ELF: Consolidate readonly_dynrelocs
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39 #define OCTETS_PER_BYTE(ABFD, SEC) 1
40
41 static bfd_reloc_status_type ppc64_elf_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
47 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
49 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc64_elf_toc_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
55 static bfd_reloc_status_type ppc64_elf_toc64_reloc
56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
57 static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
59 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
61 static bfd_vma opd_entry_value
62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
63
64 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
65 #define TARGET_LITTLE_NAME "elf64-powerpcle"
66 #define TARGET_BIG_SYM powerpc_elf64_vec
67 #define TARGET_BIG_NAME "elf64-powerpc"
68 #define ELF_ARCH bfd_arch_powerpc
69 #define ELF_TARGET_ID PPC64_ELF_DATA
70 #define ELF_MACHINE_CODE EM_PPC64
71 #define ELF_MAXPAGESIZE 0x10000
72 #define ELF_COMMONPAGESIZE 0x1000
73 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
74 #define elf_info_to_howto ppc64_elf_info_to_howto
75
76 #define elf_backend_want_got_sym 0
77 #define elf_backend_want_plt_sym 0
78 #define elf_backend_plt_alignment 3
79 #define elf_backend_plt_not_loaded 1
80 #define elf_backend_got_header_size 8
81 #define elf_backend_want_dynrelro 1
82 #define elf_backend_can_gc_sections 1
83 #define elf_backend_can_refcount 1
84 #define elf_backend_rela_normal 1
85 #define elf_backend_dtrel_excludes_plt 1
86 #define elf_backend_default_execstack 0
87
88 #define bfd_elf64_mkobject ppc64_elf_mkobject
89 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
90 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
91 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
93 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
95 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
96 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
97 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
98
99 #define elf_backend_object_p ppc64_elf_object_p
100 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
102 #define elf_backend_write_core_note ppc64_elf_write_core_note
103 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
104 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
105 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
106 #define elf_backend_check_directives ppc64_elf_before_check_relocs
107 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
108 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
109 #define elf_backend_check_relocs ppc64_elf_check_relocs
110 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
111 #define elf_backend_gc_keep ppc64_elf_gc_keep
112 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
113 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
114 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
116 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
117 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
119 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
120 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
121 #define elf_backend_action_discarded ppc64_elf_action_discarded
122 #define elf_backend_relocate_section ppc64_elf_relocate_section
123 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
126 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
127 #define elf_backend_special_sections ppc64_elf_special_sections
128 #define elf_backend_section_flags ppc64_elf_section_flags
129 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
130 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
131 #define elf_backend_get_reloc_section bfd_get_section_by_name
132
133 /* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137 /* The size in bytes of an entry in the procedure linkage table. */
138 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
139 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
140
141 /* The initial size of the plt reserved for the dynamic linker. */
142 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
143
144 /* Offsets to some stack save slots. */
145 #define STK_LR 16
146 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
147 /* This one is dodgy. ELFv2 does not have a linker word, so use the
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
152 /* TOC base pointers offset from start of TOC. */
153 #define TOC_BASE_OFF 0x8000
154 /* TOC base alignment. */
155 #define TOC_BASE_ALIGN 256
156
157 /* Offset of tp and dtp pointers from start of TLS block. */
158 #define TP_OFFSET 0x7000
159 #define DTP_OFFSET 0x8000
160
161 /* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
163 insert an addi to adjust r11. */
164 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
165 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
170 #define BCTR 0x4e800420 /* bctr */
171
172 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
173 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
175 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183 #define BNECTR 0x4ca20420 /* bnectr+ */
184 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
185
186 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
187 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
188 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
189
190 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
193
194 #define LI_R11_0 0x39600000 /* li %r11,0 */
195 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
196 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
197 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
198 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
200 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
201 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
202 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
203 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
204 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
205 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
206 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
207 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
210 #define PADDI_R12_PC 0x0610000039800000ULL
211 #define PLD_R12_PC 0x04100000e5800000ULL
212 #define PNOP 0x0700000000000000ULL
213
214 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215 #define GLINK_PLTRESOLVE_SIZE(htab) \
216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
221 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
224 /* ld %2,(0b-1b)(%11) */
225 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
226 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
231 /* bctr */
232 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
237
238 /* Pad with this. */
239 #define NOP 0x60000000
240
241 /* Some other nops. */
242 #define CROR_151515 0x4def7b82
243 #define CROR_313131 0x4ffffb82
244
245 /* .glink entries for the first 32k functions are two instructions. */
246 #define LI_R0_0 0x38000000 /* li %r0,0 */
247 #define B_DOT 0x48000000 /* b . */
248
249 /* After that, we need two instructions to load the index, followed by
250 a branch. */
251 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
252 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
253
254 /* Instructions used by the save and restore reg functions. */
255 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
259 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
261 #define LI_R12_0 0x39800000 /* li %r12,0 */
262 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
265 #define BLR 0x4e800020 /* blr */
266
267 /* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
270 relocate .opd without reloc entries. */
271 #ifndef NO_OPD_RELOCS
272 #define NO_OPD_RELOCS 0
273 #endif
274
275 #ifndef ARRAY_SIZE
276 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277 #endif
278
279 static inline int
280 abiversion (bfd *abfd)
281 {
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283 }
284
285 static inline void
286 set_abiversion (bfd *abfd, int ver)
287 {
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290 }
291 \f
292 /* Relocation HOWTO's. */
293 /* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
306 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
307
308 static reloc_howto_type ppc64_elf_howto_raw[] =
309 {
310 /* This reloc does nothing. */
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
313
314 /* A standard 32 bit relocation. */
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
322
323 /* A standard 16 bit relocation. */
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
326
327 /* A 16 bit relocation without overflow. */
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
330
331 /* Bits 16-31 of an address. */
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
360
361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
364
365 /* A relative 16 bit branch; the lower two bits must be zero. */
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
432
433 /* 32-bit PC relative. */
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
436
437 /* 32-bit relocation to the symbol's procedure linkage table. */
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
460
461 /* 16-bit section relative relocation. */
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
464
465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
468
469 /* 16-bit upper half section relative relocation. */
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
472
473 /* 16-bit upper half adjusted section relative relocation. */
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
476
477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
486
487 /* The bits 32-47 of an address. */
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
495
496 /* The bits 48-63 of an address. */
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
504
505 /* Like ADDR64, but may be unaligned. */
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
508
509 /* 64-bit relative relocation. */
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
512
513 /* 64-bit relocation to the symbol's procedure linkage table. */
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
522
523 /* 16 bit TOC-relative relocation. */
524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
527
528 /* 16 bit TOC-relative relocation without overflow. */
529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
624
625 /* Marker relocs for TLS. */
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
634
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 /* Marker relocs on inline plt call instructions. */
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
646
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
657
658 /* A 16 bit dtprel reloc. */
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
661
662 /* Like DTPREL16, but no overflow. */
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
689
690 /* Like DTPREL16, but for insns with a DS field. */
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
693
694 /* Like DTPREL16_DS, but no overflow. */
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
702
703 /* A 16 bit tprel reloc. */
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
706
707 /* Like TPREL16, but no overflow. */
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
734
735 /* Like TPREL16, but for insns with a DS field. */
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
738
739 /* Like TPREL16_DS, but no overflow. */
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
748
749 /* Like GOT_TLSGD16, but no overflow. */
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
752
753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
756
757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
760
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
766
767 /* Like GOT_TLSLD16, but no overflow. */
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
770
771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
774
775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
778
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
783
784 /* Like GOT_DTPREL16_DS, but no overflow. */
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
787
788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
791
792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
800
801 /* Like GOT_TPREL16_DS, but no overflow. */
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
804
805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
818
819 /* A 16 bit relative relocation. */
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
822
823 /* A 16 bit relative relocation without overflow. */
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
826
827 /* The high order 16 bits of a relative address. */
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
835
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
857
858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
861
862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
885
886 /* Marker reloc on ELFv2 large-model function entry. */
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
889
890 /* Like ADDR64, but use local entry point of function. */
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
893
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
933 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
934 ppc64_elf_unhandled_reloc),
935
936 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
937 ppc64_elf_unhandled_reloc),
938
939 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
940 ppc64_elf_unhandled_reloc),
941
942 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
943 ppc64_elf_unhandled_reloc),
944
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
975 /* GNU extension to record C++ vtable hierarchy. */
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
978
979 /* GNU extension to record C++ vtable member usage. */
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
982 };
983
984 \f
985 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988 static void
989 ppc_howto_init (void)
990 {
991 unsigned int i, type;
992
993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
994 {
995 type = ppc64_elf_howto_raw[i].type;
996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999 }
1000
1001 static reloc_howto_type *
1002 ppc64_elf_reloc_type_lookup (bfd *abfd,
1003 bfd_reloc_code_real_type code)
1004 {
1005 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1006
1007 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1008 /* Initialize howto table if needed. */
1009 ppc_howto_init ();
1010
1011 switch (code)
1012 {
1013 default:
1014 /* xgettext:c-format */
1015 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1016 (int) code);
1017 bfd_set_error (bfd_error_bad_value);
1018 return NULL;
1019
1020 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1021 break;
1022 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1023 break;
1024 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1025 break;
1026 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1027 break;
1028 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1029 break;
1030 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1031 break;
1032 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1033 break;
1034 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1035 break;
1036 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1037 break;
1038 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1039 break;
1040 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1041 break;
1042 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1043 break;
1044 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1045 break;
1046 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1047 break;
1048 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1049 break;
1050 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1051 break;
1052 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1053 break;
1054 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1055 break;
1056 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1057 break;
1058 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1059 break;
1060 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1061 break;
1062 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1063 break;
1064 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1065 break;
1066 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1067 break;
1068 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1069 break;
1070 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1071 break;
1072 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1073 break;
1074 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1075 break;
1076 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1077 break;
1078 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1079 break;
1080 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1081 break;
1082 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1083 break;
1084 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1085 break;
1086 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1087 break;
1088 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1089 break;
1090 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1091 break;
1092 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1093 break;
1094 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1095 break;
1096 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1097 break;
1098 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1099 break;
1100 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1101 break;
1102 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1103 break;
1104 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1105 break;
1106 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1107 break;
1108 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1109 break;
1110 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1111 break;
1112 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1113 break;
1114 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1115 break;
1116 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1117 break;
1118 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1119 break;
1120 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1121 break;
1122 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1123 break;
1124 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1125 break;
1126 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1127 break;
1128 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1129 break;
1130 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1131 break;
1132 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1133 break;
1134 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1135 break;
1136 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1137 break;
1138 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1139 break;
1140 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1141 break;
1142 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1143 break;
1144 case BFD_RELOC_PPC64_TLS_PCREL:
1145 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1146 break;
1147 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1148 break;
1149 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1150 break;
1151 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1152 break;
1153 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1154 break;
1155 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1156 break;
1157 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1158 break;
1159 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1160 break;
1161 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1162 break;
1163 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1164 break;
1165 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1168 break;
1169 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1170 break;
1171 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1172 break;
1173 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1174 break;
1175 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1176 break;
1177 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1178 break;
1179 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1200 break;
1201 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1202 break;
1203 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1208 break;
1209 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1210 break;
1211 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1220 break;
1221 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1222 break;
1223 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1232 break;
1233 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1234 break;
1235 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1236 break;
1237 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1238 break;
1239 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1240 break;
1241 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1242 break;
1243 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1252 break;
1253 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1254 break;
1255 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1256 break;
1257 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1258 break;
1259 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1260 break;
1261 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1262 break;
1263 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1264 break;
1265 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1266 break;
1267 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1268 break;
1269 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1270 break;
1271 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1272 break;
1273 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1274 break;
1275 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1276 break;
1277 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1278 break;
1279 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1280 break;
1281 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1286 break;
1287 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1288 break;
1289 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1294 break;
1295 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1296 break;
1297 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1302 break;
1303 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1304 break;
1305 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1306 break;
1307 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1308 break;
1309 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1310 break;
1311 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1312 break;
1313 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1314 break;
1315 }
1316
1317 return ppc64_elf_howto_table[r];
1318 };
1319
1320 static reloc_howto_type *
1321 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1322 const char *r_name)
1323 {
1324 unsigned int i;
1325
1326 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1327 if (ppc64_elf_howto_raw[i].name != NULL
1328 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1329 return &ppc64_elf_howto_raw[i];
1330
1331 return NULL;
1332 }
1333
1334 /* Set the howto pointer for a PowerPC ELF reloc. */
1335
1336 static bfd_boolean
1337 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1338 Elf_Internal_Rela *dst)
1339 {
1340 unsigned int type;
1341
1342 /* Initialize howto table if needed. */
1343 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1344 ppc_howto_init ();
1345
1346 type = ELF64_R_TYPE (dst->r_info);
1347 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1348 {
1349 /* xgettext:c-format */
1350 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1351 abfd, type);
1352 bfd_set_error (bfd_error_bad_value);
1353 return FALSE;
1354 }
1355 cache_ptr->howto = ppc64_elf_howto_table[type];
1356 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1357 {
1358 /* xgettext:c-format */
1359 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1360 abfd, type);
1361 bfd_set_error (bfd_error_bad_value);
1362 return FALSE;
1363 }
1364
1365 return TRUE;
1366 }
1367
1368 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1369
1370 static bfd_reloc_status_type
1371 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1372 void *data, asection *input_section,
1373 bfd *output_bfd, char **error_message)
1374 {
1375 enum elf_ppc64_reloc_type r_type;
1376 long insn;
1377 bfd_size_type octets;
1378 bfd_vma value;
1379
1380 /* If this is a relocatable link (output_bfd test tells us), just
1381 call the generic function. Any adjustment will be done at final
1382 link time. */
1383 if (output_bfd != NULL)
1384 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1385 input_section, output_bfd, error_message);
1386
1387 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1388 We won't actually be using the low bits, so trashing them
1389 doesn't matter. */
1390 r_type = reloc_entry->howto->type;
1391 if (r_type == R_PPC64_ADDR16_HIGHERA34
1392 || r_type == R_PPC64_ADDR16_HIGHESTA34
1393 || r_type == R_PPC64_REL16_HIGHERA34
1394 || r_type == R_PPC64_REL16_HIGHESTA34)
1395 reloc_entry->addend += 1ULL << 33;
1396 else
1397 reloc_entry->addend += 1U << 15;
1398 if (r_type != R_PPC64_REL16DX_HA)
1399 return bfd_reloc_continue;
1400
1401 value = 0;
1402 if (!bfd_is_com_section (symbol->section))
1403 value = symbol->value;
1404 value += (reloc_entry->addend
1405 + symbol->section->output_offset
1406 + symbol->section->output_section->vma);
1407 value -= (reloc_entry->address
1408 + input_section->output_offset
1409 + input_section->output_section->vma);
1410 value = (bfd_signed_vma) value >> 16;
1411
1412 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1413 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1414 insn &= ~0x1fffc1;
1415 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1416 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1417 if (value + 0x8000 > 0xffff)
1418 return bfd_reloc_overflow;
1419 return bfd_reloc_ok;
1420 }
1421
1422 static bfd_reloc_status_type
1423 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
1426 {
1427 if (output_bfd != NULL)
1428 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1429 input_section, output_bfd, error_message);
1430
1431 if (strcmp (symbol->section->name, ".opd") == 0
1432 && (symbol->section->owner->flags & DYNAMIC) == 0)
1433 {
1434 bfd_vma dest = opd_entry_value (symbol->section,
1435 symbol->value + reloc_entry->addend,
1436 NULL, NULL, FALSE);
1437 if (dest != (bfd_vma) -1)
1438 reloc_entry->addend = dest - (symbol->value
1439 + symbol->section->output_section->vma
1440 + symbol->section->output_offset);
1441 }
1442 else
1443 {
1444 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1445
1446 if (symbol->section->owner != abfd
1447 && symbol->section->owner != NULL
1448 && abiversion (symbol->section->owner) >= 2)
1449 {
1450 unsigned int i;
1451
1452 for (i = 0; i < symbol->section->owner->symcount; ++i)
1453 {
1454 asymbol *symdef = symbol->section->owner->outsymbols[i];
1455
1456 if (strcmp (symdef->name, symbol->name) == 0)
1457 {
1458 elfsym = (elf_symbol_type *) symdef;
1459 break;
1460 }
1461 }
1462 }
1463 reloc_entry->addend
1464 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1465 }
1466 return bfd_reloc_continue;
1467 }
1468
1469 static bfd_reloc_status_type
1470 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1471 void *data, asection *input_section,
1472 bfd *output_bfd, char **error_message)
1473 {
1474 long insn;
1475 enum elf_ppc64_reloc_type r_type;
1476 bfd_size_type octets;
1477 /* Assume 'at' branch hints. */
1478 bfd_boolean is_isa_v2 = TRUE;
1479
1480 /* If this is a relocatable link (output_bfd test tells us), just
1481 call the generic function. Any adjustment will be done at final
1482 link time. */
1483 if (output_bfd != NULL)
1484 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1485 input_section, output_bfd, error_message);
1486
1487 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1488 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1489 insn &= ~(0x01 << 21);
1490 r_type = reloc_entry->howto->type;
1491 if (r_type == R_PPC64_ADDR14_BRTAKEN
1492 || r_type == R_PPC64_REL14_BRTAKEN)
1493 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1494
1495 if (is_isa_v2)
1496 {
1497 /* Set 'a' bit. This is 0b00010 in BO field for branch
1498 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1499 for branch on CTR insns (BO == 1a00t or 1a01t). */
1500 if ((insn & (0x14 << 21)) == (0x04 << 21))
1501 insn |= 0x02 << 21;
1502 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1503 insn |= 0x08 << 21;
1504 else
1505 goto out;
1506 }
1507 else
1508 {
1509 bfd_vma target = 0;
1510 bfd_vma from;
1511
1512 if (!bfd_is_com_section (symbol->section))
1513 target = symbol->value;
1514 target += symbol->section->output_section->vma;
1515 target += symbol->section->output_offset;
1516 target += reloc_entry->addend;
1517
1518 from = (reloc_entry->address
1519 + input_section->output_offset
1520 + input_section->output_section->vma);
1521
1522 /* Invert 'y' bit if not the default. */
1523 if ((bfd_signed_vma) (target - from) < 0)
1524 insn ^= 0x01 << 21;
1525 }
1526 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1527 out:
1528 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1529 input_section, output_bfd, error_message);
1530 }
1531
1532 static bfd_reloc_status_type
1533 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1534 void *data, asection *input_section,
1535 bfd *output_bfd, char **error_message)
1536 {
1537 /* If this is a relocatable link (output_bfd test tells us), just
1538 call the generic function. Any adjustment will be done at final
1539 link time. */
1540 if (output_bfd != NULL)
1541 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1542 input_section, output_bfd, error_message);
1543
1544 /* Subtract the symbol section base address. */
1545 reloc_entry->addend -= symbol->section->output_section->vma;
1546 return bfd_reloc_continue;
1547 }
1548
1549 static bfd_reloc_status_type
1550 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1551 void *data, asection *input_section,
1552 bfd *output_bfd, char **error_message)
1553 {
1554 /* If this is a relocatable link (output_bfd test tells us), just
1555 call the generic function. Any adjustment will be done at final
1556 link time. */
1557 if (output_bfd != NULL)
1558 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1559 input_section, output_bfd, error_message);
1560
1561 /* Subtract the symbol section base address. */
1562 reloc_entry->addend -= symbol->section->output_section->vma;
1563
1564 /* Adjust the addend for sign extension of the low 16 bits. */
1565 reloc_entry->addend += 0x8000;
1566 return bfd_reloc_continue;
1567 }
1568
1569 static bfd_reloc_status_type
1570 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1571 void *data, asection *input_section,
1572 bfd *output_bfd, char **error_message)
1573 {
1574 bfd_vma TOCstart;
1575
1576 /* If this is a relocatable link (output_bfd test tells us), just
1577 call the generic function. Any adjustment will be done at final
1578 link time. */
1579 if (output_bfd != NULL)
1580 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1581 input_section, output_bfd, error_message);
1582
1583 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1584 if (TOCstart == 0)
1585 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1586
1587 /* Subtract the TOC base address. */
1588 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1589 return bfd_reloc_continue;
1590 }
1591
1592 static bfd_reloc_status_type
1593 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1594 void *data, asection *input_section,
1595 bfd *output_bfd, char **error_message)
1596 {
1597 bfd_vma TOCstart;
1598
1599 /* If this is a relocatable link (output_bfd test tells us), just
1600 call the generic function. Any adjustment will be done at final
1601 link time. */
1602 if (output_bfd != NULL)
1603 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1604 input_section, output_bfd, error_message);
1605
1606 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1607 if (TOCstart == 0)
1608 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1609
1610 /* Subtract the TOC base address. */
1611 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1612
1613 /* Adjust the addend for sign extension of the low 16 bits. */
1614 reloc_entry->addend += 0x8000;
1615 return bfd_reloc_continue;
1616 }
1617
1618 static bfd_reloc_status_type
1619 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1620 void *data, asection *input_section,
1621 bfd *output_bfd, char **error_message)
1622 {
1623 bfd_vma TOCstart;
1624 bfd_size_type octets;
1625
1626 /* If this is a relocatable link (output_bfd test tells us), just
1627 call the generic function. Any adjustment will be done at final
1628 link time. */
1629 if (output_bfd != NULL)
1630 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1631 input_section, output_bfd, error_message);
1632
1633 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1634 if (TOCstart == 0)
1635 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1636
1637 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1638 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1639 return bfd_reloc_ok;
1640 }
1641
1642 static bfd_reloc_status_type
1643 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1644 void *data, asection *input_section,
1645 bfd *output_bfd, char **error_message)
1646 {
1647 uint64_t insn;
1648 bfd_vma targ;
1649
1650 if (output_bfd != NULL)
1651 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1652 input_section, output_bfd, error_message);
1653
1654 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1655 insn <<= 32;
1656 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1657
1658 targ = (symbol->section->output_section->vma
1659 + symbol->section->output_offset
1660 + reloc_entry->addend);
1661 if (!bfd_is_com_section (symbol->section))
1662 targ += symbol->value;
1663 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1664 targ += 1ULL << 33;
1665 if (reloc_entry->howto->pc_relative)
1666 {
1667 bfd_vma from = (reloc_entry->address
1668 + input_section->output_offset
1669 + input_section->output_section->vma);
1670 targ -=from;
1671 }
1672 targ >>= reloc_entry->howto->rightshift;
1673 insn &= ~reloc_entry->howto->dst_mask;
1674 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1675 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1676 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1677 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1678 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1679 >= 1ULL << reloc_entry->howto->bitsize))
1680 return bfd_reloc_overflow;
1681 return bfd_reloc_ok;
1682 }
1683
1684 static bfd_reloc_status_type
1685 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1686 void *data, asection *input_section,
1687 bfd *output_bfd, char **error_message)
1688 {
1689 /* If this is a relocatable link (output_bfd test tells us), just
1690 call the generic function. Any adjustment will be done at final
1691 link time. */
1692 if (output_bfd != NULL)
1693 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1694 input_section, output_bfd, error_message);
1695
1696 if (error_message != NULL)
1697 {
1698 static char buf[60];
1699 sprintf (buf, "generic linker can't handle %s",
1700 reloc_entry->howto->name);
1701 *error_message = buf;
1702 }
1703 return bfd_reloc_dangerous;
1704 }
1705
1706 /* Track GOT entries needed for a given symbol. We might need more
1707 than one got entry per symbol. */
1708 struct got_entry
1709 {
1710 struct got_entry *next;
1711
1712 /* The symbol addend that we'll be placing in the GOT. */
1713 bfd_vma addend;
1714
1715 /* Unlike other ELF targets, we use separate GOT entries for the same
1716 symbol referenced from different input files. This is to support
1717 automatic multiple TOC/GOT sections, where the TOC base can vary
1718 from one input file to another. After partitioning into TOC groups
1719 we merge entries within the group.
1720
1721 Point to the BFD owning this GOT entry. */
1722 bfd *owner;
1723
1724 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1725 TLS_TPREL or TLS_DTPREL for tls entries. */
1726 unsigned char tls_type;
1727
1728 /* Non-zero if got.ent points to real entry. */
1729 unsigned char is_indirect;
1730
1731 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1732 union
1733 {
1734 bfd_signed_vma refcount;
1735 bfd_vma offset;
1736 struct got_entry *ent;
1737 } got;
1738 };
1739
1740 /* The same for PLT. */
1741 struct plt_entry
1742 {
1743 struct plt_entry *next;
1744
1745 bfd_vma addend;
1746
1747 union
1748 {
1749 bfd_signed_vma refcount;
1750 bfd_vma offset;
1751 } plt;
1752 };
1753
1754 struct ppc64_elf_obj_tdata
1755 {
1756 struct elf_obj_tdata elf;
1757
1758 /* Shortcuts to dynamic linker sections. */
1759 asection *got;
1760 asection *relgot;
1761
1762 /* Used during garbage collection. We attach global symbols defined
1763 on removed .opd entries to this section so that the sym is removed. */
1764 asection *deleted_section;
1765
1766 /* TLS local dynamic got entry handling. Support for multiple GOT
1767 sections means we potentially need one of these for each input bfd. */
1768 struct got_entry tlsld_got;
1769
1770 union
1771 {
1772 /* A copy of relocs before they are modified for --emit-relocs. */
1773 Elf_Internal_Rela *relocs;
1774
1775 /* Section contents. */
1776 bfd_byte *contents;
1777 } opd;
1778
1779 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1780 the reloc to be in the range -32768 to 32767. */
1781 unsigned int has_small_toc_reloc : 1;
1782
1783 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1784 instruction not one we handle. */
1785 unsigned int unexpected_toc_insn : 1;
1786
1787 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1788 this file. */
1789 unsigned int has_optrel : 1;
1790 };
1791
1792 #define ppc64_elf_tdata(bfd) \
1793 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1794
1795 #define ppc64_tlsld_got(bfd) \
1796 (&ppc64_elf_tdata (bfd)->tlsld_got)
1797
1798 #define is_ppc64_elf(bfd) \
1799 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1800 && elf_object_id (bfd) == PPC64_ELF_DATA)
1801
1802 /* Override the generic function because we store some extras. */
1803
1804 static bfd_boolean
1805 ppc64_elf_mkobject (bfd *abfd)
1806 {
1807 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1808 PPC64_ELF_DATA);
1809 }
1810
1811 /* Fix bad default arch selected for a 64 bit input bfd when the
1812 default is 32 bit. Also select arch based on apuinfo. */
1813
1814 static bfd_boolean
1815 ppc64_elf_object_p (bfd *abfd)
1816 {
1817 if (!abfd->arch_info->the_default)
1818 return TRUE;
1819
1820 if (abfd->arch_info->bits_per_word == 32)
1821 {
1822 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1823
1824 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1825 {
1826 /* Relies on arch after 32 bit default being 64 bit default. */
1827 abfd->arch_info = abfd->arch_info->next;
1828 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1829 }
1830 }
1831 return _bfd_elf_ppc_set_arch (abfd);
1832 }
1833
1834 /* Support for core dump NOTE sections. */
1835
1836 static bfd_boolean
1837 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1838 {
1839 size_t offset, size;
1840
1841 if (note->descsz != 504)
1842 return FALSE;
1843
1844 /* pr_cursig */
1845 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1846
1847 /* pr_pid */
1848 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1849
1850 /* pr_reg */
1851 offset = 112;
1852 size = 384;
1853
1854 /* Make a ".reg/999" section. */
1855 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1856 size, note->descpos + offset);
1857 }
1858
1859 static bfd_boolean
1860 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1861 {
1862 if (note->descsz != 136)
1863 return FALSE;
1864
1865 elf_tdata (abfd)->core->pid
1866 = bfd_get_32 (abfd, note->descdata + 24);
1867 elf_tdata (abfd)->core->program
1868 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1869 elf_tdata (abfd)->core->command
1870 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1871
1872 return TRUE;
1873 }
1874
1875 static char *
1876 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1877 ...)
1878 {
1879 switch (note_type)
1880 {
1881 default:
1882 return NULL;
1883
1884 case NT_PRPSINFO:
1885 {
1886 char data[136] ATTRIBUTE_NONSTRING;
1887 va_list ap;
1888
1889 va_start (ap, note_type);
1890 memset (data, 0, sizeof (data));
1891 strncpy (data + 40, va_arg (ap, const char *), 16);
1892 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1893 DIAGNOSTIC_PUSH;
1894 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1895 -Wstringop-truncation:
1896 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1897 */
1898 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1899 #endif
1900 strncpy (data + 56, va_arg (ap, const char *), 80);
1901 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1902 DIAGNOSTIC_POP;
1903 #endif
1904 va_end (ap);
1905 return elfcore_write_note (abfd, buf, bufsiz,
1906 "CORE", note_type, data, sizeof (data));
1907 }
1908
1909 case NT_PRSTATUS:
1910 {
1911 char data[504];
1912 va_list ap;
1913 long pid;
1914 int cursig;
1915 const void *greg;
1916
1917 va_start (ap, note_type);
1918 memset (data, 0, 112);
1919 pid = va_arg (ap, long);
1920 bfd_put_32 (abfd, pid, data + 32);
1921 cursig = va_arg (ap, int);
1922 bfd_put_16 (abfd, cursig, data + 12);
1923 greg = va_arg (ap, const void *);
1924 memcpy (data + 112, greg, 384);
1925 memset (data + 496, 0, 8);
1926 va_end (ap);
1927 return elfcore_write_note (abfd, buf, bufsiz,
1928 "CORE", note_type, data, sizeof (data));
1929 }
1930 }
1931 }
1932
1933 /* Add extra PPC sections. */
1934
1935 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1936 {
1937 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1938 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1939 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1941 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1942 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1943 { NULL, 0, 0, 0, 0 }
1944 };
1945
1946 enum _ppc64_sec_type {
1947 sec_normal = 0,
1948 sec_opd = 1,
1949 sec_toc = 2
1950 };
1951
1952 struct _ppc64_elf_section_data
1953 {
1954 struct bfd_elf_section_data elf;
1955
1956 union
1957 {
1958 /* An array with one entry for each opd function descriptor,
1959 and some spares since opd entries may be either 16 or 24 bytes. */
1960 #define OPD_NDX(OFF) ((OFF) >> 4)
1961 struct _opd_sec_data
1962 {
1963 /* Points to the function code section for local opd entries. */
1964 asection **func_sec;
1965
1966 /* After editing .opd, adjust references to opd local syms. */
1967 long *adjust;
1968 } opd;
1969
1970 /* An array for toc sections, indexed by offset/8. */
1971 struct _toc_sec_data
1972 {
1973 /* Specifies the relocation symbol index used at a given toc offset. */
1974 unsigned *symndx;
1975
1976 /* And the relocation addend. */
1977 bfd_vma *add;
1978 } toc;
1979 } u;
1980
1981 enum _ppc64_sec_type sec_type:2;
1982
1983 /* Flag set when small branches are detected. Used to
1984 select suitable defaults for the stub group size. */
1985 unsigned int has_14bit_branch:1;
1986
1987 /* Flag set when PLTCALL relocs are detected. */
1988 unsigned int has_pltcall:1;
1989
1990 /* Flag set when section has PLT/GOT/TOC relocations that can be
1991 optimised. */
1992 unsigned int has_optrel:1;
1993 };
1994
1995 #define ppc64_elf_section_data(sec) \
1996 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
1997
1998 static bfd_boolean
1999 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2000 {
2001 if (!sec->used_by_bfd)
2002 {
2003 struct _ppc64_elf_section_data *sdata;
2004 size_t amt = sizeof (*sdata);
2005
2006 sdata = bfd_zalloc (abfd, amt);
2007 if (sdata == NULL)
2008 return FALSE;
2009 sec->used_by_bfd = sdata;
2010 }
2011
2012 return _bfd_elf_new_section_hook (abfd, sec);
2013 }
2014
2015 static bfd_boolean
2016 ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2017 {
2018 const char *name = hdr->bfd_section->name;
2019
2020 if (strncmp (name, ".sbss", 5) == 0
2021 || strncmp (name, ".sdata", 6) == 0)
2022 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2023
2024 return TRUE;
2025 }
2026
2027 static struct _opd_sec_data *
2028 get_opd_info (asection * sec)
2029 {
2030 if (sec != NULL
2031 && ppc64_elf_section_data (sec) != NULL
2032 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2033 return &ppc64_elf_section_data (sec)->u.opd;
2034 return NULL;
2035 }
2036 \f
2037 /* Parameters for the qsort hook. */
2038 static bfd_boolean synthetic_relocatable;
2039 static asection *synthetic_opd;
2040
2041 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2042
2043 static int
2044 compare_symbols (const void *ap, const void *bp)
2045 {
2046 const asymbol *a = *(const asymbol **) ap;
2047 const asymbol *b = *(const asymbol **) bp;
2048
2049 /* Section symbols first. */
2050 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2051 return -1;
2052 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2053 return 1;
2054
2055 /* then .opd symbols. */
2056 if (synthetic_opd != NULL)
2057 {
2058 if (strcmp (a->section->name, ".opd") == 0
2059 && strcmp (b->section->name, ".opd") != 0)
2060 return -1;
2061 if (strcmp (a->section->name, ".opd") != 0
2062 && strcmp (b->section->name, ".opd") == 0)
2063 return 1;
2064 }
2065
2066 /* then other code symbols. */
2067 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2068 == (SEC_CODE | SEC_ALLOC))
2069 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2070 != (SEC_CODE | SEC_ALLOC)))
2071 return -1;
2072
2073 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2074 != (SEC_CODE | SEC_ALLOC))
2075 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2076 == (SEC_CODE | SEC_ALLOC)))
2077 return 1;
2078
2079 if (synthetic_relocatable)
2080 {
2081 if (a->section->id < b->section->id)
2082 return -1;
2083
2084 if (a->section->id > b->section->id)
2085 return 1;
2086 }
2087
2088 if (a->value + a->section->vma < b->value + b->section->vma)
2089 return -1;
2090
2091 if (a->value + a->section->vma > b->value + b->section->vma)
2092 return 1;
2093
2094 /* For syms with the same value, prefer strong dynamic global function
2095 syms over other syms. */
2096 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2097 return -1;
2098
2099 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2100 return 1;
2101
2102 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2103 return -1;
2104
2105 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2106 return 1;
2107
2108 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2109 return -1;
2110
2111 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2112 return 1;
2113
2114 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2115 return -1;
2116
2117 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2118 return 1;
2119
2120 /* Finally, sort on where the symbol is in memory. The symbols will
2121 be in at most two malloc'd blocks, one for static syms, one for
2122 dynamic syms, and we distinguish the two blocks above by testing
2123 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2124 originally in the same order as the symbols (and we're not
2125 sorting the symbols themselves), this ensures a stable sort. */
2126 if (a < b)
2127 return -1;
2128 if (a > b)
2129 return 1;
2130 return 0;
2131 }
2132
2133 /* Search SYMS for a symbol of the given VALUE. */
2134
2135 static asymbol *
2136 sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2137 bfd_vma value)
2138 {
2139 size_t mid;
2140
2141 if (id == (unsigned) -1)
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->value + syms[mid]->section->vma < value)
2147 lo = mid + 1;
2148 else if (syms[mid]->value + syms[mid]->section->vma > value)
2149 hi = mid;
2150 else
2151 return syms[mid];
2152 }
2153 }
2154 else
2155 {
2156 while (lo < hi)
2157 {
2158 mid = (lo + hi) >> 1;
2159 if (syms[mid]->section->id < id)
2160 lo = mid + 1;
2161 else if (syms[mid]->section->id > id)
2162 hi = mid;
2163 else if (syms[mid]->value < value)
2164 lo = mid + 1;
2165 else if (syms[mid]->value > value)
2166 hi = mid;
2167 else
2168 return syms[mid];
2169 }
2170 }
2171 return NULL;
2172 }
2173
2174 static bfd_boolean
2175 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2176 {
2177 bfd_vma vma = *(bfd_vma *) ptr;
2178 return ((section->flags & SEC_ALLOC) != 0
2179 && section->vma <= vma
2180 && vma < section->vma + section->size);
2181 }
2182
2183 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2184 entry syms. Also generate @plt symbols for the glink branch table.
2185 Returns count of synthetic symbols in RET or -1 on error. */
2186
2187 static long
2188 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2189 long static_count, asymbol **static_syms,
2190 long dyn_count, asymbol **dyn_syms,
2191 asymbol **ret)
2192 {
2193 asymbol *s;
2194 size_t i, j, count;
2195 char *names;
2196 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2197 asection *opd = NULL;
2198 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2199 asymbol **syms;
2200 int abi = abiversion (abfd);
2201
2202 *ret = NULL;
2203
2204 if (abi < 2)
2205 {
2206 opd = bfd_get_section_by_name (abfd, ".opd");
2207 if (opd == NULL && abi == 1)
2208 return 0;
2209 }
2210
2211 syms = NULL;
2212 codesecsym = 0;
2213 codesecsymend = 0;
2214 secsymend = 0;
2215 opdsymend = 0;
2216 symcount = 0;
2217 if (opd != NULL)
2218 {
2219 symcount = static_count;
2220 if (!relocatable)
2221 symcount += dyn_count;
2222 if (symcount == 0)
2223 return 0;
2224
2225 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2226 if (syms == NULL)
2227 return -1;
2228
2229 if (!relocatable && static_count != 0 && dyn_count != 0)
2230 {
2231 /* Use both symbol tables. */
2232 memcpy (syms, static_syms, static_count * sizeof (*syms));
2233 memcpy (syms + static_count, dyn_syms,
2234 (dyn_count + 1) * sizeof (*syms));
2235 }
2236 else if (!relocatable && static_count == 0)
2237 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2238 else
2239 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2240
2241 /* Trim uninteresting symbols. Interesting symbols are section,
2242 function, and notype symbols. */
2243 for (i = 0, j = 0; i < symcount; ++i)
2244 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2245 | BSF_RELC | BSF_SRELC)) == 0)
2246 syms[j++] = syms[i];
2247 symcount = j;
2248
2249 synthetic_relocatable = relocatable;
2250 synthetic_opd = opd;
2251 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2252
2253 if (!relocatable && symcount > 1)
2254 {
2255 /* Trim duplicate syms, since we may have merged the normal
2256 and dynamic symbols. Actually, we only care about syms
2257 that have different values, so trim any with the same
2258 value. Don't consider ifunc and ifunc resolver symbols
2259 duplicates however, because GDB wants to know whether a
2260 text symbol is an ifunc resolver. */
2261 for (i = 1, j = 1; i < symcount; ++i)
2262 {
2263 const asymbol *s0 = syms[i - 1];
2264 const asymbol *s1 = syms[i];
2265
2266 if ((s0->value + s0->section->vma
2267 != s1->value + s1->section->vma)
2268 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2269 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2270 syms[j++] = syms[i];
2271 }
2272 symcount = j;
2273 }
2274
2275 i = 0;
2276 /* Note that here and in compare_symbols we can't compare opd and
2277 sym->section directly. With separate debug info files, the
2278 symbols will be extracted from the debug file while abfd passed
2279 to this function is the real binary. */
2280 if (strcmp (syms[i]->section->name, ".opd") == 0)
2281 ++i;
2282 codesecsym = i;
2283
2284 for (; i < symcount; ++i)
2285 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2286 | SEC_THREAD_LOCAL))
2287 != (SEC_CODE | SEC_ALLOC))
2288 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2289 break;
2290 codesecsymend = i;
2291
2292 for (; i < symcount; ++i)
2293 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2294 break;
2295 secsymend = i;
2296
2297 for (; i < symcount; ++i)
2298 if (strcmp (syms[i]->section->name, ".opd") != 0)
2299 break;
2300 opdsymend = i;
2301
2302 for (; i < symcount; ++i)
2303 if (((syms[i]->section->flags
2304 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2305 != (SEC_CODE | SEC_ALLOC))
2306 break;
2307 symcount = i;
2308 }
2309 count = 0;
2310
2311 if (relocatable)
2312 {
2313 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2314 arelent *r;
2315 size_t size;
2316 size_t relcount;
2317
2318 if (opdsymend == secsymend)
2319 goto done;
2320
2321 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2322 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2323 if (relcount == 0)
2324 goto done;
2325
2326 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2327 {
2328 count = -1;
2329 goto done;
2330 }
2331
2332 size = 0;
2333 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2334 {
2335 asymbol *sym;
2336
2337 while (r < opd->relocation + relcount
2338 && r->address < syms[i]->value + opd->vma)
2339 ++r;
2340
2341 if (r == opd->relocation + relcount)
2342 break;
2343
2344 if (r->address != syms[i]->value + opd->vma)
2345 continue;
2346
2347 if (r->howto->type != R_PPC64_ADDR64)
2348 continue;
2349
2350 sym = *r->sym_ptr_ptr;
2351 if (!sym_exists_at (syms, opdsymend, symcount,
2352 sym->section->id, sym->value + r->addend))
2353 {
2354 ++count;
2355 size += sizeof (asymbol);
2356 size += strlen (syms[i]->name) + 2;
2357 }
2358 }
2359
2360 if (size == 0)
2361 goto done;
2362 s = *ret = bfd_malloc (size);
2363 if (s == NULL)
2364 {
2365 count = -1;
2366 goto done;
2367 }
2368
2369 names = (char *) (s + count);
2370
2371 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2372 {
2373 asymbol *sym;
2374
2375 while (r < opd->relocation + relcount
2376 && r->address < syms[i]->value + opd->vma)
2377 ++r;
2378
2379 if (r == opd->relocation + relcount)
2380 break;
2381
2382 if (r->address != syms[i]->value + opd->vma)
2383 continue;
2384
2385 if (r->howto->type != R_PPC64_ADDR64)
2386 continue;
2387
2388 sym = *r->sym_ptr_ptr;
2389 if (!sym_exists_at (syms, opdsymend, symcount,
2390 sym->section->id, sym->value + r->addend))
2391 {
2392 size_t len;
2393
2394 *s = *syms[i];
2395 s->flags |= BSF_SYNTHETIC;
2396 s->section = sym->section;
2397 s->value = sym->value + r->addend;
2398 s->name = names;
2399 *names++ = '.';
2400 len = strlen (syms[i]->name);
2401 memcpy (names, syms[i]->name, len + 1);
2402 names += len + 1;
2403 /* Have udata.p point back to the original symbol this
2404 synthetic symbol was derived from. */
2405 s->udata.p = syms[i];
2406 s++;
2407 }
2408 }
2409 }
2410 else
2411 {
2412 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2413 bfd_byte *contents = NULL;
2414 size_t size;
2415 size_t plt_count = 0;
2416 bfd_vma glink_vma = 0, resolv_vma = 0;
2417 asection *dynamic, *glink = NULL, *relplt = NULL;
2418 arelent *p;
2419
2420 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2421 {
2422 free_contents_and_exit_err:
2423 count = -1;
2424 free_contents_and_exit:
2425 free (contents);
2426 goto done;
2427 }
2428
2429 size = 0;
2430 for (i = secsymend; i < opdsymend; ++i)
2431 {
2432 bfd_vma ent;
2433
2434 /* Ignore bogus symbols. */
2435 if (syms[i]->value > opd->size - 8)
2436 continue;
2437
2438 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2439 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2440 {
2441 ++count;
2442 size += sizeof (asymbol);
2443 size += strlen (syms[i]->name) + 2;
2444 }
2445 }
2446
2447 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2448 if (dyn_count != 0
2449 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2450 {
2451 bfd_byte *dynbuf, *extdyn, *extdynend;
2452 size_t extdynsize;
2453 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2454
2455 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2456 goto free_contents_and_exit_err;
2457
2458 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2459 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2460
2461 extdyn = dynbuf;
2462 extdynend = extdyn + dynamic->size;
2463 for (; extdyn < extdynend; extdyn += extdynsize)
2464 {
2465 Elf_Internal_Dyn dyn;
2466 (*swap_dyn_in) (abfd, extdyn, &dyn);
2467
2468 if (dyn.d_tag == DT_NULL)
2469 break;
2470
2471 if (dyn.d_tag == DT_PPC64_GLINK)
2472 {
2473 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2474 See comment in ppc64_elf_finish_dynamic_sections. */
2475 glink_vma = dyn.d_un.d_val + 8 * 4;
2476 /* The .glink section usually does not survive the final
2477 link; search for the section (usually .text) where the
2478 glink stubs now reside. */
2479 glink = bfd_sections_find_if (abfd, section_covers_vma,
2480 &glink_vma);
2481 break;
2482 }
2483 }
2484
2485 free (dynbuf);
2486 }
2487
2488 if (glink != NULL)
2489 {
2490 /* Determine __glink trampoline by reading the relative branch
2491 from the first glink stub. */
2492 bfd_byte buf[4];
2493 unsigned int off = 0;
2494
2495 while (bfd_get_section_contents (abfd, glink, buf,
2496 glink_vma + off - glink->vma, 4))
2497 {
2498 unsigned int insn = bfd_get_32 (abfd, buf);
2499 insn ^= B_DOT;
2500 if ((insn & ~0x3fffffc) == 0)
2501 {
2502 resolv_vma
2503 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2504 break;
2505 }
2506 off += 4;
2507 if (off > 4)
2508 break;
2509 }
2510
2511 if (resolv_vma)
2512 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2513
2514 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2515 if (relplt != NULL)
2516 {
2517 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2518 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2519 goto free_contents_and_exit_err;
2520
2521 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2522 size += plt_count * sizeof (asymbol);
2523
2524 p = relplt->relocation;
2525 for (i = 0; i < plt_count; i++, p++)
2526 {
2527 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2528 if (p->addend != 0)
2529 size += sizeof ("+0x") - 1 + 16;
2530 }
2531 }
2532 }
2533
2534 if (size == 0)
2535 goto free_contents_and_exit;
2536 s = *ret = bfd_malloc (size);
2537 if (s == NULL)
2538 goto free_contents_and_exit_err;
2539
2540 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2541
2542 for (i = secsymend; i < opdsymend; ++i)
2543 {
2544 bfd_vma ent;
2545
2546 if (syms[i]->value > opd->size - 8)
2547 continue;
2548
2549 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2550 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2551 {
2552 size_t lo, hi;
2553 size_t len;
2554 asection *sec = abfd->sections;
2555
2556 *s = *syms[i];
2557 lo = codesecsym;
2558 hi = codesecsymend;
2559 while (lo < hi)
2560 {
2561 size_t mid = (lo + hi) >> 1;
2562 if (syms[mid]->section->vma < ent)
2563 lo = mid + 1;
2564 else if (syms[mid]->section->vma > ent)
2565 hi = mid;
2566 else
2567 {
2568 sec = syms[mid]->section;
2569 break;
2570 }
2571 }
2572
2573 if (lo >= hi && lo > codesecsym)
2574 sec = syms[lo - 1]->section;
2575
2576 for (; sec != NULL; sec = sec->next)
2577 {
2578 if (sec->vma > ent)
2579 break;
2580 /* SEC_LOAD may not be set if SEC is from a separate debug
2581 info file. */
2582 if ((sec->flags & SEC_ALLOC) == 0)
2583 break;
2584 if ((sec->flags & SEC_CODE) != 0)
2585 s->section = sec;
2586 }
2587 s->flags |= BSF_SYNTHETIC;
2588 s->value = ent - s->section->vma;
2589 s->name = names;
2590 *names++ = '.';
2591 len = strlen (syms[i]->name);
2592 memcpy (names, syms[i]->name, len + 1);
2593 names += len + 1;
2594 /* Have udata.p point back to the original symbol this
2595 synthetic symbol was derived from. */
2596 s->udata.p = syms[i];
2597 s++;
2598 }
2599 }
2600 free (contents);
2601
2602 if (glink != NULL && relplt != NULL)
2603 {
2604 if (resolv_vma)
2605 {
2606 /* Add a symbol for the main glink trampoline. */
2607 memset (s, 0, sizeof *s);
2608 s->the_bfd = abfd;
2609 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2610 s->section = glink;
2611 s->value = resolv_vma - glink->vma;
2612 s->name = names;
2613 memcpy (names, "__glink_PLTresolve",
2614 sizeof ("__glink_PLTresolve"));
2615 names += sizeof ("__glink_PLTresolve");
2616 s++;
2617 count++;
2618 }
2619
2620 /* FIXME: It would be very much nicer to put sym@plt on the
2621 stub rather than on the glink branch table entry. The
2622 objdump disassembler would then use a sensible symbol
2623 name on plt calls. The difficulty in doing so is
2624 a) finding the stubs, and,
2625 b) matching stubs against plt entries, and,
2626 c) there can be multiple stubs for a given plt entry.
2627
2628 Solving (a) could be done by code scanning, but older
2629 ppc64 binaries used different stubs to current code.
2630 (b) is the tricky one since you need to known the toc
2631 pointer for at least one function that uses a pic stub to
2632 be able to calculate the plt address referenced.
2633 (c) means gdb would need to set multiple breakpoints (or
2634 find the glink branch itself) when setting breakpoints
2635 for pending shared library loads. */
2636 p = relplt->relocation;
2637 for (i = 0; i < plt_count; i++, p++)
2638 {
2639 size_t len;
2640
2641 *s = **p->sym_ptr_ptr;
2642 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2643 we are defining a symbol, ensure one of them is set. */
2644 if ((s->flags & BSF_LOCAL) == 0)
2645 s->flags |= BSF_GLOBAL;
2646 s->flags |= BSF_SYNTHETIC;
2647 s->section = glink;
2648 s->value = glink_vma - glink->vma;
2649 s->name = names;
2650 s->udata.p = NULL;
2651 len = strlen ((*p->sym_ptr_ptr)->name);
2652 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2653 names += len;
2654 if (p->addend != 0)
2655 {
2656 memcpy (names, "+0x", sizeof ("+0x") - 1);
2657 names += sizeof ("+0x") - 1;
2658 bfd_sprintf_vma (abfd, names, p->addend);
2659 names += strlen (names);
2660 }
2661 memcpy (names, "@plt", sizeof ("@plt"));
2662 names += sizeof ("@plt");
2663 s++;
2664 if (abi < 2)
2665 {
2666 glink_vma += 8;
2667 if (i >= 0x8000)
2668 glink_vma += 4;
2669 }
2670 else
2671 glink_vma += 4;
2672 }
2673 count += plt_count;
2674 }
2675 }
2676
2677 done:
2678 free (syms);
2679 return count;
2680 }
2681 \f
2682 /* The following functions are specific to the ELF linker, while
2683 functions above are used generally. Those named ppc64_elf_* are
2684 called by the main ELF linker code. They appear in this file more
2685 or less in the order in which they are called. eg.
2686 ppc64_elf_check_relocs is called early in the link process,
2687 ppc64_elf_finish_dynamic_sections is one of the last functions
2688 called.
2689
2690 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2691 functions have both a function code symbol and a function descriptor
2692 symbol. A call to foo in a relocatable object file looks like:
2693
2694 . .text
2695 . x:
2696 . bl .foo
2697 . nop
2698
2699 The function definition in another object file might be:
2700
2701 . .section .opd
2702 . foo: .quad .foo
2703 . .quad .TOC.@tocbase
2704 . .quad 0
2705 .
2706 . .text
2707 . .foo: blr
2708
2709 When the linker resolves the call during a static link, the branch
2710 unsurprisingly just goes to .foo and the .opd information is unused.
2711 If the function definition is in a shared library, things are a little
2712 different: The call goes via a plt call stub, the opd information gets
2713 copied to the plt, and the linker patches the nop.
2714
2715 . x:
2716 . bl .foo_stub
2717 . ld 2,40(1)
2718 .
2719 .
2720 . .foo_stub:
2721 . std 2,40(1) # in practice, the call stub
2722 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2723 . addi 11,11,Lfoo@toc@l # this is the general idea
2724 . ld 12,0(11)
2725 . ld 2,8(11)
2726 . mtctr 12
2727 . ld 11,16(11)
2728 . bctr
2729 .
2730 . .section .plt
2731 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2732
2733 The "reloc ()" notation is supposed to indicate that the linker emits
2734 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2735 copying.
2736
2737 What are the difficulties here? Well, firstly, the relocations
2738 examined by the linker in check_relocs are against the function code
2739 sym .foo, while the dynamic relocation in the plt is emitted against
2740 the function descriptor symbol, foo. Somewhere along the line, we need
2741 to carefully copy dynamic link information from one symbol to the other.
2742 Secondly, the generic part of the elf linker will make .foo a dynamic
2743 symbol as is normal for most other backends. We need foo dynamic
2744 instead, at least for an application final link. However, when
2745 creating a shared library containing foo, we need to have both symbols
2746 dynamic so that references to .foo are satisfied during the early
2747 stages of linking. Otherwise the linker might decide to pull in a
2748 definition from some other object, eg. a static library.
2749
2750 Update: As of August 2004, we support a new convention. Function
2751 calls may use the function descriptor symbol, ie. "bl foo". This
2752 behaves exactly as "bl .foo". */
2753
2754 /* Of those relocs that might be copied as dynamic relocs, this
2755 function selects those that must be copied when linking a shared
2756 library or PIE, even when the symbol is local. */
2757
2758 static int
2759 must_be_dyn_reloc (struct bfd_link_info *info,
2760 enum elf_ppc64_reloc_type r_type)
2761 {
2762 switch (r_type)
2763 {
2764 default:
2765 /* Only relative relocs can be resolved when the object load
2766 address isn't fixed. DTPREL64 is excluded because the
2767 dynamic linker needs to differentiate global dynamic from
2768 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2769 return 1;
2770
2771 case R_PPC64_REL32:
2772 case R_PPC64_REL64:
2773 case R_PPC64_REL30:
2774 case R_PPC64_TOC16:
2775 case R_PPC64_TOC16_DS:
2776 case R_PPC64_TOC16_LO:
2777 case R_PPC64_TOC16_HI:
2778 case R_PPC64_TOC16_HA:
2779 case R_PPC64_TOC16_LO_DS:
2780 return 0;
2781
2782 case R_PPC64_TPREL16:
2783 case R_PPC64_TPREL16_LO:
2784 case R_PPC64_TPREL16_HI:
2785 case R_PPC64_TPREL16_HA:
2786 case R_PPC64_TPREL16_DS:
2787 case R_PPC64_TPREL16_LO_DS:
2788 case R_PPC64_TPREL16_HIGH:
2789 case R_PPC64_TPREL16_HIGHA:
2790 case R_PPC64_TPREL16_HIGHER:
2791 case R_PPC64_TPREL16_HIGHERA:
2792 case R_PPC64_TPREL16_HIGHEST:
2793 case R_PPC64_TPREL16_HIGHESTA:
2794 case R_PPC64_TPREL64:
2795 case R_PPC64_TPREL34:
2796 /* These relocations are relative but in a shared library the
2797 linker doesn't know the thread pointer base. */
2798 return bfd_link_dll (info);
2799 }
2800 }
2801
2802 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2803 copying dynamic variables from a shared lib into an app's .dynbss
2804 section, and instead use a dynamic relocation to point into the
2805 shared lib. With code that gcc generates it is vital that this be
2806 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2807 actually the address of a function descriptor which resides in the
2808 .opd section. gcc uses the descriptor directly rather than going
2809 via the GOT as some other ABIs do, which means that initialized
2810 function pointers reference the descriptor. Thus, a function
2811 pointer initialized to the address of a function in a shared
2812 library will either require a .dynbss copy and a copy reloc, or a
2813 dynamic reloc. Using a .dynbss copy redefines the function
2814 descriptor symbol to point to the copy. This presents a problem as
2815 a PLT entry for that function is also initialized from the function
2816 descriptor symbol and the copy may not be initialized first. */
2817 #define ELIMINATE_COPY_RELOCS 1
2818
2819 /* Section name for stubs is the associated section name plus this
2820 string. */
2821 #define STUB_SUFFIX ".stub"
2822
2823 /* Linker stubs.
2824 ppc_stub_long_branch:
2825 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2826 destination, but a 24 bit branch in a stub section will reach.
2827 . b dest
2828
2829 ppc_stub_plt_branch:
2830 Similar to the above, but a 24 bit branch in the stub section won't
2831 reach its destination.
2832 . addis %r12,%r2,xxx@toc@ha
2833 . ld %r12,xxx@toc@l(%r12)
2834 . mtctr %r12
2835 . bctr
2836
2837 ppc_stub_plt_call:
2838 Used to call a function in a shared library. If it so happens that
2839 the plt entry referenced crosses a 64k boundary, then an extra
2840 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2841 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2842 . addis %r11,%r2,xxx@toc@ha
2843 . ld %r12,xxx+0@toc@l(%r11)
2844 . mtctr %r12
2845 . ld %r2,xxx+8@toc@l(%r11)
2846 . ld %r11,xxx+16@toc@l(%r11)
2847 . bctr
2848
2849 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2850 code to adjust the value and save r2 to support multiple toc sections.
2851 A ppc_stub_long_branch with an r2 offset looks like:
2852 . std %r2,40(%r1)
2853 . addis %r2,%r2,off@ha
2854 . addi %r2,%r2,off@l
2855 . b dest
2856
2857 A ppc_stub_plt_branch with an r2 offset looks like:
2858 . std %r2,40(%r1)
2859 . addis %r12,%r2,xxx@toc@ha
2860 . ld %r12,xxx@toc@l(%r12)
2861 . addis %r2,%r2,off@ha
2862 . addi %r2,%r2,off@l
2863 . mtctr %r12
2864 . bctr
2865
2866 All of the above stubs are shown as their ELFv1 variants. ELFv2
2867 variants exist too, simpler for plt calls since a new toc pointer
2868 and static chain are not loaded by the stub. In addition, ELFv2
2869 has some more complex stubs to handle calls marked with NOTOC
2870 relocs from functions where r2 is not a valid toc pointer. These
2871 come in two flavours, the ones shown below, and _both variants that
2872 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2873 one call is from a function where r2 is used as the toc pointer but
2874 needs a toc adjusting stub for small-model multi-toc, and another
2875 call is from a function where r2 is not valid.
2876 ppc_stub_long_branch_notoc:
2877 . mflr %r12
2878 . bcl 20,31,1f
2879 . 1:
2880 . mflr %r11
2881 . mtlr %r12
2882 . addis %r12,%r11,dest-1b@ha
2883 . addi %r12,%r12,dest-1b@l
2884 . b dest
2885
2886 ppc_stub_plt_branch_notoc:
2887 . mflr %r12
2888 . bcl 20,31,1f
2889 . 1:
2890 . mflr %r11
2891 . mtlr %r12
2892 . lis %r12,xxx-1b@highest
2893 . ori %r12,%r12,xxx-1b@higher
2894 . sldi %r12,%r12,32
2895 . oris %r12,%r12,xxx-1b@high
2896 . ori %r12,%r12,xxx-1b@l
2897 . add %r12,%r11,%r12
2898 . mtctr %r12
2899 . bctr
2900
2901 ppc_stub_plt_call_notoc:
2902 . mflr %r12
2903 . bcl 20,31,1f
2904 . 1:
2905 . mflr %r11
2906 . mtlr %r12
2907 . lis %r12,xxx-1b@highest
2908 . ori %r12,%r12,xxx-1b@higher
2909 . sldi %r12,%r12,32
2910 . oris %r12,%r12,xxx-1b@high
2911 . ori %r12,%r12,xxx-1b@l
2912 . ldx %r12,%r11,%r12
2913 . mtctr %r12
2914 . bctr
2915
2916 There are also ELFv1 power10 variants of these stubs.
2917 ppc_stub_long_branch_notoc:
2918 . pla %r12,dest@pcrel
2919 . b dest
2920 ppc_stub_plt_branch_notoc:
2921 . lis %r11,(dest-1f)@highesta34
2922 . ori %r11,%r11,(dest-1f)@highera34
2923 . sldi %r11,%r11,34
2924 . 1: pla %r12,dest@pcrel
2925 . add %r12,%r11,%r12
2926 . mtctr %r12
2927 . bctr
2928 ppc_stub_plt_call_notoc:
2929 . lis %r11,(xxx-1f)@highesta34
2930 . ori %r11,%r11,(xxx-1f)@highera34
2931 . sldi %r11,%r11,34
2932 . 1: pla %r12,xxx@pcrel
2933 . ldx %r12,%r11,%r12
2934 . mtctr %r12
2935 . bctr
2936
2937 In cases where the high instructions would add zero, they are
2938 omitted and following instructions modified in some cases.
2939 For example, a power10 ppc_stub_plt_call_notoc might simplify down
2940 to
2941 . pld %r12,xxx@pcrel
2942 . mtctr %r12
2943 . bctr
2944
2945 For a given stub group (a set of sections all using the same toc
2946 pointer value) there will be just one stub type used for any
2947 particular function symbol. For example, if printf is called from
2948 code with the tocsave optimization (ie. r2 saved in function
2949 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2950 and from other code without the tocsave optimization requiring a
2951 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2952 type will be created. Calls with the tocsave optimization will
2953 enter this stub after the instruction saving r2. A similar
2954 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2955 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2956 to call an external function like printf. If other calls to printf
2957 require a ppc_stub_plt_call linkage stub then a single
2958 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2959 call. If other calls to printf require a ppc_stub_plt_call_r2save
2960 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2961 be created and calls not requiring r2 to be saved will enter the
2962 stub after the r2 save instruction. There is an analogous
2963 hierarchy of long branch and plt branch stubs for local call
2964 linkage. */
2965
2966 enum ppc_stub_type
2967 {
2968 ppc_stub_none,
2969 ppc_stub_long_branch,
2970 ppc_stub_long_branch_r2off,
2971 ppc_stub_long_branch_notoc,
2972 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2973 ppc_stub_plt_branch,
2974 ppc_stub_plt_branch_r2off,
2975 ppc_stub_plt_branch_notoc,
2976 ppc_stub_plt_branch_both,
2977 ppc_stub_plt_call,
2978 ppc_stub_plt_call_r2save,
2979 ppc_stub_plt_call_notoc,
2980 ppc_stub_plt_call_both,
2981 ppc_stub_global_entry,
2982 ppc_stub_save_res
2983 };
2984
2985 /* Information on stub grouping. */
2986 struct map_stub
2987 {
2988 /* The stub section. */
2989 asection *stub_sec;
2990 /* This is the section to which stubs in the group will be attached. */
2991 asection *link_sec;
2992 /* Next group. */
2993 struct map_stub *next;
2994 /* Whether to emit a copy of register save/restore functions in this
2995 group. */
2996 int needs_save_res;
2997 /* Current offset within stubs after the insn restoring lr in a
2998 _notoc or _both stub using bcl for pc-relative addressing, or
2999 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3000 unsigned int lr_restore;
3001 /* Accumulated size of EH info emitted to describe return address
3002 if stubs modify lr. Does not include 17 byte FDE header. */
3003 unsigned int eh_size;
3004 /* Offset in glink_eh_frame to the start of EH info for this group. */
3005 unsigned int eh_base;
3006 };
3007
3008 struct ppc_stub_hash_entry
3009 {
3010 /* Base hash table entry structure. */
3011 struct bfd_hash_entry root;
3012
3013 enum ppc_stub_type stub_type;
3014
3015 /* Group information. */
3016 struct map_stub *group;
3017
3018 /* Offset within stub_sec of the beginning of this stub. */
3019 bfd_vma stub_offset;
3020
3021 /* Given the symbol's value and its section we can determine its final
3022 value when building the stubs (so the stub knows where to jump. */
3023 bfd_vma target_value;
3024 asection *target_section;
3025
3026 /* The symbol table entry, if any, that this was derived from. */
3027 struct ppc_link_hash_entry *h;
3028 struct plt_entry *plt_ent;
3029
3030 /* Symbol type. */
3031 unsigned char symtype;
3032
3033 /* Symbol st_other. */
3034 unsigned char other;
3035 };
3036
3037 struct ppc_branch_hash_entry
3038 {
3039 /* Base hash table entry structure. */
3040 struct bfd_hash_entry root;
3041
3042 /* Offset within branch lookup table. */
3043 unsigned int offset;
3044
3045 /* Generation marker. */
3046 unsigned int iter;
3047 };
3048
3049 /* Used to track dynamic relocations for local symbols. */
3050 struct ppc_dyn_relocs
3051 {
3052 struct ppc_dyn_relocs *next;
3053
3054 /* The input section of the reloc. */
3055 asection *sec;
3056
3057 /* Total number of relocs copied for the input section. */
3058 unsigned int count : 31;
3059
3060 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3061 unsigned int ifunc : 1;
3062 };
3063
3064 struct ppc_link_hash_entry
3065 {
3066 struct elf_link_hash_entry elf;
3067
3068 union
3069 {
3070 /* A pointer to the most recently used stub hash entry against this
3071 symbol. */
3072 struct ppc_stub_hash_entry *stub_cache;
3073
3074 /* A pointer to the next symbol starting with a '.' */
3075 struct ppc_link_hash_entry *next_dot_sym;
3076 } u;
3077
3078 /* Link between function code and descriptor symbols. */
3079 struct ppc_link_hash_entry *oh;
3080
3081 /* Flag function code and descriptor symbols. */
3082 unsigned int is_func:1;
3083 unsigned int is_func_descriptor:1;
3084 unsigned int fake:1;
3085
3086 /* Whether global opd/toc sym has been adjusted or not.
