gas: Fix ip2k-elf and xstormy16-elf build
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
6
7 This file is part of BFD, the Binary File Descriptor library.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
22
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
36 #include "dwarf2.h"
37
38 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39 #define OCTETS_PER_BYTE(ABFD, SEC) 1
40
41 static bfd_reloc_status_type ppc64_elf_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
47 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
49 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc64_elf_toc_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
55 static bfd_reloc_status_type ppc64_elf_toc64_reloc
56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
57 static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
59 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
61 static bfd_vma opd_entry_value
62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
63
64 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
65 #define TARGET_LITTLE_NAME "elf64-powerpcle"
66 #define TARGET_BIG_SYM powerpc_elf64_vec
67 #define TARGET_BIG_NAME "elf64-powerpc"
68 #define ELF_ARCH bfd_arch_powerpc
69 #define ELF_TARGET_ID PPC64_ELF_DATA
70 #define ELF_MACHINE_CODE EM_PPC64
71 #define ELF_MAXPAGESIZE 0x10000
72 #define ELF_COMMONPAGESIZE 0x1000
73 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
74 #define elf_info_to_howto ppc64_elf_info_to_howto
75
76 #define elf_backend_want_got_sym 0
77 #define elf_backend_want_plt_sym 0
78 #define elf_backend_plt_alignment 3
79 #define elf_backend_plt_not_loaded 1
80 #define elf_backend_got_header_size 8
81 #define elf_backend_want_dynrelro 1
82 #define elf_backend_can_gc_sections 1
83 #define elf_backend_can_refcount 1
84 #define elf_backend_rela_normal 1
85 #define elf_backend_dtrel_excludes_plt 1
86 #define elf_backend_default_execstack 0
87
88 #define bfd_elf64_mkobject ppc64_elf_mkobject
89 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
90 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
91 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
93 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
95 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
96 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
97 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
98
99 #define elf_backend_object_p ppc64_elf_object_p
100 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
102 #define elf_backend_write_core_note ppc64_elf_write_core_note
103 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
104 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
105 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
106 #define elf_backend_check_directives ppc64_elf_before_check_relocs
107 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
108 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
109 #define elf_backend_check_relocs ppc64_elf_check_relocs
110 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
111 #define elf_backend_gc_keep ppc64_elf_gc_keep
112 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
113 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
114 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
116 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
117 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
119 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
120 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
121 #define elf_backend_action_discarded ppc64_elf_action_discarded
122 #define elf_backend_relocate_section ppc64_elf_relocate_section
123 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
126 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
127 #define elf_backend_special_sections ppc64_elf_special_sections
128 #define elf_backend_section_flags ppc64_elf_section_flags
129 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
130 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
131 #define elf_backend_get_reloc_section bfd_get_section_by_name
132
133 /* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137 /* The size in bytes of an entry in the procedure linkage table. */
138 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
139 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
140
141 /* The initial size of the plt reserved for the dynamic linker. */
142 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
143
144 /* Offsets to some stack save slots. */
145 #define STK_LR 16
146 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
147 /* This one is dodgy. ELFv2 does not have a linker word, so use the
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
152 /* TOC base pointers offset from start of TOC. */
153 #define TOC_BASE_OFF 0x8000
154 /* TOC base alignment. */
155 #define TOC_BASE_ALIGN 256
156
157 /* Offset of tp and dtp pointers from start of TLS block. */
158 #define TP_OFFSET 0x7000
159 #define DTP_OFFSET 0x8000
160
161 /* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
163 insert an addi to adjust r11. */
164 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
165 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
170 #define BCTR 0x4e800420 /* bctr */
171
172 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
173 #define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
175 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183 #define BNECTR 0x4ca20420 /* bnectr+ */
184 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
185
186 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
187 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
188 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
189
190 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
193
194 #define LI_R11_0 0x39600000 /* li %r11,0 */
195 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
196 #define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
197 #define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
198 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
200 #define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
201 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
202 #define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
203 #define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
204 #define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
205 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
206 #define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
207 #define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208 #define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209 #define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
210 #define PADDI_R12_PC 0x0610000039800000ULL
211 #define PLD_R12_PC 0x04100000e5800000ULL
212 #define PNOP 0x0700000000000000ULL
213
214 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215 #define GLINK_PLTRESOLVE_SIZE(htab) \
216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
221 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
224 /* ld %2,(0b-1b)(%11) */
225 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
226 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
231 /* bctr */
232 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
237
238 /* Pad with this. */
239 #define NOP 0x60000000
240
241 /* Some other nops. */
242 #define CROR_151515 0x4def7b82
243 #define CROR_313131 0x4ffffb82
244
245 /* .glink entries for the first 32k functions are two instructions. */
246 #define LI_R0_0 0x38000000 /* li %r0,0 */
247 #define B_DOT 0x48000000 /* b . */
248
249 /* After that, we need two instructions to load the index, followed by
250 a branch. */
251 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
252 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
253
254 /* Instructions used by the save and restore reg functions. */
255 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
259 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
261 #define LI_R12_0 0x39800000 /* li %r12,0 */
262 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
265 #define BLR 0x4e800020 /* blr */
266
267 /* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
270 relocate .opd without reloc entries. */
271 #ifndef NO_OPD_RELOCS
272 #define NO_OPD_RELOCS 0
273 #endif
274
275 #ifndef ARRAY_SIZE
276 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277 #endif
278
279 static inline int
280 abiversion (bfd *abfd)
281 {
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283 }
284
285 static inline void
286 set_abiversion (bfd *abfd, int ver)
287 {
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290 }
291 \f
292 /* Relocation HOWTO's. */
293 /* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
306 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
307
308 static reloc_howto_type ppc64_elf_howto_raw[] =
309 {
310 /* This reloc does nothing. */
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
313
314 /* A standard 32 bit relocation. */
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
322
323 /* A standard 16 bit relocation. */
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
326
327 /* A 16 bit relocation without overflow. */
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
330
331 /* Bits 16-31 of an address. */
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
360
361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
364
365 /* A relative 16 bit branch; the lower two bits must be zero. */
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
432
433 /* 32-bit PC relative. */
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
436
437 /* 32-bit relocation to the symbol's procedure linkage table. */
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
460
461 /* 16-bit section relative relocation. */
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
464
465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
468
469 /* 16-bit upper half section relative relocation. */
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
472
473 /* 16-bit upper half adjusted section relative relocation. */
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
476
477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
486
487 /* The bits 32-47 of an address. */
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
495
496 /* The bits 48-63 of an address. */
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
504
505 /* Like ADDR64, but may be unaligned. */
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
508
509 /* 64-bit relative relocation. */
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
512
513 /* 64-bit relocation to the symbol's procedure linkage table. */
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
522
523 /* 16 bit TOC-relative relocation. */
524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
527
528 /* 16 bit TOC-relative relocation without overflow. */
529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
624
625 /* Marker relocs for TLS. */
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
634
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 /* Marker relocs on inline plt call instructions. */
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
646
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
657
658 /* A 16 bit dtprel reloc. */
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
661
662 /* Like DTPREL16, but no overflow. */
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
689
690 /* Like DTPREL16, but for insns with a DS field. */
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
693
694 /* Like DTPREL16_DS, but no overflow. */
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
702
703 /* A 16 bit tprel reloc. */
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
706
707 /* Like TPREL16, but no overflow. */
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
734
735 /* Like TPREL16, but for insns with a DS field. */
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
738
739 /* Like TPREL16_DS, but no overflow. */
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
748
749 /* Like GOT_TLSGD16, but no overflow. */
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
752
753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
756
757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
760
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
766
767 /* Like GOT_TLSLD16, but no overflow. */
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
770
771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
774
775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
778
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
783
784 /* Like GOT_DTPREL16_DS, but no overflow. */
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
787
788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
791
792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
800
801 /* Like GOT_TPREL16_DS, but no overflow. */
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
804
805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
818
819 /* A 16 bit relative relocation. */
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
822
823 /* A 16 bit relative relocation without overflow. */
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
826
827 /* The high order 16 bits of a relative address. */
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
835
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
857
858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
861
862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
885
886 /* Marker reloc on ELFv2 large-model function entry. */
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
889
890 /* Like ADDR64, but use local entry point of function. */
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
893
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
933 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
934 ppc64_elf_unhandled_reloc),
935
936 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
937 ppc64_elf_unhandled_reloc),
938
939 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
940 ppc64_elf_unhandled_reloc),
941
942 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
943 ppc64_elf_unhandled_reloc),
944
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
975 /* GNU extension to record C++ vtable hierarchy. */
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
978
979 /* GNU extension to record C++ vtable member usage. */
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
982 };
983
984 \f
985 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988 static void
989 ppc_howto_init (void)
990 {
991 unsigned int i, type;
992
993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
994 {
995 type = ppc64_elf_howto_raw[i].type;
996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999 }
1000
1001 static reloc_howto_type *
1002 ppc64_elf_reloc_type_lookup (bfd *abfd,
1003 bfd_reloc_code_real_type code)
1004 {
1005 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1006
1007 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1008 /* Initialize howto table if needed. */
1009 ppc_howto_init ();
1010
1011 switch (code)
1012 {
1013 default:
1014 /* xgettext:c-format */
1015 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1016 (int) code);
1017 bfd_set_error (bfd_error_bad_value);
1018 return NULL;
1019
1020 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1021 break;
1022 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1023 break;
1024 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1025 break;
1026 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1027 break;
1028 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1029 break;
1030 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1031 break;
1032 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1033 break;
1034 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1035 break;
1036 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1037 break;
1038 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1039 break;
1040 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1041 break;
1042 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1043 break;
1044 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1045 break;
1046 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1047 break;
1048 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1049 break;
1050 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1051 break;
1052 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1053 break;
1054 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1055 break;
1056 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1057 break;
1058 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1059 break;
1060 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1061 break;
1062 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1063 break;
1064 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1065 break;
1066 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1067 break;
1068 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1069 break;
1070 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1071 break;
1072 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1073 break;
1074 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1075 break;
1076 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1077 break;
1078 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1079 break;
1080 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1081 break;
1082 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1083 break;
1084 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1085 break;
1086 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1087 break;
1088 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1089 break;
1090 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1091 break;
1092 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1093 break;
1094 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1095 break;
1096 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1097 break;
1098 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1099 break;
1100 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1101 break;
1102 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1103 break;
1104 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1105 break;
1106 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1107 break;
1108 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1109 break;
1110 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1111 break;
1112 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1113 break;
1114 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1115 break;
1116 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1117 break;
1118 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1119 break;
1120 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1121 break;
1122 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1123 break;
1124 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1125 break;
1126 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1127 break;
1128 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1129 break;
1130 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1131 break;
1132 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1133 break;
1134 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1135 break;
1136 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1137 break;
1138 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1139 break;
1140 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1141 break;
1142 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1143 break;
1144 case BFD_RELOC_PPC64_TLS_PCREL:
1145 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1146 break;
1147 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1148 break;
1149 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1150 break;
1151 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1152 break;
1153 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1154 break;
1155 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1156 break;
1157 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1158 break;
1159 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1160 break;
1161 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1162 break;
1163 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1164 break;
1165 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1168 break;
1169 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1170 break;
1171 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1172 break;
1173 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1174 break;
1175 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1176 break;
1177 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1178 break;
1179 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1200 break;
1201 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1202 break;
1203 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1208 break;
1209 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1210 break;
1211 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1220 break;
1221 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1222 break;
1223 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1232 break;
1233 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1234 break;
1235 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1236 break;
1237 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1238 break;
1239 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1240 break;
1241 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1242 break;
1243 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1252 break;
1253 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1254 break;
1255 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1256 break;
1257 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1258 break;
1259 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1260 break;
1261 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1262 break;
1263 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1264 break;
1265 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1266 break;
1267 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1268 break;
1269 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1270 break;
1271 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1272 break;
1273 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1274 break;
1275 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1276 break;
1277 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1278 break;
1279 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1280 break;
1281 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1286 break;
1287 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1288 break;
1289 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1294 break;
1295 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1296 break;
1297 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1302 break;
1303 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1304 break;
1305 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1306 break;
1307 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1308 break;
1309 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1310 break;
1311 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1312 break;
1313 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
1314 break;
1315 }
1316
1317 return ppc64_elf_howto_table[r];
1318 };
1319
1320 static reloc_howto_type *
1321 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1322 const char *r_name)
1323 {
1324 unsigned int i;
1325
1326 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
1327 if (ppc64_elf_howto_raw[i].name != NULL
1328 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1329 return &ppc64_elf_howto_raw[i];
1330
1331 return NULL;
1332 }
1333
1334 /* Set the howto pointer for a PowerPC ELF reloc. */
1335
1336 static bfd_boolean
1337 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
1338 Elf_Internal_Rela *dst)
1339 {
1340 unsigned int type;
1341
1342 /* Initialize howto table if needed. */
1343 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1344 ppc_howto_init ();
1345
1346 type = ELF64_R_TYPE (dst->r_info);
1347 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
1348 {
1349 /* xgettext:c-format */
1350 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1351 abfd, type);
1352 bfd_set_error (bfd_error_bad_value);
1353 return FALSE;
1354 }
1355 cache_ptr->howto = ppc64_elf_howto_table[type];
1356 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1357 {
1358 /* xgettext:c-format */
1359 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1360 abfd, type);
