]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf64-ppc.c
PowerPC section flag tidy
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_prefix_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
57 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
58 static bfd_vma opd_entry_value
59 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
60
61 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
62 #define TARGET_LITTLE_NAME "elf64-powerpcle"
63 #define TARGET_BIG_SYM powerpc_elf64_vec
64 #define TARGET_BIG_NAME "elf64-powerpc"
65 #define ELF_ARCH bfd_arch_powerpc
66 #define ELF_TARGET_ID PPC64_ELF_DATA
67 #define ELF_MACHINE_CODE EM_PPC64
68 #define ELF_MAXPAGESIZE 0x10000
69 #define ELF_COMMONPAGESIZE 0x1000
70 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
71 #define elf_info_to_howto ppc64_elf_info_to_howto
72
73 #define elf_backend_want_got_sym 0
74 #define elf_backend_want_plt_sym 0
75 #define elf_backend_plt_alignment 3
76 #define elf_backend_plt_not_loaded 1
77 #define elf_backend_got_header_size 8
78 #define elf_backend_want_dynrelro 1
79 #define elf_backend_can_gc_sections 1
80 #define elf_backend_can_refcount 1
81 #define elf_backend_rela_normal 1
82 #define elf_backend_dtrel_excludes_plt 1
83 #define elf_backend_default_execstack 0
84
85 #define bfd_elf64_mkobject ppc64_elf_mkobject
86 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
87 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
88 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
89 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
90 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
91 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
92 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
93 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
94 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
95
96 #define elf_backend_object_p ppc64_elf_object_p
97 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
98 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
99 #define elf_backend_write_core_note ppc64_elf_write_core_note
100 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
101 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
102 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
103 #define elf_backend_check_directives ppc64_elf_before_check_relocs
104 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
105 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
106 #define elf_backend_check_relocs ppc64_elf_check_relocs
107 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
108 #define elf_backend_gc_keep ppc64_elf_gc_keep
109 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
110 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
111 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
112 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
113 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
114 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
115 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
116 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
117 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
118 #define elf_backend_action_discarded ppc64_elf_action_discarded
119 #define elf_backend_relocate_section ppc64_elf_relocate_section
120 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
121 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
122 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
123 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
124 #define elf_backend_special_sections ppc64_elf_special_sections
125 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
126 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
127 #define elf_backend_get_reloc_section bfd_get_section_by_name
128
129 /* The name of the dynamic interpreter. This is put in the .interp
130 section. */
131 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
132
133 /* The size in bytes of an entry in the procedure linkage table. */
134 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
135 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
136
137 /* The initial size of the plt reserved for the dynamic linker. */
138 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
139
140 /* Offsets to some stack save slots. */
141 #define STK_LR 16
142 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
143 /* This one is dodgy. ELFv2 does not have a linker word, so use the
144 CR save slot. Used only by optimised __tls_get_addr call stub,
145 relying on __tls_get_addr_opt not saving CR.. */
146 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
147
148 /* TOC base pointers offset from start of TOC. */
149 #define TOC_BASE_OFF 0x8000
150 /* TOC base alignment. */
151 #define TOC_BASE_ALIGN 256
152
153 /* Offset of tp and dtp pointers from start of TLS block. */
154 #define TP_OFFSET 0x7000
155 #define DTP_OFFSET 0x8000
156
157 /* .plt call stub instructions. The normal stub is like this, but
158 sometimes the .plt entry crosses a 64k boundary and we need to
159 insert an addi to adjust r11. */
160 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
161 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
162 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
163 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
164 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
165 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
166 #define BCTR 0x4e800420 /* bctr */
167
168 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
169 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
170 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
171 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
172 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
173
174 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
175 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
176 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
177 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
178 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
179 #define BNECTR 0x4ca20420 /* bnectr+ */
180 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
181
182 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
183 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
184 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
185
186 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
187 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
188 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
189
190 #define LI_R11_0 0x39600000 /* li %r11,0 */
191 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
192 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
193 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
194 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
195 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
196 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
197 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
198 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
199 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
200 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
201 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
202 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
203 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
204 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
205 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
206 #define PADDI_R12_PC 0x0610000039800000ULL
207 #define PLD_R12_PC 0x04100000e5800000ULL
208 #define PNOP 0x0700000000000000ULL
209
210 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
211 #define GLINK_PLTRESOLVE_SIZE(htab) \
212 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
213 /* 0: */
214 /* .quad plt0-1f */
215 /* __glink: */
216 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
217 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
218 /* 1: */
219 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
220 /* ld %2,(0b-1b)(%11) */
221 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
222 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
223 /* ld %12,0(%11) */
224 /* ld %2,8(%11) */
225 /* mtctr %12 */
226 /* ld %11,16(%11) */
227 /* bctr */
228 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
229 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
230 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
231 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
232 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
233
234 /* Pad with this. */
235 #define NOP 0x60000000
236
237 /* Some other nops. */
238 #define CROR_151515 0x4def7b82
239 #define CROR_313131 0x4ffffb82
240
241 /* .glink entries for the first 32k functions are two instructions. */
242 #define LI_R0_0 0x38000000 /* li %r0,0 */
243 #define B_DOT 0x48000000 /* b . */
244
245 /* After that, we need two instructions to load the index, followed by
246 a branch. */
247 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
248 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
249
250 /* Instructions used by the save and restore reg functions. */
251 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
252 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
253 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
254 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
255 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
256 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
257 #define LI_R12_0 0x39800000 /* li %r12,0 */
258 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
259 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
260 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
261 #define BLR 0x4e800020 /* blr */
262
263 /* Since .opd is an array of descriptors and each entry will end up
264 with identical R_PPC64_RELATIVE relocs, there is really no need to
265 propagate .opd relocs; The dynamic linker should be taught to
266 relocate .opd without reloc entries. */
267 #ifndef NO_OPD_RELOCS
268 #define NO_OPD_RELOCS 0
269 #endif
270
271 #ifndef ARRAY_SIZE
272 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
273 #endif
274
275 static inline int
276 abiversion (bfd *abfd)
277 {
278 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
279 }
280
281 static inline void
282 set_abiversion (bfd *abfd, int ver)
283 {
284 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
285 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
286 }
287 \f
288 /* Relocation HOWTO's. */
289 /* Like other ELF RELA targets that don't apply multiple
290 field-altering relocations to the same localation, src_mask is
291 always zero and pcrel_offset is the same as pc_relative.
292 PowerPC can always use a zero bitpos, even when the field is not at
293 the LSB. For example, a REL24 could use rightshift=2, bisize=24
294 and bitpos=2 which matches the ABI description, or as we do here,
295 rightshift=0, bitsize=26 and bitpos=0. */
296 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
297 complain, special_func) \
298 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
299 complain_overflow_ ## complain, special_func, \
300 #type, FALSE, 0, mask, pc_relative)
301
302 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
303
304 static reloc_howto_type ppc64_elf_howto_raw[] =
305 {
306 /* This reloc does nothing. */
307 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
308 bfd_elf_generic_reloc),
309
310 /* A standard 32 bit relocation. */
311 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
313
314 /* An absolute 26 bit branch; the lower two bits must be zero.
315 FIXME: we don't check that, we just clear them. */
316 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
317 bfd_elf_generic_reloc),
318
319 /* A standard 16 bit relocation. */
320 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
322
323 /* A 16 bit relocation without overflow. */
324 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
325 bfd_elf_generic_reloc),
326
327 /* Bits 16-31 of an address. */
328 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
329 bfd_elf_generic_reloc),
330
331 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
332 bits, treated as a signed number, is negative. */
333 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
334 ppc64_elf_ha_reloc),
335
336 /* An absolute 16 bit branch; the lower two bits must be zero.
337 FIXME: we don't check that, we just clear them. */
338 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
339 ppc64_elf_branch_reloc),
340
341 /* An absolute 16 bit branch, for which bit 10 should be set to
342 indicate that the branch is expected to be taken. The lower two
343 bits must be zero. */
344 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
345 ppc64_elf_brtaken_reloc),
346
347 /* An absolute 16 bit branch, for which bit 10 should be set to
348 indicate that the branch is not expected to be taken. The lower
349 two bits must be zero. */
350 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
351 ppc64_elf_brtaken_reloc),
352
353 /* A relative 26 bit branch; the lower two bits must be zero. */
354 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
355 ppc64_elf_branch_reloc),
356
357 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
358 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
360
361 /* A relative 16 bit branch; the lower two bits must be zero. */
362 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
364
365 /* A relative 16 bit branch. Bit 10 should be set to indicate that
366 the branch is expected to be taken. The lower two bits must be
367 zero. */
368 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
369 ppc64_elf_brtaken_reloc),
370
371 /* A relative 16 bit branch. Bit 10 should be set to indicate that
372 the branch is not expected to be taken. The lower two bits must
373 be zero. */
374 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
375 ppc64_elf_brtaken_reloc),
376
377 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
378 symbol. */
379 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
380 ppc64_elf_unhandled_reloc),
381
382 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
383 the symbol. */
384 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
385 ppc64_elf_unhandled_reloc),
386
387 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
388 the symbol. */
389 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
390 ppc64_elf_unhandled_reloc),
391
392 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
393 the symbol. */
394 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
395 ppc64_elf_unhandled_reloc),
396
397 /* This is used only by the dynamic linker. The symbol should exist
398 both in the object being run and in some shared library. The
399 dynamic linker copies the data addressed by the symbol from the
400 shared library into the object, because the object being
401 run has to have the data at some particular address. */
402 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
403 ppc64_elf_unhandled_reloc),
404
405 /* Like R_PPC64_ADDR64, but used when setting global offset table
406 entries. */
407 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
408 ppc64_elf_unhandled_reloc),
409
410 /* Created by the link editor. Marks a procedure linkage table
411 entry for a symbol. */
412 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
413 ppc64_elf_unhandled_reloc),
414
415 /* Used only by the dynamic linker. When the object is run, this
416 doubleword64 is set to the load address of the object, plus the
417 addend. */
418 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
419 bfd_elf_generic_reloc),
420
421 /* Like R_PPC64_ADDR32, but may be unaligned. */
422 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
423 bfd_elf_generic_reloc),
424
425 /* Like R_PPC64_ADDR16, but may be unaligned. */
426 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
428
429 /* 32-bit PC relative. */
430 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 bfd_elf_generic_reloc),
432
433 /* 32-bit relocation to the symbol's procedure linkage table. */
434 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
435 ppc64_elf_unhandled_reloc),
436
437 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
438 FIXME: R_PPC64_PLTREL32 not supported. */
439 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
440 ppc64_elf_unhandled_reloc),
441
442 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
443 the symbol. */
444 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
445 ppc64_elf_unhandled_reloc),
446
447 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
448 the symbol. */
449 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
450 ppc64_elf_unhandled_reloc),
451
452 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
453 the symbol. */
454 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
455 ppc64_elf_unhandled_reloc),
456
457 /* 16-bit section relative relocation. */
458 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
459 ppc64_elf_sectoff_reloc),
460
461 /* Like R_PPC64_SECTOFF, but no overflow warning. */
462 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
463 ppc64_elf_sectoff_reloc),
464
465 /* 16-bit upper half section relative relocation. */
466 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
467 ppc64_elf_sectoff_reloc),
468
469 /* 16-bit upper half adjusted section relative relocation. */
470 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_ha_reloc),
472
473 /* Like R_PPC64_REL24 without touching the two least significant bits. */
474 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
475 bfd_elf_generic_reloc),
476
477 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
478
479 /* A standard 64-bit relocation. */
480 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
481 bfd_elf_generic_reloc),
482
483 /* The bits 32-47 of an address. */
484 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
485 bfd_elf_generic_reloc),
486
487 /* The bits 32-47 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
489 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
490 ppc64_elf_ha_reloc),
491
492 /* The bits 48-63 of an address. */
493 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
494 bfd_elf_generic_reloc),
495
496 /* The bits 48-63 of an address, plus 1 if the contents of the low
497 16 bits, treated as a signed number, is negative. */
498 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
499 ppc64_elf_ha_reloc),
500
501 /* Like ADDR64, but may be unaligned. */
502 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
503 bfd_elf_generic_reloc),
504
505 /* 64-bit relative relocation. */
506 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
507 bfd_elf_generic_reloc),
508
509 /* 64-bit relocation to the symbol's procedure linkage table. */
510 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
511 ppc64_elf_unhandled_reloc),
512
513 /* 64-bit PC relative relocation to the symbol's procedure linkage
514 table. */
515 /* FIXME: R_PPC64_PLTREL64 not supported. */
516 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
517 ppc64_elf_unhandled_reloc),
518
519 /* 16 bit TOC-relative relocation. */
520 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
521 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
522 ppc64_elf_toc_reloc),
523
524 /* 16 bit TOC-relative relocation without overflow. */
525 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
526 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
527 ppc64_elf_toc_reloc),
528
529 /* 16 bit TOC-relative relocation, high 16 bits. */
530 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
531 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
532 ppc64_elf_toc_reloc),
533
534 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
535 contents of the low 16 bits, treated as a signed number, is
536 negative. */
537 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
538 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
539 ppc64_elf_toc_ha_reloc),
540
541 /* 64-bit relocation; insert value of TOC base (.TOC.). */
542 /* R_PPC64_TOC 51 doubleword64 .TOC. */
543 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
544 ppc64_elf_toc64_reloc),
545
546 /* Like R_PPC64_GOT16, but also informs the link editor that the
547 value to relocate may (!) refer to a PLT entry which the link
548 editor (a) may replace with the symbol value. If the link editor
549 is unable to fully resolve the symbol, it may (b) create a PLT
550 entry and store the address to the new PLT entry in the GOT.
551 This permits lazy resolution of function symbols at run time.
552 The link editor may also skip all of this and just (c) emit a
553 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
554 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
555 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
556 ppc64_elf_unhandled_reloc),
557
558 /* Like R_PPC64_PLTGOT16, but without overflow. */
559 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
560 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
561 ppc64_elf_unhandled_reloc),
562
563 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
564 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
565 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
566 ppc64_elf_unhandled_reloc),
567
568 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
569 1 if the contents of the low 16 bits, treated as a signed number,
570 is negative. */
571 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
572 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
573 ppc64_elf_unhandled_reloc),
574
575 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
576 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
577 bfd_elf_generic_reloc),
578
579 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
580 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
581 bfd_elf_generic_reloc),
582
583 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
584 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
585 ppc64_elf_unhandled_reloc),
586
587 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
588 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
589 ppc64_elf_unhandled_reloc),
590
591 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
592 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
594
595 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
596 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
597 ppc64_elf_sectoff_reloc),
598
599 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
600 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
601 ppc64_elf_sectoff_reloc),
602
603 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
604 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_toc_reloc),
606
607 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
608 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
609 ppc64_elf_toc_reloc),
610
611 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
612 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
613 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
614 ppc64_elf_unhandled_reloc),
615
616 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
617 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
618 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
619 ppc64_elf_unhandled_reloc),
620
621 /* Marker relocs for TLS. */
622 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
623 bfd_elf_generic_reloc),
624
625 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 /* Marker reloc for optimizing r2 save in prologue rather than on
632 each plt call stub. */
633 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
634 bfd_elf_generic_reloc),
635
636 /* Marker relocs on inline plt call instructions. */
637 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
642
643 /* Computes the load module index of the load module that contains the
644 definition of its TLS sym. */
645 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
646 ppc64_elf_unhandled_reloc),
647
648 /* Computes a dtv-relative displacement, the difference between the value
649 of sym+add and the base address of the thread-local storage block that
650 contains the definition of sym, minus 0x8000. */
651 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
652 ppc64_elf_unhandled_reloc),
653
654 /* A 16 bit dtprel reloc. */
655 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
656 ppc64_elf_unhandled_reloc),
657
658 /* Like DTPREL16, but no overflow. */
659 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
660 ppc64_elf_unhandled_reloc),
661
662 /* Like DTPREL16_LO, but next higher group of 16 bits. */
663 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
664 ppc64_elf_unhandled_reloc),
665
666 /* Like DTPREL16_HI, but adjust for low 16 bits. */
667 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
669
670 /* Like DTPREL16_HI, but next higher group of 16 bits. */
671 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
672 ppc64_elf_unhandled_reloc),
673
674 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
675 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
677
678 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
679 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
681
682 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
683 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
685
686 /* Like DTPREL16, but for insns with a DS field. */
687 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
688 ppc64_elf_unhandled_reloc),
689
690 /* Like DTPREL16_DS, but no overflow. */
691 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
692 ppc64_elf_unhandled_reloc),
693
694 /* Computes a tp-relative displacement, the difference between the value of
695 sym+add and the value of the thread pointer (r13). */
696 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
697 ppc64_elf_unhandled_reloc),
698
699 /* A 16 bit tprel reloc. */
700 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
701 ppc64_elf_unhandled_reloc),
702
703 /* Like TPREL16, but no overflow. */
704 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
705 ppc64_elf_unhandled_reloc),
706
707 /* Like TPREL16_LO, but next higher group of 16 bits. */
708 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
709 ppc64_elf_unhandled_reloc),
710
711 /* Like TPREL16_HI, but adjust for low 16 bits. */
712 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
714
715 /* Like TPREL16_HI, but next higher group of 16 bits. */
716 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
717 ppc64_elf_unhandled_reloc),
718
719 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
720 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
722
723 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
724 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
726
727 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
728 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
730
731 /* Like TPREL16, but for insns with a DS field. */
732 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
733 ppc64_elf_unhandled_reloc),
734
735 /* Like TPREL16_DS, but no overflow. */
736 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
737 ppc64_elf_unhandled_reloc),
738
739 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
740 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
741 to the first entry relative to the TOC base (r2). */
742 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
743 ppc64_elf_unhandled_reloc),
744
745 /* Like GOT_TLSGD16, but no overflow. */
746 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
747 ppc64_elf_unhandled_reloc),
748
749 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
750 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
751 ppc64_elf_unhandled_reloc),
752
753 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
754 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
756
757 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
758 with values (sym+add)@dtpmod and zero, and computes the offset to the
759 first entry relative to the TOC base (r2). */
760 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
761 ppc64_elf_unhandled_reloc),
762
763 /* Like GOT_TLSLD16, but no overflow. */
764 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
765 ppc64_elf_unhandled_reloc),
766
767 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
768 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
770
771 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
772 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
774
775 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
776 the offset to the entry relative to the TOC base (r2). */
777 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
778 ppc64_elf_unhandled_reloc),
779
780 /* Like GOT_DTPREL16_DS, but no overflow. */
781 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
782 ppc64_elf_unhandled_reloc),
783
784 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
785 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
787
788 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
789 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
791
792 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
793 offset to the entry relative to the TOC base (r2). */
794 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
795 ppc64_elf_unhandled_reloc),
796
797 /* Like GOT_TPREL16_DS, but no overflow. */
798 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
799 ppc64_elf_unhandled_reloc),
800
801 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
802 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
803 ppc64_elf_unhandled_reloc),
804
805 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
806 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
813 bfd_elf_generic_reloc),
814
815 /* A 16 bit relative relocation. */
816 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
817 bfd_elf_generic_reloc),
818
819 /* A 16 bit relative relocation without overflow. */
820 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
821 bfd_elf_generic_reloc),
822
823 /* The high order 16 bits of a relative address. */
824 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
825 bfd_elf_generic_reloc),
826
827 /* The high order 16 bits of a relative address, plus 1 if the contents of
828 the low 16 bits, treated as a signed number, is negative. */
829 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
830 ppc64_elf_ha_reloc),
831
832 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
833 bfd_elf_generic_reloc),
834
835 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
836 ppc64_elf_ha_reloc),
837
838 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
839 bfd_elf_generic_reloc),
840
841 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
842 ppc64_elf_ha_reloc),
843
844 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
845 bfd_elf_generic_reloc),
846
847 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
848 ppc64_elf_ha_reloc),
849
850 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
851 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
852 ppc64_elf_ha_reloc),
853
854 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
855 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
856 ppc64_elf_ha_reloc),
857
858 /* Like R_PPC64_ADDR16_HI, but no overflow. */
859 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
860 bfd_elf_generic_reloc),
861
862 /* Like R_PPC64_ADDR16_HA, but no overflow. */
863 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
864 ppc64_elf_ha_reloc),
865
866 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
867 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_unhandled_reloc),
869
870 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
871 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
873
874 /* Like R_PPC64_TPREL16_HI, but no overflow. */
875 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
877
878 /* Like R_PPC64_TPREL16_HA, but no overflow. */
879 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
881
882 /* Marker reloc on ELFv2 large-model function entry. */
883 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
884 bfd_elf_generic_reloc),
885
886 /* Like ADDR64, but use local entry point of function. */
887 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
889
890 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
900 ppc64_elf_prefix_reloc),
901
902 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_unhandled_reloc),
916
917 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
923 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
924 ppc64_elf_unhandled_reloc),
925
926 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
941 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
942 bfd_elf_generic_reloc),
943
944 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
945 ppc64_elf_ha_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
948 bfd_elf_generic_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
951 ppc64_elf_ha_reloc),
952
953 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
954 bfd_elf_generic_reloc),
955
956 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
957 ppc64_elf_ha_reloc),
958
959 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
960 bfd_elf_generic_reloc),
961
962 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
963 ppc64_elf_ha_reloc),
964
965 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
966 ppc64_elf_prefix_reloc),
967
968 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
969 ppc64_elf_prefix_reloc),
970
971 /* GNU extension to record C++ vtable hierarchy. */
972 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
973 NULL),
974
975 /* GNU extension to record C++ vtable member usage. */
976 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
977 NULL),
978 };
979
980 \f
981 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
982 be done. */
983
984 static void
985 ppc_howto_init (void)
986 {
987 unsigned int i, type;
988
989 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
990 {
991 type = ppc64_elf_howto_raw[i].type;
992 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
993 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
994 }
995 }
996
997 static reloc_howto_type *
998 ppc64_elf_reloc_type_lookup (bfd *abfd,
999 bfd_reloc_code_real_type code)
1000 {
1001 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1002
1003 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1004 /* Initialize howto table if needed. */
1005 ppc_howto_init ();
1006
1007 switch (code)
1008 {
1009 default:
1010 /* xgettext:c-format */
1011 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1012 (int) code);
1013 bfd_set_error (bfd_error_bad_value);
1014 return NULL;
1015
1016 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1017 break;
1018 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1019 break;
1020 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1021 break;
1022 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1023 break;
1024 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1025 break;
1026 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1027 break;
1028 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1029 break;
1030 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1031 break;
1032 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1033 break;
1034 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1035 break;
1036 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1037 break;
1038 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1039 break;
1040 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1041 break;
1042 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1043 break;
1044 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1045 break;
1046 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1047 break;
1048 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1049 break;
1050 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1051 break;
1052 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1053 break;
1054 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1055 break;
1056 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1057 break;
1058 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1059 break;
1060 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1061 break;
1062 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1063 break;
1064 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1065 break;
1066 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1067 break;
1068 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1069 break;
1070 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1071 break;
1072 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1073 break;
1074 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1075 break;
1076 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1077 break;
1078 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1079 break;
1080 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1081 break;
1082 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1083 break;
1084 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1085 break;
1086 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1087 break;
1088 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1089 break;
1090 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1091 break;
1092 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1093 break;
1094 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1095 break;
1096 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1097 break;
1098 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1099 break;
1100 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1101 break;
1102 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1103 break;
1104 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1105 break;
1106 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1107 break;
1108 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1109 break;
1110 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1111 break;
1112 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1113 break;
1114 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1115 break;
1116 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1117 break;
1118 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1119 break;
1120 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1121 break;
1122 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1123 break;
1124 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1125 break;
1126 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1127 break;
1128 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1129 break;
1130 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1131 break;
1132 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1133 break;
1134 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1135 break;
1136 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1137 break;
1138 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1139 break;
1140 case BFD_RELOC_PPC64_TLS_PCREL:
1141 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1142 break;
1143 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1144 break;
1145 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1146 break;
1147 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1148 break;
1149 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1150 break;
1151 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1152 break;
1153 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1154 break;
1155 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1156 break;
1157 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1158 break;
1159 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1160 break;
1161 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1162 break;
1163 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1164 break;
1165 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1168 break;
1169 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1170 break;
1171 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1172 break;
1173 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1174 break;
1175 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1176 break;
1177 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1178 break;
1179 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1200 break;
1201 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1202 break;
1203 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1208 break;
1209 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1210 break;
1211 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1220 break;
1221 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1222 break;
1223 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1232 break;
1233 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1234 break;
1235 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1236 break;
1237 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1238 break;
1239 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1240 break;
1241 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1242 break;
1243 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1252 break;
1253 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1254 break;
1255 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1256 break;
1257 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1258 break;
1259 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1260 break;
1261 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1262 break;
1263 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1264 break;
1265 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1266 break;
1267 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1268 break;
1269 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1270 break;
1271 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1272 break;
1273 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1274 break;
1275 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1276 break;
1277 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1278 break;
1279 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1280 break;
1281 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1286 break;
1287 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1288 break;
1289 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1294 break;
1295 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1296 break;
1297 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1302 break;
1303 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1304 break;
1305 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1306 break;
1307 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1308 break;
1309 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1310 break;
1311 }
1312
1313 return ppc64_elf_howto_table[r];
1314 };
1315
1316 static reloc_howto_type *
1317 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1318 const char *r_name)
1319 {
1320 unsigned int i;
1321
1322 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1323 if (ppc64_elf_howto_raw[i].name != NULL
1324 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1325 return &ppc64_elf_howto_raw[i];
1326
1327 return NULL;
1328 }
1329
1330 /* Set the howto pointer for a PowerPC ELF reloc. */
1331
1332 static bfd_boolean
1333 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1334 Elf_Internal_Rela *dst)
1335 {
1336 unsigned int type;
1337
1338 /* Initialize howto table if needed. */
1339 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1340 ppc_howto_init ();
1341
1342 type = ELF64_R_TYPE (dst->r_info);
1343 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1344 {
1345 /* xgettext:c-format */
1346 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1347 abfd, type);
1348 bfd_set_error (bfd_error_bad_value);
1349 return FALSE;
1350 }
1351 cache_ptr->howto = ppc64_elf_howto_table[type];
1352 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1353 {
1354 /* xgettext:c-format */
1355 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1356 abfd, type);
1357 bfd_set_error (bfd_error_bad_value);
1358 return FALSE;
1359 }
1360
1361 return TRUE;
1362 }
1363
1364 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1365
1366 static bfd_reloc_status_type
1367 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1368 void *data, asection *input_section,
1369 bfd *output_bfd, char **error_message)
1370 {
1371 enum elf_ppc64_reloc_type r_type;
1372 long insn;
1373 bfd_size_type octets;
1374 bfd_vma value;
1375
1376 /* If this is a relocatable link (output_bfd test tells us), just
1377 call the generic function. Any adjustment will be done at final
1378 link time. */
1379 if (output_bfd != NULL)
1380 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1381 input_section, output_bfd, error_message);
1382
1383 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1384 We won't actually be using the low bits, so trashing them
1385 doesn't matter. */
1386 r_type = reloc_entry->howto->type;
1387 if (r_type == R_PPC64_ADDR16_HIGHERA34
1388 || r_type == R_PPC64_ADDR16_HIGHESTA34
1389 || r_type == R_PPC64_REL16_HIGHERA34
1390 || r_type == R_PPC64_REL16_HIGHESTA34)
1391 reloc_entry->addend += 1ULL << 33;
1392 else
1393 reloc_entry->addend += 1U << 15;
1394 if (r_type != R_PPC64_REL16DX_HA)
1395 return bfd_reloc_continue;
1396
1397 value = 0;
1398 if (!bfd_is_com_section (symbol->section))
1399 value = symbol->value;
1400 value += (reloc_entry->addend
1401 + symbol->section->output_offset
1402 + symbol->section->output_section->vma);
1403 value -= (reloc_entry->address
1404 + input_section->output_offset
1405 + input_section->output_section->vma);
1406 value = (bfd_signed_vma) value >> 16;
1407
1408 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1409 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1410 insn &= ~0x1fffc1;
1411 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1412 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1413 if (value + 0x8000 > 0xffff)
1414 return bfd_reloc_overflow;
1415 return bfd_reloc_ok;
1416 }
1417
1418 static bfd_reloc_status_type
1419 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1420 void *data, asection *input_section,
1421 bfd *output_bfd, char **error_message)
1422 {
1423 if (output_bfd != NULL)
1424 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1425 input_section, output_bfd, error_message);
1426
1427 if (strcmp (symbol->section->name, ".opd") == 0
1428 && (symbol->section->owner->flags & DYNAMIC) == 0)
1429 {
1430 bfd_vma dest = opd_entry_value (symbol->section,
1431 symbol->value + reloc_entry->addend,
1432 NULL, NULL, FALSE);
1433 if (dest != (bfd_vma) -1)
1434 reloc_entry->addend = dest - (symbol->value
1435 + symbol->section->output_section->vma
1436 + symbol->section->output_offset);
1437 }
1438 else
1439 {
1440 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1441
1442 if (symbol->section->owner != abfd
1443 && symbol->section->owner != NULL
1444 && abiversion (symbol->section->owner) >= 2)
1445 {
1446 unsigned int i;
1447
1448 for (i = 0; i < symbol->section->owner->symcount; ++i)
1449 {
1450 asymbol *symdef = symbol->section->owner->outsymbols[i];
1451
1452 if (strcmp (symdef->name, symbol->name) == 0)
1453 {
1454 elfsym = (elf_symbol_type *) symdef;
1455 break;
1456 }
1457 }
1458 }
1459 reloc_entry->addend
1460 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1461 }
1462 return bfd_reloc_continue;
1463 }
1464
1465 static bfd_reloc_status_type
1466 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1467 void *data, asection *input_section,
1468 bfd *output_bfd, char **error_message)
1469 {
1470 long insn;
1471 enum elf_ppc64_reloc_type r_type;
1472 bfd_size_type octets;
1473 /* Assume 'at' branch hints. */
1474 bfd_boolean is_isa_v2 = TRUE;
1475
1476 /* If this is a relocatable link (output_bfd test tells us), just
1477 call the generic function. Any adjustment will be done at final
1478 link time. */
1479 if (output_bfd != NULL)
1480 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1481 input_section, output_bfd, error_message);
1482
1483 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1484 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1485 insn &= ~(0x01 << 21);
1486 r_type = reloc_entry->howto->type;
1487 if (r_type == R_PPC64_ADDR14_BRTAKEN
1488 || r_type == R_PPC64_REL14_BRTAKEN)
1489 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1490
1491 if (is_isa_v2)
1492 {
1493 /* Set 'a' bit. This is 0b00010 in BO field for branch
1494 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1495 for branch on CTR insns (BO == 1a00t or 1a01t). */
1496 if ((insn & (0x14 << 21)) == (0x04 << 21))
1497 insn |= 0x02 << 21;
1498 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1499 insn |= 0x08 << 21;
1500 else
1501 goto out;
1502 }
1503 else
1504 {
1505 bfd_vma target = 0;
1506 bfd_vma from;
1507
1508 if (!bfd_is_com_section (symbol->section))
1509 target = symbol->value;
1510 target += symbol->section->output_section->vma;
1511 target += symbol->section->output_offset;
1512 target += reloc_entry->addend;
1513
1514 from = (reloc_entry->address
1515 + input_section->output_offset
1516 + input_section->output_section->vma);
1517
1518 /* Invert 'y' bit if not the default. */
1519 if ((bfd_signed_vma) (target - from) < 0)
1520 insn ^= 0x01 << 21;
1521 }
1522 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1523 out:
1524 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1525 input_section, output_bfd, error_message);
1526 }
1527
1528 static bfd_reloc_status_type
1529 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1530 void *data, asection *input_section,
1531 bfd *output_bfd, char **error_message)
1532 {
1533 /* If this is a relocatable link (output_bfd test tells us), just
1534 call the generic function. Any adjustment will be done at final
1535 link time. */
1536 if (output_bfd != NULL)
1537 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1538 input_section, output_bfd, error_message);
1539
1540 /* Subtract the symbol section base address. */
1541 reloc_entry->addend -= symbol->section->output_section->vma;
1542 return bfd_reloc_continue;
1543 }
1544
1545 static bfd_reloc_status_type
1546 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1547 void *data, asection *input_section,
1548 bfd *output_bfd, char **error_message)
1549 {
1550 /* If this is a relocatable link (output_bfd test tells us), just
1551 call the generic function. Any adjustment will be done at final
1552 link time. */
1553 if (output_bfd != NULL)
1554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1555 input_section, output_bfd, error_message);
1556
1557 /* Subtract the symbol section base address. */
1558 reloc_entry->addend -= symbol->section->output_section->vma;
1559
1560 /* Adjust the addend for sign extension of the low 16 bits. */
1561 reloc_entry->addend += 0x8000;
1562 return bfd_reloc_continue;
1563 }
1564
1565 static bfd_reloc_status_type
1566 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
1569 {
1570 bfd_vma TOCstart;
1571
1572 /* If this is a relocatable link (output_bfd test tells us), just
1573 call the generic function. Any adjustment will be done at final
1574 link time. */
1575 if (output_bfd != NULL)
1576 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1577 input_section, output_bfd, error_message);
1578
1579 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1580 if (TOCstart == 0)
1581 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1582
1583 /* Subtract the TOC base address. */
1584 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1585 return bfd_reloc_continue;
1586 }
1587
1588 static bfd_reloc_status_type
1589 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1590 void *data, asection *input_section,
1591 bfd *output_bfd, char **error_message)
1592 {
1593 bfd_vma TOCstart;
1594
1595 /* If this is a relocatable link (output_bfd test tells us), just
1596 call the generic function. Any adjustment will be done at final
1597 link time. */
1598 if (output_bfd != NULL)
1599 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1600 input_section, output_bfd, error_message);
1601
1602 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1603 if (TOCstart == 0)
1604 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1605
1606 /* Subtract the TOC base address. */
1607 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1608
1609 /* Adjust the addend for sign extension of the low 16 bits. */
1610 reloc_entry->addend += 0x8000;
1611 return bfd_reloc_continue;
1612 }
1613
1614 static bfd_reloc_status_type
1615 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1616 void *data, asection *input_section,
1617 bfd *output_bfd, char **error_message)
1618 {
1619 bfd_vma TOCstart;
1620 bfd_size_type octets;
1621
1622 /* If this is a relocatable link (output_bfd test tells us), just
1623 call the generic function. Any adjustment will be done at final
1624 link time. */
1625 if (output_bfd != NULL)
1626 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1627 input_section, output_bfd, error_message);
1628
1629 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1630 if (TOCstart == 0)
1631 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1632
1633 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1634 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1635 return bfd_reloc_ok;
1636 }
1637
1638 static bfd_reloc_status_type
1639 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1640 void *data, asection *input_section,
1641 bfd *output_bfd, char **error_message)
1642 {
1643 uint64_t insn;
1644 bfd_vma targ;
1645
1646 if (output_bfd != NULL)
1647 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1648 input_section, output_bfd, error_message);
1649
1650 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1651 insn <<= 32;
1652 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1653
1654 targ = (symbol->section->output_section->vma
1655 + symbol->section->output_offset
1656 + reloc_entry->addend);
1657 if (!bfd_is_com_section (symbol->section))
1658 targ += symbol->value;
1659 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1660 targ += 1ULL << 33;
1661 if (reloc_entry->howto->pc_relative)
1662 {
1663 bfd_vma from = (reloc_entry->address
1664 + input_section->output_offset
1665 + input_section->output_section->vma);
1666 targ -=from;
1667 }
1668 targ >>= reloc_entry->howto->rightshift;
1669 insn &= ~reloc_entry->howto->dst_mask;
1670 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1671 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1672 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1673 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1674 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1675 >= 1ULL << reloc_entry->howto->bitsize))
1676 return bfd_reloc_overflow;
1677 return bfd_reloc_ok;
1678 }
1679
1680 static bfd_reloc_status_type
1681 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1682 void *data, asection *input_section,
1683 bfd *output_bfd, char **error_message)
1684 {
1685 /* If this is a relocatable link (output_bfd test tells us), just
1686 call the generic function. Any adjustment will be done at final
1687 link time. */
1688 if (output_bfd != NULL)
1689 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1690 input_section, output_bfd, error_message);
1691
1692 if (error_message != NULL)
1693 {
1694 static char buf[60];
1695 sprintf (buf, "generic linker can't handle %s",
1696 reloc_entry->howto->name);
1697 *error_message = buf;
1698 }
1699 return bfd_reloc_dangerous;
1700 }
1701
1702 /* Track GOT entries needed for a given symbol. We might need more
1703 than one got entry per symbol. */
1704 struct got_entry
1705 {
1706 struct got_entry *next;
1707
1708 /* The symbol addend that we'll be placing in the GOT. */
1709 bfd_vma addend;
1710
1711 /* Unlike other ELF targets, we use separate GOT entries for the same
1712 symbol referenced from different input files. This is to support
1713 automatic multiple TOC/GOT sections, where the TOC base can vary
1714 from one input file to another. After partitioning into TOC groups
1715 we merge entries within the group.
1716
1717 Point to the BFD owning this GOT entry. */
1718 bfd *owner;
1719
1720 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1721 TLS_TPREL or TLS_DTPREL for tls entries. */
1722 unsigned char tls_type;
1723
1724 /* Non-zero if got.ent points to real entry. */
1725 unsigned char is_indirect;
1726
1727 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1728 union
1729 {
1730 bfd_signed_vma refcount;
1731 bfd_vma offset;
1732 struct got_entry *ent;
1733 } got;
1734 };
1735
1736 /* The same for PLT. */
1737 struct plt_entry
1738 {
1739 struct plt_entry *next;
1740
1741 bfd_vma addend;
1742
1743 union
1744 {
1745 bfd_signed_vma refcount;
1746 bfd_vma offset;
1747 } plt;
1748 };
1749
1750 struct ppc64_elf_obj_tdata
1751 {
1752 struct elf_obj_tdata elf;
1753
1754 /* Shortcuts to dynamic linker sections. */
1755 asection *got;
1756 asection *relgot;
1757
1758 /* Used during garbage collection. We attach global symbols defined
1759 on removed .opd entries to this section so that the sym is removed. */
1760 asection *deleted_section;
1761
1762 /* TLS local dynamic got entry handling. Support for multiple GOT
1763 sections means we potentially need one of these for each input bfd. */
1764 struct got_entry tlsld_got;
1765
1766 union
1767 {
1768 /* A copy of relocs before they are modified for --emit-relocs. */
1769 Elf_Internal_Rela *relocs;
1770
1771 /* Section contents. */
1772 bfd_byte *contents;
1773 } opd;
1774
1775 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1776 the reloc to be in the range -32768 to 32767. */
1777 unsigned int has_small_toc_reloc : 1;
1778
1779 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1780 instruction not one we handle. */
1781 unsigned int unexpected_toc_insn : 1;
1782
1783 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1784 this file. */
1785 unsigned int has_optrel : 1;
1786 };
1787
1788 #define ppc64_elf_tdata(bfd) \
1789 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1790
1791 #define ppc64_tlsld_got(bfd) \
1792 (&ppc64_elf_tdata (bfd)->tlsld_got)
1793
1794 #define is_ppc64_elf(bfd) \
1795 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1796 && elf_object_id (bfd) == PPC64_ELF_DATA)
1797
1798 /* Override the generic function because we store some extras. */
1799
1800 static bfd_boolean
1801 ppc64_elf_mkobject (bfd *abfd)
1802 {
1803 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1804 PPC64_ELF_DATA);
1805 }
1806
1807 /* Fix bad default arch selected for a 64 bit input bfd when the
1808 default is 32 bit. Also select arch based on apuinfo. */
1809
1810 static bfd_boolean
1811 ppc64_elf_object_p (bfd *abfd)
1812 {
1813 if (!abfd->arch_info->the_default)
1814 return TRUE;
1815
1816 if (abfd->arch_info->bits_per_word == 32)
1817 {
1818 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1819
1820 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1821 {
1822 /* Relies on arch after 32 bit default being 64 bit default. */
1823 abfd->arch_info = abfd->arch_info->next;
1824 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1825 }
1826 }
1827 return _bfd_elf_ppc_set_arch (abfd);
1828 }
1829
1830 /* Support for core dump NOTE sections. */
1831
1832 static bfd_boolean
1833 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1834 {
1835 size_t offset, size;
1836
1837 if (note->descsz != 504)
1838 return FALSE;
1839
1840 /* pr_cursig */
1841 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1842
1843 /* pr_pid */
1844 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1845
1846 /* pr_reg */
1847 offset = 112;
1848 size = 384;
1849
1850 /* Make a ".reg/999" section. */
1851 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1852 size, note->descpos + offset);
1853 }
1854
1855 static bfd_boolean
1856 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1857 {
1858 if (note->descsz != 136)
1859 return FALSE;
1860
1861 elf_tdata (abfd)->core->pid
1862 = bfd_get_32 (abfd, note->descdata + 24);
1863 elf_tdata (abfd)->core->program
1864 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1865 elf_tdata (abfd)->core->command
1866 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1867
1868 return TRUE;
1869 }
1870
1871 static char *
1872 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1873 ...)
1874 {
1875 switch (note_type)
1876 {
1877 default:
1878 return NULL;
1879
1880 case NT_PRPSINFO:
1881 {
1882 char data[136] ATTRIBUTE_NONSTRING;
1883 va_list ap;
1884
1885 va_start (ap, note_type);
1886 memset (data, 0, sizeof (data));
1887 strncpy (data + 40, va_arg (ap, const char *), 16);
1888 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1889 DIAGNOSTIC_PUSH;
1890 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1891 -Wstringop-truncation:
1892 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1893 */
1894 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1895 #endif
1896 strncpy (data + 56, va_arg (ap, const char *), 80);
1897 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1898 DIAGNOSTIC_POP;
1899 #endif
1900 va_end (ap);
1901 return elfcore_write_note (abfd, buf, bufsiz,
1902 "CORE", note_type, data, sizeof (data));
1903 }
1904
1905 case NT_PRSTATUS:
1906 {
1907 char data[504];
1908 va_list ap;
1909 long pid;
1910 int cursig;
1911 const void *greg;
1912
1913 va_start (ap, note_type);
1914 memset (data, 0, 112);
1915 pid = va_arg (ap, long);
1916 bfd_put_32 (abfd, pid, data + 32);
1917 cursig = va_arg (ap, int);
1918 bfd_put_16 (abfd, cursig, data + 12);
1919 greg = va_arg (ap, const void *);
1920 memcpy (data + 112, greg, 384);
1921 memset (data + 496, 0, 8);
1922 va_end (ap);
1923 return elfcore_write_note (abfd, buf, bufsiz,
1924 "CORE", note_type, data, sizeof (data));
1925 }
1926 }
1927 }
1928
1929 /* Add extra PPC sections. */
1930
1931 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1932 {
1933 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1934 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1935 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1936 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1937 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1938 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1939 { NULL, 0, 0, 0, 0 }
1940 };
1941
1942 enum _ppc64_sec_type {
1943 sec_normal = 0,
1944 sec_opd = 1,
1945 sec_toc = 2
1946 };
1947
1948 struct _ppc64_elf_section_data
1949 {
1950 struct bfd_elf_section_data elf;
1951
1952 union
1953 {
1954 /* An array with one entry for each opd function descriptor,
1955 and some spares since opd entries may be either 16 or 24 bytes. */
1956 #define OPD_NDX(OFF) ((OFF) >> 4)
1957 struct _opd_sec_data
1958 {
1959 /* Points to the function code section for local opd entries. */
1960 asection **func_sec;
1961
1962 /* After editing .opd, adjust references to opd local syms. */
1963 long *adjust;
1964 } opd;
1965
1966 /* An array for toc sections, indexed by offset/8. */
1967 struct _toc_sec_data
1968 {
1969 /* Specifies the relocation symbol index used at a given toc offset. */
1970 unsigned *symndx;
1971
1972 /* And the relocation addend. */
1973 bfd_vma *add;
1974 } toc;
1975 } u;
1976
1977 enum _ppc64_sec_type sec_type:2;
1978
1979 /* Flag set when small branches are detected. Used to
1980 select suitable defaults for the stub group size. */
1981 unsigned int has_14bit_branch:1;
1982
1983 /* Flag set when PLTCALL relocs are detected. */
1984 unsigned int has_pltcall:1;
1985
1986 /* Flag set when section has PLT/GOT/TOC relocations that can be
1987 optimised. */
1988 unsigned int has_optrel:1;
1989 };
1990
1991 #define ppc64_elf_section_data(sec) \
1992 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
1993
1994 static bfd_boolean
1995 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
1996 {
1997 if (!sec->used_by_bfd)
1998 {
1999 struct _ppc64_elf_section_data *sdata;
2000 bfd_size_type amt = sizeof (*sdata);
2001
2002 sdata = bfd_zalloc (abfd, amt);
2003 if (sdata == NULL)
2004 return FALSE;
2005 sec->used_by_bfd = sdata;
2006 }
2007
2008 return _bfd_elf_new_section_hook (abfd, sec);
2009 }
2010
2011 static struct _opd_sec_data *
2012 get_opd_info (asection * sec)
2013 {
2014 if (sec != NULL
2015 && ppc64_elf_section_data (sec) != NULL
2016 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2017 return &ppc64_elf_section_data (sec)->u.opd;
2018 return NULL;
2019 }
2020 \f
2021 /* Parameters for the qsort hook. */
2022 static bfd_boolean synthetic_relocatable;
2023 static asection *synthetic_opd;
2024
2025 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2026
2027 static int
2028 compare_symbols (const void *ap, const void *bp)
2029 {
2030 const asymbol *a = *(const asymbol **) ap;
2031 const asymbol *b = *(const asymbol **) bp;
2032
2033 /* Section symbols first. */
2034 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2035 return -1;
2036 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2037 return 1;
2038
2039 /* then .opd symbols. */
2040 if (synthetic_opd != NULL)
2041 {
2042 if (strcmp (a->section->name, ".opd") == 0
2043 && strcmp (b->section->name, ".opd") != 0)
2044 return -1;
2045 if (strcmp (a->section->name, ".opd") != 0
2046 && strcmp (b->section->name, ".opd") == 0)
2047 return 1;
2048 }
2049
2050 /* then other code symbols. */
2051 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2052 == (SEC_CODE | SEC_ALLOC))
2053 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2054 != (SEC_CODE | SEC_ALLOC)))
2055 return -1;
2056
2057 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2058 != (SEC_CODE | SEC_ALLOC))
2059 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2060 == (SEC_CODE | SEC_ALLOC)))
2061 return 1;
2062
2063 if (synthetic_relocatable)
2064 {
2065 if (a->section->id < b->section->id)
2066 return -1;
2067
2068 if (a->section->id > b->section->id)
2069 return 1;
2070 }
2071
2072 if (a->value + a->section->vma < b->value + b->section->vma)
2073 return -1;
2074
2075 if (a->value + a->section->vma > b->value + b->section->vma)
2076 return 1;
2077
2078 /* For syms with the same value, prefer strong dynamic global function
2079 syms over other syms. */
2080 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2081 return -1;
2082
2083 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2084 return 1;
2085
2086 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2087 return -1;
2088
2089 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2090 return 1;
2091
2092 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2093 return -1;
2094
2095 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2096 return 1;
2097
2098 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2099 return -1;
2100
2101 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2102 return 1;
2103
2104 return a > b;
2105 }
2106
2107 /* Search SYMS for a symbol of the given VALUE. */
2108
2109 static asymbol *
2110 sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
2111 {
2112 long mid;
2113
2114 if (id == (unsigned) -1)
2115 {
2116 while (lo < hi)
2117 {
2118 mid = (lo + hi) >> 1;
2119 if (syms[mid]->value + syms[mid]->section->vma < value)
2120 lo = mid + 1;
2121 else if (syms[mid]->value + syms[mid]->section->vma > value)
2122 hi = mid;
2123 else
2124 return syms[mid];
2125 }
2126 }
2127 else
2128 {
2129 while (lo < hi)
2130 {
2131 mid = (lo + hi) >> 1;
2132 if (syms[mid]->section->id < id)
2133 lo = mid + 1;
2134 else if (syms[mid]->section->id > id)
2135 hi = mid;
2136 else if (syms[mid]->value < value)
2137 lo = mid + 1;
2138 else if (syms[mid]->value > value)
2139 hi = mid;
2140 else
2141 return syms[mid];
2142 }
2143 }
2144 return NULL;
2145 }
2146
2147 static bfd_boolean
2148 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2149 {
2150 bfd_vma vma = *(bfd_vma *) ptr;
2151 return ((section->flags & SEC_ALLOC) != 0
2152 && section->vma <= vma
2153 && vma < section->vma + section->size);
2154 }
2155
2156 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2157 entry syms. Also generate @plt symbols for the glink branch table.
2158 Returns count of synthetic symbols in RET or -1 on error. */
2159
2160 static long
2161 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2162 long static_count, asymbol **static_syms,
2163 long dyn_count, asymbol **dyn_syms,
2164 asymbol **ret)
2165 {
2166 asymbol *s;
2167 size_t i, j, count;
2168 char *names;
2169 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2170 asection *opd = NULL;
2171 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2172 asymbol **syms;
2173 int abi = abiversion (abfd);
2174
2175 *ret = NULL;
2176
2177 if (abi < 2)
2178 {
2179 opd = bfd_get_section_by_name (abfd, ".opd");
2180 if (opd == NULL && abi == 1)
2181 return 0;
2182 }
2183
2184 syms = NULL;
2185 codesecsym = 0;
2186 codesecsymend = 0;
2187 secsymend = 0;
2188 opdsymend = 0;
2189 symcount = 0;
2190 if (opd != NULL)
2191 {
2192 symcount = static_count;
2193 if (!relocatable)
2194 symcount += dyn_count;
2195 if (symcount == 0)
2196 return 0;
2197
2198 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2199 if (syms == NULL)
2200 return -1;
2201
2202 if (!relocatable && static_count != 0 && dyn_count != 0)
2203 {
2204 /* Use both symbol tables. */
2205 memcpy (syms, static_syms, static_count * sizeof (*syms));
2206 memcpy (syms + static_count, dyn_syms,
2207 (dyn_count + 1) * sizeof (*syms));
2208 }
2209 else if (!relocatable && static_count == 0)
2210 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2211 else
2212 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2213
2214 /* Trim uninteresting symbols. Interesting symbols are section,
2215 function, and notype symbols. */
2216 for (i = 0, j = 0; i < symcount; ++i)
2217 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2218 | BSF_RELC | BSF_SRELC)) == 0)
2219 syms[j++] = syms[i];
2220 symcount = j;
2221
2222 synthetic_relocatable = relocatable;
2223 synthetic_opd = opd;
2224 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2225
2226 if (!relocatable && symcount > 1)
2227 {
2228 /* Trim duplicate syms, since we may have merged the normal
2229 and dynamic symbols. Actually, we only care about syms
2230 that have different values, so trim any with the same
2231 value. Don't consider ifunc and ifunc resolver symbols
2232 duplicates however, because GDB wants to know whether a
2233 text symbol is an ifunc resolver. */
2234 for (i = 1, j = 1; i < symcount; ++i)
2235 {
2236 const asymbol *s0 = syms[i - 1];
2237 const asymbol *s1 = syms[i];
2238
2239 if ((s0->value + s0->section->vma
2240 != s1->value + s1->section->vma)
2241 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2242 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2243 syms[j++] = syms[i];
2244 }
2245 symcount = j;
2246 }
2247
2248 i = 0;
2249 /* Note that here and in compare_symbols we can't compare opd and
2250 sym->section directly. With separate debug info files, the
2251 symbols will be extracted from the debug file while abfd passed
2252 to this function is the real binary. */
2253 if (strcmp (syms[i]->section->name, ".opd") == 0)
2254 ++i;
2255 codesecsym = i;
2256
2257 for (; i < symcount; ++i)
2258 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2259 | SEC_THREAD_LOCAL))
2260 != (SEC_CODE | SEC_ALLOC))
2261 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2262 break;
2263 codesecsymend = i;
2264
2265 for (; i < symcount; ++i)
2266 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2267 break;
2268 secsymend = i;
2269
2270 for (; i < symcount; ++i)
2271 if (strcmp (syms[i]->section->name, ".opd") != 0)
2272 break;
2273 opdsymend = i;
2274
2275 for (; i < symcount; ++i)
2276 if (((syms[i]->section->flags
2277 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2278 != (SEC_CODE | SEC_ALLOC))
2279 break;
2280 symcount = i;
2281 }
2282 count = 0;
2283
2284 if (relocatable)
2285 {
2286 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2287 arelent *r;
2288 size_t size;
2289 size_t relcount;
2290
2291 if (opdsymend == secsymend)
2292 goto done;
2293
2294 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2295 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2296 if (relcount == 0)
2297 goto done;
2298
2299 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2300 {
2301 count = -1;
2302 goto done;
2303 }
2304
2305 size = 0;
2306 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2307 {
2308 asymbol *sym;
2309
2310 while (r < opd->relocation + relcount
2311 && r->address < syms[i]->value + opd->vma)
2312 ++r;
2313
2314 if (r == opd->relocation + relcount)
2315 break;
2316
2317 if (r->address != syms[i]->value + opd->vma)
2318 continue;
2319
2320 if (r->howto->type != R_PPC64_ADDR64)
2321 continue;
2322
2323 sym = *r->sym_ptr_ptr;
2324 if (!sym_exists_at (syms, opdsymend, symcount,
2325 sym->section->id, sym->value + r->addend))
2326 {
2327 ++count;
2328 size += sizeof (asymbol);
2329 size += strlen (syms[i]->name) + 2;
2330 }
2331 }
2332
2333 if (size == 0)
2334 goto done;
2335 s = *ret = bfd_malloc (size);
2336 if (s == NULL)
2337 {
2338 count = -1;
2339 goto done;
2340 }
2341
2342 names = (char *) (s + count);
2343
2344 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2345 {
2346 asymbol *sym;
2347
2348 while (r < opd->relocation + relcount
2349 && r->address < syms[i]->value + opd->vma)
2350 ++r;
2351
2352 if (r == opd->relocation + relcount)
2353 break;
2354
2355 if (r->address != syms[i]->value + opd->vma)
2356 continue;
2357
2358 if (r->howto->type != R_PPC64_ADDR64)
2359 continue;
2360
2361 sym = *r->sym_ptr_ptr;
2362 if (!sym_exists_at (syms, opdsymend, symcount,
2363 sym->section->id, sym->value + r->addend))
2364 {
2365 size_t len;
2366
2367 *s = *syms[i];
2368 s->flags |= BSF_SYNTHETIC;
2369 s->section = sym->section;
2370 s->value = sym->value + r->addend;
2371 s->name = names;
2372 *names++ = '.';
2373 len = strlen (syms[i]->name);
2374 memcpy (names, syms[i]->name, len + 1);
2375 names += len + 1;
2376 /* Have udata.p point back to the original symbol this
2377 synthetic symbol was derived from. */
2378 s->udata.p = syms[i];
2379 s++;
2380 }
2381 }
2382 }
2383 else
2384 {
2385 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2386 bfd_byte *contents = NULL;
2387 size_t size;
2388 size_t plt_count = 0;
2389 bfd_vma glink_vma = 0, resolv_vma = 0;
2390 asection *dynamic, *glink = NULL, *relplt = NULL;
2391 arelent *p;
2392
2393 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2394 {
2395 free_contents_and_exit_err:
2396 count = -1;
2397 free_contents_and_exit:
2398 if (contents)
2399 free (contents);
2400 goto done;
2401 }
2402
2403 size = 0;
2404 for (i = secsymend; i < opdsymend; ++i)
2405 {
2406 bfd_vma ent;
2407
2408 /* Ignore bogus symbols. */
2409 if (syms[i]->value > opd->size - 8)
2410 continue;
2411
2412 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2413 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2414 {
2415 ++count;
2416 size += sizeof (asymbol);
2417 size += strlen (syms[i]->name) + 2;
2418 }
2419 }
2420
2421 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2422 if (dyn_count != 0
2423 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2424 {
2425 bfd_byte *dynbuf, *extdyn, *extdynend;
2426 size_t extdynsize;
2427 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2428
2429 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2430 goto free_contents_and_exit_err;
2431
2432 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2433 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2434
2435 extdyn = dynbuf;
2436 extdynend = extdyn + dynamic->size;
2437 for (; extdyn < extdynend; extdyn += extdynsize)
2438 {
2439 Elf_Internal_Dyn dyn;
2440 (*swap_dyn_in) (abfd, extdyn, &dyn);
2441
2442 if (dyn.d_tag == DT_NULL)
2443 break;
2444
2445 if (dyn.d_tag == DT_PPC64_GLINK)
2446 {
2447 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2448 See comment in ppc64_elf_finish_dynamic_sections. */
2449 glink_vma = dyn.d_un.d_val + 8 * 4;
2450 /* The .glink section usually does not survive the final
2451 link; search for the section (usually .text) where the
2452 glink stubs now reside. */
2453 glink = bfd_sections_find_if (abfd, section_covers_vma,
2454 &glink_vma);
2455 break;
2456 }
2457 }
2458
2459 free (dynbuf);
2460 }
2461
2462 if (glink != NULL)
2463 {
2464 /* Determine __glink trampoline by reading the relative branch
2465 from the first glink stub. */
2466 bfd_byte buf[4];
2467 unsigned int off = 0;
2468
2469 while (bfd_get_section_contents (abfd, glink, buf,
2470 glink_vma + off - glink->vma, 4))
2471 {
2472 unsigned int insn = bfd_get_32 (abfd, buf);
2473 insn ^= B_DOT;
2474 if ((insn & ~0x3fffffc) == 0)
2475 {
2476 resolv_vma
2477 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2478 break;
2479 }
2480 off += 4;
2481 if (off > 4)
2482 break;
2483 }
2484
2485 if (resolv_vma)
2486 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2487
2488 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2489 if (relplt != NULL)
2490 {
2491 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2492 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2493 goto free_contents_and_exit_err;
2494
2495 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2496 size += plt_count * sizeof (asymbol);
2497
2498 p = relplt->relocation;
2499 for (i = 0; i < plt_count; i++, p++)
2500 {
2501 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2502 if (p->addend != 0)
2503 size += sizeof ("+0x") - 1 + 16;
2504 }
2505 }
2506 }
2507
2508 if (size == 0)
2509 goto free_contents_and_exit;
2510 s = *ret = bfd_malloc (size);
2511 if (s == NULL)
2512 goto free_contents_and_exit_err;
2513
2514 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2515
2516 for (i = secsymend; i < opdsymend; ++i)
2517 {
2518 bfd_vma ent;
2519
2520 if (syms[i]->value > opd->size - 8)
2521 continue;
2522
2523 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2524 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2525 {
2526 size_t lo, hi;
2527 size_t len;
2528 asection *sec = abfd->sections;
2529
2530 *s = *syms[i];
2531 lo = codesecsym;
2532 hi = codesecsymend;
2533 while (lo < hi)
2534 {
2535 size_t mid = (lo + hi) >> 1;
2536 if (syms[mid]->section->vma < ent)
2537 lo = mid + 1;
2538 else if (syms[mid]->section->vma > ent)
2539 hi = mid;
2540 else
2541 {
2542 sec = syms[mid]->section;
2543 break;
2544 }
2545 }
2546
2547 if (lo >= hi && lo > codesecsym)
2548 sec = syms[lo - 1]->section;
2549
2550 for (; sec != NULL; sec = sec->next)
2551 {
2552 if (sec->vma > ent)
2553 break;
2554 /* SEC_LOAD may not be set if SEC is from a separate debug
2555 info file. */
2556 if ((sec->flags & SEC_ALLOC) == 0)
2557 break;
2558 if ((sec->flags & SEC_CODE) != 0)
2559 s->section = sec;
2560 }
2561 s->flags |= BSF_SYNTHETIC;
2562 s->value = ent - s->section->vma;
2563 s->name = names;
2564 *names++ = '.';
2565 len = strlen (syms[i]->name);
2566 memcpy (names, syms[i]->name, len + 1);
2567 names += len + 1;
2568 /* Have udata.p point back to the original symbol this
2569 synthetic symbol was derived from. */
2570 s->udata.p = syms[i];
2571 s++;
2572 }
2573 }
2574 free (contents);
2575
2576 if (glink != NULL && relplt != NULL)
2577 {
2578 if (resolv_vma)
2579 {
2580 /* Add a symbol for the main glink trampoline. */
2581 memset (s, 0, sizeof *s);
2582 s->the_bfd = abfd;
2583 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2584 s->section = glink;
2585 s->value = resolv_vma - glink->vma;
2586 s->name = names;
2587 memcpy (names, "__glink_PLTresolve",
2588 sizeof ("__glink_PLTresolve"));
2589 names += sizeof ("__glink_PLTresolve");
2590 s++;
2591 count++;
2592 }
2593
2594 /* FIXME: It would be very much nicer to put sym@plt on the
2595 stub rather than on the glink branch table entry. The
2596 objdump disassembler would then use a sensible symbol
2597 name on plt calls. The difficulty in doing so is
2598 a) finding the stubs, and,
2599 b) matching stubs against plt entries, and,
2600 c) there can be multiple stubs for a given plt entry.
2601
2602 Solving (a) could be done by code scanning, but older
2603 ppc64 binaries used different stubs to current code.
2604 (b) is the tricky one since you need to known the toc
2605 pointer for at least one function that uses a pic stub to
2606 be able to calculate the plt address referenced.
2607 (c) means gdb would need to set multiple breakpoints (or
2608 find the glink branch itself) when setting breakpoints
2609 for pending shared library loads. */
2610 p = relplt->relocation;
2611 for (i = 0; i < plt_count; i++, p++)
2612 {
2613 size_t len;
2614
2615 *s = **p->sym_ptr_ptr;
2616 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2617 we are defining a symbol, ensure one of them is set. */
2618 if ((s->flags & BSF_LOCAL) == 0)
2619 s->flags |= BSF_GLOBAL;
2620 s->flags |= BSF_SYNTHETIC;
2621 s->section = glink;
2622 s->value = glink_vma - glink->vma;
2623 s->name = names;
2624 s->udata.p = NULL;
2625 len = strlen ((*p->sym_ptr_ptr)->name);
2626 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2627 names += len;
2628 if (p->addend != 0)
2629 {
2630 memcpy (names, "+0x", sizeof ("+0x") - 1);
2631 names += sizeof ("+0x") - 1;
2632 bfd_sprintf_vma (abfd, names, p->addend);
2633 names += strlen (names);
2634 }
2635 memcpy (names, "@plt", sizeof ("@plt"));
2636 names += sizeof ("@plt");
2637 s++;
2638 if (abi < 2)
2639 {
2640 glink_vma += 8;
2641 if (i >= 0x8000)
2642 glink_vma += 4;
2643 }
2644 else
2645 glink_vma += 4;
2646 }
2647 count += plt_count;
2648 }
2649 }
2650
2651 done:
2652 free (syms);
2653 return count;
2654 }
2655 \f
2656 /* The following functions are specific to the ELF linker, while
2657 functions above are used generally. Those named ppc64_elf_* are
2658 called by the main ELF linker code. They appear in this file more
2659 or less in the order in which they are called. eg.
2660 ppc64_elf_check_relocs is called early in the link process,
2661 ppc64_elf_finish_dynamic_sections is one of the last functions
2662 called.
2663
2664 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2665 functions have both a function code symbol and a function descriptor
2666 symbol. A call to foo in a relocatable object file looks like:
2667
2668 . .text
2669 . x:
2670 . bl .foo
2671 . nop
2672
2673 The function definition in another object file might be:
2674
2675 . .section .opd
2676 . foo: .quad .foo
2677 . .quad .TOC.@tocbase
2678 . .quad 0
2679 .
2680 . .text
2681 . .foo: blr
2682
2683 When the linker resolves the call during a static link, the branch
2684 unsurprisingly just goes to .foo and the .opd information is unused.
2685 If the function definition is in a shared library, things are a little
2686 different: The call goes via a plt call stub, the opd information gets
2687 copied to the plt, and the linker patches the nop.
2688
2689 . x:
2690 . bl .foo_stub
2691 . ld 2,40(1)
2692 .
2693 .
2694 . .foo_stub:
2695 . std 2,40(1) # in practice, the call stub
2696 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2697 . addi 11,11,Lfoo@toc@l # this is the general idea
2698 . ld 12,0(11)
2699 . ld 2,8(11)
2700 . mtctr 12
2701 . ld 11,16(11)
2702 . bctr
2703 .
2704 . .section .plt
2705 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2706
2707 The "reloc ()" notation is supposed to indicate that the linker emits
2708 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2709 copying.
2710
2711 What are the difficulties here? Well, firstly, the relocations
2712 examined by the linker in check_relocs are against the function code
2713 sym .foo, while the dynamic relocation in the plt is emitted against
2714 the function descriptor symbol, foo. Somewhere along the line, we need
2715 to carefully copy dynamic link information from one symbol to the other.
