]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf64-ppc.c
PowerPC64: Downgrade ifunc with textrel error to a warning
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39 #define OCTETS_PER_BYTE(ABFD, SEC) 1
40
41 static bfd_reloc_status_type ppc64_elf_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
47 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
49 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc64_elf_toc_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
55 static bfd_reloc_status_type ppc64_elf_toc64_reloc
56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
57 static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
59 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
61 static bfd_vma opd_entry_value
62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
63
64 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
65 #define TARGET_LITTLE_NAME "elf64-powerpcle"
66 #define TARGET_BIG_SYM powerpc_elf64_vec
67 #define TARGET_BIG_NAME "elf64-powerpc"
68 #define ELF_ARCH bfd_arch_powerpc
69 #define ELF_TARGET_ID PPC64_ELF_DATA
70 #define ELF_MACHINE_CODE EM_PPC64
71 #define ELF_MAXPAGESIZE 0x10000
72 #define ELF_COMMONPAGESIZE 0x1000
73 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
74 #define elf_info_to_howto ppc64_elf_info_to_howto
75
76 #define elf_backend_want_got_sym 0
77 #define elf_backend_want_plt_sym 0
78 #define elf_backend_plt_alignment 3
79 #define elf_backend_plt_not_loaded 1
80 #define elf_backend_got_header_size 8
81 #define elf_backend_want_dynrelro 1
82 #define elf_backend_can_gc_sections 1
83 #define elf_backend_can_refcount 1
84 #define elf_backend_rela_normal 1
85 #define elf_backend_dtrel_excludes_plt 1
86 #define elf_backend_default_execstack 0
87
88 #define bfd_elf64_mkobject ppc64_elf_mkobject
89 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
90 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
91 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
93 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
95 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
96 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
97 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
98
99 #define elf_backend_object_p ppc64_elf_object_p
100 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
102 #define elf_backend_write_core_note ppc64_elf_write_core_note
103 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
104 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
105 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
106 #define elf_backend_check_directives ppc64_elf_before_check_relocs
107 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
108 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
109 #define elf_backend_check_relocs ppc64_elf_check_relocs
110 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
111 #define elf_backend_gc_keep ppc64_elf_gc_keep
112 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
113 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
114 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
116 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
117 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
119 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
120 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
121 #define elf_backend_action_discarded ppc64_elf_action_discarded
122 #define elf_backend_relocate_section ppc64_elf_relocate_section
123 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
126 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
127 #define elf_backend_special_sections ppc64_elf_special_sections
128 #define elf_backend_section_flags ppc64_elf_section_flags
129 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
130 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
131 #define elf_backend_get_reloc_section bfd_get_section_by_name
132
133 /* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137 /* The size in bytes of an entry in the procedure linkage table. */
138 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
139 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
140
141 /* The initial size of the plt reserved for the dynamic linker. */
142 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
143
144 /* Offsets to some stack save slots. */
145 #define STK_LR 16
146 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
147 /* This one is dodgy. ELFv2 does not have a linker word, so use the
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
152 /* TOC base pointers offset from start of TOC. */
153 #define TOC_BASE_OFF 0x8000
154 /* TOC base alignment. */
155 #define TOC_BASE_ALIGN 256
156
157 /* Offset of tp and dtp pointers from start of TLS block. */
158 #define TP_OFFSET 0x7000
159 #define DTP_OFFSET 0x8000
160
161 /* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
163 insert an addi to adjust r11. */
164 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
165 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
170 #define BCTR 0x4e800420 /* bctr */
171
172 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
173 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
175 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183 #define BNECTR 0x4ca20420 /* bnectr+ */
184 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
185
186 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
187 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
188 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
189
190 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
193
194 #define LI_R11_0 0x39600000 /* li %r11,0 */
195 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
196 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
197 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
198 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
200 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
201 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
202 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
203 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
204 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
205 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
206 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
207 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
210 #define PADDI_R12_PC 0x0610000039800000ULL
211 #define PLD_R12_PC 0x04100000e5800000ULL
212 #define PNOP 0x0700000000000000ULL
213
214 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215 #define GLINK_PLTRESOLVE_SIZE(htab) \
216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
221 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
224 /* ld %2,(0b-1b)(%11) */
225 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
226 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
231 /* bctr */
232 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
237
238 /* Pad with this. */
239 #define NOP 0x60000000
240
241 /* Some other nops. */
242 #define CROR_151515 0x4def7b82
243 #define CROR_313131 0x4ffffb82
244
245 /* .glink entries for the first 32k functions are two instructions. */
246 #define LI_R0_0 0x38000000 /* li %r0,0 */
247 #define B_DOT 0x48000000 /* b . */
248
249 /* After that, we need two instructions to load the index, followed by
250 a branch. */
251 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
252 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
253
254 /* Instructions used by the save and restore reg functions. */
255 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
259 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
261 #define LI_R12_0 0x39800000 /* li %r12,0 */
262 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
265 #define BLR 0x4e800020 /* blr */
266
267 /* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
270 relocate .opd without reloc entries. */
271 #ifndef NO_OPD_RELOCS
272 #define NO_OPD_RELOCS 0
273 #endif
274
275 #ifndef ARRAY_SIZE
276 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277 #endif
278
279 static inline int
280 abiversion (bfd *abfd)
281 {
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283 }
284
285 static inline void
286 set_abiversion (bfd *abfd, int ver)
287 {
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290 }
291 \f
292 /* Relocation HOWTO's. */
293 /* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
306 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
307
308 static reloc_howto_type ppc64_elf_howto_raw[] =
309 {
310 /* This reloc does nothing. */
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
313
314 /* A standard 32 bit relocation. */
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
322
323 /* A standard 16 bit relocation. */
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
326
327 /* A 16 bit relocation without overflow. */
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
330
331 /* Bits 16-31 of an address. */
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
360
361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
364
365 /* A relative 16 bit branch; the lower two bits must be zero. */
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
432
433 /* 32-bit PC relative. */
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
436
437 /* 32-bit relocation to the symbol's procedure linkage table. */
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
460
461 /* 16-bit section relative relocation. */
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
464
465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
468
469 /* 16-bit upper half section relative relocation. */
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
472
473 /* 16-bit upper half adjusted section relative relocation. */
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
476
477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
486
487 /* The bits 32-47 of an address. */
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
495
496 /* The bits 48-63 of an address. */
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
504
505 /* Like ADDR64, but may be unaligned. */
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
508
509 /* 64-bit relative relocation. */
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
512
513 /* 64-bit relocation to the symbol's procedure linkage table. */
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
522
523 /* 16 bit TOC-relative relocation. */
524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
527
528 /* 16 bit TOC-relative relocation without overflow. */
529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
624
625 /* Marker relocs for TLS. */
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
634
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 /* Marker relocs on inline plt call instructions. */
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
646
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
657
658 /* A 16 bit dtprel reloc. */
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
661
662 /* Like DTPREL16, but no overflow. */
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
689
690 /* Like DTPREL16, but for insns with a DS field. */
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
693
694 /* Like DTPREL16_DS, but no overflow. */
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
702
703 /* A 16 bit tprel reloc. */
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
706
707 /* Like TPREL16, but no overflow. */
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
734
735 /* Like TPREL16, but for insns with a DS field. */
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
738
739 /* Like TPREL16_DS, but no overflow. */
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
748
749 /* Like GOT_TLSGD16, but no overflow. */
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
752
753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
756
757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
760
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
766
767 /* Like GOT_TLSLD16, but no overflow. */
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
770
771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
774
775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
778
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
783
784 /* Like GOT_DTPREL16_DS, but no overflow. */
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
787
788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
791
792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
800
801 /* Like GOT_TPREL16_DS, but no overflow. */
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
804
805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
818
819 /* A 16 bit relative relocation. */
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
822
823 /* A 16 bit relative relocation without overflow. */
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
826
827 /* The high order 16 bits of a relative address. */
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
835
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
857
858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
861
862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
885
886 /* Marker reloc on ELFv2 large-model function entry. */
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
889
890 /* Like ADDR64, but use local entry point of function. */
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
893
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
933 HOW (R_PPC64_GOT_TLSGD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
934 ppc64_elf_unhandled_reloc),
935
936 HOW (R_PPC64_GOT_TLSLD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
937 ppc64_elf_unhandled_reloc),
938
939 HOW (R_PPC64_GOT_TPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
940 ppc64_elf_unhandled_reloc),
941
942 HOW (R_PPC64_GOT_DTPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
943 ppc64_elf_unhandled_reloc),
944
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
975 /* GNU extension to record C++ vtable hierarchy. */
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
978
979 /* GNU extension to record C++ vtable member usage. */
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
982 };
983
984 \f
985 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988 static void
989 ppc_howto_init (void)
990 {
991 unsigned int i, type;
992
993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
994 {
995 type = ppc64_elf_howto_raw[i].type;
996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999 }
1000
1001 static reloc_howto_type *
1002 ppc64_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
1003 {
1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
1010 switch (code)
1011 {
1012 default:
1013 /* xgettext:c-format */
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
1016 bfd_set_error (bfd_error_bad_value);
1017 return NULL;
1018
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1034 break;
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1038 break;
1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1040 break;
1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1042 break;
1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1044 break;
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1048 break;
1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1050 break;
1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1052 break;
1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1054 break;
1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1056 break;
1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1058 break;
1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1060 break;
1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1062 break;
1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1064 break;
1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1066 break;
1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1068 break;
1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1070 break;
1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1072 break;
1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1074 break;
1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1076 break;
1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1078 break;
1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1080 break;
1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1082 break;
1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1084 break;
1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1086 break;
1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1088 break;
1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1090 break;
1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1092 break;
1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1094 break;
1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1096 break;
1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1098 break;
1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1100 break;
1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1102 break;
1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1104 break;
1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1106 break;
1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1108 break;
1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1110 break;
1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1112 break;
1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1114 break;
1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1116 break;
1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1118 break;
1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1120 break;
1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1122 break;
1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1124 break;
1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1126 break;
1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1128 break;
1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1130 break;
1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1132 break;
1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1134 break;
1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1136 break;
1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1138 break;
1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1140 break;
1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1142 break;
1143 case BFD_RELOC_PPC64_TLS_PCREL:
1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1145 break;
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1151 break;
1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1153 break;
1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1155 break;
1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1157 break;
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1161 break;
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1165 break;
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
1282 case BFD_RELOC_PPC64_GOT_TLSGD_PCREL34: r = R_PPC64_GOT_TLSGD_PCREL34;
1283 break;
1284 case BFD_RELOC_PPC64_GOT_TLSLD_PCREL34: r = R_PPC64_GOT_TLSLD_PCREL34;
1285 break;
1286 case BFD_RELOC_PPC64_GOT_TPREL_PCREL34: r = R_PPC64_GOT_TPREL_PCREL34;
1287 break;
1288 case BFD_RELOC_PPC64_GOT_DTPREL_PCREL34: r = R_PPC64_GOT_DTPREL_PCREL34;
1289 break;
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1313 break;
1314 }
1315
1316 return ppc64_elf_howto_table[r];
1317 };
1318
1319 static reloc_howto_type *
1320 ppc64_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
1321 {
1322 unsigned int i;
1323 static char *compat_map[][2] = {
1324 { "R_PPC64_GOT_TLSGD34", "R_PPC64_GOT_TLSGD_PCREL34" },
1325 { "R_PPC64_GOT_TLSLD34", "R_PPC64_GOT_TLSLD_PCREL34" },
1326 { "R_PPC64_GOT_TPREL34", "R_PPC64_GOT_TPREL_PCREL34" },
1327 { "R_PPC64_GOT_DTPREL34", "R_PPC64_GOT_DTPREL_PCREL34" }
1328 };
1329
1330 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1331 if (ppc64_elf_howto_raw[i].name != NULL
1332 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1333 return &ppc64_elf_howto_raw[i];
1334
1335 /* Handle old names of relocations in case they were used by
1336 .reloc directives.
1337 FIXME: Remove this soon. Mapping the reloc names is very likely
1338 completely unnecessary. */
1339 for (i = 0; i < ARRAY_SIZE (compat_map); i++)
1340 if (strcasecmp (compat_map[i][0], r_name) == 0)
1341 {
1342 _bfd_error_handler (_("warning: %s should be used rather than %s"),
1343 compat_map[i][1], compat_map[i][0]);
1344 return ppc64_elf_reloc_name_lookup (abfd, compat_map[i][1]);
1345 }
1346
1347 return NULL;
1348 }
1349
1350 /* Set the howto pointer for a PowerPC ELF reloc. */
1351
1352 static bfd_boolean
1353 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1354 Elf_Internal_Rela *dst)
1355 {
1356 unsigned int type;
1357
1358 /* Initialize howto table if needed. */
1359 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1360 ppc_howto_init ();
1361
1362 type = ELF64_R_TYPE (dst->r_info);
1363 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1364 {
1365 /* xgettext:c-format */
1366 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1367 abfd, type);
1368 bfd_set_error (bfd_error_bad_value);
1369 return FALSE;
1370 }
1371 cache_ptr->howto = ppc64_elf_howto_table[type];
1372 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1373 {
1374 /* xgettext:c-format */
1375 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1376 abfd, type);
1377 bfd_set_error (bfd_error_bad_value);
1378 return FALSE;
1379 }
1380
1381 return TRUE;
1382 }
1383
1384 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1385
1386 static bfd_reloc_status_type
1387 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1388 void *data, asection *input_section,
1389 bfd *output_bfd, char **error_message)
1390 {
1391 enum elf_ppc64_reloc_type r_type;
1392 long insn;
1393 bfd_size_type octets;
1394 bfd_vma value;
1395
1396 /* If this is a relocatable link (output_bfd test tells us), just
1397 call the generic function. Any adjustment will be done at final
1398 link time. */
1399 if (output_bfd != NULL)
1400 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1401 input_section, output_bfd, error_message);
1402
1403 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1404 We won't actually be using the low bits, so trashing them
1405 doesn't matter. */
1406 r_type = reloc_entry->howto->type;
1407 if (r_type == R_PPC64_ADDR16_HIGHERA34
1408 || r_type == R_PPC64_ADDR16_HIGHESTA34
1409 || r_type == R_PPC64_REL16_HIGHERA34
1410 || r_type == R_PPC64_REL16_HIGHESTA34)
1411 reloc_entry->addend += 1ULL << 33;
1412 else
1413 reloc_entry->addend += 1U << 15;
1414 if (r_type != R_PPC64_REL16DX_HA)
1415 return bfd_reloc_continue;
1416
1417 value = 0;
1418 if (!bfd_is_com_section (symbol->section))
1419 value = symbol->value;
1420 value += (reloc_entry->addend
1421 + symbol->section->output_offset
1422 + symbol->section->output_section->vma);
1423 value -= (reloc_entry->address
1424 + input_section->output_offset
1425 + input_section->output_section->vma);
1426 value = (bfd_signed_vma) value >> 16;
1427
1428 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1429 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1430 insn &= ~0x1fffc1;
1431 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1432 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1433 if (value + 0x8000 > 0xffff)
1434 return bfd_reloc_overflow;
1435 return bfd_reloc_ok;
1436 }
1437
1438 static bfd_reloc_status_type
1439 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1440 void *data, asection *input_section,
1441 bfd *output_bfd, char **error_message)
1442 {
1443 if (output_bfd != NULL)
1444 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1445 input_section, output_bfd, error_message);
1446
1447 if (strcmp (symbol->section->name, ".opd") == 0
1448 && (symbol->section->owner->flags & DYNAMIC) == 0)
1449 {
1450 bfd_vma dest = opd_entry_value (symbol->section,
1451 symbol->value + reloc_entry->addend,
1452 NULL, NULL, FALSE);
1453 if (dest != (bfd_vma) -1)
1454 reloc_entry->addend = dest - (symbol->value
1455 + symbol->section->output_section->vma
1456 + symbol->section->output_offset);
1457 }
1458 else
1459 {
1460 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1461
1462 if (symbol->section->owner != abfd
1463 && symbol->section->owner != NULL
1464 && abiversion (symbol->section->owner) >= 2)
1465 {
1466 unsigned int i;
1467
1468 for (i = 0; i < symbol->section->owner->symcount; ++i)
1469 {
1470 asymbol *symdef = symbol->section->owner->outsymbols[i];
1471
1472 if (strcmp (symdef->name, symbol->name) == 0)
1473 {
1474 elfsym = (elf_symbol_type *) symdef;
1475 break;
1476 }
1477 }
1478 }
1479 reloc_entry->addend
1480 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1481 }
1482 return bfd_reloc_continue;
1483 }
1484
1485 static bfd_reloc_status_type
1486 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1487 void *data, asection *input_section,
1488 bfd *output_bfd, char **error_message)
1489 {
1490 long insn;
1491 enum elf_ppc64_reloc_type r_type;
1492 bfd_size_type octets;
1493 /* Assume 'at' branch hints. */
1494 bfd_boolean is_isa_v2 = TRUE;
1495
1496 /* If this is a relocatable link (output_bfd test tells us), just
1497 call the generic function. Any adjustment will be done at final
1498 link time. */
1499 if (output_bfd != NULL)
1500 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1501 input_section, output_bfd, error_message);
1502
1503 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1504 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1505 insn &= ~(0x01 << 21);
1506 r_type = reloc_entry->howto->type;
1507 if (r_type == R_PPC64_ADDR14_BRTAKEN
1508 || r_type == R_PPC64_REL14_BRTAKEN)
1509 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1510
1511 if (is_isa_v2)
1512 {
1513 /* Set 'a' bit. This is 0b00010 in BO field for branch
1514 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1515 for branch on CTR insns (BO == 1a00t or 1a01t). */
1516 if ((insn & (0x14 << 21)) == (0x04 << 21))
1517 insn |= 0x02 << 21;
1518 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1519 insn |= 0x08 << 21;
1520 else
1521 goto out;
1522 }
1523 else
1524 {
1525 bfd_vma target = 0;
1526 bfd_vma from;
1527
1528 if (!bfd_is_com_section (symbol->section))
1529 target = symbol->value;
1530 target += symbol->section->output_section->vma;
1531 target += symbol->section->output_offset;
1532 target += reloc_entry->addend;
1533
1534 from = (reloc_entry->address
1535 + input_section->output_offset
1536 + input_section->output_section->vma);
1537
1538 /* Invert 'y' bit if not the default. */
1539 if ((bfd_signed_vma) (target - from) < 0)
1540 insn ^= 0x01 << 21;
1541 }
1542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1543 out:
1544 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1545 input_section, output_bfd, error_message);
1546 }
1547
1548 static bfd_reloc_status_type
1549 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
1552 {
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1558 input_section, output_bfd, error_message);
1559
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
1562 return bfd_reloc_continue;
1563 }
1564
1565 static bfd_reloc_status_type
1566 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
1569 {
1570 /* If this is a relocatable link (output_bfd test tells us), just
1571 call the generic function. Any adjustment will be done at final
1572 link time. */
1573 if (output_bfd != NULL)
1574 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1575 input_section, output_bfd, error_message);
1576
1577 /* Subtract the symbol section base address. */
1578 reloc_entry->addend -= symbol->section->output_section->vma;
1579
1580 /* Adjust the addend for sign extension of the low 16 bits. */
1581 reloc_entry->addend += 0x8000;
1582 return bfd_reloc_continue;
1583 }
1584
1585 static bfd_reloc_status_type
1586 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1587 void *data, asection *input_section,
1588 bfd *output_bfd, char **error_message)
1589 {
1590 bfd_vma TOCstart;
1591
1592 /* If this is a relocatable link (output_bfd test tells us), just
1593 call the generic function. Any adjustment will be done at final
1594 link time. */
1595 if (output_bfd != NULL)
1596 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1597 input_section, output_bfd, error_message);
1598
1599 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1600 if (TOCstart == 0)
1601 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1602
1603 /* Subtract the TOC base address. */
1604 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1605 return bfd_reloc_continue;
1606 }
1607
1608 static bfd_reloc_status_type
1609 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1610 void *data, asection *input_section,
1611 bfd *output_bfd, char **error_message)
1612 {
1613 bfd_vma TOCstart;
1614
1615 /* If this is a relocatable link (output_bfd test tells us), just
1616 call the generic function. Any adjustment will be done at final
1617 link time. */
1618 if (output_bfd != NULL)
1619 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1620 input_section, output_bfd, error_message);
1621
1622 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1623 if (TOCstart == 0)
1624 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1625
1626 /* Subtract the TOC base address. */
1627 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1628
1629 /* Adjust the addend for sign extension of the low 16 bits. */
1630 reloc_entry->addend += 0x8000;
1631 return bfd_reloc_continue;
1632 }
1633
1634 static bfd_reloc_status_type
1635 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1636 void *data, asection *input_section,
1637 bfd *output_bfd, char **error_message)
1638 {
1639 bfd_vma TOCstart;
1640 bfd_size_type octets;
1641
1642 /* If this is a relocatable link (output_bfd test tells us), just
1643 call the generic function. Any adjustment will be done at final
1644 link time. */
1645 if (output_bfd != NULL)
1646 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1647 input_section, output_bfd, error_message);
1648
1649 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1650 if (TOCstart == 0)
1651 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1652
1653 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1654 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1655 return bfd_reloc_ok;
1656 }
1657
1658 static bfd_reloc_status_type
1659 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1660 void *data, asection *input_section,
1661 bfd *output_bfd, char **error_message)
1662 {
1663 uint64_t insn;
1664 bfd_vma targ;
1665
1666 if (output_bfd != NULL)
1667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1668 input_section, output_bfd, error_message);
1669
1670 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1671 insn <<= 32;
1672 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1673
1674 targ = (symbol->section->output_section->vma
1675 + symbol->section->output_offset
1676 + reloc_entry->addend);
1677 if (!bfd_is_com_section (symbol->section))
1678 targ += symbol->value;
1679 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1680 targ += 1ULL << 33;
1681 if (reloc_entry->howto->pc_relative)
1682 {
1683 bfd_vma from = (reloc_entry->address
1684 + input_section->output_offset
1685 + input_section->output_section->vma);
1686 targ -=from;
1687 }
1688 targ >>= reloc_entry->howto->rightshift;
1689 insn &= ~reloc_entry->howto->dst_mask;
1690 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1691 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1692 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1693 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1694 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1695 >= 1ULL << reloc_entry->howto->bitsize))
1696 return bfd_reloc_overflow;
1697 return bfd_reloc_ok;
1698 }
1699
1700 static bfd_reloc_status_type
1701 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1702 void *data, asection *input_section,
1703 bfd *output_bfd, char **error_message)
1704 {
1705 /* If this is a relocatable link (output_bfd test tells us), just
1706 call the generic function. Any adjustment will be done at final
1707 link time. */
1708 if (output_bfd != NULL)
1709 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1710 input_section, output_bfd, error_message);
1711
1712 if (error_message != NULL)
1713 {
1714 static char buf[60];
1715 sprintf (buf, "generic linker can't handle %s",
1716 reloc_entry->howto->name);
1717 *error_message = buf;
1718 }
1719 return bfd_reloc_dangerous;
1720 }
1721
1722 /* Track GOT entries needed for a given symbol. We might need more
1723 than one got entry per symbol. */
1724 struct got_entry
1725 {
1726 struct got_entry *next;
1727
1728 /* The symbol addend that we'll be placing in the GOT. */
1729 bfd_vma addend;
1730
1731 /* Unlike other ELF targets, we use separate GOT entries for the same
1732 symbol referenced from different input files. This is to support
1733 automatic multiple TOC/GOT sections, where the TOC base can vary
1734 from one input file to another. After partitioning into TOC groups
1735 we merge entries within the group.
1736
1737 Point to the BFD owning this GOT entry. */
1738 bfd *owner;
1739
1740 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1741 TLS_TPREL or TLS_DTPREL for tls entries. */
1742 unsigned char tls_type;
1743
1744 /* Non-zero if got.ent points to real entry. */
1745 unsigned char is_indirect;
1746
1747 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1748 union
1749 {
1750 bfd_signed_vma refcount;
1751 bfd_vma offset;
1752 struct got_entry *ent;
1753 } got;
1754 };
1755
1756 /* The same for PLT. */
1757 struct plt_entry
1758 {
1759 struct plt_entry *next;
1760
1761 bfd_vma addend;
1762
1763 union
1764 {
1765 bfd_signed_vma refcount;
1766 bfd_vma offset;
1767 } plt;
1768 };
1769
1770 struct ppc64_elf_obj_tdata
1771 {
1772 struct elf_obj_tdata elf;
1773
1774 /* Shortcuts to dynamic linker sections. */
1775 asection *got;
1776 asection *relgot;
1777
1778 /* Used during garbage collection. We attach global symbols defined
1779 on removed .opd entries to this section so that the sym is removed. */
1780 asection *deleted_section;
1781
1782 /* TLS local dynamic got entry handling. Support for multiple GOT
1783 sections means we potentially need one of these for each input bfd. */
1784 struct got_entry tlsld_got;
1785
1786 union
1787 {
1788 /* A copy of relocs before they are modified for --emit-relocs. */
1789 Elf_Internal_Rela *relocs;
1790
1791 /* Section contents. */
1792 bfd_byte *contents;
1793 } opd;
1794
1795 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1796 the reloc to be in the range -32768 to 32767. */
1797 unsigned int has_small_toc_reloc : 1;
1798
1799 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1800 instruction not one we handle. */
1801 unsigned int unexpected_toc_insn : 1;
1802
1803 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1804 this file. */
1805 unsigned int has_optrel : 1;
1806 };
1807
1808 #define ppc64_elf_tdata(bfd) \
1809 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1810
1811 #define ppc64_tlsld_got(bfd) \
1812 (&ppc64_elf_tdata (bfd)->tlsld_got)
1813
1814 #define is_ppc64_elf(bfd) \
1815 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1816 && elf_object_id (bfd) == PPC64_ELF_DATA)
1817
1818 /* Override the generic function because we store some extras. */
1819
1820 static bfd_boolean
1821 ppc64_elf_mkobject (bfd *abfd)
1822 {
1823 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1824 PPC64_ELF_DATA);
1825 }
1826
1827 /* Fix bad default arch selected for a 64 bit input bfd when the
1828 default is 32 bit. Also select arch based on apuinfo. */
1829
1830 static bfd_boolean
1831 ppc64_elf_object_p (bfd *abfd)
1832 {
1833 if (!abfd->arch_info->the_default)
1834 return TRUE;
1835
1836 if (abfd->arch_info->bits_per_word == 32)
1837 {
1838 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1839
1840 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1841 {
1842 /* Relies on arch after 32 bit default being 64 bit default. */
1843 abfd->arch_info = abfd->arch_info->next;
1844 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1845 }
1846 }
1847 return _bfd_elf_ppc_set_arch (abfd);
1848 }
1849
1850 /* Support for core dump NOTE sections. */
1851
1852 static bfd_boolean
1853 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1854 {
1855 size_t offset, size;
1856
1857 if (note->descsz != 504)
1858 return FALSE;
1859
1860 /* pr_cursig */
1861 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1862
1863 /* pr_pid */
1864 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1865
1866 /* pr_reg */
1867 offset = 112;
1868 size = 384;
1869
1870 /* Make a ".reg/999" section. */
1871 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1872 size, note->descpos + offset);
1873 }
1874
1875 static bfd_boolean
1876 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1877 {
1878 if (note->descsz != 136)
1879 return FALSE;
1880
1881 elf_tdata (abfd)->core->pid
1882 = bfd_get_32 (abfd, note->descdata + 24);
1883 elf_tdata (abfd)->core->program
1884 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1885 elf_tdata (abfd)->core->command
1886 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1887
1888 return TRUE;
1889 }
1890
1891 static char *
1892 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1893 ...)
1894 {
1895 switch (note_type)
1896 {
1897 default:
1898 return NULL;
1899
1900 case NT_PRPSINFO:
1901 {
1902 char data[136] ATTRIBUTE_NONSTRING;
1903 va_list ap;
1904
1905 va_start (ap, note_type);
1906 memset (data, 0, sizeof (data));
1907 strncpy (data + 40, va_arg (ap, const char *), 16);
1908 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1909 DIAGNOSTIC_PUSH;
1910 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1911 -Wstringop-truncation:
1912 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1913 */
1914 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1915 #endif
1916 strncpy (data + 56, va_arg (ap, const char *), 80);
1917 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1918 DIAGNOSTIC_POP;
1919 #endif
1920 va_end (ap);
1921 return elfcore_write_note (abfd, buf, bufsiz,
1922 "CORE", note_type, data, sizeof (data));
1923 }
1924
1925 case NT_PRSTATUS:
1926 {
1927 char data[504];
1928 va_list ap;
1929 long pid;
1930 int cursig;
1931 const void *greg;
1932
1933 va_start (ap, note_type);
1934 memset (data, 0, 112);
1935 pid = va_arg (ap, long);
1936 bfd_put_32 (abfd, pid, data + 32);
1937 cursig = va_arg (ap, int);
1938 bfd_put_16 (abfd, cursig, data + 12);
1939 greg = va_arg (ap, const void *);
1940 memcpy (data + 112, greg, 384);
1941 memset (data + 496, 0, 8);
1942 va_end (ap);
1943 return elfcore_write_note (abfd, buf, bufsiz,
1944 "CORE", note_type, data, sizeof (data));
1945 }
1946 }
1947 }
1948
1949 /* Add extra PPC sections. */
1950
1951 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1952 {
1953 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1954 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1955 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1956 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1957 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1958 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1959 { NULL, 0, 0, 0, 0 }
1960 };
1961
1962 enum _ppc64_sec_type {
1963 sec_normal = 0,
1964 sec_opd = 1,
1965 sec_toc = 2
1966 };
1967
1968 struct _ppc64_elf_section_data
1969 {
1970 struct bfd_elf_section_data elf;
1971
1972 union
1973 {
1974 /* An array with one entry for each opd function descriptor,
1975 and some spares since opd entries may be either 16 or 24 bytes. */
1976 #define OPD_NDX(OFF) ((OFF) >> 4)
1977 struct _opd_sec_data
1978 {
1979 /* Points to the function code section for local opd entries. */
1980 asection **func_sec;
1981
1982 /* After editing .opd, adjust references to opd local syms. */
1983 long *adjust;
1984 } opd;
1985
1986 /* An array for toc sections, indexed by offset/8. */
1987 struct _toc_sec_data
1988 {
1989 /* Specifies the relocation symbol index used at a given toc offset. */
1990 unsigned *symndx;
1991
1992 /* And the relocation addend. */
1993 bfd_vma *add;
1994 } toc;
1995 } u;
1996
1997 enum _ppc64_sec_type sec_type:2;
1998
1999 /* Flag set when small branches are detected. Used to
2000 select suitable defaults for the stub group size. */
2001 unsigned int has_14bit_branch:1;
2002
2003 /* Flag set when PLTCALL relocs are detected. */
2004 unsigned int has_pltcall:1;
2005
2006 /* Flag set when section has PLT/GOT/TOC relocations that can be
2007 optimised. */
2008 unsigned int has_optrel:1;
2009 };
2010
2011 #define ppc64_elf_section_data(sec) \
2012 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2013
2014 static bfd_boolean
2015 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2016 {
2017 if (!sec->used_by_bfd)
2018 {
2019 struct _ppc64_elf_section_data *sdata;
2020 size_t amt = sizeof (*sdata);
2021
2022 sdata = bfd_zalloc (abfd, amt);
2023 if (sdata == NULL)
2024 return FALSE;
2025 sec->used_by_bfd = sdata;
2026 }
2027
2028 return _bfd_elf_new_section_hook (abfd, sec);
2029 }
2030
2031 static bfd_boolean
2032 ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2033 {
2034 const char *name = hdr->bfd_section->name;
2035
2036 if (strncmp (name, ".sbss", 5) == 0
2037 || strncmp (name, ".sdata", 6) == 0)
2038 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2039
2040 return TRUE;
2041 }
2042
2043 static struct _opd_sec_data *
2044 get_opd_info (asection * sec)
2045 {
2046 if (sec != NULL
2047 && ppc64_elf_section_data (sec) != NULL
2048 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2049 return &ppc64_elf_section_data (sec)->u.opd;
2050 return NULL;
2051 }
2052 \f
2053 /* Parameters for the qsort hook. */
2054 static bfd_boolean synthetic_relocatable;
2055 static asection *synthetic_opd;
2056
2057 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2058
2059 static int
2060 compare_symbols (const void *ap, const void *bp)
2061 {
2062 const asymbol *a = *(const asymbol **) ap;
2063 const asymbol *b = *(const asymbol **) bp;
2064
2065 /* Section symbols first. */
2066 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2067 return -1;
2068 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2069 return 1;
2070
2071 /* then .opd symbols. */
2072 if (synthetic_opd != NULL)
2073 {
2074 if (strcmp (a->section->name, ".opd") == 0
2075 && strcmp (b->section->name, ".opd") != 0)
2076 return -1;
2077 if (strcmp (a->section->name, ".opd") != 0
2078 && strcmp (b->section->name, ".opd") == 0)
2079 return 1;
2080 }
2081
2082 /* then other code symbols. */
2083 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2084 == (SEC_CODE | SEC_ALLOC))
2085 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2086 != (SEC_CODE | SEC_ALLOC)))
2087 return -1;
2088
2089 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2090 != (SEC_CODE | SEC_ALLOC))
2091 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2092 == (SEC_CODE | SEC_ALLOC)))
2093 return 1;
2094
2095 if (synthetic_relocatable)
2096 {
2097 if (a->section->id < b->section->id)
2098 return -1;
2099
2100 if (a->section->id > b->section->id)
2101 return 1;
2102 }
2103
2104 if (a->value + a->section->vma < b->value + b->section->vma)
2105 return -1;
2106
2107 if (a->value + a->section->vma > b->value + b->section->vma)
2108 return 1;
2109
2110 /* For syms with the same value, prefer strong dynamic global function
2111 syms over other syms. */
2112 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2113 return -1;
2114
2115 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2116 return 1;
2117
2118 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2119 return -1;
2120
2121 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2122 return 1;
2123
2124 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2125 return -1;
2126
2127 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2128 return 1;
2129
2130 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2131 return -1;
2132
2133 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2134 return 1;
2135
2136 /* Finally, sort on where the symbol is in memory. The symbols will
2137 be in at most two malloc'd blocks, one for static syms, one for
2138 dynamic syms, and we distinguish the two blocks above by testing
2139 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2140 originally in the same order as the symbols (and we're not
2141 sorting the symbols themselves), this ensures a stable sort. */
2142 if (a < b)
2143 return -1;
2144 if (a > b)
2145 return 1;
2146 return 0;
2147 }
2148
2149 /* Search SYMS for a symbol of the given VALUE. */
2150
2151 static asymbol *
2152 sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2153 bfd_vma value)
2154 {
2155 size_t mid;
2156
2157 if (id == (unsigned) -1)
2158 {
2159 while (lo < hi)
2160 {
2161 mid = (lo + hi) >> 1;
2162 if (syms[mid]->value + syms[mid]->section->vma < value)
2163 lo = mid + 1;
2164 else if (syms[mid]->value + syms[mid]->section->vma > value)
2165 hi = mid;
2166 else
2167 return syms[mid];
2168 }
2169 }
2170 else
2171 {
2172 while (lo < hi)
2173 {
2174 mid = (lo + hi) >> 1;
2175 if (syms[mid]->section->id < id)
2176 lo = mid + 1;
2177 else if (syms[mid]->section->id > id)
2178 hi = mid;
2179 else if (syms[mid]->value < value)
2180 lo = mid + 1;
2181 else if (syms[mid]->value > value)
2182 hi = mid;
2183 else
2184 return syms[mid];
2185 }
2186 }
2187 return NULL;
2188 }
2189
2190 static bfd_boolean
2191 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2192 {
2193 bfd_vma vma = *(bfd_vma *) ptr;
2194 return ((section->flags & SEC_ALLOC) != 0
2195 && section->vma <= vma
2196 && vma < section->vma + section->size);
2197 }
2198
2199 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2200 entry syms. Also generate @plt symbols for the glink branch table.
2201 Returns count of synthetic symbols in RET or -1 on error. */
2202
2203 static long
2204 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2205 long static_count, asymbol **static_syms,
2206 long dyn_count, asymbol **dyn_syms,
2207 asymbol **ret)
2208 {
2209 asymbol *s;
2210 size_t i, j, count;
2211 char *names;
2212 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2213 asection *opd = NULL;
2214 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2215 asymbol **syms;
2216 int abi = abiversion (abfd);
2217
2218 *ret = NULL;
2219
2220 if (abi < 2)
2221 {
2222 opd = bfd_get_section_by_name (abfd, ".opd");
2223 if (opd == NULL && abi == 1)
2224 return 0;
2225 }
2226
2227 syms = NULL;
2228 codesecsym = 0;
2229 codesecsymend = 0;
2230 secsymend = 0;
2231 opdsymend = 0;
2232 symcount = 0;
2233 if (opd != NULL)
2234 {
2235 symcount = static_count;
2236 if (!relocatable)
2237 symcount += dyn_count;
2238 if (symcount == 0)
2239 return 0;
2240
2241 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2242 if (syms == NULL)
2243 return -1;
2244
2245 if (!relocatable && static_count != 0 && dyn_count != 0)
2246 {
2247 /* Use both symbol tables. */
2248 memcpy (syms, static_syms, static_count * sizeof (*syms));
2249 memcpy (syms + static_count, dyn_syms,
2250 (dyn_count + 1) * sizeof (*syms));
2251 }
2252 else if (!relocatable && static_count == 0)
2253 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2254 else
2255 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2256
2257 /* Trim uninteresting symbols. Interesting symbols are section,
2258 function, and notype symbols. */
2259 for (i = 0, j = 0; i < symcount; ++i)
2260 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2261 | BSF_RELC | BSF_SRELC)) == 0)
2262 syms[j++] = syms[i];
2263 symcount = j;
2264
2265 synthetic_relocatable = relocatable;
2266 synthetic_opd = opd;
2267 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2268
2269 if (!relocatable && symcount > 1)
2270 {
2271 /* Trim duplicate syms, since we may have merged the normal
2272 and dynamic symbols. Actually, we only care about syms
2273 that have different values, so trim any with the same
2274 value. Don't consider ifunc and ifunc resolver symbols
2275 duplicates however, because GDB wants to know whether a
2276 text symbol is an ifunc resolver. */
2277 for (i = 1, j = 1; i < symcount; ++i)
2278 {
2279 const asymbol *s0 = syms[i - 1];
2280 const asymbol *s1 = syms[i];
2281
2282 if ((s0->value + s0->section->vma
2283 != s1->value + s1->section->vma)
2284 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2285 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2286 syms[j++] = syms[i];
2287 }
2288 symcount = j;
2289 }
2290
2291 i = 0;
2292 /* Note that here and in compare_symbols we can't compare opd and
2293 sym->section directly. With separate debug info files, the
2294 symbols will be extracted from the debug file while abfd passed
2295 to this function is the real binary. */
2296 if (strcmp (syms[i]->section->name, ".opd") == 0)
2297 ++i;
2298 codesecsym = i;
2299
2300 for (; i < symcount; ++i)
2301 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2302 | SEC_THREAD_LOCAL))
2303 != (SEC_CODE | SEC_ALLOC))
2304 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2305 break;
2306 codesecsymend = i;
2307
2308 for (; i < symcount; ++i)
2309 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2310 break;
2311 secsymend = i;
2312
2313 for (; i < symcount; ++i)
2314 if (strcmp (syms[i]->section->name, ".opd") != 0)
2315 break;
2316 opdsymend = i;
2317
2318 for (; i < symcount; ++i)
2319 if (((syms[i]->section->flags
2320 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2321 != (SEC_CODE | SEC_ALLOC))
2322 break;
2323 symcount = i;
2324 }
2325 count = 0;
2326
2327 if (relocatable)
2328 {
2329 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2330 arelent *r;
2331 size_t size;
2332 size_t relcount;
2333
2334 if (opdsymend == secsymend)
2335 goto done;
2336
2337 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2338 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2339 if (relcount == 0)
2340 goto done;
2341
2342 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2343 {
2344 count = -1;
2345 goto done;
2346 }
2347
2348 size = 0;
2349 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2350 {
2351 asymbol *sym;
2352
2353 while (r < opd->relocation + relcount
2354 && r->address < syms[i]->value + opd->vma)
2355 ++r;
2356
2357 if (r == opd->relocation + relcount)
2358 break;
2359
2360 if (r->address != syms[i]->value + opd->vma)
2361 continue;
2362
2363 if (r->howto->type != R_PPC64_ADDR64)
2364 continue;
2365
2366 sym = *r->sym_ptr_ptr;
2367 if (!sym_exists_at (syms, opdsymend, symcount,
2368 sym->section->id, sym->value + r->addend))
2369 {
2370 ++count;
2371 size += sizeof (asymbol);
2372 size += strlen (syms[i]->name) + 2;
2373 }
2374 }
2375
2376 if (size == 0)
2377 goto done;
2378 s = *ret = bfd_malloc (size);
2379 if (s == NULL)
2380 {
2381 count = -1;
2382 goto done;
2383 }
2384
2385 names = (char *) (s + count);
2386
2387 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2388 {
2389 asymbol *sym;
2390
2391 while (r < opd->relocation + relcount
2392 && r->address < syms[i]->value + opd->vma)
2393 ++r;
2394
2395 if (r == opd->relocation + relcount)
2396 break;
2397
2398 if (r->address != syms[i]->value + opd->vma)
2399 continue;
2400
2401 if (r->howto->type != R_PPC64_ADDR64)
2402 continue;
2403
2404 sym = *r->sym_ptr_ptr;
2405 if (!sym_exists_at (syms, opdsymend, symcount,
2406 sym->section->id, sym->value + r->addend))
2407 {
2408 size_t len;
2409
2410 *s = *syms[i];
2411 s->flags |= BSF_SYNTHETIC;
2412 s->section = sym->section;
2413 s->value = sym->value + r->addend;
2414 s->name = names;
2415 *names++ = '.';
2416 len = strlen (syms[i]->name);
2417 memcpy (names, syms[i]->name, len + 1);
2418 names += len + 1;
2419 /* Have udata.p point back to the original symbol this
2420 synthetic symbol was derived from. */
2421 s->udata.p = syms[i];
2422 s++;
2423 }
2424 }
2425 }
2426 else
2427 {
2428 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2429 bfd_byte *contents = NULL;
2430 size_t size;
2431 size_t plt_count = 0;
2432 bfd_vma glink_vma = 0, resolv_vma = 0;
2433 asection *dynamic, *glink = NULL, *relplt = NULL;
2434 arelent *p;
2435
2436 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2437 {
2438 free_contents_and_exit_err:
2439 count = -1;
2440 free_contents_and_exit:
2441 free (contents);
2442 goto done;
2443 }
2444
2445 size = 0;
2446 for (i = secsymend; i < opdsymend; ++i)
2447 {
2448 bfd_vma ent;
2449
2450 /* Ignore bogus symbols. */
2451 if (syms[i]->value > opd->size - 8)
2452 continue;
2453
2454 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2455 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2456 {
2457 ++count;
2458 size += sizeof (asymbol);
2459 size += strlen (syms[i]->name) + 2;
2460 }
2461 }
2462
2463 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2464 if (dyn_count != 0
2465 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2466 {
2467 bfd_byte *dynbuf, *extdyn, *extdynend;
2468 size_t extdynsize;
2469 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2470
2471 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2472 goto free_contents_and_exit_err;
2473
2474 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2475 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2476
2477 extdyn = dynbuf;
2478 extdynend = extdyn + dynamic->size;
2479 for (; extdyn < extdynend; extdyn += extdynsize)
2480 {
2481 Elf_Internal_Dyn dyn;
2482 (*swap_dyn_in) (abfd, extdyn, &dyn);
2483
2484 if (dyn.d_tag == DT_NULL)
2485 break;
2486
2487 if (dyn.d_tag == DT_PPC64_GLINK)
2488 {
2489 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2490 See comment in ppc64_elf_finish_dynamic_sections. */
2491 glink_vma = dyn.d_un.d_val + 8 * 4;
2492 /* The .glink section usually does not survive the final
2493 link; search for the section (usually .text) where the
2494 glink stubs now reside. */
2495 glink = bfd_sections_find_if (abfd, section_covers_vma,
2496 &glink_vma);
2497 break;
2498 }
2499 }
2500
2501 free (dynbuf);
2502 }
2503
2504 if (glink != NULL)
2505 {
2506 /* Determine __glink trampoline by reading the relative branch
2507 from the first glink stub. */
2508 bfd_byte buf[4];
2509 unsigned int off = 0;
2510
2511 while (bfd_get_section_contents (abfd, glink, buf,
2512 glink_vma + off - glink->vma, 4))
2513 {
2514 unsigned int insn = bfd_get_32 (abfd, buf);
2515 insn ^= B_DOT;
2516 if ((insn & ~0x3fffffc) == 0)
2517 {
2518 resolv_vma
2519 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2520 break;
2521 }
2522 off += 4;
2523 if (off > 4)
2524 break;
2525 }
2526
2527 if (resolv_vma)
2528 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2529
2530 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2531 if (relplt != NULL)
2532 {
2533 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2534 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2535 goto free_contents_and_exit_err;
2536
2537 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2538 size += plt_count * sizeof (asymbol);
2539
2540 p = relplt->relocation;
2541 for (i = 0; i < plt_count; i++, p++)
2542 {
2543 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2544 if (p->addend != 0)
2545 size += sizeof ("+0x") - 1 + 16;
2546 }
2547 }
2548 }
2549
2550 if (size == 0)
2551 goto free_contents_and_exit;
2552 s = *ret = bfd_malloc (size);
2553 if (s == NULL)
2554 goto free_contents_and_exit_err;
2555
2556 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2557
2558 for (i = secsymend; i < opdsymend; ++i)
2559 {
2560 bfd_vma ent;
2561
2562 if (syms[i]->value > opd->size - 8)
2563 continue;
2564
2565 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2566 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2567 {
2568 size_t lo, hi;
2569 size_t len;
2570 asection *sec = abfd->sections;
2571
2572 *s = *syms[i];
2573 lo = codesecsym;
2574 hi = codesecsymend;
2575 while (lo < hi)
2576 {
2577 size_t mid = (lo + hi) >> 1;
2578 if (syms[mid]->section->vma < ent)
2579 lo = mid + 1;
2580 else if (syms[mid]->section->vma > ent)
2581 hi = mid;
2582 else
2583 {
2584 sec = syms[mid]->section;
2585 break;
2586 }
2587 }
2588
2589 if (lo >= hi && lo > codesecsym)
2590 sec = syms[lo - 1]->section;
2591
2592 for (; sec != NULL; sec = sec->next)
2593 {
2594 if (sec->vma > ent)
2595 break;
2596 /* SEC_LOAD may not be set if SEC is from a separate debug
2597 info file. */
2598 if ((sec->flags & SEC_ALLOC) == 0)
2599 break;
2600 if ((sec->flags & SEC_CODE) != 0)
2601 s->section = sec;
2602 }
2603 s->flags |= BSF_SYNTHETIC;
2604 s->value = ent - s->section->vma;
2605 s->name = names;
2606 *names++ = '.';
2607 len = strlen (syms[i]->name);
2608 memcpy (names, syms[i]->name, len + 1);
2609 names += len + 1;
2610 /* Have udata.p point back to the original symbol this
2611 synthetic symbol was derived from. */
2612 s->udata.p = syms[i];
2613 s++;
2614 }
2615 }
2616 free (contents);
2617
2618 if (glink != NULL && relplt != NULL)
2619 {
2620 if (resolv_vma)
2621 {
2622 /* Add a symbol for the main glink trampoline. */
2623 memset (s, 0, sizeof *s);
2624 s->the_bfd = abfd;
2625 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2626 s->section = glink;
2627 s->value = resolv_vma - glink->vma;
2628 s->name = names;
2629 memcpy (names, "__glink_PLTresolve",
2630 sizeof ("__glink_PLTresolve"));
2631 names += sizeof ("__glink_PLTresolve");
2632 s++;
2633 count++;
2634 }
2635
2636 /* FIXME: It would be very much nicer to put sym@plt on the
2637 stub rather than on the glink branch table entry. The
2638 objdump disassembler would then use a sensible symbol
2639 name on plt calls. The difficulty in doing so is
2640 a) finding the stubs, and,
2641 b) matching stubs against plt entries, and,
2642 c) there can be multiple stubs for a given plt entry.
2643
2644 Solving (a) could be done by code scanning, but older
2645 ppc64 binaries used different stubs to current code.
2646 (b) is the tricky one since you need to known the toc
2647 pointer for at least one function that uses a pic stub to
2648 be able to calculate the plt address referenced.
2649 (c) means gdb would need to set multiple breakpoints (or
2650 find the glink branch itself) when setting breakpoints
2651 for pending shared library loads. */
2652 p = relplt->relocation;
2653 for (i = 0; i < plt_count; i++, p++)
2654 {
2655 size_t len;
2656
2657 *s = **p->sym_ptr_ptr;
2658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2659 we are defining a symbol, ensure one of them is set. */
2660 if ((s->flags & BSF_LOCAL) == 0)
2661 s->flags |= BSF_GLOBAL;
2662 s->flags |= BSF_SYNTHETIC;
2663 s->section = glink;
2664 s->value = glink_vma - glink->vma;
2665 s->name = names;
2666 s->udata.p = NULL;
2667 len = strlen ((*p->sym_ptr_ptr)->name);
2668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2669 names += len;
2670 if (p->addend != 0)
2671 {
2672 memcpy (names, "+0x", sizeof ("+0x") - 1);
2673 names += sizeof ("+0x") - 1;
2674 bfd_sprintf_vma (abfd, names, p->addend);
2675 names += strlen (names);
2676 }
2677 memcpy (names, "@plt", sizeof ("@plt"));
2678 names += sizeof ("@plt");
2679 s++;
2680 if (abi < 2)
2681 {
2682 glink_vma += 8;
2683 if (i >= 0x8000)
2684 glink_vma += 4;
2685 }
2686 else
2687 glink_vma += 4;
2688 }
2689 count += plt_count;
2690 }
2691 }
2692
2693 done:
2694 free (syms);
2695 return count;
2696 }
2697 \f
2698 /* The following functions are specific to the ELF linker, while
2699 functions above are used generally. Those named ppc64_elf_* are
2700 called by the main ELF linker code. They appear in this file more
2701 or less in the order in which they are called. eg.
2702 ppc64_elf_check_relocs is called early in the link process,
2703 ppc64_elf_finish_dynamic_sections is one of the last functions
2704 called.
2705
2706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2707 functions have both a function code symbol and a function descriptor
2708 symbol. A call to foo in a relocatable object file looks like:
2709
2710 . .text
2711 . x:
2712 . bl .foo
2713 . nop
2714
2715 The function definition in another object file might be:
2716
2717 . .section .opd
2718 . foo: .quad .foo
2719 . .quad .TOC.@tocbase
2720 . .quad 0
2721 .
2722 . .text
2723 . .foo: blr
2724
2725 When the linker resolves the call during a static link, the branch
2726 unsurprisingly just goes to .foo and the .opd information is unused.
2727 If the function definition is in a shared library, things are a little
2728 different: The call goes via a plt call stub, the opd information gets
2729 copied to the plt, and the linker patches the nop.
2730
2731 . x:
2732 . bl .foo_stub
2733 . ld 2,40(1)
2734 .
2735 .
2736 . .foo_stub:
2737 . std 2,40(1) # in practice, the call stub
2738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2739 . addi 11,11,Lfoo@toc@l # this is the general idea
2740 . ld 12,0(11)
2741 . ld 2,8(11)
2742 . mtctr 12
2743 . ld 11,16(11)
2744 . bctr
2745 .
2746 . .section .plt
2747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2748
2749 The "reloc ()" notation is supposed to indicate that the linker emits
2750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2751 copying.
2752
2753 What are the difficulties here? Well, firstly, the relocations
2754 examined by the linker in check_relocs are against the function code
2755 sym .foo, while the dynamic relocation in the plt is emitted against
2756 the function descriptor symbol, foo. Somewhere along the line, we need
2757 to carefully copy dynamic link information from one symbol to the other.
2758 Secondly, the generic part of the elf linker will make .foo a dynamic
2759 symbol as is normal for most other backends. We need foo dynamic
2760 instead, at least for an application final link. However, when
2761 creating a shared library containing foo, we need to have both symbols
2762 dynamic so that references to .foo are satisfied during the early
2763 stages of linking. Otherwise the linker might decide to pull in a
2764 definition from some other object, eg. a static library.
2765
2766 Update: As of August 2004, we support a new convention. Function
2767 calls may use the function descriptor symbol, ie. "bl foo". This
2768 behaves exactly as "bl .foo". */
2769
2770 /* Of those relocs that might be copied as dynamic relocs, this
2771 function selects those that must be copied when linking a shared
2772 library or PIE, even when the symbol is local. */
2773
2774 static int
2775 must_be_dyn_reloc (struct bfd_link_info *info,
2776 enum elf_ppc64_reloc_type r_type)
2777 {
2778 switch (r_type)
2779 {
2780 default:
2781 /* Only relative relocs can be resolved when the object load
2782 address isn't fixed. DTPREL64 is excluded because the
2783 dynamic linker needs to differentiate global dynamic from
2784 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2785 return 1;
2786
2787 case R_PPC64_REL32:
2788 case R_PPC64_REL64:
2789 case R_PPC64_REL30:
2790 case R_PPC64_TOC16:
2791 case R_PPC64_TOC16_DS:
2792 case R_PPC64_TOC16_LO:
2793 case R_PPC64_TOC16_HI:
2794 case R_PPC64_TOC16_HA:
2795 case R_PPC64_TOC16_LO_DS:
2796 return 0;
2797
2798 case R_PPC64_TPREL16:
2799 case R_PPC64_TPREL16_LO:
2800 case R_PPC64_TPREL16_HI:
2801 case R_PPC64_TPREL16_HA:
2802 case R_PPC64_TPREL16_DS:
2803 case R_PPC64_TPREL16_LO_DS:
2804 case R_PPC64_TPREL16_HIGH:
2805 case R_PPC64_TPREL16_HIGHA:
2806 case R_PPC64_TPREL16_HIGHER:
2807 case R_PPC64_TPREL16_HIGHERA:
2808 case R_PPC64_TPREL16_HIGHEST:
2809 case R_PPC64_TPREL16_HIGHESTA:
2810 case R_PPC64_TPREL64:
2811 case R_PPC64_TPREL34:
2812 /* These relocations are relative but in a shared library the
2813 linker doesn't know the thread pointer base. */
2814 return bfd_link_dll (info);
2815 }
2816 }
2817
2818 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2819 copying dynamic variables from a shared lib into an app's .dynbss
2820 section, and instead use a dynamic relocation to point into the
2821 shared lib. With code that gcc generates it is vital that this be
2822 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2823 actually the address of a function descriptor which resides in the
2824 .opd section. gcc uses the descriptor directly rather than going
2825 via the GOT as some other ABIs do, which means that initialized
2826 function pointers reference the descriptor. Thus, a function
2827 pointer initialized to the address of a function in a shared
2828 library will either require a .dynbss copy and a copy reloc, or a
2829 dynamic reloc. Using a .dynbss copy redefines the function
2830 descriptor symbol to point to the copy. This presents a problem as
2831 a PLT entry for that function is also initialized from the function
2832 descriptor symbol and the copy may not be initialized first. */
2833 #define ELIMINATE_COPY_RELOCS 1
2834
2835 /* Section name for stubs is the associated section name plus this
2836 string. */
2837 #define STUB_SUFFIX ".stub"
2838
2839 /* Linker stubs.
2840 ppc_stub_long_branch:
2841 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2842 destination, but a 24 bit branch in a stub section will reach.
2843 . b dest
2844
2845 ppc_stub_plt_branch:
2846 Similar to the above, but a 24 bit branch in the stub section won't
2847 reach its destination.
2848 . addis %r12,%r2,xxx@toc@ha
2849 . ld %r12,xxx@toc@l(%r12)
2850 . mtctr %r12
2851 . bctr
2852
2853 ppc_stub_plt_call:
2854 Used to call a function in a shared library. If it so happens that
2855 the plt entry referenced crosses a 64k boundary, then an extra
2856 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2857 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2858 . addis %r11,%r2,xxx@toc@ha
2859 . ld %r12,xxx+0@toc@l(%r11)
2860 . mtctr %r12
2861 . ld %r2,xxx+8@toc@l(%r11)
2862 . ld %r11,xxx+16@toc@l(%r11)
2863 . bctr
2864
2865 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2866 code to adjust the value and save r2 to support multiple toc sections.
2867 A ppc_stub_long_branch with an r2 offset looks like:
2868 . std %r2,40(%r1)
2869 . addis %r2,%r2,off@ha
2870 . addi %r2,%r2,off@l
2871 . b dest
2872
2873 A ppc_stub_plt_branch with an r2 offset looks like:
2874 . std %r2,40(%r1)
2875 . addis %r12,%r2,xxx@toc@ha
2876 . ld %r12,xxx@toc@l(%r12)
2877 . addis %r2,%r2,off@ha
2878 . addi %r2,%r2,off@l
2879 . mtctr %r12
2880 . bctr
2881
2882 All of the above stubs are shown as their ELFv1 variants. ELFv2
2883 variants exist too, simpler for plt calls since a new toc pointer
2884 and static chain are not loaded by the stub. In addition, ELFv2
2885 has some more complex stubs to handle calls marked with NOTOC
2886 relocs from functions where r2 is not a valid toc pointer. These
2887 come in two flavours, the ones shown below, and _both variants that
2888 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2889 one call is from a function where r2 is used as the toc pointer but
2890 needs a toc adjusting stub for small-model multi-toc, and another
2891 call is from a function where r2 is not valid.
2892 ppc_stub_long_branch_notoc:
2893 . mflr %r12
2894 . bcl 20,31,1f
2895 . 1:
2896 . mflr %r11
2897 . mtlr %r12
2898 . addis %r12,%r11,dest-1b@ha
2899 . addi %r12,%r12,dest-1b@l
2900 . b dest
2901
2902 ppc_stub_plt_branch_notoc:
2903 . mflr %r12
2904 . bcl 20,31,1f
2905 . 1:
2906 . mflr %r11
2907 . mtlr %r12
2908 . lis %r12,xxx-1b@highest
2909 . ori %r12,%r12,xxx-1b@higher
2910 . sldi %r12,%r12,32
2911 . oris %r12,%r12,xxx-1b@high
2912 . ori %r12,%r12,xxx-1b@l
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916
2917 ppc_stub_plt_call_notoc:
2918 . mflr %r12
2919 . bcl 20,31,1f
2920 . 1:
2921 . mflr %r11
2922 . mtlr %r12
2923 . lis %r12,xxx-1b@highest
2924 . ori %r12,%r12,xxx-1b@higher
2925 . sldi %r12,%r12,32
2926 . oris %r12,%r12,xxx-1b@high
2927 . ori %r12,%r12,xxx-1b@l
2928 . ldx %r12,%r11,%r12
2929 . mtctr %r12
2930 . bctr
2931
2932 There are also ELFv1 power10 variants of these stubs.
2933 ppc_stub_long_branch_notoc:
2934 . pla %r12,dest@pcrel
2935 . b dest
2936 ppc_stub_plt_branch_notoc:
2937 . lis %r11,(dest-1f)@highesta34
2938 . ori %r11,%r11,(dest-1f)@highera34
2939 . sldi %r11,%r11,34
2940 . 1: pla %r12,dest@pcrel
2941 . add %r12,%r11,%r12
2942 . mtctr %r12
2943 . bctr
2944 ppc_stub_plt_call_notoc:
2945 . lis %r11,(xxx-1f)@highesta34
2946 . ori %r11,%r11,(xxx-1f)@highera34
2947 . sldi %r11,%r11,34
2948 . 1: pla %r12,xxx@pcrel
2949 . ldx %r12,%r11,%r12
2950 . mtctr %r12
2951 . bctr
2952
2953 In cases where the high instructions would add zero, they are
2954 omitted and following instructions modified in some cases.
2955 For example, a power10 ppc_stub_plt_call_notoc might simplify down
2956 to
2957 . pld %r12,xxx@pcrel
2958 . mtctr %r12
2959 . bctr
2960
2961 For a given stub group (a set of sections all using the same toc
2962 pointer value) there will be just one stub type used for any
2963 particular function symbol. For example, if printf is called from
2964 code with the tocsave optimization (ie. r2 saved in function
2965 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2966 and from other code without the tocsave optimization requiring a
2967 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2968 type will be created. Calls with the tocsave optimization will
2969 enter this stub after the instruction saving r2. A similar
2970 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2971 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2972 to call an external function like printf. If other calls to printf
2973 require a ppc_stub_plt_call linkage stub then a single
2974 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2975 call. If other calls to printf require a ppc_stub_plt_call_r2save
2976 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2977 be created and calls not requiring r2 to be saved will enter the
2978 stub after the r2 save instruction. There is an analogous
2979 hierarchy of long branch and plt branch stubs for local call
2980 linkage. */
2981
2982 enum ppc_stub_type
2983 {
2984 ppc_stub_none,
2985 ppc_stub_long_branch,
2986 ppc_stub_long_branch_r2off,
2987 ppc_stub_long_branch_notoc,
2988 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2989 ppc_stub_plt_branch,
2990 ppc_stub_plt_branch_r2off,
2991 ppc_stub_plt_branch_notoc,
2992 ppc_stub_plt_branch_both,
2993 ppc_stub_plt_call,
2994 ppc_stub_plt_call_r2save,
2995 ppc_stub_plt_call_notoc,
2996 ppc_stub_plt_call_both,
2997 ppc_stub_global_entry,
2998 ppc_stub_save_res
2999 };
3000
3001 /* Information on stub grouping. */
3002 struct map_stub
3003 {
3004 /* The stub section. */
3005 asection *stub_sec;
3006 /* This is the section to which stubs in the group will be attached. */
3007 asection *link_sec;
3008 /* Next group. */
3009 struct map_stub *next;
3010 /* Whether to emit a copy of register save/restore functions in this
3011 group. */
3012 int needs_save_res;
3013 /* Current offset within stubs after the insn restoring lr in a
3014 _notoc or _both stub using bcl for pc-relative addressing, or
3015 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3016 unsigned int lr_restore;
3017 /* Accumulated size of EH info emitted to describe return address
3018 if stubs modify lr. Does not include 17 byte FDE header. */
3019 unsigned int eh_size;
3020 /* Offset in glink_eh_frame to the start of EH info for this group. */
3021 unsigned int eh_base;
3022 };
3023
3024 struct ppc_stub_hash_entry
3025 {
3026 /* Base hash table entry structure. */
3027 struct bfd_hash_entry root;
3028
3029 enum ppc_stub_type stub_type;
3030
3031 /* Group information. */
3032 struct map_stub *group;
3033
3034 /* Offset within stub_sec of the beginning of this stub. */
3035 bfd_vma stub_offset;
3036
3037 /* Given the symbol's value and its section we can determine its final
3038 value when building the stubs (so the stub knows where to jump. */
3039 bfd_vma target_value;
3040 asection *target_section;
3041
3042 /* The symbol table entry, if any, that this was derived from. */
3043 struct ppc_link_hash_entry *h;
3044 struct plt_entry *plt_ent;
3045
3046 /* Symbol type. */
3047 unsigned char symtype;
3048
3049 /* Symbol st_other. */
3050 unsigned char other;
3051 };
3052
3053 struct ppc_branch_hash_entry
3054 {
3055 /* Base hash table entry structure. */
3056 struct bfd_hash_entry root;
3057
3058 /* Offset within branch lookup table. */
3059 unsigned int offset;
3060
3061 /* Generation marker. */
3062 unsigned int iter;
3063 };
3064
3065 /* Used to track dynamic relocations for local symbols. */
3066 struct ppc_dyn_relocs
3067 {
3068 struct ppc_dyn_relocs *next;
3069
3070 /* The input section of the reloc. */
3071 asection *sec;
3072
3073 /* Total number of relocs copied for the input section. */
3074 unsigned int count : 31;
3075
3076 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3077 unsigned int ifunc : 1;
3078 };
3079
3080 struct ppc_link_hash_entry
3081 {
3082 struct elf_link_hash_entry elf;
3083
3084 union
3085 {
3086 /* A pointer to the most recently used stub hash entry against this
3087 symbol. */
3088 struct ppc_stub_hash_entry *stub_cache;
3089
3090 /* A pointer to the next symbol starting with a '.' */
3091 struct ppc_link_hash_entry *next_dot_sym;
3092 } u;
3093
3094 /* Link between function code and descriptor symbols. */
3095 struct ppc_link_hash_entry *oh;
3096
3097 /* Flag function code and descriptor symbols. */
3098 unsigned int is_func:1;
3099 unsigned int is_func_descriptor:1;
3100 unsigned int fake:1;
3101
3102 /* Whether global opd/toc sym has been adjusted or not.