1361 bfd_set_error (bfd_error_bad_value);
1362 return FALSE;
1363 }
1364
1365 return TRUE;
1366 }
1367
1368 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
1369
1370 static bfd_reloc_status_type
1371 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1372 void *data, asection *input_section,
1373 bfd *output_bfd, char **error_message)
1374 {
1375 enum elf_ppc64_reloc_type r_type;
1376 long insn;
1377 bfd_size_type octets;
1378 bfd_vma value;
1379
1380 /* If this is a relocatable link (output_bfd test tells us), just
1381 call the generic function. Any adjustment will be done at final
1382 link time. */
1383 if (output_bfd != NULL)
1384 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1385 input_section, output_bfd, error_message);
1386
1387 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1388 We won't actually be using the low bits, so trashing them
1389 doesn't matter. */
1390 r_type = reloc_entry->howto->type;
1391 if (r_type == R_PPC64_ADDR16_HIGHERA34
1392 || r_type == R_PPC64_ADDR16_HIGHESTA34
1393 || r_type == R_PPC64_REL16_HIGHERA34
1394 || r_type == R_PPC64_REL16_HIGHESTA34)
1395 reloc_entry->addend += 1ULL << 33;
1396 else
1397 reloc_entry->addend += 1U << 15;
1398 if (r_type != R_PPC64_REL16DX_HA)
1399 return bfd_reloc_continue;
1400
1401 value = 0;
1402 if (!bfd_is_com_section (symbol->section))
1403 value = symbol->value;
1404 value += (reloc_entry->addend
1405 + symbol->section->output_offset
1406 + symbol->section->output_section->vma);
1407 value -= (reloc_entry->address
1408 + input_section->output_offset
1409 + input_section->output_section->vma);
1410 value = (bfd_signed_vma) value >> 16;
1411
1412 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1413 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1414 insn &= ~0x1fffc1;
1415 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
1416 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1417 if (value + 0x8000 > 0xffff)
1418 return bfd_reloc_overflow;
1419 return bfd_reloc_ok;
1420 }
1421
1422 static bfd_reloc_status_type
1423 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
1426 {
1427 if (output_bfd != NULL)
1428 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1429 input_section, output_bfd, error_message);
1430
1431 if (strcmp (symbol->section->name, ".opd") == 0
1432 && (symbol->section->owner->flags & DYNAMIC) == 0)
1433 {
1434 bfd_vma dest = opd_entry_value (symbol->section,
1435 symbol->value + reloc_entry->addend,
1436 NULL, NULL, FALSE);
1437 if (dest != (bfd_vma) -1)
1438 reloc_entry->addend = dest - (symbol->value
1439 + symbol->section->output_section->vma
1440 + symbol->section->output_offset);
1441 }
1442 else
1443 {
1444 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1445
1446 if (symbol->section->owner != abfd
1447 && symbol->section->owner != NULL
1448 && abiversion (symbol->section->owner) >= 2)
1449 {
1450 unsigned int i;
1451
1452 for (i = 0; i < symbol->section->owner->symcount; ++i)
1453 {
1454 asymbol *symdef = symbol->section->owner->outsymbols[i];
1455
1456 if (strcmp (symdef->name, symbol->name) == 0)
1457 {
1458 elfsym = (elf_symbol_type *) symdef;
1459 break;
1460 }
1461 }
1462 }
1463 reloc_entry->addend
1464 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1465 }
1466 return bfd_reloc_continue;
1467 }
1468
1469 static bfd_reloc_status_type
1470 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1471 void *data, asection *input_section,
1472 bfd *output_bfd, char **error_message)
1473 {
1474 long insn;
1475 enum elf_ppc64_reloc_type r_type;
1476 bfd_size_type octets;
1477 /* Assume 'at' branch hints. */
1478 bfd_boolean is_isa_v2 = TRUE;
1479
1480 /* If this is a relocatable link (output_bfd test tells us), just
1481 call the generic function. Any adjustment will be done at final
1482 link time. */
1483 if (output_bfd != NULL)
1484 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1485 input_section, output_bfd, error_message);
1486
1487 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1488 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1489 insn &= ~(0x01 << 21);
1490 r_type = reloc_entry->howto->type;
1491 if (r_type == R_PPC64_ADDR14_BRTAKEN
1492 || r_type == R_PPC64_REL14_BRTAKEN)
1493 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1494
1495 if (is_isa_v2)
1496 {
1497 /* Set 'a' bit. This is 0b00010 in BO field for branch
1498 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1499 for branch on CTR insns (BO == 1a00t or 1a01t). */
1500 if ((insn & (0x14 << 21)) == (0x04 << 21))
1501 insn |= 0x02 << 21;
1502 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1503 insn |= 0x08 << 21;
1504 else
1505 goto out;
1506 }
1507 else
1508 {
1509 bfd_vma target = 0;
1510 bfd_vma from;
1511
1512 if (!bfd_is_com_section (symbol->section))
1513 target = symbol->value;
1514 target += symbol->section->output_section->vma;
1515 target += symbol->section->output_offset;
1516 target += reloc_entry->addend;
1517
1518 from = (reloc_entry->address
1519 + input_section->output_offset
1520 + input_section->output_section->vma);
1521
1522 /* Invert 'y' bit if not the default. */
1523 if ((bfd_signed_vma) (target - from) < 0)
1524 insn ^= 0x01 << 21;
1525 }
1526 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
1527 out:
1528 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1529 input_section, output_bfd, error_message);
1530 }
1531
1532 static bfd_reloc_status_type
1533 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1534 void *data, asection *input_section,
1535 bfd *output_bfd, char **error_message)
1536 {
1537 /* If this is a relocatable link (output_bfd test tells us), just
1538 call the generic function. Any adjustment will be done at final
1539 link time. */
1540 if (output_bfd != NULL)
1541 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1542 input_section, output_bfd, error_message);
1543
1544 /* Subtract the symbol section base address. */
1545 reloc_entry->addend -= symbol->section->output_section->vma;
1546 return bfd_reloc_continue;
1547 }
1548
1549 static bfd_reloc_status_type
1550 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1551 void *data, asection *input_section,
1552 bfd *output_bfd, char **error_message)
1553 {
1554 /* If this is a relocatable link (output_bfd test tells us), just
1555 call the generic function. Any adjustment will be done at final
1556 link time. */
1557 if (output_bfd != NULL)
1558 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1559 input_section, output_bfd, error_message);
1560
1561 /* Subtract the symbol section base address. */
1562 reloc_entry->addend -= symbol->section->output_section->vma;
1563
1564 /* Adjust the addend for sign extension of the low 16 bits. */
1565 reloc_entry->addend += 0x8000;
1566 return bfd_reloc_continue;
1567 }
1568
1569 static bfd_reloc_status_type
1570 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1571 void *data, asection *input_section,
1572 bfd *output_bfd, char **error_message)
1573 {
1574 bfd_vma TOCstart;
1575
1576 /* If this is a relocatable link (output_bfd test tells us), just
1577 call the generic function. Any adjustment will be done at final
1578 link time. */
1579 if (output_bfd != NULL)
1580 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1581 input_section, output_bfd, error_message);
1582
1583 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1584 if (TOCstart == 0)
1585 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1586
1587 /* Subtract the TOC base address. */
1588 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1589 return bfd_reloc_continue;
1590 }
1591
1592 static bfd_reloc_status_type
1593 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1594 void *data, asection *input_section,
1595 bfd *output_bfd, char **error_message)
1596 {
1597 bfd_vma TOCstart;
1598
1599 /* If this is a relocatable link (output_bfd test tells us), just
1600 call the generic function. Any adjustment will be done at final
1601 link time. */
1602 if (output_bfd != NULL)
1603 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1604 input_section, output_bfd, error_message);
1605
1606 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1607 if (TOCstart == 0)
1608 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1609
1610 /* Subtract the TOC base address. */
1611 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1612
1613 /* Adjust the addend for sign extension of the low 16 bits. */
1614 reloc_entry->addend += 0x8000;
1615 return bfd_reloc_continue;
1616 }
1617
1618 static bfd_reloc_status_type
1619 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1620 void *data, asection *input_section,
1621 bfd *output_bfd, char **error_message)
1622 {
1623 bfd_vma TOCstart;
1624 bfd_size_type octets;
1625
1626 /* If this is a relocatable link (output_bfd test tells us), just
1627 call the generic function. Any adjustment will be done at final
1628 link time. */
1629 if (output_bfd != NULL)
1630 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1631 input_section, output_bfd, error_message);
1632
1633 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1634 if (TOCstart == 0)
1635 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
1636
1637 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
1638 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1639 return bfd_reloc_ok;
1640 }
1641
1642 static bfd_reloc_status_type
1643 ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1644 void *data, asection *input_section,
1645 bfd *output_bfd, char **error_message)
1646 {
1647 uint64_t insn;
1648 bfd_vma targ;
1649
1650 if (output_bfd != NULL)
1651 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1652 input_section, output_bfd, error_message);
1653
1654 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1655 insn <<= 32;
1656 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1657
1658 targ = (symbol->section->output_section->vma
1659 + symbol->section->output_offset
1660 + reloc_entry->addend);
1661 if (!bfd_is_com_section (symbol->section))
1662 targ += symbol->value;
1663 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1664 targ += 1ULL << 33;
1665 if (reloc_entry->howto->pc_relative)
1666 {
1667 bfd_vma from = (reloc_entry->address
1668 + input_section->output_offset
1669 + input_section->output_section->vma);
1670 targ -=from;
1671 }
1672 targ >>= reloc_entry->howto->rightshift;
1673 insn &= ~reloc_entry->howto->dst_mask;
1674 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1675 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1676 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1677 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1678 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1679 >= 1ULL << reloc_entry->howto->bitsize))
1680 return bfd_reloc_overflow;
1681 return bfd_reloc_ok;
1682 }
1683
1684 static bfd_reloc_status_type
1685 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1686 void *data, asection *input_section,
1687 bfd *output_bfd, char **error_message)
1688 {
1689 /* If this is a relocatable link (output_bfd test tells us), just
1690 call the generic function. Any adjustment will be done at final
1691 link time. */
1692 if (output_bfd != NULL)
1693 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1694 input_section, output_bfd, error_message);
1695
1696 if (error_message != NULL)
1697 {
1698 static char buf[60];
1699 sprintf (buf, "generic linker can't handle %s",
1700 reloc_entry->howto->name);
1701 *error_message = buf;
1702 }
1703 return bfd_reloc_dangerous;
1704 }
1705
1706 /* Track GOT entries needed for a given symbol. We might need more
1707 than one got entry per symbol. */
1708 struct got_entry
1709 {
1710 struct got_entry *next;
1711
1712 /* The symbol addend that we'll be placing in the GOT. */
1713 bfd_vma addend;
1714
1715 /* Unlike other ELF targets, we use separate GOT entries for the same
1716 symbol referenced from different input files. This is to support
1717 automatic multiple TOC/GOT sections, where the TOC base can vary
1718 from one input file to another. After partitioning into TOC groups
1719 we merge entries within the group.
1720
1721 Point to the BFD owning this GOT entry. */
1722 bfd *owner;
1723
1724 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1725 TLS_TPREL or TLS_DTPREL for tls entries. */
1726 unsigned char tls_type;
1727
1728 /* Non-zero if got.ent points to real entry. */
1729 unsigned char is_indirect;
1730
1731 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1732 union
1733 {
1734 bfd_signed_vma refcount;
1735 bfd_vma offset;
1736 struct got_entry *ent;
1737 } got;
1738 };
1739
1740 /* The same for PLT. */
1741 struct plt_entry
1742 {
1743 struct plt_entry *next;
1744
1745 bfd_vma addend;
1746
1747 union
1748 {
1749 bfd_signed_vma refcount;
1750 bfd_vma offset;
1751 } plt;
1752 };
1753
1754 struct ppc64_elf_obj_tdata
1755 {
1756 struct elf_obj_tdata elf;
1757
1758 /* Shortcuts to dynamic linker sections. */
1759 asection *got;
1760 asection *relgot;
1761
1762 /* Used during garbage collection. We attach global symbols defined
1763 on removed .opd entries to this section so that the sym is removed. */
1764 asection *deleted_section;
1765
1766 /* TLS local dynamic got entry handling. Support for multiple GOT
1767 sections means we potentially need one of these for each input bfd. */
1768 struct got_entry tlsld_got;
1769
1770 union
1771 {
1772 /* A copy of relocs before they are modified for --emit-relocs. */
1773 Elf_Internal_Rela *relocs;
1774
1775 /* Section contents. */
1776 bfd_byte *contents;
1777 } opd;
1778
1779 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1780 the reloc to be in the range -32768 to 32767. */
1781 unsigned int has_small_toc_reloc : 1;
1782
1783 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1784 instruction not one we handle. */
1785 unsigned int unexpected_toc_insn : 1;
1786
1787 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1788 this file. */
1789 unsigned int has_optrel : 1;
1790 };
1791
1792 #define ppc64_elf_tdata(bfd) \
1793 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1794
1795 #define ppc64_tlsld_got(bfd) \
1796 (&ppc64_elf_tdata (bfd)->tlsld_got)
1797
1798 #define is_ppc64_elf(bfd) \
1799 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1800 && elf_object_id (bfd) == PPC64_ELF_DATA)
1801
1802 /* Override the generic function because we store some extras. */
1803
1804 static bfd_boolean
1805 ppc64_elf_mkobject (bfd *abfd)
1806 {
1807 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
1808 PPC64_ELF_DATA);
1809 }
1810
1811 /* Fix bad default arch selected for a 64 bit input bfd when the
1812 default is 32 bit. Also select arch based on apuinfo. */
1813
1814 static bfd_boolean
1815 ppc64_elf_object_p (bfd *abfd)
1816 {
1817 if (!abfd->arch_info->the_default)
1818 return TRUE;
1819
1820 if (abfd->arch_info->bits_per_word == 32)
1821 {
1822 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1823
1824 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1825 {
1826 /* Relies on arch after 32 bit default being 64 bit default. */
1827 abfd->arch_info = abfd->arch_info->next;
1828 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1829 }
1830 }
1831 return _bfd_elf_ppc_set_arch (abfd);
1832 }
1833
1834 /* Support for core dump NOTE sections. */
1835
1836 static bfd_boolean
1837 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1838 {
1839 size_t offset, size;
1840
1841 if (note->descsz != 504)
1842 return FALSE;
1843
1844 /* pr_cursig */
1845 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1846
1847 /* pr_pid */
1848 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
1849
1850 /* pr_reg */
1851 offset = 112;
1852 size = 384;
1853
1854 /* Make a ".reg/999" section. */
1855 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1856 size, note->descpos + offset);
1857 }
1858
1859 static bfd_boolean
1860 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1861 {
1862 if (note->descsz != 136)
1863 return FALSE;
1864
1865 elf_tdata (abfd)->core->pid
1866 = bfd_get_32 (abfd, note->descdata + 24);
1867 elf_tdata (abfd)->core->program
1868 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
1869 elf_tdata (abfd)->core->command
1870 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1871
1872 return TRUE;
1873 }
1874
1875 static char *
1876 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1877 ...)
1878 {
1879 switch (note_type)
1880 {
1881 default:
1882 return NULL;
1883
1884 case NT_PRPSINFO:
1885 {
1886 char data[136] ATTRIBUTE_NONSTRING;
1887 va_list ap;
1888
1889 va_start (ap, note_type);
1890 memset (data, 0, sizeof (data));
1891 strncpy (data + 40, va_arg (ap, const char *), 16);
1892 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1893 DIAGNOSTIC_PUSH;
1894 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1895 -Wstringop-truncation:
1896 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1897 */
1898 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1899 #endif
1900 strncpy (data + 56, va_arg (ap, const char *), 80);
1901 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1902 DIAGNOSTIC_POP;
1903 #endif
1904 va_end (ap);
1905 return elfcore_write_note (abfd, buf, bufsiz,
1906 "CORE", note_type, data, sizeof (data));
1907 }
1908
1909 case NT_PRSTATUS:
1910 {
1911 char data[504];
1912 va_list ap;
1913 long pid;
1914 int cursig;
1915 const void *greg;
1916
1917 va_start (ap, note_type);
1918 memset (data, 0, 112);
1919 pid = va_arg (ap, long);
1920 bfd_put_32 (abfd, pid, data + 32);
1921 cursig = va_arg (ap, int);
1922 bfd_put_16 (abfd, cursig, data + 12);
1923 greg = va_arg (ap, const void *);
1924 memcpy (data + 112, greg, 384);
1925 memset (data + 496, 0, 8);
1926 va_end (ap);
1927 return elfcore_write_note (abfd, buf, bufsiz,
1928 "CORE", note_type, data, sizeof (data));
1929 }
1930 }
1931 }
1932
1933 /* Add extra PPC sections. */
1934
1935 static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
1936 {
1937 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1938 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1939 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1941 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1942 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1943 { NULL, 0, 0, 0, 0 }
1944 };
1945
1946 enum _ppc64_sec_type {
1947 sec_normal = 0,
1948 sec_opd = 1,
1949 sec_toc = 2
1950 };
1951
1952 struct _ppc64_elf_section_data
1953 {
1954 struct bfd_elf_section_data elf;
1955
1956 union
1957 {
1958 /* An array with one entry for each opd function descriptor,
1959 and some spares since opd entries may be either 16 or 24 bytes. */
1960 #define OPD_NDX(OFF) ((OFF) >> 4)
1961 struct _opd_sec_data
1962 {
1963 /* Points to the function code section for local opd entries. */
1964 asection **func_sec;
1965
1966 /* After editing .opd, adjust references to opd local syms. */
1967 long *adjust;
1968 } opd;
1969
1970 /* An array for toc sections, indexed by offset/8. */
1971 struct _toc_sec_data
1972 {
1973 /* Specifies the relocation symbol index used at a given toc offset. */
1974 unsigned *symndx;
1975
1976 /* And the relocation addend. */
1977 bfd_vma *add;
1978 } toc;
1979 } u;
1980
1981 enum _ppc64_sec_type sec_type:2;
1982
1983 /* Flag set when small branches are detected. Used to
1984 select suitable defaults for the stub group size. */
1985 unsigned int has_14bit_branch:1;
1986
1987 /* Flag set when PLTCALL relocs are detected. */
1988 unsigned int has_pltcall:1;
1989
1990 /* Flag set when section has PLT/GOT/TOC relocations that can be
1991 optimised. */
1992 unsigned int has_optrel:1;
1993 };
1994
1995 #define ppc64_elf_section_data(sec) \
1996 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
1997
1998 static bfd_boolean
1999 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2000 {
2001 if (!sec->used_by_bfd)
2002 {
2003 struct _ppc64_elf_section_data *sdata;
2004 size_t amt = sizeof (*sdata);
2005
2006 sdata = bfd_zalloc (abfd, amt);
2007 if (sdata == NULL)
2008 return FALSE;
2009 sec->used_by_bfd = sdata;
2010 }
2011
2012 return _bfd_elf_new_section_hook (abfd, sec);
2013 }
2014
2015 static bfd_boolean
2016 ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2017 {
2018 const char *name = hdr->bfd_section->name;
2019
2020 if (strncmp (name, ".sbss", 5) == 0
2021 || strncmp (name, ".sdata", 6) == 0)
2022 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2023
2024 return TRUE;
2025 }
2026
2027 static struct _opd_sec_data *
2028 get_opd_info (asection * sec)
2029 {
2030 if (sec != NULL
2031 && ppc64_elf_section_data (sec) != NULL
2032 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2033 return &ppc64_elf_section_data (sec)->u.opd;
2034 return NULL;
2035 }
2036 \f
2037 /* Parameters for the qsort hook. */
2038 static bfd_boolean synthetic_relocatable;
2039 static asection *synthetic_opd;
2040
2041 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2042
2043 static int
2044 compare_symbols (const void *ap, const void *bp)
2045 {
2046 const asymbol *a = *(const asymbol **) ap;
2047 const asymbol *b = *(const asymbol **) bp;
2048
2049 /* Section symbols first. */
2050 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2051 return -1;
2052 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2053 return 1;
2054
2055 /* then .opd symbols. */
2056 if (synthetic_opd != NULL)
2057 {
2058 if (strcmp (a->section->name, ".opd") == 0
2059 && strcmp (b->section->name, ".opd") != 0)
2060 return -1;
2061 if (strcmp (a->section->name, ".opd") != 0
2062 && strcmp (b->section->name, ".opd") == 0)
2063 return 1;
2064 }
2065
2066 /* then other code symbols. */
2067 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2068 == (SEC_CODE | SEC_ALLOC))
2069 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2070 != (SEC_CODE | SEC_ALLOC)))
2071 return -1;
2072
2073 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2074 != (SEC_CODE | SEC_ALLOC))
2075 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2076 == (SEC_CODE | SEC_ALLOC)))
2077 return 1;
2078
2079 if (synthetic_relocatable)
2080 {
2081 if (a->section->id < b->section->id)
2082 return -1;
2083
2084 if (a->section->id > b->section->id)
2085 return 1;
2086 }
2087
2088 if (a->value + a->section->vma < b->value + b->section->vma)
2089 return -1;
2090
2091 if (a->value + a->section->vma > b->value + b->section->vma)
2092 return 1;
2093
2094 /* For syms with the same value, prefer strong dynamic global function
2095 syms over other syms. */
2096 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2097 return -1;
2098
2099 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2100 return 1;
2101
2102 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2103 return -1;
2104
2105 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2106 return 1;
2107
2108 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2109 return -1;
2110
2111 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2112 return 1;
2113
2114 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2115 return -1;
2116
2117 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2118 return 1;
2119
2120 /* Finally, sort on where the symbol is in memory. The symbols will
2121 be in at most two malloc'd blocks, one for static syms, one for
2122 dynamic syms, and we distinguish the two blocks above by testing
2123 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2124 originally in the same order as the symbols (and we're not
2125 sorting the symbols themselves), this ensures a stable sort. */
2126 if (a < b)
2127 return -1;
2128 if (a > b)
2129 return 1;
2130 return 0;
2131 }
2132
2133 /* Search SYMS for a symbol of the given VALUE. */
2134
2135 static asymbol *
2136 sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2137 bfd_vma value)
2138 {
2139 size_t mid;
2140
2141 if (id == (unsigned) -1)
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->value + syms[mid]->section->vma < value)
2147 lo = mid + 1;
2148 else if (syms[mid]->value + syms[mid]->section->vma > value)
2149 hi = mid;
2150 else
2151 return syms[mid];
2152 }
2153 }
2154 else
2155 {
2156 while (lo < hi)
2157 {
2158 mid = (lo + hi) >> 1;
2159 if (syms[mid]->section->id < id)
2160 lo = mid + 1;
2161 else if (syms[mid]->section->id > id)
2162 hi = mid;
2163 else if (syms[mid]->value < value)
2164 lo = mid + 1;
2165 else if (syms[mid]->value > value)
2166 hi = mid;
2167 else
2168 return syms[mid];
2169 }
2170 }
2171 return NULL;
2172 }
2173
2174 static bfd_boolean
2175 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2176 {
2177 bfd_vma vma = *(bfd_vma *) ptr;
2178 return ((section->flags & SEC_ALLOC) != 0
2179 && section->vma <= vma
2180 && vma < section->vma + section->size);
2181 }
2182
2183 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2184 entry syms. Also generate @plt symbols for the glink branch table.
