toc_tls;
14492 }
14493
14494 /* Check that tls relocs are used with tls syms, and non-tls
14495 relocs are used with non-tls syms. */
14496 if (r_symndx != STN_UNDEF
14497 && r_type != R_PPC64_NONE
14498 && (h == NULL
14499 || h->elf.root.type == bfd_link_hash_defined
14500 || h->elf.root.type == bfd_link_hash_defweak)
14501 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14502 {
14503 if ((tls_mask & TLS_TLS) != 0
14504 && (r_type == R_PPC64_TLS
14505 || r_type == R_PPC64_TLSGD
14506 || r_type == R_PPC64_TLSLD))
14507 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14508 ;
14509 else
14510 info->callbacks->einfo
14511 (!IS_PPC64_TLS_RELOC (r_type)
14512 /* xgettext:c-format */
14513 ? _("%H: %s used with TLS symbol `%pT'\n")
14514 /* xgettext:c-format */
14515 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14516 input_bfd, input_section, rel->r_offset,
14517 ppc64_elf_howto_table[r_type]->name,
14518 sym_name);
14519 }
14520
14521 /* Ensure reloc mapping code below stays sane. */
14522 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14523 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14524 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14525 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14526 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14527 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14528 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14529 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14530 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14531 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14532 abort ();
14533
14534 switch (r_type)
14535 {
14536 default:
14537 break;
14538
14539 case R_PPC64_LO_DS_OPT:
14540 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14541 if ((insn & (0x3fu << 26)) != 58u << 26)
14542 abort ();
14543 insn += (14u << 26) - (58u << 26);
14544 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14545 r_type = R_PPC64_TOC16_LO;
14546 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14547 break;
14548
14549 case R_PPC64_TOC16:
14550 case R_PPC64_TOC16_LO:
14551 case R_PPC64_TOC16_DS:
14552 case R_PPC64_TOC16_LO_DS:
14553 {
14554 /* Check for toc tls entries. */
14555 unsigned char *toc_tls;
14556 int retval;
14557
14558 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14559 &local_syms, rel, input_bfd);
14560 if (retval == 0)
14561 return FALSE;
14562
14563 if (toc_tls)
14564 {
14565 tls_mask = *toc_tls;
14566 if (r_type == R_PPC64_TOC16_DS
14567 || r_type == R_PPC64_TOC16_LO_DS)
14568 {
14569 if ((tls_mask & TLS_TLS) != 0
14570 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14571 goto toctprel;
14572 }
14573 else
14574 {
14575 /* If we found a GD reloc pair, then we might be
14576 doing a GD->IE transition. */
14577 if (retval == 2)
14578 {
14579 tls_gd = TLS_GDIE;
14580 if ((tls_mask & TLS_TLS) != 0
14581 && (tls_mask & TLS_GD) == 0)
14582 goto tls_ldgd_opt;
14583 }
14584 else if (retval == 3)
14585 {
14586 if ((tls_mask & TLS_TLS) != 0
14587 && (tls_mask & TLS_LD) == 0)
14588 goto tls_ldgd_opt;
14589 }
14590 }
14591 }
14592 }
14593 break;
14594
14595 case R_PPC64_GOT_TPREL16_HI:
14596 case R_PPC64_GOT_TPREL16_HA:
14597 if ((tls_mask & TLS_TLS) != 0
14598 && (tls_mask & TLS_TPREL) == 0)
14599 {
14600 rel->r_offset -= d_offset;
14601 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14602 r_type = R_PPC64_NONE;
14603 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14604 }
14605 break;
14606
14607 case R_PPC64_GOT_TPREL16_DS:
14608 case R_PPC64_GOT_TPREL16_LO_DS:
14609 if ((tls_mask & TLS_TLS) != 0
14610 && (tls_mask & TLS_TPREL) == 0)
14611 {
14612 toctprel:
14613 insn = bfd_get_32 (input_bfd,
14614 contents + rel->r_offset - d_offset);
14615 insn &= 31 << 21;
14616 insn |= 0x3c0d0000; /* addis 0,13,0 */
14617 bfd_put_32 (input_bfd, insn,
14618 contents + rel->r_offset - d_offset);
14619 r_type = R_PPC64_TPREL16_HA;
14620 if (toc_symndx != 0)
14621 {
14622 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14623 rel->r_addend = toc_addend;
14624 /* We changed the symbol. Start over in order to
14625 get h, sym, sec etc. right. */
14626 goto again;
14627 }
14628 else
14629 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14630 }
14631 break;
14632
14633 case R_PPC64_GOT_TPREL34:
14634 if ((tls_mask & TLS_TLS) != 0
14635 && (tls_mask & TLS_TPREL) == 0)
14636 {
14637 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14638 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14639 pinsn <<= 32;
14640 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14641 pinsn += ((2ULL << 56) + (-1ULL << 52)
14642 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14643 bfd_put_32 (input_bfd, pinsn >> 32,
14644 contents + rel->r_offset);
14645 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14646 contents + rel->r_offset + 4);
14647 r_type = R_PPC64_TPREL34;
14648 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14649 }
14650 break;
14651
14652 case R_PPC64_TLS:
14653 if ((tls_mask & TLS_TLS) != 0
14654 && (tls_mask & TLS_TPREL) == 0)
14655 {
14656 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
14657 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14658 if (insn == 0)
14659 break;
14660 if ((rel->r_offset & 3) == 0)
14661 {
14662 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14663 /* Was PPC64_TLS which sits on insn boundary, now
14664 PPC64_TPREL16_LO which is at low-order half-word. */
14665 rel->r_offset += d_offset;
14666 r_type = R_PPC64_TPREL16_LO;
14667 if (toc_symndx != 0)
14668 {
14669 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14670 rel->r_addend = toc_addend;
14671 /* We changed the symbol. Start over in order to
14672 get h, sym, sec etc. right. */
14673 goto again;
14674 }
14675 else
14676 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14677 }
14678 else if ((rel->r_offset & 3) == 1)
14679 {
14680 /* For pcrel IE to LE we already have the full
14681 offset and thus don't need an addi here. A nop
14682 or mr will do. */
14683 if ((insn & (0x3fu << 26)) == 14 << 26)
14684 {
14685 /* Extract regs from addi rt,ra,si. */
14686 unsigned int rt = (insn >> 21) & 0x1f;
14687 unsigned int ra = (insn >> 16) & 0x1f;
14688 if (rt == ra)
14689 insn = NOP;
14690 else
14691 {
14692 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14693 insn = (rt << 16) | (ra << 21) | (ra << 11);
14694 insn |= (31u << 26) | (444u << 1);
14695 }
14696 }
14697 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
14698 }
14699 }
14700 break;
14701
14702 case R_PPC64_GOT_TLSGD16_HI:
14703 case R_PPC64_GOT_TLSGD16_HA:
14704 tls_gd = TLS_GDIE;
14705 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14706 goto tls_gdld_hi;
14707 break;
14708
14709 case R_PPC64_GOT_TLSLD16_HI:
14710 case R_PPC64_GOT_TLSLD16_HA:
14711 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14712 {
14713 tls_gdld_hi:
14714 if ((tls_mask & tls_gd) != 0)
14715 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14716 + R_PPC64_GOT_TPREL16_DS);
14717 else
14718 {
14719 rel->r_offset -= d_offset;
14720 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14721 r_type = R_PPC64_NONE;
14722 }
14723 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14724 }
14725 break;
14726
14727 case R_PPC64_GOT_TLSGD16:
14728 case R_PPC64_GOT_TLSGD16_LO:
14729 tls_gd = TLS_GDIE;
14730 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14731 goto tls_ldgd_opt;
14732 break;
14733
14734 case R_PPC64_GOT_TLSLD16:
14735 case R_PPC64_GOT_TLSLD16_LO:
14736 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14737 {
14738 unsigned int insn1, insn2;
14739
14740 tls_ldgd_opt:
14741 offset = (bfd_vma) -1;
14742 /* If not using the newer R_PPC64_TLSGD/LD to mark
14743 __tls_get_addr calls, we must trust that the call
14744 stays with its arg setup insns, ie. that the next
14745 reloc is the __tls_get_addr call associated with
14746 the current reloc. Edit both insns. */
14747 if (input_section->nomark_tls_get_addr
14748 && rel + 1 < relend
14749 && branch_reloc_hash_match (input_bfd, rel + 1,
14750 htab->tls_get_addr,
14751 htab->tls_get_addr_fd))
14752 offset = rel[1].r_offset;
14753 /* We read the low GOT_TLS (or TOC16) insn because we
14754 need to keep the destination reg. It may be
14755 something other than the usual r3, and moved to r3
14756 before the call by intervening code. */
14757 insn1 = bfd_get_32 (input_bfd,
14758 contents + rel->r_offset - d_offset);
14759 if ((tls_mask & tls_gd) != 0)
14760 {
14761 /* IE */
14762 insn1 &= (0x1f << 21) | (0x1f << 16);
14763 insn1 |= 58u << 26; /* ld */
14764 insn2 = 0x7c636a14; /* add 3,3,13 */
14765 if (offset != (bfd_vma) -1)
14766 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14767 if (r_type == R_PPC64_TOC16
14768 || r_type == R_PPC64_TOC16_LO)
14769 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
14770 else
14771 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14772 + R_PPC64_GOT_TPREL16_DS);
14773 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14774 }
14775 else
14776 {
14777 /* LE */
14778 insn1 &= 0x1f << 21;
14779 insn1 |= 0x3c0d0000; /* addis r,13,0 */
14780 insn2 = 0x38630000; /* addi 3,3,0 */
14781 if (tls_gd == 0)
14782 {
14783 /* Was an LD reloc. */
14784 r_symndx = STN_UNDEF;
14785 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14786 }
14787 else if (toc_symndx != 0)
14788 {
14789 r_symndx = toc_symndx;
14790 rel->r_addend = toc_addend;
14791 }
14792 r_type = R_PPC64_TPREL16_HA;
14793 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14794 if (offset != (bfd_vma) -1)
14795 {
14796 rel[1].r_info = ELF64_R_INFO (r_symndx,
14797 R_PPC64_TPREL16_LO);
14798 rel[1].r_offset = offset + d_offset;
14799 rel[1].r_addend = rel->r_addend;
14800 }
14801 }
14802 bfd_put_32 (input_bfd, insn1,
14803 contents + rel->r_offset - d_offset);
14804 if (offset != (bfd_vma) -1)
14805 {
14806 bfd_put_32 (input_bfd, insn2, contents + offset);
14807 if (offset + 8 <= input_section->size)
14808 {
14809 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14810 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14811 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14812 }
14813 }
14814 if ((tls_mask & tls_gd) == 0
14815 && (tls_gd == 0 || toc_symndx != 0))
14816 {
14817 /* We changed the symbol. Start over in order
14818 to get h, sym, sec etc. right. */
14819 goto again;
14820 }
14821 }
14822 break;
14823
14824 case R_PPC64_GOT_TLSGD34:
14825 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14826 {
14827 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14828 pinsn <<= 32;
14829 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14830 if ((tls_mask & TLS_GDIE) != 0)
14831 {
14832 /* IE, pla -> pld */
14833 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14834 r_type = R_PPC64_GOT_TPREL34;
14835 }
14836 else
14837 {
14838 /* LE, pla pcrel -> paddi r13 */
14839 pinsn += (-1ULL << 52) + (13ULL << 16);
14840 r_type = R_PPC64_TPREL34;
14841 }
14842 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14843 bfd_put_32 (input_bfd, pinsn >> 32,
14844 contents + rel->r_offset);
14845 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14846 contents + rel->r_offset + 4);
14847 }
14848 break;
14849
14850 case R_PPC64_GOT_TLSLD34:
14851 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14852 {
14853 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14854 pinsn <<= 32;
14855 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14856 pinsn += (-1ULL << 52) + (13ULL << 16);