2716 Secondly, the generic part of the elf linker will make .foo a dynamic
2717 symbol as is normal for most other backends. We need foo dynamic
2718 instead, at least for an application final link. However, when
2719 creating a shared library containing foo, we need to have both symbols
2720 dynamic so that references to .foo are satisfied during the early
2721 stages of linking. Otherwise the linker might decide to pull in a
2722 definition from some other object, eg. a static library.
2723
2724 Update: As of August 2004, we support a new convention. Function
2725 calls may use the function descriptor symbol, ie. "bl foo". This
2726 behaves exactly as "bl .foo". */
2727
2728 /* Of those relocs that might be copied as dynamic relocs, this
2729 function selects those that must be copied when linking a shared
2730 library or PIE, even when the symbol is local. */
2731
2732 static int
2733 must_be_dyn_reloc (struct bfd_link_info *info,
2734 enum elf_ppc64_reloc_type r_type)
2735 {
2736 switch (r_type)
2737 {
2738 default:
2739 /* Only relative relocs can be resolved when the object load
2740 address isn't fixed. DTPREL64 is excluded because the
2741 dynamic linker needs to differentiate global dynamic from
2742 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2743 return 1;
2744
2745 case R_PPC64_REL32:
2746 case R_PPC64_REL64:
2747 case R_PPC64_REL30:
2748 case R_PPC64_TOC16:
2749 case R_PPC64_TOC16_DS:
2750 case R_PPC64_TOC16_LO:
2751 case R_PPC64_TOC16_HI:
2752 case R_PPC64_TOC16_HA:
2753 case R_PPC64_TOC16_LO_DS:
2754 return 0;
2755
2756 case R_PPC64_TPREL16:
2757 case R_PPC64_TPREL16_LO:
2758 case R_PPC64_TPREL16_HI:
2759 case R_PPC64_TPREL16_HA:
2760 case R_PPC64_TPREL16_DS:
2761 case R_PPC64_TPREL16_LO_DS:
2762 case R_PPC64_TPREL16_HIGH:
2763 case R_PPC64_TPREL16_HIGHA:
2764 case R_PPC64_TPREL16_HIGHER:
2765 case R_PPC64_TPREL16_HIGHERA:
2766 case R_PPC64_TPREL16_HIGHEST:
2767 case R_PPC64_TPREL16_HIGHESTA:
2768 case R_PPC64_TPREL64:
2769 case R_PPC64_TPREL34:
2770 /* These relocations are relative but in a shared library the
2771 linker doesn't know the thread pointer base. */
2772 return bfd_link_dll (info);
2773 }
2774 }
2775
2776 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2777 copying dynamic variables from a shared lib into an app's dynbss
2778 section, and instead use a dynamic relocation to point into the
2779 shared lib. With code that gcc generates, it's vital that this be
2780 enabled; In the PowerPC64 ABI, the address of a function is actually
2781 the address of a function descriptor, which resides in the .opd
2782 section. gcc uses the descriptor directly rather than going via the
2783 GOT as some other ABI's do, which means that initialized function
2784 pointers must reference the descriptor. Thus, a function pointer
2785 initialized to the address of a function in a shared library will
2786 either require a copy reloc, or a dynamic reloc. Using a copy reloc
2787 redefines the function descriptor symbol to point to the copy. This
2788 presents a problem as a plt entry for that function is also
2789 initialized from the function descriptor symbol and the copy reloc
2790 may not be initialized first. */
2791 #define ELIMINATE_COPY_RELOCS 1
2792
2793 /* Section name for stubs is the associated section name plus this
2794 string. */
2795 #define STUB_SUFFIX ".stub"
2796
2797 /* Linker stubs.
2798 ppc_stub_long_branch:
2799 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2800 destination, but a 24 bit branch in a stub section will reach.
2801 . b dest
2802
2803 ppc_stub_plt_branch:
2804 Similar to the above, but a 24 bit branch in the stub section won't
2805 reach its destination.
2806 . addis %r11,%r2,xxx@toc@ha
2807 . ld %r12,xxx@toc@l(%r11)
2808 . mtctr %r12
2809 . bctr
2810
2811 ppc_stub_plt_call:
2812 Used to call a function in a shared library. If it so happens that
2813 the plt entry referenced crosses a 64k boundary, then an extra
2814 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2815 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2816 . addis %r11,%r2,xxx@toc@ha
2817 . ld %r12,xxx+0@toc@l(%r11)
2818 . mtctr %r12
2819 . ld %r2,xxx+8@toc@l(%r11)
2820 . ld %r11,xxx+16@toc@l(%r11)
2821 . bctr
2822
2823 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2824 code to adjust the value and save r2 to support multiple toc sections.
2825 A ppc_stub_long_branch with an r2 offset looks like:
2826 . std %r2,40(%r1)
2827 . addis %r2,%r2,off@ha
2828 . addi %r2,%r2,off@l
2829 . b dest
2830
2831 A ppc_stub_plt_branch with an r2 offset looks like:
2832 . std %r2,40(%r1)
2833 . addis %r11,%r2,xxx@toc@ha
2834 . ld %r12,xxx@toc@l(%r11)
2835 . addis %r2,%r2,off@ha
2836 . addi %r2,%r2,off@l
2837 . mtctr %r12
2838 . bctr
2839
2840 All of the above stubs are shown as their ELFv1 variants. ELFv2
2841 variants exist too, simpler for plt calls since a new toc pointer
2842 and static chain are not loaded by the stub. In addition, ELFv2
2843 has some more complex stubs to handle calls marked with NOTOC
2844 relocs from functions where r2 is not a valid toc pointer. These
2845 come in two flavours, the ones shown below, and _both variants that
2846 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2847 one call is from a function where r2 is used as the toc pointer but
2848 needs a toc adjusting stub for small-model multi-toc, and another
2849 call is from a function where r2 is not valid.
2850 ppc_stub_long_branch_notoc:
2851 . mflr %r12
2852 . bcl 20,31,1f
2853 . 1:
2854 . mflr %r11
2855 . mtlr %r12
2856 . addis %r12,%r11,dest-1b@ha
2857 . addi %r12,%r12,dest-1b@l
2858 . b dest
2859
2860 ppc_stub_plt_branch_notoc:
2861 . mflr %r12
2862 . bcl 20,31,1f
2863 . 1:
2864 . mflr %r11
2865 . mtlr %r12
2866 . lis %r12,xxx-1b@highest
2867 . ori %r12,%r12,xxx-1b@higher
2868 . sldi %r12,%r12,32
2869 . oris %r12,%r12,xxx-1b@high
2870 . ori %r12,%r12,xxx-1b@l
2871 . add %r12,%r11,%r12
2872 . mtctr %r12
2873 . bctr
2874
2875 ppc_stub_plt_call_notoc:
2876 . mflr %r12
2877 . bcl 20,31,1f
2878 . 1:
2879 . mflr %r11
2880 . mtlr %r12
2881 . lis %r12,xxx-1b@highest
2882 . ori %r12,%r12,xxx-1b@higher
2883 . sldi %r12,%r12,32
2884 . oris %r12,%r12,xxx-1b@high
2885 . ori %r12,%r12,xxx-1b@l
2886 . ldx %r12,%r11,%r12
2887 . mtctr %r12
2888 . bctr
2889
2890 There are also ELFv1 powerxx variants of these stubs.
2891 ppc_stub_long_branch_notoc:
2892 . pla %r12,dest@pcrel
2893 . b dest
2894 ppc_stub_plt_branch_notoc:
2895 . lis %r11,(dest-1f)@highesta34
2896 . ori %r11,%r11,(dest-1f)@highera34
2897 . sldi %r11,%r11,34
2898 . 1: pla %r12,dest@pcrel
2899 . add %r12,%r11,%r12
2900 . mtctr %r12
2901 . bctr
2902 ppc_stub_plt_call_notoc:
2903 . lis %r11,(xxx-1f)@highesta34
2904 . ori %r11,%r11,(xxx-1f)@highera34
2905 . sldi %r11,%r11,34
2906 . 1: pla %r12,xxx@pcrel
2907 . ldx %r12,%r11,%r12
2908 . mtctr %r12
2909 . bctr
2910
2911 In cases where the high instructions would add zero, they are
2912 omitted and following instructions modified in some cases.
2913 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2914 to
2915 . pld %r12,xxx@pcrel
2916 . mtctr %r12
2917 . bctr
2918
2919 For a given stub group (a set of sections all using the same toc
2920 pointer value) there will be just one stub type used for any
2921 particular function symbol. For example, if printf is called from
2922 code with the tocsave optimization (ie. r2 saved in function
2923 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2924 and from other code without the tocsave optimization requiring a
2925 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2926 type will be created. Calls with the tocsave optimization will
2927 enter this stub after the instruction saving r2. A similar
2928 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2929 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2930 to call an external function like printf. If other calls to printf
2931 require a ppc_stub_plt_call linkage stub then a single
2932 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2933 call. If other calls to printf require a ppc_stub_plt_call_r2save
2934 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2935 be created and calls not requiring r2 to be saved will enter the
2936 stub after the r2 save instruction. There is an analogous
2937 hierarchy of long branch and plt branch stubs for local call
2938 linkage. */
2939
2940 enum ppc_stub_type
2941 {
2942 ppc_stub_none,
2943 ppc_stub_long_branch,
2944 ppc_stub_long_branch_r2off,
2945 ppc_stub_long_branch_notoc,
2946 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2947 ppc_stub_plt_branch,
2948 ppc_stub_plt_branch_r2off,
2949 ppc_stub_plt_branch_notoc,
2950 ppc_stub_plt_branch_both,
2951 ppc_stub_plt_call,
2952 ppc_stub_plt_call_r2save,
2953 ppc_stub_plt_call_notoc,
2954 ppc_stub_plt_call_both,
2955 ppc_stub_global_entry,
2956 ppc_stub_save_res
2957 };
2958
2959 /* Information on stub grouping. */
2960 struct map_stub
2961 {
2962 /* The stub section. */
2963 asection *stub_sec;
2964 /* This is the section to which stubs in the group will be attached. */
2965 asection *link_sec;
2966 /* Next group. */
2967 struct map_stub *next;
2968 /* Whether to emit a copy of register save/restore functions in this
2969 group. */
2970 int needs_save_res;
2971 /* Current offset within stubs after the insn restoring lr in a
2972 _notoc or _both stub using bcl for pc-relative addressing, or
2973 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2974 unsigned int lr_restore;
2975 /* Accumulated size of EH info emitted to describe return address
2976 if stubs modify lr. Does not include 17 byte FDE header. */
2977 unsigned int eh_size;
2978 /* Offset in glink_eh_frame to the start of EH info for this group. */
2979 unsigned int eh_base;
2980 };
2981
2982 struct ppc_stub_hash_entry
2983 {
2984 /* Base hash table entry structure. */
2985 struct bfd_hash_entry root;
2986
2987 enum ppc_stub_type stub_type;
2988
2989 /* Group information. */
2990 struct map_stub *group;
2991
2992 /* Offset within stub_sec of the beginning of this stub. */
2993 bfd_vma stub_offset;
2994
2995 /* Given the symbol's value and its section we can determine its final
2996 value when building the stubs (so the stub knows where to jump. */
2997 bfd_vma target_value;
2998 asection *target_section;
2999
3000 /* The symbol table entry, if any, that this was derived from. */
3001 struct ppc_link_hash_entry *h;
3002 struct plt_entry *plt_ent;
3003
3004 /* Symbol type. */
3005 unsigned char symtype;
3006
3007 /* Symbol st_other. */
3008 unsigned char other;
3009 };
3010
3011 struct ppc_branch_hash_entry
3012 {
3013 /* Base hash table entry structure. */
3014 struct bfd_hash_entry root;
3015
3016 /* Offset within branch lookup table. */
3017 unsigned int offset;
3018
3019 /* Generation marker. */
3020 unsigned int iter;
3021 };
3022
3023 /* Used to track dynamic relocations for local symbols. */
3024 struct ppc_dyn_relocs
3025 {
3026 struct ppc_dyn_relocs *next;
3027
3028 /* The input section of the reloc. */
3029 asection *sec;
3030
3031 /* Total number of relocs copied for the input section. */
3032 unsigned int count : 31;
3033
3034 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3035 unsigned int ifunc : 1;
3036 };
3037
3038 struct ppc_link_hash_entry
3039 {
3040 struct elf_link_hash_entry elf;
3041
3042 union
3043 {
3044 /* A pointer to the most recently used stub hash entry against this
3045 symbol. */
3046 struct ppc_stub_hash_entry *stub_cache;
3047
3048 /* A pointer to the next symbol starting with a '.' */
3049 struct ppc_link_hash_entry *next_dot_sym;
3050 } u;
3051
3052 /* Track dynamic relocs copied for this symbol. */
3053 struct elf_dyn_relocs *dyn_relocs;
3054
3055 /* Link between function code and descriptor symbols. */
3056 struct ppc_link_hash_entry *oh;
3057
3058 /* Flag function code and descriptor symbols. */
3059 unsigned int is_func:1;
3060 unsigned int is_func_descriptor:1;
3061 unsigned int fake:1;
3062
3063 /* Whether global opd/toc sym has been adjusted or not.
3064 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3065 should be set for all globals defined in any opd/toc section. */
3066 unsigned int adjust_done:1;
3067
3068 /* Set if this is an out-of-line register save/restore function,
3069 with non-standard calling convention. */
3070 unsigned int save_res:1;
3071
3072 /* Set if a duplicate symbol with non-zero localentry is detected,
3073 even when the duplicate symbol does not provide a definition. */
3074 unsigned int non_zero_localentry:1;
3075
3076 /* Contexts in which symbol is used in the GOT (or TOC).
3077 Bits are or'd into the mask as the corresponding relocs are
3078 encountered during check_relocs, with TLS_TLS being set when any
3079 of the other TLS bits are set. tls_optimize clears bits when
3080 optimizing to indicate the corresponding GOT entry type is not
3081 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3082 set TLS_GDIE when a GD reloc turns into an IE one.
3083 These flags are also kept for local symbols. */
3084 #define TLS_TLS 1 /* Any TLS reloc. */
3085 #define TLS_GD 2 /* GD reloc. */
3086 #define TLS_LD 4 /* LD reloc. */
3087 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3088 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3089 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3090 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3091 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3092 unsigned char tls_mask;
3093
3094 /* The above field is also used to mark function symbols. In which
3095 case TLS_TLS will be 0. */
3096 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3097 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3098 #define NON_GOT 256 /* local symbol plt, not stored. */
3099 };
3100
3101 /* ppc64 ELF linker hash table. */
3102
3103 struct ppc_link_hash_table
3104 {
3105 struct elf_link_hash_table elf;
3106
3107 /* The stub hash table. */
3108 struct bfd_hash_table stub_hash_table;
3109
3110 /* Another hash table for plt_branch stubs. */
3111 struct bfd_hash_table branch_hash_table;
3112
3113 /* Hash table for function prologue tocsave. */
3114 htab_t tocsave_htab;
3115
3116 /* Various options and other info passed from the linker. */
3117 struct ppc64_elf_params *params;
3118
3119 /* The size of sec_info below. */
3120 unsigned int sec_info_arr_size;
3121
3122 /* Per-section array of extra section info. Done this way rather
3123 than as part of ppc64_elf_section_data so we have the info for
3124 non-ppc64 sections. */
3125 struct
3126 {
3127 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3128 bfd_vma toc_off;
3129
3130 union
3131 {
3132 /* The section group that this section belongs to. */
3133 struct map_stub *group;
3134 /* A temp section list pointer. */
3135 asection *list;
3136 } u;
3137 } *sec_info;
3138
3139 /* Linked list of groups. */
3140 struct map_stub *group;
3141
3142 /* Temp used when calculating TOC pointers. */
3143 bfd_vma toc_curr;
3144 bfd *toc_bfd;
3145 asection *toc_first_sec;
3146
3147 /* Used when adding symbols. */
3148 struct ppc_link_hash_entry *dot_syms;
3149
3150 /* Shortcuts to get to dynamic linker sections. */
3151 asection *glink;
3152 asection *global_entry;
3153 asection *sfpr;
3154 asection *pltlocal;
3155 asection *relpltlocal;
3156 asection *brlt;
3157 asection *relbrlt;
3158 asection *glink_eh_frame;
3159
3160 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3161 struct ppc_link_hash_entry *tls_get_addr;
3162 struct ppc_link_hash_entry *tls_get_addr_fd;
3163
3164 /* The size of reliplt used by got entry relocs. */
3165 bfd_size_type got_reli_size;
3166
3167 /* Statistics. */
3168 unsigned long stub_count[ppc_stub_global_entry];
3169
3170 /* Number of stubs against global syms. */
3171 unsigned long stub_globals;
3172
3173 /* Set if we're linking code with function descriptors. */
3174 unsigned int opd_abi:1;
3175
3176 /* Support for multiple toc sections. */
3177 unsigned int do_multi_toc:1;
3178 unsigned int multi_toc_needed:1;
3179 unsigned int second_toc_pass:1;
3180 unsigned int do_toc_opt:1;
3181
3182 /* Set if tls optimization is enabled. */
3183 unsigned int do_tls_opt:1;
3184
3185 /* Set if inline plt calls should be converted to direct calls. */
3186 unsigned int can_convert_all_inline_plt:1;
3187
3188 /* Set on error. */
3189 unsigned int stub_error:1;
3190
3191 /* Whether func_desc_adjust needs to be run over symbols. */
3192 unsigned int need_func_desc_adj:1;
3193
3194 /* Whether there exist local gnu indirect function resolvers,
3195 referenced by dynamic relocations. */
3196 unsigned int local_ifunc_resolver:1;
3197 unsigned int maybe_local_ifunc_resolver:1;
3198
3199 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3200 unsigned int has_plt_localentry0:1;
3201
3202 /* Whether calls are made via the PLT from NOTOC functions. */
3203 unsigned int notoc_plt:1;
3204
3205 /* Whether to use powerxx instructions in linkage stubs. */
3206 unsigned int powerxx_stubs:1;
3207
3208 /* Incremented every time we size stubs. */
3209 unsigned int stub_iteration;
3210
3211 /* Small local sym cache. */
3212 struct sym_cache sym_cache;
3213 };
3214
3215 /* Rename some of the generic section flags to better document how they
3216 are used here. */
3217
3218 /* Nonzero if this section has TLS related relocations. */
3219 #define has_tls_reloc sec_flg0
3220
3221 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3222 relocations. */
3223 #define nomark_tls_get_addr sec_flg1
3224
3225 /* Nonzero if this section has any toc or got relocs. */
3226 #define has_toc_reloc sec_flg2
3227
3228 /* Nonzero if this section has a call to another section that uses
3229 the toc or got. */
3230 #define makes_toc_func_call sec_flg3
3231
3232 /* Recursion protection when determining above flag. */
3233 #define call_check_in_progress sec_flg4
3234 #define call_check_done sec_flg5
3235
3236 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3237
3238 #define ppc_hash_table(p) \
3239 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3240 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3241
3242 #define ppc_stub_hash_lookup(table, string, create, copy) \
3243 ((struct ppc_stub_hash_entry *) \
3244 bfd_hash_lookup ((table), (string), (create), (copy)))
3245
3246 #define ppc_branch_hash_lookup(table, string, create, copy) \
3247 ((struct ppc_branch_hash_entry *) \
3248 bfd_hash_lookup ((table), (string), (create), (copy)))
3249
3250 /* Create an entry in the stub hash table. */
3251
3252 static struct bfd_hash_entry *
3253 stub_hash_newfunc (struct bfd_hash_entry *entry,
3254 struct bfd_hash_table *table,
3255 const char *string)
3256 {
3257 /* Allocate the structure if it has not already been allocated by a
3258 subclass. */
3259 if (entry == NULL)
3260 {
3261 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3262 if (entry == NULL)
3263 return entry;
3264 }
3265
3266 /* Call the allocation method of the superclass. */
3267 entry = bfd_hash_newfunc (entry, table, string);
3268 if (entry != NULL)
3269 {
3270 struct ppc_stub_hash_entry *eh;
3271
3272 /* Initialize the local fields. */
3273 eh = (struct ppc_stub_hash_entry *) entry;
3274 eh->stub_type = ppc_stub_none;
3275 eh->group = NULL;
3276 eh->stub_offset = 0;
3277 eh->target_value = 0;
3278 eh->target_section = NULL;
3279 eh->h = NULL;
3280 eh->plt_ent = NULL;
3281 eh->other = 0;
3282 }
3283
3284 return entry;
3285 }
3286
3287 /* Create an entry in the branch hash table. */
3288
3289 static struct bfd_hash_entry *
3290 branch_hash_newfunc (struct bfd_hash_entry *entry,
3291 struct bfd_hash_table *table,
3292 const char *string)
3293 {
3294 /* Allocate the structure if it has not already been allocated by a
3295 subclass. */
3296 if (entry == NULL)
3297 {
3298 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3299 if (entry == NULL)
3300 return entry;
3301 }
3302
3303 /* Call the allocation method of the superclass. */
3304 entry = bfd_hash_newfunc (entry, table, string);
3305 if (entry != NULL)
3306 {
3307 struct ppc_branch_hash_entry *eh;
3308
3309 /* Initialize the local fields. */
3310 eh = (struct ppc_branch_hash_entry *) entry;
3311 eh->offset = 0;
3312 eh->iter = 0;
3313 }
3314
3315 return entry;
3316 }
3317
3318 /* Create an entry in a ppc64 ELF linker hash table. */
3319
3320 static struct bfd_hash_entry *
3321 link_hash_newfunc (struct bfd_hash_entry *entry,
3322 struct bfd_hash_table *table,
3323 const char *string)
3324 {
3325 /* Allocate the structure if it has not already been allocated by a
3326 subclass. */
3327 if (entry == NULL)
3328 {
3329 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3330 if (entry == NULL)
3331 return entry;
3332 }
3333
3334 /* Call the allocation method of the superclass. */
3335 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3336 if (entry != NULL)
3337 {
3338 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3339
3340 memset (&eh->u.stub_cache, 0,
3341 (sizeof (struct ppc_link_hash_entry)
3342 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3343
3344 /* When making function calls, old ABI code references function entry
3345 points (dot symbols), while new ABI code references the function
3346 descriptor symbol. We need to make any combination of reference and
3347 definition work together, without breaking archive linking.
3348
3349 For a defined function "foo" and an undefined call to "bar":
3350 An old object defines "foo" and ".foo", references ".bar" (possibly
3351 "bar" too).
3352 A new object defines "foo" and references "bar".
3353
3354 A new object thus has no problem with its undefined symbols being
3355 satisfied by definitions in an old object. On the other hand, the
3356 old object won't have ".bar" satisfied by a new object.
3357
3358 Keep a list of newly added dot-symbols. */
3359
3360 if (string[0] == '.')
3361 {
3362 struct ppc_link_hash_table *htab;
3363
3364 htab = (struct ppc_link_hash_table *) table;
3365 eh->u.next_dot_sym = htab->dot_syms;
3366 htab->dot_syms = eh;
3367 }
3368 }
3369
3370 return entry;
3371 }
3372
3373 struct tocsave_entry
3374 {
3375 asection *sec;
3376 bfd_vma offset;
3377 };
3378
3379 static hashval_t
3380 tocsave_htab_hash (const void *p)
3381 {
3382 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3383 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3384 }
3385
3386 static int
3387 tocsave_htab_eq (const void *p1, const void *p2)
3388 {
3389 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3390 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3391 return e1->sec == e2->sec && e1->offset == e2->offset;
3392 }
3393
3394 /* Destroy a ppc64 ELF linker hash table. */
3395
3396 static void
3397 ppc64_elf_link_hash_table_free (bfd *obfd)
3398 {
3399 struct ppc_link_hash_table *htab;
3400
3401 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3402 if (htab->tocsave_htab)
3403 htab_delete (htab->tocsave_htab);
3404 bfd_hash_table_free (&htab->branch_hash_table);
3405 bfd_hash_table_free (&htab->stub_hash_table);
3406 _bfd_elf_link_hash_table_free (obfd);
3407 }
3408
3409 /* Create a ppc64 ELF linker hash table. */
3410
3411 static struct bfd_link_hash_table *
3412 ppc64_elf_link_hash_table_create (bfd *abfd)
3413 {
3414 struct ppc_link_hash_table *htab;
3415 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3416
3417 htab = bfd_zmalloc (amt);
3418 if (htab == NULL)
3419 return NULL;
3420
3421 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3422 sizeof (struct ppc_link_hash_entry),
3423 PPC64_ELF_DATA))
3424 {
3425 free (htab);
3426 return NULL;
3427 }
3428
3429 /* Init the stub hash table too. */
3430 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3431 sizeof (struct ppc_stub_hash_entry)))
3432 {
3433 _bfd_elf_link_hash_table_free (abfd);
3434 return NULL;
3435 }
3436
3437 /* And the branch hash table. */
3438 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3439 sizeof (struct ppc_branch_hash_entry)))
3440 {
3441 bfd_hash_table_free (&htab->stub_hash_table);
3442 _bfd_elf_link_hash_table_free (abfd);
3443 return NULL;
3444 }
3445
3446 htab->tocsave_htab = htab_try_create (1024,
3447 tocsave_htab_hash,
3448 tocsave_htab_eq,
3449 NULL);
3450 if (htab->tocsave_htab == NULL)
3451 {
3452 ppc64_elf_link_hash_table_free (abfd);
3453 return NULL;
3454 }
3455 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3456
3457 /* Initializing two fields of the union is just cosmetic. We really
3458 only care about glist, but when compiled on a 32-bit host the
3459 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3460 debugger inspection of these fields look nicer. */
3461 htab->elf.init_got_refcount.refcount = 0;
3462 htab->elf.init_got_refcount.glist = NULL;
3463 htab->elf.init_plt_refcount.refcount = 0;
3464 htab->elf.init_plt_refcount.glist = NULL;
3465 htab->elf.init_got_offset.offset = 0;
3466 htab->elf.init_got_offset.glist = NULL;
3467 htab->elf.init_plt_offset.offset = 0;
3468 htab->elf.init_plt_offset.glist = NULL;
3469
3470 return &htab->elf.root;
3471 }
3472
3473 /* Create sections for linker generated code. */
3474
3475 static bfd_boolean
3476 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3477 {
3478 struct ppc_link_hash_table *htab;
3479 flagword flags;
3480
3481 htab = ppc_hash_table (info);
3482
3483 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3484 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3485 if (htab->params->save_restore_funcs)
3486 {
3487 /* Create .sfpr for code to save and restore fp regs. */
3488 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3489 flags);
3490 if (htab->sfpr == NULL
3491 || !bfd_set_section_alignment (htab->sfpr, 2))
3492 return FALSE;
3493 }
3494
3495 if (bfd_link_relocatable (info))
3496 return TRUE;
3497
3498 /* Create .glink for lazy dynamic linking support. */
3499 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3500 flags);
3501 if (htab->glink == NULL
3502 || !bfd_set_section_alignment (htab->glink, 3))
3503 return FALSE;
3504
3505 /* The part of .glink used by global entry stubs, separate so that
3506 it can be aligned appropriately without affecting htab->glink. */
3507 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3508 flags);
3509 if (htab->global_entry == NULL
3510 || !bfd_set_section_alignment (htab->global_entry, 2))
3511 return FALSE;
3512
3513 if (!info->no_ld_generated_unwind_info)
3514 {
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3516 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3518 ".eh_frame",
3519 flags);
3520 if (htab->glink_eh_frame == NULL
3521 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3522 return FALSE;
3523 }
3524
3525 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3526 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3527 if (htab->elf.iplt == NULL
3528 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3529 return FALSE;
3530
3531 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3532 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3533 htab->elf.irelplt
3534 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3535 if (htab->elf.irelplt == NULL
3536 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3537 return FALSE;
3538
3539 /* Create branch lookup table for plt_branch stubs. */
3540 flags = (SEC_ALLOC | SEC_LOAD
3541 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3542 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3543 flags);
3544 if (htab->brlt == NULL
3545 || !bfd_set_section_alignment (htab->brlt, 3))
3546 return FALSE;
3547
3548 /* Local plt entries, put in .branch_lt but a separate section for
3549 convenience. */
3550 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3551 flags);
3552 if (htab->pltlocal == NULL
3553 || !bfd_set_section_alignment (htab->pltlocal, 3))
3554 return FALSE;
3555
3556 if (!bfd_link_pic (info))
3557 return TRUE;
3558
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3560 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3561 htab->relbrlt
3562 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3563 if (htab->relbrlt == NULL
3564 || !bfd_set_section_alignment (htab->relbrlt, 3))
3565 return FALSE;
3566
3567 htab->relpltlocal
3568 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3569 if (htab->relpltlocal == NULL
3570 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3571 return FALSE;
3572
3573 return TRUE;
3574 }
3575
3576 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3577
3578 bfd_boolean
3579 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3580 struct ppc64_elf_params *params)
3581 {
3582 struct ppc_link_hash_table *htab;
3583
3584 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3585
3586 /* Always hook our dynamic sections into the first bfd, which is the
3587 linker created stub bfd. This ensures that the GOT header is at
3588 the start of the output TOC section. */
3589 htab = ppc_hash_table (info);
3590 htab->elf.dynobj = params->stub_bfd;
3591 htab->params = params;
3592
3593 return create_linkage_sections (htab->elf.dynobj, info);
3594 }
3595
3596 /* Build a name for an entry in the stub hash table. */
3597
3598 static char *
3599 ppc_stub_name (const asection *input_section,
3600 const asection *sym_sec,
3601 const struct ppc_link_hash_entry *h,
3602 const Elf_Internal_Rela *rel)
3603 {
3604 char *stub_name;
3605 ssize_t len;
3606
3607 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3608 offsets from a sym as a branch target? In fact, we could
3609 probably assume the addend is always zero. */
3610 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3611
3612 if (h)
3613 {
3614 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3615 stub_name = bfd_malloc (len);
3616 if (stub_name == NULL)
3617 return stub_name;
3618
3619 len = sprintf (stub_name, "%08x.%s+%x",
3620 input_section->id & 0xffffffff,
3621 h->elf.root.root.string,
3622 (int) rel->r_addend & 0xffffffff);
3623 }
3624 else
3625 {
3626 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3627 stub_name = bfd_malloc (len);
3628 if (stub_name == NULL)
3629 return stub_name;
3630
3631 len = sprintf (stub_name, "%08x.%x:%x+%x",
3632 input_section->id & 0xffffffff,
3633 sym_sec->id & 0xffffffff,
3634 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3635 (int) rel->r_addend & 0xffffffff);
3636 }
3637 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3638 stub_name[len - 2] = 0;
3639 return stub_name;
3640 }
3641
3642 /* Look up an entry in the stub hash. Stub entries are cached because
3643 creating the stub name takes a bit of time. */
3644
3645 static struct ppc_stub_hash_entry *
3646 ppc_get_stub_entry (const asection *input_section,
3647 const asection *sym_sec,
3648 struct ppc_link_hash_entry *h,
3649 const Elf_Internal_Rela *rel,
3650 struct ppc_link_hash_table *htab)
3651 {
3652 struct ppc_stub_hash_entry *stub_entry;
3653 struct map_stub *group;
3654
3655 /* If this input section is part of a group of sections sharing one
3656 stub section, then use the id of the first section in the group.
3657 Stub names need to include a section id, as there may well be
3658 more than one stub used to reach say, printf, and we need to
3659 distinguish between them. */
3660 group = htab->sec_info[input_section->id].u.group;
3661 if (group == NULL)
3662 return NULL;
3663
3664 if (h != NULL && h->u.stub_cache != NULL
3665 && h->u.stub_cache->h == h
3666 && h->u.stub_cache->group == group)
3667 {
3668 stub_entry = h->u.stub_cache;
3669 }
3670 else
3671 {
3672 char *stub_name;
3673
3674 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3675 if (stub_name == NULL)
3676 return NULL;
3677
3678 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3679 stub_name, FALSE, FALSE);
3680 if (h != NULL)
3681 h->u.stub_cache = stub_entry;
3682
3683 free (stub_name);
3684 }
3685
3686 return stub_entry;
3687 }
3688
3689 /* Add a new stub entry to the stub hash. Not all fields of the new
3690 stub entry are initialised. */
3691
3692 static struct ppc_stub_hash_entry *
3693 ppc_add_stub (const char *stub_name,
3694 asection *section,
3695 struct bfd_link_info *info)
3696 {
3697 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3698 struct map_stub *group;
3699 asection *link_sec;
3700 asection *stub_sec;
3701 struct ppc_stub_hash_entry *stub_entry;
3702
3703 group = htab->sec_info[section->id].u.group;
3704 link_sec = group->link_sec;
3705 stub_sec = group->stub_sec;
3706 if (stub_sec == NULL)
3707 {
3708 size_t namelen;
3709 bfd_size_type len;
3710 char *s_name;
3711
3712 namelen = strlen (link_sec->name);
3713 len = namelen + sizeof (STUB_SUFFIX);
3714 s_name = bfd_alloc (htab->params->stub_bfd, len);
3715 if (s_name == NULL)
3716 return NULL;
3717
3718 memcpy (s_name, link_sec->name, namelen);
3719 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3720 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3721 if (stub_sec == NULL)
3722 return NULL;
3723 group->stub_sec = stub_sec;
3724 }
3725
3726 /* Enter this entry into the linker stub hash table. */
3727 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3728 TRUE, FALSE);
3729 if (stub_entry == NULL)
3730 {
3731 /* xgettext:c-format */
3732 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3733 section->owner, stub_name);
3734 return NULL;
3735 }
3736
3737 stub_entry->group = group;
3738 stub_entry->stub_offset = 0;
3739 return stub_entry;
3740 }
3741
3742 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3743 not already done. */
3744
3745 static bfd_boolean
3746 create_got_section (bfd *abfd, struct bfd_link_info *info)
3747 {
3748 asection *got, *relgot;
3749 flagword flags;
3750 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3751
3752 if (!is_ppc64_elf (abfd))
3753 return FALSE;
3754 if (htab == NULL)
3755 return FALSE;
3756
3757 if (!htab->elf.sgot
3758 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3759 return FALSE;
3760
3761 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3762 | SEC_LINKER_CREATED);
3763
3764 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3765 if (!got
3766 || !bfd_set_section_alignment (got, 3))
3767 return FALSE;
3768
3769 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3770 flags | SEC_READONLY);
3771 if (!relgot
3772 || !bfd_set_section_alignment (relgot, 3))
3773 return FALSE;
3774
3775 ppc64_elf_tdata (abfd)->got = got;
3776 ppc64_elf_tdata (abfd)->relgot = relgot;
3777 return TRUE;
3778 }
3779
3780 /* Follow indirect and warning symbol links. */
3781
3782 static inline struct bfd_link_hash_entry *
3783 follow_link (struct bfd_link_hash_entry *h)
3784 {
3785 while (h->type == bfd_link_hash_indirect
3786 || h->type == bfd_link_hash_warning)
3787 h = h->u.i.link;
3788 return h;
3789 }
3790
3791 static inline struct elf_link_hash_entry *
3792 elf_follow_link (struct elf_link_hash_entry *h)
3793 {
3794 return (struct elf_link_hash_entry *) follow_link (&h->root);
3795 }
3796
3797 static inline struct ppc_link_hash_entry *
3798 ppc_follow_link (struct ppc_link_hash_entry *h)
3799 {
3800 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3801 }
3802
3803 /* Merge PLT info on FROM with that on TO. */
3804
3805 static void
3806 move_plt_plist (struct ppc_link_hash_entry *from,
3807 struct ppc_link_hash_entry *to)
3808 {
3809 if (from->elf.plt.plist != NULL)
3810 {
3811 if (to->elf.plt.plist != NULL)
3812 {
3813 struct plt_entry **entp;
3814 struct plt_entry *ent;
3815
3816 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3817 {
3818 struct plt_entry *dent;
3819
3820 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3821 if (dent->addend == ent->addend)
3822 {
3823 dent->plt.refcount += ent->plt.refcount;
3824 *entp = ent->next;
3825 break;
3826 }
3827 if (dent == NULL)
3828 entp = &ent->next;
3829 }
3830 *entp = to->elf.plt.plist;
3831 }
3832
3833 to->elf.plt.plist = from->elf.plt.plist;
3834 from->elf.plt.plist = NULL;
3835 }
3836 }
3837
3838 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3839
3840 static void
3841 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3842 struct elf_link_hash_entry *dir,
3843 struct elf_link_hash_entry *ind)
3844 {
3845 struct ppc_link_hash_entry *edir, *eind;
3846
3847 edir = (struct ppc_link_hash_entry *) dir;
3848 eind = (struct ppc_link_hash_entry *) ind;
3849
3850 edir->is_func |= eind->is_func;
3851 edir->is_func_descriptor |= eind->is_func_descriptor;
3852 edir->tls_mask |= eind->tls_mask;
3853 if (eind->oh != NULL)
3854 edir->oh = ppc_follow_link (eind->oh);
3855
3856 if (edir->elf.versioned != versioned_hidden)
3857 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3858 edir->elf.ref_regular |= eind->elf.ref_regular;
3859 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3860 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3861 edir->elf.needs_plt |= eind->elf.needs_plt;
3862 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3863
3864 /* If we were called to copy over info for a weak sym, don't copy
3865 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3866 in order to simplify readonly_dynrelocs and save a field in the
3867 symbol hash entry, but that means dyn_relocs can't be used in any
3868 tests about a specific symbol, or affect other symbol flags which
3869 are then tested. */
3870 if (eind->elf.root.type != bfd_link_hash_indirect)
3871 return;
3872
3873 /* Copy over any dynamic relocs we may have on the indirect sym. */
3874 if (eind->dyn_relocs != NULL)
3875 {
3876 if (edir->dyn_relocs != NULL)
3877 {
3878 struct elf_dyn_relocs **pp;
3879 struct elf_dyn_relocs *p;
3880
3881 /* Add reloc counts against the indirect sym to the direct sym
3882 list. Merge any entries against the same section. */
3883 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3884 {
3885 struct elf_dyn_relocs *q;
3886
3887 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3888 if (q->sec == p->sec)
3889 {
3890 q->pc_count += p->pc_count;
3891 q->count += p->count;
3892 *pp = p->next;
3893 break;
3894 }
3895 if (q == NULL)
3896 pp = &p->next;
3897 }
3898 *pp = edir->dyn_relocs;
3899 }
3900
3901 edir->dyn_relocs = eind->dyn_relocs;
3902 eind->dyn_relocs = NULL;
3903 }
3904
3905 /* Copy over got entries that we may have already seen to the
3906 symbol which just became indirect. */
3907 if (eind->elf.got.glist != NULL)
3908 {
3909 if (edir->elf.got.glist != NULL)
3910 {
3911 struct got_entry **entp;
3912 struct got_entry *ent;
3913
3914 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3915 {
3916 struct got_entry *dent;
3917
3918 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3919 if (dent->addend == ent->addend
3920 && dent->owner == ent->owner
3921 && dent->tls_type == ent->tls_type)
3922 {
3923 dent->got.refcount += ent->got.refcount;
3924 *entp = ent->next;
3925 break;
3926 }
3927 if (dent == NULL)
3928 entp = &ent->next;
3929 }
3930 *entp = edir->elf.got.glist;
3931 }
3932
3933 edir->elf.got.glist = eind->elf.got.glist;
3934 eind->elf.got.glist = NULL;
3935 }
3936
3937 /* And plt entries. */
3938 move_plt_plist (eind, edir);
3939
3940 if (eind->elf.dynindx != -1)
3941 {
3942 if (edir->elf.dynindx != -1)
3943 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3944 edir->elf.dynstr_index);
3945 edir->elf.dynindx = eind->elf.dynindx;
3946 edir->elf.dynstr_index = eind->elf.dynstr_index;
3947 eind->elf.dynindx = -1;
3948 eind->elf.dynstr_index = 0;
3949 }
3950 }
3951
3952 /* Find the function descriptor hash entry from the given function code
3953 hash entry FH. Link the entries via their OH fields. */
3954
3955 static struct ppc_link_hash_entry *
3956 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3957 {
3958 struct ppc_link_hash_entry *fdh = fh->oh;
3959
3960 if (fdh == NULL)
3961 {
3962 const char *fd_name = fh->elf.root.root.string + 1;
3963
3964 fdh = (struct ppc_link_hash_entry *)
3965 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
3966 if (fdh == NULL)
3967 return fdh;
3968
3969 fdh->is_func_descriptor = 1;
3970 fdh->oh = fh;
3971 fh->is_func = 1;
3972 fh->oh = fdh;
3973 }
3974
3975 fdh = ppc_follow_link (fdh);
3976 fdh->is_func_descriptor = 1;
3977 fdh->oh = fh;
3978 return fdh;
3979 }
3980
3981 /* Make a fake function descriptor sym for the undefined code sym FH. */
3982
3983 static struct ppc_link_hash_entry *
3984 make_fdh (struct bfd_link_info *info,
3985 struct ppc_link_hash_entry *fh)
3986 {
3987 bfd *abfd = fh->elf.root.u.undef.abfd;
3988 struct bfd_link_hash_entry *bh = NULL;
3989 struct ppc_link_hash_entry *fdh;
3990 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3991 ? BSF_WEAK
3992 : BSF_GLOBAL);
3993
3994 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3995 fh->elf.root.root.string + 1,
3996 flags, bfd_und_section_ptr, 0,
3997 NULL, FALSE, FALSE, &bh))
3998 return NULL;
3999
4000 fdh = (struct ppc_link_hash_entry *) bh;
4001 fdh->elf.non_elf = 0;
4002 fdh->fake = 1;
4003 fdh->is_func_descriptor = 1;
4004 fdh->oh = fh;
4005 fh->is_func = 1;
4006 fh->oh = fdh;
4007 return fdh;
4008 }
4009
4010 /* Fix function descriptor symbols defined in .opd sections to be
4011 function type. */
4012
4013 static bfd_boolean
4014 ppc64_elf_add_symbol_hook (bfd *ibfd,
4015 struct bfd_link_info *info,
4016 Elf_Internal_Sym *isym,
4017 const char **name,
4018 flagword *flags ATTRIBUTE_UNUSED,
4019 asection **sec,
4020 bfd_vma *value)
4021 {
4022 if (*sec != NULL
4023 && strcmp ((*sec)->name, ".opd") == 0)
4024 {
4025 asection *code_sec;
4026
4027 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4028 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4029 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4030
4031 /* If the symbol is a function defined in .opd, and the function
4032 code is in a discarded group, let it appear to be undefined. */
4033 if (!bfd_link_relocatable (info)
4034 && (*sec)->reloc_count != 0
4035 && opd_entry_value (*sec, *value, &code_sec, NULL,
4036 FALSE) != (bfd_vma) -1
4037 && discarded_section (code_sec))
4038 {
4039 *sec = bfd_und_section_ptr;
4040 isym->st_shndx = SHN_UNDEF;
4041 }
4042 }
4043 else if (*sec != NULL
4044 && strcmp ((*sec)->name, ".toc") == 0
4045 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4046 {
4047 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4048 if (htab != NULL)
4049 htab->params->object_in_toc = 1;
4050 }
4051
4052 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4053 {
4054 if (abiversion (ibfd) == 0)
4055 set_abiversion (ibfd, 2);
4056 else if (abiversion (ibfd) == 1)
4057 {
4058 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4059 " for ABI version 1"), *name);
4060 bfd_set_error (bfd_error_bad_value);
4061 return FALSE;
4062 }
4063 }
4064
4065 return TRUE;
4066 }
4067
4068 /* Merge non-visibility st_other attributes: local entry point. */
4069
4070 static void
4071 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4072 const Elf_Internal_Sym *isym,
4073 bfd_boolean definition,
4074 bfd_boolean dynamic)
4075 {
4076 if (definition && (!dynamic || !h->def_regular))
4077 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4078 | ELF_ST_VISIBILITY (h->other));
4079 }
4080
4081 /* Hook called on merging a symbol. We use this to clear "fake" since
4082 we now have a real symbol. */
4083
4084 static bfd_boolean
4085 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4086 const Elf_Internal_Sym *isym,
4087 asection **psec ATTRIBUTE_UNUSED,
4088 bfd_boolean newdef ATTRIBUTE_UNUSED,
4089 bfd_boolean olddef ATTRIBUTE_UNUSED,
4090 bfd *oldbfd ATTRIBUTE_UNUSED,
4091 const asection *oldsec ATTRIBUTE_UNUSED)
4092 {
4093 ((struct ppc_link_hash_entry *) h)->fake = 0;
4094 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4095 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
4096 return TRUE;
4097 }
4098
4099 /* This function makes an old ABI object reference to ".bar" cause the
4100 inclusion of a new ABI object archive that defines "bar".
4101 NAME is a symbol defined in an archive. Return a symbol in the hash
4102 table that might be satisfied by the archive symbols. */
4103
4104 static struct elf_link_hash_entry *
4105 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4106 struct bfd_link_info *info,
4107 const char *name)
4108 {
4109 struct elf_link_hash_entry *h;
4110 char *dot_name;
4111 size_t len;
4112
4113 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4114 if (h != NULL
4115 /* Don't return this sym if it is a fake function descriptor
4116 created by add_symbol_adjust. */
4117 && !((struct ppc_link_hash_entry *) h)->fake)
4118 return h;
4119
4120 if (name[0] == '.')
4121 return h;
4122
4123 len = strlen (name);
4124 dot_name = bfd_alloc (abfd, len + 2);
4125 if (dot_name == NULL)
4126 return (struct elf_link_hash_entry *) -1;
4127 dot_name[0] = '.';
4128 memcpy (dot_name + 1, name, len + 1);
4129 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4130 bfd_release (abfd, dot_name);
4131 return h;
4132 }
4133
4134 /* This function satisfies all old ABI object references to ".bar" if a
4135 new ABI object defines "bar". Well, at least, undefined dot symbols
4136 are made weak. This stops later archive searches from including an
4137 object if we already have a function descriptor definition. It also
4138 prevents the linker complaining about undefined symbols.
4139 We also check and correct mismatched symbol visibility here. The
4140 most restrictive visibility of the function descriptor and the
4141 function entry symbol is used. */
4142
4143 static bfd_boolean
4144 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4145 {
4146 struct ppc_link_hash_table *htab;
4147 struct ppc_link_hash_entry *fdh;
4148
4149 if (eh->elf.root.type == bfd_link_hash_warning)
4150 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4151
4152 if (eh->elf.root.type == bfd_link_hash_indirect)
4153 return TRUE;
4154
4155 if (eh->elf.root.root.string[0] != '.')
4156 abort ();
4157
4158 htab = ppc_hash_table (info);
4159 if (htab == NULL)
4160 return FALSE;
4161
4162 fdh = lookup_fdh (eh, htab);
4163 if (fdh == NULL
4164 && !bfd_link_relocatable (info)
4165 && (eh->elf.root.type == bfd_link_hash_undefined
4166 || eh->elf.root.type == bfd_link_hash_undefweak)
4167 && eh->elf.ref_regular)
4168 {
4169 /* Make an undefined function descriptor sym, in order to
4170 pull in an --as-needed shared lib. Archives are handled
4171 elsewhere. */
4172 fdh = make_fdh (info, eh);
4173 if (fdh == NULL)
4174 return FALSE;
4175 }
4176
4177 if (fdh != NULL)
4178 {
4179 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4180 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4181
4182 /* Make both descriptor and entry symbol have the most
4183 constraining visibility of either symbol. */
4184 if (entry_vis < descr_vis)
4185 fdh->elf.other += entry_vis - descr_vis;
4186 else if (entry_vis > descr_vis)
4187 eh->elf.other += descr_vis - entry_vis;
4188
4189 /* Propagate reference flags from entry symbol to function
4190 descriptor symbol. */
4191 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4192 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4193 fdh->elf.ref_regular |= eh->elf.ref_regular;
4194 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4195
4196 if (!fdh->elf.forced_local
4197 && fdh->elf.dynindx == -1
4198 && fdh->elf.versioned != versioned_hidden
4199 && (bfd_link_dll (info)
4200 || fdh->elf.def_dynamic
4201 || fdh->elf.ref_dynamic)
4202 && (eh->elf.ref_regular
4203 || eh->elf.def_regular))
4204 {
4205 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4206 return FALSE;
4207 }
4208 }
4209
4210 return TRUE;
4211 }
4212
4213 /* Set up opd section info and abiversion for IBFD, and process list
4214 of dot-symbols we made in link_hash_newfunc. */
4215
4216 static bfd_boolean
4217 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4218 {
4219 struct ppc_link_hash_table *htab;
4220 struct ppc_link_hash_entry **p, *eh;
4221 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4222
4223 if (opd != NULL && opd->size != 0)
4224 {
4225 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4226 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4227
4228 if (abiversion (ibfd) == 0)
4229 set_abiversion (ibfd, 1);
4230 else if (abiversion (ibfd) >= 2)
4231 {
4232 /* xgettext:c-format */
4233 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4234 ibfd, abiversion (ibfd));
4235 bfd_set_error (bfd_error_bad_value);
4236 return FALSE;
4237 }
4238 }
4239
4240 if (is_ppc64_elf (info->output_bfd))
4241 {
4242 /* For input files without an explicit abiversion in e_flags
4243 we should have flagged any with symbol st_other bits set
4244 as ELFv1 and above flagged those with .opd as ELFv2.
4245 Set the output abiversion if not yet set, and for any input
4246 still ambiguous, take its abiversion from the output.
4247 Differences in ABI are reported later. */
4248 if (abiversion (info->output_bfd) == 0)
4249 set_abiversion (info->output_bfd, abiversion (ibfd));
4250 else if (abiversion (ibfd) == 0)
4251 set_abiversion (ibfd, abiversion (info->output_bfd));
4252 }
4253
4254 htab = ppc_hash_table (info);
4255 if (htab == NULL)
4256 return TRUE;
4257
4258 if (opd != NULL && opd->size != 0
4259 && (ibfd->flags & DYNAMIC) == 0
4260 && (opd->flags & SEC_RELOC) != 0
4261 && opd->reloc_count != 0
4262 && !bfd_is_abs_section (opd->output_section)
4263 && info->gc_sections)
4264 {
4265 /* Garbage collection needs some extra help with .opd sections.
4266 We don't want to necessarily keep everything referenced by
4267 relocs in .opd, as that would keep all functions. Instead,
4268 if we reference an .opd symbol (a function descriptor), we
4269 want to keep the function code symbol's section. This is
4270 easy for global symbols, but for local syms we need to keep
4271 information about the associated function section. */
4272 bfd_size_type amt;
4273 asection **opd_sym_map;
4274 Elf_Internal_Shdr *symtab_hdr;
4275 Elf_Internal_Rela *relocs, *rel_end, *rel;
4276
4277 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4278 opd_sym_map = bfd_zalloc (ibfd, amt);
4279 if (opd_sym_map == NULL)
4280 return FALSE;
4281 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4282 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4283 info->keep_memory);
4284 if (relocs == NULL)
4285 return FALSE;
4286 symtab_hdr = &elf_symtab_hdr (ibfd);
4287 rel_end = relocs + opd->reloc_count - 1;
4288 for (rel = relocs; rel < rel_end; rel++)
4289 {
4290 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4291 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4292
4293 if (r_type == R_PPC64_ADDR64
4294 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4295 && r_symndx < symtab_hdr->sh_info)
4296 {
4297 Elf_Internal_Sym *isym;
4298 asection *s;
4299
4300 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4301 if (isym == NULL)
4302 {
4303 if (elf_section_data (opd)->relocs != relocs)
4304 free (relocs);
4305 return FALSE;
4306 }
4307
4308 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4309 if (s != NULL && s != opd)
4310 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4311 }
4312 }
4313 if (elf_section_data (opd)->relocs != relocs)
4314 free (relocs);
4315 }
4316
4317 p = &htab->dot_syms;
4318 while ((eh = *p) != NULL)
4319 {
4320 *p = NULL;
4321 if (&eh->elf == htab->elf.hgot)
4322 ;
4323 else if (htab->elf.hgot == NULL
4324 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4325 htab->elf.hgot = &eh->elf;
4326 else if (abiversion (ibfd) <= 1)
4327 {
4328 htab->need_func_desc_adj = 1;
4329 if (!add_symbol_adjust (eh, info))
4330 return FALSE;
4331 }
4332 p = &eh->u.next_dot_sym;
4333 }
4334 return TRUE;
4335 }
4336
4337 /* Undo hash table changes when an --as-needed input file is determined
4338 not to be needed. */
4339
4340 static bfd_boolean
4341 ppc64_elf_notice_as_needed (bfd *ibfd,
4342 struct bfd_link_info *info,
4343 enum notice_asneeded_action act)
4344 {
4345 if (act == notice_not_needed)
4346 {
4347 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4348
4349 if (htab == NULL)
4350 return FALSE;
4351
4352 htab->dot_syms = NULL;
4353 }
4354 return _bfd_elf_notice_as_needed (ibfd, info, act);
4355 }
4356
4357 /* If --just-symbols against a final linked binary, then assume we need
4358 toc adjusting stubs when calling functions defined there. */
4359
4360 static void
4361 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4362 {
4363 if ((sec->flags & SEC_CODE) != 0
4364 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4365 && is_ppc64_elf (sec->owner))
4366 {
4367 if (abiversion (sec->owner) >= 2
4368 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4369 sec->has_toc_reloc = 1;
4370 }
4371 _bfd_elf_link_just_syms (sec, info);
4372 }
4373
4374 static struct plt_entry **
4375 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4376 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4377 {
4378 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4379 struct plt_entry **local_plt;
4380 unsigned char *local_got_tls_masks;
4381
4382 if (local_got_ents == NULL)
4383 {
4384 bfd_size_type size = symtab_hdr->sh_info;
4385
4386 size *= (sizeof (*local_got_ents)
4387 + sizeof (*local_plt)
4388 + sizeof (*local_got_tls_masks));
4389 local_got_ents = bfd_zalloc (abfd, size);
4390 if (local_got_ents == NULL)
4391 return NULL;
4392 elf_local_got_ents (abfd) = local_got_ents;
4393 }
4394
4395 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4396 {
4397 struct got_entry *ent;
4398
4399 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4400 if (ent->addend == r_addend
4401 && ent->owner == abfd
4402 && ent->tls_type == tls_type)
4403 break;
4404 if (ent == NULL)
4405 {
4406 bfd_size_type amt = sizeof (*ent);
4407 ent = bfd_alloc (abfd, amt);
4408 if (ent == NULL)
4409 return FALSE;
4410 ent->next = local_got_ents[r_symndx];
4411 ent->addend = r_addend;
4412 ent->owner = abfd;
4413 ent->tls_type = tls_type;
4414 ent->is_indirect = FALSE;
4415 ent->got.refcount = 0;
4416 local_got_ents[r_symndx] = ent;
4417 }
4418 ent->got.refcount += 1;
4419 }
4420
4421 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4422 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4423 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4424
4425 return local_plt + r_symndx;
4426 }
4427
4428 static bfd_boolean
4429 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4430 {
4431 struct plt_entry *ent;
4432
4433 for (ent = *plist; ent != NULL; ent = ent->next)
4434 if (ent->addend == addend)
4435 break;
4436 if (ent == NULL)
4437 {
4438 bfd_size_type amt = sizeof (*ent);
4439 ent = bfd_alloc (abfd, amt);
4440 if (ent == NULL)
4441 return FALSE;
4442 ent->next = *plist;
4443 ent->addend = addend;
4444 ent->plt.refcount = 0;
4445 *plist = ent;
4446 }
4447 ent->plt.refcount += 1;
4448 return TRUE;
4449 }
4450
4451 static bfd_boolean
4452 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4453 {
4454 return (r_type == R_PPC64_REL24
4455 || r_type == R_PPC64_REL24_NOTOC
4456 || r_type == R_PPC64_REL14
4457 || r_type == R_PPC64_REL14_BRTAKEN
4458 || r_type == R_PPC64_REL14_BRNTAKEN
4459 || r_type == R_PPC64_ADDR24
4460 || r_type == R_PPC64_ADDR14
4461 || r_type == R_PPC64_ADDR14_BRTAKEN
4462 || r_type == R_PPC64_ADDR14_BRNTAKEN
4463 || r_type == R_PPC64_PLTCALL
4464 || r_type == R_PPC64_PLTCALL_NOTOC);
4465 }
4466
4467 /* Relocs on inline plt call sequence insns prior to the call. */
4468
4469 static bfd_boolean
4470 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4471 {
4472 return (r_type == R_PPC64_PLT16_HA
4473 || r_type == R_PPC64_PLT16_HI
4474 || r_type == R_PPC64_PLT16_LO
4475 || r_type == R_PPC64_PLT16_LO_DS
4476 || r_type == R_PPC64_PLT_PCREL34
4477 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4478 || r_type == R_PPC64_PLTSEQ
4479 || r_type == R_PPC64_PLTSEQ_NOTOC);
4480 }
4481
4482 /* Look through the relocs for a section during the first phase, and
4483 calculate needed space in the global offset table, procedure
4484 linkage table, and dynamic reloc sections. */
4485
4486 static bfd_boolean
4487 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4488 asection *sec, const Elf_Internal_Rela *relocs)
4489 {
4490 struct ppc_link_hash_table *htab;
4491 Elf_Internal_Shdr *symtab_hdr;
4492 struct elf_link_hash_entry **sym_hashes;
4493 const Elf_Internal_Rela *rel;
4494 const Elf_Internal_Rela *rel_end;
4495 asection *sreloc;
4496 struct elf_link_hash_entry *tga, *dottga;
4497 bfd_boolean is_opd;
4498
4499 if (bfd_link_relocatable (info))
4500 return TRUE;
4501
4502 /* Don't do anything special with non-loaded, non-alloced sections.
4503 In particular, any relocs in such sections should not affect GOT
4504 and PLT reference counting (ie. we don't allow them to create GOT
4505 or PLT entries), there's no possibility or desire to optimize TLS
4506 relocs, and there's not much point in propagating relocs to shared
4507 libs that the dynamic linker won't relocate. */
4508 if ((sec->flags & SEC_ALLOC) == 0)
4509 return TRUE;
4510
4511 BFD_ASSERT (is_ppc64_elf (abfd));
4512
4513 htab = ppc_hash_table (info);
4514 if (htab == NULL)
4515 return FALSE;
4516
4517 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4518 FALSE, FALSE, TRUE);
4519 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4520 FALSE, FALSE, TRUE);
4521 symtab_hdr = &elf_symtab_hdr (abfd);
4522 sym_hashes = elf_sym_hashes (abfd);
4523 sreloc = NULL;
4524 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4525 rel_end = relocs + sec->reloc_count;
4526 for (rel = relocs; rel < rel_end; rel++)
4527 {
4528 unsigned long r_symndx;
4529 struct elf_link_hash_entry *h;
4530 enum elf_ppc64_reloc_type r_type;
4531 int tls_type;
4532 struct _ppc64_elf_section_data *ppc64_sec;
4533 struct plt_entry **ifunc, **plt_list;
4534
4535 r_symndx = ELF64_R_SYM (rel->r_info);
4536 if (r_symndx < symtab_hdr->sh_info)
4537 h = NULL;
4538 else
4539 {
4540 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4541 h = elf_follow_link (h);
4542
4543 if (h == htab->elf.hgot)
4544 sec->has_toc_reloc = 1;
4545 }
4546
4547 r_type = ELF64_R_TYPE (rel->r_info);
4548 switch (r_type)
4549 {
4550 case R_PPC64_D34:
4551 case R_PPC64_D34_LO:
4552 case R_PPC64_D34_HI30:
4553 case R_PPC64_D34_HA30:
4554 case R_PPC64_D28:
4555 case R_PPC64_TPREL34:
4556 case R_PPC64_DTPREL34:
4557 case R_PPC64_PCREL34:
4558 case R_PPC64_GOT_PCREL34:
4559 case R_PPC64_GOT_TLSGD34:
4560 case R_PPC64_GOT_TLSLD34:
4561 case R_PPC64_GOT_TPREL34:
4562 case R_PPC64_GOT_DTPREL34:
4563 case R_PPC64_PLT_PCREL34:
4564 case R_PPC64_PLT_PCREL34_NOTOC:
4565 case R_PPC64_PCREL28:
4566 htab->powerxx_stubs = 1;
4567 break;
4568 default:
4569 break;
4570 }
4571
4572 switch (r_type)
4573 {
4574 case R_PPC64_PLT16_HA:
4575 case R_PPC64_GOT_TLSLD16_HA:
4576 case R_PPC64_GOT_TLSGD16_HA:
4577 case R_PPC64_GOT_TPREL16_HA:
4578 case R_PPC64_GOT_DTPREL16_HA:
4579 case R_PPC64_GOT16_HA:
4580 case R_PPC64_TOC16_HA:
4581 case R_PPC64_PLT16_LO:
4582 case R_PPC64_PLT16_LO_DS:
4583 case R_PPC64_GOT_TLSLD16_LO:
4584 case R_PPC64_GOT_TLSGD16_LO:
4585 case R_PPC64_GOT_TPREL16_LO_DS:
4586 case R_PPC64_GOT_DTPREL16_LO_DS:
4587 case R_PPC64_GOT16_LO:
4588 case R_PPC64_GOT16_LO_DS:
4589 case R_PPC64_TOC16_LO:
4590 case R_PPC64_TOC16_LO_DS:
4591 case R_PPC64_GOT_PCREL34:
4592 ppc64_elf_tdata (abfd)->has_optrel = 1;
4593 ppc64_elf_section_data (sec)->has_optrel = 1;
4594 break;
4595 default:
4596 break;
4597 }
4598
4599 ifunc = NULL;
4600 if (h != NULL)
4601 {
4602 if (h->type == STT_GNU_IFUNC)
4603 {
4604 h->needs_plt = 1;
4605 ifunc = &h->plt.plist;
4606 }
4607 }
4608 else
4609 {
4610 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4611 abfd, r_symndx);
4612 if (isym == NULL)
4613 return FALSE;
4614
4615 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4616 {
4617 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4618 rel->r_addend,
4619 NON_GOT | PLT_IFUNC);
4620 if (ifunc == NULL)
4621 return FALSE;
4622 }
4623 }
4624
4625 tls_type = 0;
4626 switch (r_type)
4627 {
4628 case R_PPC64_TLSGD:
4629 case R_PPC64_TLSLD:
4630 /* These special tls relocs tie a call to __tls_get_addr with
4631 its parameter symbol. */
4632 if (h != NULL)
4633 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4634 else
4635 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4636 rel->r_addend,
4637 NON_GOT | TLS_TLS | TLS_MARK))
4638 return FALSE;
4639 sec->has_tls_reloc = 1;
4640 break;
4641
4642 case R_PPC64_GOT_TLSLD16:
4643 case R_PPC64_GOT_TLSLD16_LO:
4644 case R_PPC64_GOT_TLSLD16_HI:
4645 case R_PPC64_GOT_TLSLD16_HA:
4646 case R_PPC64_GOT_TLSLD34:
4647 tls_type = TLS_TLS | TLS_LD;
4648 goto dogottls;
4649
4650 case R_PPC64_GOT_TLSGD16:
4651 case R_PPC64_GOT_TLSGD16_LO:
4652 case R_PPC64_GOT_TLSGD16_HI:
4653 case R_PPC64_GOT_TLSGD16_HA:
4654 case R_PPC64_GOT_TLSGD34:
4655 tls_type = TLS_TLS | TLS_GD;
4656 goto dogottls;
4657
4658 case R_PPC64_GOT_TPREL16_DS:
4659 case R_PPC64_GOT_TPREL16_LO_DS:
4660 case R_PPC64_GOT_TPREL16_HI:
4661 case R_PPC64_GOT_TPREL16_HA:
4662 case R_PPC64_GOT_TPREL34:
4663 if (bfd_link_dll (info))
4664 info->flags |= DF_STATIC_TLS;
4665 tls_type = TLS_TLS | TLS_TPREL;
4666 goto dogottls;
4667
4668 case R_PPC64_GOT_DTPREL16_DS:
4669 case R_PPC64_GOT_DTPREL16_LO_DS:
4670 case R_PPC64_GOT_DTPREL16_HI:
4671 case R_PPC64_GOT_DTPREL16_HA:
4672 case R_PPC64_GOT_DTPREL34:
4673 tls_type = TLS_TLS | TLS_DTPREL;
4674 dogottls:
4675 sec->has_tls_reloc = 1;
4676 goto dogot;
4677
4678 case R_PPC64_GOT16:
4679 case R_PPC64_GOT16_LO:
4680 case R_PPC64_GOT16_HI:
4681 case R_PPC64_GOT16_HA:
4682 case R_PPC64_GOT16_DS:
4683 case R_PPC64_GOT16_LO_DS:
4684 case R_PPC64_GOT_PCREL34:
4685 dogot:
4686 /* This symbol requires a global offset table entry. */
4687 sec->has_toc_reloc = 1;
4688 if (r_type == R_PPC64_GOT_TLSLD16
4689 || r_type == R_PPC64_GOT_TLSGD16
4690 || r_type == R_PPC64_GOT_TPREL16_DS
4691 || r_type == R_PPC64_GOT_DTPREL16_DS
4692 || r_type == R_PPC64_GOT16
4693 || r_type == R_PPC64_GOT16_DS)
4694 {
4695 htab->do_multi_toc = 1;
4696 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4697 }
4698
4699 if (ppc64_elf_tdata (abfd)->got == NULL
4700 && !create_got_section (abfd, info))
4701 return FALSE;
4702
4703 if (h != NULL)
4704 {
4705 struct ppc_link_hash_entry *eh;
4706 struct got_entry *ent;
4707
4708 eh = (struct ppc_link_hash_entry *) h;
4709 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4710 if (ent->addend == rel->r_addend
4711 && ent->owner == abfd
4712 && ent->tls_type == tls_type)
4713 break;
4714 if (ent == NULL)
4715 {
4716 bfd_size_type amt = sizeof (*ent);
4717 ent = bfd_alloc (abfd, amt);
4718 if (ent == NULL)
4719 return FALSE;
4720 ent->next = eh->elf.got.glist;
4721 ent->addend = rel->r_addend;
4722 ent->owner = abfd;
4723 ent->tls_type = tls_type;
4724 ent->is_indirect = FALSE;
4725 ent->got.refcount = 0;
4726 eh->elf.got.glist = ent;
4727 }
4728 ent->got.refcount += 1;
4729 eh->tls_mask |= tls_type;
4730 }
4731 else
4732 /* This is a global offset table entry for a local symbol. */
4733 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4734 rel->r_addend, tls_type))
4735 return FALSE;
4736
4737 /* We may also need a plt entry if the symbol turns out to be
4738 an ifunc. */
4739 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
4740 {
4741 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4742 return FALSE;
4743 }
4744 break;
4745
4746 case R_PPC64_PLT16_HA:
4747 case R_PPC64_PLT16_HI:
4748 case R_PPC64_PLT16_LO:
4749 case R_PPC64_PLT16_LO_DS:
4750 case R_PPC64_PLT_PCREL34:
4751 case R_PPC64_PLT_PCREL34_NOTOC:
4752 case R_PPC64_PLT32:
4753 case R_PPC64_PLT64:
4754 /* This symbol requires a procedure linkage table entry. */
4755 plt_list = ifunc;
4756 if (h != NULL)
4757 {
4758 h->needs_plt = 1;
4759 if (h->root.root.string[0] == '.'