3087 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3088 should be set for all globals defined in any opd/toc section. */
3089 unsigned int adjust_done:1;
3090
3091 /* Set if this is an out-of-line register save/restore function,
3092 with non-standard calling convention. */
3093 unsigned int save_res:1;
3094
3095 /* Set if a duplicate symbol with non-zero localentry is detected,
3096 even when the duplicate symbol does not provide a definition. */
3097 unsigned int non_zero_localentry:1;
3098
3099 /* Contexts in which symbol is used in the GOT (or TOC).
3100 Bits are or'd into the mask as the corresponding relocs are
3101 encountered during check_relocs, with TLS_TLS being set when any
3102 of the other TLS bits are set. tls_optimize clears bits when
3103 optimizing to indicate the corresponding GOT entry type is not
3104 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3105 set TLS_GDIE when a GD reloc turns into an IE one.
3106 These flags are also kept for local symbols. */
3107 #define TLS_TLS 1 /* Any TLS reloc. */
3108 #define TLS_GD 2 /* GD reloc. */
3109 #define TLS_LD 4 /* LD reloc. */
3110 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3111 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3112 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3113 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3114 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3115 unsigned char tls_mask;
3116
3117 /* The above field is also used to mark function symbols. In which
3118 case TLS_TLS will be 0. */
3119 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3120 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3121 #define NON_GOT 256 /* local symbol plt, not stored. */
3122 };
3123
3124 static inline struct ppc_link_hash_entry *
3125 ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3126 {
3127 return (struct ppc_link_hash_entry *) ent;
3128 }
3129
3130 /* ppc64 ELF linker hash table. */
3131
3132 struct ppc_link_hash_table
3133 {
3134 struct elf_link_hash_table elf;
3135
3136 /* The stub hash table. */
3137 struct bfd_hash_table stub_hash_table;
3138
3139 /* Another hash table for plt_branch stubs. */
3140 struct bfd_hash_table branch_hash_table;
3141
3142 /* Hash table for function prologue tocsave. */
3143 htab_t tocsave_htab;
3144
3145 /* Various options and other info passed from the linker. */
3146 struct ppc64_elf_params *params;
3147
3148 /* The size of sec_info below. */
3149 unsigned int sec_info_arr_size;
3150
3151 /* Per-section array of extra section info. Done this way rather
3152 than as part of ppc64_elf_section_data so we have the info for
3153 non-ppc64 sections. */
3154 struct
3155 {
3156 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3157 bfd_vma toc_off;
3158
3159 union
3160 {
3161 /* The section group that this section belongs to. */
3162 struct map_stub *group;
3163 /* A temp section list pointer. */
3164 asection *list;
3165 } u;
3166 } *sec_info;
3167
3168 /* Linked list of groups. */
3169 struct map_stub *group;
3170
3171 /* Temp used when calculating TOC pointers. */
3172 bfd_vma toc_curr;
3173 bfd *toc_bfd;
3174 asection *toc_first_sec;
3175
3176 /* Used when adding symbols. */
3177 struct ppc_link_hash_entry *dot_syms;
3178
3179 /* Shortcuts to get to dynamic linker sections. */
3180 asection *glink;
3181 asection *global_entry;
3182 asection *sfpr;
3183 asection *pltlocal;
3184 asection *relpltlocal;
3185 asection *brlt;
3186 asection *relbrlt;
3187 asection *glink_eh_frame;
3188
3189 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3190 struct ppc_link_hash_entry *tls_get_addr;
3191 struct ppc_link_hash_entry *tls_get_addr_fd;
3192 struct ppc_link_hash_entry *tga_desc;
3193 struct ppc_link_hash_entry *tga_desc_fd;
3194 struct map_stub *tga_group;
3195
3196 /* The size of reliplt used by got entry relocs. */
3197 bfd_size_type got_reli_size;
3198
3199 /* Statistics. */
3200 unsigned long stub_count[ppc_stub_global_entry];
3201
3202 /* Number of stubs against global syms. */
3203 unsigned long stub_globals;
3204
3205 /* Set if we're linking code with function descriptors. */
3206 unsigned int opd_abi:1;
3207
3208 /* Support for multiple toc sections. */
3209 unsigned int do_multi_toc:1;
3210 unsigned int multi_toc_needed:1;
3211 unsigned int second_toc_pass:1;
3212 unsigned int do_toc_opt:1;
3213
3214 /* Set if tls optimization is enabled. */
3215 unsigned int do_tls_opt:1;
3216
3217 /* Set if inline plt calls should be converted to direct calls. */
3218 unsigned int can_convert_all_inline_plt:1;
3219
3220 /* Set on error. */
3221 unsigned int stub_error:1;
3222
3223 /* Whether func_desc_adjust needs to be run over symbols. */
3224 unsigned int need_func_desc_adj:1;
3225
3226 /* Whether there exist local gnu indirect function resolvers,
3227 referenced by dynamic relocations. */
3228 unsigned int local_ifunc_resolver:1;
3229 unsigned int maybe_local_ifunc_resolver:1;
3230
3231 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3232 unsigned int has_plt_localentry0:1;
3233
3234 /* Whether calls are made via the PLT from NOTOC functions. */
3235 unsigned int notoc_plt:1;
3236
3237 /* Whether to use power10 instructions in linkage stubs. */
3238 unsigned int power10_stubs:1;
3239
3240 /* Incremented every time we size stubs. */
3241 unsigned int stub_iteration;
3242
3243 /* Small local sym cache. */
3244 struct sym_cache sym_cache;
3245 };
3246
3247 /* Rename some of the generic section flags to better document how they
3248 are used here. */
3249
3250 /* Nonzero if this section has TLS related relocations. */
3251 #define has_tls_reloc sec_flg0
3252
3253 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3254 relocations. */
3255 #define nomark_tls_get_addr sec_flg1
3256
3257 /* Nonzero if this section has any toc or got relocs. */
3258 #define has_toc_reloc sec_flg2
3259
3260 /* Nonzero if this section has a call to another section that uses
3261 the toc or got. */
3262 #define makes_toc_func_call sec_flg3
3263
3264 /* Recursion protection when determining above flag. */
3265 #define call_check_in_progress sec_flg4
3266 #define call_check_done sec_flg5
3267
3268 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3269
3270 #define ppc_hash_table(p) \
3271 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3272 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3273
3274 #define ppc_stub_hash_lookup(table, string, create, copy) \
3275 ((struct ppc_stub_hash_entry *) \
3276 bfd_hash_lookup ((table), (string), (create), (copy)))
3277
3278 #define ppc_branch_hash_lookup(table, string, create, copy) \
3279 ((struct ppc_branch_hash_entry *) \
3280 bfd_hash_lookup ((table), (string), (create), (copy)))
3281
3282 /* Create an entry in the stub hash table. */
3283
3284 static struct bfd_hash_entry *
3285 stub_hash_newfunc (struct bfd_hash_entry *entry,
3286 struct bfd_hash_table *table,
3287 const char *string)
3288 {
3289 /* Allocate the structure if it has not already been allocated by a
3290 subclass. */
3291 if (entry == NULL)
3292 {
3293 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3294 if (entry == NULL)
3295 return entry;
3296 }
3297
3298 /* Call the allocation method of the superclass. */
3299 entry = bfd_hash_newfunc (entry, table, string);
3300 if (entry != NULL)
3301 {
3302 struct ppc_stub_hash_entry *eh;
3303
3304 /* Initialize the local fields. */
3305 eh = (struct ppc_stub_hash_entry *) entry;
3306 eh->stub_type = ppc_stub_none;
3307 eh->group = NULL;
3308 eh->stub_offset = 0;
3309 eh->target_value = 0;
3310 eh->target_section = NULL;
3311 eh->h = NULL;
3312 eh->plt_ent = NULL;
3313 eh->other = 0;
3314 }
3315
3316 return entry;
3317 }
3318
3319 /* Create an entry in the branch hash table. */
3320
3321 static struct bfd_hash_entry *
3322 branch_hash_newfunc (struct bfd_hash_entry *entry,
3323 struct bfd_hash_table *table,
3324 const char *string)
3325 {
3326 /* Allocate the structure if it has not already been allocated by a
3327 subclass. */
3328 if (entry == NULL)
3329 {
3330 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3331 if (entry == NULL)
3332 return entry;
3333 }
3334
3335 /* Call the allocation method of the superclass. */
3336 entry = bfd_hash_newfunc (entry, table, string);
3337 if (entry != NULL)
3338 {
3339 struct ppc_branch_hash_entry *eh;
3340
3341 /* Initialize the local fields. */
3342 eh = (struct ppc_branch_hash_entry *) entry;
3343 eh->offset = 0;
3344 eh->iter = 0;
3345 }
3346
3347 return entry;
3348 }
3349
3350 /* Create an entry in a ppc64 ELF linker hash table. */
3351
3352 static struct bfd_hash_entry *
3353 link_hash_newfunc (struct bfd_hash_entry *entry,
3354 struct bfd_hash_table *table,
3355 const char *string)
3356 {
3357 /* Allocate the structure if it has not already been allocated by a
3358 subclass. */
3359 if (entry == NULL)
3360 {
3361 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3362 if (entry == NULL)
3363 return entry;
3364 }
3365
3366 /* Call the allocation method of the superclass. */
3367 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3368 if (entry != NULL)
3369 {
3370 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3371
3372 memset (&eh->u.stub_cache, 0,
3373 (sizeof (struct ppc_link_hash_entry)
3374 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3375
3376 /* When making function calls, old ABI code references function entry
3377 points (dot symbols), while new ABI code references the function
3378 descriptor symbol. We need to make any combination of reference and
3379 definition work together, without breaking archive linking.
3380
3381 For a defined function "foo" and an undefined call to "bar":
3382 An old object defines "foo" and ".foo", references ".bar" (possibly
3383 "bar" too).
3384 A new object defines "foo" and references "bar".
3385
3386 A new object thus has no problem with its undefined symbols being
3387 satisfied by definitions in an old object. On the other hand, the
3388 old object won't have ".bar" satisfied by a new object.
3389
3390 Keep a list of newly added dot-symbols. */
3391
3392 if (string[0] == '.')
3393 {
3394 struct ppc_link_hash_table *htab;
3395
3396 htab = (struct ppc_link_hash_table *) table;
3397 eh->u.next_dot_sym = htab->dot_syms;
3398 htab->dot_syms = eh;
3399 }
3400 }
3401
3402 return entry;
3403 }
3404
3405 struct tocsave_entry
3406 {
3407 asection *sec;
3408 bfd_vma offset;
3409 };
3410
3411 static hashval_t
3412 tocsave_htab_hash (const void *p)
3413 {
3414 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3415 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3416 }
3417
3418 static int
3419 tocsave_htab_eq (const void *p1, const void *p2)
3420 {
3421 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3422 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3423 return e1->sec == e2->sec && e1->offset == e2->offset;
3424 }
3425
3426 /* Destroy a ppc64 ELF linker hash table. */
3427
3428 static void
3429 ppc64_elf_link_hash_table_free (bfd *obfd)
3430 {
3431 struct ppc_link_hash_table *htab;
3432
3433 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3434 if (htab->tocsave_htab)
3435 htab_delete (htab->tocsave_htab);
3436 bfd_hash_table_free (&htab->branch_hash_table);
3437 bfd_hash_table_free (&htab->stub_hash_table);
3438 _bfd_elf_link_hash_table_free (obfd);
3439 }
3440
3441 /* Create a ppc64 ELF linker hash table. */
3442
3443 static struct bfd_link_hash_table *
3444 ppc64_elf_link_hash_table_create (bfd *abfd)
3445 {
3446 struct ppc_link_hash_table *htab;
3447 size_t amt = sizeof (struct ppc_link_hash_table);
3448
3449 htab = bfd_zmalloc (amt);
3450 if (htab == NULL)
3451 return NULL;
3452
3453 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3454 sizeof (struct ppc_link_hash_entry),
3455 PPC64_ELF_DATA))
3456 {
3457 free (htab);
3458 return NULL;
3459 }
3460
3461 /* Init the stub hash table too. */
3462 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3463 sizeof (struct ppc_stub_hash_entry)))
3464 {
3465 _bfd_elf_link_hash_table_free (abfd);
3466 return NULL;
3467 }
3468
3469 /* And the branch hash table. */
3470 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3471 sizeof (struct ppc_branch_hash_entry)))
3472 {
3473 bfd_hash_table_free (&htab->stub_hash_table);
3474 _bfd_elf_link_hash_table_free (abfd);
3475 return NULL;
3476 }
3477
3478 htab->tocsave_htab = htab_try_create (1024,
3479 tocsave_htab_hash,
3480 tocsave_htab_eq,
3481 NULL);
3482 if (htab->tocsave_htab == NULL)
3483 {
3484 ppc64_elf_link_hash_table_free (abfd);
3485 return NULL;
3486 }
3487 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3488
3489 /* Initializing two fields of the union is just cosmetic. We really
3490 only care about glist, but when compiled on a 32-bit host the
3491 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3492 debugger inspection of these fields look nicer. */
3493 htab->elf.init_got_refcount.refcount = 0;
3494 htab->elf.init_got_refcount.glist = NULL;
3495 htab->elf.init_plt_refcount.refcount = 0;
3496 htab->elf.init_plt_refcount.glist = NULL;
3497 htab->elf.init_got_offset.offset = 0;
3498 htab->elf.init_got_offset.glist = NULL;
3499 htab->elf.init_plt_offset.offset = 0;
3500 htab->elf.init_plt_offset.glist = NULL;
3501
3502 return &htab->elf.root;
3503 }
3504
3505 /* Create sections for linker generated code. */
3506
3507 static bfd_boolean
3508 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3509 {
3510 struct ppc_link_hash_table *htab;
3511 flagword flags;
3512
3513 htab = ppc_hash_table (info);
3514
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3516 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 if (htab->params->save_restore_funcs)
3518 {
3519 /* Create .sfpr for code to save and restore fp regs. */
3520 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3521 flags);
3522 if (htab->sfpr == NULL
3523 || !bfd_set_section_alignment (htab->sfpr, 2))
3524 return FALSE;
3525 }
3526
3527 if (bfd_link_relocatable (info))
3528 return TRUE;
3529
3530 /* Create .glink for lazy dynamic linking support. */
3531 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3532 flags);
3533 if (htab->glink == NULL
3534 || !bfd_set_section_alignment (htab->glink, 3))
3535 return FALSE;
3536
3537 /* The part of .glink used by global entry stubs, separate so that
3538 it can be aligned appropriately without affecting htab->glink. */
3539 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3540 flags);
3541 if (htab->global_entry == NULL
3542 || !bfd_set_section_alignment (htab->global_entry, 2))
3543 return FALSE;
3544
3545 if (!info->no_ld_generated_unwind_info)
3546 {
3547 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3548 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3549 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3550 ".eh_frame",
3551 flags);
3552 if (htab->glink_eh_frame == NULL
3553 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3554 return FALSE;
3555 }
3556
3557 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3558 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3559 if (htab->elf.iplt == NULL
3560 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3561 return FALSE;
3562
3563 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3564 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3565 htab->elf.irelplt
3566 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3567 if (htab->elf.irelplt == NULL
3568 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3569 return FALSE;
3570
3571 /* Create branch lookup table for plt_branch stubs. */
3572 flags = (SEC_ALLOC | SEC_LOAD
3573 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3574 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3575 flags);
3576 if (htab->brlt == NULL
3577 || !bfd_set_section_alignment (htab->brlt, 3))
3578 return FALSE;
3579
3580 /* Local plt entries, put in .branch_lt but a separate section for
3581 convenience. */
3582 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3583 flags);
3584 if (htab->pltlocal == NULL
3585 || !bfd_set_section_alignment (htab->pltlocal, 3))
3586 return FALSE;
3587
3588 if (!bfd_link_pic (info))
3589 return TRUE;
3590
3591 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3592 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3593 htab->relbrlt
3594 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3595 if (htab->relbrlt == NULL
3596 || !bfd_set_section_alignment (htab->relbrlt, 3))
3597 return FALSE;
3598
3599 htab->relpltlocal
3600 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3601 if (htab->relpltlocal == NULL
3602 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3603 return FALSE;
3604
3605 return TRUE;
3606 }
3607
3608 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3609
3610 bfd_boolean
3611 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3612 struct ppc64_elf_params *params)
3613 {
3614 struct ppc_link_hash_table *htab;
3615
3616 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3617
3618 /* Always hook our dynamic sections into the first bfd, which is the
3619 linker created stub bfd. This ensures that the GOT header is at
3620 the start of the output TOC section. */
3621 htab = ppc_hash_table (info);
3622 htab->elf.dynobj = params->stub_bfd;
3623 htab->params = params;
3624
3625 return create_linkage_sections (htab->elf.dynobj, info);
3626 }
3627
3628 /* Build a name for an entry in the stub hash table. */
3629
3630 static char *
3631 ppc_stub_name (const asection *input_section,
3632 const asection *sym_sec,
3633 const struct ppc_link_hash_entry *h,
3634 const Elf_Internal_Rela *rel)
3635 {
3636 char *stub_name;
3637 ssize_t len;
3638
3639 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3640 offsets from a sym as a branch target? In fact, we could
3641 probably assume the addend is always zero. */
3642 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3643
3644 if (h)
3645 {
3646 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3647 stub_name = bfd_malloc (len);
3648 if (stub_name == NULL)
3649 return stub_name;
3650
3651 len = sprintf (stub_name, "%08x.%s+%x",
3652 input_section->id & 0xffffffff,
3653 h->elf.root.root.string,
3654 (int) rel->r_addend & 0xffffffff);
3655 }
3656 else
3657 {
3658 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3659 stub_name = bfd_malloc (len);
3660 if (stub_name == NULL)
3661 return stub_name;
3662
3663 len = sprintf (stub_name, "%08x.%x:%x+%x",
3664 input_section->id & 0xffffffff,
3665 sym_sec->id & 0xffffffff,
3666 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3667 (int) rel->r_addend & 0xffffffff);
3668 }
3669 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3670 stub_name[len - 2] = 0;
3671 return stub_name;
3672 }
3673
3674 /* Look up an entry in the stub hash. Stub entries are cached because
3675 creating the stub name takes a bit of time. */
3676
3677 static struct ppc_stub_hash_entry *
3678 ppc_get_stub_entry (const asection *input_section,
3679 const asection *sym_sec,
3680 struct ppc_link_hash_entry *h,
3681 const Elf_Internal_Rela *rel,
3682 struct ppc_link_hash_table *htab)
3683 {
3684 struct ppc_stub_hash_entry *stub_entry;
3685 struct map_stub *group;
3686
3687 /* If this input section is part of a group of sections sharing one
3688 stub section, then use the id of the first section in the group.
3689 Stub names need to include a section id, as there may well be
3690 more than one stub used to reach say, printf, and we need to
3691 distinguish between them. */
3692 group = htab->sec_info[input_section->id].u.group;
3693 if (group == NULL)
3694 return NULL;
3695
3696 if (h != NULL && h->u.stub_cache != NULL
3697 && h->u.stub_cache->h == h
3698 && h->u.stub_cache->group == group)
3699 {
3700 stub_entry = h->u.stub_cache;
3701 }
3702 else
3703 {
3704 char *stub_name;
3705
3706 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3707 if (stub_name == NULL)
3708 return NULL;
3709
3710 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3711 stub_name, FALSE, FALSE);
3712 if (h != NULL)
3713 h->u.stub_cache = stub_entry;
3714
3715 free (stub_name);
3716 }
3717
3718 return stub_entry;
3719 }
3720
3721 /* Add a new stub entry to the stub hash. Not all fields of the new
3722 stub entry are initialised. */
3723
3724 static struct ppc_stub_hash_entry *
3725 ppc_add_stub (const char *stub_name,
3726 asection *section,
3727 struct bfd_link_info *info)
3728 {
3729 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3730 struct map_stub *group;
3731 asection *link_sec;
3732 asection *stub_sec;
3733 struct ppc_stub_hash_entry *stub_entry;
3734
3735 group = htab->sec_info[section->id].u.group;
3736 link_sec = group->link_sec;
3737 stub_sec = group->stub_sec;
3738 if (stub_sec == NULL)
3739 {
3740 size_t namelen;
3741 bfd_size_type len;
3742 char *s_name;
3743
3744 namelen = strlen (link_sec->name);
3745 len = namelen + sizeof (STUB_SUFFIX);
3746 s_name = bfd_alloc (htab->params->stub_bfd, len);
3747 if (s_name == NULL)
3748 return NULL;
3749
3750 memcpy (s_name, link_sec->name, namelen);
3751 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3752 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3753 if (stub_sec == NULL)
3754 return NULL;
3755 group->stub_sec = stub_sec;
3756 }
3757
3758 /* Enter this entry into the linker stub hash table. */
3759 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3760 TRUE, FALSE);
3761 if (stub_entry == NULL)
3762 {
3763 /* xgettext:c-format */
3764 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3765 section->owner, stub_name);
3766 return NULL;
3767 }
3768
3769 stub_entry->group = group;
3770 stub_entry->stub_offset = 0;
3771 return stub_entry;
3772 }
3773
3774 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3775 not already done. */
3776
3777 static bfd_boolean
3778 create_got_section (bfd *abfd, struct bfd_link_info *info)
3779 {
3780 asection *got, *relgot;
3781 flagword flags;
3782 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3783
3784 if (!is_ppc64_elf (abfd))
3785 return FALSE;
3786 if (htab == NULL)
3787 return FALSE;
3788
3789 if (!htab->elf.sgot
3790 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3791 return FALSE;
3792
3793 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3794 | SEC_LINKER_CREATED);
3795
3796 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3797 if (!got
3798 || !bfd_set_section_alignment (got, 3))
3799 return FALSE;
3800
3801 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3802 flags | SEC_READONLY);
3803 if (!relgot
3804 || !bfd_set_section_alignment (relgot, 3))
3805 return FALSE;
3806
3807 ppc64_elf_tdata (abfd)->got = got;
3808 ppc64_elf_tdata (abfd)->relgot = relgot;
3809 return TRUE;
3810 }
3811
3812 /* Follow indirect and warning symbol links. */
3813
3814 static inline struct bfd_link_hash_entry *
3815 follow_link (struct bfd_link_hash_entry *h)
3816 {
3817 while (h->type == bfd_link_hash_indirect
3818 || h->type == bfd_link_hash_warning)
3819 h = h->u.i.link;
3820 return h;
3821 }
3822
3823 static inline struct elf_link_hash_entry *
3824 elf_follow_link (struct elf_link_hash_entry *h)
3825 {
3826 return (struct elf_link_hash_entry *) follow_link (&h->root);
3827 }
3828
3829 static inline struct ppc_link_hash_entry *
3830 ppc_follow_link (struct ppc_link_hash_entry *h)
3831 {
3832 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
3833 }
3834
3835 /* Merge PLT info on FROM with that on TO. */
3836
3837 static void
3838 move_plt_plist (struct ppc_link_hash_entry *from,
3839 struct ppc_link_hash_entry *to)
3840 {
3841 if (from->elf.plt.plist != NULL)
3842 {
3843 if (to->elf.plt.plist != NULL)
3844 {
3845 struct plt_entry **entp;
3846 struct plt_entry *ent;
3847
3848 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3849 {
3850 struct plt_entry *dent;
3851
3852 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3853 if (dent->addend == ent->addend)
3854 {
3855 dent->plt.refcount += ent->plt.refcount;
3856 *entp = ent->next;
3857 break;
3858 }
3859 if (dent == NULL)
3860 entp = &ent->next;
3861 }
3862 *entp = to->elf.plt.plist;
3863 }
3864
3865 to->elf.plt.plist = from->elf.plt.plist;
3866 from->elf.plt.plist = NULL;
3867 }
3868 }
3869
3870 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3871
3872 static void
3873 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3874 struct elf_link_hash_entry *dir,
3875 struct elf_link_hash_entry *ind)
3876 {
3877 struct ppc_link_hash_entry *edir, *eind;
3878
3879 edir = ppc_elf_hash_entry (dir);
3880 eind = ppc_elf_hash_entry (ind);
3881
3882 edir->is_func |= eind->is_func;
3883 edir->is_func_descriptor |= eind->is_func_descriptor;
3884 edir->tls_mask |= eind->tls_mask;
3885 if (eind->oh != NULL)
3886 edir->oh = ppc_follow_link (eind->oh);
3887
3888 if (edir->elf.versioned != versioned_hidden)
3889 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3890 edir->elf.ref_regular |= eind->elf.ref_regular;
3891 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3892 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3893 edir->elf.needs_plt |= eind->elf.needs_plt;
3894 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3895
3896 /* If we were called to copy over info for a weak sym, don't copy
3897 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3898 in order to simplify readonly_dynrelocs and save a field in the
3899 symbol hash entry, but that means dyn_relocs can't be used in any
3900 tests about a specific symbol, or affect other symbol flags which
3901 are then tested. */
3902 if (eind->elf.root.type != bfd_link_hash_indirect)
3903 return;
3904
3905 /* Copy over any dynamic relocs we may have on the indirect sym. */
3906 if (ind->dyn_relocs != NULL)
3907 {
3908 if (dir->dyn_relocs != NULL)
3909 {
3910 struct elf_dyn_relocs **pp;
3911 struct elf_dyn_relocs *p;
3912
3913 /* Add reloc counts against the indirect sym to the direct sym
3914 list. Merge any entries against the same section. */
3915 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3916 {
3917 struct elf_dyn_relocs *q;
3918
3919 for (q = dir->dyn_relocs; q != NULL; q = q->next)
3920 if (q->sec == p->sec)
3921 {
3922 q->pc_count += p->pc_count;
3923 q->count += p->count;
3924 *pp = p->next;
3925 break;
3926 }
3927 if (q == NULL)
3928 pp = &p->next;
3929 }
3930 *pp = dir->dyn_relocs;
3931 }
3932
3933 dir->dyn_relocs = ind->dyn_relocs;
3934 ind->dyn_relocs = NULL;
3935 }
3936
3937 /* Copy over got entries that we may have already seen to the
3938 symbol which just became indirect. */
3939 if (eind->elf.got.glist != NULL)
3940 {
3941 if (edir->elf.got.glist != NULL)
3942 {
3943 struct got_entry **entp;
3944 struct got_entry *ent;
3945
3946 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3947 {
3948 struct got_entry *dent;
3949
3950 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3951 if (dent->addend == ent->addend
3952 && dent->owner == ent->owner
3953 && dent->tls_type == ent->tls_type)
3954 {
3955 dent->got.refcount += ent->got.refcount;
3956 *entp = ent->next;
3957 break;
3958 }
3959 if (dent == NULL)
3960 entp = &ent->next;
3961 }
3962 *entp = edir->elf.got.glist;
3963 }
3964
3965 edir->elf.got.glist = eind->elf.got.glist;
3966 eind->elf.got.glist = NULL;
3967 }
3968
3969 /* And plt entries. */
3970 move_plt_plist (eind, edir);
3971
3972 if (eind->elf.dynindx != -1)
3973 {
3974 if (edir->elf.dynindx != -1)
3975 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3976 edir->elf.dynstr_index);
3977 edir->elf.dynindx = eind->elf.dynindx;
3978 edir->elf.dynstr_index = eind->elf.dynstr_index;
3979 eind->elf.dynindx = -1;
3980 eind->elf.dynstr_index = 0;
3981 }
3982 }
3983
3984 /* Find the function descriptor hash entry from the given function code
3985 hash entry FH. Link the entries via their OH fields. */
3986
3987 static struct ppc_link_hash_entry *
3988 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3989 {
3990 struct ppc_link_hash_entry *fdh = fh->oh;
3991
3992 if (fdh == NULL)
3993 {
3994 const char *fd_name = fh->elf.root.root.string + 1;
3995
3996 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
3997 FALSE, FALSE, FALSE));
3998 if (fdh == NULL)
3999 return fdh;
4000
4001 fdh->is_func_descriptor = 1;
4002 fdh->oh = fh;
4003 fh->is_func = 1;
4004 fh->oh = fdh;
4005 }
4006
4007 fdh = ppc_follow_link (fdh);
4008 fdh->is_func_descriptor = 1;
4009 fdh->oh = fh;
4010 return fdh;
4011 }
4012
4013 /* Make a fake function descriptor sym for the undefined code sym FH. */
4014
4015 static struct ppc_link_hash_entry *
4016 make_fdh (struct bfd_link_info *info,
4017 struct ppc_link_hash_entry *fh)
4018 {
4019 bfd *abfd = fh->elf.root.u.undef.abfd;
4020 struct bfd_link_hash_entry *bh = NULL;
4021 struct ppc_link_hash_entry *fdh;
4022 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4023 ? BSF_WEAK
4024 : BSF_GLOBAL);
4025
4026 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4027 fh->elf.root.root.string + 1,
4028 flags, bfd_und_section_ptr, 0,
4029 NULL, FALSE, FALSE, &bh))
4030 return NULL;
4031
4032 fdh = (struct ppc_link_hash_entry *) bh;
4033 fdh->elf.non_elf = 0;
4034 fdh->fake = 1;
4035 fdh->is_func_descriptor = 1;
4036 fdh->oh = fh;
4037 fh->is_func = 1;
4038 fh->oh = fdh;
4039 return fdh;
4040 }
4041
4042 /* Fix function descriptor symbols defined in .opd sections to be
4043 function type. */
4044
4045 static bfd_boolean
4046 ppc64_elf_add_symbol_hook (bfd *ibfd,
4047 struct bfd_link_info *info,
4048 Elf_Internal_Sym *isym,
4049 const char **name,
4050 flagword *flags ATTRIBUTE_UNUSED,
4051 asection **sec,
4052 bfd_vma *value)
4053 {
4054 if (*sec != NULL
4055 && strcmp ((*sec)->name, ".opd") == 0)
4056 {
4057 asection *code_sec;
4058
4059 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4060 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4061 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4062
4063 /* If the symbol is a function defined in .opd, and the function
4064 code is in a discarded group, let it appear to be undefined. */
4065 if (!bfd_link_relocatable (info)
4066 && (*sec)->reloc_count != 0
4067 && opd_entry_value (*sec, *value, &code_sec, NULL,
4068 FALSE) != (bfd_vma) -1
4069 && discarded_section (code_sec))
4070 {
4071 *sec = bfd_und_section_ptr;
4072 isym->st_shndx = SHN_UNDEF;
4073 }
4074 }
4075 else if (*sec != NULL
4076 && strcmp ((*sec)->name, ".toc") == 0
4077 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4078 {
4079 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4080 if (htab != NULL)
4081 htab->params->object_in_toc = 1;
4082 }
4083
4084 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4085 {
4086 if (abiversion (ibfd) == 0)
4087 set_abiversion (ibfd, 2);
4088 else if (abiversion (ibfd) == 1)
4089 {
4090 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4091 " for ABI version 1"), *name);
4092 bfd_set_error (bfd_error_bad_value);
4093 return FALSE;
4094 }
4095 }
4096
4097 return TRUE;
4098 }
4099
4100 /* Merge non-visibility st_other attributes: local entry point. */
4101
4102 static void
4103 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4104 const Elf_Internal_Sym *isym,
4105 bfd_boolean definition,
4106 bfd_boolean dynamic)
4107 {
4108 if (definition && (!dynamic || !h->def_regular))
4109 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4110 | ELF_ST_VISIBILITY (h->other));
4111 }
4112
4113 /* Hook called on merging a symbol. We use this to clear "fake" since
4114 we now have a real symbol. */
4115
4116 static bfd_boolean
4117 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4118 const Elf_Internal_Sym *isym,
4119 asection **psec ATTRIBUTE_UNUSED,
4120 bfd_boolean newdef ATTRIBUTE_UNUSED,
4121 bfd_boolean olddef ATTRIBUTE_UNUSED,
4122 bfd *oldbfd ATTRIBUTE_UNUSED,
4123 const asection *oldsec ATTRIBUTE_UNUSED)
4124 {
4125 ppc_elf_hash_entry (h)->fake = 0;
4126 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4127 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
4128 return TRUE;
4129 }
4130
4131 /* This function makes an old ABI object reference to ".bar" cause the
4132 inclusion of a new ABI object archive that defines "bar".
4133 NAME is a symbol defined in an archive. Return a symbol in the hash
4134 table that might be satisfied by the archive symbols. */
4135
4136 static struct elf_link_hash_entry *
4137 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4138 struct bfd_link_info *info,
4139 const char *name)
4140 {
4141 struct elf_link_hash_entry *h;
4142 char *dot_name;
4143 size_t len;
4144
4145 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4146 if (h != NULL
4147 /* Don't return this sym if it is a fake function descriptor
4148 created by add_symbol_adjust. */
4149 && !ppc_elf_hash_entry (h)->fake)
4150 return h;
4151
4152 if (name[0] == '.')
4153 return h;
4154
4155 len = strlen (name);
4156 dot_name = bfd_alloc (abfd, len + 2);
4157 if (dot_name == NULL)
4158 return (struct elf_link_hash_entry *) -1;
4159 dot_name[0] = '.';
4160 memcpy (dot_name + 1, name, len + 1);
4161 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4162 bfd_release (abfd, dot_name);
4163 if (h != NULL)
4164 return h;
4165
4166 if (strcmp (name, "__tls_get_addr_opt") == 0)
4167 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
4168 return h;
4169 }
4170
4171 /* This function satisfies all old ABI object references to ".bar" if a
4172 new ABI object defines "bar". Well, at least, undefined dot symbols
4173 are made weak. This stops later archive searches from including an
4174 object if we already have a function descriptor definition. It also
4175 prevents the linker complaining about undefined symbols.
4176 We also check and correct mismatched symbol visibility here. The
4177 most restrictive visibility of the function descriptor and the
4178 function entry symbol is used. */
4179
4180 static bfd_boolean
4181 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4182 {
4183 struct ppc_link_hash_table *htab;
4184 struct ppc_link_hash_entry *fdh;
4185
4186 if (eh->elf.root.type == bfd_link_hash_warning)
4187 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4188
4189 if (eh->elf.root.type == bfd_link_hash_indirect)
4190 return TRUE;
4191
4192 if (eh->elf.root.root.string[0] != '.')
4193 abort ();
4194
4195 htab = ppc_hash_table (info);
4196 if (htab == NULL)
4197 return FALSE;
4198
4199 fdh = lookup_fdh (eh, htab);
4200 if (fdh == NULL
4201 && !bfd_link_relocatable (info)
4202 && (eh->elf.root.type == bfd_link_hash_undefined
4203 || eh->elf.root.type == bfd_link_hash_undefweak)
4204 && eh->elf.ref_regular)
4205 {
4206 /* Make an undefined function descriptor sym, in order to
4207 pull in an --as-needed shared lib. Archives are handled
4208 elsewhere. */
4209 fdh = make_fdh (info, eh);
4210 if (fdh == NULL)
4211 return FALSE;
4212 }
4213
4214 if (fdh != NULL)
4215 {
4216 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4217 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4218
4219 /* Make both descriptor and entry symbol have the most
4220 constraining visibility of either symbol. */
4221 if (entry_vis < descr_vis)
4222 fdh->elf.other += entry_vis - descr_vis;
4223 else if (entry_vis > descr_vis)
4224 eh->elf.other += descr_vis - entry_vis;
4225
4226 /* Propagate reference flags from entry symbol to function
4227 descriptor symbol. */
4228 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4229 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4230 fdh->elf.ref_regular |= eh->elf.ref_regular;
4231 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4232
4233 if (!fdh->elf.forced_local
4234 && fdh->elf.dynindx == -1
4235 && fdh->elf.versioned != versioned_hidden
4236 && (bfd_link_dll (info)
4237 || fdh->elf.def_dynamic
4238 || fdh->elf.ref_dynamic)
4239 && (eh->elf.ref_regular
4240 || eh->elf.def_regular))
4241 {
4242 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4243 return FALSE;
4244 }
4245 }
4246
4247 return TRUE;
4248 }
4249
4250 /* Set up opd section info and abiversion for IBFD, and process list
4251 of dot-symbols we made in link_hash_newfunc. */
4252
4253 static bfd_boolean
4254 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4255 {
4256 struct ppc_link_hash_table *htab;
4257 struct ppc_link_hash_entry **p, *eh;
4258 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4259
4260 if (opd != NULL && opd->size != 0)
4261 {
4262 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4263 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4264
4265 if (abiversion (ibfd) == 0)
4266 set_abiversion (ibfd, 1);
4267 else if (abiversion (ibfd) >= 2)
4268 {
4269 /* xgettext:c-format */
4270 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4271 ibfd, abiversion (ibfd));
4272 bfd_set_error (bfd_error_bad_value);
4273 return FALSE;
4274 }
4275 }
4276
4277 if (is_ppc64_elf (info->output_bfd))
4278 {
4279 /* For input files without an explicit abiversion in e_flags
4280 we should have flagged any with symbol st_other bits set
4281 as ELFv1 and above flagged those with .opd as ELFv2.
4282 Set the output abiversion if not yet set, and for any input
4283 still ambiguous, take its abiversion from the output.
4284 Differences in ABI are reported later. */
4285 if (abiversion (info->output_bfd) == 0)
4286 set_abiversion (info->output_bfd, abiversion (ibfd));
4287 else if (abiversion (ibfd) == 0)
4288 set_abiversion (ibfd, abiversion (info->output_bfd));
4289 }
4290
4291 htab = ppc_hash_table (info);
4292 if (htab == NULL)
4293 return TRUE;
4294
4295 if (opd != NULL && opd->size != 0
4296 && (ibfd->flags & DYNAMIC) == 0
4297 && (opd->flags & SEC_RELOC) != 0
4298 && opd->reloc_count != 0
4299 && !bfd_is_abs_section (opd->output_section)
4300 && info->gc_sections)
4301 {
4302 /* Garbage collection needs some extra help with .opd sections.
4303 We don't want to necessarily keep everything referenced by
4304 relocs in .opd, as that would keep all functions. Instead,
4305 if we reference an .opd symbol (a function descriptor), we
4306 want to keep the function code symbol's section. This is
4307 easy for global symbols, but for local syms we need to keep
4308 information about the associated function section. */
4309 bfd_size_type amt;
4310 asection **opd_sym_map;
4311 Elf_Internal_Shdr *symtab_hdr;
4312 Elf_Internal_Rela *relocs, *rel_end, *rel;
4313
4314 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4315 opd_sym_map = bfd_zalloc (ibfd, amt);
4316 if (opd_sym_map == NULL)
4317 return FALSE;
4318 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4319 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4320 info->keep_memory);
4321 if (relocs == NULL)
4322 return FALSE;
4323 symtab_hdr = &elf_symtab_hdr (ibfd);
4324 rel_end = relocs + opd->reloc_count - 1;
4325 for (rel = relocs; rel < rel_end; rel++)
4326 {
4327 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4328 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4329
4330 if (r_type == R_PPC64_ADDR64
4331 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4332 && r_symndx < symtab_hdr->sh_info)
4333 {
4334 Elf_Internal_Sym *isym;
4335 asection *s;
4336
4337 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4338 if (isym == NULL)
4339 {
4340 if (elf_section_data (opd)->relocs != relocs)
4341 free (relocs);
4342 return FALSE;
4343 }
4344
4345 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4346 if (s != NULL && s != opd)
4347 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4348 }
4349 }
4350 if (elf_section_data (opd)->relocs != relocs)
4351 free (relocs);
4352 }
4353
4354 p = &htab->dot_syms;
4355 while ((eh = *p) != NULL)
4356 {
4357 *p = NULL;
4358 if (&eh->elf == htab->elf.hgot)
4359 ;
4360 else if (htab->elf.hgot == NULL
4361 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4362 htab->elf.hgot = &eh->elf;
4363 else if (abiversion (ibfd) <= 1)
4364 {
4365 htab->need_func_desc_adj = 1;
4366 if (!add_symbol_adjust (eh, info))
4367 return FALSE;
4368 }
4369 p = &eh->u.next_dot_sym;
4370 }
4371 return TRUE;
4372 }
4373
4374 /* Undo hash table changes when an --as-needed input file is determined
4375 not to be needed. */
4376
4377 static bfd_boolean
4378 ppc64_elf_notice_as_needed (bfd *ibfd,
4379 struct bfd_link_info *info,
4380 enum notice_asneeded_action act)
4381 {
4382 if (act == notice_not_needed)
4383 {
4384 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4385
4386 if (htab == NULL)
4387 return FALSE;
4388
4389 htab->dot_syms = NULL;
4390 }
4391 return _bfd_elf_notice_as_needed (ibfd, info, act);
4392 }
4393
4394 /* If --just-symbols against a final linked binary, then assume we need
4395 toc adjusting stubs when calling functions defined there. */
4396
4397 static void
4398 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4399 {
4400 if ((sec->flags & SEC_CODE) != 0
4401 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4402 && is_ppc64_elf (sec->owner))
4403 {
4404 if (abiversion (sec->owner) >= 2
4405 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4406 sec->has_toc_reloc = 1;
4407 }
4408 _bfd_elf_link_just_syms (sec, info);
4409 }
4410
4411 static struct plt_entry **
4412 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4413 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4414 {
4415 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4416 struct plt_entry **local_plt;
4417 unsigned char *local_got_tls_masks;
4418
4419 if (local_got_ents == NULL)
4420 {
4421 bfd_size_type size = symtab_hdr->sh_info;
4422
4423 size *= (sizeof (*local_got_ents)
4424 + sizeof (*local_plt)
4425 + sizeof (*local_got_tls_masks));
4426 local_got_ents = bfd_zalloc (abfd, size);
4427 if (local_got_ents == NULL)
4428 return NULL;
4429 elf_local_got_ents (abfd) = local_got_ents;
4430 }
4431
4432 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4433 {
4434 struct got_entry *ent;
4435
4436 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4437 if (ent->addend == r_addend
4438 && ent->owner == abfd
4439 && ent->tls_type == tls_type)
4440 break;
4441 if (ent == NULL)
4442 {
4443 size_t amt = sizeof (*ent);
4444 ent = bfd_alloc (abfd, amt);
4445 if (ent == NULL)
4446 return FALSE;
4447 ent->next = local_got_ents[r_symndx];
4448 ent->addend = r_addend;
4449 ent->owner = abfd;
4450 ent->tls_type = tls_type;
4451 ent->is_indirect = FALSE;
4452 ent->got.refcount = 0;
4453 local_got_ents[r_symndx] = ent;
4454 }
4455 ent->got.refcount += 1;
4456 }
4457
4458 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4459 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4460 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4461
4462 return local_plt + r_symndx;
4463 }
4464
4465 static bfd_boolean
4466 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4467 {
4468 struct plt_entry *ent;
4469
4470 for (ent = *plist; ent != NULL; ent = ent->next)
4471 if (ent->addend == addend)
4472 break;
4473 if (ent == NULL)
4474 {
4475 size_t amt = sizeof (*ent);
4476 ent = bfd_alloc (abfd, amt);
4477 if (ent == NULL)
4478 return FALSE;
4479 ent->next = *plist;
4480 ent->addend = addend;
4481 ent->plt.refcount = 0;
4482 *plist = ent;
4483 }
4484 ent->plt.refcount += 1;
4485 return TRUE;
4486 }
4487
4488 static bfd_boolean
4489 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4490 {
4491 return (r_type == R_PPC64_REL24
4492 || r_type == R_PPC64_REL24_NOTOC
4493 || r_type == R_PPC64_REL14
4494 || r_type == R_PPC64_REL14_BRTAKEN
4495 || r_type == R_PPC64_REL14_BRNTAKEN
4496 || r_type == R_PPC64_ADDR24
4497 || r_type == R_PPC64_ADDR14
4498 || r_type == R_PPC64_ADDR14_BRTAKEN
4499 || r_type == R_PPC64_ADDR14_BRNTAKEN
4500 || r_type == R_PPC64_PLTCALL
4501 || r_type == R_PPC64_PLTCALL_NOTOC);
4502 }
4503
4504 /* Relocs on inline plt call sequence insns prior to the call. */
4505
4506 static bfd_boolean
4507 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4508 {
4509 return (r_type == R_PPC64_PLT16_HA
4510 || r_type == R_PPC64_PLT16_HI
4511 || r_type == R_PPC64_PLT16_LO
4512 || r_type == R_PPC64_PLT16_LO_DS
4513 || r_type == R_PPC64_PLT_PCREL34
4514 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4515 || r_type == R_PPC64_PLTSEQ
4516 || r_type == R_PPC64_PLTSEQ_NOTOC);
4517 }
4518
4519 /* Look through the relocs for a section during the first phase, and
4520 calculate needed space in the global offset table, procedure
4521 linkage table, and dynamic reloc sections. */
4522
4523 static bfd_boolean
4524 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4525 asection *sec, const Elf_Internal_Rela *relocs)
4526 {
4527 struct ppc_link_hash_table *htab;
4528 Elf_Internal_Shdr *symtab_hdr;
4529 struct elf_link_hash_entry **sym_hashes;
4530 const Elf_Internal_Rela *rel;
4531 const Elf_Internal_Rela *rel_end;
4532 asection *sreloc;
4533 struct elf_link_hash_entry *tga, *dottga;
4534 bfd_boolean is_opd;
4535
4536 if (bfd_link_relocatable (info))
4537 return TRUE;
4538
4539 /* Don't do anything special with non-loaded, non-alloced sections.
4540 In particular, any relocs in such sections should not affect GOT
4541 and PLT reference counting (ie. we don't allow them to create GOT
4542 or PLT entries), there's no possibility or desire to optimize TLS
4543 relocs, and there's not much point in propagating relocs to shared
4544 libs that the dynamic linker won't relocate. */
4545 if ((sec->flags & SEC_ALLOC) == 0)
4546 return TRUE;
4547
4548 BFD_ASSERT (is_ppc64_elf (abfd));
4549
4550 htab = ppc_hash_table (info);
4551 if (htab == NULL)
4552 return FALSE;
4553
4554 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4555 FALSE, FALSE, TRUE);
4556 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4557 FALSE, FALSE, TRUE);
4558 symtab_hdr = &elf_symtab_hdr (abfd);
4559 sym_hashes = elf_sym_hashes (abfd);
4560 sreloc = NULL;
4561 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4562 rel_end = relocs + sec->reloc_count;
4563 for (rel = relocs; rel < rel_end; rel++)
4564 {
4565 unsigned long r_symndx;
4566 struct elf_link_hash_entry *h;
4567 enum elf_ppc64_reloc_type r_type;
4568 int tls_type;
4569 struct _ppc64_elf_section_data *ppc64_sec;
4570 struct plt_entry **ifunc, **plt_list;
4571
4572 r_symndx = ELF64_R_SYM (rel->r_info);
4573 if (r_symndx < symtab_hdr->sh_info)
4574 h = NULL;
4575 else
4576 {
4577 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4578 h = elf_follow_link (h);
4579
4580 if (h == htab->elf.hgot)
4581 sec->has_toc_reloc = 1;
4582 }
4583
4584 r_type = ELF64_R_TYPE (rel->r_info);
4585 switch (r_type)
4586 {
4587 case R_PPC64_D34:
4588 case R_PPC64_D34_LO:
4589 case R_PPC64_D34_HI30:
4590 case R_PPC64_D34_HA30:
4591 case R_PPC64_D28:
4592 case R_PPC64_TPREL34:
4593 case R_PPC64_DTPREL34:
4594 case R_PPC64_PCREL34:
4595 case R_PPC64_GOT_PCREL34:
4596 case R_PPC64_GOT_TLSGD34:
4597 case R_PPC64_GOT_TLSLD34:
4598 case R_PPC64_GOT_TPREL34:
4599 case R_PPC64_GOT_DTPREL34:
4600 case R_PPC64_PLT_PCREL34:
4601 case R_PPC64_PLT_PCREL34_NOTOC:
4602 case R_PPC64_PCREL28:
4603 htab->power10_stubs = 1;
4604 break;
4605 default:
4606 break;
4607 }
4608
4609 switch (r_type)
4610 {
4611 case R_PPC64_PLT16_HA:
4612 case R_PPC64_GOT_TLSLD16_HA:
4613 case R_PPC64_GOT_TLSGD16_HA:
4614 case R_PPC64_GOT_TPREL16_HA:
4615 case R_PPC64_GOT_DTPREL16_HA:
4616 case R_PPC64_GOT16_HA:
4617 case R_PPC64_TOC16_HA:
4618 case R_PPC64_PLT16_LO:
4619 case R_PPC64_PLT16_LO_DS:
4620 case R_PPC64_GOT_TLSLD16_LO:
4621 case R_PPC64_GOT_TLSGD16_LO:
4622 case R_PPC64_GOT_TPREL16_LO_DS:
4623 case R_PPC64_GOT_DTPREL16_LO_DS:
4624 case R_PPC64_GOT16_LO:
4625 case R_PPC64_GOT16_LO_DS:
4626 case R_PPC64_TOC16_LO:
4627 case R_PPC64_TOC16_LO_DS:
4628 case R_PPC64_GOT_PCREL34:
4629 ppc64_elf_tdata (abfd)->has_optrel = 1;
4630 ppc64_elf_section_data (sec)->has_optrel = 1;
4631 break;
4632 default:
4633 break;
4634 }
4635
4636 ifunc = NULL;
4637 if (h != NULL)
4638 {
4639 if (h->type == STT_GNU_IFUNC)
4640 {
4641 h->needs_plt = 1;
4642 ifunc = &h->plt.plist;
4643 }
4644 }
4645 else
4646 {
4647 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4648 abfd, r_symndx);
4649 if (isym == NULL)
4650 return FALSE;
4651
4652 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4653 {
4654 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4655 rel->r_addend,
4656 NON_GOT | PLT_IFUNC);
4657 if (ifunc == NULL)
4658 return FALSE;
4659 }
4660 }
4661
4662 tls_type = 0;
4663 switch (r_type)
4664 {
4665 case R_PPC64_TLSGD:
4666 case R_PPC64_TLSLD:
4667 /* These special tls relocs tie a call to __tls_get_addr with
4668 its parameter symbol. */
4669 if (h != NULL)
4670 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4671 else
4672 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4673 rel->r_addend,
4674 NON_GOT | TLS_TLS | TLS_MARK))
4675 return FALSE;
4676 sec->has_tls_reloc = 1;
4677 break;
4678
4679 case R_PPC64_GOT_TLSLD16:
4680 case R_PPC64_GOT_TLSLD16_LO:
4681 case R_PPC64_GOT_TLSLD16_HI:
4682 case R_PPC64_GOT_TLSLD16_HA:
4683 case R_PPC64_GOT_TLSLD34:
4684 tls_type = TLS_TLS | TLS_LD;
4685 goto dogottls;
4686
4687 case R_PPC64_GOT_TLSGD16:
4688 case R_PPC64_GOT_TLSGD16_LO:
4689 case R_PPC64_GOT_TLSGD16_HI:
4690 case R_PPC64_GOT_TLSGD16_HA:
4691 case R_PPC64_GOT_TLSGD34:
4692 tls_type = TLS_TLS | TLS_GD;
4693 goto dogottls;
4694
4695 case R_PPC64_GOT_TPREL16_DS:
4696 case R_PPC64_GOT_TPREL16_LO_DS:
4697 case R_PPC64_GOT_TPREL16_HI:
4698 case R_PPC64_GOT_TPREL16_HA:
4699 case R_PPC64_GOT_TPREL34:
4700 if (bfd_link_dll (info))
4701 info->flags |= DF_STATIC_TLS;
4702 tls_type = TLS_TLS | TLS_TPREL;
4703 goto dogottls;
4704
4705 case R_PPC64_GOT_DTPREL16_DS:
4706 case R_PPC64_GOT_DTPREL16_LO_DS:
4707 case R_PPC64_GOT_DTPREL16_HI:
4708 case R_PPC64_GOT_DTPREL16_HA:
4709 case R_PPC64_GOT_DTPREL34:
4710 tls_type = TLS_TLS | TLS_DTPREL;
4711 dogottls:
4712 sec->has_tls_reloc = 1;
4713 goto dogot;
4714
4715 case R_PPC64_GOT16:
4716 case R_PPC64_GOT16_LO:
4717 case R_PPC64_GOT16_HI:
4718 case R_PPC64_GOT16_HA:
4719 case R_PPC64_GOT16_DS:
4720 case R_PPC64_GOT16_LO_DS:
4721 case R_PPC64_GOT_PCREL34:
4722 dogot:
4723 /* This symbol requires a global offset table entry. */
4724 sec->has_toc_reloc = 1;
4725 if (r_type == R_PPC64_GOT_TLSLD16
4726 || r_type == R_PPC64_GOT_TLSGD16
4727 || r_type == R_PPC64_GOT_TPREL16_DS
4728 || r_type == R_PPC64_GOT_DTPREL16_DS
4729 || r_type == R_PPC64_GOT16
4730 || r_type == R_PPC64_GOT16_DS)
4731 {
4732 htab->do_multi_toc = 1;
4733 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4734 }
4735
4736 if (ppc64_elf_tdata (abfd)->got == NULL
4737 && !create_got_section (abfd, info))
4738 return FALSE;
4739
4740 if (h != NULL)
4741 {
4742 struct ppc_link_hash_entry *eh;
4743 struct got_entry *ent;
4744
4745 eh = ppc_elf_hash_entry (h);
4746 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4747 if (ent->addend == rel->r_addend
4748 && ent->owner == abfd
4749 && ent->tls_type == tls_type)
4750 break;
4751 if (ent == NULL)
4752 {
4753 size_t amt = sizeof (*ent);
4754 ent = bfd_alloc (abfd, amt);
4755 if (ent == NULL)
4756 return FALSE;
4757 ent->next = eh->elf.got.glist;
4758 ent->addend = rel->r_addend;
4759 ent->owner = abfd;
4760 ent->tls_type = tls_type;
4761 ent->is_indirect = FALSE;
4762 ent->got.refcount = 0;
4763 eh->elf.got.glist = ent;
4764 }
4765 ent->got.refcount += 1;
4766 eh->tls_mask |= tls_type;
4767 }
4768 else
4769 /* This is a global offset table entry for a local symbol. */
4770 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4771 rel->r_addend, tls_type))
4772 return FALSE;
4773 break;
4774
4775 case R_PPC64_PLT16_HA:
4776 case R_PPC64_PLT16_HI:
4777 case R_PPC64_PLT16_LO:
4778 case R_PPC64_PLT16_LO_DS:
4779 case R_PPC64_PLT_PCREL34:
4780 case R_PPC64_PLT_PCREL34_NOTOC:
4781 case R_PPC64_PLT32:
4782 case R_PPC64_PLT64:
4783 /* This symbol requires a procedure linkage table entry. */
4784 plt_list = ifunc;
4785 if (h != NULL)
4786 {
4787 h->needs_plt = 1;
4788 if (h->root.root.string[0] == '.'
4789 && h->root.root.string[1] != '\0')
4790 ppc_elf_hash_entry (h)->is_func = 1;
4791 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
4792 plt_list = &h->plt.plist;
4793 }
4794 if (plt_list == NULL)
4795 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4796 rel->r_addend,
4797 NON_GOT | PLT_KEEP);
4798 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4799 return FALSE;
4800 break;
4801
4802 /* The following relocations don't need to propagate the
4803 relocation if linking a shared object since they are
4804 section relative. */
4805 case R_PPC64_SECTOFF:
4806 case R_PPC64_SECTOFF_LO:
4807 case R_PPC64_SECTOFF_HI:
4808 case R_PPC64_SECTOFF_HA:
4809 case R_PPC64_SECTOFF_DS:
4810 case R_PPC64_SECTOFF_LO_DS:
4811 case R_PPC64_DTPREL16:
4812 case R_PPC64_DTPREL16_LO:
4813 case R_PPC64_DTPREL16_HI:
4814 case R_PPC64_DTPREL16_HA:
4815 case R_PPC64_DTPREL16_DS:
4816 case R_PPC64_DTPREL16_LO_DS:
4817 case R_PPC64_DTPREL16_HIGH:
4818 case R_PPC64_DTPREL16_HIGHA:
4819 case R_PPC64_DTPREL16_HIGHER:
4820 case R_PPC64_DTPREL16_HIGHERA:
4821 case R_PPC64_DTPREL16_HIGHEST:
4822 case R_PPC64_DTPREL16_HIGHESTA:
4823 break;
4824
4825 /* Nor do these. */
4826 case R_PPC64_REL16:
4827 case R_PPC64_REL16_LO:
4828 case R_PPC64_REL16_HI:
4829 case R_PPC64_REL16_HA:
4830 case R_PPC64_REL16_HIGH:
4831 case R_PPC64_REL16_HIGHA:
4832 case R_PPC64_REL16_HIGHER:
4833 case R_PPC64_REL16_HIGHERA:
4834 case R_PPC64_REL16_HIGHEST:
4835 case R_PPC64_REL16_HIGHESTA:
4836 case R_PPC64_REL16_HIGHER34:
4837 case R_PPC64_REL16_HIGHERA34:
4838 case R_PPC64_REL16_HIGHEST34:
4839 case R_PPC64_REL16_HIGHESTA34:
4840 case R_PPC64_REL16DX_HA:
4841 break;
4842
4843 /* Not supported as a dynamic relocation. */
4844 case R_PPC64_ADDR64_LOCAL:
4845 if (bfd_link_pic (info))
4846 {
4847 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4848 ppc_howto_init ();
4849 /* xgettext:c-format */
4850 info->callbacks->einfo (_("%H: %s reloc unsupported "
4851 "in shared libraries and PIEs\n"),
4852 abfd, sec, rel->r_offset,
4853 ppc64_elf_howto_table[r_type]->name);
4854 bfd_set_error (bfd_error_bad_value);
4855 return FALSE;
4856 }
4857 break;
4858
4859 case R_PPC64_TOC16:
4860 case R_PPC64_TOC16_DS:
4861 htab->do_multi_toc = 1;
4862 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4863 /* Fall through. */
4864 case R_PPC64_TOC16_LO:
4865 case R_PPC64_TOC16_HI:
4866 case R_PPC64_TOC16_HA:
4867 case R_PPC64_TOC16_LO_DS:
4868 sec->has_toc_reloc = 1;
4869 if (h != NULL && bfd_link_executable (info))
4870 {
4871 /* We may need a copy reloc. */
4872 h->non_got_ref = 1;
4873 /* Strongly prefer a copy reloc over a dynamic reloc.
4874 glibc ld.so as of 2019-08 will error out if one of
4875 these relocations is emitted. */
4876 h->needs_copy = 1;
4877 goto dodyn;
4878 }
4879 break;
4880
4881 /* Marker reloc. */
4882 case R_PPC64_ENTRY:
4883 break;
4884
4885 /* This relocation describes the C++ object vtable hierarchy.
4886 Reconstruct it for later use during GC. */
4887 case R_PPC64_GNU_VTINHERIT:
4888 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4889 return FALSE;
4890 break;
4891
4892 /* This relocation describes which C++ vtable entries are actually
4893 used. Record for later use during GC. */
4894 case R_PPC64_GNU_VTENTRY:
4895 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4896 return FALSE;
4897 break;
4898
4899 case R_PPC64_REL14:
4900 case R_PPC64_REL14_BRTAKEN:
4901 case R_PPC64_REL14_BRNTAKEN:
4902 {
4903 asection *dest = NULL;
4904
4905 /* Heuristic: If jumping outside our section, chances are
4906 we are going to need a stub. */
4907 if (h != NULL)
4908 {
4909 /* If the sym is weak it may be overridden later, so
4910 don't assume we know where a weak sym lives. */
4911 if (h->root.type == bfd_link_hash_defined)
4912 dest = h->root.u.def.section;
4913 }
4914 else
4915 {
4916 Elf_Internal_Sym *isym;
4917
4918 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4919 abfd, r_symndx);
4920 if (isym == NULL)
4921 return FALSE;
4922
4923 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4924 }
4925
4926 if (dest != sec)
4927 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4928 }
4929 goto rel24;
4930
4931 case R_PPC64_PLTCALL:
4932 case R_PPC64_PLTCALL_NOTOC:
4933 ppc64_elf_section_data (sec)->has_pltcall = 1;
4934 /* Fall through. */
4935
4936 case R_PPC64_REL24:
4937 case R_PPC64_REL24_NOTOC:
4938 rel24:
4939 plt_list = ifunc;
4940 if (h != NULL)
4941 {
4942 h->needs_plt = 1;
4943 if (h->root.root.string[0] == '.'
4944 && h->root.root.string[1] != '\0')
4945 ppc_elf_hash_entry (h)->is_func = 1;
4946
4947 if (h == tga || h == dottga)
4948 {
4949 sec->has_tls_reloc = 1;
4950 if (rel != relocs
4951 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4952 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4953 /* We have a new-style __tls_get_addr call with
4954 a marker reloc. */
4955 ;
4956 else
4957 /* Mark this section as having an old-style call. */
4958 sec->nomark_tls_get_addr = 1;
4959 }
4960 plt_list = &h->plt.plist;
4961 }
4962
4963 /* We may need a .plt entry if the function this reloc
4964 refers to is in a shared lib. */
4965 if (plt_list
4966 && !update_plt_info (abfd, plt_list, rel->r_addend))
4967 return FALSE;
4968 break;
4969
4970 case R_PPC64_ADDR14:
4971 case R_PPC64_ADDR14_BRNTAKEN:
4972 case R_PPC64_ADDR14_BRTAKEN:
4973 case R_PPC64_ADDR24:
4974 goto dodyn;
4975
4976 case R_PPC64_TPREL64:
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4978 if (bfd_link_dll (info))
4979 info->flags |= DF_STATIC_TLS;
4980 goto dotlstoc;
4981
4982 case R_PPC64_DTPMOD64:
4983 if (rel + 1 < rel_end
4984 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4985 && rel[1].r_offset == rel->r_offset + 8)
4986 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4987 else
4988 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4989 goto dotlstoc;
4990
4991 case R_PPC64_DTPREL64:
4992 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4993 if (rel != relocs
4994 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4995 && rel[-1].r_offset == rel->r_offset - 8)
4996 /* This is the second reloc of a dtpmod, dtprel pair.
4997 Don't mark with TLS_DTPREL. */
4998 goto dodyn;
4999
5000 dotlstoc:
5001 sec->has_tls_reloc = 1;
5002 if (h != NULL)
5003 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
5004 else
5005 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5006 rel->r_addend, tls_type))
5007 return FALSE;
5008
5009 ppc64_sec = ppc64_elf_section_data (sec);
5010 if (ppc64_sec->sec_type != sec_toc)
5011 {
5012 bfd_size_type amt;
5013
5014 /* One extra to simplify get_tls_mask. */
5015 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5016 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5017 if (ppc64_sec->u.toc.symndx == NULL)
5018 return FALSE;
5019 amt = sec->size * sizeof (bfd_vma) / 8;
5020 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5021 if (ppc64_sec->u.toc.add == NULL)
5022 return FALSE;
5023 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5024 ppc64_sec->sec_type = sec_toc;
5025 }
5026 BFD_ASSERT (rel->r_offset % 8 == 0);
5027 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5028 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5029
5030 /* Mark the second slot of a GD or LD entry.