2185 Returns count of synthetic symbols in RET or -1 on error. */
2186
2187 static long
2188 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2189 long static_count, asymbol **static_syms,
2190 long dyn_count, asymbol **dyn_syms,
2191 asymbol **ret)
2192 {
2193 asymbol *s;
2194 size_t i, j, count;
2195 char *names;
2196 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2197 asection *opd = NULL;
2198 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2199 asymbol **syms;
2200 int abi = abiversion (abfd);
2201
2202 *ret = NULL;
2203
2204 if (abi < 2)
2205 {
2206 opd = bfd_get_section_by_name (abfd, ".opd");
2207 if (opd == NULL && abi == 1)
2208 return 0;
2209 }
2210
2211 syms = NULL;
2212 codesecsym = 0;
2213 codesecsymend = 0;
2214 secsymend = 0;
2215 opdsymend = 0;
2216 symcount = 0;
2217 if (opd != NULL)
2218 {
2219 symcount = static_count;
2220 if (!relocatable)
2221 symcount += dyn_count;
2222 if (symcount == 0)
2223 return 0;
2224
2225 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2226 if (syms == NULL)
2227 return -1;
2228
2229 if (!relocatable && static_count != 0 && dyn_count != 0)
2230 {
2231 /* Use both symbol tables. */
2232 memcpy (syms, static_syms, static_count * sizeof (*syms));
2233 memcpy (syms + static_count, dyn_syms,
2234 (dyn_count + 1) * sizeof (*syms));
2235 }
2236 else if (!relocatable && static_count == 0)
2237 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2238 else
2239 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2240
2241 /* Trim uninteresting symbols. Interesting symbols are section,
2242 function, and notype symbols. */
2243 for (i = 0, j = 0; i < symcount; ++i)
2244 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2245 | BSF_RELC | BSF_SRELC)) == 0)
2246 syms[j++] = syms[i];
2247 symcount = j;
2248
2249 synthetic_relocatable = relocatable;
2250 synthetic_opd = opd;
2251 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2252
2253 if (!relocatable && symcount > 1)
2254 {
2255 /* Trim duplicate syms, since we may have merged the normal
2256 and dynamic symbols. Actually, we only care about syms
2257 that have different values, so trim any with the same
2258 value. Don't consider ifunc and ifunc resolver symbols
2259 duplicates however, because GDB wants to know whether a
2260 text symbol is an ifunc resolver. */
2261 for (i = 1, j = 1; i < symcount; ++i)
2262 {
2263 const asymbol *s0 = syms[i - 1];
2264 const asymbol *s1 = syms[i];
2265
2266 if ((s0->value + s0->section->vma
2267 != s1->value + s1->section->vma)
2268 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2269 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2270 syms[j++] = syms[i];
2271 }
2272 symcount = j;
2273 }
2274
2275 i = 0;
2276 /* Note that here and in compare_symbols we can't compare opd and
2277 sym->section directly. With separate debug info files, the
2278 symbols will be extracted from the debug file while abfd passed
2279 to this function is the real binary. */
2280 if (strcmp (syms[i]->section->name, ".opd") == 0)
2281 ++i;
2282 codesecsym = i;
2283
2284 for (; i < symcount; ++i)
2285 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2286 | SEC_THREAD_LOCAL))
2287 != (SEC_CODE | SEC_ALLOC))
2288 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2289 break;
2290 codesecsymend = i;
2291
2292 for (; i < symcount; ++i)
2293 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2294 break;
2295 secsymend = i;
2296
2297 for (; i < symcount; ++i)
2298 if (strcmp (syms[i]->section->name, ".opd") != 0)
2299 break;
2300 opdsymend = i;
2301
2302 for (; i < symcount; ++i)
2303 if (((syms[i]->section->flags
2304 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
2305 != (SEC_CODE | SEC_ALLOC))
2306 break;
2307 symcount = i;
2308 }
2309 count = 0;
2310
2311 if (relocatable)
2312 {
2313 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2314 arelent *r;
2315 size_t size;
2316 size_t relcount;
2317
2318 if (opdsymend == secsymend)
2319 goto done;
2320
2321 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2322 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2323 if (relcount == 0)
2324 goto done;
2325
2326 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2327 {
2328 count = -1;
2329 goto done;
2330 }
2331
2332 size = 0;
2333 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2334 {
2335 asymbol *sym;
2336
2337 while (r < opd->relocation + relcount
2338 && r->address < syms[i]->value + opd->vma)
2339 ++r;
2340
2341 if (r == opd->relocation + relcount)
2342 break;
2343
2344 if (r->address != syms[i]->value + opd->vma)
2345 continue;
2346
2347 if (r->howto->type != R_PPC64_ADDR64)
2348 continue;
2349
2350 sym = *r->sym_ptr_ptr;
2351 if (!sym_exists_at (syms, opdsymend, symcount,
2352 sym->section->id, sym->value + r->addend))
2353 {
2354 ++count;
2355 size += sizeof (asymbol);
2356 size += strlen (syms[i]->name) + 2;
2357 }
2358 }
2359
2360 if (size == 0)
2361 goto done;
2362 s = *ret = bfd_malloc (size);
2363 if (s == NULL)
2364 {
2365 count = -1;
2366 goto done;
2367 }
2368
2369 names = (char *) (s + count);
2370
2371 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2372 {
2373 asymbol *sym;
2374
2375 while (r < opd->relocation + relcount
2376 && r->address < syms[i]->value + opd->vma)
2377 ++r;
2378
2379 if (r == opd->relocation + relcount)
2380 break;
2381
2382 if (r->address != syms[i]->value + opd->vma)
2383 continue;
2384
2385 if (r->howto->type != R_PPC64_ADDR64)
2386 continue;
2387
2388 sym = *r->sym_ptr_ptr;
2389 if (!sym_exists_at (syms, opdsymend, symcount,
2390 sym->section->id, sym->value + r->addend))
2391 {
2392 size_t len;
2393
2394 *s = *syms[i];
2395 s->flags |= BSF_SYNTHETIC;
2396 s->section = sym->section;
2397 s->value = sym->value + r->addend;
2398 s->name = names;
2399 *names++ = '.';
2400 len = strlen (syms[i]->name);
2401 memcpy (names, syms[i]->name, len + 1);
2402 names += len + 1;
2403 /* Have udata.p point back to the original symbol this
2404 synthetic symbol was derived from. */
2405 s->udata.p = syms[i];
2406 s++;
2407 }
2408 }
2409 }
2410 else
2411 {
2412 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2413 bfd_byte *contents = NULL;
2414 size_t size;
2415 size_t plt_count = 0;
2416 bfd_vma glink_vma = 0, resolv_vma = 0;
2417 asection *dynamic, *glink = NULL, *relplt = NULL;
2418 arelent *p;
2419
2420 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
2421 {
2422 free_contents_and_exit_err:
2423 count = -1;
2424 free_contents_and_exit:
2425 free (contents);
2426 goto done;
2427 }
2428
2429 size = 0;
2430 for (i = secsymend; i < opdsymend; ++i)
2431 {
2432 bfd_vma ent;
2433
2434 /* Ignore bogus symbols. */
2435 if (syms[i]->value > opd->size - 8)
2436 continue;
2437
2438 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2439 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2440 {
2441 ++count;
2442 size += sizeof (asymbol);
2443 size += strlen (syms[i]->name) + 2;
2444 }
2445 }
2446
2447 /* Get start of .glink stubs from DT_PPC64_GLINK. */
2448 if (dyn_count != 0
2449 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
2450 {
2451 bfd_byte *dynbuf, *extdyn, *extdynend;
2452 size_t extdynsize;
2453 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2454
2455 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2456 goto free_contents_and_exit_err;
2457
2458 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2459 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2460
2461 extdyn = dynbuf;
2462 extdynend = extdyn + dynamic->size;
2463 for (; extdyn < extdynend; extdyn += extdynsize)
2464 {
2465 Elf_Internal_Dyn dyn;
2466 (*swap_dyn_in) (abfd, extdyn, &dyn);
2467
2468 if (dyn.d_tag == DT_NULL)
2469 break;
2470
2471 if (dyn.d_tag == DT_PPC64_GLINK)
2472 {
2473 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2474 See comment in ppc64_elf_finish_dynamic_sections. */
2475 glink_vma = dyn.d_un.d_val + 8 * 4;
2476 /* The .glink section usually does not survive the final
2477 link; search for the section (usually .text) where the
2478 glink stubs now reside. */
2479 glink = bfd_sections_find_if (abfd, section_covers_vma,
2480 &glink_vma);
2481 break;
2482 }
2483 }
2484
2485 free (dynbuf);
2486 }
2487
2488 if (glink != NULL)
2489 {
2490 /* Determine __glink trampoline by reading the relative branch
2491 from the first glink stub. */
2492 bfd_byte buf[4];
2493 unsigned int off = 0;
2494
2495 while (bfd_get_section_contents (abfd, glink, buf,
2496 glink_vma + off - glink->vma, 4))
2497 {
2498 unsigned int insn = bfd_get_32 (abfd, buf);
2499 insn ^= B_DOT;
2500 if ((insn & ~0x3fffffc) == 0)
2501 {
2502 resolv_vma
2503 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
2504 break;
2505 }
2506 off += 4;
2507 if (off > 4)
2508 break;
2509 }
2510
2511 if (resolv_vma)
2512 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2513
2514 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2515 if (relplt != NULL)
2516 {
2517 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2518 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
2519 goto free_contents_and_exit_err;
2520
2521 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2522 size += plt_count * sizeof (asymbol);
2523
2524 p = relplt->relocation;
2525 for (i = 0; i < plt_count; i++, p++)
2526 {
2527 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2528 if (p->addend != 0)
2529 size += sizeof ("+0x") - 1 + 16;
2530 }
2531 }
2532 }
2533
2534 if (size == 0)
2535 goto free_contents_and_exit;
2536 s = *ret = bfd_malloc (size);
2537 if (s == NULL)
2538 goto free_contents_and_exit_err;
2539
2540 names = (char *) (s + count + plt_count + (resolv_vma != 0));
2541
2542 for (i = secsymend; i < opdsymend; ++i)
2543 {
2544 bfd_vma ent;
2545
2546 if (syms[i]->value > opd->size - 8)
2547 continue;
2548
2549 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2550 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2551 {
2552 size_t lo, hi;
2553 size_t len;
2554 asection *sec = abfd->sections;
2555
2556 *s = *syms[i];
2557 lo = codesecsym;
2558 hi = codesecsymend;
2559 while (lo < hi)
2560 {
2561 size_t mid = (lo + hi) >> 1;
2562 if (syms[mid]->section->vma < ent)
2563 lo = mid + 1;
2564 else if (syms[mid]->section->vma > ent)
2565 hi = mid;
2566 else
2567 {
2568 sec = syms[mid]->section;
2569 break;
2570 }
2571 }
2572
2573 if (lo >= hi && lo > codesecsym)
2574 sec = syms[lo - 1]->section;
2575
2576 for (; sec != NULL; sec = sec->next)
2577 {
2578 if (sec->vma > ent)
2579 break;
2580 /* SEC_LOAD may not be set if SEC is from a separate debug
2581 info file. */
2582 if ((sec->flags & SEC_ALLOC) == 0)
2583 break;
2584 if ((sec->flags & SEC_CODE) != 0)
2585 s->section = sec;
2586 }
2587 s->flags |= BSF_SYNTHETIC;
2588 s->value = ent - s->section->vma;
2589 s->name = names;
2590 *names++ = '.';
2591 len = strlen (syms[i]->name);
2592 memcpy (names, syms[i]->name, len + 1);
2593 names += len + 1;
2594 /* Have udata.p point back to the original symbol this
2595 synthetic symbol was derived from. */
2596 s->udata.p = syms[i];
2597 s++;
2598 }
2599 }
2600 free (contents);
2601
2602 if (glink != NULL && relplt != NULL)
2603 {
2604 if (resolv_vma)
2605 {
2606 /* Add a symbol for the main glink trampoline. */
2607 memset (s, 0, sizeof *s);
2608 s->the_bfd = abfd;
2609 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2610 s->section = glink;
2611 s->value = resolv_vma - glink->vma;
2612 s->name = names;
2613 memcpy (names, "__glink_PLTresolve",
2614 sizeof ("__glink_PLTresolve"));
2615 names += sizeof ("__glink_PLTresolve");
2616 s++;
2617 count++;
2618 }
2619
2620 /* FIXME: It would be very much nicer to put sym@plt on the
2621 stub rather than on the glink branch table entry. The
2622 objdump disassembler would then use a sensible symbol
2623 name on plt calls. The difficulty in doing so is
2624 a) finding the stubs, and,
2625 b) matching stubs against plt entries, and,
2626 c) there can be multiple stubs for a given plt entry.
2627
2628 Solving (a) could be done by code scanning, but older
2629 ppc64 binaries used different stubs to current code.
2630 (b) is the tricky one since you need to known the toc
2631 pointer for at least one function that uses a pic stub to
2632 be able to calculate the plt address referenced.
2633 (c) means gdb would need to set multiple breakpoints (or
2634 find the glink branch itself) when setting breakpoints
2635 for pending shared library loads. */
2636 p = relplt->relocation;
2637 for (i = 0; i < plt_count; i++, p++)
2638 {
2639 size_t len;
2640
2641 *s = **p->sym_ptr_ptr;
2642 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2643 we are defining a symbol, ensure one of them is set. */
2644 if ((s->flags & BSF_LOCAL) == 0)
2645 s->flags |= BSF_GLOBAL;
2646 s->flags |= BSF_SYNTHETIC;
2647 s->section = glink;
2648 s->value = glink_vma - glink->vma;
2649 s->name = names;
2650 s->udata.p = NULL;
2651 len = strlen ((*p->sym_ptr_ptr)->name);
2652 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2653 names += len;
2654 if (p->addend != 0)
2655 {
2656 memcpy (names, "+0x", sizeof ("+0x") - 1);
2657 names += sizeof ("+0x") - 1;
2658 bfd_sprintf_vma (abfd, names, p->addend);
2659 names += strlen (names);
2660 }
2661 memcpy (names, "@plt", sizeof ("@plt"));
2662 names += sizeof ("@plt");
2663 s++;
2664 if (abi < 2)
2665 {
2666 glink_vma += 8;
2667 if (i >= 0x8000)
2668 glink_vma += 4;
2669 }
2670 else
2671 glink_vma += 4;
2672 }
2673 count += plt_count;
2674 }
2675 }
2676
2677 done:
2678 free (syms);
2679 return count;
2680 }
2681 \f
2682 /* The following functions are specific to the ELF linker, while
2683 functions above are used generally. Those named ppc64_elf_* are
2684 called by the main ELF linker code. They appear in this file more
2685 or less in the order in which they are called. eg.
2686 ppc64_elf_check_relocs is called early in the link process,
2687 ppc64_elf_finish_dynamic_sections is one of the last functions
2688 called.
2689
2690 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2691 functions have both a function code symbol and a function descriptor
2692 symbol. A call to foo in a relocatable object file looks like:
2693
2694 . .text
2695 . x:
2696 . bl .foo
2697 . nop
2698
2699 The function definition in another object file might be:
2700
2701 . .section .opd
2702 . foo: .quad .foo
2703 . .quad .TOC.@tocbase
2704 . .quad 0
2705 .
2706 . .text
2707 . .foo: blr
2708
2709 When the linker resolves the call during a static link, the branch
2710 unsurprisingly just goes to .foo and the .opd information is unused.
2711 If the function definition is in a shared library, things are a little
2712 different: The call goes via a plt call stub, the opd information gets
2713 copied to the plt, and the linker patches the nop.
2714
2715 . x:
2716 . bl .foo_stub
2717 . ld 2,40(1)
2718 .
2719 .
2720 . .foo_stub:
2721 . std 2,40(1) # in practice, the call stub
2722 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2723 . addi 11,11,Lfoo@toc@l # this is the general idea
2724 . ld 12,0(11)
2725 . ld 2,8(11)
2726 . mtctr 12
2727 . ld 11,16(11)
2728 . bctr
2729 .
2730 . .section .plt
2731 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2732
2733 The "reloc ()" notation is supposed to indicate that the linker emits
2734 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2735 copying.
2736
2737 What are the difficulties here? Well, firstly, the relocations
2738 examined by the linker in check_relocs are against the function code
2739 sym .foo, while the dynamic relocation in the plt is emitted against
2740 the function descriptor symbol, foo. Somewhere along the line, we need
2741 to carefully copy dynamic link information from one symbol to the other.