14857 bfd_put_32 (input_bfd, pinsn >> 32,
14858 contents + rel->r_offset);
14859 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14860 contents + rel->r_offset + 4);
14861 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14862 r_symndx = STN_UNDEF;
14863 r_type = R_PPC64_TPREL34;
14864 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14865 goto again;
14866 }
14867 break;
14868
14869 case R_PPC64_TLSGD:
14870 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
14871 && rel + 1 < relend)
14872 {
14873 unsigned int insn2;
14874 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
14875
14876 offset = rel->r_offset;
14877 if (is_plt_seq_reloc (r_type1))
14878 {
14879 bfd_put_32 (output_bfd, NOP, contents + offset);
14880 if (r_type1 == R_PPC64_PLT_PCREL34
14881 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14882 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14883 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14884 break;
14885 }
14886
14887 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14888 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14889
14890 if ((tls_mask & TLS_GDIE) != 0)
14891 {
14892 /* IE */
14893 r_type = R_PPC64_NONE;
14894 insn2 = 0x7c636a14; /* add 3,3,13 */
14895 }
14896 else
14897 {
14898 /* LE */
14899 if (toc_symndx != 0)
14900 {
14901 r_symndx = toc_symndx;
14902 rel->r_addend = toc_addend;
14903 }
14904 if (r_type1 == R_PPC64_REL24_NOTOC
14905 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14906 {
14907 r_type = R_PPC64_NONE;
14908 insn2 = NOP;
14909 }
14910 else
14911 {
14912 rel->r_offset = offset + d_offset;
14913 r_type = R_PPC64_TPREL16_LO;
14914 insn2 = 0x38630000; /* addi 3,3,0 */
14915 }
14916 }
14917 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14918 /* Zap the reloc on the _tls_get_addr call too. */
14919 BFD_ASSERT (offset == rel[1].r_offset);
14920 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14921 bfd_put_32 (input_bfd, insn2, contents + offset);
14922 if ((tls_mask & TLS_GDIE) == 0
14923 && toc_symndx != 0
14924 && r_type != R_PPC64_NONE)
14925 goto again;
14926 }
14927 break;
14928
14929 case R_PPC64_TLSLD:
14930 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
14931 && rel + 1 < relend)
14932 {
14933 unsigned int insn2;
14934 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
14935
14936 offset = rel->r_offset;
14937 if (is_plt_seq_reloc (r_type1))
14938 {
14939 bfd_put_32 (output_bfd, NOP, contents + offset);
14940 if (r_type1 == R_PPC64_PLT_PCREL34
14941 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14942 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14943 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14944 break;
14945 }
14946
14947 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14948 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14949
14950 if (r_type1 == R_PPC64_REL24_NOTOC
14951 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14952 {
14953 r_type = R_PPC64_NONE;
14954 insn2 = NOP;
14955 }
14956 else
14957 {
14958 rel->r_offset = offset + d_offset;
14959 r_symndx = STN_UNDEF;
14960 r_type = R_PPC64_TPREL16_LO;
14961 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14962 insn2 = 0x38630000; /* addi 3,3,0 */
14963 }
14964 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14965 /* Zap the reloc on the _tls_get_addr call too. */
14966 BFD_ASSERT (offset == rel[1].r_offset);
14967 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14968 bfd_put_32 (input_bfd, insn2, contents + offset);
14969 if (r_type != R_PPC64_NONE)
14970 goto again;
14971 }
14972 break;
14973
14974 case R_PPC64_DTPMOD64:
14975 if (rel + 1 < relend
14976 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14977 && rel[1].r_offset == rel->r_offset + 8)
14978 {
14979 if ((tls_mask & TLS_GD) == 0)
14980 {
14981 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
14982 if ((tls_mask & TLS_GDIE) != 0)
14983 r_type = R_PPC64_TPREL64;
14984 else
14985 {
14986 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14987 r_type = R_PPC64_NONE;
14988 }
14989 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14990 }
14991 }
14992 else
14993 {
14994 if ((tls_mask & TLS_LD) == 0)
14995 {
14996 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14997 r_type = R_PPC64_NONE;
14998 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14999 }
15000 }
15001 break;
15002
15003 case R_PPC64_TPREL64:
15004 if ((tls_mask & TLS_TPREL) == 0)
15005 {
15006 r_type = R_PPC64_NONE;
15007 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15008 }
15009 break;
15010
15011 case R_PPC64_ENTRY:
15012 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15013 if (!bfd_link_pic (info)
15014 && !info->traditional_format
15015 && relocation + 0x80008000 <= 0xffffffff)
15016 {
15017 unsigned int insn1, insn2;
15018
15019 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15020 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15021 if ((insn1 & ~0xfffc) == LD_R2_0R12
15022 && insn2 == ADD_R2_R2_R12)
15023 {
15024 bfd_put_32 (input_bfd,
15025 LIS_R2 + PPC_HA (relocation),
15026 contents + rel->r_offset);
15027 bfd_put_32 (input_bfd,
15028 ADDI_R2_R2 + PPC_LO (relocation),
15029 contents + rel->r_offset + 4);
15030 }
15031 }
15032 else
15033 {
15034 relocation -= (rel->r_offset
15035 + input_section->output_offset
15036 + input_section->output_section->vma);
15037 if (relocation + 0x80008000 <= 0xffffffff)
15038 {
15039 unsigned int insn1, insn2;
15040
15041 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15042 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15043 if ((insn1 & ~0xfffc) == LD_R2_0R12
15044 && insn2 == ADD_R2_R2_R12)
15045 {
15046 bfd_put_32 (input_bfd,
15047 ADDIS_R2_R12 + PPC_HA (relocation),
15048 contents + rel->r_offset);
15049 bfd_put_32 (input_bfd,
15050 ADDI_R2_R2 + PPC_LO (relocation),
15051 contents + rel->r_offset + 4);
15052 }
15053 }
15054 }
15055 break;
15056
15057 case R_PPC64_REL16_HA:
15058 /* If we are generating a non-PIC executable, edit
15059 . 0: addis 2,12,.TOC.-0b@ha
15060 . addi 2,2,.TOC.-0b@l
15061 used by ELFv2 global entry points to set up r2, to
15062 . lis 2,.TOC.@ha
15063 . addi 2,2,.TOC.@l
15064 if .TOC. is in range. */
15065 if (!bfd_link_pic (info)
15066 && !info->traditional_format
15067 && !htab->opd_abi
15068 && rel->r_addend == d_offset
15069 && h != NULL && &h->elf == htab->elf.hgot
15070 && rel + 1 < relend
15071 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15072 && rel[1].r_offset == rel->r_offset + 4
15073 && rel[1].r_addend == rel->r_addend + 4
15074 && relocation + 0x80008000 <= 0xffffffff)
15075 {
15076 unsigned int insn1, insn2;
15077 offset = rel->r_offset - d_offset;
15078 insn1 = bfd_get_32 (input_bfd, contents + offset);
15079 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15080 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15081 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15082 {
15083 r_type = R_PPC64_ADDR16_HA;
15084 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15085 rel->r_addend -= d_offset;
15086 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15087 rel[1].r_addend -= d_offset + 4;
15088 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15089 }
15090 }
15091 break;
15092 }
15093
15094 /* Handle other relocations that tweak non-addend part of insn. */
15095 insn = 0;
15096 max_br_offset = 1 << 25;
15097 addend = rel->r_addend;
15098 reloc_dest = DEST_NORMAL;
15099 switch (r_type)
15100 {
15101 default:
15102 break;
15103
15104 case R_PPC64_TOCSAVE:
15105 if (relocation + addend == (rel->r_offset
15106 + input_section->output_offset
15107 + input_section->output_section->vma)
15108 && tocsave_find (htab, NO_INSERT,
15109 &local_syms, rel, input_bfd))
15110 {
15111 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15112 if (insn == NOP
15113 || insn == CROR_151515 || insn == CROR_313131)
15114 bfd_put_32 (input_bfd,
15115 STD_R2_0R1 + STK_TOC (htab),
15116 contents + rel->r_offset);
15117 }
15118 break;
15119
15120 /* Branch taken prediction relocations. */
15121 case R_PPC64_ADDR14_BRTAKEN:
15122 case R_PPC64_REL14_BRTAKEN:
15123 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15124 /* Fall through. */
15125
15126 /* Branch not taken prediction relocations. */
15127 case R_PPC64_ADDR14_BRNTAKEN:
15128 case R_PPC64_REL14_BRNTAKEN:
15129 insn |= bfd_get_32 (input_bfd,
15130 contents + rel->r_offset) & ~(0x01 << 21);
15131 /* Fall through. */
15132
15133 case R_PPC64_REL14:
15134 max_br_offset = 1 << 15;
15135 /* Fall through. */
15136
15137 case R_PPC64_REL24:
15138 case R_PPC64_REL24_NOTOC:
15139 case R_PPC64_PLTCALL:
15140 case R_PPC64_PLTCALL_NOTOC:
15141 /* Calls to functions with a different TOC, such as calls to
15142 shared objects, need to alter the TOC pointer. This is
15143 done using a linkage stub. A REL24 branching to these
15144 linkage stubs needs to be followed by a nop, as the nop
15145 will be replaced with an instruction to restore the TOC
15146 base pointer. */
15147 fdh = h;
15148 if (h != NULL
15149 && h->oh != NULL
15150 && h->oh->is_func_descriptor)
15151 fdh = ppc_follow_link (h->oh);
15152 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15153 htab);
15154 if ((r_type == R_PPC64_PLTCALL
15155 || r_type == R_PPC64_PLTCALL_NOTOC)
15156 && stub_entry != NULL
15157 && stub_entry->stub_type >= ppc_stub_plt_call
15158 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15159 stub_entry = NULL;
15160
15161 if (stub_entry != NULL
15162 && ((stub_entry->stub_type >= ppc_stub_plt_call
15163 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15164 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15165 || stub_entry->stub_type == ppc_stub_plt_branch_both
15166 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15167 || stub_entry->stub_type == ppc_stub_long_branch_both))
15168 {
15169 bfd_boolean can_plt_call = FALSE;
15170
15171 if (stub_entry->stub_type == ppc_stub_plt_call
15172 && !htab->opd_abi
15173 && htab->params->plt_localentry0 != 0
15174 && is_elfv2_localentry0 (&h->elf))
15175 {
15176 /* The function doesn't use or change r2. */
15177 can_plt_call = TRUE;
15178 }
15179 else if (r_type == R_PPC64_REL24_NOTOC)
15180 {
15181 /* NOTOC calls don't need to restore r2. */
15182 can_plt_call = TRUE;
15183 }
15184
15185 /* All of these stubs may modify r2, so there must be a
15186 branch and link followed by a nop. The nop is
15187 replaced by an insn to restore r2. */
15188 else if (rel->r_offset + 8 <= input_section->size)
15189 {
15190 unsigned long br;
15191
15192 br = bfd_get_32 (input_bfd,
15193 contents + rel->r_offset);
15194 if ((br & 1) != 0)
15195 {
15196 unsigned long nop;
15197
15198 nop = bfd_get_32 (input_bfd,
15199 contents + rel->r_offset + 4);
15200 if (nop == LD_R2_0R1 + STK_TOC (htab))
15201 can_plt_call = TRUE;
15202 else if (nop == NOP
15203 || nop == CROR_151515
15204 || nop == CROR_313131)
15205 {
15206 if (h != NULL
15207 && (h == htab->tls_get_addr_fd
15208 || h == htab->tls_get_addr)
15209 && htab->params->tls_get_addr_opt)
15210 {
15211 /* Special stub used, leave nop alone. */
15212 }
15213 else
15214 bfd_put_32 (input_bfd,
15215 LD_R2_0R1 + STK_TOC (htab),
15216 contents + rel->r_offset + 4);
15217 can_plt_call = TRUE;
15218 }
15219 }
15220 }
15221
15222 if (!can_plt_call && h != NULL)
15223 {
15224 const char *name = h->elf.root.root.string;
15225
15226 if (*name == '.')