5031 -1 to indicate GD and -2 to indicate LD. */
5032 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5033 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5034 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5035 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5036 goto dodyn;
5037
5038 case R_PPC64_TPREL16:
5039 case R_PPC64_TPREL16_LO:
5040 case R_PPC64_TPREL16_HI:
5041 case R_PPC64_TPREL16_HA:
5042 case R_PPC64_TPREL16_DS:
5043 case R_PPC64_TPREL16_LO_DS:
5044 case R_PPC64_TPREL16_HIGH:
5045 case R_PPC64_TPREL16_HIGHA:
5046 case R_PPC64_TPREL16_HIGHER:
5047 case R_PPC64_TPREL16_HIGHERA:
5048 case R_PPC64_TPREL16_HIGHEST:
5049 case R_PPC64_TPREL16_HIGHESTA:
5050 case R_PPC64_TPREL34:
5051 if (bfd_link_dll (info))
5052 info->flags |= DF_STATIC_TLS;
5053 goto dodyn;
5054
5055 case R_PPC64_ADDR64:
5056 if (is_opd
5057 && rel + 1 < rel_end
5058 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5059 {
5060 if (h != NULL)
5061 ppc_elf_hash_entry (h)->is_func = 1;
5062 }
5063 /* Fall through. */
5064
5065 case R_PPC64_ADDR16:
5066 case R_PPC64_ADDR16_DS:
5067 case R_PPC64_ADDR16_HA:
5068 case R_PPC64_ADDR16_HI:
5069 case R_PPC64_ADDR16_HIGH:
5070 case R_PPC64_ADDR16_HIGHA:
5071 case R_PPC64_ADDR16_HIGHER:
5072 case R_PPC64_ADDR16_HIGHERA:
5073 case R_PPC64_ADDR16_HIGHEST:
5074 case R_PPC64_ADDR16_HIGHESTA:
5075 case R_PPC64_ADDR16_LO:
5076 case R_PPC64_ADDR16_LO_DS:
5077 case R_PPC64_D34:
5078 case R_PPC64_D34_LO:
5079 case R_PPC64_D34_HI30:
5080 case R_PPC64_D34_HA30:
5081 case R_PPC64_ADDR16_HIGHER34:
5082 case R_PPC64_ADDR16_HIGHERA34:
5083 case R_PPC64_ADDR16_HIGHEST34:
5084 case R_PPC64_ADDR16_HIGHESTA34:
5085 case R_PPC64_D28:
5086 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5087 && rel->r_addend == 0)
5088 {
5089 /* We may need a .plt entry if this reloc refers to a
5090 function in a shared lib. */
5091 if (!update_plt_info (abfd, &h->plt.plist, 0))
5092 return FALSE;
5093 h->pointer_equality_needed = 1;
5094 }
5095 /* Fall through. */
5096
5097 case R_PPC64_REL30:
5098 case R_PPC64_REL32:
5099 case R_PPC64_REL64:
5100 case R_PPC64_ADDR32:
5101 case R_PPC64_UADDR16:
5102 case R_PPC64_UADDR32:
5103 case R_PPC64_UADDR64:
5104 case R_PPC64_TOC:
5105 if (h != NULL && bfd_link_executable (info))
5106 /* We may need a copy reloc. */
5107 h->non_got_ref = 1;
5108
5109 /* Don't propagate .opd relocs. */
5110 if (NO_OPD_RELOCS && is_opd)
5111 break;
5112
5113 /* If we are creating a shared library, and this is a reloc
5114 against a global symbol, or a non PC relative reloc
5115 against a local symbol, then we need to copy the reloc
5116 into the shared library. However, if we are linking with
5117 -Bsymbolic, we do not need to copy a reloc against a
5118 global symbol which is defined in an object we are
5119 including in the link (i.e., DEF_REGULAR is set). At
5120 this point we have not seen all the input files, so it is
5121 possible that DEF_REGULAR is not set now but will be set
5122 later (it is never cleared). In case of a weak definition,
5123 DEF_REGULAR may be cleared later by a strong definition in
5124 a shared library. We account for that possibility below by
5125 storing information in the dyn_relocs field of the hash
5126 table entry. A similar situation occurs when creating
5127 shared libraries and symbol visibility changes render the
5128 symbol local.
5129
5130 If on the other hand, we are creating an executable, we
5131 may need to keep relocations for symbols satisfied by a
5132 dynamic library if we manage to avoid copy relocs for the
5133 symbol. */
5134 dodyn:
5135 if ((h != NULL
5136 && (h->root.type == bfd_link_hash_defweak
5137 || !h->def_regular))
5138 || (h != NULL
5139 && !bfd_link_executable (info)
5140 && !SYMBOLIC_BIND (info, h))
5141 || (bfd_link_pic (info)
5142 && must_be_dyn_reloc (info, r_type))
5143 || (!bfd_link_pic (info)
5144 && ifunc != NULL))
5145 {
5146 /* We must copy these reloc types into the output file.
5147 Create a reloc section in dynobj and make room for
5148 this reloc. */
5149 if (sreloc == NULL)
5150 {
5151 sreloc = _bfd_elf_make_dynamic_reloc_section
5152 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5153
5154 if (sreloc == NULL)
5155 return FALSE;
5156 }
5157
5158 /* If this is a global symbol, we count the number of
5159 relocations we need for this symbol. */
5160 if (h != NULL)
5161 {
5162 struct elf_dyn_relocs *p;
5163 struct elf_dyn_relocs **head;
5164
5165 head = &h->dyn_relocs;
5166 p = *head;
5167 if (p == NULL || p->sec != sec)
5168 {
5169 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5170 if (p == NULL)
5171 return FALSE;
5172 p->next = *head;
5173 *head = p;
5174 p->sec = sec;
5175 p->count = 0;
5176 p->pc_count = 0;
5177 }
5178 p->count += 1;
5179 if (!must_be_dyn_reloc (info, r_type))
5180 p->pc_count += 1;
5181 }
5182 else
5183 {
5184 /* Track dynamic relocs needed for local syms too.
5185 We really need local syms available to do this
5186 easily. Oh well. */
5187 struct ppc_dyn_relocs *p;
5188 struct ppc_dyn_relocs **head;
5189 bfd_boolean is_ifunc;
5190 asection *s;
5191 void *vpp;
5192 Elf_Internal_Sym *isym;
5193
5194 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5195 abfd, r_symndx);
5196 if (isym == NULL)
5197 return FALSE;
5198
5199 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5200 if (s == NULL)
5201 s = sec;
5202
5203 vpp = &elf_section_data (s)->local_dynrel;
5204 head = (struct ppc_dyn_relocs **) vpp;
5205 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5206 p = *head;
5207 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5208 p = p->next;
5209 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5210 {
5211 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5212 if (p == NULL)
5213 return FALSE;
5214 p->next = *head;
5215 *head = p;
5216 p->sec = sec;
5217 p->ifunc = is_ifunc;
5218 p->count = 0;
5219 }
5220 p->count += 1;
5221 }
5222 }
5223 break;
5224
5225 default:
5226 break;
5227 }
5228 }
5229
5230 return TRUE;
5231 }
5232
5233 /* Merge backend specific data from an object file to the output
5234 object file when linking. */
5235
5236 static bfd_boolean
5237 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5238 {
5239 bfd *obfd = info->output_bfd;
5240 unsigned long iflags, oflags;
5241
5242 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5243 return TRUE;
5244
5245 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5246 return TRUE;
5247
5248 if (!_bfd_generic_verify_endian_match (ibfd, info))
5249 return FALSE;
5250
5251 iflags = elf_elfheader (ibfd)->e_flags;
5252 oflags = elf_elfheader (obfd)->e_flags;
5253
5254 if (iflags & ~EF_PPC64_ABI)
5255 {
5256 _bfd_error_handler
5257 /* xgettext:c-format */
5258 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5259 bfd_set_error (bfd_error_bad_value);
5260 return FALSE;
5261 }
5262 else if (iflags != oflags && iflags != 0)
5263 {
5264 _bfd_error_handler
5265 /* xgettext:c-format */
5266 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5267 ibfd, iflags, oflags);
5268 bfd_set_error (bfd_error_bad_value);
5269 return FALSE;
5270 }
5271
5272 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5273 return FALSE;
5274
5275 /* Merge Tag_compatibility attributes and any common GNU ones. */
5276 return _bfd_elf_merge_object_attributes (ibfd, info);
5277 }
5278
5279 static bfd_boolean
5280 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5281 {
5282 /* Print normal ELF private data. */
5283 _bfd_elf_print_private_bfd_data (abfd, ptr);
5284
5285 if (elf_elfheader (abfd)->e_flags != 0)
5286 {
5287 FILE *file = ptr;
5288
5289 fprintf (file, _("private flags = 0x%lx:"),
5290 elf_elfheader (abfd)->e_flags);
5291
5292 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5293 fprintf (file, _(" [abiv%ld]"),
5294 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5295 fputc ('\n', file);
5296 }
5297
5298 return TRUE;
5299 }
5300
5301 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5302 of the code entry point, and its section, which must be in the same
5303 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5304
5305 static bfd_vma
5306 opd_entry_value (asection *opd_sec,
5307 bfd_vma offset,
5308 asection **code_sec,
5309 bfd_vma *code_off,
5310 bfd_boolean in_code_sec)
5311 {
5312 bfd *opd_bfd = opd_sec->owner;
5313 Elf_Internal_Rela *relocs;
5314 Elf_Internal_Rela *lo, *hi, *look;
5315 bfd_vma val;
5316
5317 /* No relocs implies we are linking a --just-symbols object, or looking
5318 at a final linked executable with addr2line or somesuch. */
5319 if (opd_sec->reloc_count == 0)
5320 {
5321 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5322
5323 if (contents == NULL)
5324 {
5325 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5326 return (bfd_vma) -1;
5327 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5328 }
5329
5330 /* PR 17512: file: 64b9dfbb. */
5331 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5332 return (bfd_vma) -1;
5333
5334 val = bfd_get_64 (opd_bfd, contents + offset);
5335 if (code_sec != NULL)
5336 {
5337 asection *sec, *likely = NULL;
5338
5339 if (in_code_sec)
5340 {
5341 sec = *code_sec;
5342 if (sec->vma <= val
5343 && val < sec->vma + sec->size)
5344 likely = sec;
5345 else
5346 val = -1;
5347 }
5348 else
5349 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5350 if (sec->vma <= val
5351 && (sec->flags & SEC_LOAD) != 0
5352 && (sec->flags & SEC_ALLOC) != 0)
5353 likely = sec;
5354 if (likely != NULL)
5355 {
5356 *code_sec = likely;
5357 if (code_off != NULL)
5358 *code_off = val - likely->vma;
5359 }
5360 }
5361 return val;
5362 }
5363
5364 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5365
5366 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5367 if (relocs == NULL)
5368 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5369 /* PR 17512: file: df8e1fd6. */
5370 if (relocs == NULL)
5371 return (bfd_vma) -1;
5372
5373 /* Go find the opd reloc at the sym address. */
5374 lo = relocs;
5375 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5376 val = (bfd_vma) -1;
5377 while (lo < hi)
5378 {
5379 look = lo + (hi - lo) / 2;
5380 if (look->r_offset < offset)
5381 lo = look + 1;
5382 else if (look->r_offset > offset)
5383 hi = look;
5384 else
5385 {
5386 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5387
5388 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5389 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5390 {
5391 unsigned long symndx = ELF64_R_SYM (look->r_info);
5392 asection *sec = NULL;
5393
5394 if (symndx >= symtab_hdr->sh_info
5395 && elf_sym_hashes (opd_bfd) != NULL)
5396 {
5397 struct elf_link_hash_entry **sym_hashes;
5398 struct elf_link_hash_entry *rh;
5399
5400 sym_hashes = elf_sym_hashes (opd_bfd);
5401 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5402 if (rh != NULL)
5403 {
5404 rh = elf_follow_link (rh);
5405 if (rh->root.type != bfd_link_hash_defined
5406 && rh->root.type != bfd_link_hash_defweak)
5407 break;
5408 if (rh->root.u.def.section->owner == opd_bfd)
5409 {
5410 val = rh->root.u.def.value;
5411 sec = rh->root.u.def.section;
5412 }
5413 }
5414 }
5415
5416 if (sec == NULL)
5417 {
5418 Elf_Internal_Sym *sym;
5419
5420 if (symndx < symtab_hdr->sh_info)
5421 {
5422 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5423 if (sym == NULL)
5424 {
5425 size_t symcnt = symtab_hdr->sh_info;
5426 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5427 symcnt, 0,
5428 NULL, NULL, NULL);
5429 if (sym == NULL)
5430 break;
5431 symtab_hdr->contents = (bfd_byte *) sym;
5432 }
5433 sym += symndx;
5434 }
5435 else
5436 {
5437 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5438 1, symndx,
5439 NULL, NULL, NULL);
5440 if (sym == NULL)
5441 break;
5442 }
5443 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5444 if (sec == NULL)
5445 break;
5446 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5447 val = sym->st_value;
5448 }
5449
5450 val += look->r_addend;
5451 if (code_off != NULL)
5452 *code_off = val;
5453 if (code_sec != NULL)
5454 {
5455 if (in_code_sec && *code_sec != sec)
5456 return -1;
5457 else
5458 *code_sec = sec;
5459 }
5460 if (sec->output_section != NULL)
5461 val += sec->output_section->vma + sec->output_offset;
5462 }
5463 break;
5464 }
5465 }
5466
5467 return val;
5468 }
5469
5470 /* If the ELF symbol SYM might be a function in SEC, return the
5471 function size and set *CODE_OFF to the function's entry point,
5472 otherwise return zero. */
5473
5474 static bfd_size_type
5475 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5476 bfd_vma *code_off)
5477 {
5478 bfd_size_type size;
5479
5480 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5481 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5482 return 0;
5483
5484 size = 0;
5485 if (!(sym->flags & BSF_SYNTHETIC))
5486 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5487
5488 if (strcmp (sym->section->name, ".opd") == 0)
5489 {
5490 struct _opd_sec_data *opd = get_opd_info (sym->section);
5491 bfd_vma symval = sym->value;
5492
5493 if (opd != NULL
5494 && opd->adjust != NULL
5495 && elf_section_data (sym->section)->relocs != NULL)
5496 {
5497 /* opd_entry_value will use cached relocs that have been
5498 adjusted, but with raw symbols. That means both local
5499 and global symbols need adjusting. */
5500 long adjust = opd->adjust[OPD_NDX (symval)];
5501 if (adjust == -1)
5502 return 0;
5503 symval += adjust;
5504 }
5505
5506 if (opd_entry_value (sym->section, symval,
5507 &sec, code_off, TRUE) == (bfd_vma) -1)
5508 return 0;
5509 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5510 symbol. This size has nothing to do with the code size of the
5511 function, which is what we're supposed to return, but the
5512 code size isn't available without looking up the dot-sym.
5513 However, doing that would be a waste of time particularly
5514 since elf_find_function will look at the dot-sym anyway.
5515 Now, elf_find_function will keep the largest size of any
5516 function sym found at the code address of interest, so return
5517 1 here to avoid it incorrectly caching a larger function size
5518 for a small function. This does mean we return the wrong
5519 size for a new-ABI function of size 24, but all that does is
5520 disable caching for such functions. */
5521 if (size == 24)
5522 size = 1;
5523 }
5524 else
5525 {
5526 if (sym->section != sec)
5527 return 0;
5528 *code_off = sym->value;
5529 }
5530 if (size == 0)
5531 size = 1;
5532 return size;
5533 }
5534
5535 /* Return true if symbol is a strong function defined in an ELFv2
5536 object with st_other localentry bits of zero, ie. its local entry
5537 point coincides with its global entry point. */
5538
5539 static bfd_boolean
5540 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5541 {
5542 return (h != NULL
5543 && h->type == STT_FUNC
5544 && h->root.type == bfd_link_hash_defined
5545 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5546 && !ppc_elf_hash_entry (h)->non_zero_localentry
5547 && is_ppc64_elf (h->root.u.def.section->owner)
5548 && abiversion (h->root.u.def.section->owner) >= 2);
5549 }
5550
5551 /* Return true if symbol is defined in a regular object file. */
5552
5553 static bfd_boolean
5554 is_static_defined (struct elf_link_hash_entry *h)
5555 {
5556 return ((h->root.type == bfd_link_hash_defined
5557 || h->root.type == bfd_link_hash_defweak)
5558 && h->root.u.def.section != NULL
5559 && h->root.u.def.section->output_section != NULL);
5560 }
5561
5562 /* If FDH is a function descriptor symbol, return the associated code
5563 entry symbol if it is defined. Return NULL otherwise. */
5564
5565 static struct ppc_link_hash_entry *
5566 defined_code_entry (struct ppc_link_hash_entry *fdh)
5567 {
5568 if (fdh->is_func_descriptor)
5569 {
5570 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5571 if (fh->elf.root.type == bfd_link_hash_defined
5572 || fh->elf.root.type == bfd_link_hash_defweak)
5573 return fh;
5574 }
5575 return NULL;
5576 }
5577
5578 /* If FH is a function code entry symbol, return the associated
5579 function descriptor symbol if it is defined. Return NULL otherwise. */
5580
5581 static struct ppc_link_hash_entry *
5582 defined_func_desc (struct ppc_link_hash_entry *fh)
5583 {
5584 if (fh->oh != NULL
5585 && fh->oh->is_func_descriptor)
5586 {
5587 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5588 if (fdh->elf.root.type == bfd_link_hash_defined
5589 || fdh->elf.root.type == bfd_link_hash_defweak)
5590 return fdh;
5591 }
5592 return NULL;
5593 }
5594
5595 /* Given H is a symbol that satisfies is_static_defined, return the
5596 value in the output file. */
5597
5598 static bfd_vma
5599 defined_sym_val (struct elf_link_hash_entry *h)
5600 {
5601 return (h->root.u.def.section->output_section->vma
5602 + h->root.u.def.section->output_offset
5603 + h->root.u.def.value);
5604 }
5605
5606 /* Return true if H matches __tls_get_addr or one of its variants. */
5607
5608 static bfd_boolean
5609 is_tls_get_addr (struct elf_link_hash_entry *h,
5610 struct ppc_link_hash_table *htab)
5611 {
5612 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5613 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
5614 }
5615
5616 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5617
5618 /* Garbage collect sections, after first dealing with dot-symbols. */
5619
5620 static bfd_boolean
5621 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5622 {
5623 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5624
5625 if (htab != NULL && htab->need_func_desc_adj)
5626 {
5627 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5628 htab->need_func_desc_adj = 0;
5629 }
5630 return bfd_elf_gc_sections (abfd, info);
5631 }
5632
5633 /* Mark all our entry sym sections, both opd and code section. */
5634
5635 static void
5636 ppc64_elf_gc_keep (struct bfd_link_info *info)
5637 {
5638 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5639 struct bfd_sym_chain *sym;
5640
5641 if (htab == NULL)
5642 return;
5643
5644 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5645 {
5646 struct ppc_link_hash_entry *eh, *fh;
5647 asection *sec;
5648
5649 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5650 FALSE, FALSE, TRUE));
5651 if (eh == NULL)
5652 continue;
5653 if (eh->elf.root.type != bfd_link_hash_defined
5654 && eh->elf.root.type != bfd_link_hash_defweak)
5655 continue;
5656
5657 fh = defined_code_entry (eh);
5658 if (fh != NULL)
5659 {
5660 sec = fh->elf.root.u.def.section;
5661 sec->flags |= SEC_KEEP;
5662 }
5663 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5664 && opd_entry_value (eh->elf.root.u.def.section,
5665 eh->elf.root.u.def.value,
5666 &sec, NULL, FALSE) != (bfd_vma) -1)
5667 sec->flags |= SEC_KEEP;
5668
5669 sec = eh->elf.root.u.def.section;
5670 sec->flags |= SEC_KEEP;
5671 }
5672 }
5673
5674 /* Mark sections containing dynamically referenced symbols. When
5675 building shared libraries, we must assume that any visible symbol is
5676 referenced. */
5677
5678 static bfd_boolean
5679 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5680 {
5681 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5682 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
5683 struct ppc_link_hash_entry *fdh;
5684 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5685
5686 /* Dynamic linking info is on the func descriptor sym. */
5687 fdh = defined_func_desc (eh);
5688 if (fdh != NULL)
5689 eh = fdh;
5690
5691 if ((eh->elf.root.type == bfd_link_hash_defined
5692 || eh->elf.root.type == bfd_link_hash_defweak)
5693 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5694 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5695 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5696 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5697 && (!bfd_link_executable (info)
5698 || info->gc_keep_exported
5699 || info->export_dynamic
5700 || (eh->elf.dynamic
5701 && d != NULL
5702 && (*d->match) (&d->head, NULL,
5703 eh->elf.root.root.string)))
5704 && (eh->elf.versioned >= versioned
5705 || !bfd_hide_sym_by_version (info->version_info,
5706 eh->elf.root.root.string)))))
5707 {
5708 asection *code_sec;
5709 struct ppc_link_hash_entry *fh;
5710
5711 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5712
5713 /* Function descriptor syms cause the associated
5714 function code sym section to be marked. */
5715 fh = defined_code_entry (eh);
5716 if (fh != NULL)
5717 {
5718 code_sec = fh->elf.root.u.def.section;
5719 code_sec->flags |= SEC_KEEP;
5720 }
5721 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5722 && opd_entry_value (eh->elf.root.u.def.section,
5723 eh->elf.root.u.def.value,
5724 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5725 code_sec->flags |= SEC_KEEP;
5726 }
5727
5728 return TRUE;
5729 }
5730
5731 /* Return the section that should be marked against GC for a given
5732 relocation. */
5733
5734 static asection *
5735 ppc64_elf_gc_mark_hook (asection *sec,
5736 struct bfd_link_info *info,
5737 Elf_Internal_Rela *rel,
5738 struct elf_link_hash_entry *h,
5739 Elf_Internal_Sym *sym)
5740 {
5741 asection *rsec;
5742
5743 /* Syms return NULL if we're marking .opd, so we avoid marking all
5744 function sections, as all functions are referenced in .opd. */
5745 rsec = NULL;
5746 if (get_opd_info (sec) != NULL)
5747 return rsec;
5748
5749 if (h != NULL)
5750 {
5751 enum elf_ppc64_reloc_type r_type;
5752 struct ppc_link_hash_entry *eh, *fh, *fdh;
5753
5754 r_type = ELF64_R_TYPE (rel->r_info);
5755 switch (r_type)
5756 {
5757 case R_PPC64_GNU_VTINHERIT:
5758 case R_PPC64_GNU_VTENTRY:
5759 break;
5760
5761 default:
5762 switch (h->root.type)
5763 {
5764 case bfd_link_hash_defined:
5765 case bfd_link_hash_defweak:
5766 eh = ppc_elf_hash_entry (h);
5767 fdh = defined_func_desc (eh);
5768 if (fdh != NULL)
5769 {
5770 /* -mcall-aixdesc code references the dot-symbol on
5771 a call reloc. Mark the function descriptor too
5772 against garbage collection. */
5773 fdh->elf.mark = 1;
5774 if (fdh->elf.is_weakalias)
5775 weakdef (&fdh->elf)->mark = 1;
5776 eh = fdh;
5777 }
5778
5779 /* Function descriptor syms cause the associated
5780 function code sym section to be marked. */
5781 fh = defined_code_entry (eh);
5782 if (fh != NULL)
5783 {
5784 /* They also mark their opd section. */
5785 eh->elf.root.u.def.section->gc_mark = 1;
5786
5787 rsec = fh->elf.root.u.def.section;
5788 }
5789 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5790 && opd_entry_value (eh->elf.root.u.def.section,
5791 eh->elf.root.u.def.value,
5792 &rsec, NULL, FALSE) != (bfd_vma) -1)
5793 eh->elf.root.u.def.section->gc_mark = 1;
5794 else
5795 rsec = h->root.u.def.section;
5796 break;
5797
5798 case bfd_link_hash_common:
5799 rsec = h->root.u.c.p->section;
5800 break;
5801
5802 default:
5803 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5804 }
5805 }
5806 }
5807 else
5808 {
5809 struct _opd_sec_data *opd;
5810
5811 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5812 opd = get_opd_info (rsec);
5813 if (opd != NULL && opd->func_sec != NULL)
5814 {
5815 rsec->gc_mark = 1;
5816
5817 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5818 }
5819 }
5820
5821 return rsec;
5822 }
5823
5824 /* The maximum size of .sfpr. */
5825 #define SFPR_MAX (218*4)
5826
5827 struct sfpr_def_parms
5828 {
5829 const char name[12];
5830 unsigned char lo, hi;
5831 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5832 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5833 };
5834
5835 /* Auto-generate _save*, _rest* functions in .sfpr.
5836 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5837 instead. */
5838
5839 static bfd_boolean
5840 sfpr_define (struct bfd_link_info *info,
5841 const struct sfpr_def_parms *parm,
5842 asection *stub_sec)
5843 {
5844 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5845 unsigned int i;
5846 size_t len = strlen (parm->name);
5847 bfd_boolean writing = FALSE;
5848 char sym[16];
5849
5850 if (htab == NULL)
5851 return FALSE;
5852
5853 memcpy (sym, parm->name, len);
5854 sym[len + 2] = 0;
5855
5856 for (i = parm->lo; i <= parm->hi; i++)
5857 {
5858 struct ppc_link_hash_entry *h;
5859
5860 sym[len + 0] = i / 10 + '0';
5861 sym[len + 1] = i % 10 + '0';
5862 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5863 writing, TRUE, TRUE));
5864 if (stub_sec != NULL)
5865 {
5866 if (h != NULL
5867 && h->elf.root.type == bfd_link_hash_defined
5868 && h->elf.root.u.def.section == htab->sfpr)
5869 {
5870 struct elf_link_hash_entry *s;
5871 char buf[32];
5872 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5873 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5874 if (s == NULL)
5875 return FALSE;
5876 if (s->root.type == bfd_link_hash_new)
5877 {
5878 s->root.type = bfd_link_hash_defined;
5879 s->root.u.def.section = stub_sec;
5880 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5881 + h->elf.root.u.def.value);
5882 s->ref_regular = 1;
5883 s->def_regular = 1;
5884 s->ref_regular_nonweak = 1;
5885 s->forced_local = 1;
5886 s->non_elf = 0;
5887 s->root.linker_def = 1;
5888 }
5889 }
5890 continue;
5891 }
5892 if (h != NULL)
5893 {
5894 h->save_res = 1;
5895 if (!h->elf.def_regular)
5896 {
5897 h->elf.root.type = bfd_link_hash_defined;
5898 h->elf.root.u.def.section = htab->sfpr;
5899 h->elf.root.u.def.value = htab->sfpr->size;
5900 h->elf.type = STT_FUNC;
5901 h->elf.def_regular = 1;
5902 h->elf.non_elf = 0;
5903 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5904 writing = TRUE;
5905 if (htab->sfpr->contents == NULL)
5906 {
5907 htab->sfpr->contents
5908 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5909 if (htab->sfpr->contents == NULL)
5910 return FALSE;
5911 }
5912 }
5913 }
5914 if (writing)
5915 {
5916 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5917 if (i != parm->hi)
5918 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5919 else
5920 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5921 htab->sfpr->size = p - htab->sfpr->contents;
5922 }
5923 }
5924
5925 return TRUE;
5926 }
5927
5928 static bfd_byte *
5929 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5930 {
5931 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5932 return p + 4;
5933 }
5934
5935 static bfd_byte *
5936 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5937 {
5938 p = savegpr0 (abfd, p, r);
5939 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5940 p = p + 4;
5941 bfd_put_32 (abfd, BLR, p);
5942 return p + 4;
5943 }
5944
5945 static bfd_byte *
5946 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5947 {
5948 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5949 return p + 4;
5950 }
5951
5952 static bfd_byte *
5953 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5954 {
5955 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5956 p = p + 4;
5957 p = restgpr0 (abfd, p, r);
5958 bfd_put_32 (abfd, MTLR_R0, p);
5959 p = p + 4;
5960 if (r == 29)
5961 {
5962 p = restgpr0 (abfd, p, 30);
5963 p = restgpr0 (abfd, p, 31);
5964 }
5965 bfd_put_32 (abfd, BLR, p);
5966 return p + 4;
5967 }
5968
5969 static bfd_byte *
5970 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5971 {
5972 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5973 return p + 4;
5974 }
5975
5976 static bfd_byte *
5977 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5978 {
5979 p = savegpr1 (abfd, p, r);
5980 bfd_put_32 (abfd, BLR, p);
5981 return p + 4;
5982 }
5983
5984 static bfd_byte *
5985 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5986 {
5987 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5988 return p + 4;
5989 }
5990
5991 static bfd_byte *
5992 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5993 {
5994 p = restgpr1 (abfd, p, r);
5995 bfd_put_32 (abfd, BLR, p);
5996 return p + 4;
5997 }
5998
5999 static bfd_byte *
6000 savefpr (bfd *abfd, bfd_byte *p, int r)
6001 {
6002 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6003 return p + 4;
6004 }
6005
6006 static bfd_byte *
6007 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6008 {
6009 p = savefpr (abfd, p, r);
6010 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6011 p = p + 4;
6012 bfd_put_32 (abfd, BLR, p);
6013 return p + 4;
6014 }
6015
6016 static bfd_byte *
6017 restfpr (bfd *abfd, bfd_byte *p, int r)
6018 {
6019 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6020 return p + 4;
6021 }
6022
6023 static bfd_byte *
6024 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6025 {
6026 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6027 p = p + 4;
6028 p = restfpr (abfd, p, r);
6029 bfd_put_32 (abfd, MTLR_R0, p);
6030 p = p + 4;
6031 if (r == 29)
6032 {
6033 p = restfpr (abfd, p, 30);
6034 p = restfpr (abfd, p, 31);
6035 }
6036 bfd_put_32 (abfd, BLR, p);
6037 return p + 4;
6038 }
6039
6040 static bfd_byte *
6041 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6042 {
6043 p = savefpr (abfd, p, r);
6044 bfd_put_32 (abfd, BLR, p);
6045 return p + 4;
6046 }
6047
6048 static bfd_byte *
6049 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6050 {
6051 p = restfpr (abfd, p, r);
6052 bfd_put_32 (abfd, BLR, p);
6053 return p + 4;
6054 }
6055
6056 static bfd_byte *
6057 savevr (bfd *abfd, bfd_byte *p, int r)
6058 {
6059 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6060 p = p + 4;
6061 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6062 return p + 4;
6063 }
6064
6065 static bfd_byte *
6066 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6067 {
6068 p = savevr (abfd, p, r);
6069 bfd_put_32 (abfd, BLR, p);
6070 return p + 4;
6071 }
6072
6073 static bfd_byte *
6074 restvr (bfd *abfd, bfd_byte *p, int r)
6075 {
6076 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6077 p = p + 4;
6078 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6079 return p + 4;
6080 }
6081
6082 static bfd_byte *
6083 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6084 {
6085 p = restvr (abfd, p, r);
6086 bfd_put_32 (abfd, BLR, p);
6087 return p + 4;
6088 }
6089
6090 #define STDU_R1_0R1 0xf8210001
6091 #define ADDI_R1_R1 0x38210000
6092
6093 /* Emit prologue of wrapper preserving regs around a call to
6094 __tls_get_addr_opt. */
6095
6096 static bfd_byte *
6097 tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6098 {
6099 unsigned int i;
6100
6101 bfd_put_32 (obfd, MFLR_R0, p);
6102 p += 4;
6103 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6104 p += 4;
6105
6106 if (htab->opd_abi)
6107 {
6108 for (i = 4; i < 12; i++)
6109 {
6110 bfd_put_32 (obfd,
6111 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6112 p += 4;
6113 }
6114 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6115 p += 4;
6116 }
6117 else
6118 {
6119 for (i = 4; i < 12; i++)
6120 {
6121 bfd_put_32 (obfd,
6122 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6123 p += 4;
6124 }
6125 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6126 p += 4;
6127 }
6128 return p;
6129 }
6130
6131 /* Emit epilogue of wrapper preserving regs around a call to
6132 __tls_get_addr_opt. */
6133
6134 static bfd_byte *
6135 tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6136 {
6137 unsigned int i;
6138
6139 if (htab->opd_abi)
6140 {
6141 for (i = 4; i < 12; i++)
6142 {
6143 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6144 p += 4;
6145 }
6146 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6147 p += 4;
6148 }
6149 else
6150 {
6151 for (i = 4; i < 12; i++)
6152 {
6153 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6154 p += 4;
6155 }
6156 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6157 p += 4;
6158 }
6159 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6160 p += 4;
6161 bfd_put_32 (obfd, MTLR_R0, p);
6162 p += 4;
6163 bfd_put_32 (obfd, BLR, p);
6164 p += 4;
6165 return p;
6166 }
6167
6168 /* Called via elf_link_hash_traverse to transfer dynamic linking
6169 information on function code symbol entries to their corresponding
6170 function descriptor symbol entries. */
6171
6172 static bfd_boolean
6173 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6174 {
6175 struct bfd_link_info *info;
6176 struct ppc_link_hash_table *htab;
6177 struct ppc_link_hash_entry *fh;
6178 struct ppc_link_hash_entry *fdh;
6179 bfd_boolean force_local;
6180
6181 fh = ppc_elf_hash_entry (h);
6182 if (fh->elf.root.type == bfd_link_hash_indirect)
6183 return TRUE;
6184
6185 if (!fh->is_func)
6186 return TRUE;
6187
6188 if (fh->elf.root.root.string[0] != '.'
6189 || fh->elf.root.root.string[1] == '\0')
6190 return TRUE;
6191
6192 info = inf;
6193 htab = ppc_hash_table (info);
6194 if (htab == NULL)
6195 return FALSE;
6196
6197 /* Find the corresponding function descriptor symbol. */
6198 fdh = lookup_fdh (fh, htab);
6199
6200 /* Resolve undefined references to dot-symbols as the value
6201 in the function descriptor, if we have one in a regular object.
6202 This is to satisfy cases like ".quad .foo". Calls to functions
6203 in dynamic objects are handled elsewhere. */
6204 if ((fh->elf.root.type == bfd_link_hash_undefined
6205 || fh->elf.root.type == bfd_link_hash_undefweak)
6206 && (fdh->elf.root.type == bfd_link_hash_defined
6207 || fdh->elf.root.type == bfd_link_hash_defweak)
6208 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6209 && opd_entry_value (fdh->elf.root.u.def.section,
6210 fdh->elf.root.u.def.value,
6211 &fh->elf.root.u.def.section,
6212 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6213 {
6214 fh->elf.root.type = fdh->elf.root.type;
6215 fh->elf.forced_local = 1;
6216 fh->elf.def_regular = fdh->elf.def_regular;
6217 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6218 }
6219
6220 if (!fh->elf.dynamic)
6221 {
6222 struct plt_entry *ent;
6223
6224 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6225 if (ent->plt.refcount > 0)
6226 break;
6227 if (ent == NULL)
6228 return TRUE;
6229 }
6230
6231 /* Create a descriptor as undefined if necessary. */
6232 if (fdh == NULL
6233 && !bfd_link_executable (info)
6234 && (fh->elf.root.type == bfd_link_hash_undefined
6235 || fh->elf.root.type == bfd_link_hash_undefweak))
6236 {
6237 fdh = make_fdh (info, fh);
6238 if (fdh == NULL)
6239 return FALSE;
6240 }
6241
6242 /* We can't support overriding of symbols on a fake descriptor. */
6243 if (fdh != NULL
6244 && fdh->fake
6245 && (fh->elf.root.type == bfd_link_hash_defined
6246 || fh->elf.root.type == bfd_link_hash_defweak))
6247 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6248
6249 /* Transfer dynamic linking information to the function descriptor. */
6250 if (fdh != NULL)
6251 {
6252 fdh->elf.ref_regular |= fh->elf.ref_regular;
6253 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6254 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6255 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6256 fdh->elf.dynamic |= fh->elf.dynamic;
6257 fdh->elf.needs_plt |= (fh->elf.needs_plt
6258 || fh->elf.type == STT_FUNC
6259 || fh->elf.type == STT_GNU_IFUNC);
6260 move_plt_plist (fh, fdh);
6261
6262 if (!fdh->elf.forced_local
6263 && fh->elf.dynindx != -1)
6264 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6265 return FALSE;
6266 }
6267
6268 /* Now that the info is on the function descriptor, clear the
6269 function code sym info. Any function code syms for which we
6270 don't have a definition in a regular file, we force local.
6271 This prevents a shared library from exporting syms that have
6272 been imported from another library. Function code syms that
6273 are really in the library we must leave global to prevent the
6274 linker dragging in a definition from a static library. */
6275 force_local = (!fh->elf.def_regular
6276 || fdh == NULL
6277 || !fdh->elf.def_regular
6278 || fdh->elf.forced_local);
6279 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6280
6281 return TRUE;
6282 }
6283
6284 static const struct sfpr_def_parms save_res_funcs[] =
6285 {
6286 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6287 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6288 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6289 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6290 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6291 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6292 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6293 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6294 { "._savef", 14, 31, savefpr, savefpr1_tail },
6295 { "._restf", 14, 31, restfpr, restfpr1_tail },
6296 { "_savevr_", 20, 31, savevr, savevr_tail },
6297 { "_restvr_", 20, 31, restvr, restvr_tail }
6298 };
6299
6300 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6301 this hook to a) provide some gcc support functions, and b) transfer
6302 dynamic linking information gathered so far on function code symbol
6303 entries, to their corresponding function descriptor symbol entries. */
6304
6305 static bfd_boolean
6306 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6307 struct bfd_link_info *info)
6308 {
6309 struct ppc_link_hash_table *htab;
6310
6311 htab = ppc_hash_table (info);
6312 if (htab == NULL)
6313 return FALSE;
6314
6315 /* Provide any missing _save* and _rest* functions. */
6316 if (htab->sfpr != NULL)
6317 {
6318 unsigned int i;
6319
6320 htab->sfpr->size = 0;
6321 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6322 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6323 return FALSE;
6324 if (htab->sfpr->size == 0)
6325 htab->sfpr->flags |= SEC_EXCLUDE;
6326 }
6327
6328 if (bfd_link_relocatable (info))
6329 return TRUE;
6330
6331 if (htab->elf.hgot != NULL)
6332 {
6333 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6334 /* Make .TOC. defined so as to prevent it being made dynamic.
6335 The wrong value here is fixed later in ppc64_elf_set_toc. */
6336 if (!htab->elf.hgot->def_regular
6337 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6338 {
6339 htab->elf.hgot->root.type = bfd_link_hash_defined;
6340 htab->elf.hgot->root.u.def.value = 0;
6341 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6342 htab->elf.hgot->def_regular = 1;
6343 htab->elf.hgot->root.linker_def = 1;
6344 }
6345 htab->elf.hgot->type = STT_OBJECT;
6346 htab->elf.hgot->other
6347 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6348 }
6349
6350 if (htab->need_func_desc_adj)
6351 {
6352 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6353 htab->need_func_desc_adj = 0;
6354 }
6355
6356 return TRUE;
6357 }
6358
6359 /* Return true if we have dynamic relocs against H or any of its weak
6360 aliases, that apply to read-only sections. Cannot be used after
6361 size_dynamic_sections. */
6362
6363 static bfd_boolean
6364 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6365 {
6366 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
6367 do
6368 {
6369 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
6370 return TRUE;
6371 eh = ppc_elf_hash_entry (eh->elf.u.alias);
6372 }
6373 while (eh != NULL && &eh->elf != h);
6374
6375 return FALSE;
6376 }
6377
6378 /* Return whether EH has pc-relative dynamic relocs. */
6379
6380 static bfd_boolean
6381 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6382 {
6383 struct elf_dyn_relocs *p;
6384
6385 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
6386 if (p->pc_count != 0)
6387 return TRUE;
6388 return FALSE;
6389 }
6390
6391 /* Return true if a global entry stub will be created for H. Valid
6392 for ELFv2 before plt entries have been allocated. */
6393
6394 static bfd_boolean
6395 global_entry_stub (struct elf_link_hash_entry *h)
6396 {
6397 struct plt_entry *pent;
6398
6399 if (!h->pointer_equality_needed
6400 || h->def_regular)
6401 return FALSE;
6402
6403 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6404 if (pent->plt.refcount > 0
6405 && pent->addend == 0)
6406 return TRUE;
6407
6408 return FALSE;
6409 }
6410
6411 /* Adjust a symbol defined by a dynamic object and referenced by a
6412 regular object. The current definition is in some section of the
6413 dynamic object, but we're not including those sections. We have to
6414 change the definition to something the rest of the link can
6415 understand. */
6416
6417 static bfd_boolean
6418 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6419 struct elf_link_hash_entry *h)
6420 {
6421 struct ppc_link_hash_table *htab;
6422 asection *s, *srel;
6423
6424 htab = ppc_hash_table (info);
6425 if (htab == NULL)
6426 return FALSE;
6427
6428 /* Deal with function syms. */
6429 if (h->type == STT_FUNC
6430 || h->type == STT_GNU_IFUNC
6431 || h->needs_plt)
6432 {
6433 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
6434 || SYMBOL_CALLS_LOCAL (info, h)
6435 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6436 /* Discard dyn_relocs when non-pic if we've decided that a
6437 function symbol is local and not an ifunc. We keep dynamic
6438 relocs for ifuncs when local rather than always emitting a
6439 plt call stub for them and defining the symbol on the call
6440 stub. We can't do that for ELFv1 anyway (a function symbol
6441 is defined on a descriptor, not code) and it can be faster at
6442 run-time due to not needing to bounce through a stub. The
6443 dyn_relocs for ifuncs will be applied even in a static
6444 executable. */
6445 if (!bfd_link_pic (info)
6446 && h->type != STT_GNU_IFUNC
6447 && local)
6448 h->dyn_relocs = NULL;
6449
6450 /* Clear procedure linkage table information for any symbol that
6451 won't need a .plt entry. */
6452 struct plt_entry *ent;
6453 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6454 if (ent->plt.refcount > 0)
6455 break;
6456 if (ent == NULL
6457 || (h->type != STT_GNU_IFUNC
6458 && local
6459 && (htab->can_convert_all_inline_plt
6460 || (ppc_elf_hash_entry (h)->tls_mask
6461 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6462 {
6463 h->plt.plist = NULL;
6464 h->needs_plt = 0;
6465 h->pointer_equality_needed = 0;
6466 }
6467 else if (abiversion (info->output_bfd) >= 2)
6468 {
6469 /* Taking a function's address in a read/write section
6470 doesn't require us to define the function symbol in the
6471 executable on a global entry stub. A dynamic reloc can
6472 be used instead. The reason we prefer a few more dynamic
6473 relocs is that calling via a global entry stub costs a
6474 few more instructions, and pointer_equality_needed causes
6475 extra work in ld.so when resolving these symbols. */
6476 if (global_entry_stub (h))
6477 {
6478 if (!_bfd_elf_readonly_dynrelocs (h))
6479 {
6480 h->pointer_equality_needed = 0;
6481 /* If we haven't seen a branch reloc and the symbol
6482 isn't an ifunc then we don't need a plt entry. */
6483 if (!h->needs_plt)
6484 h->plt.plist = NULL;
6485 }
6486 else if (!bfd_link_pic (info))
6487 /* We are going to be defining the function symbol on the
6488 plt stub, so no dyn_relocs needed when non-pic. */
6489 h->dyn_relocs = NULL;
6490 }
6491
6492 /* ELFv2 function symbols can't have copy relocs. */
6493 return TRUE;
6494 }
6495 else if (!h->needs_plt
6496 && !_bfd_elf_readonly_dynrelocs (h))
6497 {
6498 /* If we haven't seen a branch reloc and the symbol isn't an
6499 ifunc then we don't need a plt entry. */
6500 h->plt.plist = NULL;
6501 h->pointer_equality_needed = 0;
6502 return TRUE;
6503 }
6504 }
6505 else
6506 h->plt.plist = NULL;
6507
6508 /* If this is a weak symbol, and there is a real definition, the
6509 processor independent code will have arranged for us to see the
6510 real definition first, and we can just use the same value. */
6511 if (h->is_weakalias)
6512 {
6513 struct elf_link_hash_entry *def = weakdef (h);
6514 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6515 h->root.u.def.section = def->root.u.def.section;
6516 h->root.u.def.value = def->root.u.def.value;
6517 if (def->root.u.def.section == htab->elf.sdynbss
6518 || def->root.u.def.section == htab->elf.sdynrelro)
6519 h->dyn_relocs = NULL;
6520 return TRUE;
6521 }
6522
6523 /* If we are creating a shared library, we must presume that the
6524 only references to the symbol are via the global offset table.
6525 For such cases we need not do anything here; the relocations will
6526 be handled correctly by relocate_section. */
6527 if (!bfd_link_executable (info))
6528 return TRUE;
6529
6530 /* If there are no references to this symbol that do not use the
6531 GOT, we don't need to generate a copy reloc. */
6532 if (!h->non_got_ref)
6533 return TRUE;
6534
6535 /* Don't generate a copy reloc for symbols defined in the executable. */
6536 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6537
6538 /* If -z nocopyreloc was given, don't generate them either. */
6539 || info->nocopyreloc
6540
6541 /* If we don't find any dynamic relocs in read-only sections, then
6542 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6543 || (ELIMINATE_COPY_RELOCS
6544 && !h->needs_copy
6545 && !alias_readonly_dynrelocs (h))
6546
6547 /* Protected variables do not work with .dynbss. The copy in
6548 .dynbss won't be used by the shared library with the protected
6549 definition for the variable. Text relocations are preferable
6550 to an incorrect program. */
6551 || h->protected_def)
6552 return TRUE;
6553
6554 if (h->type == STT_FUNC
6555 || h->type == STT_GNU_IFUNC)
6556 {
6557 /* .dynbss copies of function symbols only work if we have
6558 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6559 use dot-symbols and set the function symbol size to the text
6560 size of the function rather than the size of the descriptor.
6561 That's wrong for copying a descriptor. */
6562 if (ppc_elf_hash_entry (h)->oh == NULL
6563 || !(h->size == 24 || h->size == 16))
6564 return TRUE;
6565
6566 /* We should never get here, but unfortunately there are old
6567 versions of gcc (circa gcc-3.2) that improperly for the
6568 ELFv1 ABI put initialized function pointers, vtable refs and
6569 suchlike in read-only sections. Allow them to proceed, but
6570 warn that this might break at runtime. */
6571 info->callbacks->einfo
6572 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6573 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6574 h->root.root.string);
6575 }
6576
6577 /* This is a reference to a symbol defined by a dynamic object which
6578 is not a function. */
6579
6580 /* We must allocate the symbol in our .dynbss section, which will
6581 become part of the .bss section of the executable. There will be
6582 an entry for this symbol in the .dynsym section. The dynamic
6583 object will contain position independent code, so all references
6584 from the dynamic object to this symbol will go through the global
6585 offset table. The dynamic linker will use the .dynsym entry to
6586 determine the address it must put in the global offset table, so
6587 both the dynamic object and the regular object will refer to the
6588 same memory location for the variable. */
6589 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6590 {
6591 s = htab->elf.sdynrelro;
6592 srel = htab->elf.sreldynrelro;
6593 }
6594 else
6595 {
6596 s = htab->elf.sdynbss;
6597 srel = htab->elf.srelbss;
6598 }
6599 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6600 {
6601 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6602 linker to copy the initial value out of the dynamic object
6603 and into the runtime process image. */
6604 srel->size += sizeof (Elf64_External_Rela);
6605 h->needs_copy = 1;
6606 }
6607
6608 /* We no longer want dyn_relocs. */
6609 h->dyn_relocs = NULL;
6610 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6611 }
6612
6613 /* If given a function descriptor symbol, hide both the function code
6614 sym and the descriptor. */
6615 static void
6616 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6617 struct elf_link_hash_entry *h,
6618 bfd_boolean force_local)
6619 {
6620 struct ppc_link_hash_entry *eh;
6621 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6622
6623 if (ppc_hash_table (info) == NULL)
6624 return;
6625
6626 eh = ppc_elf_hash_entry (h);
6627 if (eh->is_func_descriptor)
6628 {
6629 struct ppc_link_hash_entry *fh = eh->oh;
6630
6631 if (fh == NULL)
6632 {
6633 const char *p, *q;
6634 struct elf_link_hash_table *htab = elf_hash_table (info);
6635 char save;
6636
6637 /* We aren't supposed to use alloca in BFD because on
6638 systems which do not have alloca the version in libiberty
6639 calls xmalloc, which might cause the program to crash
6640 when it runs out of memory. This function doesn't have a
6641 return status, so there's no way to gracefully return an
6642 error. So cheat. We know that string[-1] can be safely
6643 accessed; It's either a string in an ELF string table,
6644 or allocated in an objalloc structure. */
6645
6646 p = eh->elf.root.root.string - 1;
6647 save = *p;
6648 *(char *) p = '.';
6649 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6650 FALSE, FALSE));
6651 *(char *) p = save;
6652
6653 /* Unfortunately, if it so happens that the string we were
6654 looking for was allocated immediately before this string,
6655 then we overwrote the string terminator. That's the only
6656 reason the lookup should fail. */
6657 if (fh == NULL)
6658 {
6659 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6660 while (q >= eh->elf.root.root.string && *q == *p)
6661 --q, --p;
6662 if (q < eh->elf.root.root.string && *p == '.')
6663 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6664 FALSE, FALSE));
6665 }
6666 if (fh != NULL)
6667 {
6668 eh->oh = fh;
6669 fh->oh = eh;
6670 }
6671 }
6672 if (fh != NULL)
6673 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6674 }
6675 }
6676
6677 static bfd_boolean
6678 get_sym_h (struct elf_link_hash_entry **hp,
6679 Elf_Internal_Sym **symp,
6680 asection **symsecp,
6681 unsigned char **tls_maskp,
6682 Elf_Internal_Sym **locsymsp,
6683 unsigned long r_symndx,
6684 bfd *ibfd)
6685 {
6686 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6687
6688 if (r_symndx >= symtab_hdr->sh_info)
6689 {
6690 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6691 struct elf_link_hash_entry *h;
6692
6693 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6694 h = elf_follow_link (h);
6695
6696 if (hp != NULL)
6697 *hp = h;
6698
6699 if (symp != NULL)
6700 *symp = NULL;
6701
6702 if (symsecp != NULL)
6703 {
6704 asection *symsec = NULL;
6705 if (h->root.type == bfd_link_hash_defined
6706 || h->root.type == bfd_link_hash_defweak)
6707 symsec = h->root.u.def.section;
6708 *symsecp = symsec;
6709 }
6710
6711 if (tls_maskp != NULL)
6712 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
6713 }
6714 else
6715 {
6716 Elf_Internal_Sym *sym;
6717 Elf_Internal_Sym *locsyms = *locsymsp;
6718
6719 if (locsyms == NULL)
6720 {
6721 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6722 if (locsyms == NULL)
6723 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6724 symtab_hdr->sh_info,
6725 0, NULL, NULL, NULL);
6726 if (locsyms == NULL)
6727 return FALSE;
6728 *locsymsp = locsyms;
6729 }
6730 sym = locsyms + r_symndx;
6731
6732 if (hp != NULL)
6733 *hp = NULL;
6734
6735 if (symp != NULL)
6736 *symp = sym;
6737
6738 if (symsecp != NULL)
6739 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6740
6741 if (tls_maskp != NULL)
6742 {
6743 struct got_entry **lgot_ents;
6744 unsigned char *tls_mask;
6745
6746 tls_mask = NULL;
6747 lgot_ents = elf_local_got_ents (ibfd);
6748 if (lgot_ents != NULL)
6749 {
6750 struct plt_entry **local_plt = (struct plt_entry **)
6751 (lgot_ents + symtab_hdr->sh_info);
6752 unsigned char *lgot_masks = (unsigned char *)
6753 (local_plt + symtab_hdr->sh_info);
6754 tls_mask = &lgot_masks[r_symndx];
6755 }
6756 *tls_maskp = tls_mask;
6757 }
6758 }
6759 return TRUE;
6760 }
6761
6762 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6763 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6764 type suitable for optimization, and 1 otherwise. */
6765
6766 static int
6767 get_tls_mask (unsigned char **tls_maskp,
6768 unsigned long *toc_symndx,
6769 bfd_vma *toc_addend,
6770 Elf_Internal_Sym **locsymsp,
6771 const Elf_Internal_Rela *rel,
6772 bfd *ibfd)
6773 {
6774 unsigned long r_symndx;
6775 int next_r;
6776 struct elf_link_hash_entry *h;
6777 Elf_Internal_Sym *sym;
6778 asection *sec;
6779 bfd_vma off;
6780
6781 r_symndx = ELF64_R_SYM (rel->r_info);
6782 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6783 return 0;
6784
6785 if ((*tls_maskp != NULL
6786 && (**tls_maskp & TLS_TLS) != 0
6787 && **tls_maskp != (TLS_TLS | TLS_MARK))
6788 || sec == NULL
6789 || ppc64_elf_section_data (sec) == NULL
6790 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6791 return 1;
6792
6793 /* Look inside a TOC section too. */
6794 if (h != NULL)
6795 {
6796 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6797 off = h->root.u.def.value;
6798 }
6799 else
6800 off = sym->st_value;
6801 off += rel->r_addend;
6802 BFD_ASSERT (off % 8 == 0);
6803 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6804 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6805 if (toc_symndx != NULL)
6806 *toc_symndx = r_symndx;
6807 if (toc_addend != NULL)
6808 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6809 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6810 return 0;
6811 if ((h == NULL || is_static_defined (h))
6812 && (next_r == -1 || next_r == -2))
6813 return 1 - next_r;
6814 return 1;
6815 }
6816
6817 /* Find (or create) an entry in the tocsave hash table. */
6818
6819 static struct tocsave_entry *
6820 tocsave_find (struct ppc_link_hash_table *htab,
6821 enum insert_option insert,
6822 Elf_Internal_Sym **local_syms,
6823 const Elf_Internal_Rela *irela,
6824 bfd *ibfd)
6825 {
6826 unsigned long r_indx;
6827 struct elf_link_hash_entry *h;
6828 Elf_Internal_Sym *sym;
6829 struct tocsave_entry ent, *p;
6830 hashval_t hash;
6831 struct tocsave_entry **slot;
6832
6833 r_indx = ELF64_R_SYM (irela->r_info);
6834 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6835 return NULL;
6836 if (ent.sec == NULL || ent.sec->output_section == NULL)
6837 {
6838 _bfd_error_handler
6839 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6840 return NULL;
6841 }
6842
6843 if (h != NULL)
6844 ent.offset = h->root.u.def.value;
6845 else
6846 ent.offset = sym->st_value;
6847 ent.offset += irela->r_addend;
6848
6849 hash = tocsave_htab_hash (&ent);
6850 slot = ((struct tocsave_entry **)
6851 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6852 if (slot == NULL)
6853 return NULL;
6854
6855 if (*slot == NULL)
6856 {
6857 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6858 if (p == NULL)
6859 return NULL;
6860 *p = ent;
6861 *slot = p;
6862 }
6863 return *slot;
6864 }
6865
6866 /* Adjust all global syms defined in opd sections. In gcc generated
6867 code for the old ABI, these will already have been done. */
6868
6869 static bfd_boolean
6870 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6871 {
6872 struct ppc_link_hash_entry *eh;
6873 asection *sym_sec;
6874 struct _opd_sec_data *opd;
6875
6876 if (h->root.type == bfd_link_hash_indirect)
6877 return TRUE;
6878
6879 if (h->root.type != bfd_link_hash_defined
6880 && h->root.type != bfd_link_hash_defweak)
6881 return TRUE;
6882
6883 eh = ppc_elf_hash_entry (h);
6884 if (eh->adjust_done)
6885 return TRUE;
6886
6887 sym_sec = eh->elf.root.u.def.section;
6888 opd = get_opd_info (sym_sec);
6889 if (opd != NULL && opd->adjust != NULL)
6890 {
6891 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6892 if (adjust == -1)
6893 {
6894 /* This entry has been deleted. */
6895 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6896 if (dsec == NULL)
6897 {
6898 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6899 if (discarded_section (dsec))
6900 {
6901 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6902 break;
6903 }
6904 }
6905 eh->elf.root.u.def.value = 0;
6906 eh->elf.root.u.def.section = dsec;
6907 }
6908 else
6909 eh->elf.root.u.def.value += adjust;
6910 eh->adjust_done = 1;
6911 }
6912 return TRUE;
6913 }
6914
6915 /* Handles decrementing dynamic reloc counts for the reloc specified by
6916 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6917 have already been determined. */
6918
6919 static bfd_boolean
6920 dec_dynrel_count (bfd_vma r_info,
6921 asection *sec,
6922 struct bfd_link_info *info,
6923 Elf_Internal_Sym **local_syms,
6924 struct elf_link_hash_entry *h,
6925 Elf_Internal_Sym *sym)
6926 {
6927 enum elf_ppc64_reloc_type r_type;
6928 asection *sym_sec = NULL;
6929
6930 /* Can this reloc be dynamic? This switch, and later tests here
6931 should be kept in sync with the code in check_relocs. */
6932 r_type = ELF64_R_TYPE (r_info);
6933 switch (r_type)
6934 {
6935 default:
6936 return TRUE;
6937
6938 case R_PPC64_TOC16:
6939 case R_PPC64_TOC16_DS:
6940 case R_PPC64_TOC16_LO:
6941 case R_PPC64_TOC16_HI:
6942 case R_PPC64_TOC16_HA:
6943 case R_PPC64_TOC16_LO_DS:
6944 if (h == NULL)
6945 return TRUE;
6946 break;
6947
6948 case R_PPC64_TPREL16:
6949 case R_PPC64_TPREL16_LO:
6950 case R_PPC64_TPREL16_HI:
6951 case R_PPC64_TPREL16_HA:
6952 case R_PPC64_TPREL16_DS:
6953 case R_PPC64_TPREL16_LO_DS:
6954 case R_PPC64_TPREL16_HIGH:
6955 case R_PPC64_TPREL16_HIGHA:
6956 case R_PPC64_TPREL16_HIGHER:
6957 case R_PPC64_TPREL16_HIGHERA:
6958 case R_PPC64_TPREL16_HIGHEST:
6959 case R_PPC64_TPREL16_HIGHESTA:
6960 case R_PPC64_TPREL64:
6961 case R_PPC64_TPREL34:
6962 case R_PPC64_DTPMOD64:
6963 case R_PPC64_DTPREL64:
6964 case R_PPC64_ADDR64:
6965 case R_PPC64_REL30:
6966 case R_PPC64_REL32:
6967 case R_PPC64_REL64:
6968 case R_PPC64_ADDR14:
6969 case R_PPC64_ADDR14_BRNTAKEN:
6970 case R_PPC64_ADDR14_BRTAKEN:
6971 case R_PPC64_ADDR16:
6972 case R_PPC64_ADDR16_DS:
6973 case R_PPC64_ADDR16_HA:
6974 case R_PPC64_ADDR16_HI:
6975 case R_PPC64_ADDR16_HIGH:
6976 case R_PPC64_ADDR16_HIGHA:
6977 case R_PPC64_ADDR16_HIGHER:
6978 case R_PPC64_ADDR16_HIGHERA:
6979 case R_PPC64_ADDR16_HIGHEST:
6980 case R_PPC64_ADDR16_HIGHESTA:
6981 case R_PPC64_ADDR16_LO:
6982 case R_PPC64_ADDR16_LO_DS:
6983 case R_PPC64_ADDR24:
6984 case R_PPC64_ADDR32:
6985 case R_PPC64_UADDR16:
6986 case R_PPC64_UADDR32:
6987 case R_PPC64_UADDR64:
6988 case R_PPC64_TOC:
6989 case R_PPC64_D34:
6990 case R_PPC64_D34_LO:
6991 case R_PPC64_D34_HI30:
6992 case R_PPC64_D34_HA30:
6993 case R_PPC64_ADDR16_HIGHER34:
6994 case R_PPC64_ADDR16_HIGHERA34:
6995 case R_PPC64_ADDR16_HIGHEST34:
6996 case R_PPC64_ADDR16_HIGHESTA34:
6997 case R_PPC64_D28:
6998 break;
6999 }
7000
7001 if (local_syms != NULL)
7002 {
7003 unsigned long r_symndx;
7004 bfd *ibfd = sec->owner;
7005
7006 r_symndx = ELF64_R_SYM (r_info);
7007 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7008 return FALSE;
7009 }
7010
7011 if ((h != NULL
7012 && (h->root.type == bfd_link_hash_defweak
7013 || !h->def_regular))
7014 || (h != NULL
7015 && !bfd_link_executable (info)
7016 && !SYMBOLIC_BIND (info, h))
7017 || (bfd_link_pic (info)
7018 && must_be_dyn_reloc (info, r_type))
7019 || (!bfd_link_pic (info)
7020 && (h != NULL
7021 ? h->type == STT_GNU_IFUNC
7022 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
7023 ;
7024 else
7025 return TRUE;
7026
7027 if (h != NULL)
7028 {
7029 struct elf_dyn_relocs *p;
7030 struct elf_dyn_relocs **pp;
7031 pp = &h->dyn_relocs;
7032
7033 /* elf_gc_sweep may have already removed all dyn relocs associated
7034 with local syms for a given section. Also, symbol flags are
7035 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7036 report a dynreloc miscount. */
7037 if (*pp == NULL && info->gc_sections)
7038 return TRUE;
7039
7040 while ((p = *pp) != NULL)
7041 {
7042 if (p->sec == sec)
7043 {
7044 if (!must_be_dyn_reloc (info, r_type))
7045 p->pc_count -= 1;
7046 p->count -= 1;
7047 if (p->count == 0)
7048 *pp = p->next;
7049 return TRUE;
7050 }
7051 pp = &p->next;
7052 }
7053 }
7054 else
7055 {
7056 struct ppc_dyn_relocs *p;
7057 struct ppc_dyn_relocs **pp;
7058 void *vpp;
7059 bfd_boolean is_ifunc;
7060
7061 if (local_syms == NULL)
7062 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7063 if (sym_sec == NULL)
7064 sym_sec = sec;
7065
7066 vpp = &elf_section_data (sym_sec)->local_dynrel;
7067 pp = (struct ppc_dyn_relocs **) vpp;
7068
7069 if (*pp == NULL && info->gc_sections)
7070 return TRUE;
7071
7072 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7073 while ((p = *pp) != NULL)
7074 {
7075 if (p->sec == sec && p->ifunc == is_ifunc)
7076 {
7077 p->count -= 1;
7078 if (p->count == 0)
7079 *pp = p->next;
7080 return TRUE;
7081 }
7082 pp = &p->next;
7083 }
7084 }
7085
7086 /* xgettext:c-format */
7087 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7088 sec->owner, sec);
7089 bfd_set_error (bfd_error_bad_value);
7090 return FALSE;
7091 }
7092
7093 /* Remove unused Official Procedure Descriptor entries. Currently we
7094 only remove those associated with functions in discarded link-once
7095 sections, or weakly defined functions that have been overridden. It
7096 would be possible to remove many more entries for statically linked
7097 applications. */
7098
7099 bfd_boolean
7100 ppc64_elf_edit_opd (struct bfd_link_info *info)
7101 {
7102 bfd *ibfd;
7103 bfd_boolean some_edited = FALSE;
7104 asection *need_pad = NULL;
7105 struct ppc_link_hash_table *htab;
7106
7107 htab = ppc_hash_table (info);
7108 if (htab == NULL)
7109 return FALSE;
7110
7111 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7112 {
7113 asection *sec;
7114 Elf_Internal_Rela *relstart, *rel, *relend;
7115 Elf_Internal_Shdr *symtab_hdr;
7116 Elf_Internal_Sym *local_syms;
7117 struct _opd_sec_data *opd;
7118 bfd_boolean need_edit, add_aux_fields, broken;
7119 bfd_size_type cnt_16b = 0;
7120
7121 if (!is_ppc64_elf (ibfd))
7122 continue;
7123
7124 sec = bfd_get_section_by_name (ibfd, ".opd");
7125 if (sec == NULL || sec->size == 0)
7126 continue;
7127
7128 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7129 continue;
7130
7131 if (sec->output_section == bfd_abs_section_ptr)
7132 continue;
7133
7134 /* Look through the section relocs. */
7135 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7136 continue;
7137
7138 local_syms = NULL;
7139 symtab_hdr = &elf_symtab_hdr (ibfd);
7140
7141 /* Read the relocations. */
7142 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7143 info->keep_memory);
7144 if (relstart == NULL)
7145 return FALSE;
7146
7147 /* First run through the relocs to check they are sane, and to
7148 determine whether we need to edit this opd section. */
7149 need_edit = FALSE;
7150 broken = FALSE;
7151 need_pad = sec;
7152 relend = relstart + sec->reloc_count;
7153 for (rel = relstart; rel < relend; )
7154 {
7155 enum elf_ppc64_reloc_type r_type;
7156 unsigned long r_symndx;
7157 asection *sym_sec;
7158 struct elf_link_hash_entry *h;
7159 Elf_Internal_Sym *sym;
7160 bfd_vma offset;
7161
7162 /* .opd contains an array of 16 or 24 byte entries. We're
7163 only interested in the reloc pointing to a function entry
7164 point. */
7165 offset = rel->r_offset;
7166 if (rel + 1 == relend
7167 || rel[1].r_offset != offset + 8)
7168 {
7169 /* If someone messes with .opd alignment then after a
7170 "ld -r" we might have padding in the middle of .opd.