2742 Secondly, the generic part of the elf linker will make .foo a dynamic
2743 symbol as is normal for most other backends. We need foo dynamic
2744 instead, at least for an application final link. However, when
2745 creating a shared library containing foo, we need to have both symbols
2746 dynamic so that references to .foo are satisfied during the early
2747 stages of linking. Otherwise the linker might decide to pull in a
2748 definition from some other object, eg. a static library.
2749
2750 Update: As of August 2004, we support a new convention. Function
2751 calls may use the function descriptor symbol, ie. "bl foo". This
2752 behaves exactly as "bl .foo". */
2753
2754 /* Of those relocs that might be copied as dynamic relocs, this
2755 function selects those that must be copied when linking a shared
2756 library or PIE, even when the symbol is local. */
2757
2758 static int
2759 must_be_dyn_reloc (struct bfd_link_info *info,
2760 enum elf_ppc64_reloc_type r_type)
2761 {
2762 switch (r_type)
2763 {
2764 default:
2765 /* Only relative relocs can be resolved when the object load
2766 address isn't fixed. DTPREL64 is excluded because the
2767 dynamic linker needs to differentiate global dynamic from
2768 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
2769 return 1;
2770
2771 case R_PPC64_REL32:
2772 case R_PPC64_REL64:
2773 case R_PPC64_REL30:
2774 case R_PPC64_TOC16:
2775 case R_PPC64_TOC16_DS:
2776 case R_PPC64_TOC16_LO:
2777 case R_PPC64_TOC16_HI:
2778 case R_PPC64_TOC16_HA:
2779 case R_PPC64_TOC16_LO_DS:
2780 return 0;
2781
2782 case R_PPC64_TPREL16:
2783 case R_PPC64_TPREL16_LO:
2784 case R_PPC64_TPREL16_HI:
2785 case R_PPC64_TPREL16_HA:
2786 case R_PPC64_TPREL16_DS:
2787 case R_PPC64_TPREL16_LO_DS:
2788 case R_PPC64_TPREL16_HIGH:
2789 case R_PPC64_TPREL16_HIGHA:
2790 case R_PPC64_TPREL16_HIGHER:
2791 case R_PPC64_TPREL16_HIGHERA:
2792 case R_PPC64_TPREL16_HIGHEST:
2793 case R_PPC64_TPREL16_HIGHESTA:
2794 case R_PPC64_TPREL64:
2795 case R_PPC64_TPREL34:
2796 /* These relocations are relative but in a shared library the
2797 linker doesn't know the thread pointer base. */
2798 return bfd_link_dll (info);
2799 }
2800 }
2801
2802 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2803 copying dynamic variables from a shared lib into an app's .dynbss
2804 section, and instead use a dynamic relocation to point into the
2805 shared lib. With code that gcc generates it is vital that this be
2806 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2807 actually the address of a function descriptor which resides in the
2808 .opd section. gcc uses the descriptor directly rather than going
2809 via the GOT as some other ABIs do, which means that initialized
2810 function pointers reference the descriptor. Thus, a function
2811 pointer initialized to the address of a function in a shared
2812 library will either require a .dynbss copy and a copy reloc, or a
2813 dynamic reloc. Using a .dynbss copy redefines the function
2814 descriptor symbol to point to the copy. This presents a problem as
2815 a PLT entry for that function is also initialized from the function
2816 descriptor symbol and the copy may not be initialized first. */
2817 #define ELIMINATE_COPY_RELOCS 1
2818
2819 /* Section name for stubs is the associated section name plus this
2820 string. */
2821 #define STUB_SUFFIX ".stub"
2822
2823 /* Linker stubs.
2824 ppc_stub_long_branch:
2825 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2826 destination, but a 24 bit branch in a stub section will reach.
2827 . b dest
2828
2829 ppc_stub_plt_branch:
2830 Similar to the above, but a 24 bit branch in the stub section won't
2831 reach its destination.
2832 . addis %r12,%r2,xxx@toc@ha
2833 . ld %r12,xxx@toc@l(%r12)
2834 . mtctr %r12
2835 . bctr
2836
2837 ppc_stub_plt_call:
2838 Used to call a function in a shared library. If it so happens that
2839 the plt entry referenced crosses a 64k boundary, then an extra
2840 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
2841 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
2842 . addis %r11,%r2,xxx@toc@ha
2843 . ld %r12,xxx+0@toc@l(%r11)
2844 . mtctr %r12
2845 . ld %r2,xxx+8@toc@l(%r11)
2846 . ld %r11,xxx+16@toc@l(%r11)
2847 . bctr
2848
2849 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2850 code to adjust the value and save r2 to support multiple toc sections.
2851 A ppc_stub_long_branch with an r2 offset looks like:
2852 . std %r2,40(%r1)
2853 . addis %r2,%r2,off@ha
2854 . addi %r2,%r2,off@l
2855 . b dest
2856
2857 A ppc_stub_plt_branch with an r2 offset looks like:
2858 . std %r2,40(%r1)
2859 . addis %r12,%r2,xxx@toc@ha
2860 . ld %r12,xxx@toc@l(%r12)
2861 . addis %r2,%r2,off@ha
2862 . addi %r2,%r2,off@l
2863 . mtctr %r12
2864 . bctr
2865
2866 All of the above stubs are shown as their ELFv1 variants. ELFv2
2867 variants exist too, simpler for plt calls since a new toc pointer
2868 and static chain are not loaded by the stub. In addition, ELFv2
2869 has some more complex stubs to handle calls marked with NOTOC
2870 relocs from functions where r2 is not a valid toc pointer. These
2871 come in two flavours, the ones shown below, and _both variants that
2872 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2873 one call is from a function where r2 is used as the toc pointer but
2874 needs a toc adjusting stub for small-model multi-toc, and another
2875 call is from a function where r2 is not valid.
2876 ppc_stub_long_branch_notoc:
2877 . mflr %r12
2878 . bcl 20,31,1f
2879 . 1:
2880 . mflr %r11
2881 . mtlr %r12
2882 . addis %r12,%r11,dest-1b@ha
2883 . addi %r12,%r12,dest-1b@l
2884 . b dest
2885
2886 ppc_stub_plt_branch_notoc:
2887 . mflr %r12
2888 . bcl 20,31,1f
2889 . 1:
2890 . mflr %r11
2891 . mtlr %r12
2892 . lis %r12,xxx-1b@highest
2893 . ori %r12,%r12,xxx-1b@higher
2894 . sldi %r12,%r12,32
2895 . oris %r12,%r12,xxx-1b@high
2896 . ori %r12,%r12,xxx-1b@l
2897 . add %r12,%r11,%r12
2898 . mtctr %r12
2899 . bctr
2900
2901 ppc_stub_plt_call_notoc:
2902 . mflr %r12
2903 . bcl 20,31,1f
2904 . 1:
2905 . mflr %r11
2906 . mtlr %r12
2907 . lis %r12,xxx-1b@highest
2908 . ori %r12,%r12,xxx-1b@higher
2909 . sldi %r12,%r12,32
2910 . oris %r12,%r12,xxx-1b@high
2911 . ori %r12,%r12,xxx-1b@l
2912 . ldx %r12,%r11,%r12
2913 . mtctr %r12
2914 . bctr
2915
2916 There are also ELFv1 power10 variants of these stubs.
2917 ppc_stub_long_branch_notoc:
2918 . pla %r12,dest@pcrel
2919 . b dest
2920 ppc_stub_plt_branch_notoc:
2921 . lis %r11,(dest-1f)@highesta34
2922 . ori %r11,%r11,(dest-1f)@highera34
2923 . sldi %r11,%r11,34
2924 . 1: pla %r12,dest@pcrel
2925 . add %r12,%r11,%r12
2926 . mtctr %r12
2927 . bctr
2928 ppc_stub_plt_call_notoc:
2929 . lis %r11,(xxx-1f)@highesta34
2930 . ori %r11,%r11,(xxx-1f)@highera34
2931 . sldi %r11,%r11,34
2932 . 1: pla %r12,xxx@pcrel
2933 . ldx %r12,%r11,%r12
2934 . mtctr %r12
2935 . bctr
2936
2937 In cases where the high instructions would add zero, they are
2938 omitted and following instructions modified in some cases.
2939 For example, a power10 ppc_stub_plt_call_notoc might simplify down
2940 to
2941 . pld %r12,xxx@pcrel
2942 . mtctr %r12
2943 . bctr
2944
2945 For a given stub group (a set of sections all using the same toc
2946 pointer value) there will be just one stub type used for any
2947 particular function symbol. For example, if printf is called from
2948 code with the tocsave optimization (ie. r2 saved in function
2949 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2950 and from other code without the tocsave optimization requiring a
2951 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2952 type will be created. Calls with the tocsave optimization will
2953 enter this stub after the instruction saving r2. A similar
2954 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2955 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2956 to call an external function like printf. If other calls to printf
2957 require a ppc_stub_plt_call linkage stub then a single
2958 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2959 call. If other calls to printf require a ppc_stub_plt_call_r2save
2960 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2961 be created and calls not requiring r2 to be saved will enter the
2962 stub after the r2 save instruction. There is an analogous
2963 hierarchy of long branch and plt branch stubs for local call
2964 linkage. */
2965
2966 enum ppc_stub_type
2967 {
2968 ppc_stub_none,
2969 ppc_stub_long_branch,
2970 ppc_stub_long_branch_r2off,
2971 ppc_stub_long_branch_notoc,
2972 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
2973 ppc_stub_plt_branch,
2974 ppc_stub_plt_branch_r2off,
2975 ppc_stub_plt_branch_notoc,
2976 ppc_stub_plt_branch_both,
2977 ppc_stub_plt_call,
2978 ppc_stub_plt_call_r2save,
2979 ppc_stub_plt_call_notoc,
2980 ppc_stub_plt_call_both,
2981 ppc_stub_global_entry,
2982 ppc_stub_save_res
2983 };
2984
2985 /* Information on stub grouping. */
2986 struct map_stub
2987 {
2988 /* The stub section. */
2989 asection *stub_sec;
2990 /* This is the section to which stubs in the group will be attached. */
2991 asection *link_sec;
2992 /* Next group. */
2993 struct map_stub *next;
2994 /* Whether to emit a copy of register save/restore functions in this
2995 group. */
2996 int needs_save_res;
2997 /* Current offset within stubs after the insn restoring lr in a
2998 _notoc or _both stub using bcl for pc-relative addressing, or
2999 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3000 unsigned int lr_restore;
3001 /* Accumulated size of EH info emitted to describe return address
3002 if stubs modify lr. Does not include 17 byte FDE header. */
3003 unsigned int eh_size;
3004 /* Offset in glink_eh_frame to the start of EH info for this group. */
3005 unsigned int eh_base;
3006 };
3007
3008 struct ppc_stub_hash_entry
3009 {
3010 /* Base hash table entry structure. */
3011 struct bfd_hash_entry root;
3012
3013 enum ppc_stub_type stub_type;
3014
3015 /* Group information. */
3016 struct map_stub *group;
3017
3018 /* Offset within stub_sec of the beginning of this stub. */
3019 bfd_vma stub_offset;
3020
3021 /* Given the symbol's value and its section we can determine its final
3022 value when building the stubs (so the stub knows where to jump. */
3023 bfd_vma target_value;
3024 asection *target_section;
3025
3026 /* The symbol table entry, if any, that this was derived from. */
3027 struct ppc_link_hash_entry *h;
3028 struct plt_entry *plt_ent;
3029
3030 /* Symbol type. */
3031 unsigned char symtype;
3032
3033 /* Symbol st_other. */
3034 unsigned char other;
3035 };
3036
3037 struct ppc_branch_hash_entry
3038 {
3039 /* Base hash table entry structure. */
3040 struct bfd_hash_entry root;
3041
3042 /* Offset within branch lookup table. */
3043 unsigned int offset;
3044
3045 /* Generation marker. */
3046 unsigned int iter;
3047 };
3048
3049 /* Used to track dynamic relocations for local symbols. */
3050 struct ppc_dyn_relocs
3051 {
3052 struct ppc_dyn_relocs *next;
3053
3054 /* The input section of the reloc. */
3055 asection *sec;
3056
3057 /* Total number of relocs copied for the input section. */
3058 unsigned int count : 31;
3059
3060 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3061 unsigned int ifunc : 1;
3062 };
3063
3064 struct ppc_link_hash_entry
3065 {
3066 struct elf_link_hash_entry elf;
3067
3068 union
3069 {
3070 /* A pointer to the most recently used stub hash entry against this
3071 symbol. */
3072 struct ppc_stub_hash_entry *stub_cache;
3073
3074 /* A pointer to the next symbol starting with a '.' */
3075 struct ppc_link_hash_entry *next_dot_sym;
3076 } u;
3077
3078 /* Link between function code and descriptor symbols. */
3079 struct ppc_link_hash_entry *oh;
3080
3081 /* Flag function code and descriptor symbols. */
3082 unsigned int is_func:1;
3083 unsigned int is_func_descriptor:1;
3084 unsigned int fake:1;
3085
3086 /* Whether global opd/toc sym has been adjusted or not.
3087 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3088 should be set for all globals defined in any opd/toc section. */
3089 unsigned int adjust_done:1;
3090
3091 /* Set if this is an out-of-line register save/restore function,
3092 with non-standard calling convention. */
3093 unsigned int save_res:1;
3094
3095 /* Set if a duplicate symbol with non-zero localentry is detected,
3096 even when the duplicate symbol does not provide a definition. */
3097 unsigned int non_zero_localentry:1;
3098
3099 /* Contexts in which symbol is used in the GOT (or TOC).
3100 Bits are or'd into the mask as the corresponding relocs are
3101 encountered during check_relocs, with TLS_TLS being set when any
3102 of the other TLS bits are set. tls_optimize clears bits when
3103 optimizing to indicate the corresponding GOT entry type is not
3104 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3105 set TLS_GDIE when a GD reloc turns into an IE one.