4760 && h->root.root.string[1] != '\0')
4761 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4762 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
4763 plt_list = &h->plt.plist;
4764 }
4765 if (plt_list == NULL)
4766 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4767 rel->r_addend,
4768 NON_GOT | PLT_KEEP);
4769 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4770 return FALSE;
4771 break;
4772
4773 /* The following relocations don't need to propagate the
4774 relocation if linking a shared object since they are
4775 section relative. */
4776 case R_PPC64_SECTOFF:
4777 case R_PPC64_SECTOFF_LO:
4778 case R_PPC64_SECTOFF_HI:
4779 case R_PPC64_SECTOFF_HA:
4780 case R_PPC64_SECTOFF_DS:
4781 case R_PPC64_SECTOFF_LO_DS:
4782 case R_PPC64_DTPREL16:
4783 case R_PPC64_DTPREL16_LO:
4784 case R_PPC64_DTPREL16_HI:
4785 case R_PPC64_DTPREL16_HA:
4786 case R_PPC64_DTPREL16_DS:
4787 case R_PPC64_DTPREL16_LO_DS:
4788 case R_PPC64_DTPREL16_HIGH:
4789 case R_PPC64_DTPREL16_HIGHA:
4790 case R_PPC64_DTPREL16_HIGHER:
4791 case R_PPC64_DTPREL16_HIGHERA:
4792 case R_PPC64_DTPREL16_HIGHEST:
4793 case R_PPC64_DTPREL16_HIGHESTA:
4794 break;
4795
4796 /* Nor do these. */
4797 case R_PPC64_REL16:
4798 case R_PPC64_REL16_LO:
4799 case R_PPC64_REL16_HI:
4800 case R_PPC64_REL16_HA:
4801 case R_PPC64_REL16_HIGH:
4802 case R_PPC64_REL16_HIGHA:
4803 case R_PPC64_REL16_HIGHER:
4804 case R_PPC64_REL16_HIGHERA:
4805 case R_PPC64_REL16_HIGHEST:
4806 case R_PPC64_REL16_HIGHESTA:
4807 case R_PPC64_REL16_HIGHER34:
4808 case R_PPC64_REL16_HIGHERA34:
4809 case R_PPC64_REL16_HIGHEST34:
4810 case R_PPC64_REL16_HIGHESTA34:
4811 case R_PPC64_REL16DX_HA:
4812 break;
4813
4814 /* Not supported as a dynamic relocation. */
4815 case R_PPC64_ADDR64_LOCAL:
4816 if (bfd_link_pic (info))
4817 {
4818 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4819 ppc_howto_init ();
4820 /* xgettext:c-format */
4821 info->callbacks->einfo (_("%H: %s reloc unsupported "
4822 "in shared libraries and PIEs\n"),
4823 abfd, sec, rel->r_offset,
4824 ppc64_elf_howto_table[r_type]->name);
4825 bfd_set_error (bfd_error_bad_value);
4826 return FALSE;
4827 }
4828 break;
4829
4830 case R_PPC64_TOC16:
4831 case R_PPC64_TOC16_DS:
4832 htab->do_multi_toc = 1;
4833 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4834 /* Fall through. */
4835 case R_PPC64_TOC16_LO:
4836 case R_PPC64_TOC16_HI:
4837 case R_PPC64_TOC16_HA:
4838 case R_PPC64_TOC16_LO_DS:
4839 sec->has_toc_reloc = 1;
4840 if (h != NULL && bfd_link_executable (info))
4841 {
4842 /* We may need a copy reloc. */
4843 h->non_got_ref = 1;
4844 /* Strongly prefer a copy reloc over a dynamic reloc.
4845 glibc ld.so as of 2019-08 will error out if one of
4846 these relocations is emitted. */
4847 h->needs_copy = 1;
4848 goto dodyn;
4849 }
4850 break;
4851
4852 /* Marker reloc. */
4853 case R_PPC64_ENTRY:
4854 break;
4855
4856 /* This relocation describes the C++ object vtable hierarchy.
4857 Reconstruct it for later use during GC. */
4858 case R_PPC64_GNU_VTINHERIT:
4859 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4860 return FALSE;
4861 break;
4862
4863 /* This relocation describes which C++ vtable entries are actually
4864 used. Record for later use during GC. */
4865 case R_PPC64_GNU_VTENTRY:
4866 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4867 return FALSE;
4868 break;
4869
4870 case R_PPC64_REL14:
4871 case R_PPC64_REL14_BRTAKEN:
4872 case R_PPC64_REL14_BRNTAKEN:
4873 {
4874 asection *dest = NULL;
4875
4876 /* Heuristic: If jumping outside our section, chances are
4877 we are going to need a stub. */
4878 if (h != NULL)
4879 {
4880 /* If the sym is weak it may be overridden later, so
4881 don't assume we know where a weak sym lives. */
4882 if (h->root.type == bfd_link_hash_defined)
4883 dest = h->root.u.def.section;
4884 }
4885 else
4886 {
4887 Elf_Internal_Sym *isym;
4888
4889 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4890 abfd, r_symndx);
4891 if (isym == NULL)
4892 return FALSE;
4893
4894 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4895 }
4896
4897 if (dest != sec)
4898 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4899 }
4900 goto rel24;
4901
4902 case R_PPC64_PLTCALL:
4903 case R_PPC64_PLTCALL_NOTOC:
4904 ppc64_elf_section_data (sec)->has_pltcall = 1;
4905 /* Fall through. */
4906
4907 case R_PPC64_REL24:
4908 case R_PPC64_REL24_NOTOC:
4909 rel24:
4910 plt_list = ifunc;
4911 if (h != NULL)
4912 {
4913 h->needs_plt = 1;
4914 if (h->root.root.string[0] == '.'
4915 && h->root.root.string[1] != '\0')
4916 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4917
4918 if (h == tga || h == dottga)
4919 {
4920 sec->has_tls_reloc = 1;
4921 if (rel != relocs
4922 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4923 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4924 /* We have a new-style __tls_get_addr call with
4925 a marker reloc. */
4926 ;
4927 else
4928 /* Mark this section as having an old-style call. */
4929 sec->nomark_tls_get_addr = 1;
4930 }
4931 plt_list = &h->plt.plist;
4932 }
4933
4934 /* We may need a .plt entry if the function this reloc
4935 refers to is in a shared lib. */
4936 if (plt_list
4937 && !update_plt_info (abfd, plt_list, rel->r_addend))
4938 return FALSE;
4939 break;
4940
4941 case R_PPC64_ADDR14:
4942 case R_PPC64_ADDR14_BRNTAKEN:
4943 case R_PPC64_ADDR14_BRTAKEN:
4944 case R_PPC64_ADDR24:
4945 goto dodyn;
4946
4947 case R_PPC64_TPREL64:
4948 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4949 if (bfd_link_dll (info))
4950 info->flags |= DF_STATIC_TLS;
4951 goto dotlstoc;
4952
4953 case R_PPC64_DTPMOD64:
4954 if (rel + 1 < rel_end
4955 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4956 && rel[1].r_offset == rel->r_offset + 8)
4957 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4958 else
4959 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4960 goto dotlstoc;
4961
4962 case R_PPC64_DTPREL64:
4963 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4964 if (rel != relocs
4965 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4966 && rel[-1].r_offset == rel->r_offset - 8)
4967 /* This is the second reloc of a dtpmod, dtprel pair.
4968 Don't mark with TLS_DTPREL. */
4969 goto dodyn;
4970
4971 dotlstoc:
4972 sec->has_tls_reloc = 1;
4973 if (h != NULL)
4974 {
4975 struct ppc_link_hash_entry *eh;
4976 eh = (struct ppc_link_hash_entry *) h;
4977 eh->tls_mask |= tls_type & 0xff;
4978 }
4979 else
4980 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4981 rel->r_addend, tls_type))
4982 return FALSE;
4983
4984 ppc64_sec = ppc64_elf_section_data (sec);
4985 if (ppc64_sec->sec_type != sec_toc)
4986 {
4987 bfd_size_type amt;
4988
4989 /* One extra to simplify get_tls_mask. */
4990 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4991 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4992 if (ppc64_sec->u.toc.symndx == NULL)
4993 return FALSE;
4994 amt = sec->size * sizeof (bfd_vma) / 8;
4995 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4996 if (ppc64_sec->u.toc.add == NULL)
4997 return FALSE;
4998 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4999 ppc64_sec->sec_type = sec_toc;
5000 }
5001 BFD_ASSERT (rel->r_offset % 8 == 0);
5002 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5003 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5004
5005 /* Mark the second slot of a GD or LD entry.
5006 -1 to indicate GD and -2 to indicate LD. */
5007 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5008 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5009 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5010 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5011 goto dodyn;
5012
5013 case R_PPC64_TPREL16:
5014 case R_PPC64_TPREL16_LO:
5015 case R_PPC64_TPREL16_HI:
5016 case R_PPC64_TPREL16_HA:
5017 case R_PPC64_TPREL16_DS:
5018 case R_PPC64_TPREL16_LO_DS:
5019 case R_PPC64_TPREL16_HIGH:
5020 case R_PPC64_TPREL16_HIGHA:
5021 case R_PPC64_TPREL16_HIGHER:
5022 case R_PPC64_TPREL16_HIGHERA:
5023 case R_PPC64_TPREL16_HIGHEST:
5024 case R_PPC64_TPREL16_HIGHESTA:
5025 case R_PPC64_TPREL34:
5026 if (bfd_link_dll (info))
5027 info->flags |= DF_STATIC_TLS;
5028 goto dodyn;
5029
5030 case R_PPC64_ADDR64:
5031 if (is_opd
5032 && rel + 1 < rel_end
5033 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5034 {
5035 if (h != NULL)
5036 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5037 }
5038 /* Fall through. */
5039
5040 case R_PPC64_ADDR16:
5041 case R_PPC64_ADDR16_DS:
5042 case R_PPC64_ADDR16_HA:
5043 case R_PPC64_ADDR16_HI:
5044 case R_PPC64_ADDR16_HIGH:
5045 case R_PPC64_ADDR16_HIGHA:
5046 case R_PPC64_ADDR16_HIGHER:
5047 case R_PPC64_ADDR16_HIGHERA:
5048 case R_PPC64_ADDR16_HIGHEST:
5049 case R_PPC64_ADDR16_HIGHESTA:
5050 case R_PPC64_ADDR16_LO:
5051 case R_PPC64_ADDR16_LO_DS:
5052 case R_PPC64_D34:
5053 case R_PPC64_D34_LO:
5054 case R_PPC64_D34_HI30:
5055 case R_PPC64_D34_HA30:
5056 case R_PPC64_ADDR16_HIGHER34:
5057 case R_PPC64_ADDR16_HIGHERA34:
5058 case R_PPC64_ADDR16_HIGHEST34:
5059 case R_PPC64_ADDR16_HIGHESTA34:
5060 case R_PPC64_D28:
5061 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5062 && rel->r_addend == 0)
5063 {
5064 /* We may need a .plt entry if this reloc refers to a
5065 function in a shared lib. */
5066 if (!update_plt_info (abfd, &h->plt.plist, 0))
5067 return FALSE;
5068 h->pointer_equality_needed = 1;
5069 }
5070 /* Fall through. */
5071
5072 case R_PPC64_REL30:
5073 case R_PPC64_REL32:
5074 case R_PPC64_REL64:
5075 case R_PPC64_ADDR32:
5076 case R_PPC64_UADDR16:
5077 case R_PPC64_UADDR32:
5078 case R_PPC64_UADDR64:
5079 case R_PPC64_TOC:
5080 if (h != NULL && bfd_link_executable (info))
5081 /* We may need a copy reloc. */
5082 h->non_got_ref = 1;
5083
5084 /* Don't propagate .opd relocs. */
5085 if (NO_OPD_RELOCS && is_opd)
5086 break;
5087
5088 /* If we are creating a shared library, and this is a reloc
5089 against a global symbol, or a non PC relative reloc
5090 against a local symbol, then we need to copy the reloc
5091 into the shared library. However, if we are linking with
5092 -Bsymbolic, we do not need to copy a reloc against a
5093 global symbol which is defined in an object we are
5094 including in the link (i.e., DEF_REGULAR is set). At
5095 this point we have not seen all the input files, so it is
5096 possible that DEF_REGULAR is not set now but will be set
5097 later (it is never cleared). In case of a weak definition,
5098 DEF_REGULAR may be cleared later by a strong definition in
5099 a shared library. We account for that possibility below by
5100 storing information in the dyn_relocs field of the hash
5101 table entry. A similar situation occurs when creating
5102 shared libraries and symbol visibility changes render the
5103 symbol local.
5104
5105 If on the other hand, we are creating an executable, we
5106 may need to keep relocations for symbols satisfied by a
5107 dynamic library if we manage to avoid copy relocs for the
5108 symbol. */
5109 dodyn:
5110 if ((h != NULL
5111 && (h->root.type == bfd_link_hash_defweak
5112 || !h->def_regular))
5113 || (h != NULL
5114 && !bfd_link_executable (info)
5115 && !SYMBOLIC_BIND (info, h))
5116 || (bfd_link_pic (info)
5117 && must_be_dyn_reloc (info, r_type))
5118 || (!bfd_link_pic (info)
5119 && ifunc != NULL))
5120 {
5121 /* We must copy these reloc types into the output file.
5122 Create a reloc section in dynobj and make room for
5123 this reloc. */
5124 if (sreloc == NULL)
5125 {
5126 sreloc = _bfd_elf_make_dynamic_reloc_section
5127 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5128
5129 if (sreloc == NULL)
5130 return FALSE;
5131 }
5132
5133 /* If this is a global symbol, we count the number of
5134 relocations we need for this symbol. */
5135 if (h != NULL)
5136 {
5137 struct elf_dyn_relocs *p;
5138 struct elf_dyn_relocs **head;
5139
5140 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5141 p = *head;
5142 if (p == NULL || p->sec != sec)
5143 {
5144 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5145 if (p == NULL)
5146 return FALSE;
5147 p->next = *head;
5148 *head = p;
5149 p->sec = sec;
5150 p->count = 0;
5151 p->pc_count = 0;
5152 }
5153 p->count += 1;
5154 if (!must_be_dyn_reloc (info, r_type))
5155 p->pc_count += 1;
5156 }
5157 else
5158 {
5159 /* Track dynamic relocs needed for local syms too.
5160 We really need local syms available to do this
5161 easily. Oh well. */
5162 struct ppc_dyn_relocs *p;
5163 struct ppc_dyn_relocs **head;
5164 bfd_boolean is_ifunc;
5165 asection *s;
5166 void *vpp;
5167 Elf_Internal_Sym *isym;
5168
5169 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5170 abfd, r_symndx);
5171 if (isym == NULL)
5172 return FALSE;
5173
5174 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5175 if (s == NULL)
5176 s = sec;
5177
5178 vpp = &elf_section_data (s)->local_dynrel;
5179 head = (struct ppc_dyn_relocs **) vpp;
5180 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5181 p = *head;
5182 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5183 p = p->next;
5184 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5185 {
5186 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5187 if (p == NULL)
5188 return FALSE;
5189 p->next = *head;
5190 *head = p;
5191 p->sec = sec;
5192 p->ifunc = is_ifunc;
5193 p->count = 0;
5194 }
5195 p->count += 1;
5196 }
5197 }
5198 break;
5199
5200 default:
5201 break;
5202 }
5203 }
5204
5205 return TRUE;
5206 }
5207
5208 /* Merge backend specific data from an object file to the output
5209 object file when linking. */
5210
5211 static bfd_boolean
5212 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5213 {
5214 bfd *obfd = info->output_bfd;
5215 unsigned long iflags, oflags;
5216
5217 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5218 return TRUE;
5219
5220 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5221 return TRUE;
5222
5223 if (!_bfd_generic_verify_endian_match (ibfd, info))
5224 return FALSE;
5225
5226 iflags = elf_elfheader (ibfd)->e_flags;
5227 oflags = elf_elfheader (obfd)->e_flags;
5228
5229 if (iflags & ~EF_PPC64_ABI)
5230 {
5231 _bfd_error_handler
5232 /* xgettext:c-format */
5233 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5234 bfd_set_error (bfd_error_bad_value);
5235 return FALSE;
5236 }
5237 else if (iflags != oflags && iflags != 0)
5238 {
5239 _bfd_error_handler
5240 /* xgettext:c-format */
5241 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5242 ibfd, iflags, oflags);
5243 bfd_set_error (bfd_error_bad_value);
5244 return FALSE;
5245 }
5246
5247 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5248 return FALSE;
5249
5250 /* Merge Tag_compatibility attributes and any common GNU ones. */
5251 return _bfd_elf_merge_object_attributes (ibfd, info);
5252 }
5253
5254 static bfd_boolean
5255 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5256 {
5257 /* Print normal ELF private data. */
5258 _bfd_elf_print_private_bfd_data (abfd, ptr);
5259
5260 if (elf_elfheader (abfd)->e_flags != 0)
5261 {
5262 FILE *file = ptr;
5263
5264 fprintf (file, _("private flags = 0x%lx:"),
5265 elf_elfheader (abfd)->e_flags);
5266
5267 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5268 fprintf (file, _(" [abiv%ld]"),
5269 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5270 fputc ('\n', file);
5271 }
5272
5273 return TRUE;
5274 }
5275
5276 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5277 of the code entry point, and its section, which must be in the same
5278 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5279
5280 static bfd_vma
5281 opd_entry_value (asection *opd_sec,
5282 bfd_vma offset,
5283 asection **code_sec,
5284 bfd_vma *code_off,
5285 bfd_boolean in_code_sec)
5286 {
5287 bfd *opd_bfd = opd_sec->owner;
5288 Elf_Internal_Rela *relocs;
5289 Elf_Internal_Rela *lo, *hi, *look;
5290 bfd_vma val;
5291
5292 /* No relocs implies we are linking a --just-symbols object, or looking
5293 at a final linked executable with addr2line or somesuch. */
5294 if (opd_sec->reloc_count == 0)
5295 {
5296 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5297
5298 if (contents == NULL)
5299 {
5300 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5301 return (bfd_vma) -1;
5302 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5303 }
5304
5305 /* PR 17512: file: 64b9dfbb. */
5306 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5307 return (bfd_vma) -1;
5308
5309 val = bfd_get_64 (opd_bfd, contents + offset);
5310 if (code_sec != NULL)
5311 {
5312 asection *sec, *likely = NULL;
5313
5314 if (in_code_sec)
5315 {
5316 sec = *code_sec;
5317 if (sec->vma <= val
5318 && val < sec->vma + sec->size)
5319 likely = sec;
5320 else
5321 val = -1;
5322 }
5323 else
5324 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5325 if (sec->vma <= val
5326 && (sec->flags & SEC_LOAD) != 0
5327 && (sec->flags & SEC_ALLOC) != 0)
5328 likely = sec;
5329 if (likely != NULL)
5330 {
5331 *code_sec = likely;
5332 if (code_off != NULL)
5333 *code_off = val - likely->vma;
5334 }
5335 }
5336 return val;
5337 }
5338
5339 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5340
5341 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5342 if (relocs == NULL)
5343 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5344 /* PR 17512: file: df8e1fd6. */
5345 if (relocs == NULL)
5346 return (bfd_vma) -1;
5347
5348 /* Go find the opd reloc at the sym address. */
5349 lo = relocs;
5350 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5351 val = (bfd_vma) -1;
5352 while (lo < hi)
5353 {
5354 look = lo + (hi - lo) / 2;
5355 if (look->r_offset < offset)
5356 lo = look + 1;
5357 else if (look->r_offset > offset)
5358 hi = look;
5359 else
5360 {
5361 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5362
5363 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5364 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5365 {
5366 unsigned long symndx = ELF64_R_SYM (look->r_info);
5367 asection *sec = NULL;
5368
5369 if (symndx >= symtab_hdr->sh_info
5370 && elf_sym_hashes (opd_bfd) != NULL)
5371 {
5372 struct elf_link_hash_entry **sym_hashes;
5373 struct elf_link_hash_entry *rh;
5374
5375 sym_hashes = elf_sym_hashes (opd_bfd);
5376 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5377 if (rh != NULL)
5378 {
5379 rh = elf_follow_link (rh);
5380 if (rh->root.type != bfd_link_hash_defined
5381 && rh->root.type != bfd_link_hash_defweak)
5382 break;
5383 if (rh->root.u.def.section->owner == opd_bfd)
5384 {
5385 val = rh->root.u.def.value;
5386 sec = rh->root.u.def.section;
5387 }
5388 }
5389 }
5390
5391 if (sec == NULL)
5392 {
5393 Elf_Internal_Sym *sym;
5394
5395 if (symndx < symtab_hdr->sh_info)
5396 {
5397 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5398 if (sym == NULL)
5399 {
5400 size_t symcnt = symtab_hdr->sh_info;
5401 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5402 symcnt, 0,
5403 NULL, NULL, NULL);
5404 if (sym == NULL)
5405 break;
5406 symtab_hdr->contents = (bfd_byte *) sym;
5407 }
5408 sym += symndx;
5409 }
5410 else
5411 {
5412 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5413 1, symndx,
5414 NULL, NULL, NULL);
5415 if (sym == NULL)
5416 break;
5417 }
5418 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5419 if (sec == NULL)
5420 break;
5421 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5422 val = sym->st_value;
5423 }
5424
5425 val += look->r_addend;
5426 if (code_off != NULL)
5427 *code_off = val;
5428 if (code_sec != NULL)
5429 {
5430 if (in_code_sec && *code_sec != sec)
5431 return -1;
5432 else
5433 *code_sec = sec;
5434 }
5435 if (sec->output_section != NULL)
5436 val += sec->output_section->vma + sec->output_offset;
5437 }
5438 break;
5439 }
5440 }
5441
5442 return val;
5443 }
5444
5445 /* If the ELF symbol SYM might be a function in SEC, return the
5446 function size and set *CODE_OFF to the function's entry point,
5447 otherwise return zero. */
5448
5449 static bfd_size_type
5450 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5451 bfd_vma *code_off)
5452 {
5453 bfd_size_type size;
5454
5455 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5456 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5457 return 0;
5458
5459 size = 0;
5460 if (!(sym->flags & BSF_SYNTHETIC))
5461 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5462
5463 if (strcmp (sym->section->name, ".opd") == 0)
5464 {
5465 struct _opd_sec_data *opd = get_opd_info (sym->section);
5466 bfd_vma symval = sym->value;
5467
5468 if (opd != NULL
5469 && opd->adjust != NULL
5470 && elf_section_data (sym->section)->relocs != NULL)
5471 {
5472 /* opd_entry_value will use cached relocs that have been
5473 adjusted, but with raw symbols. That means both local
5474 and global symbols need adjusting. */
5475 long adjust = opd->adjust[OPD_NDX (symval)];
5476 if (adjust == -1)
5477 return 0;
5478 symval += adjust;
5479 }
5480
5481 if (opd_entry_value (sym->section, symval,
5482 &sec, code_off, TRUE) == (bfd_vma) -1)
5483 return 0;
5484 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5485 symbol. This size has nothing to do with the code size of the
5486 function, which is what we're supposed to return, but the
5487 code size isn't available without looking up the dot-sym.
5488 However, doing that would be a waste of time particularly
5489 since elf_find_function will look at the dot-sym anyway.
5490 Now, elf_find_function will keep the largest size of any
5491 function sym found at the code address of interest, so return
5492 1 here to avoid it incorrectly caching a larger function size
5493 for a small function. This does mean we return the wrong
5494 size for a new-ABI function of size 24, but all that does is
5495 disable caching for such functions. */
5496 if (size == 24)
5497 size = 1;
5498 }
5499 else
5500 {
5501 if (sym->section != sec)
5502 return 0;
5503 *code_off = sym->value;
5504 }
5505 if (size == 0)
5506 size = 1;
5507 return size;
5508 }
5509
5510 /* Return true if symbol is a strong function defined in an ELFv2
5511 object with st_other localentry bits of zero, ie. its local entry
5512 point coincides with its global entry point. */
5513
5514 static bfd_boolean
5515 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5516 {
5517 return (h != NULL
5518 && h->type == STT_FUNC
5519 && h->root.type == bfd_link_hash_defined
5520 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5521 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
5522 && is_ppc64_elf (h->root.u.def.section->owner)
5523 && abiversion (h->root.u.def.section->owner) >= 2);
5524 }
5525
5526 /* Return true if symbol is defined in a regular object file. */
5527
5528 static bfd_boolean
5529 is_static_defined (struct elf_link_hash_entry *h)
5530 {
5531 return ((h->root.type == bfd_link_hash_defined
5532 || h->root.type == bfd_link_hash_defweak)
5533 && h->root.u.def.section != NULL
5534 && h->root.u.def.section->output_section != NULL);
5535 }
5536
5537 /* If FDH is a function descriptor symbol, return the associated code
5538 entry symbol if it is defined. Return NULL otherwise. */
5539
5540 static struct ppc_link_hash_entry *
5541 defined_code_entry (struct ppc_link_hash_entry *fdh)
5542 {
5543 if (fdh->is_func_descriptor)
5544 {
5545 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5546 if (fh->elf.root.type == bfd_link_hash_defined
5547 || fh->elf.root.type == bfd_link_hash_defweak)
5548 return fh;
5549 }
5550 return NULL;
5551 }
5552
5553 /* If FH is a function code entry symbol, return the associated
5554 function descriptor symbol if it is defined. Return NULL otherwise. */
5555
5556 static struct ppc_link_hash_entry *
5557 defined_func_desc (struct ppc_link_hash_entry *fh)
5558 {
5559 if (fh->oh != NULL
5560 && fh->oh->is_func_descriptor)
5561 {
5562 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5563 if (fdh->elf.root.type == bfd_link_hash_defined
5564 || fdh->elf.root.type == bfd_link_hash_defweak)
5565 return fdh;
5566 }
5567 return NULL;
5568 }
5569
5570 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5571
5572 /* Garbage collect sections, after first dealing with dot-symbols. */
5573
5574 static bfd_boolean
5575 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5576 {
5577 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5578
5579 if (htab != NULL && htab->need_func_desc_adj)
5580 {
5581 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5582 htab->need_func_desc_adj = 0;
5583 }
5584 return bfd_elf_gc_sections (abfd, info);
5585 }
5586
5587 /* Mark all our entry sym sections, both opd and code section. */
5588
5589 static void
5590 ppc64_elf_gc_keep (struct bfd_link_info *info)
5591 {
5592 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5593 struct bfd_sym_chain *sym;
5594
5595 if (htab == NULL)
5596 return;
5597
5598 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5599 {
5600 struct ppc_link_hash_entry *eh, *fh;
5601 asection *sec;
5602
5603 eh = (struct ppc_link_hash_entry *)
5604 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
5605 if (eh == NULL)
5606 continue;
5607 if (eh->elf.root.type != bfd_link_hash_defined
5608 && eh->elf.root.type != bfd_link_hash_defweak)
5609 continue;
5610
5611 fh = defined_code_entry (eh);
5612 if (fh != NULL)
5613 {
5614 sec = fh->elf.root.u.def.section;
5615 sec->flags |= SEC_KEEP;
5616 }
5617 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5618 && opd_entry_value (eh->elf.root.u.def.section,
5619 eh->elf.root.u.def.value,
5620 &sec, NULL, FALSE) != (bfd_vma) -1)
5621 sec->flags |= SEC_KEEP;
5622
5623 sec = eh->elf.root.u.def.section;
5624 sec->flags |= SEC_KEEP;
5625 }
5626 }
5627
5628 /* Mark sections containing dynamically referenced symbols. When
5629 building shared libraries, we must assume that any visible symbol is
5630 referenced. */
5631
5632 static bfd_boolean
5633 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5634 {
5635 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5636 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
5637 struct ppc_link_hash_entry *fdh;
5638 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5639
5640 /* Dynamic linking info is on the func descriptor sym. */
5641 fdh = defined_func_desc (eh);
5642 if (fdh != NULL)
5643 eh = fdh;
5644
5645 if ((eh->elf.root.type == bfd_link_hash_defined
5646 || eh->elf.root.type == bfd_link_hash_defweak)
5647 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5648 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5649 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5650 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5651 && (!bfd_link_executable (info)
5652 || info->gc_keep_exported
5653 || info->export_dynamic
5654 || (eh->elf.dynamic
5655 && d != NULL
5656 && (*d->match) (&d->head, NULL,
5657 eh->elf.root.root.string)))
5658 && (eh->elf.versioned >= versioned
5659 || !bfd_hide_sym_by_version (info->version_info,
5660 eh->elf.root.root.string)))))
5661 {
5662 asection *code_sec;
5663 struct ppc_link_hash_entry *fh;
5664
5665 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5666
5667 /* Function descriptor syms cause the associated
5668 function code sym section to be marked. */
5669 fh = defined_code_entry (eh);
5670 if (fh != NULL)
5671 {
5672 code_sec = fh->elf.root.u.def.section;
5673 code_sec->flags |= SEC_KEEP;
5674 }
5675 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5676 && opd_entry_value (eh->elf.root.u.def.section,
5677 eh->elf.root.u.def.value,
5678 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5679 code_sec->flags |= SEC_KEEP;
5680 }
5681
5682 return TRUE;
5683 }
5684
5685 /* Return the section that should be marked against GC for a given
5686 relocation. */
5687
5688 static asection *
5689 ppc64_elf_gc_mark_hook (asection *sec,
5690 struct bfd_link_info *info,
5691 Elf_Internal_Rela *rel,
5692 struct elf_link_hash_entry *h,
5693 Elf_Internal_Sym *sym)
5694 {
5695 asection *rsec;
5696
5697 /* Syms return NULL if we're marking .opd, so we avoid marking all
5698 function sections, as all functions are referenced in .opd. */
5699 rsec = NULL;
5700 if (get_opd_info (sec) != NULL)
5701 return rsec;
5702
5703 if (h != NULL)
5704 {
5705 enum elf_ppc64_reloc_type r_type;
5706 struct ppc_link_hash_entry *eh, *fh, *fdh;
5707
5708 r_type = ELF64_R_TYPE (rel->r_info);
5709 switch (r_type)
5710 {
5711 case R_PPC64_GNU_VTINHERIT:
5712 case R_PPC64_GNU_VTENTRY:
5713 break;
5714
5715 default:
5716 switch (h->root.type)
5717 {
5718 case bfd_link_hash_defined:
5719 case bfd_link_hash_defweak:
5720 eh = (struct ppc_link_hash_entry *) h;
5721 fdh = defined_func_desc (eh);
5722 if (fdh != NULL)
5723 {
5724 /* -mcall-aixdesc code references the dot-symbol on
5725 a call reloc. Mark the function descriptor too
5726 against garbage collection. */
5727 fdh->elf.mark = 1;
5728 if (fdh->elf.is_weakalias)
5729 weakdef (&fdh->elf)->mark = 1;
5730 eh = fdh;
5731 }
5732
5733 /* Function descriptor syms cause the associated
5734 function code sym section to be marked. */
5735 fh = defined_code_entry (eh);
5736 if (fh != NULL)
5737 {
5738 /* They also mark their opd section. */
5739 eh->elf.root.u.def.section->gc_mark = 1;
5740
5741 rsec = fh->elf.root.u.def.section;
5742 }
5743 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5744 && opd_entry_value (eh->elf.root.u.def.section,
5745 eh->elf.root.u.def.value,
5746 &rsec, NULL, FALSE) != (bfd_vma) -1)
5747 eh->elf.root.u.def.section->gc_mark = 1;
5748 else
5749 rsec = h->root.u.def.section;
5750 break;
5751
5752 case bfd_link_hash_common:
5753 rsec = h->root.u.c.p->section;
5754 break;
5755
5756 default:
5757 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5758 }
5759 }
5760 }
5761 else
5762 {
5763 struct _opd_sec_data *opd;
5764
5765 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5766 opd = get_opd_info (rsec);
5767 if (opd != NULL && opd->func_sec != NULL)
5768 {
5769 rsec->gc_mark = 1;
5770
5771 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5772 }
5773 }
5774
5775 return rsec;
5776 }
5777
5778 /* The maximum size of .sfpr. */
5779 #define SFPR_MAX (218*4)
5780
5781 struct sfpr_def_parms
5782 {
5783 const char name[12];
5784 unsigned char lo, hi;
5785 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5786 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5787 };
5788
5789 /* Auto-generate _save*, _rest* functions in .sfpr.
5790 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5791 instead. */
5792
5793 static bfd_boolean
5794 sfpr_define (struct bfd_link_info *info,
5795 const struct sfpr_def_parms *parm,
5796 asection *stub_sec)
5797 {
5798 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5799 unsigned int i;
5800 size_t len = strlen (parm->name);
5801 bfd_boolean writing = FALSE;
5802 char sym[16];
5803
5804 if (htab == NULL)
5805 return FALSE;
5806
5807 memcpy (sym, parm->name, len);
5808 sym[len + 2] = 0;
5809
5810 for (i = parm->lo; i <= parm->hi; i++)
5811 {
5812 struct ppc_link_hash_entry *h;
5813
5814 sym[len + 0] = i / 10 + '0';
5815 sym[len + 1] = i % 10 + '0';
5816 h = (struct ppc_link_hash_entry *)
5817 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
5818 if (stub_sec != NULL)
5819 {
5820 if (h != NULL
5821 && h->elf.root.type == bfd_link_hash_defined
5822 && h->elf.root.u.def.section == htab->sfpr)
5823 {
5824 struct elf_link_hash_entry *s;
5825 char buf[32];
5826 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5827 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5828 if (s == NULL)
5829 return FALSE;
5830 if (s->root.type == bfd_link_hash_new
5831 || (s->root.type = bfd_link_hash_defined
5832 && s->root.u.def.section == stub_sec))
5833 {
5834 s->root.type = bfd_link_hash_defined;
5835 s->root.u.def.section = stub_sec;
5836 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5837 + h->elf.root.u.def.value);
5838 s->ref_regular = 1;
5839 s->def_regular = 1;
5840 s->ref_regular_nonweak = 1;
5841 s->forced_local = 1;
5842 s->non_elf = 0;
5843 s->root.linker_def = 1;
5844 }
5845 }
5846 continue;
5847 }
5848 if (h != NULL)
5849 {
5850 h->save_res = 1;
5851 if (!h->elf.def_regular)
5852 {
5853 h->elf.root.type = bfd_link_hash_defined;
5854 h->elf.root.u.def.section = htab->sfpr;
5855 h->elf.root.u.def.value = htab->sfpr->size;
5856 h->elf.type = STT_FUNC;
5857 h->elf.def_regular = 1;
5858 h->elf.non_elf = 0;
5859 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5860 writing = TRUE;
5861 if (htab->sfpr->contents == NULL)
5862 {
5863 htab->sfpr->contents
5864 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5865 if (htab->sfpr->contents == NULL)
5866 return FALSE;
5867 }
5868 }
5869 }
5870 if (writing)
5871 {
5872 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5873 if (i != parm->hi)
5874 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5875 else
5876 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5877 htab->sfpr->size = p - htab->sfpr->contents;
5878 }
5879 }
5880
5881 return TRUE;
5882 }
5883
5884 static bfd_byte *
5885 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5886 {
5887 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5888 return p + 4;
5889 }
5890
5891 static bfd_byte *
5892 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5893 {
5894 p = savegpr0 (abfd, p, r);
5895 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5896 p = p + 4;
5897 bfd_put_32 (abfd, BLR, p);
5898 return p + 4;
5899 }
5900
5901 static bfd_byte *
5902 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5903 {
5904 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5905 return p + 4;
5906 }
5907
5908 static bfd_byte *
5909 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5910 {
5911 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5912 p = p + 4;
5913 p = restgpr0 (abfd, p, r);
5914 bfd_put_32 (abfd, MTLR_R0, p);
5915 p = p + 4;
5916 if (r == 29)
5917 {
5918 p = restgpr0 (abfd, p, 30);
5919 p = restgpr0 (abfd, p, 31);
5920 }
5921 bfd_put_32 (abfd, BLR, p);
5922 return p + 4;
5923 }
5924
5925 static bfd_byte *
5926 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5927 {
5928 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5929 return p + 4;
5930 }
5931
5932 static bfd_byte *
5933 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5934 {
5935 p = savegpr1 (abfd, p, r);
5936 bfd_put_32 (abfd, BLR, p);
5937 return p + 4;
5938 }
5939
5940 static bfd_byte *
5941 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5942 {
5943 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5944 return p + 4;
5945 }
5946
5947 static bfd_byte *
5948 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5949 {
5950 p = restgpr1 (abfd, p, r);
5951 bfd_put_32 (abfd, BLR, p);
5952 return p + 4;
5953 }
5954
5955 static bfd_byte *
5956 savefpr (bfd *abfd, bfd_byte *p, int r)
5957 {
5958 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5959 return p + 4;
5960 }
5961
5962 static bfd_byte *
5963 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5964 {
5965 p = savefpr (abfd, p, r);
5966 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5967 p = p + 4;
5968 bfd_put_32 (abfd, BLR, p);
5969 return p + 4;
5970 }
5971
5972 static bfd_byte *
5973 restfpr (bfd *abfd, bfd_byte *p, int r)
5974 {
5975 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5976 return p + 4;
5977 }
5978
5979 static bfd_byte *
5980 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5981 {
5982 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5983 p = p + 4;
5984 p = restfpr (abfd, p, r);
5985 bfd_put_32 (abfd, MTLR_R0, p);
5986 p = p + 4;
5987 if (r == 29)
5988 {
5989 p = restfpr (abfd, p, 30);
5990 p = restfpr (abfd, p, 31);
5991 }
5992 bfd_put_32 (abfd, BLR, p);
5993 return p + 4;
5994 }
5995
5996 static bfd_byte *
5997 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5998 {
5999 p = savefpr (abfd, p, r);
6000 bfd_put_32 (abfd, BLR, p);
6001 return p + 4;
6002 }
6003
6004 static bfd_byte *
6005 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6006 {
6007 p = restfpr (abfd, p, r);
6008 bfd_put_32 (abfd, BLR, p);
6009 return p + 4;
6010 }
6011
6012 static bfd_byte *
6013 savevr (bfd *abfd, bfd_byte *p, int r)
6014 {
6015 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6016 p = p + 4;
6017 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6018 return p + 4;
6019 }
6020
6021 static bfd_byte *
6022 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6023 {
6024 p = savevr (abfd, p, r);
6025 bfd_put_32 (abfd, BLR, p);
6026 return p + 4;
6027 }
6028
6029 static bfd_byte *
6030 restvr (bfd *abfd, bfd_byte *p, int r)
6031 {
6032 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6033 p = p + 4;
6034 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6035 return p + 4;
6036 }
6037
6038 static bfd_byte *
6039 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6040 {
6041 p = restvr (abfd, p, r);
6042 bfd_put_32 (abfd, BLR, p);
6043 return p + 4;
6044 }
6045
6046 /* Called via elf_link_hash_traverse to transfer dynamic linking
6047 information on function code symbol entries to their corresponding
6048 function descriptor symbol entries. */
6049
6050 static bfd_boolean
6051 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6052 {
6053 struct bfd_link_info *info;
6054 struct ppc_link_hash_table *htab;
6055 struct ppc_link_hash_entry *fh;
6056 struct ppc_link_hash_entry *fdh;
6057 bfd_boolean force_local;
6058
6059 fh = (struct ppc_link_hash_entry *) h;
6060 if (fh->elf.root.type == bfd_link_hash_indirect)
6061 return TRUE;
6062
6063 if (!fh->is_func)
6064 return TRUE;
6065
6066 if (fh->elf.root.root.string[0] != '.'
6067 || fh->elf.root.root.string[1] == '\0')
6068 return TRUE;
6069
6070 info = inf;
6071 htab = ppc_hash_table (info);
6072 if (htab == NULL)
6073 return FALSE;
6074
6075 /* Find the corresponding function descriptor symbol. */
6076 fdh = lookup_fdh (fh, htab);
6077
6078 /* Resolve undefined references to dot-symbols as the value
6079 in the function descriptor, if we have one in a regular object.
6080 This is to satisfy cases like ".quad .foo". Calls to functions
6081 in dynamic objects are handled elsewhere. */
6082 if ((fh->elf.root.type == bfd_link_hash_undefined
6083 || fh->elf.root.type == bfd_link_hash_undefweak)
6084 && (fdh->elf.root.type == bfd_link_hash_defined
6085 || fdh->elf.root.type == bfd_link_hash_defweak)
6086 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6087 && opd_entry_value (fdh->elf.root.u.def.section,
6088 fdh->elf.root.u.def.value,
6089 &fh->elf.root.u.def.section,
6090 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6091 {
6092 fh->elf.root.type = fdh->elf.root.type;
6093 fh->elf.forced_local = 1;
6094 fh->elf.def_regular = fdh->elf.def_regular;
6095 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6096 }
6097
6098 if (!fh->elf.dynamic)
6099 {
6100 struct plt_entry *ent;
6101
6102 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6103 if (ent->plt.refcount > 0)
6104 break;
6105 if (ent == NULL)
6106 return TRUE;
6107 }
6108
6109 /* Create a descriptor as undefined if necessary. */
6110 if (fdh == NULL
6111 && !bfd_link_executable (info)
6112 && (fh->elf.root.type == bfd_link_hash_undefined
6113 || fh->elf.root.type == bfd_link_hash_undefweak))
6114 {
6115 fdh = make_fdh (info, fh);
6116 if (fdh == NULL)
6117 return FALSE;
6118 }
6119
6120 /* We can't support overriding of symbols on a fake descriptor. */
6121 if (fdh != NULL
6122 && fdh->fake
6123 && (fh->elf.root.type == bfd_link_hash_defined
6124 || fh->elf.root.type == bfd_link_hash_defweak))
6125 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6126
6127 /* Transfer dynamic linking information to the function descriptor. */
6128 if (fdh != NULL)
6129 {
6130 fdh->elf.ref_regular |= fh->elf.ref_regular;
6131 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6132 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6133 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6134 fdh->elf.dynamic |= fh->elf.dynamic;
6135 fdh->elf.needs_plt |= (fh->elf.needs_plt
6136 || fh->elf.type == STT_FUNC
6137 || fh->elf.type == STT_GNU_IFUNC);
6138 move_plt_plist (fh, fdh);
6139
6140 if (!fdh->elf.forced_local
6141 && fh->elf.dynindx != -1)
6142 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6143 return FALSE;
6144 }
6145
6146 /* Now that the info is on the function descriptor, clear the
6147 function code sym info. Any function code syms for which we
6148 don't have a definition in a regular file, we force local.
6149 This prevents a shared library from exporting syms that have
6150 been imported from another library. Function code syms that
6151 are really in the library we must leave global to prevent the
6152 linker dragging in a definition from a static library. */
6153 force_local = (!fh->elf.def_regular
6154 || fdh == NULL
6155 || !fdh->elf.def_regular
6156 || fdh->elf.forced_local);
6157 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6158
6159 return TRUE;
6160 }
6161
6162 static const struct sfpr_def_parms save_res_funcs[] =
6163 {
6164 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6165 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6166 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6167 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6168 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6169 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6170 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6171 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6172 { "._savef", 14, 31, savefpr, savefpr1_tail },
6173 { "._restf", 14, 31, restfpr, restfpr1_tail },
6174 { "_savevr_", 20, 31, savevr, savevr_tail },
6175 { "_restvr_", 20, 31, restvr, restvr_tail }
6176 };
6177
6178 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6179 this hook to a) provide some gcc support functions, and b) transfer
6180 dynamic linking information gathered so far on function code symbol
6181 entries, to their corresponding function descriptor symbol entries. */
6182
6183 static bfd_boolean
6184 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6185 struct bfd_link_info *info)
6186 {
6187 struct ppc_link_hash_table *htab;
6188
6189 htab = ppc_hash_table (info);
6190 if (htab == NULL)
6191 return FALSE;
6192
6193 /* Provide any missing _save* and _rest* functions. */
6194 if (htab->sfpr != NULL)
6195 {
6196 unsigned int i;
6197
6198 htab->sfpr->size = 0;
6199 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6200 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6201 return FALSE;
6202 if (htab->sfpr->size == 0)
6203 htab->sfpr->flags |= SEC_EXCLUDE;
6204 }
6205
6206 if (bfd_link_relocatable (info))
6207 return TRUE;
6208
6209 if (htab->elf.hgot != NULL)
6210 {
6211 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6212 /* Make .TOC. defined so as to prevent it being made dynamic.
6213 The wrong value here is fixed later in ppc64_elf_set_toc. */
6214 if (!htab->elf.hgot->def_regular
6215 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6216 {
6217 htab->elf.hgot->root.type = bfd_link_hash_defined;
6218 htab->elf.hgot->root.u.def.value = 0;
6219 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6220 htab->elf.hgot->def_regular = 1;
6221 htab->elf.hgot->root.linker_def = 1;
6222 }
6223 htab->elf.hgot->type = STT_OBJECT;
6224 htab->elf.hgot->other
6225 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6226 }
6227
6228 if (htab->need_func_desc_adj)
6229 {
6230 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6231 htab->need_func_desc_adj = 0;
6232 }
6233
6234 return TRUE;
6235 }
6236
6237 /* Find dynamic relocs for H that apply to read-only sections. */
6238
6239 static asection *
6240 readonly_dynrelocs (struct elf_link_hash_entry *h)
6241 {
6242 struct ppc_link_hash_entry *eh;
6243 struct elf_dyn_relocs *p;
6244
6245 eh = (struct ppc_link_hash_entry *) h;
6246 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6247 {
6248 asection *s = p->sec->output_section;
6249
6250 if (s != NULL && (s->flags & SEC_READONLY) != 0)
6251 return p->sec;
6252 }
6253 return NULL;
6254 }
6255
6256 /* Return true if we have dynamic relocs against H or any of its weak
6257 aliases, that apply to read-only sections. Cannot be used after
6258 size_dynamic_sections. */
6259
6260 static bfd_boolean
6261 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6262 {
6263 struct ppc_link_hash_entry *eh;
6264
6265 eh = (struct ppc_link_hash_entry *) h;
6266 do
6267 {
6268 if (readonly_dynrelocs (&eh->elf))
6269 return TRUE;
6270 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
6271 }
6272 while (eh != NULL && &eh->elf != h);
6273
6274 return FALSE;
6275 }
6276
6277 /* Return whether EH has pc-relative dynamic relocs. */
6278
6279 static bfd_boolean
6280 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6281 {
6282 struct elf_dyn_relocs *p;
6283
6284 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6285 if (p->pc_count != 0)
6286 return TRUE;
6287 return FALSE;
6288 }
6289
6290 /* Return true if a global entry stub will be created for H. Valid
6291 for ELFv2 before plt entries have been allocated. */
6292
6293 static bfd_boolean
6294 global_entry_stub (struct elf_link_hash_entry *h)
6295 {
6296 struct plt_entry *pent;
6297
6298 if (!h->pointer_equality_needed
6299 || h->def_regular)
6300 return FALSE;
6301
6302 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6303 if (pent->plt.refcount > 0
6304 && pent->addend == 0)
6305 return TRUE;
6306
6307 return FALSE;
6308 }
6309
6310 /* Adjust a symbol defined by a dynamic object and referenced by a
6311 regular object. The current definition is in some section of the
6312 dynamic object, but we're not including those sections. We have to
6313 change the definition to something the rest of the link can
6314 understand. */
6315
6316 static bfd_boolean
6317 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6318 struct elf_link_hash_entry *h)
6319 {
6320 struct ppc_link_hash_table *htab;
6321 asection *s, *srel;
6322
6323 htab = ppc_hash_table (info);
6324 if (htab == NULL)
6325 return FALSE;
6326
6327 /* Deal with function syms. */
6328 if (h->type == STT_FUNC
6329 || h->type == STT_GNU_IFUNC
6330 || h->needs_plt)
6331 {
6332 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6333 || SYMBOL_CALLS_LOCAL (info, h)
6334 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6335 /* Discard dyn_relocs when non-pic if we've decided that a
6336 function symbol is local and not an ifunc. We keep dynamic
6337 relocs for ifuncs when local rather than always emitting a
6338 plt call stub for them and defining the symbol on the call
6339 stub. We can't do that for ELFv1 anyway (a function symbol
6340 is defined on a descriptor, not code) and it can be faster at
6341 run-time due to not needing to bounce through a stub. The
6342 dyn_relocs for ifuncs will be applied even in a static
6343 executable. */
6344 if (!bfd_link_pic (info)
6345 && h->type != STT_GNU_IFUNC
6346 && local)
6347 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6348
6349 /* Clear procedure linkage table information for any symbol that
6350 won't need a .plt entry. */
6351 struct plt_entry *ent;
6352 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6353 if (ent->plt.refcount > 0)
6354 break;
6355 if (ent == NULL
6356 || (h->type != STT_GNU_IFUNC
6357 && local
6358 && (htab->can_convert_all_inline_plt
6359 || (((struct ppc_link_hash_entry *) h)->tls_mask
6360 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6361 {
6362 h->plt.plist = NULL;
6363 h->needs_plt = 0;
6364 h->pointer_equality_needed = 0;
6365 }
6366 else if (abiversion (info->output_bfd) >= 2)
6367 {
6368 /* Taking a function's address in a read/write section
6369 doesn't require us to define the function symbol in the
6370 executable on a global entry stub. A dynamic reloc can
6371 be used instead. The reason we prefer a few more dynamic
6372 relocs is that calling via a global entry stub costs a
6373 few more instructions, and pointer_equality_needed causes
6374 extra work in ld.so when resolving these symbols. */
6375 if (global_entry_stub (h))
6376 {
6377 if (!readonly_dynrelocs (h))
6378 {
6379 h->pointer_equality_needed = 0;
6380 /* If we haven't seen a branch reloc and the symbol
6381 isn't an ifunc then we don't need a plt entry. */
6382 if (!h->needs_plt)
6383 h->plt.plist = NULL;
6384 }
6385 else if (!bfd_link_pic (info))
6386 /* We are going to be defining the function symbol on the
6387 plt stub, so no dyn_relocs needed when non-pic. */
6388 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6389 }
6390
6391 /* ELFv2 function symbols can't have copy relocs. */
6392 return TRUE;
6393 }
6394 else if (!h->needs_plt
6395 && !readonly_dynrelocs (h))
6396 {
6397 /* If we haven't seen a branch reloc and the symbol isn't an
6398 ifunc then we don't need a plt entry. */
6399 h->plt.plist = NULL;
6400 h->pointer_equality_needed = 0;
6401 return TRUE;
6402 }
6403 }
6404 else
6405 h->plt.plist = NULL;
6406
6407 /* If this is a weak symbol, and there is a real definition, the
6408 processor independent code will have arranged for us to see the
6409 real definition first, and we can just use the same value. */
6410 if (h->is_weakalias)
6411 {
6412 struct elf_link_hash_entry *def = weakdef (h);
6413 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6414 h->root.u.def.section = def->root.u.def.section;
6415 h->root.u.def.value = def->root.u.def.value;
6416 if (def->root.u.def.section == htab->elf.sdynbss
6417 || def->root.u.def.section == htab->elf.sdynrelro)
6418 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6419 return TRUE;
6420 }
6421
6422 /* If we are creating a shared library, we must presume that the
6423 only references to the symbol are via the global offset table.
6424 For such cases we need not do anything here; the relocations will
6425 be handled correctly by relocate_section. */
6426 if (!bfd_link_executable (info))
6427 return TRUE;
6428
6429 /* If there are no references to this symbol that do not use the
6430 GOT, we don't need to generate a copy reloc. */
6431 if (!h->non_got_ref)
6432 return TRUE;
6433
6434 /* Don't generate a copy reloc for symbols defined in the executable. */
6435 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6436
6437 /* If -z nocopyreloc was given, don't generate them either. */
6438 || info->nocopyreloc
6439
6440 /* If we don't find any dynamic relocs in read-only sections, then
6441 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6442 || (ELIMINATE_COPY_RELOCS
6443 && !h->needs_copy
6444 && !alias_readonly_dynrelocs (h))
6445
6446 /* Protected variables do not work with .dynbss. The copy in
6447 .dynbss won't be used by the shared library with the protected
6448 definition for the variable. Text relocations are preferable
6449 to an incorrect program. */
6450 || h->protected_def)
6451 return TRUE;
6452
6453 if (h->plt.plist != NULL)
6454 {
6455 /* We should never get here, but unfortunately there are versions
6456 of gcc out there that improperly (for this ABI) put initialized
6457 function pointers, vtable refs and suchlike in read-only
6458 sections. Allow them to proceed, but warn that this might
6459 break at runtime. */
6460 info->callbacks->einfo
6461 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6462 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6463 h->root.root.string);
6464 }
6465
6466 /* This is a reference to a symbol defined by a dynamic object which
6467 is not a function. */
6468
6469 /* We must allocate the symbol in our .dynbss section, which will
6470 become part of the .bss section of the executable. There will be
6471 an entry for this symbol in the .dynsym section. The dynamic
6472 object will contain position independent code, so all references
6473 from the dynamic object to this symbol will go through the global
6474 offset table. The dynamic linker will use the .dynsym entry to
6475 determine the address it must put in the global offset table, so
6476 both the dynamic object and the regular object will refer to the
6477 same memory location for the variable. */
6478 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6479 {
6480 s = htab->elf.sdynrelro;
6481 srel = htab->elf.sreldynrelro;
6482 }
6483 else
6484 {
6485 s = htab->elf.sdynbss;
6486 srel = htab->elf.srelbss;
6487 }
6488 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6489 {
6490 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6491 linker to copy the initial value out of the dynamic object
6492 and into the runtime process image. */
6493 srel->size += sizeof (Elf64_External_Rela);
6494 h->needs_copy = 1;
6495 }
6496
6497 /* We no longer want dyn_relocs. */
6498 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6499 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6500 }
6501
6502 /* If given a function descriptor symbol, hide both the function code
6503 sym and the descriptor. */
6504 static void
6505 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6506 struct elf_link_hash_entry *h,
6507 bfd_boolean force_local)
6508 {
6509 struct ppc_link_hash_entry *eh;
6510 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6511
6512 if (ppc_hash_table (info) == NULL)
6513 return;
6514
6515 eh = (struct ppc_link_hash_entry *) h;
6516 if (eh->is_func_descriptor)
6517 {
6518 struct ppc_link_hash_entry *fh = eh->oh;
6519
6520 if (fh == NULL)
6521 {
6522 const char *p, *q;
6523 struct elf_link_hash_table *htab = elf_hash_table (info);
6524 char save;
6525
6526 /* We aren't supposed to use alloca in BFD because on
6527 systems which do not have alloca the version in libiberty
6528 calls xmalloc, which might cause the program to crash
6529 when it runs out of memory. This function doesn't have a
6530 return status, so there's no way to gracefully return an
6531 error. So cheat. We know that string[-1] can be safely
6532 accessed; It's either a string in an ELF string table,
6533 or allocated in an objalloc structure. */
6534
6535 p = eh->elf.root.root.string - 1;
6536 save = *p;
6537 *(char *) p = '.';
6538 fh = (struct ppc_link_hash_entry *)
6539 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
6540 *(char *) p = save;
6541
6542 /* Unfortunately, if it so happens that the string we were
6543 looking for was allocated immediately before this string,
6544 then we overwrote the string terminator. That's the only
6545 reason the lookup should fail. */
6546 if (fh == NULL)
6547 {
6548 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6549 while (q >= eh->elf.root.root.string && *q == *p)
6550 --q, --p;
6551 if (q < eh->elf.root.root.string && *p == '.')
