Add documentation for new record Python bindings.
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
... / ...
CommitLineData
1/* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2017 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28#include "sysdep.h"
29#include <stdarg.h>
30#include "bfd.h"
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc64.h"
35#include "elf64-ppc.h"
36#include "dwarf2.h"
37
38static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
58
59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60#define TARGET_LITTLE_NAME "elf64-powerpcle"
61#define TARGET_BIG_SYM powerpc_elf64_vec
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
64#define ELF_TARGET_ID PPC64_ELF_DATA
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
67#define ELF_COMMONPAGESIZE 0x10000
68#define elf_info_to_howto ppc64_elf_info_to_howto
69
70#define elf_backend_want_got_sym 0
71#define elf_backend_want_plt_sym 0
72#define elf_backend_plt_alignment 3
73#define elf_backend_plt_not_loaded 1
74#define elf_backend_got_header_size 8
75#define elf_backend_want_dynrelro 1
76#define elf_backend_can_gc_sections 1
77#define elf_backend_can_refcount 1
78#define elf_backend_rela_normal 1
79#define elf_backend_dtrel_excludes_plt 1
80#define elf_backend_default_execstack 0
81
82#define bfd_elf64_mkobject ppc64_elf_mkobject
83#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
84#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
85#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
86#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
87#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
88#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
89#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
90#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
91#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
92
93#define elf_backend_object_p ppc64_elf_object_p
94#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
95#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
96#define elf_backend_write_core_note ppc64_elf_write_core_note
97#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
98#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
99#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
100#define elf_backend_check_directives ppc64_elf_before_check_relocs
101#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
102#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
103#define elf_backend_check_relocs ppc64_elf_check_relocs
104#define elf_backend_gc_keep ppc64_elf_gc_keep
105#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
106#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
107#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
108#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
109#define elf_backend_hide_symbol ppc64_elf_hide_symbol
110#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
111#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
112#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
113#define elf_backend_hash_symbol ppc64_elf_hash_symbol
114#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
115#define elf_backend_action_discarded ppc64_elf_action_discarded
116#define elf_backend_relocate_section ppc64_elf_relocate_section
117#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
118#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
119#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
120#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
121#define elf_backend_special_sections ppc64_elf_special_sections
122#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
123#define elf_backend_merge_symbol ppc64_elf_merge_symbol
124
125/* The name of the dynamic interpreter. This is put in the .interp
126 section. */
127#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
128
129/* The size in bytes of an entry in the procedure linkage table. */
130#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
131
132/* The initial size of the plt reserved for the dynamic linker. */
133#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
134
135/* Offsets to some stack save slots. */
136#define STK_LR 16
137#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
138/* This one is dodgy. ELFv2 does not have a linker word, so use the
139 CR save slot. Used only by optimised __tls_get_addr call stub,
140 relying on __tls_get_addr_opt not saving CR.. */
141#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
142
143/* TOC base pointers offset from start of TOC. */
144#define TOC_BASE_OFF 0x8000
145/* TOC base alignment. */
146#define TOC_BASE_ALIGN 256
147
148/* Offset of tp and dtp pointers from start of TLS block. */
149#define TP_OFFSET 0x7000
150#define DTP_OFFSET 0x8000
151
152/* .plt call stub instructions. The normal stub is like this, but
153 sometimes the .plt entry crosses a 64k boundary and we need to
154 insert an addi to adjust r11. */
155#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
156#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
157#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
158#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
159#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
160#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
161#define BCTR 0x4e800420 /* bctr */
162
163#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
164#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
165#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
166
167#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
168#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
169#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
170#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
171#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
172#define BNECTR 0x4ca20420 /* bnectr+ */
173#define BNECTR_P4 0x4ce20420 /* bnectr+ */
174
175#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
176#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
177#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
178
179#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
180#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
181#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
182
183#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
184#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
185#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
186#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
187#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
188
189/* glink call stub instructions. We enter with the index in R0. */
190#define GLINK_CALL_STUB_SIZE (16*4)
191 /* 0: */
192 /* .quad plt0-1f */
193 /* __glink: */
194#define MFLR_R12 0x7d8802a6 /* mflr %12 */
195#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
196 /* 1: */
197#define MFLR_R11 0x7d6802a6 /* mflr %11 */
198 /* ld %2,(0b-1b)(%11) */
199#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
200#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
201 /* ld %12,0(%11) */
202 /* ld %2,8(%11) */
203 /* mtctr %12 */
204 /* ld %11,16(%11) */
205 /* bctr */
206#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
207#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
208#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
209#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
210#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
211
212/* Pad with this. */
213#define NOP 0x60000000
214
215/* Some other nops. */
216#define CROR_151515 0x4def7b82
217#define CROR_313131 0x4ffffb82
218
219/* .glink entries for the first 32k functions are two instructions. */
220#define LI_R0_0 0x38000000 /* li %r0,0 */
221#define B_DOT 0x48000000 /* b . */
222
223/* After that, we need two instructions to load the index, followed by
224 a branch. */
225#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
226#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
227
228/* Instructions used by the save and restore reg functions. */
229#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
230#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
231#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
232#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
233#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
234#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
235#define LI_R12_0 0x39800000 /* li %r12,0 */
236#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
237#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
238#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
239#define BLR 0x4e800020 /* blr */
240
241/* Since .opd is an array of descriptors and each entry will end up
242 with identical R_PPC64_RELATIVE relocs, there is really no need to
243 propagate .opd relocs; The dynamic linker should be taught to
244 relocate .opd without reloc entries. */
245#ifndef NO_OPD_RELOCS
246#define NO_OPD_RELOCS 0
247#endif
248
249#ifndef ARRAY_SIZE
250#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
251#endif
252
253static inline int
254abiversion (bfd *abfd)
255{
256 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
257}
258
259static inline void
260set_abiversion (bfd *abfd, int ver)
261{
262 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
263 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
264}
265\f
266#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
267
268/* Relocation HOWTO's. */
269static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
270
271static reloc_howto_type ppc64_elf_howto_raw[] = {
272 /* This reloc does nothing. */
273 HOWTO (R_PPC64_NONE, /* type */
274 0, /* rightshift */
275 3, /* size (0 = byte, 1 = short, 2 = long) */
276 0, /* bitsize */
277 FALSE, /* pc_relative */
278 0, /* bitpos */
279 complain_overflow_dont, /* complain_on_overflow */
280 bfd_elf_generic_reloc, /* special_function */
281 "R_PPC64_NONE", /* name */
282 FALSE, /* partial_inplace */
283 0, /* src_mask */
284 0, /* dst_mask */
285 FALSE), /* pcrel_offset */
286
287 /* A standard 32 bit relocation. */
288 HOWTO (R_PPC64_ADDR32, /* type */
289 0, /* rightshift */
290 2, /* size (0 = byte, 1 = short, 2 = long) */
291 32, /* bitsize */
292 FALSE, /* pc_relative */
293 0, /* bitpos */
294 complain_overflow_bitfield, /* complain_on_overflow */
295 bfd_elf_generic_reloc, /* special_function */
296 "R_PPC64_ADDR32", /* name */
297 FALSE, /* partial_inplace */
298 0, /* src_mask */
299 0xffffffff, /* dst_mask */
300 FALSE), /* pcrel_offset */
301
302 /* An absolute 26 bit branch; the lower two bits must be zero.
303 FIXME: we don't check that, we just clear them. */
304 HOWTO (R_PPC64_ADDR24, /* type */
305 0, /* rightshift */
306 2, /* size (0 = byte, 1 = short, 2 = long) */
307 26, /* bitsize */
308 FALSE, /* pc_relative */
309 0, /* bitpos */
310 complain_overflow_bitfield, /* complain_on_overflow */
311 bfd_elf_generic_reloc, /* special_function */
312 "R_PPC64_ADDR24", /* name */
313 FALSE, /* partial_inplace */
314 0, /* src_mask */
315 0x03fffffc, /* dst_mask */
316 FALSE), /* pcrel_offset */
317
318 /* A standard 16 bit relocation. */
319 HOWTO (R_PPC64_ADDR16, /* type */
320 0, /* rightshift */
321 1, /* size (0 = byte, 1 = short, 2 = long) */
322 16, /* bitsize */
323 FALSE, /* pc_relative */
324 0, /* bitpos */
325 complain_overflow_bitfield, /* complain_on_overflow */
326 bfd_elf_generic_reloc, /* special_function */
327 "R_PPC64_ADDR16", /* name */
328 FALSE, /* partial_inplace */
329 0, /* src_mask */
330 0xffff, /* dst_mask */
331 FALSE), /* pcrel_offset */
332
333 /* A 16 bit relocation without overflow. */
334 HOWTO (R_PPC64_ADDR16_LO, /* type */
335 0, /* rightshift */
336 1, /* size (0 = byte, 1 = short, 2 = long) */
337 16, /* bitsize */
338 FALSE, /* pc_relative */
339 0, /* bitpos */
340 complain_overflow_dont,/* complain_on_overflow */
341 bfd_elf_generic_reloc, /* special_function */
342 "R_PPC64_ADDR16_LO", /* name */
343 FALSE, /* partial_inplace */
344 0, /* src_mask */
345 0xffff, /* dst_mask */
346 FALSE), /* pcrel_offset */
347
348 /* Bits 16-31 of an address. */
349 HOWTO (R_PPC64_ADDR16_HI, /* type */
350 16, /* rightshift */
351 1, /* size (0 = byte, 1 = short, 2 = long) */
352 16, /* bitsize */
353 FALSE, /* pc_relative */
354 0, /* bitpos */
355 complain_overflow_signed, /* complain_on_overflow */
356 bfd_elf_generic_reloc, /* special_function */
357 "R_PPC64_ADDR16_HI", /* name */
358 FALSE, /* partial_inplace */
359 0, /* src_mask */
360 0xffff, /* dst_mask */
361 FALSE), /* pcrel_offset */
362
363 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
364 bits, treated as a signed number, is negative. */
365 HOWTO (R_PPC64_ADDR16_HA, /* type */
366 16, /* rightshift */
367 1, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
369 FALSE, /* pc_relative */
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 ppc64_elf_ha_reloc, /* special_function */
373 "R_PPC64_ADDR16_HA", /* name */
374 FALSE, /* partial_inplace */
375 0, /* src_mask */
376 0xffff, /* dst_mask */
377 FALSE), /* pcrel_offset */
378
379 /* An absolute 16 bit branch; the lower two bits must be zero.
380 FIXME: we don't check that, we just clear them. */
381 HOWTO (R_PPC64_ADDR14, /* type */
382 0, /* rightshift */
383 2, /* size (0 = byte, 1 = short, 2 = long) */
384 16, /* bitsize */
385 FALSE, /* pc_relative */
386 0, /* bitpos */
387 complain_overflow_signed, /* complain_on_overflow */
388 ppc64_elf_branch_reloc, /* special_function */
389 "R_PPC64_ADDR14", /* name */
390 FALSE, /* partial_inplace */
391 0, /* src_mask */
392 0x0000fffc, /* dst_mask */
393 FALSE), /* pcrel_offset */
394
395 /* An absolute 16 bit branch, for which bit 10 should be set to
396 indicate that the branch is expected to be taken. The lower two
397 bits must be zero. */
398 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
399 0, /* rightshift */
400 2, /* size (0 = byte, 1 = short, 2 = long) */
401 16, /* bitsize */
402 FALSE, /* pc_relative */
403 0, /* bitpos */
404 complain_overflow_signed, /* complain_on_overflow */
405 ppc64_elf_brtaken_reloc, /* special_function */
406 "R_PPC64_ADDR14_BRTAKEN",/* name */
407 FALSE, /* partial_inplace */
408 0, /* src_mask */
409 0x0000fffc, /* dst_mask */
410 FALSE), /* pcrel_offset */
411
412 /* An absolute 16 bit branch, for which bit 10 should be set to
413 indicate that the branch is not expected to be taken. The lower
414 two bits must be zero. */
415 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
416 0, /* rightshift */
417 2, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
419 FALSE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
422 ppc64_elf_brtaken_reloc, /* special_function */
423 "R_PPC64_ADDR14_BRNTAKEN",/* name */
424 FALSE, /* partial_inplace */
425 0, /* src_mask */
426 0x0000fffc, /* dst_mask */
427 FALSE), /* pcrel_offset */
428
429 /* A relative 26 bit branch; the lower two bits must be zero. */
430 HOWTO (R_PPC64_REL24, /* type */
431 0, /* rightshift */
432 2, /* size (0 = byte, 1 = short, 2 = long) */
433 26, /* bitsize */
434 TRUE, /* pc_relative */
435 0, /* bitpos */
436 complain_overflow_signed, /* complain_on_overflow */
437 ppc64_elf_branch_reloc, /* special_function */
438 "R_PPC64_REL24", /* name */
439 FALSE, /* partial_inplace */
440 0, /* src_mask */
441 0x03fffffc, /* dst_mask */
442 TRUE), /* pcrel_offset */
443
444 /* A relative 16 bit branch; the lower two bits must be zero. */
445 HOWTO (R_PPC64_REL14, /* type */
446 0, /* rightshift */
447 2, /* size (0 = byte, 1 = short, 2 = long) */
448 16, /* bitsize */
449 TRUE, /* pc_relative */
450 0, /* bitpos */
451 complain_overflow_signed, /* complain_on_overflow */
452 ppc64_elf_branch_reloc, /* special_function */
453 "R_PPC64_REL14", /* name */
454 FALSE, /* partial_inplace */
455 0, /* src_mask */
456 0x0000fffc, /* dst_mask */
457 TRUE), /* pcrel_offset */
458
459 /* A relative 16 bit branch. Bit 10 should be set to indicate that
460 the branch is expected to be taken. The lower two bits must be
461 zero. */
462 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
463 0, /* rightshift */
464 2, /* size (0 = byte, 1 = short, 2 = long) */
465 16, /* bitsize */
466 TRUE, /* pc_relative */
467 0, /* bitpos */
468 complain_overflow_signed, /* complain_on_overflow */
469 ppc64_elf_brtaken_reloc, /* special_function */
470 "R_PPC64_REL14_BRTAKEN", /* name */
471 FALSE, /* partial_inplace */
472 0, /* src_mask */
473 0x0000fffc, /* dst_mask */
474 TRUE), /* pcrel_offset */
475
476 /* A relative 16 bit branch. Bit 10 should be set to indicate that
477 the branch is not expected to be taken. The lower two bits must
478 be zero. */
479 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 16, /* bitsize */
483 TRUE, /* pc_relative */
484 0, /* bitpos */
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc64_elf_brtaken_reloc, /* special_function */
487 "R_PPC64_REL14_BRNTAKEN",/* name */
488 FALSE, /* partial_inplace */
489 0, /* src_mask */
490 0x0000fffc, /* dst_mask */
491 TRUE), /* pcrel_offset */
492
493 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
494 symbol. */
495 HOWTO (R_PPC64_GOT16, /* type */
496 0, /* rightshift */
497 1, /* size (0 = byte, 1 = short, 2 = long) */
498 16, /* bitsize */
499 FALSE, /* pc_relative */
500 0, /* bitpos */
501 complain_overflow_signed, /* complain_on_overflow */
502 ppc64_elf_unhandled_reloc, /* special_function */
503 "R_PPC64_GOT16", /* name */
504 FALSE, /* partial_inplace */
505 0, /* src_mask */
506 0xffff, /* dst_mask */
507 FALSE), /* pcrel_offset */
508
509 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
510 the symbol. */
511 HOWTO (R_PPC64_GOT16_LO, /* type */
512 0, /* rightshift */
513 1, /* size (0 = byte, 1 = short, 2 = long) */
514 16, /* bitsize */
515 FALSE, /* pc_relative */
516 0, /* bitpos */
517 complain_overflow_dont, /* complain_on_overflow */
518 ppc64_elf_unhandled_reloc, /* special_function */
519 "R_PPC64_GOT16_LO", /* name */
520 FALSE, /* partial_inplace */
521 0, /* src_mask */
522 0xffff, /* dst_mask */
523 FALSE), /* pcrel_offset */
524
525 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
526 the symbol. */
527 HOWTO (R_PPC64_GOT16_HI, /* type */
528 16, /* rightshift */
529 1, /* size (0 = byte, 1 = short, 2 = long) */
530 16, /* bitsize */
531 FALSE, /* pc_relative */
532 0, /* bitpos */
533 complain_overflow_signed,/* complain_on_overflow */
534 ppc64_elf_unhandled_reloc, /* special_function */
535 "R_PPC64_GOT16_HI", /* name */
536 FALSE, /* partial_inplace */
537 0, /* src_mask */
538 0xffff, /* dst_mask */
539 FALSE), /* pcrel_offset */
540
541 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
542 the symbol. */
543 HOWTO (R_PPC64_GOT16_HA, /* type */
544 16, /* rightshift */
545 1, /* size (0 = byte, 1 = short, 2 = long) */
546 16, /* bitsize */
547 FALSE, /* pc_relative */
548 0, /* bitpos */
549 complain_overflow_signed,/* complain_on_overflow */
550 ppc64_elf_unhandled_reloc, /* special_function */
551 "R_PPC64_GOT16_HA", /* name */
552 FALSE, /* partial_inplace */
553 0, /* src_mask */
554 0xffff, /* dst_mask */
555 FALSE), /* pcrel_offset */
556
557 /* This is used only by the dynamic linker. The symbol should exist
558 both in the object being run and in some shared library. The
559 dynamic linker copies the data addressed by the symbol from the
560 shared library into the object, because the object being
561 run has to have the data at some particular address. */
562 HOWTO (R_PPC64_COPY, /* type */
563 0, /* rightshift */
564 0, /* this one is variable size */
565 0, /* bitsize */
566 FALSE, /* pc_relative */
567 0, /* bitpos */
568 complain_overflow_dont, /* complain_on_overflow */
569 ppc64_elf_unhandled_reloc, /* special_function */
570 "R_PPC64_COPY", /* name */
571 FALSE, /* partial_inplace */
572 0, /* src_mask */
573 0, /* dst_mask */
574 FALSE), /* pcrel_offset */
575
576 /* Like R_PPC64_ADDR64, but used when setting global offset table
577 entries. */
578 HOWTO (R_PPC64_GLOB_DAT, /* type */
579 0, /* rightshift */
580 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
581 64, /* bitsize */
582 FALSE, /* pc_relative */
583 0, /* bitpos */
584 complain_overflow_dont, /* complain_on_overflow */
585 ppc64_elf_unhandled_reloc, /* special_function */
586 "R_PPC64_GLOB_DAT", /* name */
587 FALSE, /* partial_inplace */
588 0, /* src_mask */
589 ONES (64), /* dst_mask */
590 FALSE), /* pcrel_offset */
591
592 /* Created by the link editor. Marks a procedure linkage table
593 entry for a symbol. */
594 HOWTO (R_PPC64_JMP_SLOT, /* type */
595 0, /* rightshift */
596 0, /* size (0 = byte, 1 = short, 2 = long) */
597 0, /* bitsize */
598 FALSE, /* pc_relative */
599 0, /* bitpos */
600 complain_overflow_dont, /* complain_on_overflow */
601 ppc64_elf_unhandled_reloc, /* special_function */
602 "R_PPC64_JMP_SLOT", /* name */
603 FALSE, /* partial_inplace */
604 0, /* src_mask */
605 0, /* dst_mask */
606 FALSE), /* pcrel_offset */
607
608 /* Used only by the dynamic linker. When the object is run, this
609 doubleword64 is set to the load address of the object, plus the
610 addend. */
611 HOWTO (R_PPC64_RELATIVE, /* type */
612 0, /* rightshift */
613 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
614 64, /* bitsize */
615 FALSE, /* pc_relative */
616 0, /* bitpos */
617 complain_overflow_dont, /* complain_on_overflow */
618 bfd_elf_generic_reloc, /* special_function */
619 "R_PPC64_RELATIVE", /* name */
620 FALSE, /* partial_inplace */
621 0, /* src_mask */
622 ONES (64), /* dst_mask */
623 FALSE), /* pcrel_offset */
624
625 /* Like R_PPC64_ADDR32, but may be unaligned. */
626 HOWTO (R_PPC64_UADDR32, /* type */
627 0, /* rightshift */
628 2, /* size (0 = byte, 1 = short, 2 = long) */
629 32, /* bitsize */
630 FALSE, /* pc_relative */
631 0, /* bitpos */
632 complain_overflow_bitfield, /* complain_on_overflow */
633 bfd_elf_generic_reloc, /* special_function */
634 "R_PPC64_UADDR32", /* name */
635 FALSE, /* partial_inplace */
636 0, /* src_mask */
637 0xffffffff, /* dst_mask */
638 FALSE), /* pcrel_offset */
639
640 /* Like R_PPC64_ADDR16, but may be unaligned. */
641 HOWTO (R_PPC64_UADDR16, /* type */
642 0, /* rightshift */
643 1, /* size (0 = byte, 1 = short, 2 = long) */
644 16, /* bitsize */
645 FALSE, /* pc_relative */
646 0, /* bitpos */
647 complain_overflow_bitfield, /* complain_on_overflow */
648 bfd_elf_generic_reloc, /* special_function */
649 "R_PPC64_UADDR16", /* name */
650 FALSE, /* partial_inplace */
651 0, /* src_mask */
652 0xffff, /* dst_mask */
653 FALSE), /* pcrel_offset */
654
655 /* 32-bit PC relative. */
656 HOWTO (R_PPC64_REL32, /* type */
657 0, /* rightshift */
658 2, /* size (0 = byte, 1 = short, 2 = long) */
659 32, /* bitsize */
660 TRUE, /* pc_relative */
661 0, /* bitpos */
662 complain_overflow_signed, /* complain_on_overflow */
663 bfd_elf_generic_reloc, /* special_function */
664 "R_PPC64_REL32", /* name */
665 FALSE, /* partial_inplace */
666 0, /* src_mask */
667 0xffffffff, /* dst_mask */
668 TRUE), /* pcrel_offset */
669
670 /* 32-bit relocation to the symbol's procedure linkage table. */
671 HOWTO (R_PPC64_PLT32, /* type */
672 0, /* rightshift */
673 2, /* size (0 = byte, 1 = short, 2 = long) */
674 32, /* bitsize */
675 FALSE, /* pc_relative */
676 0, /* bitpos */
677 complain_overflow_bitfield, /* complain_on_overflow */
678 ppc64_elf_unhandled_reloc, /* special_function */
679 "R_PPC64_PLT32", /* name */
680 FALSE, /* partial_inplace */
681 0, /* src_mask */
682 0xffffffff, /* dst_mask */
683 FALSE), /* pcrel_offset */
684
685 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
686 FIXME: R_PPC64_PLTREL32 not supported. */
687 HOWTO (R_PPC64_PLTREL32, /* type */
688 0, /* rightshift */
689 2, /* size (0 = byte, 1 = short, 2 = long) */
690 32, /* bitsize */
691 TRUE, /* pc_relative */
692 0, /* bitpos */
693 complain_overflow_signed, /* complain_on_overflow */
694 ppc64_elf_unhandled_reloc, /* special_function */
695 "R_PPC64_PLTREL32", /* name */
696 FALSE, /* partial_inplace */
697 0, /* src_mask */
698 0xffffffff, /* dst_mask */
699 TRUE), /* pcrel_offset */
700
701 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
702 the symbol. */
703 HOWTO (R_PPC64_PLT16_LO, /* type */
704 0, /* rightshift */
705 1, /* size (0 = byte, 1 = short, 2 = long) */
706 16, /* bitsize */
707 FALSE, /* pc_relative */
708 0, /* bitpos */
709 complain_overflow_dont, /* complain_on_overflow */
710 ppc64_elf_unhandled_reloc, /* special_function */
711 "R_PPC64_PLT16_LO", /* name */
712 FALSE, /* partial_inplace */
713 0, /* src_mask */
714 0xffff, /* dst_mask */
715 FALSE), /* pcrel_offset */
716
717 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
718 the symbol. */
719 HOWTO (R_PPC64_PLT16_HI, /* type */
720 16, /* rightshift */
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
723 FALSE, /* pc_relative */
724 0, /* bitpos */
725 complain_overflow_signed, /* complain_on_overflow */
726 ppc64_elf_unhandled_reloc, /* special_function */
727 "R_PPC64_PLT16_HI", /* name */
728 FALSE, /* partial_inplace */
729 0, /* src_mask */
730 0xffff, /* dst_mask */
731 FALSE), /* pcrel_offset */
732
733 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
734 the symbol. */
735 HOWTO (R_PPC64_PLT16_HA, /* type */
736 16, /* rightshift */
737 1, /* size (0 = byte, 1 = short, 2 = long) */
738 16, /* bitsize */
739 FALSE, /* pc_relative */
740 0, /* bitpos */
741 complain_overflow_signed, /* complain_on_overflow */
742 ppc64_elf_unhandled_reloc, /* special_function */
743 "R_PPC64_PLT16_HA", /* name */
744 FALSE, /* partial_inplace */
745 0, /* src_mask */
746 0xffff, /* dst_mask */
747 FALSE), /* pcrel_offset */
748
749 /* 16-bit section relative relocation. */
750 HOWTO (R_PPC64_SECTOFF, /* type */
751 0, /* rightshift */
752 1, /* size (0 = byte, 1 = short, 2 = long) */
753 16, /* bitsize */
754 FALSE, /* pc_relative */
755 0, /* bitpos */
756 complain_overflow_signed, /* complain_on_overflow */
757 ppc64_elf_sectoff_reloc, /* special_function */
758 "R_PPC64_SECTOFF", /* name */
759 FALSE, /* partial_inplace */
760 0, /* src_mask */
761 0xffff, /* dst_mask */
762 FALSE), /* pcrel_offset */
763
764 /* Like R_PPC64_SECTOFF, but no overflow warning. */
765 HOWTO (R_PPC64_SECTOFF_LO, /* type */
766 0, /* rightshift */
767 1, /* size (0 = byte, 1 = short, 2 = long) */
768 16, /* bitsize */
769 FALSE, /* pc_relative */
770 0, /* bitpos */
771 complain_overflow_dont, /* complain_on_overflow */
772 ppc64_elf_sectoff_reloc, /* special_function */
773 "R_PPC64_SECTOFF_LO", /* name */
774 FALSE, /* partial_inplace */
775 0, /* src_mask */
776 0xffff, /* dst_mask */
777 FALSE), /* pcrel_offset */
778
779 /* 16-bit upper half section relative relocation. */
780 HOWTO (R_PPC64_SECTOFF_HI, /* type */
781 16, /* rightshift */
782 1, /* size (0 = byte, 1 = short, 2 = long) */
783 16, /* bitsize */
784 FALSE, /* pc_relative */
785 0, /* bitpos */
786 complain_overflow_signed, /* complain_on_overflow */
787 ppc64_elf_sectoff_reloc, /* special_function */
788 "R_PPC64_SECTOFF_HI", /* name */
789 FALSE, /* partial_inplace */
790 0, /* src_mask */
791 0xffff, /* dst_mask */
792 FALSE), /* pcrel_offset */
793
794 /* 16-bit upper half adjusted section relative relocation. */
795 HOWTO (R_PPC64_SECTOFF_HA, /* type */
796 16, /* rightshift */
797 1, /* size (0 = byte, 1 = short, 2 = long) */
798 16, /* bitsize */
799 FALSE, /* pc_relative */
800 0, /* bitpos */
801 complain_overflow_signed, /* complain_on_overflow */
802 ppc64_elf_sectoff_ha_reloc, /* special_function */
803 "R_PPC64_SECTOFF_HA", /* name */
804 FALSE, /* partial_inplace */
805 0, /* src_mask */
806 0xffff, /* dst_mask */
807 FALSE), /* pcrel_offset */
808
809 /* Like R_PPC64_REL24 without touching the two least significant bits. */
810 HOWTO (R_PPC64_REL30, /* type */
811 2, /* rightshift */
812 2, /* size (0 = byte, 1 = short, 2 = long) */
813 30, /* bitsize */
814 TRUE, /* pc_relative */
815 0, /* bitpos */
816 complain_overflow_dont, /* complain_on_overflow */
817 bfd_elf_generic_reloc, /* special_function */
818 "R_PPC64_REL30", /* name */
819 FALSE, /* partial_inplace */
820 0, /* src_mask */
821 0xfffffffc, /* dst_mask */
822 TRUE), /* pcrel_offset */
823
824 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
825
826 /* A standard 64-bit relocation. */
827 HOWTO (R_PPC64_ADDR64, /* type */
828 0, /* rightshift */
829 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
830 64, /* bitsize */
831 FALSE, /* pc_relative */
832 0, /* bitpos */
833 complain_overflow_dont, /* complain_on_overflow */
834 bfd_elf_generic_reloc, /* special_function */
835 "R_PPC64_ADDR64", /* name */
836 FALSE, /* partial_inplace */
837 0, /* src_mask */
838 ONES (64), /* dst_mask */
839 FALSE), /* pcrel_offset */
840
841 /* The bits 32-47 of an address. */
842 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
843 32, /* rightshift */
844 1, /* size (0 = byte, 1 = short, 2 = long) */
845 16, /* bitsize */
846 FALSE, /* pc_relative */
847 0, /* bitpos */
848 complain_overflow_dont, /* complain_on_overflow */
849 bfd_elf_generic_reloc, /* special_function */
850 "R_PPC64_ADDR16_HIGHER", /* name */
851 FALSE, /* partial_inplace */
852 0, /* src_mask */
853 0xffff, /* dst_mask */
854 FALSE), /* pcrel_offset */
855
856 /* The bits 32-47 of an address, plus 1 if the contents of the low
857 16 bits, treated as a signed number, is negative. */
858 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
859 32, /* rightshift */
860 1, /* size (0 = byte, 1 = short, 2 = long) */
861 16, /* bitsize */
862 FALSE, /* pc_relative */
863 0, /* bitpos */
864 complain_overflow_dont, /* complain_on_overflow */
865 ppc64_elf_ha_reloc, /* special_function */
866 "R_PPC64_ADDR16_HIGHERA", /* name */
867 FALSE, /* partial_inplace */
868 0, /* src_mask */
869 0xffff, /* dst_mask */
870 FALSE), /* pcrel_offset */
871
872 /* The bits 48-63 of an address. */
873 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
874 48, /* rightshift */
875 1, /* size (0 = byte, 1 = short, 2 = long) */
876 16, /* bitsize */
877 FALSE, /* pc_relative */
878 0, /* bitpos */
879 complain_overflow_dont, /* complain_on_overflow */
880 bfd_elf_generic_reloc, /* special_function */
881 "R_PPC64_ADDR16_HIGHEST", /* name */
882 FALSE, /* partial_inplace */
883 0, /* src_mask */
884 0xffff, /* dst_mask */
885 FALSE), /* pcrel_offset */
886
887 /* The bits 48-63 of an address, plus 1 if the contents of the low
888 16 bits, treated as a signed number, is negative. */
889 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
890 48, /* rightshift */
891 1, /* size (0 = byte, 1 = short, 2 = long) */
892 16, /* bitsize */
893 FALSE, /* pc_relative */
894 0, /* bitpos */
895 complain_overflow_dont, /* complain_on_overflow */
896 ppc64_elf_ha_reloc, /* special_function */
897 "R_PPC64_ADDR16_HIGHESTA", /* name */
898 FALSE, /* partial_inplace */
899 0, /* src_mask */
900 0xffff, /* dst_mask */
901 FALSE), /* pcrel_offset */
902
903 /* Like ADDR64, but may be unaligned. */
904 HOWTO (R_PPC64_UADDR64, /* type */
905 0, /* rightshift */
906 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
907 64, /* bitsize */
908 FALSE, /* pc_relative */
909 0, /* bitpos */
910 complain_overflow_dont, /* complain_on_overflow */
911 bfd_elf_generic_reloc, /* special_function */
912 "R_PPC64_UADDR64", /* name */
913 FALSE, /* partial_inplace */
914 0, /* src_mask */
915 ONES (64), /* dst_mask */
916 FALSE), /* pcrel_offset */
917
918 /* 64-bit relative relocation. */
919 HOWTO (R_PPC64_REL64, /* type */
920 0, /* rightshift */
921 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
922 64, /* bitsize */
923 TRUE, /* pc_relative */
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
926 bfd_elf_generic_reloc, /* special_function */
927 "R_PPC64_REL64", /* name */
928 FALSE, /* partial_inplace */
929 0, /* src_mask */
930 ONES (64), /* dst_mask */
931 TRUE), /* pcrel_offset */
932
933 /* 64-bit relocation to the symbol's procedure linkage table. */
934 HOWTO (R_PPC64_PLT64, /* type */
935 0, /* rightshift */
936 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
937 64, /* bitsize */
938 FALSE, /* pc_relative */
939 0, /* bitpos */
940 complain_overflow_dont, /* complain_on_overflow */
941 ppc64_elf_unhandled_reloc, /* special_function */
942 "R_PPC64_PLT64", /* name */
943 FALSE, /* partial_inplace */
944 0, /* src_mask */
945 ONES (64), /* dst_mask */
946 FALSE), /* pcrel_offset */
947
948 /* 64-bit PC relative relocation to the symbol's procedure linkage
949 table. */
950 /* FIXME: R_PPC64_PLTREL64 not supported. */
951 HOWTO (R_PPC64_PLTREL64, /* type */
952 0, /* rightshift */
953 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
954 64, /* bitsize */
955 TRUE, /* pc_relative */
956 0, /* bitpos */
957 complain_overflow_dont, /* complain_on_overflow */
958 ppc64_elf_unhandled_reloc, /* special_function */
959 "R_PPC64_PLTREL64", /* name */
960 FALSE, /* partial_inplace */
961 0, /* src_mask */
962 ONES (64), /* dst_mask */
963 TRUE), /* pcrel_offset */
964
965 /* 16 bit TOC-relative relocation. */
966
967 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
968 HOWTO (R_PPC64_TOC16, /* type */
969 0, /* rightshift */
970 1, /* size (0 = byte, 1 = short, 2 = long) */
971 16, /* bitsize */
972 FALSE, /* pc_relative */
973 0, /* bitpos */
974 complain_overflow_signed, /* complain_on_overflow */
975 ppc64_elf_toc_reloc, /* special_function */
976 "R_PPC64_TOC16", /* name */
977 FALSE, /* partial_inplace */
978 0, /* src_mask */
979 0xffff, /* dst_mask */
980 FALSE), /* pcrel_offset */
981
982 /* 16 bit TOC-relative relocation without overflow. */
983
984 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
985 HOWTO (R_PPC64_TOC16_LO, /* type */
986 0, /* rightshift */
987 1, /* size (0 = byte, 1 = short, 2 = long) */
988 16, /* bitsize */
989 FALSE, /* pc_relative */
990 0, /* bitpos */
991 complain_overflow_dont, /* complain_on_overflow */
992 ppc64_elf_toc_reloc, /* special_function */
993 "R_PPC64_TOC16_LO", /* name */
994 FALSE, /* partial_inplace */
995 0, /* src_mask */
996 0xffff, /* dst_mask */
997 FALSE), /* pcrel_offset */
998
999 /* 16 bit TOC-relative relocation, high 16 bits. */
1000
1001 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
1002 HOWTO (R_PPC64_TOC16_HI, /* type */
1003 16, /* rightshift */
1004 1, /* size (0 = byte, 1 = short, 2 = long) */
1005 16, /* bitsize */
1006 FALSE, /* pc_relative */
1007 0, /* bitpos */
1008 complain_overflow_signed, /* complain_on_overflow */
1009 ppc64_elf_toc_reloc, /* special_function */
1010 "R_PPC64_TOC16_HI", /* name */
1011 FALSE, /* partial_inplace */
1012 0, /* src_mask */
1013 0xffff, /* dst_mask */
1014 FALSE), /* pcrel_offset */
1015
1016 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1017 contents of the low 16 bits, treated as a signed number, is
1018 negative. */
1019
1020 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1021 HOWTO (R_PPC64_TOC16_HA, /* type */
1022 16, /* rightshift */
1023 1, /* size (0 = byte, 1 = short, 2 = long) */
1024 16, /* bitsize */
1025 FALSE, /* pc_relative */
1026 0, /* bitpos */
1027 complain_overflow_signed, /* complain_on_overflow */
1028 ppc64_elf_toc_ha_reloc, /* special_function */
1029 "R_PPC64_TOC16_HA", /* name */
1030 FALSE, /* partial_inplace */
1031 0, /* src_mask */
1032 0xffff, /* dst_mask */
1033 FALSE), /* pcrel_offset */
1034
1035 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1036
1037 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1038 HOWTO (R_PPC64_TOC, /* type */
1039 0, /* rightshift */
1040 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1041 64, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_toc64_reloc, /* special_function */
1046 "R_PPC64_TOC", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 ONES (64), /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_GOT16, but also informs the link editor that the
1053 value to relocate may (!) refer to a PLT entry which the link
1054 editor (a) may replace with the symbol value. If the link editor
1055 is unable to fully resolve the symbol, it may (b) create a PLT
1056 entry and store the address to the new PLT entry in the GOT.
1057 This permits lazy resolution of function symbols at run time.
1058 The link editor may also skip all of this and just (c) emit a
1059 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1060 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1061 HOWTO (R_PPC64_PLTGOT16, /* type */
1062 0, /* rightshift */
1063 1, /* size (0 = byte, 1 = short, 2 = long) */
1064 16, /* bitsize */
1065 FALSE, /* pc_relative */
1066 0, /* bitpos */
1067 complain_overflow_signed, /* complain_on_overflow */
1068 ppc64_elf_unhandled_reloc, /* special_function */
1069 "R_PPC64_PLTGOT16", /* name */
1070 FALSE, /* partial_inplace */
1071 0, /* src_mask */
1072 0xffff, /* dst_mask */
1073 FALSE), /* pcrel_offset */
1074
1075 /* Like R_PPC64_PLTGOT16, but without overflow. */
1076 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1077 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1078 0, /* rightshift */
1079 1, /* size (0 = byte, 1 = short, 2 = long) */
1080 16, /* bitsize */
1081 FALSE, /* pc_relative */
1082 0, /* bitpos */
1083 complain_overflow_dont, /* complain_on_overflow */
1084 ppc64_elf_unhandled_reloc, /* special_function */
1085 "R_PPC64_PLTGOT16_LO", /* name */
1086 FALSE, /* partial_inplace */
1087 0, /* src_mask */
1088 0xffff, /* dst_mask */
1089 FALSE), /* pcrel_offset */
1090
1091 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1092 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1093 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1094 16, /* rightshift */
1095 1, /* size (0 = byte, 1 = short, 2 = long) */
1096 16, /* bitsize */
1097 FALSE, /* pc_relative */
1098 0, /* bitpos */
1099 complain_overflow_signed, /* complain_on_overflow */
1100 ppc64_elf_unhandled_reloc, /* special_function */
1101 "R_PPC64_PLTGOT16_HI", /* name */
1102 FALSE, /* partial_inplace */
1103 0, /* src_mask */
1104 0xffff, /* dst_mask */
1105 FALSE), /* pcrel_offset */
1106
1107 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1108 1 if the contents of the low 16 bits, treated as a signed number,
1109 is negative. */
1110 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1111 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1112 16, /* rightshift */
1113 1, /* size (0 = byte, 1 = short, 2 = long) */
1114 16, /* bitsize */
1115 FALSE, /* pc_relative */
1116 0, /* bitpos */
1117 complain_overflow_signed, /* complain_on_overflow */
1118 ppc64_elf_unhandled_reloc, /* special_function */
1119 "R_PPC64_PLTGOT16_HA", /* name */
1120 FALSE, /* partial_inplace */
1121 0, /* src_mask */
1122 0xffff, /* dst_mask */
1123 FALSE), /* pcrel_offset */
1124
1125 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1126 HOWTO (R_PPC64_ADDR16_DS, /* type */
1127 0, /* rightshift */
1128 1, /* size (0 = byte, 1 = short, 2 = long) */
1129 16, /* bitsize */
1130 FALSE, /* pc_relative */
1131 0, /* bitpos */
1132 complain_overflow_signed, /* complain_on_overflow */
1133 bfd_elf_generic_reloc, /* special_function */
1134 "R_PPC64_ADDR16_DS", /* name */
1135 FALSE, /* partial_inplace */
1136 0, /* src_mask */
1137 0xfffc, /* dst_mask */
1138 FALSE), /* pcrel_offset */
1139
1140 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1141 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1142 0, /* rightshift */
1143 1, /* size (0 = byte, 1 = short, 2 = long) */
1144 16, /* bitsize */
1145 FALSE, /* pc_relative */
1146 0, /* bitpos */
1147 complain_overflow_dont,/* complain_on_overflow */
1148 bfd_elf_generic_reloc, /* special_function */
1149 "R_PPC64_ADDR16_LO_DS",/* name */
1150 FALSE, /* partial_inplace */
1151 0, /* src_mask */
1152 0xfffc, /* dst_mask */
1153 FALSE), /* pcrel_offset */
1154
1155 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1156 HOWTO (R_PPC64_GOT16_DS, /* type */
1157 0, /* rightshift */
1158 1, /* size (0 = byte, 1 = short, 2 = long) */
1159 16, /* bitsize */
1160 FALSE, /* pc_relative */
1161 0, /* bitpos */
1162 complain_overflow_signed, /* complain_on_overflow */
1163 ppc64_elf_unhandled_reloc, /* special_function */
1164 "R_PPC64_GOT16_DS", /* name */
1165 FALSE, /* partial_inplace */
1166 0, /* src_mask */
1167 0xfffc, /* dst_mask */
1168 FALSE), /* pcrel_offset */
1169
1170 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1171 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1172 0, /* rightshift */
1173 1, /* size (0 = byte, 1 = short, 2 = long) */
1174 16, /* bitsize */
1175 FALSE, /* pc_relative */
1176 0, /* bitpos */
1177 complain_overflow_dont, /* complain_on_overflow */
1178 ppc64_elf_unhandled_reloc, /* special_function */
1179 "R_PPC64_GOT16_LO_DS", /* name */
1180 FALSE, /* partial_inplace */
1181 0, /* src_mask */
1182 0xfffc, /* dst_mask */
1183 FALSE), /* pcrel_offset */
1184
1185 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1186 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1187 0, /* rightshift */
1188 1, /* size (0 = byte, 1 = short, 2 = long) */
1189 16, /* bitsize */
1190 FALSE, /* pc_relative */
1191 0, /* bitpos */
1192 complain_overflow_dont, /* complain_on_overflow */
1193 ppc64_elf_unhandled_reloc, /* special_function */
1194 "R_PPC64_PLT16_LO_DS", /* name */
1195 FALSE, /* partial_inplace */
1196 0, /* src_mask */
1197 0xfffc, /* dst_mask */
1198 FALSE), /* pcrel_offset */
1199
1200 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1201 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1202 0, /* rightshift */
1203 1, /* size (0 = byte, 1 = short, 2 = long) */
1204 16, /* bitsize */
1205 FALSE, /* pc_relative */
1206 0, /* bitpos */
1207 complain_overflow_signed, /* complain_on_overflow */
1208 ppc64_elf_sectoff_reloc, /* special_function */
1209 "R_PPC64_SECTOFF_DS", /* name */
1210 FALSE, /* partial_inplace */
1211 0, /* src_mask */
1212 0xfffc, /* dst_mask */
1213 FALSE), /* pcrel_offset */
1214
1215 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1216 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1217 0, /* rightshift */
1218 1, /* size (0 = byte, 1 = short, 2 = long) */
1219 16, /* bitsize */
1220 FALSE, /* pc_relative */
1221 0, /* bitpos */
1222 complain_overflow_dont, /* complain_on_overflow */
1223 ppc64_elf_sectoff_reloc, /* special_function */
1224 "R_PPC64_SECTOFF_LO_DS",/* name */
1225 FALSE, /* partial_inplace */
1226 0, /* src_mask */
1227 0xfffc, /* dst_mask */
1228 FALSE), /* pcrel_offset */
1229
1230 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1231 HOWTO (R_PPC64_TOC16_DS, /* type */
1232 0, /* rightshift */
1233 1, /* size (0 = byte, 1 = short, 2 = long) */
1234 16, /* bitsize */
1235 FALSE, /* pc_relative */
1236 0, /* bitpos */
1237 complain_overflow_signed, /* complain_on_overflow */
1238 ppc64_elf_toc_reloc, /* special_function */
1239 "R_PPC64_TOC16_DS", /* name */
1240 FALSE, /* partial_inplace */
1241 0, /* src_mask */
1242 0xfffc, /* dst_mask */
1243 FALSE), /* pcrel_offset */
1244
1245 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1246 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1247 0, /* rightshift */
1248 1, /* size (0 = byte, 1 = short, 2 = long) */
1249 16, /* bitsize */
1250 FALSE, /* pc_relative */
1251 0, /* bitpos */
1252 complain_overflow_dont, /* complain_on_overflow */
1253 ppc64_elf_toc_reloc, /* special_function */
1254 "R_PPC64_TOC16_LO_DS", /* name */
1255 FALSE, /* partial_inplace */
1256 0, /* src_mask */
1257 0xfffc, /* dst_mask */
1258 FALSE), /* pcrel_offset */
1259
1260 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1261 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1262 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1263 0, /* rightshift */
1264 1, /* size (0 = byte, 1 = short, 2 = long) */
1265 16, /* bitsize */
1266 FALSE, /* pc_relative */
1267 0, /* bitpos */
1268 complain_overflow_signed, /* complain_on_overflow */
1269 ppc64_elf_unhandled_reloc, /* special_function */
1270 "R_PPC64_PLTGOT16_DS", /* name */
1271 FALSE, /* partial_inplace */
1272 0, /* src_mask */
1273 0xfffc, /* dst_mask */
1274 FALSE), /* pcrel_offset */
1275
1276 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1277 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1278 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1279 0, /* rightshift */
1280 1, /* size (0 = byte, 1 = short, 2 = long) */
1281 16, /* bitsize */
1282 FALSE, /* pc_relative */
1283 0, /* bitpos */
1284 complain_overflow_dont, /* complain_on_overflow */
1285 ppc64_elf_unhandled_reloc, /* special_function */
1286 "R_PPC64_PLTGOT16_LO_DS",/* name */
1287 FALSE, /* partial_inplace */
1288 0, /* src_mask */
1289 0xfffc, /* dst_mask */
1290 FALSE), /* pcrel_offset */
1291
1292 /* Marker relocs for TLS. */
1293 HOWTO (R_PPC64_TLS,
1294 0, /* rightshift */
1295 2, /* size (0 = byte, 1 = short, 2 = long) */
1296 32, /* bitsize */
1297 FALSE, /* pc_relative */
1298 0, /* bitpos */
1299 complain_overflow_dont, /* complain_on_overflow */
1300 bfd_elf_generic_reloc, /* special_function */
1301 "R_PPC64_TLS", /* name */
1302 FALSE, /* partial_inplace */
1303 0, /* src_mask */
1304 0, /* dst_mask */
1305 FALSE), /* pcrel_offset */
1306
1307 HOWTO (R_PPC64_TLSGD,
1308 0, /* rightshift */
1309 2, /* size (0 = byte, 1 = short, 2 = long) */
1310 32, /* bitsize */
1311 FALSE, /* pc_relative */
1312 0, /* bitpos */
1313 complain_overflow_dont, /* complain_on_overflow */
1314 bfd_elf_generic_reloc, /* special_function */
1315 "R_PPC64_TLSGD", /* name */
1316 FALSE, /* partial_inplace */
1317 0, /* src_mask */
1318 0, /* dst_mask */
1319 FALSE), /* pcrel_offset */
1320
1321 HOWTO (R_PPC64_TLSLD,
1322 0, /* rightshift */
1323 2, /* size (0 = byte, 1 = short, 2 = long) */
1324 32, /* bitsize */
1325 FALSE, /* pc_relative */
1326 0, /* bitpos */
1327 complain_overflow_dont, /* complain_on_overflow */
1328 bfd_elf_generic_reloc, /* special_function */
1329 "R_PPC64_TLSLD", /* name */
1330 FALSE, /* partial_inplace */
1331 0, /* src_mask */
1332 0, /* dst_mask */
1333 FALSE), /* pcrel_offset */
1334
1335 HOWTO (R_PPC64_TOCSAVE,
1336 0, /* rightshift */
1337 2, /* size (0 = byte, 1 = short, 2 = long) */
1338 32, /* bitsize */
1339 FALSE, /* pc_relative */
1340 0, /* bitpos */
1341 complain_overflow_dont, /* complain_on_overflow */
1342 bfd_elf_generic_reloc, /* special_function */
1343 "R_PPC64_TOCSAVE", /* name */
1344 FALSE, /* partial_inplace */
1345 0, /* src_mask */
1346 0, /* dst_mask */
1347 FALSE), /* pcrel_offset */
1348
1349 /* Computes the load module index of the load module that contains the
1350 definition of its TLS sym. */
1351 HOWTO (R_PPC64_DTPMOD64,
1352 0, /* rightshift */
1353 4, /* size (0 = byte, 1 = short, 2 = long) */
1354 64, /* bitsize */
1355 FALSE, /* pc_relative */
1356 0, /* bitpos */
1357 complain_overflow_dont, /* complain_on_overflow */
1358 ppc64_elf_unhandled_reloc, /* special_function */
1359 "R_PPC64_DTPMOD64", /* name */
1360 FALSE, /* partial_inplace */
1361 0, /* src_mask */
1362 ONES (64), /* dst_mask */
1363 FALSE), /* pcrel_offset */
1364
1365 /* Computes a dtv-relative displacement, the difference between the value
1366 of sym+add and the base address of the thread-local storage block that
1367 contains the definition of sym, minus 0x8000. */
1368 HOWTO (R_PPC64_DTPREL64,
1369 0, /* rightshift */
1370 4, /* size (0 = byte, 1 = short, 2 = long) */
1371 64, /* bitsize */
1372 FALSE, /* pc_relative */
1373 0, /* bitpos */
1374 complain_overflow_dont, /* complain_on_overflow */
1375 ppc64_elf_unhandled_reloc, /* special_function */
1376 "R_PPC64_DTPREL64", /* name */
1377 FALSE, /* partial_inplace */
1378 0, /* src_mask */
1379 ONES (64), /* dst_mask */
1380 FALSE), /* pcrel_offset */
1381
1382 /* A 16 bit dtprel reloc. */
1383 HOWTO (R_PPC64_DTPREL16,
1384 0, /* rightshift */
1385 1, /* size (0 = byte, 1 = short, 2 = long) */
1386 16, /* bitsize */
1387 FALSE, /* pc_relative */
1388 0, /* bitpos */
1389 complain_overflow_signed, /* complain_on_overflow */
1390 ppc64_elf_unhandled_reloc, /* special_function */
1391 "R_PPC64_DTPREL16", /* name */
1392 FALSE, /* partial_inplace */
1393 0, /* src_mask */
1394 0xffff, /* dst_mask */
1395 FALSE), /* pcrel_offset */
1396
1397 /* Like DTPREL16, but no overflow. */
1398 HOWTO (R_PPC64_DTPREL16_LO,
1399 0, /* rightshift */
1400 1, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 FALSE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_dont, /* complain_on_overflow */
1405 ppc64_elf_unhandled_reloc, /* special_function */
1406 "R_PPC64_DTPREL16_LO", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 FALSE), /* pcrel_offset */
1411
1412 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1413 HOWTO (R_PPC64_DTPREL16_HI,
1414 16, /* rightshift */
1415 1, /* size (0 = byte, 1 = short, 2 = long) */
1416 16, /* bitsize */
1417 FALSE, /* pc_relative */
1418 0, /* bitpos */
1419 complain_overflow_signed, /* complain_on_overflow */
1420 ppc64_elf_unhandled_reloc, /* special_function */
1421 "R_PPC64_DTPREL16_HI", /* name */
1422 FALSE, /* partial_inplace */
1423 0, /* src_mask */
1424 0xffff, /* dst_mask */
1425 FALSE), /* pcrel_offset */
1426
1427 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1428 HOWTO (R_PPC64_DTPREL16_HA,
1429 16, /* rightshift */
1430 1, /* size (0 = byte, 1 = short, 2 = long) */
1431 16, /* bitsize */
1432 FALSE, /* pc_relative */
1433 0, /* bitpos */
1434 complain_overflow_signed, /* complain_on_overflow */
1435 ppc64_elf_unhandled_reloc, /* special_function */
1436 "R_PPC64_DTPREL16_HA", /* name */
1437 FALSE, /* partial_inplace */
1438 0, /* src_mask */
1439 0xffff, /* dst_mask */
1440 FALSE), /* pcrel_offset */
1441
1442 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1443 HOWTO (R_PPC64_DTPREL16_HIGHER,
1444 32, /* rightshift */
1445 1, /* size (0 = byte, 1 = short, 2 = long) */
1446 16, /* bitsize */
1447 FALSE, /* pc_relative */
1448 0, /* bitpos */
1449 complain_overflow_dont, /* complain_on_overflow */
1450 ppc64_elf_unhandled_reloc, /* special_function */
1451 "R_PPC64_DTPREL16_HIGHER", /* name */
1452 FALSE, /* partial_inplace */
1453 0, /* src_mask */
1454 0xffff, /* dst_mask */
1455 FALSE), /* pcrel_offset */
1456
1457 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1458 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1459 32, /* rightshift */
1460 1, /* size (0 = byte, 1 = short, 2 = long) */
1461 16, /* bitsize */
1462 FALSE, /* pc_relative */
1463 0, /* bitpos */
1464 complain_overflow_dont, /* complain_on_overflow */
1465 ppc64_elf_unhandled_reloc, /* special_function */
1466 "R_PPC64_DTPREL16_HIGHERA", /* name */
1467 FALSE, /* partial_inplace */
1468 0, /* src_mask */
1469 0xffff, /* dst_mask */
1470 FALSE), /* pcrel_offset */
1471
1472 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1473 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1474 48, /* rightshift */
1475 1, /* size (0 = byte, 1 = short, 2 = long) */
1476 16, /* bitsize */
1477 FALSE, /* pc_relative */
1478 0, /* bitpos */
1479 complain_overflow_dont, /* complain_on_overflow */
1480 ppc64_elf_unhandled_reloc, /* special_function */
1481 "R_PPC64_DTPREL16_HIGHEST", /* name */
1482 FALSE, /* partial_inplace */
1483 0, /* src_mask */
1484 0xffff, /* dst_mask */
1485 FALSE), /* pcrel_offset */
1486
1487 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1488 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1489 48, /* rightshift */
1490 1, /* size (0 = byte, 1 = short, 2 = long) */
1491 16, /* bitsize */
1492 FALSE, /* pc_relative */
1493 0, /* bitpos */
1494 complain_overflow_dont, /* complain_on_overflow */
1495 ppc64_elf_unhandled_reloc, /* special_function */
1496 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1497 FALSE, /* partial_inplace */
1498 0, /* src_mask */
1499 0xffff, /* dst_mask */
1500 FALSE), /* pcrel_offset */
1501
1502 /* Like DTPREL16, but for insns with a DS field. */
1503 HOWTO (R_PPC64_DTPREL16_DS,
1504 0, /* rightshift */
1505 1, /* size (0 = byte, 1 = short, 2 = long) */
1506 16, /* bitsize */
1507 FALSE, /* pc_relative */
1508 0, /* bitpos */
1509 complain_overflow_signed, /* complain_on_overflow */
1510 ppc64_elf_unhandled_reloc, /* special_function */
1511 "R_PPC64_DTPREL16_DS", /* name */
1512 FALSE, /* partial_inplace */
1513 0, /* src_mask */
1514 0xfffc, /* dst_mask */
1515 FALSE), /* pcrel_offset */
1516
1517 /* Like DTPREL16_DS, but no overflow. */
1518 HOWTO (R_PPC64_DTPREL16_LO_DS,
1519 0, /* rightshift */
1520 1, /* size (0 = byte, 1 = short, 2 = long) */
1521 16, /* bitsize */
1522 FALSE, /* pc_relative */
1523 0, /* bitpos */
1524 complain_overflow_dont, /* complain_on_overflow */
1525 ppc64_elf_unhandled_reloc, /* special_function */
1526 "R_PPC64_DTPREL16_LO_DS", /* name */
1527 FALSE, /* partial_inplace */
1528 0, /* src_mask */
1529 0xfffc, /* dst_mask */
1530 FALSE), /* pcrel_offset */
1531
1532 /* Computes a tp-relative displacement, the difference between the value of
1533 sym+add and the value of the thread pointer (r13). */
1534 HOWTO (R_PPC64_TPREL64,
1535 0, /* rightshift */
1536 4, /* size (0 = byte, 1 = short, 2 = long) */
1537 64, /* bitsize */
1538 FALSE, /* pc_relative */
1539 0, /* bitpos */
1540 complain_overflow_dont, /* complain_on_overflow */
1541 ppc64_elf_unhandled_reloc, /* special_function */
1542 "R_PPC64_TPREL64", /* name */
1543 FALSE, /* partial_inplace */
1544 0, /* src_mask */
1545 ONES (64), /* dst_mask */
1546 FALSE), /* pcrel_offset */
1547
1548 /* A 16 bit tprel reloc. */
1549 HOWTO (R_PPC64_TPREL16,
1550 0, /* rightshift */
1551 1, /* size (0 = byte, 1 = short, 2 = long) */
1552 16, /* bitsize */
1553 FALSE, /* pc_relative */
1554 0, /* bitpos */
1555 complain_overflow_signed, /* complain_on_overflow */
1556 ppc64_elf_unhandled_reloc, /* special_function */
1557 "R_PPC64_TPREL16", /* name */
1558 FALSE, /* partial_inplace */
1559 0, /* src_mask */
1560 0xffff, /* dst_mask */
1561 FALSE), /* pcrel_offset */
1562
1563 /* Like TPREL16, but no overflow. */
1564 HOWTO (R_PPC64_TPREL16_LO,
1565 0, /* rightshift */
1566 1, /* size (0 = byte, 1 = short, 2 = long) */
1567 16, /* bitsize */
1568 FALSE, /* pc_relative */
1569 0, /* bitpos */
1570 complain_overflow_dont, /* complain_on_overflow */
1571 ppc64_elf_unhandled_reloc, /* special_function */
1572 "R_PPC64_TPREL16_LO", /* name */
1573 FALSE, /* partial_inplace */
1574 0, /* src_mask */
1575 0xffff, /* dst_mask */
1576 FALSE), /* pcrel_offset */
1577
1578 /* Like TPREL16_LO, but next higher group of 16 bits. */
1579 HOWTO (R_PPC64_TPREL16_HI,
1580 16, /* rightshift */
1581 1, /* size (0 = byte, 1 = short, 2 = long) */
1582 16, /* bitsize */
1583 FALSE, /* pc_relative */
1584 0, /* bitpos */
1585 complain_overflow_signed, /* complain_on_overflow */
1586 ppc64_elf_unhandled_reloc, /* special_function */
1587 "R_PPC64_TPREL16_HI", /* name */
1588 FALSE, /* partial_inplace */
1589 0, /* src_mask */
1590 0xffff, /* dst_mask */
1591 FALSE), /* pcrel_offset */
1592
1593 /* Like TPREL16_HI, but adjust for low 16 bits. */
1594 HOWTO (R_PPC64_TPREL16_HA,
1595 16, /* rightshift */
1596 1, /* size (0 = byte, 1 = short, 2 = long) */
1597 16, /* bitsize */
1598 FALSE, /* pc_relative */
1599 0, /* bitpos */
1600 complain_overflow_signed, /* complain_on_overflow */
1601 ppc64_elf_unhandled_reloc, /* special_function */
1602 "R_PPC64_TPREL16_HA", /* name */
1603 FALSE, /* partial_inplace */
1604 0, /* src_mask */
1605 0xffff, /* dst_mask */
1606 FALSE), /* pcrel_offset */
1607
1608 /* Like TPREL16_HI, but next higher group of 16 bits. */
1609 HOWTO (R_PPC64_TPREL16_HIGHER,
1610 32, /* rightshift */
1611 1, /* size (0 = byte, 1 = short, 2 = long) */
1612 16, /* bitsize */
1613 FALSE, /* pc_relative */
1614 0, /* bitpos */
1615 complain_overflow_dont, /* complain_on_overflow */
1616 ppc64_elf_unhandled_reloc, /* special_function */
1617 "R_PPC64_TPREL16_HIGHER", /* name */
1618 FALSE, /* partial_inplace */
1619 0, /* src_mask */
1620 0xffff, /* dst_mask */
1621 FALSE), /* pcrel_offset */
1622
1623 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1624 HOWTO (R_PPC64_TPREL16_HIGHERA,
1625 32, /* rightshift */
1626 1, /* size (0 = byte, 1 = short, 2 = long) */
1627 16, /* bitsize */
1628 FALSE, /* pc_relative */
1629 0, /* bitpos */
1630 complain_overflow_dont, /* complain_on_overflow */
1631 ppc64_elf_unhandled_reloc, /* special_function */
1632 "R_PPC64_TPREL16_HIGHERA", /* name */
1633 FALSE, /* partial_inplace */
1634 0, /* src_mask */
1635 0xffff, /* dst_mask */
1636 FALSE), /* pcrel_offset */
1637
1638 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1639 HOWTO (R_PPC64_TPREL16_HIGHEST,
1640 48, /* rightshift */
1641 1, /* size (0 = byte, 1 = short, 2 = long) */
1642 16, /* bitsize */
1643 FALSE, /* pc_relative */
1644 0, /* bitpos */
1645 complain_overflow_dont, /* complain_on_overflow */
1646 ppc64_elf_unhandled_reloc, /* special_function */
1647 "R_PPC64_TPREL16_HIGHEST", /* name */
1648 FALSE, /* partial_inplace */
1649 0, /* src_mask */
1650 0xffff, /* dst_mask */
1651 FALSE), /* pcrel_offset */
1652
1653 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1654 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1655 48, /* rightshift */
1656 1, /* size (0 = byte, 1 = short, 2 = long) */
1657 16, /* bitsize */
1658 FALSE, /* pc_relative */
1659 0, /* bitpos */
1660 complain_overflow_dont, /* complain_on_overflow */
1661 ppc64_elf_unhandled_reloc, /* special_function */
1662 "R_PPC64_TPREL16_HIGHESTA", /* name */
1663 FALSE, /* partial_inplace */
1664 0, /* src_mask */
1665 0xffff, /* dst_mask */
1666 FALSE), /* pcrel_offset */
1667
1668 /* Like TPREL16, but for insns with a DS field. */
1669 HOWTO (R_PPC64_TPREL16_DS,
1670 0, /* rightshift */
1671 1, /* size (0 = byte, 1 = short, 2 = long) */
1672 16, /* bitsize */
1673 FALSE, /* pc_relative */
1674 0, /* bitpos */
1675 complain_overflow_signed, /* complain_on_overflow */
1676 ppc64_elf_unhandled_reloc, /* special_function */
1677 "R_PPC64_TPREL16_DS", /* name */
1678 FALSE, /* partial_inplace */
1679 0, /* src_mask */
1680 0xfffc, /* dst_mask */
1681 FALSE), /* pcrel_offset */
1682
1683 /* Like TPREL16_DS, but no overflow. */
1684 HOWTO (R_PPC64_TPREL16_LO_DS,
1685 0, /* rightshift */
1686 1, /* size (0 = byte, 1 = short, 2 = long) */
1687 16, /* bitsize */
1688 FALSE, /* pc_relative */
1689 0, /* bitpos */
1690 complain_overflow_dont, /* complain_on_overflow */
1691 ppc64_elf_unhandled_reloc, /* special_function */
1692 "R_PPC64_TPREL16_LO_DS", /* name */
1693 FALSE, /* partial_inplace */
1694 0, /* src_mask */
1695 0xfffc, /* dst_mask */
1696 FALSE), /* pcrel_offset */
1697
1698 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1699 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1700 to the first entry relative to the TOC base (r2). */
1701 HOWTO (R_PPC64_GOT_TLSGD16,
1702 0, /* rightshift */
1703 1, /* size (0 = byte, 1 = short, 2 = long) */
1704 16, /* bitsize */
1705 FALSE, /* pc_relative */
1706 0, /* bitpos */
1707 complain_overflow_signed, /* complain_on_overflow */
1708 ppc64_elf_unhandled_reloc, /* special_function */
1709 "R_PPC64_GOT_TLSGD16", /* name */
1710 FALSE, /* partial_inplace */
1711 0, /* src_mask */
1712 0xffff, /* dst_mask */
1713 FALSE), /* pcrel_offset */
1714
1715 /* Like GOT_TLSGD16, but no overflow. */
1716 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1717 0, /* rightshift */
1718 1, /* size (0 = byte, 1 = short, 2 = long) */
1719 16, /* bitsize */
1720 FALSE, /* pc_relative */
1721 0, /* bitpos */
1722 complain_overflow_dont, /* complain_on_overflow */
1723 ppc64_elf_unhandled_reloc, /* special_function */
1724 "R_PPC64_GOT_TLSGD16_LO", /* name */
1725 FALSE, /* partial_inplace */
1726 0, /* src_mask */
1727 0xffff, /* dst_mask */
1728 FALSE), /* pcrel_offset */
1729
1730 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1731 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1732 16, /* rightshift */
1733 1, /* size (0 = byte, 1 = short, 2 = long) */
1734 16, /* bitsize */
1735 FALSE, /* pc_relative */
1736 0, /* bitpos */
1737 complain_overflow_signed, /* complain_on_overflow */
1738 ppc64_elf_unhandled_reloc, /* special_function */
1739 "R_PPC64_GOT_TLSGD16_HI", /* name */
1740 FALSE, /* partial_inplace */
1741 0, /* src_mask */
1742 0xffff, /* dst_mask */
1743 FALSE), /* pcrel_offset */
1744
1745 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1746 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1747 16, /* rightshift */
1748 1, /* size (0 = byte, 1 = short, 2 = long) */
1749 16, /* bitsize */
1750 FALSE, /* pc_relative */
1751 0, /* bitpos */
1752 complain_overflow_signed, /* complain_on_overflow */
1753 ppc64_elf_unhandled_reloc, /* special_function */
1754 "R_PPC64_GOT_TLSGD16_HA", /* name */
1755 FALSE, /* partial_inplace */
1756 0, /* src_mask */
1757 0xffff, /* dst_mask */
1758 FALSE), /* pcrel_offset */
1759
1760 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1761 with values (sym+add)@dtpmod and zero, and computes the offset to the
1762 first entry relative to the TOC base (r2). */
1763 HOWTO (R_PPC64_GOT_TLSLD16,
1764 0, /* rightshift */
1765 1, /* size (0 = byte, 1 = short, 2 = long) */
1766 16, /* bitsize */
1767 FALSE, /* pc_relative */
1768 0, /* bitpos */
1769 complain_overflow_signed, /* complain_on_overflow */
1770 ppc64_elf_unhandled_reloc, /* special_function */
1771 "R_PPC64_GOT_TLSLD16", /* name */
1772 FALSE, /* partial_inplace */
1773 0, /* src_mask */
1774 0xffff, /* dst_mask */
1775 FALSE), /* pcrel_offset */
1776
1777 /* Like GOT_TLSLD16, but no overflow. */
1778 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1779 0, /* rightshift */