3106 These flags are also kept for local symbols. */
3107 #define TLS_TLS 1 /* Any TLS reloc. */
3108 #define TLS_GD 2 /* GD reloc. */
3109 #define TLS_LD 4 /* LD reloc. */
3110 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3111 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3112 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3113 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
3114 #define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
3115 unsigned char tls_mask;
3116
3117 /* The above field is also used to mark function symbols. In which
3118 case TLS_TLS will be 0. */
3119 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3120 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3121 #define NON_GOT 256 /* local symbol plt, not stored. */
3122 };
3123
3124 static inline struct ppc_link_hash_entry *
3125 ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3126 {
3127 return (struct ppc_link_hash_entry *) ent;
3128 }
3129
3130 /* ppc64 ELF linker hash table. */
3131
3132 struct ppc_link_hash_table
3133 {
3134 struct elf_link_hash_table elf;
3135
3136 /* The stub hash table. */
3137 struct bfd_hash_table stub_hash_table;
3138
3139 /* Another hash table for plt_branch stubs. */
3140 struct bfd_hash_table branch_hash_table;
3141
3142 /* Hash table for function prologue tocsave. */
3143 htab_t tocsave_htab;
3144
3145 /* Various options and other info passed from the linker. */
3146 struct ppc64_elf_params *params;
3147
3148 /* The size of sec_info below. */
3149 unsigned int sec_info_arr_size;
3150
3151 /* Per-section array of extra section info. Done this way rather
3152 than as part of ppc64_elf_section_data so we have the info for
3153 non-ppc64 sections. */
3154 struct
3155 {
3156 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3157 bfd_vma toc_off;
3158
3159 union
3160 {
3161 /* The section group that this section belongs to. */
3162 struct map_stub *group;
3163 /* A temp section list pointer. */
3164 asection *list;
3165 } u;
3166 } *sec_info;
3167
3168 /* Linked list of groups. */
3169 struct map_stub *group;
3170
3171 /* Temp used when calculating TOC pointers. */
3172 bfd_vma toc_curr;
3173 bfd *toc_bfd;
3174 asection *toc_first_sec;
3175
3176 /* Used when adding symbols. */
3177 struct ppc_link_hash_entry *dot_syms;
3178
3179 /* Shortcuts to get to dynamic linker sections. */
3180 asection *glink;
3181 asection *global_entry;
3182 asection *sfpr;
3183 asection *pltlocal;
3184 asection *relpltlocal;
3185 asection *brlt;
3186 asection *relbrlt;
3187 asection *glink_eh_frame;
3188
3189 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3190 struct ppc_link_hash_entry *tls_get_addr;
3191 struct ppc_link_hash_entry *tls_get_addr_fd;
3192 struct ppc_link_hash_entry *tga_desc;
3193 struct ppc_link_hash_entry *tga_desc_fd;
3194 struct map_stub *tga_group;
3195
3196 /* The size of reliplt used by got entry relocs. */
3197 bfd_size_type got_reli_size;
3198
3199 /* Statistics. */
3200 unsigned long stub_count[ppc_stub_global_entry];
3201
3202 /* Number of stubs against global syms. */
3203 unsigned long stub_globals;
3204
3205 /* Set if we're linking code with function descriptors. */
3206 unsigned int opd_abi:1;
3207
3208 /* Support for multiple toc sections. */
3209 unsigned int do_multi_toc:1;
3210 unsigned int multi_toc_needed:1;
3211 unsigned int second_toc_pass:1;
3212 unsigned int do_toc_opt:1;
3213
3214 /* Set if tls optimization is enabled. */
3215 unsigned int do_tls_opt:1;
3216
3217 /* Set if inline plt calls should be converted to direct calls. */
3218 unsigned int can_convert_all_inline_plt:1;
3219
3220 /* Set on error. */
3221 unsigned int stub_error:1;
3222
3223 /* Whether func_desc_adjust needs to be run over symbols. */
3224 unsigned int need_func_desc_adj:1;
3225
3226 /* Whether there exist local gnu indirect function resolvers,
3227 referenced by dynamic relocations. */
3228 unsigned int local_ifunc_resolver:1;
3229 unsigned int maybe_local_ifunc_resolver:1;
3230
3231 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3232 unsigned int has_plt_localentry0:1;
3233
3234 /* Whether calls are made via the PLT from NOTOC functions. */
3235 unsigned int notoc_plt:1;
3236
3237 /* Whether to use power10 instructions in linkage stubs. */
3238 unsigned int power10_stubs:1;
3239
3240 /* Incremented every time we size stubs. */
3241 unsigned int stub_iteration;
3242
3243 /* Small local sym cache. */
3244 struct sym_cache sym_cache;
3245 };
3246
3247 /* Rename some of the generic section flags to better document how they
3248 are used here. */
3249
3250 /* Nonzero if this section has TLS related relocations. */
3251 #define has_tls_reloc sec_flg0
3252
3253 /* Nonzero if this section has a call to __tls_get_addr lacking marker
3254 relocations. */
3255 #define nomark_tls_get_addr sec_flg1
3256
3257 /* Nonzero if this section has any toc or got relocs. */
3258 #define has_toc_reloc sec_flg2
3259
3260 /* Nonzero if this section has a call to another section that uses
3261 the toc or got. */
3262 #define makes_toc_func_call sec_flg3
3263
3264 /* Recursion protection when determining above flag. */
3265 #define call_check_in_progress sec_flg4
3266 #define call_check_done sec_flg5
3267
3268 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3269
3270 #define ppc_hash_table(p) \
3271 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3272 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
3273
3274 #define ppc_stub_hash_lookup(table, string, create, copy) \
3275 ((struct ppc_stub_hash_entry *) \
3276 bfd_hash_lookup ((table), (string), (create), (copy)))
3277
3278 #define ppc_branch_hash_lookup(table, string, create, copy) \
3279 ((struct ppc_branch_hash_entry *) \
3280 bfd_hash_lookup ((table), (string), (create), (copy)))
3281
3282 /* Create an entry in the stub hash table. */
3283
3284 static struct bfd_hash_entry *
3285 stub_hash_newfunc (struct bfd_hash_entry *entry,
3286 struct bfd_hash_table *table,
3287 const char *string)
3288 {
3289 /* Allocate the structure if it has not already been allocated by a
3290 subclass. */
3291 if (entry == NULL)
3292 {
3293 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3294 if (entry == NULL)
3295 return entry;
3296 }
3297
3298 /* Call the allocation method of the superclass. */
3299 entry = bfd_hash_newfunc (entry, table, string);
3300 if (entry != NULL)
3301 {
3302 struct ppc_stub_hash_entry *eh;
3303
3304 /* Initialize the local fields. */
3305 eh = (struct ppc_stub_hash_entry *) entry;
3306 eh->stub_type = ppc_stub_none;
3307 eh->group = NULL;
3308 eh->stub_offset = 0;
3309 eh->target_value = 0;
3310 eh->target_section = NULL;
3311 eh->h = NULL;
3312 eh->plt_ent = NULL;
3313 eh->other = 0;
3314 }
3315
3316 return entry;
3317 }
3318
3319 /* Create an entry in the branch hash table. */
3320
3321 static struct bfd_hash_entry *
3322 branch_hash_newfunc (struct bfd_hash_entry *entry,
3323 struct bfd_hash_table *table,
3324 const char *string)
3325 {
3326 /* Allocate the structure if it has not already been allocated by a
3327 subclass. */
3328 if (entry == NULL)
3329 {
3330 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3331 if (entry == NULL)
3332 return entry;
3333 }
3334
3335 /* Call the allocation method of the superclass. */
3336 entry = bfd_hash_newfunc (entry, table, string);
3337 if (entry != NULL)
3338 {
3339 struct ppc_branch_hash_entry *eh;
3340
3341 /* Initialize the local fields. */
3342 eh = (struct ppc_branch_hash_entry *) entry;
3343 eh->offset = 0;
3344 eh->iter = 0;
3345 }
3346
3347 return entry;
3348 }
3349
3350 /* Create an entry in a ppc64 ELF linker hash table. */
3351
3352 static struct bfd_hash_entry *
3353 link_hash_newfunc (struct bfd_hash_entry *entry,
3354 struct bfd_hash_table *table,
3355 const char *string)
3356 {
3357 /* Allocate the structure if it has not already been allocated by a
3358 subclass. */
3359 if (entry == NULL)
3360 {
3361 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3362 if (entry == NULL)
3363 return entry;
3364 }
3365
3366 /* Call the allocation method of the superclass. */
3367 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3368 if (entry != NULL)
3369 {
3370 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3371
3372 memset (&eh->u.stub_cache, 0,
3373 (sizeof (struct ppc_link_hash_entry)
3374 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3375
3376 /* When making function calls, old ABI code references function entry
3377 points (dot symbols), while new ABI code references the function
3378 descriptor symbol. We need to make any combination of reference and
3379 definition work together, without breaking archive linking.
3380
3381 For a defined function "foo" and an undefined call to "bar":
3382 An old object defines "foo" and ".foo", references ".bar" (possibly
3383 "bar" too).
3384 A new object defines "foo" and references "bar".
3385
3386 A new object thus has no problem with its undefined symbols being
3387 satisfied by definitions in an old object. On the other hand, the
3388 old object won't have ".bar" satisfied by a new object.
3389
3390 Keep a list of newly added dot-symbols. */
3391
3392 if (string[0] == '.')
3393 {
3394 struct ppc_link_hash_table *htab;
3395
3396 htab = (struct ppc_link_hash_table *) table;
3397 eh->u.next_dot_sym = htab->dot_syms;
3398 htab->dot_syms = eh;
3399 }
3400 }
3401
3402 return entry;
3403 }
3404
3405 struct tocsave_entry
3406 {
3407 asection *sec;
3408 bfd_vma offset;
3409 };
3410
3411 static hashval_t
3412 tocsave_htab_hash (const void *p)
3413 {
3414 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
3415 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3416 }
3417
3418 static int
3419 tocsave_htab_eq (const void *p1, const void *p2)
3420 {
3421 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3422 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3423 return e1->sec == e2->sec && e1->offset == e2->offset;
3424 }
3425
3426 /* Destroy a ppc64 ELF linker hash table. */
3427
3428 static void
3429 ppc64_elf_link_hash_table_free (bfd *obfd)
3430 {
3431 struct ppc_link_hash_table *htab;
3432
3433 htab = (struct ppc_link_hash_table *) obfd->link.hash;
3434 if (htab->tocsave_htab)
3435 htab_delete (htab->tocsave_htab);
3436 bfd_hash_table_free (&htab->branch_hash_table);
3437 bfd_hash_table_free (&htab->stub_hash_table);
3438 _bfd_elf_link_hash_table_free (obfd);
3439 }
3440
3441 /* Create a ppc64 ELF linker hash table. */
3442
3443 static struct bfd_link_hash_table *
3444 ppc64_elf_link_hash_table_create (bfd *abfd)
3445 {
3446 struct ppc_link_hash_table *htab;
3447 size_t amt = sizeof (struct ppc_link_hash_table);
3448
3449 htab = bfd_zmalloc (amt);
3450 if (htab == NULL)
3451 return NULL;
3452
3453 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3454 sizeof (struct ppc_link_hash_entry),
3455 PPC64_ELF_DATA))
3456 {
3457 free (htab);
3458 return NULL;
3459 }
3460
3461 /* Init the stub hash table too. */
3462 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3463 sizeof (struct ppc_stub_hash_entry)))
3464 {
3465 _bfd_elf_link_hash_table_free (abfd);
3466 return NULL;
3467 }
3468
3469 /* And the branch hash table. */
3470 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3471 sizeof (struct ppc_branch_hash_entry)))
3472 {
3473 bfd_hash_table_free (&htab->stub_hash_table);
3474 _bfd_elf_link_hash_table_free (abfd);
3475 return NULL;
3476 }
3477
3478 htab->tocsave_htab = htab_try_create (1024,
3479 tocsave_htab_hash,
3480 tocsave_htab_eq,
3481 NULL);
3482 if (htab->tocsave_htab == NULL)
3483 {
3484 ppc64_elf_link_hash_table_free (abfd);
3485 return NULL;
3486 }
3487 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3488
3489 /* Initializing two fields of the union is just cosmetic. We really
3490 only care about glist, but when compiled on a 32-bit host the
3491 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3492 debugger inspection of these fields look nicer. */
3493 htab->elf.init_got_refcount.refcount = 0;
3494 htab->elf.init_got_refcount.glist = NULL;
3495 htab->elf.init_plt_refcount.refcount = 0;
3496 htab->elf.init_plt_refcount.glist = NULL;
3497 htab->elf.init_got_offset.offset = 0;
3498 htab->elf.init_got_offset.glist = NULL;
3499 htab->elf.init_plt_offset.offset = 0;
3500 htab->elf.init_plt_offset.glist = NULL;
3501
3502 return &htab->elf.root;
3503 }
3504
3505 /* Create sections for linker generated code. */
3506
3507 static bfd_boolean
3508 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3509 {
3510 struct ppc_link_hash_table *htab;
3511 flagword flags;
3512
3513 htab = ppc_hash_table (info);
3514
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3516 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 if (htab->params->save_restore_funcs)
3518 {
3519 /* Create .sfpr for code to save and restore fp regs. */
3520 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3521 flags);
3522 if (htab->sfpr == NULL
3523 || !bfd_set_section_alignment (htab->sfpr, 2))
3524 return FALSE;
3525 }
3526
3527 if (bfd_link_relocatable (info))
3528 return TRUE;
3529
3530 /* Create .glink for lazy dynamic linking support. */
3531 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3532 flags);
3533 if (htab->glink == NULL
3534 || !bfd_set_section_alignment (htab->glink, 3))
3535 return FALSE;
3536
3537 /* The part of .glink used by global entry stubs, separate so that
3538 it can be aligned appropriately without affecting htab->glink. */
3539 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3540 flags);
3541 if (htab->global_entry == NULL
3542 || !bfd_set_section_alignment (htab->global_entry, 2))
3543 return FALSE;
3544
3545 if (!info->no_ld_generated_unwind_info)
3546 {
3547 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3548 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3549 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3550 ".eh_frame",
3551 flags);
3552 if (htab->glink_eh_frame == NULL
3553 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
3554 return FALSE;
3555 }
3556
3557 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3558 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3559 if (htab->elf.iplt == NULL
3560 || !bfd_set_section_alignment (htab->elf.iplt, 3))
3561 return FALSE;
3562
3563 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3564 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3565 htab->elf.irelplt
3566 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3567 if (htab->elf.irelplt == NULL
3568 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
3569 return FALSE;
3570
3571 /* Create branch lookup table for plt_branch stubs. */
3572 flags = (SEC_ALLOC | SEC_LOAD
3573 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3574 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3575 flags);
3576 if (htab->brlt == NULL
3577 || !bfd_set_section_alignment (htab->brlt, 3))
3578 return FALSE;
3579
3580 /* Local plt entries, put in .branch_lt but a separate section for
3581 convenience. */
3582 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3583 flags);
3584 if (htab->pltlocal == NULL
3585 || !bfd_set_section_alignment (htab->pltlocal, 3))
3586 return FALSE;
3587
3588 if (!bfd_link_pic (info))
3589 return TRUE;
3590
3591 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3592 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3593 htab->relbrlt
3594 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3595 if (htab->relbrlt == NULL
3596 || !bfd_set_section_alignment (htab->relbrlt, 3))
3597 return FALSE;
3598
3599 htab->relpltlocal
3600 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3601 if (htab->relpltlocal == NULL
3602 || !bfd_set_section_alignment (htab->relpltlocal, 3))
3603 return FALSE;
3604
3605 return TRUE;
3606 }
3607
3608 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3609
3610 bfd_boolean
3611 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3612 struct ppc64_elf_params *params)
3613 {
3614 struct ppc_link_hash_table *htab;
3615
3616 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
3617
3618 /* Always hook our dynamic sections into the first bfd, which is the
3619 linker created stub bfd. This ensures that the GOT header is at
3620 the start of the output TOC section. */
3621 htab = ppc_hash_table (info);
3622 htab->elf.dynobj = params->stub_bfd;
3623 htab->params = params;
3624
3625 return create_linkage_sections (htab->elf.dynobj, info);
3626 }
3627
3628 /* Build a name for an entry in the stub hash table. */
3629
3630 static char *
3631 ppc_stub_name (const asection *input_section,
3632 const asection *sym_sec,
3633 const struct ppc_link_hash_entry *h,
3634 const Elf_Internal_Rela *rel)
3635 {
3636 char *stub_name;
3637 ssize_t len;
3638
3639 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3640 offsets from a sym as a branch target? In fact, we could
3641 probably assume the addend is always zero. */
3642 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3643
3644 if (h)
3645 {
3646 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3647 stub_name = bfd_malloc (len);
3648 if (stub_name == NULL)
3649 return stub_name;
3650
3651 len = sprintf (stub_name, "%08x.%s+%x",
3652 input_section->id & 0xffffffff,
3653 h->elf.root.root.string,
3654 (int) rel->r_addend & 0xffffffff);
3655 }
3656 else
3657 {
3658 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3659 stub_name = bfd_malloc (len);
3660 if (stub_name == NULL)
3661 return stub_name;
3662
3663 len = sprintf (stub_name, "%08x.%x:%x+%x",
3664 input_section->id & 0xffffffff,
3665 sym_sec->id & 0xffffffff,
3666 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3667 (int) rel->r_addend & 0xffffffff);
3668 }
3669 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3670 stub_name[len - 2] = 0;
3671 return stub_name;
3672 }
3673
3674 /* Look up an entry in the stub hash. Stub entries are cached because
3675 creating the stub name takes a bit of time. */
3676
3677 static struct ppc_stub_hash_entry *
3678 ppc_get_stub_entry (const asection *input_section,
3679 const asection *sym_sec,
3680 struct ppc_link_hash_entry *h,
3681 const Elf_Internal_Rela *rel,
3682 struct ppc_link_hash_table *htab)
3683 {
3684 struct ppc_stub_hash_entry *stub_entry;
3685 struct map_stub *group;
3686
3687 /* If this input section is part of a group of sections sharing one
3688 stub section, then use the id of the first section in the group.