3103 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3104 should be set for all globals defined in any opd/toc section. */
3105 unsigned int adjust_done:1;
3106
3107 /* Set if this is an out-of-line register save/restore function,
3108 with non-standard calling convention. */
3109 unsigned int save_res:1;
3110
3111 /* Set if a duplicate symbol with non-zero localentry is detected,
3112 even when the duplicate symbol does not provide a definition. */
3113 unsigned int non_zero_localentry:1;
3114
3115 /* Contexts in which symbol is used in the GOT (or TOC).
3116 Bits are or'd into the mask as the corresponding relocs are
3117 encountered during check_relocs, with TLS_TLS being set when any
3118 of the other TLS bits are set. tls_optimize clears bits when
3119 optimizing to indicate the corresponding GOT entry type is not
3120 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3121 set TLS_GDIE when a GD reloc turns into an IE one.
3122 These flags are also kept for local symbols. */
3123 #define TLS_TLS 1 /* Any TLS reloc. */
3124 #define TLS_GD 2 /* GD reloc. */
3125 #define TLS_LD 4 /* LD reloc. */
3126 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3127 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3128 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3129 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3130 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3131 unsigned char tls_mask;
3132
3133 /* The above field is also used to mark function symbols. In which
3134 case TLS_TLS will be 0. */
3135 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3136 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3137 #define NON_GOT 256 /* local symbol plt, not stored. */
3138 };
3139
3140 static inline struct ppc_link_hash_entry *
3141 ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3142 {
3143 return (struct ppc_link_hash_entry *) ent;
3144 }
3145
3146 /* ppc64 ELF linker hash table. */
3147
3148 struct ppc_link_hash_table
3149 {
3150 struct elf_link_hash_table elf;
3151
3152 /* The stub hash table. */
3153 struct bfd_hash_table stub_hash_table;
3154
3155 /* Another hash table for plt_branch stubs. */
3156 struct bfd_hash_table branch_hash_table;
3157
3158 /* Hash table for function prologue tocsave. */
3159 htab_t tocsave_htab;
3160
3161 /* Various options and other info passed from the linker. */
3162 struct ppc64_elf_params *params;
3163
3164 /* The size of sec_info below. */
3165 unsigned int sec_info_arr_size;
3166
3167 /* Per-section array of extra section info. Done this way rather
3168 than as part of ppc64_elf_section_data so we have the info for
3169 non-ppc64 sections. */
3170 struct
3171 {
3172 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3173 bfd_vma toc_off;
3174
3175 union
3176 {
3177 /* The section group that this section belongs to. */
3178 struct map_stub *group;
3179 /* A temp section list pointer. */
3180 asection *list;
3181 } u;
3182 } *sec_info;
3183
3184 /* Linked list of groups. */
3185 struct map_stub *group;
3186
3187 /* Temp used when calculating TOC pointers. */
3188 bfd_vma toc_curr;
3189 bfd *toc_bfd;
3190 asection *toc_first_sec;
3191
3192 /* Used when adding symbols. */
3193 struct ppc_link_hash_entry *dot_syms;
3194
3195 /* Shortcuts to get to dynamic linker sections. */
3196 asection *glink;
3197 asection *global_entry;
3198 asection *sfpr;
3199 asection *pltlocal;
3200 asection *relpltlocal;
3201 asection *brlt;
3202 asection *relbrlt;
3203 asection *glink_eh_frame;
3204
3205 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3206 struct ppc_link_hash_entry *tls_get_addr;
3207 struct ppc_link_hash_entry *tls_get_addr_fd;
3208 struct ppc_link_hash_entry *tga_desc;
3209 struct ppc_link_hash_entry *tga_desc_fd;
3210 struct map_stub *tga_group;
3211
3212 /* The size of reliplt used by got entry relocs. */
3213 bfd_size_type got_reli_size;
3214
3215 /* Statistics. */
3216 unsigned long stub_count[ppc_stub_global_entry];
3217
3218 /* Number of stubs against global syms. */
3219 unsigned long stub_globals;
3220
3221 /* Set if we're linking code with function descriptors. */
3222 unsigned int opd_abi:1;
3223
3224 /* Support for multiple toc sections. */
3225 unsigned int do_multi_toc:1;
3226 unsigned int multi_toc_needed:1;
3227 unsigned int second_toc_pass:1;
3228 unsigned int do_toc_opt:1;
3229
3230 /* Set if tls optimization is enabled. */
3231 unsigned int do_tls_opt:1;
3232
3233 /* Set if inline plt calls should be converted to direct calls. */
3234 unsigned int can_convert_all_inline_plt:1;
3235
3236 /* Set on error. */
3237 unsigned int stub_error:1;
3238
3239 /* Whether func_desc_adjust needs to be run over symbols. */
3240 unsigned int need_func_desc_adj:1;
3241
3242 /* Whether there exist local gnu indirect function resolvers,
3243 referenced by dynamic relocations. */
3244 unsigned int local_ifunc_resolver:1;
3245
3246 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3247 unsigned int has_plt_localentry0:1;
3248
3249 /* Whether calls are made via the PLT from NOTOC functions. */
3250 unsigned int notoc_plt:1;
3251
3252 /* Whether to use power10 instructions in linkage stubs. */
3253 unsigned int power10_stubs:1;
3254
3255 /* Incremented every time we size stubs. */
3256 unsigned int stub_iteration;
3257
3258 /* Small local sym cache. */
3259 struct sym_cache sym_cache;
3260 };
3261
3262 /* Rename some of the generic section flags to better document how they
3263 are used here. */
3264
3265 /* Nonzero if this section has TLS related relocations. */
3266 #define has_tls_reloc sec_flg0
3267
3268 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3269 relocations. */
3270 #define nomark_tls_get_addr sec_flg1
3271
3272 /* Nonzero if this section has any toc or got relocs. */
3273 #define has_toc_reloc sec_flg2
3274
3275 /* Nonzero if this section has a call to another section that uses
3276 the toc or got. */
3277 #define makes_toc_func_call sec_flg3
3278
3279 /* Recursion protection when determining above flag. */
3280 #define call_check_in_progress sec_flg4
3281 #define call_check_done sec_flg5
3282
3283 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3284
3285 #define ppc_hash_table(p) \
3286 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3287 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3288
3289 #define ppc_stub_hash_lookup(table, string, create, copy) \
3290 ((struct ppc_stub_hash_entry *) \
3291 bfd_hash_lookup ((table), (string), (create), (copy)))
3292
3293 #define ppc_branch_hash_lookup(table, string, create, copy) \
3294 ((struct ppc_branch_hash_entry *) \
3295 bfd_hash_lookup ((table), (string), (create), (copy)))
3296
3297 /* Create an entry in the stub hash table. */
3298
3299 static struct bfd_hash_entry *
3300 stub_hash_newfunc (struct bfd_hash_entry *entry,
3301 struct bfd_hash_table *table,
3302 const char *string)
3303 {
3304 /* Allocate the structure if it has not already been allocated by a
3305 subclass. */
3306 if (entry == NULL)
3307 {
3308 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3309 if (entry == NULL)
3310 return entry;
3311 }
3312
3313 /* Call the allocation method of the superclass. */
3314 entry = bfd_hash_newfunc (entry, table, string);
3315 if (entry != NULL)
3316 {
3317 struct ppc_stub_hash_entry *eh;
3318
3319 /* Initialize the local fields. */
3320 eh = (struct ppc_stub_hash_entry *) entry;
3321 eh->stub_type = ppc_stub_none;
3322 eh->group = NULL;
3323 eh->stub_offset = 0;
3324 eh->target_value = 0;
3325 eh->target_section = NULL;
3326 eh->h = NULL;
3327 eh->plt_ent = NULL;
3328 eh->other = 0;
3329 }
3330
3331 return entry;
3332 }
3333
3334 /* Create an entry in the branch hash table. */
3335
3336 static struct bfd_hash_entry *
3337 branch_hash_newfunc (struct bfd_hash_entry *entry,
3338 struct bfd_hash_table *table,
3339 const char *string)
3340 {
3341 /* Allocate the structure if it has not already been allocated by a
3342 subclass. */
3343 if (entry == NULL)
3344 {
3345 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3346 if (entry == NULL)
3347 return entry;
3348 }
3349
3350 /* Call the allocation method of the superclass. */
3351 entry = bfd_hash_newfunc (entry, table, string);
3352 if (entry != NULL)
3353 {
3354 struct ppc_branch_hash_entry *eh;
3355
3356 /* Initialize the local fields. */
3357 eh = (struct ppc_branch_hash_entry *) entry;
3358 eh->offset = 0;
3359 eh->iter = 0;
3360 }
3361
3362 return entry;
3363 }
3364
3365 /* Create an entry in a ppc64 ELF linker hash table. */
3366
3367 static struct bfd_hash_entry *
3368 link_hash_newfunc (struct bfd_hash_entry *entry,
3369 struct bfd_hash_table *table,
3370 const char *string)
3371 {
3372 /* Allocate the structure if it has not already been allocated by a
3373 subclass. */
3374 if (entry == NULL)
3375 {
3376 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3377 if (entry == NULL)
3378 return entry;
3379 }
3380
3381 /* Call the allocation method of the superclass. */
3382 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3383 if (entry != NULL)
3384 {
3385 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3386
3387 memset (&eh->u.stub_cache, 0,
3388 (sizeof (struct ppc_link_hash_entry)
3389 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3390
3391 /* When making function calls, old ABI code references function entry
3392 points (dot symbols), while new ABI code references the function
3393 descriptor symbol. We need to make any combination of reference and
3394 definition work together, without breaking archive linking.
3395
3396 For a defined function "foo" and an undefined call to "bar":
3397 An old object defines "foo" and ".foo", references ".bar" (possibly
3398 "bar" too).
3399 A new object defines "foo" and references "bar".
3400
3401 A new object thus has no problem with its undefined symbols being
3402 satisfied by definitions in an old object. On the other hand, the
3403 old object won't have ".bar" satisfied by a new object.
3404
3405 Keep a list of newly added dot-symbols. */
3406
3407 if (string[0] == '.')
3408 {
3409 struct ppc_link_hash_table *htab;
3410
3411 htab = (struct ppc_link_hash_table *) table;
3412 eh->u.next_dot_sym = htab->dot_syms;
3413 htab->dot_syms = eh;
3414 }
3415 }
3416
3417 return entry;
3418 }
3419
3420 struct tocsave_entry
3421 {
3422 asection *sec;
3423 bfd_vma offset;
3424 };
3425
3426 static hashval_t
3427 tocsave_htab_hash (const void *p)
3428 {
3429 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3430 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3431 }
3432
3433 static int
3434 tocsave_htab_eq (const void *p1, const void *p2)
3435 {
3436 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3437 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3438 return e1->sec == e2->sec && e1->offset == e2->offset;
3439 }
3440
3441 /* Destroy a ppc64 ELF linker hash table. */
3442
3443 static void
3444 ppc64_elf_link_hash_table_free (bfd *obfd)
3445 {
3446 struct ppc_link_hash_table *htab;
3447
3448 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3449 if (htab->tocsave_htab)
3450 htab_delete (htab->tocsave_htab);
3451 bfd_hash_table_free (&htab->branch_hash_table);
3452 bfd_hash_table_free (&htab->stub_hash_table);
3453 _bfd_elf_link_hash_table_free (obfd);
3454 }
3455
3456 /* Create a ppc64 ELF linker hash table. */
3457
3458 static struct bfd_link_hash_table *
3459 ppc64_elf_link_hash_table_create (bfd *abfd)
3460 {
3461 struct ppc_link_hash_table *htab;
3462 size_t amt = sizeof (struct ppc_link_hash_table);
3463
3464 htab = bfd_zmalloc (amt);
3465 if (htab == NULL)
3466 return NULL;
3467
3468 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3469 sizeof (struct ppc_link_hash_entry),
3470 PPC64_ELF_DATA))
3471 {
3472 free (htab);
3473 return NULL;
3474 }
3475
3476 /* Init the stub hash table too. */
3477 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3478 sizeof (struct ppc_stub_hash_entry)))
3479 {
3480 _bfd_elf_link_hash_table_free (abfd);
3481 return NULL;
3482 }
3483
3484 /* And the branch hash table. */
3485 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3486 sizeof (struct ppc_branch_hash_entry)))
3487 {
3488 bfd_hash_table_free (&htab->stub_hash_table);
3489 _bfd_elf_link_hash_table_free (abfd);
3490 return NULL;
3491 }
3492
3493 htab->tocsave_htab = htab_try_create (1024,
3494 tocsave_htab_hash,
3495 tocsave_htab_eq,
3496 NULL);
3497 if (htab->tocsave_htab == NULL)
3498 {
3499 ppc64_elf_link_hash_table_free (abfd);
3500 return NULL;
3501 }
3502 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3503
3504 /* Initializing two fields of the union is just cosmetic. We really
3505 only care about glist, but when compiled on a 32-bit host the
3506 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3507 debugger inspection of these fields look nicer. */
3508 htab->elf.init_got_refcount.refcount = 0;
3509 htab->elf.init_got_refcount.glist = NULL;
3510 htab->elf.init_plt_refcount.refcount = 0;
3511 htab->elf.init_plt_refcount.glist = NULL;
3512 htab->elf.init_got_offset.offset = 0;
3513 htab->elf.init_got_offset.glist = NULL;
3514 htab->elf.init_plt_offset.offset = 0;
3515 htab->elf.init_plt_offset.glist = NULL;
3516
3517 return &htab->elf.root;
3518 }
3519
3520 /* Create sections for linker generated code. */
3521
3522 static bfd_boolean
3523 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3524 {
3525 struct ppc_link_hash_table *htab;
3526 flagword flags;
3527
3528 htab = ppc_hash_table (info);
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3531 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3532 if (htab->params->save_restore_funcs)
3533 {
3534 /* Create .sfpr for code to save and restore fp regs. */
3535 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3536 flags);
3537 if (htab->sfpr == NULL
3538 || !bfd_set_section_alignment (htab->sfpr, 2))
3539 return FALSE;
3540 }
3541
3542 if (bfd_link_relocatable (info))
3543 return TRUE;
3544
3545 /* Create .glink for lazy dynamic linking support. */
3546 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3547 flags);
3548 if (htab->glink == NULL
3549 || !bfd_set_section_alignment (htab->glink, 3))
3550 return FALSE;
3551
3552 /* The part of .glink used by global entry stubs, separate so that
3553 it can be aligned appropriately without affecting htab->glink. */
3554 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3555 flags);
3556 if (htab->global_entry == NULL
3557 || !bfd_set_section_alignment (htab->global_entry, 2))
3558 return FALSE;
3559
3560 if (!info->no_ld_generated_unwind_info)
3561 {
3562 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3563 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3564 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3565 ".eh_frame",
3566 flags);
3567 if (htab->glink_eh_frame == NULL
3568 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3569 return FALSE;
3570 }
3571
3572 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3573 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3574 if (htab->elf.iplt == NULL
3575 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3576 return FALSE;
3577
3578 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3579 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3580 htab->elf.irelplt
3581 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3582 if (htab->elf.irelplt == NULL
3583 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3584 return FALSE;
3585
3586 /* Create branch lookup table for plt_branch stubs. */
3587 flags = (SEC_ALLOC | SEC_LOAD
3588 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3589 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3590 flags);
3591 if (htab->brlt == NULL
3592 || !bfd_set_section_alignment (htab->brlt, 3))
3593 return FALSE;
3594
3595 /* Local plt entries, put in .branch_lt but a separate section for
3596 convenience. */
3597 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3598 flags);
3599 if (htab->pltlocal == NULL
3600 || !bfd_set_section_alignment (htab->pltlocal, 3))
3601 return FALSE;
3602
3603 if (!bfd_link_pic (info))
3604 return TRUE;
3605
3606 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3607 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3608 htab->relbrlt
3609 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3610 if (htab->relbrlt == NULL
3611 || !bfd_set_section_alignment (htab->relbrlt, 3))
3612 return FALSE;
3613
3614 htab->relpltlocal
3615 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3616 if (htab->relpltlocal == NULL
3617 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3618 return FALSE;
3619
3620 return TRUE;
3621 }
3622
3623 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3624
3625 bfd_boolean
3626 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3627 struct ppc64_elf_params *params)
3628 {
3629 struct ppc_link_hash_table *htab;
3630
3631 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3632
3633 /* Always hook our dynamic sections into the first bfd, which is the
3634 linker created stub bfd. This ensures that the GOT header is at
3635 the start of the output TOC section. */
3636 htab = ppc_hash_table (info);
3637 htab->elf.dynobj = params->stub_bfd;
3638 htab->params = params;
3639
3640 return create_linkage_sections (htab->elf.dynobj, info);
3641 }
3642
3643 /* Build a name for an entry in the stub hash table. */
3644
3645 static char *
3646 ppc_stub_name (const asection *input_section,
3647 const asection *sym_sec,
3648 const struct ppc_link_hash_entry *h,
3649 const Elf_Internal_Rela *rel)
3650 {
3651 char *stub_name;
3652 ssize_t len;
3653
3654 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3655 offsets from a sym as a branch target? In fact, we could
3656 probably assume the addend is always zero. */
3657 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3658
3659 if (h)
3660 {
3661 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3662 stub_name = bfd_malloc (len);
3663 if (stub_name == NULL)
3664 return stub_name;
3665
3666 len = sprintf (stub_name, "%08x.%s+%x",
3667 input_section->id & 0xffffffff,
3668 h->elf.root.root.string,
3669 (int) rel->r_addend & 0xffffffff);
3670 }
3671 else
3672 {
3673 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3674 stub_name = bfd_malloc (len);
3675 if (stub_name == NULL)
3676 return stub_name;
3677
3678 len = sprintf (stub_name, "%08x.%x:%x+%x",
3679 input_section->id & 0xffffffff,
3680 sym_sec->id & 0xffffffff,
3681 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3682 (int) rel->r_addend & 0xffffffff);
3683 }
3684 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3685 stub_name[len - 2] = 0;
3686 return stub_name;
3687 }
3688
3689 /* Look up an entry in the stub hash. Stub entries are cached because
3690 creating the stub name takes a bit of time. */
3691
3692 static struct ppc_stub_hash_entry *
3693 ppc_get_stub_entry (const asection *input_section,
3694 const asection *sym_sec,
3695 struct ppc_link_hash_entry *h,
3696 const Elf_Internal_Rela *rel,
3697 struct ppc_link_hash_table *htab)
3698 {
3699 struct ppc_stub_hash_entry *stub_entry;
3700 struct map_stub *group;
3701
3702 /* If this input section is part of a group of sections sharing one
3703 stub section, then use the id of the first section in the group.
3704 Stub names need to include a section id, as there may well be
3705 more than one stub used to reach say, printf, and we need to
3706 distinguish between them. */
3707 group = htab->sec_info[input_section->id].u.group;
3708 if (group == NULL)
3709 return NULL;
3710
3711 if (h != NULL && h->u.stub_cache != NULL
3712 && h->u.stub_cache->h == h
3713 && h->u.stub_cache->group == group)
3714 {
3715 stub_entry = h->u.stub_cache;
3716 }
3717 else
3718 {
3719 char *stub_name;
3720
3721 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3722 if (stub_name == NULL)
3723 return NULL;
3724
3725 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3726 stub_name, FALSE, FALSE);
3727 if (h != NULL)
3728 h->u.stub_cache = stub_entry;
3729
3730 free (stub_name);
3731 }
3732
3733 return stub_entry;
3734 }
3735
3736 /* Add a new stub entry to the stub hash. Not all fields of the new
3737 stub entry are initialised. */
3738
3739 static struct ppc_stub_hash_entry *
3740 ppc_add_stub (const char *stub_name,
3741 asection *section,
3742 struct bfd_link_info *info)
3743 {
3744 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3745 struct map_stub *group;
3746 asection *link_sec;
3747 asection *stub_sec;
3748 struct ppc_stub_hash_entry *stub_entry;
3749
3750 group = htab->sec_info[section->id].u.group;
3751 link_sec = group->link_sec;
3752 stub_sec = group->stub_sec;
3753 if (stub_sec == NULL)
3754 {
3755 size_t namelen;
3756 bfd_size_type len;
3757 char *s_name;
3758
3759 namelen = strlen (link_sec->name);
3760 len = namelen + sizeof (STUB_SUFFIX);
3761 s_name = bfd_alloc (htab->params->stub_bfd, len);
3762 if (s_name == NULL)
3763 return NULL;
3764
3765 memcpy (s_name, link_sec->name, namelen);
3766 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3767 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3768 if (stub_sec == NULL)
3769 return NULL;
3770 group->stub_sec = stub_sec;
3771 }
3772
3773 /* Enter this entry into the linker stub hash table. */
3774 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3775 TRUE, FALSE);
3776 if (stub_entry == NULL)
3777 {
3778 /* xgettext:c-format */
3779 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3780 section->owner, stub_name);
3781 return NULL;
3782 }
3783
3784 stub_entry->group = group;
3785 stub_entry->stub_offset = 0;
3786 return stub_entry;
3787 }
3788
3789 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3790 not already done. */
3791
3792 static bfd_boolean
3793 create_got_section (bfd *abfd, struct bfd_link_info *info)
3794 {
3795 asection *got, *relgot;
3796 flagword flags;
3797 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3798
3799 if (!is_ppc64_elf (abfd))
3800 return FALSE;
3801 if (htab == NULL)
3802 return FALSE;
3803
3804 if (!htab->elf.sgot
3805 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3806 return FALSE;
3807
3808 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3809 | SEC_LINKER_CREATED);
3810
3811 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3812 if (!got
3813 || !bfd_set_section_alignment (got, 3))
3814 return FALSE;
3815
3816 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3817 flags | SEC_READONLY);
3818 if (!relgot
3819 || !bfd_set_section_alignment (relgot, 3))
3820 return FALSE;
3821
3822 ppc64_elf_tdata (abfd)->got = got;
3823 ppc64_elf_tdata (abfd)->relgot = relgot;
3824 return TRUE;
3825 }
3826
3827 /* Follow indirect and warning symbol links. */
3828
3829 static inline struct bfd_link_hash_entry *
3830 follow_link (struct bfd_link_hash_entry *h)
3831 {
3832 while (h->type == bfd_link_hash_indirect
3833 || h->type == bfd_link_hash_warning)
3834 h = h->u.i.link;
3835 return h;
3836 }
3837
3838 static inline struct elf_link_hash_entry *
3839 elf_follow_link (struct elf_link_hash_entry *h)
3840 {
3841 return (struct elf_link_hash_entry *) follow_link (&h->root);
3842 }
3843
3844 static inline struct ppc_link_hash_entry *
3845 ppc_follow_link (struct ppc_link_hash_entry *h)
3846 {
3847 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
3848 }
3849
3850 /* Merge PLT info on FROM with that on TO. */
3851
3852 static void
3853 move_plt_plist (struct ppc_link_hash_entry *from,
3854 struct ppc_link_hash_entry *to)
3855 {
3856 if (from->elf.plt.plist != NULL)
3857 {
3858 if (to->elf.plt.plist != NULL)
3859 {
3860 struct plt_entry **entp;
3861 struct plt_entry *ent;
3862
3863 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3864 {
3865 struct plt_entry *dent;
3866
3867 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3868 if (dent->addend == ent->addend)
3869 {
3870 dent->plt.refcount += ent->plt.refcount;
3871 *entp = ent->next;
3872 break;
3873 }
3874 if (dent == NULL)
3875 entp = &ent->next;
3876 }
3877 *entp = to->elf.plt.plist;
3878 }
3879
3880 to->elf.plt.plist = from->elf.plt.plist;
3881 from->elf.plt.plist = NULL;
3882 }
3883 }
3884
3885 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3886
3887 static void
3888 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3889 struct elf_link_hash_entry *dir,
3890 struct elf_link_hash_entry *ind)
3891 {
3892 struct ppc_link_hash_entry *edir, *eind;
3893
3894 edir = ppc_elf_hash_entry (dir);
3895 eind = ppc_elf_hash_entry (ind);
3896
3897 edir->is_func |= eind->is_func;
3898 edir->is_func_descriptor |= eind->is_func_descriptor;
3899 edir->tls_mask |= eind->tls_mask;
3900 if (eind->oh != NULL)
3901 edir->oh = ppc_follow_link (eind->oh);
3902
3903 if (edir->elf.versioned != versioned_hidden)
3904 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3905 edir->elf.ref_regular |= eind->elf.ref_regular;
3906 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3907 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3908 edir->elf.needs_plt |= eind->elf.needs_plt;
3909 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3910
3911 /* If we were called to copy over info for a weak sym, don't copy
3912 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3913 in order to simplify readonly_dynrelocs and save a field in the
3914 symbol hash entry, but that means dyn_relocs can't be used in any
3915 tests about a specific symbol, or affect other symbol flags which
3916 are then tested. */
3917 if (eind->elf.root.type != bfd_link_hash_indirect)
3918 return;
3919
3920 /* Copy over any dynamic relocs we may have on the indirect sym. */
3921 if (ind->dyn_relocs != NULL)
3922 {
3923 if (dir->dyn_relocs != NULL)
3924 {
3925 struct elf_dyn_relocs **pp;
3926 struct elf_dyn_relocs *p;
3927
3928 /* Add reloc counts against the indirect sym to the direct sym
3929 list. Merge any entries against the same section. */
3930 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3931 {
3932 struct elf_dyn_relocs *q;
3933
3934 for (q = dir->dyn_relocs; q != NULL; q = q->next)
3935 if (q->sec == p->sec)
3936 {
3937 q->pc_count += p->pc_count;
3938 q->count += p->count;
3939 *pp = p->next;
3940 break;
3941 }
3942 if (q == NULL)
3943 pp = &p->next;
3944 }
3945 *pp = dir->dyn_relocs;
3946 }
3947
3948 dir->dyn_relocs = ind->dyn_relocs;
3949 ind->dyn_relocs = NULL;
3950 }
3951
3952 /* Copy over got entries that we may have already seen to the
3953 symbol which just became indirect. */
3954 if (eind->elf.got.glist != NULL)
3955 {
3956 if (edir->elf.got.glist != NULL)
3957 {
3958 struct got_entry **entp;
3959 struct got_entry *ent;
3960
3961 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3962 {
3963 struct got_entry *dent;
3964
3965 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3966 if (dent->addend == ent->addend
3967 && dent->owner == ent->owner
3968 && dent->tls_type == ent->tls_type)
3969 {
3970 dent->got.refcount += ent->got.refcount;
3971 *entp = ent->next;
3972 break;
3973 }
3974 if (dent == NULL)
3975 entp = &ent->next;
3976 }
3977 *entp = edir->elf.got.glist;
3978 }
3979
3980 edir->elf.got.glist = eind->elf.got.glist;
3981 eind->elf.got.glist = NULL;
3982 }
3983
3984 /* And plt entries. */
3985 move_plt_plist (eind, edir);
3986
3987 if (eind->elf.dynindx != -1)
3988 {
3989 if (edir->elf.dynindx != -1)
3990 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3991 edir->elf.dynstr_index);
3992 edir->elf.dynindx = eind->elf.dynindx;
3993 edir->elf.dynstr_index = eind->elf.dynstr_index;
3994 eind->elf.dynindx = -1;
3995 eind->elf.dynstr_index = 0;
3996 }
3997 }
3998
3999 /* Find the function descriptor hash entry from the given function code
4000 hash entry FH. Link the entries via their OH fields. */
4001
4002 static struct ppc_link_hash_entry *
4003 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4004 {
4005 struct ppc_link_hash_entry *fdh = fh->oh;
4006
4007 if (fdh == NULL)
4008 {
4009 const char *fd_name = fh->elf.root.root.string + 1;
4010
4011 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4012 FALSE, FALSE, FALSE));
4013 if (fdh == NULL)
4014 return fdh;
4015
4016 fdh->is_func_descriptor = 1;
4017 fdh->oh = fh;
4018 fh->is_func = 1;
4019 fh->oh = fdh;
4020 }
4021
4022 fdh = ppc_follow_link (fdh);
4023 fdh->is_func_descriptor = 1;
4024 fdh->oh = fh;
4025 return fdh;
4026 }
4027
4028 /* Make a fake function descriptor sym for the undefined code sym FH. */
4029
4030 static struct ppc_link_hash_entry *
4031 make_fdh (struct bfd_link_info *info,
4032 struct ppc_link_hash_entry *fh)
4033 {
4034 bfd *abfd = fh->elf.root.u.undef.abfd;
4035 struct bfd_link_hash_entry *bh = NULL;
4036 struct ppc_link_hash_entry *fdh;
4037 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4038 ? BSF_WEAK
4039 : BSF_GLOBAL);
4040
4041 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4042 fh->elf.root.root.string + 1,
4043 flags, bfd_und_section_ptr, 0,
4044 NULL, FALSE, FALSE, &bh))
4045 return NULL;
4046
4047 fdh = (struct ppc_link_hash_entry *) bh;
4048 fdh->elf.non_elf = 0;
4049 fdh->fake = 1;
4050 fdh->is_func_descriptor = 1;
4051 fdh->oh = fh;
4052 fh->is_func = 1;
4053 fh->oh = fdh;
4054 return fdh;
4055 }
4056
4057 /* Fix function descriptor symbols defined in .opd sections to be
4058 function type. */
4059
4060 static bfd_boolean
4061 ppc64_elf_add_symbol_hook (bfd *ibfd,
4062 struct bfd_link_info *info,
4063 Elf_Internal_Sym *isym,
4064 const char **name,
4065 flagword *flags ATTRIBUTE_UNUSED,
4066 asection **sec,
4067 bfd_vma *value)
4068 {
4069 if (*sec != NULL
4070 && strcmp ((*sec)->name, ".opd") == 0)
4071 {
4072 asection *code_sec;
4073
4074 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4075 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4076 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4077
4078 /* If the symbol is a function defined in .opd, and the function
4079 code is in a discarded group, let it appear to be undefined. */
4080 if (!bfd_link_relocatable (info)
4081 && (*sec)->reloc_count != 0
4082 && opd_entry_value (*sec, *value, &code_sec, NULL,
4083 FALSE) != (bfd_vma) -1
4084 && discarded_section (code_sec))
4085 {
4086 *sec = bfd_und_section_ptr;
4087 isym->st_shndx = SHN_UNDEF;
4088 }
4089 }
4090 else if (*sec != NULL
4091 && strcmp ((*sec)->name, ".toc") == 0
4092 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4093 {
4094 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4095 if (htab != NULL)
4096 htab->params->object_in_toc = 1;
4097 }
4098
4099 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4100 {
4101 if (abiversion (ibfd) == 0)
4102 set_abiversion (ibfd, 2);
4103 else if (abiversion (ibfd) == 1)
4104 {
4105 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4106 " for ABI version 1"), *name);
4107 bfd_set_error (bfd_error_bad_value);
4108 return FALSE;
4109 }
4110 }
4111
4112 return TRUE;
4113 }
4114
4115 /* Merge non-visibility st_other attributes: local entry point. */
4116
4117 static void
4118 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4119 const Elf_Internal_Sym *isym,
4120 bfd_boolean definition,
4121 bfd_boolean dynamic)
4122 {
4123 if (definition && (!dynamic || !h->def_regular))
4124 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4125 | ELF_ST_VISIBILITY (h->other));
4126 }
4127
4128 /* Hook called on merging a symbol. We use this to clear "fake" since
4129 we now have a real symbol. */
4130
4131 static bfd_boolean
4132 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4133 const Elf_Internal_Sym *isym,
4134 asection **psec ATTRIBUTE_UNUSED,
4135 bfd_boolean newdef ATTRIBUTE_UNUSED,
4136 bfd_boolean olddef ATTRIBUTE_UNUSED,
4137 bfd *oldbfd ATTRIBUTE_UNUSED,
4138 const asection *oldsec ATTRIBUTE_UNUSED)
4139 {
4140 ppc_elf_hash_entry (h)->fake = 0;
4141 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4142 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
4143 return TRUE;
4144 }
4145
4146 /* This function makes an old ABI object reference to ".bar" cause the
4147 inclusion of a new ABI object archive that defines "bar".
4148 NAME is a symbol defined in an archive. Return a symbol in the hash
4149 table that might be satisfied by the archive symbols. */
4150
4151 static struct elf_link_hash_entry *
4152 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4153 struct bfd_link_info *info,
4154 const char *name)
4155 {
4156 struct elf_link_hash_entry *h;
4157 char *dot_name;
4158 size_t len;
4159
4160 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4161 if (h != NULL
4162 /* Don't return this sym if it is a fake function descriptor
4163 created by add_symbol_adjust. */
4164 && !ppc_elf_hash_entry (h)->fake)
4165 return h;
4166
4167 if (name[0] == '.')
4168 return h;
4169
4170 len = strlen (name);
4171 dot_name = bfd_alloc (abfd, len + 2);
4172 if (dot_name == NULL)
4173 return (struct elf_link_hash_entry *) -1;
4174 dot_name[0] = '.';
4175 memcpy (dot_name + 1, name, len + 1);
4176 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4177 bfd_release (abfd, dot_name);
4178 if (h != NULL)
4179 return h;
4180
4181 if (strcmp (name, "__tls_get_addr_opt") == 0)
4182 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
4183 return h;
4184 }
4185
4186 /* This function satisfies all old ABI object references to ".bar" if a
4187 new ABI object defines "bar". Well, at least, undefined dot symbols
4188 are made weak. This stops later archive searches from including an
4189 object if we already have a function descriptor definition. It also
4190 prevents the linker complaining about undefined symbols.
4191 We also check and correct mismatched symbol visibility here. The
4192 most restrictive visibility of the function descriptor and the
4193 function entry symbol is used. */
4194
4195 static bfd_boolean
4196 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4197 {
4198 struct ppc_link_hash_table *htab;
4199 struct ppc_link_hash_entry *fdh;
4200
4201 if (eh->elf.root.type == bfd_link_hash_warning)
4202 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4203
4204 if (eh->elf.root.type == bfd_link_hash_indirect)
4205 return TRUE;
4206
4207 if (eh->elf.root.root.string[0] != '.')
4208 abort ();
4209
4210 htab = ppc_hash_table (info);
4211 if (htab == NULL)
4212 return FALSE;
4213
4214 fdh = lookup_fdh (eh, htab);
4215 if (fdh == NULL
4216 && !bfd_link_relocatable (info)
4217 && (eh->elf.root.type == bfd_link_hash_undefined
4218 || eh->elf.root.type == bfd_link_hash_undefweak)
4219 && eh->elf.ref_regular)
4220 {
4221 /* Make an undefined function descriptor sym, in order to
4222 pull in an --as-needed shared lib. Archives are handled
4223 elsewhere. */
4224 fdh = make_fdh (info, eh);
4225 if (fdh == NULL)
4226 return FALSE;
4227 }
4228
4229 if (fdh != NULL)
4230 {
4231 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4232 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4233
4234 /* Make both descriptor and entry symbol have the most
4235 constraining visibility of either symbol. */
4236 if (entry_vis < descr_vis)
4237 fdh->elf.other += entry_vis - descr_vis;
4238 else if (entry_vis > descr_vis)
4239 eh->elf.other += descr_vis - entry_vis;
4240
4241 /* Propagate reference flags from entry symbol to function
4242 descriptor symbol. */
4243 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4244 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4245 fdh->elf.ref_regular |= eh->elf.ref_regular;
4246 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4247
4248 if (!fdh->elf.forced_local
4249 && fdh->elf.dynindx == -1
4250 && fdh->elf.versioned != versioned_hidden
4251 && (bfd_link_dll (info)
4252 || fdh->elf.def_dynamic
4253 || fdh->elf.ref_dynamic)
4254 && (eh->elf.ref_regular
4255 || eh->elf.def_regular))
4256 {
4257 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4258 return FALSE;
4259 }
4260 }
4261
4262 return TRUE;
4263 }
4264
4265 /* Set up opd section info and abiversion for IBFD, and process list
4266 of dot-symbols we made in link_hash_newfunc. */
4267
4268 static bfd_boolean
4269 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4270 {
4271 struct ppc_link_hash_table *htab;
4272 struct ppc_link_hash_entry **p, *eh;
4273 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4274
4275 if (opd != NULL && opd->size != 0)
4276 {
4277 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4278 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4279
4280 if (abiversion (ibfd) == 0)
4281 set_abiversion (ibfd, 1);
4282 else if (abiversion (ibfd) >= 2)
4283 {
4284 /* xgettext:c-format */
4285 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4286 ibfd, abiversion (ibfd));
4287 bfd_set_error (bfd_error_bad_value);
4288 return FALSE;
4289 }
4290 }
4291
4292 if (is_ppc64_elf (info->output_bfd))
4293 {
4294 /* For input files without an explicit abiversion in e_flags
4295 we should have flagged any with symbol st_other bits set
4296 as ELFv1 and above flagged those with .opd as ELFv2.
4297 Set the output abiversion if not yet set, and for any input
4298 still ambiguous, take its abiversion from the output.
4299 Differences in ABI are reported later. */
4300 if (abiversion (info->output_bfd) == 0)
4301 set_abiversion (info->output_bfd, abiversion (ibfd));
4302 else if (abiversion (ibfd) == 0)
4303 set_abiversion (ibfd, abiversion (info->output_bfd));
4304 }
4305
4306 htab = ppc_hash_table (info);
4307 if (htab == NULL)
4308 return TRUE;
4309
4310 if (opd != NULL && opd->size != 0
4311 && (ibfd->flags & DYNAMIC) == 0
4312 && (opd->flags & SEC_RELOC) != 0
4313 && opd->reloc_count != 0
4314 && !bfd_is_abs_section (opd->output_section)
4315 && info->gc_sections)
4316 {
4317 /* Garbage collection needs some extra help with .opd sections.
4318 We don't want to necessarily keep everything referenced by
4319 relocs in .opd, as that would keep all functions. Instead,
4320 if we reference an .opd symbol (a function descriptor), we
4321 want to keep the function code symbol's section. This is
4322 easy for global symbols, but for local syms we need to keep
4323 information about the associated function section. */
4324 bfd_size_type amt;
4325 asection **opd_sym_map;
4326 Elf_Internal_Shdr *symtab_hdr;
4327 Elf_Internal_Rela *relocs, *rel_end, *rel;
4328
4329 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4330 opd_sym_map = bfd_zalloc (ibfd, amt);
4331 if (opd_sym_map == NULL)
4332 return FALSE;
4333 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4334 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4335 info->keep_memory);
4336 if (relocs == NULL)
4337 return FALSE;
4338 symtab_hdr = &elf_symtab_hdr (ibfd);
4339 rel_end = relocs + opd->reloc_count - 1;
4340 for (rel = relocs; rel < rel_end; rel++)
4341 {
4342 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4343 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4344
4345 if (r_type == R_PPC64_ADDR64
4346 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4347 && r_symndx < symtab_hdr->sh_info)
4348 {
4349 Elf_Internal_Sym *isym;
4350 asection *s;
4351
4352 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4353 if (isym == NULL)
4354 {
4355 if (elf_section_data (opd)->relocs != relocs)
4356 free (relocs);
4357 return FALSE;
4358 }
4359
4360 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4361 if (s != NULL && s != opd)
4362 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4363 }
4364 }
4365 if (elf_section_data (opd)->relocs != relocs)
4366 free (relocs);
4367 }
4368
4369 p = &htab->dot_syms;
4370 while ((eh = *p) != NULL)
4371 {
4372 *p = NULL;
4373 if (&eh->elf == htab->elf.hgot)
4374 ;
4375 else if (htab->elf.hgot == NULL
4376 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4377 htab->elf.hgot = &eh->elf;
4378 else if (abiversion (ibfd) <= 1)
4379 {
4380 htab->need_func_desc_adj = 1;
4381 if (!add_symbol_adjust (eh, info))
4382 return FALSE;
4383 }
4384 p = &eh->u.next_dot_sym;
4385 }
4386 return TRUE;
4387 }
4388
4389 /* Undo hash table changes when an --as-needed input file is determined
4390 not to be needed. */
4391
4392 static bfd_boolean
4393 ppc64_elf_notice_as_needed (bfd *ibfd,
4394 struct bfd_link_info *info,
4395 enum notice_asneeded_action act)
4396 {
4397 if (act == notice_not_needed)
4398 {
4399 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4400
4401 if (htab == NULL)
4402 return FALSE;
4403
4404 htab->dot_syms = NULL;
4405 }
4406 return _bfd_elf_notice_as_needed (ibfd, info, act);
4407 }
4408
4409 /* If --just-symbols against a final linked binary, then assume we need
4410 toc adjusting stubs when calling functions defined there. */
4411
4412 static void
4413 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4414 {
4415 if ((sec->flags & SEC_CODE) != 0
4416 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4417 && is_ppc64_elf (sec->owner))
4418 {
4419 if (abiversion (sec->owner) >= 2
4420 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4421 sec->has_toc_reloc = 1;
4422 }
4423 _bfd_elf_link_just_syms (sec, info);
4424 }
4425
4426 static struct plt_entry **
4427 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4428 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4429 {
4430 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4431 struct plt_entry **local_plt;
4432 unsigned char *local_got_tls_masks;
4433
4434 if (local_got_ents == NULL)
4435 {
4436 bfd_size_type size = symtab_hdr->sh_info;
4437
4438 size *= (sizeof (*local_got_ents)
4439 + sizeof (*local_plt)
4440 + sizeof (*local_got_tls_masks));
4441 local_got_ents = bfd_zalloc (abfd, size);
4442 if (local_got_ents == NULL)
4443 return NULL;
4444 elf_local_got_ents (abfd) = local_got_ents;
4445 }
4446
4447 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4448 {
4449 struct got_entry *ent;
4450
4451 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4452 if (ent->addend == r_addend
4453 && ent->owner == abfd
4454 && ent->tls_type == tls_type)
4455 break;
4456 if (ent == NULL)
4457 {
4458 size_t amt = sizeof (*ent);
4459 ent = bfd_alloc (abfd, amt);
4460 if (ent == NULL)
4461 return FALSE;
4462 ent->next = local_got_ents[r_symndx];
4463 ent->addend = r_addend;
4464 ent->owner = abfd;
4465 ent->tls_type = tls_type;
4466 ent->is_indirect = FALSE;
4467 ent->got.refcount = 0;
4468 local_got_ents[r_symndx] = ent;
4469 }
4470 ent->got.refcount += 1;
4471 }
4472
4473 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4474 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4475 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4476
4477 return local_plt + r_symndx;
4478 }
4479
4480 static bfd_boolean
4481 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4482 {
4483 struct plt_entry *ent;
4484
4485 for (ent = *plist; ent != NULL; ent = ent->next)
4486 if (ent->addend == addend)
4487 break;
4488 if (ent == NULL)
4489 {
4490 size_t amt = sizeof (*ent);
4491 ent = bfd_alloc (abfd, amt);
4492 if (ent == NULL)
4493 return FALSE;
4494 ent->next = *plist;
4495 ent->addend = addend;
4496 ent->plt.refcount = 0;
4497 *plist = ent;
4498 }
4499 ent->plt.refcount += 1;
4500 return TRUE;
4501 }
4502
4503 static bfd_boolean
4504 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4505 {
4506 return (r_type == R_PPC64_REL24
4507 || r_type == R_PPC64_REL24_NOTOC
4508 || r_type == R_PPC64_REL14
4509 || r_type == R_PPC64_REL14_BRTAKEN
4510 || r_type == R_PPC64_REL14_BRNTAKEN
4511 || r_type == R_PPC64_ADDR24
4512 || r_type == R_PPC64_ADDR14
4513 || r_type == R_PPC64_ADDR14_BRTAKEN
4514 || r_type == R_PPC64_ADDR14_BRNTAKEN
4515 || r_type == R_PPC64_PLTCALL
4516 || r_type == R_PPC64_PLTCALL_NOTOC);
4517 }
4518
4519 /* Relocs on inline plt call sequence insns prior to the call. */
4520
4521 static bfd_boolean
4522 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4523 {
4524 return (r_type == R_PPC64_PLT16_HA
4525 || r_type == R_PPC64_PLT16_HI
4526 || r_type == R_PPC64_PLT16_LO
4527 || r_type == R_PPC64_PLT16_LO_DS
4528 || r_type == R_PPC64_PLT_PCREL34
4529 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4530 || r_type == R_PPC64_PLTSEQ
4531 || r_type == R_PPC64_PLTSEQ_NOTOC);
4532 }
4533
4534 /* Look through the relocs for a section during the first phase, and
4535 calculate needed space in the global offset table, procedure
4536 linkage table, and dynamic reloc sections. */
4537
4538 static bfd_boolean
4539 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4540 asection *sec, const Elf_Internal_Rela *relocs)
4541 {
4542 struct ppc_link_hash_table *htab;
4543 Elf_Internal_Shdr *symtab_hdr;
4544 struct elf_link_hash_entry **sym_hashes;
4545 const Elf_Internal_Rela *rel;
4546 const Elf_Internal_Rela *rel_end;
4547 asection *sreloc;
4548 struct elf_link_hash_entry *tga, *dottga;
4549 bfd_boolean is_opd;
4550
4551 if (bfd_link_relocatable (info))
4552 return TRUE;
4553
4554 BFD_ASSERT (is_ppc64_elf (abfd));
4555
4556 htab = ppc_hash_table (info);
4557 if (htab == NULL)
4558 return FALSE;
4559
4560 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4561 FALSE, FALSE, TRUE);
4562 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4563 FALSE, FALSE, TRUE);
4564 symtab_hdr = &elf_symtab_hdr (abfd);
4565 sym_hashes = elf_sym_hashes (abfd);
4566 sreloc = NULL;
4567 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4568 rel_end = relocs + sec->reloc_count;
4569 for (rel = relocs; rel < rel_end; rel++)
4570 {
4571 unsigned long r_symndx;
4572 struct elf_link_hash_entry *h;
4573 enum elf_ppc64_reloc_type r_type;
4574 int tls_type;
4575 struct _ppc64_elf_section_data *ppc64_sec;
4576 struct plt_entry **ifunc, **plt_list;
4577
4578 r_symndx = ELF64_R_SYM (rel->r_info);
4579 if (r_symndx < symtab_hdr->sh_info)
4580 h = NULL;
4581 else
4582 {
4583 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4584 h = elf_follow_link (h);
4585
4586 if (h == htab->elf.hgot)
4587 sec->has_toc_reloc = 1;
4588 }
4589
4590 r_type = ELF64_R_TYPE (rel->r_info);
4591 switch (r_type)
4592 {
4593 case R_PPC64_D34:
4594 case R_PPC64_D34_LO:
4595 case R_PPC64_D34_HI30:
4596 case R_PPC64_D34_HA30:
4597 case R_PPC64_D28:
4598 case R_PPC64_TPREL34:
4599 case R_PPC64_DTPREL34:
4600 case R_PPC64_PCREL34:
4601 case R_PPC64_GOT_PCREL34:
4602 case R_PPC64_GOT_TLSGD_PCREL34:
4603 case R_PPC64_GOT_TLSLD_PCREL34:
4604 case R_PPC64_GOT_TPREL_PCREL34:
4605 case R_PPC64_GOT_DTPREL_PCREL34:
4606 case R_PPC64_PLT_PCREL34:
4607 case R_PPC64_PLT_PCREL34_NOTOC:
4608 case R_PPC64_PCREL28:
4609 htab->power10_stubs = 1;
4610 break;
4611 default:
4612 break;
4613 }
4614
4615 switch (r_type)
4616 {
4617 case R_PPC64_PLT16_HA:
4618 case R_PPC64_GOT_TLSLD16_HA:
4619 case R_PPC64_GOT_TLSGD16_HA:
4620 case R_PPC64_GOT_TPREL16_HA:
4621 case R_PPC64_GOT_DTPREL16_HA:
4622 case R_PPC64_GOT16_HA:
4623 case R_PPC64_TOC16_HA:
4624 case R_PPC64_PLT16_LO:
4625 case R_PPC64_PLT16_LO_DS:
4626 case R_PPC64_GOT_TLSLD16_LO:
4627 case R_PPC64_GOT_TLSGD16_LO:
4628 case R_PPC64_GOT_TPREL16_LO_DS:
4629 case R_PPC64_GOT_DTPREL16_LO_DS:
4630 case R_PPC64_GOT16_LO:
4631 case R_PPC64_GOT16_LO_DS:
4632 case R_PPC64_TOC16_LO:
4633 case R_PPC64_TOC16_LO_DS:
4634 case R_PPC64_GOT_PCREL34:
4635 ppc64_elf_tdata (abfd)->has_optrel = 1;
4636 ppc64_elf_section_data (sec)->has_optrel = 1;
4637 break;
4638 default:
4639 break;
4640 }
4641
4642 ifunc = NULL;
4643 if (h != NULL)
4644 {
4645 if (h->type == STT_GNU_IFUNC)
4646 {
4647 h->needs_plt = 1;
4648 ifunc = &h->plt.plist;
4649 }
4650 }
4651 else
4652 {
4653 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4654 abfd, r_symndx);
4655 if (isym == NULL)
4656 return FALSE;
4657
4658 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4659 {
4660 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4661 rel->r_addend,
4662 NON_GOT | PLT_IFUNC);
4663 if (ifunc == NULL)
4664 return FALSE;
4665 }
4666 }
4667
4668 tls_type = 0;
4669 switch (r_type)
4670 {
4671 case R_PPC64_TLSGD:
4672 case R_PPC64_TLSLD:
4673 /* These special tls relocs tie a call to __tls_get_addr with
4674 its parameter symbol. */
4675 if (h != NULL)
4676 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4677 else
4678 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4679 rel->r_addend,
4680 NON_GOT | TLS_TLS | TLS_MARK))
4681 return FALSE;
4682 sec->has_tls_reloc = 1;
4683 break;
4684
4685 case R_PPC64_GOT_TLSLD16:
4686 case R_PPC64_GOT_TLSLD16_LO:
4687 case R_PPC64_GOT_TLSLD16_HI:
4688 case R_PPC64_GOT_TLSLD16_HA:
4689 case R_PPC64_GOT_TLSLD_PCREL34:
4690 tls_type = TLS_TLS | TLS_LD;
4691 goto dogottls;
4692
4693 case R_PPC64_GOT_TLSGD16:
4694 case R_PPC64_GOT_TLSGD16_LO:
4695 case R_PPC64_GOT_TLSGD16_HI:
4696 case R_PPC64_GOT_TLSGD16_HA:
4697 case R_PPC64_GOT_TLSGD_PCREL34:
4698 tls_type = TLS_TLS | TLS_GD;
4699 goto dogottls;
4700
4701 case R_PPC64_GOT_TPREL16_DS:
4702 case R_PPC64_GOT_TPREL16_LO_DS:
4703 case R_PPC64_GOT_TPREL16_HI:
4704 case R_PPC64_GOT_TPREL16_HA:
4705 case R_PPC64_GOT_TPREL_PCREL34:
4706 if (bfd_link_dll (info))
4707 info->flags |= DF_STATIC_TLS;
4708 tls_type = TLS_TLS | TLS_TPREL;
4709 goto dogottls;
4710
4711 case R_PPC64_GOT_DTPREL16_DS:
4712 case R_PPC64_GOT_DTPREL16_LO_DS:
4713 case R_PPC64_GOT_DTPREL16_HI:
4714 case R_PPC64_GOT_DTPREL16_HA:
4715 case R_PPC64_GOT_DTPREL_PCREL34:
4716 tls_type = TLS_TLS | TLS_DTPREL;
4717 dogottls:
4718 sec->has_tls_reloc = 1;
4719 goto dogot;
4720
4721 case R_PPC64_GOT16:
4722 case R_PPC64_GOT16_LO:
4723 case R_PPC64_GOT16_HI:
4724 case R_PPC64_GOT16_HA:
4725 case R_PPC64_GOT16_DS:
4726 case R_PPC64_GOT16_LO_DS:
4727 case R_PPC64_GOT_PCREL34:
4728 dogot:
4729 /* This symbol requires a global offset table entry. */
4730 sec->has_toc_reloc = 1;
4731 if (r_type == R_PPC64_GOT_TLSLD16
4732 || r_type == R_PPC64_GOT_TLSGD16
4733 || r_type == R_PPC64_GOT_TPREL16_DS
4734 || r_type == R_PPC64_GOT_DTPREL16_DS
4735 || r_type == R_PPC64_GOT16
4736 || r_type == R_PPC64_GOT16_DS)
4737 {
4738 htab->do_multi_toc = 1;
4739 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4740 }
4741
4742 if (ppc64_elf_tdata (abfd)->got == NULL
4743 && !create_got_section (abfd, info))
4744 return FALSE;
4745
4746 if (h != NULL)
4747 {
4748 struct ppc_link_hash_entry *eh;
4749 struct got_entry *ent;
4750
4751 eh = ppc_elf_hash_entry (h);
4752 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4753 if (ent->addend == rel->r_addend
4754 && ent->owner == abfd
4755 && ent->tls_type == tls_type)
4756 break;
4757 if (ent == NULL)
4758 {
4759 size_t amt = sizeof (*ent);
4760 ent = bfd_alloc (abfd, amt);
4761 if (ent == NULL)
4762 return FALSE;
4763 ent->next = eh->elf.got.glist;
4764 ent->addend = rel->r_addend;
4765 ent->owner = abfd;
4766 ent->tls_type = tls_type;
4767 ent->is_indirect = FALSE;
4768 ent->got.refcount = 0;
4769 eh->elf.got.glist = ent;
4770 }
4771 ent->got.refcount += 1;
4772 eh->tls_mask |= tls_type;
4773 }
4774 else
4775 /* This is a global offset table entry for a local symbol. */
4776 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4777 rel->r_addend, tls_type))
4778 return FALSE;
4779 break;
4780
4781 case R_PPC64_PLT16_HA:
4782 case R_PPC64_PLT16_HI:
4783 case R_PPC64_PLT16_LO:
4784 case R_PPC64_PLT16_LO_DS:
4785 case R_PPC64_PLT_PCREL34:
4786 case R_PPC64_PLT_PCREL34_NOTOC:
4787 case R_PPC64_PLT32:
4788 case R_PPC64_PLT64:
4789 /* This symbol requires a procedure linkage table entry. */
4790 plt_list = ifunc;
4791 if (h != NULL)
4792 {
4793 h->needs_plt = 1;
4794 if (h->root.root.string[0] == '.'
4795 && h->root.root.string[1] != '\0')
4796 ppc_elf_hash_entry (h)->is_func = 1;
4797 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
4798 plt_list = &h->plt.plist;
4799 }
4800 if (plt_list == NULL)
4801 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4802 rel->r_addend,
4803 NON_GOT | PLT_KEEP);
4804 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4805 return FALSE;
4806 break;
4807
4808 /* The following relocations don't need to propagate the
4809 relocation if linking a shared object since they are
4810 section relative. */
4811 case R_PPC64_SECTOFF:
4812 case R_PPC64_SECTOFF_LO:
4813 case R_PPC64_SECTOFF_HI:
4814 case R_PPC64_SECTOFF_HA:
4815 case R_PPC64_SECTOFF_DS:
4816 case R_PPC64_SECTOFF_LO_DS:
4817 case R_PPC64_DTPREL16:
4818 case R_PPC64_DTPREL16_LO:
4819 case R_PPC64_DTPREL16_HI:
4820 case R_PPC64_DTPREL16_HA:
4821 case R_PPC64_DTPREL16_DS:
4822 case R_PPC64_DTPREL16_LO_DS:
4823 case R_PPC64_DTPREL16_HIGH:
4824 case R_PPC64_DTPREL16_HIGHA:
4825 case R_PPC64_DTPREL16_HIGHER:
4826 case R_PPC64_DTPREL16_HIGHERA:
4827 case R_PPC64_DTPREL16_HIGHEST:
4828 case R_PPC64_DTPREL16_HIGHESTA:
4829 break;
4830
4831 /* Nor do these. */
4832 case R_PPC64_REL16:
4833 case R_PPC64_REL16_LO:
4834 case R_PPC64_REL16_HI:
4835 case R_PPC64_REL16_HA:
4836 case R_PPC64_REL16_HIGH:
4837 case R_PPC64_REL16_HIGHA:
4838 case R_PPC64_REL16_HIGHER:
4839 case R_PPC64_REL16_HIGHERA:
4840 case R_PPC64_REL16_HIGHEST:
4841 case R_PPC64_REL16_HIGHESTA:
4842 case R_PPC64_REL16_HIGHER34:
4843 case R_PPC64_REL16_HIGHERA34:
4844 case R_PPC64_REL16_HIGHEST34:
4845 case R_PPC64_REL16_HIGHESTA34:
4846 case R_PPC64_REL16DX_HA:
4847 break;
4848
4849 /* Not supported as a dynamic relocation. */
4850 case R_PPC64_ADDR64_LOCAL:
4851 if (bfd_link_pic (info))
4852 {
4853 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4854 ppc_howto_init ();
4855 /* xgettext:c-format */
4856 info->callbacks->einfo (_("%H: %s reloc unsupported "
4857 "in shared libraries and PIEs\n"),
4858 abfd, sec, rel->r_offset,
4859 ppc64_elf_howto_table[r_type]->name);
4860 bfd_set_error (bfd_error_bad_value);
4861 return FALSE;
4862 }
4863 break;
4864
4865 case R_PPC64_TOC16:
4866 case R_PPC64_TOC16_DS:
4867 htab->do_multi_toc = 1;
4868 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4869 /* Fall through. */
4870 case R_PPC64_TOC16_LO:
4871 case R_PPC64_TOC16_HI:
4872 case R_PPC64_TOC16_HA:
4873 case R_PPC64_TOC16_LO_DS:
4874 sec->has_toc_reloc = 1;
4875 if (h != NULL && bfd_link_executable (info))
4876 {
4877 /* We may need a copy reloc. */
4878 h->non_got_ref = 1;
4879 /* Strongly prefer a copy reloc over a dynamic reloc.
4880 glibc ld.so as of 2019-08 will error out if one of
4881 these relocations is emitted. */
4882 h->needs_copy = 1;
4883 goto dodyn;
4884 }
4885 break;
4886
4887 /* Marker reloc. */
4888 case R_PPC64_ENTRY:
4889 break;
4890
4891 /* This relocation describes the C++ object vtable hierarchy.
4892 Reconstruct it for later use during GC. */
4893 case R_PPC64_GNU_VTINHERIT:
4894 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4895 return FALSE;
4896 break;
4897
4898 /* This relocation describes which C++ vtable entries are actually
4899 used. Record for later use during GC. */
4900 case R_PPC64_GNU_VTENTRY:
4901 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4902 return FALSE;
4903 break;
4904
4905 case R_PPC64_REL14:
4906 case R_PPC64_REL14_BRTAKEN:
4907 case R_PPC64_REL14_BRNTAKEN:
4908 {
4909 asection *dest = NULL;
4910
4911 /* Heuristic: If jumping outside our section, chances are
4912 we are going to need a stub. */
4913 if (h != NULL)
4914 {
4915 /* If the sym is weak it may be overridden later, so
4916 don't assume we know where a weak sym lives. */
4917 if (h->root.type == bfd_link_hash_defined)
4918 dest = h->root.u.def.section;
4919 }
4920 else
4921 {
4922 Elf_Internal_Sym *isym;
4923
4924 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4925 abfd, r_symndx);
4926 if (isym == NULL)
4927 return FALSE;
4928
4929 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4930 }
4931
4932 if (dest != sec)
4933 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4934 }
4935 goto rel24;
4936
4937 case R_PPC64_PLTCALL:
4938 case R_PPC64_PLTCALL_NOTOC:
4939 ppc64_elf_section_data (sec)->has_pltcall = 1;
4940 /* Fall through. */
4941
4942 case R_PPC64_REL24:
4943 case R_PPC64_REL24_NOTOC:
4944 rel24:
4945 plt_list = ifunc;
4946 if (h != NULL)
4947 {
4948 h->needs_plt = 1;
4949 if (h->root.root.string[0] == '.'
4950 && h->root.root.string[1] != '\0')
4951 ppc_elf_hash_entry (h)->is_func = 1;
4952
4953 if (h == tga || h == dottga)
4954 {
4955 sec->has_tls_reloc = 1;
4956 if (rel != relocs
4957 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4958 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4959 /* We have a new-style __tls_get_addr call with
4960 a marker reloc. */
4961 ;
4962 else
4963 /* Mark this section as having an old-style call. */
4964 sec->nomark_tls_get_addr = 1;
4965 }
4966 plt_list = &h->plt.plist;
4967 }
4968
4969 /* We may need a .plt entry if the function this reloc
4970 refers to is in a shared lib. */
4971 if (plt_list
4972 && !update_plt_info (abfd, plt_list, rel->r_addend))
4973 return FALSE;
4974 break;
4975
4976 case R_PPC64_ADDR14:
4977 case R_PPC64_ADDR14_BRNTAKEN:
4978 case R_PPC64_ADDR14_BRTAKEN:
4979 case R_PPC64_ADDR24:
4980 goto dodyn;
4981
4982 case R_PPC64_TPREL64:
4983 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4984 if (bfd_link_dll (info))
4985 info->flags |= DF_STATIC_TLS;
4986 goto dotlstoc;
4987
4988 case R_PPC64_DTPMOD64:
4989 if (rel + 1 < rel_end
4990 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4991 && rel[1].r_offset == rel->r_offset + 8)
4992 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4993 else
4994 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4995 goto dotlstoc;
4996
4997 case R_PPC64_DTPREL64:
4998 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4999 if (rel != relocs
5000 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5001 && rel[-1].r_offset == rel->r_offset - 8)
5002 /* This is the second reloc of a dtpmod, dtprel pair.
5003 Don't mark with TLS_DTPREL. */
5004 goto dodyn;
5005
5006 dotlstoc:
5007 sec->has_tls_reloc = 1;
5008 if (h != NULL)
5009 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
5010 else
5011 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5012 rel->r_addend, tls_type))
5013 return FALSE;
5014
5015 ppc64_sec = ppc64_elf_section_data (sec);
5016 if (ppc64_sec->sec_type != sec_toc)
5017 {
5018 bfd_size_type amt;
5019
5020 /* One extra to simplify get_tls_mask. */
5021 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5022 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5023 if (ppc64_sec->u.toc.symndx == NULL)
5024 return FALSE;
5025 amt = sec->size * sizeof (bfd_vma) / 8;
5026 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5027 if (ppc64_sec->u.toc.add == NULL)
5028 return FALSE;
5029 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5030 ppc64_sec->sec_type = sec_toc;
5031 }
5032 BFD_ASSERT (rel->r_offset % 8 == 0);
5033 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5034 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5035
5036 /* Mark the second slot of a GD or LD entry.
5037 -1 to indicate GD and -2 to indicate LD. */
5038 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5039 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5040 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5041 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5042 goto dodyn;
5043
5044 case R_PPC64_TPREL16:
5045 case R_PPC64_TPREL16_LO:
5046 case R_PPC64_TPREL16_HI:
5047 case R_PPC64_TPREL16_HA:
5048 case R_PPC64_TPREL16_DS:
5049 case R_PPC64_TPREL16_LO_DS:
5050 case R_PPC64_TPREL16_HIGH:
5051 case R_PPC64_TPREL16_HIGHA:
5052 case R_PPC64_TPREL16_HIGHER:
5053 case R_PPC64_TPREL16_HIGHERA:
5054 case R_PPC64_TPREL16_HIGHEST:
5055 case R_PPC64_TPREL16_HIGHESTA:
5056 case R_PPC64_TPREL34:
5057 if (bfd_link_dll (info))
5058 info->flags |= DF_STATIC_TLS;
5059 goto dodyn;
5060
5061 case R_PPC64_ADDR64:
5062 if (is_opd
5063 && rel + 1 < rel_end
5064 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5065 {
5066 if (h != NULL)
5067 ppc_elf_hash_entry (h)->is_func = 1;
5068 }
5069 /* Fall through. */
5070
5071 case R_PPC64_ADDR16:
5072 case R_PPC64_ADDR16_DS:
5073 case R_PPC64_ADDR16_HA:
5074 case R_PPC64_ADDR16_HI:
5075 case R_PPC64_ADDR16_HIGH:
5076 case R_PPC64_ADDR16_HIGHA:
5077 case R_PPC64_ADDR16_HIGHER:
5078 case R_PPC64_ADDR16_HIGHERA:
5079 case R_PPC64_ADDR16_HIGHEST:
5080 case R_PPC64_ADDR16_HIGHESTA:
5081 case R_PPC64_ADDR16_LO:
5082 case R_PPC64_ADDR16_LO_DS:
5083 case R_PPC64_D34:
5084 case R_PPC64_D34_LO:
5085 case R_PPC64_D34_HI30:
5086 case R_PPC64_D34_HA30:
5087 case R_PPC64_ADDR16_HIGHER34:
5088 case R_PPC64_ADDR16_HIGHERA34:
5089 case R_PPC64_ADDR16_HIGHEST34:
5090 case R_PPC64_ADDR16_HIGHESTA34:
5091 case R_PPC64_D28:
5092 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5093 && rel->r_addend == 0)
5094 {
5095 /* We may need a .plt entry if this reloc refers to a
5096 function in a shared lib. */
5097 if (!update_plt_info (abfd, &h->plt.plist, 0))
5098 return FALSE;
5099 h->pointer_equality_needed = 1;
5100 }
5101 /* Fall through. */
5102
5103 case R_PPC64_REL30:
5104 case R_PPC64_REL32:
5105 case R_PPC64_REL64:
5106 case R_PPC64_ADDR32:
5107 case R_PPC64_UADDR16:
5108 case R_PPC64_UADDR32:
5109 case R_PPC64_UADDR64:
5110 case R_PPC64_TOC:
5111 if (h != NULL && bfd_link_executable (info))
5112 /* We may need a copy reloc. */
5113 h->non_got_ref = 1;
5114
5115 /* Don't propagate .opd relocs. */
5116 if (NO_OPD_RELOCS && is_opd)
5117 break;
5118
5119 /* If we are creating a shared library, and this is a reloc
5120 against a global symbol, or a non PC relative reloc
5121 against a local symbol, then we need to copy the reloc
5122 into the shared library. However, if we are linking with
5123 -Bsymbolic, we do not need to copy a reloc against a
5124 global symbol which is defined in an object we are
5125 including in the link (i.e., DEF_REGULAR is set). At
5126 this point we have not seen all the input files, so it is
5127 possible that DEF_REGULAR is not set now but will be set
5128 later (it is never cleared). In case of a weak definition,
5129 DEF_REGULAR may be cleared later by a strong definition in
5130 a shared library. We account for that possibility below by
5131 storing information in the dyn_relocs field of the hash
5132 table entry. A similar situation occurs when creating
5133 shared libraries and symbol visibility changes render the
5134 symbol local.