15227 ++name;
15228
15229 if (strncmp (name, "__libc_start_main", 17) == 0
15230 && (name[17] == 0 || name[17] == '@'))
15231 {
15232 /* Allow crt1 branch to go via a toc adjusting
15233 stub. Other calls that never return could do
15234 the same, if we could detect such. */
15235 can_plt_call = TRUE;
15236 }
15237 }
15238
15239 if (!can_plt_call)
15240 {
15241 /* g++ as of 20130507 emits self-calls without a
15242 following nop. This is arguably wrong since we
15243 have conflicting information. On the one hand a
15244 global symbol and on the other a local call
15245 sequence, but don't error for this special case.
15246 It isn't possible to cheaply verify we have
15247 exactly such a call. Allow all calls to the same
15248 section. */
15249 asection *code_sec = sec;
15250
15251 if (get_opd_info (sec) != NULL)
15252 {
15253 bfd_vma off = (relocation + addend
15254 - sec->output_section->vma
15255 - sec->output_offset);
15256
15257 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15258 }
15259 if (code_sec == input_section)
15260 can_plt_call = TRUE;
15261 }
15262
15263 if (!can_plt_call)
15264 {
15265 if (stub_entry->stub_type >= ppc_stub_plt_call
15266 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15267 info->callbacks->einfo
15268 /* xgettext:c-format */
15269 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15270 "(plt call stub)\n"),
15271 input_bfd, input_section, rel->r_offset, sym_name);
15272 else
15273 info->callbacks->einfo
15274 /* xgettext:c-format */
15275 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15276 "(toc save/adjust stub)\n"),
15277 input_bfd, input_section, rel->r_offset, sym_name);
15278
15279 bfd_set_error (bfd_error_bad_value);
15280 ret = FALSE;
15281 }
15282
15283 if (can_plt_call
15284 && stub_entry->stub_type >= ppc_stub_plt_call
15285 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15286 unresolved_reloc = FALSE;
15287 }
15288
15289 if ((stub_entry == NULL
15290 || stub_entry->stub_type == ppc_stub_long_branch
15291 || stub_entry->stub_type == ppc_stub_plt_branch)
15292 && get_opd_info (sec) != NULL)
15293 {
15294 /* The branch destination is the value of the opd entry. */
15295 bfd_vma off = (relocation + addend
15296 - sec->output_section->vma
15297 - sec->output_offset);
15298 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15299 if (dest != (bfd_vma) -1)
15300 {
15301 relocation = dest;
15302 addend = 0;
15303 reloc_dest = DEST_OPD;
15304 }
15305 }
15306
15307 /* If the branch is out of reach we ought to have a long
15308 branch stub. */
15309 from = (rel->r_offset
15310 + input_section->output_offset
15311 + input_section->output_section->vma);
15312
15313 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15314 ? fdh->elf.other
15315 : sym->st_other);
15316
15317 if (stub_entry != NULL
15318 && (stub_entry->stub_type == ppc_stub_long_branch
15319 || stub_entry->stub_type == ppc_stub_plt_branch)
15320 && (r_type == R_PPC64_ADDR14_BRTAKEN
15321 || r_type == R_PPC64_ADDR14_BRNTAKEN
15322 || (relocation + addend - from + max_br_offset
15323 < 2 * max_br_offset)))
15324 /* Don't use the stub if this branch is in range. */
15325 stub_entry = NULL;
15326
15327 if (stub_entry != NULL
15328 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15329 || stub_entry->stub_type == ppc_stub_long_branch_both
15330 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15331 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15332 && (r_type != R_PPC64_REL24_NOTOC
15333 || ((fdh ? fdh->elf.other : sym->st_other)
15334 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15335 && (relocation + addend - from + max_br_offset
15336 < 2 * max_br_offset))
15337 stub_entry = NULL;
15338
15339 if (stub_entry != NULL
15340 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15341 || stub_entry->stub_type == ppc_stub_long_branch_both
15342 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15343 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15344 && r_type == R_PPC64_REL24_NOTOC
15345 && (relocation + addend - from + max_br_offset
15346 < 2 * max_br_offset))
15347 stub_entry = NULL;
15348
15349 if (stub_entry != NULL)
15350 {
15351 /* Munge up the value and addend so that we call the stub
15352 rather than the procedure directly. */
15353 asection *stub_sec = stub_entry->group->stub_sec;
15354
15355 if (stub_entry->stub_type == ppc_stub_save_res)
15356 relocation += (stub_sec->output_offset
15357 + stub_sec->output_section->vma
15358 + stub_sec->size - htab->sfpr->size
15359 - htab->sfpr->output_offset
15360 - htab->sfpr->output_section->vma);
15361 else
15362 relocation = (stub_entry->stub_offset
15363 + stub_sec->output_offset
15364 + stub_sec->output_section->vma);
15365 addend = 0;
15366 reloc_dest = DEST_STUB;
15367
15368 if (((stub_entry->stub_type == ppc_stub_plt_call
15369 && ALWAYS_EMIT_R2SAVE)
15370 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15371 || stub_entry->stub_type == ppc_stub_plt_call_both)
15372 && !(h != NULL
15373 && (h == htab->tls_get_addr_fd
15374 || h == htab->tls_get_addr)
15375 && htab->params->tls_get_addr_opt)
15376 && rel + 1 < relend
15377 && rel[1].r_offset == rel->r_offset + 4
15378 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15379 relocation += 4;
15380 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15381 || stub_entry->stub_type == ppc_stub_plt_branch_both
15382 || stub_entry->stub_type == ppc_stub_plt_call_both)
15383 && r_type == R_PPC64_REL24_NOTOC)
15384 relocation += 4;
15385
15386 if (r_type == R_PPC64_REL24_NOTOC
15387 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15388 || stub_entry->stub_type == ppc_stub_plt_call_both))
15389 htab->notoc_plt = 1;
15390 }
15391
15392 if (insn != 0)
15393 {
15394 if (is_isa_v2)
15395 {
15396 /* Set 'a' bit. This is 0b00010 in BO field for branch
15397 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15398 for branch on CTR insns (BO == 1a00t or 1a01t). */
15399 if ((insn & (0x14 << 21)) == (0x04 << 21))
15400 insn |= 0x02 << 21;
15401 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15402 insn |= 0x08 << 21;
15403 else
15404 break;
15405 }
15406 else
15407 {
15408 /* Invert 'y' bit if not the default. */
15409 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15410 insn ^= 0x01 << 21;
15411 }
15412
15413 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15414 }
15415
15416 /* NOP out calls to undefined weak functions.