3689 Stub names need to include a section id, as there may well be
3690 more than one stub used to reach say, printf, and we need to
3691 distinguish between them. */
3692 group = htab->sec_info[input_section->id].u.group;
3693 if (group == NULL)
3694 return NULL;
3695
3696 if (h != NULL && h->u.stub_cache != NULL
3697 && h->u.stub_cache->h == h
3698 && h->u.stub_cache->group == group)
3699 {
3700 stub_entry = h->u.stub_cache;
3701 }
3702 else
3703 {
3704 char *stub_name;
3705
3706 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
3707 if (stub_name == NULL)
3708 return NULL;
3709
3710 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3711 stub_name, FALSE, FALSE);
3712 if (h != NULL)
3713 h->u.stub_cache = stub_entry;
3714
3715 free (stub_name);
3716 }
3717
3718 return stub_entry;
3719 }
3720
3721 /* Add a new stub entry to the stub hash. Not all fields of the new
3722 stub entry are initialised. */
3723
3724 static struct ppc_stub_hash_entry *
3725 ppc_add_stub (const char *stub_name,
3726 asection *section,
3727 struct bfd_link_info *info)
3728 {
3729 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3730 struct map_stub *group;
3731 asection *link_sec;
3732 asection *stub_sec;
3733 struct ppc_stub_hash_entry *stub_entry;
3734
3735 group = htab->sec_info[section->id].u.group;
3736 link_sec = group->link_sec;
3737 stub_sec = group->stub_sec;
3738 if (stub_sec == NULL)
3739 {
3740 size_t namelen;
3741 bfd_size_type len;
3742 char *s_name;
3743
3744 namelen = strlen (link_sec->name);
3745 len = namelen + sizeof (STUB_SUFFIX);
3746 s_name = bfd_alloc (htab->params->stub_bfd, len);
3747 if (s_name == NULL)
3748 return NULL;
3749
3750 memcpy (s_name, link_sec->name, namelen);
3751 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3752 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3753 if (stub_sec == NULL)
3754 return NULL;
3755 group->stub_sec = stub_sec;
3756 }
3757
3758 /* Enter this entry into the linker stub hash table. */
3759 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3760 TRUE, FALSE);
3761 if (stub_entry == NULL)
3762 {
3763 /* xgettext:c-format */
3764 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3765 section->owner, stub_name);
3766 return NULL;
3767 }
3768
3769 stub_entry->group = group;
3770 stub_entry->stub_offset = 0;
3771 return stub_entry;
3772 }
3773
3774 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3775 not already done. */
3776
3777 static bfd_boolean
3778 create_got_section (bfd *abfd, struct bfd_link_info *info)
3779 {
3780 asection *got, *relgot;
3781 flagword flags;
3782 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3783
3784 if (!is_ppc64_elf (abfd))
3785 return FALSE;
3786 if (htab == NULL)
3787 return FALSE;
3788
3789 if (!htab->elf.sgot
3790 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3791 return FALSE;
3792
3793 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3794 | SEC_LINKER_CREATED);
3795
3796 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3797 if (!got
3798 || !bfd_set_section_alignment (got, 3))
3799 return FALSE;
3800
3801 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3802 flags | SEC_READONLY);
3803 if (!relgot
3804 || !bfd_set_section_alignment (relgot, 3))
3805 return FALSE;
3806
3807 ppc64_elf_tdata (abfd)->got = got;
3808 ppc64_elf_tdata (abfd)->relgot = relgot;
3809 return TRUE;
3810 }
3811
3812 /* Follow indirect and warning symbol links. */
3813
3814 static inline struct bfd_link_hash_entry *
3815 follow_link (struct bfd_link_hash_entry *h)
3816 {
3817 while (h->type == bfd_link_hash_indirect
3818 || h->type == bfd_link_hash_warning)
3819 h = h->u.i.link;
3820 return h;
3821 }
3822
3823 static inline struct elf_link_hash_entry *
3824 elf_follow_link (struct elf_link_hash_entry *h)
3825 {
3826 return (struct elf_link_hash_entry *) follow_link (&h->root);
3827 }
3828
3829 static inline struct ppc_link_hash_entry *
3830 ppc_follow_link (struct ppc_link_hash_entry *h)
3831 {
3832 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
3833 }
3834
3835 /* Merge PLT info on FROM with that on TO. */
3836
3837 static void
3838 move_plt_plist (struct ppc_link_hash_entry *from,
3839 struct ppc_link_hash_entry *to)
3840 {
3841 if (from->elf.plt.plist != NULL)
3842 {
3843 if (to->elf.plt.plist != NULL)
3844 {
3845 struct plt_entry **entp;
3846 struct plt_entry *ent;
3847
3848 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3849 {
3850 struct plt_entry *dent;
3851
3852 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3853 if (dent->addend == ent->addend)
3854 {
3855 dent->plt.refcount += ent->plt.refcount;
3856 *entp = ent->next;
3857 break;
3858 }
3859 if (dent == NULL)
3860 entp = &ent->next;
3861 }
3862 *entp = to->elf.plt.plist;
3863 }
3864
3865 to->elf.plt.plist = from->elf.plt.plist;
3866 from->elf.plt.plist = NULL;
3867 }
3868 }
3869
3870 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3871
3872 static void
3873 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3874 struct elf_link_hash_entry *dir,
3875 struct elf_link_hash_entry *ind)
3876 {
3877 struct ppc_link_hash_entry *edir, *eind;
3878
3879 edir = ppc_elf_hash_entry (dir);
3880 eind = ppc_elf_hash_entry (ind);
3881
3882 edir->is_func |= eind->is_func;
3883 edir->is_func_descriptor |= eind->is_func_descriptor;
3884 edir->tls_mask |= eind->tls_mask;
3885 if (eind->oh != NULL)
3886 edir->oh = ppc_follow_link (eind->oh);
3887
3888 if (edir->elf.versioned != versioned_hidden)
3889 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3890 edir->elf.ref_regular |= eind->elf.ref_regular;
3891 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3892 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3893 edir->elf.needs_plt |= eind->elf.needs_plt;
3894 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3895
3896 /* If we were called to copy over info for a weak sym, don't copy
3897 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3898 in order to simplify readonly_dynrelocs and save a field in the
3899 symbol hash entry, but that means dyn_relocs can't be used in any
3900 tests about a specific symbol, or affect other symbol flags which
3901 are then tested. */
3902 if (eind->elf.root.type != bfd_link_hash_indirect)
3903 return;
3904
3905 /* Copy over any dynamic relocs we may have on the indirect sym. */
3906 if (ind->dyn_relocs != NULL)
3907 {
3908 if (dir->dyn_relocs != NULL)
3909 {
3910 struct elf_dyn_relocs **pp;
3911 struct elf_dyn_relocs *p;
3912
3913 /* Add reloc counts against the indirect sym to the direct sym
3914 list. Merge any entries against the same section. */
3915 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3916 {
3917 struct elf_dyn_relocs *q;
3918
3919 for (q = dir->dyn_relocs; q != NULL; q = q->next)
3920 if (q->sec == p->sec)
3921 {
3922 q->pc_count += p->pc_count;
3923 q->count += p->count;
3924 *pp = p->next;
3925 break;
3926 }
3927 if (q == NULL)
3928 pp = &p->next;
3929 }
3930 *pp = dir->dyn_relocs;
3931 }
3932
3933 dir->dyn_relocs = ind->dyn_relocs;
3934 ind->dyn_relocs = NULL;
3935 }
3936
3937 /* Copy over got entries that we may have already seen to the
3938 symbol which just became indirect. */
3939 if (eind->elf.got.glist != NULL)
3940 {
3941 if (edir->elf.got.glist != NULL)
3942 {
3943 struct got_entry **entp;
3944 struct got_entry *ent;
3945
3946 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3947 {
3948 struct got_entry *dent;
3949
3950 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3951 if (dent->addend == ent->addend
3952 && dent->owner == ent->owner
3953 && dent->tls_type == ent->tls_type)
3954 {
3955 dent->got.refcount += ent->got.refcount;
3956 *entp = ent->next;
3957 break;
3958 }
3959 if (dent == NULL)
3960 entp = &ent->next;
3961 }
3962 *entp = edir->elf.got.glist;
3963 }
3964
3965 edir->elf.got.glist = eind->elf.got.glist;
3966 eind->elf.got.glist = NULL;
3967 }
3968
3969 /* And plt entries. */
3970 move_plt_plist (eind, edir);
3971
3972 if (eind->elf.dynindx != -1)
3973 {
3974 if (edir->elf.dynindx != -1)
3975 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3976 edir->elf.dynstr_index);
3977 edir->elf.dynindx = eind->elf.dynindx;
3978 edir->elf.dynstr_index = eind->elf.dynstr_index;
3979 eind->elf.dynindx = -1;
3980 eind->elf.dynstr_index = 0;
3981 }
3982 }
3983
3984 /* Find the function descriptor hash entry from the given function code
3985 hash entry FH. Link the entries via their OH fields. */
3986
3987 static struct ppc_link_hash_entry *
3988 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3989 {
3990 struct ppc_link_hash_entry *fdh = fh->oh;
3991
3992 if (fdh == NULL)
3993 {
3994 const char *fd_name = fh->elf.root.root.string + 1;
3995
3996 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
3997 FALSE, FALSE, FALSE));
3998 if (fdh == NULL)
3999 return fdh;
4000
4001 fdh->is_func_descriptor = 1;
4002 fdh->oh = fh;
4003 fh->is_func = 1;
4004 fh->oh = fdh;
4005 }
4006
4007 fdh = ppc_follow_link (fdh);
4008 fdh->is_func_descriptor = 1;
4009 fdh->oh = fh;
4010 return fdh;
4011 }
4012
4013 /* Make a fake function descriptor sym for the undefined code sym FH. */
4014
4015 static struct ppc_link_hash_entry *
4016 make_fdh (struct bfd_link_info *info,
4017 struct ppc_link_hash_entry *fh)
4018 {
4019 bfd *abfd = fh->elf.root.u.undef.abfd;
4020 struct bfd_link_hash_entry *bh = NULL;
4021 struct ppc_link_hash_entry *fdh;
4022 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4023 ? BSF_WEAK
4024 : BSF_GLOBAL);
4025
4026 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4027 fh->elf.root.root.string + 1,
4028 flags, bfd_und_section_ptr, 0,
4029 NULL, FALSE, FALSE, &bh))
4030 return NULL;
4031
4032 fdh = (struct ppc_link_hash_entry *) bh;
4033 fdh->elf.non_elf = 0;
4034 fdh->fake = 1;
4035 fdh->is_func_descriptor = 1;
4036 fdh->oh = fh;
4037 fh->is_func = 1;
4038 fh->oh = fdh;
4039 return fdh;
4040 }
4041
4042 /* Fix function descriptor symbols defined in .opd sections to be
4043 function type. */
4044
4045 static bfd_boolean
4046 ppc64_elf_add_symbol_hook (bfd *ibfd,
4047 struct bfd_link_info *info,
4048 Elf_Internal_Sym *isym,
4049 const char **name,
4050 flagword *flags ATTRIBUTE_UNUSED,
4051 asection **sec,
4052 bfd_vma *value)
4053 {
4054 if (*sec != NULL
4055 && strcmp ((*sec)->name, ".opd") == 0)
4056 {
4057 asection *code_sec;
4058
4059 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4060 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4061 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4062
4063 /* If the symbol is a function defined in .opd, and the function
4064 code is in a discarded group, let it appear to be undefined. */
4065 if (!bfd_link_relocatable (info)
4066 && (*sec)->reloc_count != 0
4067 && opd_entry_value (*sec, *value, &code_sec, NULL,
4068 FALSE) != (bfd_vma) -1
4069 && discarded_section (code_sec))
4070 {
4071 *sec = bfd_und_section_ptr;
4072 isym->st_shndx = SHN_UNDEF;
4073 }
4074 }
4075 else if (*sec != NULL
4076 && strcmp ((*sec)->name, ".toc") == 0
4077 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4078 {
4079 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4080 if (htab != NULL)
4081 htab->params->object_in_toc = 1;
4082 }
4083
4084 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4085 {
4086 if (abiversion (ibfd) == 0)
4087 set_abiversion (ibfd, 2);
4088 else if (abiversion (ibfd) == 1)
4089 {
4090 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4091 " for ABI version 1"), *name);
4092 bfd_set_error (bfd_error_bad_value);
4093 return FALSE;
4094 }
4095 }
4096
4097 return TRUE;
4098 }
4099
4100 /* Merge non-visibility st_other attributes: local entry point. */
4101
4102 static void
4103 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4104 const Elf_Internal_Sym *isym,
4105 bfd_boolean definition,
4106 bfd_boolean dynamic)
4107 {
4108 if (definition && (!dynamic || !h->def_regular))
4109 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4110 | ELF_ST_VISIBILITY (h->other));
4111 }
4112
4113 /* Hook called on merging a symbol. We use this to clear "fake" since
4114 we now have a real symbol. */
4115
4116 static bfd_boolean
4117 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
4118 const Elf_Internal_Sym *isym,
4119 asection **psec ATTRIBUTE_UNUSED,
4120 bfd_boolean newdef ATTRIBUTE_UNUSED,
4121 bfd_boolean olddef ATTRIBUTE_UNUSED,
4122 bfd *oldbfd ATTRIBUTE_UNUSED,
4123 const asection *oldsec ATTRIBUTE_UNUSED)
4124 {
4125 ppc_elf_hash_entry (h)->fake = 0;
4126 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4127 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
4128 return TRUE;
4129 }
4130
4131 /* This function makes an old ABI object reference to ".bar" cause the
4132 inclusion of a new ABI object archive that defines "bar".
4133 NAME is a symbol defined in an archive. Return a symbol in the hash
4134 table that might be satisfied by the archive symbols. */
4135
4136 static struct elf_link_hash_entry *
4137 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4138 struct bfd_link_info *info,
4139 const char *name)
4140 {
4141 struct elf_link_hash_entry *h;
4142 char *dot_name;
4143 size_t len;
4144
4145 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4146 if (h != NULL
4147 /* Don't return this sym if it is a fake function descriptor
4148 created by add_symbol_adjust. */
4149 && !ppc_elf_hash_entry (h)->fake)
4150 return h;
4151
4152 if (name[0] == '.')
4153 return h;
4154
4155 len = strlen (name);
4156 dot_name = bfd_alloc (abfd, len + 2);
4157 if (dot_name == NULL)
4158 return (struct elf_link_hash_entry *) -1;
4159 dot_name[0] = '.';
4160 memcpy (dot_name + 1, name, len + 1);
4161 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4162 bfd_release (abfd, dot_name);
4163 if (h != NULL)
4164 return h;
4165
4166 if (strcmp (name, "__tls_get_addr_opt") == 0)
4167 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
4168 return h;
4169 }
4170
4171 /* This function satisfies all old ABI object references to ".bar" if a
4172 new ABI object defines "bar". Well, at least, undefined dot symbols
4173 are made weak. This stops later archive searches from including an
4174 object if we already have a function descriptor definition. It also
4175 prevents the linker complaining about undefined symbols.
4176 We also check and correct mismatched symbol visibility here. The
4177 most restrictive visibility of the function descriptor and the
4178 function entry symbol is used. */
4179
4180 static bfd_boolean
4181 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4182 {
4183 struct ppc_link_hash_table *htab;
4184 struct ppc_link_hash_entry *fdh;
4185
4186 if (eh->elf.root.type == bfd_link_hash_warning)
4187 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4188
4189 if (eh->elf.root.type == bfd_link_hash_indirect)
4190 return TRUE;
4191
4192 if (eh->elf.root.root.string[0] != '.')
4193 abort ();
4194
4195 htab = ppc_hash_table (info);
4196 if (htab == NULL)
4197 return FALSE;
4198
4199 fdh = lookup_fdh (eh, htab);
4200 if (fdh == NULL
4201 && !bfd_link_relocatable (info)
4202 && (eh->elf.root.type == bfd_link_hash_undefined
4203 || eh->elf.root.type == bfd_link_hash_undefweak)
4204 && eh->elf.ref_regular)
4205 {
4206 /* Make an undefined function descriptor sym, in order to
4207 pull in an --as-needed shared lib. Archives are handled
4208 elsewhere. */
4209 fdh = make_fdh (info, eh);
4210 if (fdh == NULL)
4211 return FALSE;
4212 }
4213
4214 if (fdh != NULL)
4215 {
4216 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4217 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4218
4219 /* Make both descriptor and entry symbol have the most
4220 constraining visibility of either symbol. */
4221 if (entry_vis < descr_vis)
4222 fdh->elf.other += entry_vis - descr_vis;
4223 else if (entry_vis > descr_vis)
4224 eh->elf.other += descr_vis - entry_vis;
4225
4226 /* Propagate reference flags from entry symbol to function
4227 descriptor symbol. */
4228 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4229 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
4230 fdh->elf.ref_regular |= eh->elf.ref_regular;
4231 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4232
4233 if (!fdh->elf.forced_local
4234 && fdh->elf.dynindx == -1
4235 && fdh->elf.versioned != versioned_hidden
4236 && (bfd_link_dll (info)
4237 || fdh->elf.def_dynamic
4238 || fdh->elf.ref_dynamic)
4239 && (eh->elf.ref_regular
4240 || eh->elf.def_regular))
4241 {
4242 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4243 return FALSE;
4244 }
4245 }
4246
4247 return TRUE;
4248 }
4249
4250 /* Set up opd section info and abiversion for IBFD, and process list
4251 of dot-symbols we made in link_hash_newfunc. */
4252
4253 static bfd_boolean
4254 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4255 {
4256 struct ppc_link_hash_table *htab;
4257 struct ppc_link_hash_entry **p, *eh;
4258 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4259
4260 if (opd != NULL && opd->size != 0)
4261 {
4262 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4263 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4264
4265 if (abiversion (ibfd) == 0)
4266 set_abiversion (ibfd, 1);
4267 else if (abiversion (ibfd) >= 2)
4268 {
4269 /* xgettext:c-format */
4270 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4271 ibfd, abiversion (ibfd));
4272 bfd_set_error (bfd_error_bad_value);
4273 return FALSE;
4274 }
4275 }
4276
4277 if (is_ppc64_elf (info->output_bfd))
4278 {
4279 /* For input files without an explicit abiversion in e_flags
4280 we should have flagged any with symbol st_other bits set
4281 as ELFv1 and above flagged those with .opd as ELFv2.
4282 Set the output abiversion if not yet set, and for any input
4283 still ambiguous, take its abiversion from the output.
4284 Differences in ABI are reported later. */
4285 if (abiversion (info->output_bfd) == 0)
4286 set_abiversion (info->output_bfd, abiversion (ibfd));
4287 else if (abiversion (ibfd) == 0)
4288 set_abiversion (ibfd, abiversion (info->output_bfd));
4289 }
4290
4291 htab = ppc_hash_table (info);
4292 if (htab == NULL)
4293 return TRUE;
4294
4295 if (opd != NULL && opd->size != 0
4296 && (ibfd->flags & DYNAMIC) == 0
4297 && (opd->flags & SEC_RELOC) != 0
4298 && opd->reloc_count != 0
4299 && !bfd_is_abs_section (opd->output_section)
4300 && info->gc_sections)
4301 {
4302 /* Garbage collection needs some extra help with .opd sections.