6552 fh = (struct ppc_link_hash_entry *)
6553 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
6554 }
6555 if (fh != NULL)
6556 {
6557 eh->oh = fh;
6558 fh->oh = eh;
6559 }
6560 }
6561 if (fh != NULL)
6562 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6563 }
6564 }
6565
6566 static bfd_boolean
6567 get_sym_h (struct elf_link_hash_entry **hp,
6568 Elf_Internal_Sym **symp,
6569 asection **symsecp,
6570 unsigned char **tls_maskp,
6571 Elf_Internal_Sym **locsymsp,
6572 unsigned long r_symndx,
6573 bfd *ibfd)
6574 {
6575 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6576
6577 if (r_symndx >= symtab_hdr->sh_info)
6578 {
6579 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6580 struct elf_link_hash_entry *h;
6581
6582 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6583 h = elf_follow_link (h);
6584
6585 if (hp != NULL)
6586 *hp = h;
6587
6588 if (symp != NULL)
6589 *symp = NULL;
6590
6591 if (symsecp != NULL)
6592 {
6593 asection *symsec = NULL;
6594 if (h->root.type == bfd_link_hash_defined
6595 || h->root.type == bfd_link_hash_defweak)
6596 symsec = h->root.u.def.section;
6597 *symsecp = symsec;
6598 }
6599
6600 if (tls_maskp != NULL)
6601 {
6602 struct ppc_link_hash_entry *eh;
6603
6604 eh = (struct ppc_link_hash_entry *) h;
6605 *tls_maskp = &eh->tls_mask;
6606 }
6607 }
6608 else
6609 {
6610 Elf_Internal_Sym *sym;
6611 Elf_Internal_Sym *locsyms = *locsymsp;
6612
6613 if (locsyms == NULL)
6614 {
6615 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6616 if (locsyms == NULL)
6617 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6618 symtab_hdr->sh_info,
6619 0, NULL, NULL, NULL);
6620 if (locsyms == NULL)
6621 return FALSE;
6622 *locsymsp = locsyms;
6623 }
6624 sym = locsyms + r_symndx;
6625
6626 if (hp != NULL)
6627 *hp = NULL;
6628
6629 if (symp != NULL)
6630 *symp = sym;
6631
6632 if (symsecp != NULL)
6633 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6634
6635 if (tls_maskp != NULL)
6636 {
6637 struct got_entry **lgot_ents;
6638 unsigned char *tls_mask;
6639
6640 tls_mask = NULL;
6641 lgot_ents = elf_local_got_ents (ibfd);
6642 if (lgot_ents != NULL)
6643 {
6644 struct plt_entry **local_plt = (struct plt_entry **)
6645 (lgot_ents + symtab_hdr->sh_info);
6646 unsigned char *lgot_masks = (unsigned char *)
6647 (local_plt + symtab_hdr->sh_info);
6648 tls_mask = &lgot_masks[r_symndx];
6649 }
6650 *tls_maskp = tls_mask;
6651 }
6652 }
6653 return TRUE;
6654 }
6655
6656 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6657 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6658 type suitable for optimization, and 1 otherwise. */
6659
6660 static int
6661 get_tls_mask (unsigned char **tls_maskp,
6662 unsigned long *toc_symndx,
6663 bfd_vma *toc_addend,
6664 Elf_Internal_Sym **locsymsp,
6665 const Elf_Internal_Rela *rel,
6666 bfd *ibfd)
6667 {
6668 unsigned long r_symndx;
6669 int next_r;
6670 struct elf_link_hash_entry *h;
6671 Elf_Internal_Sym *sym;
6672 asection *sec;
6673 bfd_vma off;
6674
6675 r_symndx = ELF64_R_SYM (rel->r_info);
6676 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6677 return 0;
6678
6679 if ((*tls_maskp != NULL
6680 && (**tls_maskp & TLS_TLS) != 0
6681 && **tls_maskp != (TLS_TLS | TLS_MARK))
6682 || sec == NULL
6683 || ppc64_elf_section_data (sec) == NULL
6684 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6685 return 1;
6686
6687 /* Look inside a TOC section too. */
6688 if (h != NULL)
6689 {
6690 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6691 off = h->root.u.def.value;
6692 }
6693 else
6694 off = sym->st_value;
6695 off += rel->r_addend;
6696 BFD_ASSERT (off % 8 == 0);
6697 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6698 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6699 if (toc_symndx != NULL)
6700 *toc_symndx = r_symndx;
6701 if (toc_addend != NULL)
6702 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6703 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6704 return 0;
6705 if ((h == NULL || is_static_defined (h))
6706 && (next_r == -1 || next_r == -2))
6707 return 1 - next_r;
6708 return 1;
6709 }
6710
6711 /* Find (or create) an entry in the tocsave hash table. */
6712
6713 static struct tocsave_entry *
6714 tocsave_find (struct ppc_link_hash_table *htab,
6715 enum insert_option insert,
6716 Elf_Internal_Sym **local_syms,
6717 const Elf_Internal_Rela *irela,
6718 bfd *ibfd)
6719 {
6720 unsigned long r_indx;
6721 struct elf_link_hash_entry *h;
6722 Elf_Internal_Sym *sym;
6723 struct tocsave_entry ent, *p;
6724 hashval_t hash;
6725 struct tocsave_entry **slot;
6726
6727 r_indx = ELF64_R_SYM (irela->r_info);
6728 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6729 return NULL;
6730 if (ent.sec == NULL || ent.sec->output_section == NULL)
6731 {
6732 _bfd_error_handler
6733 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6734 return NULL;
6735 }
6736
6737 if (h != NULL)
6738 ent.offset = h->root.u.def.value;
6739 else
6740 ent.offset = sym->st_value;
6741 ent.offset += irela->r_addend;
6742
6743 hash = tocsave_htab_hash (&ent);
6744 slot = ((struct tocsave_entry **)
6745 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6746 if (slot == NULL)
6747 return NULL;
6748
6749 if (*slot == NULL)
6750 {
6751 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6752 if (p == NULL)
6753 return NULL;
6754 *p = ent;
6755 *slot = p;
6756 }
6757 return *slot;
6758 }
6759
6760 /* Adjust all global syms defined in opd sections. In gcc generated
6761 code for the old ABI, these will already have been done. */
6762
6763 static bfd_boolean
6764 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6765 {
6766 struct ppc_link_hash_entry *eh;
6767 asection *sym_sec;
6768 struct _opd_sec_data *opd;
6769
6770 if (h->root.type == bfd_link_hash_indirect)
6771 return TRUE;
6772
6773 if (h->root.type != bfd_link_hash_defined
6774 && h->root.type != bfd_link_hash_defweak)
6775 return TRUE;
6776
6777 eh = (struct ppc_link_hash_entry *) h;
6778 if (eh->adjust_done)
6779 return TRUE;
6780
6781 sym_sec = eh->elf.root.u.def.section;
6782 opd = get_opd_info (sym_sec);
6783 if (opd != NULL && opd->adjust != NULL)
6784 {
6785 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6786 if (adjust == -1)
6787 {
6788 /* This entry has been deleted. */
6789 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6790 if (dsec == NULL)
6791 {
6792 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6793 if (discarded_section (dsec))
6794 {
6795 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6796 break;
6797 }
6798 }
6799 eh->elf.root.u.def.value = 0;
6800 eh->elf.root.u.def.section = dsec;
6801 }
6802 else
6803 eh->elf.root.u.def.value += adjust;
6804 eh->adjust_done = 1;
6805 }
6806 return TRUE;
6807 }
6808
6809 /* Handles decrementing dynamic reloc counts for the reloc specified by
6810 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6811 have already been determined. */
6812
6813 static bfd_boolean
6814 dec_dynrel_count (bfd_vma r_info,
6815 asection *sec,
6816 struct bfd_link_info *info,
6817 Elf_Internal_Sym **local_syms,
6818 struct elf_link_hash_entry *h,
6819 Elf_Internal_Sym *sym)
6820 {
6821 enum elf_ppc64_reloc_type r_type;
6822 asection *sym_sec = NULL;
6823
6824 /* Can this reloc be dynamic? This switch, and later tests here
6825 should be kept in sync with the code in check_relocs. */
6826 r_type = ELF64_R_TYPE (r_info);
6827 switch (r_type)
6828 {
6829 default:
6830 return TRUE;
6831
6832 case R_PPC64_TOC16:
6833 case R_PPC64_TOC16_DS:
6834 case R_PPC64_TOC16_LO:
6835 case R_PPC64_TOC16_HI:
6836 case R_PPC64_TOC16_HA:
6837 case R_PPC64_TOC16_LO_DS:
6838 if (h == NULL)
6839 return TRUE;
6840 break;
6841
6842 case R_PPC64_TPREL16:
6843 case R_PPC64_TPREL16_LO:
6844 case R_PPC64_TPREL16_HI:
6845 case R_PPC64_TPREL16_HA:
6846 case R_PPC64_TPREL16_DS:
6847 case R_PPC64_TPREL16_LO_DS:
6848 case R_PPC64_TPREL16_HIGH:
6849 case R_PPC64_TPREL16_HIGHA:
6850 case R_PPC64_TPREL16_HIGHER:
6851 case R_PPC64_TPREL16_HIGHERA:
6852 case R_PPC64_TPREL16_HIGHEST:
6853 case R_PPC64_TPREL16_HIGHESTA:
6854 case R_PPC64_TPREL64:
6855 case R_PPC64_TPREL34:
6856 case R_PPC64_DTPMOD64:
6857 case R_PPC64_DTPREL64:
6858 case R_PPC64_ADDR64:
6859 case R_PPC64_REL30:
6860 case R_PPC64_REL32:
6861 case R_PPC64_REL64:
6862 case R_PPC64_ADDR14:
6863 case R_PPC64_ADDR14_BRNTAKEN:
6864 case R_PPC64_ADDR14_BRTAKEN:
6865 case R_PPC64_ADDR16:
6866 case R_PPC64_ADDR16_DS:
6867 case R_PPC64_ADDR16_HA:
6868 case R_PPC64_ADDR16_HI:
6869 case R_PPC64_ADDR16_HIGH:
6870 case R_PPC64_ADDR16_HIGHA:
6871 case R_PPC64_ADDR16_HIGHER:
6872 case R_PPC64_ADDR16_HIGHERA:
6873 case R_PPC64_ADDR16_HIGHEST:
6874 case R_PPC64_ADDR16_HIGHESTA:
6875 case R_PPC64_ADDR16_LO:
6876 case R_PPC64_ADDR16_LO_DS:
6877 case R_PPC64_ADDR24:
6878 case R_PPC64_ADDR32:
6879 case R_PPC64_UADDR16:
6880 case R_PPC64_UADDR32:
6881 case R_PPC64_UADDR64:
6882 case R_PPC64_TOC:
6883 case R_PPC64_D34:
6884 case R_PPC64_D34_LO:
6885 case R_PPC64_D34_HI30:
6886 case R_PPC64_D34_HA30:
6887 case R_PPC64_ADDR16_HIGHER34:
6888 case R_PPC64_ADDR16_HIGHERA34:
6889 case R_PPC64_ADDR16_HIGHEST34:
6890 case R_PPC64_ADDR16_HIGHESTA34:
6891 case R_PPC64_D28:
6892 break;
6893 }
6894
6895 if (local_syms != NULL)
6896 {
6897 unsigned long r_symndx;
6898 bfd *ibfd = sec->owner;
6899
6900 r_symndx = ELF64_R_SYM (r_info);
6901 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6902 return FALSE;
6903 }
6904
6905 if ((h != NULL
6906 && (h->root.type == bfd_link_hash_defweak
6907 || !h->def_regular))
6908 || (h != NULL
6909 && !bfd_link_executable (info)
6910 && !SYMBOLIC_BIND (info, h))
6911 || (bfd_link_pic (info)
6912 && must_be_dyn_reloc (info, r_type))
6913 || (!bfd_link_pic (info)
6914 && (h != NULL
6915 ? h->type == STT_GNU_IFUNC
6916 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
6917 ;
6918 else
6919 return TRUE;
6920
6921 if (h != NULL)
6922 {
6923 struct elf_dyn_relocs *p;
6924 struct elf_dyn_relocs **pp;
6925 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6926
6927 /* elf_gc_sweep may have already removed all dyn relocs associated
6928 with local syms for a given section. Also, symbol flags are
6929 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6930 report a dynreloc miscount. */
6931 if (*pp == NULL && info->gc_sections)
6932 return TRUE;
6933
6934 while ((p = *pp) != NULL)
6935 {
6936 if (p->sec == sec)
6937 {
6938 if (!must_be_dyn_reloc (info, r_type))
6939 p->pc_count -= 1;
6940 p->count -= 1;
6941 if (p->count == 0)
6942 *pp = p->next;
6943 return TRUE;
6944 }
6945 pp = &p->next;
6946 }
6947 }
6948 else
6949 {
6950 struct ppc_dyn_relocs *p;
6951 struct ppc_dyn_relocs **pp;
6952 void *vpp;
6953 bfd_boolean is_ifunc;
6954
6955 if (local_syms == NULL)
6956 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6957 if (sym_sec == NULL)
6958 sym_sec = sec;
6959
6960 vpp = &elf_section_data (sym_sec)->local_dynrel;
6961 pp = (struct ppc_dyn_relocs **) vpp;
6962
6963 if (*pp == NULL && info->gc_sections)
6964 return TRUE;
6965
6966 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6967 while ((p = *pp) != NULL)
6968 {
6969 if (p->sec == sec && p->ifunc == is_ifunc)
6970 {
6971 p->count -= 1;
6972 if (p->count == 0)
6973 *pp = p->next;
6974 return TRUE;
6975 }
6976 pp = &p->next;
6977 }
6978 }
6979
6980 /* xgettext:c-format */
6981 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6982 sec->owner, sec);
6983 bfd_set_error (bfd_error_bad_value);
6984 return FALSE;
6985 }
6986
6987 /* Remove unused Official Procedure Descriptor entries. Currently we
6988 only remove those associated with functions in discarded link-once
6989 sections, or weakly defined functions that have been overridden. It
6990 would be possible to remove many more entries for statically linked
6991 applications. */
6992
6993 bfd_boolean
6994 ppc64_elf_edit_opd (struct bfd_link_info *info)
6995 {
6996 bfd *ibfd;
6997 bfd_boolean some_edited = FALSE;
6998 asection *need_pad = NULL;
6999 struct ppc_link_hash_table *htab;
7000
7001 htab = ppc_hash_table (info);
7002 if (htab == NULL)
7003 return FALSE;
7004
7005 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7006 {
7007 asection *sec;
7008 Elf_Internal_Rela *relstart, *rel, *relend;
7009 Elf_Internal_Shdr *symtab_hdr;
7010 Elf_Internal_Sym *local_syms;
7011 struct _opd_sec_data *opd;
7012 bfd_boolean need_edit, add_aux_fields, broken;
7013 bfd_size_type cnt_16b = 0;
7014
7015 if (!is_ppc64_elf (ibfd))
7016 continue;
7017
7018 sec = bfd_get_section_by_name (ibfd, ".opd");
7019 if (sec == NULL || sec->size == 0)
7020 continue;
7021
7022 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7023 continue;
7024
7025 if (sec->output_section == bfd_abs_section_ptr)
7026 continue;
7027
7028 /* Look through the section relocs. */
7029 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7030 continue;
7031
7032 local_syms = NULL;
7033 symtab_hdr = &elf_symtab_hdr (ibfd);
7034
7035 /* Read the relocations. */
7036 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7037 info->keep_memory);
7038 if (relstart == NULL)
7039 return FALSE;
7040
7041 /* First run through the relocs to check they are sane, and to
7042 determine whether we need to edit this opd section. */
7043 need_edit = FALSE;
7044 broken = FALSE;
7045 need_pad = sec;
7046 relend = relstart + sec->reloc_count;
7047 for (rel = relstart; rel < relend; )
7048 {
7049 enum elf_ppc64_reloc_type r_type;
7050 unsigned long r_symndx;
7051 asection *sym_sec;
7052 struct elf_link_hash_entry *h;
7053 Elf_Internal_Sym *sym;
7054 bfd_vma offset;
7055
7056 /* .opd contains an array of 16 or 24 byte entries. We're
7057 only interested in the reloc pointing to a function entry
7058 point. */
7059 offset = rel->r_offset;
7060 if (rel + 1 == relend
7061 || rel[1].r_offset != offset + 8)
7062 {
7063 /* If someone messes with .opd alignment then after a
7064 "ld -r" we might have padding in the middle of .opd.
7065 Also, there's nothing to prevent someone putting
7066 something silly in .opd with the assembler. No .opd
7067 optimization for them! */
7068 broken_opd:
7069 _bfd_error_handler
7070 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7071 broken = TRUE;
7072 break;
7073 }
7074
7075 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7076 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7077 {
7078 _bfd_error_handler
7079 /* xgettext:c-format */
7080 (_("%pB: unexpected reloc type %u in .opd section"),
7081 ibfd, r_type);
7082 broken = TRUE;
7083 break;
7084 }
7085
7086 r_symndx = ELF64_R_SYM (rel->r_info);
7087 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7088 r_symndx, ibfd))
7089 goto error_ret;
7090
7091 if (sym_sec == NULL || sym_sec->owner == NULL)
7092 {
7093 const char *sym_name;
7094 if (h != NULL)
7095 sym_name = h->root.root.string;
7096 else
7097 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7098 sym_sec);
7099
7100 _bfd_error_handler
7101 /* xgettext:c-format */
7102 (_("%pB: undefined sym `%s' in .opd section"),
7103 ibfd, sym_name);
7104 broken = TRUE;
7105 break;
7106 }
7107
7108 /* opd entries are always for functions defined in the
7109 current input bfd. If the symbol isn't defined in the
7110 input bfd, then we won't be using the function in this
7111 bfd; It must be defined in a linkonce section in another
7112 bfd, or is weak. It's also possible that we are
7113 discarding the function due to a linker script /DISCARD/,
7114 which we test for via the output_section. */
7115 if (sym_sec->owner != ibfd
7116 || sym_sec->output_section == bfd_abs_section_ptr)
7117 need_edit = TRUE;
7118
7119 rel += 2;
7120 if (rel + 1 == relend
7121 || (rel + 2 < relend
7122 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7123 ++rel;
7124
7125 if (rel == relend)
7126 {
7127 if (sec->size == offset + 24)
7128 {
7129 need_pad = NULL;
7130 break;
7131 }
7132 if (sec->size == offset + 16)
7133 {
7134 cnt_16b++;
7135 break;
7136 }
7137 goto broken_opd;
7138 }
7139 else if (rel + 1 < relend
7140 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7141 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7142 {
7143 if (rel[0].r_offset == offset + 16)
7144 cnt_16b++;
7145 else if (rel[0].r_offset != offset + 24)
7146 goto broken_opd;
7147 }
7148 else
7149 goto broken_opd;
7150 }
7151
7152 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7153
7154 if (!broken && (need_edit || add_aux_fields))
7155 {
7156 Elf_Internal_Rela *write_rel;
7157 Elf_Internal_Shdr *rel_hdr;
7158 bfd_byte *rptr, *wptr;
7159 bfd_byte *new_contents;
7160 bfd_size_type amt;
7161
7162 new_contents = NULL;
7163 amt = OPD_NDX (sec->size) * sizeof (long);
7164 opd = &ppc64_elf_section_data (sec)->u.opd;
7165 opd->adjust = bfd_zalloc (sec->owner, amt);
7166 if (opd->adjust == NULL)
7167 return FALSE;
7168
7169 /* This seems a waste of time as input .opd sections are all
7170 zeros as generated by gcc, but I suppose there's no reason
7171 this will always be so. We might start putting something in
7172 the third word of .opd entries. */
7173 if ((sec->flags & SEC_IN_MEMORY) == 0)
7174 {
7175 bfd_byte *loc;
7176 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7177 {
7178 if (loc != NULL)
7179 free (loc);
7180 error_ret:
7181 if (local_syms != NULL
7182 && symtab_hdr->contents != (unsigned char *) local_syms)
7183 free (local_syms);
7184 if (elf_section_data (sec)->relocs != relstart)
7185 free (relstart);
7186 return FALSE;
7187 }
7188 sec->contents = loc;
7189 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7190 }
7191
7192 elf_section_data (sec)->relocs = relstart;
7193
7194 new_contents = sec->contents;
7195 if (add_aux_fields)
7196 {
7197 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7198 if (new_contents == NULL)
7199 return FALSE;
7200 need_pad = NULL;
7201 }
7202 wptr = new_contents;
7203 rptr = sec->contents;
7204 write_rel = relstart;
7205 for (rel = relstart; rel < relend; )
7206 {
7207 unsigned long r_symndx;
7208 asection *sym_sec;
7209 struct elf_link_hash_entry *h;
7210 struct ppc_link_hash_entry *fdh = NULL;
7211 Elf_Internal_Sym *sym;
7212 long opd_ent_size;
7213 Elf_Internal_Rela *next_rel;
7214 bfd_boolean skip;
7215
7216 r_symndx = ELF64_R_SYM (rel->r_info);
7217 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7218 r_symndx, ibfd))
7219 goto error_ret;
7220
7221 next_rel = rel + 2;
7222 if (next_rel + 1 == relend
7223 || (next_rel + 2 < relend
7224 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7225 ++next_rel;
7226
7227 /* See if the .opd entry is full 24 byte or
7228 16 byte (with fd_aux entry overlapped with next
7229 fd_func). */
7230 opd_ent_size = 24;
7231 if (next_rel == relend)
7232 {
7233 if (sec->size == rel->r_offset + 16)
7234 opd_ent_size = 16;
7235 }
7236 else if (next_rel->r_offset == rel->r_offset + 16)
7237 opd_ent_size = 16;
7238
7239 if (h != NULL
7240 && h->root.root.string[0] == '.')
7241 {
7242 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7243 if (fdh != NULL)
7244 {
7245 fdh = ppc_follow_link (fdh);
7246 if (fdh->elf.root.type != bfd_link_hash_defined
7247 && fdh->elf.root.type != bfd_link_hash_defweak)
7248 fdh = NULL;
7249 }
7250 }
7251
7252 skip = (sym_sec->owner != ibfd
7253 || sym_sec->output_section == bfd_abs_section_ptr);
7254 if (skip)
7255 {
7256 if (fdh != NULL && sym_sec->owner == ibfd)
7257 {
7258 /* Arrange for the function descriptor sym
7259 to be dropped. */
7260 fdh->elf.root.u.def.value = 0;
7261 fdh->elf.root.u.def.section = sym_sec;
7262 }
7263 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7264
7265 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7266 rel = next_rel;
7267 else
7268 while (1)
7269 {
7270 if (!dec_dynrel_count (rel->r_info, sec, info,
7271 NULL, h, sym))
7272 goto error_ret;
7273
7274 if (++rel == next_rel)
7275 break;
7276
7277 r_symndx = ELF64_R_SYM (rel->r_info);
7278 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7279 r_symndx, ibfd))
7280 goto error_ret;
7281 }
7282 }
7283 else
7284 {
7285 /* We'll be keeping this opd entry. */
7286 long adjust;
7287
7288 if (fdh != NULL)
7289 {
7290 /* Redefine the function descriptor symbol to
7291 this location in the opd section. It is
7292 necessary to update the value here rather
7293 than using an array of adjustments as we do
7294 for local symbols, because various places
7295 in the generic ELF code use the value
7296 stored in u.def.value. */
7297 fdh->elf.root.u.def.value = wptr - new_contents;
7298 fdh->adjust_done = 1;
7299 }
7300
7301 /* Local syms are a bit tricky. We could
7302 tweak them as they can be cached, but
7303 we'd need to look through the local syms
7304 for the function descriptor sym which we
7305 don't have at the moment. So keep an
7306 array of adjustments. */
7307 adjust = (wptr - new_contents) - (rptr - sec->contents);
7308 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7309
7310 if (wptr != rptr)
7311 memcpy (wptr, rptr, opd_ent_size);
7312 wptr += opd_ent_size;
7313 if (add_aux_fields && opd_ent_size == 16)
7314 {
7315 memset (wptr, '\0', 8);
7316 wptr += 8;
7317 }
7318
7319 /* We need to adjust any reloc offsets to point to the
7320 new opd entries. */
7321 for ( ; rel != next_rel; ++rel)
7322 {
7323 rel->r_offset += adjust;
7324 if (write_rel != rel)
7325 memcpy (write_rel, rel, sizeof (*rel));
7326 ++write_rel;
7327 }
7328 }
7329
7330 rptr += opd_ent_size;
7331 }
7332
7333 sec->size = wptr - new_contents;
7334 sec->reloc_count = write_rel - relstart;
7335 if (add_aux_fields)
7336 {
7337 free (sec->contents);
7338 sec->contents = new_contents;
7339 }
7340
7341 /* Fudge the header size too, as this is used later in
7342 elf_bfd_final_link if we are emitting relocs. */
7343 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7344 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7345 some_edited = TRUE;
7346 }
7347 else if (elf_section_data (sec)->relocs != relstart)
7348 free (relstart);
7349
7350 if (local_syms != NULL
7351 && symtab_hdr->contents != (unsigned char *) local_syms)
7352 {
7353 if (!info->keep_memory)
7354 free (local_syms);
7355 else
7356 symtab_hdr->contents = (unsigned char *) local_syms;
7357 }
7358 }
7359
7360 if (some_edited)
7361 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7362
7363 /* If we are doing a final link and the last .opd entry is just 16 byte
7364 long, add a 8 byte padding after it. */
7365 if (need_pad != NULL && !bfd_link_relocatable (info))
7366 {
7367 bfd_byte *p;
7368
7369 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7370 {
7371 BFD_ASSERT (need_pad->size > 0);
7372
7373 p = bfd_malloc (need_pad->size + 8);
7374 if (p == NULL)
7375 return FALSE;
7376
7377 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7378 p, 0, need_pad->size))
7379 return FALSE;
7380
7381 need_pad->contents = p;
7382 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7383 }
7384 else
7385 {
7386 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7387 if (p == NULL)
7388 return FALSE;
7389
7390 need_pad->contents = p;
7391 }
7392
7393 memset (need_pad->contents + need_pad->size, 0, 8);
7394 need_pad->size += 8;
7395 }
7396
7397 return TRUE;
7398 }
7399
7400 /* Analyze inline PLT call relocations to see whether calls to locally
7401 defined functions can be converted to direct calls. */
7402
7403 bfd_boolean
7404 ppc64_elf_inline_plt (struct bfd_link_info *info)
7405 {
7406 struct ppc_link_hash_table *htab;
7407 bfd *ibfd;
7408 asection *sec;
7409 bfd_vma low_vma, high_vma, limit;
7410
7411 htab = ppc_hash_table (info);
7412 if (htab == NULL)
7413 return FALSE;
7414
7415 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7416 reduced somewhat to cater for possible stubs that might be added
7417 between the call and its destination. */
7418 if (htab->params->group_size < 0)
7419 {
7420 limit = -htab->params->group_size;
7421 if (limit == 1)
7422 limit = 0x1e00000;
7423 }
7424 else
7425 {
7426 limit = htab->params->group_size;
7427 if (limit == 1)
7428 limit = 0x1c00000;
7429 }
7430
7431 low_vma = -1;
7432 high_vma = 0;
7433 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7434 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7435 {
7436 if (low_vma > sec->vma)
7437 low_vma = sec->vma;
7438 if (high_vma < sec->vma + sec->size)
7439 high_vma = sec->vma + sec->size;
7440 }
7441
7442 /* If a "bl" can reach anywhere in local code sections, then we can
7443 convert all inline PLT sequences to direct calls when the symbol
7444 is local. */
7445 if (high_vma - low_vma < limit)
7446 {
7447 htab->can_convert_all_inline_plt = 1;
7448 return TRUE;
7449 }
7450
7451 /* Otherwise, go looking through relocs for cases where a direct
7452 call won't reach. Mark the symbol on any such reloc to disable
7453 the optimization and keep the PLT entry as it seems likely that
7454 this will be better than creating trampolines. Note that this
7455 will disable the optimization for all inline PLT calls to a
7456 particular symbol, not just those that won't reach. The
7457 difficulty in doing a more precise optimization is that the
7458 linker needs to make a decision depending on whether a
7459 particular R_PPC64_PLTCALL insn can be turned into a direct
7460 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7461 the sequence, and there is nothing that ties those relocs
7462 together except their symbol. */
7463
7464 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7465 {
7466 Elf_Internal_Shdr *symtab_hdr;
7467 Elf_Internal_Sym *local_syms;
7468
7469 if (!is_ppc64_elf (ibfd))
7470 continue;
7471
7472 local_syms = NULL;
7473 symtab_hdr = &elf_symtab_hdr (ibfd);
7474
7475 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7476 if (ppc64_elf_section_data (sec)->has_pltcall
7477 && !bfd_is_abs_section (sec->output_section))
7478 {
7479 Elf_Internal_Rela *relstart, *rel, *relend;
7480
7481 /* Read the relocations. */
7482 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7483 info->keep_memory);
7484 if (relstart == NULL)
7485 return FALSE;
7486
7487 relend = relstart + sec->reloc_count;
7488 for (rel = relstart; rel < relend; )
7489 {
7490 enum elf_ppc64_reloc_type r_type;
7491 unsigned long r_symndx;
7492 asection *sym_sec;
7493 struct elf_link_hash_entry *h;
7494 Elf_Internal_Sym *sym;
7495 unsigned char *tls_maskp;
7496
7497 r_type = ELF64_R_TYPE (rel->r_info);
7498 if (r_type != R_PPC64_PLTCALL
7499 && r_type != R_PPC64_PLTCALL_NOTOC)
7500 continue;
7501
7502 r_symndx = ELF64_R_SYM (rel->r_info);
7503 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7504 r_symndx, ibfd))
7505 {
7506 if (elf_section_data (sec)->relocs != relstart)
7507 free (relstart);
7508 if (local_syms != NULL
7509 && symtab_hdr->contents != (bfd_byte *) local_syms)
7510 free (local_syms);
7511 return FALSE;
7512 }
7513
7514 if (sym_sec != NULL && sym_sec->output_section != NULL)
7515 {
7516 bfd_vma from, to;
7517 if (h != NULL)
7518 to = h->root.u.def.value;
7519 else
7520 to = sym->st_value;
7521 to += (rel->r_addend
7522 + sym_sec->output_offset
7523 + sym_sec->output_section->vma);
7524 from = (rel->r_offset
7525 + sec->output_offset
7526 + sec->output_section->vma);
7527 if (to - from + limit < 2 * limit
7528 && !(r_type == R_PPC64_PLTCALL_NOTOC
7529 && (((h ? h->other : sym->st_other)
7530 & STO_PPC64_LOCAL_MASK)
7531 > 1 << STO_PPC64_LOCAL_BIT)))
7532 *tls_maskp &= ~PLT_KEEP;
7533 }
7534 }
7535 if (elf_section_data (sec)->relocs != relstart)
7536 free (relstart);
7537 }
7538
7539 if (local_syms != NULL
7540 && symtab_hdr->contents != (unsigned char *) local_syms)
7541 {
7542 if (!info->keep_memory)
7543 free (local_syms);
7544 else
7545 symtab_hdr->contents = (unsigned char *) local_syms;
7546 }
7547 }
7548
7549 return TRUE;
7550 }
7551
7552 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7553
7554 asection *
7555 ppc64_elf_tls_setup (struct bfd_link_info *info)
7556 {
7557 struct ppc_link_hash_table *htab;
7558
7559 htab = ppc_hash_table (info);
7560 if (htab == NULL)
7561 return NULL;
7562
7563 if (abiversion (info->output_bfd) == 1)
7564 htab->opd_abi = 1;
7565
7566 if (htab->params->no_multi_toc)
7567 htab->do_multi_toc = 0;
7568 else if (!htab->do_multi_toc)
7569 htab->params->no_multi_toc = 1;
7570
7571 /* Default to --no-plt-localentry, as this option can cause problems
7572 with symbol interposition. For example, glibc libpthread.so and
7573 libc.so duplicate many pthread symbols, with a fallback
7574 implementation in libc.so. In some cases the fallback does more
7575 work than the pthread implementation. __pthread_condattr_destroy
7576 is one such symbol: the libpthread.so implementation is
7577 localentry:0 while the libc.so implementation is localentry:8.
7578 An app that "cleverly" uses dlopen to only load necessary
7579 libraries at runtime may omit loading libpthread.so when not
7580 running multi-threaded, which then results in the libc.so
7581 fallback symbols being used and ld.so complaining. Now there
7582 are workarounds in ld (see non_zero_localentry) to detect the
7583 pthread situation, but that may not be the only case where
7584 --plt-localentry can cause trouble. */
7585 if (htab->params->plt_localentry0 < 0)
7586 htab->params->plt_localentry0 = 0;
7587 if (htab->params->plt_localentry0
7588 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7589 FALSE, FALSE, FALSE) == NULL)
7590 _bfd_error_handler
7591 (_("warning: --plt-localentry is especially dangerous without "
7592 "ld.so support to detect ABI violations"));
7593
7594 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7595 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7596 FALSE, FALSE, TRUE));
7597 /* Move dynamic linking info to the function descriptor sym. */
7598 if (htab->tls_get_addr != NULL)
7599 func_desc_adjust (&htab->tls_get_addr->elf, info);
7600 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7601 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7602 FALSE, FALSE, TRUE));
7603 if (htab->params->tls_get_addr_opt)
7604 {
7605 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7606
7607 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7608 FALSE, FALSE, TRUE);
7609 if (opt != NULL)
7610 func_desc_adjust (opt, info);
7611 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7612 FALSE, FALSE, TRUE);
7613 if (opt_fd != NULL
7614 && (opt_fd->root.type == bfd_link_hash_defined
7615 || opt_fd->root.type == bfd_link_hash_defweak))
7616 {
7617 /* If glibc supports an optimized __tls_get_addr call stub,
7618 signalled by the presence of __tls_get_addr_opt, and we'll
7619 be calling __tls_get_addr via a plt call stub, then
7620 make __tls_get_addr point to __tls_get_addr_opt. */
7621 tga_fd = &htab->tls_get_addr_fd->elf;
7622 if (htab->elf.dynamic_sections_created
7623 && tga_fd != NULL
7624 && (tga_fd->type == STT_FUNC
7625 || tga_fd->needs_plt)
7626 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7627 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
7628 {
7629 struct plt_entry *ent;
7630
7631 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7632 if (ent->plt.refcount > 0)
7633 break;
7634 if (ent != NULL)
7635 {
7636 tga_fd->root.type = bfd_link_hash_indirect;
7637 tga_fd->root.u.i.link = &opt_fd->root;
7638 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7639 opt_fd->mark = 1;
7640 if (opt_fd->dynindx != -1)
7641 {
7642 /* Use __tls_get_addr_opt in dynamic relocations. */
7643 opt_fd->dynindx = -1;
7644 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7645 opt_fd->dynstr_index);
7646 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7647 return NULL;
7648 }
7649 htab->tls_get_addr_fd
7650 = (struct ppc_link_hash_entry *) opt_fd;
7651 tga = &htab->tls_get_addr->elf;
7652 if (opt != NULL && tga != NULL)
7653 {
7654 tga->root.type = bfd_link_hash_indirect;
7655 tga->root.u.i.link = &opt->root;
7656 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7657 opt->mark = 1;
7658 _bfd_elf_link_hash_hide_symbol (info, opt,
7659 tga->forced_local);
7660 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7661 }
7662 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7663 htab->tls_get_addr_fd->is_func_descriptor = 1;
7664 if (htab->tls_get_addr != NULL)
7665 {
7666 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7667 htab->tls_get_addr->is_func = 1;
7668 }
7669 }
7670 }
7671 }
7672 else if (htab->params->tls_get_addr_opt < 0)
7673 htab->params->tls_get_addr_opt = 0;
7674 }
7675 return _bfd_elf_tls_setup (info->output_bfd, info);
7676 }
7677
7678 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7679 HASH1 or HASH2. */
7680
7681 static bfd_boolean
7682 branch_reloc_hash_match (const bfd *ibfd,
7683 const Elf_Internal_Rela *rel,
7684 const struct ppc_link_hash_entry *hash1,
7685 const struct ppc_link_hash_entry *hash2)
7686 {
7687 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7688 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7689 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7690
7691 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7692 {
7693 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7694 struct elf_link_hash_entry *h;
7695
7696 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7697 h = elf_follow_link (h);
7698 if (h == &hash1->elf || h == &hash2->elf)
7699 return TRUE;
7700 }
7701 return FALSE;
7702 }
7703
7704 /* Run through all the TLS relocs looking for optimization
7705 opportunities. The linker has been hacked (see ppc64elf.em) to do
7706 a preliminary section layout so that we know the TLS segment
7707 offsets. We can't optimize earlier because some optimizations need
7708 to know the tp offset, and we need to optimize before allocating
7709 dynamic relocations. */
7710
7711 bfd_boolean
7712 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7713 {
7714 bfd *ibfd;
7715 asection *sec;
7716 struct ppc_link_hash_table *htab;
7717 unsigned char *toc_ref;
7718 int pass;
7719
7720 if (!bfd_link_executable (info))
7721 return TRUE;
7722
7723 htab = ppc_hash_table (info);
7724 if (htab == NULL)
7725 return FALSE;
7726
7727 /* Make two passes over the relocs. On the first pass, mark toc
7728 entries involved with tls relocs, and check that tls relocs
7729 involved in setting up a tls_get_addr call are indeed followed by
7730 such a call. If they are not, we can't do any tls optimization.
7731 On the second pass twiddle tls_mask flags to notify
7732 relocate_section that optimization can be done, and adjust got
7733 and plt refcounts. */
7734 toc_ref = NULL;
7735 for (pass = 0; pass < 2; ++pass)
7736 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7737 {
7738 Elf_Internal_Sym *locsyms = NULL;
7739 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7740
7741 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7742 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7743 {
7744 Elf_Internal_Rela *relstart, *rel, *relend;
7745 bfd_boolean found_tls_get_addr_arg = 0;
7746
7747 /* Read the relocations. */
7748 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7749 info->keep_memory);
7750 if (relstart == NULL)
7751 {
7752 free (toc_ref);
7753 return FALSE;
7754 }
7755
7756 relend = relstart + sec->reloc_count;
7757 for (rel = relstart; rel < relend; rel++)
7758 {
7759 enum elf_ppc64_reloc_type r_type;
7760 unsigned long r_symndx;
7761 struct elf_link_hash_entry *h;
7762 Elf_Internal_Sym *sym;
7763 asection *sym_sec;
7764 unsigned char *tls_mask;
7765 unsigned int tls_set, tls_clear, tls_type = 0;
7766 bfd_vma value;
7767 bfd_boolean ok_tprel, is_local;
7768 long toc_ref_index = 0;
7769 int expecting_tls_get_addr = 0;
7770 bfd_boolean ret = FALSE;
7771
7772 r_symndx = ELF64_R_SYM (rel->r_info);
7773 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7774 r_symndx, ibfd))
7775 {
7776 err_free_rel:
7777 if (elf_section_data (sec)->relocs != relstart)
7778 free (relstart);
7779 if (toc_ref != NULL)
7780 free (toc_ref);
7781 if (locsyms != NULL
7782 && (elf_symtab_hdr (ibfd).contents
7783 != (unsigned char *) locsyms))
7784 free (locsyms);
7785 return ret;
7786 }
7787
7788 if (h != NULL)
7789 {
7790 if (h->root.type == bfd_link_hash_defined
7791 || h->root.type == bfd_link_hash_defweak)
7792 value = h->root.u.def.value;
7793 else if (h->root.type == bfd_link_hash_undefweak)
7794 value = 0;
7795 else
7796 {
7797 found_tls_get_addr_arg = 0;
7798 continue;
7799 }
7800 }
7801 else
7802 /* Symbols referenced by TLS relocs must be of type
7803 STT_TLS. So no need for .opd local sym adjust. */
7804 value = sym->st_value;
7805
7806 ok_tprel = FALSE;
7807 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7808 if (is_local)
7809 {
7810 if (h != NULL
7811 && h->root.type == bfd_link_hash_undefweak)
7812 ok_tprel = TRUE;
7813 else if (sym_sec != NULL
7814 && sym_sec->output_section != NULL)
7815 {
7816 value += sym_sec->output_offset;
7817 value += sym_sec->output_section->vma;
7818 value -= htab->elf.tls_sec->vma + TP_OFFSET;
7819 /* Note that even though the prefix insns
7820 allow a 1<<33 offset we use the same test
7821 as for addis;addi. There may be a mix of
7822 pcrel and non-pcrel code and the decision
7823 to optimise is per symbol, not per TLS
7824 sequence. */
7825 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
7826 }
7827 }
7828
7829 r_type = ELF64_R_TYPE (rel->r_info);
7830 /* If this section has old-style __tls_get_addr calls
7831 without marker relocs, then check that each
7832 __tls_get_addr call reloc is preceded by a reloc
7833 that conceivably belongs to the __tls_get_addr arg
7834 setup insn. If we don't find matching arg setup
7835 relocs, don't do any tls optimization. */
7836 if (pass == 0
7837 && sec->nomark_tls_get_addr
7838 && h != NULL
7839 && (h == &htab->tls_get_addr->elf
7840 || h == &htab->tls_get_addr_fd->elf)
7841 && !found_tls_get_addr_arg
7842 && is_branch_reloc (r_type))
7843 {
7844 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
7845 "TLS optimization disabled\n"),
7846 ibfd, sec, rel->r_offset);
7847 ret = TRUE;
7848 goto err_free_rel;
7849 }
7850
7851 found_tls_get_addr_arg = 0;
7852 switch (r_type)
7853 {
7854 case R_PPC64_GOT_TLSLD16:
7855 case R_PPC64_GOT_TLSLD16_LO:
7856 case R_PPC64_GOT_TLSLD34:
7857 expecting_tls_get_addr = 1;
7858 found_tls_get_addr_arg = 1;
7859 /* Fall through. */
7860
7861 case R_PPC64_GOT_TLSLD16_HI:
7862 case R_PPC64_GOT_TLSLD16_HA:
7863 /* These relocs should never be against a symbol
7864 defined in a shared lib. Leave them alone if
7865 that turns out to be the case. */
7866 if (!is_local)
7867 continue;
7868
7869 /* LD -> LE */
7870 tls_set = 0;
7871 tls_clear = TLS_LD;
7872 tls_type = TLS_TLS | TLS_LD;
7873 break;
7874
7875 case R_PPC64_GOT_TLSGD16:
7876 case R_PPC64_GOT_TLSGD16_LO:
7877 case R_PPC64_GOT_TLSGD34:
7878 expecting_tls_get_addr = 1;
7879 found_tls_get_addr_arg = 1;
7880 /* Fall through. */
7881
7882 case R_PPC64_GOT_TLSGD16_HI:
7883 case R_PPC64_GOT_TLSGD16_HA:
7884 if (ok_tprel)
7885 /* GD -> LE */
7886 tls_set = 0;
7887 else
7888 /* GD -> IE */
7889 tls_set = TLS_TLS | TLS_GDIE;
7890 tls_clear = TLS_GD;
7891 tls_type = TLS_TLS | TLS_GD;
7892 break;
7893
7894 case R_PPC64_GOT_TPREL34:
7895 case R_PPC64_GOT_TPREL16_DS:
7896 case R_PPC64_GOT_TPREL16_LO_DS:
7897 case R_PPC64_GOT_TPREL16_HI:
7898 case R_PPC64_GOT_TPREL16_HA:
7899 if (ok_tprel)
7900 {
7901 /* IE -> LE */
7902 tls_set = 0;
7903 tls_clear = TLS_TPREL;
7904 tls_type = TLS_TLS | TLS_TPREL;
7905 break;
7906 }
7907 continue;
7908
7909 case R_PPC64_TLSGD:
7910 case R_PPC64_TLSLD:
7911 if (rel + 1 < relend
7912 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7913 {
7914 if (pass != 0
7915 && (ELF64_R_TYPE (rel[1].r_info)
7916 != R_PPC64_PLTSEQ)
7917 && (ELF64_R_TYPE (rel[1].r_info)
7918 != R_PPC64_PLTSEQ_NOTOC))
7919 {
7920 r_symndx = ELF64_R_SYM (rel[1].r_info);
7921 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
7922 r_symndx, ibfd))
7923 goto err_free_rel;
7924 if (h != NULL)
7925 {
7926 struct plt_entry *ent = NULL;
7927
7928 for (ent = h->plt.plist;
7929 ent != NULL;
7930 ent = ent->next)
7931 if (ent->addend == rel[1].r_addend)
7932 break;
7933
7934 if (ent != NULL
7935 && ent->plt.refcount > 0)
7936 ent->plt.refcount -= 1;
7937 }
7938 }
7939 continue;
7940 }
7941 found_tls_get_addr_arg = 1;
7942 /* Fall through. */
7943
7944 case R_PPC64_TLS:
7945 case R_PPC64_TOC16:
7946 case R_PPC64_TOC16_LO:
7947 if (sym_sec == NULL || sym_sec != toc)
7948 continue;
7949
7950 /* Mark this toc entry as referenced by a TLS
7951 code sequence. We can do that now in the
7952 case of R_PPC64_TLS, and after checking for
7953 tls_get_addr for the TOC16 relocs. */
7954 if (toc_ref == NULL)
7955 toc_ref
7956 = bfd_zmalloc (toc->output_section->rawsize / 8);
7957 if (toc_ref == NULL)
7958 goto err_free_rel;
7959
7960 if (h != NULL)
7961 value = h->root.u.def.value;
7962 else
7963 value = sym->st_value;
7964 value += rel->r_addend;
7965 if (value % 8 != 0)
7966 continue;
7967 BFD_ASSERT (value < toc->size
7968 && toc->output_offset % 8 == 0);
7969 toc_ref_index = (value + toc->output_offset) / 8;
7970 if (r_type == R_PPC64_TLS
7971 || r_type == R_PPC64_TLSGD
7972 || r_type == R_PPC64_TLSLD)
7973 {
7974 toc_ref[toc_ref_index] = 1;
7975 continue;
7976 }
7977
7978 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7979 continue;
7980
7981 tls_set = 0;
7982 tls_clear = 0;
7983 expecting_tls_get_addr = 2;
7984 break;
7985
7986 case R_PPC64_TPREL64:
7987 if (pass == 0
7988 || sec != toc
7989 || toc_ref == NULL
7990 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
7991 continue;
7992 if (ok_tprel)
7993 {
7994 /* IE -> LE */
7995 tls_set = TLS_EXPLICIT;
7996 tls_clear = TLS_TPREL;
7997 break;
7998 }
7999 continue;
8000
8001 case R_PPC64_DTPMOD64:
8002 if (pass == 0
8003 || sec != toc
8004 || toc_ref == NULL
8005 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8006 continue;
8007 if (rel + 1 < relend
8008 && (rel[1].r_info
8009 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8010 && rel[1].r_offset == rel->r_offset + 8)
8011 {
8012 if (ok_tprel)
8013 /* GD -> LE */
8014 tls_set = TLS_EXPLICIT | TLS_GD;
8015 else
8016 /* GD -> IE */
8017 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8018 tls_clear = TLS_GD;
8019 }
8020 else
8021 {
8022 if (!is_local)
8023 continue;
8024
8025 /* LD -> LE */
8026 tls_set = TLS_EXPLICIT;
8027 tls_clear = TLS_LD;
8028 }
8029 break;
8030
8031 default:
8032 continue;
8033 }
8034
8035 if (pass == 0)
8036 {
8037 if (!expecting_tls_get_addr
8038 || !sec->nomark_tls_get_addr)
8039 continue;
8040
8041 if (rel + 1 < relend
8042 && branch_reloc_hash_match (ibfd, rel + 1,
8043 htab->tls_get_addr,
8044 htab->tls_get_addr_fd))
8045 {
8046 if (expecting_tls_get_addr == 2)
8047 {
8048 /* Check for toc tls entries. */
8049 unsigned char *toc_tls;
8050 int retval;
8051
8052 retval = get_tls_mask (&toc_tls, NULL, NULL,
8053 &locsyms,
8054 rel, ibfd);
8055 if (retval == 0)
8056 goto err_free_rel;
8057 if (toc_tls != NULL)
8058 {
8059 if ((*toc_tls & TLS_TLS) != 0
8060 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8061 found_tls_get_addr_arg = 1;
8062 if (retval > 1)
8063 toc_ref[toc_ref_index] = 1;
8064 }
8065 }
8066 continue;
8067 }
8068
8069 /* Uh oh, we didn't find the expected call. We
8070 could just mark this symbol to exclude it
8071 from tls optimization but it's safer to skip
8072 the entire optimization. */
8073 /* xgettext:c-format */
8074 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8075 "TLS optimization disabled\n"),
8076 ibfd, sec, rel->r_offset);
8077 ret = TRUE;
8078 goto err_free_rel;
8079 }
8080
8081 /* If we don't have old-style __tls_get_addr calls
8082 without TLSGD/TLSLD marker relocs, and we haven't
8083 found a new-style __tls_get_addr call with a
8084 marker for this symbol, then we either have a
8085 broken object file or an -mlongcall style
8086 indirect call to __tls_get_addr without a marker.
8087 Disable optimization in this case. */
8088 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8089 && (tls_set & TLS_EXPLICIT) == 0
8090 && !sec->nomark_tls_get_addr
8091 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8092 != (TLS_TLS | TLS_MARK)))
8093 continue;
8094
8095 if (expecting_tls_get_addr)
8096 {
8097 struct plt_entry *ent = NULL;
8098
8099 if (htab->tls_get_addr != NULL)
8100 for (ent = htab->tls_get_addr->elf.plt.plist;
8101 ent != NULL;
8102 ent = ent->next)
8103 if (ent->addend == 0)
8104 break;
8105
8106 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8107 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8108 ent != NULL;
8109 ent = ent->next)
8110 if (ent->addend == 0)
8111 break;
8112
8113 if (ent != NULL
8114 && ent->plt.refcount > 0)
8115 ent->plt.refcount -= 1;
8116 }
8117
8118 if (tls_clear == 0)
8119 continue;
8120
8121 if ((tls_set & TLS_EXPLICIT) == 0)
8122 {
8123 struct got_entry *ent;
8124
8125 /* Adjust got entry for this reloc. */
8126 if (h != NULL)
8127 ent = h->got.glist;
8128 else
8129 ent = elf_local_got_ents (ibfd)[r_symndx];
8130
8131 for (; ent != NULL; ent = ent->next)
8132 if (ent->addend == rel->r_addend
8133 && ent->owner == ibfd
8134 && ent->tls_type == tls_type)
8135 break;
8136 if (ent == NULL)
8137 abort ();
8138
8139 if (tls_set == 0)
8140 {
8141 /* We managed to get rid of a got entry. */
8142 if (ent->got.refcount > 0)
8143 ent->got.refcount -= 1;
8144 }
8145 }
8146 else
8147 {
8148 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8149 we'll lose one or two dyn relocs. */
8150 if (!dec_dynrel_count (rel->r_info, sec, info,
8151 NULL, h, sym))
8152 return FALSE;
8153
8154 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8155 {
8156 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8157 NULL, h, sym))
8158 return FALSE;
8159 }
8160 }
8161
8162 *tls_mask |= tls_set & 0xff;
8163 *tls_mask &= ~tls_clear;
8164 }
8165
8166 if (elf_section_data (sec)->relocs != relstart)
8167 free (relstart);
8168 }
8169
8170 if (locsyms != NULL
8171 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8172 {
8173 if (!info->keep_memory)
8174 free (locsyms);
8175 else
8176 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8177 }
8178 }
8179
8180 if (toc_ref != NULL)
8181 free (toc_ref);
8182 htab->do_tls_opt = 1;
8183 return TRUE;
8184 }
8185
8186 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8187 the values of any global symbols in a toc section that has been
8188 edited. Globals in toc sections should be a rarity, so this function
8189 sets a flag if any are found in toc sections other than the one just
8190 edited, so that further hash table traversals can be avoided. */
8191
8192 struct adjust_toc_info
8193 {
8194 asection *toc;
8195 unsigned long *skip;
8196 bfd_boolean global_toc_syms;
8197 };
8198
8199 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8200
8201 static bfd_boolean
8202 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8203 {
8204 struct ppc_link_hash_entry *eh;
8205 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8206 unsigned long i;
8207
8208 if (h->root.type != bfd_link_hash_defined
8209 && h->root.type != bfd_link_hash_defweak)
8210 return TRUE;
8211
8212 eh = (struct ppc_link_hash_entry *) h;
8213 if (eh->adjust_done)
8214 return TRUE;
8215
8216 if (eh->elf.root.u.def.section == toc_inf->toc)
8217 {
8218 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8219 i = toc_inf->toc->rawsize >> 3;
8220 else
8221 i = eh->elf.root.u.def.value >> 3;
8222
8223 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8224 {
8225 _bfd_error_handler
8226 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8227 do
8228 ++i;
8229 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8230 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8231 }
8232
8233 eh->elf.root.u.def.value -= toc_inf->skip[i];
8234 eh->adjust_done = 1;
8235 }
8236 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8237 toc_inf->global_toc_syms = TRUE;
8238
8239 return TRUE;
8240 }
8241
8242 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8243 on a _LO variety toc/got reloc. */
8244
8245 static bfd_boolean
8246 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8247 {
8248 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8249 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
8250 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8251 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8252 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8253 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8254 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8255 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8256 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8257 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8258 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8259 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8260 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8261 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8262 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8263 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8264 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8265 /* Exclude lfqu by testing reloc. If relocs are ever
8266 defined for the reduced D field in psq_lu then those
8267 will need testing too. */
8268 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8269 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8270 && (insn & 1) == 0)
8271 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8272 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8273 /* Exclude stfqu. psq_stu as above for psq_lu. */
8274 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8275 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8276 && (insn & 1) == 0));
8277 }
8278
8279 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8280 pld ra,symbol@got@pcrel
8281 load/store rt,off(ra)
8282 or
8283 pla ra,symbol@pcrel
8284 load/store rt,off(ra)
8285 may be translated to
8286 pload/pstore rt,symbol+off@pcrel
8287 nop.
8288 This function returns true if the optimization is possible, placing
8289 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8290
8291 On entry to this function, the linker has already determined that
8292 the pld can be replaced with pla: *PINSN1 is that pla insn,
8293 while *PINSN2 is the second instruction. */
8294
8295 static bfd_boolean
8296 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8297 {
8298 uint64_t insn1 = *pinsn1;
8299 uint64_t insn2 = *pinsn2;
8300 bfd_signed_vma off;
8301
8302 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8303 {
8304 /* Check that regs match. */
8305 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8306 return FALSE;
8307
8308 /* P8LS or PMLS form, non-pcrel. */
8309 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8310 return FALSE;
8311
8312 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8313 *pinsn2 = PNOP;
8314 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8315 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8316 return TRUE;
8317 }
8318
8319 insn2 >>= 32;
8320
8321 /* Check that regs match. */
8322 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8323 return FALSE;
8324
8325 switch ((insn2 >> 26) & 63)
8326 {
8327 default:
8328 return FALSE;
8329
8330 case 32: /* lwz */
8331 case 34: /* lbz */
8332 case 36: /* stw */
8333 case 38: /* stb */
8334 case 40: /* lhz */
8335 case 42: /* lha */
8336 case 44: /* sth */
8337 case 48: /* lfs */
8338 case 50: /* lfd */
8339 case 52: /* stfs */
8340 case 54: /* stfd */
8341 /* These are the PMLS cases, where we just need to tack a prefix
8342 on the insn. */
8343 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8344 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8345 off = insn2 & 0xffff;
8346 break;
8347
8348 case 58: /* lwa, ld */
8349 if ((insn2 & 1) != 0)
8350 return FALSE;
8351 insn1 = ((1ULL << 58) | (1ULL << 52)
8352 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8353 | (insn2 & (31ULL << 21)));
8354 off = insn2 & 0xfffc;
8355 break;
8356
8357 case 57: /* lxsd, lxssp */
8358 if ((insn2 & 3) < 2)
8359 return FALSE;
8360 insn1 = ((1ULL << 58) | (1ULL << 52)
8361 | ((40ULL | (insn2 & 3)) << 26)
8362 | (insn2 & (31ULL << 21)));
8363 off = insn2 & 0xfffc;
8364 break;
8365
8366 case 61: /* stxsd, stxssp, lxv, stxv */
8367 if ((insn2 & 3) == 0)
8368 return FALSE;
8369 else if ((insn2 & 3) >= 2)
8370 {
8371 insn1 = ((1ULL << 58) | (1ULL << 52)
8372 | ((44ULL | (insn2 & 3)) << 26)
8373 | (insn2 & (31ULL << 21)));
8374 off = insn2 & 0xfffc;
8375 }
8376 else
8377 {
8378 insn1 = ((1ULL << 58) | (1ULL << 52)
8379 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8380 | (insn2 & (31ULL << 21)));
8381 off = insn2 & 0xfff0;
8382 }
8383 break;
8384
8385 case 56: /* lq */
8386 insn1 = ((1ULL << 58) | (1ULL << 52)
8387 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8388 off = insn2 & 0xffff;
8389 break;
8390
8391 case 62: /* std, stq */
8392 if ((insn2 & 1) != 0)
8393 return FALSE;
8394 insn1 = ((1ULL << 58) | (1ULL << 52)
8395 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8396 | (insn2 & (31ULL << 21)));
8397 off = insn2 & 0xfffc;
8398 break;
8399 }
8400
8401 *pinsn1 = insn1;
8402 *pinsn2 = (uint64_t) NOP << 32;
8403 *poff = (off ^ 0x8000) - 0x8000;
8404 return TRUE;
8405 }
8406
8407 /* Examine all relocs referencing .toc sections in order to remove
8408 unused .toc entries. */
8409
8410 bfd_boolean
8411 ppc64_elf_edit_toc (struct bfd_link_info *info)
8412 {
8413 bfd *ibfd;
8414 struct adjust_toc_info toc_inf;
8415 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8416
8417 htab->do_toc_opt = 1;
8418 toc_inf.global_toc_syms = TRUE;
8419 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8420 {
8421 asection *toc, *sec;
8422 Elf_Internal_Shdr *symtab_hdr;
8423 Elf_Internal_Sym *local_syms;
8424 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8425 unsigned long *skip, *drop;
8426 unsigned char *used;
8427 unsigned char *keep, last, some_unused;
8428
8429 if (!is_ppc64_elf (ibfd))
8430 continue;
8431
8432 toc = bfd_get_section_by_name (ibfd, ".toc");
8433 if (toc == NULL
8434 || toc->size == 0
8435 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8436 || discarded_section (toc))
8437 continue;
8438
8439 toc_relocs = NULL;
8440 local_syms = NULL;
8441 symtab_hdr = &elf_symtab_hdr (ibfd);
8442
8443 /* Look at sections dropped from the final link. */
8444 skip = NULL;
8445 relstart = NULL;
8446 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8447 {
8448 if (sec->reloc_count == 0
8449 || !discarded_section (sec)
8450 || get_opd_info (sec)
8451 || (sec->flags & SEC_ALLOC) == 0
8452 || (sec->flags & SEC_DEBUGGING) != 0)
8453 continue;
8454
8455 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8456 if (relstart == NULL)
8457 goto error_ret;
8458
8459 /* Run through the relocs to see which toc entries might be
8460 unused. */
8461 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8462 {
8463 enum elf_ppc64_reloc_type r_type;
8464 unsigned long r_symndx;
8465 asection *sym_sec;
8466 struct elf_link_hash_entry *h;
8467 Elf_Internal_Sym *sym;
8468 bfd_vma val;
8469
8470 r_type = ELF64_R_TYPE (rel->r_info);
8471 switch (r_type)
8472 {
8473 default:
8474 continue;
8475
8476 case R_PPC64_TOC16:
8477 case R_PPC64_TOC16_LO:
8478 case R_PPC64_TOC16_HI:
8479 case R_PPC64_TOC16_HA:
8480 case R_PPC64_TOC16_DS:
8481 case R_PPC64_TOC16_LO_DS:
8482 break;
8483 }
8484
8485 r_symndx = ELF64_R_SYM (rel->r_info);
8486 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8487 r_symndx, ibfd))
8488 goto error_ret;
8489
8490 if (sym_sec != toc)
8491 continue;
8492
8493 if (h != NULL)
8494 val = h->root.u.def.value;
8495 else
8496 val = sym->st_value;
8497 val += rel->r_addend;
8498
8499 if (val >= toc->size)
8500 continue;
8501
8502 /* Anything in the toc ought to be aligned to 8 bytes.
8503 If not, don't mark as unused. */
8504 if (val & 7)
8505 continue;
8506
8507 if (skip == NULL)
8508 {
8509 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8510 if (skip == NULL)
8511 goto error_ret;
8512 }
8513
8514 skip[val >> 3] = ref_from_discarded;
8515 }
8516
8517 if (elf_section_data (sec)->relocs != relstart)
8518 free (relstart);
8519 }
8520
8521 /* For largetoc loads of address constants, we can convert
8522 . addis rx,2,addr@got@ha
8523 . ld ry,addr@got@l(rx)
8524 to
8525 . addis rx,2,addr@toc@ha
8526 . addi ry,rx,addr@toc@l
8527 when addr is within 2G of the toc pointer. This then means
8528 that the word storing "addr" in the toc is no longer needed. */
8529
8530 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8531 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8532 && toc->reloc_count != 0)
8533 {
8534 /* Read toc relocs. */
8535 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8536 info->keep_memory);
8537 if (toc_relocs == NULL)
8538 goto error_ret;
8539
8540 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8541 {
8542 enum elf_ppc64_reloc_type r_type;
8543 unsigned long r_symndx;
8544 asection *sym_sec;
8545 struct elf_link_hash_entry *h;
8546 Elf_Internal_Sym *sym;
8547 bfd_vma val, addr;
8548
8549 r_type = ELF64_R_TYPE (rel->r_info);
8550 if (r_type != R_PPC64_ADDR64)
8551 continue;
8552
8553 r_symndx = ELF64_R_SYM (rel->r_info);
8554 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8555 r_symndx, ibfd))
8556 goto error_ret;
8557
8558 if (sym_sec == NULL
8559 || sym_sec->output_section == NULL
8560 || discarded_section (sym_sec))
8561 continue;
8562
8563 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8564 continue;
8565
8566 if (h != NULL)
8567 {
8568 if (h->type == STT_GNU_IFUNC)
8569 continue;
8570 val = h->root.u.def.value;
8571 }
8572 else
8573 {
8574 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8575 continue;
8576 val = sym->st_value;
8577 }
8578 val += rel->r_addend;
8579 val += sym_sec->output_section->vma + sym_sec->output_offset;
8580
8581 /* We don't yet know the exact toc pointer value, but we
8582 know it will be somewhere in the toc section. Don't
8583 optimize if the difference from any possible toc
8584 pointer is outside [ff..f80008000, 7fff7fff]. */
8585 addr = toc->output_section->vma + TOC_BASE_OFF;
8586 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8587 continue;
8588
8589 addr = toc->output_section->vma + toc->output_section->rawsize;
8590 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8591 continue;
8592
8593 if (skip == NULL)
8594 {
8595 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8596 if (skip == NULL)
8597 goto error_ret;
8598 }
8599
8600 skip[rel->r_offset >> 3]
8601 |= can_optimize | ((rel - toc_relocs) << 2);
8602 }
8603 }
8604
8605 if (skip == NULL)
8606 continue;
8607
8608 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8609 if (used == NULL)
8610 {
8611 error_ret:
8612 if (local_syms != NULL
8613 && symtab_hdr->contents != (unsigned char *) local_syms)
8614 free (local_syms);
8615 if (sec != NULL
8616 && relstart != NULL
8617 && elf_section_data (sec)->relocs != relstart)
8618 free (relstart);
8619 if (toc_relocs != NULL
8620 && elf_section_data (toc)->relocs != toc_relocs)
8621 free (toc_relocs);
8622 if (skip != NULL)
8623 free (skip);
8624 return FALSE;
8625 }
8626
8627 /* Now check all kept sections that might reference the toc.