1780 1, /* size (0 = byte, 1 = short, 2 = long) */
1781 16, /* bitsize */
1782 FALSE, /* pc_relative */
1783 0, /* bitpos */
1784 complain_overflow_dont, /* complain_on_overflow */
1785 ppc64_elf_unhandled_reloc, /* special_function */
1786 "R_PPC64_GOT_TLSLD16_LO", /* name */
1787 FALSE, /* partial_inplace */
1788 0, /* src_mask */
1789 0xffff, /* dst_mask */
1790 FALSE), /* pcrel_offset */
1791
1792 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1793 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1794 16, /* rightshift */
1795 1, /* size (0 = byte, 1 = short, 2 = long) */
1796 16, /* bitsize */
1797 FALSE, /* pc_relative */
1798 0, /* bitpos */
1799 complain_overflow_signed, /* complain_on_overflow */
1800 ppc64_elf_unhandled_reloc, /* special_function */
1801 "R_PPC64_GOT_TLSLD16_HI", /* name */
1802 FALSE, /* partial_inplace */
1803 0, /* src_mask */
1804 0xffff, /* dst_mask */
1805 FALSE), /* pcrel_offset */
1806
1807 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1808 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1809 16, /* rightshift */
1810 1, /* size (0 = byte, 1 = short, 2 = long) */
1811 16, /* bitsize */
1812 FALSE, /* pc_relative */
1813 0, /* bitpos */
1814 complain_overflow_signed, /* complain_on_overflow */
1815 ppc64_elf_unhandled_reloc, /* special_function */
1816 "R_PPC64_GOT_TLSLD16_HA", /* name */
1817 FALSE, /* partial_inplace */
1818 0, /* src_mask */
1819 0xffff, /* dst_mask */
1820 FALSE), /* pcrel_offset */
1821
1822 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1823 the offset to the entry relative to the TOC base (r2). */
1824 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1825 0, /* rightshift */
1826 1, /* size (0 = byte, 1 = short, 2 = long) */
1827 16, /* bitsize */
1828 FALSE, /* pc_relative */
1829 0, /* bitpos */
1830 complain_overflow_signed, /* complain_on_overflow */
1831 ppc64_elf_unhandled_reloc, /* special_function */
1832 "R_PPC64_GOT_DTPREL16_DS", /* name */
1833 FALSE, /* partial_inplace */
1834 0, /* src_mask */
1835 0xfffc, /* dst_mask */
1836 FALSE), /* pcrel_offset */
1837
1838 /* Like GOT_DTPREL16_DS, but no overflow. */
1839 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1840 0, /* rightshift */
1841 1, /* size (0 = byte, 1 = short, 2 = long) */
1842 16, /* bitsize */
1843 FALSE, /* pc_relative */
1844 0, /* bitpos */
1845 complain_overflow_dont, /* complain_on_overflow */
1846 ppc64_elf_unhandled_reloc, /* special_function */
1847 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1848 FALSE, /* partial_inplace */
1849 0, /* src_mask */
1850 0xfffc, /* dst_mask */
1851 FALSE), /* pcrel_offset */
1852
1853 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1854 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1855 16, /* rightshift */
1856 1, /* size (0 = byte, 1 = short, 2 = long) */
1857 16, /* bitsize */
1858 FALSE, /* pc_relative */
1859 0, /* bitpos */
1860 complain_overflow_signed, /* complain_on_overflow */
1861 ppc64_elf_unhandled_reloc, /* special_function */
1862 "R_PPC64_GOT_DTPREL16_HI", /* name */
1863 FALSE, /* partial_inplace */
1864 0, /* src_mask */
1865 0xffff, /* dst_mask */
1866 FALSE), /* pcrel_offset */
1867
1868 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1869 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1870 16, /* rightshift */
1871 1, /* size (0 = byte, 1 = short, 2 = long) */
1872 16, /* bitsize */
1873 FALSE, /* pc_relative */
1874 0, /* bitpos */
1875 complain_overflow_signed, /* complain_on_overflow */
1876 ppc64_elf_unhandled_reloc, /* special_function */
1877 "R_PPC64_GOT_DTPREL16_HA", /* name */
1878 FALSE, /* partial_inplace */
1879 0, /* src_mask */
1880 0xffff, /* dst_mask */
1881 FALSE), /* pcrel_offset */
1882
1883 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1884 offset to the entry relative to the TOC base (r2). */
1885 HOWTO (R_PPC64_GOT_TPREL16_DS,
1886 0, /* rightshift */
1887 1, /* size (0 = byte, 1 = short, 2 = long) */
1888 16, /* bitsize */
1889 FALSE, /* pc_relative */
1890 0, /* bitpos */
1891 complain_overflow_signed, /* complain_on_overflow */
1892 ppc64_elf_unhandled_reloc, /* special_function */
1893 "R_PPC64_GOT_TPREL16_DS", /* name */
1894 FALSE, /* partial_inplace */
1895 0, /* src_mask */
1896 0xfffc, /* dst_mask */
1897 FALSE), /* pcrel_offset */
1898
1899 /* Like GOT_TPREL16_DS, but no overflow. */
1900 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1901 0, /* rightshift */
1902 1, /* size (0 = byte, 1 = short, 2 = long) */
1903 16, /* bitsize */
1904 FALSE, /* pc_relative */
1905 0, /* bitpos */
1906 complain_overflow_dont, /* complain_on_overflow */
1907 ppc64_elf_unhandled_reloc, /* special_function */
1908 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1909 FALSE, /* partial_inplace */
1910 0, /* src_mask */
1911 0xfffc, /* dst_mask */
1912 FALSE), /* pcrel_offset */
1913
1914 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1915 HOWTO (R_PPC64_GOT_TPREL16_HI,
1916 16, /* rightshift */
1917 1, /* size (0 = byte, 1 = short, 2 = long) */
1918 16, /* bitsize */
1919 FALSE, /* pc_relative */
1920 0, /* bitpos */
1921 complain_overflow_signed, /* complain_on_overflow */
1922 ppc64_elf_unhandled_reloc, /* special_function */
1923 "R_PPC64_GOT_TPREL16_HI", /* name */
1924 FALSE, /* partial_inplace */
1925 0, /* src_mask */
1926 0xffff, /* dst_mask */
1927 FALSE), /* pcrel_offset */
1928
1929 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1930 HOWTO (R_PPC64_GOT_TPREL16_HA,
1931 16, /* rightshift */
1932 1, /* size (0 = byte, 1 = short, 2 = long) */
1933 16, /* bitsize */
1934 FALSE, /* pc_relative */
1935 0, /* bitpos */
1936 complain_overflow_signed, /* complain_on_overflow */
1937 ppc64_elf_unhandled_reloc, /* special_function */
1938 "R_PPC64_GOT_TPREL16_HA", /* name */
1939 FALSE, /* partial_inplace */
1940 0, /* src_mask */
1941 0xffff, /* dst_mask */
1942 FALSE), /* pcrel_offset */
1943
1944 HOWTO (R_PPC64_JMP_IREL, /* type */
1945 0, /* rightshift */
1946 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1947 0, /* bitsize */
1948 FALSE, /* pc_relative */
1949 0, /* bitpos */
1950 complain_overflow_dont, /* complain_on_overflow */
1951 ppc64_elf_unhandled_reloc, /* special_function */
1952 "R_PPC64_JMP_IREL", /* name */
1953 FALSE, /* partial_inplace */
1954 0, /* src_mask */
1955 0, /* dst_mask */
1956 FALSE), /* pcrel_offset */
1957
1958 HOWTO (R_PPC64_IRELATIVE, /* type */
1959 0, /* rightshift */
1960 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1961 64, /* bitsize */
1962 FALSE, /* pc_relative */
1963 0, /* bitpos */
1964 complain_overflow_dont, /* complain_on_overflow */
1965 bfd_elf_generic_reloc, /* special_function */
1966 "R_PPC64_IRELATIVE", /* name */
1967 FALSE, /* partial_inplace */
1968 0, /* src_mask */
1969 ONES (64), /* dst_mask */
1970 FALSE), /* pcrel_offset */
1971
1972 /* A 16 bit relative relocation. */
1973 HOWTO (R_PPC64_REL16, /* type */
1974 0, /* rightshift */
1975 1, /* size (0 = byte, 1 = short, 2 = long) */
1976 16, /* bitsize */
1977 TRUE, /* pc_relative */
1978 0, /* bitpos */
1979 complain_overflow_signed, /* complain_on_overflow */
1980 bfd_elf_generic_reloc, /* special_function */
1981 "R_PPC64_REL16", /* name */
1982 FALSE, /* partial_inplace */
1983 0, /* src_mask */
1984 0xffff, /* dst_mask */
1985 TRUE), /* pcrel_offset */
1986
1987 /* A 16 bit relative relocation without overflow. */
1988 HOWTO (R_PPC64_REL16_LO, /* type */
1989 0, /* rightshift */
1990 1, /* size (0 = byte, 1 = short, 2 = long) */
1991 16, /* bitsize */
1992 TRUE, /* pc_relative */
1993 0, /* bitpos */
1994 complain_overflow_dont,/* complain_on_overflow */
1995 bfd_elf_generic_reloc, /* special_function */
1996 "R_PPC64_REL16_LO", /* name */
1997 FALSE, /* partial_inplace */
1998 0, /* src_mask */
1999 0xffff, /* dst_mask */
2000 TRUE), /* pcrel_offset */
2001
2002 /* The high order 16 bits of a relative address. */
2003 HOWTO (R_PPC64_REL16_HI, /* type */
2004 16, /* rightshift */
2005 1, /* size (0 = byte, 1 = short, 2 = long) */
2006 16, /* bitsize */
2007 TRUE, /* pc_relative */
2008 0, /* bitpos */
2009 complain_overflow_signed, /* complain_on_overflow */
2010 bfd_elf_generic_reloc, /* special_function */
2011 "R_PPC64_REL16_HI", /* name */
2012 FALSE, /* partial_inplace */
2013 0, /* src_mask */
2014 0xffff, /* dst_mask */
2015 TRUE), /* pcrel_offset */
2016
2017 /* The high order 16 bits of a relative address, plus 1 if the contents of
2018 the low 16 bits, treated as a signed number, is negative. */
2019 HOWTO (R_PPC64_REL16_HA, /* type */
2020 16, /* rightshift */
2021 1, /* size (0 = byte, 1 = short, 2 = long) */
2022 16, /* bitsize */
2023 TRUE, /* pc_relative */
2024 0, /* bitpos */
2025 complain_overflow_signed, /* complain_on_overflow */
2026 ppc64_elf_ha_reloc, /* special_function */
2027 "R_PPC64_REL16_HA", /* name */
2028 FALSE, /* partial_inplace */
2029 0, /* src_mask */
2030 0xffff, /* dst_mask */
2031 TRUE), /* pcrel_offset */
2032
2033 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2034 HOWTO (R_PPC64_REL16DX_HA, /* type */
2035 16, /* rightshift */
2036 2, /* size (0 = byte, 1 = short, 2 = long) */
2037 16, /* bitsize */
2038 TRUE, /* pc_relative */
2039 0, /* bitpos */
2040 complain_overflow_signed, /* complain_on_overflow */
2041 ppc64_elf_ha_reloc, /* special_function */
2042 "R_PPC64_REL16DX_HA", /* name */
2043 FALSE, /* partial_inplace */
2044 0, /* src_mask */
2045 0x1fffc1, /* dst_mask */
2046 TRUE), /* pcrel_offset */
2047
2048 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2049 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2050 16, /* rightshift */
2051 1, /* size (0 = byte, 1 = short, 2 = long) */
2052 16, /* bitsize */
2053 FALSE, /* pc_relative */
2054 0, /* bitpos */
2055 complain_overflow_dont, /* complain_on_overflow */
2056 bfd_elf_generic_reloc, /* special_function */
2057 "R_PPC64_ADDR16_HIGH", /* name */
2058 FALSE, /* partial_inplace */
2059 0, /* src_mask */
2060 0xffff, /* dst_mask */
2061 FALSE), /* pcrel_offset */
2062
2063 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2064 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2065 16, /* rightshift */
2066 1, /* size (0 = byte, 1 = short, 2 = long) */
2067 16, /* bitsize */
2068 FALSE, /* pc_relative */
2069 0, /* bitpos */
2070 complain_overflow_dont, /* complain_on_overflow */
2071 ppc64_elf_ha_reloc, /* special_function */
2072 "R_PPC64_ADDR16_HIGHA", /* name */
2073 FALSE, /* partial_inplace */
2074 0, /* src_mask */
2075 0xffff, /* dst_mask */
2076 FALSE), /* pcrel_offset */
2077
2078 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2079 HOWTO (R_PPC64_DTPREL16_HIGH,
2080 16, /* rightshift */
2081 1, /* size (0 = byte, 1 = short, 2 = long) */
2082 16, /* bitsize */
2083 FALSE, /* pc_relative */
2084 0, /* bitpos */
2085 complain_overflow_dont, /* complain_on_overflow */
2086 ppc64_elf_unhandled_reloc, /* special_function */
2087 "R_PPC64_DTPREL16_HIGH", /* name */
2088 FALSE, /* partial_inplace */
2089 0, /* src_mask */
2090 0xffff, /* dst_mask */
2091 FALSE), /* pcrel_offset */
2092
2093 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2094 HOWTO (R_PPC64_DTPREL16_HIGHA,
2095 16, /* rightshift */
2096 1, /* size (0 = byte, 1 = short, 2 = long) */
2097 16, /* bitsize */
2098 FALSE, /* pc_relative */
2099 0, /* bitpos */
2100 complain_overflow_dont, /* complain_on_overflow */
2101 ppc64_elf_unhandled_reloc, /* special_function */
2102 "R_PPC64_DTPREL16_HIGHA", /* name */
2103 FALSE, /* partial_inplace */
2104 0, /* src_mask */
2105 0xffff, /* dst_mask */
2106 FALSE), /* pcrel_offset */
2107
2108 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2109 HOWTO (R_PPC64_TPREL16_HIGH,
2110 16, /* rightshift */
2111 1, /* size (0 = byte, 1 = short, 2 = long) */
2112 16, /* bitsize */
2113 FALSE, /* pc_relative */
2114 0, /* bitpos */
2115 complain_overflow_dont, /* complain_on_overflow */
2116 ppc64_elf_unhandled_reloc, /* special_function */
2117 "R_PPC64_TPREL16_HIGH", /* name */
2118 FALSE, /* partial_inplace */
2119 0, /* src_mask */
2120 0xffff, /* dst_mask */
2121 FALSE), /* pcrel_offset */
2122
2123 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2124 HOWTO (R_PPC64_TPREL16_HIGHA,
2125 16, /* rightshift */
2126 1, /* size (0 = byte, 1 = short, 2 = long) */
2127 16, /* bitsize */
2128 FALSE, /* pc_relative */
2129 0, /* bitpos */
2130 complain_overflow_dont, /* complain_on_overflow */
2131 ppc64_elf_unhandled_reloc, /* special_function */
2132 "R_PPC64_TPREL16_HIGHA", /* name */
2133 FALSE, /* partial_inplace */
2134 0, /* src_mask */
2135 0xffff, /* dst_mask */
2136 FALSE), /* pcrel_offset */
2137
2138 /* Marker reloc on ELFv2 large-model function entry. */
2139 HOWTO (R_PPC64_ENTRY,
2140 0, /* rightshift */
2141 2, /* size (0 = byte, 1 = short, 2 = long) */
2142 32, /* bitsize */
2143 FALSE, /* pc_relative */
2144 0, /* bitpos */
2145 complain_overflow_dont, /* complain_on_overflow */
2146 bfd_elf_generic_reloc, /* special_function */
2147 "R_PPC64_ENTRY", /* name */
2148 FALSE, /* partial_inplace */
2149 0, /* src_mask */
2150 0, /* dst_mask */
2151 FALSE), /* pcrel_offset */
2152
2153 /* Like ADDR64, but use local entry point of function. */
2154 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2155 0, /* rightshift */
2156 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2157 64, /* bitsize */
2158 FALSE, /* pc_relative */
2159 0, /* bitpos */
2160 complain_overflow_dont, /* complain_on_overflow */
2161 bfd_elf_generic_reloc, /* special_function */
2162 "R_PPC64_ADDR64_LOCAL", /* name */
2163 FALSE, /* partial_inplace */
2164 0, /* src_mask */
2165 ONES (64), /* dst_mask */
2166 FALSE), /* pcrel_offset */
2167
2168 /* GNU extension to record C++ vtable hierarchy. */
2169 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2170 0, /* rightshift */
2171 0, /* size (0 = byte, 1 = short, 2 = long) */
2172 0, /* bitsize */
2173 FALSE, /* pc_relative */
2174 0, /* bitpos */
2175 complain_overflow_dont, /* complain_on_overflow */
2176 NULL, /* special_function */
2177 "R_PPC64_GNU_VTINHERIT", /* name */
2178 FALSE, /* partial_inplace */
2179 0, /* src_mask */
2180 0, /* dst_mask */
2181 FALSE), /* pcrel_offset */
2182
2183 /* GNU extension to record C++ vtable member usage. */
2184 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2185 0, /* rightshift */
2186 0, /* size (0 = byte, 1 = short, 2 = long) */
2187 0, /* bitsize */
2188 FALSE, /* pc_relative */
2189 0, /* bitpos */
2190 complain_overflow_dont, /* complain_on_overflow */
2191 NULL, /* special_function */
2192 "R_PPC64_GNU_VTENTRY", /* name */
2193 FALSE, /* partial_inplace */
2194 0, /* src_mask */
2195 0, /* dst_mask */
2196 FALSE), /* pcrel_offset */
2197};
2198
2199\f
2200/* Initialize the ppc64_elf_howto_table, so that linear accesses can
2201 be done. */
2202
2203static void
2204ppc_howto_init (void)
2205{
2206 unsigned int i, type;
2207
2208 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2209 {
2210 type = ppc64_elf_howto_raw[i].type;
2211 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
2212 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2213 }
2214}
2215
2216static reloc_howto_type *
2217ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2218 bfd_reloc_code_real_type code)
2219{
2220 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
2221
2222 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2223 /* Initialize howto table if needed. */
2224 ppc_howto_init ();
2225
2226 switch (code)
2227 {
2228 default:
2229 return NULL;
2230
2231 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2232 break;
2233 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2234 break;
2235 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2236 break;
2237 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2238 break;
2239 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2240 break;
2241 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2242 break;
2243 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2244 break;
2245 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
2246 break;
2247 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2248 break;
2249 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
2250 break;
2251 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
2252 break;
2253 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
2254 break;
2255 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
2256 break;
2257 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
2258 break;
2259 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
2260 break;
2261 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
2262 break;
2263 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
2264 break;
2265 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
2266 break;
2267 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
2268 break;
2269 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
2270 break;
2271 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
2272 break;
2273 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
2274 break;
2275 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
2276 break;
2277 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
2278 break;
2279 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
2280 break;
2281 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
2282 break;
2283 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
2284 break;
2285 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
2286 break;
2287 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
2288 break;
2289 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
2290 break;
2291 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
2292 break;
2293 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
2294 break;
2295 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
2296 break;
2297 case BFD_RELOC_64: r = R_PPC64_ADDR64;
2298 break;
2299 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
2300 break;
2301 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
2302 break;
2303 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
2304 break;
2305 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
2306 break;
2307 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
2308 break;
2309 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
2310 break;
2311 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
2312 break;
2313 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
2314 break;
2315 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
2316 break;
2317 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
2318 break;
2319 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
2320 break;
2321 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2322 break;
2323 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2324 break;
2325 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2326 break;
2327 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2328 break;
2329 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2330 break;
2331 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2332 break;
2333 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2334 break;
2335 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2336 break;
2337 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2338 break;
2339 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2340 break;
2341 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2342 break;
2343 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2344 break;
2345 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2346 break;
2347 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2348 break;
2349 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2350 break;
2351 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2352 break;
2353 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2354 break;
2355 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2356 break;
2357 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2358 break;
2359 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2360 break;
2361 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2362 break;
2363 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2364 break;
2365 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2366 break;
2367 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2368 break;
2369 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2370 break;
2371 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2372 break;
2373 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2374 break;
2375 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2376 break;
2377 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2378 break;
2379 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2380 break;
2381 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2382 break;
2383 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2384 break;
2385 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2386 break;
2387 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2388 break;
2389 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2390 break;
2391 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2392 break;
2393 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2394 break;
2395 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2396 break;
2397 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2398 break;
2399 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2400 break;
2401 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2402 break;
2403 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2404 break;
2405 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2406 break;
2407 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2408 break;
2409 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2410 break;
2411 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2412 break;
2413 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2414 break;
2415 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2416 break;
2417 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2418 break;
2419 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2420 break;
2421 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2422 break;
2423 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2424 break;
2425 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2426 break;
2427 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2428 break;
2429 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2430 break;
2431 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2432 break;
2433 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2434 break;
2435 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2436 break;
2437 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2438 break;
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2440 break;
2441 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2442 break;
2443 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2444 break;
2445 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2446 break;
2447 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2448 break;
2449 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2450 break;
2451 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2452 break;
2453 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2454 break;
2455 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2456 break;
2457 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2458 break;
2459 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2460 break;
2461 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2462 break;
2463 }
2464
2465 return ppc64_elf_howto_table[r];
2466};
2467
2468static reloc_howto_type *
2469ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2470 const char *r_name)
2471{
2472 unsigned int i;
2473
2474 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2475 if (ppc64_elf_howto_raw[i].name != NULL
2476 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2477 return &ppc64_elf_howto_raw[i];
2478
2479 return NULL;
2480}
2481
2482/* Set the howto pointer for a PowerPC ELF reloc. */
2483
2484static void
2485ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2486 Elf_Internal_Rela *dst)
2487{
2488 unsigned int type;
2489
2490 /* Initialize howto table if needed. */
2491 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2492 ppc_howto_init ();
2493
2494 type = ELF64_R_TYPE (dst->r_info);
2495 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
2496 {
2497 /* xgettext:c-format */
2498 _bfd_error_handler (_("%B: invalid relocation type %d"),
2499 abfd, (int) type);
2500 type = R_PPC64_NONE;
2501 }
2502 cache_ptr->howto = ppc64_elf_howto_table[type];
2503}
2504
2505/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2506
2507static bfd_reloc_status_type
2508ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2509 void *data, asection *input_section,
2510 bfd *output_bfd, char **error_message)
2511{
2512 enum elf_ppc64_reloc_type r_type;
2513 long insn;
2514 bfd_size_type octets;
2515 bfd_vma value;
2516
2517 /* If this is a relocatable link (output_bfd test tells us), just
2518 call the generic function. Any adjustment will be done at final
2519 link time. */
2520 if (output_bfd != NULL)
2521 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2522 input_section, output_bfd, error_message);
2523
2524 /* Adjust the addend for sign extension of the low 16 bits.
2525 We won't actually be using the low 16 bits, so trashing them
2526 doesn't matter. */
2527 reloc_entry->addend += 0x8000;
2528 r_type = reloc_entry->howto->type;
2529 if (r_type != R_PPC64_REL16DX_HA)
2530 return bfd_reloc_continue;
2531
2532 value = 0;
2533 if (!bfd_is_com_section (symbol->section))
2534 value = symbol->value;
2535 value += (reloc_entry->addend
2536 + symbol->section->output_offset
2537 + symbol->section->output_section->vma);
2538 value -= (reloc_entry->address
2539 + input_section->output_offset
2540 + input_section->output_section->vma);
2541 value = (bfd_signed_vma) value >> 16;
2542
2543 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2544 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2545 insn &= ~0x1fffc1;
2546 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2547 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2548 if (value + 0x8000 > 0xffff)
2549 return bfd_reloc_overflow;
2550 return bfd_reloc_ok;
2551}
2552
2553static bfd_reloc_status_type
2554ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2555 void *data, asection *input_section,
2556 bfd *output_bfd, char **error_message)
2557{
2558 if (output_bfd != NULL)
2559 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2560 input_section, output_bfd, error_message);
2561
2562 if (strcmp (symbol->section->name, ".opd") == 0
2563 && (symbol->section->owner->flags & DYNAMIC) == 0)
2564 {
2565 bfd_vma dest = opd_entry_value (symbol->section,
2566 symbol->value + reloc_entry->addend,
2567 NULL, NULL, FALSE);
2568 if (dest != (bfd_vma) -1)
2569 reloc_entry->addend = dest - (symbol->value
2570 + symbol->section->output_section->vma
2571 + symbol->section->output_offset);
2572 }
2573 else
2574 {
2575 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2576
2577 if (symbol->section->owner != abfd
2578 && symbol->section->owner != NULL
2579 && abiversion (symbol->section->owner) >= 2)
2580 {
2581 unsigned int i;
2582
2583 for (i = 0; i < symbol->section->owner->symcount; ++i)
2584 {
2585 asymbol *symdef = symbol->section->owner->outsymbols[i];
2586
2587 if (strcmp (symdef->name, symbol->name) == 0)
2588 {
2589 elfsym = (elf_symbol_type *) symdef;
2590 break;
2591 }
2592 }
2593 }
2594 reloc_entry->addend
2595 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2596 }
2597 return bfd_reloc_continue;
2598}
2599
2600static bfd_reloc_status_type
2601ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2602 void *data, asection *input_section,
2603 bfd *output_bfd, char **error_message)
2604{
2605 long insn;
2606 enum elf_ppc64_reloc_type r_type;
2607 bfd_size_type octets;
2608 /* Assume 'at' branch hints. */
2609 bfd_boolean is_isa_v2 = TRUE;
2610
2611 /* If this is a relocatable link (output_bfd test tells us), just
2612 call the generic function. Any adjustment will be done at final
2613 link time. */
2614 if (output_bfd != NULL)
2615 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2616 input_section, output_bfd, error_message);
2617
2618 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2619 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2620 insn &= ~(0x01 << 21);
2621 r_type = reloc_entry->howto->type;
2622 if (r_type == R_PPC64_ADDR14_BRTAKEN
2623 || r_type == R_PPC64_REL14_BRTAKEN)
2624 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2625
2626 if (is_isa_v2)
2627 {
2628 /* Set 'a' bit. This is 0b00010 in BO field for branch
2629 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2630 for branch on CTR insns (BO == 1a00t or 1a01t). */
2631 if ((insn & (0x14 << 21)) == (0x04 << 21))
2632 insn |= 0x02 << 21;
2633 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2634 insn |= 0x08 << 21;
2635 else
2636 goto out;
2637 }
2638 else
2639 {
2640 bfd_vma target = 0;
2641 bfd_vma from;
2642
2643 if (!bfd_is_com_section (symbol->section))
2644 target = symbol->value;
2645 target += symbol->section->output_section->vma;
2646 target += symbol->section->output_offset;
2647 target += reloc_entry->addend;
2648
2649 from = (reloc_entry->address
2650 + input_section->output_offset
2651 + input_section->output_section->vma);
2652
2653 /* Invert 'y' bit if not the default. */
2654 if ((bfd_signed_vma) (target - from) < 0)
2655 insn ^= 0x01 << 21;
2656 }
2657 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2658 out:
2659 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2660 input_section, output_bfd, error_message);
2661}
2662
2663static bfd_reloc_status_type
2664ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2665 void *data, asection *input_section,
2666 bfd *output_bfd, char **error_message)
2667{
2668 /* If this is a relocatable link (output_bfd test tells us), just
2669 call the generic function. Any adjustment will be done at final
2670 link time. */
2671 if (output_bfd != NULL)
2672 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2673 input_section, output_bfd, error_message);
2674
2675 /* Subtract the symbol section base address. */
2676 reloc_entry->addend -= symbol->section->output_section->vma;
2677 return bfd_reloc_continue;
2678}
2679
2680static bfd_reloc_status_type
2681ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2682 void *data, asection *input_section,
2683 bfd *output_bfd, char **error_message)
2684{
2685 /* If this is a relocatable link (output_bfd test tells us), just
2686 call the generic function. Any adjustment will be done at final
2687 link time. */
2688 if (output_bfd != NULL)
2689 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2690 input_section, output_bfd, error_message);
2691
2692 /* Subtract the symbol section base address. */
2693 reloc_entry->addend -= symbol->section->output_section->vma;
2694
2695 /* Adjust the addend for sign extension of the low 16 bits. */
2696 reloc_entry->addend += 0x8000;
2697 return bfd_reloc_continue;
2698}
2699
2700static bfd_reloc_status_type
2701ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2702 void *data, asection *input_section,
2703 bfd *output_bfd, char **error_message)
2704{
2705 bfd_vma TOCstart;
2706
2707 /* If this is a relocatable link (output_bfd test tells us), just
2708 call the generic function. Any adjustment will be done at final
2709 link time. */
2710 if (output_bfd != NULL)
2711 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2712 input_section, output_bfd, error_message);
2713
2714 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2715 if (TOCstart == 0)
2716 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2717
2718 /* Subtract the TOC base address. */
2719 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2720 return bfd_reloc_continue;
2721}
2722
2723static bfd_reloc_status_type
2724ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2725 void *data, asection *input_section,
2726 bfd *output_bfd, char **error_message)
2727{
2728 bfd_vma TOCstart;
2729
2730 /* If this is a relocatable link (output_bfd test tells us), just
2731 call the generic function. Any adjustment will be done at final
2732 link time. */
2733 if (output_bfd != NULL)
2734 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2735 input_section, output_bfd, error_message);
2736
2737 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2738 if (TOCstart == 0)
2739 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2740
2741 /* Subtract the TOC base address. */
2742 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2743
2744 /* Adjust the addend for sign extension of the low 16 bits. */
2745 reloc_entry->addend += 0x8000;
2746 return bfd_reloc_continue;
2747}
2748
2749static bfd_reloc_status_type
2750ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2751 void *data, asection *input_section,
2752 bfd *output_bfd, char **error_message)
2753{
2754 bfd_vma TOCstart;
2755 bfd_size_type octets;
2756
2757 /* If this is a relocatable link (output_bfd test tells us), just
2758 call the generic function. Any adjustment will be done at final
2759 link time. */
2760 if (output_bfd != NULL)
2761 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2762 input_section, output_bfd, error_message);
2763
2764 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2765 if (TOCstart == 0)
2766 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2767
2768 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2769 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2770 return bfd_reloc_ok;
2771}
2772
2773static bfd_reloc_status_type
2774ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2775 void *data, asection *input_section,
2776 bfd *output_bfd, char **error_message)
2777{
2778 /* If this is a relocatable link (output_bfd test tells us), just
2779 call the generic function. Any adjustment will be done at final
2780 link time. */
2781 if (output_bfd != NULL)
2782 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2783 input_section, output_bfd, error_message);
2784
2785 if (error_message != NULL)
2786 {
2787 static char buf[60];
2788 sprintf (buf, "generic linker can't handle %s",
2789 reloc_entry->howto->name);
2790 *error_message = buf;
2791 }
2792 return bfd_reloc_dangerous;
2793}
2794
2795/* Track GOT entries needed for a given symbol. We might need more
2796 than one got entry per symbol. */
2797struct got_entry
2798{
2799 struct got_entry *next;
2800
2801 /* The symbol addend that we'll be placing in the GOT. */
2802 bfd_vma addend;
2803
2804 /* Unlike other ELF targets, we use separate GOT entries for the same
2805 symbol referenced from different input files. This is to support
2806 automatic multiple TOC/GOT sections, where the TOC base can vary
2807 from one input file to another. After partitioning into TOC groups
2808 we merge entries within the group.
2809
2810 Point to the BFD owning this GOT entry. */
2811 bfd *owner;
2812
2813 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2814 TLS_TPREL or TLS_DTPREL for tls entries. */
2815 unsigned char tls_type;
2816
2817 /* Non-zero if got.ent points to real entry. */
2818 unsigned char is_indirect;
2819
2820 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2821 union
2822 {
2823 bfd_signed_vma refcount;
2824 bfd_vma offset;
2825 struct got_entry *ent;
2826 } got;
2827};
2828
2829/* The same for PLT. */
2830struct plt_entry
2831{
2832 struct plt_entry *next;
2833
2834 bfd_vma addend;
2835
2836 union
2837 {
2838 bfd_signed_vma refcount;
2839 bfd_vma offset;
2840 } plt;
2841};
2842
2843struct ppc64_elf_obj_tdata
2844{
2845 struct elf_obj_tdata elf;
2846
2847 /* Shortcuts to dynamic linker sections. */
2848 asection *got;
2849 asection *relgot;
2850
2851 /* Used during garbage collection. We attach global symbols defined
2852 on removed .opd entries to this section so that the sym is removed. */
2853 asection *deleted_section;
2854
2855 /* TLS local dynamic got entry handling. Support for multiple GOT
2856 sections means we potentially need one of these for each input bfd. */
2857 struct got_entry tlsld_got;
2858
2859 union {
2860 /* A copy of relocs before they are modified for --emit-relocs. */
2861 Elf_Internal_Rela *relocs;
2862
2863 /* Section contents. */
2864 bfd_byte *contents;
2865 } opd;
2866
2867 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2868 the reloc to be in the range -32768 to 32767. */
2869 unsigned int has_small_toc_reloc : 1;
2870
2871 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2872 instruction not one we handle. */
2873 unsigned int unexpected_toc_insn : 1;
2874};
2875
2876#define ppc64_elf_tdata(bfd) \
2877 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2878
2879#define ppc64_tlsld_got(bfd) \
2880 (&ppc64_elf_tdata (bfd)->tlsld_got)
2881
2882#define is_ppc64_elf(bfd) \
2883 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2884 && elf_object_id (bfd) == PPC64_ELF_DATA)
2885
2886/* Override the generic function because we store some extras. */
2887
2888static bfd_boolean
2889ppc64_elf_mkobject (bfd *abfd)
2890{
2891 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
2892 PPC64_ELF_DATA);
2893}
2894
2895/* Fix bad default arch selected for a 64 bit input bfd when the
2896 default is 32 bit. Also select arch based on apuinfo. */
2897
2898static bfd_boolean
2899ppc64_elf_object_p (bfd *abfd)
2900{
2901 if (!abfd->arch_info->the_default)
2902 return TRUE;
2903
2904 if (abfd->arch_info->bits_per_word == 32)
2905 {
2906 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2907
2908 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2909 {
2910 /* Relies on arch after 32 bit default being 64 bit default. */
2911 abfd->arch_info = abfd->arch_info->next;
2912 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2913 }
2914 }
2915 return _bfd_elf_ppc_set_arch (abfd);
2916}
2917
2918/* Support for core dump NOTE sections. */
2919
2920static bfd_boolean
2921ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2922{
2923 size_t offset, size;
2924
2925 if (note->descsz != 504)
2926 return FALSE;
2927
2928 /* pr_cursig */
2929 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2930
2931 /* pr_pid */
2932 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
2933
2934 /* pr_reg */
2935 offset = 112;
2936 size = 384;
2937
2938 /* Make a ".reg/999" section. */
2939 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2940 size, note->descpos + offset);
2941}
2942
2943static bfd_boolean
2944ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2945{
2946 if (note->descsz != 136)
2947 return FALSE;
2948
2949 elf_tdata (abfd)->core->pid
2950 = bfd_get_32 (abfd, note->descdata + 24);
2951 elf_tdata (abfd)->core->program
2952 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2953 elf_tdata (abfd)->core->command
2954 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2955
2956 return TRUE;
2957}
2958
2959static char *
2960ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2961 ...)
2962{
2963 switch (note_type)
2964 {
2965 default:
2966 return NULL;
2967
2968 case NT_PRPSINFO:
2969 {
2970 char data[136];
2971 va_list ap;
2972
2973 va_start (ap, note_type);
2974 memset (data, 0, sizeof (data));
2975 strncpy (data + 40, va_arg (ap, const char *), 16);
2976 strncpy (data + 56, va_arg (ap, const char *), 80);
2977 va_end (ap);
2978 return elfcore_write_note (abfd, buf, bufsiz,
2979 "CORE", note_type, data, sizeof (data));
2980 }
2981
2982 case NT_PRSTATUS:
2983 {
2984 char data[504];
2985 va_list ap;
2986 long pid;
2987 int cursig;
2988 const void *greg;
2989
2990 va_start (ap, note_type);
2991 memset (data, 0, 112);
2992 pid = va_arg (ap, long);
2993 bfd_put_32 (abfd, pid, data + 32);
2994 cursig = va_arg (ap, int);
2995 bfd_put_16 (abfd, cursig, data + 12);
2996 greg = va_arg (ap, const void *);
2997 memcpy (data + 112, greg, 384);
2998 memset (data + 496, 0, 8);
2999 va_end (ap);
3000 return elfcore_write_note (abfd, buf, bufsiz,
3001 "CORE", note_type, data, sizeof (data));
3002 }
3003 }
3004}
3005
3006/* Add extra PPC sections. */
3007
3008static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
3009{
3010 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3011 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3012 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3013 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3014 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3015 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3016 { NULL, 0, 0, 0, 0 }
3017};
3018
3019enum _ppc64_sec_type {
3020 sec_normal = 0,
3021 sec_opd = 1,
3022 sec_toc = 2
3023};
3024
3025struct _ppc64_elf_section_data
3026{
3027 struct bfd_elf_section_data elf;
3028
3029 union
3030 {
3031 /* An array with one entry for each opd function descriptor,
3032 and some spares since opd entries may be either 16 or 24 bytes. */
3033#define OPD_NDX(OFF) ((OFF) >> 4)
3034 struct _opd_sec_data
3035 {
3036 /* Points to the function code section for local opd entries. */
3037 asection **func_sec;
3038
3039 /* After editing .opd, adjust references to opd local syms. */
3040 long *adjust;
3041 } opd;
3042
3043 /* An array for toc sections, indexed by offset/8. */
3044 struct _toc_sec_data
3045 {
3046 /* Specifies the relocation symbol index used at a given toc offset. */
3047 unsigned *symndx;
3048
3049 /* And the relocation addend. */
3050 bfd_vma *add;
3051 } toc;
3052 } u;
3053
3054 enum _ppc64_sec_type sec_type:2;
3055
3056 /* Flag set when small branches are detected. Used to
3057 select suitable defaults for the stub group size. */
3058 unsigned int has_14bit_branch:1;
3059};
3060
3061#define ppc64_elf_section_data(sec) \
3062 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
3063
3064static bfd_boolean
3065ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
3066{
3067 if (!sec->used_by_bfd)
3068 {
3069 struct _ppc64_elf_section_data *sdata;
3070 bfd_size_type amt = sizeof (*sdata);
3071
3072 sdata = bfd_zalloc (abfd, amt);
3073 if (sdata == NULL)
3074 return FALSE;
3075 sec->used_by_bfd = sdata;
3076 }
3077
3078 return _bfd_elf_new_section_hook (abfd, sec);
3079}
3080
3081static struct _opd_sec_data *
3082get_opd_info (asection * sec)
3083{
3084 if (sec != NULL
3085 && ppc64_elf_section_data (sec) != NULL
3086 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
3087 return &ppc64_elf_section_data (sec)->u.opd;
3088 return NULL;
3089}
3090\f
3091/* Parameters for the qsort hook. */
3092static bfd_boolean synthetic_relocatable;
3093static asection *synthetic_opd;
3094
3095/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3096
3097static int
3098compare_symbols (const void *ap, const void *bp)
3099{
3100 const asymbol *a = * (const asymbol **) ap;
3101 const asymbol *b = * (const asymbol **) bp;
3102
3103 /* Section symbols first. */
3104 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
3105 return -1;
3106 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
3107 return 1;
3108
3109 /* then .opd symbols. */
3110 if (synthetic_opd != NULL)
3111 {
3112 if (strcmp (a->section->name, ".opd") == 0
3113 && strcmp (b->section->name, ".opd") != 0)
3114 return -1;
3115 if (strcmp (a->section->name, ".opd") != 0
3116 && strcmp (b->section->name, ".opd") == 0)
3117 return 1;
3118 }
3119
3120 /* then other code symbols. */
3121 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3122 == (SEC_CODE | SEC_ALLOC)
3123 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3124 != (SEC_CODE | SEC_ALLOC))
3125 return -1;
3126
3127 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3128 != (SEC_CODE | SEC_ALLOC)
3129 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3130 == (SEC_CODE | SEC_ALLOC))
3131 return 1;
3132
3133 if (synthetic_relocatable)
3134 {
3135 if (a->section->id < b->section->id)
3136 return -1;
3137
3138 if (a->section->id > b->section->id)
3139 return 1;
3140 }
3141
3142 if (a->value + a->section->vma < b->value + b->section->vma)
3143 return -1;
3144
3145 if (a->value + a->section->vma > b->value + b->section->vma)
3146 return 1;
3147
3148 /* For syms with the same value, prefer strong dynamic global function
3149 syms over other syms. */
3150 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3151 return -1;
3152
3153 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3154 return 1;
3155
3156 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3157 return -1;
3158
3159 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3160 return 1;
3161
3162 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3163 return -1;
3164
3165 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3166 return 1;
3167
3168 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3169 return -1;
3170
3171 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3172 return 1;
3173
3174 return 0;
3175}
3176
3177/* Search SYMS for a symbol of the given VALUE. */
3178
3179static asymbol *
3180sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
3181{
3182 long mid;
3183
3184 if (id == (unsigned) -1)
3185 {
3186 while (lo < hi)
3187 {
3188 mid = (lo + hi) >> 1;
3189 if (syms[mid]->value + syms[mid]->section->vma < value)
3190 lo = mid + 1;
3191 else if (syms[mid]->value + syms[mid]->section->vma > value)
3192 hi = mid;
3193 else
3194 return syms[mid];
3195 }
3196 }
3197 else
3198 {
3199 while (lo < hi)
3200 {
3201 mid = (lo + hi) >> 1;
3202 if (syms[mid]->section->id < id)
3203 lo = mid + 1;
3204 else if (syms[mid]->section->id > id)
3205 hi = mid;
3206 else if (syms[mid]->value < value)
3207 lo = mid + 1;
3208 else if (syms[mid]->value > value)
3209 hi = mid;
3210 else
3211 return syms[mid];
3212 }
3213 }
3214 return NULL;
3215}
3216
3217static bfd_boolean
3218section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3219{
3220 bfd_vma vma = *(bfd_vma *) ptr;
3221 return ((section->flags & SEC_ALLOC) != 0
3222 && section->vma <= vma
3223 && vma < section->vma + section->size);
3224}
3225
3226/* Create synthetic symbols, effectively restoring "dot-symbol" function
3227 entry syms. Also generate @plt symbols for the glink branch table.
3228 Returns count of synthetic symbols in RET or -1 on error. */
3229
3230static long
3231ppc64_elf_get_synthetic_symtab (bfd *abfd,
3232 long static_count, asymbol **static_syms,
3233 long dyn_count, asymbol **dyn_syms,
3234 asymbol **ret)
3235{
3236 asymbol *s;
3237 long i;
3238 long count;
3239 char *names;
3240 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
3241 asection *opd = NULL;
3242 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
3243 asymbol **syms;
3244 int abi = abiversion (abfd);
3245
3246 *ret = NULL;
3247
3248 if (abi < 2)
3249 {
3250 opd = bfd_get_section_by_name (abfd, ".opd");
3251 if (opd == NULL && abi == 1)
3252 return 0;
3253 }
3254
3255 symcount = static_count;
3256 if (!relocatable)
3257 symcount += dyn_count;
3258 if (symcount == 0)
3259 return 0;
3260
3261 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3262 if (syms == NULL)
3263 return -1;
3264
3265 if (!relocatable && static_count != 0 && dyn_count != 0)
3266 {
3267 /* Use both symbol tables. */
3268 memcpy (syms, static_syms, static_count * sizeof (*syms));
3269 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3270 }
3271 else if (!relocatable && static_count == 0)
3272 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3273 else
3274 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3275
3276 synthetic_relocatable = relocatable;
3277 synthetic_opd = opd;
3278 qsort (syms, symcount, sizeof (*syms), compare_symbols);
3279
3280 if (!relocatable && symcount > 1)
3281 {
3282 long j;
3283 /* Trim duplicate syms, since we may have merged the normal and
3284 dynamic symbols. Actually, we only care about syms that have
3285 different values, so trim any with the same value. */
3286 for (i = 1, j = 1; i < symcount; ++i)
3287 if (syms[i - 1]->value + syms[i - 1]->section->vma
3288 != syms[i]->value + syms[i]->section->vma)
3289 syms[j++] = syms[i];
3290 symcount = j;
3291 }
3292
3293 i = 0;
3294 /* Note that here and in compare_symbols we can't compare opd and
3295 sym->section directly. With separate debug info files, the
3296 symbols will be extracted from the debug file while abfd passed
3297 to this function is the real binary. */
3298 if (opd != NULL && strcmp (syms[i]->section->name, ".opd") == 0)
3299 ++i;
3300 codesecsym = i;
3301
3302 for (; i < symcount; ++i)
3303 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3304 != (SEC_CODE | SEC_ALLOC))
3305 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3306 break;
3307 codesecsymend = i;
3308
3309 for (; i < symcount; ++i)
3310 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3311 break;
3312 secsymend = i;
3313
3314 if (opd != NULL)
3315 for (; i < symcount; ++i)
3316 if (strcmp (syms[i]->section->name, ".opd") != 0)
3317 break;
3318 opdsymend = i;
3319
3320 for (; i < symcount; ++i)
3321 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3322 != (SEC_CODE | SEC_ALLOC))
3323 break;
3324 symcount = i;
3325
3326 count = 0;
3327
3328 if (relocatable)
3329 {
3330 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3331 arelent *r;
3332 size_t size;
3333 long relcount;
3334
3335 if (opdsymend == secsymend)
3336 goto done;
3337
3338 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3339 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
3340 if (relcount == 0)
3341 goto done;
3342
3343 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3344 {
3345 count = -1;
3346 goto done;
3347 }
3348
3349 size = 0;
3350 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3351 {
3352 asymbol *sym;
3353
3354 while (r < opd->relocation + relcount
3355 && r->address < syms[i]->value + opd->vma)
3356 ++r;
3357
3358 if (r == opd->relocation + relcount)
3359 break;
3360
3361 if (r->address != syms[i]->value + opd->vma)
3362 continue;
3363
3364 if (r->howto->type != R_PPC64_ADDR64)
3365 continue;
3366
3367 sym = *r->sym_ptr_ptr;
3368 if (!sym_exists_at (syms, opdsymend, symcount,
3369 sym->section->id, sym->value + r->addend))
3370 {
3371 ++count;
3372 size += sizeof (asymbol);
3373 size += strlen (syms[i]->name) + 2;
3374 }
3375 }
3376
3377 if (size == 0)
3378 goto done;
3379 s = *ret = bfd_malloc (size);
3380 if (s == NULL)
3381 {
3382 count = -1;
3383 goto done;
3384 }
3385
3386 names = (char *) (s + count);
3387
3388 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3389 {
3390 asymbol *sym;
3391
3392 while (r < opd->relocation + relcount
3393 && r->address < syms[i]->value + opd->vma)
3394 ++r;
3395
3396 if (r == opd->relocation + relcount)
3397 break;
3398
3399 if (r->address != syms[i]->value + opd->vma)
3400 continue;
3401
3402 if (r->howto->type != R_PPC64_ADDR64)
3403 continue;
3404
3405 sym = *r->sym_ptr_ptr;
3406 if (!sym_exists_at (syms, opdsymend, symcount,
3407 sym->section->id, sym->value + r->addend))
3408 {
3409 size_t len;
3410
3411 *s = *syms[i];
3412 s->flags |= BSF_SYNTHETIC;
3413 s->section = sym->section;
3414 s->value = sym->value + r->addend;
3415 s->name = names;
3416 *names++ = '.';
3417 len = strlen (syms[i]->name);
3418 memcpy (names, syms[i]->name, len + 1);
3419 names += len + 1;
3420 /* Have udata.p point back to the original symbol this
3421 synthetic symbol was derived from. */
3422 s->udata.p = syms[i];
3423 s++;
3424 }
3425 }
3426 }
3427 else
3428 {
3429 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3430 bfd_byte *contents = NULL;
3431 size_t size;
3432 long plt_count = 0;
3433 bfd_vma glink_vma = 0, resolv_vma = 0;
3434 asection *dynamic, *glink = NULL, *relplt = NULL;
3435 arelent *p;
3436
3437 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
3438 {
3439 free_contents_and_exit_err:
3440 count = -1;
3441 free_contents_and_exit:
3442 if (contents)
3443 free (contents);
3444 goto done;
3445 }
3446
3447 size = 0;
3448 for (i = secsymend; i < opdsymend; ++i)
3449 {
3450 bfd_vma ent;
3451
3452 /* Ignore bogus symbols. */
3453 if (syms[i]->value > opd->size - 8)
3454 continue;
3455
3456 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3457 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3458 {
3459 ++count;
3460 size += sizeof (asymbol);
3461 size += strlen (syms[i]->name) + 2;
3462 }
3463 }
3464
3465 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3466 if (dyn_count != 0
3467 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
3468 {
3469 bfd_byte *dynbuf, *extdyn, *extdynend;
3470 size_t extdynsize;
3471 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3472
3473 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
3474 goto free_contents_and_exit_err;
3475
3476 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3477 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3478
3479 extdyn = dynbuf;
3480 extdynend = extdyn + dynamic->size;
3481 for (; extdyn < extdynend; extdyn += extdynsize)
3482 {
3483 Elf_Internal_Dyn dyn;
3484 (*swap_dyn_in) (abfd, extdyn, &dyn);
3485
3486 if (dyn.d_tag == DT_NULL)
3487 break;
3488
3489 if (dyn.d_tag == DT_PPC64_GLINK)
3490 {
3491 /* The first glink stub starts at offset 32; see
3492 comment in ppc64_elf_finish_dynamic_sections. */
3493 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
3494 /* The .glink section usually does not survive the final
3495 link; search for the section (usually .text) where the
3496 glink stubs now reside. */
3497 glink = bfd_sections_find_if (abfd, section_covers_vma,
3498 &glink_vma);
3499 break;
3500 }
3501 }
3502
3503 free (dynbuf);
3504 }
3505
3506 if (glink != NULL)
3507 {
3508 /* Determine __glink trampoline by reading the relative branch
3509 from the first glink stub. */
3510 bfd_byte buf[4];
3511 unsigned int off = 0;
3512
3513 while (bfd_get_section_contents (abfd, glink, buf,
3514 glink_vma + off - glink->vma, 4))
3515 {
3516 unsigned int insn = bfd_get_32 (abfd, buf);
3517 insn ^= B_DOT;
3518 if ((insn & ~0x3fffffc) == 0)
3519 {
3520 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3521 break;
3522 }
3523 off += 4;
3524 if (off > 4)
3525 break;
3526 }
3527
3528 if (resolv_vma)
3529 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3530
3531 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3532 if (relplt != NULL)
3533 {
3534 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3535 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
3536 goto free_contents_and_exit_err;
3537
3538 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3539 size += plt_count * sizeof (asymbol);
3540
3541 p = relplt->relocation;
3542 for (i = 0; i < plt_count; i++, p++)
3543 {
3544 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3545 if (p->addend != 0)
3546 size += sizeof ("+0x") - 1 + 16;
3547 }
3548 }
3549 }
3550
3551 if (size == 0)
3552 goto free_contents_and_exit;
3553 s = *ret = bfd_malloc (size);
3554 if (s == NULL)
3555 goto free_contents_and_exit_err;
3556
3557 names = (char *) (s + count + plt_count + (resolv_vma != 0));
3558
3559 for (i = secsymend; i < opdsymend; ++i)
3560 {
3561 bfd_vma ent;
3562
3563 if (syms[i]->value > opd->size - 8)
3564 continue;
3565
3566 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3567 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3568 {
3569 long lo, hi;
3570 size_t len;
3571 asection *sec = abfd->sections;
3572
3573 *s = *syms[i];
3574 lo = codesecsym;
3575 hi = codesecsymend;
3576 while (lo < hi)
3577 {
3578 long mid = (lo + hi) >> 1;
3579 if (syms[mid]->section->vma < ent)
3580 lo = mid + 1;
3581 else if (syms[mid]->section->vma > ent)
3582 hi = mid;
3583 else
3584 {
3585 sec = syms[mid]->section;
3586 break;
3587 }
3588 }
3589
3590 if (lo >= hi && lo > codesecsym)
3591 sec = syms[lo - 1]->section;
3592
3593 for (; sec != NULL; sec = sec->next)
3594 {
3595 if (sec->vma > ent)
3596 break;
3597 /* SEC_LOAD may not be set if SEC is from a separate debug
3598 info file. */
3599 if ((sec->flags & SEC_ALLOC) == 0)
3600 break;
3601 if ((sec->flags & SEC_CODE) != 0)
3602 s->section = sec;
3603 }
3604 s->flags |= BSF_SYNTHETIC;
3605 s->value = ent - s->section->vma;
3606 s->name = names;
3607 *names++ = '.';
3608 len = strlen (syms[i]->name);
3609 memcpy (names, syms[i]->name, len + 1);
3610 names += len + 1;
3611 /* Have udata.p point back to the original symbol this
3612 synthetic symbol was derived from. */
3613 s->udata.p = syms[i];
3614 s++;
3615 }
3616 }
3617 free (contents);
3618
3619 if (glink != NULL && relplt != NULL)
3620 {
3621 if (resolv_vma)
3622 {
3623 /* Add a symbol for the main glink trampoline. */
3624 memset (s, 0, sizeof *s);
3625 s->the_bfd = abfd;
3626 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3627 s->section = glink;
3628 s->value = resolv_vma - glink->vma;
3629 s->name = names;
3630 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3631 names += sizeof ("__glink_PLTresolve");
3632 s++;
3633 count++;
3634 }
3635
3636 /* FIXME: It would be very much nicer to put sym@plt on the
3637 stub rather than on the glink branch table entry. The
3638 objdump disassembler would then use a sensible symbol
3639 name on plt calls. The difficulty in doing so is
3640 a) finding the stubs, and,
3641 b) matching stubs against plt entries, and,
3642 c) there can be multiple stubs for a given plt entry.
3643
3644 Solving (a) could be done by code scanning, but older
3645 ppc64 binaries used different stubs to current code.
3646 (b) is the tricky one since you need to known the toc
3647 pointer for at least one function that uses a pic stub to
3648 be able to calculate the plt address referenced.
3649 (c) means gdb would need to set multiple breakpoints (or
3650 find the glink branch itself) when setting breakpoints
3651 for pending shared library loads. */
3652 p = relplt->relocation;
3653 for (i = 0; i < plt_count; i++, p++)
3654 {
3655 size_t len;
3656
3657 *s = **p->sym_ptr_ptr;
3658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3659 we are defining a symbol, ensure one of them is set. */
3660 if ((s->flags & BSF_LOCAL) == 0)
3661 s->flags |= BSF_GLOBAL;
3662 s->flags |= BSF_SYNTHETIC;
3663 s->section = glink;
3664 s->value = glink_vma - glink->vma;
3665 s->name = names;
3666 s->udata.p = NULL;
3667 len = strlen ((*p->sym_ptr_ptr)->name);
3668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3669 names += len;
3670 if (p->addend != 0)
3671 {
3672 memcpy (names, "+0x", sizeof ("+0x") - 1);
3673 names += sizeof ("+0x") - 1;
3674 bfd_sprintf_vma (abfd, names, p->addend);
3675 names += strlen (names);
3676 }
3677 memcpy (names, "@plt", sizeof ("@plt"));
3678 names += sizeof ("@plt");
3679 s++;
3680 if (abi < 2)
3681 {
3682 glink_vma += 8;
3683 if (i >= 0x8000)
3684 glink_vma += 4;
3685 }
3686 else
3687 glink_vma += 4;
3688 }
3689 count += plt_count;
3690 }
3691 }
3692
3693 done:
3694 free (syms);
3695 return count;
3696}
3697\f
3698/* The following functions are specific to the ELF linker, while
3699 functions above are used generally. Those named ppc64_elf_* are
3700 called by the main ELF linker code. They appear in this file more
3701 or less in the order in which they are called. eg.
3702 ppc64_elf_check_relocs is called early in the link process,
3703 ppc64_elf_finish_dynamic_sections is one of the last functions
3704 called.
3705
3706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3707 functions have both a function code symbol and a function descriptor
3708 symbol. A call to foo in a relocatable object file looks like:
3709
3710 . .text
3711 . x:
3712 . bl .foo
3713 . nop
3714
3715 The function definition in another object file might be:
3716
3717 . .section .opd
3718 . foo: .quad .foo
3719 . .quad .TOC.@tocbase
3720 . .quad 0
3721 .
3722 . .text
3723 . .foo: blr
3724
3725 When the linker resolves the call during a static link, the branch
3726 unsurprisingly just goes to .foo and the .opd information is unused.
3727 If the function definition is in a shared library, things are a little
3728 different: The call goes via a plt call stub, the opd information gets
3729 copied to the plt, and the linker patches the nop.
3730
3731 . x:
3732 . bl .foo_stub
3733 . ld 2,40(1)
3734 .
3735 .
3736 . .foo_stub:
3737 . std 2,40(1) # in practice, the call stub
3738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3739 . addi 11,11,Lfoo@toc@l # this is the general idea
3740 . ld 12,0(11)
3741 . ld 2,8(11)
3742 . mtctr 12
3743 . ld 11,16(11)
3744 . bctr
3745 .
3746 . .section .plt
3747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3748
3749 The "reloc ()" notation is supposed to indicate that the linker emits
3750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3751 copying.
3752
3753 What are the difficulties here? Well, firstly, the relocations
3754 examined by the linker in check_relocs are against the function code
3755 sym .foo, while the dynamic relocation in the plt is emitted against
3756 the function descriptor symbol, foo. Somewhere along the line, we need
3757 to carefully copy dynamic link information from one symbol to the other.
3758 Secondly, the generic part of the elf linker will make .foo a dynamic
3759 symbol as is normal for most other backends. We need foo dynamic
3760 instead, at least for an application final link. However, when
3761 creating a shared library containing foo, we need to have both symbols
3762 dynamic so that references to .foo are satisfied during the early
3763 stages of linking. Otherwise the linker might decide to pull in a
3764 definition from some other object, eg. a static library.