5135
5136 If on the other hand, we are creating an executable, we
5137 may need to keep relocations for symbols satisfied by a
5138 dynamic library if we manage to avoid copy relocs for the
5139 symbol. */
5140 dodyn:
5141 if ((h != NULL
5142 && (h->root.type == bfd_link_hash_defweak
5143 || !h->def_regular))
5144 || (h != NULL
5145 && !bfd_link_executable (info)
5146 && !SYMBOLIC_BIND (info, h))
5147 || (bfd_link_pic (info)
5148 && must_be_dyn_reloc (info, r_type))
5149 || (!bfd_link_pic (info)
5150 && ifunc != NULL))
5151 {
5152 /* We must copy these reloc types into the output file.
5153 Create a reloc section in dynobj and make room for
5154 this reloc. */
5155 if (sreloc == NULL)
5156 {
5157 sreloc = _bfd_elf_make_dynamic_reloc_section
5158 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5159
5160 if (sreloc == NULL)
5161 return FALSE;
5162 }
5163
5164 /* If this is a global symbol, we count the number of
5165 relocations we need for this symbol. */
5166 if (h != NULL)
5167 {
5168 struct elf_dyn_relocs *p;
5169 struct elf_dyn_relocs **head;
5170
5171 head = &h->dyn_relocs;
5172 p = *head;
5173 if (p == NULL || p->sec != sec)
5174 {
5175 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5176 if (p == NULL)
5177 return FALSE;
5178 p->next = *head;
5179 *head = p;
5180 p->sec = sec;
5181 p->count = 0;
5182 p->pc_count = 0;
5183 }
5184 p->count += 1;
5185 if (!must_be_dyn_reloc (info, r_type))
5186 p->pc_count += 1;
5187 }
5188 else
5189 {
5190 /* Track dynamic relocs needed for local syms too.
5191 We really need local syms available to do this
5192 easily. Oh well. */
5193 struct ppc_dyn_relocs *p;
5194 struct ppc_dyn_relocs **head;
5195 bfd_boolean is_ifunc;
5196 asection *s;
5197 void *vpp;
5198 Elf_Internal_Sym *isym;
5199
5200 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5201 abfd, r_symndx);
5202 if (isym == NULL)
5203 return FALSE;
5204
5205 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5206 if (s == NULL)
5207 s = sec;
5208
5209 vpp = &elf_section_data (s)->local_dynrel;
5210 head = (struct ppc_dyn_relocs **) vpp;
5211 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5212 p = *head;
5213 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5214 p = p->next;
5215 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5216 {
5217 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5218 if (p == NULL)
5219 return FALSE;
5220 p->next = *head;
5221 *head = p;
5222 p->sec = sec;
5223 p->ifunc = is_ifunc;
5224 p->count = 0;
5225 }
5226 p->count += 1;
5227 }
5228 }
5229 break;
5230
5231 default:
5232 break;
5233 }
5234 }
5235
5236 return TRUE;
5237 }
5238
5239 /* Merge backend specific data from an object file to the output
5240 object file when linking. */
5241
5242 static bfd_boolean
5243 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5244 {
5245 bfd *obfd = info->output_bfd;
5246 unsigned long iflags, oflags;
5247
5248 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5249 return TRUE;
5250
5251 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5252 return TRUE;
5253
5254 if (!_bfd_generic_verify_endian_match (ibfd, info))
5255 return FALSE;
5256
5257 iflags = elf_elfheader (ibfd)->e_flags;
5258 oflags = elf_elfheader (obfd)->e_flags;
5259
5260 if (iflags & ~EF_PPC64_ABI)
5261 {
5262 _bfd_error_handler
5263 /* xgettext:c-format */
5264 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5265 bfd_set_error (bfd_error_bad_value);
5266 return FALSE;
5267 }
5268 else if (iflags != oflags && iflags != 0)
5269 {
5270 _bfd_error_handler
5271 /* xgettext:c-format */
5272 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5273 ibfd, iflags, oflags);
5274 bfd_set_error (bfd_error_bad_value);
5275 return FALSE;
5276 }
5277
5278 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5279 return FALSE;
5280
5281 /* Merge Tag_compatibility attributes and any common GNU ones. */
5282 return _bfd_elf_merge_object_attributes (ibfd, info);
5283 }
5284
5285 static bfd_boolean
5286 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5287 {
5288 /* Print normal ELF private data. */
5289 _bfd_elf_print_private_bfd_data (abfd, ptr);
5290
5291 if (elf_elfheader (abfd)->e_flags != 0)
5292 {
5293 FILE *file = ptr;
5294
5295 fprintf (file, _("private flags = 0x%lx:"),
5296 elf_elfheader (abfd)->e_flags);
5297
5298 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5299 fprintf (file, _(" [abiv%ld]"),
5300 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5301 fputc ('\n', file);
5302 }
5303
5304 return TRUE;
5305 }
5306
5307 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5308 of the code entry point, and its section, which must be in the same
5309 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5310
5311 static bfd_vma
5312 opd_entry_value (asection *opd_sec,
5313 bfd_vma offset,
5314 asection **code_sec,
5315 bfd_vma *code_off,
5316 bfd_boolean in_code_sec)
5317 {
5318 bfd *opd_bfd = opd_sec->owner;
5319 Elf_Internal_Rela *relocs;
5320 Elf_Internal_Rela *lo, *hi, *look;
5321 bfd_vma val;
5322
5323 /* No relocs implies we are linking a --just-symbols object, or looking
5324 at a final linked executable with addr2line or somesuch. */
5325 if (opd_sec->reloc_count == 0)
5326 {
5327 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5328
5329 if (contents == NULL)
5330 {
5331 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5332 return (bfd_vma) -1;
5333 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5334 }
5335
5336 /* PR 17512: file: 64b9dfbb. */
5337 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5338 return (bfd_vma) -1;
5339
5340 val = bfd_get_64 (opd_bfd, contents + offset);
5341 if (code_sec != NULL)
5342 {
5343 asection *sec, *likely = NULL;
5344
5345 if (in_code_sec)
5346 {
5347 sec = *code_sec;
5348 if (sec->vma <= val
5349 && val < sec->vma + sec->size)
5350 likely = sec;
5351 else
5352 val = -1;
5353 }
5354 else
5355 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5356 if (sec->vma <= val
5357 && (sec->flags & SEC_LOAD) != 0
5358 && (sec->flags & SEC_ALLOC) != 0)
5359 likely = sec;
5360 if (likely != NULL)
5361 {
5362 *code_sec = likely;
5363 if (code_off != NULL)
5364 *code_off = val - likely->vma;
5365 }
5366 }
5367 return val;
5368 }
5369
5370 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5371
5372 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5373 if (relocs == NULL)
5374 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5375 /* PR 17512: file: df8e1fd6. */
5376 if (relocs == NULL)
5377 return (bfd_vma) -1;
5378
5379 /* Go find the opd reloc at the sym address. */
5380 lo = relocs;
5381 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5382 val = (bfd_vma) -1;
5383 while (lo < hi)
5384 {
5385 look = lo + (hi - lo) / 2;
5386 if (look->r_offset < offset)
5387 lo = look + 1;
5388 else if (look->r_offset > offset)
5389 hi = look;
5390 else
5391 {
5392 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5393
5394 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5395 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5396 {
5397 unsigned long symndx = ELF64_R_SYM (look->r_info);
5398 asection *sec = NULL;
5399
5400 if (symndx >= symtab_hdr->sh_info
5401 && elf_sym_hashes (opd_bfd) != NULL)
5402 {
5403 struct elf_link_hash_entry **sym_hashes;
5404 struct elf_link_hash_entry *rh;
5405
5406 sym_hashes = elf_sym_hashes (opd_bfd);
5407 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5408 if (rh != NULL)
5409 {
5410 rh = elf_follow_link (rh);
5411 if (rh->root.type != bfd_link_hash_defined
5412 && rh->root.type != bfd_link_hash_defweak)
5413 break;
5414 if (rh->root.u.def.section->owner == opd_bfd)
5415 {
5416 val = rh->root.u.def.value;
5417 sec = rh->root.u.def.section;
5418 }
5419 }
5420 }
5421
5422 if (sec == NULL)
5423 {
5424 Elf_Internal_Sym *sym;
5425
5426 if (symndx < symtab_hdr->sh_info)
5427 {
5428 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5429 if (sym == NULL)
5430 {
5431 size_t symcnt = symtab_hdr->sh_info;
5432 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5433 symcnt, 0,
5434 NULL, NULL, NULL);
5435 if (sym == NULL)
5436 break;
5437 symtab_hdr->contents = (bfd_byte *) sym;
5438 }
5439 sym += symndx;
5440 }
5441 else
5442 {
5443 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5444 1, symndx,
5445 NULL, NULL, NULL);
5446 if (sym == NULL)
5447 break;
5448 }
5449 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5450 if (sec == NULL)
5451 break;
5452 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5453 val = sym->st_value;
5454 }
5455
5456 val += look->r_addend;
5457 if (code_off != NULL)
5458 *code_off = val;
5459 if (code_sec != NULL)
5460 {
5461 if (in_code_sec && *code_sec != sec)
5462 return -1;
5463 else
5464 *code_sec = sec;
5465 }
5466 if (sec->output_section != NULL)
5467 val += sec->output_section->vma + sec->output_offset;
5468 }
5469 break;
5470 }
5471 }
5472
5473 return val;
5474 }
5475
5476 /* If the ELF symbol SYM might be a function in SEC, return the
5477 function size and set *CODE_OFF to the function's entry point,
5478 otherwise return zero. */
5479
5480 static bfd_size_type
5481 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5482 bfd_vma *code_off)
5483 {
5484 bfd_size_type size;
5485
5486 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5487 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5488 return 0;
5489
5490 size = 0;
5491 if (!(sym->flags & BSF_SYNTHETIC))
5492 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5493
5494 if (strcmp (sym->section->name, ".opd") == 0)
5495 {
5496 struct _opd_sec_data *opd = get_opd_info (sym->section);
5497 bfd_vma symval = sym->value;
5498
5499 if (opd != NULL
5500 && opd->adjust != NULL
5501 && elf_section_data (sym->section)->relocs != NULL)
5502 {
5503 /* opd_entry_value will use cached relocs that have been
5504 adjusted, but with raw symbols. That means both local
5505 and global symbols need adjusting. */
5506 long adjust = opd->adjust[OPD_NDX (symval)];
5507 if (adjust == -1)
5508 return 0;
5509 symval += adjust;
5510 }
5511
5512 if (opd_entry_value (sym->section, symval,
5513 &sec, code_off, TRUE) == (bfd_vma) -1)
5514 return 0;
5515 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5516 symbol. This size has nothing to do with the code size of the
5517 function, which is what we're supposed to return, but the
5518 code size isn't available without looking up the dot-sym.
5519 However, doing that would be a waste of time particularly
5520 since elf_find_function will look at the dot-sym anyway.
5521 Now, elf_find_function will keep the largest size of any
5522 function sym found at the code address of interest, so return
5523 1 here to avoid it incorrectly caching a larger function size
5524 for a small function. This does mean we return the wrong
5525 size for a new-ABI function of size 24, but all that does is
5526 disable caching for such functions. */
5527 if (size == 24)
5528 size = 1;
5529 }
5530 else
5531 {
5532 if (sym->section != sec)
5533 return 0;
5534 *code_off = sym->value;
5535 }
5536 if (size == 0)
5537 size = 1;
5538 return size;
5539 }
5540
5541 /* Return true if symbol is a strong function defined in an ELFv2
5542 object with st_other localentry bits of zero, ie. its local entry
5543 point coincides with its global entry point. */
5544
5545 static bfd_boolean
5546 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5547 {
5548 return (h != NULL
5549 && h->type == STT_FUNC
5550 && h->root.type == bfd_link_hash_defined
5551 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5552 && !ppc_elf_hash_entry (h)->non_zero_localentry
5553 && is_ppc64_elf (h->root.u.def.section->owner)
5554 && abiversion (h->root.u.def.section->owner) >= 2);
5555 }
5556
5557 /* Return true if symbol is defined in a regular object file. */
5558
5559 static bfd_boolean
5560 is_static_defined (struct elf_link_hash_entry *h)
5561 {
5562 return ((h->root.type == bfd_link_hash_defined
5563 || h->root.type == bfd_link_hash_defweak)
5564 && h->root.u.def.section != NULL
5565 && h->root.u.def.section->output_section != NULL);
5566 }
5567
5568 /* If FDH is a function descriptor symbol, return the associated code
5569 entry symbol if it is defined. Return NULL otherwise. */
5570
5571 static struct ppc_link_hash_entry *
5572 defined_code_entry (struct ppc_link_hash_entry *fdh)
5573 {
5574 if (fdh->is_func_descriptor)
5575 {
5576 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5577 if (fh->elf.root.type == bfd_link_hash_defined
5578 || fh->elf.root.type == bfd_link_hash_defweak)
5579 return fh;
5580 }
5581 return NULL;
5582 }
5583
5584 /* If FH is a function code entry symbol, return the associated
5585 function descriptor symbol if it is defined. Return NULL otherwise. */
5586
5587 static struct ppc_link_hash_entry *
5588 defined_func_desc (struct ppc_link_hash_entry *fh)
5589 {
5590 if (fh->oh != NULL
5591 && fh->oh->is_func_descriptor)
5592 {
5593 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5594 if (fdh->elf.root.type == bfd_link_hash_defined
5595 || fdh->elf.root.type == bfd_link_hash_defweak)
5596 return fdh;
5597 }
5598 return NULL;
5599 }
5600
5601 /* Given H is a symbol that satisfies is_static_defined, return the
5602 value in the output file. */
5603
5604 static bfd_vma
5605 defined_sym_val (struct elf_link_hash_entry *h)
5606 {
5607 return (h->root.u.def.section->output_section->vma
5608 + h->root.u.def.section->output_offset
5609 + h->root.u.def.value);
5610 }
5611
5612 /* Return true if H matches __tls_get_addr or one of its variants. */
5613
5614 static bfd_boolean
5615 is_tls_get_addr (struct elf_link_hash_entry *h,
5616 struct ppc_link_hash_table *htab)
5617 {
5618 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5619 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
5620 }
5621
5622 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5623
5624 /* Garbage collect sections, after first dealing with dot-symbols. */
5625
5626 static bfd_boolean
5627 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5628 {
5629 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5630
5631 if (htab != NULL && htab->need_func_desc_adj)
5632 {
5633 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5634 htab->need_func_desc_adj = 0;
5635 }
5636 return bfd_elf_gc_sections (abfd, info);
5637 }
5638
5639 /* Mark all our entry sym sections, both opd and code section. */
5640
5641 static void
5642 ppc64_elf_gc_keep (struct bfd_link_info *info)
5643 {
5644 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5645 struct bfd_sym_chain *sym;
5646
5647 if (htab == NULL)
5648 return;
5649
5650 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5651 {
5652 struct ppc_link_hash_entry *eh, *fh;
5653 asection *sec;
5654
5655 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5656 FALSE, FALSE, TRUE));
5657 if (eh == NULL)
5658 continue;
5659 if (eh->elf.root.type != bfd_link_hash_defined
5660 && eh->elf.root.type != bfd_link_hash_defweak)
5661 continue;
5662
5663 fh = defined_code_entry (eh);
5664 if (fh != NULL)
5665 {
5666 sec = fh->elf.root.u.def.section;
5667 sec->flags |= SEC_KEEP;
5668 }
5669 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5670 && opd_entry_value (eh->elf.root.u.def.section,
5671 eh->elf.root.u.def.value,
5672 &sec, NULL, FALSE) != (bfd_vma) -1)
5673 sec->flags |= SEC_KEEP;
5674
5675 sec = eh->elf.root.u.def.section;
5676 sec->flags |= SEC_KEEP;
5677 }
5678 }
5679
5680 /* Mark sections containing dynamically referenced symbols. When
5681 building shared libraries, we must assume that any visible symbol is
5682 referenced. */
5683
5684 static bfd_boolean
5685 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5686 {
5687 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5688 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
5689 struct ppc_link_hash_entry *fdh;
5690 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5691
5692 /* Dynamic linking info is on the func descriptor sym. */
5693 fdh = defined_func_desc (eh);
5694 if (fdh != NULL)
5695 eh = fdh;
5696
5697 if ((eh->elf.root.type == bfd_link_hash_defined
5698 || eh->elf.root.type == bfd_link_hash_defweak)
5699 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5700 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5701 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5702 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5703 && (!bfd_link_executable (info)
5704 || info->gc_keep_exported
5705 || info->export_dynamic
5706 || (eh->elf.dynamic
5707 && d != NULL
5708 && (*d->match) (&d->head, NULL,
5709 eh->elf.root.root.string)))
5710 && (eh->elf.versioned >= versioned
5711 || !bfd_hide_sym_by_version (info->version_info,
5712 eh->elf.root.root.string)))))
5713 {
5714 asection *code_sec;
5715 struct ppc_link_hash_entry *fh;
5716
5717 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5718
5719 /* Function descriptor syms cause the associated
5720 function code sym section to be marked. */
5721 fh = defined_code_entry (eh);
5722 if (fh != NULL)
5723 {
5724 code_sec = fh->elf.root.u.def.section;
5725 code_sec->flags |= SEC_KEEP;
5726 }
5727 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5728 && opd_entry_value (eh->elf.root.u.def.section,
5729 eh->elf.root.u.def.value,
5730 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5731 code_sec->flags |= SEC_KEEP;
5732 }
5733
5734 return TRUE;
5735 }
5736
5737 /* Return the section that should be marked against GC for a given
5738 relocation. */
5739
5740 static asection *
5741 ppc64_elf_gc_mark_hook (asection *sec,
5742 struct bfd_link_info *info,
5743 Elf_Internal_Rela *rel,
5744 struct elf_link_hash_entry *h,
5745 Elf_Internal_Sym *sym)
5746 {
5747 asection *rsec;
5748
5749 /* Syms return NULL if we're marking .opd, so we avoid marking all
5750 function sections, as all functions are referenced in .opd. */
5751 rsec = NULL;
5752 if (get_opd_info (sec) != NULL)
5753 return rsec;
5754
5755 if (h != NULL)
5756 {
5757 enum elf_ppc64_reloc_type r_type;
5758 struct ppc_link_hash_entry *eh, *fh, *fdh;
5759
5760 r_type = ELF64_R_TYPE (rel->r_info);
5761 switch (r_type)
5762 {
5763 case R_PPC64_GNU_VTINHERIT:
5764 case R_PPC64_GNU_VTENTRY:
5765 break;
5766
5767 default:
5768 switch (h->root.type)
5769 {
5770 case bfd_link_hash_defined:
5771 case bfd_link_hash_defweak:
5772 eh = ppc_elf_hash_entry (h);
5773 fdh = defined_func_desc (eh);
5774 if (fdh != NULL)
5775 {
5776 /* -mcall-aixdesc code references the dot-symbol on
5777 a call reloc. Mark the function descriptor too
5778 against garbage collection. */
5779 fdh->elf.mark = 1;
5780 if (fdh->elf.is_weakalias)
5781 weakdef (&fdh->elf)->mark = 1;
5782 eh = fdh;
5783 }
5784
5785 /* Function descriptor syms cause the associated
5786 function code sym section to be marked. */
5787 fh = defined_code_entry (eh);
5788 if (fh != NULL)
5789 {
5790 /* They also mark their opd section. */
5791 eh->elf.root.u.def.section->gc_mark = 1;
5792
5793 rsec = fh->elf.root.u.def.section;
5794 }
5795 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5796 && opd_entry_value (eh->elf.root.u.def.section,
5797 eh->elf.root.u.def.value,
5798 &rsec, NULL, FALSE) != (bfd_vma) -1)
5799 eh->elf.root.u.def.section->gc_mark = 1;
5800 else
5801 rsec = h->root.u.def.section;
5802 break;
5803
5804 case bfd_link_hash_common:
5805 rsec = h->root.u.c.p->section;
5806 break;
5807
5808 default:
5809 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5810 }
5811 }
5812 }
5813 else
5814 {
5815 struct _opd_sec_data *opd;
5816
5817 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5818 opd = get_opd_info (rsec);
5819 if (opd != NULL && opd->func_sec != NULL)
5820 {
5821 rsec->gc_mark = 1;
5822
5823 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5824 }
5825 }
5826
5827 return rsec;
5828 }
5829
5830 /* The maximum size of .sfpr. */
5831 #define SFPR_MAX (218*4)
5832
5833 struct sfpr_def_parms
5834 {
5835 const char name[12];
5836 unsigned char lo, hi;
5837 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5838 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5839 };
5840
5841 /* Auto-generate _save*, _rest* functions in .sfpr.
5842 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5843 instead. */
5844
5845 static bfd_boolean
5846 sfpr_define (struct bfd_link_info *info,
5847 const struct sfpr_def_parms *parm,
5848 asection *stub_sec)
5849 {
5850 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5851 unsigned int i;
5852 size_t len = strlen (parm->name);
5853 bfd_boolean writing = FALSE;
5854 char sym[16];
5855
5856 if (htab == NULL)
5857 return FALSE;
5858
5859 memcpy (sym, parm->name, len);
5860 sym[len + 2] = 0;
5861
5862 for (i = parm->lo; i <= parm->hi; i++)
5863 {
5864 struct ppc_link_hash_entry *h;
5865
5866 sym[len + 0] = i / 10 + '0';
5867 sym[len + 1] = i % 10 + '0';
5868 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5869 writing, TRUE, TRUE));
5870 if (stub_sec != NULL)
5871 {
5872 if (h != NULL
5873 && h->elf.root.type == bfd_link_hash_defined
5874 && h->elf.root.u.def.section == htab->sfpr)
5875 {
5876 struct elf_link_hash_entry *s;
5877 char buf[32];
5878 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5879 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5880 if (s == NULL)
5881 return FALSE;
5882 if (s->root.type == bfd_link_hash_new)
5883 {
5884 s->root.type = bfd_link_hash_defined;
5885 s->root.u.def.section = stub_sec;
5886 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5887 + h->elf.root.u.def.value);
5888 s->ref_regular = 1;
5889 s->def_regular = 1;
5890 s->ref_regular_nonweak = 1;
5891 s->forced_local = 1;
5892 s->non_elf = 0;
5893 s->root.linker_def = 1;
5894 }
5895 }
5896 continue;
5897 }
5898 if (h != NULL)
5899 {
5900 h->save_res = 1;
5901 if (!h->elf.def_regular)
5902 {
5903 h->elf.root.type = bfd_link_hash_defined;
5904 h->elf.root.u.def.section = htab->sfpr;
5905 h->elf.root.u.def.value = htab->sfpr->size;
5906 h->elf.type = STT_FUNC;
5907 h->elf.def_regular = 1;
5908 h->elf.non_elf = 0;
5909 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5910 writing = TRUE;
5911 if (htab->sfpr->contents == NULL)
5912 {
5913 htab->sfpr->contents
5914 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5915 if (htab->sfpr->contents == NULL)
5916 return FALSE;
5917 }
5918 }
5919 }
5920 if (writing)
5921 {
5922 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5923 if (i != parm->hi)
5924 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5925 else
5926 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5927 htab->sfpr->size = p - htab->sfpr->contents;
5928 }
5929 }
5930
5931 return TRUE;
5932 }
5933
5934 static bfd_byte *
5935 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5936 {
5937 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5938 return p + 4;
5939 }
5940
5941 static bfd_byte *
5942 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5943 {
5944 p = savegpr0 (abfd, p, r);
5945 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5946 p = p + 4;
5947 bfd_put_32 (abfd, BLR, p);
5948 return p + 4;
5949 }
5950
5951 static bfd_byte *
5952 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5953 {
5954 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5955 return p + 4;
5956 }
5957
5958 static bfd_byte *
5959 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5960 {
5961 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5962 p = p + 4;
5963 p = restgpr0 (abfd, p, r);
5964 bfd_put_32 (abfd, MTLR_R0, p);
5965 p = p + 4;
5966 if (r == 29)
5967 {
5968 p = restgpr0 (abfd, p, 30);
5969 p = restgpr0 (abfd, p, 31);
5970 }
5971 bfd_put_32 (abfd, BLR, p);
5972 return p + 4;
5973 }
5974
5975 static bfd_byte *
5976 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5977 {
5978 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5979 return p + 4;
5980 }
5981
5982 static bfd_byte *
5983 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5984 {
5985 p = savegpr1 (abfd, p, r);
5986 bfd_put_32 (abfd, BLR, p);
5987 return p + 4;
5988 }
5989
5990 static bfd_byte *
5991 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5992 {
5993 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5994 return p + 4;
5995 }
5996
5997 static bfd_byte *
5998 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5999 {
6000 p = restgpr1 (abfd, p, r);
6001 bfd_put_32 (abfd, BLR, p);
6002 return p + 4;
6003 }
6004
6005 static bfd_byte *
6006 savefpr (bfd *abfd, bfd_byte *p, int r)
6007 {
6008 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6009 return p + 4;
6010 }
6011
6012 static bfd_byte *
6013 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6014 {
6015 p = savefpr (abfd, p, r);
6016 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6017 p = p + 4;
6018 bfd_put_32 (abfd, BLR, p);
6019 return p + 4;
6020 }
6021
6022 static bfd_byte *
6023 restfpr (bfd *abfd, bfd_byte *p, int r)
6024 {
6025 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6026 return p + 4;
6027 }
6028
6029 static bfd_byte *
6030 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6031 {
6032 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6033 p = p + 4;
6034 p = restfpr (abfd, p, r);
6035 bfd_put_32 (abfd, MTLR_R0, p);
6036 p = p + 4;
6037 if (r == 29)
6038 {
6039 p = restfpr (abfd, p, 30);
6040 p = restfpr (abfd, p, 31);
6041 }
6042 bfd_put_32 (abfd, BLR, p);
6043 return p + 4;
6044 }
6045
6046 static bfd_byte *
6047 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6048 {
6049 p = savefpr (abfd, p, r);
6050 bfd_put_32 (abfd, BLR, p);
6051 return p + 4;
6052 }
6053
6054 static bfd_byte *
6055 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6056 {
6057 p = restfpr (abfd, p, r);
6058 bfd_put_32 (abfd, BLR, p);
6059 return p + 4;
6060 }
6061
6062 static bfd_byte *
6063 savevr (bfd *abfd, bfd_byte *p, int r)
6064 {
6065 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6066 p = p + 4;
6067 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6068 return p + 4;
6069 }
6070
6071 static bfd_byte *
6072 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6073 {
6074 p = savevr (abfd, p, r);
6075 bfd_put_32 (abfd, BLR, p);
6076 return p + 4;
6077 }
6078
6079 static bfd_byte *
6080 restvr (bfd *abfd, bfd_byte *p, int r)
6081 {
6082 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6083 p = p + 4;
6084 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6085 return p + 4;
6086 }
6087
6088 static bfd_byte *
6089 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6090 {
6091 p = restvr (abfd, p, r);
6092 bfd_put_32 (abfd, BLR, p);
6093 return p + 4;
6094 }
6095
6096 #define STDU_R1_0R1 0xf8210001
6097 #define ADDI_R1_R1 0x38210000
6098
6099 /* Emit prologue of wrapper preserving regs around a call to
6100 __tls_get_addr_opt. */
6101
6102 static bfd_byte *
6103 tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6104 {
6105 unsigned int i;
6106
6107 bfd_put_32 (obfd, MFLR_R0, p);
6108 p += 4;
6109 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6110 p += 4;
6111
6112 if (htab->opd_abi)
6113 {
6114 for (i = 4; i < 12; i++)
6115 {
6116 bfd_put_32 (obfd,
6117 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6118 p += 4;
6119 }
6120 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6121 p += 4;
6122 }
6123 else
6124 {
6125 for (i = 4; i < 12; i++)
6126 {
6127 bfd_put_32 (obfd,
6128 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6129 p += 4;
6130 }
6131 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6132 p += 4;
6133 }
6134 return p;
6135 }
6136
6137 /* Emit epilogue of wrapper preserving regs around a call to
6138 __tls_get_addr_opt. */
6139
6140 static bfd_byte *
6141 tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6142 {
6143 unsigned int i;
6144
6145 if (htab->opd_abi)
6146 {
6147 for (i = 4; i < 12; i++)
6148 {
6149 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6150 p += 4;
6151 }
6152 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6153 p += 4;
6154 }
6155 else
6156 {
6157 for (i = 4; i < 12; i++)
6158 {
6159 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6160 p += 4;
6161 }
6162 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6163 p += 4;
6164 }
6165 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6166 p += 4;
6167 bfd_put_32 (obfd, MTLR_R0, p);
6168 p += 4;
6169 bfd_put_32 (obfd, BLR, p);
6170 p += 4;
6171 return p;
6172 }
6173
6174 /* Called via elf_link_hash_traverse to transfer dynamic linking
6175 information on function code symbol entries to their corresponding
6176 function descriptor symbol entries. */
6177
6178 static bfd_boolean
6179 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6180 {
6181 struct bfd_link_info *info;
6182 struct ppc_link_hash_table *htab;
6183 struct ppc_link_hash_entry *fh;
6184 struct ppc_link_hash_entry *fdh;
6185 bfd_boolean force_local;
6186
6187 fh = ppc_elf_hash_entry (h);
6188 if (fh->elf.root.type == bfd_link_hash_indirect)
6189 return TRUE;
6190
6191 if (!fh->is_func)
6192 return TRUE;
6193
6194 if (fh->elf.root.root.string[0] != '.'
6195 || fh->elf.root.root.string[1] == '\0')
6196 return TRUE;
6197
6198 info = inf;
6199 htab = ppc_hash_table (info);
6200 if (htab == NULL)
6201 return FALSE;
6202
6203 /* Find the corresponding function descriptor symbol. */
6204 fdh = lookup_fdh (fh, htab);
6205
6206 /* Resolve undefined references to dot-symbols as the value
6207 in the function descriptor, if we have one in a regular object.
6208 This is to satisfy cases like ".quad .foo". Calls to functions
6209 in dynamic objects are handled elsewhere. */
6210 if ((fh->elf.root.type == bfd_link_hash_undefined
6211 || fh->elf.root.type == bfd_link_hash_undefweak)
6212 && (fdh->elf.root.type == bfd_link_hash_defined
6213 || fdh->elf.root.type == bfd_link_hash_defweak)
6214 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6215 && opd_entry_value (fdh->elf.root.u.def.section,
6216 fdh->elf.root.u.def.value,
6217 &fh->elf.root.u.def.section,
6218 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6219 {
6220 fh->elf.root.type = fdh->elf.root.type;
6221 fh->elf.forced_local = 1;
6222 fh->elf.def_regular = fdh->elf.def_regular;
6223 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6224 }
6225
6226 if (!fh->elf.dynamic)
6227 {
6228 struct plt_entry *ent;
6229
6230 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6231 if (ent->plt.refcount > 0)
6232 break;
6233 if (ent == NULL)
6234 return TRUE;
6235 }
6236
6237 /* Create a descriptor as undefined if necessary. */
6238 if (fdh == NULL
6239 && !bfd_link_executable (info)
6240 && (fh->elf.root.type == bfd_link_hash_undefined
6241 || fh->elf.root.type == bfd_link_hash_undefweak))
6242 {
6243 fdh = make_fdh (info, fh);
6244 if (fdh == NULL)
6245 return FALSE;
6246 }
6247
6248 /* We can't support overriding of symbols on a fake descriptor. */
6249 if (fdh != NULL
6250 && fdh->fake
6251 && (fh->elf.root.type == bfd_link_hash_defined
6252 || fh->elf.root.type == bfd_link_hash_defweak))
6253 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6254
6255 /* Transfer dynamic linking information to the function descriptor. */
6256 if (fdh != NULL)
6257 {
6258 fdh->elf.ref_regular |= fh->elf.ref_regular;
6259 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6260 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6261 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6262 fdh->elf.dynamic |= fh->elf.dynamic;
6263 fdh->elf.needs_plt |= (fh->elf.needs_plt
6264 || fh->elf.type == STT_FUNC
6265 || fh->elf.type == STT_GNU_IFUNC);
6266 move_plt_plist (fh, fdh);
6267
6268 if (!fdh->elf.forced_local
6269 && fh->elf.dynindx != -1)
6270 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6271 return FALSE;
6272 }
6273
6274 /* Now that the info is on the function descriptor, clear the
6275 function code sym info. Any function code syms for which we
6276 don't have a definition in a regular file, we force local.
6277 This prevents a shared library from exporting syms that have
6278 been imported from another library. Function code syms that
6279 are really in the library we must leave global to prevent the
6280 linker dragging in a definition from a static library. */
6281 force_local = (!fh->elf.def_regular
6282 || fdh == NULL
6283 || !fdh->elf.def_regular
6284 || fdh->elf.forced_local);
6285 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6286
6287 return TRUE;
6288 }
6289
6290 static const struct sfpr_def_parms save_res_funcs[] =
6291 {
6292 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6293 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6294 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6295 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6296 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6297 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6298 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6299 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6300 { "._savef", 14, 31, savefpr, savefpr1_tail },
6301 { "._restf", 14, 31, restfpr, restfpr1_tail },
6302 { "_savevr_", 20, 31, savevr, savevr_tail },
6303 { "_restvr_", 20, 31, restvr, restvr_tail }
6304 };
6305
6306 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6307 this hook to a) provide some gcc support functions, and b) transfer
6308 dynamic linking information gathered so far on function code symbol
6309 entries, to their corresponding function descriptor symbol entries. */
6310
6311 static bfd_boolean
6312 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6313 struct bfd_link_info *info)
6314 {
6315 struct ppc_link_hash_table *htab;
6316
6317 htab = ppc_hash_table (info);
6318 if (htab == NULL)
6319 return FALSE;
6320
6321 /* Provide any missing _save* and _rest* functions. */
6322 if (htab->sfpr != NULL)
6323 {
6324 unsigned int i;
6325
6326 htab->sfpr->size = 0;
6327 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6328 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6329 return FALSE;
6330 if (htab->sfpr->size == 0)
6331 htab->sfpr->flags |= SEC_EXCLUDE;
6332 }
6333
6334 if (bfd_link_relocatable (info))
6335 return TRUE;
6336
6337 if (htab->elf.hgot != NULL)
6338 {
6339 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6340 /* Make .TOC. defined so as to prevent it being made dynamic.
6341 The wrong value here is fixed later in ppc64_elf_set_toc. */
6342 if (!htab->elf.hgot->def_regular
6343 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6344 {
6345 htab->elf.hgot->root.type = bfd_link_hash_defined;
6346 htab->elf.hgot->root.u.def.value = 0;
6347 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6348 htab->elf.hgot->def_regular = 1;
6349 htab->elf.hgot->root.linker_def = 1;
6350 }
6351 htab->elf.hgot->type = STT_OBJECT;
6352 htab->elf.hgot->other
6353 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6354 }
6355
6356 if (htab->need_func_desc_adj)
6357 {
6358 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6359 htab->need_func_desc_adj = 0;
6360 }
6361
6362 return TRUE;
6363 }
6364
6365 /* Return true if we have dynamic relocs against H or any of its weak
6366 aliases, that apply to read-only sections. Cannot be used after
6367 size_dynamic_sections. */
6368
6369 static bfd_boolean
6370 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6371 {
6372 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
6373 do
6374 {
6375 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
6376 return TRUE;
6377 eh = ppc_elf_hash_entry (eh->elf.u.alias);
6378 }
6379 while (eh != NULL && &eh->elf != h);
6380
6381 return FALSE;
6382 }
6383
6384 /* Return whether EH has pc-relative dynamic relocs. */
6385
6386 static bfd_boolean
6387 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6388 {
6389 struct elf_dyn_relocs *p;
6390
6391 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
6392 if (p->pc_count != 0)
6393 return TRUE;
6394 return FALSE;
6395 }
6396
6397 /* Return true if a global entry stub will be created for H. Valid
6398 for ELFv2 before plt entries have been allocated. */
6399
6400 static bfd_boolean
6401 global_entry_stub (struct elf_link_hash_entry *h)
6402 {
6403 struct plt_entry *pent;
6404
6405 if (!h->pointer_equality_needed
6406 || h->def_regular)
6407 return FALSE;
6408
6409 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6410 if (pent->plt.refcount > 0
6411 && pent->addend == 0)
6412 return TRUE;
6413
6414 return FALSE;
6415 }
6416
6417 /* Adjust a symbol defined by a dynamic object and referenced by a
6418 regular object. The current definition is in some section of the
6419 dynamic object, but we're not including those sections. We have to
6420 change the definition to something the rest of the link can
6421 understand. */
6422
6423 static bfd_boolean
6424 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6425 struct elf_link_hash_entry *h)
6426 {
6427 struct ppc_link_hash_table *htab;
6428 asection *s, *srel;
6429
6430 htab = ppc_hash_table (info);
6431 if (htab == NULL)
6432 return FALSE;
6433
6434 /* Deal with function syms. */
6435 if (h->type == STT_FUNC
6436 || h->type == STT_GNU_IFUNC
6437 || h->needs_plt)
6438 {
6439 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
6440 || SYMBOL_CALLS_LOCAL (info, h)
6441 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6442 /* Discard dyn_relocs when non-pic if we've decided that a
6443 function symbol is local and not an ifunc. We keep dynamic
6444 relocs for ifuncs when local rather than always emitting a
6445 plt call stub for them and defining the symbol on the call
6446 stub. We can't do that for ELFv1 anyway (a function symbol
6447 is defined on a descriptor, not code) and it can be faster at
6448 run-time due to not needing to bounce through a stub. The
6449 dyn_relocs for ifuncs will be applied even in a static
6450 executable. */
6451 if (!bfd_link_pic (info)
6452 && h->type != STT_GNU_IFUNC
6453 && local)
6454 h->dyn_relocs = NULL;
6455
6456 /* Clear procedure linkage table information for any symbol that
6457 won't need a .plt entry. */
6458 struct plt_entry *ent;
6459 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6460 if (ent->plt.refcount > 0)
6461 break;
6462 if (ent == NULL
6463 || (h->type != STT_GNU_IFUNC
6464 && local
6465 && (htab->can_convert_all_inline_plt
6466 || (ppc_elf_hash_entry (h)->tls_mask
6467 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6468 {
6469 h->plt.plist = NULL;
6470 h->needs_plt = 0;
6471 h->pointer_equality_needed = 0;
6472 }
6473 else if (abiversion (info->output_bfd) >= 2)
6474 {
6475 /* Taking a function's address in a read/write section
6476 doesn't require us to define the function symbol in the
6477 executable on a global entry stub. A dynamic reloc can
6478 be used instead. The reason we prefer a few more dynamic
6479 relocs is that calling via a global entry stub costs a
6480 few more instructions, and pointer_equality_needed causes
6481 extra work in ld.so when resolving these symbols. */
6482 if (global_entry_stub (h))
6483 {
6484 if (!_bfd_elf_readonly_dynrelocs (h))
6485 {
6486 h->pointer_equality_needed = 0;
6487 /* If we haven't seen a branch reloc and the symbol
6488 isn't an ifunc then we don't need a plt entry. */
6489 if (!h->needs_plt)
6490 h->plt.plist = NULL;
6491 }
6492 else if (!bfd_link_pic (info))
6493 /* We are going to be defining the function symbol on the
6494 plt stub, so no dyn_relocs needed when non-pic. */
6495 h->dyn_relocs = NULL;
6496 }
6497
6498 /* ELFv2 function symbols can't have copy relocs. */
6499 return TRUE;
6500 }
6501 else if (!h->needs_plt
6502 && !_bfd_elf_readonly_dynrelocs (h))
6503 {
6504 /* If we haven't seen a branch reloc and the symbol isn't an
6505 ifunc then we don't need a plt entry. */
6506 h->plt.plist = NULL;
6507 h->pointer_equality_needed = 0;
6508 return TRUE;
6509 }
6510 }
6511 else
6512 h->plt.plist = NULL;
6513
6514 /* If this is a weak symbol, and there is a real definition, the
6515 processor independent code will have arranged for us to see the
6516 real definition first, and we can just use the same value. */
6517 if (h->is_weakalias)
6518 {
6519 struct elf_link_hash_entry *def = weakdef (h);
6520 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6521 h->root.u.def.section = def->root.u.def.section;
6522 h->root.u.def.value = def->root.u.def.value;
6523 if (def->root.u.def.section == htab->elf.sdynbss
6524 || def->root.u.def.section == htab->elf.sdynrelro)
6525 h->dyn_relocs = NULL;
6526 return TRUE;
6527 }
6528
6529 /* If we are creating a shared library, we must presume that the
6530 only references to the symbol are via the global offset table.
6531 For such cases we need not do anything here; the relocations will
6532 be handled correctly by relocate_section. */
6533 if (!bfd_link_executable (info))
6534 return TRUE;
6535
6536 /* If there are no references to this symbol that do not use the
6537 GOT, we don't need to generate a copy reloc. */
6538 if (!h->non_got_ref)
6539 return TRUE;
6540
6541 /* Don't generate a copy reloc for symbols defined in the executable. */
6542 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6543
6544 /* If -z nocopyreloc was given, don't generate them either. */
6545 || info->nocopyreloc
6546
6547 /* If we don't find any dynamic relocs in read-only sections, then
6548 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6549 || (ELIMINATE_COPY_RELOCS
6550 && !h->needs_copy
6551 && !alias_readonly_dynrelocs (h))
6552
6553 /* Protected variables do not work with .dynbss. The copy in
6554 .dynbss won't be used by the shared library with the protected
6555 definition for the variable. Text relocations are preferable
6556 to an incorrect program. */
6557 || h->protected_def)
6558 return TRUE;
6559
6560 if (h->type == STT_FUNC
6561 || h->type == STT_GNU_IFUNC)
6562 {
6563 /* .dynbss copies of function symbols only work if we have
6564 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6565 use dot-symbols and set the function symbol size to the text
6566 size of the function rather than the size of the descriptor.
6567 That's wrong for copying a descriptor. */
6568 if (ppc_elf_hash_entry (h)->oh == NULL
6569 || !(h->size == 24 || h->size == 16))
6570 return TRUE;
6571
6572 /* We should never get here, but unfortunately there are old
6573 versions of gcc (circa gcc-3.2) that improperly for the
6574 ELFv1 ABI put initialized function pointers, vtable refs and
6575 suchlike in read-only sections. Allow them to proceed, but
6576 warn that this might break at runtime. */
6577 info->callbacks->einfo
6578 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6579 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6580 h->root.root.string);
6581 }
6582
6583 /* This is a reference to a symbol defined by a dynamic object which
6584 is not a function. */
6585
6586 /* We must allocate the symbol in our .dynbss section, which will
6587 become part of the .bss section of the executable. There will be
6588 an entry for this symbol in the .dynsym section. The dynamic
6589 object will contain position independent code, so all references
6590 from the dynamic object to this symbol will go through the global
6591 offset table. The dynamic linker will use the .dynsym entry to
6592 determine the address it must put in the global offset table, so
6593 both the dynamic object and the regular object will refer to the
6594 same memory location for the variable. */
6595 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6596 {
6597 s = htab->elf.sdynrelro;
6598 srel = htab->elf.sreldynrelro;
6599 }
6600 else
6601 {
6602 s = htab->elf.sdynbss;
6603 srel = htab->elf.srelbss;
6604 }
6605 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6606 {
6607 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6608 linker to copy the initial value out of the dynamic object
6609 and into the runtime process image. */
6610 srel->size += sizeof (Elf64_External_Rela);
6611 h->needs_copy = 1;
6612 }
6613
6614 /* We no longer want dyn_relocs. */
6615 h->dyn_relocs = NULL;
6616 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6617 }
6618
6619 /* If given a function descriptor symbol, hide both the function code
6620 sym and the descriptor. */
6621 static void
6622 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6623 struct elf_link_hash_entry *h,
6624 bfd_boolean force_local)
6625 {
6626 struct ppc_link_hash_entry *eh;
6627 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6628
6629 if (ppc_hash_table (info) == NULL)
6630 return;
6631
6632 eh = ppc_elf_hash_entry (h);
6633 if (eh->is_func_descriptor)
6634 {
6635 struct ppc_link_hash_entry *fh = eh->oh;
6636
6637 if (fh == NULL)
6638 {
6639 const char *p, *q;
6640 struct elf_link_hash_table *htab = elf_hash_table (info);
6641 char save;
6642
6643 /* We aren't supposed to use alloca in BFD because on
6644 systems which do not have alloca the version in libiberty
6645 calls xmalloc, which might cause the program to crash
6646 when it runs out of memory. This function doesn't have a
6647 return status, so there's no way to gracefully return an
6648 error. So cheat. We know that string[-1] can be safely
6649 accessed; It's either a string in an ELF string table,
6650 or allocated in an objalloc structure. */
6651
6652 p = eh->elf.root.root.string - 1;
6653 save = *p;
6654 *(char *) p = '.';
6655 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6656 FALSE, FALSE));
6657 *(char *) p = save;
6658
6659 /* Unfortunately, if it so happens that the string we were
6660 looking for was allocated immediately before this string,
6661 then we overwrote the string terminator. That's the only
6662 reason the lookup should fail. */
6663 if (fh == NULL)
6664 {
6665 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6666 while (q >= eh->elf.root.root.string && *q == *p)
6667 --q, --p;
6668 if (q < eh->elf.root.root.string && *p == '.')
6669 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6670 FALSE, FALSE));
6671 }
6672 if (fh != NULL)
6673 {
6674 eh->oh = fh;
6675 fh->oh = eh;
6676 }
6677 }
6678 if (fh != NULL)
6679 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6680 }
6681 }
6682
6683 static bfd_boolean
6684 get_sym_h (struct elf_link_hash_entry **hp,
6685 Elf_Internal_Sym **symp,
6686 asection **symsecp,
6687 unsigned char **tls_maskp,
6688 Elf_Internal_Sym **locsymsp,
6689 unsigned long r_symndx,
6690 bfd *ibfd)
6691 {
6692 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6693
6694 if (r_symndx >= symtab_hdr->sh_info)
6695 {
6696 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6697 struct elf_link_hash_entry *h;
6698
6699 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6700 h = elf_follow_link (h);
6701
6702 if (hp != NULL)
6703 *hp = h;
6704
6705 if (symp != NULL)
6706 *symp = NULL;
6707
6708 if (symsecp != NULL)
6709 {
6710 asection *symsec = NULL;
6711 if (h->root.type == bfd_link_hash_defined
6712 || h->root.type == bfd_link_hash_defweak)
6713 symsec = h->root.u.def.section;
6714 *symsecp = symsec;
6715 }
6716
6717 if (tls_maskp != NULL)
6718 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
6719 }
6720 else
6721 {
6722 Elf_Internal_Sym *sym;
6723 Elf_Internal_Sym *locsyms = *locsymsp;
6724
6725 if (locsyms == NULL)
6726 {
6727 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6728 if (locsyms == NULL)
6729 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6730 symtab_hdr->sh_info,
6731 0, NULL, NULL, NULL);
6732 if (locsyms == NULL)
6733 return FALSE;
6734 *locsymsp = locsyms;
6735 }
6736 sym = locsyms + r_symndx;
6737
6738 if (hp != NULL)
6739 *hp = NULL;
6740
6741 if (symp != NULL)
6742 *symp = sym;
6743
6744 if (symsecp != NULL)
6745 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6746
6747 if (tls_maskp != NULL)
6748 {
6749 struct got_entry **lgot_ents;
6750 unsigned char *tls_mask;
6751
6752 tls_mask = NULL;
6753 lgot_ents = elf_local_got_ents (ibfd);
6754 if (lgot_ents != NULL)
6755 {
6756 struct plt_entry **local_plt = (struct plt_entry **)
6757 (lgot_ents + symtab_hdr->sh_info);
6758 unsigned char *lgot_masks = (unsigned char *)
6759 (local_plt + symtab_hdr->sh_info);
6760 tls_mask = &lgot_masks[r_symndx];
6761 }
6762 *tls_maskp = tls_mask;
6763 }
6764 }
6765 return TRUE;
6766 }
6767
6768 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6769 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6770 type suitable for optimization, and 1 otherwise. */
6771
6772 static int
6773 get_tls_mask (unsigned char **tls_maskp,
6774 unsigned long *toc_symndx,
6775 bfd_vma *toc_addend,
6776 Elf_Internal_Sym **locsymsp,
6777 const Elf_Internal_Rela *rel,
6778 bfd *ibfd)
6779 {
6780 unsigned long r_symndx;
6781 int next_r;
6782 struct elf_link_hash_entry *h;
6783 Elf_Internal_Sym *sym;
6784 asection *sec;
6785 bfd_vma off;
6786
6787 r_symndx = ELF64_R_SYM (rel->r_info);
6788 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6789 return 0;
6790
6791 if ((*tls_maskp != NULL
6792 && (**tls_maskp & TLS_TLS) != 0
6793 && **tls_maskp != (TLS_TLS | TLS_MARK))
6794 || sec == NULL
6795 || ppc64_elf_section_data (sec) == NULL
6796 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6797 return 1;
6798
6799 /* Look inside a TOC section too. */
6800 if (h != NULL)
6801 {
6802 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6803 off = h->root.u.def.value;
6804 }
6805 else
6806 off = sym->st_value;
6807 off += rel->r_addend;
6808 BFD_ASSERT (off % 8 == 0);
6809 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6810 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6811 if (toc_symndx != NULL)
6812 *toc_symndx = r_symndx;
6813 if (toc_addend != NULL)
6814 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6815 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6816 return 0;
6817 if ((h == NULL || is_static_defined (h))
6818 && (next_r == -1 || next_r == -2))
6819 return 1 - next_r;
6820 return 1;
6821 }
6822
6823 /* Find (or create) an entry in the tocsave hash table. */
6824
6825 static struct tocsave_entry *
6826 tocsave_find (struct ppc_link_hash_table *htab,
6827 enum insert_option insert,
6828 Elf_Internal_Sym **local_syms,
6829 const Elf_Internal_Rela *irela,
6830 bfd *ibfd)
6831 {
6832 unsigned long r_indx;
6833 struct elf_link_hash_entry *h;
6834 Elf_Internal_Sym *sym;
6835 struct tocsave_entry ent, *p;
6836 hashval_t hash;
6837 struct tocsave_entry **slot;
6838
6839 r_indx = ELF64_R_SYM (irela->r_info);
6840 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6841 return NULL;
6842 if (ent.sec == NULL || ent.sec->output_section == NULL)
6843 {
6844 _bfd_error_handler
6845 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6846 return NULL;
6847 }
6848
6849 if (h != NULL)
6850 ent.offset = h->root.u.def.value;
6851 else
6852 ent.offset = sym->st_value;
6853 ent.offset += irela->r_addend;
6854
6855 hash = tocsave_htab_hash (&ent);
6856 slot = ((struct tocsave_entry **)
6857 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6858 if (slot == NULL)
6859 return NULL;
6860
6861 if (*slot == NULL)
6862 {
6863 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6864 if (p == NULL)
6865 return NULL;
6866 *p = ent;
6867 *slot = p;
6868 }
6869 return *slot;
6870 }
6871
6872 /* Adjust all global syms defined in opd sections. In gcc generated
6873 code for the old ABI, these will already have been done. */
6874
6875 static bfd_boolean
6876 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6877 {
6878 struct ppc_link_hash_entry *eh;
6879 asection *sym_sec;
6880 struct _opd_sec_data *opd;
6881
6882 if (h->root.type == bfd_link_hash_indirect)
6883 return TRUE;
6884
6885 if (h->root.type != bfd_link_hash_defined
6886 && h->root.type != bfd_link_hash_defweak)
6887 return TRUE;
6888
6889 eh = ppc_elf_hash_entry (h);
6890 if (eh->adjust_done)
6891 return TRUE;
6892
6893 sym_sec = eh->elf.root.u.def.section;
6894 opd = get_opd_info (sym_sec);
6895 if (opd != NULL && opd->adjust != NULL)
6896 {
6897 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6898 if (adjust == -1)
6899 {
6900 /* This entry has been deleted. */
6901 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6902 if (dsec == NULL)
6903 {
6904 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6905 if (discarded_section (dsec))
6906 {
6907 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6908 break;
6909 }
6910 }
6911 eh->elf.root.u.def.value = 0;
6912 eh->elf.root.u.def.section = dsec;
6913 }
6914 else
6915 eh->elf.root.u.def.value += adjust;
6916 eh->adjust_done = 1;
6917 }
6918 return TRUE;
6919 }
6920
6921 /* Handles decrementing dynamic reloc counts for the reloc specified by
6922 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6923 have already been determined. */
6924
6925 static bfd_boolean
6926 dec_dynrel_count (bfd_vma r_info,
6927 asection *sec,
6928 struct bfd_link_info *info,
6929 Elf_Internal_Sym **local_syms,
6930 struct elf_link_hash_entry *h,
6931 Elf_Internal_Sym *sym)
6932 {
6933 enum elf_ppc64_reloc_type r_type;
6934 asection *sym_sec = NULL;
6935
6936 /* Can this reloc be dynamic? This switch, and later tests here
6937 should be kept in sync with the code in check_relocs. */
6938 r_type = ELF64_R_TYPE (r_info);
6939 switch (r_type)
6940 {
6941 default:
6942 return TRUE;
6943
6944 case R_PPC64_TOC16:
6945 case R_PPC64_TOC16_DS:
6946 case R_PPC64_TOC16_LO:
6947 case R_PPC64_TOC16_HI:
6948 case R_PPC64_TOC16_HA:
6949 case R_PPC64_TOC16_LO_DS:
6950 if (h == NULL)
6951 return TRUE;
6952 break;
6953
6954 case R_PPC64_TPREL16:
6955 case R_PPC64_TPREL16_LO:
6956 case R_PPC64_TPREL16_HI:
6957 case R_PPC64_TPREL16_HA:
6958 case R_PPC64_TPREL16_DS:
6959 case R_PPC64_TPREL16_LO_DS:
6960 case R_PPC64_TPREL16_HIGH:
6961 case R_PPC64_TPREL16_HIGHA:
6962 case R_PPC64_TPREL16_HIGHER:
6963 case R_PPC64_TPREL16_HIGHERA:
6964 case R_PPC64_TPREL16_HIGHEST:
6965 case R_PPC64_TPREL16_HIGHESTA:
6966 case R_PPC64_TPREL64:
6967 case R_PPC64_TPREL34:
6968 case R_PPC64_DTPMOD64:
6969 case R_PPC64_DTPREL64:
6970 case R_PPC64_ADDR64:
6971 case R_PPC64_REL30:
6972 case R_PPC64_REL32:
6973 case R_PPC64_REL64:
6974 case R_PPC64_ADDR14:
6975 case R_PPC64_ADDR14_BRNTAKEN:
6976 case R_PPC64_ADDR14_BRTAKEN:
6977 case R_PPC64_ADDR16:
6978 case R_PPC64_ADDR16_DS:
6979 case R_PPC64_ADDR16_HA:
6980 case R_PPC64_ADDR16_HI:
6981 case R_PPC64_ADDR16_HIGH:
6982 case R_PPC64_ADDR16_HIGHA:
6983 case R_PPC64_ADDR16_HIGHER:
6984 case R_PPC64_ADDR16_HIGHERA:
6985 case R_PPC64_ADDR16_HIGHEST:
6986 case R_PPC64_ADDR16_HIGHESTA:
6987 case R_PPC64_ADDR16_LO:
6988 case R_PPC64_ADDR16_LO_DS:
6989 case R_PPC64_ADDR24:
6990 case R_PPC64_ADDR32:
6991 case R_PPC64_UADDR16:
6992 case R_PPC64_UADDR32:
6993 case R_PPC64_UADDR64:
6994 case R_PPC64_TOC:
6995 case R_PPC64_D34:
6996 case R_PPC64_D34_LO:
6997 case R_PPC64_D34_HI30:
6998 case R_PPC64_D34_HA30:
6999 case R_PPC64_ADDR16_HIGHER34:
7000 case R_PPC64_ADDR16_HIGHERA34:
7001 case R_PPC64_ADDR16_HIGHEST34:
7002 case R_PPC64_ADDR16_HIGHESTA34:
7003 case R_PPC64_D28:
7004 break;
7005 }
7006
7007 if (local_syms != NULL)
7008 {
7009 unsigned long r_symndx;
7010 bfd *ibfd = sec->owner;
7011
7012 r_symndx = ELF64_R_SYM (r_info);
7013 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7014 return FALSE;
7015 }
7016
7017 if ((h != NULL
7018 && (h->root.type == bfd_link_hash_defweak
7019 || !h->def_regular))
7020 || (h != NULL
7021 && !bfd_link_executable (info)
7022 && !SYMBOLIC_BIND (info, h))
7023 || (bfd_link_pic (info)
7024 && must_be_dyn_reloc (info, r_type))
7025 || (!bfd_link_pic (info)
7026 && (h != NULL
7027 ? h->type == STT_GNU_IFUNC
7028 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
7029 ;
7030 else
7031 return TRUE;
7032
7033 if (h != NULL)
7034 {
7035 struct elf_dyn_relocs *p;
7036 struct elf_dyn_relocs **pp;
7037 pp = &h->dyn_relocs;
7038
7039 /* elf_gc_sweep may have already removed all dyn relocs associated
7040 with local syms for a given section. Also, symbol flags are
7041 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7042 report a dynreloc miscount. */
7043 if (*pp == NULL && info->gc_sections)
7044 return TRUE;
7045
7046 while ((p = *pp) != NULL)
7047 {
7048 if (p->sec == sec)
7049 {
7050 if (!must_be_dyn_reloc (info, r_type))
7051 p->pc_count -= 1;
7052 p->count -= 1;
7053 if (p->count == 0)
7054 *pp = p->next;
7055 return TRUE;
7056 }
7057 pp = &p->next;
7058 }
7059 }
7060 else
7061 {
7062 struct ppc_dyn_relocs *p;
7063 struct ppc_dyn_relocs **pp;
7064 void *vpp;
7065 bfd_boolean is_ifunc;
7066
7067 if (local_syms == NULL)
7068 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7069 if (sym_sec == NULL)
7070 sym_sec = sec;
7071
7072 vpp = &elf_section_data (sym_sec)->local_dynrel;
7073 pp = (struct ppc_dyn_relocs **) vpp;
7074
7075 if (*pp == NULL && info->gc_sections)
7076 return TRUE;
7077
7078 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7079 while ((p = *pp) != NULL)
7080 {
7081 if (p->sec == sec && p->ifunc == is_ifunc)
7082 {
7083 p->count -= 1;
7084 if (p->count == 0)
7085 *pp = p->next;
7086 return TRUE;
7087 }
7088 pp = &p->next;
7089 }
7090 }
7091
7092 /* xgettext:c-format */
7093 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7094 sec->owner, sec);
7095 bfd_set_error (bfd_error_bad_value);
7096 return FALSE;
7097 }
7098
7099 /* Remove unused Official Procedure Descriptor entries. Currently we
7100 only remove those associated with functions in discarded link-once
7101 sections, or weakly defined functions that have been overridden. It
7102 would be possible to remove many more entries for statically linked
7103 applications. */
7104
7105 bfd_boolean
7106 ppc64_elf_edit_opd (struct bfd_link_info *info)
7107 {
7108 bfd *ibfd;
7109 bfd_boolean some_edited = FALSE;
7110 asection *need_pad = NULL;
7111 struct ppc_link_hash_table *htab;
7112
7113 htab = ppc_hash_table (info);
7114 if (htab == NULL)
7115 return FALSE;
7116
7117 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7118 {
7119 asection *sec;
7120 Elf_Internal_Rela *relstart, *rel, *relend;
7121 Elf_Internal_Shdr *symtab_hdr;
7122 Elf_Internal_Sym *local_syms;
7123 struct _opd_sec_data *opd;
7124 bfd_boolean need_edit, add_aux_fields, broken;
7125 bfd_size_type cnt_16b = 0;
7126
7127 if (!is_ppc64_elf (ibfd))
7128 continue;
7129
7130 sec = bfd_get_section_by_name (ibfd, ".opd");
7131 if (sec == NULL || sec->size == 0)
7132 continue;
7133
7134 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7135 continue;
7136
7137 if (sec->output_section == bfd_abs_section_ptr)
7138 continue;
7139
7140 /* Look through the section relocs. */
7141 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7142 continue;
7143
7144 local_syms = NULL;
7145 symtab_hdr = &elf_symtab_hdr (ibfd);
7146
7147 /* Read the relocations. */
7148 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7149 info->keep_memory);
7150 if (relstart == NULL)
7151 return FALSE;
7152
7153 /* First run through the relocs to check they are sane, and to
7154 determine whether we need to edit this opd section. */
7155 need_edit = FALSE;
7156 broken = FALSE;
7157 need_pad = sec;
7158 relend = relstart + sec->reloc_count;
7159 for (rel = relstart; rel < relend; )
7160 {
7161 enum elf_ppc64_reloc_type r_type;
7162 unsigned long r_symndx;
7163 asection *sym_sec;
7164 struct elf_link_hash_entry *h;
7165 Elf_Internal_Sym *sym;
7166 bfd_vma offset;
7167
7168 /* .opd contains an array of 16 or 24 byte entries. We're
7169 only interested in the reloc pointing to a function entry
7170 point. */
7171 offset = rel->r_offset;
7172 if (rel + 1 == relend
7173 || rel[1].r_offset != offset + 8)
7174 {
7175 /* If someone messes with .opd alignment then after a
7176 "ld -r" we might have padding in the middle of .opd.