8628 Check the toc itself last. */
8629 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8630 : ibfd->sections);
8631 sec != NULL;
8632 sec = (sec == toc ? NULL
8633 : sec->next == NULL ? toc
8634 : sec->next == toc && toc->next ? toc->next
8635 : sec->next))
8636 {
8637 int repeat;
8638
8639 if (sec->reloc_count == 0
8640 || discarded_section (sec)
8641 || get_opd_info (sec)
8642 || (sec->flags & SEC_ALLOC) == 0
8643 || (sec->flags & SEC_DEBUGGING) != 0)
8644 continue;
8645
8646 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8647 info->keep_memory);
8648 if (relstart == NULL)
8649 {
8650 free (used);
8651 goto error_ret;
8652 }
8653
8654 /* Mark toc entries referenced as used. */
8655 do
8656 {
8657 repeat = 0;
8658 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8659 {
8660 enum elf_ppc64_reloc_type r_type;
8661 unsigned long r_symndx;
8662 asection *sym_sec;
8663 struct elf_link_hash_entry *h;
8664 Elf_Internal_Sym *sym;
8665 bfd_vma val;
8666
8667 r_type = ELF64_R_TYPE (rel->r_info);
8668 switch (r_type)
8669 {
8670 case R_PPC64_TOC16:
8671 case R_PPC64_TOC16_LO:
8672 case R_PPC64_TOC16_HI:
8673 case R_PPC64_TOC16_HA:
8674 case R_PPC64_TOC16_DS:
8675 case R_PPC64_TOC16_LO_DS:
8676 /* In case we're taking addresses of toc entries. */
8677 case R_PPC64_ADDR64:
8678 break;
8679
8680 default:
8681 continue;
8682 }
8683
8684 r_symndx = ELF64_R_SYM (rel->r_info);
8685 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8686 r_symndx, ibfd))
8687 {
8688 free (used);
8689 goto error_ret;
8690 }
8691
8692 if (sym_sec != toc)
8693 continue;
8694
8695 if (h != NULL)
8696 val = h->root.u.def.value;
8697 else
8698 val = sym->st_value;
8699 val += rel->r_addend;
8700
8701 if (val >= toc->size)
8702 continue;
8703
8704 if ((skip[val >> 3] & can_optimize) != 0)
8705 {
8706 bfd_vma off;
8707 unsigned char opc;
8708
8709 switch (r_type)
8710 {
8711 case R_PPC64_TOC16_HA:
8712 break;
8713
8714 case R_PPC64_TOC16_LO_DS:
8715 off = rel->r_offset;
8716 off += (bfd_big_endian (ibfd) ? -2 : 3);
8717 if (!bfd_get_section_contents (ibfd, sec, &opc,
8718 off, 1))
8719 {
8720 free (used);
8721 goto error_ret;
8722 }
8723 if ((opc & (0x3f << 2)) == (58u << 2))
8724 break;
8725 /* Fall through. */
8726
8727 default:
8728 /* Wrong sort of reloc, or not a ld. We may
8729 as well clear ref_from_discarded too. */
8730 skip[val >> 3] = 0;
8731 }
8732 }
8733
8734 if (sec != toc)
8735 used[val >> 3] = 1;
8736 /* For the toc section, we only mark as used if this
8737 entry itself isn't unused. */
8738 else if ((used[rel->r_offset >> 3]
8739 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8740 && !used[val >> 3])
8741 {
8742 /* Do all the relocs again, to catch reference
8743 chains. */
8744 repeat = 1;
8745 used[val >> 3] = 1;
8746 }
8747 }
8748 }
8749 while (repeat);
8750
8751 if (elf_section_data (sec)->relocs != relstart)
8752 free (relstart);
8753 }
8754
8755 /* Merge the used and skip arrays. Assume that TOC
8756 doublewords not appearing as either used or unused belong
8757 to an entry more than one doubleword in size. */
8758 for (drop = skip, keep = used, last = 0, some_unused = 0;
8759 drop < skip + (toc->size + 7) / 8;
8760 ++drop, ++keep)
8761 {
8762 if (*keep)
8763 {
8764 *drop &= ~ref_from_discarded;
8765 if ((*drop & can_optimize) != 0)
8766 some_unused = 1;
8767 last = 0;
8768 }
8769 else if ((*drop & ref_from_discarded) != 0)
8770 {
8771 some_unused = 1;
8772 last = ref_from_discarded;
8773 }
8774 else
8775 *drop = last;
8776 }
8777
8778 free (used);
8779
8780 if (some_unused)
8781 {
8782 bfd_byte *contents, *src;
8783 unsigned long off;
8784 Elf_Internal_Sym *sym;
8785 bfd_boolean local_toc_syms = FALSE;
8786
8787 /* Shuffle the toc contents, and at the same time convert the
8788 skip array from booleans into offsets. */
8789 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8790 goto error_ret;
8791
8792 elf_section_data (toc)->this_hdr.contents = contents;
8793
8794 for (src = contents, off = 0, drop = skip;
8795 src < contents + toc->size;
8796 src += 8, ++drop)
8797 {
8798 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8799 off += 8;
8800 else if (off != 0)
8801 {
8802 *drop = off;
8803 memcpy (src - off, src, 8);
8804 }
8805 }
8806 *drop = off;
8807 toc->rawsize = toc->size;
8808 toc->size = src - contents - off;
8809
8810 /* Adjust addends for relocs against the toc section sym,
8811 and optimize any accesses we can. */
8812 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8813 {
8814 if (sec->reloc_count == 0
8815 || discarded_section (sec))
8816 continue;
8817
8818 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8819 info->keep_memory);
8820 if (relstart == NULL)
8821 goto error_ret;
8822
8823 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8824 {
8825 enum elf_ppc64_reloc_type r_type;
8826 unsigned long r_symndx;
8827 asection *sym_sec;
8828 struct elf_link_hash_entry *h;
8829 bfd_vma val;
8830
8831 r_type = ELF64_R_TYPE (rel->r_info);
8832 switch (r_type)
8833 {
8834 default:
8835 continue;
8836
8837 case R_PPC64_TOC16:
8838 case R_PPC64_TOC16_LO:
8839 case R_PPC64_TOC16_HI:
8840 case R_PPC64_TOC16_HA:
8841 case R_PPC64_TOC16_DS:
8842 case R_PPC64_TOC16_LO_DS:
8843 case R_PPC64_ADDR64:
8844 break;
8845 }
8846
8847 r_symndx = ELF64_R_SYM (rel->r_info);
8848 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8849 r_symndx, ibfd))
8850 goto error_ret;
8851
8852 if (sym_sec != toc)
8853 continue;
8854
8855 if (h != NULL)
8856 val = h->root.u.def.value;
8857 else
8858 {
8859 val = sym->st_value;
8860 if (val != 0)
8861 local_toc_syms = TRUE;
8862 }
8863
8864 val += rel->r_addend;
8865
8866 if (val > toc->rawsize)
8867 val = toc->rawsize;
8868 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8869 continue;
8870 else if ((skip[val >> 3] & can_optimize) != 0)
8871 {
8872 Elf_Internal_Rela *tocrel
8873 = toc_relocs + (skip[val >> 3] >> 2);
8874 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8875
8876 switch (r_type)
8877 {
8878 case R_PPC64_TOC16_HA:
8879 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8880 break;
8881
8882 case R_PPC64_TOC16_LO_DS:
8883 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8884 break;
8885
8886 default:
8887 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8888 ppc_howto_init ();
8889 info->callbacks->einfo
8890 /* xgettext:c-format */
8891 (_("%H: %s references "
8892 "optimized away TOC entry\n"),
8893 ibfd, sec, rel->r_offset,
8894 ppc64_elf_howto_table[r_type]->name);
8895 bfd_set_error (bfd_error_bad_value);
8896 goto error_ret;
8897 }
8898 rel->r_addend = tocrel->r_addend;
8899 elf_section_data (sec)->relocs = relstart;
8900 continue;
8901 }
8902
8903 if (h != NULL || sym->st_value != 0)
8904 continue;
8905
8906 rel->r_addend -= skip[val >> 3];
8907 elf_section_data (sec)->relocs = relstart;
8908 }
8909
8910 if (elf_section_data (sec)->relocs != relstart)
8911 free (relstart);
8912 }
8913
8914 /* We shouldn't have local or global symbols defined in the TOC,
8915 but handle them anyway. */
8916 if (local_syms != NULL)
8917 for (sym = local_syms;
8918 sym < local_syms + symtab_hdr->sh_info;
8919 ++sym)
8920 if (sym->st_value != 0
8921 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8922 {
8923 unsigned long i;
8924
8925 if (sym->st_value > toc->rawsize)
8926 i = toc->rawsize >> 3;
8927 else
8928 i = sym->st_value >> 3;
8929
8930 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8931 {
8932 if (local_toc_syms)
8933 _bfd_error_handler
8934 (_("%s defined on removed toc entry"),
8935 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8936 do
8937 ++i;
8938 while ((skip[i] & (ref_from_discarded | can_optimize)));
8939 sym->st_value = (bfd_vma) i << 3;
8940 }
8941
8942 sym->st_value -= skip[i];
8943 symtab_hdr->contents = (unsigned char *) local_syms;
8944 }
8945
8946 /* Adjust any global syms defined in this toc input section. */
8947 if (toc_inf.global_toc_syms)
8948 {
8949 toc_inf.toc = toc;
8950 toc_inf.skip = skip;
8951 toc_inf.global_toc_syms = FALSE;
8952 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8953 &toc_inf);
8954 }
8955
8956 if (toc->reloc_count != 0)
8957 {
8958 Elf_Internal_Shdr *rel_hdr;
8959 Elf_Internal_Rela *wrel;
8960 bfd_size_type sz;
8961
8962 /* Remove unused toc relocs, and adjust those we keep. */
8963 if (toc_relocs == NULL)
8964 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8965 info->keep_memory);
8966 if (toc_relocs == NULL)
8967 goto error_ret;
8968
8969 wrel = toc_relocs;
8970 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8971 if ((skip[rel->r_offset >> 3]
8972 & (ref_from_discarded | can_optimize)) == 0)
8973 {
8974 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8975 wrel->r_info = rel->r_info;
8976 wrel->r_addend = rel->r_addend;
8977 ++wrel;
8978 }
8979 else if (!dec_dynrel_count (rel->r_info, toc, info,
8980 &local_syms, NULL, NULL))
8981 goto error_ret;
8982
8983 elf_section_data (toc)->relocs = toc_relocs;
8984 toc->reloc_count = wrel - toc_relocs;
8985 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8986 sz = rel_hdr->sh_entsize;
8987 rel_hdr->sh_size = toc->reloc_count * sz;
8988 }
8989 }
8990 else if (toc_relocs != NULL
8991 && elf_section_data (toc)->relocs != toc_relocs)
8992 free (toc_relocs);
8993
8994 if (local_syms != NULL
8995 && symtab_hdr->contents != (unsigned char *) local_syms)
8996 {
8997 if (!info->keep_memory)
8998 free (local_syms);
8999 else
9000 symtab_hdr->contents = (unsigned char *) local_syms;
9001 }
9002 free (skip);
9003 }
9004
9005 /* Look for cases where we can change an indirect GOT access to
9006 a GOT relative or PC relative access, possibly reducing the
9007 number of GOT entries. */
9008 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9009 {
9010 asection *sec;
9011 Elf_Internal_Shdr *symtab_hdr;
9012 Elf_Internal_Sym *local_syms;
9013 Elf_Internal_Rela *relstart, *rel;
9014 bfd_vma got;
9015
9016 if (!is_ppc64_elf (ibfd))
9017 continue;
9018
9019 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9020 continue;
9021
9022 sec = ppc64_elf_tdata (ibfd)->got;
9023 got = 0;
9024 if (sec != NULL)
9025 got = sec->output_section->vma + sec->output_offset + 0x8000;
9026
9027 local_syms = NULL;
9028 symtab_hdr = &elf_symtab_hdr (ibfd);
9029
9030 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9031 {
9032 if (sec->reloc_count == 0
9033 || !ppc64_elf_section_data (sec)->has_optrel
9034 || discarded_section (sec))
9035 continue;
9036
9037 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9038 info->keep_memory);
9039 if (relstart == NULL)
9040 {
9041 got_error_ret:
9042 if (local_syms != NULL
9043 && symtab_hdr->contents != (unsigned char *) local_syms)
9044 free (local_syms);
9045 if (sec != NULL
9046 && relstart != NULL
9047 && elf_section_data (sec)->relocs != relstart)
9048 free (relstart);
9049 return FALSE;
9050 }
9051
9052 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9053 {
9054 enum elf_ppc64_reloc_type r_type;
9055 unsigned long r_symndx;
9056 Elf_Internal_Sym *sym;
9057 asection *sym_sec;
9058 struct elf_link_hash_entry *h;
9059 struct got_entry *ent;
9060 bfd_vma val, pc;
9061 unsigned char buf[8];
9062 unsigned int insn;
9063 enum {no_check, check_lo, check_ha} insn_check;
9064
9065 r_type = ELF64_R_TYPE (rel->r_info);
9066 switch (r_type)
9067 {
9068 default:
9069 insn_check = no_check;
9070 break;
9071
9072 case R_PPC64_PLT16_HA:
9073 case R_PPC64_GOT_TLSLD16_HA:
9074 case R_PPC64_GOT_TLSGD16_HA:
9075 case R_PPC64_GOT_TPREL16_HA:
9076 case R_PPC64_GOT_DTPREL16_HA:
9077 case R_PPC64_GOT16_HA:
9078 case R_PPC64_TOC16_HA:
9079 insn_check = check_ha;
9080 break;
9081
9082 case R_PPC64_PLT16_LO:
9083 case R_PPC64_PLT16_LO_DS:
9084 case R_PPC64_GOT_TLSLD16_LO:
9085 case R_PPC64_GOT_TLSGD16_LO:
9086 case R_PPC64_GOT_TPREL16_LO_DS:
9087 case R_PPC64_GOT_DTPREL16_LO_DS:
9088 case R_PPC64_GOT16_LO:
9089 case R_PPC64_GOT16_LO_DS:
9090 case R_PPC64_TOC16_LO:
9091 case R_PPC64_TOC16_LO_DS:
9092 insn_check = check_lo;
9093 break;
9094 }
9095
9096 if (insn_check != no_check)
9097 {
9098 bfd_vma off = rel->r_offset & ~3;
9099
9100 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9101 goto got_error_ret;
9102
9103 insn = bfd_get_32 (ibfd, buf);
9104 if (insn_check == check_lo
9105 ? !ok_lo_toc_insn (insn, r_type)
9106 : ((insn & ((0x3f << 26) | 0x1f << 16))
9107 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9108 {
9109 char str[12];
9110
9111 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9112 sprintf (str, "%#08x", insn);
9113 info->callbacks->einfo
9114 /* xgettext:c-format */
9115 (_("%H: got/toc optimization is not supported for"
9116 " %s instruction\n"),
9117 ibfd, sec, rel->r_offset & ~3, str);
9118 continue;
9119 }
9120 }
9121
9122 switch (r_type)
9123 {
9124 /* Note that we don't delete GOT entries for
9125 R_PPC64_GOT16_DS since we'd need a lot more
9126 analysis. For starters, the preliminary layout is
9127 before the GOT, PLT, dynamic sections and stubs are
9128 laid out. Then we'd need to allow for changes in
9129 distance between sections caused by alignment. */
9130 default:
9131 continue;
9132
9133 case R_PPC64_GOT16_HA:
9134 case R_PPC64_GOT16_LO_DS:
9135 case R_PPC64_GOT_PCREL34:
9136 break;
9137 }
9138
9139 r_symndx = ELF64_R_SYM (rel->r_info);
9140 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9141 r_symndx, ibfd))
9142 goto got_error_ret;
9143
9144 if (sym_sec == NULL
9145 || sym_sec->output_section == NULL
9146 || discarded_section (sym_sec))
9147 continue;
9148
9149 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9150 continue;
9151
9152 if (h != NULL)
9153 val = h->root.u.def.value;
9154 else
9155 val = sym->st_value;
9156 val += rel->r_addend;
9157 val += sym_sec->output_section->vma + sym_sec->output_offset;
9158
9159 /* Fudge factor to allow for the fact that the preliminary layout
9160 isn't exact. Reduce limits by this factor. */
9161 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9162
9163 switch (r_type)
9164 {
9165 default:
9166 continue;
9167
9168 case R_PPC64_GOT16_HA:
9169 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9170 >= LIMIT_ADJUST (0x100000000ULL))
9171 continue;
9172
9173 if (!bfd_get_section_contents (ibfd, sec, buf,
9174 rel->r_offset & ~3, 4))
9175 goto got_error_ret;
9176 insn = bfd_get_32 (ibfd, buf);
9177 if (((insn & ((0x3f << 26) | 0x1f << 16))
9178 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9179 continue;
9180 break;
9181
9182 case R_PPC64_GOT16_LO_DS:
9183 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9184 >= LIMIT_ADJUST (0x100000000ULL))
9185 continue;
9186 if (!bfd_get_section_contents (ibfd, sec, buf,
9187 rel->r_offset & ~3, 4))
9188 goto got_error_ret;
9189 insn = bfd_get_32 (ibfd, buf);
9190 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9191 continue;
9192 break;
9193
9194 case R_PPC64_GOT_PCREL34:
9195 pc = rel->r_offset;
9196 pc += sec->output_section->vma + sec->output_offset;
9197 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9198 >= LIMIT_ADJUST (1ULL << 34))
9199 continue;
9200 if (!bfd_get_section_contents (ibfd, sec, buf,
9201 rel->r_offset & ~3, 8))
9202 goto got_error_ret;
9203 insn = bfd_get_32 (ibfd, buf);
9204 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9205 continue;
9206 insn = bfd_get_32 (ibfd, buf + 4);
9207 if ((insn & (0x3f << 26)) != 57u << 26)
9208 continue;
9209 break;
9210 }
9211 #undef LIMIT_ADJUST
9212
9213 if (h != NULL)
9214 ent = h->got.glist;
9215 else
9216 {
9217 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9218 ent = local_got_ents[r_symndx];
9219 }
9220 for (; ent != NULL; ent = ent->next)
9221 if (ent->addend == rel->r_addend
9222 && ent->owner == ibfd
9223 && ent->tls_type == 0)
9224 break;
9225 BFD_ASSERT (ent && ent->got.refcount > 0);
9226 ent->got.refcount -= 1;
9227 }
9228
9229 if (elf_section_data (sec)->relocs != relstart)
9230 free (relstart);
9231 }
9232
9233 if (local_syms != NULL
9234 && symtab_hdr->contents != (unsigned char *) local_syms)
9235 {
9236 if (!info->keep_memory)
9237 free (local_syms);
9238 else
9239 symtab_hdr->contents = (unsigned char *) local_syms;
9240 }
9241 }
9242
9243 return TRUE;
9244 }
9245
9246 /* Return true iff input section I references the TOC using
9247 instructions limited to +/-32k offsets. */
9248
9249 bfd_boolean
9250 ppc64_elf_has_small_toc_reloc (asection *i)
9251 {
9252 return (is_ppc64_elf (i->owner)
9253 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9254 }
9255
9256 /* Allocate space for one GOT entry. */
9257
9258 static void
9259 allocate_got (struct elf_link_hash_entry *h,
9260 struct bfd_link_info *info,
9261 struct got_entry *gent)
9262 {
9263 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9264 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9265 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9266 ? 16 : 8);
9267 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9268 ? 2 : 1) * sizeof (Elf64_External_Rela);
9269 asection *got = ppc64_elf_tdata (gent->owner)->got;
9270
9271 gent->got.offset = got->size;
9272 got->size += entsize;
9273
9274 if (h->type == STT_GNU_IFUNC)
9275 {
9276 htab->elf.irelplt->size += rentsize;
9277 htab->got_reli_size += rentsize;
9278 }
9279 else if (((bfd_link_pic (info)
9280 && !(gent->tls_type != 0
9281 && bfd_link_executable (info)
9282 && SYMBOL_REFERENCES_LOCAL (info, h)))
9283 || (htab->elf.dynamic_sections_created
9284 && h->dynindx != -1
9285 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9286 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9287 {
9288 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9289 relgot->size += rentsize;
9290 }
9291 }
9292
9293 /* This function merges got entries in the same toc group. */
9294
9295 static void
9296 merge_got_entries (struct got_entry **pent)
9297 {
9298 struct got_entry *ent, *ent2;
9299
9300 for (ent = *pent; ent != NULL; ent = ent->next)
9301 if (!ent->is_indirect)
9302 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9303 if (!ent2->is_indirect
9304 && ent2->addend == ent->addend
9305 && ent2->tls_type == ent->tls_type
9306 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9307 {
9308 ent2->is_indirect = TRUE;
9309 ent2->got.ent = ent;
9310 }
9311 }
9312
9313 /* If H is undefined, make it dynamic if that makes sense. */
9314
9315 static bfd_boolean
9316 ensure_undef_dynamic (struct bfd_link_info *info,
9317 struct elf_link_hash_entry *h)
9318 {
9319 struct elf_link_hash_table *htab = elf_hash_table (info);
9320
9321 if (htab->dynamic_sections_created
9322 && ((info->dynamic_undefined_weak != 0
9323 && h->root.type == bfd_link_hash_undefweak)
9324 || h->root.type == bfd_link_hash_undefined)
9325 && h->dynindx == -1
9326 && !h->forced_local
9327 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9328 return bfd_elf_link_record_dynamic_symbol (info, h);
9329 return TRUE;
9330 }
9331
9332 /* Allocate space in .plt, .got and associated reloc sections for
9333 dynamic relocs. */
9334
9335 static bfd_boolean
9336 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9337 {
9338 struct bfd_link_info *info;
9339 struct ppc_link_hash_table *htab;
9340 asection *s;
9341 struct ppc_link_hash_entry *eh;
9342 struct got_entry **pgent, *gent;
9343
9344 if (h->root.type == bfd_link_hash_indirect)
9345 return TRUE;
9346
9347 info = (struct bfd_link_info *) inf;
9348 htab = ppc_hash_table (info);
9349 if (htab == NULL)
9350 return FALSE;
9351
9352 eh = (struct ppc_link_hash_entry *) h;
9353 /* Run through the TLS GD got entries first if we're changing them
9354 to TPREL. */
9355 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9356 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9357 if (gent->got.refcount > 0
9358 && (gent->tls_type & TLS_GD) != 0)
9359 {
9360 /* This was a GD entry that has been converted to TPREL. If
9361 there happens to be a TPREL entry we can use that one. */
9362 struct got_entry *ent;
9363 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9364 if (ent->got.refcount > 0
9365 && (ent->tls_type & TLS_TPREL) != 0
9366 && ent->addend == gent->addend
9367 && ent->owner == gent->owner)
9368 {
9369 gent->got.refcount = 0;
9370 break;
9371 }
9372
9373 /* If not, then we'll be using our own TPREL entry. */
9374 if (gent->got.refcount != 0)
9375 gent->tls_type = TLS_TLS | TLS_TPREL;
9376 }
9377
9378 /* Remove any list entry that won't generate a word in the GOT before
9379 we call merge_got_entries. Otherwise we risk merging to empty
9380 entries. */
9381 pgent = &h->got.glist;
9382 while ((gent = *pgent) != NULL)
9383 if (gent->got.refcount > 0)
9384 {
9385 if ((gent->tls_type & TLS_LD) != 0
9386 && SYMBOL_REFERENCES_LOCAL (info, h))
9387 {
9388 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9389 *pgent = gent->next;
9390 }
9391 else
9392 pgent = &gent->next;
9393 }
9394 else
9395 *pgent = gent->next;
9396
9397 if (!htab->do_multi_toc)
9398 merge_got_entries (&h->got.glist);
9399
9400 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9401 if (!gent->is_indirect)
9402 {
9403 /* Ensure we catch all the cases where this symbol should
9404 be made dynamic. */
9405 if (!ensure_undef_dynamic (info, h))
9406 return FALSE;
9407
9408 if (!is_ppc64_elf (gent->owner))
9409 abort ();
9410
9411 allocate_got (h, info, gent);
9412 }
9413
9414 /* If no dynamic sections we can't have dynamic relocs, except for
9415 IFUNCs which are handled even in static executables. */
9416 if (!htab->elf.dynamic_sections_created
9417 && h->type != STT_GNU_IFUNC)
9418 eh->dyn_relocs = NULL;
9419
9420 /* Discard relocs on undefined symbols that must be local. */
9421 else if (h->root.type == bfd_link_hash_undefined
9422 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9423 eh->dyn_relocs = NULL;
9424
9425 /* Also discard relocs on undefined weak syms with non-default
9426 visibility, or when dynamic_undefined_weak says so. */
9427 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9428 eh->dyn_relocs = NULL;
9429
9430 if (eh->dyn_relocs != NULL)
9431 {
9432 struct elf_dyn_relocs *p, **pp;
9433
9434 /* In the shared -Bsymbolic case, discard space allocated for
9435 dynamic pc-relative relocs against symbols which turn out to
9436 be defined in regular objects. For the normal shared case,
9437 discard space for relocs that have become local due to symbol
9438 visibility changes. */
9439 if (bfd_link_pic (info))
9440 {
9441 /* Relocs that use pc_count are those that appear on a call
9442 insn, or certain REL relocs (see must_be_dyn_reloc) that
9443 can be generated via assembly. We want calls to
9444 protected symbols to resolve directly to the function
9445 rather than going via the plt. If people want function
9446 pointer comparisons to work as expected then they should
9447 avoid writing weird assembly. */
9448 if (SYMBOL_CALLS_LOCAL (info, h))
9449 {
9450 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9451 {
9452 p->count -= p->pc_count;
9453 p->pc_count = 0;
9454 if (p->count == 0)
9455 *pp = p->next;
9456 else
9457 pp = &p->next;
9458 }
9459 }
9460
9461 if (eh->dyn_relocs != NULL)
9462 {
9463 /* Ensure we catch all the cases where this symbol
9464 should be made dynamic. */
9465 if (!ensure_undef_dynamic (info, h))
9466 return FALSE;
9467 }
9468 }
9469
9470 /* For a fixed position executable, discard space for
9471 relocs against symbols which are not dynamic. */
9472 else if (h->type != STT_GNU_IFUNC)
9473 {
9474 if (h->dynamic_adjusted
9475 && !h->def_regular
9476 && !ELF_COMMON_DEF_P (h))
9477 {
9478 /* Ensure we catch all the cases where this symbol
9479 should be made dynamic. */
9480 if (!ensure_undef_dynamic (info, h))
9481 return FALSE;
9482
9483 /* But if that didn't work out, discard dynamic relocs. */
9484 if (h->dynindx == -1)
9485 eh->dyn_relocs = NULL;
9486 }
9487 else
9488 eh->dyn_relocs = NULL;
9489 }
9490
9491 /* Finally, allocate space. */
9492 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9493 {
9494 asection *sreloc = elf_section_data (p->sec)->sreloc;
9495 if (eh->elf.type == STT_GNU_IFUNC)
9496 sreloc = htab->elf.irelplt;
9497 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9498 }
9499 }
9500
9501 /* We might need a PLT entry when the symbol
9502 a) is dynamic, or
9503 b) is an ifunc, or
9504 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9505 d) has plt16 relocs and we are linking statically. */
9506 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9507 || h->type == STT_GNU_IFUNC
9508 || (h->needs_plt && h->dynamic_adjusted)
9509 || (h->needs_plt
9510 && h->def_regular
9511 && !htab->elf.dynamic_sections_created
9512 && !htab->can_convert_all_inline_plt
9513 && (((struct ppc_link_hash_entry *) h)->tls_mask
9514 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9515 {
9516 struct plt_entry *pent;
9517 bfd_boolean doneone = FALSE;
9518 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9519 if (pent->plt.refcount > 0)
9520 {
9521 if (!htab->elf.dynamic_sections_created
9522 || h->dynindx == -1)
9523 {
9524 if (h->type == STT_GNU_IFUNC)
9525 {
9526 s = htab->elf.iplt;
9527 pent->plt.offset = s->size;
9528 s->size += PLT_ENTRY_SIZE (htab);
9529 s = htab->elf.irelplt;
9530 }
9531 else
9532 {
9533 s = htab->pltlocal;
9534 pent->plt.offset = s->size;
9535 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9536 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9537 }
9538 }
9539 else
9540 {
9541 /* If this is the first .plt entry, make room for the special
9542 first entry. */
9543 s = htab->elf.splt;
9544 if (s->size == 0)
9545 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9546
9547 pent->plt.offset = s->size;
9548
9549 /* Make room for this entry. */
9550 s->size += PLT_ENTRY_SIZE (htab);
9551
9552 /* Make room for the .glink code. */
9553 s = htab->glink;
9554 if (s->size == 0)
9555 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9556 if (htab->opd_abi)
9557 {
9558 /* We need bigger stubs past index 32767. */
9559 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9560 s->size += 4;
9561 s->size += 2*4;
9562 }
9563 else
9564 s->size += 4;
9565
9566 /* We also need to make an entry in the .rela.plt section. */
9567 s = htab->elf.srelplt;
9568 }
9569 if (s != NULL)
9570 s->size += sizeof (Elf64_External_Rela);
9571 doneone = TRUE;
9572 }
9573 else
9574 pent->plt.offset = (bfd_vma) -1;
9575 if (!doneone)
9576 {
9577 h->plt.plist = NULL;
9578 h->needs_plt = 0;
9579 }
9580 }
9581 else
9582 {
9583 h->plt.plist = NULL;
9584 h->needs_plt = 0;
9585 }
9586
9587 return TRUE;
9588 }
9589
9590 #define PPC_LO(v) ((v) & 0xffff)
9591 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9592 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9593 #define D34(v) \
9594 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9595 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9596
9597 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9598 to set up space for global entry stubs. These are put in glink,
9599 after the branch table. */
9600
9601 static bfd_boolean
9602 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9603 {
9604 struct bfd_link_info *info;
9605 struct ppc_link_hash_table *htab;
9606 struct plt_entry *pent;
9607 asection *s, *plt;
9608
9609 if (h->root.type == bfd_link_hash_indirect)
9610 return TRUE;
9611
9612 if (!h->pointer_equality_needed)
9613 return TRUE;
9614
9615 if (h->def_regular)
9616 return TRUE;
9617
9618 info = inf;
9619 htab = ppc_hash_table (info);
9620 if (htab == NULL)
9621 return FALSE;
9622
9623 s = htab->global_entry;
9624 plt = htab->elf.splt;
9625 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9626 if (pent->plt.offset != (bfd_vma) -1
9627 && pent->addend == 0)
9628 {
9629 /* For ELFv2, if this symbol is not defined in a regular file
9630 and we are not generating a shared library or pie, then we
9631 need to define the symbol in the executable on a call stub.
9632 This is to avoid text relocations. */
9633 bfd_vma off, stub_align, stub_off, stub_size;
9634 unsigned int align_power;
9635
9636 stub_size = 16;
9637 stub_off = s->size;
9638 if (htab->params->plt_stub_align >= 0)
9639 align_power = htab->params->plt_stub_align;
9640 else
9641 align_power = -htab->params->plt_stub_align;
9642 /* Setting section alignment is delayed until we know it is
9643 non-empty. Otherwise the .text output section will be
9644 aligned at least to plt_stub_align even when no global
9645 entry stubs are needed. */
9646 if (s->alignment_power < align_power)
9647 s->alignment_power = align_power;
9648 stub_align = (bfd_vma) 1 << align_power;
9649 if (htab->params->plt_stub_align >= 0
9650 || ((((stub_off + stub_size - 1) & -stub_align)
9651 - (stub_off & -stub_align))
9652 > ((stub_size - 1) & -stub_align)))
9653 stub_off = (stub_off + stub_align - 1) & -stub_align;
9654 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9655 off -= stub_off + s->output_offset + s->output_section->vma;
9656 /* Note that for --plt-stub-align negative we have a possible
9657 dependency between stub offset and size. Break that
9658 dependency by assuming the max stub size when calculating
9659 the stub offset. */
9660 if (PPC_HA (off) == 0)
9661 stub_size -= 4;
9662 h->root.type = bfd_link_hash_defined;
9663 h->root.u.def.section = s;
9664 h->root.u.def.value = stub_off;
9665 s->size = stub_off + stub_size;
9666 break;
9667 }
9668 return TRUE;
9669 }
9670
9671 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9672 read-only sections. */
9673
9674 static bfd_boolean
9675 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
9676 {
9677 asection *sec;
9678
9679 if (h->root.type == bfd_link_hash_indirect)
9680 return TRUE;
9681
9682 sec = readonly_dynrelocs (h);
9683 if (sec != NULL)
9684 {
9685 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9686
9687 info->flags |= DF_TEXTREL;
9688 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9689 " in read-only section `%pA'\n"),
9690 sec->owner, h->root.root.string, sec);
9691
9692 /* Not an error, just cut short the traversal. */
9693 return FALSE;
9694 }
9695 return TRUE;
9696 }
9697
9698 /* Set the sizes of the dynamic sections. */
9699
9700 static bfd_boolean
9701 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9702 struct bfd_link_info *info)
9703 {
9704 struct ppc_link_hash_table *htab;
9705 bfd *dynobj;
9706 asection *s;
9707 bfd_boolean relocs;
9708 bfd *ibfd;
9709 struct got_entry *first_tlsld;
9710
9711 htab = ppc_hash_table (info);
9712 if (htab == NULL)
9713 return FALSE;
9714
9715 dynobj = htab->elf.dynobj;
9716 if (dynobj == NULL)
9717 abort ();
9718
9719 if (htab->elf.dynamic_sections_created)
9720 {
9721 /* Set the contents of the .interp section to the interpreter. */
9722 if (bfd_link_executable (info) && !info->nointerp)
9723 {
9724 s = bfd_get_linker_section (dynobj, ".interp");
9725 if (s == NULL)
9726 abort ();
9727 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9728 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9729 }
9730 }
9731
9732 /* Set up .got offsets for local syms, and space for local dynamic
9733 relocs. */
9734 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9735 {
9736 struct got_entry **lgot_ents;
9737 struct got_entry **end_lgot_ents;
9738 struct plt_entry **local_plt;
9739 struct plt_entry **end_local_plt;
9740 unsigned char *lgot_masks;
9741 bfd_size_type locsymcount;
9742 Elf_Internal_Shdr *symtab_hdr;
9743
9744 if (!is_ppc64_elf (ibfd))
9745 continue;
9746
9747 for (s = ibfd->sections; s != NULL; s = s->next)
9748 {
9749 struct ppc_dyn_relocs *p;
9750
9751 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9752 {
9753 if (!bfd_is_abs_section (p->sec)
9754 && bfd_is_abs_section (p->sec->output_section))
9755 {
9756 /* Input section has been discarded, either because
9757 it is a copy of a linkonce section or due to
9758 linker script /DISCARD/, so we'll be discarding
9759 the relocs too. */
9760 }
9761 else if (p->count != 0)
9762 {
9763 asection *srel = elf_section_data (p->sec)->sreloc;
9764 if (p->ifunc)
9765 srel = htab->elf.irelplt;
9766 srel->size += p->count * sizeof (Elf64_External_Rela);
9767 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9768 info->flags |= DF_TEXTREL;
9769 }
9770 }
9771 }
9772
9773 lgot_ents = elf_local_got_ents (ibfd);
9774 if (!lgot_ents)
9775 continue;
9776
9777 symtab_hdr = &elf_symtab_hdr (ibfd);
9778 locsymcount = symtab_hdr->sh_info;
9779 end_lgot_ents = lgot_ents + locsymcount;
9780 local_plt = (struct plt_entry **) end_lgot_ents;
9781 end_local_plt = local_plt + locsymcount;
9782 lgot_masks = (unsigned char *) end_local_plt;
9783 s = ppc64_elf_tdata (ibfd)->got;
9784 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9785 {
9786 struct got_entry **pent, *ent;
9787
9788 pent = lgot_ents;
9789 while ((ent = *pent) != NULL)
9790 if (ent->got.refcount > 0)
9791 {
9792 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9793 {
9794 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9795 *pent = ent->next;
9796 }
9797 else
9798 {
9799 unsigned int ent_size = 8;
9800 unsigned int rel_size = sizeof (Elf64_External_Rela);
9801
9802 ent->got.offset = s->size;
9803 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9804 {
9805 ent_size *= 2;
9806 rel_size *= 2;
9807 }
9808 s->size += ent_size;
9809 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9810 {
9811 htab->elf.irelplt->size += rel_size;
9812 htab->got_reli_size += rel_size;
9813 }
9814 else if (bfd_link_dll (info))
9815 {
9816 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9817 srel->size += rel_size;
9818 }
9819 pent = &ent->next;
9820 }
9821 }
9822 else
9823 *pent = ent->next;
9824 }
9825
9826 /* Allocate space for plt calls to local syms. */
9827 lgot_masks = (unsigned char *) end_local_plt;
9828 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
9829 {
9830 struct plt_entry *ent;
9831
9832 for (ent = *local_plt; ent != NULL; ent = ent->next)
9833 if (ent->plt.refcount > 0)
9834 {
9835 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9836 {
9837 s = htab->elf.iplt;
9838 ent->plt.offset = s->size;
9839 s->size += PLT_ENTRY_SIZE (htab);
9840 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9841 }
9842 else if (htab->can_convert_all_inline_plt
9843 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
9844 ent->plt.offset = (bfd_vma) -1;
9845 else
9846 {
9847 s = htab->pltlocal;
9848 ent->plt.offset = s->size;
9849 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9850 if (bfd_link_pic (info))
9851 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9852 }
9853 }
9854 else
9855 ent->plt.offset = (bfd_vma) -1;
9856 }
9857 }
9858
9859 /* Allocate global sym .plt and .got entries, and space for global
9860 sym dynamic relocs. */
9861 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
9862
9863 if (!htab->opd_abi && !bfd_link_pic (info))
9864 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
9865
9866 first_tlsld = NULL;
9867 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9868 {
9869 struct got_entry *ent;
9870
9871 if (!is_ppc64_elf (ibfd))
9872 continue;
9873
9874 ent = ppc64_tlsld_got (ibfd);
9875 if (ent->got.refcount > 0)
9876 {
9877 if (!htab->do_multi_toc && first_tlsld != NULL)
9878 {
9879 ent->is_indirect = TRUE;
9880 ent->got.ent = first_tlsld;
9881 }
9882 else
9883 {
9884 if (first_tlsld == NULL)
9885 first_tlsld = ent;
9886 s = ppc64_elf_tdata (ibfd)->got;
9887 ent->got.offset = s->size;
9888 ent->owner = ibfd;
9889 s->size += 16;
9890 if (bfd_link_dll (info))
9891 {
9892 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9893 srel->size += sizeof (Elf64_External_Rela);
9894 }
9895 }
9896 }
9897 else
9898 ent->got.offset = (bfd_vma) -1;
9899 }
9900
9901 /* We now have determined the sizes of the various dynamic sections.
9902 Allocate memory for them. */
9903 relocs = FALSE;
9904 for (s = dynobj->sections; s != NULL; s = s->next)
9905 {
9906 if ((s->flags & SEC_LINKER_CREATED) == 0)
9907 continue;
9908
9909 if (s == htab->brlt || s == htab->relbrlt)
9910 /* These haven't been allocated yet; don't strip. */
9911 continue;
9912 else if (s == htab->elf.sgot
9913 || s == htab->elf.splt
9914 || s == htab->elf.iplt
9915 || s == htab->pltlocal
9916 || s == htab->glink
9917 || s == htab->global_entry
9918 || s == htab->elf.sdynbss
9919 || s == htab->elf.sdynrelro)
9920 {
9921 /* Strip this section if we don't need it; see the
9922 comment below. */
9923 }
9924 else if (s == htab->glink_eh_frame)
9925 {
9926 if (!bfd_is_abs_section (s->output_section))
9927 /* Not sized yet. */
9928 continue;
9929 }
9930 else if (CONST_STRNEQ (s->name, ".rela"))
9931 {
9932 if (s->size != 0)
9933 {
9934 if (s != htab->elf.srelplt)
9935 relocs = TRUE;
9936
9937 /* We use the reloc_count field as a counter if we need
9938 to copy relocs into the output file. */
9939 s->reloc_count = 0;
9940 }
9941 }
9942 else
9943 {
9944 /* It's not one of our sections, so don't allocate space. */
9945 continue;
9946 }
9947
9948 if (s->size == 0)
9949 {
9950 /* If we don't need this section, strip it from the
9951 output file. This is mostly to handle .rela.bss and
9952 .rela.plt. We must create both sections in
9953 create_dynamic_sections, because they must be created
9954 before the linker maps input sections to output
9955 sections. The linker does that before
9956 adjust_dynamic_symbol is called, and it is that
9957 function which decides whether anything needs to go
9958 into these sections. */
9959 s->flags |= SEC_EXCLUDE;
9960 continue;
9961 }
9962
9963 if (bfd_is_abs_section (s->output_section))
9964 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9965 s->name);
9966
9967 if ((s->flags & SEC_HAS_CONTENTS) == 0)
9968 continue;
9969
9970 /* Allocate memory for the section contents. We use bfd_zalloc
9971 here in case unused entries are not reclaimed before the
9972 section's contents are written out. This should not happen,
9973 but this way if it does we get a R_PPC64_NONE reloc in .rela
9974 sections instead of garbage.
9975 We also rely on the section contents being zero when writing
9976 the GOT and .dynrelro. */
9977 s->contents = bfd_zalloc (dynobj, s->size);
9978 if (s->contents == NULL)
9979 return FALSE;
9980 }
9981
9982 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9983 {
9984 if (!is_ppc64_elf (ibfd))
9985 continue;
9986
9987 s = ppc64_elf_tdata (ibfd)->got;
9988 if (s != NULL && s != htab->elf.sgot)
9989 {
9990 if (s->size == 0)
9991 s->flags |= SEC_EXCLUDE;
9992 else
9993 {
9994 s->contents = bfd_zalloc (ibfd, s->size);
9995 if (s->contents == NULL)
9996 return FALSE;
9997 }
9998 }
9999 s = ppc64_elf_tdata (ibfd)->relgot;
10000 if (s != NULL)
10001 {
10002 if (s->size == 0)
10003 s->flags |= SEC_EXCLUDE;
10004 else
10005 {
10006 s->contents = bfd_zalloc (ibfd, s->size);
10007 if (s->contents == NULL)
10008 return FALSE;
10009 relocs = TRUE;
10010 s->reloc_count = 0;
10011 }
10012 }
10013 }
10014
10015 if (htab->elf.dynamic_sections_created)
10016 {
10017 bfd_boolean tls_opt;
10018
10019 /* Add some entries to the .dynamic section. We fill in the
10020 values later, in ppc64_elf_finish_dynamic_sections, but we
10021 must add the entries now so that we get the correct size for
10022 the .dynamic section. The DT_DEBUG entry is filled in by the
10023 dynamic linker and used by the debugger. */
10024 #define add_dynamic_entry(TAG, VAL) \
10025 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10026
10027 if (bfd_link_executable (info))
10028 {
10029 if (!add_dynamic_entry (DT_DEBUG, 0))
10030 return FALSE;
10031 }
10032
10033 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10034 {
10035 if (!add_dynamic_entry (DT_PLTGOT, 0)
10036 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10037 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10038 || !add_dynamic_entry (DT_JMPREL, 0)
10039 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10040 return FALSE;
10041 }
10042
10043 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10044 {
10045 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10046 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10047 return FALSE;
10048 }
10049
10050 tls_opt = (htab->params->tls_get_addr_opt
10051 && htab->tls_get_addr_fd != NULL
10052 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10053 if (tls_opt || !htab->opd_abi)
10054 {
10055 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10056 return FALSE;
10057 }
10058
10059 if (relocs)
10060 {
10061 if (!add_dynamic_entry (DT_RELA, 0)
10062 || !add_dynamic_entry (DT_RELASZ, 0)
10063 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10064 return FALSE;
10065
10066 /* If any dynamic relocs apply to a read-only section,
10067 then we need a DT_TEXTREL entry. */
10068 if ((info->flags & DF_TEXTREL) == 0)
10069 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10070
10071 if ((info->flags & DF_TEXTREL) != 0)
10072 {
10073 if (!add_dynamic_entry (DT_TEXTREL, 0))
10074 return FALSE;
10075 }
10076 }
10077 }
10078 #undef add_dynamic_entry
10079
10080 return TRUE;
10081 }
10082
10083 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10084
10085 static bfd_boolean
10086 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10087 {
10088 if (h->plt.plist != NULL
10089 && !h->def_regular
10090 && !h->pointer_equality_needed)
10091 return FALSE;
10092
10093 return _bfd_elf_hash_symbol (h);
10094 }
10095
10096 /* Determine the type of stub needed, if any, for a call. */
10097
10098 static inline enum ppc_stub_type
10099 ppc_type_of_stub (asection *input_sec,
10100 const Elf_Internal_Rela *rel,
10101 struct ppc_link_hash_entry **hash,
10102 struct plt_entry **plt_ent,
10103 bfd_vma destination,
10104 unsigned long local_off)
10105 {
10106 struct ppc_link_hash_entry *h = *hash;
10107 bfd_vma location;
10108 bfd_vma branch_offset;
10109 bfd_vma max_branch_offset;
10110 enum elf_ppc64_reloc_type r_type;
10111
10112 if (h != NULL)
10113 {
10114 struct plt_entry *ent;
10115 struct ppc_link_hash_entry *fdh = h;
10116 if (h->oh != NULL
10117 && h->oh->is_func_descriptor)
10118 {
10119 fdh = ppc_follow_link (h->oh);
10120 *hash = fdh;
10121 }
10122
10123 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10124 if (ent->addend == rel->r_addend
10125 && ent->plt.offset != (bfd_vma) -1)
10126 {
10127 *plt_ent = ent;
10128 return ppc_stub_plt_call;
10129 }
10130
10131 /* Here, we know we don't have a plt entry. If we don't have a
10132 either a defined function descriptor or a defined entry symbol
10133 in a regular object file, then it is pointless trying to make
10134 any other type of stub. */
10135 if (!is_static_defined (&fdh->elf)
10136 && !is_static_defined (&h->elf))
10137 return ppc_stub_none;
10138 }
10139 else if (elf_local_got_ents (input_sec->owner) != NULL)
10140 {
10141 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10142 struct plt_entry **local_plt = (struct plt_entry **)
10143 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10144 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10145
10146 if (local_plt[r_symndx] != NULL)
10147 {
10148 struct plt_entry *ent;
10149
10150 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10151 if (ent->addend == rel->r_addend
10152 && ent->plt.offset != (bfd_vma) -1)
10153 {
10154 *plt_ent = ent;
10155 return ppc_stub_plt_call;
10156 }
10157 }
10158 }
10159
10160 /* Determine where the call point is. */
10161 location = (input_sec->output_offset
10162 + input_sec->output_section->vma
10163 + rel->r_offset);
10164
10165 branch_offset = destination - location;
10166 r_type = ELF64_R_TYPE (rel->r_info);
10167
10168 /* Determine if a long branch stub is needed. */
10169 max_branch_offset = 1 << 25;
10170 if (r_type == R_PPC64_REL14
10171 || r_type == R_PPC64_REL14_BRTAKEN
10172 || r_type == R_PPC64_REL14_BRNTAKEN)
10173 max_branch_offset = 1 << 15;
10174
10175 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10176 /* We need a stub. Figure out whether a long_branch or plt_branch
10177 is needed later. */
10178 return ppc_stub_long_branch;
10179
10180 return ppc_stub_none;
10181 }
10182
10183 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10184 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10185 . mflr %r12
10186 . bcl 20,31,1f
10187 .1: mflr %r11
10188 . mtlr %r12
10189 . lis %r12,xxx-1b@highest
10190 . ori %r12,%r12,xxx-1b@higher
10191 . sldi %r12,%r12,32
10192 . oris %r12,%r12,xxx-1b@high
10193 . ori %r12,%r12,xxx-1b@l
10194 . add/ldx %r12,%r11,%r12 */
10195
10196 static bfd_byte *
10197 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10198 {
10199 bfd_put_32 (abfd, MFLR_R12, p);
10200 p += 4;
10201 bfd_put_32 (abfd, BCL_20_31, p);
10202 p += 4;
10203 bfd_put_32 (abfd, MFLR_R11, p);
10204 p += 4;
10205 bfd_put_32 (abfd, MTLR_R12, p);
10206 p += 4;
10207 if (off + 0x8000 < 0x10000)
10208 {
10209 if (load)
10210 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10211 else
10212 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10213 p += 4;
10214 }
10215 else if (off + 0x80008000ULL < 0x100000000ULL)
10216 {
10217 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10218 p += 4;
10219 if (load)
10220 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10221 else
10222 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10223 p += 4;
10224 }
10225 else
10226 {
10227 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10228 {
10229 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10230 p += 4;
10231 }
10232 else
10233 {
10234 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10235 p += 4;
10236 if (((off >> 32) & 0xffff) != 0)
10237 {
10238 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10239 p += 4;
10240 }
10241 }
10242 if (((off >> 32) & 0xffffffffULL) != 0)
10243 {
10244 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10245 p += 4;
10246 }
10247 if (PPC_HI (off) != 0)
10248 {
10249 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10250 p += 4;
10251 }
10252 if (PPC_LO (off) != 0)
10253 {
10254 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10255 p += 4;
10256 }
10257 if (load)
10258 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10259 else
10260 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10261 p += 4;
10262 }
10263 return p;
10264 }
10265
10266 static unsigned int
10267 size_offset (bfd_vma off)
10268 {
10269 unsigned int size;
10270 if (off + 0x8000 < 0x10000)
10271 size = 4;
10272 else if (off + 0x80008000ULL < 0x100000000ULL)
10273 size = 8;
10274 else
10275 {
10276 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10277 size = 4;
10278 else
10279 {
10280 size = 4;
10281 if (((off >> 32) & 0xffff) != 0)
10282 size += 4;
10283 }
10284 if (((off >> 32) & 0xffffffffULL) != 0)
10285 size += 4;
10286 if (PPC_HI (off) != 0)
10287 size += 4;
10288 if (PPC_LO (off) != 0)
10289 size += 4;
10290 size += 4;
10291 }
10292 return size + 16;
10293 }
10294
10295 static unsigned int
10296 num_relocs_for_offset (bfd_vma off)
10297 {
10298 unsigned int num_rel;
10299 if (off + 0x8000 < 0x10000)
10300 num_rel = 1;
10301 else if (off + 0x80008000ULL < 0x100000000ULL)
10302 num_rel = 2;
10303 else
10304 {
10305 num_rel = 1;
10306 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10307 && ((off >> 32) & 0xffff) != 0)
10308 num_rel += 1;
10309 if (PPC_HI (off) != 0)
10310 num_rel += 1;
10311 if (PPC_LO (off) != 0)
10312 num_rel += 1;
10313 }
10314 return num_rel;
10315 }
10316
10317 static Elf_Internal_Rela *
10318 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10319 bfd_vma roff, bfd_vma targ, bfd_vma off)
10320 {
10321 bfd_vma relative_targ = targ - (roff - 8);
10322 if (bfd_big_endian (info->output_bfd))
10323 roff += 2;
10324 r->r_offset = roff;
10325 r->r_addend = relative_targ + roff;
10326 if (off + 0x8000 < 0x10000)
10327 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10328 else if (off + 0x80008000ULL < 0x100000000ULL)
10329 {
10330 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10331 ++r;
10332 roff += 4;
10333 r->r_offset = roff;
10334 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10335 r->r_addend = relative_targ + roff;
10336 }
10337 else
10338 {
10339 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10340 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10341 else
10342 {
10343 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10344 if (((off >> 32) & 0xffff) != 0)
10345 {
10346 ++r;
10347 roff += 4;
10348 r->r_offset = roff;
10349 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10350 r->r_addend = relative_targ + roff;
10351 }
10352 }
10353 if (((off >> 32) & 0xffffffffULL) != 0)
10354 roff += 4;
10355 if (PPC_HI (off) != 0)
10356 {
10357 ++r;
10358 roff += 4;
10359 r->r_offset = roff;
10360 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10361 r->r_addend = relative_targ + roff;
10362 }
10363 if (PPC_LO (off) != 0)
10364 {
10365 ++r;
10366 roff += 4;
10367 r->r_offset = roff;
10368 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10369 r->r_addend = relative_targ + roff;
10370 }
10371 }
10372 return r;
10373 }
10374
10375 static bfd_byte *
10376 build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10377 bfd_boolean load)
10378 {
10379 uint64_t insn;
10380 if (off - odd + (1ULL << 33) < 1ULL << 34)
10381 {
10382 off -= odd;
10383 if (odd)
10384 {
10385 bfd_put_32 (abfd, NOP, p);
10386 p += 4;
10387 }
10388 if (load)
10389 insn = PLD_R12_PC;
10390 else
10391 insn = PADDI_R12_PC;
10392 insn |= D34 (off);
10393 bfd_put_32 (abfd, insn >> 32, p);
10394 p += 4;
10395 bfd_put_32 (abfd, insn, p);
10396 }
10397 /* The minimum value for paddi is -0x200000000. The minimum value
10398 for li is -0x8000, which when shifted by 34 and added gives a
10399 minimum value of -0x2000200000000. The maximum value is
10400 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10401 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10402 {
10403 off -= 8 - odd;
10404 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10405 p += 4;
10406 if (!odd)
10407 {
10408 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10409 p += 4;
10410 }
10411 insn = PADDI_R12_PC | D34 (off);
10412 bfd_put_32 (abfd, insn >> 32, p);
10413 p += 4;
10414 bfd_put_32 (abfd, insn, p);
10415 p += 4;
10416 if (odd)
10417 {
10418 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10419 p += 4;
10420 }
10421 if (load)
10422 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10423 else
10424 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10425 }
10426 else
10427 {
10428 off -= odd + 8;
10429 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10430 p += 4;
10431 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10432 p += 4;
10433 if (odd)
10434 {
10435 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10436 p += 4;
10437 }
10438 insn = PADDI_R12_PC | D34 (off);
10439 bfd_put_32 (abfd, insn >> 32, p);
10440 p += 4;
10441 bfd_put_32 (abfd, insn, p);
10442 p += 4;
10443 if (!odd)
10444 {
10445 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10446 p += 4;
10447 }
10448 if (load)
10449 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10450 else
10451 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10452 }
10453 p += 4;
10454 return p;
10455 }
10456
10457 static unsigned int
10458 size_powerxx_offset (bfd_vma off, int odd)
10459 {
10460 if (off - odd + (1ULL << 33) < 1ULL << 34)
10461 return odd + 8;
10462 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10463 return 20;
10464 else
10465 return 24;
10466 }
10467
10468 static unsigned int
10469 num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10470 {
10471 if (off - odd + (1ULL << 33) < 1ULL << 34)
10472 return 1;
10473 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10474 return 2;
10475 else
10476 return 3;
10477 }
10478
10479 static Elf_Internal_Rela *
10480 emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10481 Elf_Internal_Rela *r, bfd_vma roff,
10482 bfd_vma targ, bfd_vma off, int odd)
10483 {
10484 if (off - odd + (1ULL << 33) < 1ULL << 34)
10485 roff += odd;
10486 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10487 {
10488 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10489 r->r_offset = roff + d_offset;
10490 r->r_addend = targ + 8 - odd - d_offset;
10491 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10492 ++r;
10493 roff += 8 - odd;
10494 }
10495 else
10496 {
10497 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10498 r->r_offset = roff + d_offset;
10499 r->r_addend = targ + 8 + odd - d_offset;
10500 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10501 ++r;
10502 roff += 4;
10503 r->r_offset = roff + d_offset;
10504 r->r_addend = targ + 4 + odd - d_offset;
10505 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10506 ++r;
10507 roff += 4 + odd;
10508 }
10509 r->r_offset = roff;
10510 r->r_addend = targ;
10511 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10512 return r;
10513 }
10514
10515 /* Emit .eh_frame opcode to advance pc by DELTA. */
10516
10517 static bfd_byte *
10518 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10519 {
10520 delta /= 4;
10521 if (delta < 64)
10522 *eh++ = DW_CFA_advance_loc + delta;
10523 else if (delta < 256)
10524 {
10525 *eh++ = DW_CFA_advance_loc1;
10526 *eh++ = delta;
10527 }
10528 else if (delta < 65536)
10529 {
10530 *eh++ = DW_CFA_advance_loc2;
10531 bfd_put_16 (abfd, delta, eh);
10532 eh += 2;
10533 }
10534 else
10535 {
10536 *eh++ = DW_CFA_advance_loc4;
10537 bfd_put_32 (abfd, delta, eh);
10538 eh += 4;
10539 }
10540 return eh;
10541 }
10542
10543 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10544
10545 static unsigned int
10546 eh_advance_size (unsigned int delta)
10547 {
10548 if (delta < 64 * 4)
10549 /* DW_CFA_advance_loc+[1..63]. */
10550 return 1;
10551 if (delta < 256 * 4)
10552 /* DW_CFA_advance_loc1, byte. */
10553 return 2;
10554 if (delta < 65536 * 4)
10555 /* DW_CFA_advance_loc2, 2 bytes. */
10556 return 3;
10557 /* DW_CFA_advance_loc4, 4 bytes. */
10558 return 5;
10559 }
10560
10561 /* With power7 weakly ordered memory model, it is possible for ld.so
10562 to update a plt entry in one thread and have another thread see a
10563 stale zero toc entry. To avoid this we need some sort of acquire
10564 barrier in the call stub. One solution is to make the load of the
10565 toc word seem to appear to depend on the load of the function entry
10566 word. Another solution is to test for r2 being zero, and branch to
10567 the appropriate glink entry if so.
10568
10569 . fake dep barrier compare
10570 . ld 12,xxx(2) ld 12,xxx(2)
10571 . mtctr 12 mtctr 12
10572 . xor 11,12,12 ld 2,xxx+8(2)
10573 . add 2,2,11 cmpldi 2,0
10574 . ld 2,xxx+8(2) bnectr+
10575 . bctr b <glink_entry>
10576
10577 The solution involving the compare turns out to be faster, so
10578 that's what we use unless the branch won't reach. */
10579
10580 #define ALWAYS_USE_FAKE_DEP 0
10581 #define ALWAYS_EMIT_R2SAVE 0
10582
10583 static inline unsigned int
10584 plt_stub_size (struct ppc_link_hash_table *htab,
10585 struct ppc_stub_hash_entry *stub_entry,
10586 bfd_vma off)
10587 {
10588 unsigned size;
10589
10590 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10591 {
10592 if (htab->powerxx_stubs)
10593 {
10594 bfd_vma start = (stub_entry->stub_offset
10595 + stub_entry->group->stub_sec->output_offset
10596 + stub_entry->group->stub_sec->output_section->vma);
10597 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10598 start += 4;
10599 size = 8 + size_powerxx_offset (off, start & 4);
10600 }
10601 else
10602 size = 8 + size_offset (off - 8);
10603 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10604 size += 4;
10605 return size;
10606 }
10607
10608 size = 12;
10609 if (ALWAYS_EMIT_R2SAVE
10610 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10611 size += 4;
10612 if (PPC_HA (off) != 0)
10613 size += 4;
10614 if (htab->opd_abi)
10615 {
10616 size += 4;
10617 if (htab->params->plt_static_chain)
10618 size += 4;
10619 if (htab->params->plt_thread_safe
10620 && htab->elf.dynamic_sections_created
10621 && stub_entry->h != NULL
10622 && stub_entry->h->elf.dynindx != -1)
10623 size += 8;
10624 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10625 size += 4;
10626 }
10627 if (stub_entry->h != NULL
10628 && (stub_entry->h == htab->tls_get_addr_fd
10629 || stub_entry->h == htab->tls_get_addr)
10630 && htab->params->tls_get_addr_opt)
10631 {
10632 size += 7 * 4;
10633 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10634 size += 6 * 4;
10635 }
10636 return size;
10637 }
10638
10639 /* Depending on the sign of plt_stub_align:
10640 If positive, return the padding to align to a 2**plt_stub_align
10641 boundary.