3765
3766 Update: As of August 2004, we support a new convention. Function
3767 calls may use the function descriptor symbol, ie. "bl foo". This
3768 behaves exactly as "bl .foo". */
3769
3770/* Of those relocs that might be copied as dynamic relocs, this function
3771 selects those that must be copied when linking a shared library,
3772 even when the symbol is local. */
3773
3774static int
3775must_be_dyn_reloc (struct bfd_link_info *info,
3776 enum elf_ppc64_reloc_type r_type)
3777{
3778 switch (r_type)
3779 {
3780 default:
3781 return 1;
3782
3783 case R_PPC64_REL32:
3784 case R_PPC64_REL64:
3785 case R_PPC64_REL30:
3786 return 0;
3787
3788 case R_PPC64_TPREL16:
3789 case R_PPC64_TPREL16_LO:
3790 case R_PPC64_TPREL16_HI:
3791 case R_PPC64_TPREL16_HA:
3792 case R_PPC64_TPREL16_DS:
3793 case R_PPC64_TPREL16_LO_DS:
3794 case R_PPC64_TPREL16_HIGH:
3795 case R_PPC64_TPREL16_HIGHA:
3796 case R_PPC64_TPREL16_HIGHER:
3797 case R_PPC64_TPREL16_HIGHERA:
3798 case R_PPC64_TPREL16_HIGHEST:
3799 case R_PPC64_TPREL16_HIGHESTA:
3800 case R_PPC64_TPREL64:
3801 return !bfd_link_executable (info);
3802 }
3803}
3804
3805/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3806 copying dynamic variables from a shared lib into an app's dynbss
3807 section, and instead use a dynamic relocation to point into the
3808 shared lib. With code that gcc generates, it's vital that this be
3809 enabled; In the PowerPC64 ABI, the address of a function is actually
3810 the address of a function descriptor, which resides in the .opd
3811 section. gcc uses the descriptor directly rather than going via the
3812 GOT as some other ABI's do, which means that initialized function
3813 pointers must reference the descriptor. Thus, a function pointer
3814 initialized to the address of a function in a shared library will
3815 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3816 redefines the function descriptor symbol to point to the copy. This
3817 presents a problem as a plt entry for that function is also
3818 initialized from the function descriptor symbol and the copy reloc
3819 may not be initialized first. */
3820#define ELIMINATE_COPY_RELOCS 1
3821
3822/* Section name for stubs is the associated section name plus this
3823 string. */
3824#define STUB_SUFFIX ".stub"
3825
3826/* Linker stubs.
3827 ppc_stub_long_branch:
3828 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3829 destination, but a 24 bit branch in a stub section will reach.
3830 . b dest
3831
3832 ppc_stub_plt_branch:
3833 Similar to the above, but a 24 bit branch in the stub section won't
3834 reach its destination.
3835 . addis %r11,%r2,xxx@toc@ha
3836 . ld %r12,xxx@toc@l(%r11)
3837 . mtctr %r12
3838 . bctr
3839
3840 ppc_stub_plt_call:
3841 Used to call a function in a shared library. If it so happens that
3842 the plt entry referenced crosses a 64k boundary, then an extra
3843 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3844 . std %r2,40(%r1)
3845 . addis %r11,%r2,xxx@toc@ha
3846 . ld %r12,xxx+0@toc@l(%r11)
3847 . mtctr %r12
3848 . ld %r2,xxx+8@toc@l(%r11)
3849 . ld %r11,xxx+16@toc@l(%r11)
3850 . bctr
3851
3852 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3853 code to adjust the value and save r2 to support multiple toc sections.
3854 A ppc_stub_long_branch with an r2 offset looks like:
3855 . std %r2,40(%r1)
3856 . addis %r2,%r2,off@ha
3857 . addi %r2,%r2,off@l
3858 . b dest
3859
3860 A ppc_stub_plt_branch with an r2 offset looks like:
3861 . std %r2,40(%r1)
3862 . addis %r11,%r2,xxx@toc@ha
3863 . ld %r12,xxx@toc@l(%r11)
3864 . addis %r2,%r2,off@ha
3865 . addi %r2,%r2,off@l
3866 . mtctr %r12
3867 . bctr
3868
3869 In cases where the "addis" instruction would add zero, the "addis" is
3870 omitted and following instructions modified slightly in some cases.
3871*/
3872
3873enum ppc_stub_type {
3874 ppc_stub_none,
3875 ppc_stub_long_branch,
3876 ppc_stub_long_branch_r2off,
3877 ppc_stub_plt_branch,
3878 ppc_stub_plt_branch_r2off,
3879 ppc_stub_plt_call,
3880 ppc_stub_plt_call_r2save,
3881 ppc_stub_global_entry,
3882 ppc_stub_save_res
3883};
3884
3885/* Information on stub grouping. */
3886struct map_stub
3887{
3888 /* The stub section. */
3889 asection *stub_sec;
3890 /* This is the section to which stubs in the group will be attached. */
3891 asection *link_sec;
3892 /* Next group. */
3893 struct map_stub *next;
3894 /* Whether to emit a copy of register save/restore functions in this
3895 group. */
3896 int needs_save_res;
3897};
3898
3899struct ppc_stub_hash_entry {
3900
3901 /* Base hash table entry structure. */
3902 struct bfd_hash_entry root;
3903
3904 enum ppc_stub_type stub_type;
3905
3906 /* Group information. */
3907 struct map_stub *group;
3908
3909 /* Offset within stub_sec of the beginning of this stub. */
3910 bfd_vma stub_offset;
3911
3912 /* Given the symbol's value and its section we can determine its final
3913 value when building the stubs (so the stub knows where to jump. */
3914 bfd_vma target_value;
3915 asection *target_section;
3916
3917 /* The symbol table entry, if any, that this was derived from. */
3918 struct ppc_link_hash_entry *h;
3919 struct plt_entry *plt_ent;
3920
3921 /* Symbol st_other. */
3922 unsigned char other;
3923};
3924
3925struct ppc_branch_hash_entry {
3926
3927 /* Base hash table entry structure. */
3928 struct bfd_hash_entry root;
3929
3930 /* Offset within branch lookup table. */
3931 unsigned int offset;
3932
3933 /* Generation marker. */
3934 unsigned int iter;
3935};
3936
3937/* Used to track dynamic relocations for local symbols. */
3938struct ppc_dyn_relocs
3939{
3940 struct ppc_dyn_relocs *next;
3941
3942 /* The input section of the reloc. */
3943 asection *sec;
3944
3945 /* Total number of relocs copied for the input section. */
3946 unsigned int count : 31;
3947
3948 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3949 unsigned int ifunc : 1;
3950};
3951
3952struct ppc_link_hash_entry
3953{
3954 struct elf_link_hash_entry elf;
3955
3956 union {
3957 /* A pointer to the most recently used stub hash entry against this
3958 symbol. */
3959 struct ppc_stub_hash_entry *stub_cache;
3960
3961 /* A pointer to the next symbol starting with a '.' */
3962 struct ppc_link_hash_entry *next_dot_sym;
3963 } u;
3964
3965 /* Track dynamic relocs copied for this symbol. */
3966 struct elf_dyn_relocs *dyn_relocs;
3967
3968 /* Chain of aliases referring to a weakdef. */
3969 struct ppc_link_hash_entry *weakref;
3970
3971 /* Link between function code and descriptor symbols. */
3972 struct ppc_link_hash_entry *oh;
3973
3974 /* Flag function code and descriptor symbols. */
3975 unsigned int is_func:1;
3976 unsigned int is_func_descriptor:1;
3977 unsigned int fake:1;
3978
3979 /* Whether global opd/toc sym has been adjusted or not.
3980 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3981 should be set for all globals defined in any opd/toc section. */
3982 unsigned int adjust_done:1;
3983
3984 /* Set if this is an out-of-line register save/restore function,
3985 with non-standard calling convention. */
3986 unsigned int save_res:1;
3987
3988 /* Contexts in which symbol is used in the GOT (or TOC).
3989 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3990 corresponding relocs are encountered during check_relocs.
3991 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3992 indicate the corresponding GOT entry type is not needed.
3993 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3994 a TPREL one. We use a separate flag rather than setting TPREL
3995 just for convenience in distinguishing the two cases. */
3996#define TLS_GD 1 /* GD reloc. */
3997#define TLS_LD 2 /* LD reloc. */
3998#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3999#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
4000#define TLS_TLS 16 /* Any TLS reloc. */
4001#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
4002#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
4003#define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
4004 unsigned char tls_mask;
4005};
4006
4007/* ppc64 ELF linker hash table. */
4008
4009struct ppc_link_hash_table
4010{
4011 struct elf_link_hash_table elf;
4012
4013 /* The stub hash table. */
4014 struct bfd_hash_table stub_hash_table;
4015
4016 /* Another hash table for plt_branch stubs. */
4017 struct bfd_hash_table branch_hash_table;
4018
4019 /* Hash table for function prologue tocsave. */
4020 htab_t tocsave_htab;
4021
4022 /* Various options and other info passed from the linker. */
4023 struct ppc64_elf_params *params;
4024
4025 /* The size of sec_info below. */
4026 unsigned int sec_info_arr_size;
4027
4028 /* Per-section array of extra section info. Done this way rather
4029 than as part of ppc64_elf_section_data so we have the info for
4030 non-ppc64 sections. */
4031 struct
4032 {
4033 /* Along with elf_gp, specifies the TOC pointer used by this section. */
4034 bfd_vma toc_off;
4035
4036 union
4037 {
4038 /* The section group that this section belongs to. */
4039 struct map_stub *group;
4040 /* A temp section list pointer. */
4041 asection *list;
4042 } u;
4043 } *sec_info;
4044
4045 /* Linked list of groups. */
4046 struct map_stub *group;
4047
4048 /* Temp used when calculating TOC pointers. */
4049 bfd_vma toc_curr;
4050 bfd *toc_bfd;
4051 asection *toc_first_sec;
4052
4053 /* Used when adding symbols. */
4054 struct ppc_link_hash_entry *dot_syms;
4055
4056 /* Shortcuts to get to dynamic linker sections. */
4057 asection *glink;
4058 asection *sfpr;
4059 asection *brlt;
4060 asection *relbrlt;
4061 asection *glink_eh_frame;
4062
4063 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4064 struct ppc_link_hash_entry *tls_get_addr;
4065 struct ppc_link_hash_entry *tls_get_addr_fd;
4066
4067 /* The size of reliplt used by got entry relocs. */
4068 bfd_size_type got_reli_size;
4069
4070 /* Statistics. */
4071 unsigned long stub_count[ppc_stub_global_entry];
4072
4073 /* Number of stubs against global syms. */
4074 unsigned long stub_globals;
4075
4076 /* Set if we're linking code with function descriptors. */
4077 unsigned int opd_abi:1;
4078
4079 /* Support for multiple toc sections. */
4080 unsigned int do_multi_toc:1;
4081 unsigned int multi_toc_needed:1;
4082 unsigned int second_toc_pass:1;
4083 unsigned int do_toc_opt:1;
4084
4085 /* Set on error. */
4086 unsigned int stub_error:1;
4087
4088 /* Whether func_desc_adjust needs to be run over symbols. */
4089 unsigned int need_func_desc_adj:1;
4090
4091 /* Incremented every time we size stubs. */
4092 unsigned int stub_iteration;
4093
4094 /* Small local sym cache. */
4095 struct sym_cache sym_cache;
4096};
4097
4098/* Rename some of the generic section flags to better document how they
4099 are used here. */
4100
4101/* Nonzero if this section has TLS related relocations. */
4102#define has_tls_reloc sec_flg0
4103
4104/* Nonzero if this section has a call to __tls_get_addr. */
4105#define has_tls_get_addr_call sec_flg1
4106
4107/* Nonzero if this section has any toc or got relocs. */
4108#define has_toc_reloc sec_flg2
4109
4110/* Nonzero if this section has a call to another section that uses
4111 the toc or got. */
4112#define makes_toc_func_call sec_flg3
4113
4114/* Recursion protection when determining above flag. */
4115#define call_check_in_progress sec_flg4
4116#define call_check_done sec_flg5
4117
4118/* Get the ppc64 ELF linker hash table from a link_info structure. */
4119
4120#define ppc_hash_table(p) \
4121 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4122 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4123
4124#define ppc_stub_hash_lookup(table, string, create, copy) \
4125 ((struct ppc_stub_hash_entry *) \
4126 bfd_hash_lookup ((table), (string), (create), (copy)))
4127
4128#define ppc_branch_hash_lookup(table, string, create, copy) \
4129 ((struct ppc_branch_hash_entry *) \
4130 bfd_hash_lookup ((table), (string), (create), (copy)))
4131
4132/* Create an entry in the stub hash table. */
4133
4134static struct bfd_hash_entry *
4135stub_hash_newfunc (struct bfd_hash_entry *entry,
4136 struct bfd_hash_table *table,
4137 const char *string)
4138{
4139 /* Allocate the structure if it has not already been allocated by a
4140 subclass. */
4141 if (entry == NULL)
4142 {
4143 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4144 if (entry == NULL)
4145 return entry;
4146 }
4147
4148 /* Call the allocation method of the superclass. */
4149 entry = bfd_hash_newfunc (entry, table, string);
4150 if (entry != NULL)
4151 {
4152 struct ppc_stub_hash_entry *eh;
4153
4154 /* Initialize the local fields. */
4155 eh = (struct ppc_stub_hash_entry *) entry;
4156 eh->stub_type = ppc_stub_none;
4157 eh->group = NULL;
4158 eh->stub_offset = 0;
4159 eh->target_value = 0;
4160 eh->target_section = NULL;
4161 eh->h = NULL;
4162 eh->plt_ent = NULL;
4163 eh->other = 0;
4164 }
4165
4166 return entry;
4167}
4168
4169/* Create an entry in the branch hash table. */
4170
4171static struct bfd_hash_entry *
4172branch_hash_newfunc (struct bfd_hash_entry *entry,
4173 struct bfd_hash_table *table,
4174 const char *string)
4175{
4176 /* Allocate the structure if it has not already been allocated by a
4177 subclass. */
4178 if (entry == NULL)
4179 {
4180 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4181 if (entry == NULL)
4182 return entry;
4183 }
4184
4185 /* Call the allocation method of the superclass. */
4186 entry = bfd_hash_newfunc (entry, table, string);
4187 if (entry != NULL)
4188 {
4189 struct ppc_branch_hash_entry *eh;
4190
4191 /* Initialize the local fields. */
4192 eh = (struct ppc_branch_hash_entry *) entry;
4193 eh->offset = 0;
4194 eh->iter = 0;
4195 }
4196
4197 return entry;
4198}
4199
4200/* Create an entry in a ppc64 ELF linker hash table. */
4201
4202static struct bfd_hash_entry *
4203link_hash_newfunc (struct bfd_hash_entry *entry,
4204 struct bfd_hash_table *table,
4205 const char *string)
4206{
4207 /* Allocate the structure if it has not already been allocated by a
4208 subclass. */
4209 if (entry == NULL)
4210 {
4211 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4212 if (entry == NULL)
4213 return entry;
4214 }
4215
4216 /* Call the allocation method of the superclass. */
4217 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4218 if (entry != NULL)
4219 {
4220 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4221
4222 memset (&eh->u.stub_cache, 0,
4223 (sizeof (struct ppc_link_hash_entry)
4224 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4225
4226 /* When making function calls, old ABI code references function entry
4227 points (dot symbols), while new ABI code references the function
4228 descriptor symbol. We need to make any combination of reference and
4229 definition work together, without breaking archive linking.
4230
4231 For a defined function "foo" and an undefined call to "bar":
4232 An old object defines "foo" and ".foo", references ".bar" (possibly
4233 "bar" too).
4234 A new object defines "foo" and references "bar".
4235
4236 A new object thus has no problem with its undefined symbols being
4237 satisfied by definitions in an old object. On the other hand, the
4238 old object won't have ".bar" satisfied by a new object.
4239
4240 Keep a list of newly added dot-symbols. */
4241
4242 if (string[0] == '.')
4243 {
4244 struct ppc_link_hash_table *htab;
4245
4246 htab = (struct ppc_link_hash_table *) table;
4247 eh->u.next_dot_sym = htab->dot_syms;
4248 htab->dot_syms = eh;
4249 }
4250 }
4251
4252 return entry;
4253}
4254
4255struct tocsave_entry {
4256 asection *sec;
4257 bfd_vma offset;
4258};
4259
4260static hashval_t
4261tocsave_htab_hash (const void *p)
4262{
4263 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4264 return ((bfd_vma)(intptr_t) e->sec ^ e->offset) >> 3;
4265}
4266
4267static int
4268tocsave_htab_eq (const void *p1, const void *p2)
4269{
4270 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4271 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4272 return e1->sec == e2->sec && e1->offset == e2->offset;
4273}
4274
4275/* Destroy a ppc64 ELF linker hash table. */
4276
4277static void
4278ppc64_elf_link_hash_table_free (bfd *obfd)
4279{
4280 struct ppc_link_hash_table *htab;
4281
4282 htab = (struct ppc_link_hash_table *) obfd->link.hash;
4283 if (htab->tocsave_htab)
4284 htab_delete (htab->tocsave_htab);
4285 bfd_hash_table_free (&htab->branch_hash_table);
4286 bfd_hash_table_free (&htab->stub_hash_table);
4287 _bfd_elf_link_hash_table_free (obfd);
4288}
4289
4290/* Create a ppc64 ELF linker hash table. */
4291
4292static struct bfd_link_hash_table *
4293ppc64_elf_link_hash_table_create (bfd *abfd)
4294{
4295 struct ppc_link_hash_table *htab;
4296 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4297
4298 htab = bfd_zmalloc (amt);
4299 if (htab == NULL)
4300 return NULL;
4301
4302 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4303 sizeof (struct ppc_link_hash_entry),
4304 PPC64_ELF_DATA))
4305 {
4306 free (htab);
4307 return NULL;
4308 }
4309
4310 /* Init the stub hash table too. */
4311 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4312 sizeof (struct ppc_stub_hash_entry)))
4313 {
4314 _bfd_elf_link_hash_table_free (abfd);
4315 return NULL;
4316 }
4317
4318 /* And the branch hash table. */
4319 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4320 sizeof (struct ppc_branch_hash_entry)))
4321 {
4322 bfd_hash_table_free (&htab->stub_hash_table);
4323 _bfd_elf_link_hash_table_free (abfd);
4324 return NULL;
4325 }
4326
4327 htab->tocsave_htab = htab_try_create (1024,
4328 tocsave_htab_hash,
4329 tocsave_htab_eq,
4330 NULL);
4331 if (htab->tocsave_htab == NULL)
4332 {
4333 ppc64_elf_link_hash_table_free (abfd);
4334 return NULL;
4335 }
4336 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
4337
4338 /* Initializing two fields of the union is just cosmetic. We really
4339 only care about glist, but when compiled on a 32-bit host the
4340 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4341 debugger inspection of these fields look nicer. */
4342 htab->elf.init_got_refcount.refcount = 0;
4343 htab->elf.init_got_refcount.glist = NULL;
4344 htab->elf.init_plt_refcount.refcount = 0;
4345 htab->elf.init_plt_refcount.glist = NULL;
4346 htab->elf.init_got_offset.offset = 0;
4347 htab->elf.init_got_offset.glist = NULL;
4348 htab->elf.init_plt_offset.offset = 0;
4349 htab->elf.init_plt_offset.glist = NULL;
4350
4351 return &htab->elf.root;
4352}
4353
4354/* Create sections for linker generated code. */
4355
4356static bfd_boolean
4357create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4358{
4359 struct ppc_link_hash_table *htab;
4360 flagword flags;
4361
4362 htab = ppc_hash_table (info);
4363
4364 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4365 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4366 if (htab->params->save_restore_funcs)
4367 {
4368 /* Create .sfpr for code to save and restore fp regs. */
4369 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4370 flags);
4371 if (htab->sfpr == NULL
4372 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4373 return FALSE;
4374 }
4375
4376 if (bfd_link_relocatable (info))
4377 return TRUE;
4378
4379 /* Create .glink for lazy dynamic linking support. */
4380 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4381 flags);
4382 if (htab->glink == NULL
4383 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4384 return FALSE;
4385
4386 if (!info->no_ld_generated_unwind_info)
4387 {
4388 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4389 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4390 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4391 ".eh_frame",
4392 flags);
4393 if (htab->glink_eh_frame == NULL
4394 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4395 return FALSE;
4396 }
4397
4398 flags = SEC_ALLOC | SEC_LINKER_CREATED;
4399 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4400 if (htab->elf.iplt == NULL
4401 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
4402 return FALSE;
4403
4404 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4405 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4406 htab->elf.irelplt
4407 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4408 if (htab->elf.irelplt == NULL
4409 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
4410 return FALSE;
4411
4412 /* Create branch lookup table for plt_branch stubs. */
4413 flags = (SEC_ALLOC | SEC_LOAD
4414 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4415 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4416 flags);
4417 if (htab->brlt == NULL
4418 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4419 return FALSE;
4420
4421 if (!bfd_link_pic (info))
4422 return TRUE;
4423
4424 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4425 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4426 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4427 ".rela.branch_lt",
4428 flags);
4429 if (htab->relbrlt == NULL
4430 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4431 return FALSE;
4432
4433 return TRUE;
4434}
4435
4436/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4437
4438bfd_boolean
4439ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4440 struct ppc64_elf_params *params)
4441{
4442 struct ppc_link_hash_table *htab;
4443
4444 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
4445
4446/* Always hook our dynamic sections into the first bfd, which is the
4447 linker created stub bfd. This ensures that the GOT header is at
4448 the start of the output TOC section. */
4449 htab = ppc_hash_table (info);
4450 htab->elf.dynobj = params->stub_bfd;
4451 htab->params = params;
4452
4453 return create_linkage_sections (htab->elf.dynobj, info);
4454}
4455
4456/* Build a name for an entry in the stub hash table. */
4457
4458static char *
4459ppc_stub_name (const asection *input_section,
4460 const asection *sym_sec,
4461 const struct ppc_link_hash_entry *h,
4462 const Elf_Internal_Rela *rel)
4463{
4464 char *stub_name;
4465 ssize_t len;
4466
4467 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4468 offsets from a sym as a branch target? In fact, we could
4469 probably assume the addend is always zero. */
4470 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4471
4472 if (h)
4473 {
4474 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4475 stub_name = bfd_malloc (len);
4476 if (stub_name == NULL)
4477 return stub_name;
4478
4479 len = sprintf (stub_name, "%08x.%s+%x",
4480 input_section->id & 0xffffffff,
4481 h->elf.root.root.string,
4482 (int) rel->r_addend & 0xffffffff);
4483 }
4484 else
4485 {
4486 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4487 stub_name = bfd_malloc (len);
4488 if (stub_name == NULL)
4489 return stub_name;
4490
4491 len = sprintf (stub_name, "%08x.%x:%x+%x",
4492 input_section->id & 0xffffffff,
4493 sym_sec->id & 0xffffffff,
4494 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4495 (int) rel->r_addend & 0xffffffff);
4496 }
4497 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
4498 stub_name[len - 2] = 0;
4499 return stub_name;
4500}
4501
4502/* Look up an entry in the stub hash. Stub entries are cached because
4503 creating the stub name takes a bit of time. */
4504
4505static struct ppc_stub_hash_entry *
4506ppc_get_stub_entry (const asection *input_section,
4507 const asection *sym_sec,
4508 struct ppc_link_hash_entry *h,
4509 const Elf_Internal_Rela *rel,
4510 struct ppc_link_hash_table *htab)
4511{
4512 struct ppc_stub_hash_entry *stub_entry;
4513 struct map_stub *group;
4514
4515 /* If this input section is part of a group of sections sharing one
4516 stub section, then use the id of the first section in the group.
4517 Stub names need to include a section id, as there may well be
4518 more than one stub used to reach say, printf, and we need to
4519 distinguish between them. */
4520 group = htab->sec_info[input_section->id].u.group;
4521 if (group == NULL)
4522 return NULL;
4523
4524 if (h != NULL && h->u.stub_cache != NULL
4525 && h->u.stub_cache->h == h
4526 && h->u.stub_cache->group == group)
4527 {
4528 stub_entry = h->u.stub_cache;
4529 }
4530 else
4531 {
4532 char *stub_name;
4533
4534 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
4535 if (stub_name == NULL)
4536 return NULL;
4537
4538 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
4539 stub_name, FALSE, FALSE);
4540 if (h != NULL)
4541 h->u.stub_cache = stub_entry;
4542
4543 free (stub_name);
4544 }
4545
4546 return stub_entry;
4547}
4548
4549/* Add a new stub entry to the stub hash. Not all fields of the new
4550 stub entry are initialised. */
4551
4552static struct ppc_stub_hash_entry *
4553ppc_add_stub (const char *stub_name,
4554 asection *section,
4555 struct bfd_link_info *info)
4556{
4557 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4558 struct map_stub *group;
4559 asection *link_sec;
4560 asection *stub_sec;
4561 struct ppc_stub_hash_entry *stub_entry;
4562
4563 group = htab->sec_info[section->id].u.group;
4564 link_sec = group->link_sec;
4565 stub_sec = group->stub_sec;
4566 if (stub_sec == NULL)
4567 {
4568 size_t namelen;
4569 bfd_size_type len;
4570 char *s_name;
4571
4572 namelen = strlen (link_sec->name);
4573 len = namelen + sizeof (STUB_SUFFIX);
4574 s_name = bfd_alloc (htab->params->stub_bfd, len);
4575 if (s_name == NULL)
4576 return NULL;
4577
4578 memcpy (s_name, link_sec->name, namelen);
4579 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4580 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4581 if (stub_sec == NULL)
4582 return NULL;
4583 group->stub_sec = stub_sec;
4584 }
4585
4586 /* Enter this entry into the linker stub hash table. */
4587 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
4588 TRUE, FALSE);
4589 if (stub_entry == NULL)
4590 {
4591 /* xgettext:c-format */
4592 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
4593 section->owner, stub_name);
4594 return NULL;
4595 }
4596
4597 stub_entry->group = group;
4598 stub_entry->stub_offset = 0;
4599 return stub_entry;
4600}
4601
4602/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4603 not already done. */
4604
4605static bfd_boolean
4606create_got_section (bfd *abfd, struct bfd_link_info *info)
4607{
4608 asection *got, *relgot;
4609 flagword flags;
4610 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4611
4612 if (!is_ppc64_elf (abfd))
4613 return FALSE;
4614 if (htab == NULL)
4615 return FALSE;
4616
4617 if (!htab->elf.sgot
4618 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4619 return FALSE;
4620
4621 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4622 | SEC_LINKER_CREATED);
4623
4624 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4625 if (!got
4626 || !bfd_set_section_alignment (abfd, got, 3))
4627 return FALSE;
4628
4629 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4630 flags | SEC_READONLY);
4631 if (!relgot
4632 || ! bfd_set_section_alignment (abfd, relgot, 3))
4633 return FALSE;
4634
4635 ppc64_elf_tdata (abfd)->got = got;
4636 ppc64_elf_tdata (abfd)->relgot = relgot;
4637 return TRUE;
4638}
4639
4640/* Follow indirect and warning symbol links. */
4641
4642static inline struct bfd_link_hash_entry *
4643follow_link (struct bfd_link_hash_entry *h)
4644{
4645 while (h->type == bfd_link_hash_indirect
4646 || h->type == bfd_link_hash_warning)
4647 h = h->u.i.link;
4648 return h;
4649}
4650
4651static inline struct elf_link_hash_entry *
4652elf_follow_link (struct elf_link_hash_entry *h)
4653{
4654 return (struct elf_link_hash_entry *) follow_link (&h->root);
4655}
4656
4657static inline struct ppc_link_hash_entry *
4658ppc_follow_link (struct ppc_link_hash_entry *h)
4659{
4660 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4661}
4662
4663/* Merge PLT info on FROM with that on TO. */
4664
4665static void
4666move_plt_plist (struct ppc_link_hash_entry *from,
4667 struct ppc_link_hash_entry *to)
4668{
4669 if (from->elf.plt.plist != NULL)
4670 {
4671 if (to->elf.plt.plist != NULL)
4672 {
4673 struct plt_entry **entp;
4674 struct plt_entry *ent;
4675
4676 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4677 {
4678 struct plt_entry *dent;
4679
4680 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4681 if (dent->addend == ent->addend)
4682 {
4683 dent->plt.refcount += ent->plt.refcount;
4684 *entp = ent->next;
4685 break;
4686 }
4687 if (dent == NULL)
4688 entp = &ent->next;
4689 }
4690 *entp = to->elf.plt.plist;
4691 }
4692
4693 to->elf.plt.plist = from->elf.plt.plist;
4694 from->elf.plt.plist = NULL;
4695 }
4696}
4697
4698/* Copy the extra info we tack onto an elf_link_hash_entry. */
4699
4700static void
4701ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4702 struct elf_link_hash_entry *dir,
4703 struct elf_link_hash_entry *ind)
4704{
4705 struct ppc_link_hash_entry *edir, *eind;
4706
4707 edir = (struct ppc_link_hash_entry *) dir;
4708 eind = (struct ppc_link_hash_entry *) ind;
4709
4710 edir->is_func |= eind->is_func;
4711 edir->is_func_descriptor |= eind->is_func_descriptor;
4712 edir->tls_mask |= eind->tls_mask;
4713 if (eind->oh != NULL)
4714 edir->oh = ppc_follow_link (eind->oh);
4715
4716 /* If called to transfer flags for a weakdef during processing
4717 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4718 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4719 if (!(ELIMINATE_COPY_RELOCS
4720 && eind->elf.root.type != bfd_link_hash_indirect
4721 && edir->elf.dynamic_adjusted))
4722 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4723
4724 if (edir->elf.versioned != versioned_hidden)
4725 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4726 edir->elf.ref_regular |= eind->elf.ref_regular;
4727 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4728 edir->elf.needs_plt |= eind->elf.needs_plt;
4729 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
4730
4731 /* If we were called to copy over info for a weak sym, don't copy
4732 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4733 in order to simplify readonly_dynrelocs and save a field in the
4734 symbol hash entry, but that means dyn_relocs can't be used in any
4735 tests about a specific symbol, or affect other symbol flags which
4736 are then tested.
4737 Chain weakdefs so we can get from the weakdef back to an alias.
4738 The list is circular so that we don't need to use u.weakdef as
4739 well as this list to look at all aliases. */
4740 if (eind->elf.root.type != bfd_link_hash_indirect)
4741 {
4742 struct ppc_link_hash_entry *cur, *add, *next;
4743
4744 add = eind;
4745 do
4746 {
4747 cur = edir->weakref;
4748 if (cur != NULL)
4749 {
4750 do
4751 {
4752 /* We can be called twice for the same symbols.
4753 Don't make multiple loops. */
4754 if (cur == add)
4755 return;
4756 cur = cur->weakref;
4757 } while (cur != edir);
4758 }
4759 next = add->weakref;
4760 if (cur != add)
4761 {
4762 add->weakref = edir->weakref != NULL ? edir->weakref : edir;
4763 edir->weakref = add;
4764 }
4765 add = next;
4766 } while (add != NULL && add != eind);
4767 return;
4768 }
4769
4770 /* Copy over any dynamic relocs we may have on the indirect sym. */
4771 if (eind->dyn_relocs != NULL)
4772 {
4773 if (edir->dyn_relocs != NULL)
4774 {
4775 struct elf_dyn_relocs **pp;
4776 struct elf_dyn_relocs *p;
4777
4778 /* Add reloc counts against the indirect sym to the direct sym
4779 list. Merge any entries against the same section. */
4780 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4781 {
4782 struct elf_dyn_relocs *q;
4783
4784 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4785 if (q->sec == p->sec)
4786 {
4787 q->pc_count += p->pc_count;
4788 q->count += p->count;
4789 *pp = p->next;
4790 break;
4791 }
4792 if (q == NULL)
4793 pp = &p->next;
4794 }
4795 *pp = edir->dyn_relocs;
4796 }
4797
4798 edir->dyn_relocs = eind->dyn_relocs;
4799 eind->dyn_relocs = NULL;
4800 }
4801
4802 /* Copy over got entries that we may have already seen to the
4803 symbol which just became indirect. */
4804 if (eind->elf.got.glist != NULL)
4805 {
4806 if (edir->elf.got.glist != NULL)
4807 {
4808 struct got_entry **entp;
4809 struct got_entry *ent;
4810
4811 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4812 {
4813 struct got_entry *dent;
4814
4815 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4816 if (dent->addend == ent->addend
4817 && dent->owner == ent->owner
4818 && dent->tls_type == ent->tls_type)
4819 {
4820 dent->got.refcount += ent->got.refcount;
4821 *entp = ent->next;
4822 break;
4823 }
4824 if (dent == NULL)
4825 entp = &ent->next;
4826 }
4827 *entp = edir->elf.got.glist;
4828 }
4829
4830 edir->elf.got.glist = eind->elf.got.glist;
4831 eind->elf.got.glist = NULL;
4832 }
4833
4834 /* And plt entries. */
4835 move_plt_plist (eind, edir);
4836
4837 if (eind->elf.dynindx != -1)
4838 {
4839 if (edir->elf.dynindx != -1)
4840 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4841 edir->elf.dynstr_index);
4842 edir->elf.dynindx = eind->elf.dynindx;
4843 edir->elf.dynstr_index = eind->elf.dynstr_index;
4844 eind->elf.dynindx = -1;
4845 eind->elf.dynstr_index = 0;
4846 }
4847}
4848
4849/* Find the function descriptor hash entry from the given function code
4850 hash entry FH. Link the entries via their OH fields. */
4851
4852static struct ppc_link_hash_entry *
4853lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4854{
4855 struct ppc_link_hash_entry *fdh = fh->oh;
4856
4857 if (fdh == NULL)
4858 {
4859 const char *fd_name = fh->elf.root.root.string + 1;
4860
4861 fdh = (struct ppc_link_hash_entry *)
4862 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4863 if (fdh == NULL)
4864 return fdh;
4865
4866 fdh->is_func_descriptor = 1;
4867 fdh->oh = fh;
4868 fh->is_func = 1;
4869 fh->oh = fdh;
4870 }
4871
4872 fdh = ppc_follow_link (fdh);
4873 fdh->is_func_descriptor = 1;
4874 fdh->oh = fh;
4875 return fdh;
4876}
4877
4878/* Make a fake function descriptor sym for the undefined code sym FH. */
4879
4880static struct ppc_link_hash_entry *
4881make_fdh (struct bfd_link_info *info,
4882 struct ppc_link_hash_entry *fh)
4883{
4884 bfd *abfd = fh->elf.root.u.undef.abfd;
4885 struct bfd_link_hash_entry *bh = NULL;
4886 struct ppc_link_hash_entry *fdh;
4887 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4888 ? BSF_WEAK
4889 : BSF_GLOBAL);
4890
4891 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4892 fh->elf.root.root.string + 1,
4893 flags, bfd_und_section_ptr, 0,
4894 NULL, FALSE, FALSE, &bh))
4895 return NULL;
4896
4897 fdh = (struct ppc_link_hash_entry *) bh;
4898 fdh->elf.non_elf = 0;
4899 fdh->fake = 1;
4900 fdh->is_func_descriptor = 1;
4901 fdh->oh = fh;
4902 fh->is_func = 1;
4903 fh->oh = fdh;
4904 return fdh;
4905}
4906
4907/* Fix function descriptor symbols defined in .opd sections to be
4908 function type. */
4909
4910static bfd_boolean
4911ppc64_elf_add_symbol_hook (bfd *ibfd,
4912 struct bfd_link_info *info,
4913 Elf_Internal_Sym *isym,
4914 const char **name,
4915 flagword *flags ATTRIBUTE_UNUSED,
4916 asection **sec,
4917 bfd_vma *value)
4918{
4919 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4920 && (ibfd->flags & DYNAMIC) == 0
4921 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
4922 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
4923
4924 if (*sec != NULL
4925 && strcmp ((*sec)->name, ".opd") == 0)
4926 {
4927 asection *code_sec;
4928
4929 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4930 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4931 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4932
4933 /* If the symbol is a function defined in .opd, and the function
4934 code is in a discarded group, let it appear to be undefined. */
4935 if (!bfd_link_relocatable (info)
4936 && (*sec)->reloc_count != 0
4937 && opd_entry_value (*sec, *value, &code_sec, NULL,
4938 FALSE) != (bfd_vma) -1
4939 && discarded_section (code_sec))
4940 {
4941 *sec = bfd_und_section_ptr;
4942 isym->st_shndx = SHN_UNDEF;
4943 }
4944 }
4945 else if (*sec != NULL
4946 && strcmp ((*sec)->name, ".toc") == 0
4947 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4948 {
4949 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4950 if (htab != NULL)
4951 htab->params->object_in_toc = 1;
4952 }
4953
4954 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4955 {
4956 if (abiversion (ibfd) == 0)
4957 set_abiversion (ibfd, 2);
4958 else if (abiversion (ibfd) == 1)
4959 {
4960 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4961 " for ABI version 1\n"), name);
4962 bfd_set_error (bfd_error_bad_value);
4963 return FALSE;
4964 }
4965 }
4966
4967 return TRUE;
4968}
4969
4970/* Merge non-visibility st_other attributes: local entry point. */
4971
4972static void
4973ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4974 const Elf_Internal_Sym *isym,
4975 bfd_boolean definition,
4976 bfd_boolean dynamic)
4977{
4978 if (definition && !dynamic)
4979 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4980 | ELF_ST_VISIBILITY (h->other));
4981}
4982
4983/* Hook called on merging a symbol. We use this to clear "fake" since
4984 we now have a real symbol. */
4985
4986static bfd_boolean
4987ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4988 const Elf_Internal_Sym *isym ATTRIBUTE_UNUSED,
4989 asection **psec ATTRIBUTE_UNUSED,
4990 bfd_boolean newdef ATTRIBUTE_UNUSED,
4991 bfd_boolean olddef ATTRIBUTE_UNUSED,
4992 bfd *oldbfd ATTRIBUTE_UNUSED,
4993 const asection *oldsec ATTRIBUTE_UNUSED)
4994{
4995 ((struct ppc_link_hash_entry *) h)->fake = 0;
4996 return TRUE;
4997}
4998
4999/* This function makes an old ABI object reference to ".bar" cause the
5000 inclusion of a new ABI object archive that defines "bar".
5001 NAME is a symbol defined in an archive. Return a symbol in the hash
5002 table that might be satisfied by the archive symbols. */
5003
5004static struct elf_link_hash_entry *
5005ppc64_elf_archive_symbol_lookup (bfd *abfd,
5006 struct bfd_link_info *info,
5007 const char *name)
5008{
5009 struct elf_link_hash_entry *h;
5010 char *dot_name;
5011 size_t len;
5012
5013 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
5014 if (h != NULL
5015 /* Don't return this sym if it is a fake function descriptor
5016 created by add_symbol_adjust. */
5017 && !((struct ppc_link_hash_entry *) h)->fake)
5018 return h;
5019
5020 if (name[0] == '.')
5021 return h;
5022
5023 len = strlen (name);
5024 dot_name = bfd_alloc (abfd, len + 2);
5025 if (dot_name == NULL)
5026 return (struct elf_link_hash_entry *) 0 - 1;
5027 dot_name[0] = '.';
5028 memcpy (dot_name + 1, name, len + 1);
5029 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5030 bfd_release (abfd, dot_name);
5031 return h;
5032}
5033
5034/* This function satisfies all old ABI object references to ".bar" if a
5035 new ABI object defines "bar". Well, at least, undefined dot symbols
5036 are made weak. This stops later archive searches from including an
5037 object if we already have a function descriptor definition. It also
5038 prevents the linker complaining about undefined symbols.
5039 We also check and correct mismatched symbol visibility here. The
5040 most restrictive visibility of the function descriptor and the
5041 function entry symbol is used. */
5042
5043static bfd_boolean
5044add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
5045{
5046 struct ppc_link_hash_table *htab;
5047 struct ppc_link_hash_entry *fdh;
5048
5049 if (eh->elf.root.type == bfd_link_hash_warning)
5050 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
5051
5052 if (eh->elf.root.type == bfd_link_hash_indirect)
5053 return TRUE;
5054
5055 if (eh->elf.root.root.string[0] != '.')
5056 abort ();
5057
5058 htab = ppc_hash_table (info);
5059 if (htab == NULL)
5060 return FALSE;
5061
5062 fdh = lookup_fdh (eh, htab);
5063 if (fdh == NULL
5064 && !bfd_link_relocatable (info)
5065 && (eh->elf.root.type == bfd_link_hash_undefined
5066 || eh->elf.root.type == bfd_link_hash_undefweak)
5067 && eh->elf.ref_regular)
5068 {
5069 /* Make an undefined function descriptor sym, in order to
5070 pull in an --as-needed shared lib. Archives are handled
5071 elsewhere. */
5072 fdh = make_fdh (info, eh);
5073 if (fdh == NULL)
5074 return FALSE;
5075 }
5076
5077 if (fdh != NULL)
5078 {
5079 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5080 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5081
5082 /* Make both descriptor and entry symbol have the most
5083 constraining visibility of either symbol. */
5084 if (entry_vis < descr_vis)
5085 fdh->elf.other += entry_vis - descr_vis;
5086 else if (entry_vis > descr_vis)
5087 eh->elf.other += descr_vis - entry_vis;
5088
5089 /* Propagate reference flags from entry symbol to function
5090 descriptor symbol. */
5091 fdh->elf.root.non_ir_ref |= eh->elf.root.non_ir_ref;
5092 fdh->elf.ref_regular |= eh->elf.ref_regular;
5093 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
5094
5095 if (!fdh->elf.forced_local
5096 && fdh->elf.dynindx == -1
5097 && fdh->elf.versioned != versioned_hidden
5098 && (bfd_link_dll (info)
5099 || fdh->elf.def_dynamic
5100 || fdh->elf.ref_dynamic)
5101 && (eh->elf.ref_regular
5102 || eh->elf.def_regular))
5103 {
5104 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5105 return FALSE;
5106 }
5107 }
5108
5109 return TRUE;
5110}
5111
5112/* Set up opd section info and abiversion for IBFD, and process list
5113 of dot-symbols we made in link_hash_newfunc. */
5114
5115static bfd_boolean
5116ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
5117{
5118 struct ppc_link_hash_table *htab;
5119 struct ppc_link_hash_entry **p, *eh;
5120 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
5121
5122 if (opd != NULL && opd->size != 0)
5123 {
5124 if (abiversion (ibfd) == 0)
5125 set_abiversion (ibfd, 1);
5126 else if (abiversion (ibfd) >= 2)
5127 {
5128 /* xgettext:c-format */
5129 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5130 " version %d\n"),
5131 ibfd, abiversion (ibfd));
5132 bfd_set_error (bfd_error_bad_value);
5133 return FALSE;
5134 }
5135
5136 if ((ibfd->flags & DYNAMIC) == 0
5137 && (opd->flags & SEC_RELOC) != 0
5138 && opd->reloc_count != 0
5139 && !bfd_is_abs_section (opd->output_section))
5140 {
5141 /* Garbage collection needs some extra help with .opd sections.
5142 We don't want to necessarily keep everything referenced by
5143 relocs in .opd, as that would keep all functions. Instead,
5144 if we reference an .opd symbol (a function descriptor), we
5145 want to keep the function code symbol's section. This is
5146 easy for global symbols, but for local syms we need to keep
5147 information about the associated function section. */
5148 bfd_size_type amt;
5149 asection **opd_sym_map;
5150
5151 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5152 opd_sym_map = bfd_zalloc (ibfd, amt);
5153 if (opd_sym_map == NULL)
5154 return FALSE;
5155 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5156 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5157 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5158 }
5159 }
5160
5161 if (!is_ppc64_elf (info->output_bfd))
5162 return TRUE;
5163 htab = ppc_hash_table (info);
5164 if (htab == NULL)
5165 return FALSE;
5166
5167 /* For input files without an explicit abiversion in e_flags
5168 we should have flagged any with symbol st_other bits set
5169 as ELFv1 and above flagged those with .opd as ELFv2.
5170 Set the output abiversion if not yet set, and for any input
5171 still ambiguous, take its abiversion from the output.
5172 Differences in ABI are reported later. */
5173 if (abiversion (info->output_bfd) == 0)
5174 set_abiversion (info->output_bfd, abiversion (ibfd));
5175 else if (abiversion (ibfd) == 0)
5176 set_abiversion (ibfd, abiversion (info->output_bfd));
5177
5178 p = &htab->dot_syms;
5179 while ((eh = *p) != NULL)
5180 {
5181 *p = NULL;
5182 if (&eh->elf == htab->elf.hgot)
5183 ;
5184 else if (htab->elf.hgot == NULL
5185 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5186 htab->elf.hgot = &eh->elf;
5187 else if (abiversion (ibfd) <= 1)
5188 {
5189 htab->need_func_desc_adj = 1;
5190 if (!add_symbol_adjust (eh, info))
5191 return FALSE;
5192 }
5193 p = &eh->u.next_dot_sym;
5194 }
5195 return TRUE;
5196}
5197
5198/* Undo hash table changes when an --as-needed input file is determined
5199 not to be needed. */
5200
5201static bfd_boolean
5202ppc64_elf_notice_as_needed (bfd *ibfd,
5203 struct bfd_link_info *info,
5204 enum notice_asneeded_action act)
5205{
5206 if (act == notice_not_needed)
5207 {
5208 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5209
5210 if (htab == NULL)
5211 return FALSE;
5212
5213 htab->dot_syms = NULL;
5214 }
5215 return _bfd_elf_notice_as_needed (ibfd, info, act);
5216}
5217
5218/* If --just-symbols against a final linked binary, then assume we need
5219 toc adjusting stubs when calling functions defined there. */
5220
5221static void
5222ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5223{
5224 if ((sec->flags & SEC_CODE) != 0
5225 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5226 && is_ppc64_elf (sec->owner))
5227 {
5228 if (abiversion (sec->owner) >= 2
5229 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
5230 sec->has_toc_reloc = 1;
5231 }
5232 _bfd_elf_link_just_syms (sec, info);
5233}
5234
5235static struct plt_entry **
5236update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5237 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
5238{
5239 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
5240 struct plt_entry **local_plt;
5241 unsigned char *local_got_tls_masks;
5242
5243 if (local_got_ents == NULL)
5244 {
5245 bfd_size_type size = symtab_hdr->sh_info;
5246
5247 size *= (sizeof (*local_got_ents)
5248 + sizeof (*local_plt)
5249 + sizeof (*local_got_tls_masks));
5250 local_got_ents = bfd_zalloc (abfd, size);
5251 if (local_got_ents == NULL)
5252 return NULL;
5253 elf_local_got_ents (abfd) = local_got_ents;
5254 }
5255
5256 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
5257 {
5258 struct got_entry *ent;
5259
5260 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
5261 if (ent->addend == r_addend
5262 && ent->owner == abfd
5263 && ent->tls_type == tls_type)
5264 break;
5265 if (ent == NULL)
5266 {
5267 bfd_size_type amt = sizeof (*ent);
5268 ent = bfd_alloc (abfd, amt);
5269 if (ent == NULL)
5270 return FALSE;
5271 ent->next = local_got_ents[r_symndx];
5272 ent->addend = r_addend;
5273 ent->owner = abfd;
5274 ent->tls_type = tls_type;
5275 ent->is_indirect = FALSE;
5276 ent->got.refcount = 0;
5277 local_got_ents[r_symndx] = ent;
5278 }
5279 ent->got.refcount += 1;
5280 }
5281
5282 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
5283 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
5284 local_got_tls_masks[r_symndx] |= tls_type;
5285
5286 return local_plt + r_symndx;
5287}
5288
5289static bfd_boolean
5290update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
5291{
5292 struct plt_entry *ent;
5293
5294 for (ent = *plist; ent != NULL; ent = ent->next)
5295 if (ent->addend == addend)
5296 break;
5297 if (ent == NULL)
5298 {
5299 bfd_size_type amt = sizeof (*ent);
5300 ent = bfd_alloc (abfd, amt);
5301 if (ent == NULL)
5302 return FALSE;
5303 ent->next = *plist;
5304 ent->addend = addend;
5305 ent->plt.refcount = 0;
5306 *plist = ent;
5307 }
5308 ent->plt.refcount += 1;
5309 return TRUE;
5310}
5311
5312static bfd_boolean
5313is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5314{
5315 return (r_type == R_PPC64_REL24
5316 || r_type == R_PPC64_REL14
5317 || r_type == R_PPC64_REL14_BRTAKEN
5318 || r_type == R_PPC64_REL14_BRNTAKEN
5319 || r_type == R_PPC64_ADDR24
5320 || r_type == R_PPC64_ADDR14
5321 || r_type == R_PPC64_ADDR14_BRTAKEN
5322 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5323}
5324
5325/* Look through the relocs for a section during the first phase, and
5326 calculate needed space in the global offset table, procedure
5327 linkage table, and dynamic reloc sections. */
5328
5329static bfd_boolean
5330ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5331 asection *sec, const Elf_Internal_Rela *relocs)
5332{
5333 struct ppc_link_hash_table *htab;
5334 Elf_Internal_Shdr *symtab_hdr;
5335 struct elf_link_hash_entry **sym_hashes;
5336 const Elf_Internal_Rela *rel;
5337 const Elf_Internal_Rela *rel_end;
5338 asection *sreloc;
5339 asection **opd_sym_map;
5340 struct elf_link_hash_entry *tga, *dottga;
5341
5342 if (bfd_link_relocatable (info))
5343 return TRUE;
5344
5345 /* Don't do anything special with non-loaded, non-alloced sections.
5346 In particular, any relocs in such sections should not affect GOT
5347 and PLT reference counting (ie. we don't allow them to create GOT
5348 or PLT entries), there's no possibility or desire to optimize TLS
5349 relocs, and there's not much point in propagating relocs to shared
5350 libs that the dynamic linker won't relocate. */
5351 if ((sec->flags & SEC_ALLOC) == 0)
5352 return TRUE;
5353
5354 BFD_ASSERT (is_ppc64_elf (abfd));
5355
5356 htab = ppc_hash_table (info);
5357 if (htab == NULL)
5358 return FALSE;
5359
5360 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5361 FALSE, FALSE, TRUE);
5362 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5363 FALSE, FALSE, TRUE);
5364 symtab_hdr = &elf_symtab_hdr (abfd);
5365 sym_hashes = elf_sym_hashes (abfd);
5366 sreloc = NULL;
5367 opd_sym_map = NULL;
5368 if (ppc64_elf_section_data (sec) != NULL
5369 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5370 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5371
5372 rel_end = relocs + sec->reloc_count;
5373 for (rel = relocs; rel < rel_end; rel++)
5374 {
5375 unsigned long r_symndx;
5376 struct elf_link_hash_entry *h;
5377 enum elf_ppc64_reloc_type r_type;
5378 int tls_type;
5379 struct _ppc64_elf_section_data *ppc64_sec;
5380 struct plt_entry **ifunc, **plt_list;
5381
5382 r_symndx = ELF64_R_SYM (rel->r_info);
5383 if (r_symndx < symtab_hdr->sh_info)
5384 h = NULL;
5385 else
5386 {
5387 struct ppc_link_hash_entry *eh;
5388
5389 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5390 h = elf_follow_link (h);
5391 eh = (struct ppc_link_hash_entry *) h;
5392
5393 /* PR15323, ref flags aren't set for references in the same
5394 object. */
5395 h->root.non_ir_ref = 1;
5396 if (eh->is_func && eh->oh != NULL)
5397 eh->oh->elf.root.non_ir_ref = 1;
5398
5399 if (h == htab->elf.hgot)
5400 sec->has_toc_reloc = 1;
5401 }
5402
5403 tls_type = 0;
5404 ifunc = NULL;
5405 if (h != NULL)
5406 {
5407 if (h->type == STT_GNU_IFUNC)
5408 {
5409 h->needs_plt = 1;
5410 ifunc = &h->plt.plist;
5411 }
5412 }
5413 else
5414 {
5415 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5416 abfd, r_symndx);
5417 if (isym == NULL)
5418 return FALSE;
5419
5420 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5421 {
5422 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5423 rel->r_addend, PLT_IFUNC);
5424 if (ifunc == NULL)
5425 return FALSE;
5426 }
5427 }
5428
5429 r_type = ELF64_R_TYPE (rel->r_info);
5430 switch (r_type)
5431 {
5432 case R_PPC64_TLSGD:
5433 case R_PPC64_TLSLD:
5434 /* These special tls relocs tie a call to __tls_get_addr with
5435 its parameter symbol. */
5436 break;
5437
5438 case R_PPC64_GOT_TLSLD16:
5439 case R_PPC64_GOT_TLSLD16_LO:
5440 case R_PPC64_GOT_TLSLD16_HI:
5441 case R_PPC64_GOT_TLSLD16_HA:
5442 tls_type = TLS_TLS | TLS_LD;
5443 goto dogottls;
5444
5445 case R_PPC64_GOT_TLSGD16:
5446 case R_PPC64_GOT_TLSGD16_LO:
5447 case R_PPC64_GOT_TLSGD16_HI:
5448 case R_PPC64_GOT_TLSGD16_HA:
5449 tls_type = TLS_TLS | TLS_GD;
5450 goto dogottls;
5451
5452 case R_PPC64_GOT_TPREL16_DS:
5453 case R_PPC64_GOT_TPREL16_LO_DS:
5454 case R_PPC64_GOT_TPREL16_HI:
5455 case R_PPC64_GOT_TPREL16_HA:
5456 if (bfd_link_pic (info))
5457 info->flags |= DF_STATIC_TLS;
5458 tls_type = TLS_TLS | TLS_TPREL;
5459 goto dogottls;
5460
5461 case R_PPC64_GOT_DTPREL16_DS:
5462 case R_PPC64_GOT_DTPREL16_LO_DS:
5463 case R_PPC64_GOT_DTPREL16_HI:
5464 case R_PPC64_GOT_DTPREL16_HA:
5465 tls_type = TLS_TLS | TLS_DTPREL;
5466 dogottls:
5467 sec->has_tls_reloc = 1;
5468 /* Fall through */
5469
5470 case R_PPC64_GOT16:
5471 case R_PPC64_GOT16_DS:
5472 case R_PPC64_GOT16_HA:
5473 case R_PPC64_GOT16_HI:
5474 case R_PPC64_GOT16_LO:
5475 case R_PPC64_GOT16_LO_DS:
5476 /* This symbol requires a global offset table entry. */
5477 sec->has_toc_reloc = 1;
5478 if (r_type == R_PPC64_GOT_TLSLD16
5479 || r_type == R_PPC64_GOT_TLSGD16
5480 || r_type == R_PPC64_GOT_TPREL16_DS
5481 || r_type == R_PPC64_GOT_DTPREL16_DS
5482 || r_type == R_PPC64_GOT16
5483 || r_type == R_PPC64_GOT16_DS)
5484 {
5485 htab->do_multi_toc = 1;
5486 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5487 }
5488
5489 if (ppc64_elf_tdata (abfd)->got == NULL
5490 && !create_got_section (abfd, info))
5491 return FALSE;
5492
5493 if (h != NULL)
5494 {
5495 struct ppc_link_hash_entry *eh;
5496 struct got_entry *ent;
5497
5498 eh = (struct ppc_link_hash_entry *) h;
5499 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5500 if (ent->addend == rel->r_addend
5501 && ent->owner == abfd
5502 && ent->tls_type == tls_type)
5503 break;
5504 if (ent == NULL)
5505 {
5506 bfd_size_type amt = sizeof (*ent);
5507 ent = bfd_alloc (abfd, amt);
5508 if (ent == NULL)
5509 return FALSE;
5510 ent->next = eh->elf.got.glist;
5511 ent->addend = rel->r_addend;
5512 ent->owner = abfd;
5513 ent->tls_type = tls_type;
5514 ent->is_indirect = FALSE;
5515 ent->got.refcount = 0;
5516 eh->elf.got.glist = ent;
5517 }
5518 ent->got.refcount += 1;
5519 eh->tls_mask |= tls_type;
5520 }
5521 else
5522 /* This is a global offset table entry for a local symbol. */
5523 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5524 rel->r_addend, tls_type))
5525 return FALSE;
5526
5527 /* We may also need a plt entry if the symbol turns out to be
5528 an ifunc. */
5529 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
5530 {
5531 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5532 return FALSE;
5533 }
5534 break;
5535
5536 case R_PPC64_PLT16_HA:
5537 case R_PPC64_PLT16_HI:
5538 case R_PPC64_PLT16_LO:
5539 case R_PPC64_PLT32:
5540 case R_PPC64_PLT64:
5541 /* This symbol requires a procedure linkage table entry. */
5542 plt_list = ifunc;
5543 if (h != NULL)
5544 {
5545 h->needs_plt = 1;
5546 if (h->root.root.string[0] == '.'
5547 && h->root.root.string[1] != '\0')
5548 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5549 plt_list = &h->plt.plist;
5550 }
5551 if (plt_list == NULL)
5552 {
5553 /* It does not make sense to have a procedure linkage
5554 table entry for a non-ifunc local symbol. */
5555 info->callbacks->einfo
5556 /* xgettext:c-format */
5557 (_("%P: %H: %s reloc against local symbol\n"),
5558 abfd, sec, rel->r_offset,
5559 ppc64_elf_howto_table[r_type]->name);
5560 bfd_set_error (bfd_error_bad_value);
5561 return FALSE;
5562 }
5563 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5564 return FALSE;
5565 break;
5566
5567 /* The following relocations don't need to propagate the
5568 relocation if linking a shared object since they are
5569 section relative. */
5570 case R_PPC64_SECTOFF:
5571 case R_PPC64_SECTOFF_LO:
5572 case R_PPC64_SECTOFF_HI:
5573 case R_PPC64_SECTOFF_HA:
5574 case R_PPC64_SECTOFF_DS:
5575 case R_PPC64_SECTOFF_LO_DS:
5576 case R_PPC64_DTPREL16:
5577 case R_PPC64_DTPREL16_LO:
5578 case R_PPC64_DTPREL16_HI:
5579 case R_PPC64_DTPREL16_HA:
5580 case R_PPC64_DTPREL16_DS:
5581 case R_PPC64_DTPREL16_LO_DS:
5582 case R_PPC64_DTPREL16_HIGH:
5583 case R_PPC64_DTPREL16_HIGHA:
5584 case R_PPC64_DTPREL16_HIGHER:
5585 case R_PPC64_DTPREL16_HIGHERA:
5586 case R_PPC64_DTPREL16_HIGHEST:
5587 case R_PPC64_DTPREL16_HIGHESTA:
5588 break;
5589
5590 /* Nor do these. */
5591 case R_PPC64_REL16:
5592 case R_PPC64_REL16_LO:
5593 case R_PPC64_REL16_HI:
5594 case R_PPC64_REL16_HA:
5595 case R_PPC64_REL16DX_HA:
5596 break;
5597
5598 /* Not supported as a dynamic relocation. */
5599 case R_PPC64_ADDR64_LOCAL:
5600 if (bfd_link_pic (info))
5601 {
5602 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5603 ppc_howto_init ();
5604 /* xgettext:c-format */
5605 info->callbacks->einfo (_("%P: %H: %s reloc unsupported "
5606 "in shared libraries and PIEs.\n"),
5607 abfd, sec, rel->r_offset,
5608 ppc64_elf_howto_table[r_type]->name);
5609 bfd_set_error (bfd_error_bad_value);
5610 return FALSE;
5611 }
5612 break;
5613
5614 case R_PPC64_TOC16:
5615 case R_PPC64_TOC16_DS:
5616 htab->do_multi_toc = 1;
5617 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5618 /* Fall through. */
5619 case R_PPC64_TOC16_LO:
5620 case R_PPC64_TOC16_HI:
5621 case R_PPC64_TOC16_HA:
5622 case R_PPC64_TOC16_LO_DS:
5623 sec->has_toc_reloc = 1;
5624 break;
5625
5626 /* Marker reloc. */
5627 case R_PPC64_ENTRY:
5628 break;
5629
5630 /* This relocation describes the C++ object vtable hierarchy.
5631 Reconstruct it for later use during GC. */
5632 case R_PPC64_GNU_VTINHERIT:
5633 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5634 return FALSE;
5635 break;
5636
5637 /* This relocation describes which C++ vtable entries are actually
5638 used. Record for later use during GC. */
5639 case R_PPC64_GNU_VTENTRY:
5640 BFD_ASSERT (h != NULL);
5641 if (h != NULL
5642 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5643 return FALSE;
5644 break;
5645
5646 case R_PPC64_REL14:
5647 case R_PPC64_REL14_BRTAKEN:
5648 case R_PPC64_REL14_BRNTAKEN:
5649 {
5650 asection *dest = NULL;
5651
5652 /* Heuristic: If jumping outside our section, chances are
5653 we are going to need a stub. */
5654 if (h != NULL)
5655 {
5656 /* If the sym is weak it may be overridden later, so
5657 don't assume we know where a weak sym lives. */
5658 if (h->root.type == bfd_link_hash_defined)
5659 dest = h->root.u.def.section;
5660 }
5661 else
5662 {
5663 Elf_Internal_Sym *isym;
5664
5665 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5666 abfd, r_symndx);
5667 if (isym == NULL)
5668 return FALSE;
5669
5670 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5671 }
5672
5673 if (dest != sec)
5674 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
5675 }
5676 /* Fall through. */
5677
5678 case R_PPC64_REL24:
5679 plt_list = ifunc;
5680 if (h != NULL)
5681 {
5682 h->needs_plt = 1;
5683 if (h->root.root.string[0] == '.'
5684 && h->root.root.string[1] != '\0')
5685 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5686
5687 if (h == tga || h == dottga)
5688 {
5689 sec->has_tls_reloc = 1;
5690 if (rel != relocs
5691 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5692 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5693 /* We have a new-style __tls_get_addr call with
5694 a marker reloc. */
5695 ;
5696 else
5697 /* Mark this section as having an old-style call. */
5698 sec->has_tls_get_addr_call = 1;
5699 }
5700 plt_list = &h->plt.plist;
5701 }
5702
5703 /* We may need a .plt entry if the function this reloc
5704 refers to is in a shared lib. */
5705 if (plt_list
5706 && !update_plt_info (abfd, plt_list, rel->r_addend))
5707 return FALSE;
5708 break;
5709
5710 case R_PPC64_ADDR14:
5711 case R_PPC64_ADDR14_BRNTAKEN:
5712 case R_PPC64_ADDR14_BRTAKEN:
5713 case R_PPC64_ADDR24:
5714 goto dodyn;
5715
5716 case R_PPC64_TPREL64:
5717 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
5718 if (bfd_link_pic (info))
5719 info->flags |= DF_STATIC_TLS;
5720 goto dotlstoc;
5721
5722 case R_PPC64_DTPMOD64:
5723 if (rel + 1 < rel_end
5724 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5725 && rel[1].r_offset == rel->r_offset + 8)
5726 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
5727 else
5728 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
5729 goto dotlstoc;
5730
5731 case R_PPC64_DTPREL64:
5732 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5733 if (rel != relocs
5734 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5735 && rel[-1].r_offset == rel->r_offset - 8)
5736 /* This is the second reloc of a dtpmod, dtprel pair.