15417 We can thus call a weak function without first
15418 checking whether the function is defined. */
15419 else if (h != NULL
15420 && h->elf.root.type == bfd_link_hash_undefweak
15421 && h->elf.dynindx == -1
15422 && (r_type == R_PPC64_REL24
15423 || r_type == R_PPC64_REL24_NOTOC)
15424 && relocation == 0
15425 && addend == 0)
15426 {
15427 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15428 goto copy_reloc;
15429 }
15430 break;
15431
15432 case R_PPC64_GOT16_DS:
15433 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15434 if (relocation + addend - from + 0x8000 < 0x10000
15435 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15436 {
15437 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15438 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15439 {
15440 insn += (14u << 26) - (58u << 26);
15441 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15442 r_type = R_PPC64_TOC16;
15443 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15444 }
15445 }
15446 break;
15447
15448 case R_PPC64_GOT16_LO_DS:
15449 case R_PPC64_GOT16_HA:
15450 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15451 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15452 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15453 {
15454 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15455 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15456 {
15457 insn += (14u << 26) - (58u << 26);
15458 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15459 r_type = R_PPC64_TOC16_LO;
15460 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15461 }
15462 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
15463 {
15464 r_type = R_PPC64_TOC16_HA;
15465 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15466 }
15467 }
15468 break;
15469
15470 case R_PPC64_GOT_PCREL34:
15471 from = (rel->r_offset
15472 + input_section->output_section->vma
15473 + input_section->output_offset);
15474 if (relocation - from + (1ULL << 33) < 1ULL << 34
15475 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15476 {
15477 offset = rel->r_offset;
15478 pinsn = bfd_get_32 (input_bfd, contents + offset);
15479 pinsn <<= 32;
15480 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15481 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15482 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15483 {
15484 /* Replace with paddi. */
15485 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15486 r_type = R_PPC64_PCREL34;
15487 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15488 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15489 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15490 goto pcrelopt;
15491 }
15492 }
15493 break;
15494
15495 case R_PPC64_PCREL34:
15496 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15497 {
15498 offset = rel->r_offset;
15499 pinsn = bfd_get_32 (input_bfd, contents + offset);
15500 pinsn <<= 32;
15501 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15502 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15503 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15504 | (14ULL << 26) /* paddi */))
15505 {
15506 pcrelopt:
15507 if (rel + 1 < relend
15508 && rel[1].r_offset == offset
15509 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15510 {
15511 bfd_vma off2 = rel[1].r_addend;
15512 if (off2 == 0)
15513 /* zero means next insn. */
15514 off2 = 8;
15515 off2 += offset;
15516 if (off2 + 4 <= input_section->size)
15517 {
15518 uint64_t pinsn2;
15519 bfd_signed_vma addend_off;
15520 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15521 pinsn2 <<= 32;
15522 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15523 {
15524 if (off2 + 8 > input_section->size)
15525 break;
15526 pinsn2 |= bfd_get_32 (input_bfd,
15527 contents + off2 + 4);
15528 }
15529 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15530 {
15531 addend += addend_off;
15532 rel->r_addend = addend;
15533 bfd_put_32 (input_bfd, pinsn >> 32,
15534 contents + offset);
15535 bfd_put_32 (input_bfd, pinsn,
15536 contents + offset + 4);
15537 bfd_put_32 (input_bfd, pinsn2 >> 32,
15538 contents + off2);
15539 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15540 bfd_put_32 (input_bfd, pinsn2,
15541 contents + off2 + 4);
15542 }
15543 }
15544 }
15545 }
15546 }
15547 break;
15548 }
15549
15550 tls_type = 0;
15551 save_unresolved_reloc = unresolved_reloc;
15552 switch (r_type)
15553 {
15554 default:
15555 /* xgettext:c-format */
15556 _bfd_error_handler (_("%pB: %s unsupported"),
15557 input_bfd, ppc64_elf_howto_table[r_type]->name);
15558
15559 bfd_set_error (bfd_error_bad_value);
15560 ret = FALSE;
15561 goto copy_reloc;
15562
15563 case R_PPC64_NONE:
15564 case R_PPC64_TLS:
15565 case R_PPC64_TLSGD:
15566 case R_PPC64_TLSLD:
15567 case R_PPC64_TOCSAVE:
15568 case R_PPC64_GNU_VTINHERIT:
15569 case R_PPC64_GNU_VTENTRY:
15570 case R_PPC64_ENTRY:
15571 case R_PPC64_PCREL_OPT:
15572 goto copy_reloc;
15573
15574 /* GOT16 relocations. Like an ADDR16 using the symbol's
15575 address in the GOT as relocation value instead of the
15576 symbol's value itself. Also, create a GOT entry for the
15577 symbol and put the symbol value there. */
15578 case R_PPC64_GOT_TLSGD16:
15579 case R_PPC64_GOT_TLSGD16_LO:
15580 case R_PPC64_GOT_TLSGD16_HI:
15581 case R_PPC64_GOT_TLSGD16_HA:
15582 case R_PPC64_GOT_TLSGD34:
15583 tls_type = TLS_TLS | TLS_GD;
15584 goto dogot;
15585
15586 case R_PPC64_GOT_TLSLD16:
15587 case R_PPC64_GOT_TLSLD16_LO:
15588 case R_PPC64_GOT_TLSLD16_HI:
15589 case R_PPC64_GOT_TLSLD16_HA:
15590 case R_PPC64_GOT_TLSLD34:
15591 tls_type = TLS_TLS | TLS_LD;
15592 goto dogot;
15593
15594 case R_PPC64_GOT_TPREL16_DS:
15595 case R_PPC64_GOT_TPREL16_LO_DS:
15596 case R_PPC64_GOT_TPREL16_HI:
15597 case R_PPC64_GOT_TPREL16_HA:
15598 case R_PPC64_GOT_TPREL34:
15599 tls_type = TLS_TLS | TLS_TPREL;
15600 goto dogot;
15601
15602 case R_PPC64_GOT_DTPREL16_DS:
15603 case R_PPC64_GOT_DTPREL16_LO_DS:
15604 case R_PPC64_GOT_DTPREL16_HI:
15605 case R_PPC64_GOT_DTPREL16_HA:
15606 case R_PPC64_GOT_DTPREL34:
15607 tls_type = TLS_TLS | TLS_DTPREL;
15608 goto dogot;
15609
15610 case R_PPC64_GOT16:
15611 case R_PPC64_GOT16_LO:
15612 case R_PPC64_GOT16_HI:
15613 case R_PPC64_GOT16_HA:
15614 case R_PPC64_GOT16_DS:
15615 case R_PPC64_GOT16_LO_DS:
15616 case R_PPC64_GOT_PCREL34:
15617 dogot:
15618 {
15619 /* Relocation is to the entry for this symbol in the global
15620 offset table. */
15621 asection *got;
15622 bfd_vma *offp;
15623 bfd_vma off;
15624 unsigned long indx = 0;
15625 struct got_entry *ent;
15626
15627 if (tls_type == (TLS_TLS | TLS_LD)
15628 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15629 ent = ppc64_tlsld_got (input_bfd);
15630 else
15631 {
15632 if (h != NULL)
15633 {
15634 if (!htab->elf.dynamic_sections_created
15635 || h->elf.dynindx == -1
15636 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
15637 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15638 /* This is actually a static link, or it is a
15639 -Bsymbolic link and the symbol is defined
15640 locally, or the symbol was forced to be local
15641 because of a version file. */
15642 ;
15643 else
15644 {
15645 indx = h->elf.dynindx;
15646 unresolved_reloc = FALSE;
15647 }
15648 ent = h->elf.got.glist;
15649 }
15650 else
15651 {
15652 if (local_got_ents == NULL)
15653 abort ();
15654 ent = local_got_ents[r_symndx];
15655 }
15656
15657 for (; ent != NULL; ent = ent->next)
15658 if (ent->addend == orig_rel.r_addend
15659 && ent->owner == input_bfd
15660 && ent->tls_type == tls_type)
15661 break;
15662 }
15663
15664 if (ent == NULL)
15665 abort ();
15666 if (ent->is_indirect)
15667 ent = ent->got.ent;
15668 offp = &ent->got.offset;
15669 got = ppc64_elf_tdata (ent->owner)->got;
15670 if (got == NULL)
15671 abort ();
15672
15673 /* The offset must always be a multiple of 8. We use the
15674 least significant bit to record whether we have already
15675 processed this entry. */
15676 off = *offp;
15677 if ((off & 1) != 0)
15678 off &= ~1;
15679 else
15680 {
15681 /* Generate relocs for the dynamic linker, except in
15682 the case of TLSLD where we'll use one entry per
15683 module. */
15684 asection *relgot;
15685 bfd_boolean ifunc;
15686
15687 *offp = off | 1;
15688 relgot = NULL;
15689 ifunc = (h != NULL
15690 ? h->elf.type == STT_GNU_IFUNC
15691 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
15692 if (ifunc)
15693 {
15694 relgot = htab->elf.irelplt;
15695 if (indx == 0)
15696 htab->local_ifunc_resolver = 1;
15697 else if (is_static_defined (&h->elf))
15698 htab->maybe_local_ifunc_resolver = 1;
15699 }
15700 else if (indx != 0
15701 || (bfd_link_pic (info)
15702 && (h == NULL
15703 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15704 && !(tls_type != 0
15705 && bfd_link_executable (info)
15706 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
15707 relgot = ppc64_elf_tdata (ent->owner)->relgot;
15708 if (relgot != NULL)
15709 {
15710 outrel.r_offset = (got->output_section->vma
15711 + got->output_offset
15712 + off);
15713 outrel.r_addend = orig_rel.r_addend;
15714 if (tls_type & (TLS_LD | TLS_GD))
15715 {
15716 outrel.r_addend = 0;
15717 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
15718 if (tls_type == (TLS_TLS | TLS_GD))
15719 {
15720 loc = relgot->contents;
15721 loc += (relgot->reloc_count++
15722 * sizeof (Elf64_External_Rela));
15723 bfd_elf64_swap_reloca_out (output_bfd,
15724 &outrel, loc);
15725 outrel.r_offset += 8;
15726 outrel.r_addend = orig_rel.r_addend;
15727 outrel.r_info
15728 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15729 }
15730 }
15731 else if (tls_type == (TLS_TLS | TLS_DTPREL))
15732 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15733 else if (tls_type == (TLS_TLS | TLS_TPREL))
15734 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
15735 else if (indx != 0)
15736 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15737 else
15738 {
15739 if (ifunc)
15740 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15741 else
15742 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
15743
15744 /* Write the .got section contents for the sake
15745 of prelink. */
15746 loc = got->contents + off;
15747 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15748 loc);
15749 }
15750
15751 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
15752 {
15753 outrel.r_addend += relocation;
15754 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
15755 {
15756 if (htab->elf.tls_sec == NULL)
15757 outrel.r_addend = 0;
15758 else
15759 outrel.r_addend -= htab->elf.tls_sec->vma;
15760 }
15761 }
15762 loc = relgot->contents;
15763 loc += (relgot->reloc_count++
15764 * sizeof (Elf64_External_Rela));
15765 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15766 }
15767
15768 /* Init the .got section contents here if we're not
15769 emitting a reloc. */
15770 else
15771 {
15772 relocation += orig_rel.r_addend;
15773 if (tls_type != 0)
15774 {
15775 if (htab->elf.tls_sec == NULL)
15776 relocation = 0;
15777 else
15778 {
15779 if (tls_type & TLS_LD)
15780 relocation = 0;
15781 else
15782 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
15783 if (tls_type & TLS_TPREL)
15784 relocation += DTP_OFFSET - TP_OFFSET;
15785 }
15786
15787 if (tls_type & (TLS_GD | TLS_LD))
15788 {
15789 bfd_put_64 (output_bfd, relocation,
15790 got->contents + off + 8);
15791 relocation = 1;
15792 }
15793 }
15794 bfd_put_64 (output_bfd, relocation,
15795 got->contents + off);
15796 }
15797 }
15798
15799 if (off >= (bfd_vma) -2)
15800 abort ();
15801
15802 relocation = got->output_section->vma + got->output_offset + off;
15803 addend = 0;
15804 if (!(r_type == R_PPC64_GOT_PCREL34
15805 || r_type == R_PPC64_GOT_TLSGD34
15806 || r_type == R_PPC64_GOT_TLSLD34
15807 || r_type == R_PPC64_GOT_TPREL34
15808 || r_type == R_PPC64_GOT_DTPREL34))
15809 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
15810 }
15811 break;
15812
15813 case R_PPC64_PLT16_HA:
15814 case R_PPC64_PLT16_HI:
15815 case R_PPC64_PLT16_LO:
15816 case R_PPC64_PLT16_LO_DS:
15817 case R_PPC64_PLT_PCREL34:
15818 case R_PPC64_PLT_PCREL34_NOTOC:
15819 case R_PPC64_PLT32:
15820 case R_PPC64_PLT64:
15821 case R_PPC64_PLTSEQ:
15822 case R_PPC64_PLTSEQ_NOTOC:
15823 case R_PPC64_PLTCALL:
15824 case R_PPC64_PLTCALL_NOTOC:
15825 /* Relocation is to the entry for this symbol in the
15826 procedure linkage table. */
15827 unresolved_reloc = TRUE;
15828 {
15829 struct plt_entry **plt_list = NULL;
15830 if (h != NULL)
15831 plt_list = &h->elf.plt.plist;
15832 else if (local_got_ents != NULL)
15833 {
15834 struct plt_entry **local_plt = (struct plt_entry **)
15835 (local_got_ents + symtab_hdr->sh_info);
15836 plt_list = local_plt + r_symndx;
15837 }
15838 if (plt_list)
15839 {
15840 struct plt_entry *ent;
15841
15842 for (ent = *plt_list; ent != NULL; ent = ent->next)
15843 if (ent->plt.offset != (bfd_vma) -1
15844 && ent->addend == orig_rel.r_addend)
15845 {
15846 asection *plt;
15847 bfd_vma got;
15848
15849 plt = htab->elf.splt;
15850 if (!htab->elf.dynamic_sections_created
15851 || h == NULL
15852 || h->elf.dynindx == -1)
15853 {
15854 if (h != NULL
15855 ? h->elf.type == STT_GNU_IFUNC
15856 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15857 plt = htab->elf.iplt;
15858 else
15859 plt = htab->pltlocal;
15860 }
15861 relocation = (plt->output_section->vma
15862 + plt->output_offset
15863 + ent->plt.offset);
15864 if (r_type == R_PPC64_PLT16_HA
15865 || r_type == R_PPC64_PLT16_HI
15866 || r_type == R_PPC64_PLT16_LO
15867 || r_type == R_PPC64_PLT16_LO_DS)
15868 {
15869 got = (elf_gp (output_bfd)
15870 + htab->sec_info[input_section->id].toc_off);
15871 relocation -= got;
15872 }
15873 addend = 0;
15874 unresolved_reloc = FALSE;
15875 break;
15876 }
15877 }
15878 }
15879 break;
15880
15881 case R_PPC64_TOC:
15882 /* Relocation value is TOC base. */
15883 relocation = TOCstart;
15884 if (r_symndx == STN_UNDEF)
15885 relocation += htab->sec_info[input_section->id].toc_off;
15886 else if (unresolved_reloc)
15887 ;
15888 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15889 relocation += htab->sec_info[sec->id].toc_off;
15890 else
15891 unresolved_reloc = TRUE;
15892 goto dodyn;
15893
15894 /* TOC16 relocs. We want the offset relative to the TOC base,
15895 which is the address of the start of the TOC plus 0x8000.