7171 Also, there's nothing to prevent someone putting
7172 something silly in .opd with the assembler. No .opd
7173 optimization for them! */
7174 broken_opd:
7175 _bfd_error_handler
7176 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7177 broken = TRUE;
7178 break;
7179 }
7180
7181 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7182 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7183 {
7184 _bfd_error_handler
7185 /* xgettext:c-format */
7186 (_("%pB: unexpected reloc type %u in .opd section"),
7187 ibfd, r_type);
7188 broken = TRUE;
7189 break;
7190 }
7191
7192 r_symndx = ELF64_R_SYM (rel->r_info);
7193 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7194 r_symndx, ibfd))
7195 goto error_ret;
7196
7197 if (sym_sec == NULL || sym_sec->owner == NULL)
7198 {
7199 const char *sym_name;
7200 if (h != NULL)
7201 sym_name = h->root.root.string;
7202 else
7203 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7204 sym_sec);
7205
7206 _bfd_error_handler
7207 /* xgettext:c-format */
7208 (_("%pB: undefined sym `%s' in .opd section"),
7209 ibfd, sym_name);
7210 broken = TRUE;
7211 break;
7212 }
7213
7214 /* opd entries are always for functions defined in the
7215 current input bfd. If the symbol isn't defined in the
7216 input bfd, then we won't be using the function in this
7217 bfd; It must be defined in a linkonce section in another
7218 bfd, or is weak. It's also possible that we are
7219 discarding the function due to a linker script /DISCARD/,
7220 which we test for via the output_section. */
7221 if (sym_sec->owner != ibfd
7222 || sym_sec->output_section == bfd_abs_section_ptr)
7223 need_edit = TRUE;
7224
7225 rel += 2;
7226 if (rel + 1 == relend
7227 || (rel + 2 < relend
7228 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7229 ++rel;
7230
7231 if (rel == relend)
7232 {
7233 if (sec->size == offset + 24)
7234 {
7235 need_pad = NULL;
7236 break;
7237 }
7238 if (sec->size == offset + 16)
7239 {
7240 cnt_16b++;
7241 break;
7242 }
7243 goto broken_opd;
7244 }
7245 else if (rel + 1 < relend
7246 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7247 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7248 {
7249 if (rel[0].r_offset == offset + 16)
7250 cnt_16b++;
7251 else if (rel[0].r_offset != offset + 24)
7252 goto broken_opd;
7253 }
7254 else
7255 goto broken_opd;
7256 }
7257
7258 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7259
7260 if (!broken && (need_edit || add_aux_fields))
7261 {
7262 Elf_Internal_Rela *write_rel;
7263 Elf_Internal_Shdr *rel_hdr;
7264 bfd_byte *rptr, *wptr;
7265 bfd_byte *new_contents;
7266 bfd_size_type amt;
7267
7268 new_contents = NULL;
7269 amt = OPD_NDX (sec->size) * sizeof (long);
7270 opd = &ppc64_elf_section_data (sec)->u.opd;
7271 opd->adjust = bfd_zalloc (sec->owner, amt);
7272 if (opd->adjust == NULL)
7273 return FALSE;
7274
7275 /* This seems a waste of time as input .opd sections are all
7276 zeros as generated by gcc, but I suppose there's no reason
7277 this will always be so. We might start putting something in
7278 the third word of .opd entries. */
7279 if ((sec->flags & SEC_IN_MEMORY) == 0)
7280 {
7281 bfd_byte *loc;
7282 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7283 {
7284 free (loc);
7285 error_ret:
7286 if (symtab_hdr->contents != (unsigned char *) local_syms)
7287 free (local_syms);
7288 if (elf_section_data (sec)->relocs != relstart)
7289 free (relstart);
7290 return FALSE;
7291 }
7292 sec->contents = loc;
7293 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7294 }
7295
7296 elf_section_data (sec)->relocs = relstart;
7297
7298 new_contents = sec->contents;
7299 if (add_aux_fields)
7300 {
7301 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7302 if (new_contents == NULL)
7303 return FALSE;
7304 need_pad = NULL;
7305 }
7306 wptr = new_contents;
7307 rptr = sec->contents;
7308 write_rel = relstart;
7309 for (rel = relstart; rel < relend; )
7310 {
7311 unsigned long r_symndx;
7312 asection *sym_sec;
7313 struct elf_link_hash_entry *h;
7314 struct ppc_link_hash_entry *fdh = NULL;
7315 Elf_Internal_Sym *sym;
7316 long opd_ent_size;
7317 Elf_Internal_Rela *next_rel;
7318 bfd_boolean skip;
7319
7320 r_symndx = ELF64_R_SYM (rel->r_info);
7321 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7322 r_symndx, ibfd))
7323 goto error_ret;
7324
7325 next_rel = rel + 2;
7326 if (next_rel + 1 == relend
7327 || (next_rel + 2 < relend
7328 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7329 ++next_rel;
7330
7331 /* See if the .opd entry is full 24 byte or
7332 16 byte (with fd_aux entry overlapped with next
7333 fd_func). */
7334 opd_ent_size = 24;
7335 if (next_rel == relend)
7336 {
7337 if (sec->size == rel->r_offset + 16)
7338 opd_ent_size = 16;
7339 }
7340 else if (next_rel->r_offset == rel->r_offset + 16)
7341 opd_ent_size = 16;
7342
7343 if (h != NULL
7344 && h->root.root.string[0] == '.')
7345 {
7346 fdh = ppc_elf_hash_entry (h)->oh;
7347 if (fdh != NULL)
7348 {
7349 fdh = ppc_follow_link (fdh);
7350 if (fdh->elf.root.type != bfd_link_hash_defined
7351 && fdh->elf.root.type != bfd_link_hash_defweak)
7352 fdh = NULL;
7353 }
7354 }
7355
7356 skip = (sym_sec->owner != ibfd
7357 || sym_sec->output_section == bfd_abs_section_ptr);
7358 if (skip)
7359 {
7360 if (fdh != NULL && sym_sec->owner == ibfd)
7361 {
7362 /* Arrange for the function descriptor sym
7363 to be dropped. */
7364 fdh->elf.root.u.def.value = 0;
7365 fdh->elf.root.u.def.section = sym_sec;
7366 }
7367 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7368
7369 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7370 rel = next_rel;
7371 else
7372 while (1)
7373 {
7374 if (!dec_dynrel_count (rel->r_info, sec, info,
7375 NULL, h, sym))
7376 goto error_ret;
7377
7378 if (++rel == next_rel)
7379 break;
7380
7381 r_symndx = ELF64_R_SYM (rel->r_info);
7382 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7383 r_symndx, ibfd))
7384 goto error_ret;
7385 }
7386 }
7387 else
7388 {
7389 /* We'll be keeping this opd entry. */
7390 long adjust;
7391
7392 if (fdh != NULL)
7393 {
7394 /* Redefine the function descriptor symbol to
7395 this location in the opd section. It is
7396 necessary to update the value here rather
7397 than using an array of adjustments as we do
7398 for local symbols, because various places
7399 in the generic ELF code use the value
7400 stored in u.def.value. */
7401 fdh->elf.root.u.def.value = wptr - new_contents;
7402 fdh->adjust_done = 1;
7403 }
7404
7405 /* Local syms are a bit tricky. We could
7406 tweak them as they can be cached, but
7407 we'd need to look through the local syms
7408 for the function descriptor sym which we
7409 don't have at the moment. So keep an
7410 array of adjustments. */
7411 adjust = (wptr - new_contents) - (rptr - sec->contents);
7412 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7413
7414 if (wptr != rptr)
7415 memcpy (wptr, rptr, opd_ent_size);
7416 wptr += opd_ent_size;
7417 if (add_aux_fields && opd_ent_size == 16)
7418 {
7419 memset (wptr, '\0', 8);
7420 wptr += 8;
7421 }
7422
7423 /* We need to adjust any reloc offsets to point to the
7424 new opd entries. */
7425 for ( ; rel != next_rel; ++rel)
7426 {
7427 rel->r_offset += adjust;
7428 if (write_rel != rel)
7429 memcpy (write_rel, rel, sizeof (*rel));
7430 ++write_rel;
7431 }
7432 }
7433
7434 rptr += opd_ent_size;
7435 }
7436
7437 sec->size = wptr - new_contents;
7438 sec->reloc_count = write_rel - relstart;
7439 if (add_aux_fields)
7440 {
7441 free (sec->contents);
7442 sec->contents = new_contents;
7443 }
7444
7445 /* Fudge the header size too, as this is used later in
7446 elf_bfd_final_link if we are emitting relocs. */
7447 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7448 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7449 some_edited = TRUE;
7450 }
7451 else if (elf_section_data (sec)->relocs != relstart)
7452 free (relstart);
7453
7454 if (local_syms != NULL
7455 && symtab_hdr->contents != (unsigned char *) local_syms)
7456 {
7457 if (!info->keep_memory)
7458 free (local_syms);
7459 else
7460 symtab_hdr->contents = (unsigned char *) local_syms;
7461 }
7462 }
7463
7464 if (some_edited)
7465 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7466
7467 /* If we are doing a final link and the last .opd entry is just 16 byte
7468 long, add a 8 byte padding after it. */
7469 if (need_pad != NULL && !bfd_link_relocatable (info))
7470 {
7471 bfd_byte *p;
7472
7473 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7474 {
7475 BFD_ASSERT (need_pad->size > 0);
7476
7477 p = bfd_malloc (need_pad->size + 8);
7478 if (p == NULL)
7479 return FALSE;
7480
7481 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7482 p, 0, need_pad->size))
7483 return FALSE;
7484
7485 need_pad->contents = p;
7486 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7487 }
7488 else
7489 {
7490 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7491 if (p == NULL)
7492 return FALSE;
7493
7494 need_pad->contents = p;
7495 }
7496
7497 memset (need_pad->contents + need_pad->size, 0, 8);
7498 need_pad->size += 8;
7499 }
7500
7501 return TRUE;
7502 }
7503
7504 /* Analyze inline PLT call relocations to see whether calls to locally
7505 defined functions can be converted to direct calls. */
7506
7507 bfd_boolean
7508 ppc64_elf_inline_plt (struct bfd_link_info *info)
7509 {
7510 struct ppc_link_hash_table *htab;
7511 bfd *ibfd;
7512 asection *sec;
7513 bfd_vma low_vma, high_vma, limit;
7514
7515 htab = ppc_hash_table (info);
7516 if (htab == NULL)
7517 return FALSE;
7518
7519 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7520 reduced somewhat to cater for possible stubs that might be added
7521 between the call and its destination. */
7522 if (htab->params->group_size < 0)
7523 {
7524 limit = -htab->params->group_size;
7525 if (limit == 1)
7526 limit = 0x1e00000;
7527 }
7528 else
7529 {
7530 limit = htab->params->group_size;
7531 if (limit == 1)
7532 limit = 0x1c00000;
7533 }
7534
7535 low_vma = -1;
7536 high_vma = 0;
7537 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7538 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7539 {
7540 if (low_vma > sec->vma)
7541 low_vma = sec->vma;
7542 if (high_vma < sec->vma + sec->size)
7543 high_vma = sec->vma + sec->size;
7544 }
7545
7546 /* If a "bl" can reach anywhere in local code sections, then we can
7547 convert all inline PLT sequences to direct calls when the symbol
7548 is local. */
7549 if (high_vma - low_vma < limit)
7550 {
7551 htab->can_convert_all_inline_plt = 1;
7552 return TRUE;
7553 }
7554
7555 /* Otherwise, go looking through relocs for cases where a direct
7556 call won't reach. Mark the symbol on any such reloc to disable
7557 the optimization and keep the PLT entry as it seems likely that
7558 this will be better than creating trampolines. Note that this
7559 will disable the optimization for all inline PLT calls to a
7560 particular symbol, not just those that won't reach. The
7561 difficulty in doing a more precise optimization is that the
7562 linker needs to make a decision depending on whether a
7563 particular R_PPC64_PLTCALL insn can be turned into a direct
7564 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7565 the sequence, and there is nothing that ties those relocs
7566 together except their symbol. */
7567
7568 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7569 {
7570 Elf_Internal_Shdr *symtab_hdr;
7571 Elf_Internal_Sym *local_syms;
7572
7573 if (!is_ppc64_elf (ibfd))
7574 continue;
7575
7576 local_syms = NULL;
7577 symtab_hdr = &elf_symtab_hdr (ibfd);
7578
7579 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7580 if (ppc64_elf_section_data (sec)->has_pltcall
7581 && !bfd_is_abs_section (sec->output_section))
7582 {
7583 Elf_Internal_Rela *relstart, *rel, *relend;
7584
7585 /* Read the relocations. */
7586 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7587 info->keep_memory);
7588 if (relstart == NULL)
7589 return FALSE;
7590
7591 relend = relstart + sec->reloc_count;
7592 for (rel = relstart; rel < relend; rel++)
7593 {
7594 enum elf_ppc64_reloc_type r_type;
7595 unsigned long r_symndx;
7596 asection *sym_sec;
7597 struct elf_link_hash_entry *h;
7598 Elf_Internal_Sym *sym;
7599 unsigned char *tls_maskp;
7600
7601 r_type = ELF64_R_TYPE (rel->r_info);
7602 if (r_type != R_PPC64_PLTCALL
7603 && r_type != R_PPC64_PLTCALL_NOTOC)
7604 continue;
7605
7606 r_symndx = ELF64_R_SYM (rel->r_info);
7607 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7608 r_symndx, ibfd))
7609 {
7610 if (elf_section_data (sec)->relocs != relstart)
7611 free (relstart);
7612 if (symtab_hdr->contents != (bfd_byte *) local_syms)
7613 free (local_syms);
7614 return FALSE;
7615 }
7616
7617 if (sym_sec != NULL && sym_sec->output_section != NULL)
7618 {
7619 bfd_vma from, to;
7620 if (h != NULL)
7621 to = h->root.u.def.value;
7622 else
7623 to = sym->st_value;
7624 to += (rel->r_addend
7625 + sym_sec->output_offset
7626 + sym_sec->output_section->vma);
7627 from = (rel->r_offset
7628 + sec->output_offset
7629 + sec->output_section->vma);
7630 if (to - from + limit < 2 * limit
7631 && !(r_type == R_PPC64_PLTCALL_NOTOC
7632 && (((h ? h->other : sym->st_other)
7633 & STO_PPC64_LOCAL_MASK)
7634 > 1 << STO_PPC64_LOCAL_BIT)))
7635 *tls_maskp &= ~PLT_KEEP;
7636 }
7637 }
7638 if (elf_section_data (sec)->relocs != relstart)
7639 free (relstart);
7640 }
7641
7642 if (local_syms != NULL
7643 && symtab_hdr->contents != (unsigned char *) local_syms)
7644 {
7645 if (!info->keep_memory)
7646 free (local_syms);
7647 else
7648 symtab_hdr->contents = (unsigned char *) local_syms;
7649 }
7650 }
7651
7652 return TRUE;
7653 }
7654
7655 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7656
7657 asection *
7658 ppc64_elf_tls_setup (struct bfd_link_info *info)
7659 {
7660 struct ppc_link_hash_table *htab;
7661 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
7662
7663 htab = ppc_hash_table (info);
7664 if (htab == NULL)
7665 return NULL;
7666
7667 if (abiversion (info->output_bfd) == 1)
7668 htab->opd_abi = 1;
7669
7670 if (htab->params->no_multi_toc)
7671 htab->do_multi_toc = 0;
7672 else if (!htab->do_multi_toc)
7673 htab->params->no_multi_toc = 1;
7674
7675 /* Default to --no-plt-localentry, as this option can cause problems
7676 with symbol interposition. For example, glibc libpthread.so and
7677 libc.so duplicate many pthread symbols, with a fallback
7678 implementation in libc.so. In some cases the fallback does more
7679 work than the pthread implementation. __pthread_condattr_destroy
7680 is one such symbol: the libpthread.so implementation is
7681 localentry:0 while the libc.so implementation is localentry:8.
7682 An app that "cleverly" uses dlopen to only load necessary
7683 libraries at runtime may omit loading libpthread.so when not
7684 running multi-threaded, which then results in the libc.so
7685 fallback symbols being used and ld.so complaining. Now there
7686 are workarounds in ld (see non_zero_localentry) to detect the
7687 pthread situation, but that may not be the only case where
7688 --plt-localentry can cause trouble. */
7689 if (htab->params->plt_localentry0 < 0)
7690 htab->params->plt_localentry0 = 0;
7691 if (htab->params->plt_localentry0
7692 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7693 FALSE, FALSE, FALSE) == NULL)
7694 _bfd_error_handler
7695 (_("warning: --plt-localentry is especially dangerous without "
7696 "ld.so support to detect ABI violations"));
7697
7698 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7699 FALSE, FALSE, TRUE);
7700 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7701
7702 /* Move dynamic linking info to the function descriptor sym. */
7703 if (tga != NULL)
7704 func_desc_adjust (tga, info);
7705 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7706 FALSE, FALSE, TRUE);
7707 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7708
7709 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7710 FALSE, FALSE, TRUE);
7711 htab->tga_desc = ppc_elf_hash_entry (desc);
7712 if (desc != NULL)
7713 func_desc_adjust (desc, info);
7714 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7715 FALSE, FALSE, TRUE);
7716 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7717
7718 if (htab->params->tls_get_addr_opt)
7719 {
7720 struct elf_link_hash_entry *opt, *opt_fd;
7721
7722 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7723 FALSE, FALSE, TRUE);
7724 if (opt != NULL)
7725 func_desc_adjust (opt, info);
7726 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7727 FALSE, FALSE, TRUE);
7728 if (opt_fd != NULL
7729 && (opt_fd->root.type == bfd_link_hash_defined
7730 || opt_fd->root.type == bfd_link_hash_defweak))
7731 {
7732 /* If glibc supports an optimized __tls_get_addr call stub,
7733 signalled by the presence of __tls_get_addr_opt, and we'll
7734 be calling __tls_get_addr via a plt call stub, then
7735 make __tls_get_addr point to __tls_get_addr_opt. */
7736 if (!(htab->elf.dynamic_sections_created
7737 && tga_fd != NULL
7738 && (tga_fd->type == STT_FUNC
7739 || tga_fd->needs_plt)
7740 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7741 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7742 tga_fd = NULL;
7743 if (!(htab->elf.dynamic_sections_created
7744 && desc_fd != NULL
7745 && (desc_fd->type == STT_FUNC
7746 || desc_fd->needs_plt)
7747 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7748 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7749 desc_fd = NULL;
7750
7751 if (tga_fd != NULL || desc_fd != NULL)
7752 {
7753 struct plt_entry *ent = NULL;
7754
7755 if (tga_fd != NULL)
7756 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7757 if (ent->plt.refcount > 0)
7758 break;
7759 if (ent == NULL && desc_fd != NULL)
7760 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7761 if (ent->plt.refcount > 0)
7762 break;
7763 if (ent != NULL)
7764 {
7765 if (tga_fd != NULL)
7766 {
7767 tga_fd->root.type = bfd_link_hash_indirect;
7768 tga_fd->root.u.i.link = &opt_fd->root;
7769 tga_fd->root.u.i.warning = NULL;
7770 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7771 }
7772 if (desc_fd != NULL)
7773 {
7774 desc_fd->root.type = bfd_link_hash_indirect;
7775 desc_fd->root.u.i.link = &opt_fd->root;
7776 desc_fd->root.u.i.warning = NULL;
7777 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7778 }
7779 opt_fd->mark = 1;
7780 if (opt_fd->dynindx != -1)
7781 {
7782 /* Use __tls_get_addr_opt in dynamic relocations. */
7783 opt_fd->dynindx = -1;
7784 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7785 opt_fd->dynstr_index);
7786 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7787 return NULL;
7788 }
7789 if (tga_fd != NULL)
7790 {
7791 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7792 tga = &htab->tls_get_addr->elf;
7793 if (opt != NULL && tga != NULL)
7794 {
7795 tga->root.type = bfd_link_hash_indirect;
7796 tga->root.u.i.link = &opt->root;
7797 tga->root.u.i.warning = NULL;
7798 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7799 opt->mark = 1;
7800 _bfd_elf_link_hash_hide_symbol (info, opt,
7801 tga->forced_local);
7802 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7803 }
7804 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7805 htab->tls_get_addr_fd->is_func_descriptor = 1;
7806 if (htab->tls_get_addr != NULL)
7807 {
7808 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7809 htab->tls_get_addr->is_func = 1;
7810 }
7811 }
7812 if (desc_fd != NULL)
7813 {
7814 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7815 if (opt != NULL && desc != NULL)
7816 {
7817 desc->root.type = bfd_link_hash_indirect;
7818 desc->root.u.i.link = &opt->root;
7819 desc->root.u.i.warning = NULL;
7820 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7821 opt->mark = 1;
7822 _bfd_elf_link_hash_hide_symbol (info, opt,
7823 desc->forced_local);
7824 htab->tga_desc = ppc_elf_hash_entry (opt);
7825 }
7826 htab->tga_desc_fd->oh = htab->tga_desc;
7827 htab->tga_desc_fd->is_func_descriptor = 1;
7828 if (htab->tga_desc != NULL)
7829 {
7830 htab->tga_desc->oh = htab->tga_desc_fd;
7831 htab->tga_desc->is_func = 1;
7832 }
7833 }
7834 }
7835 }
7836 }
7837 else if (htab->params->tls_get_addr_opt < 0)
7838 htab->params->tls_get_addr_opt = 0;
7839 }
7840
7841 if (htab->tga_desc_fd != NULL
7842 && htab->params->tls_get_addr_opt
7843 && htab->params->no_tls_get_addr_regsave == -1)
7844 htab->params->no_tls_get_addr_regsave = 0;
7845
7846 return _bfd_elf_tls_setup (info->output_bfd, info);
7847 }
7848
7849 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7850 any of HASH1, HASH2, HASH3, or HASH4. */
7851
7852 static bfd_boolean
7853 branch_reloc_hash_match (const bfd *ibfd,
7854 const Elf_Internal_Rela *rel,
7855 const struct ppc_link_hash_entry *hash1,
7856 const struct ppc_link_hash_entry *hash2,
7857 const struct ppc_link_hash_entry *hash3,
7858 const struct ppc_link_hash_entry *hash4)
7859 {
7860 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7861 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7862 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7863
7864 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7865 {
7866 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7867 struct elf_link_hash_entry *h;
7868
7869 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7870 h = elf_follow_link (h);
7871 if (h == &hash1->elf || h == &hash2->elf
7872 || h == &hash3->elf || h == &hash4->elf)
7873 return TRUE;
7874 }
7875 return FALSE;
7876 }
7877
7878 /* Run through all the TLS relocs looking for optimization
7879 opportunities. The linker has been hacked (see ppc64elf.em) to do
7880 a preliminary section layout so that we know the TLS segment
7881 offsets. We can't optimize earlier because some optimizations need
7882 to know the tp offset, and we need to optimize before allocating
7883 dynamic relocations. */
7884
7885 bfd_boolean
7886 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7887 {
7888 bfd *ibfd;
7889 asection *sec;
7890 struct ppc_link_hash_table *htab;
7891 unsigned char *toc_ref;
7892 int pass;
7893
7894 if (!bfd_link_executable (info))
7895 return TRUE;
7896
7897 htab = ppc_hash_table (info);
7898 if (htab == NULL)
7899 return FALSE;
7900
7901 /* Make two passes over the relocs. On the first pass, mark toc
7902 entries involved with tls relocs, and check that tls relocs
7903 involved in setting up a tls_get_addr call are indeed followed by
7904 such a call. If they are not, we can't do any tls optimization.
7905 On the second pass twiddle tls_mask flags to notify
7906 relocate_section that optimization can be done, and adjust got
7907 and plt refcounts. */
7908 toc_ref = NULL;
7909 for (pass = 0; pass < 2; ++pass)
7910 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7911 {
7912 Elf_Internal_Sym *locsyms = NULL;
7913 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7914
7915 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7916 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7917 {
7918 Elf_Internal_Rela *relstart, *rel, *relend;
7919 bfd_boolean found_tls_get_addr_arg = 0;
7920
7921 /* Read the relocations. */
7922 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7923 info->keep_memory);
7924 if (relstart == NULL)
7925 {
7926 free (toc_ref);
7927 return FALSE;
7928 }
7929
7930 relend = relstart + sec->reloc_count;
7931 for (rel = relstart; rel < relend; rel++)
7932 {
7933 enum elf_ppc64_reloc_type r_type;
7934 unsigned long r_symndx;
7935 struct elf_link_hash_entry *h;
7936 Elf_Internal_Sym *sym;
7937 asection *sym_sec;
7938 unsigned char *tls_mask;
7939 unsigned int tls_set, tls_clear, tls_type = 0;
7940 bfd_vma value;
7941 bfd_boolean ok_tprel, is_local;
7942 long toc_ref_index = 0;
7943 int expecting_tls_get_addr = 0;
7944 bfd_boolean ret = FALSE;
7945
7946 r_symndx = ELF64_R_SYM (rel->r_info);
7947 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7948 r_symndx, ibfd))
7949 {
7950 err_free_rel:
7951 if (elf_section_data (sec)->relocs != relstart)
7952 free (relstart);
7953 free (toc_ref);
7954 if (elf_symtab_hdr (ibfd).contents
7955 != (unsigned char *) locsyms)
7956 free (locsyms);
7957 return ret;
7958 }
7959
7960 if (h != NULL)
7961 {
7962 if (h->root.type == bfd_link_hash_defined
7963 || h->root.type == bfd_link_hash_defweak)
7964 value = h->root.u.def.value;
7965 else if (h->root.type == bfd_link_hash_undefweak)
7966 value = 0;
7967 else
7968 {
7969 found_tls_get_addr_arg = 0;
7970 continue;
7971 }
7972 }
7973 else
7974 /* Symbols referenced by TLS relocs must be of type
7975 STT_TLS. So no need for .opd local sym adjust. */
7976 value = sym->st_value;
7977
7978 ok_tprel = FALSE;
7979 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7980 if (is_local)
7981 {
7982 if (h != NULL
7983 && h->root.type == bfd_link_hash_undefweak)
7984 ok_tprel = TRUE;
7985 else if (sym_sec != NULL
7986 && sym_sec->output_section != NULL)
7987 {
7988 value += sym_sec->output_offset;
7989 value += sym_sec->output_section->vma;
7990 value -= htab->elf.tls_sec->vma + TP_OFFSET;
7991 /* Note that even though the prefix insns
7992 allow a 1<<33 offset we use the same test
7993 as for addis;addi. There may be a mix of
7994 pcrel and non-pcrel code and the decision
7995 to optimise is per symbol, not per TLS
7996 sequence. */
7997 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
7998 }
7999 }
8000
8001 r_type = ELF64_R_TYPE (rel->r_info);
8002 /* If this section has old-style __tls_get_addr calls
8003 without marker relocs, then check that each
8004 __tls_get_addr call reloc is preceded by a reloc
8005 that conceivably belongs to the __tls_get_addr arg
8006 setup insn. If we don't find matching arg setup
8007 relocs, don't do any tls optimization. */
8008 if (pass == 0
8009 && sec->nomark_tls_get_addr
8010 && h != NULL
8011 && is_tls_get_addr (h, htab)
8012 && !found_tls_get_addr_arg
8013 && is_branch_reloc (r_type))
8014 {
8015 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8016 "TLS optimization disabled\n"),
8017 ibfd, sec, rel->r_offset);
8018 ret = TRUE;
8019 goto err_free_rel;
8020 }
8021
8022 found_tls_get_addr_arg = 0;
8023 switch (r_type)
8024 {
8025 case R_PPC64_GOT_TLSLD16:
8026 case R_PPC64_GOT_TLSLD16_LO:
8027 case R_PPC64_GOT_TLSLD34:
8028 expecting_tls_get_addr = 1;
8029 found_tls_get_addr_arg = 1;
8030 /* Fall through. */
8031
8032 case R_PPC64_GOT_TLSLD16_HI:
8033 case R_PPC64_GOT_TLSLD16_HA:
8034 /* These relocs should never be against a symbol
8035 defined in a shared lib. Leave them alone if
8036 that turns out to be the case. */
8037 if (!is_local)
8038 continue;
8039
8040 /* LD -> LE */
8041 tls_set = 0;
8042 tls_clear = TLS_LD;
8043 tls_type = TLS_TLS | TLS_LD;
8044 break;
8045
8046 case R_PPC64_GOT_TLSGD16:
8047 case R_PPC64_GOT_TLSGD16_LO:
8048 case R_PPC64_GOT_TLSGD34:
8049 expecting_tls_get_addr = 1;
8050 found_tls_get_addr_arg = 1;
8051 /* Fall through. */
8052
8053 case R_PPC64_GOT_TLSGD16_HI:
8054 case R_PPC64_GOT_TLSGD16_HA:
8055 if (ok_tprel)
8056 /* GD -> LE */
8057 tls_set = 0;
8058 else
8059 /* GD -> IE */
8060 tls_set = TLS_TLS | TLS_GDIE;
8061 tls_clear = TLS_GD;
8062 tls_type = TLS_TLS | TLS_GD;
8063 break;
8064
8065 case R_PPC64_GOT_TPREL34:
8066 case R_PPC64_GOT_TPREL16_DS:
8067 case R_PPC64_GOT_TPREL16_LO_DS:
8068 case R_PPC64_GOT_TPREL16_HI:
8069 case R_PPC64_GOT_TPREL16_HA:
8070 if (ok_tprel)
8071 {
8072 /* IE -> LE */
8073 tls_set = 0;
8074 tls_clear = TLS_TPREL;
8075 tls_type = TLS_TLS | TLS_TPREL;
8076 break;
8077 }
8078 continue;
8079
8080 case R_PPC64_TLSLD:
8081 if (!is_local)
8082 continue;
8083 /* Fall through. */
8084 case R_PPC64_TLSGD:
8085 if (rel + 1 < relend
8086 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8087 {
8088 if (pass != 0
8089 && (ELF64_R_TYPE (rel[1].r_info)
8090 != R_PPC64_PLTSEQ)
8091 && (ELF64_R_TYPE (rel[1].r_info)
8092 != R_PPC64_PLTSEQ_NOTOC))
8093 {
8094 r_symndx = ELF64_R_SYM (rel[1].r_info);
8095 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8096 r_symndx, ibfd))
8097 goto err_free_rel;
8098 if (h != NULL)
8099 {
8100 struct plt_entry *ent = NULL;
8101
8102 for (ent = h->plt.plist;
8103 ent != NULL;
8104 ent = ent->next)
8105 if (ent->addend == rel[1].r_addend)
8106 break;
8107
8108 if (ent != NULL
8109 && ent->plt.refcount > 0)
8110 ent->plt.refcount -= 1;
8111 }
8112 }
8113 continue;
8114 }
8115 found_tls_get_addr_arg = 1;
8116 /* Fall through. */
8117
8118 case R_PPC64_TLS:
8119 case R_PPC64_TOC16:
8120 case R_PPC64_TOC16_LO:
8121 if (sym_sec == NULL || sym_sec != toc)
8122 continue;
8123
8124 /* Mark this toc entry as referenced by a TLS
8125 code sequence. We can do that now in the
8126 case of R_PPC64_TLS, and after checking for
8127 tls_get_addr for the TOC16 relocs. */
8128 if (toc_ref == NULL)
8129 toc_ref
8130 = bfd_zmalloc (toc->output_section->rawsize / 8);
8131 if (toc_ref == NULL)
8132 goto err_free_rel;
8133
8134 if (h != NULL)
8135 value = h->root.u.def.value;
8136 else
8137 value = sym->st_value;
8138 value += rel->r_addend;
8139 if (value % 8 != 0)
8140 continue;
8141 BFD_ASSERT (value < toc->size
8142 && toc->output_offset % 8 == 0);
8143 toc_ref_index = (value + toc->output_offset) / 8;
8144 if (r_type == R_PPC64_TLS
8145 || r_type == R_PPC64_TLSGD
8146 || r_type == R_PPC64_TLSLD)
8147 {
8148 toc_ref[toc_ref_index] = 1;
8149 continue;
8150 }
8151
8152 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8153 continue;
8154
8155 tls_set = 0;
8156 tls_clear = 0;
8157 expecting_tls_get_addr = 2;
8158 break;
8159
8160 case R_PPC64_TPREL64:
8161 if (pass == 0
8162 || sec != toc
8163 || toc_ref == NULL
8164 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8165 continue;
8166 if (ok_tprel)
8167 {
8168 /* IE -> LE */
8169 tls_set = TLS_EXPLICIT;
8170 tls_clear = TLS_TPREL;
8171 break;
8172 }
8173 continue;
8174
8175 case R_PPC64_DTPMOD64:
8176 if (pass == 0
8177 || sec != toc
8178 || toc_ref == NULL
8179 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8180 continue;
8181 if (rel + 1 < relend
8182 && (rel[1].r_info
8183 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8184 && rel[1].r_offset == rel->r_offset + 8)
8185 {
8186 if (ok_tprel)
8187 /* GD -> LE */
8188 tls_set = TLS_EXPLICIT | TLS_GD;
8189 else
8190 /* GD -> IE */
8191 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8192 tls_clear = TLS_GD;
8193 }
8194 else
8195 {
8196 if (!is_local)
8197 continue;
8198
8199 /* LD -> LE */
8200 tls_set = TLS_EXPLICIT;
8201 tls_clear = TLS_LD;
8202 }
8203 break;
8204
8205 default:
8206 continue;
8207 }
8208
8209 if (pass == 0)
8210 {
8211 if (!expecting_tls_get_addr
8212 || !sec->nomark_tls_get_addr)
8213 continue;
8214
8215 if (rel + 1 < relend
8216 && branch_reloc_hash_match (ibfd, rel + 1,
8217 htab->tls_get_addr_fd,
8218 htab->tga_desc_fd,
8219 htab->tls_get_addr,
8220 htab->tga_desc))
8221 {
8222 if (expecting_tls_get_addr == 2)
8223 {
8224 /* Check for toc tls entries. */
8225 unsigned char *toc_tls;
8226 int retval;
8227
8228 retval = get_tls_mask (&toc_tls, NULL, NULL,
8229 &locsyms,
8230 rel, ibfd);
8231 if (retval == 0)
8232 goto err_free_rel;
8233 if (toc_tls != NULL)
8234 {
8235 if ((*toc_tls & TLS_TLS) != 0
8236 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8237 found_tls_get_addr_arg = 1;
8238 if (retval > 1)
8239 toc_ref[toc_ref_index] = 1;
8240 }
8241 }
8242 continue;
8243 }
8244
8245 /* Uh oh, we didn't find the expected call. We
8246 could just mark this symbol to exclude it
8247 from tls optimization but it's safer to skip
8248 the entire optimization. */
8249 /* xgettext:c-format */
8250 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8251 "TLS optimization disabled\n"),
8252 ibfd, sec, rel->r_offset);
8253 ret = TRUE;
8254 goto err_free_rel;
8255 }
8256
8257 /* If we don't have old-style __tls_get_addr calls
8258 without TLSGD/TLSLD marker relocs, and we haven't
8259 found a new-style __tls_get_addr call with a
8260 marker for this symbol, then we either have a
8261 broken object file or an -mlongcall style
8262 indirect call to __tls_get_addr without a marker.
8263 Disable optimization in this case. */
8264 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8265 && (tls_set & TLS_EXPLICIT) == 0
8266 && !sec->nomark_tls_get_addr
8267 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8268 != (TLS_TLS | TLS_MARK)))
8269 continue;
8270
8271 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
8272 {
8273 struct plt_entry *ent = NULL;
8274
8275 if (htab->tls_get_addr_fd != NULL)
8276 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8277 ent != NULL;
8278 ent = ent->next)
8279 if (ent->addend == 0)
8280 break;
8281
8282 if (ent == NULL && htab->tga_desc_fd != NULL)
8283 for (ent = htab->tga_desc_fd->elf.plt.plist;
8284 ent != NULL;
8285 ent = ent->next)
8286 if (ent->addend == 0)
8287 break;
8288
8289 if (ent == NULL && htab->tls_get_addr != NULL)
8290 for (ent = htab->tls_get_addr->elf.plt.plist;
8291 ent != NULL;
8292 ent = ent->next)
8293 if (ent->addend == 0)
8294 break;
8295
8296 if (ent == NULL && htab->tga_desc != NULL)
8297 for (ent = htab->tga_desc->elf.plt.plist;
8298 ent != NULL;
8299 ent = ent->next)
8300 if (ent->addend == 0)
8301 break;
8302
8303 if (ent != NULL
8304 && ent->plt.refcount > 0)
8305 ent->plt.refcount -= 1;
8306 }
8307
8308 if (tls_clear == 0)
8309 continue;
8310
8311 if ((tls_set & TLS_EXPLICIT) == 0)
8312 {
8313 struct got_entry *ent;
8314
8315 /* Adjust got entry for this reloc. */
8316 if (h != NULL)
8317 ent = h->got.glist;
8318 else
8319 ent = elf_local_got_ents (ibfd)[r_symndx];
8320
8321 for (; ent != NULL; ent = ent->next)
8322 if (ent->addend == rel->r_addend
8323 && ent->owner == ibfd
8324 && ent->tls_type == tls_type)
8325 break;
8326 if (ent == NULL)
8327 abort ();
8328
8329 if (tls_set == 0)
8330 {
8331 /* We managed to get rid of a got entry. */
8332 if (ent->got.refcount > 0)
8333 ent->got.refcount -= 1;
8334 }
8335 }
8336 else
8337 {
8338 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8339 we'll lose one or two dyn relocs. */
8340 if (!dec_dynrel_count (rel->r_info, sec, info,
8341 NULL, h, sym))
8342 return FALSE;
8343
8344 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8345 {
8346 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8347 NULL, h, sym))
8348 return FALSE;
8349 }
8350 }
8351
8352 *tls_mask |= tls_set & 0xff;
8353 *tls_mask &= ~tls_clear;
8354 }
8355
8356 if (elf_section_data (sec)->relocs != relstart)
8357 free (relstart);
8358 }
8359
8360 if (locsyms != NULL
8361 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8362 {
8363 if (!info->keep_memory)
8364 free (locsyms);
8365 else
8366 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8367 }
8368 }
8369
8370 free (toc_ref);
8371 htab->do_tls_opt = 1;
8372 return TRUE;
8373 }
8374
8375 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8376 the values of any global symbols in a toc section that has been
8377 edited. Globals in toc sections should be a rarity, so this function
8378 sets a flag if any are found in toc sections other than the one just
8379 edited, so that further hash table traversals can be avoided. */
8380
8381 struct adjust_toc_info
8382 {
8383 asection *toc;
8384 unsigned long *skip;
8385 bfd_boolean global_toc_syms;
8386 };
8387
8388 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8389
8390 static bfd_boolean
8391 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8392 {
8393 struct ppc_link_hash_entry *eh;
8394 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8395 unsigned long i;
8396
8397 if (h->root.type != bfd_link_hash_defined
8398 && h->root.type != bfd_link_hash_defweak)
8399 return TRUE;
8400
8401 eh = ppc_elf_hash_entry (h);
8402 if (eh->adjust_done)
8403 return TRUE;
8404
8405 if (eh->elf.root.u.def.section == toc_inf->toc)
8406 {
8407 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8408 i = toc_inf->toc->rawsize >> 3;
8409 else
8410 i = eh->elf.root.u.def.value >> 3;
8411
8412 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8413 {
8414 _bfd_error_handler
8415 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8416 do
8417 ++i;
8418 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8419 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8420 }
8421
8422 eh->elf.root.u.def.value -= toc_inf->skip[i];
8423 eh->adjust_done = 1;
8424 }
8425 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8426 toc_inf->global_toc_syms = TRUE;
8427
8428 return TRUE;
8429 }
8430
8431 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8432 on a _LO variety toc/got reloc. */
8433
8434 static bfd_boolean
8435 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8436 {
8437 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8438 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8439 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8440 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8441 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8442 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8443 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8444 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8445 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8446 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8447 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8448 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8449 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8450 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8451 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8452 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8453 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8454 /* Exclude lfqu by testing reloc. If relocs are ever
8455 defined for the reduced D field in psq_lu then those
8456 will need testing too. */
8457 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8458 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
8459 && (insn & 1) == 0)
8460 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8461 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8462 /* Exclude stfqu. psq_stu as above for psq_lu. */
8463 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8464 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
8465 && (insn & 1) == 0));
8466 }
8467
8468 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8469 pld ra,symbol@got@pcrel
8470 load/store rt,off(ra)
8471 or
8472 pla ra,symbol@pcrel
8473 load/store rt,off(ra)
8474 may be translated to
8475 pload/pstore rt,symbol+off@pcrel
8476 nop.
8477 This function returns true if the optimization is possible, placing
8478 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8479
8480 On entry to this function, the linker has already determined that
8481 the pld can be replaced with pla: *PINSN1 is that pla insn,
8482 while *PINSN2 is the second instruction. */
8483
8484 static bfd_boolean
8485 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8486 {
8487 uint64_t insn1 = *pinsn1;
8488 uint64_t insn2 = *pinsn2;
8489 bfd_signed_vma off;
8490
8491 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8492 {
8493 /* Check that regs match. */
8494 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8495 return FALSE;
8496
8497 /* P8LS or PMLS form, non-pcrel. */
8498 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8499 return FALSE;
8500
8501 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8502 *pinsn2 = PNOP;
8503 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8504 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8505 return TRUE;
8506 }
8507
8508 insn2 >>= 32;
8509
8510 /* Check that regs match. */
8511 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8512 return FALSE;
8513
8514 switch ((insn2 >> 26) & 63)
8515 {
8516 default:
8517 return FALSE;
8518
8519 case 32: /* lwz */
8520 case 34: /* lbz */
8521 case 36: /* stw */
8522 case 38: /* stb */
8523 case 40: /* lhz */
8524 case 42: /* lha */
8525 case 44: /* sth */
8526 case 48: /* lfs */
8527 case 50: /* lfd */
8528 case 52: /* stfs */
8529 case 54: /* stfd */
8530 /* These are the PMLS cases, where we just need to tack a prefix
8531 on the insn. */
8532 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8533 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8534 off = insn2 & 0xffff;
8535 break;
8536
8537 case 58: /* lwa, ld */
8538 if ((insn2 & 1) != 0)
8539 return FALSE;
8540 insn1 = ((1ULL << 58) | (1ULL << 52)
8541 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8542 | (insn2 & (31ULL << 21)));
8543 off = insn2 & 0xfffc;
8544 break;
8545
8546 case 57: /* lxsd, lxssp */
8547 if ((insn2 & 3) < 2)
8548 return FALSE;
8549 insn1 = ((1ULL << 58) | (1ULL << 52)
8550 | ((40ULL | (insn2 & 3)) << 26)
8551 | (insn2 & (31ULL << 21)));
8552 off = insn2 & 0xfffc;
8553 break;
8554
8555 case 61: /* stxsd, stxssp, lxv, stxv */
8556 if ((insn2 & 3) == 0)
8557 return FALSE;
8558 else if ((insn2 & 3) >= 2)
8559 {
8560 insn1 = ((1ULL << 58) | (1ULL << 52)
8561 | ((44ULL | (insn2 & 3)) << 26)
8562 | (insn2 & (31ULL << 21)));
8563 off = insn2 & 0xfffc;
8564 }
8565 else
8566 {
8567 insn1 = ((1ULL << 58) | (1ULL << 52)
8568 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8569 | (insn2 & (31ULL << 21)));
8570 off = insn2 & 0xfff0;
8571 }
8572 break;
8573
8574 case 56: /* lq */
8575 insn1 = ((1ULL << 58) | (1ULL << 52)
8576 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8577 off = insn2 & 0xffff;
8578 break;
8579
8580 case 6: /* lxvp, stxvp */
8581 if ((insn2 & 0xe) != 0)
8582 return FALSE;
8583 insn1 = ((1ULL << 58) | (1ULL << 52)
8584 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8585 | (insn2 & (31ULL << 21)));
8586 off = insn2 & 0xfff0;
8587 break;
8588
8589 case 62: /* std, stq */
8590 if ((insn2 & 1) != 0)
8591 return FALSE;
8592 insn1 = ((1ULL << 58) | (1ULL << 52)
8593 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8594 | (insn2 & (31ULL << 21)));
8595 off = insn2 & 0xfffc;
8596 break;
8597 }
8598
8599 *pinsn1 = insn1;
8600 *pinsn2 = (uint64_t) NOP << 32;
8601 *poff = (off ^ 0x8000) - 0x8000;
8602 return TRUE;
8603 }
8604
8605 /* Examine all relocs referencing .toc sections in order to remove
8606 unused .toc entries. */
8607
8608 bfd_boolean
8609 ppc64_elf_edit_toc (struct bfd_link_info *info)
8610 {
8611 bfd *ibfd;
8612 struct adjust_toc_info toc_inf;
8613 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8614
8615 htab->do_toc_opt = 1;
8616 toc_inf.global_toc_syms = TRUE;
8617 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8618 {
8619 asection *toc, *sec;
8620 Elf_Internal_Shdr *symtab_hdr;
8621 Elf_Internal_Sym *local_syms;
8622 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8623 unsigned long *skip, *drop;
8624 unsigned char *used;
8625 unsigned char *keep, last, some_unused;
8626
8627 if (!is_ppc64_elf (ibfd))
8628 continue;
8629
8630 toc = bfd_get_section_by_name (ibfd, ".toc");
8631 if (toc == NULL
8632 || toc->size == 0
8633 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8634 || discarded_section (toc))
8635 continue;
8636
8637 toc_relocs = NULL;
8638 local_syms = NULL;
8639 symtab_hdr = &elf_symtab_hdr (ibfd);
8640
8641 /* Look at sections dropped from the final link. */
8642 skip = NULL;
8643 relstart = NULL;
8644 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8645 {
8646 if (sec->reloc_count == 0
8647 || !discarded_section (sec)
8648 || get_opd_info (sec)
8649 || (sec->flags & SEC_ALLOC) == 0
8650 || (sec->flags & SEC_DEBUGGING) != 0)
8651 continue;
8652
8653 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8654 if (relstart == NULL)
8655 goto error_ret;
8656
8657 /* Run through the relocs to see which toc entries might be
8658 unused. */
8659 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8660 {
8661 enum elf_ppc64_reloc_type r_type;
8662 unsigned long r_symndx;
8663 asection *sym_sec;
8664 struct elf_link_hash_entry *h;
8665 Elf_Internal_Sym *sym;
8666 bfd_vma val;
8667
8668 r_type = ELF64_R_TYPE (rel->r_info);
8669 switch (r_type)
8670 {
8671 default:
8672 continue;
8673
8674 case R_PPC64_TOC16:
8675 case R_PPC64_TOC16_LO:
8676 case R_PPC64_TOC16_HI:
8677 case R_PPC64_TOC16_HA:
8678 case R_PPC64_TOC16_DS:
8679 case R_PPC64_TOC16_LO_DS:
8680 break;
8681 }
8682
8683 r_symndx = ELF64_R_SYM (rel->r_info);
8684 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8685 r_symndx, ibfd))
8686 goto error_ret;
8687
8688 if (sym_sec != toc)
8689 continue;
8690
8691 if (h != NULL)
8692 val = h->root.u.def.value;
8693 else
8694 val = sym->st_value;
8695 val += rel->r_addend;
8696
8697 if (val >= toc->size)
8698 continue;
8699
8700 /* Anything in the toc ought to be aligned to 8 bytes.
8701 If not, don't mark as unused. */
8702 if (val & 7)
8703 continue;
8704
8705 if (skip == NULL)
8706 {
8707 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8708 if (skip == NULL)
8709 goto error_ret;
8710 }
8711
8712 skip[val >> 3] = ref_from_discarded;
8713 }
8714
8715 if (elf_section_data (sec)->relocs != relstart)
8716 free (relstart);
8717 }
8718
8719 /* For largetoc loads of address constants, we can convert
8720 . addis rx,2,addr@got@ha
8721 . ld ry,addr@got@l(rx)
8722 to
8723 . addis rx,2,addr@toc@ha
8724 . addi ry,rx,addr@toc@l
8725 when addr is within 2G of the toc pointer. This then means
8726 that the word storing "addr" in the toc is no longer needed. */
8727
8728 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8729 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8730 && toc->reloc_count != 0)
8731 {
8732 /* Read toc relocs. */
8733 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8734 info->keep_memory);
8735 if (toc_relocs == NULL)
8736 goto error_ret;
8737
8738 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8739 {
8740 enum elf_ppc64_reloc_type r_type;
8741 unsigned long r_symndx;
8742 asection *sym_sec;
8743 struct elf_link_hash_entry *h;
8744 Elf_Internal_Sym *sym;
8745 bfd_vma val, addr;
8746
8747 r_type = ELF64_R_TYPE (rel->r_info);
8748 if (r_type != R_PPC64_ADDR64)
8749 continue;
8750
8751 r_symndx = ELF64_R_SYM (rel->r_info);
8752 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8753 r_symndx, ibfd))
8754 goto error_ret;
8755
8756 if (sym_sec == NULL
8757 || sym_sec->output_section == NULL
8758 || discarded_section (sym_sec))
8759 continue;
8760
8761 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8762 continue;
8763
8764 if (h != NULL)
8765 {
8766 if (h->type == STT_GNU_IFUNC)
8767 continue;
8768 val = h->root.u.def.value;
8769 }
8770 else
8771 {
8772 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8773 continue;
8774 val = sym->st_value;
8775 }
8776 val += rel->r_addend;
8777 val += sym_sec->output_section->vma + sym_sec->output_offset;
8778
8779 /* We don't yet know the exact toc pointer value, but we
8780 know it will be somewhere in the toc section. Don't
8781 optimize if the difference from any possible toc
8782 pointer is outside [ff..f80008000, 7fff7fff]. */
8783 addr = toc->output_section->vma + TOC_BASE_OFF;
8784 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8785 continue;
8786
8787 addr = toc->output_section->vma + toc->output_section->rawsize;
8788 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8789 continue;
8790
8791 if (skip == NULL)
8792 {
8793 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8794 if (skip == NULL)
8795 goto error_ret;
8796 }
8797
8798 skip[rel->r_offset >> 3]
8799 |= can_optimize | ((rel - toc_relocs) << 2);
8800 }
8801 }
8802
8803 if (skip == NULL)
8804 continue;
8805
8806 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8807 if (used == NULL)
8808 {
8809 error_ret:
8810 if (symtab_hdr->contents != (unsigned char *) local_syms)
8811 free (local_syms);
8812 if (sec != NULL
8813 && elf_section_data (sec)->relocs != relstart)
8814 free (relstart);
8815 if (elf_section_data (toc)->relocs != toc_relocs)
8816 free (toc_relocs);
8817 free (skip);
8818 return FALSE;
8819 }
8820
8821 /* Now check all kept sections that might reference the toc.
8822 Check the toc itself last. */
8823 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8824 : ibfd->sections);
8825 sec != NULL;
8826 sec = (sec == toc ? NULL
8827 : sec->next == NULL ? toc
8828 : sec->next == toc && toc->next ? toc->next
8829 : sec->next))
8830 {
8831 int repeat;
8832
8833 if (sec->reloc_count == 0
8834 || discarded_section (sec)
8835 || get_opd_info (sec)
8836 || (sec->flags & SEC_ALLOC) == 0
8837 || (sec->flags & SEC_DEBUGGING) != 0)
8838 continue;
8839
8840 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8841 info->keep_memory);
8842 if (relstart == NULL)
8843 {
8844 free (used);
8845 goto error_ret;
8846 }
8847
8848 /* Mark toc entries referenced as used. */
8849 do
8850 {
8851 repeat = 0;
8852 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8853 {
8854 enum elf_ppc64_reloc_type r_type;
8855 unsigned long r_symndx;
8856 asection *sym_sec;
8857 struct elf_link_hash_entry *h;
8858 Elf_Internal_Sym *sym;
8859 bfd_vma val;
8860
8861 r_type = ELF64_R_TYPE (rel->r_info);
8862 switch (r_type)
8863 {
8864 case R_PPC64_TOC16:
8865 case R_PPC64_TOC16_LO:
8866 case R_PPC64_TOC16_HI:
8867 case R_PPC64_TOC16_HA:
8868 case R_PPC64_TOC16_DS:
8869 case R_PPC64_TOC16_LO_DS:
8870 /* In case we're taking addresses of toc entries. */
8871 case R_PPC64_ADDR64:
8872 break;
8873
8874 default:
8875 continue;
8876 }
8877
8878 r_symndx = ELF64_R_SYM (rel->r_info);
8879 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8880 r_symndx, ibfd))
8881 {
8882 free (used);
8883 goto error_ret;
8884 }
8885
8886 if (sym_sec != toc)
8887 continue;
8888
8889 if (h != NULL)
8890 val = h->root.u.def.value;
8891 else
8892 val = sym->st_value;
8893 val += rel->r_addend;
8894
8895 if (val >= toc->size)
8896 continue;
8897
8898 if ((skip[val >> 3] & can_optimize) != 0)
8899 {
8900 bfd_vma off;
8901 unsigned char opc;
8902
8903 switch (r_type)
8904 {
8905 case R_PPC64_TOC16_HA:
8906 break;
8907
8908 case R_PPC64_TOC16_LO_DS:
8909 off = rel->r_offset;
8910 off += (bfd_big_endian (ibfd) ? -2 : 3);
8911 if (!bfd_get_section_contents (ibfd, sec, &opc,
8912 off, 1))
8913 {
8914 free (used);
8915 goto error_ret;
8916 }
8917 if ((opc & (0x3f << 2)) == (58u << 2))
8918 break;
8919 /* Fall through. */
8920
8921 default:
8922 /* Wrong sort of reloc, or not a ld. We may
8923 as well clear ref_from_discarded too. */
8924 skip[val >> 3] = 0;
8925 }
8926 }
8927
8928 if (sec != toc)
8929 used[val >> 3] = 1;
8930 /* For the toc section, we only mark as used if this
8931 entry itself isn't unused. */
8932 else if ((used[rel->r_offset >> 3]
8933 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8934 && !used[val >> 3])
8935 {
8936 /* Do all the relocs again, to catch reference
8937 chains. */
8938 repeat = 1;
8939 used[val >> 3] = 1;
8940 }
8941 }
8942 }
8943 while (repeat);
8944
8945 if (elf_section_data (sec)->relocs != relstart)
8946 free (relstart);
8947 }
8948
8949 /* Merge the used and skip arrays. Assume that TOC
8950 doublewords not appearing as either used or unused belong
8951 to an entry more than one doubleword in size. */
8952 for (drop = skip, keep = used, last = 0, some_unused = 0;
8953 drop < skip + (toc->size + 7) / 8;
8954 ++drop, ++keep)
8955 {
8956 if (*keep)
8957 {
8958 *drop &= ~ref_from_discarded;
8959 if ((*drop & can_optimize) != 0)
8960 some_unused = 1;
8961 last = 0;
8962 }
8963 else if ((*drop & ref_from_discarded) != 0)
8964 {
8965 some_unused = 1;
8966 last = ref_from_discarded;
8967 }
8968 else
8969 *drop = last;
8970 }
8971
8972 free (used);
8973
8974 if (some_unused)
8975 {
8976 bfd_byte *contents, *src;
8977 unsigned long off;
8978 Elf_Internal_Sym *sym;
8979 bfd_boolean local_toc_syms = FALSE;
8980
8981 /* Shuffle the toc contents, and at the same time convert the
8982 skip array from booleans into offsets. */
8983 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8984 goto error_ret;
8985
8986 elf_section_data (toc)->this_hdr.contents = contents;
8987
8988 for (src = contents, off = 0, drop = skip;
8989 src < contents + toc->size;
8990 src += 8, ++drop)
8991 {
8992 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8993 off += 8;
8994 else if (off != 0)
8995 {
8996 *drop = off;
8997 memcpy (src - off, src, 8);
8998 }
8999 }
9000 *drop = off;
9001 toc->rawsize = toc->size;
9002 toc->size = src - contents - off;
9003
9004 /* Adjust addends for relocs against the toc section sym,
9005 and optimize any accesses we can. */
9006 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9007 {
9008 if (sec->reloc_count == 0
9009 || discarded_section (sec))
9010 continue;
9011
9012 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9013 info->keep_memory);
9014 if (relstart == NULL)
9015 goto error_ret;
9016
9017 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9018 {
9019 enum elf_ppc64_reloc_type r_type;
9020 unsigned long r_symndx;
9021 asection *sym_sec;
9022 struct elf_link_hash_entry *h;
9023 bfd_vma val;
9024
9025 r_type = ELF64_R_TYPE (rel->r_info);
9026 switch (r_type)
9027 {
9028 default:
9029 continue;
9030
9031 case R_PPC64_TOC16:
9032 case R_PPC64_TOC16_LO:
9033 case R_PPC64_TOC16_HI:
9034 case R_PPC64_TOC16_HA:
9035 case R_PPC64_TOC16_DS:
9036 case R_PPC64_TOC16_LO_DS:
9037 case R_PPC64_ADDR64:
9038 break;
9039 }
9040
9041 r_symndx = ELF64_R_SYM (rel->r_info);
9042 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9043 r_symndx, ibfd))
9044 goto error_ret;
9045
9046 if (sym_sec != toc)
9047 continue;
9048
9049 if (h != NULL)
9050 val = h->root.u.def.value;
9051 else
9052 {
9053 val = sym->st_value;
9054 if (val != 0)
9055 local_toc_syms = TRUE;
9056 }
9057
9058 val += rel->r_addend;
9059
9060 if (val > toc->rawsize)
9061 val = toc->rawsize;
9062 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9063 continue;
9064 else if ((skip[val >> 3] & can_optimize) != 0)
9065 {
9066 Elf_Internal_Rela *tocrel
9067 = toc_relocs + (skip[val >> 3] >> 2);
9068 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9069
9070 switch (r_type)
9071 {
9072 case R_PPC64_TOC16_HA:
9073 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9074 break;
9075
9076 case R_PPC64_TOC16_LO_DS:
9077 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9078 break;
9079
9080 default:
9081 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9082 ppc_howto_init ();
9083 info->callbacks->einfo
9084 /* xgettext:c-format */
9085 (_("%H: %s references "
9086 "optimized away TOC entry\n"),
9087 ibfd, sec, rel->r_offset,
9088 ppc64_elf_howto_table[r_type]->name);
9089 bfd_set_error (bfd_error_bad_value);
9090 goto error_ret;
9091 }
9092 rel->r_addend = tocrel->r_addend;
9093 elf_section_data (sec)->relocs = relstart;
9094 continue;
9095 }
9096
9097 if (h != NULL || sym->st_value != 0)
9098 continue;
9099
9100 rel->r_addend -= skip[val >> 3];
9101 elf_section_data (sec)->relocs = relstart;
9102 }
9103
9104 if (elf_section_data (sec)->relocs != relstart)
9105 free (relstart);
9106 }
9107
9108 /* We shouldn't have local or global symbols defined in the TOC,
9109 but handle them anyway. */
9110 if (local_syms != NULL)
9111 for (sym = local_syms;
9112 sym < local_syms + symtab_hdr->sh_info;
9113 ++sym)
9114 if (sym->st_value != 0
9115 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9116 {
9117 unsigned long i;
9118
9119 if (sym->st_value > toc->rawsize)
9120 i = toc->rawsize >> 3;
9121 else
9122 i = sym->st_value >> 3;
9123
9124 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9125 {
9126 if (local_toc_syms)
9127 _bfd_error_handler
9128 (_("%s defined on removed toc entry"),
9129 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9130 do
9131 ++i;
9132 while ((skip[i] & (ref_from_discarded | can_optimize)));
9133 sym->st_value = (bfd_vma) i << 3;
9134 }
9135
9136 sym->st_value -= skip[i];
9137 symtab_hdr->contents = (unsigned char *) local_syms;
9138 }
9139
9140 /* Adjust any global syms defined in this toc input section. */
9141 if (toc_inf.global_toc_syms)
9142 {
9143 toc_inf.toc = toc;
9144 toc_inf.skip = skip;
9145 toc_inf.global_toc_syms = FALSE;
9146 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9147 &toc_inf);
9148 }
9149
9150 if (toc->reloc_count != 0)
9151 {
9152 Elf_Internal_Shdr *rel_hdr;
9153 Elf_Internal_Rela *wrel;
9154 bfd_size_type sz;
9155
9156 /* Remove unused toc relocs, and adjust those we keep. */
9157 if (toc_relocs == NULL)
9158 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9159 info->keep_memory);
9160 if (toc_relocs == NULL)
9161 goto error_ret;
9162
9163 wrel = toc_relocs;
9164 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9165 if ((skip[rel->r_offset >> 3]
9166 & (ref_from_discarded | can_optimize)) == 0)
9167 {
9168 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9169 wrel->r_info = rel->r_info;
9170 wrel->r_addend = rel->r_addend;
9171 ++wrel;
9172 }
9173 else if (!dec_dynrel_count (rel->r_info, toc, info,
9174 &local_syms, NULL, NULL))
9175 goto error_ret;
9176
9177 elf_section_data (toc)->relocs = toc_relocs;
9178 toc->reloc_count = wrel - toc_relocs;
9179 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9180 sz = rel_hdr->sh_entsize;
9181 rel_hdr->sh_size = toc->reloc_count * sz;
9182 }
9183 }
9184 else if (elf_section_data (toc)->relocs != toc_relocs)
9185 free (toc_relocs);
9186
9187 if (local_syms != NULL
9188 && symtab_hdr->contents != (unsigned char *) local_syms)
9189 {
9190 if (!info->keep_memory)
9191 free (local_syms);
9192 else
9193 symtab_hdr->contents = (unsigned char *) local_syms;
9194 }
9195 free (skip);
9196 }
9197
9198 /* Look for cases where we can change an indirect GOT access to
9199 a GOT relative or PC relative access, possibly reducing the
9200 number of GOT entries. */
9201 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9202 {
9203 asection *sec;
9204 Elf_Internal_Shdr *symtab_hdr;
9205 Elf_Internal_Sym *local_syms;
9206 Elf_Internal_Rela *relstart, *rel;
9207 bfd_vma got;
9208
9209 if (!is_ppc64_elf (ibfd))
9210 continue;
9211
9212 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9213 continue;
9214
9215 sec = ppc64_elf_tdata (ibfd)->got;
9216 got = 0;
9217 if (sec != NULL)
9218 got = sec->output_section->vma + sec->output_offset + 0x8000;
9219
9220 local_syms = NULL;
9221 symtab_hdr = &elf_symtab_hdr (ibfd);
9222
9223 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9224 {
9225 if (sec->reloc_count == 0
9226 || !ppc64_elf_section_data (sec)->has_optrel
9227 || discarded_section (sec))
9228 continue;
9229
9230 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9231 info->keep_memory);
9232 if (relstart == NULL)
9233 {
9234 got_error_ret:
9235 if (symtab_hdr->contents != (unsigned char *) local_syms)
9236 free (local_syms);
9237 if (sec != NULL
9238 && elf_section_data (sec)->relocs != relstart)
9239 free (relstart);
9240 return FALSE;
9241 }
9242
9243 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9244 {
9245 enum elf_ppc64_reloc_type r_type;
9246 unsigned long r_symndx;
9247 Elf_Internal_Sym *sym;
9248 asection *sym_sec;
9249 struct elf_link_hash_entry *h;
9250 struct got_entry *ent;
9251 bfd_vma val, pc;
9252 unsigned char buf[8];
9253 unsigned int insn;
9254 enum {no_check, check_lo, check_ha} insn_check;
9255
9256 r_type = ELF64_R_TYPE (rel->r_info);
9257 switch (r_type)
9258 {
9259 default:
9260 insn_check = no_check;
9261 break;
9262
9263 case R_PPC64_PLT16_HA:
9264 case R_PPC64_GOT_TLSLD16_HA:
9265 case R_PPC64_GOT_TLSGD16_HA:
9266 case R_PPC64_GOT_TPREL16_HA:
9267 case R_PPC64_GOT_DTPREL16_HA:
9268 case R_PPC64_GOT16_HA:
9269 case R_PPC64_TOC16_HA:
9270 insn_check = check_ha;
9271 break;
9272
9273 case R_PPC64_PLT16_LO:
9274 case R_PPC64_PLT16_LO_DS:
9275 case R_PPC64_GOT_TLSLD16_LO:
9276 case R_PPC64_GOT_TLSGD16_LO:
9277 case R_PPC64_GOT_TPREL16_LO_DS:
9278 case R_PPC64_GOT_DTPREL16_LO_DS:
9279 case R_PPC64_GOT16_LO:
9280 case R_PPC64_GOT16_LO_DS:
9281 case R_PPC64_TOC16_LO:
9282 case R_PPC64_TOC16_LO_DS:
9283 insn_check = check_lo;
9284 break;
9285 }
9286
9287 if (insn_check != no_check)
9288 {
9289 bfd_vma off = rel->r_offset & ~3;
9290
9291 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9292 goto got_error_ret;
9293
9294 insn = bfd_get_32 (ibfd, buf);
9295 if (insn_check == check_lo
9296 ? !ok_lo_toc_insn (insn, r_type)
9297 : ((insn & ((0x3fu << 26) | 0x1f << 16))
9298 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9299 {
9300 char str[12];
9301
9302 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9303 sprintf (str, "%#08x", insn);
9304 info->callbacks->einfo
9305 /* xgettext:c-format */
9306 (_("%H: got/toc optimization is not supported for"
9307 " %s instruction\n"),
9308 ibfd, sec, rel->r_offset & ~3, str);
9309 continue;
9310 }
9311 }
9312
9313 switch (r_type)
9314 {
9315 /* Note that we don't delete GOT entries for
9316 R_PPC64_GOT16_DS since we'd need a lot more
9317 analysis. For starters, the preliminary layout is
9318 before the GOT, PLT, dynamic sections and stubs are
9319 laid out. Then we'd need to allow for changes in
9320 distance between sections caused by alignment. */
9321 default:
9322 continue;
9323
9324 case R_PPC64_GOT16_HA:
9325 case R_PPC64_GOT16_LO_DS:
9326 case R_PPC64_GOT_PCREL34:
9327 break;
9328 }
9329
9330 r_symndx = ELF64_R_SYM (rel->r_info);
9331 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9332 r_symndx, ibfd))
9333 goto got_error_ret;
9334
9335 if (sym_sec == NULL
9336 || sym_sec->output_section == NULL
9337 || discarded_section (sym_sec))
9338 continue;
9339
9340 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9341 continue;
9342
9343 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9344 continue;
9345
9346 if (h != NULL)
9347 val = h->root.u.def.value;
9348 else
9349 val = sym->st_value;
9350 val += rel->r_addend;
9351 val += sym_sec->output_section->vma + sym_sec->output_offset;
9352
9353 /* Fudge factor to allow for the fact that the preliminary layout
9354 isn't exact. Reduce limits by this factor. */
9355 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9356
9357 switch (r_type)
9358 {
9359 default:
9360 continue;
9361
9362 case R_PPC64_GOT16_HA:
9363 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9364 >= LIMIT_ADJUST (0x100000000ULL))
9365 continue;
9366
9367 if (!bfd_get_section_contents (ibfd, sec, buf,
9368 rel->r_offset & ~3, 4))
9369 goto got_error_ret;
9370 insn = bfd_get_32 (ibfd, buf);
9371 if (((insn & ((0x3fu << 26) | 0x1f << 16))
9372 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9373 continue;
9374 break;
9375
9376 case R_PPC64_GOT16_LO_DS:
9377 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9378 >= LIMIT_ADJUST (0x100000000ULL))
9379 continue;
9380 if (!bfd_get_section_contents (ibfd, sec, buf,
9381 rel->r_offset & ~3, 4))
9382 goto got_error_ret;
9383 insn = bfd_get_32 (ibfd, buf);
9384 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
9385 continue;
9386 break;
9387
9388 case R_PPC64_GOT_PCREL34:
9389 pc = rel->r_offset;
9390 pc += sec->output_section->vma + sec->output_offset;
9391 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9392 >= LIMIT_ADJUST (1ULL << 34))
9393 continue;
9394 if (!bfd_get_section_contents (ibfd, sec, buf,
9395 rel->r_offset & ~3, 8))
9396 goto got_error_ret;
9397 insn = bfd_get_32 (ibfd, buf);
9398 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9399 continue;
9400 insn = bfd_get_32 (ibfd, buf + 4);
9401 if ((insn & (0x3fu << 26)) != 57u << 26)
9402 continue;
9403 break;
9404 }
9405 #undef LIMIT_ADJUST
9406
9407 if (h != NULL)
9408 ent = h->got.glist;
9409 else
9410 {
9411 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9412 ent = local_got_ents[r_symndx];
9413 }
9414 for (; ent != NULL; ent = ent->next)
9415 if (ent->addend == rel->r_addend
9416 && ent->owner == ibfd
9417 && ent->tls_type == 0)
9418 break;
9419 BFD_ASSERT (ent && ent->got.refcount > 0);
9420 ent->got.refcount -= 1;
9421 }
9422
9423 if (elf_section_data (sec)->relocs != relstart)
9424 free (relstart);
9425 }
9426
9427 if (local_syms != NULL
9428 && symtab_hdr->contents != (unsigned char *) local_syms)
9429 {
9430 if (!info->keep_memory)
9431 free (local_syms);
9432 else
9433 symtab_hdr->contents = (unsigned char *) local_syms;
9434 }
9435 }
9436
9437 return TRUE;
9438 }
9439
9440 /* Return true iff input section I references the TOC using
9441 instructions limited to +/-32k offsets. */
9442
9443 bfd_boolean
9444 ppc64_elf_has_small_toc_reloc (asection *i)
9445 {
9446 return (is_ppc64_elf (i->owner)
9447 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9448 }
9449
9450 /* Allocate space for one GOT entry. */
9451
9452 static void
9453 allocate_got (struct elf_link_hash_entry *h,
9454 struct bfd_link_info *info,
9455 struct got_entry *gent)
9456 {
9457 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9458 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
9459 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9460 ? 16 : 8);
9461 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9462 ? 2 : 1) * sizeof (Elf64_External_Rela);
9463 asection *got = ppc64_elf_tdata (gent->owner)->got;
9464
9465 gent->got.offset = got->size;
9466 got->size += entsize;
9467
9468 if (h->type == STT_GNU_IFUNC)
9469 {
9470 htab->elf.irelplt->size += rentsize;
9471 htab->got_reli_size += rentsize;
9472 }
9473 else if (((bfd_link_pic (info)
9474 && !(gent->tls_type != 0
9475 && bfd_link_executable (info)
9476 && SYMBOL_REFERENCES_LOCAL (info, h)))
9477 || (htab->elf.dynamic_sections_created
9478 && h->dynindx != -1
9479 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9480 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9481 {
9482 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9483 relgot->size += rentsize;
9484 }
9485 }
9486
9487 /* This function merges got entries in the same toc group. */
9488
9489 static void
9490 merge_got_entries (struct got_entry **pent)
9491 {
9492 struct got_entry *ent, *ent2;
9493
9494 for (ent = *pent; ent != NULL; ent = ent->next)
9495 if (!ent->is_indirect)
9496 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9497 if (!ent2->is_indirect
9498 && ent2->addend == ent->addend
9499 && ent2->tls_type == ent->tls_type
9500 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9501 {
9502 ent2->is_indirect = TRUE;
9503 ent2->got.ent = ent;
9504 }
9505 }
9506
9507 /* If H is undefined, make it dynamic if that makes sense. */
9508
9509 static bfd_boolean
9510 ensure_undef_dynamic (struct bfd_link_info *info,
9511 struct elf_link_hash_entry *h)
9512 {
9513 struct elf_link_hash_table *htab = elf_hash_table (info);
9514
9515 if (htab->dynamic_sections_created
9516 && ((info->dynamic_undefined_weak != 0
9517 && h->root.type == bfd_link_hash_undefweak)
9518 || h->root.type == bfd_link_hash_undefined)
9519 && h->dynindx == -1
9520 && !h->forced_local
9521 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9522 return bfd_elf_link_record_dynamic_symbol (info, h);
9523 return TRUE;
9524 }
9525
9526 /* Allocate space in .plt, .got and associated reloc sections for
9527 dynamic relocs. */
9528
9529 static bfd_boolean
9530 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9531 {
9532 struct bfd_link_info *info;
9533 struct ppc_link_hash_table *htab;
9534 asection *s;
9535 struct ppc_link_hash_entry *eh;
9536 struct got_entry **pgent, *gent;
9537
9538 if (h->root.type == bfd_link_hash_indirect)
9539 return TRUE;
9540
9541 info = (struct bfd_link_info *) inf;
9542 htab = ppc_hash_table (info);
9543 if (htab == NULL)
9544 return FALSE;
9545
9546 eh = ppc_elf_hash_entry (h);
9547 /* Run through the TLS GD got entries first if we're changing them
9548 to TPREL. */
9549 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9550 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9551 if (gent->got.refcount > 0
9552 && (gent->tls_type & TLS_GD) != 0)
9553 {
9554 /* This was a GD entry that has been converted to TPREL. If
9555 there happens to be a TPREL entry we can use that one. */
9556 struct got_entry *ent;
9557 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9558 if (ent->got.refcount > 0
9559 && (ent->tls_type & TLS_TPREL) != 0
9560 && ent->addend == gent->addend
9561 && ent->owner == gent->owner)
9562 {
9563 gent->got.refcount = 0;
9564 break;
9565 }
9566
9567 /* If not, then we'll be using our own TPREL entry. */
9568 if (gent->got.refcount != 0)
9569 gent->tls_type = TLS_TLS | TLS_TPREL;
9570 }
9571
9572 /* Remove any list entry that won't generate a word in the GOT before
9573 we call merge_got_entries. Otherwise we risk merging to empty
9574 entries. */
9575 pgent = &h->got.glist;
9576 while ((gent = *pgent) != NULL)
9577 if (gent->got.refcount > 0)
9578 {
9579 if ((gent->tls_type & TLS_LD) != 0
9580 && SYMBOL_REFERENCES_LOCAL (info, h))
9581 {
9582 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9583 *pgent = gent->next;
9584 }
9585 else
9586 pgent = &gent->next;
9587 }
9588 else
9589 *pgent = gent->next;
9590
9591 if (!htab->do_multi_toc)
9592 merge_got_entries (&h->got.glist);
9593
9594 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9595 if (!gent->is_indirect)
9596 {
9597 /* Ensure we catch all the cases where this symbol should
9598 be made dynamic. */
9599 if (!ensure_undef_dynamic (info, h))
9600 return FALSE;
9601
9602 if (!is_ppc64_elf (gent->owner))
9603 abort ();
9604
9605 allocate_got (h, info, gent);
9606 }
9607
9608 /* If no dynamic sections we can't have dynamic relocs, except for
9609 IFUNCs which are handled even in static executables. */
9610 if (!htab->elf.dynamic_sections_created
9611 && h->type != STT_GNU_IFUNC)
9612 h->dyn_relocs = NULL;
9613
9614 /* Discard relocs on undefined symbols that must be local. */
9615 else if (h->root.type == bfd_link_hash_undefined
9616 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9617 h->dyn_relocs = NULL;
9618
9619 /* Also discard relocs on undefined weak syms with non-default
9620 visibility, or when dynamic_undefined_weak says so. */
9621 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9622 h->dyn_relocs = NULL;
9623
9624 if (h->dyn_relocs != NULL)
9625 {
9626 struct elf_dyn_relocs *p, **pp;
9627
9628 /* In the shared -Bsymbolic case, discard space allocated for
9629 dynamic pc-relative relocs against symbols which turn out to
9630 be defined in regular objects. For the normal shared case,
9631 discard space for relocs that have become local due to symbol
9632 visibility changes. */
9633 if (bfd_link_pic (info))
9634 {
9635 /* Relocs that use pc_count are those that appear on a call
9636 insn, or certain REL relocs (see must_be_dyn_reloc) that
9637 can be generated via assembly. We want calls to
9638 protected symbols to resolve directly to the function
9639 rather than going via the plt. If people want function
9640 pointer comparisons to work as expected then they should
9641 avoid writing weird assembly. */
9642 if (SYMBOL_CALLS_LOCAL (info, h))
9643 {
9644 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
9645 {
9646 p->count -= p->pc_count;
9647 p->pc_count = 0;
9648 if (p->count == 0)
9649 *pp = p->next;
9650 else
9651 pp = &p->next;
9652 }
9653 }
9654
9655 if (h->dyn_relocs != NULL)
9656 {
9657 /* Ensure we catch all the cases where this symbol
9658 should be made dynamic. */
9659 if (!ensure_undef_dynamic (info, h))
9660 return FALSE;
9661 }
9662 }
9663
9664 /* For a fixed position executable, discard space for
9665 relocs against symbols which are not dynamic. */
9666 else if (h->type != STT_GNU_IFUNC)
9667 {
9668 if (h->dynamic_adjusted
9669 && !h->def_regular
9670 && !ELF_COMMON_DEF_P (h))
9671 {
9672 /* Ensure we catch all the cases where this symbol
9673 should be made dynamic. */
9674 if (!ensure_undef_dynamic (info, h))
9675 return FALSE;
9676
9677 /* But if that didn't work out, discard dynamic relocs. */
9678 if (h->dynindx == -1)
9679 h->dyn_relocs = NULL;
9680 }
9681 else
9682 h->dyn_relocs = NULL;
9683 }
9684
9685 /* Finally, allocate space. */
9686 for (p = h->dyn_relocs; p != NULL; p = p->next)
9687 {
9688 asection *sreloc = elf_section_data (p->sec)->sreloc;
9689 if (eh->elf.type == STT_GNU_IFUNC)
9690 sreloc = htab->elf.irelplt;
9691 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9692 }
9693 }
9694
9695 /* We might need a PLT entry when the symbol
9696 a) is dynamic, or
9697 b) is an ifunc, or
9698 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9699 d) has plt16 relocs and we are linking statically. */
9700 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9701 || h->type == STT_GNU_IFUNC
9702 || (h->needs_plt && h->dynamic_adjusted)
9703 || (h->needs_plt
9704 && h->def_regular
9705 && !htab->elf.dynamic_sections_created
9706 && !htab->can_convert_all_inline_plt
9707 && (ppc_elf_hash_entry (h)->tls_mask
9708 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9709 {
9710 struct plt_entry *pent;
9711 bfd_boolean doneone = FALSE;
9712 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9713 if (pent->plt.refcount > 0)
9714 {
9715 if (!htab->elf.dynamic_sections_created
9716 || h->dynindx == -1)
9717 {
9718 if (h->type == STT_GNU_IFUNC)
9719 {
9720 s = htab->elf.iplt;
9721 pent->plt.offset = s->size;
9722 s->size += PLT_ENTRY_SIZE (htab);
9723 s = htab->elf.irelplt;
9724 }
9725 else
9726 {
9727 s = htab->pltlocal;
9728 pent->plt.offset = s->size;
9729 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9730 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9731 }
9732 }
9733 else
9734 {
9735 /* If this is the first .plt entry, make room for the special
9736 first entry. */
9737 s = htab->elf.splt;
9738 if (s->size == 0)
9739 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9740
9741 pent->plt.offset = s->size;
9742
9743 /* Make room for this entry. */
9744 s->size += PLT_ENTRY_SIZE (htab);
9745
9746 /* Make room for the .glink code. */
9747 s = htab->glink;
9748 if (s->size == 0)
9749 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9750 if (htab->opd_abi)
9751 {
9752 /* We need bigger stubs past index 32767. */
9753 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9754 s->size += 4;
9755 s->size += 2*4;
9756 }
9757 else
9758 s->size += 4;
9759
9760 /* We also need to make an entry in the .rela.plt section. */
9761 s = htab->elf.srelplt;
9762 }
9763 if (s != NULL)
9764 s->size += sizeof (Elf64_External_Rela);
9765 doneone = TRUE;
9766 }
9767 else
9768 pent->plt.offset = (bfd_vma) -1;
9769 if (!doneone)
9770 {
9771 h->plt.plist = NULL;
9772 h->needs_plt = 0;
9773 }
9774 }
9775 else
9776 {
9777 h->plt.plist = NULL;
9778 h->needs_plt = 0;
9779 }
9780
9781 return TRUE;
9782 }
9783
9784 #define PPC_LO(v) ((v) & 0xffff)
9785 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9786 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9787 #define D34(v) \
9788 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9789 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9790
9791 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9792 to set up space for global entry stubs. These are put in glink,
9793 after the branch table. */
9794
9795 static bfd_boolean
9796 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9797 {
9798 struct bfd_link_info *info;
9799 struct ppc_link_hash_table *htab;
9800 struct plt_entry *pent;
9801 asection *s, *plt;
9802
9803 if (h->root.type == bfd_link_hash_indirect)
9804 return TRUE;
9805
9806 if (!h->pointer_equality_needed)
9807 return TRUE;
9808
9809 if (h->def_regular)
9810 return TRUE;
9811
9812 info = inf;
9813 htab = ppc_hash_table (info);
9814 if (htab == NULL)
9815 return FALSE;
9816
9817 s = htab->global_entry;
9818 plt = htab->elf.splt;
9819 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9820 if (pent->plt.offset != (bfd_vma) -1
9821 && pent->addend == 0)
9822 {
9823 /* For ELFv2, if this symbol is not defined in a regular file
9824 and we are not generating a shared library or pie, then we
9825 need to define the symbol in the executable on a call stub.