5737 Don't mark with TLS_DTPREL. */
5738 goto dodyn;
5739
5740 dotlstoc:
5741 sec->has_tls_reloc = 1;
5742 if (h != NULL)
5743 {
5744 struct ppc_link_hash_entry *eh;
5745 eh = (struct ppc_link_hash_entry *) h;
5746 eh->tls_mask |= tls_type;
5747 }
5748 else
5749 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5750 rel->r_addend, tls_type))
5751 return FALSE;
5752
5753 ppc64_sec = ppc64_elf_section_data (sec);
5754 if (ppc64_sec->sec_type != sec_toc)
5755 {
5756 bfd_size_type amt;
5757
5758 /* One extra to simplify get_tls_mask. */
5759 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5760 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5761 if (ppc64_sec->u.toc.symndx == NULL)
5762 return FALSE;
5763 amt = sec->size * sizeof (bfd_vma) / 8;
5764 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5765 if (ppc64_sec->u.toc.add == NULL)
5766 return FALSE;
5767 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5768 ppc64_sec->sec_type = sec_toc;
5769 }
5770 BFD_ASSERT (rel->r_offset % 8 == 0);
5771 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5772 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5773
5774 /* Mark the second slot of a GD or LD entry.
5775 -1 to indicate GD and -2 to indicate LD. */
5776 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5777 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5778 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5779 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5780 goto dodyn;
5781
5782 case R_PPC64_TPREL16:
5783 case R_PPC64_TPREL16_LO:
5784 case R_PPC64_TPREL16_HI:
5785 case R_PPC64_TPREL16_HA:
5786 case R_PPC64_TPREL16_DS:
5787 case R_PPC64_TPREL16_LO_DS:
5788 case R_PPC64_TPREL16_HIGH:
5789 case R_PPC64_TPREL16_HIGHA:
5790 case R_PPC64_TPREL16_HIGHER:
5791 case R_PPC64_TPREL16_HIGHERA:
5792 case R_PPC64_TPREL16_HIGHEST:
5793 case R_PPC64_TPREL16_HIGHESTA:
5794 if (bfd_link_pic (info))
5795 {
5796 info->flags |= DF_STATIC_TLS;
5797 goto dodyn;
5798 }
5799 break;
5800
5801 case R_PPC64_ADDR64:
5802 if (opd_sym_map != NULL
5803 && rel + 1 < rel_end
5804 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5805 {
5806 if (h != NULL)
5807 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5808 else
5809 {
5810 asection *s;
5811 Elf_Internal_Sym *isym;
5812
5813 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5814 abfd, r_symndx);
5815 if (isym == NULL)
5816 return FALSE;
5817
5818 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5819 if (s != NULL && s != sec)
5820 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5821 }
5822 }
5823 /* Fall through. */
5824
5825 case R_PPC64_ADDR16:
5826 case R_PPC64_ADDR16_DS:
5827 case R_PPC64_ADDR16_HA:
5828 case R_PPC64_ADDR16_HI:
5829 case R_PPC64_ADDR16_HIGH:
5830 case R_PPC64_ADDR16_HIGHA:
5831 case R_PPC64_ADDR16_HIGHER:
5832 case R_PPC64_ADDR16_HIGHERA:
5833 case R_PPC64_ADDR16_HIGHEST:
5834 case R_PPC64_ADDR16_HIGHESTA:
5835 case R_PPC64_ADDR16_LO:
5836 case R_PPC64_ADDR16_LO_DS:
5837 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5838 && rel->r_addend == 0)
5839 {
5840 /* We may need a .plt entry if this reloc refers to a
5841 function in a shared lib. */
5842 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5843 return FALSE;
5844 h->pointer_equality_needed = 1;
5845 }
5846 /* Fall through. */
5847
5848 case R_PPC64_REL30:
5849 case R_PPC64_REL32:
5850 case R_PPC64_REL64:
5851 case R_PPC64_ADDR32:
5852 case R_PPC64_UADDR16:
5853 case R_PPC64_UADDR32:
5854 case R_PPC64_UADDR64:
5855 case R_PPC64_TOC:
5856 if (h != NULL && !bfd_link_pic (info))
5857 /* We may need a copy reloc. */
5858 h->non_got_ref = 1;
5859
5860 /* Don't propagate .opd relocs. */
5861 if (NO_OPD_RELOCS && opd_sym_map != NULL)
5862 break;
5863
5864 /* If we are creating a shared library, and this is a reloc
5865 against a global symbol, or a non PC relative reloc
5866 against a local symbol, then we need to copy the reloc
5867 into the shared library. However, if we are linking with
5868 -Bsymbolic, we do not need to copy a reloc against a
5869 global symbol which is defined in an object we are
5870 including in the link (i.e., DEF_REGULAR is set). At
5871 this point we have not seen all the input files, so it is
5872 possible that DEF_REGULAR is not set now but will be set
5873 later (it is never cleared). In case of a weak definition,
5874 DEF_REGULAR may be cleared later by a strong definition in
5875 a shared library. We account for that possibility below by
5876 storing information in the dyn_relocs field of the hash
5877 table entry. A similar situation occurs when creating
5878 shared libraries and symbol visibility changes render the
5879 symbol local.
5880
5881 If on the other hand, we are creating an executable, we
5882 may need to keep relocations for symbols satisfied by a
5883 dynamic library if we manage to avoid copy relocs for the
5884 symbol. */
5885 dodyn:
5886 if ((bfd_link_pic (info)
5887 && (must_be_dyn_reloc (info, r_type)
5888 || (h != NULL
5889 && (!SYMBOLIC_BIND (info, h)
5890 || h->root.type == bfd_link_hash_defweak
5891 || !h->def_regular))))
5892 || (ELIMINATE_COPY_RELOCS
5893 && !bfd_link_pic (info)
5894 && h != NULL
5895 && (h->root.type == bfd_link_hash_defweak
5896 || !h->def_regular))
5897 || (!bfd_link_pic (info)
5898 && ifunc != NULL))
5899 {
5900 /* We must copy these reloc types into the output file.
5901 Create a reloc section in dynobj and make room for
5902 this reloc. */
5903 if (sreloc == NULL)
5904 {
5905 sreloc = _bfd_elf_make_dynamic_reloc_section
5906 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5907
5908 if (sreloc == NULL)
5909 return FALSE;
5910 }
5911
5912 /* If this is a global symbol, we count the number of
5913 relocations we need for this symbol. */
5914 if (h != NULL)
5915 {
5916 struct elf_dyn_relocs *p;
5917 struct elf_dyn_relocs **head;
5918
5919 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5920 p = *head;
5921 if (p == NULL || p->sec != sec)
5922 {
5923 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5924 if (p == NULL)
5925 return FALSE;
5926 p->next = *head;
5927 *head = p;
5928 p->sec = sec;
5929 p->count = 0;
5930 p->pc_count = 0;
5931 }
5932 p->count += 1;
5933 if (!must_be_dyn_reloc (info, r_type))
5934 p->pc_count += 1;
5935 }
5936 else
5937 {
5938 /* Track dynamic relocs needed for local syms too.
5939 We really need local syms available to do this
5940 easily. Oh well. */
5941 struct ppc_dyn_relocs *p;
5942 struct ppc_dyn_relocs **head;
5943 bfd_boolean is_ifunc;
5944 asection *s;
5945 void *vpp;
5946 Elf_Internal_Sym *isym;
5947
5948 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5949 abfd, r_symndx);
5950 if (isym == NULL)
5951 return FALSE;
5952
5953 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5954 if (s == NULL)
5955 s = sec;
5956
5957 vpp = &elf_section_data (s)->local_dynrel;
5958 head = (struct ppc_dyn_relocs **) vpp;
5959 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5960 p = *head;
5961 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5962 p = p->next;
5963 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5964 {
5965 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5966 if (p == NULL)
5967 return FALSE;
5968 p->next = *head;
5969 *head = p;
5970 p->sec = sec;
5971 p->ifunc = is_ifunc;
5972 p->count = 0;
5973 }
5974 p->count += 1;
5975 }
5976 }
5977 break;
5978
5979 default:
5980 break;
5981 }
5982 }
5983
5984 return TRUE;
5985}
5986
5987/* Merge backend specific data from an object file to the output
5988 object file when linking. */
5989
5990static bfd_boolean
5991ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5992{
5993 bfd *obfd = info->output_bfd;
5994 unsigned long iflags, oflags;
5995
5996 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5997 return TRUE;
5998
5999 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
6000 return TRUE;
6001
6002 if (!_bfd_generic_verify_endian_match (ibfd, info))
6003 return FALSE;
6004
6005 iflags = elf_elfheader (ibfd)->e_flags;
6006 oflags = elf_elfheader (obfd)->e_flags;
6007
6008 if (iflags & ~EF_PPC64_ABI)
6009 {
6010 _bfd_error_handler
6011 /* xgettext:c-format */
6012 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
6013 bfd_set_error (bfd_error_bad_value);
6014 return FALSE;
6015 }
6016 else if (iflags != oflags && iflags != 0)
6017 {
6018 _bfd_error_handler
6019 /* xgettext:c-format */
6020 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
6021 ibfd, iflags, oflags);
6022 bfd_set_error (bfd_error_bad_value);
6023 return FALSE;
6024 }
6025
6026 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
6027
6028 /* Merge Tag_compatibility attributes and any common GNU ones. */
6029 _bfd_elf_merge_object_attributes (ibfd, info);
6030
6031 return TRUE;
6032}
6033
6034static bfd_boolean
6035ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6036{
6037 /* Print normal ELF private data. */
6038 _bfd_elf_print_private_bfd_data (abfd, ptr);
6039
6040 if (elf_elfheader (abfd)->e_flags != 0)
6041 {
6042 FILE *file = ptr;
6043
6044 fprintf (file, _("private flags = 0x%lx:"),
6045 elf_elfheader (abfd)->e_flags);
6046
6047 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6048 fprintf (file, _(" [abiv%ld]"),
6049 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6050 fputc ('\n', file);
6051 }
6052
6053 return TRUE;
6054}
6055
6056/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
6057 of the code entry point, and its section, which must be in the same
6058 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
6059
6060static bfd_vma
6061opd_entry_value (asection *opd_sec,
6062 bfd_vma offset,
6063 asection **code_sec,
6064 bfd_vma *code_off,
6065 bfd_boolean in_code_sec)
6066{
6067 bfd *opd_bfd = opd_sec->owner;
6068 Elf_Internal_Rela *relocs;
6069 Elf_Internal_Rela *lo, *hi, *look;
6070 bfd_vma val;
6071
6072 /* No relocs implies we are linking a --just-symbols object, or looking
6073 at a final linked executable with addr2line or somesuch. */
6074 if (opd_sec->reloc_count == 0)
6075 {
6076 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
6077
6078 if (contents == NULL)
6079 {
6080 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6081 return (bfd_vma) -1;
6082 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6083 }
6084
6085 /* PR 17512: file: 64b9dfbb. */
6086 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
6087 return (bfd_vma) -1;
6088
6089 val = bfd_get_64 (opd_bfd, contents + offset);
6090 if (code_sec != NULL)
6091 {
6092 asection *sec, *likely = NULL;
6093
6094 if (in_code_sec)
6095 {
6096 sec = *code_sec;
6097 if (sec->vma <= val
6098 && val < sec->vma + sec->size)
6099 likely = sec;
6100 else
6101 val = -1;
6102 }
6103 else
6104 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6105 if (sec->vma <= val
6106 && (sec->flags & SEC_LOAD) != 0
6107 && (sec->flags & SEC_ALLOC) != 0)
6108 likely = sec;
6109 if (likely != NULL)
6110 {
6111 *code_sec = likely;
6112 if (code_off != NULL)
6113 *code_off = val - likely->vma;
6114 }
6115 }
6116 return val;
6117 }
6118
6119 BFD_ASSERT (is_ppc64_elf (opd_bfd));
6120
6121 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
6122 if (relocs == NULL)
6123 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
6124 /* PR 17512: file: df8e1fd6. */
6125 if (relocs == NULL)
6126 return (bfd_vma) -1;
6127
6128 /* Go find the opd reloc at the sym address. */
6129 lo = relocs;
6130 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
6131 val = (bfd_vma) -1;
6132 while (lo < hi)
6133 {
6134 look = lo + (hi - lo) / 2;
6135 if (look->r_offset < offset)
6136 lo = look + 1;
6137 else if (look->r_offset > offset)
6138 hi = look;
6139 else
6140 {
6141 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6142
6143 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6144 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6145 {
6146 unsigned long symndx = ELF64_R_SYM (look->r_info);
6147 asection *sec = NULL;
6148
6149 if (symndx >= symtab_hdr->sh_info
6150 && elf_sym_hashes (opd_bfd) != NULL)
6151 {
6152 struct elf_link_hash_entry **sym_hashes;
6153 struct elf_link_hash_entry *rh;
6154
6155 sym_hashes = elf_sym_hashes (opd_bfd);
6156 rh = sym_hashes[symndx - symtab_hdr->sh_info];
6157 if (rh != NULL)
6158 {
6159 rh = elf_follow_link (rh);
6160 if (rh->root.type != bfd_link_hash_defined
6161 && rh->root.type != bfd_link_hash_defweak)
6162 break;
6163 if (rh->root.u.def.section->owner == opd_bfd)
6164 {
6165 val = rh->root.u.def.value;
6166 sec = rh->root.u.def.section;
6167 }
6168 }
6169 }
6170
6171 if (sec == NULL)
6172 {
6173 Elf_Internal_Sym *sym;
6174
6175 if (symndx < symtab_hdr->sh_info)
6176 {
6177 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6178 if (sym == NULL)
6179 {
6180 size_t symcnt = symtab_hdr->sh_info;
6181 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6182 symcnt, 0,
6183 NULL, NULL, NULL);
6184 if (sym == NULL)
6185 break;
6186 symtab_hdr->contents = (bfd_byte *) sym;
6187 }
6188 sym += symndx;
6189 }
6190 else
6191 {
6192 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6193 1, symndx,
6194 NULL, NULL, NULL);
6195 if (sym == NULL)
6196 break;
6197 }
6198 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6199 if (sec == NULL)
6200 break;
6201 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6202 val = sym->st_value;
6203 }
6204
6205 val += look->r_addend;
6206 if (code_off != NULL)
6207 *code_off = val;
6208 if (code_sec != NULL)
6209 {
6210 if (in_code_sec && *code_sec != sec)
6211 return -1;
6212 else
6213 *code_sec = sec;
6214 }
6215 if (sec->output_section != NULL)
6216 val += sec->output_section->vma + sec->output_offset;
6217 }
6218 break;
6219 }
6220 }
6221
6222 return val;
6223}
6224
6225/* If the ELF symbol SYM might be a function in SEC, return the
6226 function size and set *CODE_OFF to the function's entry point,
6227 otherwise return zero. */
6228
6229static bfd_size_type
6230ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6231 bfd_vma *code_off)
6232{
6233 bfd_size_type size;
6234
6235 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6236 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6237 return 0;
6238
6239 size = 0;
6240 if (!(sym->flags & BSF_SYNTHETIC))
6241 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6242
6243 if (strcmp (sym->section->name, ".opd") == 0)
6244 {
6245 struct _opd_sec_data *opd = get_opd_info (sym->section);
6246 bfd_vma symval = sym->value;
6247
6248 if (opd != NULL
6249 && opd->adjust != NULL
6250 && elf_section_data (sym->section)->relocs != NULL)
6251 {
6252 /* opd_entry_value will use cached relocs that have been
6253 adjusted, but with raw symbols. That means both local
6254 and global symbols need adjusting. */
6255 long adjust = opd->adjust[OPD_NDX (symval)];
6256 if (adjust == -1)
6257 return 0;
6258 symval += adjust;
6259 }
6260
6261 if (opd_entry_value (sym->section, symval,
6262 &sec, code_off, TRUE) == (bfd_vma) -1)
6263 return 0;
6264 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6265 symbol. This size has nothing to do with the code size of the
6266 function, which is what we're supposed to return, but the
6267 code size isn't available without looking up the dot-sym.
6268 However, doing that would be a waste of time particularly
6269 since elf_find_function will look at the dot-sym anyway.
6270 Now, elf_find_function will keep the largest size of any
6271 function sym found at the code address of interest, so return
6272 1 here to avoid it incorrectly caching a larger function size
6273 for a small function. This does mean we return the wrong
6274 size for a new-ABI function of size 24, but all that does is
6275 disable caching for such functions. */
6276 if (size == 24)
6277 size = 1;
6278 }
6279 else
6280 {
6281 if (sym->section != sec)
6282 return 0;
6283 *code_off = sym->value;
6284 }
6285 if (size == 0)
6286 size = 1;
6287 return size;
6288}
6289
6290/* Return true if symbol is defined in a regular object file. */
6291
6292static bfd_boolean
6293is_static_defined (struct elf_link_hash_entry *h)
6294{
6295 return ((h->root.type == bfd_link_hash_defined
6296 || h->root.type == bfd_link_hash_defweak)
6297 && h->root.u.def.section != NULL
6298 && h->root.u.def.section->output_section != NULL);
6299}
6300
6301/* If FDH is a function descriptor symbol, return the associated code
6302 entry symbol if it is defined. Return NULL otherwise. */
6303
6304static struct ppc_link_hash_entry *
6305defined_code_entry (struct ppc_link_hash_entry *fdh)
6306{
6307 if (fdh->is_func_descriptor)
6308 {
6309 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6310 if (fh->elf.root.type == bfd_link_hash_defined
6311 || fh->elf.root.type == bfd_link_hash_defweak)
6312 return fh;
6313 }
6314 return NULL;
6315}
6316
6317/* If FH is a function code entry symbol, return the associated
6318 function descriptor symbol if it is defined. Return NULL otherwise. */
6319
6320static struct ppc_link_hash_entry *
6321defined_func_desc (struct ppc_link_hash_entry *fh)
6322{
6323 if (fh->oh != NULL
6324 && fh->oh->is_func_descriptor)
6325 {
6326 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6327 if (fdh->elf.root.type == bfd_link_hash_defined
6328 || fdh->elf.root.type == bfd_link_hash_defweak)
6329 return fdh;
6330 }
6331 return NULL;
6332}
6333
6334static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
6335
6336/* Garbage collect sections, after first dealing with dot-symbols. */
6337
6338static bfd_boolean
6339ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
6340{
6341 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6342
6343 if (htab != NULL && htab->need_func_desc_adj)
6344 {
6345 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6346 htab->need_func_desc_adj = 0;
6347 }
6348 return bfd_elf_gc_sections (abfd, info);
6349}
6350
6351/* Mark all our entry sym sections, both opd and code section. */
6352
6353static void
6354ppc64_elf_gc_keep (struct bfd_link_info *info)
6355{
6356 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6357 struct bfd_sym_chain *sym;
6358
6359 if (htab == NULL)
6360 return;
6361
6362 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6363 {
6364 struct ppc_link_hash_entry *eh, *fh;
6365 asection *sec;
6366
6367 eh = (struct ppc_link_hash_entry *)
6368 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
6369 if (eh == NULL)
6370 continue;
6371 if (eh->elf.root.type != bfd_link_hash_defined
6372 && eh->elf.root.type != bfd_link_hash_defweak)
6373 continue;
6374
6375 fh = defined_code_entry (eh);
6376 if (fh != NULL)
6377 {
6378 sec = fh->elf.root.u.def.section;
6379 sec->flags |= SEC_KEEP;
6380 }
6381 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6382 && opd_entry_value (eh->elf.root.u.def.section,
6383 eh->elf.root.u.def.value,
6384 &sec, NULL, FALSE) != (bfd_vma) -1)
6385 sec->flags |= SEC_KEEP;
6386
6387 sec = eh->elf.root.u.def.section;
6388 sec->flags |= SEC_KEEP;
6389 }
6390}
6391
6392/* Mark sections containing dynamically referenced symbols. When
6393 building shared libraries, we must assume that any visible symbol is
6394 referenced. */
6395
6396static bfd_boolean
6397ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6398{
6399 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6400 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
6401 struct ppc_link_hash_entry *fdh;
6402 struct bfd_elf_dynamic_list *d = info->dynamic_list;
6403
6404 /* Dynamic linking info is on the func descriptor sym. */
6405 fdh = defined_func_desc (eh);
6406 if (fdh != NULL)
6407 eh = fdh;
6408
6409 if ((eh->elf.root.type == bfd_link_hash_defined
6410 || eh->elf.root.type == bfd_link_hash_defweak)
6411 && (eh->elf.ref_dynamic
6412 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
6413 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
6414 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
6415 && (!bfd_link_executable (info)
6416 || info->export_dynamic
6417 || (eh->elf.dynamic
6418 && d != NULL
6419 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
6420 && (strchr (eh->elf.root.root.string, ELF_VER_CHR) != NULL
6421 || !bfd_hide_sym_by_version (info->version_info,
6422 eh->elf.root.root.string)))))
6423 {
6424 asection *code_sec;
6425 struct ppc_link_hash_entry *fh;
6426
6427 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6428
6429 /* Function descriptor syms cause the associated
6430 function code sym section to be marked. */
6431 fh = defined_code_entry (eh);
6432 if (fh != NULL)
6433 {
6434 code_sec = fh->elf.root.u.def.section;
6435 code_sec->flags |= SEC_KEEP;
6436 }
6437 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6438 && opd_entry_value (eh->elf.root.u.def.section,
6439 eh->elf.root.u.def.value,
6440 &code_sec, NULL, FALSE) != (bfd_vma) -1)
6441 code_sec->flags |= SEC_KEEP;
6442 }
6443
6444 return TRUE;
6445}
6446
6447/* Return the section that should be marked against GC for a given
6448 relocation. */
6449
6450static asection *
6451ppc64_elf_gc_mark_hook (asection *sec,
6452 struct bfd_link_info *info,
6453 Elf_Internal_Rela *rel,
6454 struct elf_link_hash_entry *h,
6455 Elf_Internal_Sym *sym)
6456{
6457 asection *rsec;
6458
6459 /* Syms return NULL if we're marking .opd, so we avoid marking all
6460 function sections, as all functions are referenced in .opd. */
6461 rsec = NULL;
6462 if (get_opd_info (sec) != NULL)
6463 return rsec;
6464
6465 if (h != NULL)
6466 {
6467 enum elf_ppc64_reloc_type r_type;
6468 struct ppc_link_hash_entry *eh, *fh, *fdh;
6469
6470 r_type = ELF64_R_TYPE (rel->r_info);
6471 switch (r_type)
6472 {
6473 case R_PPC64_GNU_VTINHERIT:
6474 case R_PPC64_GNU_VTENTRY:
6475 break;
6476
6477 default:
6478 switch (h->root.type)
6479 {
6480 case bfd_link_hash_defined:
6481 case bfd_link_hash_defweak:
6482 eh = (struct ppc_link_hash_entry *) h;
6483 fdh = defined_func_desc (eh);
6484 if (fdh != NULL)
6485 {
6486 /* -mcall-aixdesc code references the dot-symbol on
6487 a call reloc. Mark the function descriptor too
6488 against garbage collection. */
6489 fdh->elf.mark = 1;
6490 if (fdh->elf.u.weakdef != NULL)
6491 fdh->elf.u.weakdef->mark = 1;
6492 eh = fdh;
6493 }
6494
6495 /* Function descriptor syms cause the associated
6496 function code sym section to be marked. */
6497 fh = defined_code_entry (eh);
6498 if (fh != NULL)
6499 {
6500 /* They also mark their opd section. */
6501 eh->elf.root.u.def.section->gc_mark = 1;
6502
6503 rsec = fh->elf.root.u.def.section;
6504 }
6505 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6506 && opd_entry_value (eh->elf.root.u.def.section,
6507 eh->elf.root.u.def.value,
6508 &rsec, NULL, FALSE) != (bfd_vma) -1)
6509 eh->elf.root.u.def.section->gc_mark = 1;
6510 else
6511 rsec = h->root.u.def.section;
6512 break;
6513
6514 case bfd_link_hash_common:
6515 rsec = h->root.u.c.p->section;
6516 break;
6517
6518 default:
6519 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
6520 }
6521 }
6522 }
6523 else
6524 {
6525 struct _opd_sec_data *opd;
6526
6527 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6528 opd = get_opd_info (rsec);
6529 if (opd != NULL && opd->func_sec != NULL)
6530 {
6531 rsec->gc_mark = 1;
6532
6533 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
6534 }
6535 }
6536
6537 return rsec;
6538}
6539
6540/* Update the .got, .plt. and dynamic reloc reference counts for the
6541 section being removed. */
6542
6543static bfd_boolean
6544ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6545 asection *sec, const Elf_Internal_Rela *relocs)
6546{
6547 struct ppc_link_hash_table *htab;
6548 Elf_Internal_Shdr *symtab_hdr;
6549 struct elf_link_hash_entry **sym_hashes;
6550 struct got_entry **local_got_ents;
6551 const Elf_Internal_Rela *rel, *relend;
6552
6553 if (bfd_link_relocatable (info))
6554 return TRUE;
6555
6556 if ((sec->flags & SEC_ALLOC) == 0)
6557 return TRUE;
6558
6559 elf_section_data (sec)->local_dynrel = NULL;
6560
6561 htab = ppc_hash_table (info);
6562 if (htab == NULL)
6563 return FALSE;
6564
6565 symtab_hdr = &elf_symtab_hdr (abfd);
6566 sym_hashes = elf_sym_hashes (abfd);
6567 local_got_ents = elf_local_got_ents (abfd);
6568
6569 relend = relocs + sec->reloc_count;
6570 for (rel = relocs; rel < relend; rel++)
6571 {
6572 unsigned long r_symndx;
6573 enum elf_ppc64_reloc_type r_type;
6574 struct elf_link_hash_entry *h = NULL;
6575 struct plt_entry **plt_list;
6576 unsigned char tls_type = 0;
6577
6578 r_symndx = ELF64_R_SYM (rel->r_info);
6579 r_type = ELF64_R_TYPE (rel->r_info);
6580 if (r_symndx >= symtab_hdr->sh_info)
6581 {
6582 struct ppc_link_hash_entry *eh;
6583 struct elf_dyn_relocs **pp;
6584 struct elf_dyn_relocs *p;
6585
6586 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6587 h = elf_follow_link (h);
6588 eh = (struct ppc_link_hash_entry *) h;
6589
6590 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6591 if (p->sec == sec)
6592 {
6593 /* Everything must go for SEC. */
6594 *pp = p->next;
6595 break;
6596 }
6597 }
6598
6599 switch (r_type)
6600 {
6601 case R_PPC64_GOT_TLSLD16:
6602 case R_PPC64_GOT_TLSLD16_LO:
6603 case R_PPC64_GOT_TLSLD16_HI:
6604 case R_PPC64_GOT_TLSLD16_HA:
6605 tls_type = TLS_TLS | TLS_LD;
6606 goto dogot;
6607
6608 case R_PPC64_GOT_TLSGD16:
6609 case R_PPC64_GOT_TLSGD16_LO:
6610 case R_PPC64_GOT_TLSGD16_HI:
6611 case R_PPC64_GOT_TLSGD16_HA:
6612 tls_type = TLS_TLS | TLS_GD;
6613 goto dogot;
6614
6615 case R_PPC64_GOT_TPREL16_DS:
6616 case R_PPC64_GOT_TPREL16_LO_DS:
6617 case R_PPC64_GOT_TPREL16_HI:
6618 case R_PPC64_GOT_TPREL16_HA:
6619 tls_type = TLS_TLS | TLS_TPREL;
6620 goto dogot;
6621
6622 case R_PPC64_GOT_DTPREL16_DS:
6623 case R_PPC64_GOT_DTPREL16_LO_DS:
6624 case R_PPC64_GOT_DTPREL16_HI:
6625 case R_PPC64_GOT_DTPREL16_HA:
6626 tls_type = TLS_TLS | TLS_DTPREL;
6627 goto dogot;
6628
6629 case R_PPC64_GOT16:
6630 case R_PPC64_GOT16_DS:
6631 case R_PPC64_GOT16_HA:
6632 case R_PPC64_GOT16_HI:
6633 case R_PPC64_GOT16_LO:
6634 case R_PPC64_GOT16_LO_DS:
6635 dogot:
6636 {
6637 struct got_entry *ent;
6638
6639 if (h != NULL)
6640 ent = h->got.glist;
6641 else
6642 ent = local_got_ents[r_symndx];
6643
6644 for (; ent != NULL; ent = ent->next)
6645 if (ent->addend == rel->r_addend
6646 && ent->owner == abfd
6647 && ent->tls_type == tls_type)
6648 break;
6649 if (ent == NULL)
6650 abort ();
6651 if (ent->got.refcount > 0)
6652 ent->got.refcount -= 1;
6653 }
6654 break;
6655
6656 case R_PPC64_PLT16_HA:
6657 case R_PPC64_PLT16_HI:
6658 case R_PPC64_PLT16_LO:
6659 case R_PPC64_PLT32:
6660 case R_PPC64_PLT64:
6661 case R_PPC64_REL14:
6662 case R_PPC64_REL14_BRNTAKEN:
6663 case R_PPC64_REL14_BRTAKEN:
6664 case R_PPC64_REL24:
6665 plt_list = NULL;
6666 if (h != NULL)
6667 plt_list = &h->plt.plist;
6668 else if (local_got_ents != NULL)
6669 {
6670 struct plt_entry **local_plt = (struct plt_entry **)
6671 (local_got_ents + symtab_hdr->sh_info);
6672 unsigned char *local_got_tls_masks = (unsigned char *)
6673 (local_plt + symtab_hdr->sh_info);
6674 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6675 plt_list = local_plt + r_symndx;
6676 }
6677 if (plt_list)
6678 {
6679 struct plt_entry *ent;
6680
6681 for (ent = *plt_list; ent != NULL; ent = ent->next)
6682 if (ent->addend == rel->r_addend)
6683 break;
6684 if (ent != NULL && ent->plt.refcount > 0)
6685 ent->plt.refcount -= 1;
6686 }
6687 break;
6688
6689 default:
6690 break;
6691 }
6692 }
6693 return TRUE;
6694}
6695
6696/* The maximum size of .sfpr. */
6697#define SFPR_MAX (218*4)
6698
6699struct sfpr_def_parms
6700{
6701 const char name[12];
6702 unsigned char lo, hi;
6703 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6704 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6705};
6706
6707/* Auto-generate _save*, _rest* functions in .sfpr.
6708 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6709 instead. */
6710
6711static bfd_boolean
6712sfpr_define (struct bfd_link_info *info,
6713 const struct sfpr_def_parms *parm,
6714 asection *stub_sec)
6715{
6716 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6717 unsigned int i;
6718 size_t len = strlen (parm->name);
6719 bfd_boolean writing = FALSE;
6720 char sym[16];
6721
6722 if (htab == NULL)
6723 return FALSE;
6724
6725 memcpy (sym, parm->name, len);
6726 sym[len + 2] = 0;
6727
6728 for (i = parm->lo; i <= parm->hi; i++)
6729 {
6730 struct ppc_link_hash_entry *h;
6731
6732 sym[len + 0] = i / 10 + '0';
6733 sym[len + 1] = i % 10 + '0';
6734 h = (struct ppc_link_hash_entry *)
6735 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
6736 if (stub_sec != NULL)
6737 {
6738 if (h != NULL
6739 && h->elf.root.type == bfd_link_hash_defined
6740 && h->elf.root.u.def.section == htab->sfpr)
6741 {
6742 struct elf_link_hash_entry *s;
6743 char buf[32];
6744 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6745 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6746 if (s == NULL)
6747 return FALSE;
6748 if (s->root.type == bfd_link_hash_new
6749 || (s->root.type = bfd_link_hash_defined
6750 && s->root.u.def.section == stub_sec))
6751 {
6752 s->root.type = bfd_link_hash_defined;
6753 s->root.u.def.section = stub_sec;
6754 s->root.u.def.value = (stub_sec->size
6755 + h->elf.root.u.def.value);
6756 s->ref_regular = 1;
6757 s->def_regular = 1;
6758 s->ref_regular_nonweak = 1;
6759 s->forced_local = 1;
6760 s->non_elf = 0;
6761 s->root.linker_def = 1;
6762 }
6763 }
6764 continue;
6765 }
6766 if (h != NULL)
6767 {
6768 h->save_res = 1;
6769 if (!h->elf.def_regular)
6770 {
6771 h->elf.root.type = bfd_link_hash_defined;
6772 h->elf.root.u.def.section = htab->sfpr;
6773 h->elf.root.u.def.value = htab->sfpr->size;
6774 h->elf.type = STT_FUNC;
6775 h->elf.def_regular = 1;
6776 h->elf.non_elf = 0;
6777 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6778 writing = TRUE;
6779 if (htab->sfpr->contents == NULL)
6780 {
6781 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6782 if (htab->sfpr->contents == NULL)
6783 return FALSE;
6784 }
6785 }
6786 }
6787 if (writing)
6788 {
6789 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6790 if (i != parm->hi)
6791 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6792 else
6793 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6794 htab->sfpr->size = p - htab->sfpr->contents;
6795 }
6796 }
6797
6798 return TRUE;
6799}
6800
6801static bfd_byte *
6802savegpr0 (bfd *abfd, bfd_byte *p, int r)
6803{
6804 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6805 return p + 4;
6806}
6807
6808static bfd_byte *
6809savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6810{
6811 p = savegpr0 (abfd, p, r);
6812 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6813 p = p + 4;
6814 bfd_put_32 (abfd, BLR, p);
6815 return p + 4;
6816}
6817
6818static bfd_byte *
6819restgpr0 (bfd *abfd, bfd_byte *p, int r)
6820{
6821 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6822 return p + 4;
6823}
6824
6825static bfd_byte *
6826restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6827{
6828 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6829 p = p + 4;
6830 p = restgpr0 (abfd, p, r);
6831 bfd_put_32 (abfd, MTLR_R0, p);
6832 p = p + 4;
6833 if (r == 29)
6834 {
6835 p = restgpr0 (abfd, p, 30);
6836 p = restgpr0 (abfd, p, 31);
6837 }
6838 bfd_put_32 (abfd, BLR, p);
6839 return p + 4;
6840}
6841
6842static bfd_byte *
6843savegpr1 (bfd *abfd, bfd_byte *p, int r)
6844{
6845 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6846 return p + 4;
6847}
6848
6849static bfd_byte *
6850savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6851{
6852 p = savegpr1 (abfd, p, r);
6853 bfd_put_32 (abfd, BLR, p);
6854 return p + 4;
6855}
6856
6857static bfd_byte *
6858restgpr1 (bfd *abfd, bfd_byte *p, int r)
6859{
6860 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6861 return p + 4;
6862}
6863
6864static bfd_byte *
6865restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6866{
6867 p = restgpr1 (abfd, p, r);
6868 bfd_put_32 (abfd, BLR, p);
6869 return p + 4;
6870}
6871
6872static bfd_byte *
6873savefpr (bfd *abfd, bfd_byte *p, int r)
6874{
6875 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6876 return p + 4;
6877}
6878
6879static bfd_byte *
6880savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6881{
6882 p = savefpr (abfd, p, r);
6883 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6884 p = p + 4;
6885 bfd_put_32 (abfd, BLR, p);
6886 return p + 4;
6887}
6888
6889static bfd_byte *
6890restfpr (bfd *abfd, bfd_byte *p, int r)
6891{
6892 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6893 return p + 4;
6894}
6895
6896static bfd_byte *
6897restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6898{
6899 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6900 p = p + 4;
6901 p = restfpr (abfd, p, r);
6902 bfd_put_32 (abfd, MTLR_R0, p);
6903 p = p + 4;
6904 if (r == 29)
6905 {
6906 p = restfpr (abfd, p, 30);
6907 p = restfpr (abfd, p, 31);
6908 }
6909 bfd_put_32 (abfd, BLR, p);
6910 return p + 4;
6911}
6912
6913static bfd_byte *
6914savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6915{
6916 p = savefpr (abfd, p, r);
6917 bfd_put_32 (abfd, BLR, p);
6918 return p + 4;
6919}
6920
6921static bfd_byte *
6922restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6923{
6924 p = restfpr (abfd, p, r);
6925 bfd_put_32 (abfd, BLR, p);
6926 return p + 4;
6927}
6928
6929static bfd_byte *
6930savevr (bfd *abfd, bfd_byte *p, int r)
6931{
6932 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6933 p = p + 4;
6934 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6935 return p + 4;
6936}
6937
6938static bfd_byte *
6939savevr_tail (bfd *abfd, bfd_byte *p, int r)
6940{
6941 p = savevr (abfd, p, r);
6942 bfd_put_32 (abfd, BLR, p);
6943 return p + 4;
6944}
6945
6946static bfd_byte *
6947restvr (bfd *abfd, bfd_byte *p, int r)
6948{
6949 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6950 p = p + 4;
6951 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6952 return p + 4;
6953}
6954
6955static bfd_byte *
6956restvr_tail (bfd *abfd, bfd_byte *p, int r)
6957{
6958 p = restvr (abfd, p, r);
6959 bfd_put_32 (abfd, BLR, p);
6960 return p + 4;
6961}
6962
6963/* Called via elf_link_hash_traverse to transfer dynamic linking
6964 information on function code symbol entries to their corresponding
6965 function descriptor symbol entries. */
6966
6967static bfd_boolean
6968func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6969{
6970 struct bfd_link_info *info;
6971 struct ppc_link_hash_table *htab;
6972 struct ppc_link_hash_entry *fh;
6973 struct ppc_link_hash_entry *fdh;
6974 bfd_boolean force_local;
6975
6976 fh = (struct ppc_link_hash_entry *) h;
6977 if (fh->elf.root.type == bfd_link_hash_indirect)
6978 return TRUE;
6979
6980 if (!fh->is_func)
6981 return TRUE;
6982
6983 if (fh->elf.root.root.string[0] != '.'
6984 || fh->elf.root.root.string[1] == '\0')
6985 return TRUE;
6986
6987 info = inf;
6988 htab = ppc_hash_table (info);
6989 if (htab == NULL)
6990 return FALSE;
6991
6992 /* Find the corresponding function descriptor symbol. */
6993 fdh = lookup_fdh (fh, htab);
6994
6995 /* Resolve undefined references to dot-symbols as the value
6996 in the function descriptor, if we have one in a regular object.
6997 This is to satisfy cases like ".quad .foo". Calls to functions
6998 in dynamic objects are handled elsewhere. */
6999 if ((fh->elf.root.type == bfd_link_hash_undefined
7000 || fh->elf.root.type == bfd_link_hash_undefweak)
7001 && (fdh->elf.root.type == bfd_link_hash_defined
7002 || fdh->elf.root.type == bfd_link_hash_defweak)
7003 && get_opd_info (fdh->elf.root.u.def.section) != NULL
7004 && opd_entry_value (fdh->elf.root.u.def.section,
7005 fdh->elf.root.u.def.value,
7006 &fh->elf.root.u.def.section,
7007 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
7008 {
7009 fh->elf.root.type = fdh->elf.root.type;
7010 fh->elf.forced_local = 1;
7011 fh->elf.def_regular = fdh->elf.def_regular;
7012 fh->elf.def_dynamic = fdh->elf.def_dynamic;
7013 }
7014
7015 if (!fh->elf.dynamic)
7016 {
7017 struct plt_entry *ent;
7018
7019 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
7020 if (ent->plt.refcount > 0)
7021 break;
7022 if (ent == NULL)
7023 return TRUE;
7024 }
7025
7026 /* Create a descriptor as undefined if necessary. */
7027 if (fdh == NULL
7028 && !bfd_link_executable (info)
7029 && (fh->elf.root.type == bfd_link_hash_undefined
7030 || fh->elf.root.type == bfd_link_hash_undefweak))
7031 {
7032 fdh = make_fdh (info, fh);
7033 if (fdh == NULL)
7034 return FALSE;
7035 }
7036
7037 /* We can't support overriding of symbols on a fake descriptor. */
7038 if (fdh != NULL
7039 && fdh->fake
7040 && (fh->elf.root.type == bfd_link_hash_defined
7041 || fh->elf.root.type == bfd_link_hash_defweak))
7042 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
7043
7044 /* Transfer dynamic linking information to the function descriptor. */
7045 if (fdh != NULL)
7046 {
7047 fdh->elf.ref_regular |= fh->elf.ref_regular;
7048 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7049 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7050 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
7051 fdh->elf.dynamic |= fh->elf.dynamic;
7052 fdh->elf.needs_plt |= (fh->elf.needs_plt
7053 || fh->elf.type == STT_FUNC
7054 || fh->elf.type == STT_GNU_IFUNC);
7055 move_plt_plist (fh, fdh);
7056
7057 if (!fdh->elf.forced_local
7058 && fh->elf.dynindx != -1)
7059 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
7060 return FALSE;
7061 }
7062
7063 /* Now that the info is on the function descriptor, clear the
7064 function code sym info. Any function code syms for which we
7065 don't have a definition in a regular file, we force local.
7066 This prevents a shared library from exporting syms that have
7067 been imported from another library. Function code syms that
7068 are really in the library we must leave global to prevent the
7069 linker dragging in a definition from a static library. */
7070 force_local = (!fh->elf.def_regular
7071 || fdh == NULL
7072 || !fdh->elf.def_regular
7073 || fdh->elf.forced_local);
7074 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7075
7076 return TRUE;
7077}
7078
7079static const struct sfpr_def_parms save_res_funcs[] =
7080 {
7081 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7082 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7083 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7084 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7085 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7086 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7087 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7088 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7089 { "._savef", 14, 31, savefpr, savefpr1_tail },
7090 { "._restf", 14, 31, restfpr, restfpr1_tail },
7091 { "_savevr_", 20, 31, savevr, savevr_tail },
7092 { "_restvr_", 20, 31, restvr, restvr_tail }
7093 };
7094
7095/* Called near the start of bfd_elf_size_dynamic_sections. We use
7096 this hook to a) provide some gcc support functions, and b) transfer
7097 dynamic linking information gathered so far on function code symbol
7098 entries, to their corresponding function descriptor symbol entries. */
7099
7100static bfd_boolean
7101ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7102 struct bfd_link_info *info)
7103{
7104 struct ppc_link_hash_table *htab;
7105
7106 htab = ppc_hash_table (info);
7107 if (htab == NULL)
7108 return FALSE;
7109
7110 /* Provide any missing _save* and _rest* functions. */
7111 if (htab->sfpr != NULL)
7112 {
7113 unsigned int i;
7114
7115 htab->sfpr->size = 0;
7116 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7117 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7118 return FALSE;
7119 if (htab->sfpr->size == 0)
7120 htab->sfpr->flags |= SEC_EXCLUDE;
7121 }
7122
7123 if (bfd_link_relocatable (info))
7124 return TRUE;
7125
7126 if (htab->elf.hgot != NULL)
7127 {
7128 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7129 /* Make .TOC. defined so as to prevent it being made dynamic.
7130 The wrong value here is fixed later in ppc64_elf_set_toc. */
7131 if (!htab->elf.hgot->def_regular
7132 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7133 {
7134 htab->elf.hgot->root.type = bfd_link_hash_defined;
7135 htab->elf.hgot->root.u.def.value = 0;
7136 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7137 htab->elf.hgot->def_regular = 1;
7138 htab->elf.hgot->root.linker_def = 1;
7139 }
7140 htab->elf.hgot->type = STT_OBJECT;
7141 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7142 | STV_HIDDEN);
7143 }
7144
7145 if (htab->need_func_desc_adj)
7146 {
7147 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7148 htab->need_func_desc_adj = 0;
7149 }
7150
7151 return TRUE;
7152}
7153
7154/* Return true if we have dynamic relocs against H that apply to
7155 read-only sections. */
7156
7157static bfd_boolean
7158readonly_dynrelocs (struct elf_link_hash_entry *h)
7159{
7160 struct ppc_link_hash_entry *eh;
7161 struct elf_dyn_relocs *p;
7162
7163 eh = (struct ppc_link_hash_entry *) h;
7164 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7165 {
7166 asection *s = p->sec->output_section;
7167
7168 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7169 return TRUE;
7170 }
7171 return FALSE;
7172}
7173
7174/* Return true if we have dynamic relocs against H or any of its weak
7175 aliases, that apply to read-only sections. */
7176
7177static bfd_boolean
7178alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7179{
7180 struct ppc_link_hash_entry *eh;
7181
7182 eh = (struct ppc_link_hash_entry *) h;
7183 do
7184 {
7185 if (readonly_dynrelocs (&eh->elf))
7186 return TRUE;
7187 eh = eh->weakref;
7188 } while (eh != NULL && &eh->elf != h);
7189
7190 return FALSE;
7191}
7192
7193/* Return whether EH has pc-relative dynamic relocs. */
7194
7195static bfd_boolean
7196pc_dynrelocs (struct ppc_link_hash_entry *eh)
7197{
7198 struct elf_dyn_relocs *p;
7199
7200 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7201 if (p->pc_count != 0)
7202 return TRUE;
7203 return FALSE;
7204}
7205
7206/* Return true if a global entry stub will be created for H. Valid
7207 for ELFv2 before plt entries have been allocated. */
7208
7209static bfd_boolean
7210global_entry_stub (struct elf_link_hash_entry *h)
7211{
7212 struct plt_entry *pent;
7213
7214 if (!h->pointer_equality_needed
7215 || h->def_regular)
7216 return FALSE;
7217
7218 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7219 if (pent->plt.refcount > 0
7220 && pent->addend == 0)
7221 return TRUE;
7222
7223 return FALSE;
7224}
7225
7226/* Adjust a symbol defined by a dynamic object and referenced by a
7227 regular object. The current definition is in some section of the
7228 dynamic object, but we're not including those sections. We have to
7229 change the definition to something the rest of the link can
7230 understand. */
7231
7232static bfd_boolean
7233ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7234 struct elf_link_hash_entry *h)
7235{
7236 struct ppc_link_hash_table *htab;
7237 asection *s, *srel;
7238
7239 htab = ppc_hash_table (info);
7240 if (htab == NULL)
7241 return FALSE;
7242
7243 /* Deal with function syms. */
7244 if (h->type == STT_FUNC
7245 || h->type == STT_GNU_IFUNC
7246 || h->needs_plt)
7247 {
7248 /* Clear procedure linkage table information for any symbol that
7249 won't need a .plt entry. */
7250 struct plt_entry *ent;
7251 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7252 if (ent->plt.refcount > 0)
7253 break;
7254 if (ent == NULL
7255 || (h->type != STT_GNU_IFUNC
7256 && (SYMBOL_CALLS_LOCAL (info, h)
7257 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
7258 && h->root.type == bfd_link_hash_undefweak)))
7259 || ((struct ppc_link_hash_entry *) h)->save_res)
7260 {
7261 h->plt.plist = NULL;
7262 h->needs_plt = 0;
7263 h->pointer_equality_needed = 0;
7264 }
7265 else if (abiversion (info->output_bfd) >= 2)
7266 {
7267 /* Taking a function's address in a read/write section
7268 doesn't require us to define the function symbol in the
7269 executable on a global entry stub. A dynamic reloc can
7270 be used instead. The reason we prefer a few more dynamic
7271 relocs is that calling via a global entry stub costs a
7272 few more instructions, and pointer_equality_needed causes
7273 extra work in ld.so when resolving these symbols. */
7274 if (global_entry_stub (h)
7275 && !alias_readonly_dynrelocs (h))
7276 {
7277 h->pointer_equality_needed = 0;
7278 /* After adjust_dynamic_symbol, non_got_ref set in
7279 the non-pic case means that dyn_relocs for this
7280 symbol should be discarded. */
7281 h->non_got_ref = 0;
7282 }
7283
7284 /* If making a plt entry, then we don't need copy relocs. */
7285 return TRUE;
7286 }
7287 }
7288 else
7289 h->plt.plist = NULL;
7290
7291 /* If this is a weak symbol, and there is a real definition, the
7292 processor independent code will have arranged for us to see the
7293 real definition first, and we can just use the same value. */
7294 if (h->u.weakdef != NULL)
7295 {
7296 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7297 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7298 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7299 h->root.u.def.value = h->u.weakdef->root.u.def.value;
7300 if (ELIMINATE_COPY_RELOCS)
7301 h->non_got_ref = h->u.weakdef->non_got_ref;
7302 return TRUE;
7303 }
7304
7305 /* If we are creating a shared library, we must presume that the
7306 only references to the symbol are via the global offset table.
7307 For such cases we need not do anything here; the relocations will
7308 be handled correctly by relocate_section. */
7309 if (bfd_link_pic (info))
7310 return TRUE;
7311
7312 /* If there are no references to this symbol that do not use the
7313 GOT, we don't need to generate a copy reloc. */
7314 if (!h->non_got_ref)
7315 return TRUE;
7316
7317 /* Don't generate a copy reloc for symbols defined in the executable. */
7318 if (!h->def_dynamic || !h->ref_regular || h->def_regular
7319
7320 /* If -z nocopyreloc was given, don't generate them either. */
7321 || info->nocopyreloc
7322
7323 /* If we didn't find any dynamic relocs in read-only sections, then
7324 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7325 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
7326
7327 /* Protected variables do not work with .dynbss. The copy in
7328 .dynbss won't be used by the shared library with the protected
7329 definition for the variable. Text relocations are preferable
7330 to an incorrect program. */
7331 || h->protected_def)
7332 {
7333 h->non_got_ref = 0;
7334 return TRUE;
7335 }
7336
7337 if (h->plt.plist != NULL)
7338 {
7339 /* We should never get here, but unfortunately there are versions
7340 of gcc out there that improperly (for this ABI) put initialized
7341 function pointers, vtable refs and suchlike in read-only
7342 sections. Allow them to proceed, but warn that this might
7343 break at runtime. */
7344 info->callbacks->einfo
7345 (_("%P: copy reloc against `%T' requires lazy plt linking; "
7346 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7347 h->root.root.string);
7348 }
7349
7350 /* This is a reference to a symbol defined by a dynamic object which
7351 is not a function. */
7352
7353 /* We must allocate the symbol in our .dynbss section, which will
7354 become part of the .bss section of the executable. There will be
7355 an entry for this symbol in the .dynsym section. The dynamic
7356 object will contain position independent code, so all references
7357 from the dynamic object to this symbol will go through the global
7358 offset table. The dynamic linker will use the .dynsym entry to
7359 determine the address it must put in the global offset table, so
7360 both the dynamic object and the regular object will refer to the
7361 same memory location for the variable. */
7362
7363 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7364 to copy the initial value out of the dynamic object and into the
7365 runtime process image. We need to remember the offset into the
7366 .rela.bss section we are going to use. */
7367 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
7368 {
7369 s = htab->elf.sdynrelro;
7370 srel = htab->elf.sreldynrelro;
7371 }
7372 else
7373 {
7374 s = htab->elf.sdynbss;
7375 srel = htab->elf.srelbss;
7376 }
7377 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
7378 {
7379 srel->size += sizeof (Elf64_External_Rela);
7380 h->needs_copy = 1;
7381 }
7382
7383 return _bfd_elf_adjust_dynamic_copy (info, h, s);
7384}
7385
7386/* If given a function descriptor symbol, hide both the function code
7387 sym and the descriptor. */
7388static void
7389ppc64_elf_hide_symbol (struct bfd_link_info *info,
7390 struct elf_link_hash_entry *h,
7391 bfd_boolean force_local)
7392{
7393 struct ppc_link_hash_entry *eh;
7394 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7395
7396 eh = (struct ppc_link_hash_entry *) h;
7397 if (eh->is_func_descriptor)
7398 {
7399 struct ppc_link_hash_entry *fh = eh->oh;
7400
7401 if (fh == NULL)
7402 {
7403 const char *p, *q;
7404 struct elf_link_hash_table *htab = elf_hash_table (info);
7405 char save;
7406
7407 /* We aren't supposed to use alloca in BFD because on
7408 systems which do not have alloca the version in libiberty
7409 calls xmalloc, which might cause the program to crash
7410 when it runs out of memory. This function doesn't have a
7411 return status, so there's no way to gracefully return an
7412 error. So cheat. We know that string[-1] can be safely
7413 accessed; It's either a string in an ELF string table,
7414 or allocated in an objalloc structure. */
7415
7416 p = eh->elf.root.root.string - 1;
7417 save = *p;
7418 *(char *) p = '.';
7419 fh = (struct ppc_link_hash_entry *)
7420 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7421 *(char *) p = save;
7422
7423 /* Unfortunately, if it so happens that the string we were
7424 looking for was allocated immediately before this string,
7425 then we overwrote the string terminator. That's the only
7426 reason the lookup should fail. */
7427 if (fh == NULL)
7428 {
7429 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7430 while (q >= eh->elf.root.root.string && *q == *p)
7431 --q, --p;
7432 if (q < eh->elf.root.root.string && *p == '.')
7433 fh = (struct ppc_link_hash_entry *)
7434 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7435 }
7436 if (fh != NULL)
7437 {
7438 eh->oh = fh;
7439 fh->oh = eh;
7440 }
7441 }
7442 if (fh != NULL)
7443 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7444 }
7445}
7446
7447static bfd_boolean
7448get_sym_h (struct elf_link_hash_entry **hp,
7449 Elf_Internal_Sym **symp,
7450 asection **symsecp,
7451 unsigned char **tls_maskp,
7452 Elf_Internal_Sym **locsymsp,
7453 unsigned long r_symndx,
7454 bfd *ibfd)
7455{
7456 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7457
7458 if (r_symndx >= symtab_hdr->sh_info)
7459 {
7460 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7461 struct elf_link_hash_entry *h;
7462
7463 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7464 h = elf_follow_link (h);
7465
7466 if (hp != NULL)
7467 *hp = h;
7468
7469 if (symp != NULL)
7470 *symp = NULL;
7471
7472 if (symsecp != NULL)
7473 {
7474 asection *symsec = NULL;
7475 if (h->root.type == bfd_link_hash_defined
7476 || h->root.type == bfd_link_hash_defweak)
7477 symsec = h->root.u.def.section;
7478 *symsecp = symsec;
7479 }
7480
7481 if (tls_maskp != NULL)
7482 {
7483 struct ppc_link_hash_entry *eh;
7484
7485 eh = (struct ppc_link_hash_entry *) h;
7486 *tls_maskp = &eh->tls_mask;
7487 }
7488 }
7489 else
7490 {
7491 Elf_Internal_Sym *sym;
7492 Elf_Internal_Sym *locsyms = *locsymsp;
7493
7494 if (locsyms == NULL)
7495 {
7496 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7497 if (locsyms == NULL)
7498 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7499 symtab_hdr->sh_info,
7500 0, NULL, NULL, NULL);
7501 if (locsyms == NULL)
7502 return FALSE;
7503 *locsymsp = locsyms;
7504 }
7505 sym = locsyms + r_symndx;
7506
7507 if (hp != NULL)
7508 *hp = NULL;
7509
7510 if (symp != NULL)
7511 *symp = sym;
7512
7513 if (symsecp != NULL)
7514 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
7515
7516 if (tls_maskp != NULL)
7517 {
7518 struct got_entry **lgot_ents;
7519 unsigned char *tls_mask;
7520
7521 tls_mask = NULL;
7522 lgot_ents = elf_local_got_ents (ibfd);
7523 if (lgot_ents != NULL)
7524 {
7525 struct plt_entry **local_plt = (struct plt_entry **)
7526 (lgot_ents + symtab_hdr->sh_info);
7527 unsigned char *lgot_masks = (unsigned char *)
7528 (local_plt + symtab_hdr->sh_info);
7529 tls_mask = &lgot_masks[r_symndx];
7530 }
7531 *tls_maskp = tls_mask;
7532 }
7533 }
7534 return TRUE;
7535}
7536
7537/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7538 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7539 type suitable for optimization, and 1 otherwise. */
7540
7541static int
7542get_tls_mask (unsigned char **tls_maskp,
7543 unsigned long *toc_symndx,
7544 bfd_vma *toc_addend,
7545 Elf_Internal_Sym **locsymsp,
7546 const Elf_Internal_Rela *rel,
7547 bfd *ibfd)
7548{
7549 unsigned long r_symndx;
7550 int next_r;
7551 struct elf_link_hash_entry *h;
7552 Elf_Internal_Sym *sym;
7553 asection *sec;
7554 bfd_vma off;
7555
7556 r_symndx = ELF64_R_SYM (rel->r_info);
7557 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7558 return 0;
7559
7560 if ((*tls_maskp != NULL && **tls_maskp != 0)
7561 || sec == NULL
7562 || ppc64_elf_section_data (sec) == NULL
7563 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
7564 return 1;
7565
7566 /* Look inside a TOC section too. */
7567 if (h != NULL)
7568 {
7569 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7570 off = h->root.u.def.value;
7571 }
7572 else
7573 off = sym->st_value;
7574 off += rel->r_addend;
7575 BFD_ASSERT (off % 8 == 0);
7576 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7577 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
7578 if (toc_symndx != NULL)
7579 *toc_symndx = r_symndx;
7580 if (toc_addend != NULL)
7581 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7582 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7583 return 0;
7584 if ((h == NULL || is_static_defined (h))
7585 && (next_r == -1 || next_r == -2))
7586 return 1 - next_r;
7587 return 1;
7588}
7589
7590/* Find (or create) an entry in the tocsave hash table. */
7591
7592static struct tocsave_entry *
7593tocsave_find (struct ppc_link_hash_table *htab,
7594 enum insert_option insert,
7595 Elf_Internal_Sym **local_syms,
7596 const Elf_Internal_Rela *irela,
7597 bfd *ibfd)
7598{
7599 unsigned long r_indx;
7600 struct elf_link_hash_entry *h;
7601 Elf_Internal_Sym *sym;
7602 struct tocsave_entry ent, *p;
7603 hashval_t hash;
7604 struct tocsave_entry **slot;
7605
7606 r_indx = ELF64_R_SYM (irela->r_info);
7607 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7608 return NULL;
7609 if (ent.sec == NULL || ent.sec->output_section == NULL)
7610 {
7611 _bfd_error_handler
7612 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7613 return NULL;
7614 }
7615
7616 if (h != NULL)
7617 ent.offset = h->root.u.def.value;
7618 else
7619 ent.offset = sym->st_value;
7620 ent.offset += irela->r_addend;
7621
7622 hash = tocsave_htab_hash (&ent);
7623 slot = ((struct tocsave_entry **)
7624 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7625 if (slot == NULL)
7626 return NULL;
7627
7628 if (*slot == NULL)
7629 {
7630 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7631 if (p == NULL)
7632 return NULL;
7633 *p = ent;
7634 *slot = p;
7635 }
7636 return *slot;
7637}
7638
7639/* Adjust all global syms defined in opd sections. In gcc generated
7640 code for the old ABI, these will already have been done. */
7641
7642static bfd_boolean
7643adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7644{
7645 struct ppc_link_hash_entry *eh;
7646 asection *sym_sec;
7647 struct _opd_sec_data *opd;
7648
7649 if (h->root.type == bfd_link_hash_indirect)
7650 return TRUE;
7651
7652 if (h->root.type != bfd_link_hash_defined
7653 && h->root.type != bfd_link_hash_defweak)
7654 return TRUE;
7655
7656 eh = (struct ppc_link_hash_entry *) h;
7657 if (eh->adjust_done)
7658 return TRUE;
7659
7660 sym_sec = eh->elf.root.u.def.section;
7661 opd = get_opd_info (sym_sec);
7662 if (opd != NULL && opd->adjust != NULL)
7663 {
7664 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
7665 if (adjust == -1)
7666 {
7667 /* This entry has been deleted. */
7668 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
7669 if (dsec == NULL)
7670 {
7671 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
7672 if (discarded_section (dsec))
7673 {
7674 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
7675 break;
7676 }
7677 }
7678 eh->elf.root.u.def.value = 0;
7679 eh->elf.root.u.def.section = dsec;
7680 }
7681 else
7682 eh->elf.root.u.def.value += adjust;
7683 eh->adjust_done = 1;
7684 }
7685 return TRUE;
7686}
7687
7688/* Handles decrementing dynamic reloc counts for the reloc specified by
7689 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7690 have already been determined. */
7691
7692static bfd_boolean
7693dec_dynrel_count (bfd_vma r_info,
7694 asection *sec,
7695 struct bfd_link_info *info,
7696 Elf_Internal_Sym **local_syms,
7697 struct elf_link_hash_entry *h,
7698 Elf_Internal_Sym *sym)
7699{
7700 enum elf_ppc64_reloc_type r_type;
7701 asection *sym_sec = NULL;
7702
7703 /* Can this reloc be dynamic? This switch, and later tests here
7704 should be kept in sync with the code in check_relocs. */
7705 r_type = ELF64_R_TYPE (r_info);
7706 switch (r_type)
7707 {
7708 default:
7709 return TRUE;
7710
7711 case R_PPC64_TPREL16:
7712 case R_PPC64_TPREL16_LO:
7713 case R_PPC64_TPREL16_HI:
7714 case R_PPC64_TPREL16_HA:
7715 case R_PPC64_TPREL16_DS:
7716 case R_PPC64_TPREL16_LO_DS:
7717 case R_PPC64_TPREL16_HIGH:
7718 case R_PPC64_TPREL16_HIGHA:
7719 case R_PPC64_TPREL16_HIGHER:
7720 case R_PPC64_TPREL16_HIGHERA:
7721 case R_PPC64_TPREL16_HIGHEST:
7722 case R_PPC64_TPREL16_HIGHESTA:
7723 if (!bfd_link_pic (info))
7724 return TRUE;
7725
7726 case R_PPC64_TPREL64:
7727 case R_PPC64_DTPMOD64:
7728 case R_PPC64_DTPREL64:
7729 case R_PPC64_ADDR64:
7730 case R_PPC64_REL30:
7731 case R_PPC64_REL32:
7732 case R_PPC64_REL64:
7733 case R_PPC64_ADDR14:
7734 case R_PPC64_ADDR14_BRNTAKEN:
7735 case R_PPC64_ADDR14_BRTAKEN:
7736 case R_PPC64_ADDR16:
7737 case R_PPC64_ADDR16_DS:
7738 case R_PPC64_ADDR16_HA:
7739 case R_PPC64_ADDR16_HI:
7740 case R_PPC64_ADDR16_HIGH:
7741 case R_PPC64_ADDR16_HIGHA:
7742 case R_PPC64_ADDR16_HIGHER:
7743 case R_PPC64_ADDR16_HIGHERA:
7744 case R_PPC64_ADDR16_HIGHEST:
7745 case R_PPC64_ADDR16_HIGHESTA:
7746 case R_PPC64_ADDR16_LO:
7747 case R_PPC64_ADDR16_LO_DS:
7748 case R_PPC64_ADDR24:
7749 case R_PPC64_ADDR32:
7750 case R_PPC64_UADDR16:
7751 case R_PPC64_UADDR32:
7752 case R_PPC64_UADDR64:
7753 case R_PPC64_TOC:
7754 break;
7755 }
7756
7757 if (local_syms != NULL)
7758 {
7759 unsigned long r_symndx;
7760 bfd *ibfd = sec->owner;
7761
7762 r_symndx = ELF64_R_SYM (r_info);
7763 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7764 return FALSE;
7765 }
7766
7767 if ((bfd_link_pic (info)
7768 && (must_be_dyn_reloc (info, r_type)
7769 || (h != NULL
7770 && (!SYMBOLIC_BIND (info, h)
7771 || h->root.type == bfd_link_hash_defweak
7772 || !h->def_regular))))
7773 || (ELIMINATE_COPY_RELOCS
7774 && !bfd_link_pic (info)
7775 && h != NULL
7776 && (h->root.type == bfd_link_hash_defweak
7777 || !h->def_regular)))
7778 ;
7779 else
7780 return TRUE;
7781
7782 if (h != NULL)
7783 {
7784 struct elf_dyn_relocs *p;
7785 struct elf_dyn_relocs **pp;
7786 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7787
7788 /* elf_gc_sweep may have already removed all dyn relocs associated
7789 with local syms for a given section. Also, symbol flags are
7790 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7791 report a dynreloc miscount. */
7792 if (*pp == NULL && info->gc_sections)
7793 return TRUE;
7794
7795 while ((p = *pp) != NULL)
7796 {
7797 if (p->sec == sec)
7798 {
7799 if (!must_be_dyn_reloc (info, r_type))
7800 p->pc_count -= 1;
7801 p->count -= 1;
7802 if (p->count == 0)
7803 *pp = p->next;
7804 return TRUE;
7805 }
7806 pp = &p->next;
7807 }
7808 }
7809 else
7810 {
7811 struct ppc_dyn_relocs *p;
7812 struct ppc_dyn_relocs **pp;
7813 void *vpp;
7814 bfd_boolean is_ifunc;
7815
7816 if (local_syms == NULL)
7817 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7818 if (sym_sec == NULL)
7819 sym_sec = sec;
7820
7821 vpp = &elf_section_data (sym_sec)->local_dynrel;
7822 pp = (struct ppc_dyn_relocs **) vpp;
7823
7824 if (*pp == NULL && info->gc_sections)
7825 return TRUE;
7826
7827 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7828 while ((p = *pp) != NULL)
7829 {
7830 if (p->sec == sec && p->ifunc == is_ifunc)
7831 {
7832 p->count -= 1;
7833 if (p->count == 0)
7834 *pp = p->next;
7835 return TRUE;
7836 }
7837 pp = &p->next;
7838 }
7839 }
7840
7841 /* xgettext:c-format */
7842 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
7843 sec->owner, sec);
7844 bfd_set_error (bfd_error_bad_value);
7845 return FALSE;
7846}
7847
7848/* Remove unused Official Procedure Descriptor entries. Currently we
7849 only remove those associated with functions in discarded link-once
7850 sections, or weakly defined functions that have been overridden. It
7851 would be possible to remove many more entries for statically linked
7852 applications. */
7853
7854bfd_boolean
7855ppc64_elf_edit_opd (struct bfd_link_info *info)
7856{
7857 bfd *ibfd;
7858 bfd_boolean some_edited = FALSE;
7859 asection *need_pad = NULL;
7860 struct ppc_link_hash_table *htab;
7861
7862 htab = ppc_hash_table (info);
7863 if (htab == NULL)
7864 return FALSE;
7865
7866 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7867 {
7868 asection *sec;
7869 Elf_Internal_Rela *relstart, *rel, *relend;
7870 Elf_Internal_Shdr *symtab_hdr;
7871 Elf_Internal_Sym *local_syms;
7872 struct _opd_sec_data *opd;
7873 bfd_boolean need_edit, add_aux_fields, broken;
7874 bfd_size_type cnt_16b = 0;
7875
7876 if (!is_ppc64_elf (ibfd))
7877 continue;
7878
7879 sec = bfd_get_section_by_name (ibfd, ".opd");
7880 if (sec == NULL || sec->size == 0)
7881 continue;
7882
7883 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7884 continue;
7885
7886 if (sec->output_section == bfd_abs_section_ptr)
7887 continue;
7888
7889 /* Look through the section relocs. */
7890 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7891 continue;
7892
7893 local_syms = NULL;
7894 symtab_hdr = &elf_symtab_hdr (ibfd);
7895
7896 /* Read the relocations. */
7897 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7898 info->keep_memory);
7899 if (relstart == NULL)
7900 return FALSE;
7901
7902 /* First run through the relocs to check they are sane, and to
7903 determine whether we need to edit this opd section. */
7904 need_edit = FALSE;
7905 broken = FALSE;
7906 need_pad = sec;
7907 relend = relstart + sec->reloc_count;
7908 for (rel = relstart; rel < relend; )
7909 {
7910 enum elf_ppc64_reloc_type r_type;
7911 unsigned long r_symndx;
7912 asection *sym_sec;
7913 struct elf_link_hash_entry *h;
7914 Elf_Internal_Sym *sym;
7915 bfd_vma offset;
7916
7917 /* .opd contains an array of 16 or 24 byte entries. We're
7918 only interested in the reloc pointing to a function entry
7919 point. */
7920 offset = rel->r_offset;
7921 if (rel + 1 == relend
7922 || rel[1].r_offset != offset + 8)
7923 {
7924 /* If someone messes with .opd alignment then after a
7925 "ld -r" we might have padding in the middle of .opd.