15896 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15897 in this order. */
15898 case R_PPC64_TOC16:
15899 case R_PPC64_TOC16_LO:
15900 case R_PPC64_TOC16_HI:
15901 case R_PPC64_TOC16_DS:
15902 case R_PPC64_TOC16_LO_DS:
15903 case R_PPC64_TOC16_HA:
15904 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
15905 if (h != NULL)
15906 goto dodyn;
15907 break;
15908
15909 /* Relocate against the beginning of the section. */
15910 case R_PPC64_SECTOFF:
15911 case R_PPC64_SECTOFF_LO:
15912 case R_PPC64_SECTOFF_HI:
15913 case R_PPC64_SECTOFF_DS:
15914 case R_PPC64_SECTOFF_LO_DS:
15915 case R_PPC64_SECTOFF_HA:
15916 if (sec != NULL)
15917 addend -= sec->output_section->vma;
15918 break;
15919
15920 case R_PPC64_REL16:
15921 case R_PPC64_REL16_LO:
15922 case R_PPC64_REL16_HI:
15923 case R_PPC64_REL16_HA:
15924 case R_PPC64_REL16_HIGH:
15925 case R_PPC64_REL16_HIGHA:
15926 case R_PPC64_REL16_HIGHER:
15927 case R_PPC64_REL16_HIGHERA:
15928 case R_PPC64_REL16_HIGHEST:
15929 case R_PPC64_REL16_HIGHESTA:
15930 case R_PPC64_REL16_HIGHER34:
15931 case R_PPC64_REL16_HIGHERA34:
15932 case R_PPC64_REL16_HIGHEST34:
15933 case R_PPC64_REL16_HIGHESTA34:
15934 case R_PPC64_REL16DX_HA:
15935 case R_PPC64_REL14:
15936 case R_PPC64_REL14_BRNTAKEN:
15937 case R_PPC64_REL14_BRTAKEN:
15938 case R_PPC64_REL24:
15939 case R_PPC64_REL24_NOTOC:
15940 case R_PPC64_PCREL34:
15941 case R_PPC64_PCREL28:
15942 break;
15943
15944 case R_PPC64_TPREL16:
15945 case R_PPC64_TPREL16_LO:
15946 case R_PPC64_TPREL16_HI:
15947 case R_PPC64_TPREL16_HA:
15948 case R_PPC64_TPREL16_DS:
15949 case R_PPC64_TPREL16_LO_DS:
15950 case R_PPC64_TPREL16_HIGH:
15951 case R_PPC64_TPREL16_HIGHA:
15952 case R_PPC64_TPREL16_HIGHER:
15953 case R_PPC64_TPREL16_HIGHERA:
15954 case R_PPC64_TPREL16_HIGHEST:
15955 case R_PPC64_TPREL16_HIGHESTA:
15956 case R_PPC64_TPREL34:
15957 if (h != NULL
15958 && h->elf.root.type == bfd_link_hash_undefweak
15959 && h->elf.dynindx == -1)
15960 {
15961 /* Make this relocation against an undefined weak symbol
15962 resolve to zero. This is really just a tweak, since
15963 code using weak externs ought to check that they are
15964 defined before using them. */
15965 bfd_byte *p = contents + rel->r_offset - d_offset;
15966
15967 insn = bfd_get_32 (input_bfd, p);
15968 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15969 if (insn != 0)
15970 bfd_put_32 (input_bfd, insn, p);
15971 break;
15972 }
15973 if (htab->elf.tls_sec != NULL)
15974 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
15975 /* The TPREL16 relocs shouldn't really be used in shared
15976 libs or with non-local symbols as that will result in
15977 DT_TEXTREL being set, but support them anyway. */
15978 goto dodyn;
15979
15980 case R_PPC64_DTPREL16:
15981 case R_PPC64_DTPREL16_LO:
15982 case R_PPC64_DTPREL16_HI:
15983 case R_PPC64_DTPREL16_HA:
15984 case R_PPC64_DTPREL16_DS:
15985 case R_PPC64_DTPREL16_LO_DS:
15986 case R_PPC64_DTPREL16_HIGH:
15987 case R_PPC64_DTPREL16_HIGHA:
15988 case R_PPC64_DTPREL16_HIGHER:
15989 case R_PPC64_DTPREL16_HIGHERA:
15990 case R_PPC64_DTPREL16_HIGHEST:
15991 case R_PPC64_DTPREL16_HIGHESTA:
15992 case R_PPC64_DTPREL34:
15993 if (htab->elf.tls_sec != NULL)
15994 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
15995 break;
15996
15997 case R_PPC64_ADDR64_LOCAL:
15998 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15999 ? h->elf.other
16000 : sym->st_other);
16001 break;
16002
16003 case R_PPC64_DTPMOD64:
16004 relocation = 1;
16005 addend = 0;
16006 goto dodyn;
16007
16008 case R_PPC64_TPREL64:
16009 if (htab->elf.tls_sec != NULL)
16010 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16011 goto dodyn;
16012
16013 case R_PPC64_DTPREL64:
16014 if (htab->elf.tls_sec != NULL)
16015 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16016 /* Fall through. */
16017
16018 /* Relocations that may need to be propagated if this is a
16019 dynamic object. */
16020 case R_PPC64_REL30:
16021 case R_PPC64_REL32:
16022 case R_PPC64_REL64:
16023 case R_PPC64_ADDR14:
16024 case R_PPC64_ADDR14_BRNTAKEN:
16025 case R_PPC64_ADDR14_BRTAKEN:
16026 case R_PPC64_ADDR16:
16027 case R_PPC64_ADDR16_DS:
16028 case R_PPC64_ADDR16_HA:
16029 case R_PPC64_ADDR16_HI:
16030 case R_PPC64_ADDR16_HIGH:
16031 case R_PPC64_ADDR16_HIGHA:
16032 case R_PPC64_ADDR16_HIGHER:
16033 case R_PPC64_ADDR16_HIGHERA:
16034 case R_PPC64_ADDR16_HIGHEST:
16035 case R_PPC64_ADDR16_HIGHESTA:
16036 case R_PPC64_ADDR16_LO:
16037 case R_PPC64_ADDR16_LO_DS:
16038 case R_PPC64_ADDR16_HIGHER34:
16039 case R_PPC64_ADDR16_HIGHERA34:
16040 case R_PPC64_ADDR16_HIGHEST34:
16041 case R_PPC64_ADDR16_HIGHESTA34:
16042 case R_PPC64_ADDR24:
16043 case R_PPC64_ADDR32:
16044 case R_PPC64_ADDR64:
16045 case R_PPC64_UADDR16:
16046 case R_PPC64_UADDR32:
16047 case R_PPC64_UADDR64:
16048 case R_PPC64_D34:
16049 case R_PPC64_D34_LO:
16050 case R_PPC64_D34_HI30:
16051 case R_PPC64_D34_HA30:
16052 case R_PPC64_D28:
16053 dodyn:
16054 if ((input_section->flags & SEC_ALLOC) == 0)
16055 break;
16056
16057 if (NO_OPD_RELOCS && is_opd)
16058 break;
16059
16060 if (bfd_link_pic (info)
16061 ? ((h == NULL
16062 || h->dyn_relocs != NULL)
16063 && ((h != NULL && pc_dynrelocs (h))
16064 || must_be_dyn_reloc (info, r_type)))
16065 : (h != NULL
16066 ? h->dyn_relocs != NULL
16067 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16068 {
16069 bfd_boolean skip, relocate;
16070 asection *sreloc;
16071 bfd_vma out_off;
16072 long indx = 0;
16073
16074 /* When generating a dynamic object, these relocations
16075 are copied into the output file to be resolved at run
16076 time. */
16077
16078 skip = FALSE;
16079 relocate = FALSE;
16080
16081 out_off = _bfd_elf_section_offset (output_bfd, info,
16082 input_section, rel->r_offset);
16083 if (out_off == (bfd_vma) -1)
16084 skip = TRUE;
16085 else if (out_off == (bfd_vma) -2)
16086 skip = TRUE, relocate = TRUE;
16087 out_off += (input_section->output_section->vma
16088 + input_section->output_offset);
16089 outrel.r_offset = out_off;
16090 outrel.r_addend = rel->r_addend;
16091
16092 /* Optimize unaligned reloc use. */
16093 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16094 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16095 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16096 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16097 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16098 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16099 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16100 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16101 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16102
16103 if (skip)
16104 memset (&outrel, 0, sizeof outrel);
16105 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16106 && !is_opd
16107 && r_type != R_PPC64_TOC)
16108 {
16109 indx = h->elf.dynindx;
16110 BFD_ASSERT (indx != -1);
16111 outrel.r_info = ELF64_R_INFO (indx, r_type);
16112 }
16113 else
16114 {
16115 /* This symbol is local, or marked to become local,
16116 or this is an opd section reloc which must point
16117 at a local function. */
16118 outrel.r_addend += relocation;
16119 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16120 {
16121 if (is_opd && h != NULL)
16122 {
16123 /* Lie about opd entries. This case occurs
16124 when building shared libraries and we
16125 reference a function in another shared
16126 lib. The same thing happens for a weak
16127 definition in an application that's
16128 overridden by a strong definition in a
16129 shared lib. (I believe this is a generic
16130 bug in binutils handling of weak syms.)
16131 In these cases we won't use the opd
16132 entry in this lib. */
16133 unresolved_reloc = FALSE;
16134 }
16135 if (!is_opd
16136 && r_type == R_PPC64_ADDR64
16137 && (h != NULL
16138 ? h->elf.type == STT_GNU_IFUNC
16139 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16140 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16141 else
16142 {
16143 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16144
16145 /* We need to relocate .opd contents for ld.so.