7177 Also, there's nothing to prevent someone putting
7178 something silly in .opd with the assembler. No .opd
7179 optimization for them! */
7180 broken_opd:
7181 _bfd_error_handler
7182 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7183 broken = TRUE;
7184 break;
7185 }
7186
7187 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7188 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7189 {
7190 _bfd_error_handler
7191 /* xgettext:c-format */
7192 (_("%pB: unexpected reloc type %u in .opd section"),
7193 ibfd, r_type);
7194 broken = TRUE;
7195 break;
7196 }
7197
7198 r_symndx = ELF64_R_SYM (rel->r_info);
7199 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7200 r_symndx, ibfd))
7201 goto error_ret;
7202
7203 if (sym_sec == NULL || sym_sec->owner == NULL)
7204 {
7205 const char *sym_name;
7206 if (h != NULL)
7207 sym_name = h->root.root.string;
7208 else
7209 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7210 sym_sec);
7211
7212 _bfd_error_handler
7213 /* xgettext:c-format */
7214 (_("%pB: undefined sym `%s' in .opd section"),
7215 ibfd, sym_name);
7216 broken = TRUE;
7217 break;
7218 }
7219
7220 /* opd entries are always for functions defined in the
7221 current input bfd. If the symbol isn't defined in the
7222 input bfd, then we won't be using the function in this
7223 bfd; It must be defined in a linkonce section in another
7224 bfd, or is weak. It's also possible that we are
7225 discarding the function due to a linker script /DISCARD/,
7226 which we test for via the output_section. */
7227 if (sym_sec->owner != ibfd
7228 || sym_sec->output_section == bfd_abs_section_ptr)
7229 need_edit = TRUE;
7230
7231 rel += 2;
7232 if (rel + 1 == relend
7233 || (rel + 2 < relend
7234 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7235 ++rel;
7236
7237 if (rel == relend)
7238 {
7239 if (sec->size == offset + 24)
7240 {
7241 need_pad = NULL;
7242 break;
7243 }
7244 if (sec->size == offset + 16)
7245 {
7246 cnt_16b++;
7247 break;
7248 }
7249 goto broken_opd;
7250 }
7251 else if (rel + 1 < relend
7252 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7253 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7254 {
7255 if (rel[0].r_offset == offset + 16)
7256 cnt_16b++;
7257 else if (rel[0].r_offset != offset + 24)
7258 goto broken_opd;
7259 }
7260 else
7261 goto broken_opd;
7262 }
7263
7264 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7265
7266 if (!broken && (need_edit || add_aux_fields))
7267 {
7268 Elf_Internal_Rela *write_rel;
7269 Elf_Internal_Shdr *rel_hdr;
7270 bfd_byte *rptr, *wptr;
7271 bfd_byte *new_contents;
7272 bfd_size_type amt;
7273
7274 new_contents = NULL;
7275 amt = OPD_NDX (sec->size) * sizeof (long);
7276 opd = &ppc64_elf_section_data (sec)->u.opd;
7277 opd->adjust = bfd_zalloc (sec->owner, amt);
7278 if (opd->adjust == NULL)
7279 return FALSE;
7280
7281 /* This seems a waste of time as input .opd sections are all
7282 zeros as generated by gcc, but I suppose there's no reason
7283 this will always be so. We might start putting something in
7284 the third word of .opd entries. */
7285 if ((sec->flags & SEC_IN_MEMORY) == 0)
7286 {
7287 bfd_byte *loc;
7288 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7289 {
7290 free (loc);
7291 error_ret:
7292 if (symtab_hdr->contents != (unsigned char *) local_syms)
7293 free (local_syms);
7294 if (elf_section_data (sec)->relocs != relstart)
7295 free (relstart);
7296 return FALSE;
7297 }
7298 sec->contents = loc;
7299 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7300 }
7301
7302 elf_section_data (sec)->relocs = relstart;
7303
7304 new_contents = sec->contents;
7305 if (add_aux_fields)
7306 {
7307 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7308 if (new_contents == NULL)
7309 return FALSE;
7310 need_pad = NULL;
7311 }
7312 wptr = new_contents;
7313 rptr = sec->contents;
7314 write_rel = relstart;
7315 for (rel = relstart; rel < relend; )
7316 {
7317 unsigned long r_symndx;
7318 asection *sym_sec;
7319 struct elf_link_hash_entry *h;
7320 struct ppc_link_hash_entry *fdh = NULL;
7321 Elf_Internal_Sym *sym;
7322 long opd_ent_size;
7323 Elf_Internal_Rela *next_rel;
7324 bfd_boolean skip;
7325
7326 r_symndx = ELF64_R_SYM (rel->r_info);
7327 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7328 r_symndx, ibfd))
7329 goto error_ret;
7330
7331 next_rel = rel + 2;
7332 if (next_rel + 1 == relend
7333 || (next_rel + 2 < relend
7334 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7335 ++next_rel;
7336
7337 /* See if the .opd entry is full 24 byte or
7338 16 byte (with fd_aux entry overlapped with next
7339 fd_func). */
7340 opd_ent_size = 24;
7341 if (next_rel == relend)
7342 {
7343 if (sec->size == rel->r_offset + 16)
7344 opd_ent_size = 16;
7345 }
7346 else if (next_rel->r_offset == rel->r_offset + 16)
7347 opd_ent_size = 16;
7348
7349 if (h != NULL
7350 && h->root.root.string[0] == '.')
7351 {
7352 fdh = ppc_elf_hash_entry (h)->oh;
7353 if (fdh != NULL)
7354 {
7355 fdh = ppc_follow_link (fdh);
7356 if (fdh->elf.root.type != bfd_link_hash_defined
7357 && fdh->elf.root.type != bfd_link_hash_defweak)
7358 fdh = NULL;
7359 }
7360 }
7361
7362 skip = (sym_sec->owner != ibfd
7363 || sym_sec->output_section == bfd_abs_section_ptr);
7364 if (skip)
7365 {
7366 if (fdh != NULL && sym_sec->owner == ibfd)
7367 {
7368 /* Arrange for the function descriptor sym
7369 to be dropped. */
7370 fdh->elf.root.u.def.value = 0;
7371 fdh->elf.root.u.def.section = sym_sec;
7372 }
7373 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7374
7375 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7376 rel = next_rel;
7377 else
7378 while (1)
7379 {
7380 if (!dec_dynrel_count (rel->r_info, sec, info,
7381 NULL, h, sym))
7382 goto error_ret;
7383
7384 if (++rel == next_rel)
7385 break;
7386
7387 r_symndx = ELF64_R_SYM (rel->r_info);
7388 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7389 r_symndx, ibfd))
7390 goto error_ret;
7391 }
7392 }
7393 else
7394 {
7395 /* We'll be keeping this opd entry. */
7396 long adjust;
7397
7398 if (fdh != NULL)
7399 {
7400 /* Redefine the function descriptor symbol to
7401 this location in the opd section. It is
7402 necessary to update the value here rather
7403 than using an array of adjustments as we do
7404 for local symbols, because various places
7405 in the generic ELF code use the value
7406 stored in u.def.value. */
7407 fdh->elf.root.u.def.value = wptr - new_contents;
7408 fdh->adjust_done = 1;
7409 }
7410
7411 /* Local syms are a bit tricky. We could
7412 tweak them as they can be cached, but
7413 we'd need to look through the local syms
7414 for the function descriptor sym which we
7415 don't have at the moment. So keep an
7416 array of adjustments. */
7417 adjust = (wptr - new_contents) - (rptr - sec->contents);
7418 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7419
7420 if (wptr != rptr)
7421 memcpy (wptr, rptr, opd_ent_size);
7422 wptr += opd_ent_size;
7423 if (add_aux_fields && opd_ent_size == 16)
7424 {
7425 memset (wptr, '\0', 8);
7426 wptr += 8;
7427 }
7428
7429 /* We need to adjust any reloc offsets to point to the
7430 new opd entries. */
7431 for ( ; rel != next_rel; ++rel)
7432 {
7433 rel->r_offset += adjust;
7434 if (write_rel != rel)
7435 memcpy (write_rel, rel, sizeof (*rel));
7436 ++write_rel;
7437 }
7438 }
7439
7440 rptr += opd_ent_size;
7441 }
7442
7443 sec->size = wptr - new_contents;
7444 sec->reloc_count = write_rel - relstart;
7445 if (add_aux_fields)
7446 {
7447 free (sec->contents);
7448 sec->contents = new_contents;
7449 }
7450
7451 /* Fudge the header size too, as this is used later in
7452 elf_bfd_final_link if we are emitting relocs. */
7453 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7454 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7455 some_edited = TRUE;
7456 }
7457 else if (elf_section_data (sec)->relocs != relstart)
7458 free (relstart);
7459
7460 if (local_syms != NULL
7461 && symtab_hdr->contents != (unsigned char *) local_syms)
7462 {
7463 if (!info->keep_memory)
7464 free (local_syms);
7465 else
7466 symtab_hdr->contents = (unsigned char *) local_syms;
7467 }
7468 }
7469
7470 if (some_edited)
7471 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7472
7473 /* If we are doing a final link and the last .opd entry is just 16 byte
7474 long, add a 8 byte padding after it. */
7475 if (need_pad != NULL && !bfd_link_relocatable (info))
7476 {
7477 bfd_byte *p;
7478
7479 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7480 {
7481 BFD_ASSERT (need_pad->size > 0);
7482
7483 p = bfd_malloc (need_pad->size + 8);
7484 if (p == NULL)
7485 return FALSE;
7486
7487 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7488 p, 0, need_pad->size))
7489 return FALSE;
7490
7491 need_pad->contents = p;
7492 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7493 }
7494 else
7495 {
7496 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7497 if (p == NULL)
7498 return FALSE;
7499
7500 need_pad->contents = p;
7501 }
7502
7503 memset (need_pad->contents + need_pad->size, 0, 8);
7504 need_pad->size += 8;
7505 }
7506
7507 return TRUE;
7508 }
7509
7510 /* Analyze inline PLT call relocations to see whether calls to locally
7511 defined functions can be converted to direct calls. */
7512
7513 bfd_boolean
7514 ppc64_elf_inline_plt (struct bfd_link_info *info)
7515 {
7516 struct ppc_link_hash_table *htab;
7517 bfd *ibfd;
7518 asection *sec;
7519 bfd_vma low_vma, high_vma, limit;
7520
7521 htab = ppc_hash_table (info);
7522 if (htab == NULL)
7523 return FALSE;
7524
7525 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7526 reduced somewhat to cater for possible stubs that might be added
7527 between the call and its destination. */
7528 if (htab->params->group_size < 0)
7529 {
7530 limit = -htab->params->group_size;
7531 if (limit == 1)
7532 limit = 0x1e00000;
7533 }
7534 else
7535 {
7536 limit = htab->params->group_size;
7537 if (limit == 1)
7538 limit = 0x1c00000;
7539 }
7540
7541 low_vma = -1;
7542 high_vma = 0;
7543 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7544 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7545 {
7546 if (low_vma > sec->vma)
7547 low_vma = sec->vma;
7548 if (high_vma < sec->vma + sec->size)
7549 high_vma = sec->vma + sec->size;
7550 }
7551
7552 /* If a "bl" can reach anywhere in local code sections, then we can
7553 convert all inline PLT sequences to direct calls when the symbol
7554 is local. */
7555 if (high_vma - low_vma < limit)
7556 {
7557 htab->can_convert_all_inline_plt = 1;
7558 return TRUE;
7559 }
7560
7561 /* Otherwise, go looking through relocs for cases where a direct
7562 call won't reach. Mark the symbol on any such reloc to disable
7563 the optimization and keep the PLT entry as it seems likely that
7564 this will be better than creating trampolines. Note that this
7565 will disable the optimization for all inline PLT calls to a
7566 particular symbol, not just those that won't reach. The
7567 difficulty in doing a more precise optimization is that the
7568 linker needs to make a decision depending on whether a
7569 particular R_PPC64_PLTCALL insn can be turned into a direct
7570 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7571 the sequence, and there is nothing that ties those relocs
7572 together except their symbol. */
7573
7574 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7575 {
7576 Elf_Internal_Shdr *symtab_hdr;
7577 Elf_Internal_Sym *local_syms;
7578
7579 if (!is_ppc64_elf (ibfd))
7580 continue;
7581
7582 local_syms = NULL;
7583 symtab_hdr = &elf_symtab_hdr (ibfd);
7584
7585 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7586 if (ppc64_elf_section_data (sec)->has_pltcall
7587 && !bfd_is_abs_section (sec->output_section))
7588 {
7589 Elf_Internal_Rela *relstart, *rel, *relend;
7590
7591 /* Read the relocations. */
7592 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7593 info->keep_memory);
7594 if (relstart == NULL)
7595 return FALSE;
7596
7597 relend = relstart + sec->reloc_count;
7598 for (rel = relstart; rel < relend; rel++)
7599 {
7600 enum elf_ppc64_reloc_type r_type;
7601 unsigned long r_symndx;
7602 asection *sym_sec;
7603 struct elf_link_hash_entry *h;
7604 Elf_Internal_Sym *sym;
7605 unsigned char *tls_maskp;
7606
7607 r_type = ELF64_R_TYPE (rel->r_info);
7608 if (r_type != R_PPC64_PLTCALL
7609 && r_type != R_PPC64_PLTCALL_NOTOC)
7610 continue;
7611
7612 r_symndx = ELF64_R_SYM (rel->r_info);
7613 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7614 r_symndx, ibfd))
7615 {
7616 if (elf_section_data (sec)->relocs != relstart)
7617 free (relstart);
7618 if (symtab_hdr->contents != (bfd_byte *) local_syms)
7619 free (local_syms);
7620 return FALSE;
7621 }
7622
7623 if (sym_sec != NULL && sym_sec->output_section != NULL)
7624 {
7625 bfd_vma from, to;
7626 if (h != NULL)
7627 to = h->root.u.def.value;
7628 else
7629 to = sym->st_value;
7630 to += (rel->r_addend
7631 + sym_sec->output_offset
7632 + sym_sec->output_section->vma);
7633 from = (rel->r_offset
7634 + sec->output_offset
7635 + sec->output_section->vma);
7636 if (to - from + limit < 2 * limit
7637 && !(r_type == R_PPC64_PLTCALL_NOTOC
7638 && (((h ? h->other : sym->st_other)
7639 & STO_PPC64_LOCAL_MASK)
7640 > 1 << STO_PPC64_LOCAL_BIT)))
7641 *tls_maskp &= ~PLT_KEEP;
7642 }
7643 }
7644 if (elf_section_data (sec)->relocs != relstart)
7645 free (relstart);
7646 }
7647
7648 if (local_syms != NULL
7649 && symtab_hdr->contents != (unsigned char *) local_syms)
7650 {
7651 if (!info->keep_memory)
7652 free (local_syms);
7653 else
7654 symtab_hdr->contents = (unsigned char *) local_syms;
7655 }
7656 }
7657
7658 return TRUE;
7659 }
7660
7661 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7662
7663 asection *
7664 ppc64_elf_tls_setup (struct bfd_link_info *info)
7665 {
7666 struct ppc_link_hash_table *htab;
7667 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
7668
7669 htab = ppc_hash_table (info);
7670 if (htab == NULL)
7671 return NULL;
7672
7673 if (abiversion (info->output_bfd) == 1)
7674 htab->opd_abi = 1;
7675
7676 if (htab->params->no_multi_toc)
7677 htab->do_multi_toc = 0;
7678 else if (!htab->do_multi_toc)
7679 htab->params->no_multi_toc = 1;
7680
7681 /* Default to --no-plt-localentry, as this option can cause problems
7682 with symbol interposition. For example, glibc libpthread.so and
7683 libc.so duplicate many pthread symbols, with a fallback
7684 implementation in libc.so. In some cases the fallback does more
7685 work than the pthread implementation. __pthread_condattr_destroy
7686 is one such symbol: the libpthread.so implementation is
7687 localentry:0 while the libc.so implementation is localentry:8.
7688 An app that "cleverly" uses dlopen to only load necessary
7689 libraries at runtime may omit loading libpthread.so when not
7690 running multi-threaded, which then results in the libc.so
7691 fallback symbols being used and ld.so complaining. Now there
7692 are workarounds in ld (see non_zero_localentry) to detect the
7693 pthread situation, but that may not be the only case where
7694 --plt-localentry can cause trouble. */
7695 if (htab->params->plt_localentry0 < 0)
7696 htab->params->plt_localentry0 = 0;
7697 if (htab->params->plt_localentry0
7698 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7699 FALSE, FALSE, FALSE) == NULL)
7700 _bfd_error_handler
7701 (_("warning: --plt-localentry is especially dangerous without "
7702 "ld.so support to detect ABI violations"));
7703
7704 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7705 FALSE, FALSE, TRUE);
7706 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7707
7708 /* Move dynamic linking info to the function descriptor sym. */
7709 if (tga != NULL)
7710 func_desc_adjust (tga, info);
7711 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7712 FALSE, FALSE, TRUE);
7713 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7714
7715 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7716 FALSE, FALSE, TRUE);
7717 htab->tga_desc = ppc_elf_hash_entry (desc);
7718 if (desc != NULL)
7719 func_desc_adjust (desc, info);
7720 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7721 FALSE, FALSE, TRUE);
7722 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7723
7724 if (htab->params->tls_get_addr_opt)
7725 {
7726 struct elf_link_hash_entry *opt, *opt_fd;
7727
7728 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7729 FALSE, FALSE, TRUE);
7730 if (opt != NULL)
7731 func_desc_adjust (opt, info);
7732 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7733 FALSE, FALSE, TRUE);
7734 if (opt_fd != NULL
7735 && (opt_fd->root.type == bfd_link_hash_defined
7736 || opt_fd->root.type == bfd_link_hash_defweak))
7737 {
7738 /* If glibc supports an optimized __tls_get_addr call stub,
7739 signalled by the presence of __tls_get_addr_opt, and we'll
7740 be calling __tls_get_addr via a plt call stub, then
7741 make __tls_get_addr point to __tls_get_addr_opt. */
7742 if (!(htab->elf.dynamic_sections_created
7743 && tga_fd != NULL
7744 && (tga_fd->type == STT_FUNC
7745 || tga_fd->needs_plt)
7746 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7747 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7748 tga_fd = NULL;
7749 if (!(htab->elf.dynamic_sections_created
7750 && desc_fd != NULL
7751 && (desc_fd->type == STT_FUNC
7752 || desc_fd->needs_plt)
7753 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7754 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7755 desc_fd = NULL;
7756
7757 if (tga_fd != NULL || desc_fd != NULL)
7758 {
7759 struct plt_entry *ent = NULL;
7760
7761 if (tga_fd != NULL)
7762 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7763 if (ent->plt.refcount > 0)
7764 break;
7765 if (ent == NULL && desc_fd != NULL)
7766 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7767 if (ent->plt.refcount > 0)
7768 break;
7769 if (ent != NULL)
7770 {
7771 if (tga_fd != NULL)
7772 {
7773 tga_fd->root.type = bfd_link_hash_indirect;
7774 tga_fd->root.u.i.link = &opt_fd->root;
7775 tga_fd->root.u.i.warning = NULL;
7776 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7777 }
7778 if (desc_fd != NULL)
7779 {
7780 desc_fd->root.type = bfd_link_hash_indirect;
7781 desc_fd->root.u.i.link = &opt_fd->root;
7782 desc_fd->root.u.i.warning = NULL;
7783 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7784 }
7785 opt_fd->mark = 1;
7786 if (opt_fd->dynindx != -1)
7787 {
7788 /* Use __tls_get_addr_opt in dynamic relocations. */
7789 opt_fd->dynindx = -1;
7790 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7791 opt_fd->dynstr_index);
7792 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7793 return NULL;
7794 }
7795 if (tga_fd != NULL)
7796 {
7797 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7798 tga = &htab->tls_get_addr->elf;
7799 if (opt != NULL && tga != NULL)
7800 {
7801 tga->root.type = bfd_link_hash_indirect;
7802 tga->root.u.i.link = &opt->root;
7803 tga->root.u.i.warning = NULL;
7804 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7805 opt->mark = 1;
7806 _bfd_elf_link_hash_hide_symbol (info, opt,
7807 tga->forced_local);
7808 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7809 }
7810 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7811 htab->tls_get_addr_fd->is_func_descriptor = 1;
7812 if (htab->tls_get_addr != NULL)
7813 {
7814 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7815 htab->tls_get_addr->is_func = 1;
7816 }
7817 }
7818 if (desc_fd != NULL)
7819 {
7820 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7821 if (opt != NULL && desc != NULL)
7822 {
7823 desc->root.type = bfd_link_hash_indirect;
7824 desc->root.u.i.link = &opt->root;
7825 desc->root.u.i.warning = NULL;
7826 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7827 opt->mark = 1;
7828 _bfd_elf_link_hash_hide_symbol (info, opt,
7829 desc->forced_local);
7830 htab->tga_desc = ppc_elf_hash_entry (opt);
7831 }
7832 htab->tga_desc_fd->oh = htab->tga_desc;
7833 htab->tga_desc_fd->is_func_descriptor = 1;
7834 if (htab->tga_desc != NULL)
7835 {
7836 htab->tga_desc->oh = htab->tga_desc_fd;
7837 htab->tga_desc->is_func = 1;
7838 }
7839 }
7840 }
7841 }
7842 }
7843 else if (htab->params->tls_get_addr_opt < 0)
7844 htab->params->tls_get_addr_opt = 0;
7845 }
7846
7847 if (htab->tga_desc_fd != NULL
7848 && htab->params->tls_get_addr_opt
7849 && htab->params->no_tls_get_addr_regsave == -1)
7850 htab->params->no_tls_get_addr_regsave = 0;
7851
7852 return _bfd_elf_tls_setup (info->output_bfd, info);
7853 }
7854
7855 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7856 any of HASH1, HASH2, HASH3, or HASH4. */
7857
7858 static bfd_boolean
7859 branch_reloc_hash_match (const bfd *ibfd,
7860 const Elf_Internal_Rela *rel,
7861 const struct ppc_link_hash_entry *hash1,
7862 const struct ppc_link_hash_entry *hash2,
7863 const struct ppc_link_hash_entry *hash3,
7864 const struct ppc_link_hash_entry *hash4)
7865 {
7866 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7867 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7868 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7869
7870 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7871 {
7872 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7873 struct elf_link_hash_entry *h;
7874
7875 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7876 h = elf_follow_link (h);
7877 if (h == &hash1->elf || h == &hash2->elf
7878 || h == &hash3->elf || h == &hash4->elf)
7879 return TRUE;
7880 }
7881 return FALSE;
7882 }
7883
7884 /* Run through all the TLS relocs looking for optimization
7885 opportunities. The linker has been hacked (see ppc64elf.em) to do
7886 a preliminary section layout so that we know the TLS segment
7887 offsets. We can't optimize earlier because some optimizations need
7888 to know the tp offset, and we need to optimize before allocating
7889 dynamic relocations. */
7890
7891 bfd_boolean
7892 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7893 {
7894 bfd *ibfd;
7895 asection *sec;
7896 struct ppc_link_hash_table *htab;
7897 unsigned char *toc_ref;
7898 int pass;
7899
7900 if (!bfd_link_executable (info))
7901 return TRUE;
7902
7903 htab = ppc_hash_table (info);
7904 if (htab == NULL)
7905 return FALSE;
7906
7907 /* Make two passes over the relocs. On the first pass, mark toc
7908 entries involved with tls relocs, and check that tls relocs
7909 involved in setting up a tls_get_addr call are indeed followed by
7910 such a call. If they are not, we can't do any tls optimization.
7911 On the second pass twiddle tls_mask flags to notify
7912 relocate_section that optimization can be done, and adjust got
7913 and plt refcounts. */
7914 toc_ref = NULL;
7915 for (pass = 0; pass < 2; ++pass)
7916 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7917 {
7918 Elf_Internal_Sym *locsyms = NULL;
7919 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7920
7921 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7922 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7923 {
7924 Elf_Internal_Rela *relstart, *rel, *relend;
7925 bfd_boolean found_tls_get_addr_arg = 0;
7926
7927 /* Read the relocations. */
7928 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7929 info->keep_memory);
7930 if (relstart == NULL)
7931 {
7932 free (toc_ref);
7933 return FALSE;
7934 }
7935
7936 relend = relstart + sec->reloc_count;
7937 for (rel = relstart; rel < relend; rel++)
7938 {
7939 enum elf_ppc64_reloc_type r_type;
7940 unsigned long r_symndx;
7941 struct elf_link_hash_entry *h;
7942 Elf_Internal_Sym *sym;
7943 asection *sym_sec;
7944 unsigned char *tls_mask;
7945 unsigned int tls_set, tls_clear, tls_type = 0;
7946 bfd_vma value;
7947 bfd_boolean ok_tprel, is_local;
7948 long toc_ref_index = 0;
7949 int expecting_tls_get_addr = 0;
7950 bfd_boolean ret = FALSE;
7951
7952 r_symndx = ELF64_R_SYM (rel->r_info);
7953 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7954 r_symndx, ibfd))
7955 {
7956 err_free_rel:
7957 if (elf_section_data (sec)->relocs != relstart)
7958 free (relstart);
7959 free (toc_ref);
7960 if (elf_symtab_hdr (ibfd).contents
7961 != (unsigned char *) locsyms)
7962 free (locsyms);
7963 return ret;
7964 }
7965
7966 if (h != NULL)
7967 {
7968 if (h->root.type == bfd_link_hash_defined
7969 || h->root.type == bfd_link_hash_defweak)
7970 value = h->root.u.def.value;
7971 else if (h->root.type == bfd_link_hash_undefweak)
7972 value = 0;
7973 else
7974 {
7975 found_tls_get_addr_arg = 0;
7976 continue;
7977 }
7978 }
7979 else
7980 /* Symbols referenced by TLS relocs must be of type
7981 STT_TLS. So no need for .opd local sym adjust. */
7982 value = sym->st_value;
7983
7984 ok_tprel = FALSE;
7985 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7986 if (is_local)
7987 {
7988 if (h != NULL
7989 && h->root.type == bfd_link_hash_undefweak)
7990 ok_tprel = TRUE;
7991 else if (sym_sec != NULL
7992 && sym_sec->output_section != NULL)
7993 {
7994 value += sym_sec->output_offset;
7995 value += sym_sec->output_section->vma;
7996 value -= htab->elf.tls_sec->vma + TP_OFFSET;
7997 /* Note that even though the prefix insns
7998 allow a 1<<33 offset we use the same test
7999 as for addis;addi. There may be a mix of
8000 pcrel and non-pcrel code and the decision
8001 to optimise is per symbol, not per TLS
8002 sequence. */
8003 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
8004 }
8005 }
8006
8007 r_type = ELF64_R_TYPE (rel->r_info);
8008 /* If this section has old-style __tls_get_addr calls
8009 without marker relocs, then check that each
8010 __tls_get_addr call reloc is preceded by a reloc
8011 that conceivably belongs to the __tls_get_addr arg
8012 setup insn. If we don't find matching arg setup
8013 relocs, don't do any tls optimization. */
8014 if (pass == 0
8015 && sec->nomark_tls_get_addr
8016 && h != NULL
8017 && is_tls_get_addr (h, htab)
8018 && !found_tls_get_addr_arg
8019 && is_branch_reloc (r_type))
8020 {
8021 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8022 "TLS optimization disabled\n"),
8023 ibfd, sec, rel->r_offset);
8024 ret = TRUE;
8025 goto err_free_rel;
8026 }
8027
8028 found_tls_get_addr_arg = 0;
8029 switch (r_type)
8030 {
8031 case R_PPC64_GOT_TLSLD16:
8032 case R_PPC64_GOT_TLSLD16_LO:
8033 case R_PPC64_GOT_TLSLD_PCREL34:
8034 expecting_tls_get_addr = 1;
8035 found_tls_get_addr_arg = 1;
8036 /* Fall through. */
8037
8038 case R_PPC64_GOT_TLSLD16_HI:
8039 case R_PPC64_GOT_TLSLD16_HA:
8040 /* These relocs should never be against a symbol
8041 defined in a shared lib. Leave them alone if
8042 that turns out to be the case. */
8043 if (!is_local)
8044 continue;
8045
8046 /* LD -> LE */
8047 tls_set = 0;
8048 tls_clear = TLS_LD;
8049 tls_type = TLS_TLS | TLS_LD;
8050 break;
8051
8052 case R_PPC64_GOT_TLSGD16:
8053 case R_PPC64_GOT_TLSGD16_LO:
8054 case R_PPC64_GOT_TLSGD_PCREL34:
8055 expecting_tls_get_addr = 1;
8056 found_tls_get_addr_arg = 1;
8057 /* Fall through. */
8058
8059 case R_PPC64_GOT_TLSGD16_HI:
8060 case R_PPC64_GOT_TLSGD16_HA:
8061 if (ok_tprel)
8062 /* GD -> LE */
8063 tls_set = 0;
8064 else
8065 /* GD -> IE */
8066 tls_set = TLS_TLS | TLS_GDIE;
8067 tls_clear = TLS_GD;
8068 tls_type = TLS_TLS | TLS_GD;
8069 break;
8070
8071 case R_PPC64_GOT_TPREL_PCREL34:
8072 case R_PPC64_GOT_TPREL16_DS:
8073 case R_PPC64_GOT_TPREL16_LO_DS:
8074 case R_PPC64_GOT_TPREL16_HI:
8075 case R_PPC64_GOT_TPREL16_HA:
8076 if (ok_tprel)
8077 {
8078 /* IE -> LE */
8079 tls_set = 0;
8080 tls_clear = TLS_TPREL;
8081 tls_type = TLS_TLS | TLS_TPREL;
8082 break;
8083 }
8084 continue;
8085
8086 case R_PPC64_TLSLD:
8087 if (!is_local)
8088 continue;
8089 /* Fall through. */
8090 case R_PPC64_TLSGD:
8091 if (rel + 1 < relend
8092 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8093 {
8094 if (pass != 0
8095 && (ELF64_R_TYPE (rel[1].r_info)
8096 != R_PPC64_PLTSEQ)
8097 && (ELF64_R_TYPE (rel[1].r_info)
8098 != R_PPC64_PLTSEQ_NOTOC))
8099 {
8100 r_symndx = ELF64_R_SYM (rel[1].r_info);
8101 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8102 r_symndx, ibfd))
8103 goto err_free_rel;
8104 if (h != NULL)
8105 {
8106 struct plt_entry *ent = NULL;
8107
8108 for (ent = h->plt.plist;
8109 ent != NULL;
8110 ent = ent->next)
8111 if (ent->addend == rel[1].r_addend)
8112 break;
8113
8114 if (ent != NULL
8115 && ent->plt.refcount > 0)
8116 ent->plt.refcount -= 1;
8117 }
8118 }
8119 continue;
8120 }
8121 found_tls_get_addr_arg = 1;
8122 /* Fall through. */
8123
8124 case R_PPC64_TLS:
8125 case R_PPC64_TOC16:
8126 case R_PPC64_TOC16_LO:
8127 if (sym_sec == NULL || sym_sec != toc)
8128 continue;
8129
8130 /* Mark this toc entry as referenced by a TLS
8131 code sequence. We can do that now in the
8132 case of R_PPC64_TLS, and after checking for
8133 tls_get_addr for the TOC16 relocs. */
8134 if (toc_ref == NULL)
8135 toc_ref
8136 = bfd_zmalloc (toc->output_section->rawsize / 8);
8137 if (toc_ref == NULL)
8138 goto err_free_rel;
8139
8140 if (h != NULL)
8141 value = h->root.u.def.value;
8142 else
8143 value = sym->st_value;
8144 value += rel->r_addend;
8145 if (value % 8 != 0)
8146 continue;
8147 BFD_ASSERT (value < toc->size
8148 && toc->output_offset % 8 == 0);
8149 toc_ref_index = (value + toc->output_offset) / 8;
8150 if (r_type == R_PPC64_TLS
8151 || r_type == R_PPC64_TLSGD
8152 || r_type == R_PPC64_TLSLD)
8153 {
8154 toc_ref[toc_ref_index] = 1;
8155 continue;
8156 }
8157
8158 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8159 continue;
8160
8161 tls_set = 0;
8162 tls_clear = 0;
8163 expecting_tls_get_addr = 2;
8164 break;
8165
8166 case R_PPC64_TPREL64:
8167 if (pass == 0
8168 || sec != toc
8169 || toc_ref == NULL
8170 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8171 continue;
8172 if (ok_tprel)
8173 {
8174 /* IE -> LE */
8175 tls_set = TLS_EXPLICIT;
8176 tls_clear = TLS_TPREL;
8177 break;
8178 }
8179 continue;
8180
8181 case R_PPC64_DTPMOD64:
8182 if (pass == 0
8183 || sec != toc
8184 || toc_ref == NULL
8185 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8186 continue;
8187 if (rel + 1 < relend
8188 && (rel[1].r_info
8189 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8190 && rel[1].r_offset == rel->r_offset + 8)
8191 {
8192 if (ok_tprel)
8193 /* GD -> LE */
8194 tls_set = TLS_EXPLICIT | TLS_GD;
8195 else
8196 /* GD -> IE */
8197 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8198 tls_clear = TLS_GD;
8199 }
8200 else
8201 {
8202 if (!is_local)
8203 continue;
8204
8205 /* LD -> LE */
8206 tls_set = TLS_EXPLICIT;
8207 tls_clear = TLS_LD;
8208 }
8209 break;
8210
8211 default:
8212 continue;
8213 }
8214
8215 if (pass == 0)
8216 {
8217 if (!expecting_tls_get_addr
8218 || !sec->nomark_tls_get_addr)
8219 continue;
8220
8221 if (rel + 1 < relend
8222 && branch_reloc_hash_match (ibfd, rel + 1,
8223 htab->tls_get_addr_fd,
8224 htab->tga_desc_fd,
8225 htab->tls_get_addr,
8226 htab->tga_desc))
8227 {
8228 if (expecting_tls_get_addr == 2)
8229 {
8230 /* Check for toc tls entries. */
8231 unsigned char *toc_tls;
8232 int retval;
8233
8234 retval = get_tls_mask (&toc_tls, NULL, NULL,
8235 &locsyms,
8236 rel, ibfd);
8237 if (retval == 0)
8238 goto err_free_rel;
8239 if (toc_tls != NULL)
8240 {
8241 if ((*toc_tls & TLS_TLS) != 0
8242 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8243 found_tls_get_addr_arg = 1;
8244 if (retval > 1)
8245 toc_ref[toc_ref_index] = 1;
8246 }
8247 }
8248 continue;
8249 }
8250
8251 /* Uh oh, we didn't find the expected call. We
8252 could just mark this symbol to exclude it
8253 from tls optimization but it's safer to skip
8254 the entire optimization. */
8255 /* xgettext:c-format */
8256 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8257 "TLS optimization disabled\n"),
8258 ibfd, sec, rel->r_offset);
8259 ret = TRUE;
8260 goto err_free_rel;
8261 }
8262
8263 /* If we don't have old-style __tls_get_addr calls
8264 without TLSGD/TLSLD marker relocs, and we haven't
8265 found a new-style __tls_get_addr call with a
8266 marker for this symbol, then we either have a
8267 broken object file or an -mlongcall style
8268 indirect call to __tls_get_addr without a marker.
8269 Disable optimization in this case. */
8270 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8271 && (tls_set & TLS_EXPLICIT) == 0
8272 && !sec->nomark_tls_get_addr
8273 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8274 != (TLS_TLS | TLS_MARK)))
8275 continue;
8276
8277 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
8278 {
8279 struct plt_entry *ent = NULL;
8280
8281 if (htab->tls_get_addr_fd != NULL)
8282 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8283 ent != NULL;
8284 ent = ent->next)
8285 if (ent->addend == 0)
8286 break;
8287
8288 if (ent == NULL && htab->tga_desc_fd != NULL)
8289 for (ent = htab->tga_desc_fd->elf.plt.plist;
8290 ent != NULL;
8291 ent = ent->next)
8292 if (ent->addend == 0)
8293 break;
8294
8295 if (ent == NULL && htab->tls_get_addr != NULL)
8296 for (ent = htab->tls_get_addr->elf.plt.plist;
8297 ent != NULL;
8298 ent = ent->next)
8299 if (ent->addend == 0)
8300 break;
8301
8302 if (ent == NULL && htab->tga_desc != NULL)
8303 for (ent = htab->tga_desc->elf.plt.plist;
8304 ent != NULL;
8305 ent = ent->next)
8306 if (ent->addend == 0)
8307 break;
8308
8309 if (ent != NULL
8310 && ent->plt.refcount > 0)
8311 ent->plt.refcount -= 1;
8312 }
8313
8314 if (tls_clear == 0)
8315 continue;
8316
8317 if ((tls_set & TLS_EXPLICIT) == 0)
8318 {
8319 struct got_entry *ent;
8320
8321 /* Adjust got entry for this reloc. */
8322 if (h != NULL)
8323 ent = h->got.glist;
8324 else
8325 ent = elf_local_got_ents (ibfd)[r_symndx];
8326
8327 for (; ent != NULL; ent = ent->next)
8328 if (ent->addend == rel->r_addend
8329 && ent->owner == ibfd
8330 && ent->tls_type == tls_type)
8331 break;
8332 if (ent == NULL)
8333 abort ();
8334
8335 if (tls_set == 0)
8336 {
8337 /* We managed to get rid of a got entry. */
8338 if (ent->got.refcount > 0)
8339 ent->got.refcount -= 1;
8340 }
8341 }
8342 else
8343 {
8344 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8345 we'll lose one or two dyn relocs. */
8346 if (!dec_dynrel_count (rel->r_info, sec, info,
8347 NULL, h, sym))
8348 return FALSE;
8349
8350 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8351 {
8352 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8353 NULL, h, sym))
8354 return FALSE;
8355 }
8356 }
8357
8358 *tls_mask |= tls_set & 0xff;
8359 *tls_mask &= ~tls_clear;
8360 }
8361
8362 if (elf_section_data (sec)->relocs != relstart)
8363 free (relstart);
8364 }
8365
8366 if (locsyms != NULL
8367 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8368 {
8369 if (!info->keep_memory)
8370 free (locsyms);
8371 else
8372 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8373 }
8374 }
8375
8376 free (toc_ref);
8377 htab->do_tls_opt = 1;
8378 return TRUE;
8379 }
8380
8381 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8382 the values of any global symbols in a toc section that has been
8383 edited. Globals in toc sections should be a rarity, so this function
8384 sets a flag if any are found in toc sections other than the one just
8385 edited, so that further hash table traversals can be avoided. */
8386
8387 struct adjust_toc_info
8388 {
8389 asection *toc;
8390 unsigned long *skip;
8391 bfd_boolean global_toc_syms;
8392 };
8393
8394 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8395
8396 static bfd_boolean
8397 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8398 {
8399 struct ppc_link_hash_entry *eh;
8400 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8401 unsigned long i;
8402
8403 if (h->root.type != bfd_link_hash_defined
8404 && h->root.type != bfd_link_hash_defweak)
8405 return TRUE;
8406
8407 eh = ppc_elf_hash_entry (h);
8408 if (eh->adjust_done)
8409 return TRUE;
8410
8411 if (eh->elf.root.u.def.section == toc_inf->toc)
8412 {
8413 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8414 i = toc_inf->toc->rawsize >> 3;
8415 else
8416 i = eh->elf.root.u.def.value >> 3;
8417
8418 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8419 {
8420 _bfd_error_handler
8421 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8422 do
8423 ++i;
8424 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8425 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8426 }
8427
8428 eh->elf.root.u.def.value -= toc_inf->skip[i];
8429 eh->adjust_done = 1;
8430 }
8431 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8432 toc_inf->global_toc_syms = TRUE;
8433
8434 return TRUE;
8435 }
8436
8437 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8438 on a _LO variety toc/got reloc. */
8439
8440 static bfd_boolean
8441 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8442 {
8443 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8444 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8445 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8446 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8447 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8448 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8449 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8450 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8451 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8452 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8453 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8454 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8455 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8456 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8457 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8458 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8459 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8460 /* Exclude lfqu by testing reloc. If relocs are ever
8461 defined for the reduced D field in psq_lu then those
8462 will need testing too. */
8463 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8464 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
8465 && (insn & 1) == 0)
8466 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8467 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8468 /* Exclude stfqu. psq_stu as above for psq_lu. */
8469 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8470 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
8471 && (insn & 1) == 0));
8472 }
8473
8474 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8475 pld ra,symbol@got@pcrel
8476 load/store rt,off(ra)
8477 or
8478 pla ra,symbol@pcrel
8479 load/store rt,off(ra)
8480 may be translated to
8481 pload/pstore rt,symbol+off@pcrel
8482 nop.
8483 This function returns true if the optimization is possible, placing
8484 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8485
8486 On entry to this function, the linker has already determined that
8487 the pld can be replaced with pla: *PINSN1 is that pla insn,
8488 while *PINSN2 is the second instruction. */
8489
8490 static bfd_boolean
8491 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8492 {
8493 uint64_t insn1 = *pinsn1;
8494 uint64_t insn2 = *pinsn2;
8495 bfd_signed_vma off;
8496
8497 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8498 {
8499 /* Check that regs match. */
8500 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8501 return FALSE;
8502
8503 /* P8LS or PMLS form, non-pcrel. */
8504 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8505 return FALSE;
8506
8507 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8508 *pinsn2 = PNOP;
8509 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8510 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8511 return TRUE;
8512 }
8513
8514 insn2 >>= 32;
8515
8516 /* Check that regs match. */
8517 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8518 return FALSE;
8519
8520 switch ((insn2 >> 26) & 63)
8521 {
8522 default:
8523 return FALSE;
8524
8525 case 32: /* lwz */
8526 case 34: /* lbz */
8527 case 36: /* stw */
8528 case 38: /* stb */
8529 case 40: /* lhz */
8530 case 42: /* lha */
8531 case 44: /* sth */
8532 case 48: /* lfs */
8533 case 50: /* lfd */
8534 case 52: /* stfs */
8535 case 54: /* stfd */
8536 /* These are the PMLS cases, where we just need to tack a prefix
8537 on the insn. */
8538 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8539 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8540 off = insn2 & 0xffff;
8541 break;
8542
8543 case 58: /* lwa, ld */
8544 if ((insn2 & 1) != 0)
8545 return FALSE;
8546 insn1 = ((1ULL << 58) | (1ULL << 52)
8547 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8548 | (insn2 & (31ULL << 21)));
8549 off = insn2 & 0xfffc;
8550 break;
8551
8552 case 57: /* lxsd, lxssp */
8553 if ((insn2 & 3) < 2)
8554 return FALSE;
8555 insn1 = ((1ULL << 58) | (1ULL << 52)
8556 | ((40ULL | (insn2 & 3)) << 26)
8557 | (insn2 & (31ULL << 21)));
8558 off = insn2 & 0xfffc;
8559 break;
8560
8561 case 61: /* stxsd, stxssp, lxv, stxv */
8562 if ((insn2 & 3) == 0)
8563 return FALSE;
8564 else if ((insn2 & 3) >= 2)
8565 {
8566 insn1 = ((1ULL << 58) | (1ULL << 52)
8567 | ((44ULL | (insn2 & 3)) << 26)
8568 | (insn2 & (31ULL << 21)));
8569 off = insn2 & 0xfffc;
8570 }
8571 else
8572 {
8573 insn1 = ((1ULL << 58) | (1ULL << 52)
8574 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8575 | (insn2 & (31ULL << 21)));
8576 off = insn2 & 0xfff0;
8577 }
8578 break;
8579
8580 case 56: /* lq */
8581 insn1 = ((1ULL << 58) | (1ULL << 52)
8582 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8583 off = insn2 & 0xffff;
8584 break;
8585
8586 case 6: /* lxvp, stxvp */
8587 if ((insn2 & 0xe) != 0)
8588 return FALSE;
8589 insn1 = ((1ULL << 58) | (1ULL << 52)
8590 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8591 | (insn2 & (31ULL << 21)));
8592 off = insn2 & 0xfff0;
8593 break;
8594
8595 case 62: /* std, stq */
8596 if ((insn2 & 1) != 0)
8597 return FALSE;
8598 insn1 = ((1ULL << 58) | (1ULL << 52)
8599 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8600 | (insn2 & (31ULL << 21)));
8601 off = insn2 & 0xfffc;
8602 break;
8603 }
8604
8605 *pinsn1 = insn1;
8606 *pinsn2 = (uint64_t) NOP << 32;
8607 *poff = (off ^ 0x8000) - 0x8000;
8608 return TRUE;
8609 }
8610
8611 /* Examine all relocs referencing .toc sections in order to remove
8612 unused .toc entries. */
8613
8614 bfd_boolean
8615 ppc64_elf_edit_toc (struct bfd_link_info *info)
8616 {
8617 bfd *ibfd;
8618 struct adjust_toc_info toc_inf;
8619 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8620
8621 htab->do_toc_opt = 1;
8622 toc_inf.global_toc_syms = TRUE;
8623 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8624 {
8625 asection *toc, *sec;
8626 Elf_Internal_Shdr *symtab_hdr;
8627 Elf_Internal_Sym *local_syms;
8628 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8629 unsigned long *skip, *drop;
8630 unsigned char *used;
8631 unsigned char *keep, last, some_unused;
8632
8633 if (!is_ppc64_elf (ibfd))
8634 continue;
8635
8636 toc = bfd_get_section_by_name (ibfd, ".toc");
8637 if (toc == NULL
8638 || toc->size == 0
8639 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8640 || discarded_section (toc))
8641 continue;
8642
8643 toc_relocs = NULL;
8644 local_syms = NULL;
8645 symtab_hdr = &elf_symtab_hdr (ibfd);
8646
8647 /* Look at sections dropped from the final link. */
8648 skip = NULL;
8649 relstart = NULL;
8650 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8651 {
8652 if (sec->reloc_count == 0
8653 || !discarded_section (sec)
8654 || get_opd_info (sec)
8655 || (sec->flags & SEC_ALLOC) == 0
8656 || (sec->flags & SEC_DEBUGGING) != 0)
8657 continue;
8658
8659 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8660 if (relstart == NULL)
8661 goto error_ret;
8662
8663 /* Run through the relocs to see which toc entries might be
8664 unused. */
8665 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8666 {
8667 enum elf_ppc64_reloc_type r_type;
8668 unsigned long r_symndx;
8669 asection *sym_sec;
8670 struct elf_link_hash_entry *h;
8671 Elf_Internal_Sym *sym;
8672 bfd_vma val;
8673
8674 r_type = ELF64_R_TYPE (rel->r_info);
8675 switch (r_type)
8676 {
8677 default:
8678 continue;
8679
8680 case R_PPC64_TOC16:
8681 case R_PPC64_TOC16_LO:
8682 case R_PPC64_TOC16_HI:
8683 case R_PPC64_TOC16_HA:
8684 case R_PPC64_TOC16_DS:
8685 case R_PPC64_TOC16_LO_DS:
8686 break;
8687 }
8688
8689 r_symndx = ELF64_R_SYM (rel->r_info);
8690 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8691 r_symndx, ibfd))
8692 goto error_ret;
8693
8694 if (sym_sec != toc)
8695 continue;
8696
8697 if (h != NULL)
8698 val = h->root.u.def.value;
8699 else
8700 val = sym->st_value;
8701 val += rel->r_addend;
8702
8703 if (val >= toc->size)
8704 continue;
8705
8706 /* Anything in the toc ought to be aligned to 8 bytes.
8707 If not, don't mark as unused. */
8708 if (val & 7)
8709 continue;
8710
8711 if (skip == NULL)
8712 {
8713 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8714 if (skip == NULL)
8715 goto error_ret;
8716 }
8717
8718 skip[val >> 3] = ref_from_discarded;
8719 }
8720
8721 if (elf_section_data (sec)->relocs != relstart)
8722 free (relstart);
8723 }
8724
8725 /* For largetoc loads of address constants, we can convert
8726 . addis rx,2,addr@got@ha
8727 . ld ry,addr@got@l(rx)
8728 to
8729 . addis rx,2,addr@toc@ha
8730 . addi ry,rx,addr@toc@l
8731 when addr is within 2G of the toc pointer. This then means
8732 that the word storing "addr" in the toc is no longer needed. */
8733
8734 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8735 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8736 && toc->reloc_count != 0)
8737 {
8738 /* Read toc relocs. */
8739 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8740 info->keep_memory);
8741 if (toc_relocs == NULL)
8742 goto error_ret;
8743
8744 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8745 {
8746 enum elf_ppc64_reloc_type r_type;
8747 unsigned long r_symndx;
8748 asection *sym_sec;
8749 struct elf_link_hash_entry *h;
8750 Elf_Internal_Sym *sym;
8751 bfd_vma val, addr;
8752
8753 r_type = ELF64_R_TYPE (rel->r_info);
8754 if (r_type != R_PPC64_ADDR64)
8755 continue;
8756
8757 r_symndx = ELF64_R_SYM (rel->r_info);
8758 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8759 r_symndx, ibfd))
8760 goto error_ret;
8761
8762 if (sym_sec == NULL
8763 || sym_sec->output_section == NULL
8764 || discarded_section (sym_sec))
8765 continue;
8766
8767 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8768 continue;
8769
8770 if (h != NULL)
8771 {
8772 if (h->type == STT_GNU_IFUNC)
8773 continue;
8774 val = h->root.u.def.value;
8775 }
8776 else
8777 {
8778 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8779 continue;
8780 val = sym->st_value;
8781 }
8782 val += rel->r_addend;
8783 val += sym_sec->output_section->vma + sym_sec->output_offset;
8784
8785 /* We don't yet know the exact toc pointer value, but we
8786 know it will be somewhere in the toc section. Don't
8787 optimize if the difference from any possible toc
8788 pointer is outside [ff..f80008000, 7fff7fff]. */
8789 addr = toc->output_section->vma + TOC_BASE_OFF;
8790 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8791 continue;
8792
8793 addr = toc->output_section->vma + toc->output_section->rawsize;
8794 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8795 continue;
8796
8797 if (skip == NULL)
8798 {
8799 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8800 if (skip == NULL)
8801 goto error_ret;
8802 }
8803
8804 skip[rel->r_offset >> 3]
8805 |= can_optimize | ((rel - toc_relocs) << 2);
8806 }
8807 }
8808
8809 if (skip == NULL)
8810 continue;
8811
8812 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8813 if (used == NULL)
8814 {
8815 error_ret:
8816 if (symtab_hdr->contents != (unsigned char *) local_syms)
8817 free (local_syms);
8818 if (sec != NULL
8819 && elf_section_data (sec)->relocs != relstart)
8820 free (relstart);
8821 if (elf_section_data (toc)->relocs != toc_relocs)
8822 free (toc_relocs);
8823 free (skip);
8824 return FALSE;
8825 }
8826
8827 /* Now check all kept sections that might reference the toc.
8828 Check the toc itself last. */
8829 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8830 : ibfd->sections);
8831 sec != NULL;
8832 sec = (sec == toc ? NULL
8833 : sec->next == NULL ? toc
8834 : sec->next == toc && toc->next ? toc->next
8835 : sec->next))
8836 {
8837 int repeat;
8838
8839 if (sec->reloc_count == 0
8840 || discarded_section (sec)
8841 || get_opd_info (sec)
8842 || (sec->flags & SEC_ALLOC) == 0
8843 || (sec->flags & SEC_DEBUGGING) != 0)
8844 continue;
8845
8846 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8847 info->keep_memory);
8848 if (relstart == NULL)
8849 {
8850 free (used);
8851 goto error_ret;
8852 }
8853
8854 /* Mark toc entries referenced as used. */
8855 do
8856 {
8857 repeat = 0;
8858 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8859 {
8860 enum elf_ppc64_reloc_type r_type;
8861 unsigned long r_symndx;
8862 asection *sym_sec;
8863 struct elf_link_hash_entry *h;
8864 Elf_Internal_Sym *sym;
8865 bfd_vma val;
8866
8867 r_type = ELF64_R_TYPE (rel->r_info);
8868 switch (r_type)
8869 {
8870 case R_PPC64_TOC16:
8871 case R_PPC64_TOC16_LO:
8872 case R_PPC64_TOC16_HI:
8873 case R_PPC64_TOC16_HA:
8874 case R_PPC64_TOC16_DS:
8875 case R_PPC64_TOC16_LO_DS:
8876 /* In case we're taking addresses of toc entries. */
8877 case R_PPC64_ADDR64:
8878 break;
8879
8880 default:
8881 continue;
8882 }
8883
8884 r_symndx = ELF64_R_SYM (rel->r_info);
8885 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8886 r_symndx, ibfd))
8887 {
8888 free (used);
8889 goto error_ret;
8890 }
8891
8892 if (sym_sec != toc)
8893 continue;
8894
8895 if (h != NULL)
8896 val = h->root.u.def.value;
8897 else
8898 val = sym->st_value;
8899 val += rel->r_addend;
8900
8901 if (val >= toc->size)
8902 continue;
8903
8904 if ((skip[val >> 3] & can_optimize) != 0)
8905 {
8906 bfd_vma off;
8907 unsigned char opc;
8908
8909 switch (r_type)
8910 {
8911 case R_PPC64_TOC16_HA:
8912 break;
8913
8914 case R_PPC64_TOC16_LO_DS:
8915 off = rel->r_offset;
8916 off += (bfd_big_endian (ibfd) ? -2 : 3);
8917 if (!bfd_get_section_contents (ibfd, sec, &opc,
8918 off, 1))
8919 {
8920 free (used);
8921 goto error_ret;
8922 }
8923 if ((opc & (0x3f << 2)) == (58u << 2))
8924 break;
8925 /* Fall through. */
8926
8927 default:
8928 /* Wrong sort of reloc, or not a ld. We may
8929 as well clear ref_from_discarded too. */
8930 skip[val >> 3] = 0;
8931 }
8932 }
8933
8934 if (sec != toc)
8935 used[val >> 3] = 1;
8936 /* For the toc section, we only mark as used if this
8937 entry itself isn't unused. */
8938 else if ((used[rel->r_offset >> 3]
8939 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8940 && !used[val >> 3])
8941 {
8942 /* Do all the relocs again, to catch reference
8943 chains. */
8944 repeat = 1;
8945 used[val >> 3] = 1;
8946 }
8947 }
8948 }
8949 while (repeat);
8950
8951 if (elf_section_data (sec)->relocs != relstart)
8952 free (relstart);
8953 }
8954
8955 /* Merge the used and skip arrays. Assume that TOC
8956 doublewords not appearing as either used or unused belong
8957 to an entry more than one doubleword in size. */
8958 for (drop = skip, keep = used, last = 0, some_unused = 0;
8959 drop < skip + (toc->size + 7) / 8;
8960 ++drop, ++keep)
8961 {
8962 if (*keep)
8963 {
8964 *drop &= ~ref_from_discarded;
8965 if ((*drop & can_optimize) != 0)
8966 some_unused = 1;
8967 last = 0;
8968 }
8969 else if ((*drop & ref_from_discarded) != 0)
8970 {
8971 some_unused = 1;
8972 last = ref_from_discarded;
8973 }
8974 else
8975 *drop = last;
8976 }
8977
8978 free (used);
8979
8980 if (some_unused)
8981 {
8982 bfd_byte *contents, *src;
8983 unsigned long off;
8984 Elf_Internal_Sym *sym;
8985 bfd_boolean local_toc_syms = FALSE;
8986
8987 /* Shuffle the toc contents, and at the same time convert the
8988 skip array from booleans into offsets. */
8989 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8990 goto error_ret;
8991
8992 elf_section_data (toc)->this_hdr.contents = contents;
8993
8994 for (src = contents, off = 0, drop = skip;
8995 src < contents + toc->size;
8996 src += 8, ++drop)
8997 {
8998 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8999 off += 8;
9000 else if (off != 0)
9001 {
9002 *drop = off;
9003 memcpy (src - off, src, 8);
9004 }
9005 }
9006 *drop = off;
9007 toc->rawsize = toc->size;
9008 toc->size = src - contents - off;
9009
9010 /* Adjust addends for relocs against the toc section sym,
9011 and optimize any accesses we can. */
9012 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9013 {
9014 if (sec->reloc_count == 0
9015 || discarded_section (sec))
9016 continue;
9017
9018 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9019 info->keep_memory);
9020 if (relstart == NULL)
9021 goto error_ret;
9022
9023 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9024 {
9025 enum elf_ppc64_reloc_type r_type;
9026 unsigned long r_symndx;
9027 asection *sym_sec;
9028 struct elf_link_hash_entry *h;
9029 bfd_vma val;
9030
9031 r_type = ELF64_R_TYPE (rel->r_info);
9032 switch (r_type)
9033 {
9034 default:
9035 continue;
9036
9037 case R_PPC64_TOC16:
9038 case R_PPC64_TOC16_LO:
9039 case R_PPC64_TOC16_HI:
9040 case R_PPC64_TOC16_HA:
9041 case R_PPC64_TOC16_DS:
9042 case R_PPC64_TOC16_LO_DS:
9043 case R_PPC64_ADDR64:
9044 break;
9045 }
9046
9047 r_symndx = ELF64_R_SYM (rel->r_info);
9048 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9049 r_symndx, ibfd))
9050 goto error_ret;
9051
9052 if (sym_sec != toc)
9053 continue;
9054
9055 if (h != NULL)
9056 val = h->root.u.def.value;
9057 else
9058 {
9059 val = sym->st_value;
9060 if (val != 0)
9061 local_toc_syms = TRUE;
9062 }
9063
9064 val += rel->r_addend;
9065
9066 if (val > toc->rawsize)
9067 val = toc->rawsize;
9068 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9069 continue;
9070 else if ((skip[val >> 3] & can_optimize) != 0)
9071 {
9072 Elf_Internal_Rela *tocrel
9073 = toc_relocs + (skip[val >> 3] >> 2);
9074 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9075
9076 switch (r_type)
9077 {
9078 case R_PPC64_TOC16_HA:
9079 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9080 break;
9081
9082 case R_PPC64_TOC16_LO_DS:
9083 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9084 break;
9085
9086 default:
9087 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9088 ppc_howto_init ();
9089 info->callbacks->einfo
9090 /* xgettext:c-format */
9091 (_("%H: %s references "
9092 "optimized away TOC entry\n"),
9093 ibfd, sec, rel->r_offset,
9094 ppc64_elf_howto_table[r_type]->name);
9095 bfd_set_error (bfd_error_bad_value);
9096 goto error_ret;
9097 }
9098 rel->r_addend = tocrel->r_addend;
9099 elf_section_data (sec)->relocs = relstart;
9100 continue;
9101 }
9102
9103 if (h != NULL || sym->st_value != 0)
9104 continue;
9105
9106 rel->r_addend -= skip[val >> 3];
9107 elf_section_data (sec)->relocs = relstart;
9108 }
9109
9110 if (elf_section_data (sec)->relocs != relstart)
9111 free (relstart);
9112 }
9113
9114 /* We shouldn't have local or global symbols defined in the TOC,
9115 but handle them anyway. */
9116 if (local_syms != NULL)
9117 for (sym = local_syms;
9118 sym < local_syms + symtab_hdr->sh_info;
9119 ++sym)
9120 if (sym->st_value != 0
9121 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9122 {
9123 unsigned long i;
9124
9125 if (sym->st_value > toc->rawsize)
9126 i = toc->rawsize >> 3;
9127 else
9128 i = sym->st_value >> 3;
9129
9130 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9131 {
9132 if (local_toc_syms)
9133 _bfd_error_handler
9134 (_("%s defined on removed toc entry"),
9135 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9136 do
9137 ++i;
9138 while ((skip[i] & (ref_from_discarded | can_optimize)));
9139 sym->st_value = (bfd_vma) i << 3;
9140 }
9141
9142 sym->st_value -= skip[i];
9143 symtab_hdr->contents = (unsigned char *) local_syms;
9144 }
9145
9146 /* Adjust any global syms defined in this toc input section. */
9147 if (toc_inf.global_toc_syms)
9148 {
9149 toc_inf.toc = toc;
9150 toc_inf.skip = skip;
9151 toc_inf.global_toc_syms = FALSE;
9152 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9153 &toc_inf);
9154 }
9155
9156 if (toc->reloc_count != 0)
9157 {
9158 Elf_Internal_Shdr *rel_hdr;
9159 Elf_Internal_Rela *wrel;
9160 bfd_size_type sz;
9161
9162 /* Remove unused toc relocs, and adjust those we keep. */
9163 if (toc_relocs == NULL)
9164 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9165 info->keep_memory);
9166 if (toc_relocs == NULL)
9167 goto error_ret;
9168
9169 wrel = toc_relocs;
9170 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9171 if ((skip[rel->r_offset >> 3]
9172 & (ref_from_discarded | can_optimize)) == 0)
9173 {
9174 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9175 wrel->r_info = rel->r_info;
9176 wrel->r_addend = rel->r_addend;
9177 ++wrel;
9178 }
9179 else if (!dec_dynrel_count (rel->r_info, toc, info,
9180 &local_syms, NULL, NULL))
9181 goto error_ret;
9182
9183 elf_section_data (toc)->relocs = toc_relocs;
9184 toc->reloc_count = wrel - toc_relocs;
9185 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9186 sz = rel_hdr->sh_entsize;
9187 rel_hdr->sh_size = toc->reloc_count * sz;
9188 }
9189 }
9190 else if (elf_section_data (toc)->relocs != toc_relocs)
9191 free (toc_relocs);
9192
9193 if (local_syms != NULL
9194 && symtab_hdr->contents != (unsigned char *) local_syms)
9195 {
9196 if (!info->keep_memory)
9197 free (local_syms);
9198 else
9199 symtab_hdr->contents = (unsigned char *) local_syms;
9200 }
9201 free (skip);
9202 }
9203
9204 /* Look for cases where we can change an indirect GOT access to
9205 a GOT relative or PC relative access, possibly reducing the
9206 number of GOT entries. */
9207 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9208 {
9209 asection *sec;
9210 Elf_Internal_Shdr *symtab_hdr;
9211 Elf_Internal_Sym *local_syms;
9212 Elf_Internal_Rela *relstart, *rel;
9213 bfd_vma got;
9214
9215 if (!is_ppc64_elf (ibfd))
9216 continue;
9217
9218 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9219 continue;
9220
9221 sec = ppc64_elf_tdata (ibfd)->got;
9222 got = 0;
9223 if (sec != NULL)
9224 got = sec->output_section->vma + sec->output_offset + 0x8000;
9225
9226 local_syms = NULL;
9227 symtab_hdr = &elf_symtab_hdr (ibfd);
9228
9229 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9230 {
9231 if (sec->reloc_count == 0
9232 || !ppc64_elf_section_data (sec)->has_optrel
9233 || discarded_section (sec))
9234 continue;
9235
9236 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9237 info->keep_memory);
9238 if (relstart == NULL)
9239 {
9240 got_error_ret:
9241 if (symtab_hdr->contents != (unsigned char *) local_syms)
9242 free (local_syms);
9243 if (sec != NULL
9244 && elf_section_data (sec)->relocs != relstart)
9245 free (relstart);
9246 return FALSE;
9247 }
9248
9249 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9250 {
9251 enum elf_ppc64_reloc_type r_type;
9252 unsigned long r_symndx;
9253 Elf_Internal_Sym *sym;
9254 asection *sym_sec;
9255 struct elf_link_hash_entry *h;
9256 struct got_entry *ent;
9257 bfd_vma val, pc;
9258 unsigned char buf[8];
9259 unsigned int insn;
9260 enum {no_check, check_lo, check_ha} insn_check;
9261
9262 r_type = ELF64_R_TYPE (rel->r_info);
9263 switch (r_type)
9264 {
9265 default:
9266 insn_check = no_check;
9267 break;
9268
9269 case R_PPC64_PLT16_HA:
9270 case R_PPC64_GOT_TLSLD16_HA:
9271 case R_PPC64_GOT_TLSGD16_HA:
9272 case R_PPC64_GOT_TPREL16_HA:
9273 case R_PPC64_GOT_DTPREL16_HA:
9274 case R_PPC64_GOT16_HA:
9275 case R_PPC64_TOC16_HA:
9276 insn_check = check_ha;
9277 break;
9278
9279 case R_PPC64_PLT16_LO:
9280 case R_PPC64_PLT16_LO_DS:
9281 case R_PPC64_GOT_TLSLD16_LO:
9282 case R_PPC64_GOT_TLSGD16_LO:
9283 case R_PPC64_GOT_TPREL16_LO_DS:
9284 case R_PPC64_GOT_DTPREL16_LO_DS:
9285 case R_PPC64_GOT16_LO:
9286 case R_PPC64_GOT16_LO_DS:
9287 case R_PPC64_TOC16_LO:
9288 case R_PPC64_TOC16_LO_DS:
9289 insn_check = check_lo;
9290 break;
9291 }
9292
9293 if (insn_check != no_check)
9294 {
9295 bfd_vma off = rel->r_offset & ~3;
9296
9297 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9298 goto got_error_ret;
9299
9300 insn = bfd_get_32 (ibfd, buf);
9301 if (insn_check == check_lo
9302 ? !ok_lo_toc_insn (insn, r_type)
9303 : ((insn & ((0x3fu << 26) | 0x1f << 16))
9304 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9305 {
9306 char str[12];
9307
9308 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9309 sprintf (str, "%#08x", insn);
9310 info->callbacks->einfo
9311 /* xgettext:c-format */
9312 (_("%H: got/toc optimization is not supported for"
9313 " %s instruction\n"),
9314 ibfd, sec, rel->r_offset & ~3, str);
9315 continue;
9316 }
9317 }
9318
9319 switch (r_type)
9320 {
9321 /* Note that we don't delete GOT entries for
9322 R_PPC64_GOT16_DS since we'd need a lot more
9323 analysis. For starters, the preliminary layout is
9324 before the GOT, PLT, dynamic sections and stubs are
9325 laid out. Then we'd need to allow for changes in
9326 distance between sections caused by alignment. */
9327 default:
9328 continue;
9329
9330 case R_PPC64_GOT16_HA:
9331 case R_PPC64_GOT16_LO_DS:
9332 case R_PPC64_GOT_PCREL34:
9333 break;
9334 }
9335
9336 r_symndx = ELF64_R_SYM (rel->r_info);
9337 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9338 r_symndx, ibfd))
9339 goto got_error_ret;
9340
9341 if (sym_sec == NULL
9342 || sym_sec->output_section == NULL
9343 || discarded_section (sym_sec))
9344 continue;
9345
9346 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9347 continue;
9348
9349 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9350 continue;
9351
9352 if (h != NULL)
9353 val = h->root.u.def.value;
9354 else
9355 val = sym->st_value;
9356 val += rel->r_addend;
9357 val += sym_sec->output_section->vma + sym_sec->output_offset;
9358
9359 /* Fudge factor to allow for the fact that the preliminary layout
9360 isn't exact. Reduce limits by this factor. */
9361 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9362
9363 switch (r_type)
9364 {
9365 default:
9366 continue;
9367
9368 case R_PPC64_GOT16_HA:
9369 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9370 >= LIMIT_ADJUST (0x100000000ULL))
9371 continue;
9372
9373 if (!bfd_get_section_contents (ibfd, sec, buf,
9374 rel->r_offset & ~3, 4))
9375 goto got_error_ret;
9376 insn = bfd_get_32 (ibfd, buf);
9377 if (((insn & ((0x3fu << 26) | 0x1f << 16))
9378 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9379 continue;
9380 break;
9381
9382 case R_PPC64_GOT16_LO_DS:
9383 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9384 >= LIMIT_ADJUST (0x100000000ULL))
9385 continue;
9386 if (!bfd_get_section_contents (ibfd, sec, buf,
9387 rel->r_offset & ~3, 4))
9388 goto got_error_ret;
9389 insn = bfd_get_32 (ibfd, buf);
9390 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
9391 continue;
9392 break;
9393
9394 case R_PPC64_GOT_PCREL34:
9395 pc = rel->r_offset;
9396 pc += sec->output_section->vma + sec->output_offset;
9397 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9398 >= LIMIT_ADJUST (1ULL << 34))
9399 continue;
9400 if (!bfd_get_section_contents (ibfd, sec, buf,
9401 rel->r_offset & ~3, 8))
9402 goto got_error_ret;
9403 insn = bfd_get_32 (ibfd, buf);
9404 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9405 continue;
9406 insn = bfd_get_32 (ibfd, buf + 4);
9407 if ((insn & (0x3fu << 26)) != 57u << 26)
9408 continue;
9409 break;
9410 }
9411 #undef LIMIT_ADJUST
9412
9413 if (h != NULL)
9414 ent = h->got.glist;
9415 else
9416 {
9417 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9418 ent = local_got_ents[r_symndx];
9419 }
9420 for (; ent != NULL; ent = ent->next)
9421 if (ent->addend == rel->r_addend
9422 && ent->owner == ibfd
9423 && ent->tls_type == 0)
9424 break;
9425 BFD_ASSERT (ent && ent->got.refcount > 0);
9426 ent->got.refcount -= 1;
9427 }
9428
9429 if (elf_section_data (sec)->relocs != relstart)
9430 free (relstart);
9431 }
9432
9433 if (local_syms != NULL
9434 && symtab_hdr->contents != (unsigned char *) local_syms)
9435 {
9436 if (!info->keep_memory)
9437 free (local_syms);
9438 else
9439 symtab_hdr->contents = (unsigned char *) local_syms;
9440 }
9441 }
9442
9443 return TRUE;
9444 }
9445
9446 /* Return true iff input section I references the TOC using
9447 instructions limited to +/-32k offsets. */
9448
9449 bfd_boolean
9450 ppc64_elf_has_small_toc_reloc (asection *i)
9451 {
9452 return (is_ppc64_elf (i->owner)
9453 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9454 }
9455
9456 /* Allocate space for one GOT entry. */
9457
9458 static void
9459 allocate_got (struct elf_link_hash_entry *h,
9460 struct bfd_link_info *info,
9461 struct got_entry *gent)
9462 {
9463 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9464 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
9465 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9466 ? 16 : 8);
9467 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9468 ? 2 : 1) * sizeof (Elf64_External_Rela);
9469 asection *got = ppc64_elf_tdata (gent->owner)->got;
9470
9471 gent->got.offset = got->size;
9472 got->size += entsize;
9473
9474 if (h->type == STT_GNU_IFUNC)
9475 {
9476 htab->elf.irelplt->size += rentsize;
9477 htab->got_reli_size += rentsize;
9478 }
9479 else if (((bfd_link_pic (info)
9480 && !(gent->tls_type != 0
9481 && bfd_link_executable (info)
9482 && SYMBOL_REFERENCES_LOCAL (info, h)))
9483 || (htab->elf.dynamic_sections_created
9484 && h->dynindx != -1
9485 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9486 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9487 {
9488 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9489 relgot->size += rentsize;
9490 }
9491 }
9492
9493 /* This function merges got entries in the same toc group. */
9494
9495 static void
9496 merge_got_entries (struct got_entry **pent)
9497 {
9498 struct got_entry *ent, *ent2;
9499
9500 for (ent = *pent; ent != NULL; ent = ent->next)
9501 if (!ent->is_indirect)
9502 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9503 if (!ent2->is_indirect
9504 && ent2->addend == ent->addend
9505 && ent2->tls_type == ent->tls_type
9506 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9507 {
9508 ent2->is_indirect = TRUE;
9509 ent2->got.ent = ent;
9510 }
9511 }
9512
9513 /* If H is undefined, make it dynamic if that makes sense. */
9514
9515 static bfd_boolean
9516 ensure_undef_dynamic (struct bfd_link_info *info,
9517 struct elf_link_hash_entry *h)
9518 {
9519 struct elf_link_hash_table *htab = elf_hash_table (info);
9520
9521 if (htab->dynamic_sections_created
9522 && ((info->dynamic_undefined_weak != 0
9523 && h->root.type == bfd_link_hash_undefweak)
9524 || h->root.type == bfd_link_hash_undefined)
9525 && h->dynindx == -1
9526 && !h->forced_local
9527 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9528 return bfd_elf_link_record_dynamic_symbol (info, h);
9529 return TRUE;
9530 }
9531
9532 /* Allocate space in .plt, .got and associated reloc sections for
9533 dynamic relocs. */
9534
9535 static bfd_boolean
9536 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9537 {
9538 struct bfd_link_info *info;
9539 struct ppc_link_hash_table *htab;
9540 asection *s;
9541 struct ppc_link_hash_entry *eh;
9542 struct got_entry **pgent, *gent;
9543
9544 if (h->root.type == bfd_link_hash_indirect)
9545 return TRUE;
9546
9547 info = (struct bfd_link_info *) inf;
9548 htab = ppc_hash_table (info);
9549 if (htab == NULL)
9550 return FALSE;
9551
9552 eh = ppc_elf_hash_entry (h);
9553 /* Run through the TLS GD got entries first if we're changing them
9554 to TPREL. */
9555 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9556 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9557 if (gent->got.refcount > 0
9558 && (gent->tls_type & TLS_GD) != 0)
9559 {
9560 /* This was a GD entry that has been converted to TPREL. If
9561 there happens to be a TPREL entry we can use that one. */
9562 struct got_entry *ent;
9563 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9564 if (ent->got.refcount > 0
9565 && (ent->tls_type & TLS_TPREL) != 0
9566 && ent->addend == gent->addend
9567 && ent->owner == gent->owner)
9568 {
9569 gent->got.refcount = 0;
9570 break;
9571 }
9572
9573 /* If not, then we'll be using our own TPREL entry. */
9574 if (gent->got.refcount != 0)
9575 gent->tls_type = TLS_TLS | TLS_TPREL;
9576 }
9577
9578 /* Remove any list entry that won't generate a word in the GOT before
9579 we call merge_got_entries. Otherwise we risk merging to empty
9580 entries. */
9581 pgent = &h->got.glist;
9582 while ((gent = *pgent) != NULL)
9583 if (gent->got.refcount > 0)
9584 {
9585 if ((gent->tls_type & TLS_LD) != 0
9586 && SYMBOL_REFERENCES_LOCAL (info, h))
9587 {
9588 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9589 *pgent = gent->next;
9590 }
9591 else
9592 pgent = &gent->next;
9593 }
9594 else
9595 *pgent = gent->next;
9596
9597 if (!htab->do_multi_toc)
9598 merge_got_entries (&h->got.glist);
9599
9600 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9601 if (!gent->is_indirect)
9602 {
9603 /* Ensure we catch all the cases where this symbol should
9604 be made dynamic. */
9605 if (!ensure_undef_dynamic (info, h))
9606 return FALSE;
9607
9608 if (!is_ppc64_elf (gent->owner))
9609 abort ();
9610
9611 allocate_got (h, info, gent);
9612 }
9613
9614 /* If no dynamic sections we can't have dynamic relocs, except for
9615 IFUNCs which are handled even in static executables. */
9616 if (!htab->elf.dynamic_sections_created
9617 && h->type != STT_GNU_IFUNC)
9618 h->dyn_relocs = NULL;
9619
9620 /* Discard relocs on undefined symbols that must be local. */
9621 else if (h->root.type == bfd_link_hash_undefined
9622 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9623 h->dyn_relocs = NULL;
9624
9625 /* Also discard relocs on undefined weak syms with non-default
9626 visibility, or when dynamic_undefined_weak says so. */
9627 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9628 h->dyn_relocs = NULL;
9629
9630 if (h->dyn_relocs != NULL)
9631 {
9632 struct elf_dyn_relocs *p, **pp;
9633
9634 /* In the shared -Bsymbolic case, discard space allocated for
9635 dynamic pc-relative relocs against symbols which turn out to
9636 be defined in regular objects. For the normal shared case,
9637 discard space for relocs that have become local due to symbol
9638 visibility changes. */
9639 if (bfd_link_pic (info))
9640 {
9641 /* Relocs that use pc_count are those that appear on a call
9642 insn, or certain REL relocs (see must_be_dyn_reloc) that
9643 can be generated via assembly. We want calls to
9644 protected symbols to resolve directly to the function
9645 rather than going via the plt. If people want function
9646 pointer comparisons to work as expected then they should
9647 avoid writing weird assembly. */
9648 if (SYMBOL_CALLS_LOCAL (info, h))
9649 {
9650 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
9651 {
9652 p->count -= p->pc_count;
9653 p->pc_count = 0;
9654 if (p->count == 0)
9655 *pp = p->next;
9656 else
9657 pp = &p->next;
9658 }
9659 }
9660
9661 if (h->dyn_relocs != NULL)
9662 {
9663 /* Ensure we catch all the cases where this symbol
9664 should be made dynamic. */
9665 if (!ensure_undef_dynamic (info, h))
9666 return FALSE;
9667 }
9668 }
9669
9670 /* For a fixed position executable, discard space for
9671 relocs against symbols which are not dynamic. */
9672 else if (h->type != STT_GNU_IFUNC)
9673 {
9674 if (h->dynamic_adjusted
9675 && !h->def_regular
9676 && !ELF_COMMON_DEF_P (h))
9677 {
9678 /* Ensure we catch all the cases where this symbol
9679 should be made dynamic. */
9680 if (!ensure_undef_dynamic (info, h))
9681 return FALSE;
9682
9683 /* But if that didn't work out, discard dynamic relocs. */
9684 if (h->dynindx == -1)
9685 h->dyn_relocs = NULL;
9686 }
9687 else
9688 h->dyn_relocs = NULL;
9689 }
9690
9691 /* Finally, allocate space. */
9692 for (p = h->dyn_relocs; p != NULL; p = p->next)
9693 {
9694 asection *sreloc = elf_section_data (p->sec)->sreloc;
9695 if (eh->elf.type == STT_GNU_IFUNC)
9696 sreloc = htab->elf.irelplt;
9697 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9698 }
9699 }
9700
9701 /* We might need a PLT entry when the symbol
9702 a) is dynamic, or
9703 b) is an ifunc, or
9704 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9705 d) has plt16 relocs and we are linking statically. */
9706 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9707 || h->type == STT_GNU_IFUNC
9708 || (h->needs_plt && h->dynamic_adjusted)
9709 || (h->needs_plt
9710 && h->def_regular
9711 && !htab->elf.dynamic_sections_created
9712 && !htab->can_convert_all_inline_plt
9713 && (ppc_elf_hash_entry (h)->tls_mask
9714 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9715 {
9716 struct plt_entry *pent;
9717 bfd_boolean doneone = FALSE;
9718 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9719 if (pent->plt.refcount > 0)
9720 {
9721 if (!htab->elf.dynamic_sections_created
9722 || h->dynindx == -1)
9723 {
9724 if (h->type == STT_GNU_IFUNC)
9725 {
9726 s = htab->elf.iplt;
9727 pent->plt.offset = s->size;
9728 s->size += PLT_ENTRY_SIZE (htab);
9729 s = htab->elf.irelplt;
9730 }
9731 else
9732 {
9733 s = htab->pltlocal;
9734 pent->plt.offset = s->size;
9735 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9736 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9737 }
9738 }
9739 else
9740 {
9741 /* If this is the first .plt entry, make room for the special
9742 first entry. */
9743 s = htab->elf.splt;
9744 if (s->size == 0)
9745 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9746
9747 pent->plt.offset = s->size;
9748
9749 /* Make room for this entry. */
9750 s->size += PLT_ENTRY_SIZE (htab);
9751
9752 /* Make room for the .glink code. */
9753 s = htab->glink;
9754 if (s->size == 0)
9755 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9756 if (htab->opd_abi)
9757 {
9758 /* We need bigger stubs past index 32767. */
9759 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9760 s->size += 4;
9761 s->size += 2*4;
9762 }
9763 else
9764 s->size += 4;
9765
9766 /* We also need to make an entry in the .rela.plt section. */
9767 s = htab->elf.srelplt;
9768 }
9769 if (s != NULL)
9770 s->size += sizeof (Elf64_External_Rela);
9771 doneone = TRUE;
9772 }
9773 else
9774 pent->plt.offset = (bfd_vma) -1;
9775 if (!doneone)
9776 {
9777 h->plt.plist = NULL;
9778 h->needs_plt = 0;
9779 }
9780 }
9781 else
9782 {
9783 h->plt.plist = NULL;
9784 h->needs_plt = 0;
9785 }
9786
9787 return TRUE;
9788 }
9789
9790 #define PPC_LO(v) ((v) & 0xffff)
9791 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9792 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9793 #define D34(v) \
9794 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9795 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9796
9797 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9798 to set up space for global entry stubs. These are put in glink,
9799 after the branch table. */
9800
9801 static bfd_boolean
9802 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9803 {
9804 struct bfd_link_info *info;
9805 struct ppc_link_hash_table *htab;
9806 struct plt_entry *pent;
9807 asection *s, *plt;
9808
9809 if (h->root.type == bfd_link_hash_indirect)
9810 return TRUE;
9811
9812 if (!h->pointer_equality_needed)
9813 return TRUE;
9814
9815 if (h->def_regular)
9816 return TRUE;
9817
9818 info = inf;
9819 htab = ppc_hash_table (info);
9820 if (htab == NULL)
9821 return FALSE;
9822
9823 s = htab->global_entry;
9824 plt = htab->elf.splt;
9825 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9826 if (pent->plt.offset != (bfd_vma) -1
9827 && pent->addend == 0)
9828 {
9829 /* For ELFv2, if this symbol is not defined in a regular file
9830 and we are not generating a shared library or pie, then we
9831 need to define the symbol in the executable on a call stub.