7926 Also, there's nothing to prevent someone putting
7927 something silly in .opd with the assembler. No .opd
7928 optimization for them! */
7929 broken_opd:
7930 _bfd_error_handler
7931 (_("%B: .opd is not a regular array of opd entries"), ibfd);
7932 broken = TRUE;
7933 break;
7934 }
7935
7936 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7937 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7938 {
7939 _bfd_error_handler
7940 /* xgettext:c-format */
7941 (_("%B: unexpected reloc type %u in .opd section"),
7942 ibfd, r_type);
7943 broken = TRUE;
7944 break;
7945 }
7946
7947 r_symndx = ELF64_R_SYM (rel->r_info);
7948 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7949 r_symndx, ibfd))
7950 goto error_ret;
7951
7952 if (sym_sec == NULL || sym_sec->owner == NULL)
7953 {
7954 const char *sym_name;
7955 if (h != NULL)
7956 sym_name = h->root.root.string;
7957 else
7958 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7959 sym_sec);
7960
7961 _bfd_error_handler
7962 /* xgettext:c-format */
7963 (_("%B: undefined sym `%s' in .opd section"),
7964 ibfd, sym_name);
7965 broken = TRUE;
7966 break;
7967 }
7968
7969 /* opd entries are always for functions defined in the
7970 current input bfd. If the symbol isn't defined in the
7971 input bfd, then we won't be using the function in this
7972 bfd; It must be defined in a linkonce section in another
7973 bfd, or is weak. It's also possible that we are
7974 discarding the function due to a linker script /DISCARD/,
7975 which we test for via the output_section. */
7976 if (sym_sec->owner != ibfd
7977 || sym_sec->output_section == bfd_abs_section_ptr)
7978 need_edit = TRUE;
7979
7980 rel += 2;
7981 if (rel + 1 == relend
7982 || (rel + 2 < relend
7983 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7984 ++rel;
7985
7986 if (rel == relend)
7987 {
7988 if (sec->size == offset + 24)
7989 {
7990 need_pad = NULL;
7991 break;
7992 }
7993 if (sec->size == offset + 16)
7994 {
7995 cnt_16b++;
7996 break;
7997 }
7998 goto broken_opd;
7999 }
8000 else if (rel + 1 < relend
8001 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
8002 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
8003 {
8004 if (rel[0].r_offset == offset + 16)
8005 cnt_16b++;
8006 else if (rel[0].r_offset != offset + 24)
8007 goto broken_opd;
8008 }
8009 else
8010 goto broken_opd;
8011 }
8012
8013 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
8014
8015 if (!broken && (need_edit || add_aux_fields))
8016 {
8017 Elf_Internal_Rela *write_rel;
8018 Elf_Internal_Shdr *rel_hdr;
8019 bfd_byte *rptr, *wptr;
8020 bfd_byte *new_contents;
8021 bfd_size_type amt;
8022
8023 new_contents = NULL;
8024 amt = OPD_NDX (sec->size) * sizeof (long);
8025 opd = &ppc64_elf_section_data (sec)->u.opd;
8026 opd->adjust = bfd_zalloc (sec->owner, amt);
8027 if (opd->adjust == NULL)
8028 return FALSE;
8029 ppc64_elf_section_data (sec)->sec_type = sec_opd;
8030
8031 /* This seems a waste of time as input .opd sections are all
8032 zeros as generated by gcc, but I suppose there's no reason
8033 this will always be so. We might start putting something in
8034 the third word of .opd entries. */
8035 if ((sec->flags & SEC_IN_MEMORY) == 0)
8036 {
8037 bfd_byte *loc;
8038 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
8039 {
8040 if (loc != NULL)
8041 free (loc);
8042 error_ret:
8043 if (local_syms != NULL
8044 && symtab_hdr->contents != (unsigned char *) local_syms)
8045 free (local_syms);
8046 if (elf_section_data (sec)->relocs != relstart)
8047 free (relstart);
8048 return FALSE;
8049 }
8050 sec->contents = loc;
8051 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8052 }
8053
8054 elf_section_data (sec)->relocs = relstart;
8055
8056 new_contents = sec->contents;
8057 if (add_aux_fields)
8058 {
8059 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8060 if (new_contents == NULL)
8061 return FALSE;
8062 need_pad = NULL;
8063 }
8064 wptr = new_contents;
8065 rptr = sec->contents;
8066 write_rel = relstart;
8067 for (rel = relstart; rel < relend; )
8068 {
8069 unsigned long r_symndx;
8070 asection *sym_sec;
8071 struct elf_link_hash_entry *h;
8072 struct ppc_link_hash_entry *fdh = NULL;
8073 Elf_Internal_Sym *sym;
8074 long opd_ent_size;
8075 Elf_Internal_Rela *next_rel;
8076 bfd_boolean skip;
8077
8078 r_symndx = ELF64_R_SYM (rel->r_info);
8079 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8080 r_symndx, ibfd))
8081 goto error_ret;
8082
8083 next_rel = rel + 2;
8084 if (next_rel + 1 == relend
8085 || (next_rel + 2 < relend
8086 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8087 ++next_rel;
8088
8089 /* See if the .opd entry is full 24 byte or
8090 16 byte (with fd_aux entry overlapped with next
8091 fd_func). */
8092 opd_ent_size = 24;
8093 if (next_rel == relend)
8094 {
8095 if (sec->size == rel->r_offset + 16)
8096 opd_ent_size = 16;
8097 }
8098 else if (next_rel->r_offset == rel->r_offset + 16)
8099 opd_ent_size = 16;
8100
8101 if (h != NULL
8102 && h->root.root.string[0] == '.')
8103 {
8104 fdh = ((struct ppc_link_hash_entry *) h)->oh;
8105 if (fdh != NULL)
8106 {
8107 fdh = ppc_follow_link (fdh);
8108 if (fdh->elf.root.type != bfd_link_hash_defined
8109 && fdh->elf.root.type != bfd_link_hash_defweak)
8110 fdh = NULL;
8111 }
8112 }
8113
8114 skip = (sym_sec->owner != ibfd
8115 || sym_sec->output_section == bfd_abs_section_ptr);
8116 if (skip)
8117 {
8118 if (fdh != NULL && sym_sec->owner == ibfd)
8119 {
8120 /* Arrange for the function descriptor sym
8121 to be dropped. */
8122 fdh->elf.root.u.def.value = 0;
8123 fdh->elf.root.u.def.section = sym_sec;
8124 }
8125 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
8126
8127 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
8128 rel = next_rel;
8129 else
8130 while (1)
8131 {
8132 if (!dec_dynrel_count (rel->r_info, sec, info,
8133 NULL, h, sym))
8134 goto error_ret;
8135
8136 if (++rel == next_rel)
8137 break;
8138
8139 r_symndx = ELF64_R_SYM (rel->r_info);
8140 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8141 r_symndx, ibfd))
8142 goto error_ret;
8143 }
8144 }
8145 else
8146 {
8147 /* We'll be keeping this opd entry. */
8148 long adjust;
8149
8150 if (fdh != NULL)
8151 {
8152 /* Redefine the function descriptor symbol to
8153 this location in the opd section. It is
8154 necessary to update the value here rather
8155 than using an array of adjustments as we do
8156 for local symbols, because various places
8157 in the generic ELF code use the value
8158 stored in u.def.value. */
8159 fdh->elf.root.u.def.value = wptr - new_contents;
8160 fdh->adjust_done = 1;
8161 }
8162
8163 /* Local syms are a bit tricky. We could
8164 tweak them as they can be cached, but
8165 we'd need to look through the local syms
8166 for the function descriptor sym which we
8167 don't have at the moment. So keep an
8168 array of adjustments. */
8169 adjust = (wptr - new_contents) - (rptr - sec->contents);
8170 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8171
8172 if (wptr != rptr)
8173 memcpy (wptr, rptr, opd_ent_size);
8174 wptr += opd_ent_size;
8175 if (add_aux_fields && opd_ent_size == 16)
8176 {
8177 memset (wptr, '\0', 8);
8178 wptr += 8;
8179 }
8180
8181 /* We need to adjust any reloc offsets to point to the
8182 new opd entries. */
8183 for ( ; rel != next_rel; ++rel)
8184 {
8185 rel->r_offset += adjust;
8186 if (write_rel != rel)
8187 memcpy (write_rel, rel, sizeof (*rel));
8188 ++write_rel;
8189 }
8190 }
8191
8192 rptr += opd_ent_size;
8193 }
8194
8195 sec->size = wptr - new_contents;
8196 sec->reloc_count = write_rel - relstart;
8197 if (add_aux_fields)
8198 {
8199 free (sec->contents);
8200 sec->contents = new_contents;
8201 }
8202
8203 /* Fudge the header size too, as this is used later in
8204 elf_bfd_final_link if we are emitting relocs. */
8205 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8206 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
8207 some_edited = TRUE;
8208 }
8209 else if (elf_section_data (sec)->relocs != relstart)
8210 free (relstart);
8211
8212 if (local_syms != NULL
8213 && symtab_hdr->contents != (unsigned char *) local_syms)
8214 {
8215 if (!info->keep_memory)
8216 free (local_syms);
8217 else
8218 symtab_hdr->contents = (unsigned char *) local_syms;
8219 }
8220 }
8221
8222 if (some_edited)
8223 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8224
8225 /* If we are doing a final link and the last .opd entry is just 16 byte
8226 long, add a 8 byte padding after it. */
8227 if (need_pad != NULL && !bfd_link_relocatable (info))
8228 {
8229 bfd_byte *p;
8230
8231 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8232 {
8233 BFD_ASSERT (need_pad->size > 0);
8234
8235 p = bfd_malloc (need_pad->size + 8);
8236 if (p == NULL)
8237 return FALSE;
8238
8239 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8240 p, 0, need_pad->size))
8241 return FALSE;
8242
8243 need_pad->contents = p;
8244 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8245 }
8246 else
8247 {
8248 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8249 if (p == NULL)
8250 return FALSE;
8251
8252 need_pad->contents = p;
8253 }
8254
8255 memset (need_pad->contents + need_pad->size, 0, 8);
8256 need_pad->size += 8;
8257 }
8258
8259 return TRUE;
8260}
8261
8262/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8263
8264asection *
8265ppc64_elf_tls_setup (struct bfd_link_info *info)
8266{
8267 struct ppc_link_hash_table *htab;
8268
8269 htab = ppc_hash_table (info);
8270 if (htab == NULL)
8271 return NULL;
8272
8273 if (abiversion (info->output_bfd) == 1)
8274 htab->opd_abi = 1;
8275
8276 if (htab->params->no_multi_toc)
8277 htab->do_multi_toc = 0;
8278 else if (!htab->do_multi_toc)
8279 htab->params->no_multi_toc = 1;
8280
8281 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8282 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8283 FALSE, FALSE, TRUE));
8284 /* Move dynamic linking info to the function descriptor sym. */
8285 if (htab->tls_get_addr != NULL)
8286 func_desc_adjust (&htab->tls_get_addr->elf, info);
8287 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8288 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8289 FALSE, FALSE, TRUE));
8290 if (htab->params->tls_get_addr_opt)
8291 {
8292 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8293
8294 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8295 FALSE, FALSE, TRUE);
8296 if (opt != NULL)
8297 func_desc_adjust (opt, info);
8298 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8299 FALSE, FALSE, TRUE);
8300 if (opt_fd != NULL
8301 && (opt_fd->root.type == bfd_link_hash_defined
8302 || opt_fd->root.type == bfd_link_hash_defweak))
8303 {
8304 /* If glibc supports an optimized __tls_get_addr call stub,
8305 signalled by the presence of __tls_get_addr_opt, and we'll
8306 be calling __tls_get_addr via a plt call stub, then
8307 make __tls_get_addr point to __tls_get_addr_opt. */
8308 tga_fd = &htab->tls_get_addr_fd->elf;
8309 if (htab->elf.dynamic_sections_created
8310 && tga_fd != NULL
8311 && (tga_fd->type == STT_FUNC
8312 || tga_fd->needs_plt)
8313 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8314 || (ELF_ST_VISIBILITY (tga_fd->other) != STV_DEFAULT
8315 && tga_fd->root.type == bfd_link_hash_undefweak)))
8316 {
8317 struct plt_entry *ent;
8318
8319 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8320 if (ent->plt.refcount > 0)
8321 break;
8322 if (ent != NULL)
8323 {
8324 tga_fd->root.type = bfd_link_hash_indirect;
8325 tga_fd->root.u.i.link = &opt_fd->root;
8326 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
8327 opt_fd->mark = 1;
8328 if (opt_fd->dynindx != -1)
8329 {
8330 /* Use __tls_get_addr_opt in dynamic relocations. */
8331 opt_fd->dynindx = -1;
8332 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8333 opt_fd->dynstr_index);
8334 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
8335 return NULL;
8336 }
8337 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8338 tga = &htab->tls_get_addr->elf;
8339 if (opt != NULL && tga != NULL)
8340 {
8341 tga->root.type = bfd_link_hash_indirect;
8342 tga->root.u.i.link = &opt->root;
8343 ppc64_elf_copy_indirect_symbol (info, opt, tga);
8344 opt->mark = 1;
8345 _bfd_elf_link_hash_hide_symbol (info, opt,
8346 tga->forced_local);
8347 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8348 }
8349 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8350 htab->tls_get_addr_fd->is_func_descriptor = 1;
8351 if (htab->tls_get_addr != NULL)
8352 {
8353 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8354 htab->tls_get_addr->is_func = 1;
8355 }
8356 }
8357 }
8358 }
8359 else if (htab->params->tls_get_addr_opt < 0)
8360 htab->params->tls_get_addr_opt = 0;
8361 }
8362 return _bfd_elf_tls_setup (info->output_bfd, info);
8363}
8364
8365/* Return TRUE iff REL is a branch reloc with a global symbol matching
8366 HASH1 or HASH2. */
8367
8368static bfd_boolean
8369branch_reloc_hash_match (const bfd *ibfd,
8370 const Elf_Internal_Rela *rel,
8371 const struct ppc_link_hash_entry *hash1,
8372 const struct ppc_link_hash_entry *hash2)
8373{
8374 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8375 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8376 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8377
8378 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8379 {
8380 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8381 struct elf_link_hash_entry *h;
8382
8383 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8384 h = elf_follow_link (h);
8385 if (h == &hash1->elf || h == &hash2->elf)
8386 return TRUE;
8387 }
8388 return FALSE;
8389}
8390
8391/* Run through all the TLS relocs looking for optimization
8392 opportunities. The linker has been hacked (see ppc64elf.em) to do
8393 a preliminary section layout so that we know the TLS segment
8394 offsets. We can't optimize earlier because some optimizations need
8395 to know the tp offset, and we need to optimize before allocating
8396 dynamic relocations. */
8397
8398bfd_boolean
8399ppc64_elf_tls_optimize (struct bfd_link_info *info)
8400{
8401 bfd *ibfd;
8402 asection *sec;
8403 struct ppc_link_hash_table *htab;
8404 unsigned char *toc_ref;
8405 int pass;
8406
8407 if (!bfd_link_executable (info))
8408 return TRUE;
8409
8410 htab = ppc_hash_table (info);
8411 if (htab == NULL)
8412 return FALSE;
8413
8414 /* Make two passes over the relocs. On the first pass, mark toc
8415 entries involved with tls relocs, and check that tls relocs
8416 involved in setting up a tls_get_addr call are indeed followed by
8417 such a call. If they are not, we can't do any tls optimization.
8418 On the second pass twiddle tls_mask flags to notify
8419 relocate_section that optimization can be done, and adjust got
8420 and plt refcounts. */
8421 toc_ref = NULL;
8422 for (pass = 0; pass < 2; ++pass)
8423 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8424 {
8425 Elf_Internal_Sym *locsyms = NULL;
8426 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8427
8428 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8429 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8430 {
8431 Elf_Internal_Rela *relstart, *rel, *relend;
8432 bfd_boolean found_tls_get_addr_arg = 0;
8433
8434 /* Read the relocations. */
8435 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8436 info->keep_memory);
8437 if (relstart == NULL)
8438 {
8439 free (toc_ref);
8440 return FALSE;
8441 }
8442
8443 relend = relstart + sec->reloc_count;
8444 for (rel = relstart; rel < relend; rel++)
8445 {
8446 enum elf_ppc64_reloc_type r_type;
8447 unsigned long r_symndx;
8448 struct elf_link_hash_entry *h;
8449 Elf_Internal_Sym *sym;
8450 asection *sym_sec;
8451 unsigned char *tls_mask;
8452 unsigned char tls_set, tls_clear, tls_type = 0;
8453 bfd_vma value;
8454 bfd_boolean ok_tprel, is_local;
8455 long toc_ref_index = 0;
8456 int expecting_tls_get_addr = 0;
8457 bfd_boolean ret = FALSE;
8458
8459 r_symndx = ELF64_R_SYM (rel->r_info);
8460 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8461 r_symndx, ibfd))
8462 {
8463 err_free_rel:
8464 if (elf_section_data (sec)->relocs != relstart)
8465 free (relstart);
8466 if (toc_ref != NULL)
8467 free (toc_ref);
8468 if (locsyms != NULL
8469 && (elf_symtab_hdr (ibfd).contents
8470 != (unsigned char *) locsyms))
8471 free (locsyms);
8472 return ret;
8473 }
8474
8475 if (h != NULL)
8476 {
8477 if (h->root.type == bfd_link_hash_defined
8478 || h->root.type == bfd_link_hash_defweak)
8479 value = h->root.u.def.value;
8480 else if (h->root.type == bfd_link_hash_undefweak)
8481 value = 0;
8482 else
8483 {
8484 found_tls_get_addr_arg = 0;
8485 continue;
8486 }
8487 }
8488 else
8489 /* Symbols referenced by TLS relocs must be of type
8490 STT_TLS. So no need for .opd local sym adjust. */
8491 value = sym->st_value;
8492
8493 ok_tprel = FALSE;
8494 is_local = FALSE;
8495 if (h == NULL
8496 || !h->def_dynamic)
8497 {
8498 is_local = TRUE;
8499 if (h != NULL
8500 && h->root.type == bfd_link_hash_undefweak)
8501 ok_tprel = TRUE;
8502 else if (sym_sec != NULL
8503 && sym_sec->output_section != NULL)
8504 {
8505 value += sym_sec->output_offset;
8506 value += sym_sec->output_section->vma;
8507 value -= htab->elf.tls_sec->vma;
8508 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8509 < (bfd_vma) 1 << 32);
8510 }
8511 }
8512
8513 r_type = ELF64_R_TYPE (rel->r_info);
8514 /* If this section has old-style __tls_get_addr calls
8515 without marker relocs, then check that each
8516 __tls_get_addr call reloc is preceded by a reloc
8517 that conceivably belongs to the __tls_get_addr arg
8518 setup insn. If we don't find matching arg setup
8519 relocs, don't do any tls optimization. */
8520 if (pass == 0
8521 && sec->has_tls_get_addr_call
8522 && h != NULL
8523 && (h == &htab->tls_get_addr->elf
8524 || h == &htab->tls_get_addr_fd->elf)
8525 && !found_tls_get_addr_arg
8526 && is_branch_reloc (r_type))
8527 {
8528 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8529 "TLS optimization disabled\n"),
8530 ibfd, sec, rel->r_offset);
8531 ret = TRUE;
8532 goto err_free_rel;
8533 }
8534
8535 found_tls_get_addr_arg = 0;
8536 switch (r_type)
8537 {
8538 case R_PPC64_GOT_TLSLD16:
8539 case R_PPC64_GOT_TLSLD16_LO:
8540 expecting_tls_get_addr = 1;
8541 found_tls_get_addr_arg = 1;
8542 /* Fall through. */
8543
8544 case R_PPC64_GOT_TLSLD16_HI:
8545 case R_PPC64_GOT_TLSLD16_HA:
8546 /* These relocs should never be against a symbol
8547 defined in a shared lib. Leave them alone if
8548 that turns out to be the case. */
8549 if (!is_local)
8550 continue;
8551
8552 /* LD -> LE */
8553 tls_set = 0;
8554 tls_clear = TLS_LD;
8555 tls_type = TLS_TLS | TLS_LD;
8556 break;
8557
8558 case R_PPC64_GOT_TLSGD16:
8559 case R_PPC64_GOT_TLSGD16_LO:
8560 expecting_tls_get_addr = 1;
8561 found_tls_get_addr_arg = 1;
8562 /* Fall through. */
8563
8564 case R_PPC64_GOT_TLSGD16_HI:
8565 case R_PPC64_GOT_TLSGD16_HA:
8566 if (ok_tprel)
8567 /* GD -> LE */
8568 tls_set = 0;
8569 else
8570 /* GD -> IE */
8571 tls_set = TLS_TLS | TLS_TPRELGD;
8572 tls_clear = TLS_GD;
8573 tls_type = TLS_TLS | TLS_GD;
8574 break;
8575
8576 case R_PPC64_GOT_TPREL16_DS:
8577 case R_PPC64_GOT_TPREL16_LO_DS:
8578 case R_PPC64_GOT_TPREL16_HI:
8579 case R_PPC64_GOT_TPREL16_HA:
8580 if (ok_tprel)
8581 {
8582 /* IE -> LE */
8583 tls_set = 0;
8584 tls_clear = TLS_TPREL;
8585 tls_type = TLS_TLS | TLS_TPREL;
8586 break;
8587 }
8588 continue;
8589
8590 case R_PPC64_TLSGD:
8591 case R_PPC64_TLSLD:
8592 found_tls_get_addr_arg = 1;
8593 /* Fall through. */
8594
8595 case R_PPC64_TLS:
8596 case R_PPC64_TOC16:
8597 case R_PPC64_TOC16_LO:
8598 if (sym_sec == NULL || sym_sec != toc)
8599 continue;
8600
8601 /* Mark this toc entry as referenced by a TLS
8602 code sequence. We can do that now in the
8603 case of R_PPC64_TLS, and after checking for
8604 tls_get_addr for the TOC16 relocs. */
8605 if (toc_ref == NULL)
8606 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8607 if (toc_ref == NULL)
8608 goto err_free_rel;
8609
8610 if (h != NULL)
8611 value = h->root.u.def.value;
8612 else
8613 value = sym->st_value;
8614 value += rel->r_addend;
8615 if (value % 8 != 0)
8616 continue;
8617 BFD_ASSERT (value < toc->size
8618 && toc->output_offset % 8 == 0);
8619 toc_ref_index = (value + toc->output_offset) / 8;
8620 if (r_type == R_PPC64_TLS
8621 || r_type == R_PPC64_TLSGD
8622 || r_type == R_PPC64_TLSLD)
8623 {
8624 toc_ref[toc_ref_index] = 1;
8625 continue;
8626 }
8627
8628 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8629 continue;
8630
8631 tls_set = 0;
8632 tls_clear = 0;
8633 expecting_tls_get_addr = 2;
8634 break;
8635
8636 case R_PPC64_TPREL64:
8637 if (pass == 0
8638 || sec != toc
8639 || toc_ref == NULL
8640 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8641 continue;
8642 if (ok_tprel)
8643 {
8644 /* IE -> LE */
8645 tls_set = TLS_EXPLICIT;
8646 tls_clear = TLS_TPREL;
8647 break;
8648 }
8649 continue;
8650
8651 case R_PPC64_DTPMOD64:
8652 if (pass == 0
8653 || sec != toc
8654 || toc_ref == NULL
8655 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8656 continue;
8657 if (rel + 1 < relend
8658 && (rel[1].r_info
8659 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8660 && rel[1].r_offset == rel->r_offset + 8)
8661 {
8662 if (ok_tprel)
8663 /* GD -> LE */
8664 tls_set = TLS_EXPLICIT | TLS_GD;
8665 else
8666 /* GD -> IE */
8667 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8668 tls_clear = TLS_GD;
8669 }
8670 else
8671 {
8672 if (!is_local)
8673 continue;
8674
8675 /* LD -> LE */
8676 tls_set = TLS_EXPLICIT;
8677 tls_clear = TLS_LD;
8678 }
8679 break;
8680
8681 default:
8682 continue;
8683 }
8684
8685 if (pass == 0)
8686 {
8687 if (!expecting_tls_get_addr
8688 || !sec->has_tls_get_addr_call)
8689 continue;
8690
8691 if (rel + 1 < relend
8692 && branch_reloc_hash_match (ibfd, rel + 1,
8693 htab->tls_get_addr,
8694 htab->tls_get_addr_fd))
8695 {
8696 if (expecting_tls_get_addr == 2)
8697 {
8698 /* Check for toc tls entries. */
8699 unsigned char *toc_tls;
8700 int retval;
8701
8702 retval = get_tls_mask (&toc_tls, NULL, NULL,
8703 &locsyms,
8704 rel, ibfd);
8705 if (retval == 0)
8706 goto err_free_rel;
8707 if (toc_tls != NULL)
8708 {
8709 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8710 found_tls_get_addr_arg = 1;
8711 if (retval > 1)
8712 toc_ref[toc_ref_index] = 1;
8713 }
8714 }
8715 continue;
8716 }
8717
8718 if (expecting_tls_get_addr != 1)
8719 continue;
8720
8721 /* Uh oh, we didn't find the expected call. We
8722 could just mark this symbol to exclude it
8723 from tls optimization but it's safer to skip
8724 the entire optimization. */
8725 /* xgettext:c-format */
8726 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8727 "TLS optimization disabled\n"),
8728 ibfd, sec, rel->r_offset);
8729 ret = TRUE;
8730 goto err_free_rel;
8731 }
8732
8733 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
8734 {
8735 struct plt_entry *ent;
8736 for (ent = htab->tls_get_addr->elf.plt.plist;
8737 ent != NULL;
8738 ent = ent->next)
8739 if (ent->addend == 0)
8740 {
8741 if (ent->plt.refcount > 0)
8742 {
8743 ent->plt.refcount -= 1;
8744 expecting_tls_get_addr = 0;
8745 }
8746 break;
8747 }
8748 }
8749
8750 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
8751 {
8752 struct plt_entry *ent;
8753 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8754 ent != NULL;
8755 ent = ent->next)
8756 if (ent->addend == 0)
8757 {
8758 if (ent->plt.refcount > 0)
8759 ent->plt.refcount -= 1;
8760 break;
8761 }
8762 }
8763
8764 if (tls_clear == 0)
8765 continue;
8766
8767 if ((tls_set & TLS_EXPLICIT) == 0)
8768 {
8769 struct got_entry *ent;
8770
8771 /* Adjust got entry for this reloc. */
8772 if (h != NULL)
8773 ent = h->got.glist;
8774 else
8775 ent = elf_local_got_ents (ibfd)[r_symndx];
8776
8777 for (; ent != NULL; ent = ent->next)
8778 if (ent->addend == rel->r_addend
8779 && ent->owner == ibfd
8780 && ent->tls_type == tls_type)
8781 break;
8782 if (ent == NULL)
8783 abort ();
8784
8785 if (tls_set == 0)
8786 {
8787 /* We managed to get rid of a got entry. */
8788 if (ent->got.refcount > 0)
8789 ent->got.refcount -= 1;
8790 }
8791 }
8792 else
8793 {
8794 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8795 we'll lose one or two dyn relocs. */
8796 if (!dec_dynrel_count (rel->r_info, sec, info,
8797 NULL, h, sym))
8798 return FALSE;
8799
8800 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8801 {
8802 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8803 NULL, h, sym))
8804 return FALSE;
8805 }
8806 }
8807
8808 *tls_mask |= tls_set;
8809 *tls_mask &= ~tls_clear;
8810 }
8811
8812 if (elf_section_data (sec)->relocs != relstart)
8813 free (relstart);
8814 }
8815
8816 if (locsyms != NULL
8817 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8818 {
8819 if (!info->keep_memory)
8820 free (locsyms);
8821 else
8822 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8823 }
8824 }
8825
8826 if (toc_ref != NULL)
8827 free (toc_ref);
8828 return TRUE;
8829}
8830
8831/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8832 the values of any global symbols in a toc section that has been
8833 edited. Globals in toc sections should be a rarity, so this function
8834 sets a flag if any are found in toc sections other than the one just
8835 edited, so that futher hash table traversals can be avoided. */
8836
8837struct adjust_toc_info
8838{
8839 asection *toc;
8840 unsigned long *skip;
8841 bfd_boolean global_toc_syms;
8842};
8843
8844enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8845
8846static bfd_boolean
8847adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8848{
8849 struct ppc_link_hash_entry *eh;
8850 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8851 unsigned long i;
8852
8853 if (h->root.type != bfd_link_hash_defined
8854 && h->root.type != bfd_link_hash_defweak)
8855 return TRUE;
8856
8857 eh = (struct ppc_link_hash_entry *) h;
8858 if (eh->adjust_done)
8859 return TRUE;
8860
8861 if (eh->elf.root.u.def.section == toc_inf->toc)
8862 {
8863 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8864 i = toc_inf->toc->rawsize >> 3;
8865 else
8866 i = eh->elf.root.u.def.value >> 3;
8867
8868 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8869 {
8870 _bfd_error_handler
8871 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8872 do
8873 ++i;
8874 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8875 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8876 }
8877
8878 eh->elf.root.u.def.value -= toc_inf->skip[i];
8879 eh->adjust_done = 1;
8880 }
8881 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8882 toc_inf->global_toc_syms = TRUE;
8883
8884 return TRUE;
8885}
8886
8887/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8888 on a _LO variety toc/got reloc. */
8889
8890static bfd_boolean
8891ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8892{
8893 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8894 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
8895 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8896 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8897 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8898 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8899 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8900 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8901 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8902 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8903 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8904 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8905 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8906 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8907 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8908 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8909 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8910 /* Exclude lfqu by testing reloc. If relocs are ever
8911 defined for the reduced D field in psq_lu then those
8912 will need testing too. */
8913 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8914 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8915 && (insn & 1) == 0)
8916 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8917 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8918 /* Exclude stfqu. psq_stu as above for psq_lu. */
8919 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8920 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8921 && (insn & 1) == 0));
8922}
8923
8924/* Examine all relocs referencing .toc sections in order to remove
8925 unused .toc entries. */
8926
8927bfd_boolean
8928ppc64_elf_edit_toc (struct bfd_link_info *info)
8929{
8930 bfd *ibfd;
8931 struct adjust_toc_info toc_inf;
8932 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8933
8934 htab->do_toc_opt = 1;
8935 toc_inf.global_toc_syms = TRUE;
8936 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8937 {
8938 asection *toc, *sec;
8939 Elf_Internal_Shdr *symtab_hdr;
8940 Elf_Internal_Sym *local_syms;
8941 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8942 unsigned long *skip, *drop;
8943 unsigned char *used;
8944 unsigned char *keep, last, some_unused;
8945
8946 if (!is_ppc64_elf (ibfd))
8947 continue;
8948
8949 toc = bfd_get_section_by_name (ibfd, ".toc");
8950 if (toc == NULL
8951 || toc->size == 0
8952 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8953 || discarded_section (toc))
8954 continue;
8955
8956 toc_relocs = NULL;
8957 local_syms = NULL;
8958 symtab_hdr = &elf_symtab_hdr (ibfd);
8959
8960 /* Look at sections dropped from the final link. */
8961 skip = NULL;
8962 relstart = NULL;
8963 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8964 {
8965 if (sec->reloc_count == 0
8966 || !discarded_section (sec)
8967 || get_opd_info (sec)
8968 || (sec->flags & SEC_ALLOC) == 0
8969 || (sec->flags & SEC_DEBUGGING) != 0)
8970 continue;
8971
8972 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8973 if (relstart == NULL)
8974 goto error_ret;
8975
8976 /* Run through the relocs to see which toc entries might be
8977 unused. */
8978 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8979 {
8980 enum elf_ppc64_reloc_type r_type;
8981 unsigned long r_symndx;
8982 asection *sym_sec;
8983 struct elf_link_hash_entry *h;
8984 Elf_Internal_Sym *sym;
8985 bfd_vma val;
8986
8987 r_type = ELF64_R_TYPE (rel->r_info);
8988 switch (r_type)
8989 {
8990 default:
8991 continue;
8992
8993 case R_PPC64_TOC16:
8994 case R_PPC64_TOC16_LO:
8995 case R_PPC64_TOC16_HI:
8996 case R_PPC64_TOC16_HA:
8997 case R_PPC64_TOC16_DS:
8998 case R_PPC64_TOC16_LO_DS:
8999 break;
9000 }
9001
9002 r_symndx = ELF64_R_SYM (rel->r_info);
9003 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9004 r_symndx, ibfd))
9005 goto error_ret;
9006
9007 if (sym_sec != toc)
9008 continue;
9009
9010 if (h != NULL)
9011 val = h->root.u.def.value;
9012 else
9013 val = sym->st_value;
9014 val += rel->r_addend;
9015
9016 if (val >= toc->size)
9017 continue;
9018
9019 /* Anything in the toc ought to be aligned to 8 bytes.
9020 If not, don't mark as unused. */
9021 if (val & 7)
9022 continue;
9023
9024 if (skip == NULL)
9025 {
9026 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9027 if (skip == NULL)
9028 goto error_ret;
9029 }
9030
9031 skip[val >> 3] = ref_from_discarded;
9032 }
9033
9034 if (elf_section_data (sec)->relocs != relstart)
9035 free (relstart);
9036 }
9037
9038 /* For largetoc loads of address constants, we can convert
9039 . addis rx,2,addr@got@ha
9040 . ld ry,addr@got@l(rx)
9041 to
9042 . addis rx,2,addr@toc@ha
9043 . addi ry,rx,addr@toc@l
9044 when addr is within 2G of the toc pointer. This then means
9045 that the word storing "addr" in the toc is no longer needed. */
9046
9047 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
9048 && toc->output_section->rawsize < (bfd_vma) 1 << 31
9049 && toc->reloc_count != 0)
9050 {
9051 /* Read toc relocs. */
9052 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9053 info->keep_memory);
9054 if (toc_relocs == NULL)
9055 goto error_ret;
9056
9057 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9058 {
9059 enum elf_ppc64_reloc_type r_type;
9060 unsigned long r_symndx;
9061 asection *sym_sec;
9062 struct elf_link_hash_entry *h;
9063 Elf_Internal_Sym *sym;
9064 bfd_vma val, addr;
9065
9066 r_type = ELF64_R_TYPE (rel->r_info);
9067 if (r_type != R_PPC64_ADDR64)
9068 continue;
9069
9070 r_symndx = ELF64_R_SYM (rel->r_info);
9071 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9072 r_symndx, ibfd))
9073 goto error_ret;
9074
9075 if (sym_sec == NULL
9076 || sym_sec->output_section == NULL
9077 || discarded_section (sym_sec))
9078 continue;
9079
9080 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9081 continue;
9082
9083 if (h != NULL)
9084 {
9085 if (h->type == STT_GNU_IFUNC)
9086 continue;
9087 val = h->root.u.def.value;
9088 }
9089 else
9090 {
9091 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9092 continue;
9093 val = sym->st_value;
9094 }
9095 val += rel->r_addend;
9096 val += sym_sec->output_section->vma + sym_sec->output_offset;
9097
9098 /* We don't yet know the exact toc pointer value, but we
9099 know it will be somewhere in the toc section. Don't
9100 optimize if the difference from any possible toc
9101 pointer is outside [ff..f80008000, 7fff7fff]. */
9102 addr = toc->output_section->vma + TOC_BASE_OFF;
9103 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9104 continue;
9105
9106 addr = toc->output_section->vma + toc->output_section->rawsize;
9107 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9108 continue;
9109
9110 if (skip == NULL)
9111 {
9112 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9113 if (skip == NULL)
9114 goto error_ret;
9115 }
9116
9117 skip[rel->r_offset >> 3]
9118 |= can_optimize | ((rel - toc_relocs) << 2);
9119 }
9120 }
9121
9122 if (skip == NULL)
9123 continue;
9124
9125 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9126 if (used == NULL)
9127 {
9128 error_ret:
9129 if (local_syms != NULL
9130 && symtab_hdr->contents != (unsigned char *) local_syms)
9131 free (local_syms);
9132 if (sec != NULL
9133 && relstart != NULL
9134 && elf_section_data (sec)->relocs != relstart)
9135 free (relstart);
9136 if (toc_relocs != NULL
9137 && elf_section_data (toc)->relocs != toc_relocs)
9138 free (toc_relocs);
9139 if (skip != NULL)
9140 free (skip);
9141 return FALSE;
9142 }
9143
9144 /* Now check all kept sections that might reference the toc.
9145 Check the toc itself last. */
9146 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9147 : ibfd->sections);
9148 sec != NULL;
9149 sec = (sec == toc ? NULL
9150 : sec->next == NULL ? toc
9151 : sec->next == toc && toc->next ? toc->next
9152 : sec->next))
9153 {
9154 int repeat;
9155
9156 if (sec->reloc_count == 0
9157 || discarded_section (sec)
9158 || get_opd_info (sec)
9159 || (sec->flags & SEC_ALLOC) == 0
9160 || (sec->flags & SEC_DEBUGGING) != 0)
9161 continue;
9162
9163 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9164 info->keep_memory);
9165 if (relstart == NULL)
9166 {
9167 free (used);
9168 goto error_ret;
9169 }
9170
9171 /* Mark toc entries referenced as used. */
9172 do
9173 {
9174 repeat = 0;
9175 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9176 {
9177 enum elf_ppc64_reloc_type r_type;
9178 unsigned long r_symndx;
9179 asection *sym_sec;
9180 struct elf_link_hash_entry *h;
9181 Elf_Internal_Sym *sym;
9182 bfd_vma val;
9183 enum {no_check, check_lo, check_ha} insn_check;
9184
9185 r_type = ELF64_R_TYPE (rel->r_info);
9186 switch (r_type)
9187 {
9188 default:
9189 insn_check = no_check;
9190 break;
9191
9192 case R_PPC64_GOT_TLSLD16_HA:
9193 case R_PPC64_GOT_TLSGD16_HA:
9194 case R_PPC64_GOT_TPREL16_HA:
9195 case R_PPC64_GOT_DTPREL16_HA:
9196 case R_PPC64_GOT16_HA:
9197 case R_PPC64_TOC16_HA:
9198 insn_check = check_ha;
9199 break;
9200
9201 case R_PPC64_GOT_TLSLD16_LO:
9202 case R_PPC64_GOT_TLSGD16_LO:
9203 case R_PPC64_GOT_TPREL16_LO_DS:
9204 case R_PPC64_GOT_DTPREL16_LO_DS:
9205 case R_PPC64_GOT16_LO:
9206 case R_PPC64_GOT16_LO_DS:
9207 case R_PPC64_TOC16_LO:
9208 case R_PPC64_TOC16_LO_DS:
9209 insn_check = check_lo;
9210 break;
9211 }
9212
9213 if (insn_check != no_check)
9214 {
9215 bfd_vma off = rel->r_offset & ~3;
9216 unsigned char buf[4];
9217 unsigned int insn;
9218
9219 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9220 {
9221 free (used);
9222 goto error_ret;
9223 }
9224 insn = bfd_get_32 (ibfd, buf);
9225 if (insn_check == check_lo
9226 ? !ok_lo_toc_insn (insn, r_type)
9227 : ((insn & ((0x3f << 26) | 0x1f << 16))
9228 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9229 {
9230 char str[12];
9231
9232 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9233 sprintf (str, "%#08x", insn);
9234 info->callbacks->einfo
9235 /* xgettext:c-format */
9236 (_("%P: %H: toc optimization is not supported for"
9237 " %s instruction.\n"),
9238 ibfd, sec, rel->r_offset & ~3, str);
9239 }
9240 }
9241
9242 switch (r_type)
9243 {
9244 case R_PPC64_TOC16:
9245 case R_PPC64_TOC16_LO:
9246 case R_PPC64_TOC16_HI:
9247 case R_PPC64_TOC16_HA:
9248 case R_PPC64_TOC16_DS:
9249 case R_PPC64_TOC16_LO_DS:
9250 /* In case we're taking addresses of toc entries. */
9251 case R_PPC64_ADDR64:
9252 break;
9253
9254 default:
9255 continue;
9256 }
9257
9258 r_symndx = ELF64_R_SYM (rel->r_info);
9259 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9260 r_symndx, ibfd))
9261 {
9262 free (used);
9263 goto error_ret;
9264 }
9265
9266 if (sym_sec != toc)
9267 continue;
9268
9269 if (h != NULL)
9270 val = h->root.u.def.value;
9271 else
9272 val = sym->st_value;
9273 val += rel->r_addend;
9274
9275 if (val >= toc->size)
9276 continue;
9277
9278 if ((skip[val >> 3] & can_optimize) != 0)
9279 {
9280 bfd_vma off;
9281 unsigned char opc;
9282
9283 switch (r_type)
9284 {
9285 case R_PPC64_TOC16_HA:
9286 break;
9287
9288 case R_PPC64_TOC16_LO_DS:
9289 off = rel->r_offset;
9290 off += (bfd_big_endian (ibfd) ? -2 : 3);
9291 if (!bfd_get_section_contents (ibfd, sec, &opc,
9292 off, 1))
9293 {
9294 free (used);
9295 goto error_ret;
9296 }
9297 if ((opc & (0x3f << 2)) == (58u << 2))
9298 break;
9299 /* Fall through. */
9300
9301 default:
9302 /* Wrong sort of reloc, or not a ld. We may
9303 as well clear ref_from_discarded too. */
9304 skip[val >> 3] = 0;
9305 }
9306 }
9307
9308 if (sec != toc)
9309 used[val >> 3] = 1;
9310 /* For the toc section, we only mark as used if this
9311 entry itself isn't unused. */
9312 else if ((used[rel->r_offset >> 3]
9313 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9314 && !used[val >> 3])
9315 {
9316 /* Do all the relocs again, to catch reference
9317 chains. */
9318 repeat = 1;
9319 used[val >> 3] = 1;
9320 }
9321 }
9322 }
9323 while (repeat);
9324
9325 if (elf_section_data (sec)->relocs != relstart)
9326 free (relstart);
9327 }
9328
9329 /* Merge the used and skip arrays. Assume that TOC
9330 doublewords not appearing as either used or unused belong
9331 to to an entry more than one doubleword in size. */
9332 for (drop = skip, keep = used, last = 0, some_unused = 0;
9333 drop < skip + (toc->size + 7) / 8;
9334 ++drop, ++keep)
9335 {
9336 if (*keep)
9337 {
9338 *drop &= ~ref_from_discarded;
9339 if ((*drop & can_optimize) != 0)
9340 some_unused = 1;
9341 last = 0;
9342 }
9343 else if ((*drop & ref_from_discarded) != 0)
9344 {
9345 some_unused = 1;
9346 last = ref_from_discarded;
9347 }
9348 else
9349 *drop = last;
9350 }
9351
9352 free (used);
9353
9354 if (some_unused)
9355 {
9356 bfd_byte *contents, *src;
9357 unsigned long off;
9358 Elf_Internal_Sym *sym;
9359 bfd_boolean local_toc_syms = FALSE;
9360
9361 /* Shuffle the toc contents, and at the same time convert the
9362 skip array from booleans into offsets. */
9363 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9364 goto error_ret;
9365
9366 elf_section_data (toc)->this_hdr.contents = contents;
9367
9368 for (src = contents, off = 0, drop = skip;
9369 src < contents + toc->size;
9370 src += 8, ++drop)
9371 {
9372 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9373 off += 8;
9374 else if (off != 0)
9375 {
9376 *drop = off;
9377 memcpy (src - off, src, 8);
9378 }
9379 }
9380 *drop = off;
9381 toc->rawsize = toc->size;
9382 toc->size = src - contents - off;
9383
9384 /* Adjust addends for relocs against the toc section sym,
9385 and optimize any accesses we can. */
9386 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9387 {
9388 if (sec->reloc_count == 0
9389 || discarded_section (sec))
9390 continue;
9391
9392 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9393 info->keep_memory);
9394 if (relstart == NULL)
9395 goto error_ret;
9396
9397 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9398 {
9399 enum elf_ppc64_reloc_type r_type;
9400 unsigned long r_symndx;
9401 asection *sym_sec;
9402 struct elf_link_hash_entry *h;
9403 bfd_vma val;
9404
9405 r_type = ELF64_R_TYPE (rel->r_info);
9406 switch (r_type)
9407 {
9408 default:
9409 continue;
9410
9411 case R_PPC64_TOC16:
9412 case R_PPC64_TOC16_LO:
9413 case R_PPC64_TOC16_HI:
9414 case R_PPC64_TOC16_HA:
9415 case R_PPC64_TOC16_DS:
9416 case R_PPC64_TOC16_LO_DS:
9417 case R_PPC64_ADDR64:
9418 break;
9419 }
9420
9421 r_symndx = ELF64_R_SYM (rel->r_info);
9422 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9423 r_symndx, ibfd))
9424 goto error_ret;
9425
9426 if (sym_sec != toc)
9427 continue;
9428
9429 if (h != NULL)
9430 val = h->root.u.def.value;
9431 else
9432 {
9433 val = sym->st_value;
9434 if (val != 0)
9435 local_toc_syms = TRUE;
9436 }
9437
9438 val += rel->r_addend;
9439
9440 if (val > toc->rawsize)
9441 val = toc->rawsize;
9442 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9443 continue;
9444 else if ((skip[val >> 3] & can_optimize) != 0)
9445 {
9446 Elf_Internal_Rela *tocrel
9447 = toc_relocs + (skip[val >> 3] >> 2);
9448 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9449
9450 switch (r_type)
9451 {
9452 case R_PPC64_TOC16_HA:
9453 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9454 break;
9455
9456 case R_PPC64_TOC16_LO_DS:
9457 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9458 break;
9459
9460 default:
9461 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9462 ppc_howto_init ();
9463 info->callbacks->einfo
9464 /* xgettext:c-format */
9465 (_("%P: %H: %s references "
9466 "optimized away TOC entry\n"),
9467 ibfd, sec, rel->r_offset,
9468 ppc64_elf_howto_table[r_type]->name);
9469 bfd_set_error (bfd_error_bad_value);
9470 goto error_ret;
9471 }
9472 rel->r_addend = tocrel->r_addend;
9473 elf_section_data (sec)->relocs = relstart;
9474 continue;
9475 }
9476
9477 if (h != NULL || sym->st_value != 0)
9478 continue;
9479
9480 rel->r_addend -= skip[val >> 3];
9481 elf_section_data (sec)->relocs = relstart;
9482 }
9483
9484 if (elf_section_data (sec)->relocs != relstart)
9485 free (relstart);
9486 }
9487
9488 /* We shouldn't have local or global symbols defined in the TOC,
9489 but handle them anyway. */
9490 if (local_syms != NULL)
9491 for (sym = local_syms;
9492 sym < local_syms + symtab_hdr->sh_info;
9493 ++sym)
9494 if (sym->st_value != 0
9495 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9496 {
9497 unsigned long i;
9498
9499 if (sym->st_value > toc->rawsize)
9500 i = toc->rawsize >> 3;
9501 else
9502 i = sym->st_value >> 3;
9503
9504 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9505 {
9506 if (local_toc_syms)
9507 _bfd_error_handler
9508 (_("%s defined on removed toc entry"),
9509 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9510 do
9511 ++i;
9512 while ((skip[i] & (ref_from_discarded | can_optimize)));
9513 sym->st_value = (bfd_vma) i << 3;
9514 }
9515
9516 sym->st_value -= skip[i];
9517 symtab_hdr->contents = (unsigned char *) local_syms;
9518 }
9519
9520 /* Adjust any global syms defined in this toc input section. */
9521 if (toc_inf.global_toc_syms)
9522 {
9523 toc_inf.toc = toc;
9524 toc_inf.skip = skip;
9525 toc_inf.global_toc_syms = FALSE;
9526 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9527 &toc_inf);
9528 }
9529
9530 if (toc->reloc_count != 0)
9531 {
9532 Elf_Internal_Shdr *rel_hdr;
9533 Elf_Internal_Rela *wrel;
9534 bfd_size_type sz;
9535
9536 /* Remove unused toc relocs, and adjust those we keep. */
9537 if (toc_relocs == NULL)
9538 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9539 info->keep_memory);
9540 if (toc_relocs == NULL)
9541 goto error_ret;
9542
9543 wrel = toc_relocs;
9544 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9545 if ((skip[rel->r_offset >> 3]
9546 & (ref_from_discarded | can_optimize)) == 0)
9547 {
9548 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9549 wrel->r_info = rel->r_info;
9550 wrel->r_addend = rel->r_addend;
9551 ++wrel;
9552 }
9553 else if (!dec_dynrel_count (rel->r_info, toc, info,
9554 &local_syms, NULL, NULL))
9555 goto error_ret;
9556
9557 elf_section_data (toc)->relocs = toc_relocs;
9558 toc->reloc_count = wrel - toc_relocs;
9559 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9560 sz = rel_hdr->sh_entsize;
9561 rel_hdr->sh_size = toc->reloc_count * sz;
9562 }
9563 }
9564 else if (toc_relocs != NULL
9565 && elf_section_data (toc)->relocs != toc_relocs)
9566 free (toc_relocs);
9567
9568 if (local_syms != NULL
9569 && symtab_hdr->contents != (unsigned char *) local_syms)
9570 {
9571 if (!info->keep_memory)
9572 free (local_syms);
9573 else
9574 symtab_hdr->contents = (unsigned char *) local_syms;
9575 }
9576 free (skip);
9577 }
9578
9579 return TRUE;
9580}
9581
9582/* Return true iff input section I references the TOC using
9583 instructions limited to +/-32k offsets. */
9584
9585bfd_boolean
9586ppc64_elf_has_small_toc_reloc (asection *i)
9587{
9588 return (is_ppc64_elf (i->owner)
9589 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9590}
9591
9592/* Allocate space for one GOT entry. */
9593
9594static void
9595allocate_got (struct elf_link_hash_entry *h,
9596 struct bfd_link_info *info,
9597 struct got_entry *gent)
9598{
9599 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9600 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9601 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9602 ? 16 : 8);
9603 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9604 ? 2 : 1) * sizeof (Elf64_External_Rela);
9605 asection *got = ppc64_elf_tdata (gent->owner)->got;
9606
9607 gent->got.offset = got->size;
9608 got->size += entsize;
9609
9610 if (h->type == STT_GNU_IFUNC)
9611 {
9612 htab->elf.irelplt->size += rentsize;
9613 htab->got_reli_size += rentsize;
9614 }
9615 else if ((bfd_link_pic (info)
9616 || (htab->elf.dynamic_sections_created
9617 && h->dynindx != -1
9618 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9619 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
9620 || h->root.type != bfd_link_hash_undefweak))
9621 {
9622 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9623 relgot->size += rentsize;
9624 }
9625}
9626
9627/* This function merges got entries in the same toc group. */
9628
9629static void
9630merge_got_entries (struct got_entry **pent)
9631{
9632 struct got_entry *ent, *ent2;
9633
9634 for (ent = *pent; ent != NULL; ent = ent->next)
9635 if (!ent->is_indirect)
9636 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9637 if (!ent2->is_indirect
9638 && ent2->addend == ent->addend
9639 && ent2->tls_type == ent->tls_type
9640 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9641 {
9642 ent2->is_indirect = TRUE;
9643 ent2->got.ent = ent;
9644 }
9645}
9646
9647/* If H is undefined weak, make it dynamic if that makes sense. */
9648
9649static bfd_boolean
9650ensure_undefweak_dynamic (struct bfd_link_info *info,
9651 struct elf_link_hash_entry *h)
9652{
9653 struct elf_link_hash_table *htab = elf_hash_table (info);
9654
9655 if (htab->dynamic_sections_created
9656 && h->root.type == bfd_link_hash_undefweak
9657 && h->dynindx == -1
9658 && !h->forced_local
9659 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9660 return bfd_elf_link_record_dynamic_symbol (info, h);
9661 return TRUE;
9662}
9663
9664/* Allocate space in .plt, .got and associated reloc sections for
9665 dynamic relocs. */
9666
9667static bfd_boolean
9668allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9669{
9670 struct bfd_link_info *info;
9671 struct ppc_link_hash_table *htab;
9672 asection *s;
9673 struct ppc_link_hash_entry *eh;
9674 struct got_entry **pgent, *gent;
9675
9676 if (h->root.type == bfd_link_hash_indirect)
9677 return TRUE;
9678
9679 info = (struct bfd_link_info *) inf;
9680 htab = ppc_hash_table (info);
9681 if (htab == NULL)
9682 return FALSE;
9683
9684 eh = (struct ppc_link_hash_entry *) h;
9685 /* Run through the TLS GD got entries first if we're changing them
9686 to TPREL. */
9687 if ((eh->tls_mask & TLS_TPRELGD) != 0)
9688 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9689 if (gent->got.refcount > 0
9690 && (gent->tls_type & TLS_GD) != 0)
9691 {
9692 /* This was a GD entry that has been converted to TPREL. If
9693 there happens to be a TPREL entry we can use that one. */
9694 struct got_entry *ent;
9695 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9696 if (ent->got.refcount > 0
9697 && (ent->tls_type & TLS_TPREL) != 0
9698 && ent->addend == gent->addend
9699 && ent->owner == gent->owner)
9700 {
9701 gent->got.refcount = 0;
9702 break;
9703 }
9704
9705 /* If not, then we'll be using our own TPREL entry. */
9706 if (gent->got.refcount != 0)
9707 gent->tls_type = TLS_TLS | TLS_TPREL;
9708 }
9709
9710 /* Remove any list entry that won't generate a word in the GOT before
9711 we call merge_got_entries. Otherwise we risk merging to empty
9712 entries. */
9713 pgent = &h->got.glist;
9714 while ((gent = *pgent) != NULL)
9715 if (gent->got.refcount > 0)
9716 {
9717 if ((gent->tls_type & TLS_LD) != 0
9718 && !h->def_dynamic)
9719 {
9720 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9721 *pgent = gent->next;
9722 }
9723 else
9724 pgent = &gent->next;
9725 }
9726 else
9727 *pgent = gent->next;
9728
9729 if (!htab->do_multi_toc)
9730 merge_got_entries (&h->got.glist);
9731
9732 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9733 if (!gent->is_indirect)
9734 {
9735 /* Make sure this symbol is output as a dynamic symbol.
9736 Undefined weak syms won't yet be marked as dynamic. */
9737 if (!ensure_undefweak_dynamic (info, h))
9738 return FALSE;
9739
9740 if (!is_ppc64_elf (gent->owner))
9741 abort ();
9742
9743 allocate_got (h, info, gent);
9744 }
9745
9746 if (!htab->elf.dynamic_sections_created
9747 && h->type != STT_GNU_IFUNC)
9748 eh->dyn_relocs = NULL;
9749
9750 if (eh->dyn_relocs != NULL)
9751 {
9752 struct elf_dyn_relocs *p, **pp;
9753
9754 /* In the shared -Bsymbolic case, discard space allocated for
9755 dynamic pc-relative relocs against symbols which turn out to
9756 be defined in regular objects. For the normal shared case,
9757 discard space for relocs that have become local due to symbol
9758 visibility changes. */
9759
9760 if (bfd_link_pic (info))
9761 {
9762 /* Relocs that use pc_count are those that appear on a call
9763 insn, or certain REL relocs (see must_be_dyn_reloc) that
9764 can be generated via assembly. We want calls to
9765 protected symbols to resolve directly to the function
9766 rather than going via the plt. If people want function
9767 pointer comparisons to work as expected then they should
9768 avoid writing weird assembly. */
9769 if (SYMBOL_CALLS_LOCAL (info, h))
9770 {
9771 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9772 {
9773 p->count -= p->pc_count;
9774 p->pc_count = 0;
9775 if (p->count == 0)
9776 *pp = p->next;
9777 else
9778 pp = &p->next;
9779 }
9780 }
9781
9782 /* Also discard relocs on undefined weak syms with
9783 non-default visibility. */
9784 if (eh->dyn_relocs != NULL
9785 && h->root.type == bfd_link_hash_undefweak)
9786 {
9787 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9788 eh->dyn_relocs = NULL;
9789
9790 /* Make sure this symbol is output as a dynamic symbol.
9791 Undefined weak syms won't yet be marked as dynamic. */
9792 else if (!ensure_undefweak_dynamic (info, h))
9793 return FALSE;
9794 }
9795 }
9796 else if (h->type == STT_GNU_IFUNC)
9797 {
9798 /* A plt entry is always created when making direct calls to
9799 an ifunc, even when building a static executable, but
9800 that doesn't cover all cases. We may have only an ifunc
9801 initialised function pointer for a given ifunc symbol.
9802
9803 For ELFv2, dynamic relocations are not required when
9804 generating a global entry PLT stub. */
9805 if (abiversion (info->output_bfd) >= 2)
9806 {
9807 if (global_entry_stub (h))
9808 eh->dyn_relocs = NULL;
9809 }
9810
9811 /* For ELFv1 we have function descriptors. Descriptors need
9812 to be treated like PLT entries and thus have dynamic
9813 relocations. One exception is when the function
9814 descriptor is copied into .dynbss (which should only
9815 happen with ancient versions of gcc). */
9816 else if (h->needs_copy)
9817 eh->dyn_relocs = NULL;
9818 }
9819 else if (ELIMINATE_COPY_RELOCS)
9820 {
9821 /* For the non-pic case, discard space for relocs against
9822 symbols which turn out to need copy relocs or are not
9823 dynamic. */
9824 if (!h->non_got_ref
9825 && !h->def_regular)
9826 {
9827 /* Make sure this symbol is output as a dynamic symbol.