4303 We don't want to necessarily keep everything referenced by
4304 relocs in .opd, as that would keep all functions. Instead,
4305 if we reference an .opd symbol (a function descriptor), we
4306 want to keep the function code symbol's section. This is
4307 easy for global symbols, but for local syms we need to keep
4308 information about the associated function section. */
4309 bfd_size_type amt;
4310 asection **opd_sym_map;
4311 Elf_Internal_Shdr *symtab_hdr;
4312 Elf_Internal_Rela *relocs, *rel_end, *rel;
4313
4314 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4315 opd_sym_map = bfd_zalloc (ibfd, amt);
4316 if (opd_sym_map == NULL)
4317 return FALSE;
4318 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4319 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4320 info->keep_memory);
4321 if (relocs == NULL)
4322 return FALSE;
4323 symtab_hdr = &elf_symtab_hdr (ibfd);
4324 rel_end = relocs + opd->reloc_count - 1;
4325 for (rel = relocs; rel < rel_end; rel++)
4326 {
4327 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4328 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4329
4330 if (r_type == R_PPC64_ADDR64
4331 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4332 && r_symndx < symtab_hdr->sh_info)
4333 {
4334 Elf_Internal_Sym *isym;
4335 asection *s;
4336
4337 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4338 if (isym == NULL)
4339 {
4340 if (elf_section_data (opd)->relocs != relocs)
4341 free (relocs);
4342 return FALSE;
4343 }
4344
4345 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4346 if (s != NULL && s != opd)
4347 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4348 }
4349 }
4350 if (elf_section_data (opd)->relocs != relocs)
4351 free (relocs);
4352 }
4353
4354 p = &htab->dot_syms;
4355 while ((eh = *p) != NULL)
4356 {
4357 *p = NULL;
4358 if (&eh->elf == htab->elf.hgot)
4359 ;
4360 else if (htab->elf.hgot == NULL
4361 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4362 htab->elf.hgot = &eh->elf;
4363 else if (abiversion (ibfd) <= 1)
4364 {
4365 htab->need_func_desc_adj = 1;
4366 if (!add_symbol_adjust (eh, info))
4367 return FALSE;
4368 }
4369 p = &eh->u.next_dot_sym;
4370 }
4371 return TRUE;
4372 }
4373
4374 /* Undo hash table changes when an --as-needed input file is determined
4375 not to be needed. */
4376
4377 static bfd_boolean
4378 ppc64_elf_notice_as_needed (bfd *ibfd,
4379 struct bfd_link_info *info,
4380 enum notice_asneeded_action act)
4381 {
4382 if (act == notice_not_needed)
4383 {
4384 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4385
4386 if (htab == NULL)
4387 return FALSE;
4388
4389 htab->dot_syms = NULL;
4390 }
4391 return _bfd_elf_notice_as_needed (ibfd, info, act);
4392 }
4393
4394 /* If --just-symbols against a final linked binary, then assume we need
4395 toc adjusting stubs when calling functions defined there. */
4396
4397 static void
4398 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4399 {
4400 if ((sec->flags & SEC_CODE) != 0
4401 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4402 && is_ppc64_elf (sec->owner))
4403 {
4404 if (abiversion (sec->owner) >= 2
4405 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
4406 sec->has_toc_reloc = 1;
4407 }
4408 _bfd_elf_link_just_syms (sec, info);
4409 }
4410
4411 static struct plt_entry **
4412 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4413 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4414 {
4415 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4416 struct plt_entry **local_plt;
4417 unsigned char *local_got_tls_masks;
4418
4419 if (local_got_ents == NULL)
4420 {
4421 bfd_size_type size = symtab_hdr->sh_info;
4422
4423 size *= (sizeof (*local_got_ents)
4424 + sizeof (*local_plt)
4425 + sizeof (*local_got_tls_masks));
4426 local_got_ents = bfd_zalloc (abfd, size);
4427 if (local_got_ents == NULL)
4428 return NULL;
4429 elf_local_got_ents (abfd) = local_got_ents;
4430 }
4431
4432 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
4433 {
4434 struct got_entry *ent;
4435
4436 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4437 if (ent->addend == r_addend
4438 && ent->owner == abfd
4439 && ent->tls_type == tls_type)
4440 break;
4441 if (ent == NULL)
4442 {
4443 size_t amt = sizeof (*ent);
4444 ent = bfd_alloc (abfd, amt);
4445 if (ent == NULL)
4446 return FALSE;
4447 ent->next = local_got_ents[r_symndx];
4448 ent->addend = r_addend;
4449 ent->owner = abfd;
4450 ent->tls_type = tls_type;
4451 ent->is_indirect = FALSE;
4452 ent->got.refcount = 0;
4453 local_got_ents[r_symndx] = ent;
4454 }
4455 ent->got.refcount += 1;
4456 }
4457
4458 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
4459 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
4460 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
4461
4462 return local_plt + r_symndx;
4463 }
4464
4465 static bfd_boolean
4466 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
4467 {
4468 struct plt_entry *ent;
4469
4470 for (ent = *plist; ent != NULL; ent = ent->next)
4471 if (ent->addend == addend)
4472 break;
4473 if (ent == NULL)
4474 {
4475 size_t amt = sizeof (*ent);
4476 ent = bfd_alloc (abfd, amt);
4477 if (ent == NULL)
4478 return FALSE;
4479 ent->next = *plist;
4480 ent->addend = addend;
4481 ent->plt.refcount = 0;
4482 *plist = ent;
4483 }
4484 ent->plt.refcount += 1;
4485 return TRUE;
4486 }
4487
4488 static bfd_boolean
4489 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4490 {
4491 return (r_type == R_PPC64_REL24
4492 || r_type == R_PPC64_REL24_NOTOC
4493 || r_type == R_PPC64_REL14
4494 || r_type == R_PPC64_REL14_BRTAKEN
4495 || r_type == R_PPC64_REL14_BRNTAKEN
4496 || r_type == R_PPC64_ADDR24
4497 || r_type == R_PPC64_ADDR14
4498 || r_type == R_PPC64_ADDR14_BRTAKEN
4499 || r_type == R_PPC64_ADDR14_BRNTAKEN
4500 || r_type == R_PPC64_PLTCALL
4501 || r_type == R_PPC64_PLTCALL_NOTOC);
4502 }
4503
4504 /* Relocs on inline plt call sequence insns prior to the call. */
4505
4506 static bfd_boolean
4507 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4508 {
4509 return (r_type == R_PPC64_PLT16_HA
4510 || r_type == R_PPC64_PLT16_HI
4511 || r_type == R_PPC64_PLT16_LO
4512 || r_type == R_PPC64_PLT16_LO_DS
4513 || r_type == R_PPC64_PLT_PCREL34
4514 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4515 || r_type == R_PPC64_PLTSEQ
4516 || r_type == R_PPC64_PLTSEQ_NOTOC);
4517 }
4518
4519 /* Look through the relocs for a section during the first phase, and
4520 calculate needed space in the global offset table, procedure
4521 linkage table, and dynamic reloc sections. */
4522
4523 static bfd_boolean
4524 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4525 asection *sec, const Elf_Internal_Rela *relocs)
4526 {
4527 struct ppc_link_hash_table *htab;
4528 Elf_Internal_Shdr *symtab_hdr;
4529 struct elf_link_hash_entry **sym_hashes;
4530 const Elf_Internal_Rela *rel;
4531 const Elf_Internal_Rela *rel_end;
4532 asection *sreloc;
4533 struct elf_link_hash_entry *tga, *dottga;
4534 bfd_boolean is_opd;
4535
4536 if (bfd_link_relocatable (info))
4537 return TRUE;
4538
4539 BFD_ASSERT (is_ppc64_elf (abfd));
4540
4541 htab = ppc_hash_table (info);
4542 if (htab == NULL)
4543 return FALSE;
4544
4545 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4546 FALSE, FALSE, TRUE);
4547 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4548 FALSE, FALSE, TRUE);
4549 symtab_hdr = &elf_symtab_hdr (abfd);
4550 sym_hashes = elf_sym_hashes (abfd);
4551 sreloc = NULL;
4552 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
4553 rel_end = relocs + sec->reloc_count;
4554 for (rel = relocs; rel < rel_end; rel++)
4555 {
4556 unsigned long r_symndx;
4557 struct elf_link_hash_entry *h;
4558 enum elf_ppc64_reloc_type r_type;
4559 int tls_type;
4560 struct _ppc64_elf_section_data *ppc64_sec;
4561 struct plt_entry **ifunc, **plt_list;
4562
4563 r_symndx = ELF64_R_SYM (rel->r_info);
4564 if (r_symndx < symtab_hdr->sh_info)
4565 h = NULL;
4566 else
4567 {
4568 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4569 h = elf_follow_link (h);
4570
4571 if (h == htab->elf.hgot)
4572 sec->has_toc_reloc = 1;
4573 }
4574
4575 r_type = ELF64_R_TYPE (rel->r_info);
4576 switch (r_type)
4577 {
4578 case R_PPC64_D34:
4579 case R_PPC64_D34_LO:
4580 case R_PPC64_D34_HI30:
4581 case R_PPC64_D34_HA30:
4582 case R_PPC64_D28:
4583 case R_PPC64_TPREL34:
4584 case R_PPC64_DTPREL34:
4585 case R_PPC64_PCREL34:
4586 case R_PPC64_GOT_PCREL34:
4587 case R_PPC64_GOT_TLSGD34:
4588 case R_PPC64_GOT_TLSLD34:
4589 case R_PPC64_GOT_TPREL34:
4590 case R_PPC64_GOT_DTPREL34:
4591 case R_PPC64_PLT_PCREL34:
4592 case R_PPC64_PLT_PCREL34_NOTOC:
4593 case R_PPC64_PCREL28:
4594 htab->power10_stubs = 1;
4595 break;
4596 default:
4597 break;
4598 }
4599
4600 switch (r_type)
4601 {
4602 case R_PPC64_PLT16_HA:
4603 case R_PPC64_GOT_TLSLD16_HA:
4604 case R_PPC64_GOT_TLSGD16_HA:
4605 case R_PPC64_GOT_TPREL16_HA:
4606 case R_PPC64_GOT_DTPREL16_HA:
4607 case R_PPC64_GOT16_HA:
4608 case R_PPC64_TOC16_HA:
4609 case R_PPC64_PLT16_LO:
4610 case R_PPC64_PLT16_LO_DS:
4611 case R_PPC64_GOT_TLSLD16_LO:
4612 case R_PPC64_GOT_TLSGD16_LO:
4613 case R_PPC64_GOT_TPREL16_LO_DS:
4614 case R_PPC64_GOT_DTPREL16_LO_DS:
4615 case R_PPC64_GOT16_LO:
4616 case R_PPC64_GOT16_LO_DS:
4617 case R_PPC64_TOC16_LO:
4618 case R_PPC64_TOC16_LO_DS:
4619 case R_PPC64_GOT_PCREL34:
4620 ppc64_elf_tdata (abfd)->has_optrel = 1;
4621 ppc64_elf_section_data (sec)->has_optrel = 1;
4622 break;
4623 default:
4624 break;
4625 }
4626
4627 ifunc = NULL;
4628 if (h != NULL)
4629 {
4630 if (h->type == STT_GNU_IFUNC)
4631 {
4632 h->needs_plt = 1;
4633 ifunc = &h->plt.plist;
4634 }
4635 }
4636 else
4637 {
4638 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4639 abfd, r_symndx);
4640 if (isym == NULL)
4641 return FALSE;
4642
4643 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4644 {
4645 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4646 rel->r_addend,
4647 NON_GOT | PLT_IFUNC);
4648 if (ifunc == NULL)
4649 return FALSE;
4650 }
4651 }
4652
4653 tls_type = 0;
4654 switch (r_type)
4655 {
4656 case R_PPC64_TLSGD:
4657 case R_PPC64_TLSLD:
4658 /* These special tls relocs tie a call to __tls_get_addr with
4659 its parameter symbol. */
4660 if (h != NULL)
4661 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4662 else
4663 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4664 rel->r_addend,
4665 NON_GOT | TLS_TLS | TLS_MARK))
4666 return FALSE;
4667 sec->has_tls_reloc = 1;
4668 break;
4669
4670 case R_PPC64_GOT_TLSLD16:
4671 case R_PPC64_GOT_TLSLD16_LO:
4672 case R_PPC64_GOT_TLSLD16_HI:
4673 case R_PPC64_GOT_TLSLD16_HA:
4674 case R_PPC64_GOT_TLSLD34:
4675 tls_type = TLS_TLS | TLS_LD;
4676 goto dogottls;
4677
4678 case R_PPC64_GOT_TLSGD16:
4679 case R_PPC64_GOT_TLSGD16_LO:
4680 case R_PPC64_GOT_TLSGD16_HI:
4681 case R_PPC64_GOT_TLSGD16_HA:
4682 case R_PPC64_GOT_TLSGD34:
4683 tls_type = TLS_TLS | TLS_GD;
4684 goto dogottls;
4685
4686 case R_PPC64_GOT_TPREL16_DS:
4687 case R_PPC64_GOT_TPREL16_LO_DS:
4688 case R_PPC64_GOT_TPREL16_HI:
4689 case R_PPC64_GOT_TPREL16_HA:
4690 case R_PPC64_GOT_TPREL34:
4691 if (bfd_link_dll (info))
4692 info->flags |= DF_STATIC_TLS;
4693 tls_type = TLS_TLS | TLS_TPREL;
4694 goto dogottls;
4695
4696 case R_PPC64_GOT_DTPREL16_DS:
4697 case R_PPC64_GOT_DTPREL16_LO_DS:
4698 case R_PPC64_GOT_DTPREL16_HI:
4699 case R_PPC64_GOT_DTPREL16_HA:
4700 case R_PPC64_GOT_DTPREL34:
4701 tls_type = TLS_TLS | TLS_DTPREL;
4702 dogottls:
4703 sec->has_tls_reloc = 1;
4704 goto dogot;
4705
4706 case R_PPC64_GOT16:
4707 case R_PPC64_GOT16_LO:
4708 case R_PPC64_GOT16_HI:
4709 case R_PPC64_GOT16_HA:
4710 case R_PPC64_GOT16_DS:
4711 case R_PPC64_GOT16_LO_DS:
4712 case R_PPC64_GOT_PCREL34:
4713 dogot:
4714 /* This symbol requires a global offset table entry. */
4715 sec->has_toc_reloc = 1;
4716 if (r_type == R_PPC64_GOT_TLSLD16
4717 || r_type == R_PPC64_GOT_TLSGD16
4718 || r_type == R_PPC64_GOT_TPREL16_DS
4719 || r_type == R_PPC64_GOT_DTPREL16_DS
4720 || r_type == R_PPC64_GOT16
4721 || r_type == R_PPC64_GOT16_DS)
4722 {
4723 htab->do_multi_toc = 1;
4724 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4725 }
4726
4727 if (ppc64_elf_tdata (abfd)->got == NULL
4728 && !create_got_section (abfd, info))
4729 return FALSE;
4730
4731 if (h != NULL)
4732 {
4733 struct ppc_link_hash_entry *eh;
4734 struct got_entry *ent;
4735
4736 eh = ppc_elf_hash_entry (h);
4737 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4738 if (ent->addend == rel->r_addend
4739 && ent->owner == abfd
4740 && ent->tls_type == tls_type)
4741 break;
4742 if (ent == NULL)
4743 {
4744 size_t amt = sizeof (*ent);
4745 ent = bfd_alloc (abfd, amt);
4746 if (ent == NULL)
4747 return FALSE;
4748 ent->next = eh->elf.got.glist;
4749 ent->addend = rel->r_addend;
4750 ent->owner = abfd;
4751 ent->tls_type = tls_type;
4752 ent->is_indirect = FALSE;
4753 ent->got.refcount = 0;
4754 eh->elf.got.glist = ent;
4755 }
4756 ent->got.refcount += 1;
4757 eh->tls_mask |= tls_type;
4758 }
4759 else
4760 /* This is a global offset table entry for a local symbol. */
4761 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4762 rel->r_addend, tls_type))
4763 return FALSE;
4764 break;
4765
4766 case R_PPC64_PLT16_HA:
4767 case R_PPC64_PLT16_HI:
4768 case R_PPC64_PLT16_LO:
4769 case R_PPC64_PLT16_LO_DS:
4770 case R_PPC64_PLT_PCREL34:
4771 case R_PPC64_PLT_PCREL34_NOTOC:
4772 case R_PPC64_PLT32:
4773 case R_PPC64_PLT64:
4774 /* This symbol requires a procedure linkage table entry. */
4775 plt_list = ifunc;
4776 if (h != NULL)
4777 {
4778 h->needs_plt = 1;
4779 if (h->root.root.string[0] == '.'
4780 && h->root.root.string[1] != '\0')
4781 ppc_elf_hash_entry (h)->is_func = 1;
4782 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
4783 plt_list = &h->plt.plist;
4784 }
4785 if (plt_list == NULL)
4786 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4787 rel->r_addend,
4788 NON_GOT | PLT_KEEP);
4789 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4790 return FALSE;
4791 break;
4792
4793 /* The following relocations don't need to propagate the
4794 relocation if linking a shared object since they are
4795 section relative. */
4796 case R_PPC64_SECTOFF:
4797 case R_PPC64_SECTOFF_LO:
4798 case R_PPC64_SECTOFF_HI:
4799 case R_PPC64_SECTOFF_HA:
4800 case R_PPC64_SECTOFF_DS:
4801 case R_PPC64_SECTOFF_LO_DS:
4802 case R_PPC64_DTPREL16:
4803 case R_PPC64_DTPREL16_LO:
4804 case R_PPC64_DTPREL16_HI:
4805 case R_PPC64_DTPREL16_HA:
4806 case R_PPC64_DTPREL16_DS:
4807 case R_PPC64_DTPREL16_LO_DS:
4808 case R_PPC64_DTPREL16_HIGH:
4809 case R_PPC64_DTPREL16_HIGHA:
4810 case R_PPC64_DTPREL16_HIGHER:
4811 case R_PPC64_DTPREL16_HIGHERA:
4812 case R_PPC64_DTPREL16_HIGHEST:
4813 case R_PPC64_DTPREL16_HIGHESTA:
4814 break;
4815
4816 /* Nor do these. */
4817 case R_PPC64_REL16:
4818 case R_PPC64_REL16_LO:
4819 case R_PPC64_REL16_HI:
4820 case R_PPC64_REL16_HA:
4821 case R_PPC64_REL16_HIGH:
4822 case R_PPC64_REL16_HIGHA:
4823 case R_PPC64_REL16_HIGHER:
4824 case R_PPC64_REL16_HIGHERA:
4825 case R_PPC64_REL16_HIGHEST:
4826 case R_PPC64_REL16_HIGHESTA:
4827 case R_PPC64_REL16_HIGHER34:
4828 case R_PPC64_REL16_HIGHERA34:
4829 case R_PPC64_REL16_HIGHEST34:
4830 case R_PPC64_REL16_HIGHESTA34:
4831 case R_PPC64_REL16DX_HA:
4832 break;
4833
4834 /* Not supported as a dynamic relocation. */
4835 case R_PPC64_ADDR64_LOCAL:
4836 if (bfd_link_pic (info))
4837 {
4838 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4839 ppc_howto_init ();
4840 /* xgettext:c-format */
4841 info->callbacks->einfo (_("%H: %s reloc unsupported "
4842 "in shared libraries and PIEs\n"),
4843 abfd, sec, rel->r_offset,
4844 ppc64_elf_howto_table[r_type]->name);
4845 bfd_set_error (bfd_error_bad_value);
4846 return FALSE;
4847 }
4848 break;
4849
4850 case R_PPC64_TOC16:
4851 case R_PPC64_TOC16_DS:
4852 htab->do_multi_toc = 1;
4853 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
4854 /* Fall through. */
4855 case R_PPC64_TOC16_LO:
4856 case R_PPC64_TOC16_HI:
4857 case R_PPC64_TOC16_HA:
4858 case R_PPC64_TOC16_LO_DS:
4859 sec->has_toc_reloc = 1;
4860 if (h != NULL && bfd_link_executable (info))
4861 {
4862 /* We may need a copy reloc. */
4863 h->non_got_ref = 1;
4864 /* Strongly prefer a copy reloc over a dynamic reloc.