9832 This is to avoid text relocations. */
9833 bfd_vma off, stub_align, stub_off, stub_size;
9834 unsigned int align_power;
9835
9836 stub_size = 16;
9837 stub_off = s->size;
9838 if (htab->params->plt_stub_align >= 0)
9839 align_power = htab->params->plt_stub_align;
9840 else
9841 align_power = -htab->params->plt_stub_align;
9842 /* Setting section alignment is delayed until we know it is
9843 non-empty. Otherwise the .text output section will be
9844 aligned at least to plt_stub_align even when no global
9845 entry stubs are needed. */
9846 if (s->alignment_power < align_power)
9847 s->alignment_power = align_power;
9848 stub_align = (bfd_vma) 1 << align_power;
9849 if (htab->params->plt_stub_align >= 0
9850 || ((((stub_off + stub_size - 1) & -stub_align)
9851 - (stub_off & -stub_align))
9852 > ((stub_size - 1) & -stub_align)))
9853 stub_off = (stub_off + stub_align - 1) & -stub_align;
9854 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9855 off -= stub_off + s->output_offset + s->output_section->vma;
9856 /* Note that for --plt-stub-align negative we have a possible
9857 dependency between stub offset and size. Break that
9858 dependency by assuming the max stub size when calculating
9859 the stub offset. */
9860 if (PPC_HA (off) == 0)
9861 stub_size -= 4;
9862 h->root.type = bfd_link_hash_defined;
9863 h->root.u.def.section = s;
9864 h->root.u.def.value = stub_off;
9865 s->size = stub_off + stub_size;
9866 break;
9867 }
9868 return TRUE;
9869 }
9870
9871 /* Set the sizes of the dynamic sections. */
9872
9873 static bfd_boolean
9874 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9875 struct bfd_link_info *info)
9876 {
9877 struct ppc_link_hash_table *htab;
9878 bfd *dynobj;
9879 asection *s;
9880 bfd_boolean relocs;
9881 bfd *ibfd;
9882 struct got_entry *first_tlsld;
9883
9884 htab = ppc_hash_table (info);
9885 if (htab == NULL)
9886 return FALSE;
9887
9888 dynobj = htab->elf.dynobj;
9889 if (dynobj == NULL)
9890 abort ();
9891
9892 if (htab->elf.dynamic_sections_created)
9893 {
9894 /* Set the contents of the .interp section to the interpreter. */
9895 if (bfd_link_executable (info) && !info->nointerp)
9896 {
9897 s = bfd_get_linker_section (dynobj, ".interp");
9898 if (s == NULL)
9899 abort ();
9900 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9901 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9902 }
9903 }
9904
9905 /* Set up .got offsets for local syms, and space for local dynamic
9906 relocs. */
9907 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9908 {
9909 struct got_entry **lgot_ents;
9910 struct got_entry **end_lgot_ents;
9911 struct plt_entry **local_plt;
9912 struct plt_entry **end_local_plt;
9913 unsigned char *lgot_masks;
9914 bfd_size_type locsymcount;
9915 Elf_Internal_Shdr *symtab_hdr;
9916
9917 if (!is_ppc64_elf (ibfd))
9918 continue;
9919
9920 for (s = ibfd->sections; s != NULL; s = s->next)
9921 {
9922 struct ppc_dyn_relocs *p;
9923
9924 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9925 {
9926 if (!bfd_is_abs_section (p->sec)
9927 && bfd_is_abs_section (p->sec->output_section))
9928 {
9929 /* Input section has been discarded, either because
9930 it is a copy of a linkonce section or due to
9931 linker script /DISCARD/, so we'll be discarding
9932 the relocs too. */
9933 }
9934 else if (p->count != 0)
9935 {
9936 asection *srel = elf_section_data (p->sec)->sreloc;
9937 if (p->ifunc)
9938 srel = htab->elf.irelplt;
9939 srel->size += p->count * sizeof (Elf64_External_Rela);
9940 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9941 info->flags |= DF_TEXTREL;
9942 }
9943 }
9944 }
9945
9946 lgot_ents = elf_local_got_ents (ibfd);
9947 if (!lgot_ents)
9948 continue;
9949
9950 symtab_hdr = &elf_symtab_hdr (ibfd);
9951 locsymcount = symtab_hdr->sh_info;
9952 end_lgot_ents = lgot_ents + locsymcount;
9953 local_plt = (struct plt_entry **) end_lgot_ents;
9954 end_local_plt = local_plt + locsymcount;
9955 lgot_masks = (unsigned char *) end_local_plt;
9956 s = ppc64_elf_tdata (ibfd)->got;
9957 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9958 {
9959 struct got_entry **pent, *ent;
9960
9961 pent = lgot_ents;
9962 while ((ent = *pent) != NULL)
9963 if (ent->got.refcount > 0)
9964 {
9965 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9966 {
9967 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9968 *pent = ent->next;
9969 }
9970 else
9971 {
9972 unsigned int ent_size = 8;
9973 unsigned int rel_size = sizeof (Elf64_External_Rela);
9974
9975 ent->got.offset = s->size;
9976 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9977 {
9978 ent_size *= 2;
9979 rel_size *= 2;
9980 }
9981 s->size += ent_size;
9982 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9983 {
9984 htab->elf.irelplt->size += rel_size;
9985 htab->got_reli_size += rel_size;
9986 }
9987 else if (bfd_link_pic (info)
9988 && !(ent->tls_type != 0
9989 && bfd_link_executable (info)))
9990 {
9991 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9992 srel->size += rel_size;
9993 }
9994 pent = &ent->next;
9995 }
9996 }
9997 else
9998 *pent = ent->next;
9999 }
10000
10001 /* Allocate space for plt calls to local syms. */
10002 lgot_masks = (unsigned char *) end_local_plt;
10003 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
10004 {
10005 struct plt_entry *ent;
10006
10007 for (ent = *local_plt; ent != NULL; ent = ent->next)
10008 if (ent->plt.refcount > 0)
10009 {
10010 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10011 {
10012 s = htab->elf.iplt;
10013 ent->plt.offset = s->size;
10014 s->size += PLT_ENTRY_SIZE (htab);
10015 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10016 }
10017 else if (htab->can_convert_all_inline_plt
10018 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
10019 ent->plt.offset = (bfd_vma) -1;
10020 else
10021 {
10022 s = htab->pltlocal;
10023 ent->plt.offset = s->size;
10024 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10025 if (bfd_link_pic (info))
10026 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10027 }
10028 }
10029 else
10030 ent->plt.offset = (bfd_vma) -1;
10031 }
10032 }
10033
10034 /* Allocate global sym .plt and .got entries, and space for global
10035 sym dynamic relocs. */
10036 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10037
10038 if (!htab->opd_abi && !bfd_link_pic (info))
10039 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10040
10041 first_tlsld = NULL;
10042 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10043 {
10044 struct got_entry *ent;
10045
10046 if (!is_ppc64_elf (ibfd))
10047 continue;
10048
10049 ent = ppc64_tlsld_got (ibfd);
10050 if (ent->got.refcount > 0)
10051 {
10052 if (!htab->do_multi_toc && first_tlsld != NULL)
10053 {
10054 ent->is_indirect = TRUE;
10055 ent->got.ent = first_tlsld;
10056 }
10057 else
10058 {
10059 if (first_tlsld == NULL)
10060 first_tlsld = ent;
10061 s = ppc64_elf_tdata (ibfd)->got;
10062 ent->got.offset = s->size;
10063 ent->owner = ibfd;
10064 s->size += 16;
10065 if (bfd_link_dll (info))
10066 {
10067 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10068 srel->size += sizeof (Elf64_External_Rela);
10069 }
10070 }
10071 }
10072 else
10073 ent->got.offset = (bfd_vma) -1;
10074 }
10075
10076 /* We now have determined the sizes of the various dynamic sections.
10077 Allocate memory for them. */
10078 relocs = FALSE;
10079 for (s = dynobj->sections; s != NULL; s = s->next)
10080 {
10081 if ((s->flags & SEC_LINKER_CREATED) == 0)
10082 continue;
10083
10084 if (s == htab->brlt || s == htab->relbrlt)
10085 /* These haven't been allocated yet; don't strip. */
10086 continue;
10087 else if (s == htab->elf.sgot
10088 || s == htab->elf.splt
10089 || s == htab->elf.iplt
10090 || s == htab->pltlocal
10091 || s == htab->glink
10092 || s == htab->global_entry
10093 || s == htab->elf.sdynbss
10094 || s == htab->elf.sdynrelro)
10095 {
10096 /* Strip this section if we don't need it; see the
10097 comment below. */
10098 }
10099 else if (s == htab->glink_eh_frame)
10100 {
10101 if (!bfd_is_abs_section (s->output_section))
10102 /* Not sized yet. */
10103 continue;
10104 }
10105 else if (CONST_STRNEQ (s->name, ".rela"))
10106 {
10107 if (s->size != 0)
10108 {
10109 if (s != htab->elf.srelplt)
10110 relocs = TRUE;
10111
10112 /* We use the reloc_count field as a counter if we need
10113 to copy relocs into the output file. */
10114 s->reloc_count = 0;
10115 }
10116 }
10117 else
10118 {
10119 /* It's not one of our sections, so don't allocate space. */
10120 continue;
10121 }
10122
10123 if (s->size == 0)
10124 {
10125 /* If we don't need this section, strip it from the
10126 output file. This is mostly to handle .rela.bss and
10127 .rela.plt. We must create both sections in
10128 create_dynamic_sections, because they must be created
10129 before the linker maps input sections to output
10130 sections. The linker does that before
10131 adjust_dynamic_symbol is called, and it is that
10132 function which decides whether anything needs to go
10133 into these sections. */
10134 s->flags |= SEC_EXCLUDE;
10135 continue;
10136 }
10137
10138 if (bfd_is_abs_section (s->output_section))
10139 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10140 s->name);
10141
10142 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10143 continue;
10144
10145 /* Allocate memory for the section contents. We use bfd_zalloc
10146 here in case unused entries are not reclaimed before the
10147 section's contents are written out. This should not happen,
10148 but this way if it does we get a R_PPC64_NONE reloc in .rela
10149 sections instead of garbage.
10150 We also rely on the section contents being zero when writing
10151 the GOT and .dynrelro. */
10152 s->contents = bfd_zalloc (dynobj, s->size);
10153 if (s->contents == NULL)
10154 return FALSE;
10155 }
10156
10157 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10158 {
10159 if (!is_ppc64_elf (ibfd))
10160 continue;
10161
10162 s = ppc64_elf_tdata (ibfd)->got;
10163 if (s != NULL && s != htab->elf.sgot)
10164 {
10165 if (s->size == 0)
10166 s->flags |= SEC_EXCLUDE;
10167 else
10168 {
10169 s->contents = bfd_zalloc (ibfd, s->size);
10170 if (s->contents == NULL)
10171 return FALSE;
10172 }
10173 }
10174 s = ppc64_elf_tdata (ibfd)->relgot;
10175 if (s != NULL)
10176 {
10177 if (s->size == 0)
10178 s->flags |= SEC_EXCLUDE;
10179 else
10180 {
10181 s->contents = bfd_zalloc (ibfd, s->size);
10182 if (s->contents == NULL)
10183 return FALSE;
10184 relocs = TRUE;
10185 s->reloc_count = 0;
10186 }
10187 }
10188 }
10189
10190 if (htab->elf.dynamic_sections_created)
10191 {
10192 bfd_boolean tls_opt;
10193
10194 /* Add some entries to the .dynamic section. We fill in the
10195 values later, in ppc64_elf_finish_dynamic_sections, but we
10196 must add the entries now so that we get the correct size for
10197 the .dynamic section. The DT_DEBUG entry is filled in by the
10198 dynamic linker and used by the debugger. */
10199 #define add_dynamic_entry(TAG, VAL) \
10200 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10201
10202 if (bfd_link_executable (info))
10203 {
10204 if (!add_dynamic_entry (DT_DEBUG, 0))
10205 return FALSE;
10206 }
10207
10208 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10209 {
10210 if (!add_dynamic_entry (DT_PLTGOT, 0)
10211 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10212 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10213 || !add_dynamic_entry (DT_JMPREL, 0)
10214 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10215 return FALSE;
10216 }
10217
10218 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10219 {
10220 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10221 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10222 return FALSE;
10223 }
10224
10225 tls_opt = (htab->params->tls_get_addr_opt
10226 && ((htab->tls_get_addr_fd != NULL
10227 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10228 || (htab->tga_desc_fd != NULL
10229 && htab->tga_desc_fd->elf.plt.plist != NULL)));
10230 if (tls_opt || !htab->opd_abi)
10231 {
10232 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10233 return FALSE;
10234 }
10235
10236 if (relocs)
10237 {
10238 if (!add_dynamic_entry (DT_RELA, 0)
10239 || !add_dynamic_entry (DT_RELASZ, 0)
10240 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10241 return FALSE;
10242
10243 /* If any dynamic relocs apply to a read-only section,
10244 then we need a DT_TEXTREL entry. */
10245 if ((info->flags & DF_TEXTREL) == 0)
10246 elf_link_hash_traverse (&htab->elf,
10247 _bfd_elf_maybe_set_textrel, info);
10248
10249 if ((info->flags & DF_TEXTREL) != 0)
10250 {
10251 if (!add_dynamic_entry (DT_TEXTREL, 0))
10252 return FALSE;
10253 }
10254 }
10255 }
10256 #undef add_dynamic_entry
10257
10258 return TRUE;
10259 }
10260
10261 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10262
10263 static bfd_boolean
10264 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10265 {
10266 if (h->plt.plist != NULL
10267 && !h->def_regular
10268 && !h->pointer_equality_needed)
10269 return FALSE;
10270
10271 return _bfd_elf_hash_symbol (h);
10272 }
10273
10274 /* Determine the type of stub needed, if any, for a call. */
10275
10276 static inline enum ppc_stub_type
10277 ppc_type_of_stub (asection *input_sec,
10278 const Elf_Internal_Rela *rel,
10279 struct ppc_link_hash_entry **hash,
10280 struct plt_entry **plt_ent,
10281 bfd_vma destination,
10282 unsigned long local_off)
10283 {
10284 struct ppc_link_hash_entry *h = *hash;
10285 bfd_vma location;
10286 bfd_vma branch_offset;
10287 bfd_vma max_branch_offset;
10288 enum elf_ppc64_reloc_type r_type;
10289
10290 if (h != NULL)
10291 {
10292 struct plt_entry *ent;
10293 struct ppc_link_hash_entry *fdh = h;
10294 if (h->oh != NULL
10295 && h->oh->is_func_descriptor)
10296 {
10297 fdh = ppc_follow_link (h->oh);
10298 *hash = fdh;
10299 }
10300
10301 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10302 if (ent->addend == rel->r_addend
10303 && ent->plt.offset != (bfd_vma) -1)
10304 {
10305 *plt_ent = ent;
10306 return ppc_stub_plt_call;
10307 }
10308
10309 /* Here, we know we don't have a plt entry. If we don't have a
10310 either a defined function descriptor or a defined entry symbol
10311 in a regular object file, then it is pointless trying to make
10312 any other type of stub. */
10313 if (!is_static_defined (&fdh->elf)
10314 && !is_static_defined (&h->elf))
10315 return ppc_stub_none;
10316 }
10317 else if (elf_local_got_ents (input_sec->owner) != NULL)
10318 {
10319 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10320 struct plt_entry **local_plt = (struct plt_entry **)
10321 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10322 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10323
10324 if (local_plt[r_symndx] != NULL)
10325 {
10326 struct plt_entry *ent;
10327
10328 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10329 if (ent->addend == rel->r_addend
10330 && ent->plt.offset != (bfd_vma) -1)
10331 {
10332 *plt_ent = ent;
10333 return ppc_stub_plt_call;
10334 }
10335 }
10336 }
10337
10338 /* Determine where the call point is. */
10339 location = (input_sec->output_offset
10340 + input_sec->output_section->vma
10341 + rel->r_offset);
10342
10343 branch_offset = destination - location;
10344 r_type = ELF64_R_TYPE (rel->r_info);
10345
10346 /* Determine if a long branch stub is needed. */
10347 max_branch_offset = 1 << 25;
10348 if (r_type == R_PPC64_REL14
10349 || r_type == R_PPC64_REL14_BRTAKEN
10350 || r_type == R_PPC64_REL14_BRNTAKEN)
10351 max_branch_offset = 1 << 15;
10352
10353 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10354 /* We need a stub. Figure out whether a long_branch or plt_branch
10355 is needed later. */
10356 return ppc_stub_long_branch;
10357
10358 return ppc_stub_none;
10359 }
10360
10361 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10362 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10363 . mflr %r12
10364 . bcl 20,31,1f
10365 .1: mflr %r11
10366 . mtlr %r12
10367 . lis %r12,xxx-1b@highest
10368 . ori %r12,%r12,xxx-1b@higher
10369 . sldi %r12,%r12,32
10370 . oris %r12,%r12,xxx-1b@high
10371 . ori %r12,%r12,xxx-1b@l
10372 . add/ldx %r12,%r11,%r12 */
10373
10374 static bfd_byte *
10375 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10376 {
10377 bfd_put_32 (abfd, MFLR_R12, p);
10378 p += 4;
10379 bfd_put_32 (abfd, BCL_20_31, p);
10380 p += 4;
10381 bfd_put_32 (abfd, MFLR_R11, p);
10382 p += 4;
10383 bfd_put_32 (abfd, MTLR_R12, p);
10384 p += 4;
10385 if (off + 0x8000 < 0x10000)
10386 {
10387 if (load)
10388 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10389 else
10390 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10391 p += 4;
10392 }
10393 else if (off + 0x80008000ULL < 0x100000000ULL)
10394 {
10395 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10396 p += 4;
10397 if (load)
10398 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10399 else
10400 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10401 p += 4;
10402 }
10403 else
10404 {
10405 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10406 {
10407 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10408 p += 4;
10409 }
10410 else
10411 {
10412 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10413 p += 4;
10414 if (((off >> 32) & 0xffff) != 0)
10415 {
10416 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10417 p += 4;
10418 }
10419 }
10420 if (((off >> 32) & 0xffffffffULL) != 0)
10421 {
10422 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10423 p += 4;
10424 }
10425 if (PPC_HI (off) != 0)
10426 {
10427 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10428 p += 4;
10429 }
10430 if (PPC_LO (off) != 0)
10431 {
10432 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10433 p += 4;
10434 }
10435 if (load)
10436 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10437 else
10438 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10439 p += 4;
10440 }
10441 return p;
10442 }
10443
10444 static unsigned int
10445 size_offset (bfd_vma off)
10446 {
10447 unsigned int size;
10448 if (off + 0x8000 < 0x10000)
10449 size = 4;
10450 else if (off + 0x80008000ULL < 0x100000000ULL)
10451 size = 8;
10452 else
10453 {
10454 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10455 size = 4;
10456 else
10457 {
10458 size = 4;
10459 if (((off >> 32) & 0xffff) != 0)
10460 size += 4;
10461 }
10462 if (((off >> 32) & 0xffffffffULL) != 0)
10463 size += 4;
10464 if (PPC_HI (off) != 0)
10465 size += 4;
10466 if (PPC_LO (off) != 0)
10467 size += 4;
10468 size += 4;
10469 }
10470 return size + 16;
10471 }
10472
10473 static unsigned int
10474 num_relocs_for_offset (bfd_vma off)
10475 {
10476 unsigned int num_rel;
10477 if (off + 0x8000 < 0x10000)
10478 num_rel = 1;
10479 else if (off + 0x80008000ULL < 0x100000000ULL)
10480 num_rel = 2;
10481 else
10482 {
10483 num_rel = 1;
10484 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10485 && ((off >> 32) & 0xffff) != 0)
10486 num_rel += 1;
10487 if (PPC_HI (off) != 0)
10488 num_rel += 1;
10489 if (PPC_LO (off) != 0)
10490 num_rel += 1;
10491 }
10492 return num_rel;
10493 }
10494
10495 static Elf_Internal_Rela *
10496 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10497 bfd_vma roff, bfd_vma targ, bfd_vma off)
10498 {
10499 bfd_vma relative_targ = targ - (roff - 8);
10500 if (bfd_big_endian (info->output_bfd))
10501 roff += 2;
10502 r->r_offset = roff;
10503 r->r_addend = relative_targ + roff;
10504 if (off + 0x8000 < 0x10000)
10505 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10506 else if (off + 0x80008000ULL < 0x100000000ULL)
10507 {
10508 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10509 ++r;
10510 roff += 4;
10511 r->r_offset = roff;
10512 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10513 r->r_addend = relative_targ + roff;
10514 }
10515 else
10516 {
10517 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10518 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10519 else
10520 {
10521 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10522 if (((off >> 32) & 0xffff) != 0)
10523 {
10524 ++r;
10525 roff += 4;
10526 r->r_offset = roff;
10527 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10528 r->r_addend = relative_targ + roff;
10529 }
10530 }
10531 if (((off >> 32) & 0xffffffffULL) != 0)
10532 roff += 4;
10533 if (PPC_HI (off) != 0)
10534 {
10535 ++r;
10536 roff += 4;
10537 r->r_offset = roff;
10538 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10539 r->r_addend = relative_targ + roff;
10540 }
10541 if (PPC_LO (off) != 0)
10542 {
10543 ++r;
10544 roff += 4;
10545 r->r_offset = roff;
10546 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10547 r->r_addend = relative_targ + roff;
10548 }
10549 }
10550 return r;
10551 }
10552
10553 static bfd_byte *
10554 build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10555 bfd_boolean load)
10556 {
10557 uint64_t insn;
10558 if (off - odd + (1ULL << 33) < 1ULL << 34)
10559 {
10560 off -= odd;
10561 if (odd)
10562 {
10563 bfd_put_32 (abfd, NOP, p);
10564 p += 4;
10565 }
10566 if (load)
10567 insn = PLD_R12_PC;
10568 else
10569 insn = PADDI_R12_PC;
10570 insn |= D34 (off);
10571 bfd_put_32 (abfd, insn >> 32, p);
10572 p += 4;
10573 bfd_put_32 (abfd, insn, p);
10574 }
10575 /* The minimum value for paddi is -0x200000000. The minimum value
10576 for li is -0x8000, which when shifted by 34 and added gives a
10577 minimum value of -0x2000200000000. The maximum value is
10578 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10579 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10580 {
10581 off -= 8 - odd;
10582 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10583 p += 4;
10584 if (!odd)
10585 {
10586 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10587 p += 4;
10588 }
10589 insn = PADDI_R12_PC | D34 (off);
10590 bfd_put_32 (abfd, insn >> 32, p);
10591 p += 4;
10592 bfd_put_32 (abfd, insn, p);
10593 p += 4;
10594 if (odd)
10595 {
10596 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10597 p += 4;
10598 }
10599 if (load)
10600 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10601 else
10602 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10603 }
10604 else
10605 {
10606 off -= odd + 8;
10607 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10608 p += 4;
10609 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10610 p += 4;
10611 if (odd)
10612 {
10613 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10614 p += 4;
10615 }
10616 insn = PADDI_R12_PC | D34 (off);
10617 bfd_put_32 (abfd, insn >> 32, p);
10618 p += 4;
10619 bfd_put_32 (abfd, insn, p);
10620 p += 4;
10621 if (!odd)
10622 {
10623 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10624 p += 4;
10625 }
10626 if (load)
10627 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10628 else
10629 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10630 }
10631 p += 4;
10632 return p;
10633 }
10634
10635 static unsigned int
10636 size_power10_offset (bfd_vma off, int odd)
10637 {
10638 if (off - odd + (1ULL << 33) < 1ULL << 34)
10639 return odd + 8;
10640 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10641 return 20;
10642 else
10643 return 24;
10644 }
10645
10646 static unsigned int
10647 num_relocs_for_power10_offset (bfd_vma off, int odd)
10648 {
10649 if (off - odd + (1ULL << 33) < 1ULL << 34)
10650 return 1;
10651 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10652 return 2;
10653 else
10654 return 3;
10655 }
10656
10657 static Elf_Internal_Rela *
10658 emit_relocs_for_power10_offset (struct bfd_link_info *info,
10659 Elf_Internal_Rela *r, bfd_vma roff,
10660 bfd_vma targ, bfd_vma off, int odd)
10661 {
10662 if (off - odd + (1ULL << 33) < 1ULL << 34)
10663 roff += odd;
10664 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10665 {
10666 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10667 r->r_offset = roff + d_offset;
10668 r->r_addend = targ + 8 - odd - d_offset;
10669 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10670 ++r;
10671 roff += 8 - odd;
10672 }
10673 else
10674 {
10675 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10676 r->r_offset = roff + d_offset;
10677 r->r_addend = targ + 8 + odd - d_offset;
10678 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10679 ++r;
10680 roff += 4;
10681 r->r_offset = roff + d_offset;
10682 r->r_addend = targ + 4 + odd - d_offset;
10683 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10684 ++r;
10685 roff += 4 + odd;
10686 }
10687 r->r_offset = roff;
10688 r->r_addend = targ;
10689 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10690 return r;
10691 }
10692
10693 /* Emit .eh_frame opcode to advance pc by DELTA. */
10694
10695 static bfd_byte *
10696 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10697 {
10698 delta /= 4;
10699 if (delta < 64)
10700 *eh++ = DW_CFA_advance_loc + delta;
10701 else if (delta < 256)
10702 {
10703 *eh++ = DW_CFA_advance_loc1;
10704 *eh++ = delta;
10705 }
10706 else if (delta < 65536)
10707 {
10708 *eh++ = DW_CFA_advance_loc2;
10709 bfd_put_16 (abfd, delta, eh);
10710 eh += 2;
10711 }
10712 else
10713 {
10714 *eh++ = DW_CFA_advance_loc4;
10715 bfd_put_32 (abfd, delta, eh);
10716 eh += 4;
10717 }
10718 return eh;
10719 }
10720
10721 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10722
10723 static unsigned int
10724 eh_advance_size (unsigned int delta)
10725 {
10726 if (delta < 64 * 4)
10727 /* DW_CFA_advance_loc+[1..63]. */
10728 return 1;
10729 if (delta < 256 * 4)
10730 /* DW_CFA_advance_loc1, byte. */
10731 return 2;
10732 if (delta < 65536 * 4)
10733 /* DW_CFA_advance_loc2, 2 bytes. */
10734 return 3;
10735 /* DW_CFA_advance_loc4, 4 bytes. */
10736 return 5;
10737 }
10738
10739 /* With power7 weakly ordered memory model, it is possible for ld.so
10740 to update a plt entry in one thread and have another thread see a
10741 stale zero toc entry. To avoid this we need some sort of acquire
10742 barrier in the call stub. One solution is to make the load of the
10743 toc word seem to appear to depend on the load of the function entry
10744 word. Another solution is to test for r2 being zero, and branch to
10745 the appropriate glink entry if so.
10746
10747 . fake dep barrier compare
10748 . ld 12,xxx(2) ld 12,xxx(2)
10749 . mtctr 12 mtctr 12
10750 . xor 11,12,12 ld 2,xxx+8(2)
10751 . add 2,2,11 cmpldi 2,0
10752 . ld 2,xxx+8(2) bnectr+
10753 . bctr b <glink_entry>
10754
10755 The solution involving the compare turns out to be faster, so
10756 that's what we use unless the branch won't reach. */
10757
10758 #define ALWAYS_USE_FAKE_DEP 0
10759 #define ALWAYS_EMIT_R2SAVE 0
10760
10761 static inline unsigned int
10762 plt_stub_size (struct ppc_link_hash_table *htab,
10763 struct ppc_stub_hash_entry *stub_entry,
10764 bfd_vma off)
10765 {
10766 unsigned size;
10767
10768 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10769 {
10770 if (htab->power10_stubs)
10771 {
10772 bfd_vma start = (stub_entry->stub_offset
10773 + stub_entry->group->stub_sec->output_offset
10774 + stub_entry->group->stub_sec->output_section->vma);
10775 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10776 start += 4;
10777 size = 8 + size_power10_offset (off, start & 4);
10778 }
10779 else
10780 size = 8 + size_offset (off - 8);
10781 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10782 size += 4;
10783 return size;
10784 }
10785
10786 size = 12;
10787 if (ALWAYS_EMIT_R2SAVE
10788 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10789 size += 4;
10790 if (PPC_HA (off) != 0)
10791 size += 4;
10792 if (htab->opd_abi)
10793 {
10794 size += 4;
10795 if (htab->params->plt_static_chain)
10796 size += 4;
10797 if (htab->params->plt_thread_safe
10798 && htab->elf.dynamic_sections_created
10799 && stub_entry->h != NULL
10800 && stub_entry->h->elf.dynindx != -1)
10801 size += 8;
10802 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10803 size += 4;
10804 }
10805 if (stub_entry->h != NULL
10806 && is_tls_get_addr (&stub_entry->h->elf, htab)
10807 && htab->params->tls_get_addr_opt)
10808 {
10809 if (htab->params->no_tls_get_addr_regsave)
10810 {
10811 size += 7 * 4;
10812 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10813 size += 6 * 4;
10814 }
10815 else
10816 {
10817 size += 30 * 4;
10818 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10819 size += 4;
10820 }
10821 }
10822 return size;
10823 }
10824
10825 /* Depending on the sign of plt_stub_align:
10826 If positive, return the padding to align to a 2**plt_stub_align
10827 boundary.
10828 If negative, if this stub would cross fewer 2**plt_stub_align
10829 boundaries if we align, then return the padding needed to do so. */
10830
10831 static inline unsigned int
10832 plt_stub_pad (struct ppc_link_hash_table *htab,
10833 struct ppc_stub_hash_entry *stub_entry,
10834 bfd_vma plt_off)
10835 {
10836 int stub_align;
10837 unsigned stub_size;
10838 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10839
10840 if (htab->params->plt_stub_align >= 0)
10841 {
10842 stub_align = 1 << htab->params->plt_stub_align;
10843 if ((stub_off & (stub_align - 1)) != 0)
10844 return stub_align - (stub_off & (stub_align - 1));
10845 return 0;
10846 }
10847
10848 stub_align = 1 << -htab->params->plt_stub_align;
10849 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10850 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10851 > ((stub_size - 1) & -stub_align))
10852 return stub_align - (stub_off & (stub_align - 1));
10853 return 0;
10854 }
10855
10856 /* Build a .plt call stub. */
10857
10858 static inline bfd_byte *
10859 build_plt_stub (struct ppc_link_hash_table *htab,
10860 struct ppc_stub_hash_entry *stub_entry,
10861 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10862 {
10863 bfd *obfd = htab->params->stub_bfd;
10864 bfd_boolean plt_load_toc = htab->opd_abi;
10865 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10866 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10867 && htab->elf.dynamic_sections_created
10868 && stub_entry->h != NULL
10869 && stub_entry->h->elf.dynindx != -1);
10870 bfd_boolean use_fake_dep = plt_thread_safe;
10871 bfd_vma cmp_branch_off = 0;
10872
10873 if (!ALWAYS_USE_FAKE_DEP
10874 && plt_load_toc
10875 && plt_thread_safe
10876 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
10877 && htab->params->tls_get_addr_opt))
10878 {
10879 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10880 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10881 / PLT_ENTRY_SIZE (htab));
10882 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10883 bfd_vma to, from;
10884
10885 if (pltindex > 32768)
10886 glinkoff += (pltindex - 32768) * 4;
10887 to = (glinkoff
10888 + htab->glink->output_offset
10889 + htab->glink->output_section->vma);
10890 from = (p - stub_entry->group->stub_sec->contents
10891 + 4 * (ALWAYS_EMIT_R2SAVE
10892 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10893 + 4 * (PPC_HA (offset) != 0)
10894 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10895 != PPC_HA (offset))
10896 + 4 * (plt_static_chain != 0)
10897 + 20
10898 + stub_entry->group->stub_sec->output_offset
10899 + stub_entry->group->stub_sec->output_section->vma);
10900 cmp_branch_off = to - from;
10901 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10902 }
10903
10904 if (PPC_HA (offset) != 0)
10905 {
10906 if (r != NULL)
10907 {
10908 if (ALWAYS_EMIT_R2SAVE
10909 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10910 r[0].r_offset += 4;
10911 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10912 r[1].r_offset = r[0].r_offset + 4;
10913 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10914 r[1].r_addend = r[0].r_addend;
10915 if (plt_load_toc)
10916 {
10917 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10918 {
10919 r[2].r_offset = r[1].r_offset + 4;
10920 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10921 r[2].r_addend = r[0].r_addend;
10922 }
10923 else
10924 {
10925 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10926 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10927 r[2].r_addend = r[0].r_addend + 8;
10928 if (plt_static_chain)
10929 {
10930 r[3].r_offset = r[2].r_offset + 4;
10931 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10932 r[3].r_addend = r[0].r_addend + 16;
10933 }
10934 }
10935 }
10936 }
10937 if (ALWAYS_EMIT_R2SAVE
10938 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10939 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10940 if (plt_load_toc)
10941 {
10942 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10943 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10944 }
10945 else
10946 {
10947 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10948 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10949 }
10950 if (plt_load_toc
10951 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10952 {
10953 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10954 offset = 0;
10955 }
10956 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10957 if (plt_load_toc)
10958 {
10959 if (use_fake_dep)
10960 {
10961 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10962 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10963 }
10964 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10965 if (plt_static_chain)
10966 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10967 }
10968 }
10969 else
10970 {
10971 if (r != NULL)
10972 {
10973 if (ALWAYS_EMIT_R2SAVE
10974 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10975 r[0].r_offset += 4;
10976 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10977 if (plt_load_toc)
10978 {
10979 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10980 {
10981 r[1].r_offset = r[0].r_offset + 4;
10982 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10983 r[1].r_addend = r[0].r_addend;
10984 }
10985 else
10986 {
10987 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10988 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10989 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10990 if (plt_static_chain)
10991 {
10992 r[2].r_offset = r[1].r_offset + 4;
10993 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10994 r[2].r_addend = r[0].r_addend + 8;
10995 }
10996 }
10997 }
10998 }
10999 if (ALWAYS_EMIT_R2SAVE
11000 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11001 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
11002 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
11003 if (plt_load_toc
11004 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
11005 {
11006 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11007 offset = 0;
11008 }
11009 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
11010 if (plt_load_toc)
11011 {
11012 if (use_fake_dep)
11013 {
11014 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11015 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11016 }
11017 if (plt_static_chain)
11018 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11019 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
11020 }
11021 }
11022 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
11023 {
11024 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11025 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
11026 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
11027 }
11028 else
11029 bfd_put_32 (obfd, BCTR, p), p += 4;
11030 return p;
11031 }
11032
11033 /* Build a special .plt call stub for __tls_get_addr. */
11034
11035 #define LD_R0_0R3 0xe8030000
11036 #define LD_R12_0R3 0xe9830000
11037 #define MR_R0_R3 0x7c601b78
11038 #define CMPDI_R0_0 0x2c200000
11039 #define ADD_R3_R12_R13 0x7c6c6a14
11040 #define BEQLR 0x4d820020
11041 #define MR_R3_R0 0x7c030378
11042 #define BCTRL 0x4e800421
11043
11044 static inline bfd_byte *
11045 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11046 struct ppc_stub_hash_entry *stub_entry,
11047 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
11048 {
11049 bfd *obfd = htab->params->stub_bfd;
11050 bfd_byte *loc = p;
11051 unsigned int i;
11052
11053 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
11054 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11055 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
11056 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11057 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11058 bfd_put_32 (obfd, BEQLR, p), p += 4;
11059 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
11060 if (htab->params->no_tls_get_addr_regsave)
11061 {
11062 if (r != NULL)
11063 r[0].r_offset += 7 * 4;
11064 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11065 return build_plt_stub (htab, stub_entry, p, offset, r);
11066
11067 bfd_put_32 (obfd, MFLR_R0, p);
11068 p += 4;
11069 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11070 p += 4;
11071
11072 if (r != NULL)
11073 r[0].r_offset += 2 * 4;
11074 p = build_plt_stub (htab, stub_entry, p, offset, r);
11075 bfd_put_32 (obfd, BCTRL, p - 4);
11076
11077 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11078 p += 4;
11079 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11080 p += 4;
11081 bfd_put_32 (obfd, MTLR_R0, p);
11082 p += 4;
11083 bfd_put_32 (obfd, BLR, p);
11084 p += 4;
11085 }
11086 else
11087 {
11088 p = tls_get_addr_prologue (obfd, p, htab);
11089
11090 if (r != NULL)
11091 r[0].r_offset += 18 * 4;
11092
11093 p = build_plt_stub (htab, stub_entry, p, offset, r);
11094 bfd_put_32 (obfd, BCTRL, p - 4);
11095
11096 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11097 {
11098 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11099 p += 4;
11100 }
11101
11102 p = tls_get_addr_epilogue (obfd, p, htab);
11103 }
11104
11105 if (htab->glink_eh_frame != NULL
11106 && htab->glink_eh_frame->size != 0)
11107 {
11108 bfd_byte *base, *eh;
11109
11110 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11111 eh = base + stub_entry->group->eh_size;
11112 if (htab->params->no_tls_get_addr_regsave)
11113 {
11114 unsigned int lr_used, delta;
11115 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11116 delta = lr_used - stub_entry->group->lr_restore;
11117 stub_entry->group->lr_restore = lr_used + 16;
11118 eh = eh_advance (htab->elf.dynobj, eh, delta);
11119 *eh++ = DW_CFA_offset_extended_sf;
11120 *eh++ = 65;
11121 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11122 *eh++ = DW_CFA_advance_loc + 4;
11123 }
11124 else
11125 {
11126 unsigned int cfa_updt, delta;
11127 /* After the bctrl, lr has been modified so we need to emit
11128 .eh_frame info saying the return address is on the stack. In
11129 fact we must put the EH info at or before the call rather
11130 than after it, because the EH info for a call needs to be
11131 specified by that point.