10642 If negative, if this stub would cross fewer 2**plt_stub_align
10643 boundaries if we align, then return the padding needed to do so. */
10644
10645 static inline unsigned int
10646 plt_stub_pad (struct ppc_link_hash_table *htab,
10647 struct ppc_stub_hash_entry *stub_entry,
10648 bfd_vma plt_off)
10649 {
10650 int stub_align;
10651 unsigned stub_size;
10652 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10653
10654 if (htab->params->plt_stub_align >= 0)
10655 {
10656 stub_align = 1 << htab->params->plt_stub_align;
10657 if ((stub_off & (stub_align - 1)) != 0)
10658 return stub_align - (stub_off & (stub_align - 1));
10659 return 0;
10660 }
10661
10662 stub_align = 1 << -htab->params->plt_stub_align;
10663 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10664 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10665 > ((stub_size - 1) & -stub_align))
10666 return stub_align - (stub_off & (stub_align - 1));
10667 return 0;
10668 }
10669
10670 /* Build a .plt call stub. */
10671
10672 static inline bfd_byte *
10673 build_plt_stub (struct ppc_link_hash_table *htab,
10674 struct ppc_stub_hash_entry *stub_entry,
10675 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10676 {
10677 bfd *obfd = htab->params->stub_bfd;
10678 bfd_boolean plt_load_toc = htab->opd_abi;
10679 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10680 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10681 && htab->elf.dynamic_sections_created
10682 && stub_entry->h != NULL
10683 && stub_entry->h->elf.dynindx != -1);
10684 bfd_boolean use_fake_dep = plt_thread_safe;
10685 bfd_vma cmp_branch_off = 0;
10686
10687 if (!ALWAYS_USE_FAKE_DEP
10688 && plt_load_toc
10689 && plt_thread_safe
10690 && !((stub_entry->h == htab->tls_get_addr_fd
10691 || stub_entry->h == htab->tls_get_addr)
10692 && htab->params->tls_get_addr_opt))
10693 {
10694 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10695 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10696 / PLT_ENTRY_SIZE (htab));
10697 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10698 bfd_vma to, from;
10699
10700 if (pltindex > 32768)
10701 glinkoff += (pltindex - 32768) * 4;
10702 to = (glinkoff
10703 + htab->glink->output_offset
10704 + htab->glink->output_section->vma);
10705 from = (p - stub_entry->group->stub_sec->contents
10706 + 4 * (ALWAYS_EMIT_R2SAVE
10707 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10708 + 4 * (PPC_HA (offset) != 0)
10709 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10710 != PPC_HA (offset))
10711 + 4 * (plt_static_chain != 0)
10712 + 20
10713 + stub_entry->group->stub_sec->output_offset
10714 + stub_entry->group->stub_sec->output_section->vma);
10715 cmp_branch_off = to - from;
10716 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10717 }
10718
10719 if (PPC_HA (offset) != 0)
10720 {
10721 if (r != NULL)
10722 {
10723 if (ALWAYS_EMIT_R2SAVE
10724 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10725 r[0].r_offset += 4;
10726 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10727 r[1].r_offset = r[0].r_offset + 4;
10728 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10729 r[1].r_addend = r[0].r_addend;
10730 if (plt_load_toc)
10731 {
10732 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10733 {
10734 r[2].r_offset = r[1].r_offset + 4;
10735 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10736 r[2].r_addend = r[0].r_addend;
10737 }
10738 else
10739 {
10740 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10741 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10742 r[2].r_addend = r[0].r_addend + 8;
10743 if (plt_static_chain)
10744 {
10745 r[3].r_offset = r[2].r_offset + 4;
10746 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10747 r[3].r_addend = r[0].r_addend + 16;
10748 }
10749 }
10750 }
10751 }
10752 if (ALWAYS_EMIT_R2SAVE
10753 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10754 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10755 if (plt_load_toc)
10756 {
10757 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10758 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10759 }
10760 else
10761 {
10762 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10763 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10764 }
10765 if (plt_load_toc
10766 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10767 {
10768 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10769 offset = 0;
10770 }
10771 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10772 if (plt_load_toc)
10773 {
10774 if (use_fake_dep)
10775 {
10776 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10777 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10778 }
10779 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10780 if (plt_static_chain)
10781 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10782 }
10783 }
10784 else
10785 {
10786 if (r != NULL)
10787 {
10788 if (ALWAYS_EMIT_R2SAVE
10789 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10790 r[0].r_offset += 4;
10791 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10792 if (plt_load_toc)
10793 {
10794 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10795 {
10796 r[1].r_offset = r[0].r_offset + 4;
10797 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10798 r[1].r_addend = r[0].r_addend;
10799 }
10800 else
10801 {
10802 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10803 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10804 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10805 if (plt_static_chain)
10806 {
10807 r[2].r_offset = r[1].r_offset + 4;
10808 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10809 r[2].r_addend = r[0].r_addend + 8;
10810 }
10811 }
10812 }
10813 }
10814 if (ALWAYS_EMIT_R2SAVE
10815 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10816 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10817 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10818 if (plt_load_toc
10819 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10820 {
10821 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10822 offset = 0;
10823 }
10824 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10825 if (plt_load_toc)
10826 {
10827 if (use_fake_dep)
10828 {
10829 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10830 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10831 }
10832 if (plt_static_chain)
10833 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10834 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10835 }
10836 }
10837 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10838 {
10839 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10840 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10841 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10842 }
10843 else
10844 bfd_put_32 (obfd, BCTR, p), p += 4;
10845 return p;
10846 }
10847
10848 /* Build a special .plt call stub for __tls_get_addr. */
10849
10850 #define LD_R11_0R3 0xe9630000
10851 #define LD_R12_0R3 0xe9830000
10852 #define MR_R0_R3 0x7c601b78
10853 #define CMPDI_R11_0 0x2c2b0000
10854 #define ADD_R3_R12_R13 0x7c6c6a14
10855 #define BEQLR 0x4d820020
10856 #define MR_R3_R0 0x7c030378
10857 #define STD_R11_0R1 0xf9610000
10858 #define BCTRL 0x4e800421
10859 #define LD_R11_0R1 0xe9610000
10860 #define MTLR_R11 0x7d6803a6
10861
10862 static inline bfd_byte *
10863 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10864 struct ppc_stub_hash_entry *stub_entry,
10865 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10866 {
10867 bfd *obfd = htab->params->stub_bfd;
10868 bfd_byte *loc = p;
10869
10870 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10871 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10872 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10873 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10874 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10875 bfd_put_32 (obfd, BEQLR, p), p += 4;
10876 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10877 if (r != NULL)
10878 r[0].r_offset += 7 * 4;
10879 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
10880 return build_plt_stub (htab, stub_entry, p, offset, r);
10881
10882 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10883 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10884
10885 if (r != NULL)
10886 r[0].r_offset += 2 * 4;
10887 p = build_plt_stub (htab, stub_entry, p, offset, r);
10888 bfd_put_32 (obfd, BCTRL, p - 4);
10889
10890 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10891 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10892 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10893 bfd_put_32 (obfd, BLR, p), p += 4;
10894
10895 if (htab->glink_eh_frame != NULL
10896 && htab->glink_eh_frame->size != 0)
10897 {
10898 bfd_byte *base, *eh;
10899 unsigned int lr_used, delta;
10900
10901 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10902 eh = base + stub_entry->group->eh_size;
10903 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10904 delta = lr_used - stub_entry->group->lr_restore;
10905 stub_entry->group->lr_restore = lr_used + 16;
10906 eh = eh_advance (htab->elf.dynobj, eh, delta);
10907 *eh++ = DW_CFA_offset_extended_sf;
10908 *eh++ = 65;
10909 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10910 *eh++ = DW_CFA_advance_loc + 4;
10911 *eh++ = DW_CFA_restore_extended;
10912 *eh++ = 65;
10913 stub_entry->group->eh_size = eh - base;
10914 }
10915 return p;
10916 }
10917
10918 static Elf_Internal_Rela *
10919 get_relocs (asection *sec, int count)
10920 {
10921 Elf_Internal_Rela *relocs;
10922 struct bfd_elf_section_data *elfsec_data;
10923
10924 elfsec_data = elf_section_data (sec);
10925 relocs = elfsec_data->relocs;
10926 if (relocs == NULL)
10927 {
10928 bfd_size_type relsize;
10929 relsize = sec->reloc_count * sizeof (*relocs);
10930 relocs = bfd_alloc (sec->owner, relsize);
10931 if (relocs == NULL)
10932 return NULL;
10933 elfsec_data->relocs = relocs;
10934 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10935 sizeof (Elf_Internal_Shdr));
10936 if (elfsec_data->rela.hdr == NULL)
10937 return NULL;
10938 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10939 * sizeof (Elf64_External_Rela));
10940 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10941 sec->reloc_count = 0;
10942 }
10943 relocs += sec->reloc_count;
10944 sec->reloc_count += count;
10945 return relocs;
10946 }
10947
10948 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10949 forms, to the equivalent relocs against the global symbol given by
10950 STUB_ENTRY->H. */
10951
10952 static bfd_boolean
10953 use_global_in_relocs (struct ppc_link_hash_table *htab,
10954 struct ppc_stub_hash_entry *stub_entry,
10955 Elf_Internal_Rela *r, unsigned int num_rel)
10956 {
10957 struct elf_link_hash_entry **hashes;
10958 unsigned long symndx;
10959 struct ppc_link_hash_entry *h;
10960 bfd_vma symval;
10961
10962 /* Relocs are always against symbols in their own object file. Fake
10963 up global sym hashes for the stub bfd (which has no symbols). */
10964 hashes = elf_sym_hashes (htab->params->stub_bfd);
10965 if (hashes == NULL)
10966 {
10967 bfd_size_type hsize;
10968
10969 /* When called the first time, stub_globals will contain the
10970 total number of symbols seen during stub sizing. After
10971 allocating, stub_globals is used as an index to fill the
10972 hashes array. */
10973 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10974 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10975 if (hashes == NULL)
10976 return FALSE;
10977 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10978 htab->stub_globals = 1;
10979 }
10980 symndx = htab->stub_globals++;
10981 h = stub_entry->h;
10982 hashes[symndx] = &h->elf;
10983 if (h->oh != NULL && h->oh->is_func)
10984 h = ppc_follow_link (h->oh);
10985 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10986 || h->elf.root.type == bfd_link_hash_defweak);
10987 symval = (h->elf.root.u.def.value
10988 + h->elf.root.u.def.section->output_offset
10989 + h->elf.root.u.def.section->output_section->vma);
10990 while (num_rel-- != 0)
10991 {
10992 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10993 if (h->elf.root.u.def.section != stub_entry->target_section)
10994 {
10995 /* H is an opd symbol. The addend must be zero, and the
10996 branch reloc is the only one we can convert. */
10997 r->r_addend = 0;
10998 break;
10999 }
11000 else
11001 r->r_addend -= symval;
11002 --r;
11003 }
11004 return TRUE;
11005 }
11006
11007 static bfd_vma
11008 get_r2off (struct bfd_link_info *info,
11009 struct ppc_stub_hash_entry *stub_entry)
11010 {
11011 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11012 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11013
11014 if (r2off == 0)
11015 {
11016 /* Support linking -R objects. Get the toc pointer from the
11017 opd entry. */
11018 char buf[8];
11019 if (!htab->opd_abi)
11020 return r2off;
11021 asection *opd = stub_entry->h->elf.root.u.def.section;
11022 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11023
11024 if (strcmp (opd->name, ".opd") != 0
11025 || opd->reloc_count != 0)
11026 {
11027 info->callbacks->einfo
11028 (_("%P: cannot find opd entry toc for `%pT'\n"),
11029 stub_entry->h->elf.root.root.string);
11030 bfd_set_error (bfd_error_bad_value);
11031 return (bfd_vma) -1;
11032 }
11033 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11034 return (bfd_vma) -1;
11035 r2off = bfd_get_64 (opd->owner, buf);
11036 r2off -= elf_gp (info->output_bfd);
11037 }
11038 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11039 return r2off;
11040 }
11041
11042 static bfd_boolean
11043 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11044 {
11045 struct ppc_stub_hash_entry *stub_entry;
11046 struct ppc_branch_hash_entry *br_entry;
11047 struct bfd_link_info *info;
11048 struct ppc_link_hash_table *htab;
11049 bfd_byte *loc;
11050 bfd_byte *p, *relp;
11051 bfd_vma targ, off;
11052 Elf_Internal_Rela *r;
11053 asection *plt;
11054 int num_rel;
11055 int odd;
11056
11057 /* Massage our args to the form they really have. */
11058 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11059 info = in_arg;
11060
11061 htab = ppc_hash_table (info);
11062 if (htab == NULL)
11063 return FALSE;
11064
11065 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11066 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11067
11068 htab->stub_count[stub_entry->stub_type - 1] += 1;
11069 switch (stub_entry->stub_type)
11070 {
11071 case ppc_stub_long_branch:
11072 case ppc_stub_long_branch_r2off:
11073 /* Branches are relative. This is where we are going to. */
11074 targ = (stub_entry->target_value
11075 + stub_entry->target_section->output_offset
11076 + stub_entry->target_section->output_section->vma);
11077 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11078
11079 /* And this is where we are coming from. */
11080 off = (stub_entry->stub_offset
11081 + stub_entry->group->stub_sec->output_offset
11082 + stub_entry->group->stub_sec->output_section->vma);
11083 off = targ - off;
11084
11085 p = loc;
11086 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11087 {
11088 bfd_vma r2off = get_r2off (info, stub_entry);
11089
11090 if (r2off == (bfd_vma) -1)
11091 {
11092 htab->stub_error = TRUE;
11093 return FALSE;
11094 }
11095 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11096 p += 4;
11097 if (PPC_HA (r2off) != 0)
11098 {
11099 bfd_put_32 (htab->params->stub_bfd,
11100 ADDIS_R2_R2 | PPC_HA (r2off), p);
11101 p += 4;
11102 }
11103 if (PPC_LO (r2off) != 0)
11104 {
11105 bfd_put_32 (htab->params->stub_bfd,
11106 ADDI_R2_R2 | PPC_LO (r2off), p);
11107 p += 4;
11108 }
11109 off -= p - loc;
11110 }
11111 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11112 p += 4;
11113
11114 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11115 {
11116 _bfd_error_handler
11117 (_("long branch stub `%s' offset overflow"),
11118 stub_entry->root.string);
11119 htab->stub_error = TRUE;
11120 return FALSE;
11121 }
11122
11123 if (info->emitrelocations)
11124 {
11125 r = get_relocs (stub_entry->group->stub_sec, 1);
11126 if (r == NULL)
11127 return FALSE;
11128 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11129 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11130 r->r_addend = targ;
11131 if (stub_entry->h != NULL
11132 && !use_global_in_relocs (htab, stub_entry, r, 1))
11133 return FALSE;
11134 }
11135 break;
11136
11137 case ppc_stub_plt_branch:
11138 case ppc_stub_plt_branch_r2off:
11139 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11140 stub_entry->root.string + 9,
11141 FALSE, FALSE);
11142 if (br_entry == NULL)
11143 {
11144 _bfd_error_handler (_("can't find branch stub `%s'"),
11145 stub_entry->root.string);
11146 htab->stub_error = TRUE;
11147 return FALSE;
11148 }
11149
11150 targ = (stub_entry->target_value
11151 + stub_entry->target_section->output_offset
11152 + stub_entry->target_section->output_section->vma);
11153 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11154 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11155
11156 bfd_put_64 (htab->brlt->owner, targ,
11157 htab->brlt->contents + br_entry->offset);
11158
11159 if (br_entry->iter == htab->stub_iteration)
11160 {
11161 br_entry->iter = 0;
11162
11163 if (htab->relbrlt != NULL)
11164 {
11165 /* Create a reloc for the branch lookup table entry. */
11166 Elf_Internal_Rela rela;
11167 bfd_byte *rl;
11168
11169 rela.r_offset = (br_entry->offset
11170 + htab->brlt->output_offset
11171 + htab->brlt->output_section->vma);
11172 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11173 rela.r_addend = targ;
11174
11175 rl = htab->relbrlt->contents;
11176 rl += (htab->relbrlt->reloc_count++
11177 * sizeof (Elf64_External_Rela));
11178 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11179 }
11180 else if (info->emitrelocations)
11181 {
11182 r = get_relocs (htab->brlt, 1);
11183 if (r == NULL)
11184 return FALSE;
11185 /* brlt, being SEC_LINKER_CREATED does not go through the
11186 normal reloc processing. Symbols and offsets are not
11187 translated from input file to output file form, so
11188 set up the offset per the output file. */
11189 r->r_offset = (br_entry->offset
11190 + htab->brlt->output_offset
11191 + htab->brlt->output_section->vma);
11192 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11193 r->r_addend = targ;
11194 }
11195 }
11196
11197 targ = (br_entry->offset
11198 + htab->brlt->output_offset
11199 + htab->brlt->output_section->vma);
11200
11201 off = (elf_gp (info->output_bfd)
11202 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11203 off = targ - off;
11204
11205 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11206 {
11207 info->callbacks->einfo
11208 (_("%P: linkage table error against `%pT'\n"),
11209 stub_entry->root.string);
11210 bfd_set_error (bfd_error_bad_value);
11211 htab->stub_error = TRUE;
11212 return FALSE;
11213 }
11214
11215 if (info->emitrelocations)
11216 {
11217 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11218 if (r == NULL)
11219 return FALSE;
11220 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11221 if (bfd_big_endian (info->output_bfd))
11222 r[0].r_offset += 2;
11223 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11224 r[0].r_offset += 4;
11225 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11226 r[0].r_addend = targ;
11227 if (PPC_HA (off) != 0)
11228 {
11229 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11230 r[1].r_offset = r[0].r_offset + 4;
11231 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11232 r[1].r_addend = r[0].r_addend;
11233 }
11234 }
11235
11236 p = loc;
11237 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11238 {
11239 if (PPC_HA (off) != 0)
11240 {
11241 bfd_put_32 (htab->params->stub_bfd,
11242 ADDIS_R12_R2 | PPC_HA (off), p);
11243 p += 4;
11244 bfd_put_32 (htab->params->stub_bfd,
11245 LD_R12_0R12 | PPC_LO (off), p);
11246 }
11247 else
11248 bfd_put_32 (htab->params->stub_bfd,
11249 LD_R12_0R2 | PPC_LO (off), p);
11250 }
11251 else
11252 {
11253 bfd_vma r2off = get_r2off (info, stub_entry);
11254
11255 if (r2off == (bfd_vma) -1)
11256 {
11257 htab->stub_error = TRUE;
11258 return FALSE;
11259 }
11260
11261 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11262 p += 4;
11263 if (PPC_HA (off) != 0)
11264 {
11265 bfd_put_32 (htab->params->stub_bfd,
11266 ADDIS_R12_R2 | PPC_HA (off), p);
11267 p += 4;
11268 bfd_put_32 (htab->params->stub_bfd,
11269 LD_R12_0R12 | PPC_LO (off), p);
11270 }
11271 else
11272 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11273
11274 if (PPC_HA (r2off) != 0)
11275 {
11276 p += 4;
11277 bfd_put_32 (htab->params->stub_bfd,
11278 ADDIS_R2_R2 | PPC_HA (r2off), p);
11279 }
11280 if (PPC_LO (r2off) != 0)
11281 {
11282 p += 4;
11283 bfd_put_32 (htab->params->stub_bfd,
11284 ADDI_R2_R2 | PPC_LO (r2off), p);
11285 }
11286 }
11287 p += 4;
11288 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11289 p += 4;
11290 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11291 p += 4;
11292 break;
11293
11294 case ppc_stub_long_branch_notoc:
11295 case ppc_stub_long_branch_both:
11296 case ppc_stub_plt_branch_notoc:
11297 case ppc_stub_plt_branch_both:
11298 case ppc_stub_plt_call_notoc:
11299 case ppc_stub_plt_call_both:
11300 p = loc;
11301 off = (stub_entry->stub_offset
11302 + stub_entry->group->stub_sec->output_offset
11303 + stub_entry->group->stub_sec->output_section->vma);
11304 if (stub_entry->stub_type == ppc_stub_long_branch_both
11305 || stub_entry->stub_type == ppc_stub_plt_branch_both
11306 || stub_entry->stub_type == ppc_stub_plt_call_both)
11307 {
11308 off += 4;
11309 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11310 p += 4;
11311 }
11312 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11313 {
11314 targ = stub_entry->plt_ent->plt.offset & ~1;
11315 if (targ >= (bfd_vma) -2)
11316 abort ();
11317
11318 plt = htab->elf.splt;
11319 if (!htab->elf.dynamic_sections_created
11320 || stub_entry->h == NULL
11321 || stub_entry->h->elf.dynindx == -1)
11322 {
11323 if (stub_entry->symtype == STT_GNU_IFUNC)
11324 plt = htab->elf.iplt;
11325 else
11326 plt = htab->pltlocal;
11327 }
11328 targ += plt->output_offset + plt->output_section->vma;
11329 }
11330 else
11331 targ = (stub_entry->target_value
11332 + stub_entry->target_section->output_offset
11333 + stub_entry->target_section->output_section->vma);
11334 odd = off & 4;
11335 off = targ - off;
11336
11337 relp = p;
11338 num_rel = 0;
11339 if (htab->powerxx_stubs)
11340 {
11341 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11342 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11343 }
11344 else
11345 {
11346 /* The notoc stubs calculate their target (either a PLT entry or
11347 the global entry point of a function) relative to the PC
11348 returned by the "bcl" two instructions past the start of the
11349 sequence emitted by build_offset. The offset is therefore 8
11350 less than calculated from the start of the sequence. */
11351 off -= 8;
11352 p = build_offset (htab->params->stub_bfd, p, off,
11353 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11354 }
11355
11356 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11357 {
11358 bfd_vma from;
11359 num_rel = 1;
11360 from = (stub_entry->stub_offset
11361 + stub_entry->group->stub_sec->output_offset
11362 + stub_entry->group->stub_sec->output_section->vma
11363 + (p - loc));
11364 bfd_put_32 (htab->params->stub_bfd,
11365 B_DOT | ((targ - from) & 0x3fffffc), p);
11366 }
11367 else
11368 {
11369 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11370 p += 4;
11371 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11372 }
11373 p += 4;
11374
11375 if (info->emitrelocations)
11376 {
11377 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11378 if (htab->powerxx_stubs)
11379 num_rel += num_relocs_for_powerxx_offset (off, odd);
11380 else
11381 {
11382 num_rel += num_relocs_for_offset (off);
11383 roff += 16;
11384 }
11385 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11386 if (r == NULL)
11387 return FALSE;
11388 if (htab->powerxx_stubs)
11389 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11390 else
11391 r = emit_relocs_for_offset (info, r, roff, targ, off);
11392 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11393 || stub_entry->stub_type == ppc_stub_long_branch_both)
11394 {
11395 ++r;
11396 roff = p - 4 - stub_entry->group->stub_sec->contents;
11397 r->r_offset = roff;
11398 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11399 r->r_addend = targ;
11400 if (stub_entry->h != NULL
11401 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11402 return FALSE;
11403 }
11404 }
11405
11406 if (!htab->powerxx_stubs
11407 && htab->glink_eh_frame != NULL
11408 && htab->glink_eh_frame->size != 0)
11409 {
11410 bfd_byte *base, *eh;
11411 unsigned int lr_used, delta;
11412
11413 base = (htab->glink_eh_frame->contents
11414 + stub_entry->group->eh_base + 17);
11415 eh = base + stub_entry->group->eh_size;
11416 lr_used = stub_entry->stub_offset + 8;
11417 if (stub_entry->stub_type == ppc_stub_long_branch_both
11418 || stub_entry->stub_type == ppc_stub_plt_branch_both
11419 || stub_entry->stub_type == ppc_stub_plt_call_both)
11420 lr_used += 4;
11421 delta = lr_used - stub_entry->group->lr_restore;
11422 stub_entry->group->lr_restore = lr_used + 8;
11423 eh = eh_advance (htab->elf.dynobj, eh, delta);
11424 *eh++ = DW_CFA_register;
11425 *eh++ = 65;
11426 *eh++ = 12;
11427 *eh++ = DW_CFA_advance_loc + 2;
11428 *eh++ = DW_CFA_restore_extended;
11429 *eh++ = 65;
11430 stub_entry->group->eh_size = eh - base;
11431 }
11432 break;
11433
11434 case ppc_stub_plt_call:
11435 case ppc_stub_plt_call_r2save:
11436 if (stub_entry->h != NULL
11437 && stub_entry->h->is_func_descriptor
11438 && stub_entry->h->oh != NULL)
11439 {
11440 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11441
11442 /* If the old-ABI "dot-symbol" is undefined make it weak so
11443 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11444 if (fh->elf.root.type == bfd_link_hash_undefined
11445 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11446 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11447 fh->elf.root.type = bfd_link_hash_undefweak;
11448 }
11449
11450 /* Now build the stub. */
11451 targ = stub_entry->plt_ent->plt.offset & ~1;
11452 if (targ >= (bfd_vma) -2)
11453 abort ();
11454
11455 plt = htab->elf.splt;
11456 if (!htab->elf.dynamic_sections_created
11457 || stub_entry->h == NULL
11458 || stub_entry->h->elf.dynindx == -1)
11459 {
11460 if (stub_entry->symtype == STT_GNU_IFUNC)
11461 plt = htab->elf.iplt;
11462 else
11463 plt = htab->pltlocal;
11464 }
11465 targ += plt->output_offset + plt->output_section->vma;
11466
11467 off = (elf_gp (info->output_bfd)
11468 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11469 off = targ - off;
11470
11471 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11472 {
11473 info->callbacks->einfo
11474 /* xgettext:c-format */
11475 (_("%P: linkage table error against `%pT'\n"),
11476 stub_entry->h != NULL
11477 ? stub_entry->h->elf.root.root.string
11478 : "<local sym>");
11479 bfd_set_error (bfd_error_bad_value);
11480 htab->stub_error = TRUE;
11481 return FALSE;
11482 }
11483
11484 r = NULL;
11485 if (info->emitrelocations)
11486 {
11487 r = get_relocs (stub_entry->group->stub_sec,
11488 ((PPC_HA (off) != 0)
11489 + (htab->opd_abi
11490 ? 2 + (htab->params->plt_static_chain
11491 && PPC_HA (off + 16) == PPC_HA (off))
11492 : 1)));
11493 if (r == NULL)
11494 return FALSE;
11495 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11496 if (bfd_big_endian (info->output_bfd))
11497 r[0].r_offset += 2;
11498 r[0].r_addend = targ;
11499 }
11500 if (stub_entry->h != NULL
11501 && (stub_entry->h == htab->tls_get_addr_fd
11502 || stub_entry->h == htab->tls_get_addr)
11503 && htab->params->tls_get_addr_opt)
11504 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11505 else
11506 p = build_plt_stub (htab, stub_entry, loc, off, r);
11507 break;
11508
11509 case ppc_stub_save_res:
11510 return TRUE;
11511
11512 default:
11513 BFD_FAIL ();
11514 return FALSE;
11515 }
11516
11517 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11518
11519 if (htab->params->emit_stub_syms)
11520 {
11521 struct elf_link_hash_entry *h;
11522 size_t len1, len2;
11523 char *name;
11524 const char *const stub_str[] = { "long_branch",
11525 "long_branch",
11526 "long_branch",
11527 "long_branch",
11528 "plt_branch",
11529 "plt_branch",
11530 "plt_branch",
11531 "plt_branch",
11532 "plt_call",
11533 "plt_call",
11534 "plt_call",
11535 "plt_call" };
11536
11537 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11538 len2 = strlen (stub_entry->root.string);
11539 name = bfd_malloc (len1 + len2 + 2);
11540 if (name == NULL)
11541 return FALSE;
11542 memcpy (name, stub_entry->root.string, 9);
11543 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11544 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11545 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11546 if (h == NULL)
11547 return FALSE;
11548 if (h->root.type == bfd_link_hash_new)
11549 {
11550 h->root.type = bfd_link_hash_defined;
11551 h->root.u.def.section = stub_entry->group->stub_sec;
11552 h->root.u.def.value = stub_entry->stub_offset;
11553 h->ref_regular = 1;
11554 h->def_regular = 1;
11555 h->ref_regular_nonweak = 1;
11556 h->forced_local = 1;
11557 h->non_elf = 0;
11558 h->root.linker_def = 1;
11559 }
11560 }
11561
11562 return TRUE;
11563 }
11564
11565 /* As above, but don't actually build the stub. Just bump offset so
11566 we know stub section sizes, and select plt_branch stubs where
11567 long_branch stubs won't do. */
11568
11569 static bfd_boolean
11570 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11571 {
11572 struct ppc_stub_hash_entry *stub_entry;
11573 struct bfd_link_info *info;
11574 struct ppc_link_hash_table *htab;
11575 asection *plt;
11576 bfd_vma targ, off, r2off;
11577 unsigned int size, extra, lr_used, delta, odd;
11578
11579 /* Massage our args to the form they really have. */
11580 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11581 info = in_arg;
11582
11583 htab = ppc_hash_table (info);
11584 if (htab == NULL)
11585 return FALSE;
11586
11587 /* Make a note of the offset within the stubs for this entry. */
11588 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11589
11590 if (stub_entry->h != NULL
11591 && stub_entry->h->save_res
11592 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11593 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11594 {
11595 /* Don't make stubs to out-of-line register save/restore
11596 functions. Instead, emit copies of the functions. */
11597 stub_entry->group->needs_save_res = 1;
11598 stub_entry->stub_type = ppc_stub_save_res;
11599 return TRUE;
11600 }
11601
11602 switch (stub_entry->stub_type)
11603 {
11604 case ppc_stub_plt_branch:
11605 case ppc_stub_plt_branch_r2off:
11606 /* Reset the stub type from the plt branch variant in case we now
11607 can reach with a shorter stub. */
11608 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11609 /* Fall through. */
11610 case ppc_stub_long_branch:
11611 case ppc_stub_long_branch_r2off:
11612 targ = (stub_entry->target_value
11613 + stub_entry->target_section->output_offset
11614 + stub_entry->target_section->output_section->vma);
11615 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11616 off = (stub_entry->stub_offset
11617 + stub_entry->group->stub_sec->output_offset
11618 + stub_entry->group->stub_sec->output_section->vma);
11619
11620 size = 4;
11621 r2off = 0;
11622 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11623 {
11624 r2off = get_r2off (info, stub_entry);
11625 if (r2off == (bfd_vma) -1)
11626 {
11627 htab->stub_error = TRUE;
11628 return FALSE;
11629 }
11630 size = 8;
11631 if (PPC_HA (r2off) != 0)
11632 size += 4;
11633 if (PPC_LO (r2off) != 0)
11634 size += 4;
11635 off += size - 4;
11636 }
11637 off = targ - off;
11638
11639 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11640 Do the same for -R objects without function descriptors. */
11641 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11642 && r2off == 0
11643 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11644 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11645 {
11646 struct ppc_branch_hash_entry *br_entry;
11647
11648 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11649 stub_entry->root.string + 9,
11650 TRUE, FALSE);
11651 if (br_entry == NULL)
11652 {
11653 _bfd_error_handler (_("can't build branch stub `%s'"),
11654 stub_entry->root.string);
11655 htab->stub_error = TRUE;
11656 return FALSE;
11657 }
11658
11659 if (br_entry->iter != htab->stub_iteration)
11660 {
11661 br_entry->iter = htab->stub_iteration;
11662 br_entry->offset = htab->brlt->size;
11663 htab->brlt->size += 8;
11664
11665 if (htab->relbrlt != NULL)
11666 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11667 else if (info->emitrelocations)
11668 {
11669 htab->brlt->reloc_count += 1;
11670 htab->brlt->flags |= SEC_RELOC;
11671 }
11672 }
11673
11674 targ = (br_entry->offset
11675 + htab->brlt->output_offset
11676 + htab->brlt->output_section->vma);
11677 off = (elf_gp (info->output_bfd)
11678 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11679 off = targ - off;
11680
11681 if (info->emitrelocations)
11682 {
11683 stub_entry->group->stub_sec->reloc_count
11684 += 1 + (PPC_HA (off) != 0);
11685 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11686 }
11687
11688 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11689 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11690 {
11691 size = 12;
11692 if (PPC_HA (off) != 0)
11693 size = 16;
11694 }
11695 else
11696 {
11697 size = 16;
11698 if (PPC_HA (off) != 0)
11699 size += 4;
11700
11701 if (PPC_HA (r2off) != 0)
11702 size += 4;
11703 if (PPC_LO (r2off) != 0)
11704 size += 4;
11705 }
11706 }
11707 else if (info->emitrelocations)
11708 {
11709 stub_entry->group->stub_sec->reloc_count += 1;
11710 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11711 }
11712 break;
11713
11714 case ppc_stub_plt_branch_notoc:
11715 case ppc_stub_plt_branch_both:
11716 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11717 /* Fall through. */
11718 case ppc_stub_long_branch_notoc:
11719 case ppc_stub_long_branch_both:
11720 off = (stub_entry->stub_offset
11721 + stub_entry->group->stub_sec->output_offset
11722 + stub_entry->group->stub_sec->output_section->vma);
11723 size = 0;
11724 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11725 size = 4;
11726 off += size;
11727 targ = (stub_entry->target_value
11728 + stub_entry->target_section->output_offset
11729 + stub_entry->target_section->output_section->vma);
11730 odd = off & 4;
11731 off = targ - off;
11732
11733 if (info->emitrelocations)
11734 {
11735 unsigned int num_rel;
11736 if (htab->powerxx_stubs)
11737 num_rel = num_relocs_for_powerxx_offset (off, odd);
11738 else
11739 num_rel = num_relocs_for_offset (off - 8);
11740 stub_entry->group->stub_sec->reloc_count += num_rel;
11741 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11742 }
11743
11744 if (htab->powerxx_stubs)
11745 extra = size_powerxx_offset (off, odd);
11746 else
11747 extra = size_offset (off - 8);
11748 /* Include branch insn plus those in the offset sequence. */
11749 size += 4 + extra;
11750 /* The branch insn is at the end, or "extra" bytes along. So
11751 its offset will be "extra" bytes less that that already
11752 calculated. */
11753 off -= extra;
11754
11755 if (!htab->powerxx_stubs)
11756 {
11757 /* After the bcl, lr has been modified so we need to emit
11758 .eh_frame info saying the return address is in r12. */
11759 lr_used = stub_entry->stub_offset + 8;
11760 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11761 lr_used += 4;
11762 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11763 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11764 DW_CFA_restore_extended 65. */
11765 delta = lr_used - stub_entry->group->lr_restore;
11766 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11767 stub_entry->group->lr_restore = lr_used + 8;
11768 }
11769
11770 /* If the branch can't reach, use a plt_branch. */
11771 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11772 {
11773 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11774 - ppc_stub_long_branch_notoc);
11775 size += 4;
11776 }
11777 else if (info->emitrelocations)
11778 stub_entry->group->stub_sec->reloc_count +=1;
11779 break;
11780
11781 case ppc_stub_plt_call_notoc:
11782 case ppc_stub_plt_call_both:
11783 off = (stub_entry->stub_offset
11784 + stub_entry->group->stub_sec->output_offset
11785 + stub_entry->group->stub_sec->output_section->vma);
11786 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11787 off += 4;
11788 targ = stub_entry->plt_ent->plt.offset & ~1;
11789 if (targ >= (bfd_vma) -2)
11790 abort ();
11791
11792 plt = htab->elf.splt;
11793 if (!htab->elf.dynamic_sections_created
11794 || stub_entry->h == NULL
11795 || stub_entry->h->elf.dynindx == -1)
11796 {
11797 if (stub_entry->symtype == STT_GNU_IFUNC)
11798 plt = htab->elf.iplt;
11799 else
11800 plt = htab->pltlocal;
11801 }
11802 targ += plt->output_offset + plt->output_section->vma;
11803 odd = off & 4;
11804 off = targ - off;
11805
11806 if (htab->params->plt_stub_align != 0)
11807 {
11808 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11809
11810 stub_entry->group->stub_sec->size += pad;
11811 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11812 off -= pad;
11813 }
11814
11815 if (info->emitrelocations)
11816 {
11817 unsigned int num_rel;
11818 if (htab->powerxx_stubs)
11819 num_rel = num_relocs_for_powerxx_offset (off, odd);
11820 else
11821 num_rel = num_relocs_for_offset (off - 8);
11822 stub_entry->group->stub_sec->reloc_count += num_rel;
11823 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11824 }
11825
11826 size = plt_stub_size (htab, stub_entry, off);
11827
11828 if (!htab->powerxx_stubs)
11829 {
11830 /* After the bcl, lr has been modified so we need to emit
11831 .eh_frame info saying the return address is in r12. */
11832 lr_used = stub_entry->stub_offset + 8;
11833 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11834 lr_used += 4;
11835 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11836 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11837 DW_CFA_restore_extended 65. */
11838 delta = lr_used - stub_entry->group->lr_restore;
11839 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11840 stub_entry->group->lr_restore = lr_used + 8;
11841 }
11842 break;
11843
11844 case ppc_stub_plt_call:
11845 case ppc_stub_plt_call_r2save:
11846 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11847 if (targ >= (bfd_vma) -2)
11848 abort ();
11849 plt = htab->elf.splt;
11850 if (!htab->elf.dynamic_sections_created
11851 || stub_entry->h == NULL
11852 || stub_entry->h->elf.dynindx == -1)
11853 {
11854 if (stub_entry->symtype == STT_GNU_IFUNC)
11855 plt = htab->elf.iplt;
11856 else
11857 plt = htab->pltlocal;
11858 }
11859 targ += plt->output_offset + plt->output_section->vma;
11860
11861 off = (elf_gp (info->output_bfd)
11862 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11863 off = targ - off;
11864
11865 if (htab->params->plt_stub_align != 0)
11866 {
11867 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11868
11869 stub_entry->group->stub_sec->size += pad;
11870 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11871 }
11872
11873 if (info->emitrelocations)
11874 {
11875 stub_entry->group->stub_sec->reloc_count
11876 += ((PPC_HA (off) != 0)
11877 + (htab->opd_abi
11878 ? 2 + (htab->params->plt_static_chain
11879 && PPC_HA (off + 16) == PPC_HA (off))
11880 : 1));
11881 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11882 }
11883
11884 size = plt_stub_size (htab, stub_entry, off);
11885
11886 if (stub_entry->h != NULL
11887 && (stub_entry->h == htab->tls_get_addr_fd
11888 || stub_entry->h == htab->tls_get_addr)
11889 && htab->params->tls_get_addr_opt
11890 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11891 {
11892 /* After the bctrl, lr has been modified so we need to
11893 emit .eh_frame info saying the return address is
11894 on the stack. In fact we put the EH info specifying
11895 that the return address is on the stack *at* the
11896 call rather than after it, because the EH info for a
11897 call needs to be specified by that point.
11898 See libgcc/unwind-dw2.c execute_cfa_program. */
11899 lr_used = stub_entry->stub_offset + size - 20;
11900 /* The eh_frame info will consist of a DW_CFA_advance_loc
11901 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11902 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11903 delta = lr_used - stub_entry->group->lr_restore;
11904 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11905 stub_entry->group->lr_restore = size - 4;
11906 }
11907 break;
11908
11909 default:
11910 BFD_FAIL ();
11911 return FALSE;
11912 }
11913
11914 stub_entry->group->stub_sec->size += size;
11915 return TRUE;
11916 }
11917
11918 /* Set up various things so that we can make a list of input sections
11919 for each output section included in the link. Returns -1 on error,
11920 0 when no stubs will be needed, and 1 on success. */
11921
11922 int
11923 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11924 {
11925 unsigned int id;
11926 bfd_size_type amt;
11927 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11928
11929 if (htab == NULL)
11930 return -1;
11931
11932 htab->sec_info_arr_size = _bfd_section_id;
11933 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11934 htab->sec_info = bfd_zmalloc (amt);
11935 if (htab->sec_info == NULL)
11936 return -1;
11937
11938 /* Set toc_off for com, und, abs and ind sections. */
11939 for (id = 0; id < 3; id++)
11940 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11941
11942 return 1;
11943 }
11944
11945 /* Set up for first pass at multitoc partitioning. */
11946
11947 void
11948 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11949 {
11950 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11951
11952 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11953 htab->toc_bfd = NULL;
11954 htab->toc_first_sec = NULL;
11955 }
11956
11957 /* The linker repeatedly calls this function for each TOC input section
11958 and linker generated GOT section. Group input bfds such that the toc
11959 within a group is less than 64k in size. */
11960
11961 bfd_boolean
11962 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11963 {
11964 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11965 bfd_vma addr, off, limit;
11966
11967 if (htab == NULL)
11968 return FALSE;
11969
11970 if (!htab->second_toc_pass)
11971 {
11972 /* Keep track of the first .toc or .got section for this input bfd. */
11973 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11974
11975 if (new_bfd)
11976 {
11977 htab->toc_bfd = isec->owner;
11978 htab->toc_first_sec = isec;
11979 }
11980
11981 addr = isec->output_offset + isec->output_section->vma;
11982 off = addr - htab->toc_curr;
11983 limit = 0x80008000;
11984 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11985 limit = 0x10000;
11986 if (off + isec->size > limit)
11987 {
11988 addr = (htab->toc_first_sec->output_offset
11989 + htab->toc_first_sec->output_section->vma);
11990 htab->toc_curr = addr;
11991 htab->toc_curr &= -TOC_BASE_ALIGN;
11992 }
11993
11994 /* toc_curr is the base address of this toc group. Set elf_gp
11995 for the input section to be the offset relative to the
11996 output toc base plus 0x8000. Making the input elf_gp an
11997 offset allows us to move the toc as a whole without
11998 recalculating input elf_gp. */
11999 off = htab->toc_curr - elf_gp (info->output_bfd);
12000 off += TOC_BASE_OFF;
12001
12002 /* Die if someone uses a linker script that doesn't keep input
12003 file .toc and .got together. */
12004 if (new_bfd
12005 && elf_gp (isec->owner) != 0
12006 && elf_gp (isec->owner) != off)
12007 return FALSE;
12008
12009 elf_gp (isec->owner) = off;
12010 return TRUE;
12011 }
12012
12013 /* During the second pass toc_first_sec points to the start of
12014 a toc group, and toc_curr is used to track the old elf_gp.
12015 We use toc_bfd to ensure we only look at each bfd once. */
12016 if (htab->toc_bfd == isec->owner)
12017 return TRUE;
12018 htab->toc_bfd = isec->owner;
12019
12020 if (htab->toc_first_sec == NULL
12021 || htab->toc_curr != elf_gp (isec->owner))
12022 {
12023 htab->toc_curr = elf_gp (isec->owner);
12024 htab->toc_first_sec = isec;
12025 }
12026 addr = (htab->toc_first_sec->output_offset
12027 + htab->toc_first_sec->output_section->vma);
12028 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12029 elf_gp (isec->owner) = off;
12030
12031 return TRUE;
12032 }
12033
12034 /* Called via elf_link_hash_traverse to merge GOT entries for global
12035 symbol H. */
12036
12037 static bfd_boolean
12038 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12039 {
12040 if (h->root.type == bfd_link_hash_indirect)
12041 return TRUE;
12042
12043 merge_got_entries (&h->got.glist);
12044
12045 return TRUE;
12046 }
12047
12048 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12049 symbol H. */
12050
12051 static bfd_boolean
12052 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12053 {
12054 struct got_entry *gent;
12055
12056 if (h->root.type == bfd_link_hash_indirect)
12057 return TRUE;
12058
12059 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12060 if (!gent->is_indirect)
12061 allocate_got (h, (struct bfd_link_info *) inf, gent);
12062 return TRUE;
12063 }
12064
12065 /* Called on the first multitoc pass after the last call to
12066 ppc64_elf_next_toc_section. This function removes duplicate GOT
12067 entries. */
12068
12069 bfd_boolean
12070 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12071 {
12072 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12073 struct bfd *ibfd, *ibfd2;
12074 bfd_boolean done_something;
12075
12076 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12077
12078 if (!htab->do_multi_toc)
12079 return FALSE;
12080
12081 /* Merge global sym got entries within a toc group. */
12082 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12083
12084 /* And tlsld_got. */
12085 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12086 {
12087 struct got_entry *ent, *ent2;
12088
12089 if (!is_ppc64_elf (ibfd))
12090 continue;
12091
12092 ent = ppc64_tlsld_got (ibfd);
12093 if (!ent->is_indirect
12094 && ent->got.offset != (bfd_vma) -1)
12095 {
12096 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12097 {
12098 if (!is_ppc64_elf (ibfd2))
12099 continue;
12100
12101 ent2 = ppc64_tlsld_got (ibfd2);
12102 if (!ent2->is_indirect
12103 && ent2->got.offset != (bfd_vma) -1
12104 && elf_gp (ibfd2) == elf_gp (ibfd))
12105 {
12106 ent2->is_indirect = TRUE;
12107 ent2->got.ent = ent;
12108 }
12109 }
12110 }
12111 }
12112
12113 /* Zap sizes of got sections. */
12114 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12115 htab->elf.irelplt->size -= htab->got_reli_size;
12116 htab->got_reli_size = 0;
12117
12118 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12119 {
12120 asection *got, *relgot;
12121
12122 if (!is_ppc64_elf (ibfd))
12123 continue;
12124
12125 got = ppc64_elf_tdata (ibfd)->got;
12126 if (got != NULL)
12127 {
12128 got->rawsize = got->size;
12129 got->size = 0;
12130 relgot = ppc64_elf_tdata (ibfd)->relgot;
12131 relgot->rawsize = relgot->size;
12132 relgot->size = 0;
12133 }
12134 }
12135
12136 /* Now reallocate the got, local syms first. We don't need to
12137 allocate section contents again since we never increase size. */
12138 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12139 {
12140 struct got_entry **lgot_ents;
12141 struct got_entry **end_lgot_ents;
12142 struct plt_entry **local_plt;
12143 struct plt_entry **end_local_plt;
12144 unsigned char *lgot_masks;
12145 bfd_size_type locsymcount;
12146 Elf_Internal_Shdr *symtab_hdr;
12147 asection *s;
12148
12149 if (!is_ppc64_elf (ibfd))
12150 continue;
12151
12152 lgot_ents = elf_local_got_ents (ibfd);
12153 if (!lgot_ents)
12154 continue;
12155
12156 symtab_hdr = &elf_symtab_hdr (ibfd);
12157 locsymcount = symtab_hdr->sh_info;
12158 end_lgot_ents = lgot_ents + locsymcount;
12159 local_plt = (struct plt_entry **) end_lgot_ents;
12160 end_local_plt = local_plt + locsymcount;
12161 lgot_masks = (unsigned char *) end_local_plt;
12162 s = ppc64_elf_tdata (ibfd)->got;
12163 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12164 {
12165 struct got_entry *ent;
12166
12167 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12168 {
12169 unsigned int ent_size = 8;
12170 unsigned int rel_size = sizeof (Elf64_External_Rela);
12171
12172 ent->got.offset = s->size;
12173 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12174 {
12175 ent_size *= 2;
12176 rel_size *= 2;
12177 }
12178 s->size += ent_size;
12179 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12180 {
12181 htab->elf.irelplt->size += rel_size;
12182 htab->got_reli_size += rel_size;
12183 }
12184 else if (bfd_link_pic (info)
12185 && !(ent->tls_type != 0
12186 && bfd_link_executable (info)))
12187 {
12188 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12189 srel->size += rel_size;
12190 }
12191 }
12192 }
12193 }
12194
12195 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12196
12197 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12198 {
12199 struct got_entry *ent;
12200
12201 if (!is_ppc64_elf (ibfd))
12202 continue;
12203
12204 ent = ppc64_tlsld_got (ibfd);
12205 if (!ent->is_indirect
12206 && ent->got.offset != (bfd_vma) -1)
12207 {
12208 asection *s = ppc64_elf_tdata (ibfd)->got;
12209 ent->got.offset = s->size;
12210 s->size += 16;
12211 if (bfd_link_dll (info))
12212 {
12213 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12214 srel->size += sizeof (Elf64_External_Rela);
12215 }
12216 }
12217 }
12218
12219 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12220 if (!done_something)
12221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12222 {
12223 asection *got;
12224
12225 if (!is_ppc64_elf (ibfd))
12226 continue;
12227
12228 got = ppc64_elf_tdata (ibfd)->got;
12229 if (got != NULL)
12230 {
12231 done_something = got->rawsize != got->size;
12232 if (done_something)
12233 break;
12234 }
12235 }
12236
12237 if (done_something)
12238 (*htab->params->layout_sections_again) ();
12239
12240 /* Set up for second pass over toc sections to recalculate elf_gp
12241 on input sections. */
12242 htab->toc_bfd = NULL;
12243 htab->toc_first_sec = NULL;
12244 htab->second_toc_pass = TRUE;
12245 return done_something;
12246 }
12247
12248 /* Called after second pass of multitoc partitioning. */
12249
12250 void
12251 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12252 {
12253 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12254
12255 /* After the second pass, toc_curr tracks the TOC offset used
12256 for code sections below in ppc64_elf_next_input_section. */
12257 htab->toc_curr = TOC_BASE_OFF;
12258 }
12259
12260 /* No toc references were found in ISEC. If the code in ISEC makes no
12261 calls, then there's no need to use toc adjusting stubs when branching
12262 into ISEC. Actually, indirect calls from ISEC are OK as they will
12263 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12264 needed, and 2 if a cyclical call-graph was found but no other reason
12265 for a stub was detected. If called from the top level, a return of
12266 2 means the same as a return of 0. */
12267
12268 static int
12269 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12270 {
12271 int ret;
12272
12273 /* Mark this section as checked. */
12274 isec->call_check_done = 1;
12275
12276 /* We know none of our code bearing sections will need toc stubs. */
12277 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12278 return 0;
12279
12280 if (isec->size == 0)
12281 return 0;
12282
12283 if (isec->output_section == NULL)
12284 return 0;
12285
12286 ret = 0;
12287 if (isec->reloc_count != 0)
12288 {
12289 Elf_Internal_Rela *relstart, *rel;
12290 Elf_Internal_Sym *local_syms;
12291 struct ppc_link_hash_table *htab;
12292
12293 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12294 info->keep_memory);
12295 if (relstart == NULL)
12296 return -1;
12297
12298 /* Look for branches to outside of this section. */
12299 local_syms = NULL;
12300 htab = ppc_hash_table (info);
12301 if (htab == NULL)
12302 return -1;
12303
12304 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12305 {
12306 enum elf_ppc64_reloc_type r_type;
12307 unsigned long r_symndx;
12308 struct elf_link_hash_entry *h;
12309 struct ppc_link_hash_entry *eh;
12310 Elf_Internal_Sym *sym;
12311 asection *sym_sec;
12312 struct _opd_sec_data *opd;
12313 bfd_vma sym_value;
12314 bfd_vma dest;
12315
12316 r_type = ELF64_R_TYPE (rel->r_info);
12317 if (r_type != R_PPC64_REL24
12318 && r_type != R_PPC64_REL24_NOTOC
12319 && r_type != R_PPC64_REL14
12320 && r_type != R_PPC64_REL14_BRTAKEN
12321 && r_type != R_PPC64_REL14_BRNTAKEN
12322 && r_type != R_PPC64_PLTCALL
12323 && r_type != R_PPC64_PLTCALL_NOTOC)
12324 continue;
12325
12326 r_symndx = ELF64_R_SYM (rel->r_info);
12327 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12328 isec->owner))
12329 {
12330 ret = -1;
12331 break;
12332 }
12333
12334 /* Calls to dynamic lib functions go through a plt call stub
12335 that uses r2. */
12336 eh = (struct ppc_link_hash_entry *) h;
12337 if (eh != NULL
12338 && (eh->elf.plt.plist != NULL
12339 || (eh->oh != NULL
12340 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12341 {
12342 ret = 1;
12343 break;
12344 }
12345
12346 if (sym_sec == NULL)
12347 /* Ignore other undefined symbols. */
12348 continue;
12349
12350 /* Assume branches to other sections not included in the
12351 link need stubs too, to cover -R and absolute syms. */
12352 if (sym_sec->output_section == NULL)
12353 {
12354 ret = 1;
12355 break;
12356 }
12357
12358 if (h == NULL)
12359 sym_value = sym->st_value;
12360 else
12361 {
12362 if (h->root.type != bfd_link_hash_defined
12363 && h->root.type != bfd_link_hash_defweak)
12364 abort ();
12365 sym_value = h->root.u.def.value;
12366 }
12367 sym_value += rel->r_addend;
12368
12369 /* If this branch reloc uses an opd sym, find the code section. */
12370 opd = get_opd_info (sym_sec);
12371 if (opd != NULL)
12372 {
12373 if (h == NULL && opd->adjust != NULL)
12374 {
12375 long adjust;
12376
12377 adjust = opd->adjust[OPD_NDX (sym_value)];
12378 if (adjust == -1)
12379 /* Assume deleted functions won't ever be called. */
12380 continue;
12381 sym_value += adjust;
12382 }
12383
12384 dest = opd_entry_value (sym_sec, sym_value,
12385 &sym_sec, NULL, FALSE);
12386 if (dest == (bfd_vma) -1)
12387 continue;
12388 }
12389 else
12390 dest = (sym_value
12391 + sym_sec->output_offset
12392 + sym_sec->output_section->vma);
12393
12394 /* Ignore branch to self. */
12395 if (sym_sec == isec)
12396 continue;
12397
12398 /* If the called function uses the toc, we need a stub. */
12399 if (sym_sec->has_toc_reloc
12400 || sym_sec->makes_toc_func_call)
12401 {
12402 ret = 1;
12403 break;
12404 }
12405
12406 /* Assume any branch that needs a long branch stub might in fact
12407 need a plt_branch stub. A plt_branch stub uses r2. */
12408 else if (dest - (isec->output_offset
12409 + isec->output_section->vma
12410 + rel->r_offset) + (1 << 25)
12411 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12412 ? h->other
12413 : sym->st_other))
12414 {
12415 ret = 1;
12416 break;
12417 }
12418
12419 /* If calling back to a section in the process of being
12420 tested, we can't say for sure that no toc adjusting stubs
12421 are needed, so don't return zero. */
12422 else if (sym_sec->call_check_in_progress)
12423 ret = 2;
12424
12425 /* Branches to another section that itself doesn't have any TOC
12426 references are OK. Recursively call ourselves to check. */
12427 else if (!sym_sec->call_check_done)
12428 {
12429 int recur;
12430
12431 /* Mark current section as indeterminate, so that other
12432 sections that call back to current won't be marked as
12433 known. */
12434 isec->call_check_in_progress = 1;
12435 recur = toc_adjusting_stub_needed (info, sym_sec);
12436 isec->call_check_in_progress = 0;
12437
12438 if (recur != 0)
12439 {
12440 ret = recur;
12441 if (recur != 2)
12442 break;
12443 }
12444 }
12445 }
12446
12447 if (local_syms != NULL
12448 && (elf_symtab_hdr (isec->owner).contents
12449 != (unsigned char *) local_syms))
12450 free (local_syms);
12451 if (elf_section_data (isec)->relocs != relstart)
12452 free (relstart);
12453 }
12454
12455 if ((ret & 1) == 0
12456 && isec->map_head.s != NULL
12457 && (strcmp (isec->output_section->name, ".init") == 0
12458 || strcmp (isec->output_section->name, ".fini") == 0))
12459 {
12460 if (isec->map_head.s->has_toc_reloc
12461 || isec->map_head.s->makes_toc_func_call)
12462 ret = 1;
12463 else if (!isec->map_head.s->call_check_done)
12464 {
12465 int recur;
12466 isec->call_check_in_progress = 1;
12467 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12468 isec->call_check_in_progress = 0;
12469 if (recur != 0)
12470 ret = recur;
12471 }
12472 }
12473
12474 if (ret == 1)
12475 isec->makes_toc_func_call = 1;
12476
12477 return ret;
12478 }
12479
12480 /* The linker repeatedly calls this function for each input section,
12481 in the order that input sections are linked into output sections.
12482 Build lists of input sections to determine groupings between which
12483 we may insert linker stubs. */
12484
12485 bfd_boolean
12486 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12487 {
12488 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12489
12490 if (htab == NULL)
12491 return FALSE;
12492
12493 if ((isec->output_section->flags & SEC_CODE) != 0
12494 && isec->output_section->id < htab->sec_info_arr_size)
12495 {
12496 /* This happens to make the list in reverse order,
12497 which is what we want. */
12498 htab->sec_info[isec->id].u.list
12499 = htab->sec_info[isec->output_section->id].u.list;
12500 htab->sec_info[isec->output_section->id].u.list = isec;
12501 }
12502
12503 if (htab->multi_toc_needed)
12504 {
12505 /* Analyse sections that aren't already flagged as needing a
12506 valid toc pointer. Exclude .fixup for the linux kernel.
12507 .fixup contains branches, but only back to the function that
12508 hit an exception. */
12509 if (!(isec->has_toc_reloc
12510 || (isec->flags & SEC_CODE) == 0
12511 || strcmp (isec->name, ".fixup") == 0
12512 || isec->call_check_done))
12513 {
12514 if (toc_adjusting_stub_needed (info, isec) < 0)
12515 return FALSE;
12516 }
12517 /* Make all sections use the TOC assigned for this object file.
12518 This will be wrong for pasted sections; We fix that in
12519 check_pasted_section(). */
12520 if (elf_gp (isec->owner) != 0)
12521 htab->toc_curr = elf_gp (isec->owner);
12522 }
12523
12524 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12525 return TRUE;
12526 }
12527
12528 /* Check that all .init and .fini sections use the same toc, if they
12529 have toc relocs. */
12530
12531 static bfd_boolean
12532 check_pasted_section (struct bfd_link_info *info, const char *name)
12533 {
12534 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12535
12536 if (o != NULL)
12537 {
12538 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12539 bfd_vma toc_off = 0;
12540 asection *i;
12541
12542 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12543 if (i->has_toc_reloc)
12544 {
12545 if (toc_off == 0)
12546 toc_off = htab->sec_info[i->id].toc_off;
12547 else if (toc_off != htab->sec_info[i->id].toc_off)
12548 return FALSE;
12549 }
12550
12551 if (toc_off == 0)
12552 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12553 if (i->makes_toc_func_call)
12554 {
12555 toc_off = htab->sec_info[i->id].toc_off;
12556 break;
12557 }
12558
12559 /* Make sure the whole pasted function uses the same toc offset. */
12560 if (toc_off != 0)
12561 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12562 htab->sec_info[i->id].toc_off = toc_off;
12563 }
12564 return TRUE;
12565 }
12566
12567 bfd_boolean
12568 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12569 {
12570 return (check_pasted_section (info, ".init")
12571 & check_pasted_section (info, ".fini"));
12572 }
12573
12574 /* See whether we can group stub sections together. Grouping stub
12575 sections may result in fewer stubs. More importantly, we need to
12576 put all .init* and .fini* stubs at the beginning of the .init or
12577 .fini output sections respectively, because glibc splits the
12578 _init and _fini functions into multiple parts. Putting a stub in
12579 the middle of a function is not a good idea. */
12580
12581 static bfd_boolean
12582 group_sections (struct bfd_link_info *info,
12583 bfd_size_type stub_group_size,
12584 bfd_boolean stubs_always_before_branch)
12585 {
12586 struct ppc_link_hash_table *htab;
12587 asection *osec;
12588 bfd_boolean suppress_size_errors;
12589
12590 htab = ppc_hash_table (info);
12591 if (htab == NULL)
12592 return FALSE;
12593
12594 suppress_size_errors = FALSE;
12595 if (stub_group_size == 1)
12596 {
12597 /* Default values. */
12598 if (stubs_always_before_branch)
12599 stub_group_size = 0x1e00000;
12600 else
12601 stub_group_size = 0x1c00000;
12602 suppress_size_errors = TRUE;
12603 }
12604
12605 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12606 {
12607 asection *tail;
12608
12609 if (osec->id >= htab->sec_info_arr_size)
12610 continue;
12611
12612 tail = htab->sec_info[osec->id].u.list;
12613 while (tail != NULL)
12614 {
12615 asection *curr;
12616 asection *prev;
12617 bfd_size_type total;
12618 bfd_boolean big_sec;
12619 bfd_vma curr_toc;
12620 struct map_stub *group;
12621 bfd_size_type group_size;
12622
12623 curr = tail;
12624 total = tail->size;
12625 group_size = (ppc64_elf_section_data (tail) != NULL
12626 && ppc64_elf_section_data (tail)->has_14bit_branch
12627 ? stub_group_size >> 10 : stub_group_size);
12628
12629 big_sec = total > group_size;
12630 if (big_sec && !suppress_size_errors)
12631 /* xgettext:c-format */
12632 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12633 tail->owner, tail);
12634 curr_toc = htab->sec_info[tail->id].toc_off;
12635
12636 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12637 && ((total += curr->output_offset - prev->output_offset)
12638 < (ppc64_elf_section_data (prev) != NULL
12639 && ppc64_elf_section_data (prev)->has_14bit_branch
12640 ? (group_size = stub_group_size >> 10) : group_size))
12641 && htab->sec_info[prev->id].toc_off == curr_toc)
12642 curr = prev;
12643
12644 /* OK, the size from the start of CURR to the end is less
12645 than group_size and thus can be handled by one stub
12646 section. (or the tail section is itself larger than
12647 group_size, in which case we may be toast.) We should
12648 really be keeping track of the total size of stubs added
12649 here, as stubs contribute to the final output section
12650 size. That's a little tricky, and this way will only
12651 break if stubs added make the total size more than 2^25,
12652 ie. for the default stub_group_size, if stubs total more
12653 than 2097152 bytes, or nearly 75000 plt call stubs. */
12654 group = bfd_alloc (curr->owner, sizeof (*group));
12655 if (group == NULL)
12656 return FALSE;
12657 group->link_sec = curr;
12658 group->stub_sec = NULL;
12659 group->needs_save_res = 0;
12660 group->lr_restore = 0;
12661 group->eh_size = 0;
12662 group->eh_base = 0;
12663 group->next = htab->group;
12664 htab->group = group;
12665 do
12666 {
12667 prev = htab->sec_info[tail->id].u.list;
12668 /* Set up this stub group. */
12669 htab->sec_info[tail->id].u.group = group;
12670 }
12671 while (tail != curr && (tail = prev) != NULL);
12672
12673 /* But wait, there's more! Input sections up to group_size
12674 bytes before the stub section can be handled by it too.
12675 Don't do this if we have a really large section after the
12676 stubs, as adding more stubs increases the chance that
12677 branches may not reach into the stub section. */
12678 if (!stubs_always_before_branch && !big_sec)
12679 {
12680 total = 0;
12681 while (prev != NULL
12682 && ((total += tail->output_offset - prev->output_offset)
12683 < (ppc64_elf_section_data (prev) != NULL
12684 && ppc64_elf_section_data (prev)->has_14bit_branch
12685 ? (group_size = stub_group_size >> 10)
12686 : group_size))
12687 && htab->sec_info[prev->id].toc_off == curr_toc)
12688 {
12689 tail = prev;
12690 prev = htab->sec_info[tail->id].u.list;
12691 htab->sec_info[tail->id].u.group = group;
12692 }
12693 }
12694 tail = prev;
12695 }
12696 }
12697 return TRUE;
12698 }
12699
12700 static const unsigned char glink_eh_frame_cie[] =
12701 {
12702 0, 0, 0, 16, /* length. */
12703 0, 0, 0, 0, /* id. */
12704 1, /* CIE version. */
12705 'z', 'R', 0, /* Augmentation string. */
12706 4, /* Code alignment. */
12707 0x78, /* Data alignment. */
12708 65, /* RA reg. */
12709 1, /* Augmentation size. */
12710 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12711 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
12712 };
12713
12714 /* Stripping output sections is normally done before dynamic section
12715 symbols have been allocated. This function is called later, and
12716 handles cases like htab->brlt which is mapped to its own output
12717 section. */
12718
12719 static void
12720 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12721 {
12722 if (isec->size == 0
12723 && isec->output_section->size == 0
12724 && !(isec->output_section->flags & SEC_KEEP)
12725 && !bfd_section_removed_from_list (info->output_bfd,
12726 isec->output_section)
12727 && elf_section_data (isec->output_section)->dynindx == 0)
12728 {
12729 isec->output_section->flags |= SEC_EXCLUDE;
12730 bfd_section_list_remove (info->output_bfd, isec->output_section);
12731 info->output_bfd->section_count--;
12732 }
12733 }
12734
12735 /* Determine and set the size of the stub section for a final link.
12736
12737 The basic idea here is to examine all the relocations looking for
12738 PC-relative calls to a target that is unreachable with a "bl"
12739 instruction. */
12740
12741 bfd_boolean
12742 ppc64_elf_size_stubs (struct bfd_link_info *info)
12743 {
12744 bfd_size_type stub_group_size;
12745 bfd_boolean stubs_always_before_branch;
12746 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12747
12748 if (htab == NULL)
12749 return FALSE;
12750
12751 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12752 htab->params->plt_thread_safe = 1;
12753 if (!htab->opd_abi)
12754 htab->params->plt_thread_safe = 0;
12755 else if (htab->params->plt_thread_safe == -1)
12756 {
12757 static const char *const thread_starter[] =
12758 {
12759 "pthread_create",
12760 /* libstdc++ */
12761 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12762 /* librt */
12763 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12764 "mq_notify", "create_timer",
12765 /* libanl */
12766 "getaddrinfo_a",
12767 /* libgomp */
12768 "GOMP_parallel",
12769 "GOMP_parallel_start",
12770 "GOMP_parallel_loop_static",
12771 "GOMP_parallel_loop_static_start",
12772 "GOMP_parallel_loop_dynamic",
12773 "GOMP_parallel_loop_dynamic_start",
12774 "GOMP_parallel_loop_guided",
12775 "GOMP_parallel_loop_guided_start",
12776 "GOMP_parallel_loop_runtime",
12777 "GOMP_parallel_loop_runtime_start",
12778 "GOMP_parallel_sections",
12779 "GOMP_parallel_sections_start",
12780 /* libgo */
12781 "__go_go",
12782 };
12783 unsigned i;
12784
12785 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12786 {
12787 struct elf_link_hash_entry *h;
12788 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12789 FALSE, FALSE, TRUE);
12790 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12791 if (htab->params->plt_thread_safe)
12792 break;
12793 }
12794 }
12795 stubs_always_before_branch = htab->params->group_size < 0;
12796 if (htab->params->group_size < 0)
12797 stub_group_size = -htab->params->group_size;
12798 else
12799 stub_group_size = htab->params->group_size;
12800
12801 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12802 return FALSE;
12803
12804 #define STUB_SHRINK_ITER 20
12805 /* Loop until no stubs added. After iteration 20 of this loop we may
12806 exit on a stub section shrinking. This is to break out of a
12807 pathological case where adding stubs on one iteration decreases
12808 section gaps (perhaps due to alignment), which then requires
12809 fewer or smaller stubs on the next iteration. */
12810
12811 while (1)
12812 {
12813 bfd *input_bfd;
12814 unsigned int bfd_indx;
12815 struct map_stub *group;
12816
12817 htab->stub_iteration += 1;
12818
12819 for (input_bfd = info->input_bfds, bfd_indx = 0;
12820 input_bfd != NULL;
12821 input_bfd = input_bfd->link.next, bfd_indx++)
12822 {
12823 Elf_Internal_Shdr *symtab_hdr;
12824 asection *section;
12825 Elf_Internal_Sym *local_syms = NULL;
12826
12827 if (!is_ppc64_elf (input_bfd))
12828 continue;
12829
12830 /* We'll need the symbol table in a second. */
12831 symtab_hdr = &elf_symtab_hdr (input_bfd);
12832 if (symtab_hdr->sh_info == 0)
12833 continue;
12834
12835 /* Walk over each section attached to the input bfd. */
12836 for (section = input_bfd->sections;
12837 section != NULL;
12838 section = section->next)
12839 {
12840 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12841
12842 /* If there aren't any relocs, then there's nothing more
12843 to do. */
12844 if ((section->flags & SEC_RELOC) == 0
12845 || (section->flags & SEC_ALLOC) == 0
12846 || (section->flags & SEC_LOAD) == 0
12847 || (section->flags & SEC_CODE) == 0
12848 || section->reloc_count == 0)
12849 continue;
12850
12851 /* If this section is a link-once section that will be
12852 discarded, then don't create any stubs. */
12853 if (section->output_section == NULL
12854 || section->output_section->owner != info->output_bfd)
12855 continue;
12856
12857 /* Get the relocs. */
12858 internal_relocs
12859 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12860 info->keep_memory);
12861 if (internal_relocs == NULL)
12862 goto error_ret_free_local;
12863
12864 /* Now examine each relocation. */
12865 irela = internal_relocs;
12866 irelaend = irela + section->reloc_count;
12867 for (; irela < irelaend; irela++)
12868 {
12869 enum elf_ppc64_reloc_type r_type;
12870 unsigned int r_indx;
12871 enum ppc_stub_type stub_type;
12872 struct ppc_stub_hash_entry *stub_entry;
12873 asection *sym_sec, *code_sec;
12874 bfd_vma sym_value, code_value;
12875 bfd_vma destination;
12876 unsigned long local_off;
12877 bfd_boolean ok_dest;
12878 struct ppc_link_hash_entry *hash;
12879 struct ppc_link_hash_entry *fdh;
12880 struct elf_link_hash_entry *h;
12881 Elf_Internal_Sym *sym;
12882 char *stub_name;
12883 const asection *id_sec;
12884 struct _opd_sec_data *opd;
12885 struct plt_entry *plt_ent;
12886
12887 r_type = ELF64_R_TYPE (irela->r_info);
12888 r_indx = ELF64_R_SYM (irela->r_info);
12889
12890 if (r_type >= R_PPC64_max)
12891 {
12892 bfd_set_error (bfd_error_bad_value);
12893 goto error_ret_free_internal;
12894 }
12895
12896 /* Only look for stubs on branch instructions. */
12897 if (r_type != R_PPC64_REL24
12898 && r_type != R_PPC64_REL24_NOTOC
12899 && r_type != R_PPC64_REL14
12900 && r_type != R_PPC64_REL14_BRTAKEN
12901 && r_type != R_PPC64_REL14_BRNTAKEN)
12902 continue;
12903
12904 /* Now determine the call target, its name, value,
12905 section. */
12906 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12907 r_indx, input_bfd))
12908 goto error_ret_free_internal;
12909 hash = (struct ppc_link_hash_entry *) h;
12910
12911 ok_dest = FALSE;
12912 fdh = NULL;
12913 sym_value = 0;
12914 if (hash == NULL)
12915 {
12916 sym_value = sym->st_value;
12917 if (sym_sec != NULL
12918 && sym_sec->output_section != NULL)
12919 ok_dest = TRUE;
12920 }
12921 else if (hash->elf.root.type == bfd_link_hash_defined
12922 || hash->elf.root.type == bfd_link_hash_defweak)
12923 {
12924 sym_value = hash->elf.root.u.def.value;
12925 if (sym_sec->output_section != NULL)
12926 ok_dest = TRUE;
12927 }
12928 else if (hash->elf.root.type == bfd_link_hash_undefweak
12929 || hash->elf.root.type == bfd_link_hash_undefined)
12930 {
12931 /* Recognise an old ABI func code entry sym, and
12932 use the func descriptor sym instead if it is
12933 defined. */
12934 if (hash->elf.root.root.string[0] == '.'
12935 && hash->oh != NULL)
12936 {
12937 fdh = ppc_follow_link (hash->oh);
12938 if (fdh->elf.root.type == bfd_link_hash_defined
12939 || fdh->elf.root.type == bfd_link_hash_defweak)
12940 {
12941 sym_sec = fdh->elf.root.u.def.section;
12942 sym_value = fdh->elf.root.u.def.value;
12943 if (sym_sec->output_section != NULL)
12944 ok_dest = TRUE;
12945 }
12946 else
12947 fdh = NULL;
12948 }
12949 }
12950 else
12951 {
12952 bfd_set_error (bfd_error_bad_value);
12953 goto error_ret_free_internal;
12954 }
12955
12956 destination = 0;
12957 local_off = 0;
12958 if (ok_dest)
12959 {
12960 sym_value += irela->r_addend;
12961 destination = (sym_value
12962 + sym_sec->output_offset
12963 + sym_sec->output_section->vma);
12964 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12965 ? hash->elf.other
12966 : sym->st_other);
12967 }
12968
12969 code_sec = sym_sec;
12970 code_value = sym_value;
12971 opd = get_opd_info (sym_sec);
12972 if (opd != NULL)
12973 {
12974 bfd_vma dest;
12975
12976 if (hash == NULL && opd->adjust != NULL)
12977 {
12978 long adjust = opd->adjust[OPD_NDX (sym_value)];
12979 if (adjust == -1)
12980 continue;
12981 code_value += adjust;
12982 sym_value += adjust;
12983 }
12984 dest = opd_entry_value (sym_sec, sym_value,
12985 &code_sec, &code_value, FALSE);
12986 if (dest != (bfd_vma) -1)
12987 {
12988 destination = dest;
12989 if (fdh != NULL)
12990 {
12991 /* Fixup old ABI sym to point at code
12992 entry. */
12993 hash->elf.root.type = bfd_link_hash_defweak;
12994 hash->elf.root.u.def.section = code_sec;
12995 hash->elf.root.u.def.value = code_value;
12996 }
12997 }
12998 }
12999
13000 /* Determine what (if any) linker stub is needed. */
13001 plt_ent = NULL;
13002 stub_type = ppc_type_of_stub (section, irela, &hash,
13003 &plt_ent, destination,
13004 local_off);
13005
13006 if (r_type == R_PPC64_REL24_NOTOC)
13007 {
13008 if (stub_type == ppc_stub_plt_call)
13009 stub_type = ppc_stub_plt_call_notoc;
13010 else if (stub_type == ppc_stub_long_branch
13011 || (code_sec != NULL
13012 && code_sec->output_section != NULL
13013 && (((hash ? hash->elf.other : sym->st_other)
13014 & STO_PPC64_LOCAL_MASK)
13015 > 1 << STO_PPC64_LOCAL_BIT)))
13016 stub_type = ppc_stub_long_branch_notoc;
13017 }
13018 else if (stub_type != ppc_stub_plt_call)
13019 {
13020 /* Check whether we need a TOC adjusting stub.