16146 Prelink also wants simple and consistent rules
16147 for relocs. This make all RELATIVE relocs have
16148 *r_offset equal to r_addend. */
16149 relocate = TRUE;
16150 }
16151 }
16152 else
16153 {
16154 if (h != NULL
16155 ? h->elf.type == STT_GNU_IFUNC
16156 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16157 {
16158 info->callbacks->einfo
16159 /* xgettext:c-format */
16160 (_("%H: %s for indirect "
16161 "function `%pT' unsupported\n"),
16162 input_bfd, input_section, rel->r_offset,
16163 ppc64_elf_howto_table[r_type]->name,
16164 sym_name);
16165 ret = FALSE;
16166 }
16167 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16168 ;
16169 else if (sec == NULL || sec->owner == NULL)
16170 {
16171 bfd_set_error (bfd_error_bad_value);
16172 return FALSE;
16173 }
16174 else
16175 {
16176 asection *osec = sec->output_section;
16177
16178 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16179 {
16180 /* TLS symbol values are relative to the
16181 TLS segment. Dynamic relocations for
16182 local TLS symbols therefore can't be
16183 reduced to a relocation against their
16184 section symbol because it holds the
16185 address of the section, not a value
16186 relative to the TLS segment. We could
16187 change the .tdata dynamic section symbol
16188 to be zero value but STN_UNDEF works
16189 and is used elsewhere, eg. for TPREL64
16190 GOT relocs against local TLS symbols. */
16191 osec = htab->elf.tls_sec;
16192 indx = 0;
16193 }
16194 else
16195 {
16196 indx = elf_section_data (osec)->dynindx;
16197 if (indx == 0)
16198 {
16199 if ((osec->flags & SEC_READONLY) == 0
16200 && htab->elf.data_index_section != NULL)
16201 osec = htab->elf.data_index_section;
16202 else
16203 osec = htab->elf.text_index_section;
16204 indx = elf_section_data (osec)->dynindx;
16205 }
16206 BFD_ASSERT (indx != 0);
16207 }
16208
16209 /* We are turning this relocation into one
16210 against a section symbol, so subtract out
16211 the output section's address but not the
16212 offset of the input section in the output
16213 section. */
16214 outrel.r_addend -= osec->vma;
16215 }
16216
16217 outrel.r_info = ELF64_R_INFO (indx, r_type);
16218 }
16219 }
16220
16221 sreloc = elf_section_data (input_section)->sreloc;
16222 if (h != NULL
16223 ? h->elf.type == STT_GNU_IFUNC
16224 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16225 {
16226 sreloc = htab->elf.irelplt;
16227 if (indx == 0)
16228 htab->local_ifunc_resolver = 1;
16229 else if (is_static_defined (&h->elf))
16230 htab->maybe_local_ifunc_resolver = 1;
16231 }
16232 if (sreloc == NULL)
16233 abort ();
16234
16235 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16236 >= sreloc->size)
16237 abort ();
16238 loc = sreloc->contents;
16239 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16240 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16241
16242 if (!warned_dynamic
16243 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16244 {
16245 info->callbacks->einfo
16246 /* xgettext:c-format */
16247 (_("%X%P: %pB: %s against %pT "
16248 "is not supported by glibc as a dynamic relocation\n"),
16249 input_bfd,
16250 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16251 sym_name);
16252 warned_dynamic = TRUE;
16253 }
16254
16255 /* If this reloc is against an external symbol, it will
16256 be computed at runtime, so there's no need to do
16257 anything now. However, for the sake of prelink ensure
16258 that the section contents are a known value. */
16259 if (!relocate)
16260 {
16261 unresolved_reloc = FALSE;
16262 /* The value chosen here is quite arbitrary as ld.so
16263 ignores section contents except for the special
16264 case of .opd where the contents might be accessed
16265 before relocation. Choose zero, as that won't
16266 cause reloc overflow. */
16267 relocation = 0;
16268 addend = 0;
16269 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16270 to improve backward compatibility with older
16271 versions of ld. */
16272 if (r_type == R_PPC64_ADDR64)
16273 addend = outrel.r_addend;
16274 /* Adjust pc_relative relocs to have zero in *r_offset. */
16275 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16276 addend = outrel.r_offset;
16277 }
16278 }
16279 break;
16280
16281 case R_PPC64_COPY:
16282 case R_PPC64_GLOB_DAT:
16283 case R_PPC64_JMP_SLOT:
16284 case R_PPC64_JMP_IREL:
16285 case R_PPC64_RELATIVE:
16286 /* We shouldn't ever see these dynamic relocs in relocatable
16287 files. */
16288 /* Fall through. */
16289
16290 case R_PPC64_PLTGOT16:
16291 case R_PPC64_PLTGOT16_DS:
16292 case R_PPC64_PLTGOT16_HA:
16293 case R_PPC64_PLTGOT16_HI:
16294 case R_PPC64_PLTGOT16_LO:
16295 case R_PPC64_PLTGOT16_LO_DS:
16296 case R_PPC64_PLTREL32:
16297 case R_PPC64_PLTREL64:
16298 /* These ones haven't been implemented yet. */
16299
16300 info->callbacks->einfo
16301 /* xgettext:c-format */
16302 (_("%P: %pB: %s is not supported for `%pT'\n"),
16303 input_bfd,
16304 ppc64_elf_howto_table[r_type]->name, sym_name);
16305
16306 bfd_set_error (bfd_error_invalid_operation);
16307 ret = FALSE;
16308 goto copy_reloc;
16309 }
16310
16311 /* Multi-instruction sequences that access the TOC can be
16312 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16313 to nop; addi rb,r2,x; */
16314 switch (r_type)
16315 {
16316 default:
16317 break;
16318
16319 case R_PPC64_GOT_TLSLD16_HI:
16320 case R_PPC64_GOT_TLSGD16_HI:
16321 case R_PPC64_GOT_TPREL16_HI:
16322 case R_PPC64_GOT_DTPREL16_HI:
16323 case R_PPC64_GOT16_HI:
16324 case R_PPC64_TOC16_HI:
16325 /* These relocs would only be useful if building up an
16326 offset to later add to r2, perhaps in an indexed
16327 addressing mode instruction. Don't try to optimize.
16328 Unfortunately, the possibility of someone building up an
16329 offset like this or even with the HA relocs, means that
16330 we need to check the high insn when optimizing the low
16331 insn. */
16332 break;
16333
16334 case R_PPC64_PLTCALL_NOTOC:
16335 if (!unresolved_reloc)
16336 htab->notoc_plt = 1;
16337 /* Fall through. */
16338 case R_PPC64_PLTCALL:
16339 if (unresolved_reloc)
16340 {
16341 /* No plt entry. Make this into a direct call. */
16342 bfd_byte *p = contents + rel->r_offset;
16343 insn = bfd_get_32 (input_bfd, p);
16344 insn &= 1;
16345 bfd_put_32 (input_bfd, B_DOT | insn, p);
16346 if (r_type == R_PPC64_PLTCALL)
16347 bfd_put_32 (input_bfd, NOP, p + 4);
16348 unresolved_reloc = save_unresolved_reloc;
16349 r_type = R_PPC64_REL24;
16350 }
16351 break;
16352
16353 case R_PPC64_PLTSEQ_NOTOC:
16354 case R_PPC64_PLTSEQ:
16355 if (unresolved_reloc)
16356 {
16357 unresolved_reloc = FALSE;
16358 goto nop_it;
16359 }
16360 break;
16361
16362 case R_PPC64_PLT_PCREL34_NOTOC:
16363 if (!unresolved_reloc)
16364 htab->notoc_plt = 1;
16365 /* Fall through. */
16366 case R_PPC64_PLT_PCREL34:
16367 if (unresolved_reloc)
16368 {
16369 bfd_byte *p = contents + rel->r_offset;
16370 bfd_put_32 (input_bfd, PNOP >> 32, p);
16371 bfd_put_32 (input_bfd, PNOP, p + 4);
16372 unresolved_reloc = FALSE;
16373 goto copy_reloc;
16374 }
16375 break;
16376
16377 case R_PPC64_PLT16_HA:
16378 if (unresolved_reloc)
16379 {
16380 unresolved_reloc = FALSE;
16381 goto nop_it;
16382 }
16383 /* Fall through. */
16384 case R_PPC64_GOT_TLSLD16_HA:
16385 case R_PPC64_GOT_TLSGD16_HA:
16386 case R_PPC64_GOT_TPREL16_HA:
16387 case R_PPC64_GOT_DTPREL16_HA:
16388 case R_PPC64_GOT16_HA:
16389 case R_PPC64_TOC16_HA:
16390 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16391 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16392 {
16393 bfd_byte *p;
16394 nop_it:
16395 p = contents + (rel->r_offset & ~3);
16396 bfd_put_32 (input_bfd, NOP, p);
16397 goto copy_reloc;
16398 }
16399 break;
16400
16401 case R_PPC64_PLT16_LO:
16402 case R_PPC64_PLT16_LO_DS:
16403 if (unresolved_reloc)
16404 {
16405 unresolved_reloc = FALSE;
16406 goto nop_it;
16407 }
16408 /* Fall through. */
16409 case R_PPC64_GOT_TLSLD16_LO:
16410 case R_PPC64_GOT_TLSGD16_LO:
16411 case R_PPC64_GOT_TPREL16_LO_DS:
16412 case R_PPC64_GOT_DTPREL16_LO_DS:
16413 case R_PPC64_GOT16_LO:
16414 case R_PPC64_GOT16_LO_DS:
16415 case R_PPC64_TOC16_LO:
16416 case R_PPC64_TOC16_LO_DS:
16417 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16418 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16419 {
16420 bfd_byte *p = contents + (rel->r_offset & ~3);
16421 insn = bfd_get_32 (input_bfd, p);
16422 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
16423 {
16424 /* Transform addic to addi when we change reg. */
16425 insn &= ~((0x3fu << 26) | (0x1f << 16));
16426 insn |= (14u << 26) | (2 << 16);
16427 }
16428 else
16429 {
16430 insn &= ~(0x1f << 16);
16431 insn |= 2 << 16;
16432 }
16433 bfd_put_32 (input_bfd, insn, p);
16434 }
16435 break;
16436
16437 case R_PPC64_TPREL16_HA:
16438 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16439 {
16440 bfd_byte *p = contents + (rel->r_offset & ~3);
16441 insn = bfd_get_32 (input_bfd, p);
16442 if ((insn & ((0x3fu << 26) | 0x1f << 16))
16443 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16444 /* xgettext:c-format */
16445 info->callbacks->minfo
16446 (_("%H: warning: %s unexpected insn %#x.\n"),
16447 input_bfd, input_section, rel->r_offset,
16448 ppc64_elf_howto_table[r_type]->name, insn);
16449 else
16450 {
16451 bfd_put_32 (input_bfd, NOP, p);
16452 goto copy_reloc;
16453 }
16454 }
16455 break;
16456
16457 case R_PPC64_TPREL16_LO:
16458 case R_PPC64_TPREL16_LO_DS:
16459 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16460 {
16461 bfd_byte *p = contents + (rel->r_offset & ~3);
16462 insn = bfd_get_32 (input_bfd, p);
16463 insn &= ~(0x1f << 16);
16464 insn |= 13 << 16;
16465 bfd_put_32 (input_bfd, insn, p);
16466 }
16467 break;
16468 }
16469
16470 /* Do any further special processing. */
16471 switch (r_type)
16472 {
16473 default:
16474 break;
16475
16476 case R_PPC64_REL16_HA:
16477 case R_PPC64_REL16_HIGHA:
16478 case R_PPC64_REL16_HIGHERA:
16479 case R_PPC64_REL16_HIGHESTA:
16480 case R_PPC64_REL16DX_HA:
16481 case R_PPC64_ADDR16_HA:
16482 case R_PPC64_ADDR16_HIGHA:
16483 case R_PPC64_ADDR16_HIGHERA:
16484 case R_PPC64_ADDR16_HIGHESTA:
16485 case R_PPC64_TOC16_HA:
16486 case R_PPC64_SECTOFF_HA:
16487 case R_PPC64_TPREL16_HA:
16488 case R_PPC64_TPREL16_HIGHA:
16489 case R_PPC64_TPREL16_HIGHERA:
16490 case R_PPC64_TPREL16_HIGHESTA:
16491 case R_PPC64_DTPREL16_HA:
16492 case R_PPC64_DTPREL16_HIGHA:
16493 case R_PPC64_DTPREL16_HIGHERA:
16494 case R_PPC64_DTPREL16_HIGHESTA:
16495 /* It's just possible that this symbol is a weak symbol
16496 that's not actually defined anywhere. In that case,
16497 'sec' would be NULL, and we should leave the symbol
16498 alone (it will be set to zero elsewhere in the link). */
16499 if (sec == NULL)
16500 break;
16501 /* Fall through. */
16502
16503 case R_PPC64_GOT16_HA:
16504 case R_PPC64_PLTGOT16_HA:
16505 case R_PPC64_PLT16_HA:
16506 case R_PPC64_GOT_TLSGD16_HA:
16507 case R_PPC64_GOT_TLSLD16_HA:
16508 case R_PPC64_GOT_TPREL16_HA:
16509 case R_PPC64_GOT_DTPREL16_HA:
16510 /* Add 0x10000 if sign bit in 0:15 is set.