9828 Undefined weak syms won't yet be marked as dynamic. */
9829 if (!ensure_undefweak_dynamic (info, h))
9830 return FALSE;
9831
9832 if (h->dynindx == -1)
9833 eh->dyn_relocs = NULL;
9834 }
9835 else
9836 eh->dyn_relocs = NULL;
9837 }
9838
9839 /* Finally, allocate space. */
9840 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9841 {
9842 asection *sreloc = elf_section_data (p->sec)->sreloc;
9843 if (eh->elf.type == STT_GNU_IFUNC)
9844 sreloc = htab->elf.irelplt;
9845 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9846 }
9847 }
9848
9849 if ((htab->elf.dynamic_sections_created
9850 && h->dynindx != -1)
9851 || h->type == STT_GNU_IFUNC)
9852 {
9853 struct plt_entry *pent;
9854 bfd_boolean doneone = FALSE;
9855 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9856 if (pent->plt.refcount > 0)
9857 {
9858 if (!htab->elf.dynamic_sections_created
9859 || h->dynindx == -1)
9860 {
9861 s = htab->elf.iplt;
9862 pent->plt.offset = s->size;
9863 s->size += PLT_ENTRY_SIZE (htab);
9864 s = htab->elf.irelplt;
9865 }
9866 else
9867 {
9868 /* If this is the first .plt entry, make room for the special
9869 first entry. */
9870 s = htab->elf.splt;
9871 if (s->size == 0)
9872 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9873
9874 pent->plt.offset = s->size;
9875
9876 /* Make room for this entry. */
9877 s->size += PLT_ENTRY_SIZE (htab);
9878
9879 /* Make room for the .glink code. */
9880 s = htab->glink;
9881 if (s->size == 0)
9882 s->size += GLINK_CALL_STUB_SIZE;
9883 if (htab->opd_abi)
9884 {
9885 /* We need bigger stubs past index 32767. */
9886 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9887 s->size += 4;
9888 s->size += 2*4;
9889 }
9890 else
9891 s->size += 4;
9892
9893 /* We also need to make an entry in the .rela.plt section. */
9894 s = htab->elf.srelplt;
9895 }
9896 s->size += sizeof (Elf64_External_Rela);
9897 doneone = TRUE;
9898 }
9899 else
9900 pent->plt.offset = (bfd_vma) -1;
9901 if (!doneone)
9902 {
9903 h->plt.plist = NULL;
9904 h->needs_plt = 0;
9905 }
9906 }
9907 else
9908 {
9909 h->plt.plist = NULL;
9910 h->needs_plt = 0;
9911 }
9912
9913 return TRUE;
9914}
9915
9916/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9917 to set up space for global entry stubs. These are put in glink,
9918 after the branch table. */
9919
9920static bfd_boolean
9921size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9922{
9923 struct bfd_link_info *info;
9924 struct ppc_link_hash_table *htab;
9925 struct plt_entry *pent;
9926 asection *s;
9927
9928 if (h->root.type == bfd_link_hash_indirect)
9929 return TRUE;
9930
9931 if (!h->pointer_equality_needed)
9932 return TRUE;
9933
9934 if (h->def_regular)
9935 return TRUE;
9936
9937 info = inf;
9938 htab = ppc_hash_table (info);
9939 if (htab == NULL)
9940 return FALSE;
9941
9942 s = htab->glink;
9943 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9944 if (pent->plt.offset != (bfd_vma) -1
9945 && pent->addend == 0)
9946 {
9947 /* For ELFv2, if this symbol is not defined in a regular file
9948 and we are not generating a shared library or pie, then we
9949 need to define the symbol in the executable on a call stub.
9950 This is to avoid text relocations. */
9951 s->size = (s->size + 15) & -16;
9952 h->root.type = bfd_link_hash_defined;
9953 h->root.u.def.section = s;
9954 h->root.u.def.value = s->size;
9955 s->size += 16;
9956 break;
9957 }
9958 return TRUE;
9959}
9960
9961/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9962 read-only sections. */
9963
9964static bfd_boolean
9965maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
9966{
9967 if (h->root.type == bfd_link_hash_indirect)
9968 return TRUE;
9969
9970 if (readonly_dynrelocs (h))
9971 {
9972 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
9973
9974 /* Not an error, just cut short the traversal. */
9975 return FALSE;
9976 }
9977 return TRUE;
9978}
9979
9980/* Set the sizes of the dynamic sections. */
9981
9982static bfd_boolean
9983ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9984 struct bfd_link_info *info)
9985{
9986 struct ppc_link_hash_table *htab;
9987 bfd *dynobj;
9988 asection *s;
9989 bfd_boolean relocs;
9990 bfd *ibfd;
9991 struct got_entry *first_tlsld;
9992
9993 htab = ppc_hash_table (info);
9994 if (htab == NULL)
9995 return FALSE;
9996
9997 dynobj = htab->elf.dynobj;
9998 if (dynobj == NULL)
9999 abort ();
10000
10001 if (htab->elf.dynamic_sections_created)
10002 {
10003 /* Set the contents of the .interp section to the interpreter. */
10004 if (bfd_link_executable (info) && !info->nointerp)
10005 {
10006 s = bfd_get_linker_section (dynobj, ".interp");
10007 if (s == NULL)
10008 abort ();
10009 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
10010 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
10011 }
10012 }
10013
10014 /* Set up .got offsets for local syms, and space for local dynamic
10015 relocs. */
10016 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10017 {
10018 struct got_entry **lgot_ents;
10019 struct got_entry **end_lgot_ents;
10020 struct plt_entry **local_plt;
10021 struct plt_entry **end_local_plt;
10022 unsigned char *lgot_masks;
10023 bfd_size_type locsymcount;
10024 Elf_Internal_Shdr *symtab_hdr;
10025
10026 if (!is_ppc64_elf (ibfd))
10027 continue;
10028
10029 for (s = ibfd->sections; s != NULL; s = s->next)
10030 {
10031 struct ppc_dyn_relocs *p;
10032
10033 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
10034 {
10035 if (!bfd_is_abs_section (p->sec)
10036 && bfd_is_abs_section (p->sec->output_section))
10037 {
10038 /* Input section has been discarded, either because
10039 it is a copy of a linkonce section or due to
10040 linker script /DISCARD/, so we'll be discarding
10041 the relocs too. */
10042 }
10043 else if (p->count != 0)
10044 {
10045 asection *srel = elf_section_data (p->sec)->sreloc;
10046 if (p->ifunc)
10047 srel = htab->elf.irelplt;
10048 srel->size += p->count * sizeof (Elf64_External_Rela);
10049 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10050 info->flags |= DF_TEXTREL;
10051 }
10052 }
10053 }
10054
10055 lgot_ents = elf_local_got_ents (ibfd);
10056 if (!lgot_ents)
10057 continue;
10058
10059 symtab_hdr = &elf_symtab_hdr (ibfd);
10060 locsymcount = symtab_hdr->sh_info;
10061 end_lgot_ents = lgot_ents + locsymcount;
10062 local_plt = (struct plt_entry **) end_lgot_ents;
10063 end_local_plt = local_plt + locsymcount;
10064 lgot_masks = (unsigned char *) end_local_plt;
10065 s = ppc64_elf_tdata (ibfd)->got;
10066 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
10067 {
10068 struct got_entry **pent, *ent;
10069
10070 pent = lgot_ents;
10071 while ((ent = *pent) != NULL)
10072 if (ent->got.refcount > 0)
10073 {
10074 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
10075 {
10076 ppc64_tlsld_got (ibfd)->got.refcount += 1;
10077 *pent = ent->next;
10078 }
10079 else
10080 {
10081 unsigned int ent_size = 8;
10082 unsigned int rel_size = sizeof (Elf64_External_Rela);
10083
10084 ent->got.offset = s->size;
10085 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
10086 {
10087 ent_size *= 2;
10088 rel_size *= 2;
10089 }
10090 s->size += ent_size;
10091 if ((*lgot_masks & PLT_IFUNC) != 0)
10092 {
10093 htab->elf.irelplt->size += rel_size;
10094 htab->got_reli_size += rel_size;
10095 }
10096 else if (bfd_link_pic (info))
10097 {
10098 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10099 srel->size += rel_size;
10100 }
10101 pent = &ent->next;
10102 }
10103 }
10104 else
10105 *pent = ent->next;
10106 }
10107
10108 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10109 for (; local_plt < end_local_plt; ++local_plt)
10110 {
10111 struct plt_entry *ent;
10112
10113 for (ent = *local_plt; ent != NULL; ent = ent->next)
10114 if (ent->plt.refcount > 0)
10115 {
10116 s = htab->elf.iplt;
10117 ent->plt.offset = s->size;
10118 s->size += PLT_ENTRY_SIZE (htab);
10119
10120 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10121 }
10122 else
10123 ent->plt.offset = (bfd_vma) -1;
10124 }
10125 }
10126
10127 /* Allocate global sym .plt and .got entries, and space for global
10128 sym dynamic relocs. */
10129 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10130 /* Stash the end of glink branch table. */
10131 if (htab->glink != NULL)
10132 htab->glink->rawsize = htab->glink->size;
10133
10134 if (!htab->opd_abi && !bfd_link_pic (info))
10135 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10136
10137 first_tlsld = NULL;
10138 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10139 {
10140 struct got_entry *ent;
10141
10142 if (!is_ppc64_elf (ibfd))
10143 continue;
10144
10145 ent = ppc64_tlsld_got (ibfd);
10146 if (ent->got.refcount > 0)
10147 {
10148 if (!htab->do_multi_toc && first_tlsld != NULL)
10149 {
10150 ent->is_indirect = TRUE;
10151 ent->got.ent = first_tlsld;
10152 }
10153 else
10154 {
10155 if (first_tlsld == NULL)
10156 first_tlsld = ent;
10157 s = ppc64_elf_tdata (ibfd)->got;
10158 ent->got.offset = s->size;
10159 ent->owner = ibfd;
10160 s->size += 16;
10161 if (bfd_link_pic (info))
10162 {
10163 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10164 srel->size += sizeof (Elf64_External_Rela);
10165 }
10166 }
10167 }
10168 else
10169 ent->got.offset = (bfd_vma) -1;
10170 }
10171
10172 /* We now have determined the sizes of the various dynamic sections.
10173 Allocate memory for them. */
10174 relocs = FALSE;
10175 for (s = dynobj->sections; s != NULL; s = s->next)
10176 {
10177 if ((s->flags & SEC_LINKER_CREATED) == 0)
10178 continue;
10179
10180 if (s == htab->brlt || s == htab->relbrlt)
10181 /* These haven't been allocated yet; don't strip. */
10182 continue;
10183 else if (s == htab->elf.sgot
10184 || s == htab->elf.splt
10185 || s == htab->elf.iplt
10186 || s == htab->glink
10187 || s == htab->elf.sdynbss
10188 || s == htab->elf.sdynrelro)
10189 {
10190 /* Strip this section if we don't need it; see the
10191 comment below. */
10192 }
10193 else if (s == htab->glink_eh_frame)
10194 {
10195 if (!bfd_is_abs_section (s->output_section))
10196 /* Not sized yet. */
10197 continue;
10198 }
10199 else if (CONST_STRNEQ (s->name, ".rela"))
10200 {
10201 if (s->size != 0)
10202 {
10203 if (s != htab->elf.srelplt)
10204 relocs = TRUE;
10205
10206 /* We use the reloc_count field as a counter if we need
10207 to copy relocs into the output file. */
10208 s->reloc_count = 0;
10209 }
10210 }
10211 else
10212 {
10213 /* It's not one of our sections, so don't allocate space. */
10214 continue;
10215 }
10216
10217 if (s->size == 0)
10218 {
10219 /* If we don't need this section, strip it from the
10220 output file. This is mostly to handle .rela.bss and
10221 .rela.plt. We must create both sections in
10222 create_dynamic_sections, because they must be created
10223 before the linker maps input sections to output
10224 sections. The linker does that before
10225 adjust_dynamic_symbol is called, and it is that
10226 function which decides whether anything needs to go
10227 into these sections. */
10228 s->flags |= SEC_EXCLUDE;
10229 continue;
10230 }
10231
10232 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10233 continue;
10234
10235 /* Allocate memory for the section contents. We use bfd_zalloc
10236 here in case unused entries are not reclaimed before the
10237 section's contents are written out. This should not happen,
10238 but this way if it does we get a R_PPC64_NONE reloc in .rela
10239 sections instead of garbage.
10240 We also rely on the section contents being zero when writing
10241 the GOT and .dynrelro. */
10242 s->contents = bfd_zalloc (dynobj, s->size);
10243 if (s->contents == NULL)
10244 return FALSE;
10245 }
10246
10247 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10248 {
10249 if (!is_ppc64_elf (ibfd))
10250 continue;
10251
10252 s = ppc64_elf_tdata (ibfd)->got;
10253 if (s != NULL && s != htab->elf.sgot)
10254 {
10255 if (s->size == 0)
10256 s->flags |= SEC_EXCLUDE;
10257 else
10258 {
10259 s->contents = bfd_zalloc (ibfd, s->size);
10260 if (s->contents == NULL)
10261 return FALSE;
10262 }
10263 }
10264 s = ppc64_elf_tdata (ibfd)->relgot;
10265 if (s != NULL)
10266 {
10267 if (s->size == 0)
10268 s->flags |= SEC_EXCLUDE;
10269 else
10270 {
10271 s->contents = bfd_zalloc (ibfd, s->size);
10272 if (s->contents == NULL)
10273 return FALSE;
10274 relocs = TRUE;
10275 s->reloc_count = 0;
10276 }
10277 }
10278 }
10279
10280 if (htab->elf.dynamic_sections_created)
10281 {
10282 bfd_boolean tls_opt;
10283
10284 /* Add some entries to the .dynamic section. We fill in the
10285 values later, in ppc64_elf_finish_dynamic_sections, but we
10286 must add the entries now so that we get the correct size for
10287 the .dynamic section. The DT_DEBUG entry is filled in by the
10288 dynamic linker and used by the debugger. */
10289#define add_dynamic_entry(TAG, VAL) \
10290 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10291
10292 if (bfd_link_executable (info))
10293 {
10294 if (!add_dynamic_entry (DT_DEBUG, 0))
10295 return FALSE;
10296 }
10297
10298 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10299 {
10300 if (!add_dynamic_entry (DT_PLTGOT, 0)
10301 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10302 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10303 || !add_dynamic_entry (DT_JMPREL, 0)
10304 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10305 return FALSE;
10306 }
10307
10308 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10309 {
10310 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10311 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10312 return FALSE;
10313 }
10314
10315 tls_opt = (htab->params->tls_get_addr_opt
10316 && htab->tls_get_addr_fd != NULL
10317 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10318 if (tls_opt || !htab->opd_abi)
10319 {
10320 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10321 return FALSE;
10322 }
10323
10324 if (relocs)
10325 {
10326 if (!add_dynamic_entry (DT_RELA, 0)
10327 || !add_dynamic_entry (DT_RELASZ, 0)
10328 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10329 return FALSE;
10330
10331 /* If any dynamic relocs apply to a read-only section,
10332 then we need a DT_TEXTREL entry. */
10333 if ((info->flags & DF_TEXTREL) == 0)
10334 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10335
10336 if ((info->flags & DF_TEXTREL) != 0)
10337 {
10338 if (!add_dynamic_entry (DT_TEXTREL, 0))
10339 return FALSE;
10340 }
10341 }
10342 }
10343#undef add_dynamic_entry
10344
10345 return TRUE;
10346}
10347
10348/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10349
10350static bfd_boolean
10351ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10352{
10353 if (h->plt.plist != NULL
10354 && !h->def_regular
10355 && !h->pointer_equality_needed)
10356 return FALSE;
10357
10358 return _bfd_elf_hash_symbol (h);
10359}
10360
10361/* Determine the type of stub needed, if any, for a call. */
10362
10363static inline enum ppc_stub_type
10364ppc_type_of_stub (asection *input_sec,
10365 const Elf_Internal_Rela *rel,
10366 struct ppc_link_hash_entry **hash,
10367 struct plt_entry **plt_ent,
10368 bfd_vma destination,
10369 unsigned long local_off)
10370{
10371 struct ppc_link_hash_entry *h = *hash;
10372 bfd_vma location;
10373 bfd_vma branch_offset;
10374 bfd_vma max_branch_offset;
10375 enum elf_ppc64_reloc_type r_type;
10376
10377 if (h != NULL)
10378 {
10379 struct plt_entry *ent;
10380 struct ppc_link_hash_entry *fdh = h;
10381 if (h->oh != NULL
10382 && h->oh->is_func_descriptor)
10383 {
10384 fdh = ppc_follow_link (h->oh);
10385 *hash = fdh;
10386 }
10387
10388 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10389 if (ent->addend == rel->r_addend
10390 && ent->plt.offset != (bfd_vma) -1)
10391 {
10392 *plt_ent = ent;
10393 return ppc_stub_plt_call;
10394 }
10395
10396 /* Here, we know we don't have a plt entry. If we don't have a
10397 either a defined function descriptor or a defined entry symbol
10398 in a regular object file, then it is pointless trying to make
10399 any other type of stub. */
10400 if (!is_static_defined (&fdh->elf)
10401 && !is_static_defined (&h->elf))
10402 return ppc_stub_none;
10403 }
10404 else if (elf_local_got_ents (input_sec->owner) != NULL)
10405 {
10406 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10407 struct plt_entry **local_plt = (struct plt_entry **)
10408 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10409 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10410
10411 if (local_plt[r_symndx] != NULL)
10412 {
10413 struct plt_entry *ent;
10414
10415 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10416 if (ent->addend == rel->r_addend
10417 && ent->plt.offset != (bfd_vma) -1)
10418 {
10419 *plt_ent = ent;
10420 return ppc_stub_plt_call;
10421 }
10422 }
10423 }
10424
10425 /* Determine where the call point is. */
10426 location = (input_sec->output_offset
10427 + input_sec->output_section->vma
10428 + rel->r_offset);
10429
10430 branch_offset = destination - location;
10431 r_type = ELF64_R_TYPE (rel->r_info);
10432
10433 /* Determine if a long branch stub is needed. */
10434 max_branch_offset = 1 << 25;
10435 if (r_type != R_PPC64_REL24)
10436 max_branch_offset = 1 << 15;
10437
10438 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10439 /* We need a stub. Figure out whether a long_branch or plt_branch
10440 is needed later. */
10441 return ppc_stub_long_branch;
10442
10443 return ppc_stub_none;
10444}
10445
10446/* With power7 weakly ordered memory model, it is possible for ld.so
10447 to update a plt entry in one thread and have another thread see a
10448 stale zero toc entry. To avoid this we need some sort of acquire
10449 barrier in the call stub. One solution is to make the load of the
10450 toc word seem to appear to depend on the load of the function entry
10451 word. Another solution is to test for r2 being zero, and branch to
10452 the appropriate glink entry if so.
10453
10454 . fake dep barrier compare
10455 . ld 12,xxx(2) ld 12,xxx(2)
10456 . mtctr 12 mtctr 12
10457 . xor 11,12,12 ld 2,xxx+8(2)
10458 . add 2,2,11 cmpldi 2,0
10459 . ld 2,xxx+8(2) bnectr+
10460 . bctr b <glink_entry>
10461
10462 The solution involving the compare turns out to be faster, so
10463 that's what we use unless the branch won't reach. */
10464
10465#define ALWAYS_USE_FAKE_DEP 0
10466#define ALWAYS_EMIT_R2SAVE 0
10467
10468#define PPC_LO(v) ((v) & 0xffff)
10469#define PPC_HI(v) (((v) >> 16) & 0xffff)
10470#define PPC_HA(v) PPC_HI ((v) + 0x8000)
10471
10472static inline unsigned int
10473plt_stub_size (struct ppc_link_hash_table *htab,
10474 struct ppc_stub_hash_entry *stub_entry,
10475 bfd_vma off)
10476{
10477 unsigned size = 12;
10478
10479 if (ALWAYS_EMIT_R2SAVE
10480 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10481 size += 4;
10482 if (PPC_HA (off) != 0)
10483 size += 4;
10484 if (htab->opd_abi)
10485 {
10486 size += 4;
10487 if (htab->params->plt_static_chain)
10488 size += 4;
10489 if (htab->params->plt_thread_safe
10490 && htab->elf.dynamic_sections_created
10491 && stub_entry->h != NULL
10492 && stub_entry->h->elf.dynindx != -1)
10493 size += 8;
10494 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10495 size += 4;
10496 }
10497 if (stub_entry->h != NULL
10498 && (stub_entry->h == htab->tls_get_addr_fd
10499 || stub_entry->h == htab->tls_get_addr)
10500 && htab->params->tls_get_addr_opt)
10501 size += 13 * 4;
10502 return size;
10503}
10504
10505/* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10506 then return the padding needed to do so. */
10507static inline unsigned int
10508plt_stub_pad (struct ppc_link_hash_table *htab,
10509 struct ppc_stub_hash_entry *stub_entry,
10510 bfd_vma plt_off)
10511{
10512 int stub_align = 1 << htab->params->plt_stub_align;
10513 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
10514 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10515
10516 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10517 > ((stub_size - 1) & -stub_align))
10518 return stub_align - (stub_off & (stub_align - 1));
10519 return 0;
10520}
10521
10522/* Build a .plt call stub. */
10523
10524static inline bfd_byte *
10525build_plt_stub (struct ppc_link_hash_table *htab,
10526 struct ppc_stub_hash_entry *stub_entry,
10527 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10528{
10529 bfd *obfd = htab->params->stub_bfd;
10530 bfd_boolean plt_load_toc = htab->opd_abi;
10531 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10532 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10533 && htab->elf.dynamic_sections_created
10534 && stub_entry->h != NULL
10535 && stub_entry->h->elf.dynindx != -1);
10536 bfd_boolean use_fake_dep = plt_thread_safe;
10537 bfd_vma cmp_branch_off = 0;
10538
10539 if (!ALWAYS_USE_FAKE_DEP
10540 && plt_load_toc
10541 && plt_thread_safe
10542 && !((stub_entry->h == htab->tls_get_addr_fd
10543 || stub_entry->h == htab->tls_get_addr)
10544 && htab->params->tls_get_addr_opt))
10545 {
10546 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10547 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10548 / PLT_ENTRY_SIZE (htab));
10549 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10550 bfd_vma to, from;
10551
10552 if (pltindex > 32768)
10553 glinkoff += (pltindex - 32768) * 4;
10554 to = (glinkoff
10555 + htab->glink->output_offset
10556 + htab->glink->output_section->vma);
10557 from = (p - stub_entry->group->stub_sec->contents
10558 + 4 * (ALWAYS_EMIT_R2SAVE
10559 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10560 + 4 * (PPC_HA (offset) != 0)
10561 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10562 != PPC_HA (offset))
10563 + 4 * (plt_static_chain != 0)
10564 + 20
10565 + stub_entry->group->stub_sec->output_offset
10566 + stub_entry->group->stub_sec->output_section->vma);
10567 cmp_branch_off = to - from;
10568 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10569 }
10570
10571 if (PPC_HA (offset) != 0)
10572 {
10573 if (r != NULL)
10574 {
10575 if (ALWAYS_EMIT_R2SAVE
10576 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10577 r[0].r_offset += 4;
10578 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10579 r[1].r_offset = r[0].r_offset + 4;
10580 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10581 r[1].r_addend = r[0].r_addend;
10582 if (plt_load_toc)
10583 {
10584 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10585 {
10586 r[2].r_offset = r[1].r_offset + 4;
10587 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10588 r[2].r_addend = r[0].r_addend;
10589 }
10590 else
10591 {
10592 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10593 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10594 r[2].r_addend = r[0].r_addend + 8;
10595 if (plt_static_chain)
10596 {
10597 r[3].r_offset = r[2].r_offset + 4;
10598 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10599 r[3].r_addend = r[0].r_addend + 16;
10600 }
10601 }
10602 }
10603 }
10604 if (ALWAYS_EMIT_R2SAVE
10605 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10606 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10607 if (plt_load_toc)
10608 {
10609 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10610 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10611 }
10612 else
10613 {
10614 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10615 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10616 }
10617 if (plt_load_toc
10618 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10619 {
10620 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10621 offset = 0;
10622 }
10623 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10624 if (plt_load_toc)
10625 {
10626 if (use_fake_dep)
10627 {
10628 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10629 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10630 }
10631 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10632 if (plt_static_chain)
10633 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10634 }
10635 }
10636 else
10637 {
10638 if (r != NULL)
10639 {
10640 if (ALWAYS_EMIT_R2SAVE
10641 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10642 r[0].r_offset += 4;
10643 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10644 if (plt_load_toc)
10645 {
10646 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10647 {
10648 r[1].r_offset = r[0].r_offset + 4;
10649 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10650 r[1].r_addend = r[0].r_addend;
10651 }
10652 else
10653 {
10654 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10655 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10656 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10657 if (plt_static_chain)
10658 {
10659 r[2].r_offset = r[1].r_offset + 4;
10660 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10661 r[2].r_addend = r[0].r_addend + 8;
10662 }
10663 }
10664 }
10665 }
10666 if (ALWAYS_EMIT_R2SAVE
10667 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10668 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10669 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10670 if (plt_load_toc
10671 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10672 {
10673 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10674 offset = 0;
10675 }
10676 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10677 if (plt_load_toc)
10678 {
10679 if (use_fake_dep)
10680 {
10681 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10682 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10683 }
10684 if (plt_static_chain)
10685 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10686 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10687 }
10688 }
10689 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10690 {
10691 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10692 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10693 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10694 }
10695 else
10696 bfd_put_32 (obfd, BCTR, p), p += 4;
10697 return p;
10698}
10699
10700/* Build a special .plt call stub for __tls_get_addr. */
10701
10702#define LD_R11_0R3 0xe9630000
10703#define LD_R12_0R3 0xe9830000
10704#define MR_R0_R3 0x7c601b78
10705#define CMPDI_R11_0 0x2c2b0000
10706#define ADD_R3_R12_R13 0x7c6c6a14
10707#define BEQLR 0x4d820020
10708#define MR_R3_R0 0x7c030378
10709#define STD_R11_0R1 0xf9610000
10710#define BCTRL 0x4e800421
10711#define LD_R11_0R1 0xe9610000
10712#define MTLR_R11 0x7d6803a6
10713
10714static inline bfd_byte *
10715build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10716 struct ppc_stub_hash_entry *stub_entry,
10717 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10718{
10719 bfd *obfd = htab->params->stub_bfd;
10720
10721 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10722 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10723 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10724 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10725 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10726 bfd_put_32 (obfd, BEQLR, p), p += 4;
10727 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10728 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10729 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10730
10731 if (r != NULL)
10732 r[0].r_offset += 9 * 4;
10733 p = build_plt_stub (htab, stub_entry, p, offset, r);
10734 bfd_put_32 (obfd, BCTRL, p - 4);
10735
10736 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10737 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10738 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10739 bfd_put_32 (obfd, BLR, p), p += 4;
10740
10741 return p;
10742}
10743
10744static Elf_Internal_Rela *
10745get_relocs (asection *sec, int count)
10746{
10747 Elf_Internal_Rela *relocs;
10748 struct bfd_elf_section_data *elfsec_data;
10749
10750 elfsec_data = elf_section_data (sec);
10751 relocs = elfsec_data->relocs;
10752 if (relocs == NULL)
10753 {
10754 bfd_size_type relsize;
10755 relsize = sec->reloc_count * sizeof (*relocs);
10756 relocs = bfd_alloc (sec->owner, relsize);
10757 if (relocs == NULL)
10758 return NULL;
10759 elfsec_data->relocs = relocs;
10760 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10761 sizeof (Elf_Internal_Shdr));
10762 if (elfsec_data->rela.hdr == NULL)
10763 return NULL;
10764 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10765 * sizeof (Elf64_External_Rela));
10766 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10767 sec->reloc_count = 0;
10768 }
10769 relocs += sec->reloc_count;
10770 sec->reloc_count += count;
10771 return relocs;
10772}
10773
10774static bfd_vma
10775get_r2off (struct bfd_link_info *info,
10776 struct ppc_stub_hash_entry *stub_entry)
10777{
10778 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10779 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
10780
10781 if (r2off == 0)
10782 {
10783 /* Support linking -R objects. Get the toc pointer from the
10784 opd entry. */
10785 char buf[8];
10786 if (!htab->opd_abi)
10787 return r2off;
10788 asection *opd = stub_entry->h->elf.root.u.def.section;
10789 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10790
10791 if (strcmp (opd->name, ".opd") != 0
10792 || opd->reloc_count != 0)
10793 {
10794 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
10795 stub_entry->h->elf.root.root.string);
10796 bfd_set_error (bfd_error_bad_value);
10797 return (bfd_vma) -1;
10798 }
10799 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
10800 return (bfd_vma) -1;
10801 r2off = bfd_get_64 (opd->owner, buf);
10802 r2off -= elf_gp (info->output_bfd);
10803 }
10804 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
10805 return r2off;
10806}
10807
10808static bfd_boolean
10809ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
10810{
10811 struct ppc_stub_hash_entry *stub_entry;
10812 struct ppc_branch_hash_entry *br_entry;
10813 struct bfd_link_info *info;
10814 struct ppc_link_hash_table *htab;
10815 bfd_byte *loc;
10816 bfd_byte *p;
10817 bfd_vma dest, off;
10818 int size;
10819 Elf_Internal_Rela *r;
10820 asection *plt;
10821
10822 /* Massage our args to the form they really have. */
10823 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
10824 info = in_arg;
10825
10826 htab = ppc_hash_table (info);
10827 if (htab == NULL)
10828 return FALSE;
10829
10830 /* Make a note of the offset within the stubs for this entry. */
10831 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10832 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
10833
10834 htab->stub_count[stub_entry->stub_type - 1] += 1;
10835 switch (stub_entry->stub_type)
10836 {
10837 case ppc_stub_long_branch:
10838 case ppc_stub_long_branch_r2off:
10839 /* Branches are relative. This is where we are going to. */
10840 dest = (stub_entry->target_value
10841 + stub_entry->target_section->output_offset
10842 + stub_entry->target_section->output_section->vma);
10843 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10844 off = dest;
10845
10846 /* And this is where we are coming from. */
10847 off -= (stub_entry->stub_offset
10848 + stub_entry->group->stub_sec->output_offset
10849 + stub_entry->group->stub_sec->output_section->vma);
10850
10851 size = 4;
10852 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10853 {
10854 bfd_vma r2off = get_r2off (info, stub_entry);
10855
10856 if (r2off == (bfd_vma) -1)
10857 {
10858 htab->stub_error = TRUE;
10859 return FALSE;
10860 }
10861 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
10862 loc += 4;
10863 size = 8;
10864 if (PPC_HA (r2off) != 0)
10865 {
10866 bfd_put_32 (htab->params->stub_bfd,
10867 ADDIS_R2_R2 | PPC_HA (r2off), loc);
10868 loc += 4;
10869 size += 4;
10870 }
10871 if (PPC_LO (r2off) != 0)
10872 {
10873 bfd_put_32 (htab->params->stub_bfd,
10874 ADDI_R2_R2 | PPC_LO (r2off), loc);
10875 loc += 4;
10876 size += 4;
10877 }
10878 off -= size - 4;
10879 }
10880 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
10881
10882 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10883 {
10884 info->callbacks->einfo
10885 (_("%P: long branch stub `%s' offset overflow\n"),
10886 stub_entry->root.string);
10887 htab->stub_error = TRUE;
10888 return FALSE;
10889 }
10890
10891 if (info->emitrelocations)
10892 {
10893 r = get_relocs (stub_entry->group->stub_sec, 1);
10894 if (r == NULL)
10895 return FALSE;
10896 r->r_offset = loc - stub_entry->group->stub_sec->contents;
10897 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10898 r->r_addend = dest;
10899 if (stub_entry->h != NULL)
10900 {
10901 struct elf_link_hash_entry **hashes;
10902 unsigned long symndx;
10903 struct ppc_link_hash_entry *h;
10904
10905 hashes = elf_sym_hashes (htab->params->stub_bfd);
10906 if (hashes == NULL)
10907 {
10908 bfd_size_type hsize;
10909
10910 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10911 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10912 if (hashes == NULL)
10913 return FALSE;
10914 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10915 htab->stub_globals = 1;
10916 }
10917 symndx = htab->stub_globals++;
10918 h = stub_entry->h;
10919 hashes[symndx] = &h->elf;
10920 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10921 if (h->oh != NULL && h->oh->is_func)
10922 h = ppc_follow_link (h->oh);
10923 if (h->elf.root.u.def.section != stub_entry->target_section)
10924 /* H is an opd symbol. The addend must be zero. */
10925 r->r_addend = 0;
10926 else
10927 {
10928 off = (h->elf.root.u.def.value
10929 + h->elf.root.u.def.section->output_offset
10930 + h->elf.root.u.def.section->output_section->vma);
10931 r->r_addend -= off;
10932 }
10933 }
10934 }
10935 break;
10936
10937 case ppc_stub_plt_branch:
10938 case ppc_stub_plt_branch_r2off:
10939 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10940 stub_entry->root.string + 9,
10941 FALSE, FALSE);
10942 if (br_entry == NULL)
10943 {
10944 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
10945 stub_entry->root.string);
10946 htab->stub_error = TRUE;
10947 return FALSE;
10948 }
10949
10950 dest = (stub_entry->target_value
10951 + stub_entry->target_section->output_offset
10952 + stub_entry->target_section->output_section->vma);
10953 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10954 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10955
10956 bfd_put_64 (htab->brlt->owner, dest,
10957 htab->brlt->contents + br_entry->offset);
10958
10959 if (br_entry->iter == htab->stub_iteration)
10960 {
10961 br_entry->iter = 0;
10962
10963 if (htab->relbrlt != NULL)
10964 {
10965 /* Create a reloc for the branch lookup table entry. */
10966 Elf_Internal_Rela rela;
10967 bfd_byte *rl;
10968
10969 rela.r_offset = (br_entry->offset
10970 + htab->brlt->output_offset
10971 + htab->brlt->output_section->vma);
10972 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10973 rela.r_addend = dest;
10974
10975 rl = htab->relbrlt->contents;
10976 rl += (htab->relbrlt->reloc_count++
10977 * sizeof (Elf64_External_Rela));
10978 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10979 }
10980 else if (info->emitrelocations)
10981 {
10982 r = get_relocs (htab->brlt, 1);
10983 if (r == NULL)
10984 return FALSE;
10985 /* brlt, being SEC_LINKER_CREATED does not go through the
10986 normal reloc processing. Symbols and offsets are not
10987 translated from input file to output file form, so
10988 set up the offset per the output file. */
10989 r->r_offset = (br_entry->offset
10990 + htab->brlt->output_offset
10991 + htab->brlt->output_section->vma);
10992 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10993 r->r_addend = dest;
10994 }
10995 }
10996
10997 dest = (br_entry->offset
10998 + htab->brlt->output_offset
10999 + htab->brlt->output_section->vma);
11000
11001 off = (dest
11002 - elf_gp (htab->brlt->output_section->owner)
11003 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11004
11005 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11006 {
11007 info->callbacks->einfo
11008 (_("%P: linkage table error against `%T'\n"),
11009 stub_entry->root.string);
11010 bfd_set_error (bfd_error_bad_value);
11011 htab->stub_error = TRUE;
11012 return FALSE;
11013 }
11014
11015 if (info->emitrelocations)
11016 {
11017 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11018 if (r == NULL)
11019 return FALSE;
11020 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11021 if (bfd_big_endian (info->output_bfd))
11022 r[0].r_offset += 2;
11023 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11024 r[0].r_offset += 4;
11025 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11026 r[0].r_addend = dest;
11027 if (PPC_HA (off) != 0)
11028 {
11029 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11030 r[1].r_offset = r[0].r_offset + 4;
11031 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11032 r[1].r_addend = r[0].r_addend;
11033 }
11034 }
11035
11036 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11037 {
11038 if (PPC_HA (off) != 0)
11039 {
11040 size = 16;
11041 bfd_put_32 (htab->params->stub_bfd,
11042 ADDIS_R12_R2 | PPC_HA (off), loc);
11043 loc += 4;
11044 bfd_put_32 (htab->params->stub_bfd,
11045 LD_R12_0R12 | PPC_LO (off), loc);
11046 }
11047 else
11048 {
11049 size = 12;
11050 bfd_put_32 (htab->params->stub_bfd,
11051 LD_R12_0R2 | PPC_LO (off), loc);
11052 }
11053 }
11054 else
11055 {
11056 bfd_vma r2off = get_r2off (info, stub_entry);
11057
11058 if (r2off == (bfd_vma) -1)
11059 {
11060 htab->stub_error = TRUE;
11061 return FALSE;
11062 }
11063
11064 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
11065 loc += 4;
11066 size = 16;
11067 if (PPC_HA (off) != 0)
11068 {
11069 size += 4;
11070 bfd_put_32 (htab->params->stub_bfd,
11071 ADDIS_R12_R2 | PPC_HA (off), loc);
11072 loc += 4;
11073 bfd_put_32 (htab->params->stub_bfd,
11074 LD_R12_0R12 | PPC_LO (off), loc);
11075 }
11076 else
11077 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
11078
11079 if (PPC_HA (r2off) != 0)
11080 {
11081 size += 4;
11082 loc += 4;
11083 bfd_put_32 (htab->params->stub_bfd,
11084 ADDIS_R2_R2 | PPC_HA (r2off), loc);
11085 }
11086 if (PPC_LO (r2off) != 0)
11087 {
11088 size += 4;
11089 loc += 4;
11090 bfd_put_32 (htab->params->stub_bfd,
11091 ADDI_R2_R2 | PPC_LO (r2off), loc);
11092 }
11093 }
11094 loc += 4;
11095 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
11096 loc += 4;
11097 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
11098 break;
11099
11100 case ppc_stub_plt_call:
11101 case ppc_stub_plt_call_r2save:
11102 if (stub_entry->h != NULL
11103 && stub_entry->h->is_func_descriptor
11104 && stub_entry->h->oh != NULL)
11105 {
11106 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11107
11108 /* If the old-ABI "dot-symbol" is undefined make it weak so
11109 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11110 if (fh->elf.root.type == bfd_link_hash_undefined
11111 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11112 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11113 fh->elf.root.type = bfd_link_hash_undefweak;
11114 }
11115
11116 /* Now build the stub. */
11117 dest = stub_entry->plt_ent->plt.offset & ~1;
11118 if (dest >= (bfd_vma) -2)
11119 abort ();
11120
11121 plt = htab->elf.splt;
11122 if (!htab->elf.dynamic_sections_created
11123 || stub_entry->h == NULL
11124 || stub_entry->h->elf.dynindx == -1)
11125 plt = htab->elf.iplt;
11126
11127 dest += plt->output_offset + plt->output_section->vma;
11128
11129 if (stub_entry->h == NULL
11130 && (stub_entry->plt_ent->plt.offset & 1) == 0)
11131 {
11132 Elf_Internal_Rela rela;
11133 bfd_byte *rl;
11134
11135 rela.r_offset = dest;
11136 if (htab->opd_abi)
11137 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
11138 else
11139 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
11140 rela.r_addend = (stub_entry->target_value
11141 + stub_entry->target_section->output_offset
11142 + stub_entry->target_section->output_section->vma);
11143
11144 rl = (htab->elf.irelplt->contents
11145 + (htab->elf.irelplt->reloc_count++
11146 * sizeof (Elf64_External_Rela)));
11147 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
11148 stub_entry->plt_ent->plt.offset |= 1;
11149 }
11150
11151 off = (dest
11152 - elf_gp (plt->output_section->owner)
11153 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11154
11155 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11156 {
11157 info->callbacks->einfo
11158 /* xgettext:c-format */
11159 (_("%P: linkage table error against `%T'\n"),
11160 stub_entry->h != NULL
11161 ? stub_entry->h->elf.root.root.string
11162 : "<local sym>");
11163 bfd_set_error (bfd_error_bad_value);
11164 htab->stub_error = TRUE;
11165 return FALSE;
11166 }
11167
11168 if (htab->params->plt_stub_align != 0)
11169 {
11170 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11171
11172 stub_entry->group->stub_sec->size += pad;
11173 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11174 loc += pad;
11175 }
11176
11177 r = NULL;
11178 if (info->emitrelocations)
11179 {
11180 r = get_relocs (stub_entry->group->stub_sec,
11181 ((PPC_HA (off) != 0)
11182 + (htab->opd_abi
11183 ? 2 + (htab->params->plt_static_chain
11184 && PPC_HA (off + 16) == PPC_HA (off))
11185 : 1)));
11186 if (r == NULL)
11187 return FALSE;
11188 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11189 if (bfd_big_endian (info->output_bfd))
11190 r[0].r_offset += 2;
11191 r[0].r_addend = dest;
11192 }
11193 if (stub_entry->h != NULL
11194 && (stub_entry->h == htab->tls_get_addr_fd
11195 || stub_entry->h == htab->tls_get_addr)
11196 && htab->params->tls_get_addr_opt)
11197 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11198 else
11199 p = build_plt_stub (htab, stub_entry, loc, off, r);
11200 size = p - loc;
11201 break;
11202
11203 case ppc_stub_save_res:
11204 return TRUE;
11205
11206 default:
11207 BFD_FAIL ();
11208 return FALSE;
11209 }
11210
11211 stub_entry->group->stub_sec->size += size;
11212
11213 if (htab->params->emit_stub_syms)
11214 {
11215 struct elf_link_hash_entry *h;
11216 size_t len1, len2;
11217 char *name;
11218 const char *const stub_str[] = { "long_branch",
11219 "long_branch_r2off",
11220 "plt_branch",
11221 "plt_branch_r2off",
11222 "plt_call",
11223 "plt_call" };
11224
11225 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11226 len2 = strlen (stub_entry->root.string);
11227 name = bfd_malloc (len1 + len2 + 2);
11228 if (name == NULL)
11229 return FALSE;
11230 memcpy (name, stub_entry->root.string, 9);
11231 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11232 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11233 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11234 if (h == NULL)
11235 return FALSE;
11236 if (h->root.type == bfd_link_hash_new)
11237 {
11238 h->root.type = bfd_link_hash_defined;
11239 h->root.u.def.section = stub_entry->group->stub_sec;
11240 h->root.u.def.value = stub_entry->stub_offset;
11241 h->ref_regular = 1;
11242 h->def_regular = 1;
11243 h->ref_regular_nonweak = 1;
11244 h->forced_local = 1;
11245 h->non_elf = 0;
11246 h->root.linker_def = 1;
11247 }
11248 }
11249
11250 return TRUE;
11251}
11252
11253/* As above, but don't actually build the stub. Just bump offset so
11254 we know stub section sizes, and select plt_branch stubs where
11255 long_branch stubs won't do. */
11256
11257static bfd_boolean
11258ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11259{
11260 struct ppc_stub_hash_entry *stub_entry;
11261 struct bfd_link_info *info;
11262 struct ppc_link_hash_table *htab;
11263 bfd_vma off;
11264 int size;
11265
11266 /* Massage our args to the form they really have. */
11267 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11268 info = in_arg;
11269
11270 htab = ppc_hash_table (info);
11271 if (htab == NULL)
11272 return FALSE;
11273
11274 if (stub_entry->h != NULL
11275 && stub_entry->h->save_res
11276 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11277 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11278 {
11279 /* Don't make stubs to out-of-line register save/restore
11280 functions. Instead, emit copies of the functions. */
11281 stub_entry->group->needs_save_res = 1;
11282 stub_entry->stub_type = ppc_stub_save_res;
11283 return TRUE;
11284 }
11285
11286 if (stub_entry->stub_type == ppc_stub_plt_call
11287 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11288 {
11289 asection *plt;
11290 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11291 if (off >= (bfd_vma) -2)
11292 abort ();
11293 plt = htab->elf.splt;
11294 if (!htab->elf.dynamic_sections_created
11295 || stub_entry->h == NULL
11296 || stub_entry->h->elf.dynindx == -1)
11297 plt = htab->elf.iplt;
11298 off += (plt->output_offset
11299 + plt->output_section->vma
11300 - elf_gp (plt->output_section->owner)
11301 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11302
11303 size = plt_stub_size (htab, stub_entry, off);
11304 if (htab->params->plt_stub_align)
11305 size += plt_stub_pad (htab, stub_entry, off);
11306 if (info->emitrelocations)
11307 {
11308 stub_entry->group->stub_sec->reloc_count
11309 += ((PPC_HA (off) != 0)
11310 + (htab->opd_abi
11311 ? 2 + (htab->params->plt_static_chain
11312 && PPC_HA (off + 16) == PPC_HA (off))
11313 : 1));
11314 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11315 }
11316 }
11317 else
11318 {
11319 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11320 variants. */
11321 bfd_vma r2off = 0;
11322 bfd_vma local_off = 0;
11323
11324 off = (stub_entry->target_value
11325 + stub_entry->target_section->output_offset
11326 + stub_entry->target_section->output_section->vma);
11327 off -= (stub_entry->group->stub_sec->size
11328 + stub_entry->group->stub_sec->output_offset
11329 + stub_entry->group->stub_sec->output_section->vma);
11330
11331 /* Reset the stub type from the plt variant in case we now
11332 can reach with a shorter stub. */
11333 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11334 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11335
11336 size = 4;
11337 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11338 {
11339 r2off = get_r2off (info, stub_entry);
11340 if (r2off == (bfd_vma) -1)
11341 {
11342 htab->stub_error = TRUE;
11343 return FALSE;
11344 }
11345 size = 8;
11346 if (PPC_HA (r2off) != 0)
11347 size += 4;
11348 if (PPC_LO (r2off) != 0)
11349 size += 4;
11350 off -= size - 4;
11351 }
11352
11353 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11354
11355 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11356 Do the same for -R objects without function descriptors. */
11357 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11358 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
11359 && r2off == 0
11360 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
11361 {
11362 struct ppc_branch_hash_entry *br_entry;
11363
11364 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11365 stub_entry->root.string + 9,
11366 TRUE, FALSE);
11367 if (br_entry == NULL)
11368 {
11369 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
11370 stub_entry->root.string);
11371 htab->stub_error = TRUE;
11372 return FALSE;
11373 }
11374
11375 if (br_entry->iter != htab->stub_iteration)
11376 {
11377 br_entry->iter = htab->stub_iteration;
11378 br_entry->offset = htab->brlt->size;
11379 htab->brlt->size += 8;
11380
11381 if (htab->relbrlt != NULL)
11382 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11383 else if (info->emitrelocations)
11384 {
11385 htab->brlt->reloc_count += 1;
11386 htab->brlt->flags |= SEC_RELOC;
11387 }
11388 }
11389
11390 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11391 off = (br_entry->offset
11392 + htab->brlt->output_offset
11393 + htab->brlt->output_section->vma
11394 - elf_gp (htab->brlt->output_section->owner)
11395 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11396
11397 if (info->emitrelocations)
11398 {
11399 stub_entry->group->stub_sec->reloc_count
11400 += 1 + (PPC_HA (off) != 0);
11401 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11402 }
11403
11404 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11405 {
11406 size = 12;
11407 if (PPC_HA (off) != 0)
11408 size = 16;
11409 }
11410 else
11411 {
11412 size = 16;
11413 if (PPC_HA (off) != 0)
11414 size += 4;
11415
11416 if (PPC_HA (r2off) != 0)
11417 size += 4;
11418 if (PPC_LO (r2off) != 0)
11419 size += 4;
11420 }
11421 }
11422 else if (info->emitrelocations)
11423 {
11424 stub_entry->group->stub_sec->reloc_count += 1;
11425 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11426 }
11427 }
11428
11429 stub_entry->group->stub_sec->size += size;
11430 return TRUE;
11431}
11432
11433/* Set up various things so that we can make a list of input sections
11434 for each output section included in the link. Returns -1 on error,
11435 0 when no stubs will be needed, and 1 on success. */
11436
11437int
11438ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11439{
11440 unsigned int id;
11441 bfd_size_type amt;
11442 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11443
11444 if (htab == NULL)
11445 return -1;
11446
11447 htab->sec_info_arr_size = bfd_get_next_section_id ();
11448 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11449 htab->sec_info = bfd_zmalloc (amt);
11450 if (htab->sec_info == NULL)
11451 return -1;
11452
11453 /* Set toc_off for com, und, abs and ind sections. */
11454 for (id = 0; id < 3; id++)
11455 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11456
11457 return 1;
11458}
11459
11460/* Set up for first pass at multitoc partitioning. */
11461
11462void
11463ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11464{
11465 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11466
11467 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11468 htab->toc_bfd = NULL;
11469 htab->toc_first_sec = NULL;
11470}
11471
11472/* The linker repeatedly calls this function for each TOC input section
11473 and linker generated GOT section. Group input bfds such that the toc
11474 within a group is less than 64k in size. */
11475
11476bfd_boolean
11477ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11478{
11479 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11480 bfd_vma addr, off, limit;
11481
11482 if (htab == NULL)
11483 return FALSE;
11484
11485 if (!htab->second_toc_pass)
11486 {
11487 /* Keep track of the first .toc or .got section for this input bfd. */
11488 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11489
11490 if (new_bfd)
11491 {
11492 htab->toc_bfd = isec->owner;
11493 htab->toc_first_sec = isec;
11494 }
11495
11496 addr = isec->output_offset + isec->output_section->vma;
11497 off = addr - htab->toc_curr;
11498 limit = 0x80008000;
11499 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11500 limit = 0x10000;
11501 if (off + isec->size > limit)
11502 {
11503 addr = (htab->toc_first_sec->output_offset
11504 + htab->toc_first_sec->output_section->vma);
11505 htab->toc_curr = addr;
11506 htab->toc_curr &= -TOC_BASE_ALIGN;
11507 }
11508
11509 /* toc_curr is the base address of this toc group. Set elf_gp
11510 for the input section to be the offset relative to the
11511 output toc base plus 0x8000. Making the input elf_gp an
11512 offset allows us to move the toc as a whole without
11513 recalculating input elf_gp. */
11514 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11515 off += TOC_BASE_OFF;
11516
11517 /* Die if someone uses a linker script that doesn't keep input
11518 file .toc and .got together. */
11519 if (new_bfd
11520 && elf_gp (isec->owner) != 0
11521 && elf_gp (isec->owner) != off)
11522 return FALSE;
11523
11524 elf_gp (isec->owner) = off;
11525 return TRUE;
11526 }
11527
11528 /* During the second pass toc_first_sec points to the start of
11529 a toc group, and toc_curr is used to track the old elf_gp.
11530 We use toc_bfd to ensure we only look at each bfd once. */
11531 if (htab->toc_bfd == isec->owner)
11532 return TRUE;
11533 htab->toc_bfd = isec->owner;
11534
11535 if (htab->toc_first_sec == NULL
11536 || htab->toc_curr != elf_gp (isec->owner))
11537 {
11538 htab->toc_curr = elf_gp (isec->owner);
11539 htab->toc_first_sec = isec;
11540 }
11541 addr = (htab->toc_first_sec->output_offset
11542 + htab->toc_first_sec->output_section->vma);
11543 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11544 elf_gp (isec->owner) = off;
11545
11546 return TRUE;
11547}
11548
11549/* Called via elf_link_hash_traverse to merge GOT entries for global
11550 symbol H. */
11551
11552static bfd_boolean
11553merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11554{
11555 if (h->root.type == bfd_link_hash_indirect)
11556 return TRUE;
11557
11558 merge_got_entries (&h->got.glist);
11559
11560 return TRUE;
11561}
11562
11563/* Called via elf_link_hash_traverse to allocate GOT entries for global
11564 symbol H. */
11565
11566static bfd_boolean
11567reallocate_got (struct elf_link_hash_entry *h, void *inf)
11568{
11569 struct got_entry *gent;
11570
11571 if (h->root.type == bfd_link_hash_indirect)
11572 return TRUE;
11573
11574 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11575 if (!gent->is_indirect)
11576 allocate_got (h, (struct bfd_link_info *) inf, gent);
11577 return TRUE;
11578}
11579
11580/* Called on the first multitoc pass after the last call to
11581 ppc64_elf_next_toc_section. This function removes duplicate GOT
11582 entries. */
11583
11584bfd_boolean
11585ppc64_elf_layout_multitoc (struct bfd_link_info *info)
11586{
11587 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11588 struct bfd *ibfd, *ibfd2;
11589 bfd_boolean done_something;
11590
11591 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
11592
11593 if (!htab->do_multi_toc)
11594 return FALSE;
11595
11596 /* Merge global sym got entries within a toc group. */
11597 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11598
11599 /* And tlsld_got. */
11600 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11601 {
11602 struct got_entry *ent, *ent2;
11603
11604 if (!is_ppc64_elf (ibfd))
11605 continue;
11606
11607 ent = ppc64_tlsld_got (ibfd);
11608 if (!ent->is_indirect
11609 && ent->got.offset != (bfd_vma) -1)
11610 {
11611 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
11612 {
11613 if (!is_ppc64_elf (ibfd2))
11614 continue;
11615
11616 ent2 = ppc64_tlsld_got (ibfd2);
11617 if (!ent2->is_indirect
11618 && ent2->got.offset != (bfd_vma) -1
11619 && elf_gp (ibfd2) == elf_gp (ibfd))
11620 {
11621 ent2->is_indirect = TRUE;
11622 ent2->got.ent = ent;
11623 }
11624 }
11625 }
11626 }
11627
11628 /* Zap sizes of got sections. */
11629 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11630 htab->elf.irelplt->size -= htab->got_reli_size;
11631 htab->got_reli_size = 0;
11632
11633 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11634 {
11635 asection *got, *relgot;
11636
11637 if (!is_ppc64_elf (ibfd))
11638 continue;
11639
11640 got = ppc64_elf_tdata (ibfd)->got;
11641 if (got != NULL)
11642 {
11643 got->rawsize = got->size;
11644 got->size = 0;
11645 relgot = ppc64_elf_tdata (ibfd)->relgot;
11646 relgot->rawsize = relgot->size;
11647 relgot->size = 0;
11648 }
11649 }
11650
11651 /* Now reallocate the got, local syms first. We don't need to
11652 allocate section contents again since we never increase size. */
11653 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11654 {
11655 struct got_entry **lgot_ents;
11656 struct got_entry **end_lgot_ents;
11657 struct plt_entry **local_plt;
11658 struct plt_entry **end_local_plt;
11659 unsigned char *lgot_masks;
11660 bfd_size_type locsymcount;
11661 Elf_Internal_Shdr *symtab_hdr;
11662 asection *s;
11663
11664 if (!is_ppc64_elf (ibfd))
11665 continue;
11666
11667 lgot_ents = elf_local_got_ents (ibfd);
11668 if (!lgot_ents)
11669 continue;
11670
11671 symtab_hdr = &elf_symtab_hdr (ibfd);
11672 locsymcount = symtab_hdr->sh_info;
11673 end_lgot_ents = lgot_ents + locsymcount;
11674 local_plt = (struct plt_entry **) end_lgot_ents;
11675 end_local_plt = local_plt + locsymcount;
11676 lgot_masks = (unsigned char *) end_local_plt;
11677 s = ppc64_elf_tdata (ibfd)->got;
11678 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11679 {
11680 struct got_entry *ent;
11681
11682 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
11683 {
11684 unsigned int ent_size = 8;
11685 unsigned int rel_size = sizeof (Elf64_External_Rela);
11686
11687 ent->got.offset = s->size;
11688 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
11689 {
11690 ent_size *= 2;
11691 rel_size *= 2;
11692 }
11693 s->size += ent_size;
11694 if ((*lgot_masks & PLT_IFUNC) != 0)
11695 {
11696 htab->elf.irelplt->size += rel_size;
11697 htab->got_reli_size += rel_size;
11698 }
11699 else if (bfd_link_pic (info))
11700 {
11701 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11702 srel->size += rel_size;
11703 }
11704 }
11705 }
11706 }
11707
11708 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11709
11710 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11711 {
11712 struct got_entry *ent;
11713
11714 if (!is_ppc64_elf (ibfd))
11715 continue;
11716
11717 ent = ppc64_tlsld_got (ibfd);
11718 if (!ent->is_indirect
11719 && ent->got.offset != (bfd_vma) -1)
11720 {
11721 asection *s = ppc64_elf_tdata (ibfd)->got;
11722 ent->got.offset = s->size;
11723 s->size += 16;
11724 if (bfd_link_pic (info))
11725 {
11726 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11727 srel->size += sizeof (Elf64_External_Rela);
11728 }
11729 }
11730 }
11731
11732 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
11733 if (!done_something)
11734 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11735 {
11736 asection *got;
11737
11738 if (!is_ppc64_elf (ibfd))
11739 continue;
11740
11741 got = ppc64_elf_tdata (ibfd)->got;
11742 if (got != NULL)
11743 {
11744 done_something = got->rawsize != got->size;
11745 if (done_something)
11746 break;
11747 }
11748 }
11749
11750 if (done_something)
11751 (*htab->params->layout_sections_again) ();
11752
11753 /* Set up for second pass over toc sections to recalculate elf_gp
11754 on input sections. */
11755 htab->toc_bfd = NULL;
11756 htab->toc_first_sec = NULL;
11757 htab->second_toc_pass = TRUE;
11758 return done_something;
11759}
11760
11761/* Called after second pass of multitoc partitioning. */
11762
11763void
11764ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11765{
11766 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11767
11768 /* After the second pass, toc_curr tracks the TOC offset used
11769 for code sections below in ppc64_elf_next_input_section. */
11770 htab->toc_curr = TOC_BASE_OFF;
11771}
11772
11773/* No toc references were found in ISEC. If the code in ISEC makes no
11774 calls, then there's no need to use toc adjusting stubs when branching
11775 into ISEC. Actually, indirect calls from ISEC are OK as they will
11776 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11777 needed, and 2 if a cyclical call-graph was found but no other reason
11778 for a stub was detected. If called from the top level, a return of
11779 2 means the same as a return of 0. */
11780
11781static int
11782toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
11783{
11784 int ret;
11785
11786 /* Mark this section as checked. */
11787 isec->call_check_done = 1;
11788
11789 /* We know none of our code bearing sections will need toc stubs. */
11790 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11791 return 0;
11792
11793 if (isec->size == 0)
11794 return 0;
11795
11796 if (isec->output_section == NULL)
11797 return 0;
11798
11799 ret = 0;
11800 if (isec->reloc_count != 0)
11801 {
11802 Elf_Internal_Rela *relstart, *rel;
11803 Elf_Internal_Sym *local_syms;
11804 struct ppc_link_hash_table *htab;
11805
11806 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11807 info->keep_memory);
11808 if (relstart == NULL)
11809 return -1;
11810
11811 /* Look for branches to outside of this section. */
11812 local_syms = NULL;
11813 htab = ppc_hash_table (info);
11814 if (htab == NULL)
11815 return -1;
11816
11817 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
11818 {
11819 enum elf_ppc64_reloc_type r_type;
11820 unsigned long r_symndx;
11821 struct elf_link_hash_entry *h;
11822 struct ppc_link_hash_entry *eh;
11823 Elf_Internal_Sym *sym;
11824 asection *sym_sec;
11825 struct _opd_sec_data *opd;
11826 bfd_vma sym_value;
11827 bfd_vma dest;
11828
11829 r_type = ELF64_R_TYPE (rel->r_info);
11830 if (r_type != R_PPC64_REL24
11831 && r_type != R_PPC64_REL14
11832 && r_type != R_PPC64_REL14_BRTAKEN
11833 && r_type != R_PPC64_REL14_BRNTAKEN)
11834 continue;
11835
11836 r_symndx = ELF64_R_SYM (rel->r_info);
11837 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11838 isec->owner))
11839 {
11840 ret = -1;
11841 break;
11842 }
11843
11844 /* Calls to dynamic lib functions go through a plt call stub
11845 that uses r2. */
11846 eh = (struct ppc_link_hash_entry *) h;
11847 if (eh != NULL
11848 && (eh->elf.plt.plist != NULL
11849 || (eh->oh != NULL
11850 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11851 {
11852 ret = 1;
11853 break;
11854 }
11855
11856 if (sym_sec == NULL)
11857 /* Ignore other undefined symbols. */
11858 continue;
11859
11860 /* Assume branches to other sections not included in the
11861 link need stubs too, to cover -R and absolute syms. */
11862 if (sym_sec->output_section == NULL)
11863 {
11864 ret = 1;
11865 break;
11866 }
11867
11868 if (h == NULL)
11869 sym_value = sym->st_value;
11870 else
11871 {
11872 if (h->root.type != bfd_link_hash_defined
11873 && h->root.type != bfd_link_hash_defweak)
11874 abort ();
11875 sym_value = h->root.u.def.value;
11876 }
11877 sym_value += rel->r_addend;
11878
11879 /* If this branch reloc uses an opd sym, find the code section. */
11880 opd = get_opd_info (sym_sec);
11881 if (opd != NULL)
11882 {
11883 if (h == NULL && opd->adjust != NULL)
11884 {
11885 long adjust;
11886
11887 adjust = opd->adjust[OPD_NDX (sym_value)];
11888 if (adjust == -1)
11889 /* Assume deleted functions won't ever be called. */
11890 continue;
11891 sym_value += adjust;
11892 }
11893
11894 dest = opd_entry_value (sym_sec, sym_value,
11895 &sym_sec, NULL, FALSE);
11896 if (dest == (bfd_vma) -1)
11897 continue;
11898 }
11899 else
11900 dest = (sym_value
11901 + sym_sec->output_offset
11902 + sym_sec->output_section->vma);
11903
11904 /* Ignore branch to self. */
11905 if (sym_sec == isec)
11906 continue;
11907
11908 /* If the called function uses the toc, we need a stub. */
11909 if (sym_sec->has_toc_reloc
11910 || sym_sec->makes_toc_func_call)
11911 {
11912 ret = 1;
11913 break;
11914 }
11915
11916 /* Assume any branch that needs a long branch stub might in fact
11917 need a plt_branch stub. A plt_branch stub uses r2. */
11918 else if (dest - (isec->output_offset
11919 + isec->output_section->vma
11920 + rel->r_offset) + (1 << 25)
11921 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11922 ? h->other
11923 : sym->st_other))
11924 {
11925 ret = 1;
11926 break;
11927 }
11928
11929 /* If calling back to a section in the process of being
11930 tested, we can't say for sure that no toc adjusting stubs
11931 are needed, so don't return zero. */
11932 else if (sym_sec->call_check_in_progress)
11933 ret = 2;
11934
11935 /* Branches to another section that itself doesn't have any TOC
11936 references are OK. Recursively call ourselves to check. */
11937 else if (!sym_sec->call_check_done)
11938 {
11939 int recur;
11940
11941 /* Mark current section as indeterminate, so that other
11942 sections that call back to current won't be marked as
11943 known. */
11944 isec->call_check_in_progress = 1;
11945 recur = toc_adjusting_stub_needed (info, sym_sec);
11946 isec->call_check_in_progress = 0;
11947
11948 if (recur != 0)
11949 {
11950 ret = recur;
11951 if (recur != 2)
11952 break;
11953 }
11954 }
11955 }
11956
11957 if (local_syms != NULL
11958 && (elf_symtab_hdr (isec->owner).contents
11959 != (unsigned char *) local_syms))
11960 free (local_syms);
11961 if (elf_section_data (isec)->relocs != relstart)
11962 free (relstart);
11963 }
11964
11965 if ((ret & 1) == 0
11966 && isec->map_head.s != NULL
11967 && (strcmp (isec->output_section->name, ".init") == 0
11968 || strcmp (isec->output_section->name, ".fini") == 0))
11969 {
11970 if (isec->map_head.s->has_toc_reloc
11971 || isec->map_head.s->makes_toc_func_call)
11972 ret = 1;
11973 else if (!isec->map_head.s->call_check_done)
11974 {
11975 int recur;
11976 isec->call_check_in_progress = 1;
11977 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11978 isec->call_check_in_progress = 0;
11979 if (recur != 0)
11980 ret = recur;
11981 }
11982 }
11983
11984 if (ret == 1)
11985 isec->makes_toc_func_call = 1;
11986
11987 return ret;
11988}
11989
11990/* The linker repeatedly calls this function for each input section,
11991 in the order that input sections are linked into output sections.