9826 This is to avoid text relocations. */
9827 bfd_vma off, stub_align, stub_off, stub_size;
9828 unsigned int align_power;
9829
9830 stub_size = 16;
9831 stub_off = s->size;
9832 if (htab->params->plt_stub_align >= 0)
9833 align_power = htab->params->plt_stub_align;
9834 else
9835 align_power = -htab->params->plt_stub_align;
9836 /* Setting section alignment is delayed until we know it is
9837 non-empty. Otherwise the .text output section will be
9838 aligned at least to plt_stub_align even when no global
9839 entry stubs are needed. */
9840 if (s->alignment_power < align_power)
9841 s->alignment_power = align_power;
9842 stub_align = (bfd_vma) 1 << align_power;
9843 if (htab->params->plt_stub_align >= 0
9844 || ((((stub_off + stub_size - 1) & -stub_align)
9845 - (stub_off & -stub_align))
9846 > ((stub_size - 1) & -stub_align)))
9847 stub_off = (stub_off + stub_align - 1) & -stub_align;
9848 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9849 off -= stub_off + s->output_offset + s->output_section->vma;
9850 /* Note that for --plt-stub-align negative we have a possible
9851 dependency between stub offset and size. Break that
9852 dependency by assuming the max stub size when calculating
9853 the stub offset. */
9854 if (PPC_HA (off) == 0)
9855 stub_size -= 4;
9856 h->root.type = bfd_link_hash_defined;
9857 h->root.u.def.section = s;
9858 h->root.u.def.value = stub_off;
9859 s->size = stub_off + stub_size;
9860 break;
9861 }
9862 return TRUE;
9863 }
9864
9865 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9866 read-only sections. */
9867
9868 static bfd_boolean
9869 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
9870 {
9871 asection *sec;
9872
9873 if (h->root.type == bfd_link_hash_indirect)
9874 return TRUE;
9875
9876 sec = _bfd_elf_readonly_dynrelocs (h);
9877 if (sec != NULL)
9878 {
9879 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9880
9881 info->flags |= DF_TEXTREL;
9882 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9883 " in read-only section `%pA'\n"),
9884 sec->owner, h->root.root.string, sec);
9885
9886 /* Not an error, just cut short the traversal. */
9887 return FALSE;
9888 }
9889 return TRUE;
9890 }
9891
9892 /* Set the sizes of the dynamic sections. */
9893
9894 static bfd_boolean
9895 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9896 struct bfd_link_info *info)
9897 {
9898 struct ppc_link_hash_table *htab;
9899 bfd *dynobj;
9900 asection *s;
9901 bfd_boolean relocs;
9902 bfd *ibfd;
9903 struct got_entry *first_tlsld;
9904
9905 htab = ppc_hash_table (info);
9906 if (htab == NULL)
9907 return FALSE;
9908
9909 dynobj = htab->elf.dynobj;
9910 if (dynobj == NULL)
9911 abort ();
9912
9913 if (htab->elf.dynamic_sections_created)
9914 {
9915 /* Set the contents of the .interp section to the interpreter. */
9916 if (bfd_link_executable (info) && !info->nointerp)
9917 {
9918 s = bfd_get_linker_section (dynobj, ".interp");
9919 if (s == NULL)
9920 abort ();
9921 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9922 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9923 }
9924 }
9925
9926 /* Set up .got offsets for local syms, and space for local dynamic
9927 relocs. */
9928 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9929 {
9930 struct got_entry **lgot_ents;
9931 struct got_entry **end_lgot_ents;
9932 struct plt_entry **local_plt;
9933 struct plt_entry **end_local_plt;
9934 unsigned char *lgot_masks;
9935 bfd_size_type locsymcount;
9936 Elf_Internal_Shdr *symtab_hdr;
9937
9938 if (!is_ppc64_elf (ibfd))
9939 continue;
9940
9941 for (s = ibfd->sections; s != NULL; s = s->next)
9942 {
9943 struct ppc_dyn_relocs *p;
9944
9945 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9946 {
9947 if (!bfd_is_abs_section (p->sec)
9948 && bfd_is_abs_section (p->sec->output_section))
9949 {
9950 /* Input section has been discarded, either because
9951 it is a copy of a linkonce section or due to
9952 linker script /DISCARD/, so we'll be discarding
9953 the relocs too. */
9954 }
9955 else if (p->count != 0)
9956 {
9957 asection *srel = elf_section_data (p->sec)->sreloc;
9958 if (p->ifunc)
9959 srel = htab->elf.irelplt;
9960 srel->size += p->count * sizeof (Elf64_External_Rela);
9961 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9962 info->flags |= DF_TEXTREL;
9963 }
9964 }
9965 }
9966
9967 lgot_ents = elf_local_got_ents (ibfd);
9968 if (!lgot_ents)
9969 continue;
9970
9971 symtab_hdr = &elf_symtab_hdr (ibfd);
9972 locsymcount = symtab_hdr->sh_info;
9973 end_lgot_ents = lgot_ents + locsymcount;
9974 local_plt = (struct plt_entry **) end_lgot_ents;
9975 end_local_plt = local_plt + locsymcount;
9976 lgot_masks = (unsigned char *) end_local_plt;
9977 s = ppc64_elf_tdata (ibfd)->got;
9978 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9979 {
9980 struct got_entry **pent, *ent;
9981
9982 pent = lgot_ents;
9983 while ((ent = *pent) != NULL)
9984 if (ent->got.refcount > 0)
9985 {
9986 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9987 {
9988 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9989 *pent = ent->next;
9990 }
9991 else
9992 {
9993 unsigned int ent_size = 8;
9994 unsigned int rel_size = sizeof (Elf64_External_Rela);
9995
9996 ent->got.offset = s->size;
9997 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9998 {
9999 ent_size *= 2;
10000 rel_size *= 2;
10001 }
10002 s->size += ent_size;
10003 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10004 {
10005 htab->elf.irelplt->size += rel_size;
10006 htab->got_reli_size += rel_size;
10007 }
10008 else if (bfd_link_pic (info)
10009 && !(ent->tls_type != 0
10010 && bfd_link_executable (info)))
10011 {
10012 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10013 srel->size += rel_size;
10014 }
10015 pent = &ent->next;
10016 }
10017 }
10018 else
10019 *pent = ent->next;
10020 }
10021
10022 /* Allocate space for plt calls to local syms. */
10023 lgot_masks = (unsigned char *) end_local_plt;
10024 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
10025 {
10026 struct plt_entry *ent;
10027
10028 for (ent = *local_plt; ent != NULL; ent = ent->next)
10029 if (ent->plt.refcount > 0)
10030 {
10031 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10032 {
10033 s = htab->elf.iplt;
10034 ent->plt.offset = s->size;
10035 s->size += PLT_ENTRY_SIZE (htab);
10036 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10037 }
10038 else if (htab->can_convert_all_inline_plt
10039 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
10040 ent->plt.offset = (bfd_vma) -1;
10041 else
10042 {
10043 s = htab->pltlocal;
10044 ent->plt.offset = s->size;
10045 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10046 if (bfd_link_pic (info))
10047 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10048 }
10049 }
10050 else
10051 ent->plt.offset = (bfd_vma) -1;
10052 }
10053 }
10054
10055 /* Allocate global sym .plt and .got entries, and space for global
10056 sym dynamic relocs. */
10057 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10058
10059 if (!htab->opd_abi && !bfd_link_pic (info))
10060 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10061
10062 first_tlsld = NULL;
10063 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10064 {
10065 struct got_entry *ent;
10066
10067 if (!is_ppc64_elf (ibfd))
10068 continue;
10069
10070 ent = ppc64_tlsld_got (ibfd);
10071 if (ent->got.refcount > 0)
10072 {
10073 if (!htab->do_multi_toc && first_tlsld != NULL)
10074 {
10075 ent->is_indirect = TRUE;
10076 ent->got.ent = first_tlsld;
10077 }
10078 else
10079 {
10080 if (first_tlsld == NULL)
10081 first_tlsld = ent;
10082 s = ppc64_elf_tdata (ibfd)->got;
10083 ent->got.offset = s->size;
10084 ent->owner = ibfd;
10085 s->size += 16;
10086 if (bfd_link_dll (info))
10087 {
10088 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10089 srel->size += sizeof (Elf64_External_Rela);
10090 }
10091 }
10092 }
10093 else
10094 ent->got.offset = (bfd_vma) -1;
10095 }
10096
10097 /* We now have determined the sizes of the various dynamic sections.
10098 Allocate memory for them. */
10099 relocs = FALSE;
10100 for (s = dynobj->sections; s != NULL; s = s->next)
10101 {
10102 if ((s->flags & SEC_LINKER_CREATED) == 0)
10103 continue;
10104
10105 if (s == htab->brlt || s == htab->relbrlt)
10106 /* These haven't been allocated yet; don't strip. */
10107 continue;
10108 else if (s == htab->elf.sgot
10109 || s == htab->elf.splt
10110 || s == htab->elf.iplt
10111 || s == htab->pltlocal
10112 || s == htab->glink
10113 || s == htab->global_entry
10114 || s == htab->elf.sdynbss
10115 || s == htab->elf.sdynrelro)
10116 {
10117 /* Strip this section if we don't need it; see the
10118 comment below. */
10119 }
10120 else if (s == htab->glink_eh_frame)
10121 {
10122 if (!bfd_is_abs_section (s->output_section))
10123 /* Not sized yet. */
10124 continue;
10125 }
10126 else if (CONST_STRNEQ (s->name, ".rela"))
10127 {
10128 if (s->size != 0)
10129 {
10130 if (s != htab->elf.srelplt)
10131 relocs = TRUE;
10132
10133 /* We use the reloc_count field as a counter if we need
10134 to copy relocs into the output file. */
10135 s->reloc_count = 0;
10136 }
10137 }
10138 else
10139 {
10140 /* It's not one of our sections, so don't allocate space. */
10141 continue;
10142 }
10143
10144 if (s->size == 0)
10145 {
10146 /* If we don't need this section, strip it from the
10147 output file. This is mostly to handle .rela.bss and
10148 .rela.plt. We must create both sections in
10149 create_dynamic_sections, because they must be created
10150 before the linker maps input sections to output
10151 sections. The linker does that before
10152 adjust_dynamic_symbol is called, and it is that
10153 function which decides whether anything needs to go
10154 into these sections. */
10155 s->flags |= SEC_EXCLUDE;
10156 continue;
10157 }
10158
10159 if (bfd_is_abs_section (s->output_section))
10160 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10161 s->name);
10162
10163 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10164 continue;
10165
10166 /* Allocate memory for the section contents. We use bfd_zalloc
10167 here in case unused entries are not reclaimed before the
10168 section's contents are written out. This should not happen,
10169 but this way if it does we get a R_PPC64_NONE reloc in .rela
10170 sections instead of garbage.
10171 We also rely on the section contents being zero when writing
10172 the GOT and .dynrelro. */
10173 s->contents = bfd_zalloc (dynobj, s->size);
10174 if (s->contents == NULL)
10175 return FALSE;
10176 }
10177
10178 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10179 {
10180 if (!is_ppc64_elf (ibfd))
10181 continue;
10182
10183 s = ppc64_elf_tdata (ibfd)->got;
10184 if (s != NULL && s != htab->elf.sgot)
10185 {
10186 if (s->size == 0)
10187 s->flags |= SEC_EXCLUDE;
10188 else
10189 {
10190 s->contents = bfd_zalloc (ibfd, s->size);
10191 if (s->contents == NULL)
10192 return FALSE;
10193 }
10194 }
10195 s = ppc64_elf_tdata (ibfd)->relgot;
10196 if (s != NULL)
10197 {
10198 if (s->size == 0)
10199 s->flags |= SEC_EXCLUDE;
10200 else
10201 {
10202 s->contents = bfd_zalloc (ibfd, s->size);
10203 if (s->contents == NULL)
10204 return FALSE;
10205 relocs = TRUE;
10206 s->reloc_count = 0;
10207 }
10208 }
10209 }
10210
10211 if (htab->elf.dynamic_sections_created)
10212 {
10213 bfd_boolean tls_opt;
10214
10215 /* Add some entries to the .dynamic section. We fill in the
10216 values later, in ppc64_elf_finish_dynamic_sections, but we
10217 must add the entries now so that we get the correct size for
10218 the .dynamic section. The DT_DEBUG entry is filled in by the
10219 dynamic linker and used by the debugger. */
10220 #define add_dynamic_entry(TAG, VAL) \
10221 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10222
10223 if (bfd_link_executable (info))
10224 {
10225 if (!add_dynamic_entry (DT_DEBUG, 0))
10226 return FALSE;
10227 }
10228
10229 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10230 {
10231 if (!add_dynamic_entry (DT_PLTGOT, 0)
10232 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10233 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10234 || !add_dynamic_entry (DT_JMPREL, 0)
10235 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10236 return FALSE;
10237 }
10238
10239 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10240 {
10241 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10242 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10243 return FALSE;
10244 }
10245
10246 tls_opt = (htab->params->tls_get_addr_opt
10247 && ((htab->tls_get_addr_fd != NULL
10248 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10249 || (htab->tga_desc_fd != NULL
10250 && htab->tga_desc_fd->elf.plt.plist != NULL)));
10251 if (tls_opt || !htab->opd_abi)
10252 {
10253 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10254 return FALSE;
10255 }
10256
10257 if (relocs)
10258 {
10259 if (!add_dynamic_entry (DT_RELA, 0)
10260 || !add_dynamic_entry (DT_RELASZ, 0)
10261 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10262 return FALSE;
10263
10264 /* If any dynamic relocs apply to a read-only section,
10265 then we need a DT_TEXTREL entry. */
10266 if ((info->flags & DF_TEXTREL) == 0)
10267 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10268
10269 if ((info->flags & DF_TEXTREL) != 0)
10270 {
10271 if (!add_dynamic_entry (DT_TEXTREL, 0))
10272 return FALSE;
10273 }
10274 }
10275 }
10276 #undef add_dynamic_entry
10277
10278 return TRUE;
10279 }
10280
10281 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10282
10283 static bfd_boolean
10284 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10285 {
10286 if (h->plt.plist != NULL
10287 && !h->def_regular
10288 && !h->pointer_equality_needed)
10289 return FALSE;
10290
10291 return _bfd_elf_hash_symbol (h);
10292 }
10293
10294 /* Determine the type of stub needed, if any, for a call. */
10295
10296 static inline enum ppc_stub_type
10297 ppc_type_of_stub (asection *input_sec,
10298 const Elf_Internal_Rela *rel,
10299 struct ppc_link_hash_entry **hash,
10300 struct plt_entry **plt_ent,
10301 bfd_vma destination,
10302 unsigned long local_off)
10303 {
10304 struct ppc_link_hash_entry *h = *hash;
10305 bfd_vma location;
10306 bfd_vma branch_offset;
10307 bfd_vma max_branch_offset;
10308 enum elf_ppc64_reloc_type r_type;
10309
10310 if (h != NULL)
10311 {
10312 struct plt_entry *ent;
10313 struct ppc_link_hash_entry *fdh = h;
10314 if (h->oh != NULL
10315 && h->oh->is_func_descriptor)
10316 {
10317 fdh = ppc_follow_link (h->oh);
10318 *hash = fdh;
10319 }
10320
10321 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10322 if (ent->addend == rel->r_addend
10323 && ent->plt.offset != (bfd_vma) -1)
10324 {
10325 *plt_ent = ent;
10326 return ppc_stub_plt_call;
10327 }
10328
10329 /* Here, we know we don't have a plt entry. If we don't have a
10330 either a defined function descriptor or a defined entry symbol
10331 in a regular object file, then it is pointless trying to make
10332 any other type of stub. */
10333 if (!is_static_defined (&fdh->elf)
10334 && !is_static_defined (&h->elf))
10335 return ppc_stub_none;
10336 }
10337 else if (elf_local_got_ents (input_sec->owner) != NULL)
10338 {
10339 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10340 struct plt_entry **local_plt = (struct plt_entry **)
10341 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10342 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10343
10344 if (local_plt[r_symndx] != NULL)
10345 {
10346 struct plt_entry *ent;
10347
10348 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10349 if (ent->addend == rel->r_addend
10350 && ent->plt.offset != (bfd_vma) -1)
10351 {
10352 *plt_ent = ent;
10353 return ppc_stub_plt_call;
10354 }
10355 }
10356 }
10357
10358 /* Determine where the call point is. */
10359 location = (input_sec->output_offset
10360 + input_sec->output_section->vma
10361 + rel->r_offset);
10362
10363 branch_offset = destination - location;
10364 r_type = ELF64_R_TYPE (rel->r_info);
10365
10366 /* Determine if a long branch stub is needed. */
10367 max_branch_offset = 1 << 25;
10368 if (r_type == R_PPC64_REL14
10369 || r_type == R_PPC64_REL14_BRTAKEN
10370 || r_type == R_PPC64_REL14_BRNTAKEN)
10371 max_branch_offset = 1 << 15;
10372
10373 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10374 /* We need a stub. Figure out whether a long_branch or plt_branch
10375 is needed later. */
10376 return ppc_stub_long_branch;
10377
10378 return ppc_stub_none;
10379 }
10380
10381 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10382 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10383 . mflr %r12
10384 . bcl 20,31,1f
10385 .1: mflr %r11
10386 . mtlr %r12
10387 . lis %r12,xxx-1b@highest
10388 . ori %r12,%r12,xxx-1b@higher
10389 . sldi %r12,%r12,32
10390 . oris %r12,%r12,xxx-1b@high
10391 . ori %r12,%r12,xxx-1b@l
10392 . add/ldx %r12,%r11,%r12 */
10393
10394 static bfd_byte *
10395 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10396 {
10397 bfd_put_32 (abfd, MFLR_R12, p);
10398 p += 4;
10399 bfd_put_32 (abfd, BCL_20_31, p);
10400 p += 4;
10401 bfd_put_32 (abfd, MFLR_R11, p);
10402 p += 4;
10403 bfd_put_32 (abfd, MTLR_R12, p);
10404 p += 4;
10405 if (off + 0x8000 < 0x10000)
10406 {
10407 if (load)
10408 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10409 else
10410 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10411 p += 4;
10412 }
10413 else if (off + 0x80008000ULL < 0x100000000ULL)
10414 {
10415 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10416 p += 4;
10417 if (load)
10418 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10419 else
10420 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10421 p += 4;
10422 }
10423 else
10424 {
10425 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10426 {
10427 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10428 p += 4;
10429 }
10430 else
10431 {
10432 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10433 p += 4;
10434 if (((off >> 32) & 0xffff) != 0)
10435 {
10436 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10437 p += 4;
10438 }
10439 }
10440 if (((off >> 32) & 0xffffffffULL) != 0)
10441 {
10442 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10443 p += 4;
10444 }
10445 if (PPC_HI (off) != 0)
10446 {
10447 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10448 p += 4;
10449 }
10450 if (PPC_LO (off) != 0)
10451 {
10452 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10453 p += 4;
10454 }
10455 if (load)
10456 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10457 else
10458 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10459 p += 4;
10460 }
10461 return p;
10462 }
10463
10464 static unsigned int
10465 size_offset (bfd_vma off)
10466 {
10467 unsigned int size;
10468 if (off + 0x8000 < 0x10000)
10469 size = 4;
10470 else if (off + 0x80008000ULL < 0x100000000ULL)
10471 size = 8;
10472 else
10473 {
10474 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10475 size = 4;
10476 else
10477 {
10478 size = 4;
10479 if (((off >> 32) & 0xffff) != 0)
10480 size += 4;
10481 }
10482 if (((off >> 32) & 0xffffffffULL) != 0)
10483 size += 4;
10484 if (PPC_HI (off) != 0)
10485 size += 4;
10486 if (PPC_LO (off) != 0)
10487 size += 4;
10488 size += 4;
10489 }
10490 return size + 16;
10491 }
10492
10493 static unsigned int
10494 num_relocs_for_offset (bfd_vma off)
10495 {
10496 unsigned int num_rel;
10497 if (off + 0x8000 < 0x10000)
10498 num_rel = 1;
10499 else if (off + 0x80008000ULL < 0x100000000ULL)
10500 num_rel = 2;
10501 else
10502 {
10503 num_rel = 1;
10504 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10505 && ((off >> 32) & 0xffff) != 0)
10506 num_rel += 1;
10507 if (PPC_HI (off) != 0)
10508 num_rel += 1;
10509 if (PPC_LO (off) != 0)
10510 num_rel += 1;
10511 }
10512 return num_rel;
10513 }
10514
10515 static Elf_Internal_Rela *
10516 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10517 bfd_vma roff, bfd_vma targ, bfd_vma off)
10518 {
10519 bfd_vma relative_targ = targ - (roff - 8);
10520 if (bfd_big_endian (info->output_bfd))
10521 roff += 2;
10522 r->r_offset = roff;
10523 r->r_addend = relative_targ + roff;
10524 if (off + 0x8000 < 0x10000)
10525 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10526 else if (off + 0x80008000ULL < 0x100000000ULL)
10527 {
10528 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10529 ++r;
10530 roff += 4;
10531 r->r_offset = roff;
10532 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10533 r->r_addend = relative_targ + roff;
10534 }
10535 else
10536 {
10537 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10538 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10539 else
10540 {
10541 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10542 if (((off >> 32) & 0xffff) != 0)
10543 {
10544 ++r;
10545 roff += 4;
10546 r->r_offset = roff;
10547 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10548 r->r_addend = relative_targ + roff;
10549 }
10550 }
10551 if (((off >> 32) & 0xffffffffULL) != 0)
10552 roff += 4;
10553 if (PPC_HI (off) != 0)
10554 {
10555 ++r;
10556 roff += 4;
10557 r->r_offset = roff;
10558 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10559 r->r_addend = relative_targ + roff;
10560 }
10561 if (PPC_LO (off) != 0)
10562 {
10563 ++r;
10564 roff += 4;
10565 r->r_offset = roff;
10566 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10567 r->r_addend = relative_targ + roff;
10568 }
10569 }
10570 return r;
10571 }
10572
10573 static bfd_byte *
10574 build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10575 bfd_boolean load)
10576 {
10577 uint64_t insn;
10578 if (off - odd + (1ULL << 33) < 1ULL << 34)
10579 {
10580 off -= odd;
10581 if (odd)
10582 {
10583 bfd_put_32 (abfd, NOP, p);
10584 p += 4;
10585 }
10586 if (load)
10587 insn = PLD_R12_PC;
10588 else
10589 insn = PADDI_R12_PC;
10590 insn |= D34 (off);
10591 bfd_put_32 (abfd, insn >> 32, p);
10592 p += 4;
10593 bfd_put_32 (abfd, insn, p);
10594 }
10595 /* The minimum value for paddi is -0x200000000. The minimum value
10596 for li is -0x8000, which when shifted by 34 and added gives a
10597 minimum value of -0x2000200000000. The maximum value is
10598 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10599 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10600 {
10601 off -= 8 - odd;
10602 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10603 p += 4;
10604 if (!odd)
10605 {
10606 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10607 p += 4;
10608 }
10609 insn = PADDI_R12_PC | D34 (off);
10610 bfd_put_32 (abfd, insn >> 32, p);
10611 p += 4;
10612 bfd_put_32 (abfd, insn, p);
10613 p += 4;
10614 if (odd)
10615 {
10616 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10617 p += 4;
10618 }
10619 if (load)
10620 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10621 else
10622 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10623 }
10624 else
10625 {
10626 off -= odd + 8;
10627 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10628 p += 4;
10629 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10630 p += 4;
10631 if (odd)
10632 {
10633 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10634 p += 4;
10635 }
10636 insn = PADDI_R12_PC | D34 (off);
10637 bfd_put_32 (abfd, insn >> 32, p);
10638 p += 4;
10639 bfd_put_32 (abfd, insn, p);
10640 p += 4;
10641 if (!odd)
10642 {
10643 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10644 p += 4;
10645 }
10646 if (load)
10647 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10648 else
10649 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10650 }
10651 p += 4;
10652 return p;
10653 }
10654
10655 static unsigned int
10656 size_power10_offset (bfd_vma off, int odd)
10657 {
10658 if (off - odd + (1ULL << 33) < 1ULL << 34)
10659 return odd + 8;
10660 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10661 return 20;
10662 else
10663 return 24;
10664 }
10665
10666 static unsigned int
10667 num_relocs_for_power10_offset (bfd_vma off, int odd)
10668 {
10669 if (off - odd + (1ULL << 33) < 1ULL << 34)
10670 return 1;
10671 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10672 return 2;
10673 else
10674 return 3;
10675 }
10676
10677 static Elf_Internal_Rela *
10678 emit_relocs_for_power10_offset (struct bfd_link_info *info,
10679 Elf_Internal_Rela *r, bfd_vma roff,
10680 bfd_vma targ, bfd_vma off, int odd)
10681 {
10682 if (off - odd + (1ULL << 33) < 1ULL << 34)
10683 roff += odd;
10684 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10685 {
10686 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10687 r->r_offset = roff + d_offset;
10688 r->r_addend = targ + 8 - odd - d_offset;
10689 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10690 ++r;
10691 roff += 8 - odd;
10692 }
10693 else
10694 {
10695 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10696 r->r_offset = roff + d_offset;
10697 r->r_addend = targ + 8 + odd - d_offset;
10698 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10699 ++r;
10700 roff += 4;
10701 r->r_offset = roff + d_offset;
10702 r->r_addend = targ + 4 + odd - d_offset;
10703 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10704 ++r;
10705 roff += 4 + odd;
10706 }
10707 r->r_offset = roff;
10708 r->r_addend = targ;
10709 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10710 return r;
10711 }
10712
10713 /* Emit .eh_frame opcode to advance pc by DELTA. */
10714
10715 static bfd_byte *
10716 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10717 {
10718 delta /= 4;
10719 if (delta < 64)
10720 *eh++ = DW_CFA_advance_loc + delta;
10721 else if (delta < 256)
10722 {
10723 *eh++ = DW_CFA_advance_loc1;
10724 *eh++ = delta;
10725 }
10726 else if (delta < 65536)
10727 {
10728 *eh++ = DW_CFA_advance_loc2;
10729 bfd_put_16 (abfd, delta, eh);
10730 eh += 2;
10731 }
10732 else
10733 {
10734 *eh++ = DW_CFA_advance_loc4;
10735 bfd_put_32 (abfd, delta, eh);
10736 eh += 4;
10737 }
10738 return eh;
10739 }
10740
10741 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10742
10743 static unsigned int
10744 eh_advance_size (unsigned int delta)
10745 {
10746 if (delta < 64 * 4)
10747 /* DW_CFA_advance_loc+[1..63]. */
10748 return 1;
10749 if (delta < 256 * 4)
10750 /* DW_CFA_advance_loc1, byte. */
10751 return 2;
10752 if (delta < 65536 * 4)
10753 /* DW_CFA_advance_loc2, 2 bytes. */
10754 return 3;
10755 /* DW_CFA_advance_loc4, 4 bytes. */
10756 return 5;
10757 }
10758
10759 /* With power7 weakly ordered memory model, it is possible for ld.so
10760 to update a plt entry in one thread and have another thread see a
10761 stale zero toc entry. To avoid this we need some sort of acquire
10762 barrier in the call stub. One solution is to make the load of the
10763 toc word seem to appear to depend on the load of the function entry
10764 word. Another solution is to test for r2 being zero, and branch to
10765 the appropriate glink entry if so.
10766
10767 . fake dep barrier compare
10768 . ld 12,xxx(2) ld 12,xxx(2)
10769 . mtctr 12 mtctr 12
10770 . xor 11,12,12 ld 2,xxx+8(2)
10771 . add 2,2,11 cmpldi 2,0
10772 . ld 2,xxx+8(2) bnectr+
10773 . bctr b <glink_entry>
10774
10775 The solution involving the compare turns out to be faster, so
10776 that's what we use unless the branch won't reach. */
10777
10778 #define ALWAYS_USE_FAKE_DEP 0
10779 #define ALWAYS_EMIT_R2SAVE 0
10780
10781 static inline unsigned int
10782 plt_stub_size (struct ppc_link_hash_table *htab,
10783 struct ppc_stub_hash_entry *stub_entry,
10784 bfd_vma off)
10785 {
10786 unsigned size;
10787
10788 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10789 {
10790 if (htab->power10_stubs)
10791 {
10792 bfd_vma start = (stub_entry->stub_offset
10793 + stub_entry->group->stub_sec->output_offset
10794 + stub_entry->group->stub_sec->output_section->vma);
10795 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10796 start += 4;
10797 size = 8 + size_power10_offset (off, start & 4);
10798 }
10799 else
10800 size = 8 + size_offset (off - 8);
10801 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10802 size += 4;
10803 return size;
10804 }
10805
10806 size = 12;
10807 if (ALWAYS_EMIT_R2SAVE
10808 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10809 size += 4;
10810 if (PPC_HA (off) != 0)
10811 size += 4;
10812 if (htab->opd_abi)
10813 {
10814 size += 4;
10815 if (htab->params->plt_static_chain)
10816 size += 4;
10817 if (htab->params->plt_thread_safe
10818 && htab->elf.dynamic_sections_created
10819 && stub_entry->h != NULL
10820 && stub_entry->h->elf.dynindx != -1)
10821 size += 8;
10822 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10823 size += 4;
10824 }
10825 if (stub_entry->h != NULL
10826 && is_tls_get_addr (&stub_entry->h->elf, htab)
10827 && htab->params->tls_get_addr_opt)
10828 {
10829 if (htab->params->no_tls_get_addr_regsave)
10830 {
10831 size += 7 * 4;
10832 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10833 size += 6 * 4;
10834 }
10835 else
10836 {
10837 size += 30 * 4;
10838 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10839 size += 4;
10840 }
10841 }
10842 return size;
10843 }
10844
10845 /* Depending on the sign of plt_stub_align:
10846 If positive, return the padding to align to a 2**plt_stub_align
10847 boundary.
10848 If negative, if this stub would cross fewer 2**plt_stub_align
10849 boundaries if we align, then return the padding needed to do so. */
10850
10851 static inline unsigned int
10852 plt_stub_pad (struct ppc_link_hash_table *htab,
10853 struct ppc_stub_hash_entry *stub_entry,
10854 bfd_vma plt_off)
10855 {
10856 int stub_align;
10857 unsigned stub_size;
10858 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10859
10860 if (htab->params->plt_stub_align >= 0)
10861 {
10862 stub_align = 1 << htab->params->plt_stub_align;
10863 if ((stub_off & (stub_align - 1)) != 0)
10864 return stub_align - (stub_off & (stub_align - 1));
10865 return 0;
10866 }
10867
10868 stub_align = 1 << -htab->params->plt_stub_align;
10869 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10870 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10871 > ((stub_size - 1) & -stub_align))
10872 return stub_align - (stub_off & (stub_align - 1));
10873 return 0;
10874 }
10875
10876 /* Build a .plt call stub. */
10877
10878 static inline bfd_byte *
10879 build_plt_stub (struct ppc_link_hash_table *htab,
10880 struct ppc_stub_hash_entry *stub_entry,
10881 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10882 {
10883 bfd *obfd = htab->params->stub_bfd;
10884 bfd_boolean plt_load_toc = htab->opd_abi;
10885 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10886 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10887 && htab->elf.dynamic_sections_created
10888 && stub_entry->h != NULL
10889 && stub_entry->h->elf.dynindx != -1);
10890 bfd_boolean use_fake_dep = plt_thread_safe;
10891 bfd_vma cmp_branch_off = 0;
10892
10893 if (!ALWAYS_USE_FAKE_DEP
10894 && plt_load_toc
10895 && plt_thread_safe
10896 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
10897 && htab->params->tls_get_addr_opt))
10898 {
10899 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10900 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10901 / PLT_ENTRY_SIZE (htab));
10902 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10903 bfd_vma to, from;
10904
10905 if (pltindex > 32768)
10906 glinkoff += (pltindex - 32768) * 4;
10907 to = (glinkoff
10908 + htab->glink->output_offset
10909 + htab->glink->output_section->vma);
10910 from = (p - stub_entry->group->stub_sec->contents
10911 + 4 * (ALWAYS_EMIT_R2SAVE
10912 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10913 + 4 * (PPC_HA (offset) != 0)
10914 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10915 != PPC_HA (offset))
10916 + 4 * (plt_static_chain != 0)
10917 + 20
10918 + stub_entry->group->stub_sec->output_offset
10919 + stub_entry->group->stub_sec->output_section->vma);
10920 cmp_branch_off = to - from;
10921 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10922 }
10923
10924 if (PPC_HA (offset) != 0)
10925 {
10926 if (r != NULL)
10927 {
10928 if (ALWAYS_EMIT_R2SAVE
10929 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10930 r[0].r_offset += 4;
10931 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10932 r[1].r_offset = r[0].r_offset + 4;
10933 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10934 r[1].r_addend = r[0].r_addend;
10935 if (plt_load_toc)
10936 {
10937 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10938 {
10939 r[2].r_offset = r[1].r_offset + 4;
10940 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10941 r[2].r_addend = r[0].r_addend;
10942 }
10943 else
10944 {
10945 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10946 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10947 r[2].r_addend = r[0].r_addend + 8;
10948 if (plt_static_chain)
10949 {
10950 r[3].r_offset = r[2].r_offset + 4;
10951 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10952 r[3].r_addend = r[0].r_addend + 16;
10953 }
10954 }
10955 }
10956 }
10957 if (ALWAYS_EMIT_R2SAVE
10958 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10959 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10960 if (plt_load_toc)
10961 {
10962 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10963 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10964 }
10965 else
10966 {
10967 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10968 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10969 }
10970 if (plt_load_toc
10971 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10972 {
10973 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10974 offset = 0;
10975 }
10976 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10977 if (plt_load_toc)
10978 {
10979 if (use_fake_dep)
10980 {
10981 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10982 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10983 }
10984 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10985 if (plt_static_chain)
10986 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10987 }
10988 }
10989 else
10990 {
10991 if (r != NULL)
10992 {
10993 if (ALWAYS_EMIT_R2SAVE
10994 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10995 r[0].r_offset += 4;
10996 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10997 if (plt_load_toc)
10998 {
10999 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
11000 {
11001 r[1].r_offset = r[0].r_offset + 4;
11002 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11003 r[1].r_addend = r[0].r_addend;
11004 }
11005 else
11006 {
11007 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11008 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11009 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11010 if (plt_static_chain)
11011 {
11012 r[2].r_offset = r[1].r_offset + 4;
11013 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11014 r[2].r_addend = r[0].r_addend + 8;
11015 }
11016 }
11017 }
11018 }
11019 if (ALWAYS_EMIT_R2SAVE
11020 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11021 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
11022 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
11023 if (plt_load_toc
11024 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
11025 {
11026 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11027 offset = 0;
11028 }
11029 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
11030 if (plt_load_toc)
11031 {
11032 if (use_fake_dep)
11033 {
11034 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11035 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11036 }
11037 if (plt_static_chain)
11038 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11039 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
11040 }
11041 }
11042 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
11043 {
11044 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11045 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
11046 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
11047 }
11048 else
11049 bfd_put_32 (obfd, BCTR, p), p += 4;
11050 return p;
11051 }
11052
11053 /* Build a special .plt call stub for __tls_get_addr. */
11054
11055 #define LD_R0_0R3 0xe8030000
11056 #define LD_R12_0R3 0xe9830000
11057 #define MR_R0_R3 0x7c601b78
11058 #define CMPDI_R0_0 0x2c200000
11059 #define ADD_R3_R12_R13 0x7c6c6a14
11060 #define BEQLR 0x4d820020
11061 #define MR_R3_R0 0x7c030378
11062 #define BCTRL 0x4e800421
11063
11064 static inline bfd_byte *
11065 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11066 struct ppc_stub_hash_entry *stub_entry,
11067 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
11068 {
11069 bfd *obfd = htab->params->stub_bfd;
11070 bfd_byte *loc = p;
11071 unsigned int i;
11072
11073 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
11074 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11075 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
11076 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11077 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11078 bfd_put_32 (obfd, BEQLR, p), p += 4;
11079 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
11080 if (htab->params->no_tls_get_addr_regsave)
11081 {
11082 if (r != NULL)
11083 r[0].r_offset += 7 * 4;
11084 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11085 return build_plt_stub (htab, stub_entry, p, offset, r);
11086
11087 bfd_put_32 (obfd, MFLR_R0, p);
11088 p += 4;
11089 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11090 p += 4;
11091
11092 if (r != NULL)
11093 r[0].r_offset += 2 * 4;
11094 p = build_plt_stub (htab, stub_entry, p, offset, r);
11095 bfd_put_32 (obfd, BCTRL, p - 4);
11096
11097 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11098 p += 4;
11099 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11100 p += 4;
11101 bfd_put_32 (obfd, MTLR_R0, p);
11102 p += 4;
11103 bfd_put_32 (obfd, BLR, p);
11104 p += 4;
11105 }
11106 else
11107 {
11108 p = tls_get_addr_prologue (obfd, p, htab);
11109
11110 if (r != NULL)
11111 r[0].r_offset += 18 * 4;
11112
11113 p = build_plt_stub (htab, stub_entry, p, offset, r);
11114 bfd_put_32 (obfd, BCTRL, p - 4);
11115
11116 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11117 {
11118 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11119 p += 4;
11120 }
11121
11122 p = tls_get_addr_epilogue (obfd, p, htab);
11123 }
11124
11125 if (htab->glink_eh_frame != NULL
11126 && htab->glink_eh_frame->size != 0)
11127 {
11128 bfd_byte *base, *eh;
11129
11130 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11131 eh = base + stub_entry->group->eh_size;
11132 if (htab->params->no_tls_get_addr_regsave)
11133 {
11134 unsigned int lr_used, delta;
11135 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11136 delta = lr_used - stub_entry->group->lr_restore;
11137 stub_entry->group->lr_restore = lr_used + 16;
11138 eh = eh_advance (htab->elf.dynobj, eh, delta);
11139 *eh++ = DW_CFA_offset_extended_sf;
11140 *eh++ = 65;
11141 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11142 *eh++ = DW_CFA_advance_loc + 4;
11143 }
11144 else
11145 {
11146 unsigned int cfa_updt, delta;
11147 /* After the bctrl, lr has been modified so we need to emit
11148 .eh_frame info saying the return address is on the stack. In
11149 fact we must put the EH info at or before the call rather
11150 than after it, because the EH info for a call needs to be
11151 specified by that point.