13021 Since the linker pastes together pieces from
13022 different object files when creating the
13023 _init and _fini functions, it may be that a
13024 call to what looks like a local sym is in
13025 fact a call needing a TOC adjustment. */
13026 if ((code_sec != NULL
13027 && code_sec->output_section != NULL
13028 && (htab->sec_info[code_sec->id].toc_off
13029 != htab->sec_info[section->id].toc_off)
13030 && (code_sec->has_toc_reloc
13031 || code_sec->makes_toc_func_call))
13032 || (((hash ? hash->elf.other : sym->st_other)
13033 & STO_PPC64_LOCAL_MASK)
13034 == 1 << STO_PPC64_LOCAL_BIT))
13035 stub_type = ppc_stub_long_branch_r2off;
13036 }
13037
13038 if (stub_type == ppc_stub_none)
13039 continue;
13040
13041 /* __tls_get_addr calls might be eliminated. */
13042 if (stub_type != ppc_stub_plt_call
13043 && stub_type != ppc_stub_plt_call_notoc
13044 && hash != NULL
13045 && (hash == htab->tls_get_addr
13046 || hash == htab->tls_get_addr_fd)
13047 && section->has_tls_reloc
13048 && irela != internal_relocs)
13049 {
13050 /* Get tls info. */
13051 unsigned char *tls_mask;
13052
13053 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13054 irela - 1, input_bfd))
13055 goto error_ret_free_internal;
13056 if ((*tls_mask & TLS_TLS) != 0)
13057 continue;
13058 }
13059
13060 if (stub_type == ppc_stub_plt_call)
13061 {
13062 if (!htab->opd_abi
13063 && htab->params->plt_localentry0 != 0
13064 && is_elfv2_localentry0 (&hash->elf))
13065 htab->has_plt_localentry0 = 1;
13066 else if (irela + 1 < irelaend
13067 && irela[1].r_offset == irela->r_offset + 4
13068 && (ELF64_R_TYPE (irela[1].r_info)
13069 == R_PPC64_TOCSAVE))
13070 {
13071 if (!tocsave_find (htab, INSERT,
13072 &local_syms, irela + 1, input_bfd))
13073 goto error_ret_free_internal;
13074 }
13075 else
13076 stub_type = ppc_stub_plt_call_r2save;
13077 }
13078
13079 /* Support for grouping stub sections. */
13080 id_sec = htab->sec_info[section->id].u.group->link_sec;
13081
13082 /* Get the name of this stub. */
13083 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13084 if (!stub_name)
13085 goto error_ret_free_internal;
13086
13087 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13088 stub_name, FALSE, FALSE);
13089 if (stub_entry != NULL)
13090 {
13091 enum ppc_stub_type old_type;
13092 /* A stub has already been created, but it may
13093 not be the required type. We shouldn't be
13094 transitioning from plt_call to long_branch
13095 stubs or vice versa, but we might be
13096 upgrading from plt_call to plt_call_r2save or
13097 from long_branch to long_branch_r2off. */
13098 free (stub_name);
13099 old_type = stub_entry->stub_type;
13100 switch (old_type)
13101 {
13102 default:
13103 abort ();
13104
13105 case ppc_stub_save_res:
13106 continue;
13107
13108 case ppc_stub_plt_call:
13109 case ppc_stub_plt_call_r2save:
13110 case ppc_stub_plt_call_notoc:
13111 case ppc_stub_plt_call_both:
13112 if (stub_type == ppc_stub_plt_call)
13113 continue;
13114 else if (stub_type == ppc_stub_plt_call_r2save)
13115 {
13116 if (old_type == ppc_stub_plt_call_notoc)
13117 stub_type = ppc_stub_plt_call_both;
13118 }
13119 else if (stub_type == ppc_stub_plt_call_notoc)
13120 {
13121 if (old_type == ppc_stub_plt_call_r2save)
13122 stub_type = ppc_stub_plt_call_both;
13123 }
13124 else
13125 abort ();
13126 break;
13127
13128 case ppc_stub_plt_branch:
13129 case ppc_stub_plt_branch_r2off:
13130 case ppc_stub_plt_branch_notoc:
13131 case ppc_stub_plt_branch_both:
13132 old_type += (ppc_stub_long_branch
13133 - ppc_stub_plt_branch);
13134 /* Fall through. */
13135 case ppc_stub_long_branch:
13136 case ppc_stub_long_branch_r2off:
13137 case ppc_stub_long_branch_notoc:
13138 case ppc_stub_long_branch_both:
13139 if (stub_type == ppc_stub_long_branch)
13140 continue;
13141 else if (stub_type == ppc_stub_long_branch_r2off)
13142 {
13143 if (old_type == ppc_stub_long_branch_notoc)
13144 stub_type = ppc_stub_long_branch_both;
13145 }
13146 else if (stub_type == ppc_stub_long_branch_notoc)
13147 {
13148 if (old_type == ppc_stub_long_branch_r2off)
13149 stub_type = ppc_stub_long_branch_both;
13150 }
13151 else
13152 abort ();
13153 break;
13154 }
13155 if (old_type < stub_type)
13156 stub_entry->stub_type = stub_type;
13157 continue;
13158 }
13159
13160 stub_entry = ppc_add_stub (stub_name, section, info);
13161 if (stub_entry == NULL)
13162 {
13163 free (stub_name);
13164 error_ret_free_internal:
13165 if (elf_section_data (section)->relocs == NULL)
13166 free (internal_relocs);
13167 error_ret_free_local:
13168 if (local_syms != NULL
13169 && (symtab_hdr->contents
13170 != (unsigned char *) local_syms))
13171 free (local_syms);
13172 return FALSE;
13173 }
13174
13175 stub_entry->stub_type = stub_type;
13176 if (stub_type >= ppc_stub_plt_call
13177 && stub_type <= ppc_stub_plt_call_both)
13178 {
13179 stub_entry->target_value = sym_value;
13180 stub_entry->target_section = sym_sec;
13181 }
13182 else
13183 {
13184 stub_entry->target_value = code_value;
13185 stub_entry->target_section = code_sec;
13186 }
13187 stub_entry->h = hash;
13188 stub_entry->plt_ent = plt_ent;
13189 stub_entry->symtype
13190 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13191 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13192
13193 if (hash != NULL
13194 && (hash->elf.root.type == bfd_link_hash_defined
13195 || hash->elf.root.type == bfd_link_hash_defweak))
13196 htab->stub_globals += 1;
13197 }
13198
13199 /* We're done with the internal relocs, free them. */
13200 if (elf_section_data (section)->relocs != internal_relocs)
13201 free (internal_relocs);
13202 }
13203
13204 if (local_syms != NULL
13205 && symtab_hdr->contents != (unsigned char *) local_syms)
13206 {
13207 if (!info->keep_memory)
13208 free (local_syms);
13209 else
13210 symtab_hdr->contents = (unsigned char *) local_syms;
13211 }
13212 }
13213
13214 /* We may have added some stubs. Find out the new size of the
13215 stub sections. */
13216 for (group = htab->group; group != NULL; group = group->next)
13217 {
13218 group->lr_restore = 0;
13219 group->eh_size = 0;
13220 if (group->stub_sec != NULL)
13221 {
13222 asection *stub_sec = group->stub_sec;
13223
13224 if (htab->stub_iteration <= STUB_SHRINK_ITER
13225 || stub_sec->rawsize < stub_sec->size)
13226 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13227 stub_sec->rawsize = stub_sec->size;
13228 stub_sec->size = 0;
13229 stub_sec->reloc_count = 0;
13230 stub_sec->flags &= ~SEC_RELOC;
13231 }
13232 }
13233
13234 if (htab->stub_iteration <= STUB_SHRINK_ITER
13235 || htab->brlt->rawsize < htab->brlt->size)
13236 htab->brlt->rawsize = htab->brlt->size;
13237 htab->brlt->size = 0;
13238 htab->brlt->reloc_count = 0;
13239 htab->brlt->flags &= ~SEC_RELOC;
13240 if (htab->relbrlt != NULL)
13241 htab->relbrlt->size = 0;
13242
13243 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13244
13245 for (group = htab->group; group != NULL; group = group->next)
13246 if (group->needs_save_res)
13247 group->stub_sec->size += htab->sfpr->size;
13248
13249 if (info->emitrelocations
13250 && htab->glink != NULL && htab->glink->size != 0)
13251 {
13252 htab->glink->reloc_count = 1;
13253 htab->glink->flags |= SEC_RELOC;
13254 }
13255
13256 if (htab->glink_eh_frame != NULL
13257 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13258 && htab->glink_eh_frame->output_section->size > 8)
13259 {
13260 size_t size = 0, align = 4;
13261
13262 for (group = htab->group; group != NULL; group = group->next)
13263 if (group->eh_size != 0)
13264 size += (group->eh_size + 17 + align - 1) & -align;
13265 if (htab->glink != NULL && htab->glink->size != 0)
13266 size += (24 + align - 1) & -align;
13267 if (size != 0)
13268 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13269 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13270 size = (size + align - 1) & -align;
13271 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13272 htab->glink_eh_frame->size = size;
13273 }
13274
13275 if (htab->params->plt_stub_align != 0)
13276 for (group = htab->group; group != NULL; group = group->next)
13277 if (group->stub_sec != NULL)
13278 {
13279 int align = abs (htab->params->plt_stub_align);
13280 group->stub_sec->size
13281 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13282 }
13283
13284 for (group = htab->group; group != NULL; group = group->next)
13285 if (group->stub_sec != NULL
13286 && group->stub_sec->rawsize != group->stub_sec->size
13287 && (htab->stub_iteration <= STUB_SHRINK_ITER
13288 || group->stub_sec->rawsize < group->stub_sec->size))
13289 break;
13290
13291 if (group == NULL
13292 && (htab->brlt->rawsize == htab->brlt->size
13293 || (htab->stub_iteration > STUB_SHRINK_ITER
13294 && htab->brlt->rawsize > htab->brlt->size))
13295 && (htab->glink_eh_frame == NULL
13296 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
13297 break;
13298
13299 /* Ask the linker to do its stuff. */
13300 (*htab->params->layout_sections_again) ();
13301 }
13302
13303 if (htab->glink_eh_frame != NULL
13304 && htab->glink_eh_frame->size != 0)
13305 {
13306 bfd_vma val;
13307 bfd_byte *p, *last_fde;
13308 size_t last_fde_len, size, align, pad;
13309 struct map_stub *group;
13310
13311 /* It is necessary to at least have a rough outline of the
13312 linker generated CIEs and FDEs written before
13313 bfd_elf_discard_info is run, in order for these FDEs to be
13314 indexed in .eh_frame_hdr. */
13315 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13316 if (p == NULL)
13317 return FALSE;
13318 htab->glink_eh_frame->contents = p;
13319 last_fde = p;
13320 align = 4;
13321
13322 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13323 /* CIE length (rewrite in case little-endian). */
13324 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13325 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13326 p += last_fde_len + 4;
13327
13328 for (group = htab->group; group != NULL; group = group->next)
13329 if (group->eh_size != 0)
13330 {
13331 group->eh_base = p - htab->glink_eh_frame->contents;
13332 last_fde = p;
13333 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13334 /* FDE length. */
13335 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13336 p += 4;
13337 /* CIE pointer. */
13338 val = p - htab->glink_eh_frame->contents;
13339 bfd_put_32 (htab->elf.dynobj, val, p);
13340 p += 4;
13341 /* Offset to stub section, written later. */
13342 p += 4;
13343 /* stub section size. */
13344 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13345 p += 4;
13346 /* Augmentation. */
13347 p += 1;
13348 /* Make sure we don't have all nops. This is enough for
13349 elf-eh-frame.c to detect the last non-nop opcode. */
13350 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13351 p = last_fde + last_fde_len + 4;
13352 }
13353 if (htab->glink != NULL && htab->glink->size != 0)
13354 {
13355 last_fde = p;
13356 last_fde_len = ((24 + align - 1) & -align) - 4;
13357 /* FDE length. */
13358 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13359 p += 4;
13360 /* CIE pointer. */
13361 val = p - htab->glink_eh_frame->contents;
13362 bfd_put_32 (htab->elf.dynobj, val, p);
13363 p += 4;
13364 /* Offset to .glink, written later. */
13365 p += 4;
13366 /* .glink size. */
13367 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13368 p += 4;
13369 /* Augmentation. */
13370 p += 1;
13371
13372 *p++ = DW_CFA_advance_loc + 1;
13373 *p++ = DW_CFA_register;
13374 *p++ = 65;
13375 *p++ = htab->opd_abi ? 12 : 0;
13376 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13377 *p++ = DW_CFA_restore_extended;
13378 *p++ = 65;
13379 p += ((24 + align - 1) & -align) - 24;
13380 }
13381 /* Subsume any padding into the last FDE if user .eh_frame
13382 sections are aligned more than glink_eh_frame. Otherwise any
13383 zero padding will be seen as a terminator. */
13384 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13385 size = p - htab->glink_eh_frame->contents;
13386 pad = ((size + align - 1) & -align) - size;
13387 htab->glink_eh_frame->size = size + pad;
13388 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13389 }
13390
13391 maybe_strip_output (info, htab->brlt);
13392 if (htab->glink_eh_frame != NULL)
13393 maybe_strip_output (info, htab->glink_eh_frame);
13394
13395 return TRUE;
13396 }
13397
13398 /* Called after we have determined section placement. If sections
13399 move, we'll be called again. Provide a value for TOCstart. */
13400
13401 bfd_vma
13402 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13403 {
13404 asection *s;
13405 bfd_vma TOCstart, adjust;
13406
13407 if (info != NULL)
13408 {
13409 struct elf_link_hash_entry *h;
13410 struct elf_link_hash_table *htab = elf_hash_table (info);
13411
13412 if (is_elf_hash_table (htab)
13413 && htab->hgot != NULL)
13414 h = htab->hgot;
13415 else
13416 {
13417 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13418 if (is_elf_hash_table (htab))
13419 htab->hgot = h;
13420 }
13421 if (h != NULL
13422 && h->root.type == bfd_link_hash_defined
13423 && !h->root.linker_def
13424 && (!is_elf_hash_table (htab)
13425 || h->def_regular))
13426 {
13427 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13428 + h->root.u.def.section->output_offset
13429 + h->root.u.def.section->output_section->vma);
13430 _bfd_set_gp_value (obfd, TOCstart);
13431 return TOCstart;
13432 }
13433 }
13434
13435 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13436 order. The TOC starts where the first of these sections starts. */
13437 s = bfd_get_section_by_name (obfd, ".got");
13438 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13439 s = bfd_get_section_by_name (obfd, ".toc");
13440 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13441 s = bfd_get_section_by_name (obfd, ".tocbss");
13442 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13443 s = bfd_get_section_by_name (obfd, ".plt");
13444 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13445 {
13446 /* This may happen for
13447 o references to TOC base (SYM@toc / TOC[tc0]) without a
13448 .toc directive
13449 o bad linker script
13450 o --gc-sections and empty TOC sections
13451
13452 FIXME: Warn user? */
13453
13454 /* Look for a likely section. We probably won't even be
13455 using TOCstart. */
13456 for (s = obfd->sections; s != NULL; s = s->next)
13457 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13458 | SEC_EXCLUDE))
13459 == (SEC_ALLOC | SEC_SMALL_DATA))
13460 break;
13461 if (s == NULL)
13462 for (s = obfd->sections; s != NULL; s = s->next)
13463 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13464 == (SEC_ALLOC | SEC_SMALL_DATA))
13465 break;
13466 if (s == NULL)
13467 for (s = obfd->sections; s != NULL; s = s->next)
13468 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13469 == SEC_ALLOC)
13470 break;
13471 if (s == NULL)
13472 for (s = obfd->sections; s != NULL; s = s->next)
13473 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13474 break;
13475 }
13476
13477 TOCstart = 0;
13478 if (s != NULL)
13479 TOCstart = s->output_section->vma + s->output_offset;
13480
13481 /* Force alignment. */
13482 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13483 TOCstart -= adjust;
13484 _bfd_set_gp_value (obfd, TOCstart);
13485
13486 if (info != NULL && s != NULL)
13487 {
13488 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13489
13490 if (htab != NULL)
13491 {
13492 if (htab->elf.hgot != NULL)
13493 {
13494 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13495 htab->elf.hgot->root.u.def.section = s;
13496 }
13497 }
13498 else
13499 {
13500 struct bfd_link_hash_entry *bh = NULL;
13501 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13502 s, TOC_BASE_OFF - adjust,
13503 NULL, FALSE, FALSE, &bh);
13504 }
13505 }
13506 return TOCstart;
13507 }
13508
13509 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13510 write out any global entry stubs, and PLT relocations. */
13511
13512 static bfd_boolean
13513 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13514 {
13515 struct bfd_link_info *info;
13516 struct ppc_link_hash_table *htab;
13517 struct plt_entry *ent;
13518 asection *s;
13519
13520 if (h->root.type == bfd_link_hash_indirect)
13521 return TRUE;
13522
13523 info = inf;
13524 htab = ppc_hash_table (info);
13525 if (htab == NULL)
13526 return FALSE;
13527
13528 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13529 if (ent->plt.offset != (bfd_vma) -1)
13530 {
13531 /* This symbol has an entry in the procedure linkage
13532 table. Set it up. */
13533 Elf_Internal_Rela rela;
13534 asection *plt, *relplt;
13535 bfd_byte *loc;
13536
13537 if (!htab->elf.dynamic_sections_created
13538 || h->dynindx == -1)
13539 {
13540 if (!(h->def_regular
13541 && (h->root.type == bfd_link_hash_defined
13542 || h->root.type == bfd_link_hash_defweak)))
13543 continue;
13544 if (h->type == STT_GNU_IFUNC)
13545 {
13546 plt = htab->elf.iplt;
13547 relplt = htab->elf.irelplt;
13548 htab->local_ifunc_resolver = 1;
13549 if (htab->opd_abi)
13550 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13551 else
13552 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13553 }
13554 else
13555 {
13556 plt = htab->pltlocal;
13557 if (bfd_link_pic (info))
13558 {
13559 relplt = htab->relpltlocal;
13560 if (htab->opd_abi)
13561 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13562 else
13563 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13564 }
13565 else
13566 relplt = NULL;
13567 }
13568 rela.r_addend = (h->root.u.def.value
13569 + h->root.u.def.section->output_offset
13570 + h->root.u.def.section->output_section->vma
13571 + ent->addend);
13572
13573 if (relplt == NULL)
13574 {
13575 loc = plt->contents + ent->plt.offset;
13576 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13577 if (htab->opd_abi)
13578 {
13579 bfd_vma toc = elf_gp (info->output_bfd);
13580 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13581 bfd_put_64 (info->output_bfd, toc, loc + 8);
13582 }
13583 }
13584 else
13585 {
13586 rela.r_offset = (plt->output_section->vma
13587 + plt->output_offset
13588 + ent->plt.offset);
13589 loc = relplt->contents + (relplt->reloc_count++
13590 * sizeof (Elf64_External_Rela));
13591 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13592 }
13593 }
13594 else
13595 {
13596 rela.r_offset = (htab->elf.splt->output_section->vma
13597 + htab->elf.splt->output_offset
13598 + ent->plt.offset);
13599 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13600 rela.r_addend = ent->addend;
13601 loc = (htab->elf.srelplt->contents
13602 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13603 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13604 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13605 htab->maybe_local_ifunc_resolver = 1;
13606 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13607 }
13608 }
13609
13610 if (!h->pointer_equality_needed)
13611 return TRUE;
13612
13613 if (h->def_regular)
13614 return TRUE;
13615
13616 s = htab->global_entry;
13617 if (s == NULL || s->size == 0)
13618 return TRUE;
13619
13620 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13621 if (ent->plt.offset != (bfd_vma) -1
13622 && ent->addend == 0)
13623 {
13624 bfd_byte *p;
13625 asection *plt;
13626 bfd_vma off;
13627
13628 p = s->contents + h->root.u.def.value;
13629 plt = htab->elf.splt;
13630 if (!htab->elf.dynamic_sections_created
13631 || h->dynindx == -1)
13632 {
13633 if (h->type == STT_GNU_IFUNC)
13634 plt = htab->elf.iplt;
13635 else
13636 plt = htab->pltlocal;
13637 }
13638 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13639 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13640
13641 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13642 {
13643 info->callbacks->einfo
13644 (_("%P: linkage table error against `%pT'\n"),
13645 h->root.root.string);
13646 bfd_set_error (bfd_error_bad_value);
13647 htab->stub_error = TRUE;
13648 }
13649
13650 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13651 if (htab->params->emit_stub_syms)
13652 {
13653 size_t len = strlen (h->root.root.string);
13654 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13655
13656 if (name == NULL)
13657 return FALSE;
13658
13659 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13660 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13661 if (h == NULL)
13662 return FALSE;
13663 if (h->root.type == bfd_link_hash_new)
13664 {
13665 h->root.type = bfd_link_hash_defined;
13666 h->root.u.def.section = s;
13667 h->root.u.def.value = p - s->contents;
13668 h->ref_regular = 1;
13669 h->def_regular = 1;
13670 h->ref_regular_nonweak = 1;
13671 h->forced_local = 1;
13672 h->non_elf = 0;
13673 h->root.linker_def = 1;
13674 }
13675 }
13676
13677 if (PPC_HA (off) != 0)
13678 {
13679 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13680 p += 4;
13681 }
13682 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13683 p += 4;
13684 bfd_put_32 (s->owner, MTCTR_R12, p);
13685 p += 4;
13686 bfd_put_32 (s->owner, BCTR, p);
13687 break;
13688 }
13689 return TRUE;
13690 }
13691
13692 /* Write PLT relocs for locals. */
13693
13694 static bfd_boolean
13695 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13696 {
13697 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13698 bfd *ibfd;
13699
13700 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13701 {
13702 struct got_entry **lgot_ents, **end_lgot_ents;
13703 struct plt_entry **local_plt, **lplt, **end_local_plt;
13704 Elf_Internal_Shdr *symtab_hdr;
13705 bfd_size_type locsymcount;
13706 Elf_Internal_Sym *local_syms = NULL;
13707 struct plt_entry *ent;
13708
13709 if (!is_ppc64_elf (ibfd))
13710 continue;
13711
13712 lgot_ents = elf_local_got_ents (ibfd);
13713 if (!lgot_ents)
13714 continue;
13715
13716 symtab_hdr = &elf_symtab_hdr (ibfd);
13717 locsymcount = symtab_hdr->sh_info;
13718 end_lgot_ents = lgot_ents + locsymcount;
13719 local_plt = (struct plt_entry **) end_lgot_ents;
13720 end_local_plt = local_plt + locsymcount;
13721 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13722 for (ent = *lplt; ent != NULL; ent = ent->next)
13723 if (ent->plt.offset != (bfd_vma) -1)
13724 {
13725 Elf_Internal_Sym *sym;
13726 asection *sym_sec;
13727 asection *plt, *relplt;
13728 bfd_byte *loc;
13729 bfd_vma val;
13730
13731 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13732 lplt - local_plt, ibfd))
13733 {
13734 if (local_syms != NULL
13735 && symtab_hdr->contents != (unsigned char *) local_syms)
13736 free (local_syms);
13737 return FALSE;
13738 }
13739
13740 val = sym->st_value + ent->addend;
13741 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13742 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
13743 if (sym_sec != NULL && sym_sec->output_section != NULL)
13744 val += sym_sec->output_offset + sym_sec->output_section->vma;
13745
13746 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13747 {
13748 htab->local_ifunc_resolver = 1;
13749 plt = htab->elf.iplt;
13750 relplt = htab->elf.irelplt;
13751 }
13752 else
13753 {
13754 plt = htab->pltlocal;
13755 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13756 }
13757
13758 if (relplt == NULL)
13759 {
13760 loc = plt->contents + ent->plt.offset;
13761 bfd_put_64 (info->output_bfd, val, loc);
13762 if (htab->opd_abi)
13763 {
13764 bfd_vma toc = elf_gp (ibfd);
13765 bfd_put_64 (info->output_bfd, toc, loc + 8);
13766 }
13767 }
13768 else
13769 {
13770 Elf_Internal_Rela rela;
13771 rela.r_offset = (ent->plt.offset
13772 + plt->output_offset
13773 + plt->output_section->vma);
13774 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13775 {
13776 if (htab->opd_abi)
13777 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13778 else
13779 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13780 }
13781 else
13782 {
13783 if (htab->opd_abi)
13784 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13785 else
13786 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13787 }
13788 rela.r_addend = val;
13789 loc = relplt->contents + (relplt->reloc_count++
13790 * sizeof (Elf64_External_Rela));
13791 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13792 }
13793 }
13794
13795 if (local_syms != NULL
13796 && symtab_hdr->contents != (unsigned char *) local_syms)
13797 {
13798 if (!info->keep_memory)
13799 free (local_syms);
13800 else
13801 symtab_hdr->contents = (unsigned char *) local_syms;
13802 }
13803 }
13804 return TRUE;
13805 }
13806
13807 /* Build all the stubs associated with the current output file.
13808 The stubs are kept in a hash table attached to the main linker
13809 hash table. This function is called via gldelf64ppc_finish. */
13810
13811 bfd_boolean
13812 ppc64_elf_build_stubs (struct bfd_link_info *info,
13813 char **stats)
13814 {
13815 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13816 struct map_stub *group;
13817 asection *stub_sec;
13818 bfd_byte *p;
13819 int stub_sec_count = 0;
13820
13821 if (htab == NULL)
13822 return FALSE;
13823
13824 /* Allocate memory to hold the linker stubs. */
13825 for (group = htab->group; group != NULL; group = group->next)
13826 {
13827 group->eh_size = 0;
13828 group->lr_restore = 0;
13829 if ((stub_sec = group->stub_sec) != NULL
13830 && stub_sec->size != 0)
13831 {
13832 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13833 stub_sec->size);
13834 if (stub_sec->contents == NULL)
13835 return FALSE;
13836 stub_sec->size = 0;
13837 }
13838 }
13839
13840 if (htab->glink != NULL && htab->glink->size != 0)
13841 {
13842 unsigned int indx;
13843 bfd_vma plt0;
13844
13845 /* Build the .glink plt call stub. */
13846 if (htab->params->emit_stub_syms)
13847 {
13848 struct elf_link_hash_entry *h;
13849 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13850 TRUE, FALSE, FALSE);
13851 if (h == NULL)
13852 return FALSE;
13853 if (h->root.type == bfd_link_hash_new)
13854 {
13855 h->root.type = bfd_link_hash_defined;
13856 h->root.u.def.section = htab->glink;
13857 h->root.u.def.value = 8;
13858 h->ref_regular = 1;
13859 h->def_regular = 1;
13860 h->ref_regular_nonweak = 1;
13861 h->forced_local = 1;
13862 h->non_elf = 0;
13863 h->root.linker_def = 1;
13864 }
13865 }
13866 plt0 = (htab->elf.splt->output_section->vma
13867 + htab->elf.splt->output_offset
13868 - 16);
13869 if (info->emitrelocations)
13870 {
13871 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13872 if (r == NULL)
13873 return FALSE;
13874 r->r_offset = (htab->glink->output_offset
13875 + htab->glink->output_section->vma);
13876 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13877 r->r_addend = plt0;
13878 }
13879 p = htab->glink->contents;
13880 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
13881 bfd_put_64 (htab->glink->owner, plt0, p);
13882 p += 8;
13883 if (htab->opd_abi)
13884 {
13885 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13886 p += 4;
13887 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13888 p += 4;
13889 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13890 p += 4;
13891 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13892 p += 4;
13893 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13894 p += 4;
13895 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13896 p += 4;
13897 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13898 p += 4;
13899 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13900 p += 4;
13901 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13902 p += 4;
13903 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13904 p += 4;
13905 }
13906 else
13907 {
13908 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13909 p += 4;
13910 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13911 p += 4;
13912 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13913 p += 4;
13914 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13915 p += 4;
13916 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13917 p += 4;
13918 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13919 p += 4;
13920 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13921 p += 4;
13922 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13923 p += 4;
13924 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13925 p += 4;
13926 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13927 p += 4;
13928 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13929 p += 4;
13930 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13931 p += 4;
13932 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13933 p += 4;
13934 }
13935 bfd_put_32 (htab->glink->owner, BCTR, p);
13936 p += 4;
13937 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
13938
13939 /* Build the .glink lazy link call stubs. */
13940 indx = 0;
13941 while (p < htab->glink->contents + htab->glink->size)
13942 {
13943 if (htab->opd_abi)
13944 {
13945 if (indx < 0x8000)
13946 {
13947 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13948 p += 4;
13949 }
13950 else
13951 {
13952 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13953 p += 4;
13954 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13955 p);
13956 p += 4;
13957 }
13958 }
13959 bfd_put_32 (htab->glink->owner,
13960 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13961 indx++;
13962 p += 4;
13963 }
13964 }
13965
13966 /* Build .glink global entry stubs, and PLT relocs for globals. */
13967 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13968
13969 if (!write_plt_relocs_for_local_syms (info))
13970 return FALSE;
13971
13972 if (htab->brlt != NULL && htab->brlt->size != 0)
13973 {
13974 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13975 htab->brlt->size);
13976 if (htab->brlt->contents == NULL)
13977 return FALSE;
13978 }
13979 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13980 {
13981 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13982 htab->relbrlt->size);
13983 if (htab->relbrlt->contents == NULL)
13984 return FALSE;
13985 }
13986
13987 /* Build the stubs as directed by the stub hash table. */
13988 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
13989
13990 for (group = htab->group; group != NULL; group = group->next)
13991 if (group->needs_save_res)
13992 group->stub_sec->size += htab->sfpr->size;
13993
13994 if (htab->relbrlt != NULL)
13995 htab->relbrlt->reloc_count = 0;
13996
13997 if (htab->params->plt_stub_align != 0)
13998 for (group = htab->group; group != NULL; group = group->next)
13999 if ((stub_sec = group->stub_sec) != NULL)
14000 {
14001 int align = abs (htab->params->plt_stub_align);
14002 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14003 }
14004
14005 for (group = htab->group; group != NULL; group = group->next)
14006 if (group->needs_save_res)
14007 {
14008 stub_sec = group->stub_sec;
14009 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14010 htab->sfpr->contents, htab->sfpr->size);
14011 if (htab->params->emit_stub_syms)
14012 {
14013 unsigned int i;
14014
14015 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14016 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14017 return FALSE;
14018 }
14019 }
14020
14021 if (htab->glink_eh_frame != NULL
14022 && htab->glink_eh_frame->size != 0)
14023 {
14024 bfd_vma val;
14025 size_t align = 4;
14026
14027 p = htab->glink_eh_frame->contents;
14028 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14029
14030 for (group = htab->group; group != NULL; group = group->next)
14031 if (group->eh_size != 0)
14032 {
14033 /* Offset to stub section. */
14034 val = (group->stub_sec->output_section->vma
14035 + group->stub_sec->output_offset);
14036 val -= (htab->glink_eh_frame->output_section->vma
14037 + htab->glink_eh_frame->output_offset
14038 + (p + 8 - htab->glink_eh_frame->contents));
14039 if (val + 0x80000000 > 0xffffffff)
14040 {
14041 _bfd_error_handler
14042 (_("%s offset too large for .eh_frame sdata4 encoding"),
14043 group->stub_sec->name);
14044 return FALSE;
14045 }
14046 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14047 p += (group->eh_size + 17 + 3) & -4;
14048 }
14049 if (htab->glink != NULL && htab->glink->size != 0)
14050 {
14051 /* Offset to .glink. */
14052 val = (htab->glink->output_section->vma
14053 + htab->glink->output_offset
14054 + 8);
14055 val -= (htab->glink_eh_frame->output_section->vma
14056 + htab->glink_eh_frame->output_offset
14057 + (p + 8 - htab->glink_eh_frame->contents));
14058 if (val + 0x80000000 > 0xffffffff)
14059 {
14060 _bfd_error_handler
14061 (_("%s offset too large for .eh_frame sdata4 encoding"),
14062 htab->glink->name);
14063 return FALSE;
14064 }
14065 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14066 p += (24 + align - 1) & -align;
14067 }
14068 }
14069
14070 for (group = htab->group; group != NULL; group = group->next)
14071 if ((stub_sec = group->stub_sec) != NULL)
14072 {
14073 stub_sec_count += 1;
14074 if (stub_sec->rawsize != stub_sec->size
14075 && (htab->stub_iteration <= STUB_SHRINK_ITER
14076 || stub_sec->rawsize < stub_sec->size))
14077 break;
14078 }
14079
14080 if (group != NULL)
14081 {
14082 htab->stub_error = TRUE;
14083 _bfd_error_handler (_("stubs don't match calculated size"));
14084 }
14085
14086 if (htab->stub_error)
14087 return FALSE;
14088
14089 if (stats != NULL)
14090 {
14091 size_t len;
14092 *stats = bfd_malloc (500);
14093 if (*stats == NULL)
14094 return FALSE;
14095
14096 len = sprintf (*stats,
14097 ngettext ("linker stubs in %u group\n",
14098 "linker stubs in %u groups\n",
14099 stub_sec_count),
14100 stub_sec_count);
14101 sprintf (*stats + len, _(" branch %lu\n"
14102 " branch toc adj %lu\n"
14103 " branch notoc %lu\n"
14104 " branch both %lu\n"
14105 " long branch %lu\n"
14106 " long toc adj %lu\n"
14107 " long notoc %lu\n"
14108 " long both %lu\n"
14109 " plt call %lu\n"
14110 " plt call save %lu\n"
14111 " plt call notoc %lu\n"
14112 " plt call both %lu\n"
14113 " global entry %lu"),
14114 htab->stub_count[ppc_stub_long_branch - 1],
14115 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14116 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14117 htab->stub_count[ppc_stub_long_branch_both - 1],
14118 htab->stub_count[ppc_stub_plt_branch - 1],
14119 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14120 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14121 htab->stub_count[ppc_stub_plt_branch_both - 1],
14122 htab->stub_count[ppc_stub_plt_call - 1],
14123 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14124 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14125 htab->stub_count[ppc_stub_plt_call_both - 1],
14126 htab->stub_count[ppc_stub_global_entry - 1]);
14127 }
14128 return TRUE;
14129 }
14130
14131 /* What to do when ld finds relocations against symbols defined in
14132 discarded sections. */
14133
14134 static unsigned int
14135 ppc64_elf_action_discarded (asection *sec)
14136 {
14137 if (strcmp (".opd", sec->name) == 0)
14138 return 0;
14139
14140 if (strcmp (".toc", sec->name) == 0)
14141 return 0;
14142
14143 if (strcmp (".toc1", sec->name) == 0)
14144 return 0;
14145
14146 return _bfd_elf_default_action_discarded (sec);
14147 }
14148
14149 /* These are the dynamic relocations supported by glibc. */
14150
14151 static bfd_boolean
14152 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14153 {
14154 switch (r_type)
14155 {
14156 case R_PPC64_RELATIVE:
14157 case R_PPC64_NONE:
14158 case R_PPC64_ADDR64:
14159 case R_PPC64_GLOB_DAT:
14160 case R_PPC64_IRELATIVE:
14161 case R_PPC64_JMP_IREL:
14162 case R_PPC64_JMP_SLOT:
14163 case R_PPC64_DTPMOD64:
14164 case R_PPC64_DTPREL64:
14165 case R_PPC64_TPREL64:
14166 case R_PPC64_TPREL16_LO_DS:
14167 case R_PPC64_TPREL16_DS:
14168 case R_PPC64_TPREL16:
14169 case R_PPC64_TPREL16_LO:
14170 case R_PPC64_TPREL16_HI:
14171 case R_PPC64_TPREL16_HIGH:
14172 case R_PPC64_TPREL16_HA:
14173 case R_PPC64_TPREL16_HIGHA:
14174 case R_PPC64_TPREL16_HIGHER:
14175 case R_PPC64_TPREL16_HIGHEST:
14176 case R_PPC64_TPREL16_HIGHERA:
14177 case R_PPC64_TPREL16_HIGHESTA:
14178 case R_PPC64_ADDR16_LO_DS:
14179 case R_PPC64_ADDR16_LO:
14180 case R_PPC64_ADDR16_HI:
14181 case R_PPC64_ADDR16_HIGH:
14182 case R_PPC64_ADDR16_HA:
14183 case R_PPC64_ADDR16_HIGHA:
14184 case R_PPC64_REL30:
14185 case R_PPC64_COPY:
14186 case R_PPC64_UADDR64:
14187 case R_PPC64_UADDR32:
14188 case R_PPC64_ADDR32:
14189 case R_PPC64_ADDR24:
14190 case R_PPC64_ADDR16:
14191 case R_PPC64_UADDR16:
14192 case R_PPC64_ADDR16_DS:
14193 case R_PPC64_ADDR16_HIGHER:
14194 case R_PPC64_ADDR16_HIGHEST:
14195 case R_PPC64_ADDR16_HIGHERA:
14196 case R_PPC64_ADDR16_HIGHESTA:
14197 case R_PPC64_ADDR14:
14198 case R_PPC64_ADDR14_BRTAKEN:
14199 case R_PPC64_ADDR14_BRNTAKEN:
14200 case R_PPC64_REL32:
14201 case R_PPC64_REL64:
14202 return TRUE;
14203
14204 default:
14205 return FALSE;
14206 }
14207 }
14208
14209 /* The RELOCATE_SECTION function is called by the ELF backend linker
14210 to handle the relocations for a section.
14211
14212 The relocs are always passed as Rela structures; if the section
14213 actually uses Rel structures, the r_addend field will always be
14214 zero.
14215
14216 This function is responsible for adjust the section contents as
14217 necessary, and (if using Rela relocs and generating a
14218 relocatable output file) adjusting the reloc addend as
14219 necessary.
14220
14221 This function does not have to worry about setting the reloc
14222 address or the reloc symbol index.
14223
14224 LOCAL_SYMS is a pointer to the swapped in local symbols.
14225
14226 LOCAL_SECTIONS is an array giving the section in the input file
14227 corresponding to the st_shndx field of each local symbol.
14228
14229 The global hash table entry for the global symbols can be found
14230 via elf_sym_hashes (input_bfd).
14231
14232 When generating relocatable output, this function must handle
14233 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14234 going to be the section symbol corresponding to the output
14235 section, which means that the addend must be adjusted
14236 accordingly. */
14237
14238 static bfd_boolean
14239 ppc64_elf_relocate_section (bfd *output_bfd,
14240 struct bfd_link_info *info,
14241 bfd *input_bfd,
14242 asection *input_section,
14243 bfd_byte *contents,
14244 Elf_Internal_Rela *relocs,
14245 Elf_Internal_Sym *local_syms,
14246 asection **local_sections)
14247 {
14248 struct ppc_link_hash_table *htab;
14249 Elf_Internal_Shdr *symtab_hdr;
14250 struct elf_link_hash_entry **sym_hashes;
14251 Elf_Internal_Rela *rel;
14252 Elf_Internal_Rela *wrel;
14253 Elf_Internal_Rela *relend;
14254 Elf_Internal_Rela outrel;
14255 bfd_byte *loc;
14256 struct got_entry **local_got_ents;
14257 bfd_vma TOCstart;
14258 bfd_boolean ret = TRUE;
14259 bfd_boolean is_opd;
14260 /* Assume 'at' branch hints. */
14261 bfd_boolean is_isa_v2 = TRUE;
14262 bfd_boolean warned_dynamic = FALSE;
14263 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14264
14265 /* Initialize howto table if needed. */
14266 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14267 ppc_howto_init ();
14268
14269 htab = ppc_hash_table (info);
14270 if (htab == NULL)
14271 return FALSE;
14272
14273 /* Don't relocate stub sections. */
14274 if (input_section->owner == htab->params->stub_bfd)
14275 return TRUE;
14276
14277 if (!is_ppc64_elf (input_bfd))
14278 {
14279 bfd_set_error (bfd_error_wrong_format);
14280 return FALSE;
14281 }
14282
14283 local_got_ents = elf_local_got_ents (input_bfd);
14284 TOCstart = elf_gp (output_bfd);
14285 symtab_hdr = &elf_symtab_hdr (input_bfd);
14286 sym_hashes = elf_sym_hashes (input_bfd);
14287 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14288
14289 rel = wrel = relocs;
14290 relend = relocs + input_section->reloc_count;
14291 for (; rel < relend; wrel++, rel++)
14292 {
14293 enum elf_ppc64_reloc_type r_type;
14294 bfd_vma addend;
14295 bfd_reloc_status_type r;
14296 Elf_Internal_Sym *sym;
14297 asection *sec;
14298 struct elf_link_hash_entry *h_elf;
14299 struct ppc_link_hash_entry *h;
14300 struct ppc_link_hash_entry *fdh;
14301 const char *sym_name;
14302 unsigned long r_symndx, toc_symndx;
14303 bfd_vma toc_addend;
14304 unsigned char tls_mask, tls_gd, tls_type;
14305 unsigned char sym_type;
14306 bfd_vma relocation;
14307 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14308 bfd_boolean warned;
14309 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14310 unsigned int insn;
14311 unsigned int mask;
14312 struct ppc_stub_hash_entry *stub_entry;
14313 bfd_vma max_br_offset;
14314 bfd_vma from;
14315 Elf_Internal_Rela orig_rel;
14316 reloc_howto_type *howto;
14317 struct reloc_howto_struct alt_howto;
14318 uint64_t pinsn;
14319 bfd_vma offset;
14320
14321 again:
14322 orig_rel = *rel;
14323
14324 r_type = ELF64_R_TYPE (rel->r_info);
14325 r_symndx = ELF64_R_SYM (rel->r_info);
14326
14327 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14328 symbol of the previous ADDR64 reloc. The symbol gives us the
14329 proper TOC base to use. */
14330 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14331 && wrel != relocs
14332 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14333 && is_opd)
14334 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14335
14336 sym = NULL;
14337 sec = NULL;
14338 h_elf = NULL;
14339 sym_name = NULL;
14340 unresolved_reloc = FALSE;
14341 warned = FALSE;
14342
14343 if (r_symndx < symtab_hdr->sh_info)
14344 {
14345 /* It's a local symbol. */
14346 struct _opd_sec_data *opd;
14347
14348 sym = local_syms + r_symndx;
14349 sec = local_sections[r_symndx];
14350 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14351 sym_type = ELF64_ST_TYPE (sym->st_info);
14352 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14353 opd = get_opd_info (sec);
14354 if (opd != NULL && opd->adjust != NULL)
14355 {
14356 long adjust = opd->adjust[OPD_NDX (sym->st_value
14357 + rel->r_addend)];
14358 if (adjust == -1)
14359 relocation = 0;
14360 else
14361 {
14362 /* If this is a relocation against the opd section sym
14363 and we have edited .opd, adjust the reloc addend so
14364 that ld -r and ld --emit-relocs output is correct.
14365 If it is a reloc against some other .opd symbol,
14366 then the symbol value will be adjusted later. */
14367 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14368 rel->r_addend += adjust;
14369 else
14370 relocation += adjust;
14371 }
14372 }
14373 }
14374 else
14375 {
14376 bfd_boolean ignored;
14377
14378 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14379 r_symndx, symtab_hdr, sym_hashes,
14380 h_elf, sec, relocation,
14381 unresolved_reloc, warned, ignored);
14382 sym_name = h_elf->root.root.string;
14383 sym_type = h_elf->type;
14384 if (sec != NULL
14385 && sec->owner == output_bfd
14386 && strcmp (sec->name, ".opd") == 0)
14387 {
14388 /* This is a symbol defined in a linker script. All
14389 such are defined in output sections, even those
14390 defined by simple assignment from a symbol defined in
14391 an input section. Transfer the symbol to an
14392 appropriate input .opd section, so that a branch to
14393 this symbol will be mapped to the location specified
14394 by the opd entry. */
14395 struct bfd_link_order *lo;
14396 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14397 if (lo->type == bfd_indirect_link_order)
14398 {
14399 asection *isec = lo->u.indirect.section;
14400 if (h_elf->root.u.def.value >= isec->output_offset
14401 && h_elf->root.u.def.value < (isec->output_offset
14402 + isec->size))
14403 {
14404 h_elf->root.u.def.value -= isec->output_offset;
14405 h_elf->root.u.def.section = isec;
14406 sec = isec;
14407 break;
14408 }
14409 }
14410 }
14411 }
14412 h = (struct ppc_link_hash_entry *) h_elf;
14413
14414 if (sec != NULL && discarded_section (sec))
14415 {
14416 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14417 input_bfd, input_section,
14418 contents, rel->r_offset);
14419 wrel->r_offset = rel->r_offset;
14420 wrel->r_info = 0;
14421 wrel->r_addend = 0;
14422
14423 /* For ld -r, remove relocations in debug sections against
14424 symbols defined in discarded sections. Not done for
14425 non-debug to preserve relocs in .eh_frame which the
14426 eh_frame editing code expects to be present. */
14427 if (bfd_link_relocatable (info)
14428 && (input_section->flags & SEC_DEBUGGING))
14429 wrel--;
14430
14431 continue;
14432 }
14433
14434 if (bfd_link_relocatable (info))
14435 goto copy_reloc;
14436
14437 if (h != NULL && &h->elf == htab->elf.hgot)
14438 {
14439 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14440 sec = bfd_abs_section_ptr;
14441 unresolved_reloc = FALSE;
14442 }
14443
14444 /* TLS optimizations. Replace instruction sequences and relocs
14445 based on information we collected in tls_optimize. We edit
14446 RELOCS so that --emit-relocs will output something sensible
14447 for the final instruction stream. */
14448 tls_mask = 0;
14449 tls_gd = 0;
14450 toc_symndx = 0;
14451 if (h != NULL)
14452 tls_mask = h->tls_mask;
14453 else if (local_got_ents != NULL)
14454 {
14455 struct plt_entry **local_plt = (struct plt_entry **)
14456 (local_got_ents + symtab_hdr->sh_info);
14457 unsigned char *lgot_masks = (unsigned char *)
14458 (local_plt + symtab_hdr->sh_info);
14459 tls_mask = lgot_masks[r_symndx];
14460 }
14461 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14462 && (r_type == R_PPC64_TLS
14463 || r_type == R_PPC64_TLSGD
14464 || r_type == R_PPC64_TLSLD))
14465 {
14466 /* Check for toc tls entries. */
14467 unsigned char *toc_tls;
14468
14469 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14470 &local_syms, rel, input_bfd))
14471 return FALSE;
14472
14473 if (toc_tls)
14474 tls_mask = *toc_tls;
14475 }
14476
14477 /* Check that tls relocs are used with tls syms, and non-tls
14478 relocs are used with non-tls syms. */
14479 if (r_symndx != STN_UNDEF
14480 && r_type != R_PPC64_NONE
14481 && (h == NULL
14482 || h->elf.root.type == bfd_link_hash_defined
14483 || h->elf.root.type == bfd_link_hash_defweak)
14484 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14485 {
14486 if ((tls_mask & TLS_TLS) != 0
14487 && (r_type == R_PPC64_TLS
14488 || r_type == R_PPC64_TLSGD
14489 || r_type == R_PPC64_TLSLD))
14490 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14491 ;
14492 else
14493 info->callbacks->einfo
14494 (!IS_PPC64_TLS_RELOC (r_type)
14495 /* xgettext:c-format */
14496 ? _("%H: %s used with TLS symbol `%pT'\n")
14497 /* xgettext:c-format */
14498 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14499 input_bfd, input_section, rel->r_offset,
14500 ppc64_elf_howto_table[r_type]->name,
14501 sym_name);
14502 }
14503
14504 /* Ensure reloc mapping code below stays sane. */
14505 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14506 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14507 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14508 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14509 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14510 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14511 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14512 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14513 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14514 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14515 abort ();
14516
14517 switch (r_type)
14518 {
14519 default:
14520 break;
14521
14522 case R_PPC64_LO_DS_OPT:
14523 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14524 if ((insn & (0x3f << 26)) != 58u << 26)
14525 abort ();
14526 insn += (14u << 26) - (58u << 26);
14527 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14528 r_type = R_PPC64_TOC16_LO;
14529 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14530 break;
14531
14532 case R_PPC64_TOC16:
14533 case R_PPC64_TOC16_LO:
14534 case R_PPC64_TOC16_DS:
14535 case R_PPC64_TOC16_LO_DS:
14536 {
14537 /* Check for toc tls entries. */
14538 unsigned char *toc_tls;
14539 int retval;
14540
14541 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14542 &local_syms, rel, input_bfd);
14543 if (retval == 0)
14544 return FALSE;
14545
14546 if (toc_tls)
14547 {
14548 tls_mask = *toc_tls;
14549 if (r_type == R_PPC64_TOC16_DS
14550 || r_type == R_PPC64_TOC16_LO_DS)
14551 {
14552 if ((tls_mask & TLS_TLS) != 0
14553 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14554 goto toctprel;
14555 }
14556 else
14557 {
14558 /* If we found a GD reloc pair, then we might be
14559 doing a GD->IE transition. */
14560 if (retval == 2)
14561 {
14562 tls_gd = TLS_GDIE;
14563 if ((tls_mask & TLS_TLS) != 0
14564 && (tls_mask & TLS_GD) == 0)
14565 goto tls_ldgd_opt;
14566 }
14567 else if (retval == 3)
14568 {
14569 if ((tls_mask & TLS_TLS) != 0
14570 && (tls_mask & TLS_LD) == 0)
14571 goto tls_ldgd_opt;
14572 }
14573 }
14574 }
14575 }
14576 break;
14577
14578 case R_PPC64_GOT_TPREL16_HI:
14579 case R_PPC64_GOT_TPREL16_HA:
14580 if ((tls_mask & TLS_TLS) != 0
14581 && (tls_mask & TLS_TPREL) == 0)
14582 {
14583 rel->r_offset -= d_offset;
14584 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14585 r_type = R_PPC64_NONE;
14586 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14587 }
14588 break;
14589
14590 case R_PPC64_GOT_TPREL16_DS:
14591 case R_PPC64_GOT_TPREL16_LO_DS:
14592 if ((tls_mask & TLS_TLS) != 0
14593 && (tls_mask & TLS_TPREL) == 0)
14594 {
14595 toctprel:
14596 insn = bfd_get_32 (input_bfd,
14597 contents + rel->r_offset - d_offset);
14598 insn &= 31 << 21;
14599 insn |= 0x3c0d0000; /* addis 0,13,0 */
14600 bfd_put_32 (input_bfd, insn,
14601 contents + rel->r_offset - d_offset);
14602 r_type = R_PPC64_TPREL16_HA;
14603 if (toc_symndx != 0)
14604 {
14605 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14606 rel->r_addend = toc_addend;
14607 /* We changed the symbol. Start over in order to
14608 get h, sym, sec etc. right. */
14609 goto again;
14610 }
14611 else
14612 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14613 }
14614 break;
14615
14616 case R_PPC64_GOT_TPREL34:
14617 if ((tls_mask & TLS_TLS) != 0
14618 && (tls_mask & TLS_TPREL) == 0)
14619 {
14620 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14621 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14622 pinsn <<= 32;
14623 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14624 pinsn += ((2ULL << 56) + (-1ULL << 52)
14625 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14626 bfd_put_32 (input_bfd, pinsn >> 32,
14627 contents + rel->r_offset);
14628 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14629 contents + rel->r_offset + 4);
14630 r_type = R_PPC64_TPREL34;
14631 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14632 }
14633 break;
14634
14635 case R_PPC64_TLS:
14636 if ((tls_mask & TLS_TLS) != 0
14637 && (tls_mask & TLS_TPREL) == 0)
14638 {
14639 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
14640 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14641 if (insn == 0)
14642 break;
14643 if ((rel->r_offset & 3) == 0)
14644 {
14645 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14646 /* Was PPC64_TLS which sits on insn boundary, now
14647 PPC64_TPREL16_LO which is at low-order half-word. */
14648 rel->r_offset += d_offset;
14649 r_type = R_PPC64_TPREL16_LO;
14650 if (toc_symndx != 0)
14651 {
14652 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14653 rel->r_addend = toc_addend;
14654 /* We changed the symbol. Start over in order to
14655 get h, sym, sec etc. right. */
14656 goto again;
14657 }
14658 else
14659 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14660 }
14661 else if ((rel->r_offset & 3) == 1)
14662 {
14663 /* For pcrel IE to LE we already have the full
14664 offset and thus don't need an addi here. A nop
14665 or mr will do. */
14666 if ((insn & (0x3f << 26)) == 14 << 26)
14667 {
14668 /* Extract regs from addi rt,ra,si. */
14669 unsigned int rt = (insn >> 21) & 0x1f;
14670 unsigned int ra = (insn >> 16) & 0x1f;
14671 if (rt == ra)
14672 insn = NOP;
14673 else
14674 {
14675 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14676 insn = (rt << 16) | (ra << 21) | (ra << 11);
14677 insn |= (31u << 26) | (444u << 1);
14678 }
14679 }
14680 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
14681 }
14682 }
14683 break;
14684
14685 case R_PPC64_GOT_TLSGD16_HI:
14686 case R_PPC64_GOT_TLSGD16_HA:
14687 tls_gd = TLS_GDIE;
14688 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14689 goto tls_gdld_hi;
14690 break;
14691
14692 case R_PPC64_GOT_TLSLD16_HI:
14693 case R_PPC64_GOT_TLSLD16_HA:
14694 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14695 {
14696 tls_gdld_hi:
14697 if ((tls_mask & tls_gd) != 0)
14698 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14699 + R_PPC64_GOT_TPREL16_DS);
14700 else
14701 {
14702 rel->r_offset -= d_offset;
14703 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14704 r_type = R_PPC64_NONE;
14705 }
14706 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14707 }
14708 break;
14709
14710 case R_PPC64_GOT_TLSGD16:
14711 case R_PPC64_GOT_TLSGD16_LO:
14712 tls_gd = TLS_GDIE;
14713 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14714 goto tls_ldgd_opt;
14715 break;
14716
14717 case R_PPC64_GOT_TLSLD16:
14718 case R_PPC64_GOT_TLSLD16_LO:
14719 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14720 {
14721 unsigned int insn1, insn2;
14722
14723 tls_ldgd_opt:
14724 offset = (bfd_vma) -1;
14725 /* If not using the newer R_PPC64_TLSGD/LD to mark
14726 __tls_get_addr calls, we must trust that the call
14727 stays with its arg setup insns, ie. that the next
14728 reloc is the __tls_get_addr call associated with
14729 the current reloc. Edit both insns. */
14730 if (input_section->nomark_tls_get_addr
14731 && rel + 1 < relend
14732 && branch_reloc_hash_match (input_bfd, rel + 1,
14733 htab->tls_get_addr,
14734 htab->tls_get_addr_fd))
14735 offset = rel[1].r_offset;
14736 /* We read the low GOT_TLS (or TOC16) insn because we
14737 need to keep the destination reg. It may be
14738 something other than the usual r3, and moved to r3
14739 before the call by intervening code. */
14740 insn1 = bfd_get_32 (input_bfd,
14741 contents + rel->r_offset - d_offset);
14742 if ((tls_mask & tls_gd) != 0)
14743 {
14744 /* IE */
14745 insn1 &= (0x1f << 21) | (0x1f << 16);
14746 insn1 |= 58 << 26; /* ld */
14747 insn2 = 0x7c636a14; /* add 3,3,13 */
14748 if (offset != (bfd_vma) -1)
14749 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14750 if (r_type == R_PPC64_TOC16
14751 || r_type == R_PPC64_TOC16_LO)
14752 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
14753 else
14754 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14755 + R_PPC64_GOT_TPREL16_DS);
14756 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14757 }
14758 else
14759 {
14760 /* LE */
14761 insn1 &= 0x1f << 21;
14762 insn1 |= 0x3c0d0000; /* addis r,13,0 */
14763 insn2 = 0x38630000; /* addi 3,3,0 */
14764 if (tls_gd == 0)
14765 {
14766 /* Was an LD reloc. */
14767 r_symndx = STN_UNDEF;
14768 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14769 }
14770 else if (toc_symndx != 0)
14771 {
14772 r_symndx = toc_symndx;
14773 rel->r_addend = toc_addend;
14774 }
14775 r_type = R_PPC64_TPREL16_HA;
14776 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14777 if (offset != (bfd_vma) -1)
14778 {
14779 rel[1].r_info = ELF64_R_INFO (r_symndx,
14780 R_PPC64_TPREL16_LO);
14781 rel[1].r_offset = offset + d_offset;
14782 rel[1].r_addend = rel->r_addend;
14783 }
14784 }
14785 bfd_put_32 (input_bfd, insn1,
14786 contents + rel->r_offset - d_offset);
14787 if (offset != (bfd_vma) -1)
14788 {
14789 bfd_put_32 (input_bfd, insn2, contents + offset);
14790 if (offset + 8 <= input_section->size)
14791 {
14792 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14793 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14794 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14795 }
14796 }
14797 if ((tls_mask & tls_gd) == 0
14798 && (tls_gd == 0 || toc_symndx != 0))
14799 {
14800 /* We changed the symbol. Start over in order
14801 to get h, sym, sec etc. right. */
14802 goto again;
14803 }
14804 }
14805 break;
14806
14807 case R_PPC64_GOT_TLSGD34:
14808 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14809 {
14810 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14811 pinsn <<= 32;
14812 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14813 if ((tls_mask & TLS_GDIE) != 0)
14814 {
14815 /* IE, pla -> pld */
14816 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14817 r_type = R_PPC64_GOT_TPREL34;
14818 }
14819 else
14820 {
14821 /* LE, pla pcrel -> paddi r13 */
14822 pinsn += (-1ULL << 52) + (13ULL << 16);
14823 r_type = R_PPC64_TPREL34;
14824 }
14825 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14826 bfd_put_32 (input_bfd, pinsn >> 32,
14827 contents + rel->r_offset);
14828 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14829 contents + rel->r_offset + 4);
14830 }
14831 break;
14832
14833 case R_PPC64_GOT_TLSLD34:
14834 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14835 {
14836 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14837 pinsn <<= 32;
14838 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14839 pinsn += (-1ULL << 52) + (13ULL << 16);
14840 bfd_put_32 (input_bfd, pinsn >> 32,
14841 contents + rel->r_offset);
14842 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14843 contents + rel->r_offset + 4);
14844 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14845 r_symndx = STN_UNDEF;
14846 r_type = R_PPC64_TPREL34;
14847 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14848 goto again;
14849 }
14850 break;
14851
14852 case R_PPC64_TLSGD:
14853 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
14854 && rel + 1 < relend)
14855 {
14856 unsigned int insn2;
14857 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
14858
14859 offset = rel->r_offset;
14860 if (is_plt_seq_reloc (r_type1))
14861 {
14862 bfd_put_32 (output_bfd, NOP, contents + offset);
14863 if (r_type1 == R_PPC64_PLT_PCREL34
14864 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14865 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14866 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14867 break;
14868 }
14869
14870 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14871 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14872
14873 if ((tls_mask & TLS_GDIE) != 0)
14874 {
14875 /* IE */
14876 r_type = R_PPC64_NONE;
14877 insn2 = 0x7c636a14; /* add 3,3,13 */
14878 }
14879 else
14880 {
14881 /* LE */
14882 if (toc_symndx != 0)
14883 {
14884 r_symndx = toc_symndx;
14885 rel->r_addend = toc_addend;
14886 }
14887 if (r_type1 == R_PPC64_REL24_NOTOC
14888 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14889 {
14890 r_type = R_PPC64_NONE;
14891 insn2 = NOP;
14892 }
14893 else
14894 {
14895 rel->r_offset = offset + d_offset;
14896 r_type = R_PPC64_TPREL16_LO;
14897 insn2 = 0x38630000; /* addi 3,3,0 */
14898 }
14899 }
14900 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14901 /* Zap the reloc on the _tls_get_addr call too. */
14902 BFD_ASSERT (offset == rel[1].r_offset);
14903 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14904 bfd_put_32 (input_bfd, insn2, contents + offset);
14905 if ((tls_mask & TLS_GDIE) == 0
14906 && toc_symndx != 0
14907 && r_type != R_PPC64_NONE)
14908 goto again;
14909 }
14910 break;
14911
14912 case R_PPC64_TLSLD:
14913 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
14914 && rel + 1 < relend)
14915 {
14916 unsigned int insn2;
14917 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
14918
14919 offset = rel->r_offset;
14920 if (is_plt_seq_reloc (r_type1))
14921 {
14922 bfd_put_32 (output_bfd, NOP, contents + offset);
14923 if (r_type1 == R_PPC64_PLT_PCREL34
14924 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14925 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14926 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14927 break;
14928 }
14929
14930 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14931 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14932
14933 if (r_type1 == R_PPC64_REL24_NOTOC
14934 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14935 {
14936 r_type = R_PPC64_NONE;
14937 insn2 = NOP;
14938 }
14939 else
14940 {
14941 rel->r_offset = offset + d_offset;
14942 r_symndx = STN_UNDEF;
14943 r_type = R_PPC64_TPREL16_LO;
14944 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14945 insn2 = 0x38630000; /* addi 3,3,0 */
14946 }
14947 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14948 /* Zap the reloc on the _tls_get_addr call too. */
14949 BFD_ASSERT (offset == rel[1].r_offset);
14950 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14951 bfd_put_32 (input_bfd, insn2, contents + offset);
14952 if (r_type != R_PPC64_NONE)
14953 goto again;
14954 }
14955 break;
14956
14957 case R_PPC64_DTPMOD64:
14958 if (rel + 1 < relend
14959 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14960 && rel[1].r_offset == rel->r_offset + 8)
14961 {
14962 if ((tls_mask & TLS_GD) == 0)
14963 {
14964 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
14965 if ((tls_mask & TLS_GDIE) != 0)
14966 r_type = R_PPC64_TPREL64;
14967 else
14968 {
14969 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14970 r_type = R_PPC64_NONE;
14971 }
14972 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14973 }
14974 }
14975 else
14976 {
14977 if ((tls_mask & TLS_LD) == 0)
14978 {
14979 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14980 r_type = R_PPC64_NONE;
14981 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14982 }
14983 }
14984 break;
14985
14986 case R_PPC64_TPREL64:
14987 if ((tls_mask & TLS_TPREL) == 0)
14988 {
14989 r_type = R_PPC64_NONE;
14990 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14991 }
14992 break;
14993
14994 case R_PPC64_ENTRY:
14995 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14996 if (!bfd_link_pic (info)
14997 && !info->traditional_format
14998 && relocation + 0x80008000 <= 0xffffffff)
14999 {
15000 unsigned int insn1, insn2;
15001
15002 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15003 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15004 if ((insn1 & ~0xfffc) == LD_R2_0R12
15005 && insn2 == ADD_R2_R2_R12)
15006 {
15007 bfd_put_32 (input_bfd,
15008 LIS_R2 + PPC_HA (relocation),
15009 contents + rel->r_offset);
15010 bfd_put_32 (input_bfd,
15011 ADDI_R2_R2 + PPC_LO (relocation),
15012 contents + rel->r_offset + 4);
15013 }
15014 }
15015 else
15016 {
15017 relocation -= (rel->r_offset
15018 + input_section->output_offset
15019 + input_section->output_section->vma);
15020 if (relocation + 0x80008000 <= 0xffffffff)
15021 {
15022 unsigned int insn1, insn2;
15023
15024 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15025 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15026 if ((insn1 & ~0xfffc) == LD_R2_0R12
15027 && insn2 == ADD_R2_R2_R12)
15028 {
15029 bfd_put_32 (input_bfd,
15030 ADDIS_R2_R12 + PPC_HA (relocation),
15031 contents + rel->r_offset);
15032 bfd_put_32 (input_bfd,
15033 ADDI_R2_R2 + PPC_LO (relocation),
15034 contents + rel->r_offset + 4);
15035 }
15036 }
15037 }
15038 break;
15039
15040 case R_PPC64_REL16_HA:
15041 /* If we are generating a non-PIC executable, edit
15042 . 0: addis 2,12,.TOC.-0b@ha
15043 . addi 2,2,.TOC.-0b@l
15044 used by ELFv2 global entry points to set up r2, to
15045 . lis 2,.TOC.@ha
15046 . addi 2,2,.TOC.@l
15047 if .TOC. is in range. */
15048 if (!bfd_link_pic (info)
15049 && !info->traditional_format
15050 && !htab->opd_abi
15051 && rel->r_addend == d_offset
15052 && h != NULL && &h->elf == htab->elf.hgot
15053 && rel + 1 < relend
15054 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15055 && rel[1].r_offset == rel->r_offset + 4
15056 && rel[1].r_addend == rel->r_addend + 4
15057 && relocation + 0x80008000 <= 0xffffffff)
15058 {
15059 unsigned int insn1, insn2;
15060 offset = rel->r_offset - d_offset;
15061 insn1 = bfd_get_32 (input_bfd, contents + offset);
15062 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15063 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15064 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15065 {
15066 r_type = R_PPC64_ADDR16_HA;
15067 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15068 rel->r_addend -= d_offset;
15069 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15070 rel[1].r_addend -= d_offset + 4;
15071 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15072 }
15073 }
15074 break;
15075 }
15076
15077 /* Handle other relocations that tweak non-addend part of insn. */
15078 insn = 0;
15079 max_br_offset = 1 << 25;
15080 addend = rel->r_addend;
15081 reloc_dest = DEST_NORMAL;
15082 switch (r_type)
15083 {
15084 default:
15085 break;
15086
15087 case R_PPC64_TOCSAVE:
15088 if (relocation + addend == (rel->r_offset
15089 + input_section->output_offset
15090 + input_section->output_section->vma)
15091 && tocsave_find (htab, NO_INSERT,
15092 &local_syms, rel, input_bfd))
15093 {
15094 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15095 if (insn == NOP
15096 || insn == CROR_151515 || insn == CROR_313131)
15097 bfd_put_32 (input_bfd,
15098 STD_R2_0R1 + STK_TOC (htab),
15099 contents + rel->r_offset);
15100 }
15101 break;
15102
15103 /* Branch taken prediction relocations. */
15104 case R_PPC64_ADDR14_BRTAKEN:
15105 case R_PPC64_REL14_BRTAKEN:
15106 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15107 /* Fall through. */
15108
15109 /* Branch not taken prediction relocations. */
15110 case R_PPC64_ADDR14_BRNTAKEN:
15111 case R_PPC64_REL14_BRNTAKEN:
15112 insn |= bfd_get_32 (input_bfd,
15113 contents + rel->r_offset) & ~(0x01 << 21);
15114 /* Fall through. */
15115
15116 case R_PPC64_REL14:
15117 max_br_offset = 1 << 15;
15118 /* Fall through. */
15119
15120 case R_PPC64_REL24:
15121 case R_PPC64_REL24_NOTOC:
15122 case R_PPC64_PLTCALL:
15123 case R_PPC64_PLTCALL_NOTOC:
15124 /* Calls to functions with a different TOC, such as calls to
15125 shared objects, need to alter the TOC pointer. This is
15126 done using a linkage stub. A REL24 branching to these
15127 linkage stubs needs to be followed by a nop, as the nop
15128 will be replaced with an instruction to restore the TOC
15129 base pointer. */
15130 fdh = h;
15131 if (h != NULL
15132 && h->oh != NULL
15133 && h->oh->is_func_descriptor)
15134 fdh = ppc_follow_link (h->oh);
15135 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15136 htab);
15137 if ((r_type == R_PPC64_PLTCALL
15138 || r_type == R_PPC64_PLTCALL_NOTOC)
15139 && stub_entry != NULL
15140 && stub_entry->stub_type >= ppc_stub_plt_call
15141 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15142 stub_entry = NULL;
15143
15144 if (stub_entry != NULL
15145 && ((stub_entry->stub_type >= ppc_stub_plt_call
15146 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15147 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15148 || stub_entry->stub_type == ppc_stub_plt_branch_both
15149 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15150 || stub_entry->stub_type == ppc_stub_long_branch_both))
15151 {
15152 bfd_boolean can_plt_call = FALSE;
15153
15154 if (stub_entry->stub_type == ppc_stub_plt_call
15155 && !htab->opd_abi
15156 && htab->params->plt_localentry0 != 0
15157 && is_elfv2_localentry0 (&h->elf))
15158 {
15159 /* The function doesn't use or change r2. */
15160 can_plt_call = TRUE;
15161 }
15162 else if (r_type == R_PPC64_REL24_NOTOC)
15163 {
15164 /* NOTOC calls don't need to restore r2. */
15165 can_plt_call = TRUE;
15166 }
15167
15168 /* All of these stubs may modify r2, so there must be a
15169 branch and link followed by a nop. The nop is
15170 replaced by an insn to restore r2. */
15171 else if (rel->r_offset + 8 <= input_section->size)
15172 {
15173 unsigned long br;
15174
15175 br = bfd_get_32 (input_bfd,
15176 contents + rel->r_offset);
15177 if ((br & 1) != 0)
15178 {
15179 unsigned long nop;
15180
15181 nop = bfd_get_32 (input_bfd,
15182 contents + rel->r_offset + 4);
15183 if (nop == LD_R2_0R1 + STK_TOC (htab))
15184 can_plt_call = TRUE;
15185 else if (nop == NOP
15186 || nop == CROR_151515
15187 || nop == CROR_313131)
15188 {
15189 if (h != NULL
15190 && (h == htab->tls_get_addr_fd
15191 || h == htab->tls_get_addr)
15192 && htab->params->tls_get_addr_opt)
15193 {
15194 /* Special stub used, leave nop alone. */
15195 }
15196 else
15197 bfd_put_32 (input_bfd,
15198 LD_R2_0R1 + STK_TOC (htab),
15199 contents + rel->r_offset + 4);
15200 can_plt_call = TRUE;
15201 }
15202 }
15203 }
15204
15205 if (!can_plt_call && h != NULL)
15206 {
15207 const char *name = h->elf.root.root.string;
15208
15209 if (*name == '.')