11992 Build lists of input sections to determine groupings between which
11993 we may insert linker stubs. */
11994
11995bfd_boolean
11996ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
11997{
11998 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11999
12000 if (htab == NULL)
12001 return FALSE;
12002
12003 if ((isec->output_section->flags & SEC_CODE) != 0
12004 && isec->output_section->id < htab->sec_info_arr_size)
12005 {
12006 /* This happens to make the list in reverse order,
12007 which is what we want. */
12008 htab->sec_info[isec->id].u.list
12009 = htab->sec_info[isec->output_section->id].u.list;
12010 htab->sec_info[isec->output_section->id].u.list = isec;
12011 }
12012
12013 if (htab->multi_toc_needed)
12014 {
12015 /* Analyse sections that aren't already flagged as needing a
12016 valid toc pointer. Exclude .fixup for the linux kernel.
12017 .fixup contains branches, but only back to the function that
12018 hit an exception. */
12019 if (!(isec->has_toc_reloc
12020 || (isec->flags & SEC_CODE) == 0
12021 || strcmp (isec->name, ".fixup") == 0
12022 || isec->call_check_done))
12023 {
12024 if (toc_adjusting_stub_needed (info, isec) < 0)
12025 return FALSE;
12026 }
12027 /* Make all sections use the TOC assigned for this object file.
12028 This will be wrong for pasted sections; We fix that in
12029 check_pasted_section(). */
12030 if (elf_gp (isec->owner) != 0)
12031 htab->toc_curr = elf_gp (isec->owner);
12032 }
12033
12034 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12035 return TRUE;
12036}
12037
12038/* Check that all .init and .fini sections use the same toc, if they
12039 have toc relocs. */
12040
12041static bfd_boolean
12042check_pasted_section (struct bfd_link_info *info, const char *name)
12043{
12044 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12045
12046 if (o != NULL)
12047 {
12048 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12049 bfd_vma toc_off = 0;
12050 asection *i;
12051
12052 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12053 if (i->has_toc_reloc)
12054 {
12055 if (toc_off == 0)
12056 toc_off = htab->sec_info[i->id].toc_off;
12057 else if (toc_off != htab->sec_info[i->id].toc_off)
12058 return FALSE;
12059 }
12060
12061 if (toc_off == 0)
12062 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12063 if (i->makes_toc_func_call)
12064 {
12065 toc_off = htab->sec_info[i->id].toc_off;
12066 break;
12067 }
12068
12069 /* Make sure the whole pasted function uses the same toc offset. */
12070 if (toc_off != 0)
12071 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12072 htab->sec_info[i->id].toc_off = toc_off;
12073 }
12074 return TRUE;
12075}
12076
12077bfd_boolean
12078ppc64_elf_check_init_fini (struct bfd_link_info *info)
12079{
12080 return (check_pasted_section (info, ".init")
12081 & check_pasted_section (info, ".fini"));
12082}
12083
12084/* See whether we can group stub sections together. Grouping stub
12085 sections may result in fewer stubs. More importantly, we need to
12086 put all .init* and .fini* stubs at the beginning of the .init or
12087 .fini output sections respectively, because glibc splits the
12088 _init and _fini functions into multiple parts. Putting a stub in
12089 the middle of a function is not a good idea. */
12090
12091static bfd_boolean
12092group_sections (struct bfd_link_info *info,
12093 bfd_size_type stub_group_size,
12094 bfd_boolean stubs_always_before_branch)
12095{
12096 struct ppc_link_hash_table *htab;
12097 asection *osec;
12098 bfd_boolean suppress_size_errors;
12099
12100 htab = ppc_hash_table (info);
12101 if (htab == NULL)
12102 return FALSE;
12103
12104 suppress_size_errors = FALSE;
12105 if (stub_group_size == 1)
12106 {
12107 /* Default values. */
12108 if (stubs_always_before_branch)
12109 stub_group_size = 0x1e00000;
12110 else
12111 stub_group_size = 0x1c00000;
12112 suppress_size_errors = TRUE;
12113 }
12114
12115 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12116 {
12117 asection *tail;
12118
12119 if (osec->id >= htab->sec_info_arr_size)
12120 continue;
12121
12122 tail = htab->sec_info[osec->id].u.list;
12123 while (tail != NULL)
12124 {
12125 asection *curr;
12126 asection *prev;
12127 bfd_size_type total;
12128 bfd_boolean big_sec;
12129 bfd_vma curr_toc;
12130 struct map_stub *group;
12131 bfd_size_type group_size;
12132
12133 curr = tail;
12134 total = tail->size;
12135 group_size = (ppc64_elf_section_data (tail) != NULL
12136 && ppc64_elf_section_data (tail)->has_14bit_branch
12137 ? stub_group_size >> 10 : stub_group_size);
12138
12139 big_sec = total > group_size;
12140 if (big_sec && !suppress_size_errors)
12141 /* xgettext:c-format */
12142 _bfd_error_handler (_("%B section %A exceeds stub group size"),
12143 tail->owner, tail);
12144 curr_toc = htab->sec_info[tail->id].toc_off;
12145
12146 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12147 && ((total += curr->output_offset - prev->output_offset)
12148 < (ppc64_elf_section_data (prev) != NULL
12149 && ppc64_elf_section_data (prev)->has_14bit_branch
12150 ? (group_size = stub_group_size >> 10) : group_size))
12151 && htab->sec_info[prev->id].toc_off == curr_toc)
12152 curr = prev;
12153
12154 /* OK, the size from the start of CURR to the end is less
12155 than group_size and thus can be handled by one stub
12156 section. (or the tail section is itself larger than
12157 group_size, in which case we may be toast.) We should
12158 really be keeping track of the total size of stubs added
12159 here, as stubs contribute to the final output section
12160 size. That's a little tricky, and this way will only
12161 break if stubs added make the total size more than 2^25,
12162 ie. for the default stub_group_size, if stubs total more
12163 than 2097152 bytes, or nearly 75000 plt call stubs. */
12164 group = bfd_alloc (curr->owner, sizeof (*group));
12165 if (group == NULL)
12166 return FALSE;
12167 group->link_sec = curr;
12168 group->stub_sec = NULL;
12169 group->needs_save_res = 0;
12170 group->next = htab->group;
12171 htab->group = group;
12172 do
12173 {
12174 prev = htab->sec_info[tail->id].u.list;
12175 /* Set up this stub group. */
12176 htab->sec_info[tail->id].u.group = group;
12177 }
12178 while (tail != curr && (tail = prev) != NULL);
12179
12180 /* But wait, there's more! Input sections up to group_size
12181 bytes before the stub section can be handled by it too.
12182 Don't do this if we have a really large section after the
12183 stubs, as adding more stubs increases the chance that
12184 branches may not reach into the stub section. */
12185 if (!stubs_always_before_branch && !big_sec)
12186 {
12187 total = 0;
12188 while (prev != NULL
12189 && ((total += tail->output_offset - prev->output_offset)
12190 < (ppc64_elf_section_data (prev) != NULL
12191 && ppc64_elf_section_data (prev)->has_14bit_branch
12192 ? (group_size = stub_group_size >> 10) : group_size))
12193 && htab->sec_info[prev->id].toc_off == curr_toc)
12194 {
12195 tail = prev;
12196 prev = htab->sec_info[tail->id].u.list;
12197 htab->sec_info[tail->id].u.group = group;
12198 }
12199 }
12200 tail = prev;
12201 }
12202 }
12203 return TRUE;
12204}
12205
12206static const unsigned char glink_eh_frame_cie[] =
12207{
12208 0, 0, 0, 16, /* length. */
12209 0, 0, 0, 0, /* id. */
12210 1, /* CIE version. */
12211 'z', 'R', 0, /* Augmentation string. */
12212 4, /* Code alignment. */
12213 0x78, /* Data alignment. */
12214 65, /* RA reg. */
12215 1, /* Augmentation size. */
12216 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12217 DW_CFA_def_cfa, 1, 0, /* def_cfa: r1 offset 0. */
12218 0, 0, 0, 0
12219};
12220
12221/* Stripping output sections is normally done before dynamic section
12222 symbols have been allocated. This function is called later, and
12223 handles cases like htab->brlt which is mapped to its own output
12224 section. */
12225
12226static void
12227maybe_strip_output (struct bfd_link_info *info, asection *isec)
12228{
12229 if (isec->size == 0
12230 && isec->output_section->size == 0
12231 && !(isec->output_section->flags & SEC_KEEP)
12232 && !bfd_section_removed_from_list (info->output_bfd,
12233 isec->output_section)
12234 && elf_section_data (isec->output_section)->dynindx == 0)
12235 {
12236 isec->output_section->flags |= SEC_EXCLUDE;
12237 bfd_section_list_remove (info->output_bfd, isec->output_section);
12238 info->output_bfd->section_count--;
12239 }
12240}
12241
12242/* Determine and set the size of the stub section for a final link.
12243
12244 The basic idea here is to examine all the relocations looking for
12245 PC-relative calls to a target that is unreachable with a "bl"
12246 instruction. */
12247
12248bfd_boolean
12249ppc64_elf_size_stubs (struct bfd_link_info *info)
12250{
12251 bfd_size_type stub_group_size;
12252 bfd_boolean stubs_always_before_branch;
12253 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12254
12255 if (htab == NULL)
12256 return FALSE;
12257
12258 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12259 htab->params->plt_thread_safe = 1;
12260 if (!htab->opd_abi)
12261 htab->params->plt_thread_safe = 0;
12262 else if (htab->params->plt_thread_safe == -1)
12263 {
12264 static const char *const thread_starter[] =
12265 {
12266 "pthread_create",
12267 /* libstdc++ */
12268 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12269 /* librt */
12270 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12271 "mq_notify", "create_timer",
12272 /* libanl */
12273 "getaddrinfo_a",
12274 /* libgomp */
12275 "GOMP_parallel",
12276 "GOMP_parallel_start",
12277 "GOMP_parallel_loop_static",
12278 "GOMP_parallel_loop_static_start",
12279 "GOMP_parallel_loop_dynamic",
12280 "GOMP_parallel_loop_dynamic_start",
12281 "GOMP_parallel_loop_guided",
12282 "GOMP_parallel_loop_guided_start",
12283 "GOMP_parallel_loop_runtime",
12284 "GOMP_parallel_loop_runtime_start",
12285 "GOMP_parallel_sections",
12286 "GOMP_parallel_sections_start",
12287 /* libgo */
12288 "__go_go",
12289 };
12290 unsigned i;
12291
12292 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12293 {
12294 struct elf_link_hash_entry *h;
12295 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12296 FALSE, FALSE, TRUE);
12297 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12298 if (htab->params->plt_thread_safe)
12299 break;
12300 }
12301 }
12302 stubs_always_before_branch = htab->params->group_size < 0;
12303 if (htab->params->group_size < 0)
12304 stub_group_size = -htab->params->group_size;
12305 else
12306 stub_group_size = htab->params->group_size;
12307
12308 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12309 return FALSE;
12310
12311#define STUB_SHRINK_ITER 20
12312 /* Loop until no stubs added. After iteration 20 of this loop we may
12313 exit on a stub section shrinking. This is to break out of a
12314 pathological case where adding stubs on one iteration decreases
12315 section gaps (perhaps due to alignment), which then requires
12316 fewer or smaller stubs on the next iteration. */
12317
12318 while (1)
12319 {
12320 bfd *input_bfd;
12321 unsigned int bfd_indx;
12322 struct map_stub *group;
12323 asection *stub_sec;
12324
12325 htab->stub_iteration += 1;
12326
12327 for (input_bfd = info->input_bfds, bfd_indx = 0;
12328 input_bfd != NULL;
12329 input_bfd = input_bfd->link.next, bfd_indx++)
12330 {
12331 Elf_Internal_Shdr *symtab_hdr;
12332 asection *section;
12333 Elf_Internal_Sym *local_syms = NULL;
12334
12335 if (!is_ppc64_elf (input_bfd))
12336 continue;
12337
12338 /* We'll need the symbol table in a second. */
12339 symtab_hdr = &elf_symtab_hdr (input_bfd);
12340 if (symtab_hdr->sh_info == 0)
12341 continue;
12342
12343 /* Walk over each section attached to the input bfd. */
12344 for (section = input_bfd->sections;
12345 section != NULL;
12346 section = section->next)
12347 {
12348 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12349
12350 /* If there aren't any relocs, then there's nothing more
12351 to do. */
12352 if ((section->flags & SEC_RELOC) == 0
12353 || (section->flags & SEC_ALLOC) == 0
12354 || (section->flags & SEC_LOAD) == 0
12355 || (section->flags & SEC_CODE) == 0
12356 || section->reloc_count == 0)
12357 continue;
12358
12359 /* If this section is a link-once section that will be
12360 discarded, then don't create any stubs. */
12361 if (section->output_section == NULL
12362 || section->output_section->owner != info->output_bfd)
12363 continue;
12364
12365 /* Get the relocs. */
12366 internal_relocs
12367 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12368 info->keep_memory);
12369 if (internal_relocs == NULL)
12370 goto error_ret_free_local;
12371
12372 /* Now examine each relocation. */
12373 irela = internal_relocs;
12374 irelaend = irela + section->reloc_count;
12375 for (; irela < irelaend; irela++)
12376 {
12377 enum elf_ppc64_reloc_type r_type;
12378 unsigned int r_indx;
12379 enum ppc_stub_type stub_type;
12380 struct ppc_stub_hash_entry *stub_entry;
12381 asection *sym_sec, *code_sec;
12382 bfd_vma sym_value, code_value;
12383 bfd_vma destination;
12384 unsigned long local_off;
12385 bfd_boolean ok_dest;
12386 struct ppc_link_hash_entry *hash;
12387 struct ppc_link_hash_entry *fdh;
12388 struct elf_link_hash_entry *h;
12389 Elf_Internal_Sym *sym;
12390 char *stub_name;
12391 const asection *id_sec;
12392 struct _opd_sec_data *opd;
12393 struct plt_entry *plt_ent;
12394
12395 r_type = ELF64_R_TYPE (irela->r_info);
12396 r_indx = ELF64_R_SYM (irela->r_info);
12397
12398 if (r_type >= R_PPC64_max)
12399 {
12400 bfd_set_error (bfd_error_bad_value);
12401 goto error_ret_free_internal;
12402 }
12403
12404 /* Only look for stubs on branch instructions. */
12405 if (r_type != R_PPC64_REL24
12406 && r_type != R_PPC64_REL14
12407 && r_type != R_PPC64_REL14_BRTAKEN
12408 && r_type != R_PPC64_REL14_BRNTAKEN)
12409 continue;
12410
12411 /* Now determine the call target, its name, value,
12412 section. */
12413 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12414 r_indx, input_bfd))
12415 goto error_ret_free_internal;
12416 hash = (struct ppc_link_hash_entry *) h;
12417
12418 ok_dest = FALSE;
12419 fdh = NULL;
12420 sym_value = 0;
12421 if (hash == NULL)
12422 {
12423 sym_value = sym->st_value;
12424 if (sym_sec != NULL
12425 && sym_sec->output_section != NULL)
12426 ok_dest = TRUE;
12427 }
12428 else if (hash->elf.root.type == bfd_link_hash_defined
12429 || hash->elf.root.type == bfd_link_hash_defweak)
12430 {
12431 sym_value = hash->elf.root.u.def.value;
12432 if (sym_sec->output_section != NULL)
12433 ok_dest = TRUE;
12434 }
12435 else if (hash->elf.root.type == bfd_link_hash_undefweak
12436 || hash->elf.root.type == bfd_link_hash_undefined)
12437 {
12438 /* Recognise an old ABI func code entry sym, and
12439 use the func descriptor sym instead if it is
12440 defined. */
12441 if (hash->elf.root.root.string[0] == '.'
12442 && hash->oh != NULL)
12443 {
12444 fdh = ppc_follow_link (hash->oh);
12445 if (fdh->elf.root.type == bfd_link_hash_defined
12446 || fdh->elf.root.type == bfd_link_hash_defweak)
12447 {
12448 sym_sec = fdh->elf.root.u.def.section;
12449 sym_value = fdh->elf.root.u.def.value;
12450 if (sym_sec->output_section != NULL)
12451 ok_dest = TRUE;
12452 }
12453 else
12454 fdh = NULL;
12455 }
12456 }
12457 else
12458 {
12459 bfd_set_error (bfd_error_bad_value);
12460 goto error_ret_free_internal;
12461 }
12462
12463 destination = 0;
12464 local_off = 0;
12465 if (ok_dest)
12466 {
12467 sym_value += irela->r_addend;
12468 destination = (sym_value
12469 + sym_sec->output_offset
12470 + sym_sec->output_section->vma);
12471 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12472 ? hash->elf.other
12473 : sym->st_other);
12474 }
12475
12476 code_sec = sym_sec;
12477 code_value = sym_value;
12478 opd = get_opd_info (sym_sec);
12479 if (opd != NULL)
12480 {
12481 bfd_vma dest;
12482
12483 if (hash == NULL && opd->adjust != NULL)
12484 {
12485 long adjust = opd->adjust[OPD_NDX (sym_value)];
12486 if (adjust == -1)
12487 continue;
12488 code_value += adjust;
12489 sym_value += adjust;
12490 }
12491 dest = opd_entry_value (sym_sec, sym_value,
12492 &code_sec, &code_value, FALSE);
12493 if (dest != (bfd_vma) -1)
12494 {
12495 destination = dest;
12496 if (fdh != NULL)
12497 {
12498 /* Fixup old ABI sym to point at code
12499 entry. */
12500 hash->elf.root.type = bfd_link_hash_defweak;
12501 hash->elf.root.u.def.section = code_sec;
12502 hash->elf.root.u.def.value = code_value;
12503 }
12504 }
12505 }
12506
12507 /* Determine what (if any) linker stub is needed. */
12508 plt_ent = NULL;
12509 stub_type = ppc_type_of_stub (section, irela, &hash,
12510 &plt_ent, destination,
12511 local_off);
12512
12513 if (stub_type != ppc_stub_plt_call)
12514 {
12515 /* Check whether we need a TOC adjusting stub.
12516 Since the linker pastes together pieces from
12517 different object files when creating the
12518 _init and _fini functions, it may be that a
12519 call to what looks like a local sym is in
12520 fact a call needing a TOC adjustment. */
12521 if (code_sec != NULL
12522 && code_sec->output_section != NULL
12523 && (htab->sec_info[code_sec->id].toc_off
12524 != htab->sec_info[section->id].toc_off)
12525 && (code_sec->has_toc_reloc
12526 || code_sec->makes_toc_func_call))
12527 stub_type = ppc_stub_long_branch_r2off;
12528 }
12529
12530 if (stub_type == ppc_stub_none)
12531 continue;
12532
12533 /* __tls_get_addr calls might be eliminated. */
12534 if (stub_type != ppc_stub_plt_call
12535 && hash != NULL
12536 && (hash == htab->tls_get_addr
12537 || hash == htab->tls_get_addr_fd)
12538 && section->has_tls_reloc
12539 && irela != internal_relocs)
12540 {
12541 /* Get tls info. */
12542 unsigned char *tls_mask;
12543
12544 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
12545 irela - 1, input_bfd))
12546 goto error_ret_free_internal;
12547 if (*tls_mask != 0)
12548 continue;
12549 }
12550
12551 if (stub_type == ppc_stub_plt_call
12552 && irela + 1 < irelaend
12553 && irela[1].r_offset == irela->r_offset + 4
12554 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12555 {
12556 if (!tocsave_find (htab, INSERT,
12557 &local_syms, irela + 1, input_bfd))
12558 goto error_ret_free_internal;
12559 }
12560 else if (stub_type == ppc_stub_plt_call)
12561 stub_type = ppc_stub_plt_call_r2save;
12562
12563 /* Support for grouping stub sections. */
12564 id_sec = htab->sec_info[section->id].u.group->link_sec;
12565
12566 /* Get the name of this stub. */
12567 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12568 if (!stub_name)
12569 goto error_ret_free_internal;
12570
12571 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
12572 stub_name, FALSE, FALSE);
12573 if (stub_entry != NULL)
12574 {
12575 /* The proper stub has already been created. */
12576 free (stub_name);
12577 if (stub_type == ppc_stub_plt_call_r2save)
12578 stub_entry->stub_type = stub_type;
12579 continue;
12580 }
12581
12582 stub_entry = ppc_add_stub (stub_name, section, info);
12583 if (stub_entry == NULL)
12584 {
12585 free (stub_name);
12586 error_ret_free_internal:
12587 if (elf_section_data (section)->relocs == NULL)
12588 free (internal_relocs);
12589 error_ret_free_local:
12590 if (local_syms != NULL
12591 && (symtab_hdr->contents
12592 != (unsigned char *) local_syms))
12593 free (local_syms);
12594 return FALSE;
12595 }
12596
12597 stub_entry->stub_type = stub_type;
12598 if (stub_type != ppc_stub_plt_call
12599 && stub_type != ppc_stub_plt_call_r2save)
12600 {
12601 stub_entry->target_value = code_value;
12602 stub_entry->target_section = code_sec;
12603 }
12604 else
12605 {
12606 stub_entry->target_value = sym_value;
12607 stub_entry->target_section = sym_sec;
12608 }
12609 stub_entry->h = hash;
12610 stub_entry->plt_ent = plt_ent;
12611 stub_entry->other = hash ? hash->elf.other : sym->st_other;
12612
12613 if (stub_entry->h != NULL)
12614 htab->stub_globals += 1;
12615 }
12616
12617 /* We're done with the internal relocs, free them. */
12618 if (elf_section_data (section)->relocs != internal_relocs)
12619 free (internal_relocs);
12620 }
12621
12622 if (local_syms != NULL
12623 && symtab_hdr->contents != (unsigned char *) local_syms)
12624 {
12625 if (!info->keep_memory)
12626 free (local_syms);
12627 else
12628 symtab_hdr->contents = (unsigned char *) local_syms;
12629 }
12630 }
12631
12632 /* We may have added some stubs. Find out the new size of the
12633 stub sections. */
12634 for (stub_sec = htab->params->stub_bfd->sections;
12635 stub_sec != NULL;
12636 stub_sec = stub_sec->next)
12637 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12638 {
12639 if (htab->stub_iteration <= STUB_SHRINK_ITER
12640 || stub_sec->rawsize < stub_sec->size)
12641 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12642 stub_sec->rawsize = stub_sec->size;
12643 stub_sec->size = 0;
12644 stub_sec->reloc_count = 0;
12645 stub_sec->flags &= ~SEC_RELOC;
12646 }
12647
12648 htab->brlt->size = 0;
12649 htab->brlt->reloc_count = 0;
12650 htab->brlt->flags &= ~SEC_RELOC;
12651 if (htab->relbrlt != NULL)
12652 htab->relbrlt->size = 0;
12653
12654 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
12655
12656 for (group = htab->group; group != NULL; group = group->next)
12657 if (group->needs_save_res)
12658 group->stub_sec->size += htab->sfpr->size;
12659
12660 if (info->emitrelocations
12661 && htab->glink != NULL && htab->glink->size != 0)
12662 {
12663 htab->glink->reloc_count = 1;
12664 htab->glink->flags |= SEC_RELOC;
12665 }
12666
12667 if (htab->glink_eh_frame != NULL
12668 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
12669 && htab->glink_eh_frame->output_section->size != 0)
12670 {
12671 size_t size = 0, align;
12672
12673 for (stub_sec = htab->params->stub_bfd->sections;
12674 stub_sec != NULL;
12675 stub_sec = stub_sec->next)
12676 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12677 size += 24;
12678 if (htab->glink != NULL && htab->glink->size != 0)
12679 size += 24;
12680 if (size != 0)
12681 size += sizeof (glink_eh_frame_cie);
12682 align = 1;
12683 align <<= htab->glink_eh_frame->output_section->alignment_power;
12684 align -= 1;
12685 size = (size + align) & ~align;
12686 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12687 htab->glink_eh_frame->size = size;
12688 }
12689
12690 if (htab->params->plt_stub_align != 0)
12691 for (stub_sec = htab->params->stub_bfd->sections;
12692 stub_sec != NULL;
12693 stub_sec = stub_sec->next)
12694 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12695 stub_sec->size = ((stub_sec->size
12696 + (1 << htab->params->plt_stub_align) - 1)
12697 & -(1 << htab->params->plt_stub_align));
12698
12699 for (stub_sec = htab->params->stub_bfd->sections;
12700 stub_sec != NULL;
12701 stub_sec = stub_sec->next)
12702 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12703 && stub_sec->rawsize != stub_sec->size
12704 && (htab->stub_iteration <= STUB_SHRINK_ITER
12705 || stub_sec->rawsize < stub_sec->size))
12706 break;
12707
12708 if (stub_sec == NULL
12709 && (htab->glink_eh_frame == NULL
12710 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
12711 break;
12712
12713 /* Ask the linker to do its stuff. */
12714 (*htab->params->layout_sections_again) ();
12715 }
12716
12717 if (htab->glink_eh_frame != NULL
12718 && htab->glink_eh_frame->size != 0)
12719 {
12720 bfd_vma val;
12721 bfd_byte *p, *last_fde;
12722 size_t last_fde_len, size, align, pad;
12723 asection *stub_sec;
12724
12725 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12726 if (p == NULL)
12727 return FALSE;
12728 htab->glink_eh_frame->contents = p;
12729 last_fde = p;
12730
12731 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12732 /* CIE length (rewrite in case little-endian). */
12733 last_fde_len = sizeof (glink_eh_frame_cie) - 4;
12734 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12735 p += sizeof (glink_eh_frame_cie);
12736
12737 for (stub_sec = htab->params->stub_bfd->sections;
12738 stub_sec != NULL;
12739 stub_sec = stub_sec->next)
12740 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12741 {
12742 last_fde = p;
12743 last_fde_len = 20;
12744 /* FDE length. */
12745 bfd_put_32 (htab->elf.dynobj, 20, p);
12746 p += 4;
12747 /* CIE pointer. */
12748 val = p - htab->glink_eh_frame->contents;
12749 bfd_put_32 (htab->elf.dynobj, val, p);
12750 p += 4;
12751 /* Offset to stub section, written later. */
12752 p += 4;
12753 /* stub section size. */
12754 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12755 p += 4;
12756 /* Augmentation. */
12757 p += 1;
12758 /* Pad. */
12759 p += 7;
12760 }
12761 if (htab->glink != NULL && htab->glink->size != 0)
12762 {
12763 last_fde = p;
12764 last_fde_len = 20;
12765 /* FDE length. */
12766 bfd_put_32 (htab->elf.dynobj, 20, p);
12767 p += 4;
12768 /* CIE pointer. */
12769 val = p - htab->glink_eh_frame->contents;
12770 bfd_put_32 (htab->elf.dynobj, val, p);
12771 p += 4;
12772 /* Offset to .glink, written later. */
12773 p += 4;
12774 /* .glink size. */
12775 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12776 p += 4;
12777 /* Augmentation. */
12778 p += 1;
12779
12780 *p++ = DW_CFA_advance_loc + 1;
12781 *p++ = DW_CFA_register;
12782 *p++ = 65;
12783 *p++ = htab->opd_abi ? 12 : 0;
12784 *p++ = DW_CFA_advance_loc + 4;
12785 *p++ = DW_CFA_restore_extended;
12786 *p++ = 65;
12787 }
12788 /* Subsume any padding into the last FDE if user .eh_frame
12789 sections are aligned more than glink_eh_frame. Otherwise any
12790 zero padding will be seen as a terminator. */
12791 size = p - htab->glink_eh_frame->contents;
12792 align = 1;
12793 align <<= htab->glink_eh_frame->output_section->alignment_power;
12794 align -= 1;
12795 pad = ((size + align) & ~align) - size;
12796 htab->glink_eh_frame->size = size + pad;
12797 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12798 }
12799
12800 maybe_strip_output (info, htab->brlt);
12801 if (htab->glink_eh_frame != NULL)
12802 maybe_strip_output (info, htab->glink_eh_frame);
12803
12804 return TRUE;
12805}
12806
12807/* Called after we have determined section placement. If sections
12808 move, we'll be called again. Provide a value for TOCstart. */
12809
12810bfd_vma
12811ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
12812{
12813 asection *s;
12814 bfd_vma TOCstart, adjust;
12815
12816 if (info != NULL)
12817 {
12818 struct elf_link_hash_entry *h;
12819 struct elf_link_hash_table *htab = elf_hash_table (info);
12820
12821 if (is_elf_hash_table (htab)
12822 && htab->hgot != NULL)
12823 h = htab->hgot;
12824 else
12825 {
12826 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12827 if (is_elf_hash_table (htab))
12828 htab->hgot = h;
12829 }
12830 if (h != NULL
12831 && h->root.type == bfd_link_hash_defined
12832 && !h->root.linker_def
12833 && (!is_elf_hash_table (htab)
12834 || h->def_regular))
12835 {
12836 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12837 + h->root.u.def.section->output_offset
12838 + h->root.u.def.section->output_section->vma);
12839 _bfd_set_gp_value (obfd, TOCstart);
12840 return TOCstart;
12841 }
12842 }
12843
12844 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12845 order. The TOC starts where the first of these sections starts. */
12846 s = bfd_get_section_by_name (obfd, ".got");
12847 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12848 s = bfd_get_section_by_name (obfd, ".toc");
12849 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12850 s = bfd_get_section_by_name (obfd, ".tocbss");
12851 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12852 s = bfd_get_section_by_name (obfd, ".plt");
12853 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12854 {
12855 /* This may happen for
12856 o references to TOC base (SYM@toc / TOC[tc0]) without a
12857 .toc directive
12858 o bad linker script
12859 o --gc-sections and empty TOC sections
12860
12861 FIXME: Warn user? */
12862
12863 /* Look for a likely section. We probably won't even be
12864 using TOCstart. */
12865 for (s = obfd->sections; s != NULL; s = s->next)
12866 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12867 | SEC_EXCLUDE))
12868 == (SEC_ALLOC | SEC_SMALL_DATA))
12869 break;
12870 if (s == NULL)
12871 for (s = obfd->sections; s != NULL; s = s->next)
12872 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
12873 == (SEC_ALLOC | SEC_SMALL_DATA))
12874 break;
12875 if (s == NULL)
12876 for (s = obfd->sections; s != NULL; s = s->next)
12877 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12878 == SEC_ALLOC)
12879 break;
12880 if (s == NULL)
12881 for (s = obfd->sections; s != NULL; s = s->next)
12882 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
12883 break;
12884 }
12885
12886 TOCstart = 0;
12887 if (s != NULL)
12888 TOCstart = s->output_section->vma + s->output_offset;
12889
12890 /* Force alignment. */
12891 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12892 TOCstart -= adjust;
12893 _bfd_set_gp_value (obfd, TOCstart);
12894
12895 if (info != NULL && s != NULL)
12896 {
12897 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12898
12899 if (htab != NULL)
12900 {
12901 if (htab->elf.hgot != NULL)
12902 {
12903 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
12904 htab->elf.hgot->root.u.def.section = s;
12905 }
12906 }
12907 else
12908 {
12909 struct bfd_link_hash_entry *bh = NULL;
12910 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
12911 s, TOC_BASE_OFF - adjust,
12912 NULL, FALSE, FALSE, &bh);
12913 }
12914 }
12915 return TOCstart;
12916}
12917
12918/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12919 write out any global entry stubs. */
12920
12921static bfd_boolean
12922build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12923{
12924 struct bfd_link_info *info;
12925 struct ppc_link_hash_table *htab;
12926 struct plt_entry *pent;
12927 asection *s;
12928
12929 if (h->root.type == bfd_link_hash_indirect)
12930 return TRUE;
12931
12932 if (!h->pointer_equality_needed)
12933 return TRUE;
12934
12935 if (h->def_regular)
12936 return TRUE;
12937
12938 info = inf;
12939 htab = ppc_hash_table (info);
12940 if (htab == NULL)
12941 return FALSE;
12942
12943 s = htab->glink;
12944 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12945 if (pent->plt.offset != (bfd_vma) -1
12946 && pent->addend == 0)
12947 {
12948 bfd_byte *p;
12949 asection *plt;
12950 bfd_vma off;
12951
12952 p = s->contents + h->root.u.def.value;
12953 plt = htab->elf.splt;
12954 if (!htab->elf.dynamic_sections_created
12955 || h->dynindx == -1)
12956 plt = htab->elf.iplt;
12957 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
12958 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12959
12960 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12961 {
12962 info->callbacks->einfo
12963 (_("%P: linkage table error against `%T'\n"),
12964 h->root.root.string);
12965 bfd_set_error (bfd_error_bad_value);
12966 htab->stub_error = TRUE;
12967 }
12968
12969 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12970 if (htab->params->emit_stub_syms)
12971 {
12972 size_t len = strlen (h->root.root.string);
12973 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12974
12975 if (name == NULL)
12976 return FALSE;
12977
12978 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12979 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12980 if (h == NULL)
12981 return FALSE;
12982 if (h->root.type == bfd_link_hash_new)
12983 {
12984 h->root.type = bfd_link_hash_defined;
12985 h->root.u.def.section = s;
12986 h->root.u.def.value = p - s->contents;
12987 h->ref_regular = 1;
12988 h->def_regular = 1;
12989 h->ref_regular_nonweak = 1;
12990 h->forced_local = 1;
12991 h->non_elf = 0;
12992 h->root.linker_def = 1;
12993 }
12994 }
12995
12996 if (PPC_HA (off) != 0)
12997 {
12998 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12999 p += 4;
13000 }
13001 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13002 p += 4;
13003 bfd_put_32 (s->owner, MTCTR_R12, p);
13004 p += 4;
13005 bfd_put_32 (s->owner, BCTR, p);
13006 break;
13007 }
13008 return TRUE;
13009}
13010
13011/* Build all the stubs associated with the current output file.
13012 The stubs are kept in a hash table attached to the main linker
13013 hash table. This function is called via gldelf64ppc_finish. */
13014
13015bfd_boolean
13016ppc64_elf_build_stubs (struct bfd_link_info *info,
13017 char **stats)
13018{
13019 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13020 struct map_stub *group;
13021 asection *stub_sec;
13022 bfd_byte *p;
13023 int stub_sec_count = 0;
13024
13025 if (htab == NULL)
13026 return FALSE;
13027
13028 /* Allocate memory to hold the linker stubs. */
13029 for (stub_sec = htab->params->stub_bfd->sections;
13030 stub_sec != NULL;
13031 stub_sec = stub_sec->next)
13032 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
13033 && stub_sec->size != 0)
13034 {
13035 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
13036 if (stub_sec->contents == NULL)
13037 return FALSE;
13038 stub_sec->size = 0;
13039 }
13040
13041 if (htab->glink != NULL && htab->glink->size != 0)
13042 {
13043 unsigned int indx;
13044 bfd_vma plt0;
13045
13046 /* Build the .glink plt call stub. */
13047 if (htab->params->emit_stub_syms)
13048 {
13049 struct elf_link_hash_entry *h;
13050 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13051 TRUE, FALSE, FALSE);
13052 if (h == NULL)
13053 return FALSE;
13054 if (h->root.type == bfd_link_hash_new)
13055 {
13056 h->root.type = bfd_link_hash_defined;
13057 h->root.u.def.section = htab->glink;
13058 h->root.u.def.value = 8;
13059 h->ref_regular = 1;
13060 h->def_regular = 1;
13061 h->ref_regular_nonweak = 1;
13062 h->forced_local = 1;
13063 h->non_elf = 0;
13064 h->root.linker_def = 1;
13065 }
13066 }
13067 plt0 = (htab->elf.splt->output_section->vma
13068 + htab->elf.splt->output_offset
13069 - 16);
13070 if (info->emitrelocations)
13071 {
13072 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13073 if (r == NULL)
13074 return FALSE;
13075 r->r_offset = (htab->glink->output_offset
13076 + htab->glink->output_section->vma);
13077 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13078 r->r_addend = plt0;
13079 }
13080 p = htab->glink->contents;
13081 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
13082 bfd_put_64 (htab->glink->owner, plt0, p);
13083 p += 8;
13084 if (htab->opd_abi)
13085 {
13086 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13087 p += 4;
13088 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13089 p += 4;
13090 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13091 p += 4;
13092 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13093 p += 4;
13094 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13095 p += 4;
13096 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13097 p += 4;
13098 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13099 p += 4;
13100 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13101 p += 4;
13102 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13103 p += 4;
13104 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13105 p += 4;
13106 }
13107 else
13108 {
13109 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13110 p += 4;
13111 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13112 p += 4;
13113 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13114 p += 4;
13115 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13116 p += 4;
13117 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13118 p += 4;
13119 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13120 p += 4;
13121 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13122 p += 4;
13123 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13124 p += 4;
13125 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13126 p += 4;
13127 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13128 p += 4;
13129 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13130 p += 4;
13131 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13132 p += 4;
13133 }
13134 bfd_put_32 (htab->glink->owner, BCTR, p);
13135 p += 4;
13136 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
13137 {
13138 bfd_put_32 (htab->glink->owner, NOP, p);
13139 p += 4;
13140 }
13141
13142 /* Build the .glink lazy link call stubs. */
13143 indx = 0;
13144 while (p < htab->glink->contents + htab->glink->rawsize)
13145 {
13146 if (htab->opd_abi)
13147 {
13148 if (indx < 0x8000)
13149 {
13150 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13151 p += 4;
13152 }
13153 else
13154 {
13155 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13156 p += 4;
13157 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13158 p);
13159 p += 4;
13160 }
13161 }
13162 bfd_put_32 (htab->glink->owner,
13163 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13164 indx++;
13165 p += 4;
13166 }
13167
13168 /* Build .glink global entry stubs. */
13169 if (htab->glink->size > htab->glink->rawsize)
13170 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
13171 }
13172
13173 if (htab->brlt != NULL && htab->brlt->size != 0)
13174 {
13175 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13176 htab->brlt->size);
13177 if (htab->brlt->contents == NULL)
13178 return FALSE;
13179 }
13180 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13181 {
13182 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13183 htab->relbrlt->size);
13184 if (htab->relbrlt->contents == NULL)
13185 return FALSE;
13186 }
13187
13188 /* Build the stubs as directed by the stub hash table. */
13189 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
13190
13191 for (group = htab->group; group != NULL; group = group->next)
13192 if (group->needs_save_res)
13193 {
13194 stub_sec = group->stub_sec;
13195 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13196 htab->sfpr->size);
13197 if (htab->params->emit_stub_syms)
13198 {
13199 unsigned int i;
13200
13201 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13202 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13203 return FALSE;
13204 }
13205 stub_sec->size += htab->sfpr->size;
13206 }
13207
13208 if (htab->relbrlt != NULL)
13209 htab->relbrlt->reloc_count = 0;
13210
13211 if (htab->params->plt_stub_align != 0)
13212 for (stub_sec = htab->params->stub_bfd->sections;
13213 stub_sec != NULL;
13214 stub_sec = stub_sec->next)
13215 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13216 stub_sec->size = ((stub_sec->size
13217 + (1 << htab->params->plt_stub_align) - 1)
13218 & -(1 << htab->params->plt_stub_align));
13219
13220 for (stub_sec = htab->params->stub_bfd->sections;
13221 stub_sec != NULL;
13222 stub_sec = stub_sec->next)
13223 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13224 {
13225 stub_sec_count += 1;
13226 if (stub_sec->rawsize != stub_sec->size
13227 && (htab->stub_iteration <= STUB_SHRINK_ITER
13228 || stub_sec->rawsize < stub_sec->size))
13229 break;
13230 }
13231
13232 /* Note that the glink_eh_frame check here is not only testing that
13233 the generated size matched the calculated size but also that
13234 bfd_elf_discard_info didn't make any changes to the section. */
13235 if (stub_sec != NULL
13236 || (htab->glink_eh_frame != NULL
13237 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
13238 {
13239 htab->stub_error = TRUE;
13240 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
13241 }
13242
13243 if (htab->stub_error)
13244 return FALSE;
13245
13246 if (stats != NULL)
13247 {
13248 *stats = bfd_malloc (500);
13249 if (*stats == NULL)
13250 return FALSE;
13251
13252 sprintf (*stats, _("linker stubs in %u group%s\n"
13253 " branch %lu\n"
13254 " toc adjust %lu\n"
13255 " long branch %lu\n"
13256 " long toc adj %lu\n"
13257 " plt call %lu\n"
13258 " plt call toc %lu\n"
13259 " global entry %lu"),
13260 stub_sec_count,
13261 stub_sec_count == 1 ? "" : "s",
13262 htab->stub_count[ppc_stub_long_branch - 1],
13263 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13264 htab->stub_count[ppc_stub_plt_branch - 1],
13265 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
13266 htab->stub_count[ppc_stub_plt_call - 1],
13267 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13268 htab->stub_count[ppc_stub_global_entry - 1]);
13269 }
13270 return TRUE;
13271}
13272
13273/* What to do when ld finds relocations against symbols defined in
13274 discarded sections. */
13275
13276static unsigned int
13277ppc64_elf_action_discarded (asection *sec)
13278{
13279 if (strcmp (".opd", sec->name) == 0)
13280 return 0;
13281
13282 if (strcmp (".toc", sec->name) == 0)
13283 return 0;
13284
13285 if (strcmp (".toc1", sec->name) == 0)
13286 return 0;
13287
13288 return _bfd_elf_default_action_discarded (sec);
13289}
13290
13291/* The RELOCATE_SECTION function is called by the ELF backend linker
13292 to handle the relocations for a section.
13293
13294 The relocs are always passed as Rela structures; if the section
13295 actually uses Rel structures, the r_addend field will always be
13296 zero.
13297
13298 This function is responsible for adjust the section contents as
13299 necessary, and (if using Rela relocs and generating a
13300 relocatable output file) adjusting the reloc addend as
13301 necessary.
13302
13303 This function does not have to worry about setting the reloc
13304 address or the reloc symbol index.
13305
13306 LOCAL_SYMS is a pointer to the swapped in local symbols.
13307
13308 LOCAL_SECTIONS is an array giving the section in the input file
13309 corresponding to the st_shndx field of each local symbol.
13310
13311 The global hash table entry for the global symbols can be found
13312 via elf_sym_hashes (input_bfd).
13313
13314 When generating relocatable output, this function must handle
13315 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13316 going to be the section symbol corresponding to the output
13317 section, which means that the addend must be adjusted
13318 accordingly. */
13319
13320static bfd_boolean
13321ppc64_elf_relocate_section (bfd *output_bfd,
13322 struct bfd_link_info *info,
13323 bfd *input_bfd,
13324 asection *input_section,
13325 bfd_byte *contents,
13326 Elf_Internal_Rela *relocs,
13327 Elf_Internal_Sym *local_syms,
13328 asection **local_sections)
13329{
13330 struct ppc_link_hash_table *htab;
13331 Elf_Internal_Shdr *symtab_hdr;
13332 struct elf_link_hash_entry **sym_hashes;
13333 Elf_Internal_Rela *rel;
13334 Elf_Internal_Rela *wrel;
13335 Elf_Internal_Rela *relend;
13336 Elf_Internal_Rela outrel;
13337 bfd_byte *loc;
13338 struct got_entry **local_got_ents;
13339 bfd_vma TOCstart;
13340 bfd_boolean ret = TRUE;
13341 bfd_boolean is_opd;
13342 /* Assume 'at' branch hints. */
13343 bfd_boolean is_isa_v2 = TRUE;
13344 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
13345
13346 /* Initialize howto table if needed. */
13347 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
13348 ppc_howto_init ();
13349
13350 htab = ppc_hash_table (info);
13351 if (htab == NULL)
13352 return FALSE;
13353
13354 /* Don't relocate stub sections. */
13355 if (input_section->owner == htab->params->stub_bfd)
13356 return TRUE;
13357
13358 BFD_ASSERT (is_ppc64_elf (input_bfd));
13359
13360 local_got_ents = elf_local_got_ents (input_bfd);
13361 TOCstart = elf_gp (output_bfd);
13362 symtab_hdr = &elf_symtab_hdr (input_bfd);
13363 sym_hashes = elf_sym_hashes (input_bfd);
13364 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
13365
13366 rel = wrel = relocs;
13367 relend = relocs + input_section->reloc_count;
13368 for (; rel < relend; wrel++, rel++)
13369 {
13370 enum elf_ppc64_reloc_type r_type;
13371 bfd_vma addend;
13372 bfd_reloc_status_type r;
13373 Elf_Internal_Sym *sym;
13374 asection *sec;
13375 struct elf_link_hash_entry *h_elf;
13376 struct ppc_link_hash_entry *h;
13377 struct ppc_link_hash_entry *fdh;
13378 const char *sym_name;
13379 unsigned long r_symndx, toc_symndx;
13380 bfd_vma toc_addend;
13381 unsigned char tls_mask, tls_gd, tls_type;
13382 unsigned char sym_type;
13383 bfd_vma relocation;
13384 bfd_boolean unresolved_reloc;
13385 bfd_boolean warned;
13386 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
13387 unsigned int insn;
13388 unsigned int mask;
13389 struct ppc_stub_hash_entry *stub_entry;
13390 bfd_vma max_br_offset;
13391 bfd_vma from;
13392 Elf_Internal_Rela orig_rel;
13393 reloc_howto_type *howto;
13394 struct reloc_howto_struct alt_howto;
13395
13396 again:
13397 orig_rel = *rel;
13398
13399 r_type = ELF64_R_TYPE (rel->r_info);
13400 r_symndx = ELF64_R_SYM (rel->r_info);
13401
13402 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13403 symbol of the previous ADDR64 reloc. The symbol gives us the
13404 proper TOC base to use. */
13405 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
13406 && wrel != relocs
13407 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
13408 && is_opd)
13409 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
13410
13411 sym = NULL;
13412 sec = NULL;
13413 h_elf = NULL;
13414 sym_name = NULL;
13415 unresolved_reloc = FALSE;
13416 warned = FALSE;
13417
13418 if (r_symndx < symtab_hdr->sh_info)
13419 {
13420 /* It's a local symbol. */
13421 struct _opd_sec_data *opd;
13422
13423 sym = local_syms + r_symndx;
13424 sec = local_sections[r_symndx];
13425 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
13426 sym_type = ELF64_ST_TYPE (sym->st_info);
13427 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
13428 opd = get_opd_info (sec);
13429 if (opd != NULL && opd->adjust != NULL)
13430 {
13431 long adjust = opd->adjust[OPD_NDX (sym->st_value
13432 + rel->r_addend)];
13433 if (adjust == -1)
13434 relocation = 0;
13435 else
13436 {
13437 /* If this is a relocation against the opd section sym
13438 and we have edited .opd, adjust the reloc addend so
13439 that ld -r and ld --emit-relocs output is correct.
13440 If it is a reloc against some other .opd symbol,
13441 then the symbol value will be adjusted later. */
13442 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13443 rel->r_addend += adjust;
13444 else
13445 relocation += adjust;
13446 }
13447 }
13448 }
13449 else
13450 {
13451 bfd_boolean ignored;
13452
13453 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13454 r_symndx, symtab_hdr, sym_hashes,
13455 h_elf, sec, relocation,
13456 unresolved_reloc, warned, ignored);
13457 sym_name = h_elf->root.root.string;
13458 sym_type = h_elf->type;
13459 if (sec != NULL
13460 && sec->owner == output_bfd
13461 && strcmp (sec->name, ".opd") == 0)
13462 {
13463 /* This is a symbol defined in a linker script. All
13464 such are defined in output sections, even those
13465 defined by simple assignment from a symbol defined in
13466 an input section. Transfer the symbol to an
13467 appropriate input .opd section, so that a branch to
13468 this symbol will be mapped to the location specified
13469 by the opd entry. */
13470 struct bfd_link_order *lo;
13471 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13472 if (lo->type == bfd_indirect_link_order)
13473 {
13474 asection *isec = lo->u.indirect.section;
13475 if (h_elf->root.u.def.value >= isec->output_offset
13476 && h_elf->root.u.def.value < (isec->output_offset
13477 + isec->size))
13478 {
13479 h_elf->root.u.def.value -= isec->output_offset;
13480 h_elf->root.u.def.section = isec;
13481 sec = isec;
13482 break;
13483 }
13484 }
13485 }
13486 }
13487 h = (struct ppc_link_hash_entry *) h_elf;
13488
13489 if (sec != NULL && discarded_section (sec))
13490 {
13491 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13492 input_bfd, input_section,
13493 contents + rel->r_offset);
13494 wrel->r_offset = rel->r_offset;
13495 wrel->r_info = 0;
13496 wrel->r_addend = 0;
13497
13498 /* For ld -r, remove relocations in debug sections against
13499 sections defined in discarded sections. Not done for
13500 non-debug to preserve relocs in .eh_frame which the
13501 eh_frame editing code expects to be present. */
13502 if (bfd_link_relocatable (info)
13503 && (input_section->flags & SEC_DEBUGGING))
13504 wrel--;
13505
13506 continue;
13507 }
13508
13509 if (bfd_link_relocatable (info))
13510 goto copy_reloc;
13511
13512 if (h != NULL && &h->elf == htab->elf.hgot)
13513 {
13514 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13515 sec = bfd_abs_section_ptr;
13516 unresolved_reloc = FALSE;
13517 }
13518
13519 /* TLS optimizations. Replace instruction sequences and relocs
13520 based on information we collected in tls_optimize. We edit
13521 RELOCS so that --emit-relocs will output something sensible
13522 for the final instruction stream. */
13523 tls_mask = 0;
13524 tls_gd = 0;
13525 toc_symndx = 0;
13526 if (h != NULL)
13527 tls_mask = h->tls_mask;
13528 else if (local_got_ents != NULL)
13529 {
13530 struct plt_entry **local_plt = (struct plt_entry **)
13531 (local_got_ents + symtab_hdr->sh_info);
13532 unsigned char *lgot_masks = (unsigned char *)
13533 (local_plt + symtab_hdr->sh_info);
13534 tls_mask = lgot_masks[r_symndx];
13535 }
13536 if (tls_mask == 0
13537 && (r_type == R_PPC64_TLS
13538 || r_type == R_PPC64_TLSGD
13539 || r_type == R_PPC64_TLSLD))
13540 {
13541 /* Check for toc tls entries. */
13542 unsigned char *toc_tls;
13543
13544 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13545 &local_syms, rel, input_bfd))
13546 return FALSE;
13547
13548 if (toc_tls)
13549 tls_mask = *toc_tls;
13550 }
13551
13552 /* Check that tls relocs are used with tls syms, and non-tls
13553 relocs are used with non-tls syms. */
13554 if (r_symndx != STN_UNDEF
13555 && r_type != R_PPC64_NONE
13556 && (h == NULL
13557 || h->elf.root.type == bfd_link_hash_defined
13558 || h->elf.root.type == bfd_link_hash_defweak)
13559 && (IS_PPC64_TLS_RELOC (r_type)
13560 != (sym_type == STT_TLS
13561 || (sym_type == STT_SECTION
13562 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
13563 {
13564 if (tls_mask != 0
13565 && (r_type == R_PPC64_TLS
13566 || r_type == R_PPC64_TLSGD
13567 || r_type == R_PPC64_TLSLD))
13568 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13569 ;
13570 else
13571 info->callbacks->einfo
13572 (!IS_PPC64_TLS_RELOC (r_type)
13573 /* xgettext:c-format */
13574 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13575 /* xgettext:c-format */
13576 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
13577 input_bfd, input_section, rel->r_offset,
13578 ppc64_elf_howto_table[r_type]->name,
13579 sym_name);
13580 }
13581
13582 /* Ensure reloc mapping code below stays sane. */
13583 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13584 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13585 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13586 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13587 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13588 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13589 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13590 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13591 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13592 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13593 abort ();
13594
13595 switch (r_type)
13596 {
13597 default:
13598 break;
13599
13600 case R_PPC64_LO_DS_OPT:
13601 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
13602 if ((insn & (0x3f << 26)) != 58u << 26)
13603 abort ();
13604 insn += (14u << 26) - (58u << 26);
13605 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
13606 r_type = R_PPC64_TOC16_LO;
13607 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13608 break;
13609
13610 case R_PPC64_TOC16:
13611 case R_PPC64_TOC16_LO:
13612 case R_PPC64_TOC16_DS:
13613 case R_PPC64_TOC16_LO_DS:
13614 {
13615 /* Check for toc tls entries. */
13616 unsigned char *toc_tls;
13617 int retval;
13618
13619 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13620 &local_syms, rel, input_bfd);
13621 if (retval == 0)
13622 return FALSE;
13623
13624 if (toc_tls)
13625 {
13626 tls_mask = *toc_tls;
13627 if (r_type == R_PPC64_TOC16_DS
13628 || r_type == R_PPC64_TOC16_LO_DS)
13629 {
13630 if (tls_mask != 0
13631 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13632 goto toctprel;
13633 }
13634 else
13635 {
13636 /* If we found a GD reloc pair, then we might be
13637 doing a GD->IE transition. */
13638 if (retval == 2)
13639 {
13640 tls_gd = TLS_TPRELGD;
13641 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13642 goto tls_ldgd_opt;
13643 }
13644 else if (retval == 3)
13645 {
13646 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13647 goto tls_ldgd_opt;
13648 }
13649 }
13650 }
13651 }
13652 break;
13653
13654 case R_PPC64_GOT_TPREL16_HI:
13655 case R_PPC64_GOT_TPREL16_HA:
13656 if (tls_mask != 0
13657 && (tls_mask & TLS_TPREL) == 0)
13658 {
13659 rel->r_offset -= d_offset;
13660 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
13661 r_type = R_PPC64_NONE;
13662 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13663 }
13664 break;
13665
13666 case R_PPC64_GOT_TPREL16_DS:
13667 case R_PPC64_GOT_TPREL16_LO_DS:
13668 if (tls_mask != 0
13669 && (tls_mask & TLS_TPREL) == 0)
13670 {
13671 toctprel:
13672 insn = bfd_get_32 (input_bfd,
13673 contents + rel->r_offset - d_offset);
13674 insn &= 31 << 21;
13675 insn |= 0x3c0d0000; /* addis 0,13,0 */
13676 bfd_put_32 (input_bfd, insn,
13677 contents + rel->r_offset - d_offset);
13678 r_type = R_PPC64_TPREL16_HA;
13679 if (toc_symndx != 0)
13680 {
13681 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13682 rel->r_addend = toc_addend;
13683 /* We changed the symbol. Start over in order to
13684 get h, sym, sec etc. right. */
13685 goto again;
13686 }
13687 else
13688 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13689 }
13690 break;
13691
13692 case R_PPC64_TLS:
13693 if (tls_mask != 0
13694 && (tls_mask & TLS_TPREL) == 0)
13695 {
13696 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
13697 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13698 if (insn == 0)
13699 abort ();
13700 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
13701 /* Was PPC64_TLS which sits on insn boundary, now
13702 PPC64_TPREL16_LO which is at low-order half-word. */
13703 rel->r_offset += d_offset;
13704 r_type = R_PPC64_TPREL16_LO;
13705 if (toc_symndx != 0)
13706 {
13707 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13708 rel->r_addend = toc_addend;
13709 /* We changed the symbol. Start over in order to
13710 get h, sym, sec etc. right. */
13711 goto again;
13712 }
13713 else
13714 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13715 }
13716 break;
13717
13718 case R_PPC64_GOT_TLSGD16_HI:
13719 case R_PPC64_GOT_TLSGD16_HA:
13720 tls_gd = TLS_TPRELGD;
13721 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13722 goto tls_gdld_hi;
13723 break;
13724
13725 case R_PPC64_GOT_TLSLD16_HI:
13726 case R_PPC64_GOT_TLSLD16_HA:
13727 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13728 {
13729 tls_gdld_hi:
13730 if ((tls_mask & tls_gd) != 0)
13731 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13732 + R_PPC64_GOT_TPREL16_DS);
13733 else
13734 {
13735 rel->r_offset -= d_offset;
13736 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
13737 r_type = R_PPC64_NONE;
13738 }
13739 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13740 }
13741 break;
13742
13743 case R_PPC64_GOT_TLSGD16:
13744 case R_PPC64_GOT_TLSGD16_LO:
13745 tls_gd = TLS_TPRELGD;
13746 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13747 goto tls_ldgd_opt;
13748 break;
13749
13750 case R_PPC64_GOT_TLSLD16:
13751 case R_PPC64_GOT_TLSLD16_LO:
13752 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13753 {
13754 unsigned int insn1, insn2, insn3;
13755 bfd_vma offset;
13756
13757 tls_ldgd_opt:
13758 offset = (bfd_vma) -1;
13759 /* If not using the newer R_PPC64_TLSGD/LD to mark
13760 __tls_get_addr calls, we must trust that the call
13761 stays with its arg setup insns, ie. that the next
13762 reloc is the __tls_get_addr call associated with
13763 the current reloc. Edit both insns. */
13764 if (input_section->has_tls_get_addr_call
13765 && rel + 1 < relend
13766 && branch_reloc_hash_match (input_bfd, rel + 1,
13767 htab->tls_get_addr,
13768 htab->tls_get_addr_fd))
13769 offset = rel[1].r_offset;
13770 /* We read the low GOT_TLS (or TOC16) insn because we
13771 need to keep the destination reg. It may be
13772 something other than the usual r3, and moved to r3
13773 before the call by intervening code. */
13774 insn1 = bfd_get_32 (input_bfd,
13775 contents + rel->r_offset - d_offset);
13776 if ((tls_mask & tls_gd) != 0)
13777 {
13778 /* IE */
13779 insn1 &= (0x1f << 21) | (0x1f << 16);
13780 insn1 |= 58 << 26; /* ld */
13781 insn2 = 0x7c636a14; /* add 3,3,13 */
13782 if (offset != (bfd_vma) -1)
13783 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13784 if ((tls_mask & TLS_EXPLICIT) == 0)
13785 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13786 + R_PPC64_GOT_TPREL16_DS);
13787 else
13788 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13789 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13790 }
13791 else
13792 {
13793 /* LE */
13794 insn1 &= 0x1f << 21;
13795 insn1 |= 0x3c0d0000; /* addis r,13,0 */
13796 insn2 = 0x38630000; /* addi 3,3,0 */
13797 if (tls_gd == 0)
13798 {
13799 /* Was an LD reloc. */
13800 if (toc_symndx)
13801 sec = local_sections[toc_symndx];
13802 for (r_symndx = 0;
13803 r_symndx < symtab_hdr->sh_info;
13804 r_symndx++)
13805 if (local_sections[r_symndx] == sec)
13806 break;
13807 if (r_symndx >= symtab_hdr->sh_info)
13808 r_symndx = STN_UNDEF;
13809 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13810 if (r_symndx != STN_UNDEF)
13811 rel->r_addend -= (local_syms[r_symndx].st_value
13812 + sec->output_offset
13813 + sec->output_section->vma);
13814 }
13815 else if (toc_symndx != 0)
13816 {
13817 r_symndx = toc_symndx;
13818 rel->r_addend = toc_addend;
13819 }
13820 r_type = R_PPC64_TPREL16_HA;
13821 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13822 if (offset != (bfd_vma) -1)
13823 {
13824 rel[1].r_info = ELF64_R_INFO (r_symndx,
13825 R_PPC64_TPREL16_LO);
13826 rel[1].r_offset = offset + d_offset;
13827 rel[1].r_addend = rel->r_addend;
13828 }
13829 }
13830 bfd_put_32 (input_bfd, insn1,
13831 contents + rel->r_offset - d_offset);
13832 if (offset != (bfd_vma) -1)
13833 {
13834 insn3 = bfd_get_32 (input_bfd,
13835 contents + offset + 4);
13836 if (insn3 == NOP
13837 || insn3 == CROR_151515 || insn3 == CROR_313131)
13838 {
13839 rel[1].r_offset += 4;
13840 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
13841 insn2 = NOP;
13842 }
13843 bfd_put_32 (input_bfd, insn2, contents + offset);
13844 }
13845 if ((tls_mask & tls_gd) == 0
13846 && (tls_gd == 0 || toc_symndx != 0))
13847 {
13848 /* We changed the symbol. Start over in order
13849 to get h, sym, sec etc. right. */
13850 goto again;
13851 }
13852 }
13853 break;
13854
13855 case R_PPC64_TLSGD:
13856 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13857 {
13858 unsigned int insn2, insn3;
13859 bfd_vma offset = rel->r_offset;
13860
13861 if ((tls_mask & TLS_TPRELGD) != 0)
13862 {
13863 /* IE */
13864 r_type = R_PPC64_NONE;
13865 insn2 = 0x7c636a14; /* add 3,3,13 */
13866 }
13867 else
13868 {
13869 /* LE */
13870 if (toc_symndx != 0)
13871 {
13872 r_symndx = toc_symndx;
13873 rel->r_addend = toc_addend;
13874 }
13875 r_type = R_PPC64_TPREL16_LO;
13876 rel->r_offset = offset + d_offset;
13877 insn2 = 0x38630000; /* addi 3,3,0 */
13878 }
13879 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13880 /* Zap the reloc on the _tls_get_addr call too. */
13881 BFD_ASSERT (offset == rel[1].r_offset);
13882 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13883 insn3 = bfd_get_32 (input_bfd,
13884 contents + offset + 4);
13885 if (insn3 == NOP
13886 || insn3 == CROR_151515 || insn3 == CROR_313131)
13887 {
13888 rel->r_offset += 4;
13889 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
13890 insn2 = NOP;
13891 }
13892 bfd_put_32 (input_bfd, insn2, contents + offset);
13893 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
13894 goto again;
13895 }
13896 break;
13897
13898 case R_PPC64_TLSLD:
13899 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13900 {
13901 unsigned int insn2, insn3;
13902 bfd_vma offset = rel->r_offset;
13903
13904 if (toc_symndx)
13905 sec = local_sections[toc_symndx];
13906 for (r_symndx = 0;
13907 r_symndx < symtab_hdr->sh_info;
13908 r_symndx++)
13909 if (local_sections[r_symndx] == sec)
13910 break;
13911 if (r_symndx >= symtab_hdr->sh_info)
13912 r_symndx = STN_UNDEF;
13913 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13914 if (r_symndx != STN_UNDEF)
13915 rel->r_addend -= (local_syms[r_symndx].st_value
13916 + sec->output_offset
13917 + sec->output_section->vma);
13918
13919 r_type = R_PPC64_TPREL16_LO;
13920 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13921 rel->r_offset = offset + d_offset;
13922 /* Zap the reloc on the _tls_get_addr call too. */
13923 BFD_ASSERT (offset == rel[1].r_offset);
13924 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13925 insn2 = 0x38630000; /* addi 3,3,0 */
13926 insn3 = bfd_get_32 (input_bfd,
13927 contents + offset + 4);
13928 if (insn3 == NOP
13929 || insn3 == CROR_151515 || insn3 == CROR_313131)
13930 {
13931 rel->r_offset += 4;
13932 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
13933 insn2 = NOP;
13934 }
13935 bfd_put_32 (input_bfd, insn2, contents + offset);
13936 goto again;
13937 }
13938 break;
13939
13940 case R_PPC64_DTPMOD64:
13941 if (rel + 1 < relend
13942 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13943 && rel[1].r_offset == rel->r_offset + 8)
13944 {
13945 if ((tls_mask & TLS_GD) == 0)
13946 {
13947 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13948 if ((tls_mask & TLS_TPRELGD) != 0)
13949 r_type = R_PPC64_TPREL64;
13950 else
13951 {
13952 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13953 r_type = R_PPC64_NONE;
13954 }
13955 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13956 }
13957 }
13958 else
13959 {
13960 if ((tls_mask & TLS_LD) == 0)
13961 {
13962 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13963 r_type = R_PPC64_NONE;
13964 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13965 }
13966 }
13967 break;
13968
13969 case R_PPC64_TPREL64:
13970 if ((tls_mask & TLS_TPREL) == 0)
13971 {
13972 r_type = R_PPC64_NONE;
13973 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13974 }
13975 break;
13976
13977 case R_PPC64_ENTRY:
13978 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13979 if (!bfd_link_pic (info)
13980 && !info->traditional_format
13981 && relocation + 0x80008000 <= 0xffffffff)
13982 {
13983 unsigned int insn1, insn2;
13984
13985 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13986 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13987 if ((insn1 & ~0xfffc) == LD_R2_0R12
13988 && insn2 == ADD_R2_R2_R12)
13989 {
13990 bfd_put_32 (input_bfd,
13991 LIS_R2 + PPC_HA (relocation),
13992 contents + rel->r_offset);
13993 bfd_put_32 (input_bfd,
13994 ADDI_R2_R2 + PPC_LO (relocation),
13995 contents + rel->r_offset + 4);
13996 }
13997 }
13998 else
13999 {
14000 relocation -= (rel->r_offset
14001 + input_section->output_offset
14002 + input_section->output_section->vma);
14003 if (relocation + 0x80008000 <= 0xffffffff)
14004 {
14005 unsigned int insn1, insn2;
14006
14007 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14008 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14009 if ((insn1 & ~0xfffc) == LD_R2_0R12
14010 && insn2 == ADD_R2_R2_R12)
14011 {
14012 bfd_put_32 (input_bfd,
14013 ADDIS_R2_R12 + PPC_HA (relocation),
14014 contents + rel->r_offset);
14015 bfd_put_32 (input_bfd,
14016 ADDI_R2_R2 + PPC_LO (relocation),
14017 contents + rel->r_offset + 4);
14018 }
14019 }
14020 }
14021 break;
14022
14023 case R_PPC64_REL16_HA:
14024 /* If we are generating a non-PIC executable, edit
14025 . 0: addis 2,12,.TOC.-0b@ha
14026 . addi 2,2,.TOC.-0b@l
14027 used by ELFv2 global entry points to set up r2, to
14028 . lis 2,.TOC.@ha
14029 . addi 2,2,.TOC.@l
14030 if .TOC. is in range. */
14031 if (!bfd_link_pic (info)
14032 && !info->traditional_format
14033 && !htab->opd_abi
14034 && rel->r_addend == d_offset
14035 && h != NULL && &h->elf == htab->elf.hgot
14036 && rel + 1 < relend
14037 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14038 && rel[1].r_offset == rel->r_offset + 4
14039 && rel[1].r_addend == rel->r_addend + 4
14040 && relocation + 0x80008000 <= 0xffffffff)
14041 {
14042 unsigned int insn1, insn2;
14043 bfd_vma offset = rel->r_offset - d_offset;
14044 insn1 = bfd_get_32 (input_bfd, contents + offset);
14045 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14046 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14047 && (insn2 & 0xffff0000) == ADDI_R2_R2)
14048 {
14049 r_type = R_PPC64_ADDR16_HA;
14050 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14051 rel->r_addend -= d_offset;
14052 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14053 rel[1].r_addend -= d_offset + 4;
14054 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
14055 }
14056 }
14057 break;
14058 }
14059
14060 /* Handle other relocations that tweak non-addend part of insn. */
14061 insn = 0;
14062 max_br_offset = 1 << 25;
14063 addend = rel->r_addend;
14064 reloc_dest = DEST_NORMAL;
14065 switch (r_type)
14066 {
14067 default:
14068 break;
14069
14070 case R_PPC64_TOCSAVE:
14071 if (relocation + addend == (rel->r_offset
14072 + input_section->output_offset
14073 + input_section->output_section->vma)
14074 && tocsave_find (htab, NO_INSERT,
14075 &local_syms, rel, input_bfd))
14076 {
14077 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14078 if (insn == NOP
14079 || insn == CROR_151515 || insn == CROR_313131)
14080 bfd_put_32 (input_bfd,
14081 STD_R2_0R1 + STK_TOC (htab),
14082 contents + rel->r_offset);
14083 }
14084 break;
14085
14086 /* Branch taken prediction relocations. */
14087 case R_PPC64_ADDR14_BRTAKEN:
14088 case R_PPC64_REL14_BRTAKEN:
14089 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14090 /* Fall through. */
14091
14092 /* Branch not taken prediction relocations. */
14093 case R_PPC64_ADDR14_BRNTAKEN:
14094 case R_PPC64_REL14_BRNTAKEN:
14095 insn |= bfd_get_32 (input_bfd,
14096 contents + rel->r_offset) & ~(0x01 << 21);
14097 /* Fall through. */
14098
14099 case R_PPC64_REL14:
14100 max_br_offset = 1 << 15;
14101 /* Fall through. */
14102
14103 case R_PPC64_REL24:
14104 /* Calls to functions with a different TOC, such as calls to
14105 shared objects, need to alter the TOC pointer. This is
14106 done using a linkage stub. A REL24 branching to these
14107 linkage stubs needs to be followed by a nop, as the nop
14108 will be replaced with an instruction to restore the TOC
14109 base pointer. */
14110 fdh = h;
14111 if (h != NULL
14112 && h->oh != NULL
14113 && h->oh->is_func_descriptor)
14114 fdh = ppc_follow_link (h->oh);
14115 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14116 htab);
14117 if (stub_entry != NULL
14118 && (stub_entry->stub_type == ppc_stub_plt_call
14119 || stub_entry->stub_type == ppc_stub_plt_call_r2save
14120 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14121 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
14122 {
14123 bfd_boolean can_plt_call = FALSE;
14124
14125 /* All of these stubs will modify r2, so there must be a
14126 branch and link followed by a nop. The nop is
14127 replaced by an insn to restore r2. */
14128 if (rel->r_offset + 8 <= input_section->size)
14129 {
14130 unsigned long br;
14131
14132 br = bfd_get_32 (input_bfd,
14133 contents + rel->r_offset);
14134 if ((br & 1) != 0)
14135 {
14136 unsigned long nop;
14137
14138 nop = bfd_get_32 (input_bfd,
14139 contents + rel->r_offset + 4);
14140 if (nop == NOP
14141 || nop == CROR_151515 || nop == CROR_313131)
14142 {
14143 if (h != NULL
14144 && (h == htab->tls_get_addr_fd
14145 || h == htab->tls_get_addr)
14146 && htab->params->tls_get_addr_opt)
14147 {
14148 /* Special stub used, leave nop alone. */
14149 }
14150 else
14151 bfd_put_32 (input_bfd,
14152 LD_R2_0R1 + STK_TOC (htab),
14153 contents + rel->r_offset + 4);
14154 can_plt_call = TRUE;
14155 }
14156 }
14157 }
14158
14159 if (!can_plt_call && h != NULL)
14160 {
14161 const char *name = h->elf.root.root.string;
14162
14163 if (*name == '.')