11152 See libgcc/unwind-dw2.c execute_cfa_program.
11153 Any stack pointer update must be described immediately after
11154 the instruction making the change, and since the stdu occurs
11155 after saving regs we put all the reg saves and the cfa
11156 change there. */
11157 cfa_updt = stub_entry->stub_offset + 18 * 4;
11158 delta = cfa_updt - stub_entry->group->lr_restore;
11159 stub_entry->group->lr_restore
11160 = stub_entry->stub_offset + (p - loc) - 4;
11161 eh = eh_advance (htab->elf.dynobj, eh, delta);
11162 *eh++ = DW_CFA_def_cfa_offset;
11163 if (htab->opd_abi)
11164 {
11165 *eh++ = 128;
11166 *eh++ = 1;
11167 }
11168 else
11169 *eh++ = 96;
11170 *eh++ = DW_CFA_offset_extended_sf;
11171 *eh++ = 65;
11172 *eh++ = (-16 / 8) & 0x7f;
11173 for (i = 4; i < 12; i++)
11174 {
11175 *eh++ = DW_CFA_offset + i;
11176 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11177 }
11178 *eh++ = (DW_CFA_advance_loc
11179 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11180 *eh++ = DW_CFA_def_cfa_offset;
11181 *eh++ = 0;
11182 for (i = 4; i < 12; i++)
11183 *eh++ = DW_CFA_restore + i;
11184 *eh++ = DW_CFA_advance_loc + 2;
11185 }
11186 *eh++ = DW_CFA_restore_extended;
11187 *eh++ = 65;
11188 stub_entry->group->eh_size = eh - base;
11189 }
11190 return p;
11191 }
11192
11193 static Elf_Internal_Rela *
11194 get_relocs (asection *sec, int count)
11195 {
11196 Elf_Internal_Rela *relocs;
11197 struct bfd_elf_section_data *elfsec_data;
11198
11199 elfsec_data = elf_section_data (sec);
11200 relocs = elfsec_data->relocs;
11201 if (relocs == NULL)
11202 {
11203 bfd_size_type relsize;
11204 relsize = sec->reloc_count * sizeof (*relocs);
11205 relocs = bfd_alloc (sec->owner, relsize);
11206 if (relocs == NULL)
11207 return NULL;
11208 elfsec_data->relocs = relocs;
11209 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11210 sizeof (Elf_Internal_Shdr));
11211 if (elfsec_data->rela.hdr == NULL)
11212 return NULL;
11213 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11214 * sizeof (Elf64_External_Rela));
11215 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
11216 sec->reloc_count = 0;
11217 }
11218 relocs += sec->reloc_count;
11219 sec->reloc_count += count;
11220 return relocs;
11221 }
11222
11223 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11224 forms, to the equivalent relocs against the global symbol given by
11225 STUB_ENTRY->H. */
11226
11227 static bfd_boolean
11228 use_global_in_relocs (struct ppc_link_hash_table *htab,
11229 struct ppc_stub_hash_entry *stub_entry,
11230 Elf_Internal_Rela *r, unsigned int num_rel)
11231 {
11232 struct elf_link_hash_entry **hashes;
11233 unsigned long symndx;
11234 struct ppc_link_hash_entry *h;
11235 bfd_vma symval;
11236
11237 /* Relocs are always against symbols in their own object file. Fake
11238 up global sym hashes for the stub bfd (which has no symbols). */
11239 hashes = elf_sym_hashes (htab->params->stub_bfd);
11240 if (hashes == NULL)
11241 {
11242 bfd_size_type hsize;
11243
11244 /* When called the first time, stub_globals will contain the
11245 total number of symbols seen during stub sizing. After
11246 allocating, stub_globals is used as an index to fill the
11247 hashes array. */
11248 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11249 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11250 if (hashes == NULL)
11251 return FALSE;
11252 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11253 htab->stub_globals = 1;
11254 }
11255 symndx = htab->stub_globals++;
11256 h = stub_entry->h;
11257 hashes[symndx] = &h->elf;
11258 if (h->oh != NULL && h->oh->is_func)
11259 h = ppc_follow_link (h->oh);
11260 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11261 || h->elf.root.type == bfd_link_hash_defweak);
11262 symval = defined_sym_val (&h->elf);
11263 while (num_rel-- != 0)
11264 {
11265 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11266 if (h->elf.root.u.def.section != stub_entry->target_section)
11267 {
11268 /* H is an opd symbol. The addend must be zero, and the
11269 branch reloc is the only one we can convert. */
11270 r->r_addend = 0;
11271 break;
11272 }
11273 else
11274 r->r_addend -= symval;
11275 --r;
11276 }
11277 return TRUE;
11278 }
11279
11280 static bfd_vma
11281 get_r2off (struct bfd_link_info *info,
11282 struct ppc_stub_hash_entry *stub_entry)
11283 {
11284 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11285 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11286
11287 if (r2off == 0)
11288 {
11289 /* Support linking -R objects. Get the toc pointer from the
11290 opd entry. */
11291 char buf[8];
11292 if (!htab->opd_abi)
11293 return r2off;
11294 asection *opd = stub_entry->h->elf.root.u.def.section;
11295 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11296
11297 if (strcmp (opd->name, ".opd") != 0
11298 || opd->reloc_count != 0)
11299 {
11300 info->callbacks->einfo
11301 (_("%P: cannot find opd entry toc for `%pT'\n"),
11302 stub_entry->h->elf.root.root.string);
11303 bfd_set_error (bfd_error_bad_value);
11304 return (bfd_vma) -1;
11305 }
11306 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11307 return (bfd_vma) -1;
11308 r2off = bfd_get_64 (opd->owner, buf);
11309 r2off -= elf_gp (info->output_bfd);
11310 }
11311 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11312 return r2off;
11313 }
11314
11315 static bfd_boolean
11316 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11317 {
11318 struct ppc_stub_hash_entry *stub_entry;
11319 struct ppc_branch_hash_entry *br_entry;
11320 struct bfd_link_info *info;
11321 struct ppc_link_hash_table *htab;
11322 bfd_byte *loc;
11323 bfd_byte *p, *relp;
11324 bfd_vma targ, off;
11325 Elf_Internal_Rela *r;
11326 asection *plt;
11327 int num_rel;
11328 int odd;
11329
11330 /* Massage our args to the form they really have. */
11331 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11332 info = in_arg;
11333
11334 /* Fail if the target section could not be assigned to an output
11335 section. The user should fix his linker script. */
11336 if (stub_entry->target_section != NULL
11337 && stub_entry->target_section->output_section == NULL
11338 && info->non_contiguous_regions)
11339 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11340 "Retry without --enable-non-contiguous-regions.\n"),
11341 stub_entry->target_section);
11342
11343 /* Same for the group. */
11344 if (stub_entry->group->stub_sec != NULL
11345 && stub_entry->group->stub_sec->output_section == NULL
11346 && info->non_contiguous_regions)
11347 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11348 "output section. Retry without "
11349 "--enable-non-contiguous-regions.\n"),
11350 stub_entry->group->stub_sec,
11351 stub_entry->target_section);
11352
11353 htab = ppc_hash_table (info);
11354 if (htab == NULL)
11355 return FALSE;
11356
11357 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11358 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11359
11360 htab->stub_count[stub_entry->stub_type - 1] += 1;
11361 switch (stub_entry->stub_type)
11362 {
11363 case ppc_stub_long_branch:
11364 case ppc_stub_long_branch_r2off:
11365 /* Branches are relative. This is where we are going to. */
11366 targ = (stub_entry->target_value
11367 + stub_entry->target_section->output_offset
11368 + stub_entry->target_section->output_section->vma);
11369 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11370
11371 /* And this is where we are coming from. */
11372 off = (stub_entry->stub_offset
11373 + stub_entry->group->stub_sec->output_offset
11374 + stub_entry->group->stub_sec->output_section->vma);
11375 off = targ - off;
11376
11377 p = loc;
11378 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11379 {
11380 bfd_vma r2off = get_r2off (info, stub_entry);
11381
11382 if (r2off == (bfd_vma) -1)
11383 {
11384 htab->stub_error = TRUE;
11385 return FALSE;
11386 }
11387 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11388 p += 4;
11389 if (PPC_HA (r2off) != 0)
11390 {
11391 bfd_put_32 (htab->params->stub_bfd,
11392 ADDIS_R2_R2 | PPC_HA (r2off), p);
11393 p += 4;
11394 }
11395 if (PPC_LO (r2off) != 0)
11396 {
11397 bfd_put_32 (htab->params->stub_bfd,
11398 ADDI_R2_R2 | PPC_LO (r2off), p);
11399 p += 4;
11400 }
11401 off -= p - loc;
11402 }
11403 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11404 p += 4;
11405
11406 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11407 {
11408 _bfd_error_handler
11409 (_("long branch stub `%s' offset overflow"),
11410 stub_entry->root.string);
11411 htab->stub_error = TRUE;
11412 return FALSE;
11413 }
11414
11415 if (info->emitrelocations)
11416 {
11417 r = get_relocs (stub_entry->group->stub_sec, 1);
11418 if (r == NULL)
11419 return FALSE;
11420 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11421 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11422 r->r_addend = targ;
11423 if (stub_entry->h != NULL
11424 && !use_global_in_relocs (htab, stub_entry, r, 1))
11425 return FALSE;
11426 }
11427 break;
11428
11429 case ppc_stub_plt_branch:
11430 case ppc_stub_plt_branch_r2off:
11431 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11432 stub_entry->root.string + 9,
11433 FALSE, FALSE);
11434 if (br_entry == NULL)
11435 {
11436 _bfd_error_handler (_("can't find branch stub `%s'"),
11437 stub_entry->root.string);
11438 htab->stub_error = TRUE;
11439 return FALSE;
11440 }
11441
11442 targ = (stub_entry->target_value
11443 + stub_entry->target_section->output_offset
11444 + stub_entry->target_section->output_section->vma);
11445 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11446 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11447
11448 bfd_put_64 (htab->brlt->owner, targ,
11449 htab->brlt->contents + br_entry->offset);
11450
11451 if (br_entry->iter == htab->stub_iteration)
11452 {
11453 br_entry->iter = 0;
11454
11455 if (htab->relbrlt != NULL)
11456 {
11457 /* Create a reloc for the branch lookup table entry. */
11458 Elf_Internal_Rela rela;
11459 bfd_byte *rl;
11460
11461 rela.r_offset = (br_entry->offset
11462 + htab->brlt->output_offset
11463 + htab->brlt->output_section->vma);
11464 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11465 rela.r_addend = targ;
11466
11467 rl = htab->relbrlt->contents;
11468 rl += (htab->relbrlt->reloc_count++
11469 * sizeof (Elf64_External_Rela));
11470 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11471 }
11472 else if (info->emitrelocations)
11473 {
11474 r = get_relocs (htab->brlt, 1);
11475 if (r == NULL)
11476 return FALSE;
11477 /* brlt, being SEC_LINKER_CREATED does not go through the
11478 normal reloc processing. Symbols and offsets are not
11479 translated from input file to output file form, so
11480 set up the offset per the output file. */
11481 r->r_offset = (br_entry->offset
11482 + htab->brlt->output_offset
11483 + htab->brlt->output_section->vma);
11484 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11485 r->r_addend = targ;
11486 }
11487 }
11488
11489 targ = (br_entry->offset
11490 + htab->brlt->output_offset
11491 + htab->brlt->output_section->vma);
11492
11493 off = (elf_gp (info->output_bfd)
11494 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11495 off = targ - off;
11496
11497 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11498 {
11499 info->callbacks->einfo
11500 (_("%P: linkage table error against `%pT'\n"),
11501 stub_entry->root.string);
11502 bfd_set_error (bfd_error_bad_value);
11503 htab->stub_error = TRUE;
11504 return FALSE;
11505 }
11506
11507 if (info->emitrelocations)
11508 {
11509 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11510 if (r == NULL)
11511 return FALSE;
11512 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11513 if (bfd_big_endian (info->output_bfd))
11514 r[0].r_offset += 2;
11515 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11516 r[0].r_offset += 4;
11517 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11518 r[0].r_addend = targ;
11519 if (PPC_HA (off) != 0)
11520 {
11521 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11522 r[1].r_offset = r[0].r_offset + 4;
11523 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11524 r[1].r_addend = r[0].r_addend;
11525 }
11526 }
11527
11528 p = loc;
11529 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11530 {
11531 if (PPC_HA (off) != 0)
11532 {
11533 bfd_put_32 (htab->params->stub_bfd,
11534 ADDIS_R12_R2 | PPC_HA (off), p);
11535 p += 4;
11536 bfd_put_32 (htab->params->stub_bfd,
11537 LD_R12_0R12 | PPC_LO (off), p);
11538 }
11539 else
11540 bfd_put_32 (htab->params->stub_bfd,
11541 LD_R12_0R2 | PPC_LO (off), p);
11542 }
11543 else
11544 {
11545 bfd_vma r2off = get_r2off (info, stub_entry);
11546
11547 if (r2off == (bfd_vma) -1)
11548 {
11549 htab->stub_error = TRUE;
11550 return FALSE;
11551 }
11552
11553 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11554 p += 4;
11555 if (PPC_HA (off) != 0)
11556 {
11557 bfd_put_32 (htab->params->stub_bfd,
11558 ADDIS_R12_R2 | PPC_HA (off), p);
11559 p += 4;
11560 bfd_put_32 (htab->params->stub_bfd,
11561 LD_R12_0R12 | PPC_LO (off), p);
11562 }
11563 else
11564 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11565
11566 if (PPC_HA (r2off) != 0)
11567 {
11568 p += 4;
11569 bfd_put_32 (htab->params->stub_bfd,
11570 ADDIS_R2_R2 | PPC_HA (r2off), p);
11571 }
11572 if (PPC_LO (r2off) != 0)
11573 {
11574 p += 4;
11575 bfd_put_32 (htab->params->stub_bfd,
11576 ADDI_R2_R2 | PPC_LO (r2off), p);
11577 }
11578 }
11579 p += 4;
11580 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11581 p += 4;
11582 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11583 p += 4;
11584 break;
11585
11586 case ppc_stub_long_branch_notoc:
11587 case ppc_stub_long_branch_both:
11588 case ppc_stub_plt_branch_notoc:
11589 case ppc_stub_plt_branch_both:
11590 case ppc_stub_plt_call_notoc:
11591 case ppc_stub_plt_call_both:
11592 p = loc;
11593 off = (stub_entry->stub_offset
11594 + stub_entry->group->stub_sec->output_offset
11595 + stub_entry->group->stub_sec->output_section->vma);
11596 if (stub_entry->stub_type == ppc_stub_long_branch_both
11597 || stub_entry->stub_type == ppc_stub_plt_branch_both
11598 || stub_entry->stub_type == ppc_stub_plt_call_both)
11599 {
11600 off += 4;
11601 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11602 p += 4;
11603 }
11604 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11605 {
11606 targ = stub_entry->plt_ent->plt.offset & ~1;
11607 if (targ >= (bfd_vma) -2)
11608 abort ();
11609
11610 plt = htab->elf.splt;
11611 if (!htab->elf.dynamic_sections_created
11612 || stub_entry->h == NULL
11613 || stub_entry->h->elf.dynindx == -1)
11614 {
11615 if (stub_entry->symtype == STT_GNU_IFUNC)
11616 plt = htab->elf.iplt;
11617 else
11618 plt = htab->pltlocal;
11619 }
11620 targ += plt->output_offset + plt->output_section->vma;
11621 }
11622 else
11623 targ = (stub_entry->target_value
11624 + stub_entry->target_section->output_offset
11625 + stub_entry->target_section->output_section->vma);
11626 odd = off & 4;
11627 off = targ - off;
11628
11629 relp = p;
11630 num_rel = 0;
11631 if (htab->power10_stubs)
11632 {
11633 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11634 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
11635 }
11636 else
11637 {
11638 /* The notoc stubs calculate their target (either a PLT entry or
11639 the global entry point of a function) relative to the PC
11640 returned by the "bcl" two instructions past the start of the
11641 sequence emitted by build_offset. The offset is therefore 8
11642 less than calculated from the start of the sequence. */
11643 off -= 8;
11644 p = build_offset (htab->params->stub_bfd, p, off,
11645 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11646 }
11647
11648 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11649 {
11650 bfd_vma from;
11651 num_rel = 1;
11652 from = (stub_entry->stub_offset
11653 + stub_entry->group->stub_sec->output_offset
11654 + stub_entry->group->stub_sec->output_section->vma
11655 + (p - loc));
11656 bfd_put_32 (htab->params->stub_bfd,
11657 B_DOT | ((targ - from) & 0x3fffffc), p);
11658 }
11659 else
11660 {
11661 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11662 p += 4;
11663 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11664 }
11665 p += 4;
11666
11667 if (info->emitrelocations)
11668 {
11669 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11670 if (htab->power10_stubs)
11671 num_rel += num_relocs_for_power10_offset (off, odd);
11672 else
11673 {
11674 num_rel += num_relocs_for_offset (off);
11675 roff += 16;
11676 }
11677 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11678 if (r == NULL)
11679 return FALSE;
11680 if (htab->power10_stubs)
11681 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
11682 else
11683 r = emit_relocs_for_offset (info, r, roff, targ, off);
11684 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11685 || stub_entry->stub_type == ppc_stub_long_branch_both)
11686 {
11687 ++r;
11688 roff = p - 4 - stub_entry->group->stub_sec->contents;
11689 r->r_offset = roff;
11690 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11691 r->r_addend = targ;
11692 if (stub_entry->h != NULL
11693 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11694 return FALSE;
11695 }
11696 }
11697
11698 if (!htab->power10_stubs
11699 && htab->glink_eh_frame != NULL
11700 && htab->glink_eh_frame->size != 0)
11701 {
11702 bfd_byte *base, *eh;
11703 unsigned int lr_used, delta;
11704
11705 base = (htab->glink_eh_frame->contents
11706 + stub_entry->group->eh_base + 17);
11707 eh = base + stub_entry->group->eh_size;
11708 lr_used = stub_entry->stub_offset + 8;
11709 if (stub_entry->stub_type == ppc_stub_long_branch_both
11710 || stub_entry->stub_type == ppc_stub_plt_branch_both
11711 || stub_entry->stub_type == ppc_stub_plt_call_both)
11712 lr_used += 4;
11713 delta = lr_used - stub_entry->group->lr_restore;
11714 stub_entry->group->lr_restore = lr_used + 8;
11715 eh = eh_advance (htab->elf.dynobj, eh, delta);
11716 *eh++ = DW_CFA_register;
11717 *eh++ = 65;
11718 *eh++ = 12;
11719 *eh++ = DW_CFA_advance_loc + 2;
11720 *eh++ = DW_CFA_restore_extended;
11721 *eh++ = 65;
11722 stub_entry->group->eh_size = eh - base;
11723 }
11724 break;
11725
11726 case ppc_stub_plt_call:
11727 case ppc_stub_plt_call_r2save:
11728 if (stub_entry->h != NULL
11729 && stub_entry->h->is_func_descriptor
11730 && stub_entry->h->oh != NULL)
11731 {
11732 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11733
11734 /* If the old-ABI "dot-symbol" is undefined make it weak so
11735 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11736 if (fh->elf.root.type == bfd_link_hash_undefined
11737 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11738 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11739 fh->elf.root.type = bfd_link_hash_undefweak;
11740 }
11741
11742 /* Now build the stub. */
11743 targ = stub_entry->plt_ent->plt.offset & ~1;
11744 if (targ >= (bfd_vma) -2)
11745 abort ();
11746
11747 plt = htab->elf.splt;
11748 if (!htab->elf.dynamic_sections_created
11749 || stub_entry->h == NULL
11750 || stub_entry->h->elf.dynindx == -1)
11751 {
11752 if (stub_entry->symtype == STT_GNU_IFUNC)
11753 plt = htab->elf.iplt;
11754 else
11755 plt = htab->pltlocal;
11756 }
11757 targ += plt->output_offset + plt->output_section->vma;
11758
11759 off = (elf_gp (info->output_bfd)
11760 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11761 off = targ - off;
11762
11763 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11764 {
11765 info->callbacks->einfo
11766 /* xgettext:c-format */
11767 (_("%P: linkage table error against `%pT'\n"),
11768 stub_entry->h != NULL
11769 ? stub_entry->h->elf.root.root.string
11770 : "<local sym>");
11771 bfd_set_error (bfd_error_bad_value);
11772 htab->stub_error = TRUE;
11773 return FALSE;
11774 }
11775
11776 r = NULL;
11777 if (info->emitrelocations)
11778 {
11779 r = get_relocs (stub_entry->group->stub_sec,
11780 ((PPC_HA (off) != 0)
11781 + (htab->opd_abi
11782 ? 2 + (htab->params->plt_static_chain
11783 && PPC_HA (off + 16) == PPC_HA (off))
11784 : 1)));
11785 if (r == NULL)
11786 return FALSE;
11787 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11788 if (bfd_big_endian (info->output_bfd))
11789 r[0].r_offset += 2;
11790 r[0].r_addend = targ;
11791 }
11792 if (stub_entry->h != NULL
11793 && is_tls_get_addr (&stub_entry->h->elf, htab)
11794 && htab->params->tls_get_addr_opt)
11795 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11796 else
11797 p = build_plt_stub (htab, stub_entry, loc, off, r);
11798 break;
11799
11800 case ppc_stub_save_res:
11801 return TRUE;
11802
11803 default:
11804 BFD_FAIL ();
11805 return FALSE;
11806 }
11807
11808 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11809
11810 if (htab->params->emit_stub_syms)
11811 {
11812 struct elf_link_hash_entry *h;
11813 size_t len1, len2;
11814 char *name;
11815 const char *const stub_str[] = { "long_branch",
11816 "long_branch",
11817 "long_branch",
11818 "long_branch",
11819 "plt_branch",
11820 "plt_branch",
11821 "plt_branch",
11822 "plt_branch",
11823 "plt_call",
11824 "plt_call",
11825 "plt_call",
11826 "plt_call" };
11827
11828 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11829 len2 = strlen (stub_entry->root.string);
11830 name = bfd_malloc (len1 + len2 + 2);
11831 if (name == NULL)
11832 return FALSE;
11833 memcpy (name, stub_entry->root.string, 9);
11834 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11835 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11836 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11837 if (h == NULL)
11838 return FALSE;
11839 if (h->root.type == bfd_link_hash_new)
11840 {
11841 h->root.type = bfd_link_hash_defined;
11842 h->root.u.def.section = stub_entry->group->stub_sec;
11843 h->root.u.def.value = stub_entry->stub_offset;
11844 h->ref_regular = 1;
11845 h->def_regular = 1;
11846 h->ref_regular_nonweak = 1;
11847 h->forced_local = 1;
11848 h->non_elf = 0;
11849 h->root.linker_def = 1;
11850 }
11851 }
11852
11853 return TRUE;
11854 }
11855
11856 /* As above, but don't actually build the stub. Just bump offset so
11857 we know stub section sizes, and select plt_branch stubs where
11858 long_branch stubs won't do. */
11859
11860 static bfd_boolean
11861 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11862 {
11863 struct ppc_stub_hash_entry *stub_entry;
11864 struct bfd_link_info *info;
11865 struct ppc_link_hash_table *htab;
11866 asection *plt;
11867 bfd_vma targ, off, r2off;
11868 unsigned int size, extra, lr_used, delta, odd;
11869
11870 /* Massage our args to the form they really have. */
11871 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11872 info = in_arg;
11873
11874 htab = ppc_hash_table (info);
11875 if (htab == NULL)
11876 return FALSE;
11877
11878 /* Fail if the target section could not be assigned to an output
11879 section. The user should fix his linker script. */
11880 if (stub_entry->target_section != NULL
11881 && stub_entry->target_section->output_section == NULL
11882 && info->non_contiguous_regions)
11883 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11884 "Retry without --enable-non-contiguous-regions.\n"),
11885 stub_entry->target_section);
11886
11887 /* Same for the group. */
11888 if (stub_entry->group->stub_sec != NULL
11889 && stub_entry->group->stub_sec->output_section == NULL
11890 && info->non_contiguous_regions)
11891 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11892 "output section. Retry without "
11893 "--enable-non-contiguous-regions.\n"),
11894 stub_entry->group->stub_sec,
11895 stub_entry->target_section);
11896
11897 /* Make a note of the offset within the stubs for this entry. */
11898 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11899
11900 if (stub_entry->h != NULL
11901 && stub_entry->h->save_res
11902 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11903 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11904 {
11905 /* Don't make stubs to out-of-line register save/restore
11906 functions. Instead, emit copies of the functions. */
11907 stub_entry->group->needs_save_res = 1;
11908 stub_entry->stub_type = ppc_stub_save_res;
11909 return TRUE;
11910 }
11911
11912 switch (stub_entry->stub_type)
11913 {
11914 case ppc_stub_plt_branch:
11915 case ppc_stub_plt_branch_r2off:
11916 /* Reset the stub type from the plt branch variant in case we now
11917 can reach with a shorter stub. */
11918 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11919 /* Fall through. */
11920 case ppc_stub_long_branch:
11921 case ppc_stub_long_branch_r2off:
11922 targ = (stub_entry->target_value
11923 + stub_entry->target_section->output_offset
11924 + stub_entry->target_section->output_section->vma);
11925 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11926 off = (stub_entry->stub_offset
11927 + stub_entry->group->stub_sec->output_offset
11928 + stub_entry->group->stub_sec->output_section->vma);
11929
11930 size = 4;
11931 r2off = 0;
11932 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11933 {
11934 r2off = get_r2off (info, stub_entry);
11935 if (r2off == (bfd_vma) -1)
11936 {
11937 htab->stub_error = TRUE;
11938 return FALSE;
11939 }
11940 size = 8;
11941 if (PPC_HA (r2off) != 0)
11942 size += 4;
11943 if (PPC_LO (r2off) != 0)
11944 size += 4;
11945 off += size - 4;
11946 }
11947 off = targ - off;
11948
11949 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11950 Do the same for -R objects without function descriptors. */
11951 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11952 && r2off == 0
11953 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11954 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11955 {
11956 struct ppc_branch_hash_entry *br_entry;
11957
11958 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11959 stub_entry->root.string + 9,
11960 TRUE, FALSE);
11961 if (br_entry == NULL)
11962 {
11963 _bfd_error_handler (_("can't build branch stub `%s'"),
11964 stub_entry->root.string);
11965 htab->stub_error = TRUE;
11966 return FALSE;
11967 }
11968
11969 if (br_entry->iter != htab->stub_iteration)
11970 {
11971 br_entry->iter = htab->stub_iteration;
11972 br_entry->offset = htab->brlt->size;
11973 htab->brlt->size += 8;
11974
11975 if (htab->relbrlt != NULL)
11976 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11977 else if (info->emitrelocations)
11978 {
11979 htab->brlt->reloc_count += 1;
11980 htab->brlt->flags |= SEC_RELOC;
11981 }
11982 }
11983
11984 targ = (br_entry->offset
11985 + htab->brlt->output_offset
11986 + htab->brlt->output_section->vma);
11987 off = (elf_gp (info->output_bfd)
11988 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11989 off = targ - off;
11990
11991 if (info->emitrelocations)
11992 {
11993 stub_entry->group->stub_sec->reloc_count
11994 += 1 + (PPC_HA (off) != 0);
11995 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11996 }
11997
11998 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11999 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12000 {
12001 size = 12;
12002 if (PPC_HA (off) != 0)
12003 size = 16;
12004 }
12005 else
12006 {
12007 size = 16;
12008 if (PPC_HA (off) != 0)
12009 size += 4;
12010
12011 if (PPC_HA (r2off) != 0)
12012 size += 4;
12013 if (PPC_LO (r2off) != 0)
12014 size += 4;
12015 }
12016 }
12017 else if (info->emitrelocations)
12018 {
12019 stub_entry->group->stub_sec->reloc_count += 1;
12020 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12021 }
12022 break;
12023
12024 case ppc_stub_plt_branch_notoc:
12025 case ppc_stub_plt_branch_both:
12026 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12027 /* Fall through. */
12028 case ppc_stub_long_branch_notoc:
12029 case ppc_stub_long_branch_both:
12030 off = (stub_entry->stub_offset
12031 + stub_entry->group->stub_sec->output_offset
12032 + stub_entry->group->stub_sec->output_section->vma);
12033 size = 0;
12034 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12035 size = 4;
12036 off += size;
12037 targ = (stub_entry->target_value
12038 + stub_entry->target_section->output_offset
12039 + stub_entry->target_section->output_section->vma);
12040 odd = off & 4;
12041 off = targ - off;
12042
12043 if (info->emitrelocations)
12044 {
12045 unsigned int num_rel;
12046 if (htab->power10_stubs)
12047 num_rel = num_relocs_for_power10_offset (off, odd);
12048 else
12049 num_rel = num_relocs_for_offset (off - 8);
12050 stub_entry->group->stub_sec->reloc_count += num_rel;
12051 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12052 }
12053
12054 if (htab->power10_stubs)
12055 extra = size_power10_offset (off, odd);
12056 else
12057 extra = size_offset (off - 8);
12058 /* Include branch insn plus those in the offset sequence. */
12059 size += 4 + extra;
12060 /* The branch insn is at the end, or "extra" bytes along. So
12061 its offset will be "extra" bytes less that that already
12062 calculated. */
12063 off -= extra;
12064
12065 if (!htab->power10_stubs)
12066 {
12067 /* After the bcl, lr has been modified so we need to emit
12068 .eh_frame info saying the return address is in r12. */
12069 lr_used = stub_entry->stub_offset + 8;
12070 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12071 lr_used += 4;
12072 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12073 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12074 DW_CFA_restore_extended 65. */
12075 delta = lr_used - stub_entry->group->lr_restore;
12076 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12077 stub_entry->group->lr_restore = lr_used + 8;
12078 }
12079
12080 /* If the branch can't reach, use a plt_branch. */
12081 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12082 {
12083 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12084 - ppc_stub_long_branch_notoc);
12085 size += 4;
12086 }
12087 else if (info->emitrelocations)
12088 stub_entry->group->stub_sec->reloc_count +=1;
12089 break;
12090
12091 case ppc_stub_plt_call_notoc:
12092 case ppc_stub_plt_call_both:
12093 off = (stub_entry->stub_offset
12094 + stub_entry->group->stub_sec->output_offset
12095 + stub_entry->group->stub_sec->output_section->vma);
12096 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12097 off += 4;
12098 targ = stub_entry->plt_ent->plt.offset & ~1;
12099 if (targ >= (bfd_vma) -2)
12100 abort ();
12101
12102 plt = htab->elf.splt;
12103 if (!htab->elf.dynamic_sections_created
12104 || stub_entry->h == NULL
12105 || stub_entry->h->elf.dynindx == -1)
12106 {
12107 if (stub_entry->symtype == STT_GNU_IFUNC)
12108 plt = htab->elf.iplt;
12109 else
12110 plt = htab->pltlocal;
12111 }
12112 targ += plt->output_offset + plt->output_section->vma;
12113 odd = off & 4;
12114 off = targ - off;
12115
12116 if (htab->params->plt_stub_align != 0)
12117 {
12118 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12119
12120 stub_entry->group->stub_sec->size += pad;
12121 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12122 off -= pad;
12123 }
12124
12125 if (info->emitrelocations)
12126 {
12127 unsigned int num_rel;
12128 if (htab->power10_stubs)
12129 num_rel = num_relocs_for_power10_offset (off, odd);
12130 else
12131 num_rel = num_relocs_for_offset (off - 8);
12132 stub_entry->group->stub_sec->reloc_count += num_rel;
12133 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12134 }
12135
12136 size = plt_stub_size (htab, stub_entry, off);
12137
12138 if (!htab->power10_stubs)
12139 {
12140 /* After the bcl, lr has been modified so we need to emit
12141 .eh_frame info saying the return address is in r12. */
12142 lr_used = stub_entry->stub_offset + 8;
12143 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12144 lr_used += 4;
12145 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12146 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12147 DW_CFA_restore_extended 65. */
12148 delta = lr_used - stub_entry->group->lr_restore;
12149 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12150 stub_entry->group->lr_restore = lr_used + 8;
12151 }
12152 break;
12153
12154 case ppc_stub_plt_call:
12155 case ppc_stub_plt_call_r2save:
12156 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12157 if (targ >= (bfd_vma) -2)
12158 abort ();
12159 plt = htab->elf.splt;
12160 if (!htab->elf.dynamic_sections_created
12161 || stub_entry->h == NULL
12162 || stub_entry->h->elf.dynindx == -1)
12163 {
12164 if (stub_entry->symtype == STT_GNU_IFUNC)
12165 plt = htab->elf.iplt;
12166 else
12167 plt = htab->pltlocal;
12168 }
12169 targ += plt->output_offset + plt->output_section->vma;
12170
12171 off = (elf_gp (info->output_bfd)
12172 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12173 off = targ - off;
12174
12175 if (htab->params->plt_stub_align != 0)
12176 {
12177 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12178
12179 stub_entry->group->stub_sec->size += pad;
12180 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12181 }
12182
12183 if (info->emitrelocations)
12184 {
12185 stub_entry->group->stub_sec->reloc_count
12186 += ((PPC_HA (off) != 0)
12187 + (htab->opd_abi
12188 ? 2 + (htab->params->plt_static_chain
12189 && PPC_HA (off + 16) == PPC_HA (off))
12190 : 1));
12191 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12192 }
12193
12194 size = plt_stub_size (htab, stub_entry, off);
12195
12196 if (stub_entry->h != NULL
12197 && is_tls_get_addr (&stub_entry->h->elf, htab)
12198 && htab->params->tls_get_addr_opt
12199 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12200 {
12201 if (htab->params->no_tls_get_addr_regsave)
12202 {
12203 lr_used = stub_entry->stub_offset + size - 20;
12204 /* The eh_frame info will consist of a DW_CFA_advance_loc
12205 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12206 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12207 delta = lr_used - stub_entry->group->lr_restore;
12208 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12209 }
12210 else
12211 {
12212 /* Adjustments to r1 need to be described. */
12213 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12214 delta = cfa_updt - stub_entry->group->lr_restore;
12215 stub_entry->group->eh_size += eh_advance_size (delta);
12216 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12217 }
12218 stub_entry->group->lr_restore = size - 4;
12219 }
12220 break;
12221
12222 default:
12223 BFD_FAIL ();
12224 return FALSE;
12225 }
12226
12227 stub_entry->group->stub_sec->size += size;
12228 return TRUE;
12229 }
12230
12231 /* Set up various things so that we can make a list of input sections
12232 for each output section included in the link. Returns -1 on error,
12233 0 when no stubs will be needed, and 1 on success. */
12234
12235 int
12236 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
12237 {
12238 unsigned int id;
12239 size_t amt;
12240 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12241
12242 if (htab == NULL)
12243 return -1;
12244
12245 htab->sec_info_arr_size = _bfd_section_id;
12246 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12247 htab->sec_info = bfd_zmalloc (amt);
12248 if (htab->sec_info == NULL)
12249 return -1;
12250
12251 /* Set toc_off for com, und, abs and ind sections. */
12252 for (id = 0; id < 3; id++)
12253 htab->sec_info[id].toc_off = TOC_BASE_OFF;
12254
12255 return 1;
12256 }
12257
12258 /* Set up for first pass at multitoc partitioning. */
12259
12260 void
12261 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12262 {
12263 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12264
12265 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
12266 htab->toc_bfd = NULL;
12267 htab->toc_first_sec = NULL;
12268 }
12269
12270 /* The linker repeatedly calls this function for each TOC input section
12271 and linker generated GOT section. Group input bfds such that the toc
12272 within a group is less than 64k in size. */
12273
12274 bfd_boolean
12275 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
12276 {
12277 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12278 bfd_vma addr, off, limit;
12279
12280 if (htab == NULL)
12281 return FALSE;
12282
12283 if (!htab->second_toc_pass)
12284 {
12285 /* Keep track of the first .toc or .got section for this input bfd. */
12286 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12287
12288 if (new_bfd)
12289 {
12290 htab->toc_bfd = isec->owner;
12291 htab->toc_first_sec = isec;
12292 }
12293
12294 addr = isec->output_offset + isec->output_section->vma;
12295 off = addr - htab->toc_curr;
12296 limit = 0x80008000;
12297 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12298 limit = 0x10000;
12299 if (off + isec->size > limit)
12300 {
12301 addr = (htab->toc_first_sec->output_offset
12302 + htab->toc_first_sec->output_section->vma);
12303 htab->toc_curr = addr;
12304 htab->toc_curr &= -TOC_BASE_ALIGN;
12305 }
12306
12307 /* toc_curr is the base address of this toc group. Set elf_gp
12308 for the input section to be the offset relative to the
12309 output toc base plus 0x8000. Making the input elf_gp an
12310 offset allows us to move the toc as a whole without
12311 recalculating input elf_gp. */
12312 off = htab->toc_curr - elf_gp (info->output_bfd);
12313 off += TOC_BASE_OFF;
12314
12315 /* Die if someone uses a linker script that doesn't keep input
12316 file .toc and .got together. */
12317 if (new_bfd
12318 && elf_gp (isec->owner) != 0
12319 && elf_gp (isec->owner) != off)
12320 return FALSE;
12321
12322 elf_gp (isec->owner) = off;
12323 return TRUE;
12324 }
12325
12326 /* During the second pass toc_first_sec points to the start of
12327 a toc group, and toc_curr is used to track the old elf_gp.
12328 We use toc_bfd to ensure we only look at each bfd once. */
12329 if (htab->toc_bfd == isec->owner)
12330 return TRUE;
12331 htab->toc_bfd = isec->owner;
12332
12333 if (htab->toc_first_sec == NULL
12334 || htab->toc_curr != elf_gp (isec->owner))
12335 {
12336 htab->toc_curr = elf_gp (isec->owner);
12337 htab->toc_first_sec = isec;
12338 }
12339 addr = (htab->toc_first_sec->output_offset
12340 + htab->toc_first_sec->output_section->vma);
12341 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12342 elf_gp (isec->owner) = off;
12343
12344 return TRUE;
12345 }
12346
12347 /* Called via elf_link_hash_traverse to merge GOT entries for global
12348 symbol H. */
12349
12350 static bfd_boolean
12351 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12352 {
12353 if (h->root.type == bfd_link_hash_indirect)
12354 return TRUE;
12355
12356 merge_got_entries (&h->got.glist);
12357
12358 return TRUE;
12359 }
12360
12361 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12362 symbol H. */
12363
12364 static bfd_boolean
12365 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12366 {
12367 struct got_entry *gent;
12368
12369 if (h->root.type == bfd_link_hash_indirect)
12370 return TRUE;
12371
12372 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12373 if (!gent->is_indirect)
12374 allocate_got (h, (struct bfd_link_info *) inf, gent);
12375 return TRUE;
12376 }
12377
12378 /* Called on the first multitoc pass after the last call to
12379 ppc64_elf_next_toc_section. This function removes duplicate GOT
12380 entries. */
12381
12382 bfd_boolean
12383 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12384 {
12385 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12386 struct bfd *ibfd, *ibfd2;
12387 bfd_boolean done_something;
12388
12389 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12390
12391 if (!htab->do_multi_toc)
12392 return FALSE;
12393
12394 /* Merge global sym got entries within a toc group. */
12395 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12396
12397 /* And tlsld_got. */
12398 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12399 {
12400 struct got_entry *ent, *ent2;
12401
12402 if (!is_ppc64_elf (ibfd))
12403 continue;
12404
12405 ent = ppc64_tlsld_got (ibfd);
12406 if (!ent->is_indirect
12407 && ent->got.offset != (bfd_vma) -1)
12408 {
12409 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12410 {
12411 if (!is_ppc64_elf (ibfd2))
12412 continue;
12413
12414 ent2 = ppc64_tlsld_got (ibfd2);
12415 if (!ent2->is_indirect
12416 && ent2->got.offset != (bfd_vma) -1
12417 && elf_gp (ibfd2) == elf_gp (ibfd))
12418 {
12419 ent2->is_indirect = TRUE;
12420 ent2->got.ent = ent;
12421 }
12422 }
12423 }
12424 }
12425
12426 /* Zap sizes of got sections. */
12427 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12428 htab->elf.irelplt->size -= htab->got_reli_size;
12429 htab->got_reli_size = 0;
12430
12431 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12432 {
12433 asection *got, *relgot;
12434
12435 if (!is_ppc64_elf (ibfd))
12436 continue;
12437
12438 got = ppc64_elf_tdata (ibfd)->got;
12439 if (got != NULL)
12440 {
12441 got->rawsize = got->size;
12442 got->size = 0;
12443 relgot = ppc64_elf_tdata (ibfd)->relgot;
12444 relgot->rawsize = relgot->size;
12445 relgot->size = 0;
12446 }
12447 }
12448
12449 /* Now reallocate the got, local syms first. We don't need to
12450 allocate section contents again since we never increase size. */
12451 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12452 {
12453 struct got_entry **lgot_ents;
12454 struct got_entry **end_lgot_ents;
12455 struct plt_entry **local_plt;
12456 struct plt_entry **end_local_plt;
12457 unsigned char *lgot_masks;
12458 bfd_size_type locsymcount;
12459 Elf_Internal_Shdr *symtab_hdr;
12460 asection *s;
12461
12462 if (!is_ppc64_elf (ibfd))
12463 continue;
12464
12465 lgot_ents = elf_local_got_ents (ibfd);
12466 if (!lgot_ents)
12467 continue;
12468
12469 symtab_hdr = &elf_symtab_hdr (ibfd);
12470 locsymcount = symtab_hdr->sh_info;
12471 end_lgot_ents = lgot_ents + locsymcount;
12472 local_plt = (struct plt_entry **) end_lgot_ents;
12473 end_local_plt = local_plt + locsymcount;
12474 lgot_masks = (unsigned char *) end_local_plt;
12475 s = ppc64_elf_tdata (ibfd)->got;
12476 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12477 {
12478 struct got_entry *ent;
12479
12480 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12481 {
12482 unsigned int ent_size = 8;
12483 unsigned int rel_size = sizeof (Elf64_External_Rela);
12484
12485 ent->got.offset = s->size;
12486 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12487 {
12488 ent_size *= 2;
12489 rel_size *= 2;
12490 }
12491 s->size += ent_size;
12492 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12493 {
12494 htab->elf.irelplt->size += rel_size;
12495 htab->got_reli_size += rel_size;
12496 }
12497 else if (bfd_link_pic (info)
12498 && !(ent->tls_type != 0
12499 && bfd_link_executable (info)))
12500 {
12501 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12502 srel->size += rel_size;
12503 }
12504 }
12505 }
12506 }
12507
12508 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12509
12510 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12511 {
12512 struct got_entry *ent;
12513
12514 if (!is_ppc64_elf (ibfd))
12515 continue;
12516
12517 ent = ppc64_tlsld_got (ibfd);
12518 if (!ent->is_indirect
12519 && ent->got.offset != (bfd_vma) -1)
12520 {
12521 asection *s = ppc64_elf_tdata (ibfd)->got;
12522 ent->got.offset = s->size;
12523 s->size += 16;
12524 if (bfd_link_dll (info))
12525 {
12526 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12527 srel->size += sizeof (Elf64_External_Rela);
12528 }
12529 }
12530 }
12531
12532 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12533 if (!done_something)
12534 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12535 {
12536 asection *got;
12537
12538 if (!is_ppc64_elf (ibfd))
12539 continue;
12540
12541 got = ppc64_elf_tdata (ibfd)->got;
12542 if (got != NULL)
12543 {
12544 done_something = got->rawsize != got->size;
12545 if (done_something)
12546 break;
12547 }
12548 }
12549
12550 if (done_something)
12551 (*htab->params->layout_sections_again) ();
12552
12553 /* Set up for second pass over toc sections to recalculate elf_gp
12554 on input sections. */
12555 htab->toc_bfd = NULL;
12556 htab->toc_first_sec = NULL;
12557 htab->second_toc_pass = TRUE;
12558 return done_something;
12559 }
12560
12561 /* Called after second pass of multitoc partitioning. */
12562
12563 void
12564 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12565 {
12566 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12567
12568 /* After the second pass, toc_curr tracks the TOC offset used
12569 for code sections below in ppc64_elf_next_input_section. */
12570 htab->toc_curr = TOC_BASE_OFF;
12571 }
12572
12573 /* No toc references were found in ISEC. If the code in ISEC makes no
12574 calls, then there's no need to use toc adjusting stubs when branching
12575 into ISEC. Actually, indirect calls from ISEC are OK as they will
12576 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12577 needed, and 2 if a cyclical call-graph was found but no other reason
12578 for a stub was detected. If called from the top level, a return of
12579 2 means the same as a return of 0. */
12580
12581 static int
12582 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12583 {
12584 int ret;
12585
12586 /* Mark this section as checked. */
12587 isec->call_check_done = 1;
12588
12589 /* We know none of our code bearing sections will need toc stubs. */
12590 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12591 return 0;
12592
12593 if (isec->size == 0)
12594 return 0;
12595
12596 if (isec->output_section == NULL)
12597 return 0;
12598
12599 ret = 0;
12600 if (isec->reloc_count != 0)
12601 {
12602 Elf_Internal_Rela *relstart, *rel;
12603 Elf_Internal_Sym *local_syms;
12604 struct ppc_link_hash_table *htab;
12605
12606 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12607 info->keep_memory);
12608 if (relstart == NULL)
12609 return -1;
12610
12611 /* Look for branches to outside of this section. */
12612 local_syms = NULL;
12613 htab = ppc_hash_table (info);
12614 if (htab == NULL)
12615 return -1;
12616
12617 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12618 {
12619 enum elf_ppc64_reloc_type r_type;
12620 unsigned long r_symndx;
12621 struct elf_link_hash_entry *h;
12622 struct ppc_link_hash_entry *eh;
12623 Elf_Internal_Sym *sym;
12624 asection *sym_sec;
12625 struct _opd_sec_data *opd;
12626 bfd_vma sym_value;
12627 bfd_vma dest;
12628
12629 r_type = ELF64_R_TYPE (rel->r_info);
12630 if (r_type != R_PPC64_REL24
12631 && r_type != R_PPC64_REL24_NOTOC
12632 && r_type != R_PPC64_REL14
12633 && r_type != R_PPC64_REL14_BRTAKEN
12634 && r_type != R_PPC64_REL14_BRNTAKEN
12635 && r_type != R_PPC64_PLTCALL
12636 && r_type != R_PPC64_PLTCALL_NOTOC)
12637 continue;
12638
12639 r_symndx = ELF64_R_SYM (rel->r_info);
12640 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12641 isec->owner))
12642 {
12643 ret = -1;
12644 break;
12645 }
12646
12647 /* Calls to dynamic lib functions go through a plt call stub
12648 that uses r2. */
12649 eh = ppc_elf_hash_entry (h);
12650 if (eh != NULL
12651 && (eh->elf.plt.plist != NULL
12652 || (eh->oh != NULL
12653 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12654 {
12655 ret = 1;
12656 break;
12657 }
12658
12659 if (sym_sec == NULL)
12660 /* Ignore other undefined symbols. */
12661 continue;
12662
12663 /* Assume branches to other sections not included in the
12664 link need stubs too, to cover -R and absolute syms. */
12665 if (sym_sec->output_section == NULL)
12666 {
12667 ret = 1;
12668 break;
12669 }
12670
12671 if (h == NULL)
12672 sym_value = sym->st_value;
12673 else
12674 {
12675 if (h->root.type != bfd_link_hash_defined
12676 && h->root.type != bfd_link_hash_defweak)
12677 abort ();
12678 sym_value = h->root.u.def.value;
12679 }
12680 sym_value += rel->r_addend;
12681
12682 /* If this branch reloc uses an opd sym, find the code section. */
12683 opd = get_opd_info (sym_sec);
12684 if (opd != NULL)
12685 {
12686 if (h == NULL && opd->adjust != NULL)
12687 {
12688 long adjust;
12689
12690 adjust = opd->adjust[OPD_NDX (sym_value)];
12691 if (adjust == -1)
12692 /* Assume deleted functions won't ever be called. */
12693 continue;
12694 sym_value += adjust;
12695 }
12696
12697 dest = opd_entry_value (sym_sec, sym_value,
12698 &sym_sec, NULL, FALSE);
12699 if (dest == (bfd_vma) -1)
12700 continue;
12701 }
12702 else
12703 dest = (sym_value
12704 + sym_sec->output_offset
12705 + sym_sec->output_section->vma);
12706
12707 /* Ignore branch to self. */
12708 if (sym_sec == isec)
12709 continue;
12710
12711 /* If the called function uses the toc, we need a stub. */
12712 if (sym_sec->has_toc_reloc
12713 || sym_sec->makes_toc_func_call)
12714 {
12715 ret = 1;
12716 break;
12717 }
12718
12719 /* Assume any branch that needs a long branch stub might in fact
12720 need a plt_branch stub. A plt_branch stub uses r2. */
12721 else if (dest - (isec->output_offset
12722 + isec->output_section->vma
12723 + rel->r_offset) + (1 << 25)
12724 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12725 ? h->other
12726 : sym->st_other))
12727 {
12728 ret = 1;
12729 break;
12730 }
12731
12732 /* If calling back to a section in the process of being
12733 tested, we can't say for sure that no toc adjusting stubs
12734 are needed, so don't return zero. */
12735 else if (sym_sec->call_check_in_progress)
12736 ret = 2;
12737
12738 /* Branches to another section that itself doesn't have any TOC
12739 references are OK. Recursively call ourselves to check. */
12740 else if (!sym_sec->call_check_done)
12741 {
12742 int recur;
12743
12744 /* Mark current section as indeterminate, so that other
12745 sections that call back to current won't be marked as
12746 known. */
12747 isec->call_check_in_progress = 1;
12748 recur = toc_adjusting_stub_needed (info, sym_sec);
12749 isec->call_check_in_progress = 0;
12750
12751 if (recur != 0)
12752 {
12753 ret = recur;
12754 if (recur != 2)
12755 break;
12756 }
12757 }
12758 }
12759
12760 if (elf_symtab_hdr (isec->owner).contents
12761 != (unsigned char *) local_syms)
12762 free (local_syms);
12763 if (elf_section_data (isec)->relocs != relstart)
12764 free (relstart);
12765 }
12766
12767 if ((ret & 1) == 0
12768 && isec->map_head.s != NULL
12769 && (strcmp (isec->output_section->name, ".init") == 0
12770 || strcmp (isec->output_section->name, ".fini") == 0))
12771 {
12772 if (isec->map_head.s->has_toc_reloc
12773 || isec->map_head.s->makes_toc_func_call)
12774 ret = 1;
12775 else if (!isec->map_head.s->call_check_done)
12776 {
12777 int recur;
12778 isec->call_check_in_progress = 1;
12779 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12780 isec->call_check_in_progress = 0;
12781 if (recur != 0)
12782 ret = recur;
12783 }
12784 }
12785
12786 if (ret == 1)
12787 isec->makes_toc_func_call = 1;
12788
12789 return ret;
12790 }
12791
12792 /* The linker repeatedly calls this function for each input section,
12793 in the order that input sections are linked into output sections.
12794 Build lists of input sections to determine groupings between which
12795 we may insert linker stubs. */
12796
12797 bfd_boolean
12798 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12799 {
12800 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12801
12802 if (htab == NULL)
12803 return FALSE;
12804
12805 if ((isec->output_section->flags & SEC_CODE) != 0
12806 && isec->output_section->id < htab->sec_info_arr_size)
12807 {
12808 /* This happens to make the list in reverse order,
12809 which is what we want. */
12810 htab->sec_info[isec->id].u.list
12811 = htab->sec_info[isec->output_section->id].u.list;
12812 htab->sec_info[isec->output_section->id].u.list = isec;
12813 }
12814
12815 if (htab->multi_toc_needed)
12816 {
12817 /* Analyse sections that aren't already flagged as needing a
12818 valid toc pointer. Exclude .fixup for the linux kernel.
12819 .fixup contains branches, but only back to the function that
12820 hit an exception. */
12821 if (!(isec->has_toc_reloc
12822 || (isec->flags & SEC_CODE) == 0
12823 || strcmp (isec->name, ".fixup") == 0
12824 || isec->call_check_done))
12825 {
12826 if (toc_adjusting_stub_needed (info, isec) < 0)
12827 return FALSE;
12828 }
12829 /* Make all sections use the TOC assigned for this object file.
12830 This will be wrong for pasted sections; We fix that in
12831 check_pasted_section(). */
12832 if (elf_gp (isec->owner) != 0)
12833 htab->toc_curr = elf_gp (isec->owner);
12834 }
12835
12836 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12837 return TRUE;
12838 }
12839
12840 /* Check that all .init and .fini sections use the same toc, if they
12841 have toc relocs. */
12842
12843 static bfd_boolean
12844 check_pasted_section (struct bfd_link_info *info, const char *name)
12845 {
12846 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12847
12848 if (o != NULL)
12849 {
12850 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12851 bfd_vma toc_off = 0;
12852 asection *i;
12853
12854 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12855 if (i->has_toc_reloc)
12856 {
12857 if (toc_off == 0)
12858 toc_off = htab->sec_info[i->id].toc_off;
12859 else if (toc_off != htab->sec_info[i->id].toc_off)
12860 return FALSE;
12861 }
12862
12863 if (toc_off == 0)
12864 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12865 if (i->makes_toc_func_call)
12866 {
12867 toc_off = htab->sec_info[i->id].toc_off;
12868 break;
12869 }
12870
12871 /* Make sure the whole pasted function uses the same toc offset. */
12872 if (toc_off != 0)
12873 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12874 htab->sec_info[i->id].toc_off = toc_off;
12875 }
12876 return TRUE;
12877 }
12878
12879 bfd_boolean
12880 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12881 {
12882 return (check_pasted_section (info, ".init")
12883 & check_pasted_section (info, ".fini"));
12884 }
12885
12886 /* See whether we can group stub sections together. Grouping stub
12887 sections may result in fewer stubs. More importantly, we need to
12888 put all .init* and .fini* stubs at the beginning of the .init or
12889 .fini output sections respectively, because glibc splits the
12890 _init and _fini functions into multiple parts. Putting a stub in
12891 the middle of a function is not a good idea. */
12892
12893 static bfd_boolean
12894 group_sections (struct bfd_link_info *info,
12895 bfd_size_type stub_group_size,
12896 bfd_boolean stubs_always_before_branch)
12897 {
12898 struct ppc_link_hash_table *htab;
12899 asection *osec;
12900 bfd_boolean suppress_size_errors;
12901
12902 htab = ppc_hash_table (info);
12903 if (htab == NULL)
12904 return FALSE;
12905
12906 suppress_size_errors = FALSE;
12907 if (stub_group_size == 1)
12908 {
12909 /* Default values. */
12910 if (stubs_always_before_branch)
12911 stub_group_size = 0x1e00000;
12912 else
12913 stub_group_size = 0x1c00000;
12914 suppress_size_errors = TRUE;
12915 }
12916
12917 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12918 {
12919 asection *tail;
12920
12921 if (osec->id >= htab->sec_info_arr_size)
12922 continue;
12923
12924 tail = htab->sec_info[osec->id].u.list;
12925 while (tail != NULL)
12926 {
12927 asection *curr;
12928 asection *prev;
12929 bfd_size_type total;
12930 bfd_boolean big_sec;
12931 bfd_vma curr_toc;
12932 struct map_stub *group;
12933 bfd_size_type group_size;
12934
12935 curr = tail;
12936 total = tail->size;
12937 group_size = (ppc64_elf_section_data (tail) != NULL
12938 && ppc64_elf_section_data (tail)->has_14bit_branch
12939 ? stub_group_size >> 10 : stub_group_size);
12940
12941 big_sec = total > group_size;
12942 if (big_sec && !suppress_size_errors)
12943 /* xgettext:c-format */
12944 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12945 tail->owner, tail);
12946 curr_toc = htab->sec_info[tail->id].toc_off;
12947
12948 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12949 && ((total += curr->output_offset - prev->output_offset)
12950 < (ppc64_elf_section_data (prev) != NULL
12951 && ppc64_elf_section_data (prev)->has_14bit_branch
12952 ? (group_size = stub_group_size >> 10) : group_size))
12953 && htab->sec_info[prev->id].toc_off == curr_toc)
12954 curr = prev;
12955
12956 /* OK, the size from the start of CURR to the end is less
12957 than group_size and thus can be handled by one stub
12958 section. (or the tail section is itself larger than
12959 group_size, in which case we may be toast.) We should
12960 really be keeping track of the total size of stubs added
12961 here, as stubs contribute to the final output section
12962 size. That's a little tricky, and this way will only
12963 break if stubs added make the total size more than 2^25,
12964 ie. for the default stub_group_size, if stubs total more
12965 than 2097152 bytes, or nearly 75000 plt call stubs. */
12966 group = bfd_alloc (curr->owner, sizeof (*group));
12967 if (group == NULL)
12968 return FALSE;
12969 group->link_sec = curr;
12970 group->stub_sec = NULL;
12971 group->needs_save_res = 0;
12972 group->lr_restore = 0;
12973 group->eh_size = 0;
12974 group->eh_base = 0;
12975 group->next = htab->group;
12976 htab->group = group;
12977 do
12978 {
12979 prev = htab->sec_info[tail->id].u.list;
12980 /* Set up this stub group. */
12981 htab->sec_info[tail->id].u.group = group;
12982 }
12983 while (tail != curr && (tail = prev) != NULL);
12984
12985 /* But wait, there's more! Input sections up to group_size
12986 bytes before the stub section can be handled by it too.
12987 Don't do this if we have a really large section after the
12988 stubs, as adding more stubs increases the chance that
12989 branches may not reach into the stub section. */
12990 if (!stubs_always_before_branch && !big_sec)
12991 {
12992 total = 0;
12993 while (prev != NULL
12994 && ((total += tail->output_offset - prev->output_offset)
12995 < (ppc64_elf_section_data (prev) != NULL
12996 && ppc64_elf_section_data (prev)->has_14bit_branch
12997 ? (group_size = stub_group_size >> 10)
12998 : group_size))
12999 && htab->sec_info[prev->id].toc_off == curr_toc)
13000 {
13001 tail = prev;
13002 prev = htab->sec_info[tail->id].u.list;
13003 htab->sec_info[tail->id].u.group = group;
13004 }
13005 }
13006 tail = prev;
13007 }
13008 }
13009 return TRUE;
13010 }
13011
13012 static const unsigned char glink_eh_frame_cie[] =
13013 {
13014 0, 0, 0, 16, /* length. */
13015 0, 0, 0, 0, /* id. */
13016 1, /* CIE version. */
13017 'z', 'R', 0, /* Augmentation string. */
13018 4, /* Code alignment. */
13019 0x78, /* Data alignment. */
13020 65, /* RA reg. */
13021 1, /* Augmentation size. */
13022 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
13023 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
13024 };
13025
13026 /* Stripping output sections is normally done before dynamic section
13027 symbols have been allocated. This function is called later, and
13028 handles cases like htab->brlt which is mapped to its own output
13029 section. */
13030
13031 static void
13032 maybe_strip_output (struct bfd_link_info *info, asection *isec)
13033 {
13034 if (isec->size == 0
13035 && isec->output_section->size == 0
13036 && !(isec->output_section->flags & SEC_KEEP)
13037 && !bfd_section_removed_from_list (info->output_bfd,
13038 isec->output_section)
13039 && elf_section_data (isec->output_section)->dynindx == 0)
13040 {
13041 isec->output_section->flags |= SEC_EXCLUDE;
13042 bfd_section_list_remove (info->output_bfd, isec->output_section);
13043 info->output_bfd->section_count--;
13044 }
13045 }
13046
13047 /* Determine and set the size of the stub section for a final link.
13048
13049 The basic idea here is to examine all the relocations looking for
13050 PC-relative calls to a target that is unreachable with a "bl"
13051 instruction. */
13052
13053 bfd_boolean
13054 ppc64_elf_size_stubs (struct bfd_link_info *info)
13055 {
13056 bfd_size_type stub_group_size;
13057 bfd_boolean stubs_always_before_branch;
13058 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13059
13060 if (htab == NULL)
13061 return FALSE;
13062
13063 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
13064 htab->params->plt_thread_safe = 1;
13065 if (!htab->opd_abi)
13066 htab->params->plt_thread_safe = 0;
13067 else if (htab->params->plt_thread_safe == -1)
13068 {
13069 static const char *const thread_starter[] =
13070 {
13071 "pthread_create",
13072 /* libstdc++ */
13073 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13074 /* librt */
13075 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13076 "mq_notify", "create_timer",
13077 /* libanl */
13078 "getaddrinfo_a",
13079 /* libgomp */
13080 "GOMP_parallel",
13081 "GOMP_parallel_start",
13082 "GOMP_parallel_loop_static",
13083 "GOMP_parallel_loop_static_start",
13084 "GOMP_parallel_loop_dynamic",
13085 "GOMP_parallel_loop_dynamic_start",
13086 "GOMP_parallel_loop_guided",
13087 "GOMP_parallel_loop_guided_start",
13088 "GOMP_parallel_loop_runtime",
13089 "GOMP_parallel_loop_runtime_start",
13090 "GOMP_parallel_sections",
13091 "GOMP_parallel_sections_start",
13092 /* libgo */
13093 "__go_go",
13094 };
13095 unsigned i;
13096
13097 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
13098 {
13099 struct elf_link_hash_entry *h;
13100 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13101 FALSE, FALSE, TRUE);
13102 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13103 if (htab->params->plt_thread_safe)
13104 break;
13105 }
13106 }
13107 stubs_always_before_branch = htab->params->group_size < 0;
13108 if (htab->params->group_size < 0)
13109 stub_group_size = -htab->params->group_size;
13110 else
13111 stub_group_size = htab->params->group_size;
13112
13113 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13114 return FALSE;
13115
13116 htab->tga_group = NULL;
13117 if (!htab->params->no_tls_get_addr_regsave
13118 && htab->tga_desc_fd != NULL
13119 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13120 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13121 && htab->tls_get_addr_fd != NULL
13122 && is_static_defined (&htab->tls_get_addr_fd->elf))
13123 {
13124 asection *sym_sec, *code_sec, *stub_sec;
13125 bfd_vma sym_value;
13126 struct _opd_sec_data *opd;
13127
13128 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13129 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13130 code_sec = sym_sec;
13131 opd = get_opd_info (sym_sec);
13132 if (opd != NULL)
13133 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13134 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13135 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13136 htab->tga_group->link_sec);
13137 if (stub_sec == NULL)
13138 return FALSE;
13139 htab->tga_group->stub_sec = stub_sec;
13140
13141 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13142 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13143 htab->tga_desc_fd->elf.root.u.def.value = 0;
13144 htab->tga_desc_fd->elf.type = STT_FUNC;
13145 htab->tga_desc_fd->elf.def_regular = 1;
13146 htab->tga_desc_fd->elf.non_elf = 0;
13147 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13148 }
13149
13150 #define STUB_SHRINK_ITER 20
13151 /* Loop until no stubs added. After iteration 20 of this loop we may
13152 exit on a stub section shrinking. This is to break out of a
13153 pathological case where adding stubs on one iteration decreases
13154 section gaps (perhaps due to alignment), which then requires
13155 fewer or smaller stubs on the next iteration. */
13156
13157 while (1)
13158 {
13159 bfd *input_bfd;
13160 unsigned int bfd_indx;
13161 struct map_stub *group;
13162
13163 htab->stub_iteration += 1;
13164
13165 for (input_bfd = info->input_bfds, bfd_indx = 0;
13166 input_bfd != NULL;
13167 input_bfd = input_bfd->link.next, bfd_indx++)
13168 {
13169 Elf_Internal_Shdr *symtab_hdr;
13170 asection *section;
13171 Elf_Internal_Sym *local_syms = NULL;
13172
13173 if (!is_ppc64_elf (input_bfd))
13174 continue;
13175
13176 /* We'll need the symbol table in a second. */
13177 symtab_hdr = &elf_symtab_hdr (input_bfd);
13178 if (symtab_hdr->sh_info == 0)
13179 continue;
13180
13181 /* Walk over each section attached to the input bfd. */
13182 for (section = input_bfd->sections;
13183 section != NULL;
13184 section = section->next)
13185 {
13186 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
13187
13188 /* If there aren't any relocs, then there's nothing more
13189 to do. */
13190 if ((section->flags & SEC_RELOC) == 0
13191 || (section->flags & SEC_ALLOC) == 0
13192 || (section->flags & SEC_LOAD) == 0
13193 || (section->flags & SEC_CODE) == 0
13194 || section->reloc_count == 0)
13195 continue;
13196
13197 /* If this section is a link-once section that will be
13198 discarded, then don't create any stubs. */
13199 if (section->output_section == NULL
13200 || section->output_section->owner != info->output_bfd)
13201 continue;
13202
13203 /* Get the relocs. */
13204 internal_relocs
13205 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
13206 info->keep_memory);
13207 if (internal_relocs == NULL)
13208 goto error_ret_free_local;
13209
13210 /* Now examine each relocation. */
13211 irela = internal_relocs;
13212 irelaend = irela + section->reloc_count;
13213 for (; irela < irelaend; irela++)
13214 {
13215 enum elf_ppc64_reloc_type r_type;
13216 unsigned int r_indx;
13217 enum ppc_stub_type stub_type;
13218 struct ppc_stub_hash_entry *stub_entry;
13219 asection *sym_sec, *code_sec;
13220 bfd_vma sym_value, code_value;
13221 bfd_vma destination;
13222 unsigned long local_off;
13223 bfd_boolean ok_dest;
13224 struct ppc_link_hash_entry *hash;
13225 struct ppc_link_hash_entry *fdh;
13226 struct elf_link_hash_entry *h;
13227 Elf_Internal_Sym *sym;
13228 char *stub_name;
13229 const asection *id_sec;
13230 struct _opd_sec_data *opd;
13231 struct plt_entry *plt_ent;
13232
13233 r_type = ELF64_R_TYPE (irela->r_info);
13234 r_indx = ELF64_R_SYM (irela->r_info);
13235
13236 if (r_type >= R_PPC64_max)
13237 {
13238 bfd_set_error (bfd_error_bad_value);
13239 goto error_ret_free_internal;
13240 }
13241
13242 /* Only look for stubs on branch instructions. */
13243 if (r_type != R_PPC64_REL24
13244 && r_type != R_PPC64_REL24_NOTOC
13245 && r_type != R_PPC64_REL14
13246 && r_type != R_PPC64_REL14_BRTAKEN
13247 && r_type != R_PPC64_REL14_BRNTAKEN)
13248 continue;
13249
13250 /* Now determine the call target, its name, value,
13251 section. */
13252 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13253 r_indx, input_bfd))
13254 goto error_ret_free_internal;
13255 hash = ppc_elf_hash_entry (h);
13256
13257 ok_dest = FALSE;
13258 fdh = NULL;
13259 sym_value = 0;
13260 if (hash == NULL)
13261 {
13262 sym_value = sym->st_value;
13263 if (sym_sec != NULL
13264 && sym_sec->output_section != NULL)
13265 ok_dest = TRUE;
13266 }
13267 else if (hash->elf.root.type == bfd_link_hash_defined
13268 || hash->elf.root.type == bfd_link_hash_defweak)
13269 {
13270 sym_value = hash->elf.root.u.def.value;
13271 if (sym_sec->output_section != NULL)
13272 ok_dest = TRUE;
13273 }
13274 else if (hash->elf.root.type == bfd_link_hash_undefweak
13275 || hash->elf.root.type == bfd_link_hash_undefined)
13276 {
13277 /* Recognise an old ABI func code entry sym, and
13278 use the func descriptor sym instead if it is
13279 defined. */
13280 if (hash->elf.root.root.string[0] == '.'
13281 && hash->oh != NULL)
13282 {
13283 fdh = ppc_follow_link (hash->oh);
13284 if (fdh->elf.root.type == bfd_link_hash_defined
13285 || fdh->elf.root.type == bfd_link_hash_defweak)
13286 {
13287 sym_sec = fdh->elf.root.u.def.section;
13288 sym_value = fdh->elf.root.u.def.value;
13289 if (sym_sec->output_section != NULL)
13290 ok_dest = TRUE;
13291 }
13292 else
13293 fdh = NULL;
13294 }
13295 }
13296 else
13297 {
13298 bfd_set_error (bfd_error_bad_value);
13299 goto error_ret_free_internal;
13300 }
13301
13302 destination = 0;
13303 local_off = 0;
13304 if (ok_dest)
13305 {
13306 sym_value += irela->r_addend;
13307 destination = (sym_value
13308 + sym_sec->output_offset
13309 + sym_sec->output_section->vma);
13310 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13311 ? hash->elf.other
13312 : sym->st_other);
13313 }
13314
13315 code_sec = sym_sec;
13316 code_value = sym_value;
13317 opd = get_opd_info (sym_sec);
13318 if (opd != NULL)
13319 {
13320 bfd_vma dest;
13321
13322 if (hash == NULL && opd->adjust != NULL)
13323 {
13324 long adjust = opd->adjust[OPD_NDX (sym_value)];
13325 if (adjust == -1)
13326 continue;
13327 code_value += adjust;
13328 sym_value += adjust;
13329 }
13330 dest = opd_entry_value (sym_sec, sym_value,
13331 &code_sec, &code_value, FALSE);
13332 if (dest != (bfd_vma) -1)
13333 {
13334 destination = dest;
13335 if (fdh != NULL)
13336 {
13337 /* Fixup old ABI sym to point at code
13338 entry. */
13339 hash->elf.root.type = bfd_link_hash_defweak;
13340 hash->elf.root.u.def.section = code_sec;
13341 hash->elf.root.u.def.value = code_value;
13342 }
13343 }
13344 }
13345
13346 /* Determine what (if any) linker stub is needed. */
13347 plt_ent = NULL;
13348 stub_type = ppc_type_of_stub (section, irela, &hash,
13349 &plt_ent, destination,
13350 local_off);
13351
13352 if (r_type == R_PPC64_REL24_NOTOC)
13353 {
13354 if (stub_type == ppc_stub_plt_call)
13355 stub_type = ppc_stub_plt_call_notoc;
13356 else if (stub_type == ppc_stub_long_branch
13357 || (code_sec != NULL
13358 && code_sec->output_section != NULL
13359 && (((hash ? hash->elf.other : sym->st_other)
13360 & STO_PPC64_LOCAL_MASK)
13361 > 1 << STO_PPC64_LOCAL_BIT)))
13362 stub_type = ppc_stub_long_branch_notoc;
13363 }
13364 else if (stub_type != ppc_stub_plt_call)
13365 {
13366 /* Check whether we need a TOC adjusting stub.