16511 Bits 0:15 are not used. */
16512 addend += 0x8000;
16513 break;
16514
16515 case R_PPC64_D34_HA30:
16516 case R_PPC64_ADDR16_HIGHERA34:
16517 case R_PPC64_ADDR16_HIGHESTA34:
16518 case R_PPC64_REL16_HIGHERA34:
16519 case R_PPC64_REL16_HIGHESTA34:
16520 if (sec != NULL)
16521 addend += 1ULL << 33;
16522 break;
16523
16524 case R_PPC64_ADDR16_DS:
16525 case R_PPC64_ADDR16_LO_DS:
16526 case R_PPC64_GOT16_DS:
16527 case R_PPC64_GOT16_LO_DS:
16528 case R_PPC64_PLT16_LO_DS:
16529 case R_PPC64_SECTOFF_DS:
16530 case R_PPC64_SECTOFF_LO_DS:
16531 case R_PPC64_TOC16_DS:
16532 case R_PPC64_TOC16_LO_DS:
16533 case R_PPC64_PLTGOT16_DS:
16534 case R_PPC64_PLTGOT16_LO_DS:
16535 case R_PPC64_GOT_TPREL16_DS:
16536 case R_PPC64_GOT_TPREL16_LO_DS:
16537 case R_PPC64_GOT_DTPREL16_DS:
16538 case R_PPC64_GOT_DTPREL16_LO_DS:
16539 case R_PPC64_TPREL16_DS:
16540 case R_PPC64_TPREL16_LO_DS:
16541 case R_PPC64_DTPREL16_DS:
16542 case R_PPC64_DTPREL16_LO_DS:
16543 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16544 mask = 3;
16545 /* If this reloc is against an lq, lxv, or stxv insn, then
16546 the value must be a multiple of 16. This is somewhat of
16547 a hack, but the "correct" way to do this by defining _DQ
16548 forms of all the _DS relocs bloats all reloc switches in
16549 this file. It doesn't make much sense to use these
16550 relocs in data, so testing the insn should be safe. */
16551 if ((insn & (0x3fu << 26)) == (56u << 26)
16552 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
16553 mask = 15;
16554 relocation += addend;
16555 addend = insn & (mask ^ 3);
16556 if ((relocation & mask) != 0)
16557 {
16558 relocation ^= relocation & mask;
16559 info->callbacks->einfo
16560 /* xgettext:c-format */
16561 (_("%H: error: %s not a multiple of %u\n"),
16562 input_bfd, input_section, rel->r_offset,
16563 ppc64_elf_howto_table[r_type]->name,
16564 mask + 1);
16565 bfd_set_error (bfd_error_bad_value);
16566 ret = FALSE;
16567 goto copy_reloc;
16568 }
16569 break;
16570 }
16571
16572 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16573 because such sections are not SEC_ALLOC and thus ld.so will
16574 not process them. */
16575 howto = ppc64_elf_howto_table[(int) r_type];
16576 if (unresolved_reloc
16577 && !((input_section->flags & SEC_DEBUGGING) != 0
16578 && h->elf.def_dynamic)
16579 && _bfd_elf_section_offset (output_bfd, info, input_section,
16580 rel->r_offset) != (bfd_vma) -1)
16581 {
16582 info->callbacks->einfo
16583 /* xgettext:c-format */
16584 (_("%H: unresolvable %s against `%pT'\n"),
16585 input_bfd, input_section, rel->r_offset,
16586 howto->name,
16587 h->elf.root.root.string);
16588 ret = FALSE;
16589 }
16590
16591 /* 16-bit fields in insns mostly have signed values, but a
16592 few insns have 16-bit unsigned values. Really, we should
16593 have different reloc types. */
16594 if (howto->complain_on_overflow != complain_overflow_dont
16595 && howto->dst_mask == 0xffff
16596 && (input_section->flags & SEC_CODE) != 0)
16597 {
16598 enum complain_overflow complain = complain_overflow_signed;
16599
16600 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16601 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
16602 complain = complain_overflow_bitfield;
16603 else if (howto->rightshift == 0
16604 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
16605 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
16606 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
16607 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
16608 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
16609 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
16610 complain = complain_overflow_unsigned;
16611 if (howto->complain_on_overflow != complain)
16612 {
16613 alt_howto = *howto;
16614 alt_howto.complain_on_overflow = complain;
16615 howto = &alt_howto;
16616 }
16617 }
16618
16619 switch (r_type)
16620 {
16621 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16622 case R_PPC64_D34:
16623 case R_PPC64_D34_LO:
16624 case R_PPC64_D34_HI30:
16625 case R_PPC64_D34_HA30:
16626 case R_PPC64_PCREL34:
16627 case R_PPC64_GOT_PCREL34:
16628 case R_PPC64_TPREL34:
16629 case R_PPC64_DTPREL34:
16630 case R_PPC64_GOT_TLSGD34:
16631 case R_PPC64_GOT_TLSLD34:
16632 case R_PPC64_GOT_TPREL34:
16633 case R_PPC64_GOT_DTPREL34:
16634 case R_PPC64_PLT_PCREL34:
16635 case R_PPC64_PLT_PCREL34_NOTOC:
16636 case R_PPC64_D28:
16637 case R_PPC64_PCREL28:
16638 if (rel->r_offset + 8 > input_section->size)
16639 r = bfd_reloc_outofrange;
16640 else
16641 {
16642 relocation += addend;
16643 if (howto->pc_relative)
16644 relocation -= (rel->r_offset
16645 + input_section->output_offset
16646 + input_section->output_section->vma);
16647 relocation >>= howto->rightshift;
16648
16649 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16650 pinsn <<= 32;
16651 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16652
16653 pinsn &= ~howto->dst_mask;
16654 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16655 & howto->dst_mask);
16656 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16657 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16658 r = bfd_reloc_ok;
16659 if (howto->complain_on_overflow == complain_overflow_signed
16660 && (relocation + (1ULL << (howto->bitsize - 1))
16661 >= 1ULL << howto->bitsize))
16662 r = bfd_reloc_overflow;
16663 }
16664 break;
16665
16666 case R_PPC64_REL16DX_HA:
16667 if (rel->r_offset + 4 > input_section->size)
16668 r = bfd_reloc_outofrange;
16669 else
16670 {
16671 relocation += addend;
16672 relocation -= (rel->r_offset
16673 + input_section->output_offset
16674 + input_section->output_section->vma);
16675 relocation = (bfd_signed_vma) relocation >> 16;
16676 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16677 insn &= ~0x1fffc1;
16678 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
16679 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16680 r = bfd_reloc_ok;
16681 if (relocation + 0x8000 > 0xffff)
16682 r = bfd_reloc_overflow;
16683 }
16684 break;
16685
16686 default:
16687 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16688 contents, rel->r_offset,
16689 relocation, addend);
16690 }
16691
16692 if (r != bfd_reloc_ok)
16693 {
16694 char *more_info = NULL;
16695 const char *reloc_name = howto->name;
16696
16697 if (reloc_dest != DEST_NORMAL)
16698 {
16699 more_info = bfd_malloc (strlen (reloc_name) + 8);
16700 if (more_info != NULL)
16701 {
16702 strcpy (more_info, reloc_name);
16703 strcat (more_info, (reloc_dest == DEST_OPD
16704 ? " (OPD)" : " (stub)"));
16705 reloc_name = more_info;
16706 }
16707 }
16708
16709 if (r == bfd_reloc_overflow)
16710 {
16711 /* On code like "if (foo) foo();" don't report overflow
16712 on a branch to zero when foo is undefined. */
16713 if (!warned
16714 && (reloc_dest == DEST_STUB
16715 || !(h != NULL
16716 && (h->elf.root.type == bfd_link_hash_undefweak
16717 || h->elf.root.type == bfd_link_hash_undefined)
16718 && is_branch_reloc (r_type))))
16719 info->callbacks->reloc_overflow (info, &h->elf.root,
16720 sym_name, reloc_name,
16721 orig_rel.r_addend,
16722 input_bfd, input_section,
16723 rel->r_offset);
16724 }
16725 else
16726 {
16727 info->callbacks->einfo
16728 /* xgettext:c-format */
16729 (_("%H: %s against `%pT': error %d\n"),
16730 input_bfd, input_section, rel->r_offset,
16731 reloc_name, sym_name, (int) r);
16732 ret = FALSE;
16733 }
16734 if (more_info != NULL)
16735 free (more_info);
16736 }
16737 copy_reloc:
16738 if (wrel != rel)
16739 *wrel = *rel;
16740 }
16741
16742 if (wrel != rel)
16743 {
16744 Elf_Internal_Shdr *rel_hdr;
16745 size_t deleted = rel - wrel;
16746
16747 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16748 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16749 if (rel_hdr->sh_size == 0)
16750 {
16751 /* It is too late to remove an empty reloc section. Leave
16752 one NONE reloc.