14164 ++name;
14165
14166 if (strncmp (name, "__libc_start_main", 17) == 0
14167 && (name[17] == 0 || name[17] == '@'))
14168 {
14169 /* Allow crt1 branch to go via a toc adjusting
14170 stub. Other calls that never return could do
14171 the same, if we could detect such. */
14172 can_plt_call = TRUE;
14173 }
14174 }
14175
14176 if (!can_plt_call)
14177 {
14178 /* g++ as of 20130507 emits self-calls without a
14179 following nop. This is arguably wrong since we
14180 have conflicting information. On the one hand a
14181 global symbol and on the other a local call
14182 sequence, but don't error for this special case.
14183 It isn't possible to cheaply verify we have
14184 exactly such a call. Allow all calls to the same
14185 section. */
14186 asection *code_sec = sec;
14187
14188 if (get_opd_info (sec) != NULL)
14189 {
14190 bfd_vma off = (relocation + addend
14191 - sec->output_section->vma
14192 - sec->output_offset);
14193
14194 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
14195 }
14196 if (code_sec == input_section)
14197 can_plt_call = TRUE;
14198 }
14199
14200 if (!can_plt_call)
14201 {
14202 if (stub_entry->stub_type == ppc_stub_plt_call
14203 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14204 info->callbacks->einfo
14205 /* xgettext:c-format */
14206 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14207 "recompile with -fPIC\n"),
14208 input_bfd, input_section, rel->r_offset, sym_name);
14209 else
14210 info->callbacks->einfo
14211 /* xgettext:c-format */
14212 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14213 "(-mcmodel=small toc adjust stub)\n"),
14214 input_bfd, input_section, rel->r_offset, sym_name);
14215
14216 bfd_set_error (bfd_error_bad_value);
14217 ret = FALSE;
14218 }
14219
14220 if (can_plt_call
14221 && (stub_entry->stub_type == ppc_stub_plt_call
14222 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14223 unresolved_reloc = FALSE;
14224 }
14225
14226 if ((stub_entry == NULL
14227 || stub_entry->stub_type == ppc_stub_long_branch
14228 || stub_entry->stub_type == ppc_stub_plt_branch)
14229 && get_opd_info (sec) != NULL)
14230 {
14231 /* The branch destination is the value of the opd entry. */
14232 bfd_vma off = (relocation + addend
14233 - sec->output_section->vma
14234 - sec->output_offset);
14235 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
14236 if (dest != (bfd_vma) -1)
14237 {
14238 relocation = dest;
14239 addend = 0;
14240 reloc_dest = DEST_OPD;
14241 }
14242 }
14243
14244 /* If the branch is out of reach we ought to have a long
14245 branch stub. */
14246 from = (rel->r_offset
14247 + input_section->output_offset
14248 + input_section->output_section->vma);
14249
14250 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14251 ? fdh->elf.other
14252 : sym->st_other);
14253
14254 if (stub_entry != NULL
14255 && (stub_entry->stub_type == ppc_stub_long_branch
14256 || stub_entry->stub_type == ppc_stub_plt_branch)
14257 && (r_type == R_PPC64_ADDR14_BRTAKEN
14258 || r_type == R_PPC64_ADDR14_BRNTAKEN
14259 || (relocation + addend - from + max_br_offset
14260 < 2 * max_br_offset)))
14261 /* Don't use the stub if this branch is in range. */
14262 stub_entry = NULL;
14263
14264 if (stub_entry != NULL)
14265 {
14266 /* Munge up the value and addend so that we call the stub
14267 rather than the procedure directly. */
14268 asection *stub_sec = stub_entry->group->stub_sec;
14269
14270 if (stub_entry->stub_type == ppc_stub_save_res)
14271 relocation += (stub_sec->output_offset
14272 + stub_sec->output_section->vma
14273 + stub_sec->size - htab->sfpr->size
14274 - htab->sfpr->output_offset
14275 - htab->sfpr->output_section->vma);
14276 else
14277 relocation = (stub_entry->stub_offset
14278 + stub_sec->output_offset
14279 + stub_sec->output_section->vma);
14280 addend = 0;
14281 reloc_dest = DEST_STUB;
14282
14283 if ((stub_entry->stub_type == ppc_stub_plt_call
14284 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14285 && (ALWAYS_EMIT_R2SAVE
14286 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14287 && rel + 1 < relend
14288 && rel[1].r_offset == rel->r_offset + 4
14289 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14290 relocation += 4;
14291 }
14292
14293 if (insn != 0)
14294 {
14295 if (is_isa_v2)
14296 {
14297 /* Set 'a' bit. This is 0b00010 in BO field for branch
14298 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14299 for branch on CTR insns (BO == 1a00t or 1a01t). */
14300 if ((insn & (0x14 << 21)) == (0x04 << 21))
14301 insn |= 0x02 << 21;
14302 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14303 insn |= 0x08 << 21;
14304 else
14305 break;
14306 }
14307 else
14308 {
14309 /* Invert 'y' bit if not the default. */
14310 if ((bfd_signed_vma) (relocation + addend - from) < 0)
14311 insn ^= 0x01 << 21;
14312 }
14313
14314 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14315 }
14316
14317 /* NOP out calls to undefined weak functions.
14318 We can thus call a weak function without first
14319 checking whether the function is defined. */
14320 else if (h != NULL
14321 && h->elf.root.type == bfd_link_hash_undefweak
14322 && h->elf.dynindx == -1
14323 && r_type == R_PPC64_REL24
14324 && relocation == 0
14325 && addend == 0)
14326 {
14327 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14328 goto copy_reloc;
14329 }
14330 break;
14331 }
14332
14333 /* Set `addend'. */
14334 tls_type = 0;
14335 switch (r_type)
14336 {
14337 default:
14338 info->callbacks->einfo
14339 /* xgettext:c-format */
14340 (_("%P: %B: unknown relocation type %d for `%T'\n"),
14341 input_bfd, (int) r_type, sym_name);
14342
14343 bfd_set_error (bfd_error_bad_value);
14344 ret = FALSE;
14345 goto copy_reloc;
14346
14347 case R_PPC64_NONE:
14348 case R_PPC64_TLS:
14349 case R_PPC64_TLSGD:
14350 case R_PPC64_TLSLD:
14351 case R_PPC64_TOCSAVE:
14352 case R_PPC64_GNU_VTINHERIT:
14353 case R_PPC64_GNU_VTENTRY:
14354 case R_PPC64_ENTRY:
14355 goto copy_reloc;
14356
14357 /* GOT16 relocations. Like an ADDR16 using the symbol's
14358 address in the GOT as relocation value instead of the
14359 symbol's value itself. Also, create a GOT entry for the
14360 symbol and put the symbol value there. */
14361 case R_PPC64_GOT_TLSGD16:
14362 case R_PPC64_GOT_TLSGD16_LO:
14363 case R_PPC64_GOT_TLSGD16_HI:
14364 case R_PPC64_GOT_TLSGD16_HA:
14365 tls_type = TLS_TLS | TLS_GD;
14366 goto dogot;
14367
14368 case R_PPC64_GOT_TLSLD16:
14369 case R_PPC64_GOT_TLSLD16_LO:
14370 case R_PPC64_GOT_TLSLD16_HI:
14371 case R_PPC64_GOT_TLSLD16_HA:
14372 tls_type = TLS_TLS | TLS_LD;
14373 goto dogot;
14374
14375 case R_PPC64_GOT_TPREL16_DS:
14376 case R_PPC64_GOT_TPREL16_LO_DS:
14377 case R_PPC64_GOT_TPREL16_HI:
14378 case R_PPC64_GOT_TPREL16_HA:
14379 tls_type = TLS_TLS | TLS_TPREL;
14380 goto dogot;
14381
14382 case R_PPC64_GOT_DTPREL16_DS:
14383 case R_PPC64_GOT_DTPREL16_LO_DS:
14384 case R_PPC64_GOT_DTPREL16_HI:
14385 case R_PPC64_GOT_DTPREL16_HA:
14386 tls_type = TLS_TLS | TLS_DTPREL;
14387 goto dogot;
14388
14389 case R_PPC64_GOT16:
14390 case R_PPC64_GOT16_LO:
14391 case R_PPC64_GOT16_HI:
14392 case R_PPC64_GOT16_HA:
14393 case R_PPC64_GOT16_DS:
14394 case R_PPC64_GOT16_LO_DS:
14395 dogot:
14396 {
14397 /* Relocation is to the entry for this symbol in the global
14398 offset table. */
14399 asection *got;
14400 bfd_vma *offp;
14401 bfd_vma off;
14402 unsigned long indx = 0;
14403 struct got_entry *ent;
14404
14405 if (tls_type == (TLS_TLS | TLS_LD)
14406 && (h == NULL
14407 || !h->elf.def_dynamic))
14408 ent = ppc64_tlsld_got (input_bfd);
14409 else
14410 {
14411 if (h != NULL)
14412 {
14413 if (!htab->elf.dynamic_sections_created
14414 || h->elf.dynindx == -1
14415 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14416 || (ELF_ST_VISIBILITY (h->elf.other) != STV_DEFAULT
14417 && h->elf.root.type == bfd_link_hash_undefweak))
14418 /* This is actually a static link, or it is a
14419 -Bsymbolic link and the symbol is defined
14420 locally, or the symbol was forced to be local
14421 because of a version file. */
14422 ;
14423 else
14424 {
14425 indx = h->elf.dynindx;
14426 unresolved_reloc = FALSE;
14427 }
14428 ent = h->elf.got.glist;
14429 }
14430 else
14431 {
14432 if (local_got_ents == NULL)
14433 abort ();
14434 ent = local_got_ents[r_symndx];
14435 }
14436
14437 for (; ent != NULL; ent = ent->next)
14438 if (ent->addend == orig_rel.r_addend
14439 && ent->owner == input_bfd
14440 && ent->tls_type == tls_type)
14441 break;
14442 }
14443
14444 if (ent == NULL)
14445 abort ();
14446 if (ent->is_indirect)
14447 ent = ent->got.ent;
14448 offp = &ent->got.offset;
14449 got = ppc64_elf_tdata (ent->owner)->got;
14450 if (got == NULL)
14451 abort ();
14452
14453 /* The offset must always be a multiple of 8. We use the
14454 least significant bit to record whether we have already
14455 processed this entry. */
14456 off = *offp;
14457 if ((off & 1) != 0)
14458 off &= ~1;
14459 else
14460 {
14461 /* Generate relocs for the dynamic linker, except in
14462 the case of TLSLD where we'll use one entry per
14463 module. */
14464 asection *relgot;
14465 bfd_boolean ifunc;
14466
14467 *offp = off | 1;
14468 relgot = NULL;
14469 ifunc = (h != NULL
14470 ? h->elf.type == STT_GNU_IFUNC
14471 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
14472 if (ifunc)
14473 relgot = htab->elf.irelplt;
14474 else if (indx != 0
14475 || (bfd_link_pic (info)
14476 && (h == NULL
14477 || (ELF_ST_VISIBILITY (h->elf.other)
14478 == STV_DEFAULT)
14479 || h->elf.root.type != bfd_link_hash_undefweak
14480 || (tls_type == (TLS_TLS | TLS_LD)
14481 && !h->elf.def_dynamic))))
14482 relgot = ppc64_elf_tdata (ent->owner)->relgot;
14483 if (relgot != NULL)
14484 {
14485 outrel.r_offset = (got->output_section->vma
14486 + got->output_offset
14487 + off);
14488 outrel.r_addend = addend;
14489 if (tls_type & (TLS_LD | TLS_GD))
14490 {
14491 outrel.r_addend = 0;
14492 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
14493 if (tls_type == (TLS_TLS | TLS_GD))
14494 {
14495 loc = relgot->contents;
14496 loc += (relgot->reloc_count++
14497 * sizeof (Elf64_External_Rela));
14498 bfd_elf64_swap_reloca_out (output_bfd,
14499 &outrel, loc);
14500 outrel.r_offset += 8;
14501 outrel.r_addend = addend;
14502 outrel.r_info
14503 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14504 }
14505 }
14506 else if (tls_type == (TLS_TLS | TLS_DTPREL))
14507 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14508 else if (tls_type == (TLS_TLS | TLS_TPREL))
14509 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
14510 else if (indx != 0)
14511 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14512 else
14513 {
14514 if (ifunc)
14515 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14516 else
14517 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14518
14519 /* Write the .got section contents for the sake
14520 of prelink. */
14521 loc = got->contents + off;
14522 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14523 loc);
14524 }
14525
14526 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
14527 {
14528 outrel.r_addend += relocation;
14529 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
14530 {
14531 if (htab->elf.tls_sec == NULL)
14532 outrel.r_addend = 0;
14533 else
14534 outrel.r_addend -= htab->elf.tls_sec->vma;
14535 }
14536 }
14537 loc = relgot->contents;
14538 loc += (relgot->reloc_count++
14539 * sizeof (Elf64_External_Rela));
14540 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14541 }
14542
14543 /* Init the .got section contents here if we're not
14544 emitting a reloc. */
14545 else
14546 {
14547 int tlsopt
14548 = (htab->params->tls_get_addr_opt
14549 && htab->tls_get_addr_fd != NULL
14550 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
14551
14552 relocation += addend;
14553 if (tls_type != 0)
14554 {
14555 if (htab->elf.tls_sec == NULL)
14556 relocation = 0;
14557 else
14558 {
14559 if (tls_type & TLS_LD)
14560 relocation = 0;
14561 else
14562 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14563 if ((tls_type & TLS_TPREL)
14564 || (tlsopt && !(tls_type & TLS_DTPREL)))
14565 relocation += DTP_OFFSET - TP_OFFSET;
14566 }
14567
14568 if (tls_type & (TLS_GD | TLS_LD))
14569 {
14570 bfd_put_64 (output_bfd, relocation,
14571 got->contents + off + 8);
14572 relocation = !tlsopt;
14573 }
14574 }
14575 bfd_put_64 (output_bfd, relocation,
14576 got->contents + off);
14577 }
14578 }
14579
14580 if (off >= (bfd_vma) -2)
14581 abort ();
14582
14583 relocation = got->output_section->vma + got->output_offset + off;
14584 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
14585 }
14586 break;
14587
14588 case R_PPC64_PLT16_HA:
14589 case R_PPC64_PLT16_HI:
14590 case R_PPC64_PLT16_LO:
14591 case R_PPC64_PLT32:
14592 case R_PPC64_PLT64:
14593 /* Relocation is to the entry for this symbol in the
14594 procedure linkage table. */
14595 {
14596 struct plt_entry **plt_list = NULL;
14597 if (h != NULL)
14598 plt_list = &h->elf.plt.plist;
14599 else if (local_got_ents != NULL)
14600 {
14601 struct plt_entry **local_plt = (struct plt_entry **)
14602 (local_got_ents + symtab_hdr->sh_info);
14603 unsigned char *local_got_tls_masks = (unsigned char *)
14604 (local_plt + symtab_hdr->sh_info);
14605 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
14606 plt_list = local_plt + r_symndx;
14607 }
14608 if (plt_list)
14609 {
14610 struct plt_entry *ent;
14611
14612 for (ent = *plt_list; ent != NULL; ent = ent->next)
14613 if (ent->plt.offset != (bfd_vma) -1
14614 && ent->addend == orig_rel.r_addend)
14615 {
14616 asection *plt;
14617
14618 plt = htab->elf.splt;
14619 if (!htab->elf.dynamic_sections_created
14620 || h == NULL
14621 || h->elf.dynindx == -1)
14622 plt = htab->elf.iplt;
14623 relocation = (plt->output_section->vma
14624 + plt->output_offset
14625 + ent->plt.offset);
14626 addend = 0;
14627 unresolved_reloc = FALSE;
14628 break;
14629 }
14630 }
14631 }
14632 break;
14633
14634 case R_PPC64_TOC:
14635 /* Relocation value is TOC base. */
14636 relocation = TOCstart;
14637 if (r_symndx == STN_UNDEF)
14638 relocation += htab->sec_info[input_section->id].toc_off;
14639 else if (unresolved_reloc)
14640 ;
14641 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14642 relocation += htab->sec_info[sec->id].toc_off;
14643 else
14644 unresolved_reloc = TRUE;
14645 goto dodyn;
14646
14647 /* TOC16 relocs. We want the offset relative to the TOC base,
14648 which is the address of the start of the TOC plus 0x8000.
14649 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14650 in this order. */
14651 case R_PPC64_TOC16:
14652 case R_PPC64_TOC16_LO:
14653 case R_PPC64_TOC16_HI:
14654 case R_PPC64_TOC16_DS:
14655 case R_PPC64_TOC16_LO_DS:
14656 case R_PPC64_TOC16_HA:
14657 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
14658 break;
14659
14660 /* Relocate against the beginning of the section. */
14661 case R_PPC64_SECTOFF:
14662 case R_PPC64_SECTOFF_LO:
14663 case R_PPC64_SECTOFF_HI:
14664 case R_PPC64_SECTOFF_DS:
14665 case R_PPC64_SECTOFF_LO_DS:
14666 case R_PPC64_SECTOFF_HA:
14667 if (sec != NULL)
14668 addend -= sec->output_section->vma;
14669 break;
14670
14671 case R_PPC64_REL16:
14672 case R_PPC64_REL16_LO:
14673 case R_PPC64_REL16_HI:
14674 case R_PPC64_REL16_HA:
14675 case R_PPC64_REL16DX_HA:
14676 break;
14677
14678 case R_PPC64_REL14:
14679 case R_PPC64_REL14_BRNTAKEN:
14680 case R_PPC64_REL14_BRTAKEN:
14681 case R_PPC64_REL24:
14682 break;
14683
14684 case R_PPC64_TPREL16:
14685 case R_PPC64_TPREL16_LO:
14686 case R_PPC64_TPREL16_HI:
14687 case R_PPC64_TPREL16_HA:
14688 case R_PPC64_TPREL16_DS:
14689 case R_PPC64_TPREL16_LO_DS:
14690 case R_PPC64_TPREL16_HIGH:
14691 case R_PPC64_TPREL16_HIGHA:
14692 case R_PPC64_TPREL16_HIGHER:
14693 case R_PPC64_TPREL16_HIGHERA:
14694 case R_PPC64_TPREL16_HIGHEST:
14695 case R_PPC64_TPREL16_HIGHESTA:
14696 if (h != NULL
14697 && h->elf.root.type == bfd_link_hash_undefweak
14698 && h->elf.dynindx == -1)
14699 {
14700 /* Make this relocation against an undefined weak symbol
14701 resolve to zero. This is really just a tweak, since
14702 code using weak externs ought to check that they are
14703 defined before using them. */
14704 bfd_byte *p = contents + rel->r_offset - d_offset;
14705
14706 insn = bfd_get_32 (input_bfd, p);
14707 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14708 if (insn != 0)
14709 bfd_put_32 (input_bfd, insn, p);
14710 break;
14711 }
14712 if (htab->elf.tls_sec != NULL)
14713 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14714 if (bfd_link_pic (info))
14715 /* The TPREL16 relocs shouldn't really be used in shared
14716 libs as they will result in DT_TEXTREL being set, but
14717 support them anyway. */
14718 goto dodyn;
14719 break;
14720
14721 case R_PPC64_DTPREL16:
14722 case R_PPC64_DTPREL16_LO:
14723 case R_PPC64_DTPREL16_HI:
14724 case R_PPC64_DTPREL16_HA:
14725 case R_PPC64_DTPREL16_DS:
14726 case R_PPC64_DTPREL16_LO_DS:
14727 case R_PPC64_DTPREL16_HIGH:
14728 case R_PPC64_DTPREL16_HIGHA:
14729 case R_PPC64_DTPREL16_HIGHER:
14730 case R_PPC64_DTPREL16_HIGHERA:
14731 case R_PPC64_DTPREL16_HIGHEST:
14732 case R_PPC64_DTPREL16_HIGHESTA:
14733 if (htab->elf.tls_sec != NULL)
14734 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14735 break;
14736
14737 case R_PPC64_ADDR64_LOCAL:
14738 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14739 ? h->elf.other
14740 : sym->st_other);
14741 break;
14742
14743 case R_PPC64_DTPMOD64:
14744 relocation = 1;
14745 addend = 0;
14746 goto dodyn;
14747
14748 case R_PPC64_TPREL64:
14749 if (htab->elf.tls_sec != NULL)
14750 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14751 goto dodyn;
14752
14753 case R_PPC64_DTPREL64:
14754 if (htab->elf.tls_sec != NULL)
14755 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14756 /* Fall through. */
14757
14758 /* Relocations that may need to be propagated if this is a
14759 dynamic object. */
14760 case R_PPC64_REL30:
14761 case R_PPC64_REL32:
14762 case R_PPC64_REL64:
14763 case R_PPC64_ADDR14:
14764 case R_PPC64_ADDR14_BRNTAKEN:
14765 case R_PPC64_ADDR14_BRTAKEN:
14766 case R_PPC64_ADDR16:
14767 case R_PPC64_ADDR16_DS:
14768 case R_PPC64_ADDR16_HA:
14769 case R_PPC64_ADDR16_HI:
14770 case R_PPC64_ADDR16_HIGH:
14771 case R_PPC64_ADDR16_HIGHA:
14772 case R_PPC64_ADDR16_HIGHER:
14773 case R_PPC64_ADDR16_HIGHERA:
14774 case R_PPC64_ADDR16_HIGHEST:
14775 case R_PPC64_ADDR16_HIGHESTA:
14776 case R_PPC64_ADDR16_LO:
14777 case R_PPC64_ADDR16_LO_DS:
14778 case R_PPC64_ADDR24:
14779 case R_PPC64_ADDR32:
14780 case R_PPC64_ADDR64:
14781 case R_PPC64_UADDR16:
14782 case R_PPC64_UADDR32:
14783 case R_PPC64_UADDR64:
14784 dodyn:
14785 if ((input_section->flags & SEC_ALLOC) == 0)
14786 break;
14787
14788 if (NO_OPD_RELOCS && is_opd)
14789 break;
14790
14791 if (bfd_link_pic (info)
14792 ? ((h != NULL && pc_dynrelocs (h))
14793 || must_be_dyn_reloc (info, r_type))
14794 : (h != NULL
14795 ? h->dyn_relocs != NULL
14796 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14797 {
14798 bfd_boolean skip, relocate;
14799 asection *sreloc;
14800 bfd_vma out_off;
14801
14802 /* When generating a dynamic object, these relocations
14803 are copied into the output file to be resolved at run
14804 time. */
14805
14806 skip = FALSE;
14807 relocate = FALSE;
14808
14809 out_off = _bfd_elf_section_offset (output_bfd, info,
14810 input_section, rel->r_offset);
14811 if (out_off == (bfd_vma) -1)
14812 skip = TRUE;
14813 else if (out_off == (bfd_vma) -2)
14814 skip = TRUE, relocate = TRUE;
14815 out_off += (input_section->output_section->vma
14816 + input_section->output_offset);
14817 outrel.r_offset = out_off;
14818 outrel.r_addend = rel->r_addend;
14819
14820 /* Optimize unaligned reloc use. */
14821 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14822 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14823 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14824 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14825 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14826 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14827 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14828 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14829 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14830
14831 if (skip)
14832 memset (&outrel, 0, sizeof outrel);
14833 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14834 && !is_opd
14835 && r_type != R_PPC64_TOC)
14836 {
14837 BFD_ASSERT (h->elf.dynindx != -1);
14838 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
14839 }
14840 else
14841 {
14842 /* This symbol is local, or marked to become local,
14843 or this is an opd section reloc which must point
14844 at a local function. */
14845 outrel.r_addend += relocation;
14846 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
14847 {
14848 if (is_opd && h != NULL)
14849 {
14850 /* Lie about opd entries. This case occurs
14851 when building shared libraries and we
14852 reference a function in another shared
14853 lib. The same thing happens for a weak
14854 definition in an application that's
14855 overridden by a strong definition in a
14856 shared lib. (I believe this is a generic
14857 bug in binutils handling of weak syms.)
14858 In these cases we won't use the opd
14859 entry in this lib. */
14860 unresolved_reloc = FALSE;
14861 }
14862 if (!is_opd
14863 && r_type == R_PPC64_ADDR64
14864 && (h != NULL
14865 ? h->elf.type == STT_GNU_IFUNC
14866 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14867 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14868 else
14869 {
14870 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14871
14872 /* We need to relocate .opd contents for ld.so.
14873 Prelink also wants simple and consistent rules
14874 for relocs. This make all RELATIVE relocs have
14875 *r_offset equal to r_addend. */
14876 relocate = TRUE;
14877 }
14878 }
14879 else
14880 {
14881 long indx = 0;
14882
14883 if (h != NULL
14884 ? h->elf.type == STT_GNU_IFUNC
14885 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14886 {
14887 info->callbacks->einfo
14888 /* xgettext:c-format */
14889 (_("%P: %H: %s for indirect "
14890 "function `%T' unsupported\n"),
14891 input_bfd, input_section, rel->r_offset,
14892 ppc64_elf_howto_table[r_type]->name,
14893 sym_name);
14894 ret = FALSE;
14895 }
14896 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
14897 ;
14898 else if (sec == NULL || sec->owner == NULL)
14899 {
14900 bfd_set_error (bfd_error_bad_value);
14901 return FALSE;
14902 }
14903 else
14904 {
14905 asection *osec;
14906
14907 osec = sec->output_section;
14908 indx = elf_section_data (osec)->dynindx;
14909
14910 if (indx == 0)
14911 {
14912 if ((osec->flags & SEC_READONLY) == 0
14913 && htab->elf.data_index_section != NULL)
14914 osec = htab->elf.data_index_section;
14915 else
14916 osec = htab->elf.text_index_section;
14917 indx = elf_section_data (osec)->dynindx;
14918 }
14919 BFD_ASSERT (indx != 0);
14920
14921 /* We are turning this relocation into one
14922 against a section symbol, so subtract out
14923 the output section's address but not the
14924 offset of the input section in the output
14925 section. */
14926 outrel.r_addend -= osec->vma;
14927 }
14928
14929 outrel.r_info = ELF64_R_INFO (indx, r_type);
14930 }
14931 }
14932
14933 sreloc = elf_section_data (input_section)->sreloc;
14934 if (h != NULL
14935 ? h->elf.type == STT_GNU_IFUNC
14936 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14937 sreloc = htab->elf.irelplt;
14938 if (sreloc == NULL)
14939 abort ();
14940
14941 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14942 >= sreloc->size)
14943 abort ();
14944 loc = sreloc->contents;
14945 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
14946 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14947
14948 /* If this reloc is against an external symbol, it will
14949 be computed at runtime, so there's no need to do
14950 anything now. However, for the sake of prelink ensure
14951 that the section contents are a known value. */
14952 if (! relocate)
14953 {
14954 unresolved_reloc = FALSE;
14955 /* The value chosen here is quite arbitrary as ld.so
14956 ignores section contents except for the special
14957 case of .opd where the contents might be accessed
14958 before relocation. Choose zero, as that won't
14959 cause reloc overflow. */
14960 relocation = 0;
14961 addend = 0;
14962 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14963 to improve backward compatibility with older
14964 versions of ld. */
14965 if (r_type == R_PPC64_ADDR64)
14966 addend = outrel.r_addend;
14967 /* Adjust pc_relative relocs to have zero in *r_offset. */
14968 else if (ppc64_elf_howto_table[r_type]->pc_relative)
14969 addend = outrel.r_offset;
14970 }
14971 }
14972 else if (r_type == R_PPC64_DTPMOD64
14973 && htab->params->tls_get_addr_opt
14974 && htab->tls_get_addr_fd != NULL
14975 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
14976 {
14977 /* Set up for __tls_get_addr_opt stub, when this entry
14978 does not have dynamic relocs. */
14979 relocation = 0;
14980 /* Set up the next word for local dynamic. If it turns
14981 out to be global dynamic, the reloc will overwrite
14982 this value. */
14983 if (rel->r_offset + 16 <= input_section->size)
14984 bfd_put_64 (input_bfd, DTP_OFFSET - TP_OFFSET,
14985 contents + rel->r_offset + 8);
14986 }
14987 else if (r_type == R_PPC64_DTPREL64
14988 && htab->params->tls_get_addr_opt
14989 && htab->tls_get_addr_fd != NULL
14990 && htab->tls_get_addr_fd->elf.plt.plist != NULL
14991 && rel > relocs
14992 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
14993 && rel[-1].r_offset + 8 == rel->r_offset)
14994 {
14995 /* __tls_get_addr_opt stub value. */
14996 addend += DTP_OFFSET - TP_OFFSET;
14997 }
14998 break;
14999
15000 case R_PPC64_COPY:
15001 case R_PPC64_GLOB_DAT:
15002 case R_PPC64_JMP_SLOT:
15003 case R_PPC64_JMP_IREL:
15004 case R_PPC64_RELATIVE:
15005 /* We shouldn't ever see these dynamic relocs in relocatable
15006 files. */
15007 /* Fall through. */
15008
15009 case R_PPC64_PLTGOT16:
15010 case R_PPC64_PLTGOT16_DS:
15011 case R_PPC64_PLTGOT16_HA:
15012 case R_PPC64_PLTGOT16_HI:
15013 case R_PPC64_PLTGOT16_LO:
15014 case R_PPC64_PLTGOT16_LO_DS:
15015 case R_PPC64_PLTREL32:
15016 case R_PPC64_PLTREL64:
15017 /* These ones haven't been implemented yet. */
15018
15019 info->callbacks->einfo
15020 /* xgettext:c-format */
15021 (_("%P: %B: %s is not supported for `%T'\n"),
15022 input_bfd,
15023 ppc64_elf_howto_table[r_type]->name, sym_name);
15024
15025 bfd_set_error (bfd_error_invalid_operation);
15026 ret = FALSE;
15027 goto copy_reloc;
15028 }
15029
15030 /* Multi-instruction sequences that access the TOC can be
15031 optimized, eg. addis ra,r2,0; addi rb,ra,x;
15032 to nop; addi rb,r2,x; */
15033 switch (r_type)
15034 {
15035 default:
15036 break;
15037
15038 case R_PPC64_GOT_TLSLD16_HI:
15039 case R_PPC64_GOT_TLSGD16_HI:
15040 case R_PPC64_GOT_TPREL16_HI:
15041 case R_PPC64_GOT_DTPREL16_HI:
15042 case R_PPC64_GOT16_HI:
15043 case R_PPC64_TOC16_HI:
15044 /* These relocs would only be useful if building up an
15045 offset to later add to r2, perhaps in an indexed
15046 addressing mode instruction. Don't try to optimize.
15047 Unfortunately, the possibility of someone building up an
15048 offset like this or even with the HA relocs, means that
15049 we need to check the high insn when optimizing the low
15050 insn. */
15051 break;
15052
15053 case R_PPC64_GOT_TLSLD16_HA:
15054 case R_PPC64_GOT_TLSGD16_HA:
15055 case R_PPC64_GOT_TPREL16_HA:
15056 case R_PPC64_GOT_DTPREL16_HA:
15057 case R_PPC64_GOT16_HA:
15058 case R_PPC64_TOC16_HA:
15059 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15060 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15061 {
15062 bfd_byte *p = contents + (rel->r_offset & ~3);
15063 bfd_put_32 (input_bfd, NOP, p);
15064 }
15065 break;
15066
15067 case R_PPC64_GOT_TLSLD16_LO:
15068 case R_PPC64_GOT_TLSGD16_LO:
15069 case R_PPC64_GOT_TPREL16_LO_DS:
15070 case R_PPC64_GOT_DTPREL16_LO_DS:
15071 case R_PPC64_GOT16_LO:
15072 case R_PPC64_GOT16_LO_DS:
15073 case R_PPC64_TOC16_LO:
15074 case R_PPC64_TOC16_LO_DS:
15075 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15076 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15077 {
15078 bfd_byte *p = contents + (rel->r_offset & ~3);
15079 insn = bfd_get_32 (input_bfd, p);
15080 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15081 {
15082 /* Transform addic to addi when we change reg. */
15083 insn &= ~((0x3f << 26) | (0x1f << 16));
15084 insn |= (14u << 26) | (2 << 16);
15085 }
15086 else
15087 {
15088 insn &= ~(0x1f << 16);
15089 insn |= 2 << 16;
15090 }
15091 bfd_put_32 (input_bfd, insn, p);
15092 }
15093 break;
15094 }
15095
15096 /* Do any further special processing. */
15097 howto = ppc64_elf_howto_table[(int) r_type];
15098 switch (r_type)
15099 {
15100 default:
15101 break;
15102
15103 case R_PPC64_REL16_HA:
15104 case R_PPC64_REL16DX_HA:
15105 case R_PPC64_ADDR16_HA:
15106 case R_PPC64_ADDR16_HIGHA:
15107 case R_PPC64_ADDR16_HIGHERA:
15108 case R_PPC64_ADDR16_HIGHESTA:
15109 case R_PPC64_TOC16_HA:
15110 case R_PPC64_SECTOFF_HA:
15111 case R_PPC64_TPREL16_HA:
15112 case R_PPC64_TPREL16_HIGHA:
15113 case R_PPC64_TPREL16_HIGHERA:
15114 case R_PPC64_TPREL16_HIGHESTA:
15115 case R_PPC64_DTPREL16_HA:
15116 case R_PPC64_DTPREL16_HIGHA:
15117 case R_PPC64_DTPREL16_HIGHERA:
15118 case R_PPC64_DTPREL16_HIGHESTA:
15119 /* It's just possible that this symbol is a weak symbol
15120 that's not actually defined anywhere. In that case,
15121 'sec' would be NULL, and we should leave the symbol
15122 alone (it will be set to zero elsewhere in the link). */
15123 if (sec == NULL)
15124 break;
15125 /* Fall through. */
15126
15127 case R_PPC64_GOT16_HA:
15128 case R_PPC64_PLTGOT16_HA:
15129 case R_PPC64_PLT16_HA:
15130 case R_PPC64_GOT_TLSGD16_HA:
15131 case R_PPC64_GOT_TLSLD16_HA:
15132 case R_PPC64_GOT_TPREL16_HA:
15133 case R_PPC64_GOT_DTPREL16_HA:
15134 /* Add 0x10000 if sign bit in 0:15 is set.
15135 Bits 0:15 are not used. */
15136 addend += 0x8000;
15137 break;
15138
15139 case R_PPC64_ADDR16_DS:
15140 case R_PPC64_ADDR16_LO_DS:
15141 case R_PPC64_GOT16_DS:
15142 case R_PPC64_GOT16_LO_DS:
15143 case R_PPC64_PLT16_LO_DS:
15144 case R_PPC64_SECTOFF_DS:
15145 case R_PPC64_SECTOFF_LO_DS:
15146 case R_PPC64_TOC16_DS:
15147 case R_PPC64_TOC16_LO_DS:
15148 case R_PPC64_PLTGOT16_DS:
15149 case R_PPC64_PLTGOT16_LO_DS:
15150 case R_PPC64_GOT_TPREL16_DS:
15151 case R_PPC64_GOT_TPREL16_LO_DS:
15152 case R_PPC64_GOT_DTPREL16_DS:
15153 case R_PPC64_GOT_DTPREL16_LO_DS:
15154 case R_PPC64_TPREL16_DS:
15155 case R_PPC64_TPREL16_LO_DS:
15156 case R_PPC64_DTPREL16_DS:
15157 case R_PPC64_DTPREL16_LO_DS:
15158 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15159 mask = 3;
15160 /* If this reloc is against an lq, lxv, or stxv insn, then
15161 the value must be a multiple of 16. This is somewhat of
15162 a hack, but the "correct" way to do this by defining _DQ
15163 forms of all the _DS relocs bloats all reloc switches in
15164 this file. It doesn't make much sense to use these
15165 relocs in data, so testing the insn should be safe. */
15166 if ((insn & (0x3f << 26)) == (56u << 26)
15167 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
15168 mask = 15;
15169 relocation += addend;
15170 addend = insn & (mask ^ 3);
15171 if ((relocation & mask) != 0)
15172 {
15173 relocation ^= relocation & mask;
15174 info->callbacks->einfo
15175 /* xgettext:c-format */
15176 (_("%P: %H: error: %s not a multiple of %u\n"),
15177 input_bfd, input_section, rel->r_offset,
15178 howto->name,
15179 mask + 1);
15180 bfd_set_error (bfd_error_bad_value);
15181 ret = FALSE;
15182 goto copy_reloc;
15183 }
15184 break;
15185 }
15186
15187 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15188 because such sections are not SEC_ALLOC and thus ld.so will
15189 not process them. */
15190 if (unresolved_reloc
15191 && !((input_section->flags & SEC_DEBUGGING) != 0
15192 && h->elf.def_dynamic)
15193 && _bfd_elf_section_offset (output_bfd, info, input_section,
15194 rel->r_offset) != (bfd_vma) -1)
15195 {
15196 info->callbacks->einfo
15197 /* xgettext:c-format */
15198 (_("%P: %H: unresolvable %s against `%T'\n"),
15199 input_bfd, input_section, rel->r_offset,
15200 howto->name,
15201 h->elf.root.root.string);
15202 ret = FALSE;
15203 }
15204
15205 /* 16-bit fields in insns mostly have signed values, but a
15206 few insns have 16-bit unsigned values. Really, we should
15207 have different reloc types. */
15208 if (howto->complain_on_overflow != complain_overflow_dont
15209 && howto->dst_mask == 0xffff
15210 && (input_section->flags & SEC_CODE) != 0)
15211 {
15212 enum complain_overflow complain = complain_overflow_signed;
15213
15214 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15215 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15216 complain = complain_overflow_bitfield;
15217 else if (howto->rightshift == 0
15218 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15219 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15220 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15221 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15222 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15223 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
15224 complain = complain_overflow_unsigned;
15225 if (howto->complain_on_overflow != complain)
15226 {
15227 alt_howto = *howto;
15228 alt_howto.complain_on_overflow = complain;
15229 howto = &alt_howto;
15230 }
15231 }
15232
15233 if (r_type == R_PPC64_REL16DX_HA)
15234 {
15235 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15236 if (rel->r_offset + 4 > input_section->size)
15237 r = bfd_reloc_outofrange;
15238 else
15239 {
15240 relocation += addend;
15241 relocation -= (rel->r_offset
15242 + input_section->output_offset
15243 + input_section->output_section->vma);
15244 relocation = (bfd_signed_vma) relocation >> 16;
15245 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15246 insn &= ~0x1fffc1;
15247 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15248 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15249 r = bfd_reloc_ok;
15250 if (relocation + 0x8000 > 0xffff)
15251 r = bfd_reloc_overflow;
15252 }
15253 }
15254 else
15255 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15256 rel->r_offset, relocation, addend);
15257
15258 if (r != bfd_reloc_ok)
15259 {
15260 char *more_info = NULL;
15261 const char *reloc_name = howto->name;
15262
15263 if (reloc_dest != DEST_NORMAL)
15264 {
15265 more_info = bfd_malloc (strlen (reloc_name) + 8);
15266 if (more_info != NULL)
15267 {
15268 strcpy (more_info, reloc_name);
15269 strcat (more_info, (reloc_dest == DEST_OPD
15270 ? " (OPD)" : " (stub)"));
15271 reloc_name = more_info;
15272 }
15273 }
15274
15275 if (r == bfd_reloc_overflow)
15276 {
15277 /* On code like "if (foo) foo();" don't report overflow
15278 on a branch to zero when foo is undefined. */
15279 if (!warned
15280 && (reloc_dest == DEST_STUB
15281 || !(h != NULL
15282 && (h->elf.root.type == bfd_link_hash_undefweak
15283 || h->elf.root.type == bfd_link_hash_undefined)
15284 && is_branch_reloc (r_type))))
15285 info->callbacks->reloc_overflow (info, &h->elf.root,
15286 sym_name, reloc_name,
15287 orig_rel.r_addend,
15288 input_bfd, input_section,
15289 rel->r_offset);
15290 }
15291 else
15292 {
15293 info->callbacks->einfo
15294 /* xgettext:c-format */
15295 (_("%P: %H: %s against `%T': error %d\n"),
15296 input_bfd, input_section, rel->r_offset,
15297 reloc_name, sym_name, (int) r);
15298 ret = FALSE;
15299 }
15300 if (more_info != NULL)
15301 free (more_info);
15302 }
15303 copy_reloc:
15304 if (wrel != rel)
15305 *wrel = *rel;
15306 }
15307
15308 if (wrel != rel)
15309 {
15310 Elf_Internal_Shdr *rel_hdr;
15311 size_t deleted = rel - wrel;
15312
15313 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15314 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15315 if (rel_hdr->sh_size == 0)
15316 {
15317 /* It is too late to remove an empty reloc section. Leave
15318 one NONE reloc.
15319 ??? What is wrong with an empty section??? */
15320 rel_hdr->sh_size = rel_hdr->sh_entsize;
15321 deleted -= 1;
15322 }
15323 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15324 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15325 input_section->reloc_count -= deleted;
15326 }
15327
15328 /* If we're emitting relocations, then shortly after this function
15329 returns, reloc offsets and addends for this section will be
15330 adjusted. Worse, reloc symbol indices will be for the output
15331 file rather than the input. Save a copy of the relocs for
15332 opd_entry_value. */
15333 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
15334 {
15335 bfd_size_type amt;
15336 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15337 rel = bfd_alloc (input_bfd, amt);
15338 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15339 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
15340 if (rel == NULL)
15341 return FALSE;
15342 memcpy (rel, relocs, amt);
15343 }
15344 return ret;
15345}
15346
15347/* Adjust the value of any local symbols in opd sections. */
15348
15349static int
15350ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15351 const char *name ATTRIBUTE_UNUSED,
15352 Elf_Internal_Sym *elfsym,
15353 asection *input_sec,
15354 struct elf_link_hash_entry *h)
15355{
15356 struct _opd_sec_data *opd;
15357 long adjust;
15358 bfd_vma value;
15359
15360 if (h != NULL)
15361 return 1;
15362
15363 opd = get_opd_info (input_sec);
15364 if (opd == NULL || opd->adjust == NULL)
15365 return 1;
15366
15367 value = elfsym->st_value - input_sec->output_offset;
15368 if (!bfd_link_relocatable (info))
15369 value -= input_sec->output_section->vma;
15370
15371 adjust = opd->adjust[OPD_NDX (value)];
15372 if (adjust == -1)
15373 return 2;
15374
15375 elfsym->st_value += adjust;
15376 return 1;
15377}
15378
15379/* Finish up dynamic symbol handling. We set the contents of various
15380 dynamic sections here. */
15381
15382static bfd_boolean
15383ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15384 struct bfd_link_info *info,
15385 struct elf_link_hash_entry *h,
15386 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
15387{
15388 struct ppc_link_hash_table *htab;
15389 struct plt_entry *ent;
15390 Elf_Internal_Rela rela;
15391 bfd_byte *loc;
15392
15393 htab = ppc_hash_table (info);
15394 if (htab == NULL)
15395 return FALSE;
15396
15397 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15398 if (ent->plt.offset != (bfd_vma) -1)
15399 {
15400 /* This symbol has an entry in the procedure linkage
15401 table. Set it up. */
15402 if (!htab->elf.dynamic_sections_created
15403 || h->dynindx == -1)
15404 {
15405 BFD_ASSERT (h->type == STT_GNU_IFUNC
15406 && h->def_regular
15407 && (h->root.type == bfd_link_hash_defined
15408 || h->root.type == bfd_link_hash_defweak));
15409 rela.r_offset = (htab->elf.iplt->output_section->vma
15410 + htab->elf.iplt->output_offset
15411 + ent->plt.offset);
15412 if (htab->opd_abi)
15413 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15414 else
15415 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15416 rela.r_addend = (h->root.u.def.value
15417 + h->root.u.def.section->output_offset
15418 + h->root.u.def.section->output_section->vma
15419 + ent->addend);
15420 loc = (htab->elf.irelplt->contents
15421 + (htab->elf.irelplt->reloc_count++
15422 * sizeof (Elf64_External_Rela)));
15423 }
15424 else
15425 {
15426 rela.r_offset = (htab->elf.splt->output_section->vma
15427 + htab->elf.splt->output_offset
15428 + ent->plt.offset);
15429 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15430 rela.r_addend = ent->addend;
15431 loc = (htab->elf.srelplt->contents
15432 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15433 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
15434 }
15435 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15436
15437 if (!htab->opd_abi)
15438 {
15439 if (!h->def_regular)
15440 {
15441 /* Mark the symbol as undefined, rather than as
15442 defined in glink. Leave the value if there were
15443 any relocations where pointer equality matters
15444 (this is a clue for the dynamic linker, to make
15445 function pointer comparisons work between an
15446 application and shared library), otherwise set it
15447 to zero. */
15448 sym->st_shndx = SHN_UNDEF;
15449 if (!h->pointer_equality_needed)
15450 sym->st_value = 0;
15451 else if (!h->ref_regular_nonweak)
15452 {
15453 /* This breaks function pointer comparisons, but
15454 that is better than breaking tests for a NULL
15455 function pointer. */
15456 sym->st_value = 0;
15457 }
15458 }
15459 }
15460 }
15461
15462 if (h->needs_copy)
15463 {
15464 /* This symbol needs a copy reloc. Set it up. */
15465 asection *srel;
15466
15467 if (h->dynindx == -1
15468 || (h->root.type != bfd_link_hash_defined
15469 && h->root.type != bfd_link_hash_defweak)
15470 || htab->elf.srelbss == NULL
15471 || htab->elf.sreldynrelro == NULL)
15472 abort ();
15473
15474 rela.r_offset = (h->root.u.def.value
15475 + h->root.u.def.section->output_section->vma
15476 + h->root.u.def.section->output_offset);
15477 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15478 rela.r_addend = 0;
15479 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
15480 srel = htab->elf.sreldynrelro;
15481 else
15482 srel = htab->elf.srelbss;
15483 loc = srel->contents;
15484 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
15485 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15486 }
15487
15488 return TRUE;
15489}
15490
15491/* Used to decide how to sort relocs in an optimal manner for the
15492 dynamic linker, before writing them out. */
15493
15494static enum elf_reloc_type_class
15495ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15496 const asection *rel_sec,
15497 const Elf_Internal_Rela *rela)
15498{
15499 enum elf_ppc64_reloc_type r_type;
15500 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15501
15502 if (rel_sec == htab->elf.irelplt)
15503 return reloc_class_ifunc;
15504
15505 r_type = ELF64_R_TYPE (rela->r_info);
15506 switch (r_type)
15507 {
15508 case R_PPC64_RELATIVE:
15509 return reloc_class_relative;
15510 case R_PPC64_JMP_SLOT:
15511 return reloc_class_plt;
15512 case R_PPC64_COPY:
15513 return reloc_class_copy;
15514 default:
15515 return reloc_class_normal;
15516 }
15517}
15518
15519/* Finish up the dynamic sections. */
15520
15521static bfd_boolean
15522ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15523 struct bfd_link_info *info)
15524{
15525 struct ppc_link_hash_table *htab;
15526 bfd *dynobj;
15527 asection *sdyn;
15528
15529 htab = ppc_hash_table (info);
15530 if (htab == NULL)
15531 return FALSE;
15532
15533 dynobj = htab->elf.dynobj;
15534 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
15535
15536 if (htab->elf.dynamic_sections_created)
15537 {
15538 Elf64_External_Dyn *dyncon, *dynconend;
15539
15540 if (sdyn == NULL || htab->elf.sgot == NULL)
15541 abort ();
15542
15543 dyncon = (Elf64_External_Dyn *) sdyn->contents;
15544 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
15545 for (; dyncon < dynconend; dyncon++)
15546 {
15547 Elf_Internal_Dyn dyn;
15548 asection *s;
15549
15550 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15551
15552 switch (dyn.d_tag)
15553 {
15554 default:
15555 continue;
15556
15557 case DT_PPC64_GLINK:
15558 s = htab->glink;
15559 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15560 /* We stupidly defined DT_PPC64_GLINK to be the start
15561 of glink rather than the first entry point, which is
15562 what ld.so needs, and now have a bigger stub to
15563 support automatic multiple TOCs. */
15564 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
15565 break;
15566
15567 case DT_PPC64_OPD:
15568 s = bfd_get_section_by_name (output_bfd, ".opd");
15569 if (s == NULL)
15570 continue;
15571 dyn.d_un.d_ptr = s->vma;
15572 break;
15573
15574 case DT_PPC64_OPT:
15575 if (htab->do_multi_toc && htab->multi_toc_needed)
15576 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15577 break;
15578
15579 case DT_PPC64_OPDSZ:
15580 s = bfd_get_section_by_name (output_bfd, ".opd");
15581 if (s == NULL)
15582 continue;
15583 dyn.d_un.d_val = s->size;
15584 break;
15585
15586 case DT_PLTGOT:
15587 s = htab->elf.splt;
15588 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15589 break;
15590
15591 case DT_JMPREL:
15592 s = htab->elf.srelplt;
15593 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15594 break;
15595
15596 case DT_PLTRELSZ:
15597 dyn.d_un.d_val = htab->elf.srelplt->size;
15598 break;
15599 }
15600
15601 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
15602 }
15603 }
15604
15605 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0)
15606 {
15607 /* Fill in the first entry in the global offset table.
15608 We use it to hold the link-time TOCbase. */
15609 bfd_put_64 (output_bfd,
15610 elf_gp (output_bfd) + TOC_BASE_OFF,
15611 htab->elf.sgot->contents);
15612
15613 /* Set .got entry size. */
15614 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
15615 }
15616
15617 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
15618 {
15619 /* Set .plt entry size. */
15620 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
15621 = PLT_ENTRY_SIZE (htab);
15622 }
15623
15624 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15625 brlt ourselves if emitrelocations. */
15626 if (htab->brlt != NULL
15627 && htab->brlt->reloc_count != 0
15628 && !_bfd_elf_link_output_relocs (output_bfd,
15629 htab->brlt,
15630 elf_section_data (htab->brlt)->rela.hdr,
15631 elf_section_data (htab->brlt)->relocs,
15632 NULL))
15633 return FALSE;
15634
15635 if (htab->glink != NULL
15636 && htab->glink->reloc_count != 0
15637 && !_bfd_elf_link_output_relocs (output_bfd,
15638 htab->glink,
15639 elf_section_data (htab->glink)->rela.hdr,
15640 elf_section_data (htab->glink)->relocs,
15641 NULL))
15642 return FALSE;
15643
15644 if (htab->glink_eh_frame != NULL
15645 && htab->glink_eh_frame->size != 0)
15646 {
15647 bfd_vma val;
15648 bfd_byte *p;
15649 asection *stub_sec;
15650
15651 p = htab->glink_eh_frame->contents + sizeof (glink_eh_frame_cie);
15652 for (stub_sec = htab->params->stub_bfd->sections;
15653 stub_sec != NULL;
15654 stub_sec = stub_sec->next)
15655 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15656 {
15657 /* FDE length. */
15658 p += 4;
15659 /* CIE pointer. */
15660 p += 4;
15661 /* Offset to stub section. */
15662 val = (stub_sec->output_section->vma
15663 + stub_sec->output_offset);
15664 val -= (htab->glink_eh_frame->output_section->vma
15665 + htab->glink_eh_frame->output_offset
15666 + (p - htab->glink_eh_frame->contents));
15667 if (val + 0x80000000 > 0xffffffff)
15668 {
15669 info->callbacks->einfo
15670 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15671 stub_sec->name);
15672 return FALSE;
15673 }
15674 bfd_put_32 (dynobj, val, p);
15675 p += 4;
15676 /* stub section size. */
15677 p += 4;
15678 /* Augmentation. */
15679 p += 1;
15680 /* Pad. */
15681 p += 7;
15682 }
15683 if (htab->glink != NULL && htab->glink->size != 0)
15684 {
15685 /* FDE length. */
15686 p += 4;
15687 /* CIE pointer. */
15688 p += 4;
15689 /* Offset to .glink. */
15690 val = (htab->glink->output_section->vma
15691 + htab->glink->output_offset
15692 + 8);
15693 val -= (htab->glink_eh_frame->output_section->vma
15694 + htab->glink_eh_frame->output_offset
15695 + (p - htab->glink_eh_frame->contents));
15696 if (val + 0x80000000 > 0xffffffff)
15697 {
15698 info->callbacks->einfo
15699 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15700 htab->glink->name);
15701 return FALSE;
15702 }
15703 bfd_put_32 (dynobj, val, p);
15704 p += 4;
15705 /* .glink size. */
15706 p += 4;
15707 /* Augmentation. */
15708 p += 1;
15709 /* Ops. */
15710 p += 7;
15711 }
15712
15713 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15714 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15715 htab->glink_eh_frame,
15716 htab->glink_eh_frame->contents))
15717 return FALSE;
15718 }
15719
15720 /* We need to handle writing out multiple GOT sections ourselves,
15721 since we didn't add them to DYNOBJ. We know dynobj is the first
15722 bfd. */
15723 while ((dynobj = dynobj->link.next) != NULL)
15724 {
15725 asection *s;
15726
15727 if (!is_ppc64_elf (dynobj))
15728 continue;
15729
15730 s = ppc64_elf_tdata (dynobj)->got;
15731 if (s != NULL
15732 && s->size != 0
15733 && s->output_section != bfd_abs_section_ptr
15734 && !bfd_set_section_contents (output_bfd, s->output_section,
15735 s->contents, s->output_offset,
15736 s->size))
15737 return FALSE;
15738 s = ppc64_elf_tdata (dynobj)->relgot;
15739 if (s != NULL
15740 && s->size != 0
15741 && s->output_section != bfd_abs_section_ptr
15742 && !bfd_set_section_contents (output_bfd, s->output_section,
15743 s->contents, s->output_offset,
15744 s->size))
15745 return FALSE;
15746 }
15747
15748 return TRUE;
15749}
15750
15751#include "elf64-target.h"
15752
15753/* FreeBSD support */
15754
15755#undef TARGET_LITTLE_SYM
15756#undef TARGET_LITTLE_NAME
15757
15758#undef TARGET_BIG_SYM
15759#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
15760#undef TARGET_BIG_NAME
15761#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15762
15763#undef ELF_OSABI
15764#define ELF_OSABI ELFOSABI_FREEBSD
15765
15766#undef elf64_bed
15767#define elf64_bed elf64_powerpc_fbsd_bed
15768
15769#include "elf64-target.h"
15770
This page took 0.079383 seconds and 4 git commands to generate.