15210 ++name;
15211
15212 if (strncmp (name, "__libc_start_main", 17) == 0
15213 && (name[17] == 0 || name[17] == '@'))
15214 {
15215 /* Allow crt1 branch to go via a toc adjusting
15216 stub. Other calls that never return could do
15217 the same, if we could detect such. */
15218 can_plt_call = TRUE;
15219 }
15220 }
15221
15222 if (!can_plt_call)
15223 {
15224 /* g++ as of 20130507 emits self-calls without a
15225 following nop. This is arguably wrong since we
15226 have conflicting information. On the one hand a
15227 global symbol and on the other a local call
15228 sequence, but don't error for this special case.
15229 It isn't possible to cheaply verify we have
15230 exactly such a call. Allow all calls to the same
15231 section. */
15232 asection *code_sec = sec;
15233
15234 if (get_opd_info (sec) != NULL)
15235 {
15236 bfd_vma off = (relocation + addend
15237 - sec->output_section->vma
15238 - sec->output_offset);
15239
15240 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15241 }
15242 if (code_sec == input_section)
15243 can_plt_call = TRUE;
15244 }
15245
15246 if (!can_plt_call)
15247 {
15248 if (stub_entry->stub_type >= ppc_stub_plt_call
15249 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15250 info->callbacks->einfo
15251 /* xgettext:c-format */
15252 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15253 "(plt call stub)\n"),
15254 input_bfd, input_section, rel->r_offset, sym_name);
15255 else
15256 info->callbacks->einfo
15257 /* xgettext:c-format */
15258 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15259 "(toc save/adjust stub)\n"),
15260 input_bfd, input_section, rel->r_offset, sym_name);
15261
15262 bfd_set_error (bfd_error_bad_value);
15263 ret = FALSE;
15264 }
15265
15266 if (can_plt_call
15267 && stub_entry->stub_type >= ppc_stub_plt_call
15268 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15269 unresolved_reloc = FALSE;
15270 }
15271
15272 if ((stub_entry == NULL
15273 || stub_entry->stub_type == ppc_stub_long_branch
15274 || stub_entry->stub_type == ppc_stub_plt_branch)
15275 && get_opd_info (sec) != NULL)
15276 {
15277 /* The branch destination is the value of the opd entry. */
15278 bfd_vma off = (relocation + addend
15279 - sec->output_section->vma
15280 - sec->output_offset);
15281 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15282 if (dest != (bfd_vma) -1)
15283 {
15284 relocation = dest;
15285 addend = 0;
15286 reloc_dest = DEST_OPD;
15287 }
15288 }
15289
15290 /* If the branch is out of reach we ought to have a long
15291 branch stub. */
15292 from = (rel->r_offset
15293 + input_section->output_offset
15294 + input_section->output_section->vma);
15295
15296 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15297 ? fdh->elf.other
15298 : sym->st_other);
15299
15300 if (stub_entry != NULL
15301 && (stub_entry->stub_type == ppc_stub_long_branch
15302 || stub_entry->stub_type == ppc_stub_plt_branch)
15303 && (r_type == R_PPC64_ADDR14_BRTAKEN
15304 || r_type == R_PPC64_ADDR14_BRNTAKEN
15305 || (relocation + addend - from + max_br_offset
15306 < 2 * max_br_offset)))
15307 /* Don't use the stub if this branch is in range. */
15308 stub_entry = NULL;
15309
15310 if (stub_entry != NULL
15311 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15312 || stub_entry->stub_type == ppc_stub_long_branch_both
15313 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15314 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15315 && (r_type != R_PPC64_REL24_NOTOC
15316 || ((fdh ? fdh->elf.other : sym->st_other)
15317 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15318 && (relocation + addend - from + max_br_offset
15319 < 2 * max_br_offset))
15320 stub_entry = NULL;
15321
15322 if (stub_entry != NULL
15323 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15324 || stub_entry->stub_type == ppc_stub_long_branch_both
15325 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15326 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15327 && r_type == R_PPC64_REL24_NOTOC
15328 && (relocation + addend - from + max_br_offset
15329 < 2 * max_br_offset))
15330 stub_entry = NULL;
15331
15332 if (stub_entry != NULL)
15333 {
15334 /* Munge up the value and addend so that we call the stub
15335 rather than the procedure directly. */
15336 asection *stub_sec = stub_entry->group->stub_sec;
15337
15338 if (stub_entry->stub_type == ppc_stub_save_res)
15339 relocation += (stub_sec->output_offset
15340 + stub_sec->output_section->vma
15341 + stub_sec->size - htab->sfpr->size
15342 - htab->sfpr->output_offset
15343 - htab->sfpr->output_section->vma);
15344 else
15345 relocation = (stub_entry->stub_offset
15346 + stub_sec->output_offset
15347 + stub_sec->output_section->vma);
15348 addend = 0;
15349 reloc_dest = DEST_STUB;
15350
15351 if (((stub_entry->stub_type == ppc_stub_plt_call
15352 && ALWAYS_EMIT_R2SAVE)
15353 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15354 || stub_entry->stub_type == ppc_stub_plt_call_both)
15355 && !(h != NULL
15356 && (h == htab->tls_get_addr_fd
15357 || h == htab->tls_get_addr)
15358 && htab->params->tls_get_addr_opt)
15359 && rel + 1 < relend
15360 && rel[1].r_offset == rel->r_offset + 4
15361 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15362 relocation += 4;
15363 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15364 || stub_entry->stub_type == ppc_stub_plt_branch_both
15365 || stub_entry->stub_type == ppc_stub_plt_call_both)
15366 && r_type == R_PPC64_REL24_NOTOC)
15367 relocation += 4;
15368
15369 if (r_type == R_PPC64_REL24_NOTOC
15370 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15371 || stub_entry->stub_type == ppc_stub_plt_call_both))
15372 htab->notoc_plt = 1;
15373 }
15374
15375 if (insn != 0)
15376 {
15377 if (is_isa_v2)
15378 {
15379 /* Set 'a' bit. This is 0b00010 in BO field for branch
15380 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15381 for branch on CTR insns (BO == 1a00t or 1a01t). */
15382 if ((insn & (0x14 << 21)) == (0x04 << 21))
15383 insn |= 0x02 << 21;
15384 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15385 insn |= 0x08 << 21;
15386 else
15387 break;
15388 }
15389 else
15390 {
15391 /* Invert 'y' bit if not the default. */
15392 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15393 insn ^= 0x01 << 21;
15394 }
15395
15396 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15397 }
15398
15399 /* NOP out calls to undefined weak functions.
15400 We can thus call a weak function without first
15401 checking whether the function is defined. */
15402 else if (h != NULL
15403 && h->elf.root.type == bfd_link_hash_undefweak
15404 && h->elf.dynindx == -1
15405 && (r_type == R_PPC64_REL24
15406 || r_type == R_PPC64_REL24_NOTOC)
15407 && relocation == 0
15408 && addend == 0)
15409 {
15410 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15411 goto copy_reloc;
15412 }
15413 break;
15414
15415 case R_PPC64_GOT16_DS:
15416 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15417 if (relocation + addend - from + 0x8000 < 0x10000
15418 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15419 {
15420 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15421 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15422 {
15423 insn += (14u << 26) - (58u << 26);
15424 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15425 r_type = R_PPC64_TOC16;
15426 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15427 }
15428 }
15429 break;
15430
15431 case R_PPC64_GOT16_LO_DS:
15432 case R_PPC64_GOT16_HA:
15433 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15434 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15435 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15436 {
15437 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15438 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15439 {
15440 insn += (14u << 26) - (58u << 26);
15441 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15442 r_type = R_PPC64_TOC16_LO;
15443 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15444 }
15445 else if ((insn & (0x3f << 26)) == 15u << 26 /* addis */)
15446 {
15447 r_type = R_PPC64_TOC16_HA;
15448 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15449 }
15450 }
15451 break;
15452
15453 case R_PPC64_GOT_PCREL34:
15454 from = (rel->r_offset
15455 + input_section->output_section->vma
15456 + input_section->output_offset);
15457 if (relocation - from + (1ULL << 33) < 1ULL << 34
15458 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15459 {
15460 offset = rel->r_offset;
15461 pinsn = bfd_get_32 (input_bfd, contents + offset);
15462 pinsn <<= 32;
15463 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15464 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15465 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15466 {
15467 /* Replace with paddi. */
15468 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15469 r_type = R_PPC64_PCREL34;
15470 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15471 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15472 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15473 goto pcrelopt;
15474 }
15475 }
15476 break;
15477
15478 case R_PPC64_PCREL34:
15479 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15480 {
15481 offset = rel->r_offset;
15482 pinsn = bfd_get_32 (input_bfd, contents + offset);
15483 pinsn <<= 32;
15484 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15485 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15486 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15487 | (14ULL << 26) /* paddi */))
15488 {
15489 pcrelopt:
15490 if (rel + 1 < relend
15491 && rel[1].r_offset == offset
15492 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15493 {
15494 bfd_vma off2 = rel[1].r_addend;
15495 if (off2 == 0)
15496 /* zero means next insn. */
15497 off2 = 8;
15498 off2 += offset;
15499 if (off2 + 4 <= input_section->size)
15500 {
15501 uint64_t pinsn2;
15502 bfd_signed_vma addend_off;
15503 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15504 pinsn2 <<= 32;
15505 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15506 {
15507 if (off2 + 8 > input_section->size)
15508 break;
15509 pinsn2 |= bfd_get_32 (input_bfd,
15510 contents + off2 + 4);
15511 }
15512 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15513 {
15514 addend += addend_off;
15515 rel->r_addend = addend;
15516 bfd_put_32 (input_bfd, pinsn >> 32,
15517 contents + offset);
15518 bfd_put_32 (input_bfd, pinsn,
15519 contents + offset + 4);
15520 bfd_put_32 (input_bfd, pinsn2 >> 32,
15521 contents + off2);
15522 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15523 bfd_put_32 (input_bfd, pinsn2,
15524 contents + off2 + 4);
15525 }
15526 }
15527 }
15528 }
15529 }
15530 break;
15531 }
15532
15533 tls_type = 0;
15534 save_unresolved_reloc = unresolved_reloc;
15535 switch (r_type)
15536 {
15537 default:
15538 /* xgettext:c-format */
15539 _bfd_error_handler (_("%pB: %s unsupported"),
15540 input_bfd, ppc64_elf_howto_table[r_type]->name);
15541
15542 bfd_set_error (bfd_error_bad_value);
15543 ret = FALSE;
15544 goto copy_reloc;
15545
15546 case R_PPC64_NONE:
15547 case R_PPC64_TLS:
15548 case R_PPC64_TLSGD:
15549 case R_PPC64_TLSLD:
15550 case R_PPC64_TOCSAVE:
15551 case R_PPC64_GNU_VTINHERIT:
15552 case R_PPC64_GNU_VTENTRY:
15553 case R_PPC64_ENTRY:
15554 case R_PPC64_PCREL_OPT:
15555 goto copy_reloc;
15556
15557 /* GOT16 relocations. Like an ADDR16 using the symbol's
15558 address in the GOT as relocation value instead of the
15559 symbol's value itself. Also, create a GOT entry for the
15560 symbol and put the symbol value there. */
15561 case R_PPC64_GOT_TLSGD16:
15562 case R_PPC64_GOT_TLSGD16_LO:
15563 case R_PPC64_GOT_TLSGD16_HI:
15564 case R_PPC64_GOT_TLSGD16_HA:
15565 case R_PPC64_GOT_TLSGD34:
15566 tls_type = TLS_TLS | TLS_GD;
15567 goto dogot;
15568
15569 case R_PPC64_GOT_TLSLD16:
15570 case R_PPC64_GOT_TLSLD16_LO:
15571 case R_PPC64_GOT_TLSLD16_HI:
15572 case R_PPC64_GOT_TLSLD16_HA:
15573 case R_PPC64_GOT_TLSLD34:
15574 tls_type = TLS_TLS | TLS_LD;
15575 goto dogot;
15576
15577 case R_PPC64_GOT_TPREL16_DS:
15578 case R_PPC64_GOT_TPREL16_LO_DS:
15579 case R_PPC64_GOT_TPREL16_HI:
15580 case R_PPC64_GOT_TPREL16_HA:
15581 case R_PPC64_GOT_TPREL34:
15582 tls_type = TLS_TLS | TLS_TPREL;
15583 goto dogot;
15584
15585 case R_PPC64_GOT_DTPREL16_DS:
15586 case R_PPC64_GOT_DTPREL16_LO_DS:
15587 case R_PPC64_GOT_DTPREL16_HI:
15588 case R_PPC64_GOT_DTPREL16_HA:
15589 case R_PPC64_GOT_DTPREL34:
15590 tls_type = TLS_TLS | TLS_DTPREL;
15591 goto dogot;
15592
15593 case R_PPC64_GOT16:
15594 case R_PPC64_GOT16_LO:
15595 case R_PPC64_GOT16_HI:
15596 case R_PPC64_GOT16_HA:
15597 case R_PPC64_GOT16_DS:
15598 case R_PPC64_GOT16_LO_DS:
15599 case R_PPC64_GOT_PCREL34:
15600 dogot:
15601 {
15602 /* Relocation is to the entry for this symbol in the global
15603 offset table. */
15604 asection *got;
15605 bfd_vma *offp;
15606 bfd_vma off;
15607 unsigned long indx = 0;
15608 struct got_entry *ent;
15609
15610 if (tls_type == (TLS_TLS | TLS_LD)
15611 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15612 ent = ppc64_tlsld_got (input_bfd);
15613 else
15614 {
15615 if (h != NULL)
15616 {
15617 if (!htab->elf.dynamic_sections_created
15618 || h->elf.dynindx == -1
15619 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
15620 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15621 /* This is actually a static link, or it is a
15622 -Bsymbolic link and the symbol is defined
15623 locally, or the symbol was forced to be local
15624 because of a version file. */
15625 ;
15626 else
15627 {
15628 indx = h->elf.dynindx;
15629 unresolved_reloc = FALSE;
15630 }
15631 ent = h->elf.got.glist;
15632 }
15633 else
15634 {
15635 if (local_got_ents == NULL)
15636 abort ();
15637 ent = local_got_ents[r_symndx];
15638 }
15639
15640 for (; ent != NULL; ent = ent->next)
15641 if (ent->addend == orig_rel.r_addend
15642 && ent->owner == input_bfd
15643 && ent->tls_type == tls_type)
15644 break;
15645 }
15646
15647 if (ent == NULL)
15648 abort ();
15649 if (ent->is_indirect)
15650 ent = ent->got.ent;
15651 offp = &ent->got.offset;
15652 got = ppc64_elf_tdata (ent->owner)->got;
15653 if (got == NULL)
15654 abort ();
15655
15656 /* The offset must always be a multiple of 8. We use the
15657 least significant bit to record whether we have already
15658 processed this entry. */
15659 off = *offp;
15660 if ((off & 1) != 0)
15661 off &= ~1;
15662 else
15663 {
15664 /* Generate relocs for the dynamic linker, except in
15665 the case of TLSLD where we'll use one entry per
15666 module. */
15667 asection *relgot;
15668 bfd_boolean ifunc;
15669
15670 *offp = off | 1;
15671 relgot = NULL;
15672 ifunc = (h != NULL
15673 ? h->elf.type == STT_GNU_IFUNC
15674 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
15675 if (ifunc)
15676 {
15677 relgot = htab->elf.irelplt;
15678 if (indx == 0)
15679 htab->local_ifunc_resolver = 1;
15680 else if (is_static_defined (&h->elf))
15681 htab->maybe_local_ifunc_resolver = 1;
15682 }
15683 else if (indx != 0
15684 || (bfd_link_pic (info)
15685 && (h == NULL
15686 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15687 && !(tls_type != 0
15688 && bfd_link_executable (info)
15689 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
15690 relgot = ppc64_elf_tdata (ent->owner)->relgot;
15691 if (relgot != NULL)
15692 {
15693 outrel.r_offset = (got->output_section->vma
15694 + got->output_offset
15695 + off);
15696 outrel.r_addend = orig_rel.r_addend;
15697 if (tls_type & (TLS_LD | TLS_GD))
15698 {
15699 outrel.r_addend = 0;
15700 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
15701 if (tls_type == (TLS_TLS | TLS_GD))
15702 {
15703 loc = relgot->contents;
15704 loc += (relgot->reloc_count++
15705 * sizeof (Elf64_External_Rela));
15706 bfd_elf64_swap_reloca_out (output_bfd,
15707 &outrel, loc);
15708 outrel.r_offset += 8;
15709 outrel.r_addend = orig_rel.r_addend;
15710 outrel.r_info
15711 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15712 }
15713 }
15714 else if (tls_type == (TLS_TLS | TLS_DTPREL))
15715 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15716 else if (tls_type == (TLS_TLS | TLS_TPREL))
15717 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
15718 else if (indx != 0)
15719 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15720 else
15721 {
15722 if (ifunc)
15723 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15724 else
15725 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
15726
15727 /* Write the .got section contents for the sake
15728 of prelink. */
15729 loc = got->contents + off;
15730 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15731 loc);
15732 }
15733
15734 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
15735 {
15736 outrel.r_addend += relocation;
15737 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
15738 {
15739 if (htab->elf.tls_sec == NULL)
15740 outrel.r_addend = 0;
15741 else
15742 outrel.r_addend -= htab->elf.tls_sec->vma;
15743 }
15744 }
15745 loc = relgot->contents;
15746 loc += (relgot->reloc_count++
15747 * sizeof (Elf64_External_Rela));
15748 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15749 }
15750
15751 /* Init the .got section contents here if we're not
15752 emitting a reloc. */
15753 else
15754 {
15755 relocation += orig_rel.r_addend;
15756 if (tls_type != 0)
15757 {
15758 if (htab->elf.tls_sec == NULL)
15759 relocation = 0;
15760 else
15761 {
15762 if (tls_type & TLS_LD)
15763 relocation = 0;
15764 else
15765 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
15766 if (tls_type & TLS_TPREL)
15767 relocation += DTP_OFFSET - TP_OFFSET;
15768 }
15769
15770 if (tls_type & (TLS_GD | TLS_LD))
15771 {
15772 bfd_put_64 (output_bfd, relocation,
15773 got->contents + off + 8);
15774 relocation = 1;
15775 }
15776 }
15777 bfd_put_64 (output_bfd, relocation,
15778 got->contents + off);
15779 }
15780 }
15781
15782 if (off >= (bfd_vma) -2)
15783 abort ();
15784
15785 relocation = got->output_section->vma + got->output_offset + off;
15786 addend = 0;
15787 if (!(r_type == R_PPC64_GOT_PCREL34
15788 || r_type == R_PPC64_GOT_TLSGD34
15789 || r_type == R_PPC64_GOT_TLSLD34
15790 || r_type == R_PPC64_GOT_TPREL34
15791 || r_type == R_PPC64_GOT_DTPREL34))
15792 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
15793 }
15794 break;
15795
15796 case R_PPC64_PLT16_HA:
15797 case R_PPC64_PLT16_HI:
15798 case R_PPC64_PLT16_LO:
15799 case R_PPC64_PLT16_LO_DS:
15800 case R_PPC64_PLT_PCREL34:
15801 case R_PPC64_PLT_PCREL34_NOTOC:
15802 case R_PPC64_PLT32:
15803 case R_PPC64_PLT64:
15804 case R_PPC64_PLTSEQ:
15805 case R_PPC64_PLTSEQ_NOTOC:
15806 case R_PPC64_PLTCALL:
15807 case R_PPC64_PLTCALL_NOTOC:
15808 /* Relocation is to the entry for this symbol in the
15809 procedure linkage table. */
15810 unresolved_reloc = TRUE;
15811 {
15812 struct plt_entry **plt_list = NULL;
15813 if (h != NULL)
15814 plt_list = &h->elf.plt.plist;
15815 else if (local_got_ents != NULL)
15816 {
15817 struct plt_entry **local_plt = (struct plt_entry **)
15818 (local_got_ents + symtab_hdr->sh_info);
15819 plt_list = local_plt + r_symndx;
15820 }
15821 if (plt_list)
15822 {
15823 struct plt_entry *ent;
15824
15825 for (ent = *plt_list; ent != NULL; ent = ent->next)
15826 if (ent->plt.offset != (bfd_vma) -1
15827 && ent->addend == orig_rel.r_addend)
15828 {
15829 asection *plt;
15830 bfd_vma got;
15831
15832 plt = htab->elf.splt;
15833 if (!htab->elf.dynamic_sections_created
15834 || h == NULL
15835 || h->elf.dynindx == -1)
15836 {
15837 if (h != NULL
15838 ? h->elf.type == STT_GNU_IFUNC
15839 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15840 plt = htab->elf.iplt;
15841 else
15842 plt = htab->pltlocal;
15843 }
15844 relocation = (plt->output_section->vma
15845 + plt->output_offset
15846 + ent->plt.offset);
15847 if (r_type == R_PPC64_PLT16_HA
15848 || r_type == R_PPC64_PLT16_HI
15849 || r_type == R_PPC64_PLT16_LO
15850 || r_type == R_PPC64_PLT16_LO_DS)
15851 {
15852 got = (elf_gp (output_bfd)
15853 + htab->sec_info[input_section->id].toc_off);
15854 relocation -= got;
15855 }
15856 addend = 0;
15857 unresolved_reloc = FALSE;
15858 break;
15859 }
15860 }
15861 }
15862 break;
15863
15864 case R_PPC64_TOC:
15865 /* Relocation value is TOC base. */
15866 relocation = TOCstart;
15867 if (r_symndx == STN_UNDEF)
15868 relocation += htab->sec_info[input_section->id].toc_off;
15869 else if (unresolved_reloc)
15870 ;
15871 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15872 relocation += htab->sec_info[sec->id].toc_off;
15873 else
15874 unresolved_reloc = TRUE;
15875 goto dodyn;
15876
15877 /* TOC16 relocs. We want the offset relative to the TOC base,
15878 which is the address of the start of the TOC plus 0x8000.
15879 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15880 in this order. */
15881 case R_PPC64_TOC16:
15882 case R_PPC64_TOC16_LO:
15883 case R_PPC64_TOC16_HI:
15884 case R_PPC64_TOC16_DS:
15885 case R_PPC64_TOC16_LO_DS:
15886 case R_PPC64_TOC16_HA:
15887 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
15888 if (h != NULL)
15889 goto dodyn;
15890 break;
15891
15892 /* Relocate against the beginning of the section. */
15893 case R_PPC64_SECTOFF:
15894 case R_PPC64_SECTOFF_LO:
15895 case R_PPC64_SECTOFF_HI:
15896 case R_PPC64_SECTOFF_DS:
15897 case R_PPC64_SECTOFF_LO_DS:
15898 case R_PPC64_SECTOFF_HA:
15899 if (sec != NULL)
15900 addend -= sec->output_section->vma;
15901 break;
15902
15903 case R_PPC64_REL16:
15904 case R_PPC64_REL16_LO:
15905 case R_PPC64_REL16_HI:
15906 case R_PPC64_REL16_HA:
15907 case R_PPC64_REL16_HIGH:
15908 case R_PPC64_REL16_HIGHA:
15909 case R_PPC64_REL16_HIGHER:
15910 case R_PPC64_REL16_HIGHERA:
15911 case R_PPC64_REL16_HIGHEST:
15912 case R_PPC64_REL16_HIGHESTA:
15913 case R_PPC64_REL16_HIGHER34:
15914 case R_PPC64_REL16_HIGHERA34:
15915 case R_PPC64_REL16_HIGHEST34:
15916 case R_PPC64_REL16_HIGHESTA34:
15917 case R_PPC64_REL16DX_HA:
15918 case R_PPC64_REL14:
15919 case R_PPC64_REL14_BRNTAKEN:
15920 case R_PPC64_REL14_BRTAKEN:
15921 case R_PPC64_REL24:
15922 case R_PPC64_REL24_NOTOC:
15923 case R_PPC64_PCREL34:
15924 case R_PPC64_PCREL28:
15925 break;
15926
15927 case R_PPC64_TPREL16:
15928 case R_PPC64_TPREL16_LO:
15929 case R_PPC64_TPREL16_HI:
15930 case R_PPC64_TPREL16_HA:
15931 case R_PPC64_TPREL16_DS:
15932 case R_PPC64_TPREL16_LO_DS:
15933 case R_PPC64_TPREL16_HIGH:
15934 case R_PPC64_TPREL16_HIGHA:
15935 case R_PPC64_TPREL16_HIGHER:
15936 case R_PPC64_TPREL16_HIGHERA:
15937 case R_PPC64_TPREL16_HIGHEST:
15938 case R_PPC64_TPREL16_HIGHESTA:
15939 case R_PPC64_TPREL34:
15940 if (h != NULL
15941 && h->elf.root.type == bfd_link_hash_undefweak
15942 && h->elf.dynindx == -1)
15943 {
15944 /* Make this relocation against an undefined weak symbol
15945 resolve to zero. This is really just a tweak, since
15946 code using weak externs ought to check that they are
15947 defined before using them. */
15948 bfd_byte *p = contents + rel->r_offset - d_offset;
15949
15950 insn = bfd_get_32 (input_bfd, p);
15951 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15952 if (insn != 0)
15953 bfd_put_32 (input_bfd, insn, p);
15954 break;
15955 }
15956 if (htab->elf.tls_sec != NULL)
15957 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
15958 /* The TPREL16 relocs shouldn't really be used in shared
15959 libs or with non-local symbols as that will result in
15960 DT_TEXTREL being set, but support them anyway. */
15961 goto dodyn;
15962
15963 case R_PPC64_DTPREL16:
15964 case R_PPC64_DTPREL16_LO:
15965 case R_PPC64_DTPREL16_HI:
15966 case R_PPC64_DTPREL16_HA:
15967 case R_PPC64_DTPREL16_DS:
15968 case R_PPC64_DTPREL16_LO_DS:
15969 case R_PPC64_DTPREL16_HIGH:
15970 case R_PPC64_DTPREL16_HIGHA:
15971 case R_PPC64_DTPREL16_HIGHER:
15972 case R_PPC64_DTPREL16_HIGHERA:
15973 case R_PPC64_DTPREL16_HIGHEST:
15974 case R_PPC64_DTPREL16_HIGHESTA:
15975 case R_PPC64_DTPREL34:
15976 if (htab->elf.tls_sec != NULL)
15977 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
15978 break;
15979
15980 case R_PPC64_ADDR64_LOCAL:
15981 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15982 ? h->elf.other
15983 : sym->st_other);
15984 break;
15985
15986 case R_PPC64_DTPMOD64:
15987 relocation = 1;
15988 addend = 0;
15989 goto dodyn;
15990
15991 case R_PPC64_TPREL64:
15992 if (htab->elf.tls_sec != NULL)
15993 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
15994 goto dodyn;
15995
15996 case R_PPC64_DTPREL64:
15997 if (htab->elf.tls_sec != NULL)
15998 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
15999 /* Fall through. */
16000
16001 /* Relocations that may need to be propagated if this is a
16002 dynamic object. */
16003 case R_PPC64_REL30:
16004 case R_PPC64_REL32:
16005 case R_PPC64_REL64:
16006 case R_PPC64_ADDR14:
16007 case R_PPC64_ADDR14_BRNTAKEN:
16008 case R_PPC64_ADDR14_BRTAKEN:
16009 case R_PPC64_ADDR16:
16010 case R_PPC64_ADDR16_DS:
16011 case R_PPC64_ADDR16_HA:
16012 case R_PPC64_ADDR16_HI:
16013 case R_PPC64_ADDR16_HIGH:
16014 case R_PPC64_ADDR16_HIGHA:
16015 case R_PPC64_ADDR16_HIGHER:
16016 case R_PPC64_ADDR16_HIGHERA:
16017 case R_PPC64_ADDR16_HIGHEST:
16018 case R_PPC64_ADDR16_HIGHESTA:
16019 case R_PPC64_ADDR16_LO:
16020 case R_PPC64_ADDR16_LO_DS:
16021 case R_PPC64_ADDR16_HIGHER34:
16022 case R_PPC64_ADDR16_HIGHERA34:
16023 case R_PPC64_ADDR16_HIGHEST34:
16024 case R_PPC64_ADDR16_HIGHESTA34:
16025 case R_PPC64_ADDR24:
16026 case R_PPC64_ADDR32:
16027 case R_PPC64_ADDR64:
16028 case R_PPC64_UADDR16:
16029 case R_PPC64_UADDR32:
16030 case R_PPC64_UADDR64:
16031 case R_PPC64_D34:
16032 case R_PPC64_D34_LO:
16033 case R_PPC64_D34_HI30:
16034 case R_PPC64_D34_HA30:
16035 case R_PPC64_D28:
16036 dodyn:
16037 if ((input_section->flags & SEC_ALLOC) == 0)
16038 break;
16039
16040 if (NO_OPD_RELOCS && is_opd)
16041 break;
16042
16043 if (bfd_link_pic (info)
16044 ? ((h == NULL
16045 || h->dyn_relocs != NULL)
16046 && ((h != NULL && pc_dynrelocs (h))
16047 || must_be_dyn_reloc (info, r_type)))
16048 : (h != NULL
16049 ? h->dyn_relocs != NULL
16050 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16051 {
16052 bfd_boolean skip, relocate;
16053 asection *sreloc;
16054 bfd_vma out_off;
16055 long indx = 0;
16056
16057 /* When generating a dynamic object, these relocations
16058 are copied into the output file to be resolved at run
16059 time. */
16060
16061 skip = FALSE;
16062 relocate = FALSE;
16063
16064 out_off = _bfd_elf_section_offset (output_bfd, info,
16065 input_section, rel->r_offset);
16066 if (out_off == (bfd_vma) -1)
16067 skip = TRUE;
16068 else if (out_off == (bfd_vma) -2)
16069 skip = TRUE, relocate = TRUE;
16070 out_off += (input_section->output_section->vma
16071 + input_section->output_offset);
16072 outrel.r_offset = out_off;
16073 outrel.r_addend = rel->r_addend;
16074
16075 /* Optimize unaligned reloc use. */
16076 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16077 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16078 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16079 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16080 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16081 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16082 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16083 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16084 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16085
16086 if (skip)
16087 memset (&outrel, 0, sizeof outrel);
16088 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16089 && !is_opd
16090 && r_type != R_PPC64_TOC)
16091 {
16092 indx = h->elf.dynindx;
16093 BFD_ASSERT (indx != -1);
16094 outrel.r_info = ELF64_R_INFO (indx, r_type);
16095 }
16096 else
16097 {
16098 /* This symbol is local, or marked to become local,
16099 or this is an opd section reloc which must point
16100 at a local function. */
16101 outrel.r_addend += relocation;
16102 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16103 {
16104 if (is_opd && h != NULL)
16105 {
16106 /* Lie about opd entries. This case occurs
16107 when building shared libraries and we
16108 reference a function in another shared
16109 lib. The same thing happens for a weak
16110 definition in an application that's
16111 overridden by a strong definition in a
16112 shared lib. (I believe this is a generic
16113 bug in binutils handling of weak syms.)
16114 In these cases we won't use the opd
16115 entry in this lib. */
16116 unresolved_reloc = FALSE;
16117 }
16118 if (!is_opd
16119 && r_type == R_PPC64_ADDR64
16120 && (h != NULL
16121 ? h->elf.type == STT_GNU_IFUNC
16122 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16123 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16124 else
16125 {
16126 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16127
16128 /* We need to relocate .opd contents for ld.so.
16129 Prelink also wants simple and consistent rules
16130 for relocs. This make all RELATIVE relocs have
16131 *r_offset equal to r_addend. */
16132 relocate = TRUE;
16133 }
16134 }
16135 else
16136 {
16137 if (h != NULL
16138 ? h->elf.type == STT_GNU_IFUNC
16139 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16140 {
16141 info->callbacks->einfo
16142 /* xgettext:c-format */
16143 (_("%H: %s for indirect "
16144 "function `%pT' unsupported\n"),
16145 input_bfd, input_section, rel->r_offset,
16146 ppc64_elf_howto_table[r_type]->name,
16147 sym_name);
16148 ret = FALSE;
16149 }
16150 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16151 ;
16152 else if (sec == NULL || sec->owner == NULL)
16153 {
16154 bfd_set_error (bfd_error_bad_value);
16155 return FALSE;
16156 }
16157 else
16158 {
16159 asection *osec = sec->output_section;
16160
16161 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16162 {
16163 /* TLS symbol values are relative to the
16164 TLS segment. Dynamic relocations for
16165 local TLS symbols therefore can't be
16166 reduced to a relocation against their
16167 section symbol because it holds the
16168 address of the section, not a value
16169 relative to the TLS segment. We could
16170 change the .tdata dynamic section symbol
16171 to be zero value but STN_UNDEF works
16172 and is used elsewhere, eg. for TPREL64
16173 GOT relocs against local TLS symbols. */
16174 osec = htab->elf.tls_sec;
16175 indx = 0;
16176 }
16177 else
16178 {
16179 indx = elf_section_data (osec)->dynindx;
16180 if (indx == 0)
16181 {
16182 if ((osec->flags & SEC_READONLY) == 0
16183 && htab->elf.data_index_section != NULL)
16184 osec = htab->elf.data_index_section;
16185 else
16186 osec = htab->elf.text_index_section;
16187 indx = elf_section_data (osec)->dynindx;
16188 }
16189 BFD_ASSERT (indx != 0);
16190 }
16191
16192 /* We are turning this relocation into one
16193 against a section symbol, so subtract out
16194 the output section's address but not the
16195 offset of the input section in the output
16196 section. */
16197 outrel.r_addend -= osec->vma;
16198 }
16199
16200 outrel.r_info = ELF64_R_INFO (indx, r_type);
16201 }
16202 }
16203
16204 sreloc = elf_section_data (input_section)->sreloc;
16205 if (h != NULL
16206 ? h->elf.type == STT_GNU_IFUNC
16207 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16208 {
16209 sreloc = htab->elf.irelplt;
16210 if (indx == 0)
16211 htab->local_ifunc_resolver = 1;
16212 else if (is_static_defined (&h->elf))
16213 htab->maybe_local_ifunc_resolver = 1;
16214 }
16215 if (sreloc == NULL)
16216 abort ();
16217
16218 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16219 >= sreloc->size)
16220 abort ();
16221 loc = sreloc->contents;
16222 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16223 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16224
16225 if (!warned_dynamic
16226 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16227 {
16228 info->callbacks->einfo
16229 /* xgettext:c-format */
16230 (_("%X%P: %pB: %s against %pT "
16231 "is not supported by glibc as a dynamic relocation\n"),
16232 input_bfd,
16233 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16234 sym_name);
16235 warned_dynamic = TRUE;
16236 }
16237
16238 /* If this reloc is against an external symbol, it will
16239 be computed at runtime, so there's no need to do
16240 anything now. However, for the sake of prelink ensure
16241 that the section contents are a known value. */
16242 if (!relocate)
16243 {
16244 unresolved_reloc = FALSE;
16245 /* The value chosen here is quite arbitrary as ld.so
16246 ignores section contents except for the special
16247 case of .opd where the contents might be accessed
16248 before relocation. Choose zero, as that won't
16249 cause reloc overflow. */
16250 relocation = 0;
16251 addend = 0;
16252 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16253 to improve backward compatibility with older
16254 versions of ld. */
16255 if (r_type == R_PPC64_ADDR64)
16256 addend = outrel.r_addend;
16257 /* Adjust pc_relative relocs to have zero in *r_offset. */
16258 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16259 addend = outrel.r_offset;
16260 }
16261 }
16262 break;
16263
16264 case R_PPC64_COPY:
16265 case R_PPC64_GLOB_DAT:
16266 case R_PPC64_JMP_SLOT:
16267 case R_PPC64_JMP_IREL:
16268 case R_PPC64_RELATIVE:
16269 /* We shouldn't ever see these dynamic relocs in relocatable
16270 files. */
16271 /* Fall through. */
16272
16273 case R_PPC64_PLTGOT16:
16274 case R_PPC64_PLTGOT16_DS:
16275 case R_PPC64_PLTGOT16_HA:
16276 case R_PPC64_PLTGOT16_HI:
16277 case R_PPC64_PLTGOT16_LO:
16278 case R_PPC64_PLTGOT16_LO_DS:
16279 case R_PPC64_PLTREL32:
16280 case R_PPC64_PLTREL64:
16281 /* These ones haven't been implemented yet. */
16282
16283 info->callbacks->einfo
16284 /* xgettext:c-format */
16285 (_("%P: %pB: %s is not supported for `%pT'\n"),
16286 input_bfd,
16287 ppc64_elf_howto_table[r_type]->name, sym_name);
16288
16289 bfd_set_error (bfd_error_invalid_operation);
16290 ret = FALSE;
16291 goto copy_reloc;
16292 }
16293
16294 /* Multi-instruction sequences that access the TOC can be
16295 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16296 to nop; addi rb,r2,x; */
16297 switch (r_type)
16298 {
16299 default:
16300 break;
16301
16302 case R_PPC64_GOT_TLSLD16_HI:
16303 case R_PPC64_GOT_TLSGD16_HI:
16304 case R_PPC64_GOT_TPREL16_HI:
16305 case R_PPC64_GOT_DTPREL16_HI:
16306 case R_PPC64_GOT16_HI:
16307 case R_PPC64_TOC16_HI:
16308 /* These relocs would only be useful if building up an
16309 offset to later add to r2, perhaps in an indexed
16310 addressing mode instruction. Don't try to optimize.
16311 Unfortunately, the possibility of someone building up an
16312 offset like this or even with the HA relocs, means that
16313 we need to check the high insn when optimizing the low
16314 insn. */
16315 break;
16316
16317 case R_PPC64_PLTCALL_NOTOC:
16318 if (!unresolved_reloc)
16319 htab->notoc_plt = 1;
16320 /* Fall through. */
16321 case R_PPC64_PLTCALL:
16322 if (unresolved_reloc)
16323 {
16324 /* No plt entry. Make this into a direct call. */
16325 bfd_byte *p = contents + rel->r_offset;
16326 insn = bfd_get_32 (input_bfd, p);
16327 insn &= 1;
16328 bfd_put_32 (input_bfd, B_DOT | insn, p);
16329 if (r_type == R_PPC64_PLTCALL)
16330 bfd_put_32 (input_bfd, NOP, p + 4);
16331 unresolved_reloc = save_unresolved_reloc;
16332 r_type = R_PPC64_REL24;
16333 }
16334 break;
16335
16336 case R_PPC64_PLTSEQ_NOTOC:
16337 case R_PPC64_PLTSEQ:
16338 if (unresolved_reloc)
16339 {
16340 unresolved_reloc = FALSE;
16341 goto nop_it;
16342 }
16343 break;
16344
16345 case R_PPC64_PLT_PCREL34_NOTOC:
16346 if (!unresolved_reloc)
16347 htab->notoc_plt = 1;
16348 /* Fall through. */
16349 case R_PPC64_PLT_PCREL34:
16350 if (unresolved_reloc)
16351 {
16352 bfd_byte *p = contents + rel->r_offset;
16353 bfd_put_32 (input_bfd, PNOP >> 32, p);
16354 bfd_put_32 (input_bfd, PNOP, p + 4);
16355 unresolved_reloc = FALSE;
16356 goto copy_reloc;
16357 }
16358 break;
16359
16360 case R_PPC64_PLT16_HA:
16361 if (unresolved_reloc)
16362 {
16363 unresolved_reloc = FALSE;
16364 goto nop_it;
16365 }
16366 /* Fall through. */
16367 case R_PPC64_GOT_TLSLD16_HA:
16368 case R_PPC64_GOT_TLSGD16_HA:
16369 case R_PPC64_GOT_TPREL16_HA:
16370 case R_PPC64_GOT_DTPREL16_HA:
16371 case R_PPC64_GOT16_HA:
16372 case R_PPC64_TOC16_HA:
16373 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16374 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16375 {
16376 bfd_byte *p;
16377 nop_it:
16378 p = contents + (rel->r_offset & ~3);
16379 bfd_put_32 (input_bfd, NOP, p);
16380 goto copy_reloc;
16381 }
16382 break;
16383
16384 case R_PPC64_PLT16_LO:
16385 case R_PPC64_PLT16_LO_DS:
16386 if (unresolved_reloc)
16387 {
16388 unresolved_reloc = FALSE;
16389 goto nop_it;
16390 }
16391 /* Fall through. */
16392 case R_PPC64_GOT_TLSLD16_LO:
16393 case R_PPC64_GOT_TLSGD16_LO:
16394 case R_PPC64_GOT_TPREL16_LO_DS:
16395 case R_PPC64_GOT_DTPREL16_LO_DS:
16396 case R_PPC64_GOT16_LO:
16397 case R_PPC64_GOT16_LO_DS:
16398 case R_PPC64_TOC16_LO:
16399 case R_PPC64_TOC16_LO_DS:
16400 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16401 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16402 {
16403 bfd_byte *p = contents + (rel->r_offset & ~3);
16404 insn = bfd_get_32 (input_bfd, p);
16405 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
16406 {
16407 /* Transform addic to addi when we change reg. */
16408 insn &= ~((0x3f << 26) | (0x1f << 16));
16409 insn |= (14u << 26) | (2 << 16);
16410 }
16411 else
16412 {
16413 insn &= ~(0x1f << 16);
16414 insn |= 2 << 16;
16415 }
16416 bfd_put_32 (input_bfd, insn, p);
16417 }
16418 break;
16419
16420 case R_PPC64_TPREL16_HA:
16421 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16422 {
16423 bfd_byte *p = contents + (rel->r_offset & ~3);
16424 insn = bfd_get_32 (input_bfd, p);
16425 if ((insn & ((0x3f << 26) | 0x1f << 16))
16426 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16427 /* xgettext:c-format */
16428 info->callbacks->minfo
16429 (_("%H: warning: %s unexpected insn %#x.\n"),
16430 input_bfd, input_section, rel->r_offset,
16431 ppc64_elf_howto_table[r_type]->name, insn);
16432 else
16433 {
16434 bfd_put_32 (input_bfd, NOP, p);
16435 goto copy_reloc;
16436 }
16437 }
16438 break;
16439
16440 case R_PPC64_TPREL16_LO:
16441 case R_PPC64_TPREL16_LO_DS:
16442 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16443 {
16444 bfd_byte *p = contents + (rel->r_offset & ~3);
16445 insn = bfd_get_32 (input_bfd, p);
16446 insn &= ~(0x1f << 16);
16447 insn |= 13 << 16;
16448 bfd_put_32 (input_bfd, insn, p);
16449 }
16450 break;
16451 }
16452
16453 /* Do any further special processing. */
16454 switch (r_type)
16455 {
16456 default:
16457 break;
16458
16459 case R_PPC64_REL16_HA:
16460 case R_PPC64_REL16_HIGHA:
16461 case R_PPC64_REL16_HIGHERA:
16462 case R_PPC64_REL16_HIGHESTA:
16463 case R_PPC64_REL16DX_HA:
16464 case R_PPC64_ADDR16_HA:
16465 case R_PPC64_ADDR16_HIGHA:
16466 case R_PPC64_ADDR16_HIGHERA:
16467 case R_PPC64_ADDR16_HIGHESTA:
16468 case R_PPC64_TOC16_HA:
16469 case R_PPC64_SECTOFF_HA:
16470 case R_PPC64_TPREL16_HA:
16471 case R_PPC64_TPREL16_HIGHA:
16472 case R_PPC64_TPREL16_HIGHERA:
16473 case R_PPC64_TPREL16_HIGHESTA:
16474 case R_PPC64_DTPREL16_HA:
16475 case R_PPC64_DTPREL16_HIGHA:
16476 case R_PPC64_DTPREL16_HIGHERA:
16477 case R_PPC64_DTPREL16_HIGHESTA:
16478 /* It's just possible that this symbol is a weak symbol
16479 that's not actually defined anywhere. In that case,
16480 'sec' would be NULL, and we should leave the symbol
16481 alone (it will be set to zero elsewhere in the link). */
16482 if (sec == NULL)
16483 break;
16484 /* Fall through. */
16485
16486 case R_PPC64_GOT16_HA:
16487 case R_PPC64_PLTGOT16_HA:
16488 case R_PPC64_PLT16_HA:
16489 case R_PPC64_GOT_TLSGD16_HA:
16490 case R_PPC64_GOT_TLSLD16_HA:
16491 case R_PPC64_GOT_TPREL16_HA:
16492 case R_PPC64_GOT_DTPREL16_HA:
16493 /* Add 0x10000 if sign bit in 0:15 is set.
16494 Bits 0:15 are not used. */
16495 addend += 0x8000;
16496 break;
16497
16498 case R_PPC64_D34_HA30:
16499 case R_PPC64_ADDR16_HIGHERA34:
16500 case R_PPC64_ADDR16_HIGHESTA34:
16501 case R_PPC64_REL16_HIGHERA34:
16502 case R_PPC64_REL16_HIGHESTA34:
16503 if (sec != NULL)
16504 addend += 1ULL << 33;
16505 break;
16506
16507 case R_PPC64_ADDR16_DS:
16508 case R_PPC64_ADDR16_LO_DS:
16509 case R_PPC64_GOT16_DS:
16510 case R_PPC64_GOT16_LO_DS:
16511 case R_PPC64_PLT16_LO_DS:
16512 case R_PPC64_SECTOFF_DS:
16513 case R_PPC64_SECTOFF_LO_DS:
16514 case R_PPC64_TOC16_DS:
16515 case R_PPC64_TOC16_LO_DS:
16516 case R_PPC64_PLTGOT16_DS:
16517 case R_PPC64_PLTGOT16_LO_DS:
16518 case R_PPC64_GOT_TPREL16_DS:
16519 case R_PPC64_GOT_TPREL16_LO_DS:
16520 case R_PPC64_GOT_DTPREL16_DS:
16521 case R_PPC64_GOT_DTPREL16_LO_DS:
16522 case R_PPC64_TPREL16_DS:
16523 case R_PPC64_TPREL16_LO_DS:
16524 case R_PPC64_DTPREL16_DS:
16525 case R_PPC64_DTPREL16_LO_DS:
16526 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16527 mask = 3;
16528 /* If this reloc is against an lq, lxv, or stxv insn, then
16529 the value must be a multiple of 16. This is somewhat of
16530 a hack, but the "correct" way to do this by defining _DQ
16531 forms of all the _DS relocs bloats all reloc switches in
16532 this file. It doesn't make much sense to use these
16533 relocs in data, so testing the insn should be safe. */
16534 if ((insn & (0x3f << 26)) == (56u << 26)
16535 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
16536 mask = 15;
16537 relocation += addend;
16538 addend = insn & (mask ^ 3);
16539 if ((relocation & mask) != 0)
16540 {
16541 relocation ^= relocation & mask;
16542 info->callbacks->einfo
16543 /* xgettext:c-format */
16544 (_("%H: error: %s not a multiple of %u\n"),
16545 input_bfd, input_section, rel->r_offset,
16546 ppc64_elf_howto_table[r_type]->name,
16547 mask + 1);
16548 bfd_set_error (bfd_error_bad_value);
16549 ret = FALSE;
16550 goto copy_reloc;
16551 }
16552 break;
16553 }
16554
16555 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16556 because such sections are not SEC_ALLOC and thus ld.so will
16557 not process them. */
16558 howto = ppc64_elf_howto_table[(int) r_type];
16559 if (unresolved_reloc
16560 && !((input_section->flags & SEC_DEBUGGING) != 0
16561 && h->elf.def_dynamic)
16562 && _bfd_elf_section_offset (output_bfd, info, input_section,
16563 rel->r_offset) != (bfd_vma) -1)
16564 {
16565 info->callbacks->einfo
16566 /* xgettext:c-format */
16567 (_("%H: unresolvable %s against `%pT'\n"),
16568 input_bfd, input_section, rel->r_offset,
16569 howto->name,
16570 h->elf.root.root.string);
16571 ret = FALSE;
16572 }
16573
16574 /* 16-bit fields in insns mostly have signed values, but a
16575 few insns have 16-bit unsigned values. Really, we should
16576 have different reloc types. */
16577 if (howto->complain_on_overflow != complain_overflow_dont
16578 && howto->dst_mask == 0xffff
16579 && (input_section->flags & SEC_CODE) != 0)
16580 {
16581 enum complain_overflow complain = complain_overflow_signed;
16582
16583 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16584 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
16585 complain = complain_overflow_bitfield;
16586 else if (howto->rightshift == 0
16587 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
16588 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
16589 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
16590 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
16591 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
16592 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
16593 complain = complain_overflow_unsigned;
16594 if (howto->complain_on_overflow != complain)
16595 {
16596 alt_howto = *howto;
16597 alt_howto.complain_on_overflow = complain;
16598 howto = &alt_howto;
16599 }
16600 }
16601
16602 switch (r_type)
16603 {
16604 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16605 case R_PPC64_D34:
16606 case R_PPC64_D34_LO:
16607 case R_PPC64_D34_HI30:
16608 case R_PPC64_D34_HA30:
16609 case R_PPC64_PCREL34:
16610 case R_PPC64_GOT_PCREL34:
16611 case R_PPC64_TPREL34:
16612 case R_PPC64_DTPREL34:
16613 case R_PPC64_GOT_TLSGD34:
16614 case R_PPC64_GOT_TLSLD34:
16615 case R_PPC64_GOT_TPREL34:
16616 case R_PPC64_GOT_DTPREL34:
16617 case R_PPC64_PLT_PCREL34:
16618 case R_PPC64_PLT_PCREL34_NOTOC:
16619 case R_PPC64_D28:
16620 case R_PPC64_PCREL28:
16621 if (rel->r_offset + 8 > input_section->size)
16622 r = bfd_reloc_outofrange;
16623 else
16624 {
16625 relocation += addend;
16626 if (howto->pc_relative)
16627 relocation -= (rel->r_offset
16628 + input_section->output_offset
16629 + input_section->output_section->vma);
16630 relocation >>= howto->rightshift;
16631
16632 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16633 pinsn <<= 32;
16634 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16635
16636 pinsn &= ~howto->dst_mask;
16637 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16638 & howto->dst_mask);
16639 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16640 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16641 r = bfd_reloc_ok;
16642 if (howto->complain_on_overflow == complain_overflow_signed
16643 && (relocation + (1ULL << (howto->bitsize - 1))
16644 >= 1ULL << howto->bitsize))
16645 r = bfd_reloc_overflow;
16646 }
16647 break;
16648
16649 case R_PPC64_REL16DX_HA:
16650 if (rel->r_offset + 4 > input_section->size)
16651 r = bfd_reloc_outofrange;
16652 else
16653 {
16654 relocation += addend;
16655 relocation -= (rel->r_offset
16656 + input_section->output_offset
16657 + input_section->output_section->vma);
16658 relocation = (bfd_signed_vma) relocation >> 16;
16659 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16660 insn &= ~0x1fffc1;
16661 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
16662 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16663 r = bfd_reloc_ok;
16664 if (relocation + 0x8000 > 0xffff)
16665 r = bfd_reloc_overflow;
16666 }
16667 break;
16668
16669 default:
16670 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16671 contents, rel->r_offset,
16672 relocation, addend);
16673 }
16674
16675 if (r != bfd_reloc_ok)
16676 {
16677 char *more_info = NULL;
16678 const char *reloc_name = howto->name;
16679
16680 if (reloc_dest != DEST_NORMAL)
16681 {
16682 more_info = bfd_malloc (strlen (reloc_name) + 8);
16683 if (more_info != NULL)
16684 {
16685 strcpy (more_info, reloc_name);
16686 strcat (more_info, (reloc_dest == DEST_OPD
16687 ? " (OPD)" : " (stub)"));
16688 reloc_name = more_info;
16689 }
16690 }
16691
16692 if (r == bfd_reloc_overflow)
16693 {
16694 /* On code like "if (foo) foo();" don't report overflow
16695 on a branch to zero when foo is undefined. */
16696 if (!warned
16697 && (reloc_dest == DEST_STUB
16698 || !(h != NULL
16699 && (h->elf.root.type == bfd_link_hash_undefweak
16700 || h->elf.root.type == bfd_link_hash_undefined)
16701 && is_branch_reloc (r_type))))
16702 info->callbacks->reloc_overflow (info, &h->elf.root,
16703 sym_name, reloc_name,
16704 orig_rel.r_addend,
16705 input_bfd, input_section,
16706 rel->r_offset);
16707 }
16708 else
16709 {
16710 info->callbacks->einfo
16711 /* xgettext:c-format */
16712 (_("%H: %s against `%pT': error %d\n"),
16713 input_bfd, input_section, rel->r_offset,
16714 reloc_name, sym_name, (int) r);
16715 ret = FALSE;
16716 }
16717 if (more_info != NULL)
16718 free (more_info);
16719 }
16720 copy_reloc:
16721 if (wrel != rel)
16722 *wrel = *rel;
16723 }
16724
16725 if (wrel != rel)
16726 {
16727 Elf_Internal_Shdr *rel_hdr;
16728 size_t deleted = rel - wrel;
16729
16730 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16731 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16732 if (rel_hdr->sh_size == 0)
16733 {
16734 /* It is too late to remove an empty reloc section. Leave
16735 one NONE reloc.
16736 ??? What is wrong with an empty section??? */
16737 rel_hdr->sh_size = rel_hdr->sh_entsize;
16738 deleted -= 1;
16739 }
16740 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16741 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16742 input_section->reloc_count -= deleted;
16743 }
16744
16745 /* If we're emitting relocations, then shortly after this function
16746 returns, reloc offsets and addends for this section will be
16747 adjusted. Worse, reloc symbol indices will be for the output
16748 file rather than the input. Save a copy of the relocs for
16749 opd_entry_value. */
16750 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
16751 {
16752 bfd_size_type amt;
16753 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16754 rel = bfd_alloc (input_bfd, amt);
16755 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16756 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
16757 if (rel == NULL)
16758 return FALSE;
16759 memcpy (rel, relocs, amt);
16760 }
16761 return ret;
16762 }
16763
16764 /* Adjust the value of any local symbols in opd sections. */
16765
16766 static int
16767 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16768 const char *name ATTRIBUTE_UNUSED,
16769 Elf_Internal_Sym *elfsym,
16770 asection *input_sec,
16771 struct elf_link_hash_entry *h)
16772 {
16773 struct _opd_sec_data *opd;
16774 long adjust;
16775 bfd_vma value;
16776
16777 if (h != NULL)
16778 return 1;
16779
16780 opd = get_opd_info (input_sec);
16781 if (opd == NULL || opd->adjust == NULL)
16782 return 1;
16783
16784 value = elfsym->st_value - input_sec->output_offset;
16785 if (!bfd_link_relocatable (info))
16786 value -= input_sec->output_section->vma;
16787
16788 adjust = opd->adjust[OPD_NDX (value)];
16789 if (adjust == -1)
16790 return 2;
16791
16792 elfsym->st_value += adjust;
16793 return 1;
16794 }
16795
16796 /* Finish up dynamic symbol handling. We set the contents of various
16797 dynamic sections here. */
16798
16799 static bfd_boolean
16800 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16801 struct bfd_link_info *info,
16802 struct elf_link_hash_entry *h,
16803 Elf_Internal_Sym *sym)
16804 {
16805 struct ppc_link_hash_table *htab;
16806 struct plt_entry *ent;
16807
16808 htab = ppc_hash_table (info);
16809 if (htab == NULL)
16810 return FALSE;
16811
16812 if (!htab->opd_abi && !h->def_regular)
16813 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16814 if (ent->plt.offset != (bfd_vma) -1)
16815 {
16816 /* Mark the symbol as undefined, rather than as
16817 defined in glink. Leave the value if there were
16818 any relocations where pointer equality matters
16819 (this is a clue for the dynamic linker, to make
16820 function pointer comparisons work between an
16821 application and shared library), otherwise set it
16822 to zero. */
16823 sym->st_shndx = SHN_UNDEF;
16824 if (!h->pointer_equality_needed)
16825 sym->st_value = 0;
16826 else if (!h->ref_regular_nonweak)
16827 {
16828 /* This breaks function pointer comparisons, but
16829 that is better than breaking tests for a NULL
16830 function pointer. */
16831 sym->st_value = 0;
16832 }
16833 break;
16834 }
16835
16836 if (h->needs_copy
16837 && (h->root.type == bfd_link_hash_defined
16838 || h->root.type == bfd_link_hash_defweak)
16839 && (h->root.u.def.section == htab->elf.sdynbss
16840 || h->root.u.def.section == htab->elf.sdynrelro))
16841 {
16842 /* This symbol needs a copy reloc. Set it up. */
16843 Elf_Internal_Rela rela;
16844 asection *srel;
16845 bfd_byte *loc;
16846
16847 if (h->dynindx == -1)
16848 abort ();
16849
16850 rela.r_offset = (h->root.u.def.value
16851 + h->root.u.def.section->output_section->vma
16852 + h->root.u.def.section->output_offset);
16853 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16854 rela.r_addend = 0;
16855 if (h->root.u.def.section == htab->elf.sdynrelro)
16856 srel = htab->elf.sreldynrelro;
16857 else
16858 srel = htab->elf.srelbss;
16859 loc = srel->contents;
16860 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
16861 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
16862 }
16863
16864 return TRUE;
16865 }
16866
16867 /* Used to decide how to sort relocs in an optimal manner for the
16868 dynamic linker, before writing them out. */
16869
16870 static enum elf_reloc_type_class
16871 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16872 const asection *rel_sec,
16873 const Elf_Internal_Rela *rela)
16874 {
16875 enum elf_ppc64_reloc_type r_type;
16876 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16877
16878 if (rel_sec == htab->elf.irelplt)
16879 return reloc_class_ifunc;
16880
16881 r_type = ELF64_R_TYPE (rela->r_info);
16882 switch (r_type)
16883 {
16884 case R_PPC64_RELATIVE:
16885 return reloc_class_relative;
16886 case R_PPC64_JMP_SLOT:
16887 return reloc_class_plt;
16888 case R_PPC64_COPY:
16889 return reloc_class_copy;
16890 default:
16891 return reloc_class_normal;
16892 }
16893 }
16894
16895 /* Finish up the dynamic sections. */
16896
16897 static bfd_boolean
16898 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16899 struct bfd_link_info *info)
16900 {
16901 struct ppc_link_hash_table *htab;
16902 bfd *dynobj;
16903 asection *sdyn;
16904
16905 htab = ppc_hash_table (info);
16906 if (htab == NULL)
16907 return FALSE;
16908
16909 dynobj = htab->elf.dynobj;
16910 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
16911
16912 if (htab->elf.dynamic_sections_created)
16913 {
16914 Elf64_External_Dyn *dyncon, *dynconend;
16915
16916 if (sdyn == NULL || htab->elf.sgot == NULL)
16917 abort ();
16918
16919 dyncon = (Elf64_External_Dyn *) sdyn->contents;
16920 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
16921 for (; dyncon < dynconend; dyncon++)
16922 {
16923 Elf_Internal_Dyn dyn;
16924 asection *s;
16925
16926 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16927
16928 switch (dyn.d_tag)
16929 {
16930 default:
16931 continue;
16932
16933 case DT_PPC64_GLINK:
16934 s = htab->glink;
16935 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16936 /* We stupidly defined DT_PPC64_GLINK to be the start
16937 of glink rather than the first entry point, which is
16938 what ld.so needs, and now have a bigger stub to
16939 support automatic multiple TOCs. */
16940 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
16941 break;
16942
16943 case DT_PPC64_OPD:
16944 s = bfd_get_section_by_name (output_bfd, ".opd");
16945 if (s == NULL)
16946 continue;
16947 dyn.d_un.d_ptr = s->vma;
16948 break;
16949
16950 case DT_PPC64_OPT:
16951 if ((htab->do_multi_toc && htab->multi_toc_needed)
16952 || htab->notoc_plt)
16953 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
16954 if (htab->has_plt_localentry0)
16955 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
16956 break;
16957
16958 case DT_PPC64_OPDSZ:
16959 s = bfd_get_section_by_name (output_bfd, ".opd");
16960 if (s == NULL)
16961 continue;
16962 dyn.d_un.d_val = s->size;
16963 break;
16964
16965 case DT_PLTGOT:
16966 s = htab->elf.splt;
16967 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16968 break;
16969
16970 case DT_JMPREL:
16971 s = htab->elf.srelplt;
16972 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16973 break;
16974
16975 case DT_PLTRELSZ:
16976 dyn.d_un.d_val = htab->elf.srelplt->size;
16977 break;
16978
16979 case DT_TEXTREL:
16980 if (htab->local_ifunc_resolver)
16981 info->callbacks->einfo
16982 (_("%X%P: text relocations and GNU indirect "
16983 "functions will result in a segfault at runtime\n"));
16984 else if (htab->maybe_local_ifunc_resolver)
16985 info->callbacks->einfo
16986 (_("%P: warning: text relocations and GNU indirect "
16987 "functions may result in a segfault at runtime\n"));
16988 continue;
16989 }
16990
16991 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
16992 }
16993 }
16994
16995 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
16996 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
16997 {
16998 /* Fill in the first entry in the global offset table.
16999 We use it to hold the link-time TOCbase. */
17000 bfd_put_64 (output_bfd,
17001 elf_gp (output_bfd) + TOC_BASE_OFF,
17002 htab->elf.sgot->contents);
17003
17004 /* Set .got entry size. */
17005 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17006 = 8;
17007 }
17008
17009 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17010 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17011 {
17012 /* Set .plt entry size. */
17013 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17014 = PLT_ENTRY_SIZE (htab);
17015 }
17016
17017 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17018 brlt ourselves if emitrelocations. */
17019 if (htab->brlt != NULL
17020 && htab->brlt->reloc_count != 0
17021 && !_bfd_elf_link_output_relocs (output_bfd,
17022 htab->brlt,
17023 elf_section_data (htab->brlt)->rela.hdr,
17024 elf_section_data (htab->brlt)->relocs,
17025 NULL))
17026 return FALSE;
17027
17028 if (htab->glink != NULL
17029 && htab->glink->reloc_count != 0
17030 && !_bfd_elf_link_output_relocs (output_bfd,
17031 htab->glink,
17032 elf_section_data (htab->glink)->rela.hdr,
17033 elf_section_data (htab->glink)->relocs,
17034 NULL))
17035 return FALSE;
17036
17037
17038 if (htab->glink_eh_frame != NULL
17039 && htab->glink_eh_frame->size != 0
17040 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17041 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17042 htab->glink_eh_frame,
17043 htab->glink_eh_frame->contents))
17044 return FALSE;
17045
17046 /* We need to handle writing out multiple GOT sections ourselves,
17047 since we didn't add them to DYNOBJ. We know dynobj is the first
17048 bfd. */
17049 while ((dynobj = dynobj->link.next) != NULL)
17050 {
17051 asection *s;
17052
17053 if (!is_ppc64_elf (dynobj))
17054 continue;
17055
17056 s = ppc64_elf_tdata (dynobj)->got;
17057 if (s != NULL
17058 && s->size != 0
17059 && s->output_section != bfd_abs_section_ptr
17060 && !bfd_set_section_contents (output_bfd, s->output_section,
17061 s->contents, s->output_offset,
17062 s->size))
17063 return FALSE;
17064 s = ppc64_elf_tdata (dynobj)->relgot;
17065 if (s != NULL
17066 && s->size != 0
17067 && s->output_section != bfd_abs_section_ptr
17068 && !bfd_set_section_contents (output_bfd, s->output_section,
17069 s->contents, s->output_offset,
17070 s->size))
17071 return FALSE;
17072 }
17073
17074 return TRUE;
17075 }
17076
17077 #include "elf64-target.h"
17078
17079 /* FreeBSD support */
17080
17081 #undef TARGET_LITTLE_SYM
17082 #undef TARGET_LITTLE_NAME
17083
17084 #undef TARGET_BIG_SYM
17085 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17086 #undef TARGET_BIG_NAME
17087 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17088
17089 #undef ELF_OSABI
17090 #define ELF_OSABI ELFOSABI_FREEBSD
17091
17092 #undef elf64_bed
17093 #define elf64_bed elf64_powerpc_fbsd_bed
17094
17095 #include "elf64-target.h"