11132 See libgcc/unwind-dw2.c execute_cfa_program.
11133 Any stack pointer update must be described immediately after
11134 the instruction making the change, and since the stdu occurs
11135 after saving regs we put all the reg saves and the cfa
11136 change there. */
11137 cfa_updt = stub_entry->stub_offset + 18 * 4;
11138 delta = cfa_updt - stub_entry->group->lr_restore;
11139 stub_entry->group->lr_restore
11140 = stub_entry->stub_offset + (p - loc) - 4;
11141 eh = eh_advance (htab->elf.dynobj, eh, delta);
11142 *eh++ = DW_CFA_def_cfa_offset;
11143 if (htab->opd_abi)
11144 {
11145 *eh++ = 128;
11146 *eh++ = 1;
11147 }
11148 else
11149 *eh++ = 96;
11150 *eh++ = DW_CFA_offset_extended_sf;
11151 *eh++ = 65;
11152 *eh++ = (-16 / 8) & 0x7f;
11153 for (i = 4; i < 12; i++)
11154 {
11155 *eh++ = DW_CFA_offset + i;
11156 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11157 }
11158 *eh++ = (DW_CFA_advance_loc
11159 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11160 *eh++ = DW_CFA_def_cfa_offset;
11161 *eh++ = 0;
11162 for (i = 4; i < 12; i++)
11163 *eh++ = DW_CFA_restore + i;
11164 *eh++ = DW_CFA_advance_loc + 2;
11165 }
11166 *eh++ = DW_CFA_restore_extended;
11167 *eh++ = 65;
11168 stub_entry->group->eh_size = eh - base;
11169 }
11170 return p;
11171 }
11172
11173 static Elf_Internal_Rela *
11174 get_relocs (asection *sec, int count)
11175 {
11176 Elf_Internal_Rela *relocs;
11177 struct bfd_elf_section_data *elfsec_data;
11178
11179 elfsec_data = elf_section_data (sec);
11180 relocs = elfsec_data->relocs;
11181 if (relocs == NULL)
11182 {
11183 bfd_size_type relsize;
11184 relsize = sec->reloc_count * sizeof (*relocs);
11185 relocs = bfd_alloc (sec->owner, relsize);
11186 if (relocs == NULL)
11187 return NULL;
11188 elfsec_data->relocs = relocs;
11189 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11190 sizeof (Elf_Internal_Shdr));
11191 if (elfsec_data->rela.hdr == NULL)
11192 return NULL;
11193 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11194 * sizeof (Elf64_External_Rela));
11195 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
11196 sec->reloc_count = 0;
11197 }
11198 relocs += sec->reloc_count;
11199 sec->reloc_count += count;
11200 return relocs;
11201 }
11202
11203 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11204 forms, to the equivalent relocs against the global symbol given by
11205 STUB_ENTRY->H. */
11206
11207 static bfd_boolean
11208 use_global_in_relocs (struct ppc_link_hash_table *htab,
11209 struct ppc_stub_hash_entry *stub_entry,
11210 Elf_Internal_Rela *r, unsigned int num_rel)
11211 {
11212 struct elf_link_hash_entry **hashes;
11213 unsigned long symndx;
11214 struct ppc_link_hash_entry *h;
11215 bfd_vma symval;
11216
11217 /* Relocs are always against symbols in their own object file. Fake
11218 up global sym hashes for the stub bfd (which has no symbols). */
11219 hashes = elf_sym_hashes (htab->params->stub_bfd);
11220 if (hashes == NULL)
11221 {
11222 bfd_size_type hsize;
11223
11224 /* When called the first time, stub_globals will contain the
11225 total number of symbols seen during stub sizing. After
11226 allocating, stub_globals is used as an index to fill the
11227 hashes array. */
11228 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11229 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11230 if (hashes == NULL)
11231 return FALSE;
11232 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11233 htab->stub_globals = 1;
11234 }
11235 symndx = htab->stub_globals++;
11236 h = stub_entry->h;
11237 hashes[symndx] = &h->elf;
11238 if (h->oh != NULL && h->oh->is_func)
11239 h = ppc_follow_link (h->oh);
11240 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11241 || h->elf.root.type == bfd_link_hash_defweak);
11242 symval = defined_sym_val (&h->elf);
11243 while (num_rel-- != 0)
11244 {
11245 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11246 if (h->elf.root.u.def.section != stub_entry->target_section)
11247 {
11248 /* H is an opd symbol. The addend must be zero, and the
11249 branch reloc is the only one we can convert. */
11250 r->r_addend = 0;
11251 break;
11252 }
11253 else
11254 r->r_addend -= symval;
11255 --r;
11256 }
11257 return TRUE;
11258 }
11259
11260 static bfd_vma
11261 get_r2off (struct bfd_link_info *info,
11262 struct ppc_stub_hash_entry *stub_entry)
11263 {
11264 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11265 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11266
11267 if (r2off == 0)
11268 {
11269 /* Support linking -R objects. Get the toc pointer from the
11270 opd entry. */
11271 char buf[8];
11272 if (!htab->opd_abi)
11273 return r2off;
11274 asection *opd = stub_entry->h->elf.root.u.def.section;
11275 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11276
11277 if (strcmp (opd->name, ".opd") != 0
11278 || opd->reloc_count != 0)
11279 {
11280 info->callbacks->einfo
11281 (_("%P: cannot find opd entry toc for `%pT'\n"),
11282 stub_entry->h->elf.root.root.string);
11283 bfd_set_error (bfd_error_bad_value);
11284 return (bfd_vma) -1;
11285 }
11286 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11287 return (bfd_vma) -1;
11288 r2off = bfd_get_64 (opd->owner, buf);
11289 r2off -= elf_gp (info->output_bfd);
11290 }
11291 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11292 return r2off;
11293 }
11294
11295 static bfd_boolean
11296 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11297 {
11298 struct ppc_stub_hash_entry *stub_entry;
11299 struct ppc_branch_hash_entry *br_entry;
11300 struct bfd_link_info *info;
11301 struct ppc_link_hash_table *htab;
11302 bfd_byte *loc;
11303 bfd_byte *p, *relp;
11304 bfd_vma targ, off;
11305 Elf_Internal_Rela *r;
11306 asection *plt;
11307 int num_rel;
11308 int odd;
11309
11310 /* Massage our args to the form they really have. */
11311 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11312 info = in_arg;
11313
11314 /* Fail if the target section could not be assigned to an output
11315 section. The user should fix his linker script. */
11316 if (stub_entry->target_section != NULL
11317 && stub_entry->target_section->output_section == NULL
11318 && info->non_contiguous_regions)
11319 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11320 "Retry without --enable-non-contiguous-regions.\n"),
11321 stub_entry->target_section);
11322
11323 /* Same for the group. */
11324 if (stub_entry->group->stub_sec != NULL
11325 && stub_entry->group->stub_sec->output_section == NULL
11326 && info->non_contiguous_regions)
11327 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11328 "output section. Retry without "
11329 "--enable-non-contiguous-regions.\n"),
11330 stub_entry->group->stub_sec,
11331 stub_entry->target_section);
11332
11333 htab = ppc_hash_table (info);
11334 if (htab == NULL)
11335 return FALSE;
11336
11337 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11338 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11339
11340 htab->stub_count[stub_entry->stub_type - 1] += 1;
11341 switch (stub_entry->stub_type)
11342 {
11343 case ppc_stub_long_branch:
11344 case ppc_stub_long_branch_r2off:
11345 /* Branches are relative. This is where we are going to. */
11346 targ = (stub_entry->target_value
11347 + stub_entry->target_section->output_offset
11348 + stub_entry->target_section->output_section->vma);
11349 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11350
11351 /* And this is where we are coming from. */
11352 off = (stub_entry->stub_offset
11353 + stub_entry->group->stub_sec->output_offset
11354 + stub_entry->group->stub_sec->output_section->vma);
11355 off = targ - off;
11356
11357 p = loc;
11358 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11359 {
11360 bfd_vma r2off = get_r2off (info, stub_entry);
11361
11362 if (r2off == (bfd_vma) -1)
11363 {
11364 htab->stub_error = TRUE;
11365 return FALSE;
11366 }
11367 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11368 p += 4;
11369 if (PPC_HA (r2off) != 0)
11370 {
11371 bfd_put_32 (htab->params->stub_bfd,
11372 ADDIS_R2_R2 | PPC_HA (r2off), p);
11373 p += 4;
11374 }
11375 if (PPC_LO (r2off) != 0)
11376 {
11377 bfd_put_32 (htab->params->stub_bfd,
11378 ADDI_R2_R2 | PPC_LO (r2off), p);
11379 p += 4;
11380 }
11381 off -= p - loc;
11382 }
11383 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11384 p += 4;
11385
11386 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11387 {
11388 _bfd_error_handler
11389 (_("long branch stub `%s' offset overflow"),
11390 stub_entry->root.string);
11391 htab->stub_error = TRUE;
11392 return FALSE;
11393 }
11394
11395 if (info->emitrelocations)
11396 {
11397 r = get_relocs (stub_entry->group->stub_sec, 1);
11398 if (r == NULL)
11399 return FALSE;
11400 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11401 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11402 r->r_addend = targ;
11403 if (stub_entry->h != NULL
11404 && !use_global_in_relocs (htab, stub_entry, r, 1))
11405 return FALSE;
11406 }
11407 break;
11408
11409 case ppc_stub_plt_branch:
11410 case ppc_stub_plt_branch_r2off:
11411 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11412 stub_entry->root.string + 9,
11413 FALSE, FALSE);
11414 if (br_entry == NULL)
11415 {
11416 _bfd_error_handler (_("can't find branch stub `%s'"),
11417 stub_entry->root.string);
11418 htab->stub_error = TRUE;
11419 return FALSE;
11420 }
11421
11422 targ = (stub_entry->target_value
11423 + stub_entry->target_section->output_offset
11424 + stub_entry->target_section->output_section->vma);
11425 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11426 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11427
11428 bfd_put_64 (htab->brlt->owner, targ,
11429 htab->brlt->contents + br_entry->offset);
11430
11431 if (br_entry->iter == htab->stub_iteration)
11432 {
11433 br_entry->iter = 0;
11434
11435 if (htab->relbrlt != NULL)
11436 {
11437 /* Create a reloc for the branch lookup table entry. */
11438 Elf_Internal_Rela rela;
11439 bfd_byte *rl;
11440
11441 rela.r_offset = (br_entry->offset
11442 + htab->brlt->output_offset
11443 + htab->brlt->output_section->vma);
11444 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11445 rela.r_addend = targ;
11446
11447 rl = htab->relbrlt->contents;
11448 rl += (htab->relbrlt->reloc_count++
11449 * sizeof (Elf64_External_Rela));
11450 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11451 }
11452 else if (info->emitrelocations)
11453 {
11454 r = get_relocs (htab->brlt, 1);
11455 if (r == NULL)
11456 return FALSE;
11457 /* brlt, being SEC_LINKER_CREATED does not go through the
11458 normal reloc processing. Symbols and offsets are not
11459 translated from input file to output file form, so
11460 set up the offset per the output file. */
11461 r->r_offset = (br_entry->offset
11462 + htab->brlt->output_offset
11463 + htab->brlt->output_section->vma);
11464 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11465 r->r_addend = targ;
11466 }
11467 }
11468
11469 targ = (br_entry->offset
11470 + htab->brlt->output_offset
11471 + htab->brlt->output_section->vma);
11472
11473 off = (elf_gp (info->output_bfd)
11474 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11475 off = targ - off;
11476
11477 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11478 {
11479 info->callbacks->einfo
11480 (_("%P: linkage table error against `%pT'\n"),
11481 stub_entry->root.string);
11482 bfd_set_error (bfd_error_bad_value);
11483 htab->stub_error = TRUE;
11484 return FALSE;
11485 }
11486
11487 if (info->emitrelocations)
11488 {
11489 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11490 if (r == NULL)
11491 return FALSE;
11492 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11493 if (bfd_big_endian (info->output_bfd))
11494 r[0].r_offset += 2;
11495 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11496 r[0].r_offset += 4;
11497 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11498 r[0].r_addend = targ;
11499 if (PPC_HA (off) != 0)
11500 {
11501 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11502 r[1].r_offset = r[0].r_offset + 4;
11503 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11504 r[1].r_addend = r[0].r_addend;
11505 }
11506 }
11507
11508 p = loc;
11509 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11510 {
11511 if (PPC_HA (off) != 0)
11512 {
11513 bfd_put_32 (htab->params->stub_bfd,
11514 ADDIS_R12_R2 | PPC_HA (off), p);
11515 p += 4;
11516 bfd_put_32 (htab->params->stub_bfd,
11517 LD_R12_0R12 | PPC_LO (off), p);
11518 }
11519 else
11520 bfd_put_32 (htab->params->stub_bfd,
11521 LD_R12_0R2 | PPC_LO (off), p);
11522 }
11523 else
11524 {
11525 bfd_vma r2off = get_r2off (info, stub_entry);
11526
11527 if (r2off == (bfd_vma) -1)
11528 {
11529 htab->stub_error = TRUE;
11530 return FALSE;
11531 }
11532
11533 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11534 p += 4;
11535 if (PPC_HA (off) != 0)
11536 {
11537 bfd_put_32 (htab->params->stub_bfd,
11538 ADDIS_R12_R2 | PPC_HA (off), p);
11539 p += 4;
11540 bfd_put_32 (htab->params->stub_bfd,
11541 LD_R12_0R12 | PPC_LO (off), p);
11542 }
11543 else
11544 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11545
11546 if (PPC_HA (r2off) != 0)
11547 {
11548 p += 4;
11549 bfd_put_32 (htab->params->stub_bfd,
11550 ADDIS_R2_R2 | PPC_HA (r2off), p);
11551 }
11552 if (PPC_LO (r2off) != 0)
11553 {
11554 p += 4;
11555 bfd_put_32 (htab->params->stub_bfd,
11556 ADDI_R2_R2 | PPC_LO (r2off), p);
11557 }
11558 }
11559 p += 4;
11560 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11561 p += 4;
11562 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11563 p += 4;
11564 break;
11565
11566 case ppc_stub_long_branch_notoc:
11567 case ppc_stub_long_branch_both:
11568 case ppc_stub_plt_branch_notoc:
11569 case ppc_stub_plt_branch_both:
11570 case ppc_stub_plt_call_notoc:
11571 case ppc_stub_plt_call_both:
11572 p = loc;
11573 off = (stub_entry->stub_offset
11574 + stub_entry->group->stub_sec->output_offset
11575 + stub_entry->group->stub_sec->output_section->vma);
11576 if (stub_entry->stub_type == ppc_stub_long_branch_both
11577 || stub_entry->stub_type == ppc_stub_plt_branch_both
11578 || stub_entry->stub_type == ppc_stub_plt_call_both)
11579 {
11580 off += 4;
11581 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11582 p += 4;
11583 }
11584 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11585 {
11586 targ = stub_entry->plt_ent->plt.offset & ~1;
11587 if (targ >= (bfd_vma) -2)
11588 abort ();
11589
11590 plt = htab->elf.splt;
11591 if (!htab->elf.dynamic_sections_created
11592 || stub_entry->h == NULL
11593 || stub_entry->h->elf.dynindx == -1)
11594 {
11595 if (stub_entry->symtype == STT_GNU_IFUNC)
11596 plt = htab->elf.iplt;
11597 else
11598 plt = htab->pltlocal;
11599 }
11600 targ += plt->output_offset + plt->output_section->vma;
11601 }
11602 else
11603 targ = (stub_entry->target_value
11604 + stub_entry->target_section->output_offset
11605 + stub_entry->target_section->output_section->vma);
11606 odd = off & 4;
11607 off = targ - off;
11608
11609 relp = p;
11610 num_rel = 0;
11611 if (htab->power10_stubs)
11612 {
11613 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11614 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
11615 }
11616 else
11617 {
11618 /* The notoc stubs calculate their target (either a PLT entry or
11619 the global entry point of a function) relative to the PC
11620 returned by the "bcl" two instructions past the start of the
11621 sequence emitted by build_offset. The offset is therefore 8
11622 less than calculated from the start of the sequence. */
11623 off -= 8;
11624 p = build_offset (htab->params->stub_bfd, p, off,
11625 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11626 }
11627
11628 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11629 {
11630 bfd_vma from;
11631 num_rel = 1;
11632 from = (stub_entry->stub_offset
11633 + stub_entry->group->stub_sec->output_offset
11634 + stub_entry->group->stub_sec->output_section->vma
11635 + (p - loc));
11636 bfd_put_32 (htab->params->stub_bfd,
11637 B_DOT | ((targ - from) & 0x3fffffc), p);
11638 }
11639 else
11640 {
11641 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11642 p += 4;
11643 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11644 }
11645 p += 4;
11646
11647 if (info->emitrelocations)
11648 {
11649 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11650 if (htab->power10_stubs)
11651 num_rel += num_relocs_for_power10_offset (off, odd);
11652 else
11653 {
11654 num_rel += num_relocs_for_offset (off);
11655 roff += 16;
11656 }
11657 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11658 if (r == NULL)
11659 return FALSE;
11660 if (htab->power10_stubs)
11661 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
11662 else
11663 r = emit_relocs_for_offset (info, r, roff, targ, off);
11664 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11665 || stub_entry->stub_type == ppc_stub_long_branch_both)
11666 {
11667 ++r;
11668 roff = p - 4 - stub_entry->group->stub_sec->contents;
11669 r->r_offset = roff;
11670 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11671 r->r_addend = targ;
11672 if (stub_entry->h != NULL
11673 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11674 return FALSE;
11675 }
11676 }
11677
11678 if (!htab->power10_stubs
11679 && htab->glink_eh_frame != NULL
11680 && htab->glink_eh_frame->size != 0)
11681 {
11682 bfd_byte *base, *eh;
11683 unsigned int lr_used, delta;
11684
11685 base = (htab->glink_eh_frame->contents
11686 + stub_entry->group->eh_base + 17);
11687 eh = base + stub_entry->group->eh_size;
11688 lr_used = stub_entry->stub_offset + 8;
11689 if (stub_entry->stub_type == ppc_stub_long_branch_both
11690 || stub_entry->stub_type == ppc_stub_plt_branch_both
11691 || stub_entry->stub_type == ppc_stub_plt_call_both)
11692 lr_used += 4;
11693 delta = lr_used - stub_entry->group->lr_restore;
11694 stub_entry->group->lr_restore = lr_used + 8;
11695 eh = eh_advance (htab->elf.dynobj, eh, delta);
11696 *eh++ = DW_CFA_register;
11697 *eh++ = 65;
11698 *eh++ = 12;
11699 *eh++ = DW_CFA_advance_loc + 2;
11700 *eh++ = DW_CFA_restore_extended;
11701 *eh++ = 65;
11702 stub_entry->group->eh_size = eh - base;
11703 }
11704 break;
11705
11706 case ppc_stub_plt_call:
11707 case ppc_stub_plt_call_r2save:
11708 if (stub_entry->h != NULL
11709 && stub_entry->h->is_func_descriptor
11710 && stub_entry->h->oh != NULL)
11711 {
11712 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11713
11714 /* If the old-ABI "dot-symbol" is undefined make it weak so
11715 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11716 if (fh->elf.root.type == bfd_link_hash_undefined
11717 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11718 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11719 fh->elf.root.type = bfd_link_hash_undefweak;
11720 }
11721
11722 /* Now build the stub. */
11723 targ = stub_entry->plt_ent->plt.offset & ~1;
11724 if (targ >= (bfd_vma) -2)
11725 abort ();
11726
11727 plt = htab->elf.splt;
11728 if (!htab->elf.dynamic_sections_created
11729 || stub_entry->h == NULL
11730 || stub_entry->h->elf.dynindx == -1)
11731 {
11732 if (stub_entry->symtype == STT_GNU_IFUNC)
11733 plt = htab->elf.iplt;
11734 else
11735 plt = htab->pltlocal;
11736 }
11737 targ += plt->output_offset + plt->output_section->vma;
11738
11739 off = (elf_gp (info->output_bfd)
11740 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11741 off = targ - off;
11742
11743 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11744 {
11745 info->callbacks->einfo
11746 /* xgettext:c-format */
11747 (_("%P: linkage table error against `%pT'\n"),
11748 stub_entry->h != NULL
11749 ? stub_entry->h->elf.root.root.string
11750 : "<local sym>");
11751 bfd_set_error (bfd_error_bad_value);
11752 htab->stub_error = TRUE;
11753 return FALSE;
11754 }
11755
11756 r = NULL;
11757 if (info->emitrelocations)
11758 {
11759 r = get_relocs (stub_entry->group->stub_sec,
11760 ((PPC_HA (off) != 0)
11761 + (htab->opd_abi
11762 ? 2 + (htab->params->plt_static_chain
11763 && PPC_HA (off + 16) == PPC_HA (off))
11764 : 1)));
11765 if (r == NULL)
11766 return FALSE;
11767 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11768 if (bfd_big_endian (info->output_bfd))
11769 r[0].r_offset += 2;
11770 r[0].r_addend = targ;
11771 }
11772 if (stub_entry->h != NULL
11773 && is_tls_get_addr (&stub_entry->h->elf, htab)
11774 && htab->params->tls_get_addr_opt)
11775 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11776 else
11777 p = build_plt_stub (htab, stub_entry, loc, off, r);
11778 break;
11779
11780 case ppc_stub_save_res:
11781 return TRUE;
11782
11783 default:
11784 BFD_FAIL ();
11785 return FALSE;
11786 }
11787
11788 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11789
11790 if (htab->params->emit_stub_syms)
11791 {
11792 struct elf_link_hash_entry *h;
11793 size_t len1, len2;
11794 char *name;
11795 const char *const stub_str[] = { "long_branch",
11796 "long_branch",
11797 "long_branch",
11798 "long_branch",
11799 "plt_branch",
11800 "plt_branch",
11801 "plt_branch",
11802 "plt_branch",
11803 "plt_call",
11804 "plt_call",
11805 "plt_call",
11806 "plt_call" };
11807
11808 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11809 len2 = strlen (stub_entry->root.string);
11810 name = bfd_malloc (len1 + len2 + 2);
11811 if (name == NULL)
11812 return FALSE;
11813 memcpy (name, stub_entry->root.string, 9);
11814 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11815 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11816 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11817 if (h == NULL)
11818 return FALSE;
11819 if (h->root.type == bfd_link_hash_new)
11820 {
11821 h->root.type = bfd_link_hash_defined;
11822 h->root.u.def.section = stub_entry->group->stub_sec;
11823 h->root.u.def.value = stub_entry->stub_offset;
11824 h->ref_regular = 1;
11825 h->def_regular = 1;
11826 h->ref_regular_nonweak = 1;
11827 h->forced_local = 1;
11828 h->non_elf = 0;
11829 h->root.linker_def = 1;
11830 }
11831 }
11832
11833 return TRUE;
11834 }
11835
11836 /* As above, but don't actually build the stub. Just bump offset so
11837 we know stub section sizes, and select plt_branch stubs where
11838 long_branch stubs won't do. */
11839
11840 static bfd_boolean
11841 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11842 {
11843 struct ppc_stub_hash_entry *stub_entry;
11844 struct bfd_link_info *info;
11845 struct ppc_link_hash_table *htab;
11846 asection *plt;
11847 bfd_vma targ, off, r2off;
11848 unsigned int size, extra, lr_used, delta, odd;
11849
11850 /* Massage our args to the form they really have. */
11851 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11852 info = in_arg;
11853
11854 htab = ppc_hash_table (info);
11855 if (htab == NULL)
11856 return FALSE;
11857
11858 /* Fail if the target section could not be assigned to an output
11859 section. The user should fix his linker script. */
11860 if (stub_entry->target_section != NULL
11861 && stub_entry->target_section->output_section == NULL
11862 && info->non_contiguous_regions)
11863 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11864 "Retry without --enable-non-contiguous-regions.\n"),
11865 stub_entry->target_section);
11866
11867 /* Same for the group. */
11868 if (stub_entry->group->stub_sec != NULL
11869 && stub_entry->group->stub_sec->output_section == NULL
11870 && info->non_contiguous_regions)
11871 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11872 "output section. Retry without "
11873 "--enable-non-contiguous-regions.\n"),
11874 stub_entry->group->stub_sec,
11875 stub_entry->target_section);
11876
11877 /* Make a note of the offset within the stubs for this entry. */
11878 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11879
11880 if (stub_entry->h != NULL
11881 && stub_entry->h->save_res
11882 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11883 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11884 {
11885 /* Don't make stubs to out-of-line register save/restore
11886 functions. Instead, emit copies of the functions. */
11887 stub_entry->group->needs_save_res = 1;
11888 stub_entry->stub_type = ppc_stub_save_res;
11889 return TRUE;
11890 }
11891
11892 switch (stub_entry->stub_type)
11893 {
11894 case ppc_stub_plt_branch:
11895 case ppc_stub_plt_branch_r2off:
11896 /* Reset the stub type from the plt branch variant in case we now
11897 can reach with a shorter stub. */
11898 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11899 /* Fall through. */
11900 case ppc_stub_long_branch:
11901 case ppc_stub_long_branch_r2off:
11902 targ = (stub_entry->target_value
11903 + stub_entry->target_section->output_offset
11904 + stub_entry->target_section->output_section->vma);
11905 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11906 off = (stub_entry->stub_offset
11907 + stub_entry->group->stub_sec->output_offset
11908 + stub_entry->group->stub_sec->output_section->vma);
11909
11910 size = 4;
11911 r2off = 0;
11912 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11913 {
11914 r2off = get_r2off (info, stub_entry);
11915 if (r2off == (bfd_vma) -1)
11916 {
11917 htab->stub_error = TRUE;
11918 return FALSE;
11919 }
11920 size = 8;
11921 if (PPC_HA (r2off) != 0)
11922 size += 4;
11923 if (PPC_LO (r2off) != 0)
11924 size += 4;
11925 off += size - 4;
11926 }
11927 off = targ - off;
11928
11929 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11930 Do the same for -R objects without function descriptors. */
11931 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11932 && r2off == 0
11933 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11934 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11935 {
11936 struct ppc_branch_hash_entry *br_entry;
11937
11938 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11939 stub_entry->root.string + 9,
11940 TRUE, FALSE);
11941 if (br_entry == NULL)
11942 {
11943 _bfd_error_handler (_("can't build branch stub `%s'"),
11944 stub_entry->root.string);
11945 htab->stub_error = TRUE;
11946 return FALSE;
11947 }
11948
11949 if (br_entry->iter != htab->stub_iteration)
11950 {
11951 br_entry->iter = htab->stub_iteration;
11952 br_entry->offset = htab->brlt->size;
11953 htab->brlt->size += 8;
11954
11955 if (htab->relbrlt != NULL)
11956 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11957 else if (info->emitrelocations)
11958 {
11959 htab->brlt->reloc_count += 1;
11960 htab->brlt->flags |= SEC_RELOC;
11961 }
11962 }
11963
11964 targ = (br_entry->offset
11965 + htab->brlt->output_offset
11966 + htab->brlt->output_section->vma);
11967 off = (elf_gp (info->output_bfd)
11968 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11969 off = targ - off;
11970
11971 if (info->emitrelocations)
11972 {
11973 stub_entry->group->stub_sec->reloc_count
11974 += 1 + (PPC_HA (off) != 0);
11975 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11976 }
11977
11978 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11979 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11980 {
11981 size = 12;
11982 if (PPC_HA (off) != 0)
11983 size = 16;
11984 }
11985 else
11986 {
11987 size = 16;
11988 if (PPC_HA (off) != 0)
11989 size += 4;
11990
11991 if (PPC_HA (r2off) != 0)
11992 size += 4;
11993 if (PPC_LO (r2off) != 0)
11994 size += 4;
11995 }
11996 }
11997 else if (info->emitrelocations)
11998 {
11999 stub_entry->group->stub_sec->reloc_count += 1;
12000 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12001 }
12002 break;
12003
12004 case ppc_stub_plt_branch_notoc:
12005 case ppc_stub_plt_branch_both:
12006 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12007 /* Fall through. */
12008 case ppc_stub_long_branch_notoc:
12009 case ppc_stub_long_branch_both:
12010 off = (stub_entry->stub_offset
12011 + stub_entry->group->stub_sec->output_offset
12012 + stub_entry->group->stub_sec->output_section->vma);
12013 size = 0;
12014 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12015 size = 4;
12016 off += size;
12017 targ = (stub_entry->target_value
12018 + stub_entry->target_section->output_offset
12019 + stub_entry->target_section->output_section->vma);
12020 odd = off & 4;
12021 off = targ - off;
12022
12023 if (info->emitrelocations)
12024 {
12025 unsigned int num_rel;
12026 if (htab->power10_stubs)
12027 num_rel = num_relocs_for_power10_offset (off, odd);
12028 else
12029 num_rel = num_relocs_for_offset (off - 8);
12030 stub_entry->group->stub_sec->reloc_count += num_rel;
12031 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12032 }
12033
12034 if (htab->power10_stubs)
12035 extra = size_power10_offset (off, odd);
12036 else
12037 extra = size_offset (off - 8);
12038 /* Include branch insn plus those in the offset sequence. */
12039 size += 4 + extra;
12040 /* The branch insn is at the end, or "extra" bytes along. So
12041 its offset will be "extra" bytes less that that already
12042 calculated. */
12043 off -= extra;
12044
12045 if (!htab->power10_stubs)
12046 {
12047 /* After the bcl, lr has been modified so we need to emit
12048 .eh_frame info saying the return address is in r12. */
12049 lr_used = stub_entry->stub_offset + 8;
12050 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12051 lr_used += 4;
12052 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12053 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12054 DW_CFA_restore_extended 65. */
12055 delta = lr_used - stub_entry->group->lr_restore;
12056 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12057 stub_entry->group->lr_restore = lr_used + 8;
12058 }
12059
12060 /* If the branch can't reach, use a plt_branch. */
12061 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12062 {
12063 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12064 - ppc_stub_long_branch_notoc);
12065 size += 4;
12066 }
12067 else if (info->emitrelocations)
12068 stub_entry->group->stub_sec->reloc_count +=1;
12069 break;
12070
12071 case ppc_stub_plt_call_notoc:
12072 case ppc_stub_plt_call_both:
12073 off = (stub_entry->stub_offset
12074 + stub_entry->group->stub_sec->output_offset
12075 + stub_entry->group->stub_sec->output_section->vma);
12076 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12077 off += 4;
12078 targ = stub_entry->plt_ent->plt.offset & ~1;
12079 if (targ >= (bfd_vma) -2)
12080 abort ();
12081
12082 plt = htab->elf.splt;
12083 if (!htab->elf.dynamic_sections_created
12084 || stub_entry->h == NULL
12085 || stub_entry->h->elf.dynindx == -1)
12086 {
12087 if (stub_entry->symtype == STT_GNU_IFUNC)
12088 plt = htab->elf.iplt;
12089 else
12090 plt = htab->pltlocal;
12091 }
12092 targ += plt->output_offset + plt->output_section->vma;
12093 odd = off & 4;
12094 off = targ - off;
12095
12096 if (htab->params->plt_stub_align != 0)
12097 {
12098 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12099
12100 stub_entry->group->stub_sec->size += pad;
12101 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12102 off -= pad;
12103 }
12104
12105 if (info->emitrelocations)
12106 {
12107 unsigned int num_rel;
12108 if (htab->power10_stubs)
12109 num_rel = num_relocs_for_power10_offset (off, odd);
12110 else
12111 num_rel = num_relocs_for_offset (off - 8);
12112 stub_entry->group->stub_sec->reloc_count += num_rel;
12113 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12114 }
12115
12116 size = plt_stub_size (htab, stub_entry, off);
12117
12118 if (!htab->power10_stubs)
12119 {
12120 /* After the bcl, lr has been modified so we need to emit
12121 .eh_frame info saying the return address is in r12. */
12122 lr_used = stub_entry->stub_offset + 8;
12123 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12124 lr_used += 4;
12125 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12126 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12127 DW_CFA_restore_extended 65. */
12128 delta = lr_used - stub_entry->group->lr_restore;
12129 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12130 stub_entry->group->lr_restore = lr_used + 8;
12131 }
12132 break;
12133
12134 case ppc_stub_plt_call:
12135 case ppc_stub_plt_call_r2save:
12136 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12137 if (targ >= (bfd_vma) -2)
12138 abort ();
12139 plt = htab->elf.splt;
12140 if (!htab->elf.dynamic_sections_created
12141 || stub_entry->h == NULL
12142 || stub_entry->h->elf.dynindx == -1)
12143 {
12144 if (stub_entry->symtype == STT_GNU_IFUNC)
12145 plt = htab->elf.iplt;
12146 else
12147 plt = htab->pltlocal;
12148 }
12149 targ += plt->output_offset + plt->output_section->vma;
12150
12151 off = (elf_gp (info->output_bfd)
12152 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12153 off = targ - off;
12154
12155 if (htab->params->plt_stub_align != 0)
12156 {
12157 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12158
12159 stub_entry->group->stub_sec->size += pad;
12160 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12161 }
12162
12163 if (info->emitrelocations)
12164 {
12165 stub_entry->group->stub_sec->reloc_count
12166 += ((PPC_HA (off) != 0)
12167 + (htab->opd_abi
12168 ? 2 + (htab->params->plt_static_chain
12169 && PPC_HA (off + 16) == PPC_HA (off))
12170 : 1));
12171 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12172 }
12173
12174 size = plt_stub_size (htab, stub_entry, off);
12175
12176 if (stub_entry->h != NULL
12177 && is_tls_get_addr (&stub_entry->h->elf, htab)
12178 && htab->params->tls_get_addr_opt
12179 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12180 {
12181 if (htab->params->no_tls_get_addr_regsave)
12182 {
12183 lr_used = stub_entry->stub_offset + size - 20;
12184 /* The eh_frame info will consist of a DW_CFA_advance_loc
12185 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12186 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12187 delta = lr_used - stub_entry->group->lr_restore;
12188 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12189 }
12190 else
12191 {
12192 /* Adjustments to r1 need to be described. */
12193 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12194 delta = cfa_updt - stub_entry->group->lr_restore;
12195 stub_entry->group->eh_size += eh_advance_size (delta);
12196 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12197 }
12198 stub_entry->group->lr_restore = size - 4;
12199 }
12200 break;
12201
12202 default:
12203 BFD_FAIL ();
12204 return FALSE;
12205 }
12206
12207 stub_entry->group->stub_sec->size += size;
12208 return TRUE;
12209 }
12210
12211 /* Set up various things so that we can make a list of input sections
12212 for each output section included in the link. Returns -1 on error,
12213 0 when no stubs will be needed, and 1 on success. */
12214
12215 int
12216 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
12217 {
12218 unsigned int id;
12219 size_t amt;
12220 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12221
12222 if (htab == NULL)
12223 return -1;
12224
12225 htab->sec_info_arr_size = _bfd_section_id;
12226 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12227 htab->sec_info = bfd_zmalloc (amt);
12228 if (htab->sec_info == NULL)
12229 return -1;
12230
12231 /* Set toc_off for com, und, abs and ind sections. */
12232 for (id = 0; id < 3; id++)
12233 htab->sec_info[id].toc_off = TOC_BASE_OFF;
12234
12235 return 1;
12236 }
12237
12238 /* Set up for first pass at multitoc partitioning. */
12239
12240 void
12241 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12242 {
12243 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12244
12245 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
12246 htab->toc_bfd = NULL;
12247 htab->toc_first_sec = NULL;
12248 }
12249
12250 /* The linker repeatedly calls this function for each TOC input section
12251 and linker generated GOT section. Group input bfds such that the toc
12252 within a group is less than 64k in size. */
12253
12254 bfd_boolean
12255 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
12256 {
12257 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12258 bfd_vma addr, off, limit;
12259
12260 if (htab == NULL)
12261 return FALSE;
12262
12263 if (!htab->second_toc_pass)
12264 {
12265 /* Keep track of the first .toc or .got section for this input bfd. */
12266 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12267
12268 if (new_bfd)
12269 {
12270 htab->toc_bfd = isec->owner;
12271 htab->toc_first_sec = isec;
12272 }
12273
12274 addr = isec->output_offset + isec->output_section->vma;
12275 off = addr - htab->toc_curr;
12276 limit = 0x80008000;
12277 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12278 limit = 0x10000;
12279 if (off + isec->size > limit)
12280 {
12281 addr = (htab->toc_first_sec->output_offset
12282 + htab->toc_first_sec->output_section->vma);
12283 htab->toc_curr = addr;
12284 htab->toc_curr &= -TOC_BASE_ALIGN;
12285 }
12286
12287 /* toc_curr is the base address of this toc group. Set elf_gp
12288 for the input section to be the offset relative to the
12289 output toc base plus 0x8000. Making the input elf_gp an
12290 offset allows us to move the toc as a whole without
12291 recalculating input elf_gp. */
12292 off = htab->toc_curr - elf_gp (info->output_bfd);
12293 off += TOC_BASE_OFF;
12294
12295 /* Die if someone uses a linker script that doesn't keep input
12296 file .toc and .got together. */
12297 if (new_bfd
12298 && elf_gp (isec->owner) != 0
12299 && elf_gp (isec->owner) != off)
12300 return FALSE;
12301
12302 elf_gp (isec->owner) = off;
12303 return TRUE;
12304 }
12305
12306 /* During the second pass toc_first_sec points to the start of
12307 a toc group, and toc_curr is used to track the old elf_gp.
12308 We use toc_bfd to ensure we only look at each bfd once. */
12309 if (htab->toc_bfd == isec->owner)
12310 return TRUE;
12311 htab->toc_bfd = isec->owner;
12312
12313 if (htab->toc_first_sec == NULL
12314 || htab->toc_curr != elf_gp (isec->owner))
12315 {
12316 htab->toc_curr = elf_gp (isec->owner);
12317 htab->toc_first_sec = isec;
12318 }
12319 addr = (htab->toc_first_sec->output_offset
12320 + htab->toc_first_sec->output_section->vma);
12321 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12322 elf_gp (isec->owner) = off;
12323
12324 return TRUE;
12325 }
12326
12327 /* Called via elf_link_hash_traverse to merge GOT entries for global
12328 symbol H. */
12329
12330 static bfd_boolean
12331 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12332 {
12333 if (h->root.type == bfd_link_hash_indirect)
12334 return TRUE;
12335
12336 merge_got_entries (&h->got.glist);
12337
12338 return TRUE;
12339 }
12340
12341 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12342 symbol H. */
12343
12344 static bfd_boolean
12345 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12346 {
12347 struct got_entry *gent;
12348
12349 if (h->root.type == bfd_link_hash_indirect)
12350 return TRUE;
12351
12352 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12353 if (!gent->is_indirect)
12354 allocate_got (h, (struct bfd_link_info *) inf, gent);
12355 return TRUE;
12356 }
12357
12358 /* Called on the first multitoc pass after the last call to
12359 ppc64_elf_next_toc_section. This function removes duplicate GOT
12360 entries. */
12361
12362 bfd_boolean
12363 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12364 {
12365 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12366 struct bfd *ibfd, *ibfd2;
12367 bfd_boolean done_something;
12368
12369 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12370
12371 if (!htab->do_multi_toc)
12372 return FALSE;
12373
12374 /* Merge global sym got entries within a toc group. */
12375 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12376
12377 /* And tlsld_got. */
12378 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12379 {
12380 struct got_entry *ent, *ent2;
12381
12382 if (!is_ppc64_elf (ibfd))
12383 continue;
12384
12385 ent = ppc64_tlsld_got (ibfd);
12386 if (!ent->is_indirect
12387 && ent->got.offset != (bfd_vma) -1)
12388 {
12389 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12390 {
12391 if (!is_ppc64_elf (ibfd2))
12392 continue;
12393
12394 ent2 = ppc64_tlsld_got (ibfd2);
12395 if (!ent2->is_indirect
12396 && ent2->got.offset != (bfd_vma) -1
12397 && elf_gp (ibfd2) == elf_gp (ibfd))
12398 {
12399 ent2->is_indirect = TRUE;
12400 ent2->got.ent = ent;
12401 }
12402 }
12403 }
12404 }
12405
12406 /* Zap sizes of got sections. */
12407 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12408 htab->elf.irelplt->size -= htab->got_reli_size;
12409 htab->got_reli_size = 0;
12410
12411 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12412 {
12413 asection *got, *relgot;
12414
12415 if (!is_ppc64_elf (ibfd))
12416 continue;
12417
12418 got = ppc64_elf_tdata (ibfd)->got;
12419 if (got != NULL)
12420 {
12421 got->rawsize = got->size;
12422 got->size = 0;
12423 relgot = ppc64_elf_tdata (ibfd)->relgot;
12424 relgot->rawsize = relgot->size;
12425 relgot->size = 0;
12426 }
12427 }
12428
12429 /* Now reallocate the got, local syms first. We don't need to
12430 allocate section contents again since we never increase size. */
12431 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12432 {
12433 struct got_entry **lgot_ents;
12434 struct got_entry **end_lgot_ents;
12435 struct plt_entry **local_plt;
12436 struct plt_entry **end_local_plt;
12437 unsigned char *lgot_masks;
12438 bfd_size_type locsymcount;
12439 Elf_Internal_Shdr *symtab_hdr;
12440 asection *s;
12441
12442 if (!is_ppc64_elf (ibfd))
12443 continue;
12444
12445 lgot_ents = elf_local_got_ents (ibfd);
12446 if (!lgot_ents)
12447 continue;
12448
12449 symtab_hdr = &elf_symtab_hdr (ibfd);
12450 locsymcount = symtab_hdr->sh_info;
12451 end_lgot_ents = lgot_ents + locsymcount;
12452 local_plt = (struct plt_entry **) end_lgot_ents;
12453 end_local_plt = local_plt + locsymcount;
12454 lgot_masks = (unsigned char *) end_local_plt;
12455 s = ppc64_elf_tdata (ibfd)->got;
12456 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12457 {
12458 struct got_entry *ent;
12459
12460 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12461 {
12462 unsigned int ent_size = 8;
12463 unsigned int rel_size = sizeof (Elf64_External_Rela);
12464
12465 ent->got.offset = s->size;
12466 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12467 {
12468 ent_size *= 2;
12469 rel_size *= 2;
12470 }
12471 s->size += ent_size;
12472 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12473 {
12474 htab->elf.irelplt->size += rel_size;
12475 htab->got_reli_size += rel_size;
12476 }
12477 else if (bfd_link_pic (info)
12478 && !(ent->tls_type != 0
12479 && bfd_link_executable (info)))
12480 {
12481 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12482 srel->size += rel_size;
12483 }
12484 }
12485 }
12486 }
12487
12488 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12489
12490 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12491 {
12492 struct got_entry *ent;
12493
12494 if (!is_ppc64_elf (ibfd))
12495 continue;
12496
12497 ent = ppc64_tlsld_got (ibfd);
12498 if (!ent->is_indirect
12499 && ent->got.offset != (bfd_vma) -1)
12500 {
12501 asection *s = ppc64_elf_tdata (ibfd)->got;
12502 ent->got.offset = s->size;
12503 s->size += 16;
12504 if (bfd_link_dll (info))
12505 {
12506 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12507 srel->size += sizeof (Elf64_External_Rela);
12508 }
12509 }
12510 }
12511
12512 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12513 if (!done_something)
12514 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12515 {
12516 asection *got;
12517
12518 if (!is_ppc64_elf (ibfd))
12519 continue;
12520
12521 got = ppc64_elf_tdata (ibfd)->got;
12522 if (got != NULL)
12523 {
12524 done_something = got->rawsize != got->size;
12525 if (done_something)
12526 break;
12527 }
12528 }
12529
12530 if (done_something)
12531 (*htab->params->layout_sections_again) ();
12532
12533 /* Set up for second pass over toc sections to recalculate elf_gp
12534 on input sections. */
12535 htab->toc_bfd = NULL;
12536 htab->toc_first_sec = NULL;
12537 htab->second_toc_pass = TRUE;
12538 return done_something;
12539 }
12540
12541 /* Called after second pass of multitoc partitioning. */
12542
12543 void
12544 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12545 {
12546 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12547
12548 /* After the second pass, toc_curr tracks the TOC offset used
12549 for code sections below in ppc64_elf_next_input_section. */
12550 htab->toc_curr = TOC_BASE_OFF;
12551 }
12552
12553 /* No toc references were found in ISEC. If the code in ISEC makes no
12554 calls, then there's no need to use toc adjusting stubs when branching
12555 into ISEC. Actually, indirect calls from ISEC are OK as they will
12556 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12557 needed, and 2 if a cyclical call-graph was found but no other reason
12558 for a stub was detected. If called from the top level, a return of
12559 2 means the same as a return of 0. */
12560
12561 static int
12562 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12563 {
12564 int ret;
12565
12566 /* Mark this section as checked. */
12567 isec->call_check_done = 1;
12568
12569 /* We know none of our code bearing sections will need toc stubs. */
12570 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12571 return 0;
12572
12573 if (isec->size == 0)
12574 return 0;
12575
12576 if (isec->output_section == NULL)
12577 return 0;
12578
12579 ret = 0;
12580 if (isec->reloc_count != 0)
12581 {
12582 Elf_Internal_Rela *relstart, *rel;
12583 Elf_Internal_Sym *local_syms;
12584 struct ppc_link_hash_table *htab;
12585
12586 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12587 info->keep_memory);
12588 if (relstart == NULL)
12589 return -1;
12590
12591 /* Look for branches to outside of this section. */
12592 local_syms = NULL;
12593 htab = ppc_hash_table (info);
12594 if (htab == NULL)
12595 return -1;
12596
12597 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12598 {
12599 enum elf_ppc64_reloc_type r_type;
12600 unsigned long r_symndx;
12601 struct elf_link_hash_entry *h;
12602 struct ppc_link_hash_entry *eh;
12603 Elf_Internal_Sym *sym;
12604 asection *sym_sec;
12605 struct _opd_sec_data *opd;
12606 bfd_vma sym_value;
12607 bfd_vma dest;
12608
12609 r_type = ELF64_R_TYPE (rel->r_info);
12610 if (r_type != R_PPC64_REL24
12611 && r_type != R_PPC64_REL24_NOTOC
12612 && r_type != R_PPC64_REL14
12613 && r_type != R_PPC64_REL14_BRTAKEN
12614 && r_type != R_PPC64_REL14_BRNTAKEN
12615 && r_type != R_PPC64_PLTCALL
12616 && r_type != R_PPC64_PLTCALL_NOTOC)
12617 continue;
12618
12619 r_symndx = ELF64_R_SYM (rel->r_info);
12620 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12621 isec->owner))
12622 {
12623 ret = -1;
12624 break;
12625 }
12626
12627 /* Calls to dynamic lib functions go through a plt call stub
12628 that uses r2. */
12629 eh = ppc_elf_hash_entry (h);
12630 if (eh != NULL
12631 && (eh->elf.plt.plist != NULL
12632 || (eh->oh != NULL
12633 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12634 {
12635 ret = 1;
12636 break;
12637 }
12638
12639 if (sym_sec == NULL)
12640 /* Ignore other undefined symbols. */
12641 continue;
12642
12643 /* Assume branches to other sections not included in the
12644 link need stubs too, to cover -R and absolute syms. */
12645 if (sym_sec->output_section == NULL)
12646 {
12647 ret = 1;
12648 break;
12649 }
12650
12651 if (h == NULL)
12652 sym_value = sym->st_value;
12653 else
12654 {
12655 if (h->root.type != bfd_link_hash_defined
12656 && h->root.type != bfd_link_hash_defweak)
12657 abort ();
12658 sym_value = h->root.u.def.value;
12659 }
12660 sym_value += rel->r_addend;
12661
12662 /* If this branch reloc uses an opd sym, find the code section. */
12663 opd = get_opd_info (sym_sec);
12664 if (opd != NULL)
12665 {
12666 if (h == NULL && opd->adjust != NULL)
12667 {
12668 long adjust;
12669
12670 adjust = opd->adjust[OPD_NDX (sym_value)];
12671 if (adjust == -1)
12672 /* Assume deleted functions won't ever be called. */
12673 continue;
12674 sym_value += adjust;
12675 }
12676
12677 dest = opd_entry_value (sym_sec, sym_value,
12678 &sym_sec, NULL, FALSE);
12679 if (dest == (bfd_vma) -1)
12680 continue;
12681 }
12682 else
12683 dest = (sym_value
12684 + sym_sec->output_offset
12685 + sym_sec->output_section->vma);
12686
12687 /* Ignore branch to self. */
12688 if (sym_sec == isec)
12689 continue;
12690
12691 /* If the called function uses the toc, we need a stub. */
12692 if (sym_sec->has_toc_reloc
12693 || sym_sec->makes_toc_func_call)
12694 {
12695 ret = 1;
12696 break;
12697 }
12698
12699 /* Assume any branch that needs a long branch stub might in fact
12700 need a plt_branch stub. A plt_branch stub uses r2. */
12701 else if (dest - (isec->output_offset
12702 + isec->output_section->vma
12703 + rel->r_offset) + (1 << 25)
12704 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12705 ? h->other
12706 : sym->st_other))
12707 {
12708 ret = 1;
12709 break;
12710 }
12711
12712 /* If calling back to a section in the process of being
12713 tested, we can't say for sure that no toc adjusting stubs
12714 are needed, so don't return zero. */
12715 else if (sym_sec->call_check_in_progress)
12716 ret = 2;
12717
12718 /* Branches to another section that itself doesn't have any TOC
12719 references are OK. Recursively call ourselves to check. */
12720 else if (!sym_sec->call_check_done)
12721 {
12722 int recur;
12723
12724 /* Mark current section as indeterminate, so that other
12725 sections that call back to current won't be marked as
12726 known. */
12727 isec->call_check_in_progress = 1;
12728 recur = toc_adjusting_stub_needed (info, sym_sec);
12729 isec->call_check_in_progress = 0;
12730
12731 if (recur != 0)
12732 {
12733 ret = recur;
12734 if (recur != 2)
12735 break;
12736 }
12737 }
12738 }
12739
12740 if (elf_symtab_hdr (isec->owner).contents
12741 != (unsigned char *) local_syms)
12742 free (local_syms);
12743 if (elf_section_data (isec)->relocs != relstart)
12744 free (relstart);
12745 }
12746
12747 if ((ret & 1) == 0
12748 && isec->map_head.s != NULL
12749 && (strcmp (isec->output_section->name, ".init") == 0
12750 || strcmp (isec->output_section->name, ".fini") == 0))
12751 {
12752 if (isec->map_head.s->has_toc_reloc
12753 || isec->map_head.s->makes_toc_func_call)
12754 ret = 1;
12755 else if (!isec->map_head.s->call_check_done)
12756 {
12757 int recur;
12758 isec->call_check_in_progress = 1;
12759 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12760 isec->call_check_in_progress = 0;
12761 if (recur != 0)
12762 ret = recur;
12763 }
12764 }
12765
12766 if (ret == 1)
12767 isec->makes_toc_func_call = 1;
12768
12769 return ret;
12770 }
12771
12772 /* The linker repeatedly calls this function for each input section,
12773 in the order that input sections are linked into output sections.
12774 Build lists of input sections to determine groupings between which
12775 we may insert linker stubs. */
12776
12777 bfd_boolean
12778 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12779 {
12780 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12781
12782 if (htab == NULL)
12783 return FALSE;
12784
12785 if ((isec->output_section->flags & SEC_CODE) != 0
12786 && isec->output_section->id < htab->sec_info_arr_size)
12787 {
12788 /* This happens to make the list in reverse order,
12789 which is what we want. */
12790 htab->sec_info[isec->id].u.list
12791 = htab->sec_info[isec->output_section->id].u.list;
12792 htab->sec_info[isec->output_section->id].u.list = isec;
12793 }
12794
12795 if (htab->multi_toc_needed)
12796 {
12797 /* Analyse sections that aren't already flagged as needing a
12798 valid toc pointer. Exclude .fixup for the linux kernel.
12799 .fixup contains branches, but only back to the function that
12800 hit an exception. */
12801 if (!(isec->has_toc_reloc
12802 || (isec->flags & SEC_CODE) == 0
12803 || strcmp (isec->name, ".fixup") == 0
12804 || isec->call_check_done))
12805 {
12806 if (toc_adjusting_stub_needed (info, isec) < 0)
12807 return FALSE;
12808 }
12809 /* Make all sections use the TOC assigned for this object file.
12810 This will be wrong for pasted sections; We fix that in
12811 check_pasted_section(). */
12812 if (elf_gp (isec->owner) != 0)
12813 htab->toc_curr = elf_gp (isec->owner);
12814 }
12815
12816 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12817 return TRUE;
12818 }
12819
12820 /* Check that all .init and .fini sections use the same toc, if they
12821 have toc relocs. */
12822
12823 static bfd_boolean
12824 check_pasted_section (struct bfd_link_info *info, const char *name)
12825 {
12826 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12827
12828 if (o != NULL)
12829 {
12830 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12831 bfd_vma toc_off = 0;
12832 asection *i;
12833
12834 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12835 if (i->has_toc_reloc)
12836 {
12837 if (toc_off == 0)
12838 toc_off = htab->sec_info[i->id].toc_off;
12839 else if (toc_off != htab->sec_info[i->id].toc_off)
12840 return FALSE;
12841 }
12842
12843 if (toc_off == 0)
12844 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12845 if (i->makes_toc_func_call)
12846 {
12847 toc_off = htab->sec_info[i->id].toc_off;
12848 break;
12849 }
12850
12851 /* Make sure the whole pasted function uses the same toc offset. */
12852 if (toc_off != 0)
12853 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12854 htab->sec_info[i->id].toc_off = toc_off;
12855 }
12856 return TRUE;
12857 }
12858
12859 bfd_boolean
12860 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12861 {
12862 return (check_pasted_section (info, ".init")
12863 & check_pasted_section (info, ".fini"));
12864 }
12865
12866 /* See whether we can group stub sections together. Grouping stub
12867 sections may result in fewer stubs. More importantly, we need to
12868 put all .init* and .fini* stubs at the beginning of the .init or
12869 .fini output sections respectively, because glibc splits the
12870 _init and _fini functions into multiple parts. Putting a stub in
12871 the middle of a function is not a good idea. */
12872
12873 static bfd_boolean
12874 group_sections (struct bfd_link_info *info,
12875 bfd_size_type stub_group_size,
12876 bfd_boolean stubs_always_before_branch)
12877 {
12878 struct ppc_link_hash_table *htab;
12879 asection *osec;
12880 bfd_boolean suppress_size_errors;
12881
12882 htab = ppc_hash_table (info);
12883 if (htab == NULL)
12884 return FALSE;
12885
12886 suppress_size_errors = FALSE;
12887 if (stub_group_size == 1)
12888 {
12889 /* Default values. */
12890 if (stubs_always_before_branch)
12891 stub_group_size = 0x1e00000;
12892 else
12893 stub_group_size = 0x1c00000;
12894 suppress_size_errors = TRUE;
12895 }
12896
12897 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12898 {
12899 asection *tail;
12900
12901 if (osec->id >= htab->sec_info_arr_size)
12902 continue;
12903
12904 tail = htab->sec_info[osec->id].u.list;
12905 while (tail != NULL)
12906 {
12907 asection *curr;
12908 asection *prev;
12909 bfd_size_type total;
12910 bfd_boolean big_sec;
12911 bfd_vma curr_toc;
12912 struct map_stub *group;
12913 bfd_size_type group_size;
12914
12915 curr = tail;
12916 total = tail->size;
12917 group_size = (ppc64_elf_section_data (tail) != NULL
12918 && ppc64_elf_section_data (tail)->has_14bit_branch
12919 ? stub_group_size >> 10 : stub_group_size);
12920
12921 big_sec = total > group_size;
12922 if (big_sec && !suppress_size_errors)
12923 /* xgettext:c-format */
12924 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12925 tail->owner, tail);
12926 curr_toc = htab->sec_info[tail->id].toc_off;
12927
12928 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12929 && ((total += curr->output_offset - prev->output_offset)
12930 < (ppc64_elf_section_data (prev) != NULL
12931 && ppc64_elf_section_data (prev)->has_14bit_branch
12932 ? (group_size = stub_group_size >> 10) : group_size))
12933 && htab->sec_info[prev->id].toc_off == curr_toc)
12934 curr = prev;
12935
12936 /* OK, the size from the start of CURR to the end is less
12937 than group_size and thus can be handled by one stub
12938 section. (or the tail section is itself larger than
12939 group_size, in which case we may be toast.) We should
12940 really be keeping track of the total size of stubs added
12941 here, as stubs contribute to the final output section
12942 size. That's a little tricky, and this way will only
12943 break if stubs added make the total size more than 2^25,
12944 ie. for the default stub_group_size, if stubs total more
12945 than 2097152 bytes, or nearly 75000 plt call stubs. */
12946 group = bfd_alloc (curr->owner, sizeof (*group));
12947 if (group == NULL)
12948 return FALSE;
12949 group->link_sec = curr;
12950 group->stub_sec = NULL;
12951 group->needs_save_res = 0;
12952 group->lr_restore = 0;
12953 group->eh_size = 0;
12954 group->eh_base = 0;
12955 group->next = htab->group;
12956 htab->group = group;
12957 do
12958 {
12959 prev = htab->sec_info[tail->id].u.list;
12960 /* Set up this stub group. */
12961 htab->sec_info[tail->id].u.group = group;
12962 }
12963 while (tail != curr && (tail = prev) != NULL);
12964
12965 /* But wait, there's more! Input sections up to group_size
12966 bytes before the stub section can be handled by it too.
12967 Don't do this if we have a really large section after the
12968 stubs, as adding more stubs increases the chance that
12969 branches may not reach into the stub section. */
12970 if (!stubs_always_before_branch && !big_sec)
12971 {
12972 total = 0;
12973 while (prev != NULL
12974 && ((total += tail->output_offset - prev->output_offset)
12975 < (ppc64_elf_section_data (prev) != NULL
12976 && ppc64_elf_section_data (prev)->has_14bit_branch
12977 ? (group_size = stub_group_size >> 10)
12978 : group_size))
12979 && htab->sec_info[prev->id].toc_off == curr_toc)
12980 {
12981 tail = prev;
12982 prev = htab->sec_info[tail->id].u.list;
12983 htab->sec_info[tail->id].u.group = group;
12984 }
12985 }
12986 tail = prev;
12987 }
12988 }
12989 return TRUE;
12990 }
12991
12992 static const unsigned char glink_eh_frame_cie[] =
12993 {
12994 0, 0, 0, 16, /* length. */
12995 0, 0, 0, 0, /* id. */
12996 1, /* CIE version. */
12997 'z', 'R', 0, /* Augmentation string. */
12998 4, /* Code alignment. */
12999 0x78, /* Data alignment. */
13000 65, /* RA reg. */
13001 1, /* Augmentation size. */
13002 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
13003 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
13004 };
13005
13006 /* Stripping output sections is normally done before dynamic section
13007 symbols have been allocated. This function is called later, and
13008 handles cases like htab->brlt which is mapped to its own output
13009 section. */
13010
13011 static void
13012 maybe_strip_output (struct bfd_link_info *info, asection *isec)
13013 {
13014 if (isec->size == 0
13015 && isec->output_section->size == 0
13016 && !(isec->output_section->flags & SEC_KEEP)
13017 && !bfd_section_removed_from_list (info->output_bfd,
13018 isec->output_section)
13019 && elf_section_data (isec->output_section)->dynindx == 0)
13020 {
13021 isec->output_section->flags |= SEC_EXCLUDE;
13022 bfd_section_list_remove (info->output_bfd, isec->output_section);
13023 info->output_bfd->section_count--;
13024 }
13025 }
13026
13027 /* Determine and set the size of the stub section for a final link.
13028
13029 The basic idea here is to examine all the relocations looking for
13030 PC-relative calls to a target that is unreachable with a "bl"
13031 instruction. */
13032
13033 bfd_boolean
13034 ppc64_elf_size_stubs (struct bfd_link_info *info)
13035 {
13036 bfd_size_type stub_group_size;
13037 bfd_boolean stubs_always_before_branch;
13038 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13039
13040 if (htab == NULL)
13041 return FALSE;
13042
13043 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
13044 htab->params->plt_thread_safe = 1;
13045 if (!htab->opd_abi)
13046 htab->params->plt_thread_safe = 0;
13047 else if (htab->params->plt_thread_safe == -1)
13048 {
13049 static const char *const thread_starter[] =
13050 {
13051 "pthread_create",
13052 /* libstdc++ */
13053 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13054 /* librt */
13055 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13056 "mq_notify", "create_timer",
13057 /* libanl */
13058 "getaddrinfo_a",
13059 /* libgomp */
13060 "GOMP_parallel",
13061 "GOMP_parallel_start",
13062 "GOMP_parallel_loop_static",
13063 "GOMP_parallel_loop_static_start",
13064 "GOMP_parallel_loop_dynamic",
13065 "GOMP_parallel_loop_dynamic_start",
13066 "GOMP_parallel_loop_guided",
13067 "GOMP_parallel_loop_guided_start",
13068 "GOMP_parallel_loop_runtime",
13069 "GOMP_parallel_loop_runtime_start",
13070 "GOMP_parallel_sections",
13071 "GOMP_parallel_sections_start",
13072 /* libgo */
13073 "__go_go",
13074 };
13075 unsigned i;
13076
13077 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
13078 {
13079 struct elf_link_hash_entry *h;
13080 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13081 FALSE, FALSE, TRUE);
13082 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13083 if (htab->params->plt_thread_safe)
13084 break;
13085 }
13086 }
13087 stubs_always_before_branch = htab->params->group_size < 0;
13088 if (htab->params->group_size < 0)
13089 stub_group_size = -htab->params->group_size;
13090 else
13091 stub_group_size = htab->params->group_size;
13092
13093 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13094 return FALSE;
13095
13096 htab->tga_group = NULL;
13097 if (!htab->params->no_tls_get_addr_regsave
13098 && htab->tga_desc_fd != NULL
13099 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13100 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13101 && htab->tls_get_addr_fd != NULL
13102 && is_static_defined (&htab->tls_get_addr_fd->elf))
13103 {
13104 asection *sym_sec, *code_sec, *stub_sec;
13105 bfd_vma sym_value;
13106 struct _opd_sec_data *opd;
13107
13108 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13109 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13110 code_sec = sym_sec;
13111 opd = get_opd_info (sym_sec);
13112 if (opd != NULL)
13113 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13114 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13115 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13116 htab->tga_group->link_sec);
13117 if (stub_sec == NULL)
13118 return FALSE;
13119 htab->tga_group->stub_sec = stub_sec;
13120
13121 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13122 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13123 htab->tga_desc_fd->elf.root.u.def.value = 0;
13124 htab->tga_desc_fd->elf.type = STT_FUNC;
13125 htab->tga_desc_fd->elf.def_regular = 1;
13126 htab->tga_desc_fd->elf.non_elf = 0;
13127 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13128 }
13129
13130 #define STUB_SHRINK_ITER 20
13131 /* Loop until no stubs added. After iteration 20 of this loop we may
13132 exit on a stub section shrinking. This is to break out of a
13133 pathological case where adding stubs on one iteration decreases
13134 section gaps (perhaps due to alignment), which then requires
13135 fewer or smaller stubs on the next iteration. */
13136
13137 while (1)
13138 {
13139 bfd *input_bfd;
13140 unsigned int bfd_indx;
13141 struct map_stub *group;
13142
13143 htab->stub_iteration += 1;
13144
13145 for (input_bfd = info->input_bfds, bfd_indx = 0;
13146 input_bfd != NULL;
13147 input_bfd = input_bfd->link.next, bfd_indx++)
13148 {
13149 Elf_Internal_Shdr *symtab_hdr;
13150 asection *section;
13151 Elf_Internal_Sym *local_syms = NULL;
13152
13153 if (!is_ppc64_elf (input_bfd))
13154 continue;
13155
13156 /* We'll need the symbol table in a second. */
13157 symtab_hdr = &elf_symtab_hdr (input_bfd);
13158 if (symtab_hdr->sh_info == 0)
13159 continue;
13160
13161 /* Walk over each section attached to the input bfd. */
13162 for (section = input_bfd->sections;
13163 section != NULL;
13164 section = section->next)
13165 {
13166 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
13167
13168 /* If there aren't any relocs, then there's nothing more
13169 to do. */
13170 if ((section->flags & SEC_RELOC) == 0
13171 || (section->flags & SEC_ALLOC) == 0
13172 || (section->flags & SEC_LOAD) == 0
13173 || (section->flags & SEC_CODE) == 0
13174 || section->reloc_count == 0)
13175 continue;
13176
13177 /* If this section is a link-once section that will be
13178 discarded, then don't create any stubs. */
13179 if (section->output_section == NULL
13180 || section->output_section->owner != info->output_bfd)
13181 continue;
13182
13183 /* Get the relocs. */
13184 internal_relocs
13185 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
13186 info->keep_memory);
13187 if (internal_relocs == NULL)
13188 goto error_ret_free_local;
13189
13190 /* Now examine each relocation. */
13191 irela = internal_relocs;
13192 irelaend = irela + section->reloc_count;
13193 for (; irela < irelaend; irela++)
13194 {
13195 enum elf_ppc64_reloc_type r_type;
13196 unsigned int r_indx;
13197 enum ppc_stub_type stub_type;
13198 struct ppc_stub_hash_entry *stub_entry;
13199 asection *sym_sec, *code_sec;
13200 bfd_vma sym_value, code_value;
13201 bfd_vma destination;
13202 unsigned long local_off;
13203 bfd_boolean ok_dest;
13204 struct ppc_link_hash_entry *hash;
13205 struct ppc_link_hash_entry *fdh;
13206 struct elf_link_hash_entry *h;
13207 Elf_Internal_Sym *sym;
13208 char *stub_name;
13209 const asection *id_sec;
13210 struct _opd_sec_data *opd;
13211 struct plt_entry *plt_ent;
13212
13213 r_type = ELF64_R_TYPE (irela->r_info);
13214 r_indx = ELF64_R_SYM (irela->r_info);
13215
13216 if (r_type >= R_PPC64_max)
13217 {
13218 bfd_set_error (bfd_error_bad_value);
13219 goto error_ret_free_internal;
13220 }
13221
13222 /* Only look for stubs on branch instructions. */
13223 if (r_type != R_PPC64_REL24
13224 && r_type != R_PPC64_REL24_NOTOC
13225 && r_type != R_PPC64_REL14
13226 && r_type != R_PPC64_REL14_BRTAKEN
13227 && r_type != R_PPC64_REL14_BRNTAKEN)
13228 continue;
13229
13230 /* Now determine the call target, its name, value,
13231 section. */
13232 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13233 r_indx, input_bfd))
13234 goto error_ret_free_internal;
13235 hash = ppc_elf_hash_entry (h);
13236
13237 ok_dest = FALSE;
13238 fdh = NULL;
13239 sym_value = 0;
13240 if (hash == NULL)
13241 {
13242 sym_value = sym->st_value;
13243 if (sym_sec != NULL
13244 && sym_sec->output_section != NULL)
13245 ok_dest = TRUE;
13246 }
13247 else if (hash->elf.root.type == bfd_link_hash_defined
13248 || hash->elf.root.type == bfd_link_hash_defweak)
13249 {
13250 sym_value = hash->elf.root.u.def.value;
13251 if (sym_sec->output_section != NULL)
13252 ok_dest = TRUE;
13253 }
13254 else if (hash->elf.root.type == bfd_link_hash_undefweak
13255 || hash->elf.root.type == bfd_link_hash_undefined)
13256 {
13257 /* Recognise an old ABI func code entry sym, and
13258 use the func descriptor sym instead if it is
13259 defined. */
13260 if (hash->elf.root.root.string[0] == '.'
13261 && hash->oh != NULL)
13262 {
13263 fdh = ppc_follow_link (hash->oh);
13264 if (fdh->elf.root.type == bfd_link_hash_defined
13265 || fdh->elf.root.type == bfd_link_hash_defweak)
13266 {
13267 sym_sec = fdh->elf.root.u.def.section;
13268 sym_value = fdh->elf.root.u.def.value;
13269 if (sym_sec->output_section != NULL)
13270 ok_dest = TRUE;
13271 }
13272 else
13273 fdh = NULL;
13274 }
13275 }
13276 else
13277 {
13278 bfd_set_error (bfd_error_bad_value);
13279 goto error_ret_free_internal;
13280 }
13281
13282 destination = 0;
13283 local_off = 0;
13284 if (ok_dest)
13285 {
13286 sym_value += irela->r_addend;
13287 destination = (sym_value
13288 + sym_sec->output_offset
13289 + sym_sec->output_section->vma);
13290 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13291 ? hash->elf.other
13292 : sym->st_other);
13293 }
13294
13295 code_sec = sym_sec;
13296 code_value = sym_value;
13297 opd = get_opd_info (sym_sec);
13298 if (opd != NULL)
13299 {
13300 bfd_vma dest;
13301
13302 if (hash == NULL && opd->adjust != NULL)
13303 {
13304 long adjust = opd->adjust[OPD_NDX (sym_value)];
13305 if (adjust == -1)
13306 continue;
13307 code_value += adjust;
13308 sym_value += adjust;
13309 }
13310 dest = opd_entry_value (sym_sec, sym_value,
13311 &code_sec, &code_value, FALSE);
13312 if (dest != (bfd_vma) -1)
13313 {
13314 destination = dest;
13315 if (fdh != NULL)
13316 {
13317 /* Fixup old ABI sym to point at code
13318 entry. */
13319 hash->elf.root.type = bfd_link_hash_defweak;
13320 hash->elf.root.u.def.section = code_sec;
13321 hash->elf.root.u.def.value = code_value;
13322 }
13323 }
13324 }
13325
13326 /* Determine what (if any) linker stub is needed. */
13327 plt_ent = NULL;
13328 stub_type = ppc_type_of_stub (section, irela, &hash,
13329 &plt_ent, destination,
13330 local_off);
13331
13332 if (r_type == R_PPC64_REL24_NOTOC)
13333 {
13334 if (stub_type == ppc_stub_plt_call)
13335 stub_type = ppc_stub_plt_call_notoc;
13336 else if (stub_type == ppc_stub_long_branch
13337 || (code_sec != NULL
13338 && code_sec->output_section != NULL
13339 && (((hash ? hash->elf.other : sym->st_other)
13340 & STO_PPC64_LOCAL_MASK)
13341 > 1 << STO_PPC64_LOCAL_BIT)))
13342 stub_type = ppc_stub_long_branch_notoc;
13343 }
13344 else if (stub_type != ppc_stub_plt_call)
13345 {
13346 /* Check whether we need a TOC adjusting stub.