13367 Since the linker pastes together pieces from
13368 different object files when creating the
13369 _init and _fini functions, it may be that a
13370 call to what looks like a local sym is in
13371 fact a call needing a TOC adjustment. */
13372 if ((code_sec != NULL
13373 && code_sec->output_section != NULL
13374 && (htab->sec_info[code_sec->id].toc_off
13375 != htab->sec_info[section->id].toc_off)
13376 && (code_sec->has_toc_reloc
13377 || code_sec->makes_toc_func_call))
13378 || (((hash ? hash->elf.other : sym->st_other)
13379 & STO_PPC64_LOCAL_MASK)
13380 == 1 << STO_PPC64_LOCAL_BIT))
13381 stub_type = ppc_stub_long_branch_r2off;
13382 }
13383
13384 if (stub_type == ppc_stub_none)
13385 continue;
13386
13387 /* __tls_get_addr calls might be eliminated. */
13388 if (stub_type != ppc_stub_plt_call
13389 && stub_type != ppc_stub_plt_call_notoc
13390 && hash != NULL
13391 && is_tls_get_addr (&hash->elf, htab)
13392 && section->has_tls_reloc
13393 && irela != internal_relocs)
13394 {
13395 /* Get tls info. */
13396 unsigned char *tls_mask;
13397
13398 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13399 irela - 1, input_bfd))
13400 goto error_ret_free_internal;
13401 if ((*tls_mask & TLS_TLS) != 0
13402 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
13403 continue;
13404 }
13405
13406 if (stub_type == ppc_stub_plt_call)
13407 {
13408 if (!htab->opd_abi
13409 && htab->params->plt_localentry0 != 0
13410 && is_elfv2_localentry0 (&hash->elf))
13411 htab->has_plt_localentry0 = 1;
13412 else if (irela + 1 < irelaend
13413 && irela[1].r_offset == irela->r_offset + 4
13414 && (ELF64_R_TYPE (irela[1].r_info)
13415 == R_PPC64_TOCSAVE))
13416 {
13417 if (!tocsave_find (htab, INSERT,
13418 &local_syms, irela + 1, input_bfd))
13419 goto error_ret_free_internal;
13420 }
13421 else
13422 stub_type = ppc_stub_plt_call_r2save;
13423 }
13424
13425 /* Support for grouping stub sections. */
13426 id_sec = htab->sec_info[section->id].u.group->link_sec;
13427
13428 /* Get the name of this stub. */
13429 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13430 if (!stub_name)
13431 goto error_ret_free_internal;
13432
13433 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13434 stub_name, FALSE, FALSE);
13435 if (stub_entry != NULL)
13436 {
13437 enum ppc_stub_type old_type;
13438 /* A stub has already been created, but it may
13439 not be the required type. We shouldn't be
13440 transitioning from plt_call to long_branch
13441 stubs or vice versa, but we might be
13442 upgrading from plt_call to plt_call_r2save or
13443 from long_branch to long_branch_r2off. */
13444 free (stub_name);
13445 old_type = stub_entry->stub_type;
13446 switch (old_type)
13447 {
13448 default:
13449 abort ();
13450
13451 case ppc_stub_save_res:
13452 continue;
13453
13454 case ppc_stub_plt_call:
13455 case ppc_stub_plt_call_r2save:
13456 case ppc_stub_plt_call_notoc:
13457 case ppc_stub_plt_call_both:
13458 if (stub_type == ppc_stub_plt_call)
13459 continue;
13460 else if (stub_type == ppc_stub_plt_call_r2save)
13461 {
13462 if (old_type == ppc_stub_plt_call_notoc)
13463 stub_type = ppc_stub_plt_call_both;
13464 }
13465 else if (stub_type == ppc_stub_plt_call_notoc)
13466 {
13467 if (old_type == ppc_stub_plt_call_r2save)
13468 stub_type = ppc_stub_plt_call_both;
13469 }
13470 else
13471 abort ();
13472 break;
13473
13474 case ppc_stub_plt_branch:
13475 case ppc_stub_plt_branch_r2off:
13476 case ppc_stub_plt_branch_notoc:
13477 case ppc_stub_plt_branch_both:
13478 old_type += (ppc_stub_long_branch
13479 - ppc_stub_plt_branch);
13480 /* Fall through. */
13481 case ppc_stub_long_branch:
13482 case ppc_stub_long_branch_r2off:
13483 case ppc_stub_long_branch_notoc:
13484 case ppc_stub_long_branch_both:
13485 if (stub_type == ppc_stub_long_branch)
13486 continue;
13487 else if (stub_type == ppc_stub_long_branch_r2off)
13488 {
13489 if (old_type == ppc_stub_long_branch_notoc)
13490 stub_type = ppc_stub_long_branch_both;
13491 }
13492 else if (stub_type == ppc_stub_long_branch_notoc)
13493 {
13494 if (old_type == ppc_stub_long_branch_r2off)
13495 stub_type = ppc_stub_long_branch_both;
13496 }
13497 else
13498 abort ();
13499 break;
13500 }
13501 if (old_type < stub_type)
13502 stub_entry->stub_type = stub_type;
13503 continue;
13504 }
13505
13506 stub_entry = ppc_add_stub (stub_name, section, info);
13507 if (stub_entry == NULL)
13508 {
13509 free (stub_name);
13510 error_ret_free_internal:
13511 if (elf_section_data (section)->relocs == NULL)
13512 free (internal_relocs);
13513 error_ret_free_local:
13514 if (symtab_hdr->contents
13515 != (unsigned char *) local_syms)
13516 free (local_syms);
13517 return FALSE;
13518 }
13519
13520 stub_entry->stub_type = stub_type;
13521 if (stub_type >= ppc_stub_plt_call
13522 && stub_type <= ppc_stub_plt_call_both)
13523 {
13524 stub_entry->target_value = sym_value;
13525 stub_entry->target_section = sym_sec;
13526 }
13527 else
13528 {
13529 stub_entry->target_value = code_value;
13530 stub_entry->target_section = code_sec;
13531 }
13532 stub_entry->h = hash;
13533 stub_entry->plt_ent = plt_ent;
13534 stub_entry->symtype
13535 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13536 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13537
13538 if (hash != NULL
13539 && (hash->elf.root.type == bfd_link_hash_defined
13540 || hash->elf.root.type == bfd_link_hash_defweak))
13541 htab->stub_globals += 1;
13542 }
13543
13544 /* We're done with the internal relocs, free them. */
13545 if (elf_section_data (section)->relocs != internal_relocs)
13546 free (internal_relocs);
13547 }
13548
13549 if (local_syms != NULL
13550 && symtab_hdr->contents != (unsigned char *) local_syms)
13551 {
13552 if (!info->keep_memory)
13553 free (local_syms);
13554 else
13555 symtab_hdr->contents = (unsigned char *) local_syms;
13556 }
13557 }
13558
13559 /* We may have added some stubs. Find out the new size of the
13560 stub sections. */
13561 for (group = htab->group; group != NULL; group = group->next)
13562 {
13563 group->lr_restore = 0;
13564 group->eh_size = 0;
13565 if (group->stub_sec != NULL)
13566 {
13567 asection *stub_sec = group->stub_sec;
13568
13569 if (htab->stub_iteration <= STUB_SHRINK_ITER
13570 || stub_sec->rawsize < stub_sec->size)
13571 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13572 stub_sec->rawsize = stub_sec->size;
13573 stub_sec->size = 0;
13574 stub_sec->reloc_count = 0;
13575 stub_sec->flags &= ~SEC_RELOC;
13576 }
13577 }
13578 if (htab->tga_group != NULL)
13579 {
13580 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13581 htab->tga_group->eh_size
13582 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13583 htab->tga_group->lr_restore = 23 * 4;
13584 htab->tga_group->stub_sec->size = 24 * 4;
13585 }
13586
13587 if (htab->stub_iteration <= STUB_SHRINK_ITER
13588 || htab->brlt->rawsize < htab->brlt->size)
13589 htab->brlt->rawsize = htab->brlt->size;
13590 htab->brlt->size = 0;
13591 htab->brlt->reloc_count = 0;
13592 htab->brlt->flags &= ~SEC_RELOC;
13593 if (htab->relbrlt != NULL)
13594 htab->relbrlt->size = 0;
13595
13596 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13597
13598 for (group = htab->group; group != NULL; group = group->next)
13599 if (group->needs_save_res)
13600 group->stub_sec->size += htab->sfpr->size;
13601
13602 if (info->emitrelocations
13603 && htab->glink != NULL && htab->glink->size != 0)
13604 {
13605 htab->glink->reloc_count = 1;
13606 htab->glink->flags |= SEC_RELOC;
13607 }
13608
13609 if (htab->glink_eh_frame != NULL
13610 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13611 && htab->glink_eh_frame->output_section->size > 8)
13612 {
13613 size_t size = 0, align = 4;
13614
13615 for (group = htab->group; group != NULL; group = group->next)
13616 if (group->eh_size != 0)
13617 size += (group->eh_size + 17 + align - 1) & -align;
13618 if (htab->glink != NULL && htab->glink->size != 0)
13619 size += (24 + align - 1) & -align;
13620 if (size != 0)
13621 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13622 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13623 size = (size + align - 1) & -align;
13624 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13625 htab->glink_eh_frame->size = size;
13626 }
13627
13628 if (htab->params->plt_stub_align != 0)
13629 for (group = htab->group; group != NULL; group = group->next)
13630 if (group->stub_sec != NULL)
13631 {
13632 int align = abs (htab->params->plt_stub_align);
13633 group->stub_sec->size
13634 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13635 }
13636
13637 for (group = htab->group; group != NULL; group = group->next)
13638 if (group->stub_sec != NULL
13639 && group->stub_sec->rawsize != group->stub_sec->size
13640 && (htab->stub_iteration <= STUB_SHRINK_ITER
13641 || group->stub_sec->rawsize < group->stub_sec->size))
13642 break;
13643
13644 if (group == NULL
13645 && (htab->brlt->rawsize == htab->brlt->size
13646 || (htab->stub_iteration > STUB_SHRINK_ITER
13647 && htab->brlt->rawsize > htab->brlt->size))
13648 && (htab->glink_eh_frame == NULL
13649 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13650 && (htab->tga_group == NULL
13651 || htab->stub_iteration > 1))
13652 break;
13653
13654 /* Ask the linker to do its stuff. */
13655 (*htab->params->layout_sections_again) ();
13656 }
13657
13658 if (htab->glink_eh_frame != NULL
13659 && htab->glink_eh_frame->size != 0)
13660 {
13661 bfd_vma val;
13662 bfd_byte *p, *last_fde;
13663 size_t last_fde_len, size, align, pad;
13664 struct map_stub *group;
13665
13666 /* It is necessary to at least have a rough outline of the
13667 linker generated CIEs and FDEs written before
13668 bfd_elf_discard_info is run, in order for these FDEs to be
13669 indexed in .eh_frame_hdr. */
13670 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13671 if (p == NULL)
13672 return FALSE;
13673 htab->glink_eh_frame->contents = p;
13674 last_fde = p;
13675 align = 4;
13676
13677 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13678 /* CIE length (rewrite in case little-endian). */
13679 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13680 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13681 p += last_fde_len + 4;
13682
13683 for (group = htab->group; group != NULL; group = group->next)
13684 if (group->eh_size != 0)
13685 {
13686 group->eh_base = p - htab->glink_eh_frame->contents;
13687 last_fde = p;
13688 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13689 /* FDE length. */
13690 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13691 p += 4;
13692 /* CIE pointer. */
13693 val = p - htab->glink_eh_frame->contents;
13694 bfd_put_32 (htab->elf.dynobj, val, p);
13695 p += 4;
13696 /* Offset to stub section, written later. */
13697 p += 4;
13698 /* stub section size. */
13699 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13700 p += 4;
13701 /* Augmentation. */
13702 p += 1;
13703 /* Make sure we don't have all nops. This is enough for
13704 elf-eh-frame.c to detect the last non-nop opcode. */
13705 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13706 p = last_fde + last_fde_len + 4;
13707 }
13708 if (htab->glink != NULL && htab->glink->size != 0)
13709 {
13710 last_fde = p;
13711 last_fde_len = ((24 + align - 1) & -align) - 4;
13712 /* FDE length. */
13713 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13714 p += 4;
13715 /* CIE pointer. */
13716 val = p - htab->glink_eh_frame->contents;
13717 bfd_put_32 (htab->elf.dynobj, val, p);
13718 p += 4;
13719 /* Offset to .glink, written later. */
13720 p += 4;
13721 /* .glink size. */
13722 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13723 p += 4;
13724 /* Augmentation. */
13725 p += 1;
13726
13727 *p++ = DW_CFA_advance_loc + 1;
13728 *p++ = DW_CFA_register;
13729 *p++ = 65;
13730 *p++ = htab->opd_abi ? 12 : 0;
13731 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13732 *p++ = DW_CFA_restore_extended;
13733 *p++ = 65;
13734 p += ((24 + align - 1) & -align) - 24;
13735 }
13736 /* Subsume any padding into the last FDE if user .eh_frame
13737 sections are aligned more than glink_eh_frame. Otherwise any
13738 zero padding will be seen as a terminator. */
13739 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13740 size = p - htab->glink_eh_frame->contents;
13741 pad = ((size + align - 1) & -align) - size;
13742 htab->glink_eh_frame->size = size + pad;
13743 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13744 }
13745
13746 maybe_strip_output (info, htab->brlt);
13747 if (htab->relbrlt != NULL)
13748 maybe_strip_output (info, htab->relbrlt);
13749 if (htab->glink_eh_frame != NULL)
13750 maybe_strip_output (info, htab->glink_eh_frame);
13751
13752 return TRUE;
13753 }
13754
13755 /* Called after we have determined section placement. If sections
13756 move, we'll be called again. Provide a value for TOCstart. */
13757
13758 bfd_vma
13759 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13760 {
13761 asection *s;
13762 bfd_vma TOCstart, adjust;
13763
13764 if (info != NULL)
13765 {
13766 struct elf_link_hash_entry *h;
13767 struct elf_link_hash_table *htab = elf_hash_table (info);
13768
13769 if (is_elf_hash_table (htab)
13770 && htab->hgot != NULL)
13771 h = htab->hgot;
13772 else
13773 {
13774 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13775 if (is_elf_hash_table (htab))
13776 htab->hgot = h;
13777 }
13778 if (h != NULL
13779 && h->root.type == bfd_link_hash_defined
13780 && !h->root.linker_def
13781 && (!is_elf_hash_table (htab)
13782 || h->def_regular))
13783 {
13784 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
13785 _bfd_set_gp_value (obfd, TOCstart);
13786 return TOCstart;
13787 }
13788 }
13789
13790 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13791 order. The TOC starts where the first of these sections starts. */
13792 s = bfd_get_section_by_name (obfd, ".got");
13793 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13794 s = bfd_get_section_by_name (obfd, ".toc");
13795 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13796 s = bfd_get_section_by_name (obfd, ".tocbss");
13797 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13798 s = bfd_get_section_by_name (obfd, ".plt");
13799 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13800 {
13801 /* This may happen for
13802 o references to TOC base (SYM@toc / TOC[tc0]) without a
13803 .toc directive
13804 o bad linker script
13805 o --gc-sections and empty TOC sections
13806
13807 FIXME: Warn user? */
13808
13809 /* Look for a likely section. We probably won't even be
13810 using TOCstart. */
13811 for (s = obfd->sections; s != NULL; s = s->next)
13812 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13813 | SEC_EXCLUDE))
13814 == (SEC_ALLOC | SEC_SMALL_DATA))
13815 break;
13816 if (s == NULL)
13817 for (s = obfd->sections; s != NULL; s = s->next)
13818 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13819 == (SEC_ALLOC | SEC_SMALL_DATA))
13820 break;
13821 if (s == NULL)
13822 for (s = obfd->sections; s != NULL; s = s->next)
13823 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13824 == SEC_ALLOC)
13825 break;
13826 if (s == NULL)
13827 for (s = obfd->sections; s != NULL; s = s->next)
13828 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13829 break;
13830 }
13831
13832 TOCstart = 0;
13833 if (s != NULL)
13834 TOCstart = s->output_section->vma + s->output_offset;
13835
13836 /* Force alignment. */
13837 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13838 TOCstart -= adjust;
13839 _bfd_set_gp_value (obfd, TOCstart);
13840
13841 if (info != NULL && s != NULL)
13842 {
13843 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13844
13845 if (htab != NULL)
13846 {
13847 if (htab->elf.hgot != NULL)
13848 {
13849 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13850 htab->elf.hgot->root.u.def.section = s;
13851 }
13852 }
13853 else
13854 {
13855 struct bfd_link_hash_entry *bh = NULL;
13856 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13857 s, TOC_BASE_OFF - adjust,
13858 NULL, FALSE, FALSE, &bh);
13859 }
13860 }
13861 return TOCstart;
13862 }
13863
13864 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13865 write out any global entry stubs, and PLT relocations. */
13866
13867 static bfd_boolean
13868 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13869 {
13870 struct bfd_link_info *info;
13871 struct ppc_link_hash_table *htab;
13872 struct plt_entry *ent;
13873 asection *s;
13874
13875 if (h->root.type == bfd_link_hash_indirect)
13876 return TRUE;
13877
13878 info = inf;
13879 htab = ppc_hash_table (info);
13880 if (htab == NULL)
13881 return FALSE;
13882
13883 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13884 if (ent->plt.offset != (bfd_vma) -1)
13885 {
13886 /* This symbol has an entry in the procedure linkage
13887 table. Set it up. */
13888 Elf_Internal_Rela rela;
13889 asection *plt, *relplt;
13890 bfd_byte *loc;
13891
13892 if (!htab->elf.dynamic_sections_created
13893 || h->dynindx == -1)
13894 {
13895 if (!(h->def_regular
13896 && (h->root.type == bfd_link_hash_defined
13897 || h->root.type == bfd_link_hash_defweak)))
13898 continue;
13899 if (h->type == STT_GNU_IFUNC)
13900 {
13901 plt = htab->elf.iplt;
13902 relplt = htab->elf.irelplt;
13903 htab->local_ifunc_resolver = 1;
13904 if (htab->opd_abi)
13905 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13906 else
13907 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13908 }
13909 else
13910 {
13911 plt = htab->pltlocal;
13912 if (bfd_link_pic (info))
13913 {
13914 relplt = htab->relpltlocal;
13915 if (htab->opd_abi)
13916 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13917 else
13918 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13919 }
13920 else
13921 relplt = NULL;
13922 }
13923 rela.r_addend = defined_sym_val (h) + ent->addend;
13924
13925 if (relplt == NULL)
13926 {
13927 loc = plt->contents + ent->plt.offset;
13928 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13929 if (htab->opd_abi)
13930 {
13931 bfd_vma toc = elf_gp (info->output_bfd);
13932 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13933 bfd_put_64 (info->output_bfd, toc, loc + 8);
13934 }
13935 }
13936 else
13937 {
13938 rela.r_offset = (plt->output_section->vma
13939 + plt->output_offset
13940 + ent->plt.offset);
13941 loc = relplt->contents + (relplt->reloc_count++
13942 * sizeof (Elf64_External_Rela));
13943 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13944 }
13945 }
13946 else
13947 {
13948 rela.r_offset = (htab->elf.splt->output_section->vma
13949 + htab->elf.splt->output_offset
13950 + ent->plt.offset);
13951 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13952 rela.r_addend = ent->addend;
13953 loc = (htab->elf.srelplt->contents
13954 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13955 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13956 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13957 htab->maybe_local_ifunc_resolver = 1;
13958 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13959 }
13960 }
13961
13962 if (!h->pointer_equality_needed)
13963 return TRUE;
13964
13965 if (h->def_regular)
13966 return TRUE;
13967
13968 s = htab->global_entry;
13969 if (s == NULL || s->size == 0)
13970 return TRUE;
13971
13972 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13973 if (ent->plt.offset != (bfd_vma) -1
13974 && ent->addend == 0)
13975 {
13976 bfd_byte *p;
13977 asection *plt;
13978 bfd_vma off;
13979
13980 p = s->contents + h->root.u.def.value;
13981 plt = htab->elf.splt;
13982 if (!htab->elf.dynamic_sections_created
13983 || h->dynindx == -1)
13984 {
13985 if (h->type == STT_GNU_IFUNC)
13986 plt = htab->elf.iplt;
13987 else
13988 plt = htab->pltlocal;
13989 }
13990 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13991 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13992
13993 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13994 {
13995 info->callbacks->einfo
13996 (_("%P: linkage table error against `%pT'\n"),
13997 h->root.root.string);
13998 bfd_set_error (bfd_error_bad_value);
13999 htab->stub_error = TRUE;
14000 }
14001
14002 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14003 if (htab->params->emit_stub_syms)
14004 {
14005 size_t len = strlen (h->root.root.string);
14006 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14007
14008 if (name == NULL)
14009 return FALSE;
14010
14011 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14012 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14013 if (h == NULL)
14014 return FALSE;
14015 if (h->root.type == bfd_link_hash_new)
14016 {
14017 h->root.type = bfd_link_hash_defined;
14018 h->root.u.def.section = s;
14019 h->root.u.def.value = p - s->contents;
14020 h->ref_regular = 1;
14021 h->def_regular = 1;
14022 h->ref_regular_nonweak = 1;
14023 h->forced_local = 1;
14024 h->non_elf = 0;
14025 h->root.linker_def = 1;
14026 }
14027 }
14028
14029 if (PPC_HA (off) != 0)
14030 {
14031 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14032 p += 4;
14033 }
14034 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14035 p += 4;
14036 bfd_put_32 (s->owner, MTCTR_R12, p);
14037 p += 4;
14038 bfd_put_32 (s->owner, BCTR, p);
14039 break;
14040 }
14041 return TRUE;
14042 }
14043
14044 /* Write PLT relocs for locals. */
14045
14046 static bfd_boolean
14047 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14048 {
14049 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14050 bfd *ibfd;
14051
14052 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14053 {
14054 struct got_entry **lgot_ents, **end_lgot_ents;
14055 struct plt_entry **local_plt, **lplt, **end_local_plt;
14056 Elf_Internal_Shdr *symtab_hdr;
14057 bfd_size_type locsymcount;
14058 Elf_Internal_Sym *local_syms = NULL;
14059 struct plt_entry *ent;
14060
14061 if (!is_ppc64_elf (ibfd))
14062 continue;
14063
14064 lgot_ents = elf_local_got_ents (ibfd);
14065 if (!lgot_ents)
14066 continue;
14067
14068 symtab_hdr = &elf_symtab_hdr (ibfd);
14069 locsymcount = symtab_hdr->sh_info;
14070 end_lgot_ents = lgot_ents + locsymcount;
14071 local_plt = (struct plt_entry **) end_lgot_ents;
14072 end_local_plt = local_plt + locsymcount;
14073 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14074 for (ent = *lplt; ent != NULL; ent = ent->next)
14075 if (ent->plt.offset != (bfd_vma) -1)
14076 {
14077 Elf_Internal_Sym *sym;
14078 asection *sym_sec;
14079 asection *plt, *relplt;
14080 bfd_byte *loc;
14081 bfd_vma val;
14082
14083 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14084 lplt - local_plt, ibfd))
14085 {
14086 if (symtab_hdr->contents != (unsigned char *) local_syms)
14087 free (local_syms);
14088 return FALSE;
14089 }
14090
14091 val = sym->st_value + ent->addend;
14092 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14093 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
14094 if (sym_sec != NULL && sym_sec->output_section != NULL)
14095 val += sym_sec->output_offset + sym_sec->output_section->vma;
14096
14097 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14098 {
14099 htab->local_ifunc_resolver = 1;
14100 plt = htab->elf.iplt;
14101 relplt = htab->elf.irelplt;
14102 }
14103 else
14104 {
14105 plt = htab->pltlocal;
14106 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14107 }
14108
14109 if (relplt == NULL)
14110 {
14111 loc = plt->contents + ent->plt.offset;
14112 bfd_put_64 (info->output_bfd, val, loc);
14113 if (htab->opd_abi)
14114 {
14115 bfd_vma toc = elf_gp (ibfd);
14116 bfd_put_64 (info->output_bfd, toc, loc + 8);
14117 }
14118 }
14119 else
14120 {
14121 Elf_Internal_Rela rela;
14122 rela.r_offset = (ent->plt.offset
14123 + plt->output_offset
14124 + plt->output_section->vma);
14125 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14126 {
14127 if (htab->opd_abi)
14128 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14129 else
14130 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14131 }
14132 else
14133 {
14134 if (htab->opd_abi)
14135 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14136 else
14137 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14138 }
14139 rela.r_addend = val;
14140 loc = relplt->contents + (relplt->reloc_count++
14141 * sizeof (Elf64_External_Rela));
14142 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14143 }
14144 }
14145
14146 if (local_syms != NULL
14147 && symtab_hdr->contents != (unsigned char *) local_syms)
14148 {
14149 if (!info->keep_memory)
14150 free (local_syms);
14151 else
14152 symtab_hdr->contents = (unsigned char *) local_syms;
14153 }
14154 }
14155 return TRUE;
14156 }
14157
14158 /* Emit the static wrapper function preserving registers around a
14159 __tls_get_addr_opt call. */
14160
14161 static bfd_boolean
14162 emit_tga_desc (struct ppc_link_hash_table *htab)
14163 {
14164 asection *stub_sec = htab->tga_group->stub_sec;
14165 unsigned int cfa_updt = 11 * 4;
14166 bfd_byte *p;
14167 bfd_vma to, from, delta;
14168
14169 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14170 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14171 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14172 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14173 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14174 delta = to - from;
14175 if (delta + (1 << 25) >= 1 << 26)
14176 {
14177 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14178 htab->stub_error = TRUE;
14179 return FALSE;
14180 }
14181
14182 p = stub_sec->contents;
14183 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14184 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14185 p += 4;
14186 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14187 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14188 }
14189
14190 /* Emit eh_frame describing the static wrapper function. */
14191
14192 static bfd_byte *
14193 emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14194 {
14195 unsigned int cfa_updt = 11 * 4;
14196 unsigned int i;
14197
14198 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14199 *p++ = DW_CFA_def_cfa_offset;
14200 if (htab->opd_abi)
14201 {
14202 *p++ = 128;
14203 *p++ = 1;
14204 }
14205 else
14206 *p++ = 96;
14207 *p++ = DW_CFA_offset_extended_sf;
14208 *p++ = 65;
14209 *p++ = (-16 / 8) & 0x7f;
14210 for (i = 4; i < 12; i++)
14211 {
14212 *p++ = DW_CFA_offset + i;
14213 *p++ = (htab->opd_abi ? 13 : 12) - i;
14214 }
14215 *p++ = DW_CFA_advance_loc + 10;
14216 *p++ = DW_CFA_def_cfa_offset;
14217 *p++ = 0;
14218 for (i = 4; i < 12; i++)
14219 *p++ = DW_CFA_restore + i;
14220 *p++ = DW_CFA_advance_loc + 2;
14221 *p++ = DW_CFA_restore_extended;
14222 *p++ = 65;
14223 return p;
14224 }
14225
14226 /* Build all the stubs associated with the current output file.
14227 The stubs are kept in a hash table attached to the main linker
14228 hash table. This function is called via gldelf64ppc_finish. */
14229
14230 bfd_boolean
14231 ppc64_elf_build_stubs (struct bfd_link_info *info,
14232 char **stats)
14233 {
14234 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14235 struct map_stub *group;
14236 asection *stub_sec;
14237 bfd_byte *p;
14238 int stub_sec_count = 0;
14239
14240 if (htab == NULL)
14241 return FALSE;
14242
14243 /* Allocate memory to hold the linker stubs. */
14244 for (group = htab->group; group != NULL; group = group->next)
14245 {
14246 group->eh_size = 0;
14247 group->lr_restore = 0;
14248 if ((stub_sec = group->stub_sec) != NULL
14249 && stub_sec->size != 0)
14250 {
14251 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14252 stub_sec->size);
14253 if (stub_sec->contents == NULL)
14254 return FALSE;
14255 stub_sec->size = 0;
14256 }
14257 }
14258
14259 if (htab->glink != NULL && htab->glink->size != 0)
14260 {
14261 unsigned int indx;
14262 bfd_vma plt0;
14263
14264 /* Build the .glink plt call stub. */
14265 if (htab->params->emit_stub_syms)
14266 {
14267 struct elf_link_hash_entry *h;
14268 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14269 TRUE, FALSE, FALSE);
14270 if (h == NULL)
14271 return FALSE;
14272 if (h->root.type == bfd_link_hash_new)
14273 {
14274 h->root.type = bfd_link_hash_defined;
14275 h->root.u.def.section = htab->glink;
14276 h->root.u.def.value = 8;
14277 h->ref_regular = 1;
14278 h->def_regular = 1;
14279 h->ref_regular_nonweak = 1;
14280 h->forced_local = 1;
14281 h->non_elf = 0;
14282 h->root.linker_def = 1;
14283 }
14284 }
14285 plt0 = (htab->elf.splt->output_section->vma
14286 + htab->elf.splt->output_offset
14287 - 16);
14288 if (info->emitrelocations)
14289 {
14290 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14291 if (r == NULL)
14292 return FALSE;
14293 r->r_offset = (htab->glink->output_offset
14294 + htab->glink->output_section->vma);
14295 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14296 r->r_addend = plt0;
14297 }
14298 p = htab->glink->contents;
14299 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
14300 bfd_put_64 (htab->glink->owner, plt0, p);
14301 p += 8;
14302 if (htab->opd_abi)
14303 {
14304 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14305 p += 4;
14306 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14307 p += 4;
14308 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14309 p += 4;
14310 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14311 p += 4;
14312 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14313 p += 4;
14314 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14315 p += 4;
14316 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14317 p += 4;
14318 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14319 p += 4;
14320 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14321 p += 4;
14322 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14323 p += 4;
14324 }
14325 else
14326 {
14327 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14328 p += 4;
14329 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14330 p += 4;
14331 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14332 p += 4;
14333 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14334 p += 4;
14335 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14336 p += 4;
14337 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14338 p += 4;
14339 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14340 p += 4;
14341 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14342 p += 4;
14343 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14344 p += 4;
14345 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14346 p += 4;
14347 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14348 p += 4;
14349 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14350 p += 4;
14351 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14352 p += 4;
14353 }
14354 bfd_put_32 (htab->glink->owner, BCTR, p);
14355 p += 4;
14356 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
14357
14358 /* Build the .glink lazy link call stubs. */
14359 indx = 0;
14360 while (p < htab->glink->contents + htab->glink->size)
14361 {
14362 if (htab->opd_abi)
14363 {
14364 if (indx < 0x8000)
14365 {
14366 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14367 p += 4;
14368 }
14369 else
14370 {
14371 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14372 p += 4;
14373 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14374 p);
14375 p += 4;
14376 }
14377 }
14378 bfd_put_32 (htab->glink->owner,
14379 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
14380 indx++;
14381 p += 4;
14382 }
14383 }
14384
14385 if (htab->tga_group != NULL)
14386 {
14387 htab->tga_group->lr_restore = 23 * 4;
14388 htab->tga_group->stub_sec->size = 24 * 4;
14389 if (!emit_tga_desc (htab))
14390 return FALSE;
14391 if (htab->glink_eh_frame != NULL
14392 && htab->glink_eh_frame->size != 0)
14393 {
14394 size_t align = 4;
14395
14396 p = htab->glink_eh_frame->contents;
14397 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14398 p += 17;
14399 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14400 }
14401 }
14402
14403 /* Build .glink global entry stubs, and PLT relocs for globals. */
14404 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14405
14406 if (!write_plt_relocs_for_local_syms (info))
14407 return FALSE;
14408
14409 if (htab->brlt != NULL && htab->brlt->size != 0)
14410 {
14411 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
14412 htab->brlt->size);
14413 if (htab->brlt->contents == NULL)
14414 return FALSE;
14415 }
14416 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
14417 {
14418 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
14419 htab->relbrlt->size);
14420 if (htab->relbrlt->contents == NULL)
14421 return FALSE;
14422 }
14423
14424 /* Build the stubs as directed by the stub hash table. */
14425 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
14426
14427 for (group = htab->group; group != NULL; group = group->next)
14428 if (group->needs_save_res)
14429 group->stub_sec->size += htab->sfpr->size;
14430
14431 if (htab->relbrlt != NULL)
14432 htab->relbrlt->reloc_count = 0;
14433
14434 if (htab->params->plt_stub_align != 0)
14435 for (group = htab->group; group != NULL; group = group->next)
14436 if ((stub_sec = group->stub_sec) != NULL)
14437 {
14438 int align = abs (htab->params->plt_stub_align);
14439 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14440 }
14441
14442 for (group = htab->group; group != NULL; group = group->next)
14443 if (group->needs_save_res)
14444 {
14445 stub_sec = group->stub_sec;
14446 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14447 htab->sfpr->contents, htab->sfpr->size);
14448 if (htab->params->emit_stub_syms)
14449 {
14450 unsigned int i;
14451
14452 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14453 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14454 return FALSE;
14455 }
14456 }
14457
14458 if (htab->glink_eh_frame != NULL
14459 && htab->glink_eh_frame->size != 0)
14460 {
14461 bfd_vma val;
14462 size_t align = 4;
14463
14464 p = htab->glink_eh_frame->contents;
14465 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14466
14467 for (group = htab->group; group != NULL; group = group->next)
14468 if (group->eh_size != 0)
14469 {
14470 /* Offset to stub section. */
14471 val = (group->stub_sec->output_section->vma
14472 + group->stub_sec->output_offset);
14473 val -= (htab->glink_eh_frame->output_section->vma
14474 + htab->glink_eh_frame->output_offset
14475 + (p + 8 - htab->glink_eh_frame->contents));
14476 if (val + 0x80000000 > 0xffffffff)
14477 {
14478 _bfd_error_handler
14479 (_("%s offset too large for .eh_frame sdata4 encoding"),
14480 group->stub_sec->name);
14481 return FALSE;
14482 }
14483 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14484 p += (group->eh_size + 17 + 3) & -4;
14485 }
14486 if (htab->glink != NULL && htab->glink->size != 0)
14487 {
14488 /* Offset to .glink. */
14489 val = (htab->glink->output_section->vma
14490 + htab->glink->output_offset
14491 + 8);
14492 val -= (htab->glink_eh_frame->output_section->vma
14493 + htab->glink_eh_frame->output_offset
14494 + (p + 8 - htab->glink_eh_frame->contents));
14495 if (val + 0x80000000 > 0xffffffff)
14496 {
14497 _bfd_error_handler
14498 (_("%s offset too large for .eh_frame sdata4 encoding"),
14499 htab->glink->name);
14500 return FALSE;
14501 }
14502 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14503 p += (24 + align - 1) & -align;
14504 }
14505 }
14506
14507 for (group = htab->group; group != NULL; group = group->next)
14508 if ((stub_sec = group->stub_sec) != NULL)
14509 {
14510 stub_sec_count += 1;
14511 if (stub_sec->rawsize != stub_sec->size
14512 && (htab->stub_iteration <= STUB_SHRINK_ITER
14513 || stub_sec->rawsize < stub_sec->size))
14514 break;
14515 }
14516
14517 if (group != NULL)
14518 {
14519 htab->stub_error = TRUE;
14520 _bfd_error_handler (_("stubs don't match calculated size"));
14521 }
14522
14523 if (htab->stub_error)
14524 return FALSE;
14525
14526 if (stats != NULL)
14527 {
14528 char *groupmsg;
14529 if (asprintf (&groupmsg,
14530 ngettext ("linker stubs in %u group\n",
14531 "linker stubs in %u groups\n",
14532 stub_sec_count),
14533 stub_sec_count) < 0)
14534 *stats = NULL;
14535 else
14536 {
14537 if (asprintf (stats, _("%s"
14538 " branch %lu\n"
14539 " branch toc adj %lu\n"
14540 " branch notoc %lu\n"
14541 " branch both %lu\n"
14542 " long branch %lu\n"
14543 " long toc adj %lu\n"
14544 " long notoc %lu\n"
14545 " long both %lu\n"
14546 " plt call %lu\n"
14547 " plt call save %lu\n"
14548 " plt call notoc %lu\n"
14549 " plt call both %lu\n"
14550 " global entry %lu"),
14551 groupmsg,
14552 htab->stub_count[ppc_stub_long_branch - 1],
14553 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14554 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14555 htab->stub_count[ppc_stub_long_branch_both - 1],
14556 htab->stub_count[ppc_stub_plt_branch - 1],
14557 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14558 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14559 htab->stub_count[ppc_stub_plt_branch_both - 1],
14560 htab->stub_count[ppc_stub_plt_call - 1],
14561 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14562 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14563 htab->stub_count[ppc_stub_plt_call_both - 1],
14564 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14565 *stats = NULL;
14566 free (groupmsg);
14567 }
14568 }
14569 return TRUE;
14570 }
14571
14572 /* What to do when ld finds relocations against symbols defined in
14573 discarded sections. */
14574
14575 static unsigned int
14576 ppc64_elf_action_discarded (asection *sec)
14577 {
14578 if (strcmp (".opd", sec->name) == 0)
14579 return 0;
14580
14581 if (strcmp (".toc", sec->name) == 0)
14582 return 0;
14583
14584 if (strcmp (".toc1", sec->name) == 0)
14585 return 0;
14586
14587 return _bfd_elf_default_action_discarded (sec);
14588 }
14589
14590 /* These are the dynamic relocations supported by glibc. */
14591
14592 static bfd_boolean
14593 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14594 {
14595 switch (r_type)
14596 {
14597 case R_PPC64_RELATIVE:
14598 case R_PPC64_NONE:
14599 case R_PPC64_ADDR64:
14600 case R_PPC64_GLOB_DAT:
14601 case R_PPC64_IRELATIVE:
14602 case R_PPC64_JMP_IREL:
14603 case R_PPC64_JMP_SLOT:
14604 case R_PPC64_DTPMOD64:
14605 case R_PPC64_DTPREL64:
14606 case R_PPC64_TPREL64:
14607 case R_PPC64_TPREL16_LO_DS:
14608 case R_PPC64_TPREL16_DS:
14609 case R_PPC64_TPREL16:
14610 case R_PPC64_TPREL16_LO:
14611 case R_PPC64_TPREL16_HI:
14612 case R_PPC64_TPREL16_HIGH:
14613 case R_PPC64_TPREL16_HA:
14614 case R_PPC64_TPREL16_HIGHA:
14615 case R_PPC64_TPREL16_HIGHER:
14616 case R_PPC64_TPREL16_HIGHEST:
14617 case R_PPC64_TPREL16_HIGHERA:
14618 case R_PPC64_TPREL16_HIGHESTA:
14619 case R_PPC64_ADDR16_LO_DS:
14620 case R_PPC64_ADDR16_LO:
14621 case R_PPC64_ADDR16_HI:
14622 case R_PPC64_ADDR16_HIGH:
14623 case R_PPC64_ADDR16_HA:
14624 case R_PPC64_ADDR16_HIGHA:
14625 case R_PPC64_REL30:
14626 case R_PPC64_COPY:
14627 case R_PPC64_UADDR64:
14628 case R_PPC64_UADDR32:
14629 case R_PPC64_ADDR32:
14630 case R_PPC64_ADDR24:
14631 case R_PPC64_ADDR16:
14632 case R_PPC64_UADDR16:
14633 case R_PPC64_ADDR16_DS:
14634 case R_PPC64_ADDR16_HIGHER:
14635 case R_PPC64_ADDR16_HIGHEST:
14636 case R_PPC64_ADDR16_HIGHERA:
14637 case R_PPC64_ADDR16_HIGHESTA:
14638 case R_PPC64_ADDR14:
14639 case R_PPC64_ADDR14_BRTAKEN:
14640 case R_PPC64_ADDR14_BRNTAKEN:
14641 case R_PPC64_REL32:
14642 case R_PPC64_REL64:
14643 return TRUE;
14644
14645 default:
14646 return FALSE;
14647 }
14648 }
14649
14650 /* The RELOCATE_SECTION function is called by the ELF backend linker
14651 to handle the relocations for a section.
14652
14653 The relocs are always passed as Rela structures; if the section
14654 actually uses Rel structures, the r_addend field will always be
14655 zero.
14656
14657 This function is responsible for adjust the section contents as
14658 necessary, and (if using Rela relocs and generating a
14659 relocatable output file) adjusting the reloc addend as
14660 necessary.
14661
14662 This function does not have to worry about setting the reloc
14663 address or the reloc symbol index.
14664
14665 LOCAL_SYMS is a pointer to the swapped in local symbols.
14666
14667 LOCAL_SECTIONS is an array giving the section in the input file
14668 corresponding to the st_shndx field of each local symbol.
14669
14670 The global hash table entry for the global symbols can be found
14671 via elf_sym_hashes (input_bfd).
14672
14673 When generating relocatable output, this function must handle
14674 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14675 going to be the section symbol corresponding to the output
14676 section, which means that the addend must be adjusted
14677 accordingly. */
14678
14679 static bfd_boolean
14680 ppc64_elf_relocate_section (bfd *output_bfd,
14681 struct bfd_link_info *info,
14682 bfd *input_bfd,
14683 asection *input_section,
14684 bfd_byte *contents,
14685 Elf_Internal_Rela *relocs,
14686 Elf_Internal_Sym *local_syms,
14687 asection **local_sections)
14688 {
14689 struct ppc_link_hash_table *htab;
14690 Elf_Internal_Shdr *symtab_hdr;
14691 struct elf_link_hash_entry **sym_hashes;
14692 Elf_Internal_Rela *rel;
14693 Elf_Internal_Rela *wrel;
14694 Elf_Internal_Rela *relend;
14695 Elf_Internal_Rela outrel;
14696 bfd_byte *loc;
14697 struct got_entry **local_got_ents;
14698 bfd_vma TOCstart;
14699 bfd_boolean ret = TRUE;
14700 bfd_boolean is_opd;
14701 /* Assume 'at' branch hints. */
14702 bfd_boolean is_isa_v2 = TRUE;
14703 bfd_boolean warned_dynamic = FALSE;
14704 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14705
14706 /* Initialize howto table if needed. */
14707 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14708 ppc_howto_init ();
14709
14710 htab = ppc_hash_table (info);
14711 if (htab == NULL)
14712 return FALSE;
14713
14714 /* Don't relocate stub sections. */
14715 if (input_section->owner == htab->params->stub_bfd)
14716 return TRUE;
14717
14718 if (!is_ppc64_elf (input_bfd))
14719 {
14720 bfd_set_error (bfd_error_wrong_format);
14721 return FALSE;
14722 }
14723
14724 local_got_ents = elf_local_got_ents (input_bfd);
14725 TOCstart = elf_gp (output_bfd);
14726 symtab_hdr = &elf_symtab_hdr (input_bfd);
14727 sym_hashes = elf_sym_hashes (input_bfd);
14728 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14729
14730 rel = wrel = relocs;
14731 relend = relocs + input_section->reloc_count;
14732 for (; rel < relend; wrel++, rel++)
14733 {
14734 enum elf_ppc64_reloc_type r_type;
14735 bfd_vma addend;
14736 bfd_reloc_status_type r;
14737 Elf_Internal_Sym *sym;
14738 asection *sec;
14739 struct elf_link_hash_entry *h_elf;
14740 struct ppc_link_hash_entry *h;
14741 struct ppc_link_hash_entry *fdh;
14742 const char *sym_name;
14743 unsigned long r_symndx, toc_symndx;
14744 bfd_vma toc_addend;
14745 unsigned char tls_mask, tls_gd, tls_type;
14746 unsigned char sym_type;
14747 bfd_vma relocation;
14748 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14749 bfd_boolean warned;
14750 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14751 unsigned int insn;
14752 unsigned int mask;
14753 struct ppc_stub_hash_entry *stub_entry;
14754 bfd_vma max_br_offset;
14755 bfd_vma from;
14756 Elf_Internal_Rela orig_rel;
14757 reloc_howto_type *howto;
14758 struct reloc_howto_struct alt_howto;
14759 uint64_t pinsn;
14760 bfd_vma offset;
14761
14762 again:
14763 orig_rel = *rel;
14764
14765 r_type = ELF64_R_TYPE (rel->r_info);
14766 r_symndx = ELF64_R_SYM (rel->r_info);
14767
14768 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14769 symbol of the previous ADDR64 reloc. The symbol gives us the
14770 proper TOC base to use. */
14771 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14772 && wrel != relocs
14773 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14774 && is_opd)
14775 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14776
14777 sym = NULL;
14778 sec = NULL;
14779 h_elf = NULL;
14780 sym_name = NULL;
14781 unresolved_reloc = FALSE;
14782 warned = FALSE;
14783
14784 if (r_symndx < symtab_hdr->sh_info)
14785 {
14786 /* It's a local symbol. */
14787 struct _opd_sec_data *opd;
14788
14789 sym = local_syms + r_symndx;
14790 sec = local_sections[r_symndx];
14791 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14792 sym_type = ELF64_ST_TYPE (sym->st_info);
14793 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14794 opd = get_opd_info (sec);
14795 if (opd != NULL && opd->adjust != NULL)
14796 {
14797 long adjust = opd->adjust[OPD_NDX (sym->st_value
14798 + rel->r_addend)];
14799 if (adjust == -1)
14800 relocation = 0;
14801 else
14802 {
14803 /* If this is a relocation against the opd section sym
14804 and we have edited .opd, adjust the reloc addend so
14805 that ld -r and ld --emit-relocs output is correct.
14806 If it is a reloc against some other .opd symbol,
14807 then the symbol value will be adjusted later. */
14808 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14809 rel->r_addend += adjust;
14810 else
14811 relocation += adjust;
14812 }
14813 }
14814 }
14815 else
14816 {
14817 bfd_boolean ignored;
14818
14819 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14820 r_symndx, symtab_hdr, sym_hashes,
14821 h_elf, sec, relocation,
14822 unresolved_reloc, warned, ignored);
14823 sym_name = h_elf->root.root.string;
14824 sym_type = h_elf->type;
14825 if (sec != NULL
14826 && sec->owner == output_bfd
14827 && strcmp (sec->name, ".opd") == 0)
14828 {
14829 /* This is a symbol defined in a linker script. All
14830 such are defined in output sections, even those
14831 defined by simple assignment from a symbol defined in
14832 an input section. Transfer the symbol to an
14833 appropriate input .opd section, so that a branch to
14834 this symbol will be mapped to the location specified
14835 by the opd entry. */
14836 struct bfd_link_order *lo;
14837 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14838 if (lo->type == bfd_indirect_link_order)
14839 {
14840 asection *isec = lo->u.indirect.section;
14841 if (h_elf->root.u.def.value >= isec->output_offset
14842 && h_elf->root.u.def.value < (isec->output_offset
14843 + isec->size))
14844 {
14845 h_elf->root.u.def.value -= isec->output_offset;
14846 h_elf->root.u.def.section = isec;
14847 sec = isec;
14848 break;
14849 }
14850 }
14851 }
14852 }
14853 h = ppc_elf_hash_entry (h_elf);
14854
14855 if (sec != NULL && discarded_section (sec))
14856 {
14857 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14858 input_bfd, input_section,
14859 contents, rel->r_offset);
14860 wrel->r_offset = rel->r_offset;
14861 wrel->r_info = 0;
14862 wrel->r_addend = 0;
14863
14864 /* For ld -r, remove relocations in debug sections against
14865 symbols defined in discarded sections. Not done for
14866 non-debug to preserve relocs in .eh_frame which the
14867 eh_frame editing code expects to be present. */
14868 if (bfd_link_relocatable (info)
14869 && (input_section->flags & SEC_DEBUGGING))
14870 wrel--;
14871
14872 continue;
14873 }
14874
14875 if (bfd_link_relocatable (info))
14876 goto copy_reloc;
14877
14878 if (h != NULL && &h->elf == htab->elf.hgot)
14879 {
14880 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14881 sec = bfd_abs_section_ptr;
14882 unresolved_reloc = FALSE;
14883 }
14884
14885 /* TLS optimizations. Replace instruction sequences and relocs
14886 based on information we collected in tls_optimize. We edit
14887 RELOCS so that --emit-relocs will output something sensible
14888 for the final instruction stream. */
14889 tls_mask = 0;
14890 tls_gd = 0;
14891 toc_symndx = 0;
14892 if (h != NULL)
14893 tls_mask = h->tls_mask;
14894 else if (local_got_ents != NULL)
14895 {
14896 struct plt_entry **local_plt = (struct plt_entry **)
14897 (local_got_ents + symtab_hdr->sh_info);
14898 unsigned char *lgot_masks = (unsigned char *)
14899 (local_plt + symtab_hdr->sh_info);
14900 tls_mask = lgot_masks[r_symndx];
14901 }
14902 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14903 && (r_type == R_PPC64_TLS
14904 || r_type == R_PPC64_TLSGD
14905 || r_type == R_PPC64_TLSLD))
14906 {
14907 /* Check for toc tls entries. */
14908 unsigned char *toc_tls;
14909
14910 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14911 &local_syms, rel, input_bfd))
14912 return FALSE;
14913
14914 if (toc_tls)
14915 tls_mask = *toc_tls;
14916 }
14917
14918 /* Check that tls relocs are used with tls syms, and non-tls
14919 relocs are used with non-tls syms. */
14920 if (r_symndx != STN_UNDEF
14921 && r_type != R_PPC64_NONE
14922 && (h == NULL
14923 || h->elf.root.type == bfd_link_hash_defined
14924 || h->elf.root.type == bfd_link_hash_defweak)
14925 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14926 {
14927 if ((tls_mask & TLS_TLS) != 0
14928 && (r_type == R_PPC64_TLS
14929 || r_type == R_PPC64_TLSGD
14930 || r_type == R_PPC64_TLSLD))
14931 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14932 ;
14933 else
14934 info->callbacks->einfo
14935 (!IS_PPC64_TLS_RELOC (r_type)
14936 /* xgettext:c-format */
14937 ? _("%H: %s used with TLS symbol `%pT'\n")
14938 /* xgettext:c-format */
14939 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14940 input_bfd, input_section, rel->r_offset,
14941 ppc64_elf_howto_table[r_type]->name,
14942 sym_name);
14943 }
14944
14945 /* Ensure reloc mapping code below stays sane. */
14946 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14947 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14948 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14949 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14950 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14951 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14952 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14953 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14954 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14955 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14956 abort ();
14957
14958 switch (r_type)
14959 {
14960 default:
14961 break;
14962
14963 case R_PPC64_LO_DS_OPT:
14964 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14965 if ((insn & (0x3fu << 26)) != 58u << 26)
14966 abort ();
14967 insn += (14u << 26) - (58u << 26);
14968 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14969 r_type = R_PPC64_TOC16_LO;
14970 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14971 break;
14972
14973 case R_PPC64_TOC16:
14974 case R_PPC64_TOC16_LO:
14975 case R_PPC64_TOC16_DS:
14976 case R_PPC64_TOC16_LO_DS:
14977 {
14978 /* Check for toc tls entries. */
14979 unsigned char *toc_tls;
14980 int retval;
14981
14982 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14983 &local_syms, rel, input_bfd);
14984 if (retval == 0)
14985 return FALSE;
14986
14987 if (toc_tls)
14988 {
14989 tls_mask = *toc_tls;
14990 if (r_type == R_PPC64_TOC16_DS
14991 || r_type == R_PPC64_TOC16_LO_DS)
14992 {
14993 if ((tls_mask & TLS_TLS) != 0
14994 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14995 goto toctprel;
14996 }
14997 else
14998 {
14999 /* If we found a GD reloc pair, then we might be
15000 doing a GD->IE transition. */
15001 if (retval == 2)
15002 {
15003 tls_gd = TLS_GDIE;
15004 if ((tls_mask & TLS_TLS) != 0
15005 && (tls_mask & TLS_GD) == 0)
15006 goto tls_ldgd_opt;
15007 }
15008 else if (retval == 3)
15009 {
15010 if ((tls_mask & TLS_TLS) != 0
15011 && (tls_mask & TLS_LD) == 0)
15012 goto tls_ldgd_opt;
15013 }
15014 }
15015 }
15016 }
15017 break;
15018
15019 case R_PPC64_GOT_TPREL16_HI:
15020 case R_PPC64_GOT_TPREL16_HA:
15021 if ((tls_mask & TLS_TLS) != 0
15022 && (tls_mask & TLS_TPREL) == 0)
15023 {
15024 rel->r_offset -= d_offset;
15025 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15026 r_type = R_PPC64_NONE;
15027 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15028 }
15029 break;
15030
15031 case R_PPC64_GOT_TPREL16_DS:
15032 case R_PPC64_GOT_TPREL16_LO_DS:
15033 if ((tls_mask & TLS_TLS) != 0
15034 && (tls_mask & TLS_TPREL) == 0)
15035 {
15036 toctprel:
15037 insn = bfd_get_32 (input_bfd,
15038 contents + rel->r_offset - d_offset);
15039 insn &= 31 << 21;
15040 insn |= 0x3c0d0000; /* addis 0,13,0 */
15041 bfd_put_32 (input_bfd, insn,
15042 contents + rel->r_offset - d_offset);
15043 r_type = R_PPC64_TPREL16_HA;
15044 if (toc_symndx != 0)
15045 {
15046 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15047 rel->r_addend = toc_addend;
15048 /* We changed the symbol. Start over in order to
15049 get h, sym, sec etc. right. */
15050 goto again;
15051 }
15052 else
15053 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15054 }
15055 break;
15056
15057 case R_PPC64_GOT_TPREL34:
15058 if ((tls_mask & TLS_TLS) != 0
15059 && (tls_mask & TLS_TPREL) == 0)
15060 {
15061 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15062 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15063 pinsn <<= 32;
15064 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15065 pinsn += ((2ULL << 56) + (-1ULL << 52)
15066 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15067 bfd_put_32 (input_bfd, pinsn >> 32,
15068 contents + rel->r_offset);
15069 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15070 contents + rel->r_offset + 4);
15071 r_type = R_PPC64_TPREL34;
15072 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15073 }
15074 break;
15075
15076 case R_PPC64_TLS:
15077 if ((tls_mask & TLS_TLS) != 0
15078 && (tls_mask & TLS_TPREL) == 0)
15079 {
15080 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15081 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15082 if (insn == 0)
15083 break;
15084 if ((rel->r_offset & 3) == 0)
15085 {
15086 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15087 /* Was PPC64_TLS which sits on insn boundary, now
15088 PPC64_TPREL16_LO which is at low-order half-word. */
15089 rel->r_offset += d_offset;
15090 r_type = R_PPC64_TPREL16_LO;
15091 if (toc_symndx != 0)
15092 {
15093 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15094 rel->r_addend = toc_addend;
15095 /* We changed the symbol. Start over in order to
15096 get h, sym, sec etc. right. */
15097 goto again;
15098 }
15099 else
15100 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15101 }
15102 else if ((rel->r_offset & 3) == 1)
15103 {
15104 /* For pcrel IE to LE we already have the full
15105 offset and thus don't need an addi here. A nop
15106 or mr will do. */
15107 if ((insn & (0x3fu << 26)) == 14 << 26)
15108 {
15109 /* Extract regs from addi rt,ra,si. */
15110 unsigned int rt = (insn >> 21) & 0x1f;
15111 unsigned int ra = (insn >> 16) & 0x1f;
15112 if (rt == ra)
15113 insn = NOP;
15114 else
15115 {
15116 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15117 insn = (rt << 16) | (ra << 21) | (ra << 11);
15118 insn |= (31u << 26) | (444u << 1);
15119 }
15120 }
15121 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
15122 }
15123 }
15124 break;
15125
15126 case R_PPC64_GOT_TLSGD16_HI:
15127 case R_PPC64_GOT_TLSGD16_HA:
15128 tls_gd = TLS_GDIE;
15129 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15130 goto tls_gdld_hi;
15131 break;
15132
15133 case R_PPC64_GOT_TLSLD16_HI:
15134 case R_PPC64_GOT_TLSLD16_HA:
15135 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15136 {
15137 tls_gdld_hi:
15138 if ((tls_mask & tls_gd) != 0)
15139 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15140 + R_PPC64_GOT_TPREL16_DS);
15141 else
15142 {
15143 rel->r_offset -= d_offset;
15144 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15145 r_type = R_PPC64_NONE;
15146 }
15147 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15148 }
15149 break;
15150
15151 case R_PPC64_GOT_TLSGD16:
15152 case R_PPC64_GOT_TLSGD16_LO:
15153 tls_gd = TLS_GDIE;
15154 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15155 goto tls_ldgd_opt;
15156 break;
15157
15158 case R_PPC64_GOT_TLSLD16:
15159 case R_PPC64_GOT_TLSLD16_LO:
15160 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15161 {
15162 unsigned int insn1, insn2;
15163
15164 tls_ldgd_opt:
15165 offset = (bfd_vma) -1;
15166 /* If not using the newer R_PPC64_TLSGD/LD to mark
15167 __tls_get_addr calls, we must trust that the call
15168 stays with its arg setup insns, ie. that the next
15169 reloc is the __tls_get_addr call associated with
15170 the current reloc. Edit both insns. */
15171 if (input_section->nomark_tls_get_addr
15172 && rel + 1 < relend
15173 && branch_reloc_hash_match (input_bfd, rel + 1,
15174 htab->tls_get_addr_fd,
15175 htab->tga_desc_fd,
15176 htab->tls_get_addr,
15177 htab->tga_desc))
15178 offset = rel[1].r_offset;
15179 /* We read the low GOT_TLS (or TOC16) insn because we
15180 need to keep the destination reg. It may be
15181 something other than the usual r3, and moved to r3
15182 before the call by intervening code. */
15183 insn1 = bfd_get_32 (input_bfd,
15184 contents + rel->r_offset - d_offset);
15185 if ((tls_mask & tls_gd) != 0)
15186 {
15187 /* IE */
15188 insn1 &= (0x1f << 21) | (0x1f << 16);
15189 insn1 |= 58u << 26; /* ld */
15190 insn2 = 0x7c636a14; /* add 3,3,13 */
15191 if (offset != (bfd_vma) -1)
15192 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15193 if (r_type == R_PPC64_TOC16
15194 || r_type == R_PPC64_TOC16_LO)
15195 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
15196 else
15197 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15198 + R_PPC64_GOT_TPREL16_DS);
15199 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15200 }
15201 else
15202 {
15203 /* LE */
15204 insn1 &= 0x1f << 21;
15205 insn1 |= 0x3c0d0000; /* addis r,13,0 */
15206 insn2 = 0x38630000; /* addi 3,3,0 */
15207 if (tls_gd == 0)
15208 {
15209 /* Was an LD reloc. */
15210 r_symndx = STN_UNDEF;
15211 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15212 }
15213 else if (toc_symndx != 0)
15214 {
15215 r_symndx = toc_symndx;
15216 rel->r_addend = toc_addend;
15217 }
15218 r_type = R_PPC64_TPREL16_HA;
15219 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15220 if (offset != (bfd_vma) -1)
15221 {
15222 rel[1].r_info = ELF64_R_INFO (r_symndx,
15223 R_PPC64_TPREL16_LO);
15224 rel[1].r_offset = offset + d_offset;
15225 rel[1].r_addend = rel->r_addend;
15226 }
15227 }
15228 bfd_put_32 (input_bfd, insn1,
15229 contents + rel->r_offset - d_offset);
15230 if (offset != (bfd_vma) -1)
15231 {
15232 bfd_put_32 (input_bfd, insn2, contents + offset);
15233 if (offset + 8 <= input_section->size)
15234 {
15235 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15236 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15237 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15238 }
15239 }
15240 if ((tls_mask & tls_gd) == 0
15241 && (tls_gd == 0 || toc_symndx != 0))
15242 {
15243 /* We changed the symbol. Start over in order
15244 to get h, sym, sec etc. right. */
15245 goto again;
15246 }
15247 }
15248 break;
15249
15250 case R_PPC64_GOT_TLSGD34:
15251 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15252 {
15253 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15254 pinsn <<= 32;
15255 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15256 if ((tls_mask & TLS_GDIE) != 0)
15257 {
15258 /* IE, pla -> pld */
15259 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15260 r_type = R_PPC64_GOT_TPREL34;
15261 }
15262 else
15263 {
15264 /* LE, pla pcrel -> paddi r13 */
15265 pinsn += (-1ULL << 52) + (13ULL << 16);
15266 r_type = R_PPC64_TPREL34;
15267 }
15268 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15269 bfd_put_32 (input_bfd, pinsn >> 32,
15270 contents + rel->r_offset);
15271 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15272 contents + rel->r_offset + 4);
15273 }
15274 break;
15275
15276 case R_PPC64_GOT_TLSLD34:
15277 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15278 {
15279 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15280 pinsn <<= 32;
15281 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15282 pinsn += (-1ULL << 52) + (13ULL << 16);
15283 bfd_put_32 (input_bfd, pinsn >> 32,
15284 contents + rel->r_offset);
15285 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15286 contents + rel->r_offset + 4);
15287 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15288 r_symndx = STN_UNDEF;
15289 r_type = R_PPC64_TPREL34;
15290 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15291 goto again;
15292 }
15293 break;
15294
15295 case R_PPC64_TLSGD:
15296 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
15297 && rel + 1 < relend)
15298 {
15299 unsigned int insn2;
15300 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15301
15302 offset = rel->r_offset;
15303 if (is_plt_seq_reloc (r_type1))
15304 {
15305 bfd_put_32 (output_bfd, NOP, contents + offset);
15306 if (r_type1 == R_PPC64_PLT_PCREL34
15307 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15308 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15309 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15310 break;
15311 }
15312
15313 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15314 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15315
15316 if ((tls_mask & TLS_GDIE) != 0)
15317 {
15318 /* IE */
15319 r_type = R_PPC64_NONE;
15320 insn2 = 0x7c636a14; /* add 3,3,13 */
15321 }
15322 else
15323 {
15324 /* LE */
15325 if (toc_symndx != 0)
15326 {
15327 r_symndx = toc_symndx;
15328 rel->r_addend = toc_addend;
15329 }
15330 if (r_type1 == R_PPC64_REL24_NOTOC
15331 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15332 {
15333 r_type = R_PPC64_NONE;
15334 insn2 = NOP;
15335 }
15336 else
15337 {
15338 rel->r_offset = offset + d_offset;
15339 r_type = R_PPC64_TPREL16_LO;
15340 insn2 = 0x38630000; /* addi 3,3,0 */
15341 }
15342 }
15343 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15344 /* Zap the reloc on the _tls_get_addr call too. */
15345 BFD_ASSERT (offset == rel[1].r_offset);
15346 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15347 bfd_put_32 (input_bfd, insn2, contents + offset);
15348 if ((tls_mask & TLS_GDIE) == 0
15349 && toc_symndx != 0
15350 && r_type != R_PPC64_NONE)
15351 goto again;
15352 }
15353 break;
15354
15355 case R_PPC64_TLSLD:
15356 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
15357 && rel + 1 < relend)
15358 {
15359 unsigned int insn2;
15360 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15361
15362 offset = rel->r_offset;
15363 if (is_plt_seq_reloc (r_type1))
15364 {
15365 bfd_put_32 (output_bfd, NOP, contents + offset);
15366 if (r_type1 == R_PPC64_PLT_PCREL34
15367 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15368 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15369 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15370 break;
15371 }
15372
15373 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15374 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15375
15376 if (r_type1 == R_PPC64_REL24_NOTOC
15377 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15378 {
15379 r_type = R_PPC64_NONE;
15380 insn2 = NOP;
15381 }
15382 else
15383 {
15384 rel->r_offset = offset + d_offset;
15385 r_symndx = STN_UNDEF;
15386 r_type = R_PPC64_TPREL16_LO;
15387 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15388 insn2 = 0x38630000; /* addi 3,3,0 */
15389 }
15390 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15391 /* Zap the reloc on the _tls_get_addr call too. */
15392 BFD_ASSERT (offset == rel[1].r_offset);
15393 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15394 bfd_put_32 (input_bfd, insn2, contents + offset);
15395 if (r_type != R_PPC64_NONE)
15396 goto again;
15397 }
15398 break;
15399
15400 case R_PPC64_DTPMOD64:
15401 if (rel + 1 < relend
15402 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15403 && rel[1].r_offset == rel->r_offset + 8)
15404 {
15405 if ((tls_mask & TLS_GD) == 0)
15406 {
15407 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
15408 if ((tls_mask & TLS_GDIE) != 0)
15409 r_type = R_PPC64_TPREL64;
15410 else
15411 {
15412 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15413 r_type = R_PPC64_NONE;
15414 }
15415 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15416 }
15417 }
15418 else
15419 {
15420 if ((tls_mask & TLS_LD) == 0)
15421 {
15422 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15423 r_type = R_PPC64_NONE;
15424 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15425 }
15426 }
15427 break;
15428
15429 case R_PPC64_TPREL64:
15430 if ((tls_mask & TLS_TPREL) == 0)
15431 {
15432 r_type = R_PPC64_NONE;
15433 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15434 }
15435 break;
15436
15437 case R_PPC64_ENTRY:
15438 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15439 if (!bfd_link_pic (info)
15440 && !info->traditional_format
15441 && relocation + 0x80008000 <= 0xffffffff)
15442 {
15443 unsigned int insn1, insn2;
15444
15445 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15446 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15447 if ((insn1 & ~0xfffc) == LD_R2_0R12
15448 && insn2 == ADD_R2_R2_R12)
15449 {
15450 bfd_put_32 (input_bfd,
15451 LIS_R2 + PPC_HA (relocation),
15452 contents + rel->r_offset);
15453 bfd_put_32 (input_bfd,
15454 ADDI_R2_R2 + PPC_LO (relocation),
15455 contents + rel->r_offset + 4);
15456 }
15457 }
15458 else
15459 {
15460 relocation -= (rel->r_offset
15461 + input_section->output_offset
15462 + input_section->output_section->vma);
15463 if (relocation + 0x80008000 <= 0xffffffff)
15464 {
15465 unsigned int insn1, insn2;
15466
15467 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15468 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15469 if ((insn1 & ~0xfffc) == LD_R2_0R12
15470 && insn2 == ADD_R2_R2_R12)
15471 {
15472 bfd_put_32 (input_bfd,
15473 ADDIS_R2_R12 + PPC_HA (relocation),
15474 contents + rel->r_offset);
15475 bfd_put_32 (input_bfd,
15476 ADDI_R2_R2 + PPC_LO (relocation),
15477 contents + rel->r_offset + 4);
15478 }
15479 }
15480 }
15481 break;
15482
15483 case R_PPC64_REL16_HA:
15484 /* If we are generating a non-PIC executable, edit
15485 . 0: addis 2,12,.TOC.-0b@ha
15486 . addi 2,2,.TOC.-0b@l
15487 used by ELFv2 global entry points to set up r2, to
15488 . lis 2,.TOC.@ha
15489 . addi 2,2,.TOC.@l
15490 if .TOC. is in range. */
15491 if (!bfd_link_pic (info)
15492 && !info->traditional_format
15493 && !htab->opd_abi
15494 && rel->r_addend == d_offset
15495 && h != NULL && &h->elf == htab->elf.hgot
15496 && rel + 1 < relend
15497 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15498 && rel[1].r_offset == rel->r_offset + 4
15499 && rel[1].r_addend == rel->r_addend + 4
15500 && relocation + 0x80008000 <= 0xffffffff)
15501 {
15502 unsigned int insn1, insn2;
15503 offset = rel->r_offset - d_offset;
15504 insn1 = bfd_get_32 (input_bfd, contents + offset);
15505 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15506 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15507 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15508 {
15509 r_type = R_PPC64_ADDR16_HA;
15510 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15511 rel->r_addend -= d_offset;
15512 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15513 rel[1].r_addend -= d_offset + 4;
15514 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15515 }
15516 }
15517 break;
15518 }
15519
15520 /* Handle other relocations that tweak non-addend part of insn. */
15521 insn = 0;
15522 max_br_offset = 1 << 25;
15523 addend = rel->r_addend;
15524 reloc_dest = DEST_NORMAL;
15525 switch (r_type)
15526 {
15527 default:
15528 break;
15529
15530 case R_PPC64_TOCSAVE:
15531 if (relocation + addend == (rel->r_offset
15532 + input_section->output_offset
15533 + input_section->output_section->vma)
15534 && tocsave_find (htab, NO_INSERT,
15535 &local_syms, rel, input_bfd))
15536 {
15537 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15538 if (insn == NOP
15539 || insn == CROR_151515 || insn == CROR_313131)
15540 bfd_put_32 (input_bfd,
15541 STD_R2_0R1 + STK_TOC (htab),
15542 contents + rel->r_offset);
15543 }
15544 break;
15545
15546 /* Branch taken prediction relocations. */
15547 case R_PPC64_ADDR14_BRTAKEN:
15548 case R_PPC64_REL14_BRTAKEN:
15549 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15550 /* Fall through. */
15551
15552 /* Branch not taken prediction relocations. */
15553 case R_PPC64_ADDR14_BRNTAKEN:
15554 case R_PPC64_REL14_BRNTAKEN:
15555 insn |= bfd_get_32 (input_bfd,
15556 contents + rel->r_offset) & ~(0x01 << 21);
15557 /* Fall through. */
15558
15559 case R_PPC64_REL14:
15560 max_br_offset = 1 << 15;
15561 /* Fall through. */
15562
15563 case R_PPC64_REL24:
15564 case R_PPC64_REL24_NOTOC:
15565 case R_PPC64_PLTCALL:
15566 case R_PPC64_PLTCALL_NOTOC:
15567 /* Calls to functions with a different TOC, such as calls to
15568 shared objects, need to alter the TOC pointer. This is
15569 done using a linkage stub. A REL24 branching to these
15570 linkage stubs needs to be followed by a nop, as the nop
15571 will be replaced with an instruction to restore the TOC
15572 base pointer. */
15573 fdh = h;
15574 if (h != NULL
15575 && h->oh != NULL
15576 && h->oh->is_func_descriptor)
15577 fdh = ppc_follow_link (h->oh);
15578 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15579 htab);
15580 if ((r_type == R_PPC64_PLTCALL
15581 || r_type == R_PPC64_PLTCALL_NOTOC)
15582 && stub_entry != NULL
15583 && stub_entry->stub_type >= ppc_stub_plt_call
15584 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15585 stub_entry = NULL;
15586
15587 if (stub_entry != NULL
15588 && ((stub_entry->stub_type >= ppc_stub_plt_call
15589 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15590 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15591 || stub_entry->stub_type == ppc_stub_plt_branch_both
15592 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15593 || stub_entry->stub_type == ppc_stub_long_branch_both))
15594 {
15595 bfd_boolean can_plt_call = FALSE;
15596
15597 if (stub_entry->stub_type == ppc_stub_plt_call
15598 && !htab->opd_abi
15599 && htab->params->plt_localentry0 != 0
15600 && is_elfv2_localentry0 (&h->elf))
15601 {
15602 /* The function doesn't use or change r2. */
15603 can_plt_call = TRUE;
15604 }
15605 else if (r_type == R_PPC64_REL24_NOTOC)
15606 {
15607 /* NOTOC calls don't need to restore r2. */
15608 can_plt_call = TRUE;
15609 }
15610
15611 /* All of these stubs may modify r2, so there must be a
15612 branch and link followed by a nop. The nop is
15613 replaced by an insn to restore r2. */
15614 else if (rel->r_offset + 8 <= input_section->size)
15615 {
15616 unsigned long br;
15617
15618 br = bfd_get_32 (input_bfd,
15619 contents + rel->r_offset);
15620 if ((br & 1) != 0)
15621 {
15622 unsigned long nop;
15623
15624 nop = bfd_get_32 (input_bfd,
15625 contents + rel->r_offset + 4);
15626 if (nop == LD_R2_0R1 + STK_TOC (htab))
15627 can_plt_call = TRUE;
15628 else if (nop == NOP
15629 || nop == CROR_151515
15630 || nop == CROR_313131)
15631 {
15632 if (h != NULL
15633 && is_tls_get_addr (&h->elf, htab)
15634 && htab->params->tls_get_addr_opt)
15635 {
15636 /* Special stub used, leave nop alone. */
15637 }
15638 else
15639 bfd_put_32 (input_bfd,
15640 LD_R2_0R1 + STK_TOC (htab),
15641 contents + rel->r_offset + 4);
15642 can_plt_call = TRUE;
15643 }
15644 }
15645 }
15646
15647 if (!can_plt_call && h != NULL)
15648 {
15649 const char *name = h->elf.root.root.string;
15650
15651 if (*name == '.')