16753 ??? What is wrong with an empty section??? */
16754 rel_hdr->sh_size = rel_hdr->sh_entsize;
16755 deleted -= 1;
16756 }
16757 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16758 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16759 input_section->reloc_count -= deleted;
16760 }
16761
16762 /* If we're emitting relocations, then shortly after this function
16763 returns, reloc offsets and addends for this section will be
16764 adjusted. Worse, reloc symbol indices will be for the output
16765 file rather than the input. Save a copy of the relocs for
16766 opd_entry_value. */
16767 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
16768 {
16769 bfd_size_type amt;
16770 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16771 rel = bfd_alloc (input_bfd, amt);
16772 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16773 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
16774 if (rel == NULL)
16775 return FALSE;
16776 memcpy (rel, relocs, amt);
16777 }
16778 return ret;
16779 }
16780
16781 /* Adjust the value of any local symbols in opd sections. */
16782
16783 static int
16784 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16785 const char *name ATTRIBUTE_UNUSED,
16786 Elf_Internal_Sym *elfsym,
16787 asection *input_sec,
16788 struct elf_link_hash_entry *h)
16789 {
16790 struct _opd_sec_data *opd;
16791 long adjust;
16792 bfd_vma value;
16793
16794 if (h != NULL)
16795 return 1;
16796
16797 opd = get_opd_info (input_sec);
16798 if (opd == NULL || opd->adjust == NULL)
16799 return 1;
16800
16801 value = elfsym->st_value - input_sec->output_offset;
16802 if (!bfd_link_relocatable (info))
16803 value -= input_sec->output_section->vma;
16804
16805 adjust = opd->adjust[OPD_NDX (value)];
16806 if (adjust == -1)
16807 return 2;
16808
16809 elfsym->st_value += adjust;
16810 return 1;
16811 }
16812
16813 /* Finish up dynamic symbol handling. We set the contents of various
16814 dynamic sections here. */
16815
16816 static bfd_boolean
16817 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16818 struct bfd_link_info *info,
16819 struct elf_link_hash_entry *h,
16820 Elf_Internal_Sym *sym)
16821 {
16822 struct ppc_link_hash_table *htab;
16823 struct plt_entry *ent;
16824
16825 htab = ppc_hash_table (info);
16826 if (htab == NULL)
16827 return FALSE;
16828
16829 if (!htab->opd_abi && !h->def_regular)
16830 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16831 if (ent->plt.offset != (bfd_vma) -1)
16832 {
16833 /* Mark the symbol as undefined, rather than as
16834 defined in glink. Leave the value if there were
16835 any relocations where pointer equality matters
16836 (this is a clue for the dynamic linker, to make
16837 function pointer comparisons work between an
16838 application and shared library), otherwise set it
16839 to zero. */
16840 sym->st_shndx = SHN_UNDEF;
16841 if (!h->pointer_equality_needed)
16842 sym->st_value = 0;
16843 else if (!h->ref_regular_nonweak)
16844 {
16845 /* This breaks function pointer comparisons, but
16846 that is better than breaking tests for a NULL
16847 function pointer. */
16848 sym->st_value = 0;
16849 }
16850 break;
16851 }
16852
16853 if (h->needs_copy
16854 && (h->root.type == bfd_link_hash_defined
16855 || h->root.type == bfd_link_hash_defweak)
16856 && (h->root.u.def.section == htab->elf.sdynbss
16857 || h->root.u.def.section == htab->elf.sdynrelro))
16858 {
16859 /* This symbol needs a copy reloc. Set it up. */
16860 Elf_Internal_Rela rela;
16861 asection *srel;
16862 bfd_byte *loc;
16863
16864 if (h->dynindx == -1)
16865 abort ();
16866
16867 rela.r_offset = (h->root.u.def.value
16868 + h->root.u.def.section->output_section->vma
16869 + h->root.u.def.section->output_offset);
16870 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16871 rela.r_addend = 0;
16872 if (h->root.u.def.section == htab->elf.sdynrelro)
16873 srel = htab->elf.sreldynrelro;
16874 else
16875 srel = htab->elf.srelbss;
16876 loc = srel->contents;
16877 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
16878 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
16879 }
16880
16881 return TRUE;
16882 }
16883
16884 /* Used to decide how to sort relocs in an optimal manner for the
16885 dynamic linker, before writing them out. */
16886
16887 static enum elf_reloc_type_class
16888 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16889 const asection *rel_sec,
16890 const Elf_Internal_Rela *rela)
16891 {
16892 enum elf_ppc64_reloc_type r_type;
16893 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16894
16895 if (rel_sec == htab->elf.irelplt)
16896 return reloc_class_ifunc;
16897
16898 r_type = ELF64_R_TYPE (rela->r_info);
16899 switch (r_type)
16900 {
16901 case R_PPC64_RELATIVE:
16902 return reloc_class_relative;
16903 case R_PPC64_JMP_SLOT:
16904 return reloc_class_plt;
16905 case R_PPC64_COPY:
16906 return reloc_class_copy;
16907 default:
16908 return reloc_class_normal;
16909 }
16910 }
16911
16912 /* Finish up the dynamic sections. */
16913
16914 static bfd_boolean
16915 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16916 struct bfd_link_info *info)
16917 {
16918 struct ppc_link_hash_table *htab;
16919 bfd *dynobj;
16920 asection *sdyn;
16921
16922 htab = ppc_hash_table (info);
16923 if (htab == NULL)
16924 return FALSE;
16925
16926 dynobj = htab->elf.dynobj;
16927 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
16928
16929 if (htab->elf.dynamic_sections_created)
16930 {
16931 Elf64_External_Dyn *dyncon, *dynconend;
16932
16933 if (sdyn == NULL || htab->elf.sgot == NULL)
16934 abort ();
16935
16936 dyncon = (Elf64_External_Dyn *) sdyn->contents;
16937 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
16938 for (; dyncon < dynconend; dyncon++)
16939 {
16940 Elf_Internal_Dyn dyn;
16941 asection *s;
16942
16943 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16944
16945 switch (dyn.d_tag)
16946 {
16947 default:
16948 continue;
16949
16950 case DT_PPC64_GLINK:
16951 s = htab->glink;
16952 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16953 /* We stupidly defined DT_PPC64_GLINK to be the start
16954 of glink rather than the first entry point, which is
16955 what ld.so needs, and now have a bigger stub to
16956 support automatic multiple TOCs. */
16957 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
16958 break;
16959
16960 case DT_PPC64_OPD:
16961 s = bfd_get_section_by_name (output_bfd, ".opd");
16962 if (s == NULL)
16963 continue;
16964 dyn.d_un.d_ptr = s->vma;
16965 break;
16966
16967 case DT_PPC64_OPT:
16968 if ((htab->do_multi_toc && htab->multi_toc_needed)
16969 || htab->notoc_plt)
16970 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
16971 if (htab->has_plt_localentry0)
16972 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
16973 break;
16974
16975 case DT_PPC64_OPDSZ:
16976 s = bfd_get_section_by_name (output_bfd, ".opd");
16977 if (s == NULL)
16978 continue;
16979 dyn.d_un.d_val = s->size;
16980 break;
16981
16982 case DT_PLTGOT:
16983 s = htab->elf.splt;
16984 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16985 break;
16986
16987 case DT_JMPREL:
16988 s = htab->elf.srelplt;
16989 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16990 break;
16991
16992 case DT_PLTRELSZ:
16993 dyn.d_un.d_val = htab->elf.srelplt->size;
16994 break;
16995
16996 case DT_TEXTREL:
16997 if (htab->local_ifunc_resolver)
16998 info->callbacks->einfo
16999 (_("%X%P: text relocations and GNU indirect "
17000 "functions will result in a segfault at runtime\n"));
17001 else if (htab->maybe_local_ifunc_resolver)
17002 info->callbacks->einfo
17003 (_("%P: warning: text relocations and GNU indirect "
17004 "functions may result in a segfault at runtime\n"));
17005 continue;
17006 }
17007
17008 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
17009 }
17010 }
17011
17012 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17013 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
17014 {
17015 /* Fill in the first entry in the global offset table.
17016 We use it to hold the link-time TOCbase. */
17017 bfd_put_64 (output_bfd,
17018 elf_gp (output_bfd) + TOC_BASE_OFF,
17019 htab->elf.sgot->contents);
17020
17021 /* Set .got entry size. */
17022 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17023 = 8;
17024 }
17025
17026 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17027 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17028 {
17029 /* Set .plt entry size. */
17030 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17031 = PLT_ENTRY_SIZE (htab);
17032 }
17033
17034 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17035 brlt ourselves if emitrelocations. */
17036 if (htab->brlt != NULL
17037 && htab->brlt->reloc_count != 0
17038 && !_bfd_elf_link_output_relocs (output_bfd,
17039 htab->brlt,
17040 elf_section_data (htab->brlt)->rela.hdr,
17041 elf_section_data (htab->brlt)->relocs,
17042 NULL))
17043 return FALSE;
17044
17045 if (htab->glink != NULL
17046 && htab->glink->reloc_count != 0
17047 && !_bfd_elf_link_output_relocs (output_bfd,
17048 htab->glink,
17049 elf_section_data (htab->glink)->rela.hdr,
17050 elf_section_data (htab->glink)->relocs,
17051 NULL))
17052 return FALSE;
17053
17054
17055 if (htab->glink_eh_frame != NULL
17056 && htab->glink_eh_frame->size != 0
17057 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17058 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17059 htab->glink_eh_frame,
17060 htab->glink_eh_frame->contents))
17061 return FALSE;
17062
17063 /* We need to handle writing out multiple GOT sections ourselves,
17064 since we didn't add them to DYNOBJ. We know dynobj is the first
17065 bfd. */
17066 while ((dynobj = dynobj->link.next) != NULL)
17067 {
17068 asection *s;
17069
17070 if (!is_ppc64_elf (dynobj))
17071 continue;
17072
17073 s = ppc64_elf_tdata (dynobj)->got;
17074 if (s != NULL
17075 && s->size != 0
17076 && s->output_section != bfd_abs_section_ptr
17077 && !bfd_set_section_contents (output_bfd, s->output_section,
17078 s->contents, s->output_offset,
17079 s->size))
17080 return FALSE;
17081 s = ppc64_elf_tdata (dynobj)->relgot;
17082 if (s != NULL
17083 && s->size != 0
17084 && s->output_section != bfd_abs_section_ptr
17085 && !bfd_set_section_contents (output_bfd, s->output_section,
17086 s->contents, s->output_offset,
17087 s->size))
17088 return FALSE;
17089 }
17090
17091 return TRUE;
17092 }
17093
17094 #include "elf64-target.h"
17095
17096 /* FreeBSD support */
17097
17098 #undef TARGET_LITTLE_SYM
17099 #undef TARGET_LITTLE_NAME
17100
17101 #undef TARGET_BIG_SYM
17102 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17103 #undef TARGET_BIG_NAME
17104 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17105
17106 #undef ELF_OSABI
17107 #define ELF_OSABI ELFOSABI_FREEBSD
17108
17109 #undef elf64_bed
17110 #define elf64_bed elf64_powerpc_fbsd_bed
17111
17112 #include "elf64-target.h"
This page took 0.582602 seconds and 4 git commands to generate.