13347 Since the linker pastes together pieces from
13348 different object files when creating the
13349 _init and _fini functions, it may be that a
13350 call to what looks like a local sym is in
13351 fact a call needing a TOC adjustment. */
13352 if ((code_sec != NULL
13353 && code_sec->output_section != NULL
13354 && (htab->sec_info[code_sec->id].toc_off
13355 != htab->sec_info[section->id].toc_off)
13356 && (code_sec->has_toc_reloc
13357 || code_sec->makes_toc_func_call))
13358 || (((hash ? hash->elf.other : sym->st_other)
13359 & STO_PPC64_LOCAL_MASK)
13360 == 1 << STO_PPC64_LOCAL_BIT))
13361 stub_type = ppc_stub_long_branch_r2off;
13362 }
13363
13364 if (stub_type == ppc_stub_none)
13365 continue;
13366
13367 /* __tls_get_addr calls might be eliminated. */
13368 if (stub_type != ppc_stub_plt_call
13369 && stub_type != ppc_stub_plt_call_notoc
13370 && hash != NULL
13371 && is_tls_get_addr (&hash->elf, htab)
13372 && section->has_tls_reloc
13373 && irela != internal_relocs)
13374 {
13375 /* Get tls info. */
13376 unsigned char *tls_mask;
13377
13378 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13379 irela - 1, input_bfd))
13380 goto error_ret_free_internal;
13381 if ((*tls_mask & TLS_TLS) != 0
13382 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
13383 continue;
13384 }
13385
13386 if (stub_type == ppc_stub_plt_call)
13387 {
13388 if (!htab->opd_abi
13389 && htab->params->plt_localentry0 != 0
13390 && is_elfv2_localentry0 (&hash->elf))
13391 htab->has_plt_localentry0 = 1;
13392 else if (irela + 1 < irelaend
13393 && irela[1].r_offset == irela->r_offset + 4
13394 && (ELF64_R_TYPE (irela[1].r_info)
13395 == R_PPC64_TOCSAVE))
13396 {
13397 if (!tocsave_find (htab, INSERT,
13398 &local_syms, irela + 1, input_bfd))
13399 goto error_ret_free_internal;
13400 }
13401 else
13402 stub_type = ppc_stub_plt_call_r2save;
13403 }
13404
13405 /* Support for grouping stub sections. */
13406 id_sec = htab->sec_info[section->id].u.group->link_sec;
13407
13408 /* Get the name of this stub. */
13409 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13410 if (!stub_name)
13411 goto error_ret_free_internal;
13412
13413 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13414 stub_name, FALSE, FALSE);
13415 if (stub_entry != NULL)
13416 {
13417 enum ppc_stub_type old_type;
13418 /* A stub has already been created, but it may
13419 not be the required type. We shouldn't be
13420 transitioning from plt_call to long_branch
13421 stubs or vice versa, but we might be
13422 upgrading from plt_call to plt_call_r2save or
13423 from long_branch to long_branch_r2off. */
13424 free (stub_name);
13425 old_type = stub_entry->stub_type;
13426 switch (old_type)
13427 {
13428 default:
13429 abort ();
13430
13431 case ppc_stub_save_res:
13432 continue;
13433
13434 case ppc_stub_plt_call:
13435 case ppc_stub_plt_call_r2save:
13436 case ppc_stub_plt_call_notoc:
13437 case ppc_stub_plt_call_both:
13438 if (stub_type == ppc_stub_plt_call)
13439 continue;
13440 else if (stub_type == ppc_stub_plt_call_r2save)
13441 {
13442 if (old_type == ppc_stub_plt_call_notoc)
13443 stub_type = ppc_stub_plt_call_both;
13444 }
13445 else if (stub_type == ppc_stub_plt_call_notoc)
13446 {
13447 if (old_type == ppc_stub_plt_call_r2save)
13448 stub_type = ppc_stub_plt_call_both;
13449 }
13450 else
13451 abort ();
13452 break;
13453
13454 case ppc_stub_plt_branch:
13455 case ppc_stub_plt_branch_r2off:
13456 case ppc_stub_plt_branch_notoc:
13457 case ppc_stub_plt_branch_both:
13458 old_type += (ppc_stub_long_branch
13459 - ppc_stub_plt_branch);
13460 /* Fall through. */
13461 case ppc_stub_long_branch:
13462 case ppc_stub_long_branch_r2off:
13463 case ppc_stub_long_branch_notoc:
13464 case ppc_stub_long_branch_both:
13465 if (stub_type == ppc_stub_long_branch)
13466 continue;
13467 else if (stub_type == ppc_stub_long_branch_r2off)
13468 {
13469 if (old_type == ppc_stub_long_branch_notoc)
13470 stub_type = ppc_stub_long_branch_both;
13471 }
13472 else if (stub_type == ppc_stub_long_branch_notoc)
13473 {
13474 if (old_type == ppc_stub_long_branch_r2off)
13475 stub_type = ppc_stub_long_branch_both;
13476 }
13477 else
13478 abort ();
13479 break;
13480 }
13481 if (old_type < stub_type)
13482 stub_entry->stub_type = stub_type;
13483 continue;
13484 }
13485
13486 stub_entry = ppc_add_stub (stub_name, section, info);
13487 if (stub_entry == NULL)
13488 {
13489 free (stub_name);
13490 error_ret_free_internal:
13491 if (elf_section_data (section)->relocs == NULL)
13492 free (internal_relocs);
13493 error_ret_free_local:
13494 if (symtab_hdr->contents
13495 != (unsigned char *) local_syms)
13496 free (local_syms);
13497 return FALSE;
13498 }
13499
13500 stub_entry->stub_type = stub_type;
13501 if (stub_type >= ppc_stub_plt_call
13502 && stub_type <= ppc_stub_plt_call_both)
13503 {
13504 stub_entry->target_value = sym_value;
13505 stub_entry->target_section = sym_sec;
13506 }
13507 else
13508 {
13509 stub_entry->target_value = code_value;
13510 stub_entry->target_section = code_sec;
13511 }
13512 stub_entry->h = hash;
13513 stub_entry->plt_ent = plt_ent;
13514 stub_entry->symtype
13515 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13516 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13517
13518 if (hash != NULL
13519 && (hash->elf.root.type == bfd_link_hash_defined
13520 || hash->elf.root.type == bfd_link_hash_defweak))
13521 htab->stub_globals += 1;
13522 }
13523
13524 /* We're done with the internal relocs, free them. */
13525 if (elf_section_data (section)->relocs != internal_relocs)
13526 free (internal_relocs);
13527 }
13528
13529 if (local_syms != NULL
13530 && symtab_hdr->contents != (unsigned char *) local_syms)
13531 {
13532 if (!info->keep_memory)
13533 free (local_syms);
13534 else
13535 symtab_hdr->contents = (unsigned char *) local_syms;
13536 }
13537 }
13538
13539 /* We may have added some stubs. Find out the new size of the
13540 stub sections. */
13541 for (group = htab->group; group != NULL; group = group->next)
13542 {
13543 group->lr_restore = 0;
13544 group->eh_size = 0;
13545 if (group->stub_sec != NULL)
13546 {
13547 asection *stub_sec = group->stub_sec;
13548
13549 if (htab->stub_iteration <= STUB_SHRINK_ITER
13550 || stub_sec->rawsize < stub_sec->size)
13551 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13552 stub_sec->rawsize = stub_sec->size;
13553 stub_sec->size = 0;
13554 stub_sec->reloc_count = 0;
13555 stub_sec->flags &= ~SEC_RELOC;
13556 }
13557 }
13558 if (htab->tga_group != NULL)
13559 {
13560 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13561 htab->tga_group->eh_size
13562 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13563 htab->tga_group->lr_restore = 23 * 4;
13564 htab->tga_group->stub_sec->size = 24 * 4;
13565 }
13566
13567 if (htab->stub_iteration <= STUB_SHRINK_ITER
13568 || htab->brlt->rawsize < htab->brlt->size)
13569 htab->brlt->rawsize = htab->brlt->size;
13570 htab->brlt->size = 0;
13571 htab->brlt->reloc_count = 0;
13572 htab->brlt->flags &= ~SEC_RELOC;
13573 if (htab->relbrlt != NULL)
13574 htab->relbrlt->size = 0;
13575
13576 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13577
13578 for (group = htab->group; group != NULL; group = group->next)
13579 if (group->needs_save_res)
13580 group->stub_sec->size += htab->sfpr->size;
13581
13582 if (info->emitrelocations
13583 && htab->glink != NULL && htab->glink->size != 0)
13584 {
13585 htab->glink->reloc_count = 1;
13586 htab->glink->flags |= SEC_RELOC;
13587 }
13588
13589 if (htab->glink_eh_frame != NULL
13590 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13591 && htab->glink_eh_frame->output_section->size > 8)
13592 {
13593 size_t size = 0, align = 4;
13594
13595 for (group = htab->group; group != NULL; group = group->next)
13596 if (group->eh_size != 0)
13597 size += (group->eh_size + 17 + align - 1) & -align;
13598 if (htab->glink != NULL && htab->glink->size != 0)
13599 size += (24 + align - 1) & -align;
13600 if (size != 0)
13601 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13602 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13603 size = (size + align - 1) & -align;
13604 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13605 htab->glink_eh_frame->size = size;
13606 }
13607
13608 if (htab->params->plt_stub_align != 0)
13609 for (group = htab->group; group != NULL; group = group->next)
13610 if (group->stub_sec != NULL)
13611 {
13612 int align = abs (htab->params->plt_stub_align);
13613 group->stub_sec->size
13614 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13615 }
13616
13617 for (group = htab->group; group != NULL; group = group->next)
13618 if (group->stub_sec != NULL
13619 && group->stub_sec->rawsize != group->stub_sec->size
13620 && (htab->stub_iteration <= STUB_SHRINK_ITER
13621 || group->stub_sec->rawsize < group->stub_sec->size))
13622 break;
13623
13624 if (group == NULL
13625 && (htab->brlt->rawsize == htab->brlt->size
13626 || (htab->stub_iteration > STUB_SHRINK_ITER
13627 && htab->brlt->rawsize > htab->brlt->size))
13628 && (htab->glink_eh_frame == NULL
13629 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13630 && (htab->tga_group == NULL
13631 || htab->stub_iteration > 1))
13632 break;
13633
13634 /* Ask the linker to do its stuff. */
13635 (*htab->params->layout_sections_again) ();
13636 }
13637
13638 if (htab->glink_eh_frame != NULL
13639 && htab->glink_eh_frame->size != 0)
13640 {
13641 bfd_vma val;
13642 bfd_byte *p, *last_fde;
13643 size_t last_fde_len, size, align, pad;
13644 struct map_stub *group;
13645
13646 /* It is necessary to at least have a rough outline of the
13647 linker generated CIEs and FDEs written before
13648 bfd_elf_discard_info is run, in order for these FDEs to be
13649 indexed in .eh_frame_hdr. */
13650 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13651 if (p == NULL)
13652 return FALSE;
13653 htab->glink_eh_frame->contents = p;
13654 last_fde = p;
13655 align = 4;
13656
13657 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13658 /* CIE length (rewrite in case little-endian). */
13659 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13660 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13661 p += last_fde_len + 4;
13662
13663 for (group = htab->group; group != NULL; group = group->next)
13664 if (group->eh_size != 0)
13665 {
13666 group->eh_base = p - htab->glink_eh_frame->contents;
13667 last_fde = p;
13668 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13669 /* FDE length. */
13670 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13671 p += 4;
13672 /* CIE pointer. */
13673 val = p - htab->glink_eh_frame->contents;
13674 bfd_put_32 (htab->elf.dynobj, val, p);
13675 p += 4;
13676 /* Offset to stub section, written later. */
13677 p += 4;
13678 /* stub section size. */
13679 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13680 p += 4;
13681 /* Augmentation. */
13682 p += 1;
13683 /* Make sure we don't have all nops. This is enough for
13684 elf-eh-frame.c to detect the last non-nop opcode. */
13685 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13686 p = last_fde + last_fde_len + 4;
13687 }
13688 if (htab->glink != NULL && htab->glink->size != 0)
13689 {
13690 last_fde = p;
13691 last_fde_len = ((24 + align - 1) & -align) - 4;
13692 /* FDE length. */
13693 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13694 p += 4;
13695 /* CIE pointer. */
13696 val = p - htab->glink_eh_frame->contents;
13697 bfd_put_32 (htab->elf.dynobj, val, p);
13698 p += 4;
13699 /* Offset to .glink, written later. */
13700 p += 4;
13701 /* .glink size. */
13702 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13703 p += 4;
13704 /* Augmentation. */
13705 p += 1;
13706
13707 *p++ = DW_CFA_advance_loc + 1;
13708 *p++ = DW_CFA_register;
13709 *p++ = 65;
13710 *p++ = htab->opd_abi ? 12 : 0;
13711 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13712 *p++ = DW_CFA_restore_extended;
13713 *p++ = 65;
13714 p += ((24 + align - 1) & -align) - 24;
13715 }
13716 /* Subsume any padding into the last FDE if user .eh_frame
13717 sections are aligned more than glink_eh_frame. Otherwise any
13718 zero padding will be seen as a terminator. */
13719 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13720 size = p - htab->glink_eh_frame->contents;
13721 pad = ((size + align - 1) & -align) - size;
13722 htab->glink_eh_frame->size = size + pad;
13723 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13724 }
13725
13726 maybe_strip_output (info, htab->brlt);
13727 if (htab->relbrlt != NULL)
13728 maybe_strip_output (info, htab->relbrlt);
13729 if (htab->glink_eh_frame != NULL)
13730 maybe_strip_output (info, htab->glink_eh_frame);
13731
13732 return TRUE;
13733 }
13734
13735 /* Called after we have determined section placement. If sections
13736 move, we'll be called again. Provide a value for TOCstart. */
13737
13738 bfd_vma
13739 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13740 {
13741 asection *s;
13742 bfd_vma TOCstart, adjust;
13743
13744 if (info != NULL)
13745 {
13746 struct elf_link_hash_entry *h;
13747 struct elf_link_hash_table *htab = elf_hash_table (info);
13748
13749 if (is_elf_hash_table (htab)
13750 && htab->hgot != NULL)
13751 h = htab->hgot;
13752 else
13753 {
13754 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13755 if (is_elf_hash_table (htab))
13756 htab->hgot = h;
13757 }
13758 if (h != NULL
13759 && h->root.type == bfd_link_hash_defined
13760 && !h->root.linker_def
13761 && (!is_elf_hash_table (htab)
13762 || h->def_regular))
13763 {
13764 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
13765 _bfd_set_gp_value (obfd, TOCstart);
13766 return TOCstart;
13767 }
13768 }
13769
13770 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13771 order. The TOC starts where the first of these sections starts. */
13772 s = bfd_get_section_by_name (obfd, ".got");
13773 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13774 s = bfd_get_section_by_name (obfd, ".toc");
13775 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13776 s = bfd_get_section_by_name (obfd, ".tocbss");
13777 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13778 s = bfd_get_section_by_name (obfd, ".plt");
13779 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13780 {
13781 /* This may happen for
13782 o references to TOC base (SYM@toc / TOC[tc0]) without a
13783 .toc directive
13784 o bad linker script
13785 o --gc-sections and empty TOC sections
13786
13787 FIXME: Warn user? */
13788
13789 /* Look for a likely section. We probably won't even be
13790 using TOCstart. */
13791 for (s = obfd->sections; s != NULL; s = s->next)
13792 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13793 | SEC_EXCLUDE))
13794 == (SEC_ALLOC | SEC_SMALL_DATA))
13795 break;
13796 if (s == NULL)
13797 for (s = obfd->sections; s != NULL; s = s->next)
13798 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13799 == (SEC_ALLOC | SEC_SMALL_DATA))
13800 break;
13801 if (s == NULL)
13802 for (s = obfd->sections; s != NULL; s = s->next)
13803 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13804 == SEC_ALLOC)
13805 break;
13806 if (s == NULL)
13807 for (s = obfd->sections; s != NULL; s = s->next)
13808 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13809 break;
13810 }
13811
13812 TOCstart = 0;
13813 if (s != NULL)
13814 TOCstart = s->output_section->vma + s->output_offset;
13815
13816 /* Force alignment. */
13817 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13818 TOCstart -= adjust;
13819 _bfd_set_gp_value (obfd, TOCstart);
13820
13821 if (info != NULL && s != NULL)
13822 {
13823 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13824
13825 if (htab != NULL)
13826 {
13827 if (htab->elf.hgot != NULL)
13828 {
13829 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13830 htab->elf.hgot->root.u.def.section = s;
13831 }
13832 }
13833 else
13834 {
13835 struct bfd_link_hash_entry *bh = NULL;
13836 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13837 s, TOC_BASE_OFF - adjust,
13838 NULL, FALSE, FALSE, &bh);
13839 }
13840 }
13841 return TOCstart;
13842 }
13843
13844 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13845 write out any global entry stubs, and PLT relocations. */
13846
13847 static bfd_boolean
13848 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13849 {
13850 struct bfd_link_info *info;
13851 struct ppc_link_hash_table *htab;
13852 struct plt_entry *ent;
13853 asection *s;
13854
13855 if (h->root.type == bfd_link_hash_indirect)
13856 return TRUE;
13857
13858 info = inf;
13859 htab = ppc_hash_table (info);
13860 if (htab == NULL)
13861 return FALSE;
13862
13863 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13864 if (ent->plt.offset != (bfd_vma) -1)
13865 {
13866 /* This symbol has an entry in the procedure linkage
13867 table. Set it up. */
13868 Elf_Internal_Rela rela;
13869 asection *plt, *relplt;
13870 bfd_byte *loc;
13871
13872 if (!htab->elf.dynamic_sections_created
13873 || h->dynindx == -1)
13874 {
13875 if (!(h->def_regular
13876 && (h->root.type == bfd_link_hash_defined
13877 || h->root.type == bfd_link_hash_defweak)))
13878 continue;
13879 if (h->type == STT_GNU_IFUNC)
13880 {
13881 plt = htab->elf.iplt;
13882 relplt = htab->elf.irelplt;
13883 htab->local_ifunc_resolver = 1;
13884 if (htab->opd_abi)
13885 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13886 else
13887 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13888 }
13889 else
13890 {
13891 plt = htab->pltlocal;
13892 if (bfd_link_pic (info))
13893 {
13894 relplt = htab->relpltlocal;
13895 if (htab->opd_abi)
13896 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13897 else
13898 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13899 }
13900 else
13901 relplt = NULL;
13902 }
13903 rela.r_addend = defined_sym_val (h) + ent->addend;
13904
13905 if (relplt == NULL)
13906 {
13907 loc = plt->contents + ent->plt.offset;
13908 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13909 if (htab->opd_abi)
13910 {
13911 bfd_vma toc = elf_gp (info->output_bfd);
13912 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13913 bfd_put_64 (info->output_bfd, toc, loc + 8);
13914 }
13915 }
13916 else
13917 {
13918 rela.r_offset = (plt->output_section->vma
13919 + plt->output_offset
13920 + ent->plt.offset);
13921 loc = relplt->contents + (relplt->reloc_count++
13922 * sizeof (Elf64_External_Rela));
13923 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13924 }
13925 }
13926 else
13927 {
13928 rela.r_offset = (htab->elf.splt->output_section->vma
13929 + htab->elf.splt->output_offset
13930 + ent->plt.offset);
13931 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13932 rela.r_addend = ent->addend;
13933 loc = (htab->elf.srelplt->contents
13934 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13935 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13936 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13937 htab->local_ifunc_resolver = 1;
13938 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13939 }
13940 }
13941
13942 if (!h->pointer_equality_needed)
13943 return TRUE;
13944
13945 if (h->def_regular)
13946 return TRUE;
13947
13948 s = htab->global_entry;
13949 if (s == NULL || s->size == 0)
13950 return TRUE;
13951
13952 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13953 if (ent->plt.offset != (bfd_vma) -1
13954 && ent->addend == 0)
13955 {
13956 bfd_byte *p;
13957 asection *plt;
13958 bfd_vma off;
13959
13960 p = s->contents + h->root.u.def.value;
13961 plt = htab->elf.splt;
13962 if (!htab->elf.dynamic_sections_created
13963 || h->dynindx == -1)
13964 {
13965 if (h->type == STT_GNU_IFUNC)
13966 plt = htab->elf.iplt;
13967 else
13968 plt = htab->pltlocal;
13969 }
13970 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13971 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13972
13973 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13974 {
13975 info->callbacks->einfo
13976 (_("%P: linkage table error against `%pT'\n"),
13977 h->root.root.string);
13978 bfd_set_error (bfd_error_bad_value);
13979 htab->stub_error = TRUE;
13980 }
13981
13982 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13983 if (htab->params->emit_stub_syms)
13984 {
13985 size_t len = strlen (h->root.root.string);
13986 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13987
13988 if (name == NULL)
13989 return FALSE;
13990
13991 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13992 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13993 if (h == NULL)
13994 return FALSE;
13995 if (h->root.type == bfd_link_hash_new)
13996 {
13997 h->root.type = bfd_link_hash_defined;
13998 h->root.u.def.section = s;
13999 h->root.u.def.value = p - s->contents;
14000 h->ref_regular = 1;
14001 h->def_regular = 1;
14002 h->ref_regular_nonweak = 1;
14003 h->forced_local = 1;
14004 h->non_elf = 0;
14005 h->root.linker_def = 1;
14006 }
14007 }
14008
14009 if (PPC_HA (off) != 0)
14010 {
14011 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14012 p += 4;
14013 }
14014 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14015 p += 4;
14016 bfd_put_32 (s->owner, MTCTR_R12, p);
14017 p += 4;
14018 bfd_put_32 (s->owner, BCTR, p);
14019 break;
14020 }
14021 return TRUE;
14022 }
14023
14024 /* Write PLT relocs for locals. */
14025
14026 static bfd_boolean
14027 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14028 {
14029 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14030 bfd *ibfd;
14031
14032 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14033 {
14034 struct got_entry **lgot_ents, **end_lgot_ents;
14035 struct plt_entry **local_plt, **lplt, **end_local_plt;
14036 Elf_Internal_Shdr *symtab_hdr;
14037 bfd_size_type locsymcount;
14038 Elf_Internal_Sym *local_syms = NULL;
14039 struct plt_entry *ent;
14040
14041 if (!is_ppc64_elf (ibfd))
14042 continue;
14043
14044 lgot_ents = elf_local_got_ents (ibfd);
14045 if (!lgot_ents)
14046 continue;
14047
14048 symtab_hdr = &elf_symtab_hdr (ibfd);
14049 locsymcount = symtab_hdr->sh_info;
14050 end_lgot_ents = lgot_ents + locsymcount;
14051 local_plt = (struct plt_entry **) end_lgot_ents;
14052 end_local_plt = local_plt + locsymcount;
14053 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14054 for (ent = *lplt; ent != NULL; ent = ent->next)
14055 if (ent->plt.offset != (bfd_vma) -1)
14056 {
14057 Elf_Internal_Sym *sym;
14058 asection *sym_sec;
14059 asection *plt, *relplt;
14060 bfd_byte *loc;
14061 bfd_vma val;
14062
14063 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14064 lplt - local_plt, ibfd))
14065 {
14066 if (symtab_hdr->contents != (unsigned char *) local_syms)
14067 free (local_syms);
14068 return FALSE;
14069 }
14070
14071 val = sym->st_value + ent->addend;
14072 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14073 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
14074 if (sym_sec != NULL && sym_sec->output_section != NULL)
14075 val += sym_sec->output_offset + sym_sec->output_section->vma;
14076
14077 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14078 {
14079 htab->local_ifunc_resolver = 1;
14080 plt = htab->elf.iplt;
14081 relplt = htab->elf.irelplt;
14082 }
14083 else
14084 {
14085 plt = htab->pltlocal;
14086 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14087 }
14088
14089 if (relplt == NULL)
14090 {
14091 loc = plt->contents + ent->plt.offset;
14092 bfd_put_64 (info->output_bfd, val, loc);
14093 if (htab->opd_abi)
14094 {
14095 bfd_vma toc = elf_gp (ibfd);
14096 bfd_put_64 (info->output_bfd, toc, loc + 8);
14097 }
14098 }
14099 else
14100 {
14101 Elf_Internal_Rela rela;
14102 rela.r_offset = (ent->plt.offset
14103 + plt->output_offset
14104 + plt->output_section->vma);
14105 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14106 {
14107 if (htab->opd_abi)
14108 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14109 else
14110 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14111 }
14112 else
14113 {
14114 if (htab->opd_abi)
14115 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14116 else
14117 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14118 }
14119 rela.r_addend = val;
14120 loc = relplt->contents + (relplt->reloc_count++
14121 * sizeof (Elf64_External_Rela));
14122 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14123 }
14124 }
14125
14126 if (local_syms != NULL
14127 && symtab_hdr->contents != (unsigned char *) local_syms)
14128 {
14129 if (!info->keep_memory)
14130 free (local_syms);
14131 else
14132 symtab_hdr->contents = (unsigned char *) local_syms;
14133 }
14134 }
14135 return TRUE;
14136 }
14137
14138 /* Emit the static wrapper function preserving registers around a
14139 __tls_get_addr_opt call. */
14140
14141 static bfd_boolean
14142 emit_tga_desc (struct ppc_link_hash_table *htab)
14143 {
14144 asection *stub_sec = htab->tga_group->stub_sec;
14145 unsigned int cfa_updt = 11 * 4;
14146 bfd_byte *p;
14147 bfd_vma to, from, delta;
14148
14149 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14150 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14151 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14152 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14153 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14154 delta = to - from;
14155 if (delta + (1 << 25) >= 1 << 26)
14156 {
14157 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14158 htab->stub_error = TRUE;
14159 return FALSE;
14160 }
14161
14162 p = stub_sec->contents;
14163 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14164 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14165 p += 4;
14166 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14167 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14168 }
14169
14170 /* Emit eh_frame describing the static wrapper function. */
14171
14172 static bfd_byte *
14173 emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14174 {
14175 unsigned int cfa_updt = 11 * 4;
14176 unsigned int i;
14177
14178 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14179 *p++ = DW_CFA_def_cfa_offset;
14180 if (htab->opd_abi)
14181 {
14182 *p++ = 128;
14183 *p++ = 1;
14184 }
14185 else
14186 *p++ = 96;
14187 *p++ = DW_CFA_offset_extended_sf;
14188 *p++ = 65;
14189 *p++ = (-16 / 8) & 0x7f;
14190 for (i = 4; i < 12; i++)
14191 {
14192 *p++ = DW_CFA_offset + i;
14193 *p++ = (htab->opd_abi ? 13 : 12) - i;
14194 }
14195 *p++ = DW_CFA_advance_loc + 10;
14196 *p++ = DW_CFA_def_cfa_offset;
14197 *p++ = 0;
14198 for (i = 4; i < 12; i++)
14199 *p++ = DW_CFA_restore + i;
14200 *p++ = DW_CFA_advance_loc + 2;
14201 *p++ = DW_CFA_restore_extended;
14202 *p++ = 65;
14203 return p;
14204 }
14205
14206 /* Build all the stubs associated with the current output file.
14207 The stubs are kept in a hash table attached to the main linker
14208 hash table. This function is called via gldelf64ppc_finish. */
14209
14210 bfd_boolean
14211 ppc64_elf_build_stubs (struct bfd_link_info *info,
14212 char **stats)
14213 {
14214 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14215 struct map_stub *group;
14216 asection *stub_sec;
14217 bfd_byte *p;
14218 int stub_sec_count = 0;
14219
14220 if (htab == NULL)
14221 return FALSE;
14222
14223 /* Allocate memory to hold the linker stubs. */
14224 for (group = htab->group; group != NULL; group = group->next)
14225 {
14226 group->eh_size = 0;
14227 group->lr_restore = 0;
14228 if ((stub_sec = group->stub_sec) != NULL
14229 && stub_sec->size != 0)
14230 {
14231 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14232 stub_sec->size);
14233 if (stub_sec->contents == NULL)
14234 return FALSE;
14235 stub_sec->size = 0;
14236 }
14237 }
14238
14239 if (htab->glink != NULL && htab->glink->size != 0)
14240 {
14241 unsigned int indx;
14242 bfd_vma plt0;
14243
14244 /* Build the .glink plt call stub. */
14245 if (htab->params->emit_stub_syms)
14246 {
14247 struct elf_link_hash_entry *h;
14248 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14249 TRUE, FALSE, FALSE);
14250 if (h == NULL)
14251 return FALSE;
14252 if (h->root.type == bfd_link_hash_new)
14253 {
14254 h->root.type = bfd_link_hash_defined;
14255 h->root.u.def.section = htab->glink;
14256 h->root.u.def.value = 8;
14257 h->ref_regular = 1;
14258 h->def_regular = 1;
14259 h->ref_regular_nonweak = 1;
14260 h->forced_local = 1;
14261 h->non_elf = 0;
14262 h->root.linker_def = 1;
14263 }
14264 }
14265 plt0 = (htab->elf.splt->output_section->vma
14266 + htab->elf.splt->output_offset
14267 - 16);
14268 if (info->emitrelocations)
14269 {
14270 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14271 if (r == NULL)
14272 return FALSE;
14273 r->r_offset = (htab->glink->output_offset
14274 + htab->glink->output_section->vma);
14275 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14276 r->r_addend = plt0;
14277 }
14278 p = htab->glink->contents;
14279 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
14280 bfd_put_64 (htab->glink->owner, plt0, p);
14281 p += 8;
14282 if (htab->opd_abi)
14283 {
14284 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14285 p += 4;
14286 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14287 p += 4;
14288 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14289 p += 4;
14290 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14291 p += 4;
14292 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14293 p += 4;
14294 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14295 p += 4;
14296 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14297 p += 4;
14298 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14299 p += 4;
14300 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14301 p += 4;
14302 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14303 p += 4;
14304 }
14305 else
14306 {
14307 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14308 p += 4;
14309 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14310 p += 4;
14311 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14312 p += 4;
14313 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14314 p += 4;
14315 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14316 p += 4;
14317 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14318 p += 4;
14319 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14320 p += 4;
14321 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14322 p += 4;
14323 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14324 p += 4;
14325 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14326 p += 4;
14327 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14328 p += 4;
14329 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14330 p += 4;
14331 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14332 p += 4;
14333 }
14334 bfd_put_32 (htab->glink->owner, BCTR, p);
14335 p += 4;
14336 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
14337
14338 /* Build the .glink lazy link call stubs. */
14339 indx = 0;
14340 while (p < htab->glink->contents + htab->glink->size)
14341 {
14342 if (htab->opd_abi)
14343 {
14344 if (indx < 0x8000)
14345 {
14346 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14347 p += 4;
14348 }
14349 else
14350 {
14351 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14352 p += 4;
14353 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14354 p);
14355 p += 4;
14356 }
14357 }
14358 bfd_put_32 (htab->glink->owner,
14359 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
14360 indx++;
14361 p += 4;
14362 }
14363 }
14364
14365 if (htab->tga_group != NULL)
14366 {
14367 htab->tga_group->lr_restore = 23 * 4;
14368 htab->tga_group->stub_sec->size = 24 * 4;
14369 if (!emit_tga_desc (htab))
14370 return FALSE;
14371 if (htab->glink_eh_frame != NULL
14372 && htab->glink_eh_frame->size != 0)
14373 {
14374 size_t align = 4;
14375
14376 p = htab->glink_eh_frame->contents;
14377 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14378 p += 17;
14379 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14380 }
14381 }
14382
14383 /* Build .glink global entry stubs, and PLT relocs for globals. */
14384 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14385
14386 if (!write_plt_relocs_for_local_syms (info))
14387 return FALSE;
14388
14389 if (htab->brlt != NULL && htab->brlt->size != 0)
14390 {
14391 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
14392 htab->brlt->size);
14393 if (htab->brlt->contents == NULL)
14394 return FALSE;
14395 }
14396 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
14397 {
14398 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
14399 htab->relbrlt->size);
14400 if (htab->relbrlt->contents == NULL)
14401 return FALSE;
14402 }
14403
14404 /* Build the stubs as directed by the stub hash table. */
14405 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
14406
14407 for (group = htab->group; group != NULL; group = group->next)
14408 if (group->needs_save_res)
14409 group->stub_sec->size += htab->sfpr->size;
14410
14411 if (htab->relbrlt != NULL)
14412 htab->relbrlt->reloc_count = 0;
14413
14414 if (htab->params->plt_stub_align != 0)
14415 for (group = htab->group; group != NULL; group = group->next)
14416 if ((stub_sec = group->stub_sec) != NULL)
14417 {
14418 int align = abs (htab->params->plt_stub_align);
14419 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14420 }
14421
14422 for (group = htab->group; group != NULL; group = group->next)
14423 if (group->needs_save_res)
14424 {
14425 stub_sec = group->stub_sec;
14426 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14427 htab->sfpr->contents, htab->sfpr->size);
14428 if (htab->params->emit_stub_syms)
14429 {
14430 unsigned int i;
14431
14432 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14433 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14434 return FALSE;
14435 }
14436 }
14437
14438 if (htab->glink_eh_frame != NULL
14439 && htab->glink_eh_frame->size != 0)
14440 {
14441 bfd_vma val;
14442 size_t align = 4;
14443
14444 p = htab->glink_eh_frame->contents;
14445 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14446
14447 for (group = htab->group; group != NULL; group = group->next)
14448 if (group->eh_size != 0)
14449 {
14450 /* Offset to stub section. */
14451 val = (group->stub_sec->output_section->vma
14452 + group->stub_sec->output_offset);
14453 val -= (htab->glink_eh_frame->output_section->vma
14454 + htab->glink_eh_frame->output_offset
14455 + (p + 8 - htab->glink_eh_frame->contents));
14456 if (val + 0x80000000 > 0xffffffff)
14457 {
14458 _bfd_error_handler
14459 (_("%s offset too large for .eh_frame sdata4 encoding"),
14460 group->stub_sec->name);
14461 return FALSE;
14462 }
14463 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14464 p += (group->eh_size + 17 + 3) & -4;
14465 }
14466 if (htab->glink != NULL && htab->glink->size != 0)
14467 {
14468 /* Offset to .glink. */
14469 val = (htab->glink->output_section->vma
14470 + htab->glink->output_offset
14471 + 8);
14472 val -= (htab->glink_eh_frame->output_section->vma
14473 + htab->glink_eh_frame->output_offset
14474 + (p + 8 - htab->glink_eh_frame->contents));
14475 if (val + 0x80000000 > 0xffffffff)
14476 {
14477 _bfd_error_handler
14478 (_("%s offset too large for .eh_frame sdata4 encoding"),
14479 htab->glink->name);
14480 return FALSE;
14481 }
14482 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14483 p += (24 + align - 1) & -align;
14484 }
14485 }
14486
14487 for (group = htab->group; group != NULL; group = group->next)
14488 if ((stub_sec = group->stub_sec) != NULL)
14489 {
14490 stub_sec_count += 1;
14491 if (stub_sec->rawsize != stub_sec->size
14492 && (htab->stub_iteration <= STUB_SHRINK_ITER
14493 || stub_sec->rawsize < stub_sec->size))
14494 break;
14495 }
14496
14497 if (group != NULL)
14498 {
14499 htab->stub_error = TRUE;
14500 _bfd_error_handler (_("stubs don't match calculated size"));
14501 }
14502
14503 if (htab->stub_error)
14504 return FALSE;
14505
14506 if (stats != NULL)
14507 {
14508 char *groupmsg;
14509 if (asprintf (&groupmsg,
14510 ngettext ("linker stubs in %u group\n",
14511 "linker stubs in %u groups\n",
14512 stub_sec_count),
14513 stub_sec_count) < 0)
14514 *stats = NULL;
14515 else
14516 {
14517 if (asprintf (stats, _("%s"
14518 " branch %lu\n"
14519 " branch toc adj %lu\n"
14520 " branch notoc %lu\n"
14521 " branch both %lu\n"
14522 " long branch %lu\n"
14523 " long toc adj %lu\n"
14524 " long notoc %lu\n"
14525 " long both %lu\n"
14526 " plt call %lu\n"
14527 " plt call save %lu\n"
14528 " plt call notoc %lu\n"
14529 " plt call both %lu\n"
14530 " global entry %lu"),
14531 groupmsg,
14532 htab->stub_count[ppc_stub_long_branch - 1],
14533 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14534 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14535 htab->stub_count[ppc_stub_long_branch_both - 1],
14536 htab->stub_count[ppc_stub_plt_branch - 1],
14537 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14538 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14539 htab->stub_count[ppc_stub_plt_branch_both - 1],
14540 htab->stub_count[ppc_stub_plt_call - 1],
14541 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14542 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14543 htab->stub_count[ppc_stub_plt_call_both - 1],
14544 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14545 *stats = NULL;
14546 free (groupmsg);
14547 }
14548 }
14549 return TRUE;
14550 }
14551
14552 /* What to do when ld finds relocations against symbols defined in
14553 discarded sections. */
14554
14555 static unsigned int
14556 ppc64_elf_action_discarded (asection *sec)
14557 {
14558 if (strcmp (".opd", sec->name) == 0)
14559 return 0;
14560
14561 if (strcmp (".toc", sec->name) == 0)
14562 return 0;
14563
14564 if (strcmp (".toc1", sec->name) == 0)
14565 return 0;
14566
14567 return _bfd_elf_default_action_discarded (sec);
14568 }
14569
14570 /* These are the dynamic relocations supported by glibc. */
14571
14572 static bfd_boolean
14573 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14574 {
14575 switch (r_type)
14576 {
14577 case R_PPC64_RELATIVE:
14578 case R_PPC64_NONE:
14579 case R_PPC64_ADDR64:
14580 case R_PPC64_GLOB_DAT:
14581 case R_PPC64_IRELATIVE:
14582 case R_PPC64_JMP_IREL:
14583 case R_PPC64_JMP_SLOT:
14584 case R_PPC64_DTPMOD64:
14585 case R_PPC64_DTPREL64:
14586 case R_PPC64_TPREL64:
14587 case R_PPC64_TPREL16_LO_DS:
14588 case R_PPC64_TPREL16_DS:
14589 case R_PPC64_TPREL16:
14590 case R_PPC64_TPREL16_LO:
14591 case R_PPC64_TPREL16_HI:
14592 case R_PPC64_TPREL16_HIGH:
14593 case R_PPC64_TPREL16_HA:
14594 case R_PPC64_TPREL16_HIGHA:
14595 case R_PPC64_TPREL16_HIGHER:
14596 case R_PPC64_TPREL16_HIGHEST:
14597 case R_PPC64_TPREL16_HIGHERA:
14598 case R_PPC64_TPREL16_HIGHESTA:
14599 case R_PPC64_ADDR16_LO_DS:
14600 case R_PPC64_ADDR16_LO:
14601 case R_PPC64_ADDR16_HI:
14602 case R_PPC64_ADDR16_HIGH:
14603 case R_PPC64_ADDR16_HA:
14604 case R_PPC64_ADDR16_HIGHA:
14605 case R_PPC64_REL30:
14606 case R_PPC64_COPY:
14607 case R_PPC64_UADDR64:
14608 case R_PPC64_UADDR32:
14609 case R_PPC64_ADDR32:
14610 case R_PPC64_ADDR24:
14611 case R_PPC64_ADDR16:
14612 case R_PPC64_UADDR16:
14613 case R_PPC64_ADDR16_DS:
14614 case R_PPC64_ADDR16_HIGHER:
14615 case R_PPC64_ADDR16_HIGHEST:
14616 case R_PPC64_ADDR16_HIGHERA:
14617 case R_PPC64_ADDR16_HIGHESTA:
14618 case R_PPC64_ADDR14:
14619 case R_PPC64_ADDR14_BRTAKEN:
14620 case R_PPC64_ADDR14_BRNTAKEN:
14621 case R_PPC64_REL32:
14622 case R_PPC64_REL64:
14623 return TRUE;
14624
14625 default:
14626 return FALSE;
14627 }
14628 }
14629
14630 /* The RELOCATE_SECTION function is called by the ELF backend linker
14631 to handle the relocations for a section.
14632
14633 The relocs are always passed as Rela structures; if the section
14634 actually uses Rel structures, the r_addend field will always be
14635 zero.
14636
14637 This function is responsible for adjust the section contents as
14638 necessary, and (if using Rela relocs and generating a
14639 relocatable output file) adjusting the reloc addend as
14640 necessary.
14641
14642 This function does not have to worry about setting the reloc
14643 address or the reloc symbol index.
14644
14645 LOCAL_SYMS is a pointer to the swapped in local symbols.
14646
14647 LOCAL_SECTIONS is an array giving the section in the input file
14648 corresponding to the st_shndx field of each local symbol.
14649
14650 The global hash table entry for the global symbols can be found
14651 via elf_sym_hashes (input_bfd).
14652
14653 When generating relocatable output, this function must handle
14654 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14655 going to be the section symbol corresponding to the output
14656 section, which means that the addend must be adjusted
14657 accordingly. */
14658
14659 static bfd_boolean
14660 ppc64_elf_relocate_section (bfd *output_bfd,
14661 struct bfd_link_info *info,
14662 bfd *input_bfd,
14663 asection *input_section,
14664 bfd_byte *contents,
14665 Elf_Internal_Rela *relocs,
14666 Elf_Internal_Sym *local_syms,
14667 asection **local_sections)
14668 {
14669 struct ppc_link_hash_table *htab;
14670 Elf_Internal_Shdr *symtab_hdr;
14671 struct elf_link_hash_entry **sym_hashes;
14672 Elf_Internal_Rela *rel;
14673 Elf_Internal_Rela *wrel;
14674 Elf_Internal_Rela *relend;
14675 Elf_Internal_Rela outrel;
14676 bfd_byte *loc;
14677 struct got_entry **local_got_ents;
14678 bfd_vma TOCstart;
14679 bfd_boolean ret = TRUE;
14680 bfd_boolean is_opd;
14681 /* Assume 'at' branch hints. */
14682 bfd_boolean is_isa_v2 = TRUE;
14683 bfd_boolean warned_dynamic = FALSE;
14684 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14685
14686 /* Initialize howto table if needed. */
14687 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14688 ppc_howto_init ();
14689
14690 htab = ppc_hash_table (info);
14691 if (htab == NULL)
14692 return FALSE;
14693
14694 /* Don't relocate stub sections. */
14695 if (input_section->owner == htab->params->stub_bfd)
14696 return TRUE;
14697
14698 if (!is_ppc64_elf (input_bfd))
14699 {
14700 bfd_set_error (bfd_error_wrong_format);
14701 return FALSE;
14702 }
14703
14704 local_got_ents = elf_local_got_ents (input_bfd);
14705 TOCstart = elf_gp (output_bfd);
14706 symtab_hdr = &elf_symtab_hdr (input_bfd);
14707 sym_hashes = elf_sym_hashes (input_bfd);
14708 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14709
14710 rel = wrel = relocs;
14711 relend = relocs + input_section->reloc_count;
14712 for (; rel < relend; wrel++, rel++)
14713 {
14714 enum elf_ppc64_reloc_type r_type;
14715 bfd_vma addend;
14716 bfd_reloc_status_type r;
14717 Elf_Internal_Sym *sym;
14718 asection *sec;
14719 struct elf_link_hash_entry *h_elf;
14720 struct ppc_link_hash_entry *h;
14721 struct ppc_link_hash_entry *fdh;
14722 const char *sym_name;
14723 unsigned long r_symndx, toc_symndx;
14724 bfd_vma toc_addend;
14725 unsigned char tls_mask, tls_gd, tls_type;
14726 unsigned char sym_type;
14727 bfd_vma relocation;
14728 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14729 bfd_boolean warned;
14730 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14731 unsigned int insn;
14732 unsigned int mask;
14733 struct ppc_stub_hash_entry *stub_entry;
14734 bfd_vma max_br_offset;
14735 bfd_vma from;
14736 Elf_Internal_Rela orig_rel;
14737 reloc_howto_type *howto;
14738 struct reloc_howto_struct alt_howto;
14739 uint64_t pinsn;
14740 bfd_vma offset;
14741
14742 again:
14743 orig_rel = *rel;
14744
14745 r_type = ELF64_R_TYPE (rel->r_info);
14746 r_symndx = ELF64_R_SYM (rel->r_info);
14747
14748 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14749 symbol of the previous ADDR64 reloc. The symbol gives us the
14750 proper TOC base to use. */
14751 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14752 && wrel != relocs
14753 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14754 && is_opd)
14755 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14756
14757 sym = NULL;
14758 sec = NULL;
14759 h_elf = NULL;
14760 sym_name = NULL;
14761 unresolved_reloc = FALSE;
14762 warned = FALSE;
14763
14764 if (r_symndx < symtab_hdr->sh_info)
14765 {
14766 /* It's a local symbol. */
14767 struct _opd_sec_data *opd;
14768
14769 sym = local_syms + r_symndx;
14770 sec = local_sections[r_symndx];
14771 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14772 sym_type = ELF64_ST_TYPE (sym->st_info);
14773 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14774 opd = get_opd_info (sec);
14775 if (opd != NULL && opd->adjust != NULL)
14776 {
14777 long adjust = opd->adjust[OPD_NDX (sym->st_value
14778 + rel->r_addend)];
14779 if (adjust == -1)
14780 relocation = 0;
14781 else
14782 {
14783 /* If this is a relocation against the opd section sym
14784 and we have edited .opd, adjust the reloc addend so
14785 that ld -r and ld --emit-relocs output is correct.
14786 If it is a reloc against some other .opd symbol,
14787 then the symbol value will be adjusted later. */
14788 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14789 rel->r_addend += adjust;
14790 else
14791 relocation += adjust;
14792 }
14793 }
14794 }
14795 else
14796 {
14797 bfd_boolean ignored;
14798
14799 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14800 r_symndx, symtab_hdr, sym_hashes,
14801 h_elf, sec, relocation,
14802 unresolved_reloc, warned, ignored);
14803 sym_name = h_elf->root.root.string;
14804 sym_type = h_elf->type;
14805 if (sec != NULL
14806 && sec->owner == output_bfd
14807 && strcmp (sec->name, ".opd") == 0)
14808 {
14809 /* This is a symbol defined in a linker script. All
14810 such are defined in output sections, even those
14811 defined by simple assignment from a symbol defined in
14812 an input section. Transfer the symbol to an
14813 appropriate input .opd section, so that a branch to
14814 this symbol will be mapped to the location specified
14815 by the opd entry. */
14816 struct bfd_link_order *lo;
14817 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14818 if (lo->type == bfd_indirect_link_order)
14819 {
14820 asection *isec = lo->u.indirect.section;
14821 if (h_elf->root.u.def.value >= isec->output_offset
14822 && h_elf->root.u.def.value < (isec->output_offset
14823 + isec->size))
14824 {
14825 h_elf->root.u.def.value -= isec->output_offset;
14826 h_elf->root.u.def.section = isec;
14827 sec = isec;
14828 break;
14829 }
14830 }
14831 }
14832 }
14833 h = ppc_elf_hash_entry (h_elf);
14834
14835 if (sec != NULL && discarded_section (sec))
14836 {
14837 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14838 input_bfd, input_section,
14839 contents, rel->r_offset);
14840 wrel->r_offset = rel->r_offset;
14841 wrel->r_info = 0;
14842 wrel->r_addend = 0;
14843
14844 /* For ld -r, remove relocations in debug sections against
14845 symbols defined in discarded sections. Not done for
14846 non-debug to preserve relocs in .eh_frame which the
14847 eh_frame editing code expects to be present. */
14848 if (bfd_link_relocatable (info)
14849 && (input_section->flags & SEC_DEBUGGING))
14850 wrel--;
14851
14852 continue;
14853 }
14854
14855 if (bfd_link_relocatable (info))
14856 goto copy_reloc;
14857
14858 if (h != NULL && &h->elf == htab->elf.hgot)
14859 {
14860 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14861 sec = bfd_abs_section_ptr;
14862 unresolved_reloc = FALSE;
14863 }
14864
14865 /* TLS optimizations. Replace instruction sequences and relocs
14866 based on information we collected in tls_optimize. We edit
14867 RELOCS so that --emit-relocs will output something sensible
14868 for the final instruction stream. */
14869 tls_mask = 0;
14870 tls_gd = 0;
14871 toc_symndx = 0;
14872 if (h != NULL)
14873 tls_mask = h->tls_mask;
14874 else if (local_got_ents != NULL)
14875 {
14876 struct plt_entry **local_plt = (struct plt_entry **)
14877 (local_got_ents + symtab_hdr->sh_info);
14878 unsigned char *lgot_masks = (unsigned char *)
14879 (local_plt + symtab_hdr->sh_info);
14880 tls_mask = lgot_masks[r_symndx];
14881 }
14882 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14883 && (r_type == R_PPC64_TLS
14884 || r_type == R_PPC64_TLSGD
14885 || r_type == R_PPC64_TLSLD))
14886 {
14887 /* Check for toc tls entries. */
14888 unsigned char *toc_tls;
14889
14890 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14891 &local_syms, rel, input_bfd))
14892 return FALSE;
14893
14894 if (toc_tls)
14895 tls_mask = *toc_tls;
14896 }
14897
14898 /* Check that tls relocs are used with tls syms, and non-tls
14899 relocs are used with non-tls syms. */
14900 if (r_symndx != STN_UNDEF
14901 && r_type != R_PPC64_NONE
14902 && (h == NULL
14903 || h->elf.root.type == bfd_link_hash_defined
14904 || h->elf.root.type == bfd_link_hash_defweak)
14905 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14906 {
14907 if ((tls_mask & TLS_TLS) != 0
14908 && (r_type == R_PPC64_TLS
14909 || r_type == R_PPC64_TLSGD
14910 || r_type == R_PPC64_TLSLD))
14911 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14912 ;
14913 else
14914 info->callbacks->einfo
14915 (!IS_PPC64_TLS_RELOC (r_type)
14916 /* xgettext:c-format */
14917 ? _("%H: %s used with TLS symbol `%pT'\n")
14918 /* xgettext:c-format */
14919 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14920 input_bfd, input_section, rel->r_offset,
14921 ppc64_elf_howto_table[r_type]->name,
14922 sym_name);
14923 }
14924
14925 /* Ensure reloc mapping code below stays sane. */
14926 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14927 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14928 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14929 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14930 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14931 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14932 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14933 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14934 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14935 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14936 abort ();
14937
14938 switch (r_type)
14939 {
14940 default:
14941 break;
14942
14943 case R_PPC64_LO_DS_OPT:
14944 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14945 if ((insn & (0x3fu << 26)) != 58u << 26)
14946 abort ();
14947 insn += (14u << 26) - (58u << 26);
14948 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14949 r_type = R_PPC64_TOC16_LO;
14950 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14951 break;
14952
14953 case R_PPC64_TOC16:
14954 case R_PPC64_TOC16_LO:
14955 case R_PPC64_TOC16_DS:
14956 case R_PPC64_TOC16_LO_DS:
14957 {
14958 /* Check for toc tls entries. */
14959 unsigned char *toc_tls;
14960 int retval;
14961
14962 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14963 &local_syms, rel, input_bfd);
14964 if (retval == 0)
14965 return FALSE;
14966
14967 if (toc_tls)
14968 {
14969 tls_mask = *toc_tls;
14970 if (r_type == R_PPC64_TOC16_DS
14971 || r_type == R_PPC64_TOC16_LO_DS)
14972 {
14973 if ((tls_mask & TLS_TLS) != 0
14974 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14975 goto toctprel;
14976 }
14977 else
14978 {
14979 /* If we found a GD reloc pair, then we might be
14980 doing a GD->IE transition. */
14981 if (retval == 2)
14982 {
14983 tls_gd = TLS_GDIE;
14984 if ((tls_mask & TLS_TLS) != 0
14985 && (tls_mask & TLS_GD) == 0)
14986 goto tls_ldgd_opt;
14987 }
14988 else if (retval == 3)
14989 {
14990 if ((tls_mask & TLS_TLS) != 0
14991 && (tls_mask & TLS_LD) == 0)
14992 goto tls_ldgd_opt;
14993 }
14994 }
14995 }
14996 }
14997 break;
14998
14999 case R_PPC64_GOT_TPREL16_HI:
15000 case R_PPC64_GOT_TPREL16_HA:
15001 if ((tls_mask & TLS_TLS) != 0
15002 && (tls_mask & TLS_TPREL) == 0)
15003 {
15004 rel->r_offset -= d_offset;
15005 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15006 r_type = R_PPC64_NONE;
15007 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15008 }
15009 break;
15010
15011 case R_PPC64_GOT_TPREL16_DS:
15012 case R_PPC64_GOT_TPREL16_LO_DS:
15013 if ((tls_mask & TLS_TLS) != 0
15014 && (tls_mask & TLS_TPREL) == 0)
15015 {
15016 toctprel:
15017 insn = bfd_get_32 (input_bfd,
15018 contents + rel->r_offset - d_offset);
15019 insn &= 31 << 21;
15020 insn |= 0x3c0d0000; /* addis 0,13,0 */
15021 bfd_put_32 (input_bfd, insn,
15022 contents + rel->r_offset - d_offset);
15023 r_type = R_PPC64_TPREL16_HA;
15024 if (toc_symndx != 0)
15025 {
15026 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15027 rel->r_addend = toc_addend;
15028 /* We changed the symbol. Start over in order to
15029 get h, sym, sec etc. right. */
15030 goto again;
15031 }
15032 else
15033 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15034 }
15035 break;
15036
15037 case R_PPC64_GOT_TPREL_PCREL34:
15038 if ((tls_mask & TLS_TLS) != 0
15039 && (tls_mask & TLS_TPREL) == 0)
15040 {
15041 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15042 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15043 pinsn <<= 32;
15044 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15045 pinsn += ((2ULL << 56) + (-1ULL << 52)
15046 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15047 bfd_put_32 (input_bfd, pinsn >> 32,
15048 contents + rel->r_offset);
15049 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15050 contents + rel->r_offset + 4);
15051 r_type = R_PPC64_TPREL34;
15052 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15053 }
15054 break;
15055
15056 case R_PPC64_TLS:
15057 if ((tls_mask & TLS_TLS) != 0
15058 && (tls_mask & TLS_TPREL) == 0)
15059 {
15060 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15061 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15062 if (insn == 0)
15063 break;
15064 if ((rel->r_offset & 3) == 0)
15065 {
15066 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15067 /* Was PPC64_TLS which sits on insn boundary, now
15068 PPC64_TPREL16_LO which is at low-order half-word. */
15069 rel->r_offset += d_offset;
15070 r_type = R_PPC64_TPREL16_LO;
15071 if (toc_symndx != 0)
15072 {
15073 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15074 rel->r_addend = toc_addend;
15075 /* We changed the symbol. Start over in order to
15076 get h, sym, sec etc. right. */
15077 goto again;
15078 }
15079 else
15080 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15081 }
15082 else if ((rel->r_offset & 3) == 1)
15083 {
15084 /* For pcrel IE to LE we already have the full
15085 offset and thus don't need an addi here. A nop
15086 or mr will do. */
15087 if ((insn & (0x3fu << 26)) == 14 << 26)
15088 {
15089 /* Extract regs from addi rt,ra,si. */
15090 unsigned int rt = (insn >> 21) & 0x1f;
15091 unsigned int ra = (insn >> 16) & 0x1f;
15092 if (rt == ra)
15093 insn = NOP;
15094 else
15095 {
15096 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15097 insn = (rt << 16) | (ra << 21) | (ra << 11);
15098 insn |= (31u << 26) | (444u << 1);
15099 }
15100 }
15101 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
15102 }
15103 }
15104 break;
15105
15106 case R_PPC64_GOT_TLSGD16_HI:
15107 case R_PPC64_GOT_TLSGD16_HA:
15108 tls_gd = TLS_GDIE;
15109 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15110 goto tls_gdld_hi;
15111 break;
15112
15113 case R_PPC64_GOT_TLSLD16_HI:
15114 case R_PPC64_GOT_TLSLD16_HA:
15115 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15116 {
15117 tls_gdld_hi:
15118 if ((tls_mask & tls_gd) != 0)
15119 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15120 + R_PPC64_GOT_TPREL16_DS);
15121 else
15122 {
15123 rel->r_offset -= d_offset;
15124 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15125 r_type = R_PPC64_NONE;
15126 }
15127 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15128 }
15129 break;
15130
15131 case R_PPC64_GOT_TLSGD16:
15132 case R_PPC64_GOT_TLSGD16_LO:
15133 tls_gd = TLS_GDIE;
15134 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15135 goto tls_ldgd_opt;
15136 break;
15137
15138 case R_PPC64_GOT_TLSLD16:
15139 case R_PPC64_GOT_TLSLD16_LO:
15140 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15141 {
15142 unsigned int insn1, insn2;
15143
15144 tls_ldgd_opt:
15145 offset = (bfd_vma) -1;
15146 /* If not using the newer R_PPC64_TLSGD/LD to mark
15147 __tls_get_addr calls, we must trust that the call
15148 stays with its arg setup insns, ie. that the next
15149 reloc is the __tls_get_addr call associated with
15150 the current reloc. Edit both insns. */
15151 if (input_section->nomark_tls_get_addr
15152 && rel + 1 < relend
15153 && branch_reloc_hash_match (input_bfd, rel + 1,
15154 htab->tls_get_addr_fd,
15155 htab->tga_desc_fd,
15156 htab->tls_get_addr,
15157 htab->tga_desc))
15158 offset = rel[1].r_offset;
15159 /* We read the low GOT_TLS (or TOC16) insn because we
15160 need to keep the destination reg. It may be
15161 something other than the usual r3, and moved to r3
15162 before the call by intervening code. */
15163 insn1 = bfd_get_32 (input_bfd,
15164 contents + rel->r_offset - d_offset);
15165 if ((tls_mask & tls_gd) != 0)
15166 {
15167 /* IE */
15168 insn1 &= (0x1f << 21) | (0x1f << 16);
15169 insn1 |= 58u << 26; /* ld */
15170 insn2 = 0x7c636a14; /* add 3,3,13 */
15171 if (offset != (bfd_vma) -1)
15172 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15173 if (r_type == R_PPC64_TOC16
15174 || r_type == R_PPC64_TOC16_LO)
15175 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
15176 else
15177 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15178 + R_PPC64_GOT_TPREL16_DS);
15179 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15180 }
15181 else
15182 {
15183 /* LE */
15184 insn1 &= 0x1f << 21;
15185 insn1 |= 0x3c0d0000; /* addis r,13,0 */
15186 insn2 = 0x38630000; /* addi 3,3,0 */
15187 if (tls_gd == 0)
15188 {
15189 /* Was an LD reloc. */
15190 r_symndx = STN_UNDEF;
15191 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15192 }
15193 else if (toc_symndx != 0)
15194 {
15195 r_symndx = toc_symndx;
15196 rel->r_addend = toc_addend;
15197 }
15198 r_type = R_PPC64_TPREL16_HA;
15199 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15200 if (offset != (bfd_vma) -1)
15201 {
15202 rel[1].r_info = ELF64_R_INFO (r_symndx,
15203 R_PPC64_TPREL16_LO);
15204 rel[1].r_offset = offset + d_offset;
15205 rel[1].r_addend = rel->r_addend;
15206 }
15207 }
15208 bfd_put_32 (input_bfd, insn1,
15209 contents + rel->r_offset - d_offset);
15210 if (offset != (bfd_vma) -1)
15211 {
15212 bfd_put_32 (input_bfd, insn2, contents + offset);
15213 if (offset + 8 <= input_section->size)
15214 {
15215 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15216 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15217 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15218 }
15219 }
15220 if ((tls_mask & tls_gd) == 0
15221 && (tls_gd == 0 || toc_symndx != 0))
15222 {
15223 /* We changed the symbol. Start over in order
15224 to get h, sym, sec etc. right. */
15225 goto again;
15226 }
15227 }
15228 break;
15229
15230 case R_PPC64_GOT_TLSGD_PCREL34:
15231 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15232 {
15233 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15234 pinsn <<= 32;
15235 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15236 if ((tls_mask & TLS_GDIE) != 0)
15237 {
15238 /* IE, pla -> pld */
15239 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15240 r_type = R_PPC64_GOT_TPREL_PCREL34;
15241 }
15242 else
15243 {
15244 /* LE, pla pcrel -> paddi r13 */
15245 pinsn += (-1ULL << 52) + (13ULL << 16);
15246 r_type = R_PPC64_TPREL34;
15247 }
15248 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15249 bfd_put_32 (input_bfd, pinsn >> 32,
15250 contents + rel->r_offset);
15251 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15252 contents + rel->r_offset + 4);
15253 }
15254 break;
15255
15256 case R_PPC64_GOT_TLSLD_PCREL34:
15257 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15258 {
15259 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15260 pinsn <<= 32;
15261 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15262 pinsn += (-1ULL << 52) + (13ULL << 16);
15263 bfd_put_32 (input_bfd, pinsn >> 32,
15264 contents + rel->r_offset);
15265 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15266 contents + rel->r_offset + 4);
15267 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15268 r_symndx = STN_UNDEF;
15269 r_type = R_PPC64_TPREL34;
15270 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15271 goto again;
15272 }
15273 break;
15274
15275 case R_PPC64_TLSGD:
15276 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
15277 && rel + 1 < relend)
15278 {
15279 unsigned int insn2;
15280 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15281
15282 offset = rel->r_offset;
15283 if (is_plt_seq_reloc (r_type1))
15284 {
15285 bfd_put_32 (output_bfd, NOP, contents + offset);
15286 if (r_type1 == R_PPC64_PLT_PCREL34
15287 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15288 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15289 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15290 break;
15291 }
15292
15293 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15294 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15295
15296 if ((tls_mask & TLS_GDIE) != 0)
15297 {
15298 /* IE */
15299 r_type = R_PPC64_NONE;
15300 insn2 = 0x7c636a14; /* add 3,3,13 */
15301 }
15302 else
15303 {
15304 /* LE */
15305 if (toc_symndx != 0)
15306 {
15307 r_symndx = toc_symndx;
15308 rel->r_addend = toc_addend;
15309 }
15310 if (r_type1 == R_PPC64_REL24_NOTOC
15311 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15312 {
15313 r_type = R_PPC64_NONE;
15314 insn2 = NOP;
15315 }
15316 else
15317 {
15318 rel->r_offset = offset + d_offset;
15319 r_type = R_PPC64_TPREL16_LO;
15320 insn2 = 0x38630000; /* addi 3,3,0 */
15321 }
15322 }
15323 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15324 /* Zap the reloc on the _tls_get_addr call too. */
15325 BFD_ASSERT (offset == rel[1].r_offset);
15326 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15327 bfd_put_32 (input_bfd, insn2, contents + offset);
15328 if ((tls_mask & TLS_GDIE) == 0
15329 && toc_symndx != 0
15330 && r_type != R_PPC64_NONE)
15331 goto again;
15332 }
15333 break;
15334
15335 case R_PPC64_TLSLD:
15336 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
15337 && rel + 1 < relend)
15338 {
15339 unsigned int insn2;
15340 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15341
15342 offset = rel->r_offset;
15343 if (is_plt_seq_reloc (r_type1))
15344 {
15345 bfd_put_32 (output_bfd, NOP, contents + offset);
15346 if (r_type1 == R_PPC64_PLT_PCREL34
15347 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15348 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15349 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15350 break;
15351 }
15352
15353 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15354 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15355
15356 if (r_type1 == R_PPC64_REL24_NOTOC
15357 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15358 {
15359 r_type = R_PPC64_NONE;
15360 insn2 = NOP;
15361 }
15362 else
15363 {
15364 rel->r_offset = offset + d_offset;
15365 r_symndx = STN_UNDEF;
15366 r_type = R_PPC64_TPREL16_LO;
15367 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15368 insn2 = 0x38630000; /* addi 3,3,0 */
15369 }
15370 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15371 /* Zap the reloc on the _tls_get_addr call too. */
15372 BFD_ASSERT (offset == rel[1].r_offset);
15373 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15374 bfd_put_32 (input_bfd, insn2, contents + offset);
15375 if (r_type != R_PPC64_NONE)
15376 goto again;
15377 }
15378 break;
15379
15380 case R_PPC64_DTPMOD64:
15381 if (rel + 1 < relend
15382 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15383 && rel[1].r_offset == rel->r_offset + 8)
15384 {
15385 if ((tls_mask & TLS_GD) == 0)
15386 {
15387 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
15388 if ((tls_mask & TLS_GDIE) != 0)
15389 r_type = R_PPC64_TPREL64;
15390 else
15391 {
15392 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15393 r_type = R_PPC64_NONE;
15394 }
15395 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15396 }
15397 }
15398 else
15399 {
15400 if ((tls_mask & TLS_LD) == 0)
15401 {
15402 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15403 r_type = R_PPC64_NONE;
15404 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15405 }
15406 }
15407 break;
15408
15409 case R_PPC64_TPREL64:
15410 if ((tls_mask & TLS_TPREL) == 0)
15411 {
15412 r_type = R_PPC64_NONE;
15413 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15414 }
15415 break;
15416
15417 case R_PPC64_ENTRY:
15418 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15419 if (!bfd_link_pic (info)
15420 && !info->traditional_format
15421 && relocation + 0x80008000 <= 0xffffffff)
15422 {
15423 unsigned int insn1, insn2;
15424
15425 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15426 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15427 if ((insn1 & ~0xfffc) == LD_R2_0R12
15428 && insn2 == ADD_R2_R2_R12)
15429 {
15430 bfd_put_32 (input_bfd,
15431 LIS_R2 + PPC_HA (relocation),
15432 contents + rel->r_offset);
15433 bfd_put_32 (input_bfd,
15434 ADDI_R2_R2 + PPC_LO (relocation),
15435 contents + rel->r_offset + 4);
15436 }
15437 }
15438 else
15439 {
15440 relocation -= (rel->r_offset
15441 + input_section->output_offset
15442 + input_section->output_section->vma);
15443 if (relocation + 0x80008000 <= 0xffffffff)
15444 {
15445 unsigned int insn1, insn2;
15446
15447 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15448 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15449 if ((insn1 & ~0xfffc) == LD_R2_0R12
15450 && insn2 == ADD_R2_R2_R12)
15451 {
15452 bfd_put_32 (input_bfd,
15453 ADDIS_R2_R12 + PPC_HA (relocation),
15454 contents + rel->r_offset);
15455 bfd_put_32 (input_bfd,
15456 ADDI_R2_R2 + PPC_LO (relocation),
15457 contents + rel->r_offset + 4);
15458 }
15459 }
15460 }
15461 break;
15462
15463 case R_PPC64_REL16_HA:
15464 /* If we are generating a non-PIC executable, edit
15465 . 0: addis 2,12,.TOC.-0b@ha
15466 . addi 2,2,.TOC.-0b@l
15467 used by ELFv2 global entry points to set up r2, to
15468 . lis 2,.TOC.@ha
15469 . addi 2,2,.TOC.@l
15470 if .TOC. is in range. */
15471 if (!bfd_link_pic (info)
15472 && !info->traditional_format
15473 && !htab->opd_abi
15474 && rel->r_addend == d_offset
15475 && h != NULL && &h->elf == htab->elf.hgot
15476 && rel + 1 < relend
15477 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15478 && rel[1].r_offset == rel->r_offset + 4
15479 && rel[1].r_addend == rel->r_addend + 4
15480 && relocation + 0x80008000 <= 0xffffffff)
15481 {
15482 unsigned int insn1, insn2;
15483 offset = rel->r_offset - d_offset;
15484 insn1 = bfd_get_32 (input_bfd, contents + offset);
15485 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15486 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15487 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15488 {
15489 r_type = R_PPC64_ADDR16_HA;
15490 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15491 rel->r_addend -= d_offset;
15492 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15493 rel[1].r_addend -= d_offset + 4;
15494 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15495 }
15496 }
15497 break;
15498 }
15499
15500 /* Handle other relocations that tweak non-addend part of insn. */
15501 insn = 0;
15502 max_br_offset = 1 << 25;
15503 addend = rel->r_addend;
15504 reloc_dest = DEST_NORMAL;
15505 switch (r_type)
15506 {
15507 default:
15508 break;
15509
15510 case R_PPC64_TOCSAVE:
15511 if (relocation + addend == (rel->r_offset
15512 + input_section->output_offset
15513 + input_section->output_section->vma)
15514 && tocsave_find (htab, NO_INSERT,
15515 &local_syms, rel, input_bfd))
15516 {
15517 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15518 if (insn == NOP
15519 || insn == CROR_151515 || insn == CROR_313131)
15520 bfd_put_32 (input_bfd,
15521 STD_R2_0R1 + STK_TOC (htab),
15522 contents + rel->r_offset);
15523 }
15524 break;
15525
15526 /* Branch taken prediction relocations. */
15527 case R_PPC64_ADDR14_BRTAKEN:
15528 case R_PPC64_REL14_BRTAKEN:
15529 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15530 /* Fall through. */
15531
15532 /* Branch not taken prediction relocations. */
15533 case R_PPC64_ADDR14_BRNTAKEN:
15534 case R_PPC64_REL14_BRNTAKEN:
15535 insn |= bfd_get_32 (input_bfd,
15536 contents + rel->r_offset) & ~(0x01 << 21);
15537 /* Fall through. */
15538
15539 case R_PPC64_REL14:
15540 max_br_offset = 1 << 15;
15541 /* Fall through. */
15542
15543 case R_PPC64_REL24:
15544 case R_PPC64_REL24_NOTOC:
15545 case R_PPC64_PLTCALL:
15546 case R_PPC64_PLTCALL_NOTOC:
15547 /* Calls to functions with a different TOC, such as calls to
15548 shared objects, need to alter the TOC pointer. This is
15549 done using a linkage stub. A REL24 branching to these
15550 linkage stubs needs to be followed by a nop, as the nop
15551 will be replaced with an instruction to restore the TOC
15552 base pointer. */
15553 fdh = h;
15554 if (h != NULL
15555 && h->oh != NULL
15556 && h->oh->is_func_descriptor)
15557 fdh = ppc_follow_link (h->oh);
15558 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15559 htab);
15560 if ((r_type == R_PPC64_PLTCALL
15561 || r_type == R_PPC64_PLTCALL_NOTOC)
15562 && stub_entry != NULL
15563 && stub_entry->stub_type >= ppc_stub_plt_call
15564 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15565 stub_entry = NULL;
15566
15567 if (stub_entry != NULL
15568 && ((stub_entry->stub_type >= ppc_stub_plt_call
15569 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15570 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15571 || stub_entry->stub_type == ppc_stub_plt_branch_both
15572 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15573 || stub_entry->stub_type == ppc_stub_long_branch_both))
15574 {
15575 bfd_boolean can_plt_call = FALSE;
15576
15577 if (stub_entry->stub_type == ppc_stub_plt_call
15578 && !htab->opd_abi
15579 && htab->params->plt_localentry0 != 0
15580 && is_elfv2_localentry0 (&h->elf))
15581 {
15582 /* The function doesn't use or change r2. */
15583 can_plt_call = TRUE;
15584 }
15585 else if (r_type == R_PPC64_REL24_NOTOC)
15586 {
15587 /* NOTOC calls don't need to restore r2. */
15588 can_plt_call = TRUE;
15589 }
15590
15591 /* All of these stubs may modify r2, so there must be a
15592 branch and link followed by a nop. The nop is
15593 replaced by an insn to restore r2. */
15594 else if (rel->r_offset + 8 <= input_section->size)
15595 {
15596 unsigned long br;
15597
15598 br = bfd_get_32 (input_bfd,
15599 contents + rel->r_offset);
15600 if ((br & 1) != 0)
15601 {
15602 unsigned long nop;
15603
15604 nop = bfd_get_32 (input_bfd,
15605 contents + rel->r_offset + 4);
15606 if (nop == LD_R2_0R1 + STK_TOC (htab))
15607 can_plt_call = TRUE;
15608 else if (nop == NOP
15609 || nop == CROR_151515
15610 || nop == CROR_313131)
15611 {
15612 if (h != NULL
15613 && is_tls_get_addr (&h->elf, htab)
15614 && htab->params->tls_get_addr_opt)
15615 {
15616 /* Special stub used, leave nop alone. */
15617 }
15618 else
15619 bfd_put_32 (input_bfd,
15620 LD_R2_0R1 + STK_TOC (htab),
15621 contents + rel->r_offset + 4);
15622 can_plt_call = TRUE;
15623 }
15624 }
15625 }
15626
15627 if (!can_plt_call && h != NULL)
15628 {
15629 const char *name = h->elf.root.root.string;
15630
15631 if (*name == '.')