15652 ++name;
15653
15654 if (strncmp (name, "__libc_start_main", 17) == 0
15655 && (name[17] == 0 || name[17] == '@'))
15656 {
15657 /* Allow crt1 branch to go via a toc adjusting
15658 stub. Other calls that never return could do
15659 the same, if we could detect such. */
15660 can_plt_call = TRUE;
15661 }
15662 }
15663
15664 if (!can_plt_call)
15665 {
15666 /* g++ as of 20130507 emits self-calls without a
15667 following nop. This is arguably wrong since we
15668 have conflicting information. On the one hand a
15669 global symbol and on the other a local call
15670 sequence, but don't error for this special case.
15671 It isn't possible to cheaply verify we have
15672 exactly such a call. Allow all calls to the same
15673 section. */
15674 asection *code_sec = sec;
15675
15676 if (get_opd_info (sec) != NULL)
15677 {
15678 bfd_vma off = (relocation + addend
15679 - sec->output_section->vma
15680 - sec->output_offset);
15681
15682 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15683 }
15684 if (code_sec == input_section)
15685 can_plt_call = TRUE;
15686 }
15687
15688 if (!can_plt_call)
15689 {
15690 if (stub_entry->stub_type >= ppc_stub_plt_call
15691 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15692 info->callbacks->einfo
15693 /* xgettext:c-format */
15694 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15695 "(plt call stub)\n"),
15696 input_bfd, input_section, rel->r_offset, sym_name);
15697 else
15698 info->callbacks->einfo
15699 /* xgettext:c-format */
15700 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15701 "(toc save/adjust stub)\n"),
15702 input_bfd, input_section, rel->r_offset, sym_name);
15703
15704 bfd_set_error (bfd_error_bad_value);
15705 ret = FALSE;
15706 }
15707
15708 if (can_plt_call
15709 && stub_entry->stub_type >= ppc_stub_plt_call
15710 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15711 unresolved_reloc = FALSE;
15712 }
15713
15714 if ((stub_entry == NULL
15715 || stub_entry->stub_type == ppc_stub_long_branch
15716 || stub_entry->stub_type == ppc_stub_plt_branch)
15717 && get_opd_info (sec) != NULL)
15718 {
15719 /* The branch destination is the value of the opd entry. */
15720 bfd_vma off = (relocation + addend
15721 - sec->output_section->vma
15722 - sec->output_offset);
15723 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15724 if (dest != (bfd_vma) -1)
15725 {
15726 relocation = dest;
15727 addend = 0;
15728 reloc_dest = DEST_OPD;
15729 }
15730 }
15731
15732 /* If the branch is out of reach we ought to have a long
15733 branch stub. */
15734 from = (rel->r_offset
15735 + input_section->output_offset
15736 + input_section->output_section->vma);
15737
15738 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15739 ? fdh->elf.other
15740 : sym->st_other);
15741
15742 if (stub_entry != NULL
15743 && (stub_entry->stub_type == ppc_stub_long_branch
15744 || stub_entry->stub_type == ppc_stub_plt_branch)
15745 && (r_type == R_PPC64_ADDR14_BRTAKEN
15746 || r_type == R_PPC64_ADDR14_BRNTAKEN
15747 || (relocation + addend - from + max_br_offset
15748 < 2 * max_br_offset)))
15749 /* Don't use the stub if this branch is in range. */
15750 stub_entry = NULL;
15751
15752 if (stub_entry != NULL
15753 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15754 || stub_entry->stub_type == ppc_stub_long_branch_both
15755 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15756 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15757 && (r_type != R_PPC64_REL24_NOTOC
15758 || ((fdh ? fdh->elf.other : sym->st_other)
15759 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15760 && (relocation + addend - from + max_br_offset
15761 < 2 * max_br_offset))
15762 stub_entry = NULL;
15763
15764 if (stub_entry != NULL
15765 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15766 || stub_entry->stub_type == ppc_stub_long_branch_both
15767 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15768 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15769 && r_type == R_PPC64_REL24_NOTOC
15770 && (relocation + addend - from + max_br_offset
15771 < 2 * max_br_offset))
15772 stub_entry = NULL;
15773
15774 if (stub_entry != NULL)
15775 {
15776 /* Munge up the value and addend so that we call the stub
15777 rather than the procedure directly. */
15778 asection *stub_sec = stub_entry->group->stub_sec;
15779
15780 if (stub_entry->stub_type == ppc_stub_save_res)
15781 relocation += (stub_sec->output_offset
15782 + stub_sec->output_section->vma
15783 + stub_sec->size - htab->sfpr->size
15784 - htab->sfpr->output_offset
15785 - htab->sfpr->output_section->vma);
15786 else
15787 relocation = (stub_entry->stub_offset
15788 + stub_sec->output_offset
15789 + stub_sec->output_section->vma);
15790 addend = 0;
15791 reloc_dest = DEST_STUB;
15792
15793 if (((stub_entry->stub_type == ppc_stub_plt_call
15794 && ALWAYS_EMIT_R2SAVE)
15795 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15796 || stub_entry->stub_type == ppc_stub_plt_call_both)
15797 && !(h != NULL
15798 && is_tls_get_addr (&h->elf, htab)
15799 && htab->params->tls_get_addr_opt)
15800 && rel + 1 < relend
15801 && rel[1].r_offset == rel->r_offset + 4
15802 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15803 relocation += 4;
15804 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15805 || stub_entry->stub_type == ppc_stub_plt_branch_both
15806 || stub_entry->stub_type == ppc_stub_plt_call_both)
15807 && r_type == R_PPC64_REL24_NOTOC)
15808 relocation += 4;
15809
15810 if (r_type == R_PPC64_REL24_NOTOC
15811 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15812 || stub_entry->stub_type == ppc_stub_plt_call_both))
15813 htab->notoc_plt = 1;
15814 }
15815
15816 if (insn != 0)
15817 {
15818 if (is_isa_v2)
15819 {
15820 /* Set 'a' bit. This is 0b00010 in BO field for branch
15821 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15822 for branch on CTR insns (BO == 1a00t or 1a01t). */
15823 if ((insn & (0x14 << 21)) == (0x04 << 21))
15824 insn |= 0x02 << 21;
15825 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15826 insn |= 0x08 << 21;
15827 else
15828 break;
15829 }
15830 else
15831 {
15832 /* Invert 'y' bit if not the default. */
15833 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15834 insn ^= 0x01 << 21;
15835 }
15836
15837 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15838 }
15839
15840 /* NOP out calls to undefined weak functions.
15841 We can thus call a weak function without first
15842 checking whether the function is defined. */
15843 else if (h != NULL
15844 && h->elf.root.type == bfd_link_hash_undefweak
15845 && h->elf.dynindx == -1
15846 && (r_type == R_PPC64_REL24
15847 || r_type == R_PPC64_REL24_NOTOC)
15848 && relocation == 0
15849 && addend == 0)
15850 {
15851 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15852 goto copy_reloc;
15853 }
15854 break;
15855
15856 case R_PPC64_GOT16_DS:
15857 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15858 break;
15859 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15860 if (relocation + addend - from + 0x8000 < 0x10000
15861 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15862 {
15863 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15864 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15865 {
15866 insn += (14u << 26) - (58u << 26);
15867 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15868 r_type = R_PPC64_TOC16;
15869 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15870 }
15871 }
15872 break;
15873
15874 case R_PPC64_GOT16_LO_DS:
15875 case R_PPC64_GOT16_HA:
15876 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15877 break;
15878 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15879 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15880 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15881 {
15882 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15883 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15884 {
15885 insn += (14u << 26) - (58u << 26);
15886 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15887 r_type = R_PPC64_TOC16_LO;
15888 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15889 }
15890 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
15891 {
15892 r_type = R_PPC64_TOC16_HA;
15893 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15894 }
15895 }
15896 break;
15897
15898 case R_PPC64_GOT_PCREL34:
15899 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15900 break;
15901 from = (rel->r_offset
15902 + input_section->output_section->vma
15903 + input_section->output_offset);
15904 if (relocation - from + (1ULL << 33) < 1ULL << 34
15905 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15906 {
15907 offset = rel->r_offset;
15908 pinsn = bfd_get_32 (input_bfd, contents + offset);
15909 pinsn <<= 32;
15910 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15911 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15912 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15913 {
15914 /* Replace with paddi. */
15915 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15916 r_type = R_PPC64_PCREL34;
15917 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15918 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15919 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15920 goto pcrelopt;
15921 }
15922 }
15923 break;
15924
15925 case R_PPC64_PCREL34:
15926 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15927 {
15928 offset = rel->r_offset;
15929 pinsn = bfd_get_32 (input_bfd, contents + offset);
15930 pinsn <<= 32;
15931 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15932 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15933 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15934 | (14ULL << 26) /* paddi */))
15935 {
15936 pcrelopt:
15937 if (rel + 1 < relend
15938 && rel[1].r_offset == offset
15939 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15940 {
15941 bfd_vma off2 = rel[1].r_addend;
15942 if (off2 == 0)
15943 /* zero means next insn. */
15944 off2 = 8;
15945 off2 += offset;
15946 if (off2 + 4 <= input_section->size)
15947 {
15948 uint64_t pinsn2;
15949 bfd_signed_vma addend_off;
15950 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15951 pinsn2 <<= 32;
15952 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15953 {
15954 if (off2 + 8 > input_section->size)
15955 break;
15956 pinsn2 |= bfd_get_32 (input_bfd,
15957 contents + off2 + 4);
15958 }
15959 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15960 {
15961 addend += addend_off;
15962 rel->r_addend = addend;
15963 bfd_put_32 (input_bfd, pinsn >> 32,
15964 contents + offset);
15965 bfd_put_32 (input_bfd, pinsn,
15966 contents + offset + 4);
15967 bfd_put_32 (input_bfd, pinsn2 >> 32,
15968 contents + off2);
15969 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15970 bfd_put_32 (input_bfd, pinsn2,
15971 contents + off2 + 4);
15972 }
15973 }
15974 }
15975 }
15976 }
15977 break;
15978 }
15979
15980 tls_type = 0;
15981 save_unresolved_reloc = unresolved_reloc;
15982 switch (r_type)
15983 {
15984 default:
15985 /* xgettext:c-format */
15986 _bfd_error_handler (_("%pB: %s unsupported"),
15987 input_bfd, ppc64_elf_howto_table[r_type]->name);
15988
15989 bfd_set_error (bfd_error_bad_value);
15990 ret = FALSE;
15991 goto copy_reloc;
15992
15993 case R_PPC64_NONE:
15994 case R_PPC64_TLS:
15995 case R_PPC64_TLSGD:
15996 case R_PPC64_TLSLD:
15997 case R_PPC64_TOCSAVE:
15998 case R_PPC64_GNU_VTINHERIT:
15999 case R_PPC64_GNU_VTENTRY:
16000 case R_PPC64_ENTRY:
16001 case R_PPC64_PCREL_OPT:
16002 goto copy_reloc;
16003
16004 /* GOT16 relocations. Like an ADDR16 using the symbol's
16005 address in the GOT as relocation value instead of the
16006 symbol's value itself. Also, create a GOT entry for the
16007 symbol and put the symbol value there. */
16008 case R_PPC64_GOT_TLSGD16:
16009 case R_PPC64_GOT_TLSGD16_LO:
16010 case R_PPC64_GOT_TLSGD16_HI:
16011 case R_PPC64_GOT_TLSGD16_HA:
16012 case R_PPC64_GOT_TLSGD34:
16013 tls_type = TLS_TLS | TLS_GD;
16014 goto dogot;
16015
16016 case R_PPC64_GOT_TLSLD16:
16017 case R_PPC64_GOT_TLSLD16_LO:
16018 case R_PPC64_GOT_TLSLD16_HI:
16019 case R_PPC64_GOT_TLSLD16_HA:
16020 case R_PPC64_GOT_TLSLD34:
16021 tls_type = TLS_TLS | TLS_LD;
16022 goto dogot;
16023
16024 case R_PPC64_GOT_TPREL16_DS:
16025 case R_PPC64_GOT_TPREL16_LO_DS:
16026 case R_PPC64_GOT_TPREL16_HI:
16027 case R_PPC64_GOT_TPREL16_HA:
16028 case R_PPC64_GOT_TPREL34:
16029 tls_type = TLS_TLS | TLS_TPREL;
16030 goto dogot;
16031
16032 case R_PPC64_GOT_DTPREL16_DS:
16033 case R_PPC64_GOT_DTPREL16_LO_DS:
16034 case R_PPC64_GOT_DTPREL16_HI:
16035 case R_PPC64_GOT_DTPREL16_HA:
16036 case R_PPC64_GOT_DTPREL34:
16037 tls_type = TLS_TLS | TLS_DTPREL;
16038 goto dogot;
16039
16040 case R_PPC64_GOT16:
16041 case R_PPC64_GOT16_LO:
16042 case R_PPC64_GOT16_HI:
16043 case R_PPC64_GOT16_HA:
16044 case R_PPC64_GOT16_DS:
16045 case R_PPC64_GOT16_LO_DS:
16046 case R_PPC64_GOT_PCREL34:
16047 dogot:
16048 {
16049 /* Relocation is to the entry for this symbol in the global
16050 offset table. */
16051 asection *got;
16052 bfd_vma *offp;
16053 bfd_vma off;
16054 unsigned long indx = 0;
16055 struct got_entry *ent;
16056
16057 if (tls_type == (TLS_TLS | TLS_LD)
16058 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
16059 ent = ppc64_tlsld_got (input_bfd);
16060 else
16061 {
16062 if (h != NULL)
16063 {
16064 if (!htab->elf.dynamic_sections_created
16065 || h->elf.dynindx == -1
16066 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16067 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16068 /* This is actually a static link, or it is a
16069 -Bsymbolic link and the symbol is defined
16070 locally, or the symbol was forced to be local
16071 because of a version file. */
16072 ;
16073 else
16074 {
16075 indx = h->elf.dynindx;
16076 unresolved_reloc = FALSE;
16077 }
16078 ent = h->elf.got.glist;
16079 }
16080 else
16081 {
16082 if (local_got_ents == NULL)
16083 abort ();
16084 ent = local_got_ents[r_symndx];
16085 }
16086
16087 for (; ent != NULL; ent = ent->next)
16088 if (ent->addend == orig_rel.r_addend
16089 && ent->owner == input_bfd
16090 && ent->tls_type == tls_type)
16091 break;
16092 }
16093
16094 if (ent == NULL)
16095 abort ();
16096 if (ent->is_indirect)
16097 ent = ent->got.ent;
16098 offp = &ent->got.offset;
16099 got = ppc64_elf_tdata (ent->owner)->got;
16100 if (got == NULL)
16101 abort ();
16102
16103 /* The offset must always be a multiple of 8. We use the
16104 least significant bit to record whether we have already
16105 processed this entry. */
16106 off = *offp;
16107 if ((off & 1) != 0)
16108 off &= ~1;
16109 else
16110 {
16111 /* Generate relocs for the dynamic linker, except in
16112 the case of TLSLD where we'll use one entry per
16113 module. */
16114 asection *relgot;
16115 bfd_boolean ifunc;
16116
16117 *offp = off | 1;
16118 relgot = NULL;
16119 ifunc = (h != NULL
16120 ? h->elf.type == STT_GNU_IFUNC
16121 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
16122 if (ifunc)
16123 {
16124 relgot = htab->elf.irelplt;
16125 if (indx == 0)
16126 htab->local_ifunc_resolver = 1;
16127 else if (is_static_defined (&h->elf))
16128 htab->maybe_local_ifunc_resolver = 1;
16129 }
16130 else if (indx != 0
16131 || (bfd_link_pic (info)
16132 && (h == NULL
16133 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16134 && !(tls_type != 0
16135 && bfd_link_executable (info)
16136 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
16137 relgot = ppc64_elf_tdata (ent->owner)->relgot;
16138 if (relgot != NULL)
16139 {
16140 outrel.r_offset = (got->output_section->vma
16141 + got->output_offset
16142 + off);
16143 outrel.r_addend = orig_rel.r_addend;
16144 if (tls_type & (TLS_LD | TLS_GD))
16145 {
16146 outrel.r_addend = 0;
16147 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
16148 if (tls_type == (TLS_TLS | TLS_GD))
16149 {
16150 loc = relgot->contents;
16151 loc += (relgot->reloc_count++
16152 * sizeof (Elf64_External_Rela));
16153 bfd_elf64_swap_reloca_out (output_bfd,
16154 &outrel, loc);
16155 outrel.r_offset += 8;
16156 outrel.r_addend = orig_rel.r_addend;
16157 outrel.r_info
16158 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16159 }
16160 }
16161 else if (tls_type == (TLS_TLS | TLS_DTPREL))
16162 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16163 else if (tls_type == (TLS_TLS | TLS_TPREL))
16164 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
16165 else if (indx != 0)
16166 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16167 else
16168 {
16169 if (ifunc)
16170 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16171 else
16172 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16173
16174 /* Write the .got section contents for the sake
16175 of prelink. */
16176 loc = got->contents + off;
16177 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16178 loc);
16179 }
16180
16181 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
16182 {
16183 outrel.r_addend += relocation;
16184 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
16185 {
16186 if (htab->elf.tls_sec == NULL)
16187 outrel.r_addend = 0;
16188 else
16189 outrel.r_addend -= htab->elf.tls_sec->vma;
16190 }
16191 }
16192 loc = relgot->contents;
16193 loc += (relgot->reloc_count++
16194 * sizeof (Elf64_External_Rela));
16195 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16196 }
16197
16198 /* Init the .got section contents here if we're not
16199 emitting a reloc. */
16200 else
16201 {
16202 relocation += orig_rel.r_addend;
16203 if (tls_type != 0)
16204 {
16205 if (htab->elf.tls_sec == NULL)
16206 relocation = 0;
16207 else
16208 {
16209 if (tls_type & TLS_LD)
16210 relocation = 0;
16211 else
16212 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
16213 if (tls_type & TLS_TPREL)
16214 relocation += DTP_OFFSET - TP_OFFSET;
16215 }
16216
16217 if (tls_type & (TLS_GD | TLS_LD))
16218 {
16219 bfd_put_64 (output_bfd, relocation,
16220 got->contents + off + 8);
16221 relocation = 1;
16222 }
16223 }
16224 bfd_put_64 (output_bfd, relocation,
16225 got->contents + off);
16226 }
16227 }
16228
16229 if (off >= (bfd_vma) -2)
16230 abort ();
16231
16232 relocation = got->output_section->vma + got->output_offset + off;
16233 addend = 0;
16234 if (!(r_type == R_PPC64_GOT_PCREL34
16235 || r_type == R_PPC64_GOT_TLSGD34
16236 || r_type == R_PPC64_GOT_TLSLD34
16237 || r_type == R_PPC64_GOT_TPREL34
16238 || r_type == R_PPC64_GOT_DTPREL34))
16239 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
16240 }
16241 break;
16242
16243 case R_PPC64_PLT16_HA:
16244 case R_PPC64_PLT16_HI:
16245 case R_PPC64_PLT16_LO:
16246 case R_PPC64_PLT16_LO_DS:
16247 case R_PPC64_PLT_PCREL34:
16248 case R_PPC64_PLT_PCREL34_NOTOC:
16249 case R_PPC64_PLT32:
16250 case R_PPC64_PLT64:
16251 case R_PPC64_PLTSEQ:
16252 case R_PPC64_PLTSEQ_NOTOC:
16253 case R_PPC64_PLTCALL:
16254 case R_PPC64_PLTCALL_NOTOC:
16255 /* Relocation is to the entry for this symbol in the
16256 procedure linkage table. */
16257 unresolved_reloc = TRUE;
16258 {
16259 struct plt_entry **plt_list = NULL;
16260 if (h != NULL)
16261 plt_list = &h->elf.plt.plist;
16262 else if (local_got_ents != NULL)
16263 {
16264 struct plt_entry **local_plt = (struct plt_entry **)
16265 (local_got_ents + symtab_hdr->sh_info);
16266 plt_list = local_plt + r_symndx;
16267 }
16268 if (plt_list)
16269 {
16270 struct plt_entry *ent;
16271
16272 for (ent = *plt_list; ent != NULL; ent = ent->next)
16273 if (ent->plt.offset != (bfd_vma) -1
16274 && ent->addend == orig_rel.r_addend)
16275 {
16276 asection *plt;
16277 bfd_vma got;
16278
16279 plt = htab->elf.splt;
16280 if (!htab->elf.dynamic_sections_created
16281 || h == NULL
16282 || h->elf.dynindx == -1)
16283 {
16284 if (h != NULL
16285 ? h->elf.type == STT_GNU_IFUNC
16286 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16287 plt = htab->elf.iplt;
16288 else
16289 plt = htab->pltlocal;
16290 }
16291 relocation = (plt->output_section->vma
16292 + plt->output_offset
16293 + ent->plt.offset);
16294 if (r_type == R_PPC64_PLT16_HA
16295 || r_type == R_PPC64_PLT16_HI
16296 || r_type == R_PPC64_PLT16_LO
16297 || r_type == R_PPC64_PLT16_LO_DS)
16298 {
16299 got = (elf_gp (output_bfd)
16300 + htab->sec_info[input_section->id].toc_off);
16301 relocation -= got;
16302 }
16303 addend = 0;
16304 unresolved_reloc = FALSE;
16305 break;
16306 }
16307 }
16308 }
16309 break;
16310
16311 case R_PPC64_TOC:
16312 /* Relocation value is TOC base. */
16313 relocation = TOCstart;
16314 if (r_symndx == STN_UNDEF)
16315 relocation += htab->sec_info[input_section->id].toc_off;
16316 else if (unresolved_reloc)
16317 ;
16318 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16319 relocation += htab->sec_info[sec->id].toc_off;
16320 else
16321 unresolved_reloc = TRUE;
16322 goto dodyn;
16323
16324 /* TOC16 relocs. We want the offset relative to the TOC base,
16325 which is the address of the start of the TOC plus 0x8000.
16326 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16327 in this order. */
16328 case R_PPC64_TOC16:
16329 case R_PPC64_TOC16_LO:
16330 case R_PPC64_TOC16_HI:
16331 case R_PPC64_TOC16_DS:
16332 case R_PPC64_TOC16_LO_DS:
16333 case R_PPC64_TOC16_HA:
16334 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
16335 if (h != NULL)
16336 goto dodyn;
16337 break;
16338
16339 /* Relocate against the beginning of the section. */
16340 case R_PPC64_SECTOFF:
16341 case R_PPC64_SECTOFF_LO:
16342 case R_PPC64_SECTOFF_HI:
16343 case R_PPC64_SECTOFF_DS:
16344 case R_PPC64_SECTOFF_LO_DS:
16345 case R_PPC64_SECTOFF_HA:
16346 if (sec != NULL)
16347 addend -= sec->output_section->vma;
16348 break;
16349
16350 case R_PPC64_REL16:
16351 case R_PPC64_REL16_LO:
16352 case R_PPC64_REL16_HI:
16353 case R_PPC64_REL16_HA:
16354 case R_PPC64_REL16_HIGH:
16355 case R_PPC64_REL16_HIGHA:
16356 case R_PPC64_REL16_HIGHER:
16357 case R_PPC64_REL16_HIGHERA:
16358 case R_PPC64_REL16_HIGHEST:
16359 case R_PPC64_REL16_HIGHESTA:
16360 case R_PPC64_REL16_HIGHER34:
16361 case R_PPC64_REL16_HIGHERA34:
16362 case R_PPC64_REL16_HIGHEST34:
16363 case R_PPC64_REL16_HIGHESTA34:
16364 case R_PPC64_REL16DX_HA:
16365 case R_PPC64_REL14:
16366 case R_PPC64_REL14_BRNTAKEN:
16367 case R_PPC64_REL14_BRTAKEN:
16368 case R_PPC64_REL24:
16369 case R_PPC64_REL24_NOTOC:
16370 case R_PPC64_PCREL34:
16371 case R_PPC64_PCREL28:
16372 break;
16373
16374 case R_PPC64_TPREL16:
16375 case R_PPC64_TPREL16_LO:
16376 case R_PPC64_TPREL16_HI:
16377 case R_PPC64_TPREL16_HA:
16378 case R_PPC64_TPREL16_DS:
16379 case R_PPC64_TPREL16_LO_DS:
16380 case R_PPC64_TPREL16_HIGH:
16381 case R_PPC64_TPREL16_HIGHA:
16382 case R_PPC64_TPREL16_HIGHER:
16383 case R_PPC64_TPREL16_HIGHERA:
16384 case R_PPC64_TPREL16_HIGHEST:
16385 case R_PPC64_TPREL16_HIGHESTA:
16386 case R_PPC64_TPREL34:
16387 if (h != NULL
16388 && h->elf.root.type == bfd_link_hash_undefweak
16389 && h->elf.dynindx == -1)
16390 {
16391 /* Make this relocation against an undefined weak symbol
16392 resolve to zero. This is really just a tweak, since
16393 code using weak externs ought to check that they are
16394 defined before using them. */
16395 bfd_byte *p = contents + rel->r_offset - d_offset;
16396
16397 insn = bfd_get_32 (input_bfd, p);
16398 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16399 if (insn != 0)
16400 bfd_put_32 (input_bfd, insn, p);
16401 break;
16402 }
16403 if (htab->elf.tls_sec != NULL)
16404 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16405 /* The TPREL16 relocs shouldn't really be used in shared
16406 libs or with non-local symbols as that will result in
16407 DT_TEXTREL being set, but support them anyway. */
16408 goto dodyn;
16409
16410 case R_PPC64_DTPREL16:
16411 case R_PPC64_DTPREL16_LO:
16412 case R_PPC64_DTPREL16_HI:
16413 case R_PPC64_DTPREL16_HA:
16414 case R_PPC64_DTPREL16_DS:
16415 case R_PPC64_DTPREL16_LO_DS:
16416 case R_PPC64_DTPREL16_HIGH:
16417 case R_PPC64_DTPREL16_HIGHA:
16418 case R_PPC64_DTPREL16_HIGHER:
16419 case R_PPC64_DTPREL16_HIGHERA:
16420 case R_PPC64_DTPREL16_HIGHEST:
16421 case R_PPC64_DTPREL16_HIGHESTA:
16422 case R_PPC64_DTPREL34:
16423 if (htab->elf.tls_sec != NULL)
16424 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16425 break;
16426
16427 case R_PPC64_ADDR64_LOCAL:
16428 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16429 ? h->elf.other
16430 : sym->st_other);
16431 break;
16432
16433 case R_PPC64_DTPMOD64:
16434 relocation = 1;
16435 addend = 0;
16436 goto dodyn;
16437
16438 case R_PPC64_TPREL64:
16439 if (htab->elf.tls_sec != NULL)
16440 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16441 goto dodyn;
16442
16443 case R_PPC64_DTPREL64:
16444 if (htab->elf.tls_sec != NULL)
16445 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16446 /* Fall through. */
16447
16448 /* Relocations that may need to be propagated if this is a
16449 dynamic object. */
16450 case R_PPC64_REL30:
16451 case R_PPC64_REL32:
16452 case R_PPC64_REL64:
16453 case R_PPC64_ADDR14:
16454 case R_PPC64_ADDR14_BRNTAKEN:
16455 case R_PPC64_ADDR14_BRTAKEN:
16456 case R_PPC64_ADDR16:
16457 case R_PPC64_ADDR16_DS:
16458 case R_PPC64_ADDR16_HA:
16459 case R_PPC64_ADDR16_HI:
16460 case R_PPC64_ADDR16_HIGH:
16461 case R_PPC64_ADDR16_HIGHA:
16462 case R_PPC64_ADDR16_HIGHER:
16463 case R_PPC64_ADDR16_HIGHERA:
16464 case R_PPC64_ADDR16_HIGHEST:
16465 case R_PPC64_ADDR16_HIGHESTA:
16466 case R_PPC64_ADDR16_LO:
16467 case R_PPC64_ADDR16_LO_DS:
16468 case R_PPC64_ADDR16_HIGHER34:
16469 case R_PPC64_ADDR16_HIGHERA34:
16470 case R_PPC64_ADDR16_HIGHEST34:
16471 case R_PPC64_ADDR16_HIGHESTA34:
16472 case R_PPC64_ADDR24:
16473 case R_PPC64_ADDR32:
16474 case R_PPC64_ADDR64:
16475 case R_PPC64_UADDR16:
16476 case R_PPC64_UADDR32:
16477 case R_PPC64_UADDR64:
16478 case R_PPC64_D34:
16479 case R_PPC64_D34_LO:
16480 case R_PPC64_D34_HI30:
16481 case R_PPC64_D34_HA30:
16482 case R_PPC64_D28:
16483 dodyn:
16484 if ((input_section->flags & SEC_ALLOC) == 0)
16485 break;
16486
16487 if (NO_OPD_RELOCS && is_opd)
16488 break;
16489
16490 if (bfd_link_pic (info)
16491 ? ((h == NULL
16492 || h->elf.dyn_relocs != NULL)
16493 && ((h != NULL && pc_dynrelocs (h))
16494 || must_be_dyn_reloc (info, r_type)))
16495 : (h != NULL
16496 ? h->elf.dyn_relocs != NULL
16497 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16498 {
16499 bfd_boolean skip, relocate;
16500 asection *sreloc;
16501 bfd_vma out_off;
16502 long indx = 0;
16503
16504 /* When generating a dynamic object, these relocations
16505 are copied into the output file to be resolved at run
16506 time. */
16507
16508 skip = FALSE;
16509 relocate = FALSE;
16510
16511 out_off = _bfd_elf_section_offset (output_bfd, info,
16512 input_section, rel->r_offset);
16513 if (out_off == (bfd_vma) -1)
16514 skip = TRUE;
16515 else if (out_off == (bfd_vma) -2)
16516 skip = TRUE, relocate = TRUE;
16517 out_off += (input_section->output_section->vma
16518 + input_section->output_offset);
16519 outrel.r_offset = out_off;
16520 outrel.r_addend = rel->r_addend;
16521
16522 /* Optimize unaligned reloc use. */
16523 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16524 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16525 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16526 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16527 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16528 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16529 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16530 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16531 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16532
16533 if (skip)
16534 memset (&outrel, 0, sizeof outrel);
16535 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16536 && !is_opd
16537 && r_type != R_PPC64_TOC)
16538 {
16539 indx = h->elf.dynindx;
16540 BFD_ASSERT (indx != -1);
16541 outrel.r_info = ELF64_R_INFO (indx, r_type);
16542 }
16543 else
16544 {
16545 /* This symbol is local, or marked to become local,
16546 or this is an opd section reloc which must point
16547 at a local function. */
16548 outrel.r_addend += relocation;
16549 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16550 {
16551 if (is_opd && h != NULL)
16552 {
16553 /* Lie about opd entries. This case occurs
16554 when building shared libraries and we
16555 reference a function in another shared
16556 lib. The same thing happens for a weak
16557 definition in an application that's
16558 overridden by a strong definition in a
16559 shared lib. (I believe this is a generic
16560 bug in binutils handling of weak syms.)
16561 In these cases we won't use the opd
16562 entry in this lib. */
16563 unresolved_reloc = FALSE;
16564 }
16565 if (!is_opd
16566 && r_type == R_PPC64_ADDR64
16567 && (h != NULL
16568 ? h->elf.type == STT_GNU_IFUNC
16569 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16570 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16571 else
16572 {
16573 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16574
16575 /* We need to relocate .opd contents for ld.so.
16576 Prelink also wants simple and consistent rules
16577 for relocs. This make all RELATIVE relocs have
16578 *r_offset equal to r_addend. */
16579 relocate = TRUE;
16580 }
16581 }
16582 else
16583 {
16584 if (h != NULL
16585 ? h->elf.type == STT_GNU_IFUNC
16586 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16587 {
16588 info->callbacks->einfo
16589 /* xgettext:c-format */
16590 (_("%H: %s for indirect "
16591 "function `%pT' unsupported\n"),
16592 input_bfd, input_section, rel->r_offset,
16593 ppc64_elf_howto_table[r_type]->name,
16594 sym_name);
16595 ret = FALSE;
16596 }
16597 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16598 ;
16599 else if (sec == NULL || sec->owner == NULL)
16600 {
16601 bfd_set_error (bfd_error_bad_value);
16602 return FALSE;
16603 }
16604 else
16605 {
16606 asection *osec = sec->output_section;
16607
16608 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16609 {
16610 /* TLS symbol values are relative to the
16611 TLS segment. Dynamic relocations for
16612 local TLS symbols therefore can't be
16613 reduced to a relocation against their
16614 section symbol because it holds the
16615 address of the section, not a value
16616 relative to the TLS segment. We could
16617 change the .tdata dynamic section symbol
16618 to be zero value but STN_UNDEF works
16619 and is used elsewhere, eg. for TPREL64
16620 GOT relocs against local TLS symbols. */
16621 osec = htab->elf.tls_sec;
16622 indx = 0;
16623 }
16624 else
16625 {
16626 indx = elf_section_data (osec)->dynindx;
16627 if (indx == 0)
16628 {
16629 if ((osec->flags & SEC_READONLY) == 0
16630 && htab->elf.data_index_section != NULL)
16631 osec = htab->elf.data_index_section;
16632 else
16633 osec = htab->elf.text_index_section;
16634 indx = elf_section_data (osec)->dynindx;
16635 }
16636 BFD_ASSERT (indx != 0);
16637 }
16638
16639 /* We are turning this relocation into one
16640 against a section symbol, so subtract out
16641 the output section's address but not the
16642 offset of the input section in the output
16643 section. */
16644 outrel.r_addend -= osec->vma;
16645 }
16646
16647 outrel.r_info = ELF64_R_INFO (indx, r_type);
16648 }
16649 }
16650
16651 sreloc = elf_section_data (input_section)->sreloc;
16652 if (h != NULL
16653 ? h->elf.type == STT_GNU_IFUNC
16654 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16655 {
16656 sreloc = htab->elf.irelplt;
16657 if (indx == 0)
16658 htab->local_ifunc_resolver = 1;
16659 else if (is_static_defined (&h->elf))
16660 htab->maybe_local_ifunc_resolver = 1;
16661 }
16662 if (sreloc == NULL)
16663 abort ();
16664
16665 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16666 >= sreloc->size)
16667 abort ();
16668 loc = sreloc->contents;
16669 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16670 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16671
16672 if (!warned_dynamic
16673 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16674 {
16675 info->callbacks->einfo
16676 /* xgettext:c-format */
16677 (_("%X%P: %pB: %s against %pT "
16678 "is not supported by glibc as a dynamic relocation\n"),
16679 input_bfd,
16680 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16681 sym_name);
16682 warned_dynamic = TRUE;
16683 }
16684
16685 /* If this reloc is against an external symbol, it will
16686 be computed at runtime, so there's no need to do
16687 anything now. However, for the sake of prelink ensure
16688 that the section contents are a known value. */
16689 if (!relocate)
16690 {
16691 unresolved_reloc = FALSE;
16692 /* The value chosen here is quite arbitrary as ld.so
16693 ignores section contents except for the special
16694 case of .opd where the contents might be accessed
16695 before relocation. Choose zero, as that won't
16696 cause reloc overflow. */
16697 relocation = 0;
16698 addend = 0;
16699 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16700 to improve backward compatibility with older
16701 versions of ld. */
16702 if (r_type == R_PPC64_ADDR64)
16703 addend = outrel.r_addend;
16704 /* Adjust pc_relative relocs to have zero in *r_offset. */
16705 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16706 addend = outrel.r_offset;
16707 }
16708 }
16709 break;
16710
16711 case R_PPC64_COPY:
16712 case R_PPC64_GLOB_DAT:
16713 case R_PPC64_JMP_SLOT:
16714 case R_PPC64_JMP_IREL:
16715 case R_PPC64_RELATIVE:
16716 /* We shouldn't ever see these dynamic relocs in relocatable
16717 files. */
16718 /* Fall through. */
16719
16720 case R_PPC64_PLTGOT16:
16721 case R_PPC64_PLTGOT16_DS:
16722 case R_PPC64_PLTGOT16_HA:
16723 case R_PPC64_PLTGOT16_HI:
16724 case R_PPC64_PLTGOT16_LO:
16725 case R_PPC64_PLTGOT16_LO_DS:
16726 case R_PPC64_PLTREL32:
16727 case R_PPC64_PLTREL64:
16728 /* These ones haven't been implemented yet. */
16729
16730 info->callbacks->einfo
16731 /* xgettext:c-format */
16732 (_("%P: %pB: %s is not supported for `%pT'\n"),
16733 input_bfd,
16734 ppc64_elf_howto_table[r_type]->name, sym_name);
16735
16736 bfd_set_error (bfd_error_invalid_operation);
16737 ret = FALSE;
16738 goto copy_reloc;
16739 }
16740
16741 /* Multi-instruction sequences that access the TOC can be
16742 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16743 to nop; addi rb,r2,x; */
16744 switch (r_type)
16745 {
16746 default:
16747 break;
16748
16749 case R_PPC64_GOT_TLSLD16_HI:
16750 case R_PPC64_GOT_TLSGD16_HI:
16751 case R_PPC64_GOT_TPREL16_HI:
16752 case R_PPC64_GOT_DTPREL16_HI:
16753 case R_PPC64_GOT16_HI:
16754 case R_PPC64_TOC16_HI:
16755 /* These relocs would only be useful if building up an
16756 offset to later add to r2, perhaps in an indexed
16757 addressing mode instruction. Don't try to optimize.
16758 Unfortunately, the possibility of someone building up an
16759 offset like this or even with the HA relocs, means that
16760 we need to check the high insn when optimizing the low
16761 insn. */
16762 break;
16763
16764 case R_PPC64_PLTCALL_NOTOC:
16765 if (!unresolved_reloc)
16766 htab->notoc_plt = 1;
16767 /* Fall through. */
16768 case R_PPC64_PLTCALL:
16769 if (unresolved_reloc)
16770 {
16771 /* No plt entry. Make this into a direct call. */
16772 bfd_byte *p = contents + rel->r_offset;
16773 insn = bfd_get_32 (input_bfd, p);
16774 insn &= 1;
16775 bfd_put_32 (input_bfd, B_DOT | insn, p);
16776 if (r_type == R_PPC64_PLTCALL)
16777 bfd_put_32 (input_bfd, NOP, p + 4);
16778 unresolved_reloc = save_unresolved_reloc;
16779 r_type = R_PPC64_REL24;
16780 }
16781 break;
16782
16783 case R_PPC64_PLTSEQ_NOTOC:
16784 case R_PPC64_PLTSEQ:
16785 if (unresolved_reloc)
16786 {
16787 unresolved_reloc = FALSE;
16788 goto nop_it;
16789 }
16790 break;
16791
16792 case R_PPC64_PLT_PCREL34_NOTOC:
16793 if (!unresolved_reloc)
16794 htab->notoc_plt = 1;
16795 /* Fall through. */
16796 case R_PPC64_PLT_PCREL34:
16797 if (unresolved_reloc)
16798 {
16799 bfd_byte *p = contents + rel->r_offset;
16800 bfd_put_32 (input_bfd, PNOP >> 32, p);
16801 bfd_put_32 (input_bfd, PNOP, p + 4);
16802 unresolved_reloc = FALSE;
16803 goto copy_reloc;
16804 }
16805 break;
16806
16807 case R_PPC64_PLT16_HA:
16808 if (unresolved_reloc)
16809 {
16810 unresolved_reloc = FALSE;
16811 goto nop_it;
16812 }
16813 /* Fall through. */
16814 case R_PPC64_GOT_TLSLD16_HA:
16815 case R_PPC64_GOT_TLSGD16_HA:
16816 case R_PPC64_GOT_TPREL16_HA:
16817 case R_PPC64_GOT_DTPREL16_HA:
16818 case R_PPC64_GOT16_HA:
16819 case R_PPC64_TOC16_HA:
16820 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16821 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16822 {
16823 bfd_byte *p;
16824 nop_it:
16825 p = contents + (rel->r_offset & ~3);
16826 bfd_put_32 (input_bfd, NOP, p);
16827 goto copy_reloc;
16828 }
16829 break;
16830
16831 case R_PPC64_PLT16_LO:
16832 case R_PPC64_PLT16_LO_DS:
16833 if (unresolved_reloc)
16834 {
16835 unresolved_reloc = FALSE;
16836 goto nop_it;
16837 }
16838 /* Fall through. */
16839 case R_PPC64_GOT_TLSLD16_LO:
16840 case R_PPC64_GOT_TLSGD16_LO:
16841 case R_PPC64_GOT_TPREL16_LO_DS:
16842 case R_PPC64_GOT_DTPREL16_LO_DS:
16843 case R_PPC64_GOT16_LO:
16844 case R_PPC64_GOT16_LO_DS:
16845 case R_PPC64_TOC16_LO:
16846 case R_PPC64_TOC16_LO_DS:
16847 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16848 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16849 {
16850 bfd_byte *p = contents + (rel->r_offset & ~3);
16851 insn = bfd_get_32 (input_bfd, p);
16852 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
16853 {
16854 /* Transform addic to addi when we change reg. */
16855 insn &= ~((0x3fu << 26) | (0x1f << 16));
16856 insn |= (14u << 26) | (2 << 16);
16857 }
16858 else
16859 {
16860 insn &= ~(0x1f << 16);
16861 insn |= 2 << 16;
16862 }
16863 bfd_put_32 (input_bfd, insn, p);
16864 }
16865 break;
16866
16867 case R_PPC64_TPREL16_HA:
16868 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16869 {
16870 bfd_byte *p = contents + (rel->r_offset & ~3);
16871 insn = bfd_get_32 (input_bfd, p);
16872 if ((insn & ((0x3fu << 26) | 0x1f << 16))
16873 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16874 /* xgettext:c-format */
16875 info->callbacks->minfo
16876 (_("%H: warning: %s unexpected insn %#x.\n"),
16877 input_bfd, input_section, rel->r_offset,
16878 ppc64_elf_howto_table[r_type]->name, insn);
16879 else
16880 {
16881 bfd_put_32 (input_bfd, NOP, p);
16882 goto copy_reloc;
16883 }
16884 }
16885 break;
16886
16887 case R_PPC64_TPREL16_LO:
16888 case R_PPC64_TPREL16_LO_DS:
16889 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16890 {
16891 bfd_byte *p = contents + (rel->r_offset & ~3);
16892 insn = bfd_get_32 (input_bfd, p);
16893 insn &= ~(0x1f << 16);
16894 insn |= 13 << 16;
16895 bfd_put_32 (input_bfd, insn, p);
16896 }
16897 break;
16898 }
16899
16900 /* Do any further special processing. */
16901 switch (r_type)
16902 {
16903 default:
16904 break;
16905
16906 case R_PPC64_REL16_HA:
16907 case R_PPC64_REL16_HIGHA:
16908 case R_PPC64_REL16_HIGHERA:
16909 case R_PPC64_REL16_HIGHESTA:
16910 case R_PPC64_REL16DX_HA:
16911 case R_PPC64_ADDR16_HA:
16912 case R_PPC64_ADDR16_HIGHA:
16913 case R_PPC64_ADDR16_HIGHERA:
16914 case R_PPC64_ADDR16_HIGHESTA:
16915 case R_PPC64_TOC16_HA:
16916 case R_PPC64_SECTOFF_HA:
16917 case R_PPC64_TPREL16_HA:
16918 case R_PPC64_TPREL16_HIGHA:
16919 case R_PPC64_TPREL16_HIGHERA:
16920 case R_PPC64_TPREL16_HIGHESTA:
16921 case R_PPC64_DTPREL16_HA:
16922 case R_PPC64_DTPREL16_HIGHA:
16923 case R_PPC64_DTPREL16_HIGHERA:
16924 case R_PPC64_DTPREL16_HIGHESTA:
16925 /* It's just possible that this symbol is a weak symbol
16926 that's not actually defined anywhere. In that case,
16927 'sec' would be NULL, and we should leave the symbol
16928 alone (it will be set to zero elsewhere in the link). */
16929 if (sec == NULL)
16930 break;
16931 /* Fall through. */
16932
16933 case R_PPC64_GOT16_HA:
16934 case R_PPC64_PLTGOT16_HA:
16935 case R_PPC64_PLT16_HA:
16936 case R_PPC64_GOT_TLSGD16_HA:
16937 case R_PPC64_GOT_TLSLD16_HA:
16938 case R_PPC64_GOT_TPREL16_HA:
16939 case R_PPC64_GOT_DTPREL16_HA:
16940 /* Add 0x10000 if sign bit in 0:15 is set.
16941 Bits 0:15 are not used. */
16942 addend += 0x8000;
16943 break;
16944
16945 case R_PPC64_D34_HA30:
16946 case R_PPC64_ADDR16_HIGHERA34:
16947 case R_PPC64_ADDR16_HIGHESTA34:
16948 case R_PPC64_REL16_HIGHERA34:
16949 case R_PPC64_REL16_HIGHESTA34:
16950 if (sec != NULL)
16951 addend += 1ULL << 33;
16952 break;
16953
16954 case R_PPC64_ADDR16_DS:
16955 case R_PPC64_ADDR16_LO_DS:
16956 case R_PPC64_GOT16_DS:
16957 case R_PPC64_GOT16_LO_DS:
16958 case R_PPC64_PLT16_LO_DS:
16959 case R_PPC64_SECTOFF_DS:
16960 case R_PPC64_SECTOFF_LO_DS:
16961 case R_PPC64_TOC16_DS:
16962 case R_PPC64_TOC16_LO_DS:
16963 case R_PPC64_PLTGOT16_DS:
16964 case R_PPC64_PLTGOT16_LO_DS:
16965 case R_PPC64_GOT_TPREL16_DS:
16966 case R_PPC64_GOT_TPREL16_LO_DS:
16967 case R_PPC64_GOT_DTPREL16_DS:
16968 case R_PPC64_GOT_DTPREL16_LO_DS:
16969 case R_PPC64_TPREL16_DS:
16970 case R_PPC64_TPREL16_LO_DS:
16971 case R_PPC64_DTPREL16_DS:
16972 case R_PPC64_DTPREL16_LO_DS:
16973 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16974 mask = 3;
16975 /* If this reloc is against an lq, lxv, or stxv insn, then
16976 the value must be a multiple of 16. This is somewhat of
16977 a hack, but the "correct" way to do this by defining _DQ
16978 forms of all the _DS relocs bloats all reloc switches in
16979 this file. It doesn't make much sense to use these
16980 relocs in data, so testing the insn should be safe. */
16981 if ((insn & (0x3fu << 26)) == (56u << 26)
16982 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
16983 mask = 15;
16984 relocation += addend;
16985 addend = insn & (mask ^ 3);
16986 if ((relocation & mask) != 0)
16987 {
16988 relocation ^= relocation & mask;
16989 info->callbacks->einfo
16990 /* xgettext:c-format */
16991 (_("%H: error: %s not a multiple of %u\n"),
16992 input_bfd, input_section, rel->r_offset,
16993 ppc64_elf_howto_table[r_type]->name,
16994 mask + 1);
16995 bfd_set_error (bfd_error_bad_value);
16996 ret = FALSE;
16997 goto copy_reloc;
16998 }
16999 break;
17000 }
17001
17002 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17003 because such sections are not SEC_ALLOC and thus ld.so will
17004 not process them. */
17005 howto = ppc64_elf_howto_table[(int) r_type];
17006 if (unresolved_reloc
17007 && !((input_section->flags & SEC_DEBUGGING) != 0
17008 && h->elf.def_dynamic)
17009 && _bfd_elf_section_offset (output_bfd, info, input_section,
17010 rel->r_offset) != (bfd_vma) -1)
17011 {
17012 info->callbacks->einfo
17013 /* xgettext:c-format */
17014 (_("%H: unresolvable %s against `%pT'\n"),
17015 input_bfd, input_section, rel->r_offset,
17016 howto->name,
17017 h->elf.root.root.string);
17018 ret = FALSE;
17019 }
17020
17021 /* 16-bit fields in insns mostly have signed values, but a
17022 few insns have 16-bit unsigned values. Really, we should
17023 have different reloc types. */
17024 if (howto->complain_on_overflow != complain_overflow_dont
17025 && howto->dst_mask == 0xffff
17026 && (input_section->flags & SEC_CODE) != 0)
17027 {
17028 enum complain_overflow complain = complain_overflow_signed;
17029
17030 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17031 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
17032 complain = complain_overflow_bitfield;
17033 else if (howto->rightshift == 0
17034 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17035 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17036 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17037 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17038 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17039 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
17040 complain = complain_overflow_unsigned;
17041 if (howto->complain_on_overflow != complain)
17042 {
17043 alt_howto = *howto;
17044 alt_howto.complain_on_overflow = complain;
17045 howto = &alt_howto;
17046 }
17047 }
17048
17049 switch (r_type)
17050 {
17051 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17052 case R_PPC64_D34:
17053 case R_PPC64_D34_LO:
17054 case R_PPC64_D34_HI30:
17055 case R_PPC64_D34_HA30:
17056 case R_PPC64_PCREL34:
17057 case R_PPC64_GOT_PCREL34:
17058 case R_PPC64_TPREL34:
17059 case R_PPC64_DTPREL34:
17060 case R_PPC64_GOT_TLSGD34:
17061 case R_PPC64_GOT_TLSLD34:
17062 case R_PPC64_GOT_TPREL34:
17063 case R_PPC64_GOT_DTPREL34:
17064 case R_PPC64_PLT_PCREL34:
17065 case R_PPC64_PLT_PCREL34_NOTOC:
17066 case R_PPC64_D28:
17067 case R_PPC64_PCREL28:
17068 if (rel->r_offset + 8 > input_section->size)
17069 r = bfd_reloc_outofrange;
17070 else
17071 {
17072 relocation += addend;
17073 if (howto->pc_relative)
17074 relocation -= (rel->r_offset
17075 + input_section->output_offset
17076 + input_section->output_section->vma);
17077 relocation >>= howto->rightshift;
17078
17079 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17080 pinsn <<= 32;
17081 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17082
17083 pinsn &= ~howto->dst_mask;
17084 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17085 & howto->dst_mask);
17086 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17087 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17088 r = bfd_reloc_ok;
17089 if (howto->complain_on_overflow == complain_overflow_signed
17090 && (relocation + (1ULL << (howto->bitsize - 1))
17091 >= 1ULL << howto->bitsize))
17092 r = bfd_reloc_overflow;
17093 }
17094 break;
17095
17096 case R_PPC64_REL16DX_HA:
17097 if (rel->r_offset + 4 > input_section->size)
17098 r = bfd_reloc_outofrange;
17099 else
17100 {
17101 relocation += addend;
17102 relocation -= (rel->r_offset
17103 + input_section->output_offset
17104 + input_section->output_section->vma);
17105 relocation = (bfd_signed_vma) relocation >> 16;
17106 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17107 insn &= ~0x1fffc1;
17108 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
17109 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17110 r = bfd_reloc_ok;
17111 if (relocation + 0x8000 > 0xffff)
17112 r = bfd_reloc_overflow;
17113 }
17114 break;
17115
17116 default:
17117 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17118 contents, rel->r_offset,
17119 relocation, addend);
17120 }
17121
17122 if (r != bfd_reloc_ok)
17123 {
17124 char *more_info = NULL;
17125 const char *reloc_name = howto->name;
17126
17127 if (reloc_dest != DEST_NORMAL)
17128 {
17129 more_info = bfd_malloc (strlen (reloc_name) + 8);
17130 if (more_info != NULL)
17131 {
17132 strcpy (more_info, reloc_name);
17133 strcat (more_info, (reloc_dest == DEST_OPD
17134 ? " (OPD)" : " (stub)"));
17135 reloc_name = more_info;
17136 }
17137 }
17138
17139 if (r == bfd_reloc_overflow)
17140 {
17141 /* On code like "if (foo) foo();" don't report overflow
17142 on a branch to zero when foo is undefined. */
17143 if (!warned
17144 && (reloc_dest == DEST_STUB
17145 || !(h != NULL
17146 && (h->elf.root.type == bfd_link_hash_undefweak
17147 || h->elf.root.type == bfd_link_hash_undefined)
17148 && is_branch_reloc (r_type))))
17149 info->callbacks->reloc_overflow (info, &h->elf.root,
17150 sym_name, reloc_name,
17151 orig_rel.r_addend,
17152 input_bfd, input_section,
17153 rel->r_offset);
17154 }
17155 else
17156 {
17157 info->callbacks->einfo
17158 /* xgettext:c-format */
17159 (_("%H: %s against `%pT': error %d\n"),
17160 input_bfd, input_section, rel->r_offset,
17161 reloc_name, sym_name, (int) r);
17162 ret = FALSE;
17163 }
17164 free (more_info);
17165 }
17166 copy_reloc:
17167 if (wrel != rel)
17168 *wrel = *rel;
17169 }
17170
17171 if (wrel != rel)
17172 {
17173 Elf_Internal_Shdr *rel_hdr;
17174 size_t deleted = rel - wrel;
17175
17176 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17177 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17178 if (rel_hdr->sh_size == 0)
17179 {
17180 /* It is too late to remove an empty reloc section. Leave
17181 one NONE reloc.
17182 ??? What is wrong with an empty section??? */
17183 rel_hdr->sh_size = rel_hdr->sh_entsize;
17184 deleted -= 1;
17185 }
17186 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17187 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17188 input_section->reloc_count -= deleted;
17189 }
17190
17191 /* If we're emitting relocations, then shortly after this function
17192 returns, reloc offsets and addends for this section will be
17193 adjusted. Worse, reloc symbol indices will be for the output
17194 file rather than the input. Save a copy of the relocs for
17195 opd_entry_value. */
17196 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
17197 {
17198 bfd_size_type amt;
17199 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17200 rel = bfd_alloc (input_bfd, amt);
17201 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17202 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
17203 if (rel == NULL)
17204 return FALSE;
17205 memcpy (rel, relocs, amt);
17206 }
17207 return ret;
17208 }
17209
17210 /* Adjust the value of any local symbols in opd sections. */
17211
17212 static int
17213 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17214 const char *name ATTRIBUTE_UNUSED,
17215 Elf_Internal_Sym *elfsym,
17216 asection *input_sec,
17217 struct elf_link_hash_entry *h)
17218 {
17219 struct _opd_sec_data *opd;
17220 long adjust;
17221 bfd_vma value;
17222
17223 if (h != NULL)
17224 return 1;
17225
17226 opd = get_opd_info (input_sec);
17227 if (opd == NULL || opd->adjust == NULL)
17228 return 1;
17229
17230 value = elfsym->st_value - input_sec->output_offset;
17231 if (!bfd_link_relocatable (info))
17232 value -= input_sec->output_section->vma;
17233
17234 adjust = opd->adjust[OPD_NDX (value)];
17235 if (adjust == -1)
17236 return 2;
17237
17238 elfsym->st_value += adjust;
17239 return 1;
17240 }
17241
17242 /* Finish up dynamic symbol handling. We set the contents of various
17243 dynamic sections here. */
17244
17245 static bfd_boolean
17246 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17247 struct bfd_link_info *info,
17248 struct elf_link_hash_entry *h,
17249 Elf_Internal_Sym *sym)
17250 {
17251 struct ppc_link_hash_table *htab;
17252 struct plt_entry *ent;
17253
17254 htab = ppc_hash_table (info);
17255 if (htab == NULL)
17256 return FALSE;
17257
17258 if (!htab->opd_abi && !h->def_regular)
17259 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17260 if (ent->plt.offset != (bfd_vma) -1)
17261 {
17262 /* Mark the symbol as undefined, rather than as
17263 defined in glink. Leave the value if there were
17264 any relocations where pointer equality matters
17265 (this is a clue for the dynamic linker, to make
17266 function pointer comparisons work between an
17267 application and shared library), otherwise set it
17268 to zero. */
17269 sym->st_shndx = SHN_UNDEF;
17270 if (!h->pointer_equality_needed)
17271 sym->st_value = 0;
17272 else if (!h->ref_regular_nonweak)
17273 {
17274 /* This breaks function pointer comparisons, but
17275 that is better than breaking tests for a NULL
17276 function pointer. */
17277 sym->st_value = 0;
17278 }
17279 break;
17280 }
17281
17282 if (h->needs_copy
17283 && (h->root.type == bfd_link_hash_defined
17284 || h->root.type == bfd_link_hash_defweak)
17285 && (h->root.u.def.section == htab->elf.sdynbss
17286 || h->root.u.def.section == htab->elf.sdynrelro))
17287 {
17288 /* This symbol needs a copy reloc. Set it up. */
17289 Elf_Internal_Rela rela;
17290 asection *srel;
17291 bfd_byte *loc;
17292
17293 if (h->dynindx == -1)
17294 abort ();
17295
17296 rela.r_offset = defined_sym_val (h);
17297 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17298 rela.r_addend = 0;
17299 if (h->root.u.def.section == htab->elf.sdynrelro)
17300 srel = htab->elf.sreldynrelro;
17301 else
17302 srel = htab->elf.srelbss;
17303 loc = srel->contents;
17304 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
17305 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
17306 }
17307
17308 return TRUE;
17309 }
17310
17311 /* Used to decide how to sort relocs in an optimal manner for the
17312 dynamic linker, before writing them out. */
17313
17314 static enum elf_reloc_type_class
17315 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17316 const asection *rel_sec,
17317 const Elf_Internal_Rela *rela)
17318 {
17319 enum elf_ppc64_reloc_type r_type;
17320 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17321
17322 if (rel_sec == htab->elf.irelplt)
17323 return reloc_class_ifunc;
17324
17325 r_type = ELF64_R_TYPE (rela->r_info);
17326 switch (r_type)
17327 {
17328 case R_PPC64_RELATIVE:
17329 return reloc_class_relative;
17330 case R_PPC64_JMP_SLOT:
17331 return reloc_class_plt;
17332 case R_PPC64_COPY:
17333 return reloc_class_copy;
17334 default:
17335 return reloc_class_normal;
17336 }
17337 }
17338
17339 /* Finish up the dynamic sections. */
17340
17341 static bfd_boolean
17342 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17343 struct bfd_link_info *info)
17344 {
17345 struct ppc_link_hash_table *htab;
17346 bfd *dynobj;
17347 asection *sdyn;
17348
17349 htab = ppc_hash_table (info);
17350 if (htab == NULL)
17351 return FALSE;
17352
17353 dynobj = htab->elf.dynobj;
17354 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
17355
17356 if (htab->elf.dynamic_sections_created)
17357 {
17358 Elf64_External_Dyn *dyncon, *dynconend;
17359
17360 if (sdyn == NULL || htab->elf.sgot == NULL)
17361 abort ();
17362
17363 dyncon = (Elf64_External_Dyn *) sdyn->contents;
17364 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
17365 for (; dyncon < dynconend; dyncon++)
17366 {
17367 Elf_Internal_Dyn dyn;
17368 asection *s;
17369
17370 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17371
17372 switch (dyn.d_tag)
17373 {
17374 default:
17375 continue;
17376
17377 case DT_PPC64_GLINK:
17378 s = htab->glink;
17379 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17380 /* We stupidly defined DT_PPC64_GLINK to be the start
17381 of glink rather than the first entry point, which is
17382 what ld.so needs, and now have a bigger stub to
17383 support automatic multiple TOCs. */
17384 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
17385 break;
17386
17387 case DT_PPC64_OPD:
17388 s = bfd_get_section_by_name (output_bfd, ".opd");
17389 if (s == NULL)
17390 continue;
17391 dyn.d_un.d_ptr = s->vma;
17392 break;
17393
17394 case DT_PPC64_OPT:
17395 if ((htab->do_multi_toc && htab->multi_toc_needed)
17396 || htab->notoc_plt)
17397 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
17398 if (htab->has_plt_localentry0)
17399 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
17400 break;
17401
17402 case DT_PPC64_OPDSZ:
17403 s = bfd_get_section_by_name (output_bfd, ".opd");
17404 if (s == NULL)
17405 continue;
17406 dyn.d_un.d_val = s->size;
17407 break;
17408
17409 case DT_PLTGOT:
17410 s = htab->elf.splt;
17411 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17412 break;
17413
17414 case DT_JMPREL:
17415 s = htab->elf.srelplt;
17416 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17417 break;
17418
17419 case DT_PLTRELSZ:
17420 dyn.d_un.d_val = htab->elf.srelplt->size;
17421 break;
17422
17423 case DT_TEXTREL:
17424 if (htab->local_ifunc_resolver)
17425 info->callbacks->einfo
17426 (_("%X%P: text relocations and GNU indirect "
17427 "functions will result in a segfault at runtime\n"));
17428 else if (htab->maybe_local_ifunc_resolver)
17429 info->callbacks->einfo
17430 (_("%P: warning: text relocations and GNU indirect "
17431 "functions may result in a segfault at runtime\n"));
17432 continue;
17433 }
17434
17435 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
17436 }
17437 }
17438
17439 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17440 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
17441 {
17442 /* Fill in the first entry in the global offset table.
17443 We use it to hold the link-time TOCbase. */
17444 bfd_put_64 (output_bfd,
17445 elf_gp (output_bfd) + TOC_BASE_OFF,
17446 htab->elf.sgot->contents);
17447
17448 /* Set .got entry size. */
17449 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17450 = 8;
17451 }
17452
17453 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17454 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17455 {
17456 /* Set .plt entry size. */
17457 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17458 = PLT_ENTRY_SIZE (htab);
17459 }
17460
17461 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17462 brlt ourselves if emitrelocations. */
17463 if (htab->brlt != NULL
17464 && htab->brlt->reloc_count != 0
17465 && !_bfd_elf_link_output_relocs (output_bfd,
17466 htab->brlt,
17467 elf_section_data (htab->brlt)->rela.hdr,
17468 elf_section_data (htab->brlt)->relocs,
17469 NULL))
17470 return FALSE;
17471
17472 if (htab->glink != NULL
17473 && htab->glink->reloc_count != 0
17474 && !_bfd_elf_link_output_relocs (output_bfd,
17475 htab->glink,
17476 elf_section_data (htab->glink)->rela.hdr,
17477 elf_section_data (htab->glink)->relocs,
17478 NULL))
17479 return FALSE;
17480
17481
17482 if (htab->glink_eh_frame != NULL
17483 && htab->glink_eh_frame->size != 0
17484 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17485 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17486 htab->glink_eh_frame,
17487 htab->glink_eh_frame->contents))
17488 return FALSE;
17489
17490 /* We need to handle writing out multiple GOT sections ourselves,
17491 since we didn't add them to DYNOBJ. We know dynobj is the first
17492 bfd. */
17493 while ((dynobj = dynobj->link.next) != NULL)
17494 {
17495 asection *s;
17496
17497 if (!is_ppc64_elf (dynobj))
17498 continue;
17499
17500 s = ppc64_elf_tdata (dynobj)->got;
17501 if (s != NULL
17502 && s->size != 0
17503 && s->output_section != bfd_abs_section_ptr
17504 && !bfd_set_section_contents (output_bfd, s->output_section,
17505 s->contents, s->output_offset,
17506 s->size))
17507 return FALSE;
17508 s = ppc64_elf_tdata (dynobj)->relgot;
17509 if (s != NULL
17510 && s->size != 0
17511 && s->output_section != bfd_abs_section_ptr
17512 && !bfd_set_section_contents (output_bfd, s->output_section,
17513 s->contents, s->output_offset,
17514 s->size))
17515 return FALSE;
17516 }
17517
17518 return TRUE;
17519 }
17520
17521 #include "elf64-target.h"
17522
17523 /* FreeBSD support */
17524
17525 #undef TARGET_LITTLE_SYM
17526 #undef TARGET_LITTLE_NAME
17527
17528 #undef TARGET_BIG_SYM
17529 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17530 #undef TARGET_BIG_NAME
17531 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17532
17533 #undef ELF_OSABI
17534 #define ELF_OSABI ELFOSABI_FREEBSD
17535
17536 #undef elf64_bed
17537 #define elf64_bed elf64_powerpc_fbsd_bed
17538
17539 #include "elf64-target.h"
This page took 0.888565 seconds and 4 git commands to generate.