15632 ++name;
15633
15634 if (strncmp (name, "__libc_start_main", 17) == 0
15635 && (name[17] == 0 || name[17] == '@'))
15636 {
15637 /* Allow crt1 branch to go via a toc adjusting
15638 stub. Other calls that never return could do
15639 the same, if we could detect such. */
15640 can_plt_call = TRUE;
15641 }
15642 }
15643
15644 if (!can_plt_call)
15645 {
15646 /* g++ as of 20130507 emits self-calls without a
15647 following nop. This is arguably wrong since we
15648 have conflicting information. On the one hand a
15649 global symbol and on the other a local call
15650 sequence, but don't error for this special case.
15651 It isn't possible to cheaply verify we have
15652 exactly such a call. Allow all calls to the same
15653 section. */
15654 asection *code_sec = sec;
15655
15656 if (get_opd_info (sec) != NULL)
15657 {
15658 bfd_vma off = (relocation + addend
15659 - sec->output_section->vma
15660 - sec->output_offset);
15661
15662 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15663 }
15664 if (code_sec == input_section)
15665 can_plt_call = TRUE;
15666 }
15667
15668 if (!can_plt_call)
15669 {
15670 if (stub_entry->stub_type >= ppc_stub_plt_call
15671 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15672 info->callbacks->einfo
15673 /* xgettext:c-format */
15674 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15675 "(plt call stub)\n"),
15676 input_bfd, input_section, rel->r_offset, sym_name);
15677 else
15678 info->callbacks->einfo
15679 /* xgettext:c-format */
15680 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15681 "(toc save/adjust stub)\n"),
15682 input_bfd, input_section, rel->r_offset, sym_name);
15683
15684 bfd_set_error (bfd_error_bad_value);
15685 ret = FALSE;
15686 }
15687
15688 if (can_plt_call
15689 && stub_entry->stub_type >= ppc_stub_plt_call
15690 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15691 unresolved_reloc = FALSE;
15692 }
15693
15694 if ((stub_entry == NULL
15695 || stub_entry->stub_type == ppc_stub_long_branch
15696 || stub_entry->stub_type == ppc_stub_plt_branch)
15697 && get_opd_info (sec) != NULL)
15698 {
15699 /* The branch destination is the value of the opd entry. */
15700 bfd_vma off = (relocation + addend
15701 - sec->output_section->vma
15702 - sec->output_offset);
15703 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15704 if (dest != (bfd_vma) -1)
15705 {
15706 relocation = dest;
15707 addend = 0;
15708 reloc_dest = DEST_OPD;
15709 }
15710 }
15711
15712 /* If the branch is out of reach we ought to have a long
15713 branch stub. */
15714 from = (rel->r_offset
15715 + input_section->output_offset
15716 + input_section->output_section->vma);
15717
15718 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15719 ? fdh->elf.other
15720 : sym->st_other);
15721
15722 if (stub_entry != NULL
15723 && (stub_entry->stub_type == ppc_stub_long_branch
15724 || stub_entry->stub_type == ppc_stub_plt_branch)
15725 && (r_type == R_PPC64_ADDR14_BRTAKEN
15726 || r_type == R_PPC64_ADDR14_BRNTAKEN
15727 || (relocation + addend - from + max_br_offset
15728 < 2 * max_br_offset)))
15729 /* Don't use the stub if this branch is in range. */
15730 stub_entry = NULL;
15731
15732 if (stub_entry != NULL
15733 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15734 || stub_entry->stub_type == ppc_stub_long_branch_both
15735 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15736 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15737 && (r_type != R_PPC64_REL24_NOTOC
15738 || ((fdh ? fdh->elf.other : sym->st_other)
15739 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15740 && (relocation + addend - from + max_br_offset
15741 < 2 * max_br_offset))
15742 stub_entry = NULL;
15743
15744 if (stub_entry != NULL
15745 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15746 || stub_entry->stub_type == ppc_stub_long_branch_both
15747 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15748 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15749 && r_type == R_PPC64_REL24_NOTOC
15750 && (relocation + addend - from + max_br_offset
15751 < 2 * max_br_offset))
15752 stub_entry = NULL;
15753
15754 if (stub_entry != NULL)
15755 {
15756 /* Munge up the value and addend so that we call the stub
15757 rather than the procedure directly. */
15758 asection *stub_sec = stub_entry->group->stub_sec;
15759
15760 if (stub_entry->stub_type == ppc_stub_save_res)
15761 relocation += (stub_sec->output_offset
15762 + stub_sec->output_section->vma
15763 + stub_sec->size - htab->sfpr->size
15764 - htab->sfpr->output_offset
15765 - htab->sfpr->output_section->vma);
15766 else
15767 relocation = (stub_entry->stub_offset
15768 + stub_sec->output_offset
15769 + stub_sec->output_section->vma);
15770 addend = 0;
15771 reloc_dest = DEST_STUB;
15772
15773 if (((stub_entry->stub_type == ppc_stub_plt_call
15774 && ALWAYS_EMIT_R2SAVE)
15775 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15776 || stub_entry->stub_type == ppc_stub_plt_call_both)
15777 && !(h != NULL
15778 && is_tls_get_addr (&h->elf, htab)
15779 && htab->params->tls_get_addr_opt)
15780 && rel + 1 < relend
15781 && rel[1].r_offset == rel->r_offset + 4
15782 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15783 relocation += 4;
15784 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15785 || stub_entry->stub_type == ppc_stub_plt_branch_both
15786 || stub_entry->stub_type == ppc_stub_plt_call_both)
15787 && r_type == R_PPC64_REL24_NOTOC)
15788 relocation += 4;
15789
15790 if (r_type == R_PPC64_REL24_NOTOC
15791 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15792 || stub_entry->stub_type == ppc_stub_plt_call_both))
15793 htab->notoc_plt = 1;
15794 }
15795
15796 if (insn != 0)
15797 {
15798 if (is_isa_v2)
15799 {
15800 /* Set 'a' bit. This is 0b00010 in BO field for branch
15801 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15802 for branch on CTR insns (BO == 1a00t or 1a01t). */
15803 if ((insn & (0x14 << 21)) == (0x04 << 21))
15804 insn |= 0x02 << 21;
15805 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15806 insn |= 0x08 << 21;
15807 else
15808 break;
15809 }
15810 else
15811 {
15812 /* Invert 'y' bit if not the default. */
15813 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15814 insn ^= 0x01 << 21;
15815 }
15816
15817 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15818 }
15819
15820 /* NOP out calls to undefined weak functions.
15821 We can thus call a weak function without first
15822 checking whether the function is defined. */
15823 else if (h != NULL
15824 && h->elf.root.type == bfd_link_hash_undefweak
15825 && h->elf.dynindx == -1
15826 && (r_type == R_PPC64_REL24
15827 || r_type == R_PPC64_REL24_NOTOC)
15828 && relocation == 0
15829 && addend == 0)
15830 {
15831 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15832 goto copy_reloc;
15833 }
15834 break;
15835
15836 case R_PPC64_GOT16_DS:
15837 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15838 break;
15839 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15840 if (relocation + addend - from + 0x8000 < 0x10000
15841 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15842 {
15843 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15844 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15845 {
15846 insn += (14u << 26) - (58u << 26);
15847 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15848 r_type = R_PPC64_TOC16;
15849 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15850 }
15851 }
15852 break;
15853
15854 case R_PPC64_GOT16_LO_DS:
15855 case R_PPC64_GOT16_HA:
15856 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15857 break;
15858 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15859 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15860 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15861 {
15862 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15863 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15864 {
15865 insn += (14u << 26) - (58u << 26);
15866 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15867 r_type = R_PPC64_TOC16_LO;
15868 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15869 }
15870 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
15871 {
15872 r_type = R_PPC64_TOC16_HA;
15873 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15874 }
15875 }
15876 break;
15877
15878 case R_PPC64_GOT_PCREL34:
15879 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15880 break;
15881 from = (rel->r_offset
15882 + input_section->output_section->vma
15883 + input_section->output_offset);
15884 if (relocation - from + (1ULL << 33) < 1ULL << 34
15885 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15886 {
15887 offset = rel->r_offset;
15888 pinsn = bfd_get_32 (input_bfd, contents + offset);
15889 pinsn <<= 32;
15890 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15891 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15892 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15893 {
15894 /* Replace with paddi. */
15895 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15896 r_type = R_PPC64_PCREL34;
15897 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15898 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15899 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15900 goto pcrelopt;
15901 }
15902 }
15903 break;
15904
15905 case R_PPC64_PCREL34:
15906 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15907 {
15908 offset = rel->r_offset;
15909 pinsn = bfd_get_32 (input_bfd, contents + offset);
15910 pinsn <<= 32;
15911 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15912 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15913 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15914 | (14ULL << 26) /* paddi */))
15915 {
15916 pcrelopt:
15917 if (rel + 1 < relend
15918 && rel[1].r_offset == offset
15919 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15920 {
15921 bfd_vma off2 = rel[1].r_addend;
15922 if (off2 == 0)
15923 /* zero means next insn. */
15924 off2 = 8;
15925 off2 += offset;
15926 if (off2 + 4 <= input_section->size)
15927 {
15928 uint64_t pinsn2;
15929 bfd_signed_vma addend_off;
15930 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15931 pinsn2 <<= 32;
15932 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15933 {
15934 if (off2 + 8 > input_section->size)
15935 break;
15936 pinsn2 |= bfd_get_32 (input_bfd,
15937 contents + off2 + 4);
15938 }
15939 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15940 {
15941 addend += addend_off;
15942 rel->r_addend = addend;
15943 bfd_put_32 (input_bfd, pinsn >> 32,
15944 contents + offset);
15945 bfd_put_32 (input_bfd, pinsn,
15946 contents + offset + 4);
15947 bfd_put_32 (input_bfd, pinsn2 >> 32,
15948 contents + off2);
15949 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15950 bfd_put_32 (input_bfd, pinsn2,
15951 contents + off2 + 4);
15952 }
15953 }
15954 }
15955 }
15956 }
15957 break;
15958 }
15959
15960 tls_type = 0;
15961 save_unresolved_reloc = unresolved_reloc;
15962 switch (r_type)
15963 {
15964 default:
15965 /* xgettext:c-format */
15966 _bfd_error_handler (_("%pB: %s unsupported"),
15967 input_bfd, ppc64_elf_howto_table[r_type]->name);
15968
15969 bfd_set_error (bfd_error_bad_value);
15970 ret = FALSE;
15971 goto copy_reloc;
15972
15973 case R_PPC64_NONE:
15974 case R_PPC64_TLS:
15975 case R_PPC64_TLSGD:
15976 case R_PPC64_TLSLD:
15977 case R_PPC64_TOCSAVE:
15978 case R_PPC64_GNU_VTINHERIT:
15979 case R_PPC64_GNU_VTENTRY:
15980 case R_PPC64_ENTRY:
15981 case R_PPC64_PCREL_OPT:
15982 goto copy_reloc;
15983
15984 /* GOT16 relocations. Like an ADDR16 using the symbol's
15985 address in the GOT as relocation value instead of the
15986 symbol's value itself. Also, create a GOT entry for the
15987 symbol and put the symbol value there. */
15988 case R_PPC64_GOT_TLSGD16:
15989 case R_PPC64_GOT_TLSGD16_LO:
15990 case R_PPC64_GOT_TLSGD16_HI:
15991 case R_PPC64_GOT_TLSGD16_HA:
15992 case R_PPC64_GOT_TLSGD_PCREL34:
15993 tls_type = TLS_TLS | TLS_GD;
15994 goto dogot;
15995
15996 case R_PPC64_GOT_TLSLD16:
15997 case R_PPC64_GOT_TLSLD16_LO:
15998 case R_PPC64_GOT_TLSLD16_HI:
15999 case R_PPC64_GOT_TLSLD16_HA:
16000 case R_PPC64_GOT_TLSLD_PCREL34:
16001 tls_type = TLS_TLS | TLS_LD;
16002 goto dogot;
16003
16004 case R_PPC64_GOT_TPREL16_DS:
16005 case R_PPC64_GOT_TPREL16_LO_DS:
16006 case R_PPC64_GOT_TPREL16_HI:
16007 case R_PPC64_GOT_TPREL16_HA:
16008 case R_PPC64_GOT_TPREL_PCREL34:
16009 tls_type = TLS_TLS | TLS_TPREL;
16010 goto dogot;
16011
16012 case R_PPC64_GOT_DTPREL16_DS:
16013 case R_PPC64_GOT_DTPREL16_LO_DS:
16014 case R_PPC64_GOT_DTPREL16_HI:
16015 case R_PPC64_GOT_DTPREL16_HA:
16016 case R_PPC64_GOT_DTPREL_PCREL34:
16017 tls_type = TLS_TLS | TLS_DTPREL;
16018 goto dogot;
16019
16020 case R_PPC64_GOT16:
16021 case R_PPC64_GOT16_LO:
16022 case R_PPC64_GOT16_HI:
16023 case R_PPC64_GOT16_HA:
16024 case R_PPC64_GOT16_DS:
16025 case R_PPC64_GOT16_LO_DS:
16026 case R_PPC64_GOT_PCREL34:
16027 dogot:
16028 {
16029 /* Relocation is to the entry for this symbol in the global
16030 offset table. */
16031 asection *got;
16032 bfd_vma *offp;
16033 bfd_vma off;
16034 unsigned long indx = 0;
16035 struct got_entry *ent;
16036
16037 if (tls_type == (TLS_TLS | TLS_LD)
16038 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
16039 ent = ppc64_tlsld_got (input_bfd);
16040 else
16041 {
16042 if (h != NULL)
16043 {
16044 if (!htab->elf.dynamic_sections_created
16045 || h->elf.dynindx == -1
16046 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16047 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16048 /* This is actually a static link, or it is a
16049 -Bsymbolic link and the symbol is defined
16050 locally, or the symbol was forced to be local
16051 because of a version file. */
16052 ;
16053 else
16054 {
16055 indx = h->elf.dynindx;
16056 unresolved_reloc = FALSE;
16057 }
16058 ent = h->elf.got.glist;
16059 }
16060 else
16061 {
16062 if (local_got_ents == NULL)
16063 abort ();
16064 ent = local_got_ents[r_symndx];
16065 }
16066
16067 for (; ent != NULL; ent = ent->next)
16068 if (ent->addend == orig_rel.r_addend
16069 && ent->owner == input_bfd
16070 && ent->tls_type == tls_type)
16071 break;
16072 }
16073
16074 if (ent == NULL)
16075 abort ();
16076 if (ent->is_indirect)
16077 ent = ent->got.ent;
16078 offp = &ent->got.offset;
16079 got = ppc64_elf_tdata (ent->owner)->got;
16080 if (got == NULL)
16081 abort ();
16082
16083 /* The offset must always be a multiple of 8. We use the
16084 least significant bit to record whether we have already
16085 processed this entry. */
16086 off = *offp;
16087 if ((off & 1) != 0)
16088 off &= ~1;
16089 else
16090 {
16091 /* Generate relocs for the dynamic linker, except in
16092 the case of TLSLD where we'll use one entry per
16093 module. */
16094 asection *relgot;
16095 bfd_boolean ifunc;
16096
16097 *offp = off | 1;
16098 relgot = NULL;
16099 ifunc = (h != NULL
16100 ? h->elf.type == STT_GNU_IFUNC
16101 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
16102 if (ifunc)
16103 {
16104 relgot = htab->elf.irelplt;
16105 if (indx == 0 || is_static_defined (&h->elf))
16106 htab->local_ifunc_resolver = 1;
16107 }
16108 else if (indx != 0
16109 || (bfd_link_pic (info)
16110 && (h == NULL
16111 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16112 && !(tls_type != 0
16113 && bfd_link_executable (info)
16114 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
16115 relgot = ppc64_elf_tdata (ent->owner)->relgot;
16116 if (relgot != NULL)
16117 {
16118 outrel.r_offset = (got->output_section->vma
16119 + got->output_offset
16120 + off);
16121 outrel.r_addend = orig_rel.r_addend;
16122 if (tls_type & (TLS_LD | TLS_GD))
16123 {
16124 outrel.r_addend = 0;
16125 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
16126 if (tls_type == (TLS_TLS | TLS_GD))
16127 {
16128 loc = relgot->contents;
16129 loc += (relgot->reloc_count++
16130 * sizeof (Elf64_External_Rela));
16131 bfd_elf64_swap_reloca_out (output_bfd,
16132 &outrel, loc);
16133 outrel.r_offset += 8;
16134 outrel.r_addend = orig_rel.r_addend;
16135 outrel.r_info
16136 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16137 }
16138 }
16139 else if (tls_type == (TLS_TLS | TLS_DTPREL))
16140 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16141 else if (tls_type == (TLS_TLS | TLS_TPREL))
16142 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
16143 else if (indx != 0)
16144 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16145 else
16146 {
16147 if (ifunc)
16148 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16149 else
16150 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16151
16152 /* Write the .got section contents for the sake
16153 of prelink. */
16154 loc = got->contents + off;
16155 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16156 loc);
16157 }
16158
16159 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
16160 {
16161 outrel.r_addend += relocation;
16162 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
16163 {
16164 if (htab->elf.tls_sec == NULL)
16165 outrel.r_addend = 0;
16166 else
16167 outrel.r_addend -= htab->elf.tls_sec->vma;
16168 }
16169 }
16170 loc = relgot->contents;
16171 loc += (relgot->reloc_count++
16172 * sizeof (Elf64_External_Rela));
16173 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16174 }
16175
16176 /* Init the .got section contents here if we're not
16177 emitting a reloc. */
16178 else
16179 {
16180 relocation += orig_rel.r_addend;
16181 if (tls_type != 0)
16182 {
16183 if (htab->elf.tls_sec == NULL)
16184 relocation = 0;
16185 else
16186 {
16187 if (tls_type & TLS_LD)
16188 relocation = 0;
16189 else
16190 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
16191 if (tls_type & TLS_TPREL)
16192 relocation += DTP_OFFSET - TP_OFFSET;
16193 }
16194
16195 if (tls_type & (TLS_GD | TLS_LD))
16196 {
16197 bfd_put_64 (output_bfd, relocation,
16198 got->contents + off + 8);
16199 relocation = 1;
16200 }
16201 }
16202 bfd_put_64 (output_bfd, relocation,
16203 got->contents + off);
16204 }
16205 }
16206
16207 if (off >= (bfd_vma) -2)
16208 abort ();
16209
16210 relocation = got->output_section->vma + got->output_offset + off;
16211 addend = 0;
16212 if (!(r_type == R_PPC64_GOT_PCREL34
16213 || r_type == R_PPC64_GOT_TLSGD_PCREL34
16214 || r_type == R_PPC64_GOT_TLSLD_PCREL34
16215 || r_type == R_PPC64_GOT_TPREL_PCREL34
16216 || r_type == R_PPC64_GOT_DTPREL_PCREL34))
16217 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
16218 }
16219 break;
16220
16221 case R_PPC64_PLT16_HA:
16222 case R_PPC64_PLT16_HI:
16223 case R_PPC64_PLT16_LO:
16224 case R_PPC64_PLT16_LO_DS:
16225 case R_PPC64_PLT_PCREL34:
16226 case R_PPC64_PLT_PCREL34_NOTOC:
16227 case R_PPC64_PLT32:
16228 case R_PPC64_PLT64:
16229 case R_PPC64_PLTSEQ:
16230 case R_PPC64_PLTSEQ_NOTOC:
16231 case R_PPC64_PLTCALL:
16232 case R_PPC64_PLTCALL_NOTOC:
16233 /* Relocation is to the entry for this symbol in the
16234 procedure linkage table. */
16235 unresolved_reloc = TRUE;
16236 {
16237 struct plt_entry **plt_list = NULL;
16238 if (h != NULL)
16239 plt_list = &h->elf.plt.plist;
16240 else if (local_got_ents != NULL)
16241 {
16242 struct plt_entry **local_plt = (struct plt_entry **)
16243 (local_got_ents + symtab_hdr->sh_info);
16244 plt_list = local_plt + r_symndx;
16245 }
16246 if (plt_list)
16247 {
16248 struct plt_entry *ent;
16249
16250 for (ent = *plt_list; ent != NULL; ent = ent->next)
16251 if (ent->plt.offset != (bfd_vma) -1
16252 && ent->addend == orig_rel.r_addend)
16253 {
16254 asection *plt;
16255 bfd_vma got;
16256
16257 plt = htab->elf.splt;
16258 if (!htab->elf.dynamic_sections_created
16259 || h == NULL
16260 || h->elf.dynindx == -1)
16261 {
16262 if (h != NULL
16263 ? h->elf.type == STT_GNU_IFUNC
16264 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16265 plt = htab->elf.iplt;
16266 else
16267 plt = htab->pltlocal;
16268 }
16269 relocation = (plt->output_section->vma
16270 + plt->output_offset
16271 + ent->plt.offset);
16272 if (r_type == R_PPC64_PLT16_HA
16273 || r_type == R_PPC64_PLT16_HI
16274 || r_type == R_PPC64_PLT16_LO
16275 || r_type == R_PPC64_PLT16_LO_DS)
16276 {
16277 got = (elf_gp (output_bfd)
16278 + htab->sec_info[input_section->id].toc_off);
16279 relocation -= got;
16280 }
16281 addend = 0;
16282 unresolved_reloc = FALSE;
16283 break;
16284 }
16285 }
16286 }
16287 break;
16288
16289 case R_PPC64_TOC:
16290 /* Relocation value is TOC base. */
16291 relocation = TOCstart;
16292 if (r_symndx == STN_UNDEF)
16293 relocation += htab->sec_info[input_section->id].toc_off;
16294 else if (unresolved_reloc)
16295 ;
16296 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16297 relocation += htab->sec_info[sec->id].toc_off;
16298 else
16299 unresolved_reloc = TRUE;
16300 goto dodyn;
16301
16302 /* TOC16 relocs. We want the offset relative to the TOC base,
16303 which is the address of the start of the TOC plus 0x8000.
16304 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16305 in this order. */
16306 case R_PPC64_TOC16:
16307 case R_PPC64_TOC16_LO:
16308 case R_PPC64_TOC16_HI:
16309 case R_PPC64_TOC16_DS:
16310 case R_PPC64_TOC16_LO_DS:
16311 case R_PPC64_TOC16_HA:
16312 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
16313 if (h != NULL)
16314 goto dodyn;
16315 break;
16316
16317 /* Relocate against the beginning of the section. */
16318 case R_PPC64_SECTOFF:
16319 case R_PPC64_SECTOFF_LO:
16320 case R_PPC64_SECTOFF_HI:
16321 case R_PPC64_SECTOFF_DS:
16322 case R_PPC64_SECTOFF_LO_DS:
16323 case R_PPC64_SECTOFF_HA:
16324 if (sec != NULL)
16325 addend -= sec->output_section->vma;
16326 break;
16327
16328 case R_PPC64_REL16:
16329 case R_PPC64_REL16_LO:
16330 case R_PPC64_REL16_HI:
16331 case R_PPC64_REL16_HA:
16332 case R_PPC64_REL16_HIGH:
16333 case R_PPC64_REL16_HIGHA:
16334 case R_PPC64_REL16_HIGHER:
16335 case R_PPC64_REL16_HIGHERA:
16336 case R_PPC64_REL16_HIGHEST:
16337 case R_PPC64_REL16_HIGHESTA:
16338 case R_PPC64_REL16_HIGHER34:
16339 case R_PPC64_REL16_HIGHERA34:
16340 case R_PPC64_REL16_HIGHEST34:
16341 case R_PPC64_REL16_HIGHESTA34:
16342 case R_PPC64_REL16DX_HA:
16343 case R_PPC64_REL14:
16344 case R_PPC64_REL14_BRNTAKEN:
16345 case R_PPC64_REL14_BRTAKEN:
16346 case R_PPC64_REL24:
16347 case R_PPC64_REL24_NOTOC:
16348 case R_PPC64_PCREL34:
16349 case R_PPC64_PCREL28:
16350 break;
16351
16352 case R_PPC64_TPREL16:
16353 case R_PPC64_TPREL16_LO:
16354 case R_PPC64_TPREL16_HI:
16355 case R_PPC64_TPREL16_HA:
16356 case R_PPC64_TPREL16_DS:
16357 case R_PPC64_TPREL16_LO_DS:
16358 case R_PPC64_TPREL16_HIGH:
16359 case R_PPC64_TPREL16_HIGHA:
16360 case R_PPC64_TPREL16_HIGHER:
16361 case R_PPC64_TPREL16_HIGHERA:
16362 case R_PPC64_TPREL16_HIGHEST:
16363 case R_PPC64_TPREL16_HIGHESTA:
16364 case R_PPC64_TPREL34:
16365 if (h != NULL
16366 && h->elf.root.type == bfd_link_hash_undefweak
16367 && h->elf.dynindx == -1)
16368 {
16369 /* Make this relocation against an undefined weak symbol
16370 resolve to zero. This is really just a tweak, since
16371 code using weak externs ought to check that they are
16372 defined before using them. */
16373 bfd_byte *p = contents + rel->r_offset - d_offset;
16374
16375 insn = bfd_get_32 (input_bfd, p);
16376 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16377 if (insn != 0)
16378 bfd_put_32 (input_bfd, insn, p);
16379 break;
16380 }
16381 if (htab->elf.tls_sec != NULL)
16382 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16383 /* The TPREL16 relocs shouldn't really be used in shared
16384 libs or with non-local symbols as that will result in
16385 DT_TEXTREL being set, but support them anyway. */
16386 goto dodyn;
16387
16388 case R_PPC64_DTPREL16:
16389 case R_PPC64_DTPREL16_LO:
16390 case R_PPC64_DTPREL16_HI:
16391 case R_PPC64_DTPREL16_HA:
16392 case R_PPC64_DTPREL16_DS:
16393 case R_PPC64_DTPREL16_LO_DS:
16394 case R_PPC64_DTPREL16_HIGH:
16395 case R_PPC64_DTPREL16_HIGHA:
16396 case R_PPC64_DTPREL16_HIGHER:
16397 case R_PPC64_DTPREL16_HIGHERA:
16398 case R_PPC64_DTPREL16_HIGHEST:
16399 case R_PPC64_DTPREL16_HIGHESTA:
16400 case R_PPC64_DTPREL34:
16401 if (htab->elf.tls_sec != NULL)
16402 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16403 break;
16404
16405 case R_PPC64_ADDR64_LOCAL:
16406 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16407 ? h->elf.other
16408 : sym->st_other);
16409 break;
16410
16411 case R_PPC64_DTPMOD64:
16412 relocation = 1;
16413 addend = 0;
16414 goto dodyn;
16415
16416 case R_PPC64_TPREL64:
16417 if (htab->elf.tls_sec != NULL)
16418 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16419 goto dodyn;
16420
16421 case R_PPC64_DTPREL64:
16422 if (htab->elf.tls_sec != NULL)
16423 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16424 /* Fall through. */
16425
16426 /* Relocations that may need to be propagated if this is a
16427 dynamic object. */
16428 case R_PPC64_REL30:
16429 case R_PPC64_REL32:
16430 case R_PPC64_REL64:
16431 case R_PPC64_ADDR14:
16432 case R_PPC64_ADDR14_BRNTAKEN:
16433 case R_PPC64_ADDR14_BRTAKEN:
16434 case R_PPC64_ADDR16:
16435 case R_PPC64_ADDR16_DS:
16436 case R_PPC64_ADDR16_HA:
16437 case R_PPC64_ADDR16_HI:
16438 case R_PPC64_ADDR16_HIGH:
16439 case R_PPC64_ADDR16_HIGHA:
16440 case R_PPC64_ADDR16_HIGHER:
16441 case R_PPC64_ADDR16_HIGHERA:
16442 case R_PPC64_ADDR16_HIGHEST:
16443 case R_PPC64_ADDR16_HIGHESTA:
16444 case R_PPC64_ADDR16_LO:
16445 case R_PPC64_ADDR16_LO_DS:
16446 case R_PPC64_ADDR16_HIGHER34:
16447 case R_PPC64_ADDR16_HIGHERA34:
16448 case R_PPC64_ADDR16_HIGHEST34:
16449 case R_PPC64_ADDR16_HIGHESTA34:
16450 case R_PPC64_ADDR24:
16451 case R_PPC64_ADDR32:
16452 case R_PPC64_ADDR64:
16453 case R_PPC64_UADDR16:
16454 case R_PPC64_UADDR32:
16455 case R_PPC64_UADDR64:
16456 case R_PPC64_D34:
16457 case R_PPC64_D34_LO:
16458 case R_PPC64_D34_HI30:
16459 case R_PPC64_D34_HA30:
16460 case R_PPC64_D28:
16461 dodyn:
16462 if ((input_section->flags & SEC_ALLOC) == 0)
16463 break;
16464
16465 if (NO_OPD_RELOCS && is_opd)
16466 break;
16467
16468 if (bfd_link_pic (info)
16469 ? ((h == NULL
16470 || h->elf.dyn_relocs != NULL)
16471 && ((h != NULL && pc_dynrelocs (h))
16472 || must_be_dyn_reloc (info, r_type)))
16473 : (h != NULL
16474 ? h->elf.dyn_relocs != NULL
16475 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16476 {
16477 bfd_boolean skip, relocate;
16478 asection *sreloc;
16479 bfd_vma out_off;
16480 long indx = 0;
16481
16482 /* When generating a dynamic object, these relocations
16483 are copied into the output file to be resolved at run
16484 time. */
16485
16486 skip = FALSE;
16487 relocate = FALSE;
16488
16489 out_off = _bfd_elf_section_offset (output_bfd, info,
16490 input_section, rel->r_offset);
16491 if (out_off == (bfd_vma) -1)
16492 skip = TRUE;
16493 else if (out_off == (bfd_vma) -2)
16494 skip = TRUE, relocate = TRUE;
16495 out_off += (input_section->output_section->vma
16496 + input_section->output_offset);
16497 outrel.r_offset = out_off;
16498 outrel.r_addend = rel->r_addend;
16499
16500 /* Optimize unaligned reloc use. */
16501 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16502 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16503 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16504 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16505 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16506 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16507 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16508 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16509 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16510
16511 if (skip)
16512 memset (&outrel, 0, sizeof outrel);
16513 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16514 && !is_opd
16515 && r_type != R_PPC64_TOC)
16516 {
16517 indx = h->elf.dynindx;
16518 BFD_ASSERT (indx != -1);
16519 outrel.r_info = ELF64_R_INFO (indx, r_type);
16520 }
16521 else
16522 {
16523 /* This symbol is local, or marked to become local,
16524 or this is an opd section reloc which must point
16525 at a local function. */
16526 outrel.r_addend += relocation;
16527 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16528 {
16529 if (is_opd && h != NULL)
16530 {
16531 /* Lie about opd entries. This case occurs
16532 when building shared libraries and we
16533 reference a function in another shared
16534 lib. The same thing happens for a weak
16535 definition in an application that's
16536 overridden by a strong definition in a
16537 shared lib. (I believe this is a generic
16538 bug in binutils handling of weak syms.)
16539 In these cases we won't use the opd
16540 entry in this lib. */
16541 unresolved_reloc = FALSE;
16542 }
16543 if (!is_opd
16544 && r_type == R_PPC64_ADDR64
16545 && (h != NULL
16546 ? h->elf.type == STT_GNU_IFUNC
16547 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16548 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16549 else
16550 {
16551 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16552
16553 /* We need to relocate .opd contents for ld.so.
16554 Prelink also wants simple and consistent rules
16555 for relocs. This make all RELATIVE relocs have
16556 *r_offset equal to r_addend. */
16557 relocate = TRUE;
16558 }
16559 }
16560 else
16561 {
16562 if (h != NULL
16563 ? h->elf.type == STT_GNU_IFUNC
16564 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16565 {
16566 info->callbacks->einfo
16567 /* xgettext:c-format */
16568 (_("%H: %s for indirect "
16569 "function `%pT' unsupported\n"),
16570 input_bfd, input_section, rel->r_offset,
16571 ppc64_elf_howto_table[r_type]->name,
16572 sym_name);
16573 ret = FALSE;
16574 }
16575 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16576 ;
16577 else if (sec == NULL || sec->owner == NULL)
16578 {
16579 bfd_set_error (bfd_error_bad_value);
16580 return FALSE;
16581 }
16582 else
16583 {
16584 asection *osec = sec->output_section;
16585
16586 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16587 {
16588 /* TLS symbol values are relative to the
16589 TLS segment. Dynamic relocations for
16590 local TLS symbols therefore can't be
16591 reduced to a relocation against their
16592 section symbol because it holds the
16593 address of the section, not a value
16594 relative to the TLS segment. We could
16595 change the .tdata dynamic section symbol
16596 to be zero value but STN_UNDEF works
16597 and is used elsewhere, eg. for TPREL64
16598 GOT relocs against local TLS symbols. */
16599 osec = htab->elf.tls_sec;
16600 indx = 0;
16601 }
16602 else
16603 {
16604 indx = elf_section_data (osec)->dynindx;
16605 if (indx == 0)
16606 {
16607 if ((osec->flags & SEC_READONLY) == 0
16608 && htab->elf.data_index_section != NULL)
16609 osec = htab->elf.data_index_section;
16610 else
16611 osec = htab->elf.text_index_section;
16612 indx = elf_section_data (osec)->dynindx;
16613 }
16614 BFD_ASSERT (indx != 0);
16615 }
16616
16617 /* We are turning this relocation into one
16618 against a section symbol, so subtract out
16619 the output section's address but not the
16620 offset of the input section in the output
16621 section. */
16622 outrel.r_addend -= osec->vma;
16623 }
16624
16625 outrel.r_info = ELF64_R_INFO (indx, r_type);
16626 }
16627 }
16628
16629 sreloc = elf_section_data (input_section)->sreloc;
16630 if (h != NULL
16631 ? h->elf.type == STT_GNU_IFUNC
16632 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16633 {
16634 sreloc = htab->elf.irelplt;
16635 if (indx == 0 || is_static_defined (&h->elf))
16636 htab->local_ifunc_resolver = 1;
16637 }
16638 if (sreloc == NULL)
16639 abort ();
16640
16641 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16642 >= sreloc->size)
16643 abort ();
16644 loc = sreloc->contents;
16645 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16646 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16647
16648 if (!warned_dynamic
16649 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16650 {
16651 info->callbacks->einfo
16652 /* xgettext:c-format */
16653 (_("%X%P: %pB: %s against %pT "
16654 "is not supported by glibc as a dynamic relocation\n"),
16655 input_bfd,
16656 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16657 sym_name);
16658 warned_dynamic = TRUE;
16659 }
16660
16661 /* If this reloc is against an external symbol, it will
16662 be computed at runtime, so there's no need to do
16663 anything now. However, for the sake of prelink ensure
16664 that the section contents are a known value. */
16665 if (!relocate)
16666 {
16667 unresolved_reloc = FALSE;
16668 /* The value chosen here is quite arbitrary as ld.so
16669 ignores section contents except for the special
16670 case of .opd where the contents might be accessed
16671 before relocation. Choose zero, as that won't
16672 cause reloc overflow. */
16673 relocation = 0;
16674 addend = 0;
16675 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16676 to improve backward compatibility with older
16677 versions of ld. */
16678 if (r_type == R_PPC64_ADDR64)
16679 addend = outrel.r_addend;
16680 /* Adjust pc_relative relocs to have zero in *r_offset. */
16681 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16682 addend = outrel.r_offset;
16683 }
16684 }
16685 break;
16686
16687 case R_PPC64_COPY:
16688 case R_PPC64_GLOB_DAT:
16689 case R_PPC64_JMP_SLOT:
16690 case R_PPC64_JMP_IREL:
16691 case R_PPC64_RELATIVE:
16692 /* We shouldn't ever see these dynamic relocs in relocatable
16693 files. */
16694 /* Fall through. */
16695
16696 case R_PPC64_PLTGOT16:
16697 case R_PPC64_PLTGOT16_DS:
16698 case R_PPC64_PLTGOT16_HA:
16699 case R_PPC64_PLTGOT16_HI:
16700 case R_PPC64_PLTGOT16_LO:
16701 case R_PPC64_PLTGOT16_LO_DS:
16702 case R_PPC64_PLTREL32:
16703 case R_PPC64_PLTREL64:
16704 /* These ones haven't been implemented yet. */
16705
16706 info->callbacks->einfo
16707 /* xgettext:c-format */
16708 (_("%P: %pB: %s is not supported for `%pT'\n"),
16709 input_bfd,
16710 ppc64_elf_howto_table[r_type]->name, sym_name);
16711
16712 bfd_set_error (bfd_error_invalid_operation);
16713 ret = FALSE;
16714 goto copy_reloc;
16715 }
16716
16717 /* Multi-instruction sequences that access the TOC can be
16718 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16719 to nop; addi rb,r2,x; */
16720 switch (r_type)
16721 {
16722 default:
16723 break;
16724
16725 case R_PPC64_GOT_TLSLD16_HI:
16726 case R_PPC64_GOT_TLSGD16_HI:
16727 case R_PPC64_GOT_TPREL16_HI:
16728 case R_PPC64_GOT_DTPREL16_HI:
16729 case R_PPC64_GOT16_HI:
16730 case R_PPC64_TOC16_HI:
16731 /* These relocs would only be useful if building up an
16732 offset to later add to r2, perhaps in an indexed
16733 addressing mode instruction. Don't try to optimize.
16734 Unfortunately, the possibility of someone building up an
16735 offset like this or even with the HA relocs, means that
16736 we need to check the high insn when optimizing the low
16737 insn. */
16738 break;
16739
16740 case R_PPC64_PLTCALL_NOTOC:
16741 if (!unresolved_reloc)
16742 htab->notoc_plt = 1;
16743 /* Fall through. */
16744 case R_PPC64_PLTCALL:
16745 if (unresolved_reloc)
16746 {
16747 /* No plt entry. Make this into a direct call. */
16748 bfd_byte *p = contents + rel->r_offset;
16749 insn = bfd_get_32 (input_bfd, p);
16750 insn &= 1;
16751 bfd_put_32 (input_bfd, B_DOT | insn, p);
16752 if (r_type == R_PPC64_PLTCALL)
16753 bfd_put_32 (input_bfd, NOP, p + 4);
16754 unresolved_reloc = save_unresolved_reloc;
16755 r_type = R_PPC64_REL24;
16756 }
16757 break;
16758
16759 case R_PPC64_PLTSEQ_NOTOC:
16760 case R_PPC64_PLTSEQ:
16761 if (unresolved_reloc)
16762 {
16763 unresolved_reloc = FALSE;
16764 goto nop_it;
16765 }
16766 break;
16767
16768 case R_PPC64_PLT_PCREL34_NOTOC:
16769 if (!unresolved_reloc)
16770 htab->notoc_plt = 1;
16771 /* Fall through. */
16772 case R_PPC64_PLT_PCREL34:
16773 if (unresolved_reloc)
16774 {
16775 bfd_byte *p = contents + rel->r_offset;
16776 bfd_put_32 (input_bfd, PNOP >> 32, p);
16777 bfd_put_32 (input_bfd, PNOP, p + 4);
16778 unresolved_reloc = FALSE;
16779 goto copy_reloc;
16780 }
16781 break;
16782
16783 case R_PPC64_PLT16_HA:
16784 if (unresolved_reloc)
16785 {
16786 unresolved_reloc = FALSE;
16787 goto nop_it;
16788 }
16789 /* Fall through. */
16790 case R_PPC64_GOT_TLSLD16_HA:
16791 case R_PPC64_GOT_TLSGD16_HA:
16792 case R_PPC64_GOT_TPREL16_HA:
16793 case R_PPC64_GOT_DTPREL16_HA:
16794 case R_PPC64_GOT16_HA:
16795 case R_PPC64_TOC16_HA:
16796 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16797 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16798 {
16799 bfd_byte *p;
16800 nop_it:
16801 p = contents + (rel->r_offset & ~3);
16802 bfd_put_32 (input_bfd, NOP, p);
16803 goto copy_reloc;
16804 }
16805 break;
16806
16807 case R_PPC64_PLT16_LO:
16808 case R_PPC64_PLT16_LO_DS:
16809 if (unresolved_reloc)
16810 {
16811 unresolved_reloc = FALSE;
16812 goto nop_it;
16813 }
16814 /* Fall through. */
16815 case R_PPC64_GOT_TLSLD16_LO:
16816 case R_PPC64_GOT_TLSGD16_LO:
16817 case R_PPC64_GOT_TPREL16_LO_DS:
16818 case R_PPC64_GOT_DTPREL16_LO_DS:
16819 case R_PPC64_GOT16_LO:
16820 case R_PPC64_GOT16_LO_DS:
16821 case R_PPC64_TOC16_LO:
16822 case R_PPC64_TOC16_LO_DS:
16823 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16824 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16825 {
16826 bfd_byte *p = contents + (rel->r_offset & ~3);
16827 insn = bfd_get_32 (input_bfd, p);
16828 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
16829 {
16830 /* Transform addic to addi when we change reg. */
16831 insn &= ~((0x3fu << 26) | (0x1f << 16));
16832 insn |= (14u << 26) | (2 << 16);
16833 }
16834 else
16835 {
16836 insn &= ~(0x1f << 16);
16837 insn |= 2 << 16;
16838 }
16839 bfd_put_32 (input_bfd, insn, p);
16840 }
16841 break;
16842
16843 case R_PPC64_TPREL16_HA:
16844 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16845 {
16846 bfd_byte *p = contents + (rel->r_offset & ~3);
16847 insn = bfd_get_32 (input_bfd, p);
16848 if ((insn & ((0x3fu << 26) | 0x1f << 16))
16849 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16850 /* xgettext:c-format */
16851 info->callbacks->minfo
16852 (_("%H: warning: %s unexpected insn %#x.\n"),
16853 input_bfd, input_section, rel->r_offset,
16854 ppc64_elf_howto_table[r_type]->name, insn);
16855 else
16856 {
16857 bfd_put_32 (input_bfd, NOP, p);
16858 goto copy_reloc;
16859 }
16860 }
16861 break;
16862
16863 case R_PPC64_TPREL16_LO:
16864 case R_PPC64_TPREL16_LO_DS:
16865 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16866 {
16867 bfd_byte *p = contents + (rel->r_offset & ~3);
16868 insn = bfd_get_32 (input_bfd, p);
16869 insn &= ~(0x1f << 16);
16870 insn |= 13 << 16;
16871 bfd_put_32 (input_bfd, insn, p);
16872 }
16873 break;
16874 }
16875
16876 /* Do any further special processing. */
16877 switch (r_type)
16878 {
16879 default:
16880 break;
16881
16882 case R_PPC64_REL16_HA:
16883 case R_PPC64_REL16_HIGHA:
16884 case R_PPC64_REL16_HIGHERA:
16885 case R_PPC64_REL16_HIGHESTA:
16886 case R_PPC64_REL16DX_HA:
16887 case R_PPC64_ADDR16_HA:
16888 case R_PPC64_ADDR16_HIGHA:
16889 case R_PPC64_ADDR16_HIGHERA:
16890 case R_PPC64_ADDR16_HIGHESTA:
16891 case R_PPC64_TOC16_HA:
16892 case R_PPC64_SECTOFF_HA:
16893 case R_PPC64_TPREL16_HA:
16894 case R_PPC64_TPREL16_HIGHA:
16895 case R_PPC64_TPREL16_HIGHERA:
16896 case R_PPC64_TPREL16_HIGHESTA:
16897 case R_PPC64_DTPREL16_HA:
16898 case R_PPC64_DTPREL16_HIGHA:
16899 case R_PPC64_DTPREL16_HIGHERA:
16900 case R_PPC64_DTPREL16_HIGHESTA:
16901 /* It's just possible that this symbol is a weak symbol
16902 that's not actually defined anywhere. In that case,
16903 'sec' would be NULL, and we should leave the symbol
16904 alone (it will be set to zero elsewhere in the link). */
16905 if (sec == NULL)
16906 break;
16907 /* Fall through. */
16908
16909 case R_PPC64_GOT16_HA:
16910 case R_PPC64_PLTGOT16_HA:
16911 case R_PPC64_PLT16_HA:
16912 case R_PPC64_GOT_TLSGD16_HA:
16913 case R_PPC64_GOT_TLSLD16_HA:
16914 case R_PPC64_GOT_TPREL16_HA:
16915 case R_PPC64_GOT_DTPREL16_HA:
16916 /* Add 0x10000 if sign bit in 0:15 is set.
16917 Bits 0:15 are not used. */
16918 addend += 0x8000;
16919 break;
16920
16921 case R_PPC64_D34_HA30:
16922 case R_PPC64_ADDR16_HIGHERA34:
16923 case R_PPC64_ADDR16_HIGHESTA34:
16924 case R_PPC64_REL16_HIGHERA34:
16925 case R_PPC64_REL16_HIGHESTA34:
16926 if (sec != NULL)
16927 addend += 1ULL << 33;
16928 break;
16929
16930 case R_PPC64_ADDR16_DS:
16931 case R_PPC64_ADDR16_LO_DS:
16932 case R_PPC64_GOT16_DS:
16933 case R_PPC64_GOT16_LO_DS:
16934 case R_PPC64_PLT16_LO_DS:
16935 case R_PPC64_SECTOFF_DS:
16936 case R_PPC64_SECTOFF_LO_DS:
16937 case R_PPC64_TOC16_DS:
16938 case R_PPC64_TOC16_LO_DS:
16939 case R_PPC64_PLTGOT16_DS:
16940 case R_PPC64_PLTGOT16_LO_DS:
16941 case R_PPC64_GOT_TPREL16_DS:
16942 case R_PPC64_GOT_TPREL16_LO_DS:
16943 case R_PPC64_GOT_DTPREL16_DS:
16944 case R_PPC64_GOT_DTPREL16_LO_DS:
16945 case R_PPC64_TPREL16_DS:
16946 case R_PPC64_TPREL16_LO_DS:
16947 case R_PPC64_DTPREL16_DS:
16948 case R_PPC64_DTPREL16_LO_DS:
16949 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16950 mask = 3;
16951 /* If this reloc is against an lq, lxv, or stxv insn, then
16952 the value must be a multiple of 16. This is somewhat of
16953 a hack, but the "correct" way to do this by defining _DQ
16954 forms of all the _DS relocs bloats all reloc switches in
16955 this file. It doesn't make much sense to use these
16956 relocs in data, so testing the insn should be safe. */
16957 if ((insn & (0x3fu << 26)) == (56u << 26)
16958 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
16959 mask = 15;
16960 relocation += addend;
16961 addend = insn & (mask ^ 3);
16962 if ((relocation & mask) != 0)
16963 {
16964 relocation ^= relocation & mask;
16965 info->callbacks->einfo
16966 /* xgettext:c-format */
16967 (_("%H: error: %s not a multiple of %u\n"),
16968 input_bfd, input_section, rel->r_offset,
16969 ppc64_elf_howto_table[r_type]->name,
16970 mask + 1);
16971 bfd_set_error (bfd_error_bad_value);
16972 ret = FALSE;
16973 goto copy_reloc;
16974 }
16975 break;
16976 }
16977
16978 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16979 because such sections are not SEC_ALLOC and thus ld.so will
16980 not process them. */
16981 howto = ppc64_elf_howto_table[(int) r_type];
16982 if (unresolved_reloc
16983 && !((input_section->flags & SEC_DEBUGGING) != 0
16984 && h->elf.def_dynamic)
16985 && _bfd_elf_section_offset (output_bfd, info, input_section,
16986 rel->r_offset) != (bfd_vma) -1)
16987 {
16988 info->callbacks->einfo
16989 /* xgettext:c-format */
16990 (_("%H: unresolvable %s against `%pT'\n"),
16991 input_bfd, input_section, rel->r_offset,
16992 howto->name,
16993 h->elf.root.root.string);
16994 ret = FALSE;
16995 }
16996
16997 /* 16-bit fields in insns mostly have signed values, but a
16998 few insns have 16-bit unsigned values. Really, we should
16999 have different reloc types. */
17000 if (howto->complain_on_overflow != complain_overflow_dont
17001 && howto->dst_mask == 0xffff
17002 && (input_section->flags & SEC_CODE) != 0)
17003 {
17004 enum complain_overflow complain = complain_overflow_signed;
17005
17006 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17007 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
17008 complain = complain_overflow_bitfield;
17009 else if (howto->rightshift == 0
17010 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17011 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17012 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17013 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17014 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17015 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
17016 complain = complain_overflow_unsigned;
17017 if (howto->complain_on_overflow != complain)
17018 {
17019 alt_howto = *howto;
17020 alt_howto.complain_on_overflow = complain;
17021 howto = &alt_howto;
17022 }
17023 }
17024
17025 switch (r_type)
17026 {
17027 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17028 case R_PPC64_D34:
17029 case R_PPC64_D34_LO:
17030 case R_PPC64_D34_HI30:
17031 case R_PPC64_D34_HA30:
17032 case R_PPC64_PCREL34:
17033 case R_PPC64_GOT_PCREL34:
17034 case R_PPC64_TPREL34:
17035 case R_PPC64_DTPREL34:
17036 case R_PPC64_GOT_TLSGD_PCREL34:
17037 case R_PPC64_GOT_TLSLD_PCREL34:
17038 case R_PPC64_GOT_TPREL_PCREL34:
17039 case R_PPC64_GOT_DTPREL_PCREL34:
17040 case R_PPC64_PLT_PCREL34:
17041 case R_PPC64_PLT_PCREL34_NOTOC:
17042 case R_PPC64_D28:
17043 case R_PPC64_PCREL28:
17044 if (rel->r_offset + 8 > input_section->size)
17045 r = bfd_reloc_outofrange;
17046 else
17047 {
17048 relocation += addend;
17049 if (howto->pc_relative)
17050 relocation -= (rel->r_offset
17051 + input_section->output_offset
17052 + input_section->output_section->vma);
17053 relocation >>= howto->rightshift;
17054
17055 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17056 pinsn <<= 32;
17057 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17058
17059 pinsn &= ~howto->dst_mask;
17060 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17061 & howto->dst_mask);
17062 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17063 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17064 r = bfd_reloc_ok;
17065 if (howto->complain_on_overflow == complain_overflow_signed
17066 && (relocation + (1ULL << (howto->bitsize - 1))
17067 >= 1ULL << howto->bitsize))
17068 r = bfd_reloc_overflow;
17069 }
17070 break;
17071
17072 case R_PPC64_REL16DX_HA:
17073 if (rel->r_offset + 4 > input_section->size)
17074 r = bfd_reloc_outofrange;
17075 else
17076 {
17077 relocation += addend;
17078 relocation -= (rel->r_offset
17079 + input_section->output_offset
17080 + input_section->output_section->vma);
17081 relocation = (bfd_signed_vma) relocation >> 16;
17082 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17083 insn &= ~0x1fffc1;
17084 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
17085 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17086 r = bfd_reloc_ok;
17087 if (relocation + 0x8000 > 0xffff)
17088 r = bfd_reloc_overflow;
17089 }
17090 break;
17091
17092 default:
17093 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17094 contents, rel->r_offset,
17095 relocation, addend);
17096 }
17097
17098 if (r != bfd_reloc_ok)
17099 {
17100 char *more_info = NULL;
17101 const char *reloc_name = howto->name;
17102
17103 if (reloc_dest != DEST_NORMAL)
17104 {
17105 more_info = bfd_malloc (strlen (reloc_name) + 8);
17106 if (more_info != NULL)
17107 {
17108 strcpy (more_info, reloc_name);
17109 strcat (more_info, (reloc_dest == DEST_OPD
17110 ? " (OPD)" : " (stub)"));
17111 reloc_name = more_info;
17112 }
17113 }
17114
17115 if (r == bfd_reloc_overflow)
17116 {
17117 /* On code like "if (foo) foo();" don't report overflow
17118 on a branch to zero when foo is undefined. */
17119 if (!warned
17120 && (reloc_dest == DEST_STUB
17121 || !(h != NULL
17122 && (h->elf.root.type == bfd_link_hash_undefweak
17123 || h->elf.root.type == bfd_link_hash_undefined)
17124 && is_branch_reloc (r_type))))
17125 info->callbacks->reloc_overflow (info, &h->elf.root,
17126 sym_name, reloc_name,
17127 orig_rel.r_addend,
17128 input_bfd, input_section,
17129 rel->r_offset);
17130 }
17131 else
17132 {
17133 info->callbacks->einfo
17134 /* xgettext:c-format */
17135 (_("%H: %s against `%pT': error %d\n"),
17136 input_bfd, input_section, rel->r_offset,
17137 reloc_name, sym_name, (int) r);
17138 ret = FALSE;
17139 }
17140 free (more_info);
17141 }
17142 copy_reloc:
17143 if (wrel != rel)
17144 *wrel = *rel;
17145 }
17146
17147 if (wrel != rel)
17148 {
17149 Elf_Internal_Shdr *rel_hdr;
17150 size_t deleted = rel - wrel;
17151
17152 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17153 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17154 if (rel_hdr->sh_size == 0)
17155 {
17156 /* It is too late to remove an empty reloc section. Leave
17157 one NONE reloc.
17158 ??? What is wrong with an empty section??? */
17159 rel_hdr->sh_size = rel_hdr->sh_entsize;
17160 deleted -= 1;
17161 }
17162 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17163 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17164 input_section->reloc_count -= deleted;
17165 }
17166
17167 /* If we're emitting relocations, then shortly after this function
17168 returns, reloc offsets and addends for this section will be
17169 adjusted. Worse, reloc symbol indices will be for the output
17170 file rather than the input. Save a copy of the relocs for
17171 opd_entry_value. */
17172 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
17173 {
17174 bfd_size_type amt;
17175 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17176 rel = bfd_alloc (input_bfd, amt);
17177 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17178 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
17179 if (rel == NULL)
17180 return FALSE;
17181 memcpy (rel, relocs, amt);
17182 }
17183 return ret;
17184 }
17185
17186 /* Adjust the value of any local symbols in opd sections. */
17187
17188 static int
17189 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17190 const char *name ATTRIBUTE_UNUSED,
17191 Elf_Internal_Sym *elfsym,
17192 asection *input_sec,
17193 struct elf_link_hash_entry *h)
17194 {
17195 struct _opd_sec_data *opd;
17196 long adjust;
17197 bfd_vma value;
17198
17199 if (h != NULL)
17200 return 1;
17201
17202 opd = get_opd_info (input_sec);
17203 if (opd == NULL || opd->adjust == NULL)
17204 return 1;
17205
17206 value = elfsym->st_value - input_sec->output_offset;
17207 if (!bfd_link_relocatable (info))
17208 value -= input_sec->output_section->vma;
17209
17210 adjust = opd->adjust[OPD_NDX (value)];
17211 if (adjust == -1)
17212 return 2;
17213
17214 elfsym->st_value += adjust;
17215 return 1;
17216 }
17217
17218 /* Finish up dynamic symbol handling. We set the contents of various
17219 dynamic sections here. */
17220
17221 static bfd_boolean
17222 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17223 struct bfd_link_info *info,
17224 struct elf_link_hash_entry *h,
17225 Elf_Internal_Sym *sym)
17226 {
17227 struct ppc_link_hash_table *htab;
17228 struct plt_entry *ent;
17229
17230 htab = ppc_hash_table (info);
17231 if (htab == NULL)
17232 return FALSE;
17233
17234 if (!htab->opd_abi && !h->def_regular)
17235 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17236 if (ent->plt.offset != (bfd_vma) -1)
17237 {
17238 /* Mark the symbol as undefined, rather than as
17239 defined in glink. Leave the value if there were
17240 any relocations where pointer equality matters
17241 (this is a clue for the dynamic linker, to make
17242 function pointer comparisons work between an
17243 application and shared library), otherwise set it
17244 to zero. */
17245 sym->st_shndx = SHN_UNDEF;
17246 if (!h->pointer_equality_needed)
17247 sym->st_value = 0;
17248 else if (!h->ref_regular_nonweak)
17249 {
17250 /* This breaks function pointer comparisons, but
17251 that is better than breaking tests for a NULL
17252 function pointer. */
17253 sym->st_value = 0;
17254 }
17255 break;
17256 }
17257
17258 if (h->needs_copy
17259 && (h->root.type == bfd_link_hash_defined
17260 || h->root.type == bfd_link_hash_defweak)
17261 && (h->root.u.def.section == htab->elf.sdynbss
17262 || h->root.u.def.section == htab->elf.sdynrelro))
17263 {
17264 /* This symbol needs a copy reloc. Set it up. */
17265 Elf_Internal_Rela rela;
17266 asection *srel;
17267 bfd_byte *loc;
17268
17269 if (h->dynindx == -1)
17270 abort ();
17271
17272 rela.r_offset = defined_sym_val (h);
17273 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17274 rela.r_addend = 0;
17275 if (h->root.u.def.section == htab->elf.sdynrelro)
17276 srel = htab->elf.sreldynrelro;
17277 else
17278 srel = htab->elf.srelbss;
17279 loc = srel->contents;
17280 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
17281 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
17282 }
17283
17284 return TRUE;
17285 }
17286
17287 /* Used to decide how to sort relocs in an optimal manner for the
17288 dynamic linker, before writing them out. */
17289
17290 static enum elf_reloc_type_class
17291 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17292 const asection *rel_sec,
17293 const Elf_Internal_Rela *rela)
17294 {
17295 enum elf_ppc64_reloc_type r_type;
17296 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17297
17298 if (rel_sec == htab->elf.irelplt)
17299 return reloc_class_ifunc;
17300
17301 r_type = ELF64_R_TYPE (rela->r_info);
17302 switch (r_type)
17303 {
17304 case R_PPC64_RELATIVE:
17305 return reloc_class_relative;
17306 case R_PPC64_JMP_SLOT:
17307 return reloc_class_plt;
17308 case R_PPC64_COPY:
17309 return reloc_class_copy;
17310 default:
17311 return reloc_class_normal;
17312 }
17313 }
17314
17315 /* Finish up the dynamic sections. */
17316
17317 static bfd_boolean
17318 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17319 struct bfd_link_info *info)
17320 {
17321 struct ppc_link_hash_table *htab;
17322 bfd *dynobj;
17323 asection *sdyn;
17324
17325 htab = ppc_hash_table (info);
17326 if (htab == NULL)
17327 return FALSE;
17328
17329 dynobj = htab->elf.dynobj;
17330 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
17331
17332 if (htab->elf.dynamic_sections_created)
17333 {
17334 Elf64_External_Dyn *dyncon, *dynconend;
17335
17336 if (sdyn == NULL || htab->elf.sgot == NULL)
17337 abort ();
17338
17339 dyncon = (Elf64_External_Dyn *) sdyn->contents;
17340 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
17341 for (; dyncon < dynconend; dyncon++)
17342 {
17343 Elf_Internal_Dyn dyn;
17344 asection *s;
17345
17346 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17347
17348 switch (dyn.d_tag)
17349 {
17350 default:
17351 continue;
17352
17353 case DT_PPC64_GLINK:
17354 s = htab->glink;
17355 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17356 /* We stupidly defined DT_PPC64_GLINK to be the start
17357 of glink rather than the first entry point, which is
17358 what ld.so needs, and now have a bigger stub to
17359 support automatic multiple TOCs. */
17360 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
17361 break;
17362
17363 case DT_PPC64_OPD:
17364 s = bfd_get_section_by_name (output_bfd, ".opd");
17365 if (s == NULL)
17366 continue;
17367 dyn.d_un.d_ptr = s->vma;
17368 break;
17369
17370 case DT_PPC64_OPT:
17371 if ((htab->do_multi_toc && htab->multi_toc_needed)
17372 || htab->notoc_plt)
17373 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
17374 if (htab->has_plt_localentry0)
17375 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
17376 break;
17377
17378 case DT_PPC64_OPDSZ:
17379 s = bfd_get_section_by_name (output_bfd, ".opd");
17380 if (s == NULL)
17381 continue;
17382 dyn.d_un.d_val = s->size;
17383 break;
17384
17385 case DT_PLTGOT:
17386 s = htab->elf.splt;
17387 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17388 break;
17389
17390 case DT_JMPREL:
17391 s = htab->elf.srelplt;
17392 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17393 break;
17394
17395 case DT_PLTRELSZ:
17396 dyn.d_un.d_val = htab->elf.srelplt->size;
17397 break;
17398
17399 case DT_TEXTREL:
17400 if (htab->local_ifunc_resolver)
17401 info->callbacks->einfo
17402 (_("%P: warning: text relocations and GNU indirect "
17403 "functions may result in a segfault at runtime\n"));
17404 continue;
17405 }
17406
17407 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
17408 }
17409 }
17410
17411 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17412 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
17413 {
17414 /* Fill in the first entry in the global offset table.
17415 We use it to hold the link-time TOCbase. */
17416 bfd_put_64 (output_bfd,
17417 elf_gp (output_bfd) + TOC_BASE_OFF,
17418 htab->elf.sgot->contents);
17419
17420 /* Set .got entry size. */
17421 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17422 = 8;
17423 }
17424
17425 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17426 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17427 {
17428 /* Set .plt entry size. */
17429 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17430 = PLT_ENTRY_SIZE (htab);
17431 }
17432
17433 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17434 brlt ourselves if emitrelocations. */
17435 if (htab->brlt != NULL
17436 && htab->brlt->reloc_count != 0
17437 && !_bfd_elf_link_output_relocs (output_bfd,
17438 htab->brlt,
17439 elf_section_data (htab->brlt)->rela.hdr,
17440 elf_section_data (htab->brlt)->relocs,
17441 NULL))
17442 return FALSE;
17443
17444 if (htab->glink != NULL
17445 && htab->glink->reloc_count != 0
17446 && !_bfd_elf_link_output_relocs (output_bfd,
17447 htab->glink,
17448 elf_section_data (htab->glink)->rela.hdr,
17449 elf_section_data (htab->glink)->relocs,
17450 NULL))
17451 return FALSE;
17452
17453
17454 if (htab->glink_eh_frame != NULL
17455 && htab->glink_eh_frame->size != 0
17456 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17457 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17458 htab->glink_eh_frame,
17459 htab->glink_eh_frame->contents))
17460 return FALSE;
17461
17462 /* We need to handle writing out multiple GOT sections ourselves,
17463 since we didn't add them to DYNOBJ. We know dynobj is the first
17464 bfd. */
17465 while ((dynobj = dynobj->link.next) != NULL)
17466 {
17467 asection *s;
17468
17469 if (!is_ppc64_elf (dynobj))
17470 continue;
17471
17472 s = ppc64_elf_tdata (dynobj)->got;
17473 if (s != NULL
17474 && s->size != 0
17475 && s->output_section != bfd_abs_section_ptr
17476 && !bfd_set_section_contents (output_bfd, s->output_section,
17477 s->contents, s->output_offset,
17478 s->size))
17479 return FALSE;
17480 s = ppc64_elf_tdata (dynobj)->relgot;
17481 if (s != NULL
17482 && s->size != 0
17483 && s->output_section != bfd_abs_section_ptr
17484 && !bfd_set_section_contents (output_bfd, s->output_section,
17485 s->contents, s->output_offset,
17486 s->size))
17487 return FALSE;
17488 }
17489
17490 return TRUE;
17491 }
17492
17493 #include "elf64-target.h"
17494
17495 /* FreeBSD support */
17496
17497 #undef TARGET_LITTLE_SYM
17498 #undef TARGET_LITTLE_NAME
17499
17500 #undef TARGET_BIG_SYM
17501 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17502 #undef TARGET_BIG_NAME
17503 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17504
17505 #undef ELF_OSABI
17506 #define ELF_OSABI ELFOSABI_FREEBSD
17507
17508 #undef elf64_bed
17509 #define elf64_bed elf64_powerpc_fbsd_bed
17510
17511 #include "elf64-target.h"