4865 glibc ld.so as of 2019-08 will error out if one of
4866 these relocations is emitted. */
4867 h->needs_copy = 1;
4868 goto dodyn;
4869 }
4870 break;
4871
4872 /* Marker reloc. */
4873 case R_PPC64_ENTRY:
4874 break;
4875
4876 /* This relocation describes the C++ object vtable hierarchy.
4877 Reconstruct it for later use during GC. */
4878 case R_PPC64_GNU_VTINHERIT:
4879 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4880 return FALSE;
4881 break;
4882
4883 /* This relocation describes which C++ vtable entries are actually
4884 used. Record for later use during GC. */
4885 case R_PPC64_GNU_VTENTRY:
4886 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4887 return FALSE;
4888 break;
4889
4890 case R_PPC64_REL14:
4891 case R_PPC64_REL14_BRTAKEN:
4892 case R_PPC64_REL14_BRNTAKEN:
4893 {
4894 asection *dest = NULL;
4895
4896 /* Heuristic: If jumping outside our section, chances are
4897 we are going to need a stub. */
4898 if (h != NULL)
4899 {
4900 /* If the sym is weak it may be overridden later, so
4901 don't assume we know where a weak sym lives. */
4902 if (h->root.type == bfd_link_hash_defined)
4903 dest = h->root.u.def.section;
4904 }
4905 else
4906 {
4907 Elf_Internal_Sym *isym;
4908
4909 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4910 abfd, r_symndx);
4911 if (isym == NULL)
4912 return FALSE;
4913
4914 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4915 }
4916
4917 if (dest != sec)
4918 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4919 }
4920 goto rel24;
4921
4922 case R_PPC64_PLTCALL:
4923 case R_PPC64_PLTCALL_NOTOC:
4924 ppc64_elf_section_data (sec)->has_pltcall = 1;
4925 /* Fall through. */
4926
4927 case R_PPC64_REL24:
4928 case R_PPC64_REL24_NOTOC:
4929 rel24:
4930 plt_list = ifunc;
4931 if (h != NULL)
4932 {
4933 h->needs_plt = 1;
4934 if (h->root.root.string[0] == '.'
4935 && h->root.root.string[1] != '\0')
4936 ppc_elf_hash_entry (h)->is_func = 1;
4937
4938 if (h == tga || h == dottga)
4939 {
4940 sec->has_tls_reloc = 1;
4941 if (rel != relocs
4942 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4943 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4944 /* We have a new-style __tls_get_addr call with
4945 a marker reloc. */
4946 ;
4947 else
4948 /* Mark this section as having an old-style call. */
4949 sec->nomark_tls_get_addr = 1;
4950 }
4951 plt_list = &h->plt.plist;
4952 }
4953
4954 /* We may need a .plt entry if the function this reloc
4955 refers to is in a shared lib. */
4956 if (plt_list
4957 && !update_plt_info (abfd, plt_list, rel->r_addend))
4958 return FALSE;
4959 break;
4960
4961 case R_PPC64_ADDR14:
4962 case R_PPC64_ADDR14_BRNTAKEN:
4963 case R_PPC64_ADDR14_BRTAKEN:
4964 case R_PPC64_ADDR24:
4965 goto dodyn;
4966
4967 case R_PPC64_TPREL64:
4968 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4969 if (bfd_link_dll (info))
4970 info->flags |= DF_STATIC_TLS;
4971 goto dotlstoc;
4972
4973 case R_PPC64_DTPMOD64:
4974 if (rel + 1 < rel_end
4975 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4976 && rel[1].r_offset == rel->r_offset + 8)
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4978 else
4979 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4980 goto dotlstoc;
4981
4982 case R_PPC64_DTPREL64:
4983 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4984 if (rel != relocs
4985 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4986 && rel[-1].r_offset == rel->r_offset - 8)
4987 /* This is the second reloc of a dtpmod, dtprel pair.
4988 Don't mark with TLS_DTPREL. */
4989 goto dodyn;
4990
4991 dotlstoc:
4992 sec->has_tls_reloc = 1;
4993 if (h != NULL)
4994 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
4995 else
4996 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4997 rel->r_addend, tls_type))
4998 return FALSE;
4999
5000 ppc64_sec = ppc64_elf_section_data (sec);
5001 if (ppc64_sec->sec_type != sec_toc)
5002 {
5003 bfd_size_type amt;
5004
5005 /* One extra to simplify get_tls_mask. */
5006 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5007 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5008 if (ppc64_sec->u.toc.symndx == NULL)
5009 return FALSE;
5010 amt = sec->size * sizeof (bfd_vma) / 8;
5011 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5012 if (ppc64_sec->u.toc.add == NULL)
5013 return FALSE;
5014 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5015 ppc64_sec->sec_type = sec_toc;
5016 }
5017 BFD_ASSERT (rel->r_offset % 8 == 0);
5018 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5019 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5020
5021 /* Mark the second slot of a GD or LD entry.
5022 -1 to indicate GD and -2 to indicate LD. */
5023 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5024 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5025 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5026 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5027 goto dodyn;
5028
5029 case R_PPC64_TPREL16:
5030 case R_PPC64_TPREL16_LO:
5031 case R_PPC64_TPREL16_HI:
5032 case R_PPC64_TPREL16_HA:
5033 case R_PPC64_TPREL16_DS:
5034 case R_PPC64_TPREL16_LO_DS:
5035 case R_PPC64_TPREL16_HIGH:
5036 case R_PPC64_TPREL16_HIGHA:
5037 case R_PPC64_TPREL16_HIGHER:
5038 case R_PPC64_TPREL16_HIGHERA:
5039 case R_PPC64_TPREL16_HIGHEST:
5040 case R_PPC64_TPREL16_HIGHESTA:
5041 case R_PPC64_TPREL34:
5042 if (bfd_link_dll (info))
5043 info->flags |= DF_STATIC_TLS;
5044 goto dodyn;
5045
5046 case R_PPC64_ADDR64:
5047 if (is_opd
5048 && rel + 1 < rel_end
5049 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5050 {
5051 if (h != NULL)
5052 ppc_elf_hash_entry (h)->is_func = 1;
5053 }
5054 /* Fall through. */
5055
5056 case R_PPC64_ADDR16:
5057 case R_PPC64_ADDR16_DS:
5058 case R_PPC64_ADDR16_HA:
5059 case R_PPC64_ADDR16_HI:
5060 case R_PPC64_ADDR16_HIGH:
5061 case R_PPC64_ADDR16_HIGHA:
5062 case R_PPC64_ADDR16_HIGHER:
5063 case R_PPC64_ADDR16_HIGHERA:
5064 case R_PPC64_ADDR16_HIGHEST:
5065 case R_PPC64_ADDR16_HIGHESTA:
5066 case R_PPC64_ADDR16_LO:
5067 case R_PPC64_ADDR16_LO_DS:
5068 case R_PPC64_D34:
5069 case R_PPC64_D34_LO:
5070 case R_PPC64_D34_HI30:
5071 case R_PPC64_D34_HA30:
5072 case R_PPC64_ADDR16_HIGHER34:
5073 case R_PPC64_ADDR16_HIGHERA34:
5074 case R_PPC64_ADDR16_HIGHEST34:
5075 case R_PPC64_ADDR16_HIGHESTA34:
5076 case R_PPC64_D28:
5077 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5078 && rel->r_addend == 0)
5079 {
5080 /* We may need a .plt entry if this reloc refers to a
5081 function in a shared lib. */
5082 if (!update_plt_info (abfd, &h->plt.plist, 0))
5083 return FALSE;
5084 h->pointer_equality_needed = 1;
5085 }
5086 /* Fall through. */
5087
5088 case R_PPC64_REL30:
5089 case R_PPC64_REL32:
5090 case R_PPC64_REL64:
5091 case R_PPC64_ADDR32:
5092 case R_PPC64_UADDR16:
5093 case R_PPC64_UADDR32:
5094 case R_PPC64_UADDR64:
5095 case R_PPC64_TOC:
5096 if (h != NULL && bfd_link_executable (info))
5097 /* We may need a copy reloc. */
5098 h->non_got_ref = 1;
5099
5100 /* Don't propagate .opd relocs. */
5101 if (NO_OPD_RELOCS && is_opd)
5102 break;
5103
5104 /* If we are creating a shared library, and this is a reloc
5105 against a global symbol, or a non PC relative reloc
5106 against a local symbol, then we need to copy the reloc
5107 into the shared library. However, if we are linking with
5108 -Bsymbolic, we do not need to copy a reloc against a
5109 global symbol which is defined in an object we are
5110 including in the link (i.e., DEF_REGULAR is set). At
5111 this point we have not seen all the input files, so it is
5112 possible that DEF_REGULAR is not set now but will be set
5113 later (it is never cleared). In case of a weak definition,
5114 DEF_REGULAR may be cleared later by a strong definition in
5115 a shared library. We account for that possibility below by
5116 storing information in the dyn_relocs field of the hash
5117 table entry. A similar situation occurs when creating
5118 shared libraries and symbol visibility changes render the
5119 symbol local.
5120
5121 If on the other hand, we are creating an executable, we
5122 may need to keep relocations for symbols satisfied by a
5123 dynamic library if we manage to avoid copy relocs for the
5124 symbol. */
5125 dodyn:
5126 if ((h != NULL
5127 && (h->root.type == bfd_link_hash_defweak
5128 || !h->def_regular))
5129 || (h != NULL
5130 && !bfd_link_executable (info)
5131 && !SYMBOLIC_BIND (info, h))
5132 || (bfd_link_pic (info)
5133 && must_be_dyn_reloc (info, r_type))
5134 || (!bfd_link_pic (info)
5135 && ifunc != NULL))
5136 {
5137 /* We must copy these reloc types into the output file.
5138 Create a reloc section in dynobj and make room for
5139 this reloc. */
5140 if (sreloc == NULL)
5141 {
5142 sreloc = _bfd_elf_make_dynamic_reloc_section
5143 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5144
5145 if (sreloc == NULL)
5146 return FALSE;
5147 }
5148
5149 /* If this is a global symbol, we count the number of
5150 relocations we need for this symbol. */
5151 if (h != NULL)
5152 {
5153 struct elf_dyn_relocs *p;
5154 struct elf_dyn_relocs **head;
5155
5156 head = &h->dyn_relocs;
5157 p = *head;
5158 if (p == NULL || p->sec != sec)
5159 {
5160 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5161 if (p == NULL)
5162 return FALSE;
5163 p->next = *head;
5164 *head = p;
5165 p->sec = sec;
5166 p->count = 0;
5167 p->pc_count = 0;
5168 }
5169 p->count += 1;
5170 if (!must_be_dyn_reloc (info, r_type))
5171 p->pc_count += 1;
5172 }
5173 else
5174 {
5175 /* Track dynamic relocs needed for local syms too.
5176 We really need local syms available to do this
5177 easily. Oh well. */
5178 struct ppc_dyn_relocs *p;
5179 struct ppc_dyn_relocs **head;
5180 bfd_boolean is_ifunc;
5181 asection *s;
5182 void *vpp;
5183 Elf_Internal_Sym *isym;
5184
5185 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5186 abfd, r_symndx);
5187 if (isym == NULL)
5188 return FALSE;
5189
5190 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5191 if (s == NULL)
5192 s = sec;
5193
5194 vpp = &elf_section_data (s)->local_dynrel;
5195 head = (struct ppc_dyn_relocs **) vpp;
5196 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5197 p = *head;
5198 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5199 p = p->next;
5200 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5201 {
5202 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5203 if (p == NULL)
5204 return FALSE;
5205 p->next = *head;
5206 *head = p;
5207 p->sec = sec;
5208 p->ifunc = is_ifunc;
5209 p->count = 0;
5210 }
5211 p->count += 1;
5212 }
5213 }
5214 break;
5215
5216 default:
5217 break;
5218 }
5219 }
5220
5221 return TRUE;
5222 }
5223
5224 /* Merge backend specific data from an object file to the output
5225 object file when linking. */
5226
5227 static bfd_boolean
5228 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
5229 {
5230 bfd *obfd = info->output_bfd;
5231 unsigned long iflags, oflags;
5232
5233 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5234 return TRUE;
5235
5236 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5237 return TRUE;
5238
5239 if (!_bfd_generic_verify_endian_match (ibfd, info))
5240 return FALSE;
5241
5242 iflags = elf_elfheader (ibfd)->e_flags;
5243 oflags = elf_elfheader (obfd)->e_flags;
5244
5245 if (iflags & ~EF_PPC64_ABI)
5246 {
5247 _bfd_error_handler
5248 /* xgettext:c-format */
5249 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
5250 bfd_set_error (bfd_error_bad_value);
5251 return FALSE;
5252 }
5253 else if (iflags != oflags && iflags != 0)
5254 {
5255 _bfd_error_handler
5256 /* xgettext:c-format */
5257 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
5258 ibfd, iflags, oflags);
5259 bfd_set_error (bfd_error_bad_value);
5260 return FALSE;
5261 }
5262
5263 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5264 return FALSE;
5265
5266 /* Merge Tag_compatibility attributes and any common GNU ones. */
5267 return _bfd_elf_merge_object_attributes (ibfd, info);
5268 }
5269
5270 static bfd_boolean
5271 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5272 {
5273 /* Print normal ELF private data. */
5274 _bfd_elf_print_private_bfd_data (abfd, ptr);
5275
5276 if (elf_elfheader (abfd)->e_flags != 0)
5277 {
5278 FILE *file = ptr;
5279
5280 fprintf (file, _("private flags = 0x%lx:"),
5281 elf_elfheader (abfd)->e_flags);
5282
5283 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5284 fprintf (file, _(" [abiv%ld]"),
5285 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5286 fputc ('\n', file);
5287 }
5288
5289 return TRUE;
5290 }
5291
5292 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5293 of the code entry point, and its section, which must be in the same
5294 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5295
5296 static bfd_vma
5297 opd_entry_value (asection *opd_sec,
5298 bfd_vma offset,
5299 asection **code_sec,
5300 bfd_vma *code_off,
5301 bfd_boolean in_code_sec)
5302 {
5303 bfd *opd_bfd = opd_sec->owner;
5304 Elf_Internal_Rela *relocs;
5305 Elf_Internal_Rela *lo, *hi, *look;
5306 bfd_vma val;
5307
5308 /* No relocs implies we are linking a --just-symbols object, or looking
5309 at a final linked executable with addr2line or somesuch. */
5310 if (opd_sec->reloc_count == 0)
5311 {
5312 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5313
5314 if (contents == NULL)
5315 {
5316 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5317 return (bfd_vma) -1;
5318 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5319 }
5320
5321 /* PR 17512: file: 64b9dfbb. */
5322 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5323 return (bfd_vma) -1;
5324
5325 val = bfd_get_64 (opd_bfd, contents + offset);
5326 if (code_sec != NULL)
5327 {
5328 asection *sec, *likely = NULL;
5329
5330 if (in_code_sec)
5331 {
5332 sec = *code_sec;
5333 if (sec->vma <= val
5334 && val < sec->vma + sec->size)
5335 likely = sec;
5336 else
5337 val = -1;
5338 }
5339 else
5340 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5341 if (sec->vma <= val
5342 && (sec->flags & SEC_LOAD) != 0
5343 && (sec->flags & SEC_ALLOC) != 0)
5344 likely = sec;
5345 if (likely != NULL)
5346 {
5347 *code_sec = likely;
5348 if (code_off != NULL)
5349 *code_off = val - likely->vma;
5350 }
5351 }
5352 return val;
5353 }
5354
5355 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5356
5357 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
5358 if (relocs == NULL)
5359 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
5360 /* PR 17512: file: df8e1fd6. */
5361 if (relocs == NULL)
5362 return (bfd_vma) -1;
5363
5364 /* Go find the opd reloc at the sym address. */
5365 lo = relocs;
5366 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
5367 val = (bfd_vma) -1;
5368 while (lo < hi)
5369 {
5370 look = lo + (hi - lo) / 2;
5371 if (look->r_offset < offset)
5372 lo = look + 1;
5373 else if (look->r_offset > offset)
5374 hi = look;
5375 else
5376 {
5377 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5378
5379 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5380 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5381 {
5382 unsigned long symndx = ELF64_R_SYM (look->r_info);
5383 asection *sec = NULL;
5384
5385 if (symndx >= symtab_hdr->sh_info
5386 && elf_sym_hashes (opd_bfd) != NULL)
5387 {
5388 struct elf_link_hash_entry **sym_hashes;
5389 struct elf_link_hash_entry *rh;
5390
5391 sym_hashes = elf_sym_hashes (opd_bfd);
5392 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5393 if (rh != NULL)
5394 {
5395 rh = elf_follow_link (rh);
5396 if (rh->root.type != bfd_link_hash_defined
5397 && rh->root.type != bfd_link_hash_defweak)
5398 break;
5399 if (rh->root.u.def.section->owner == opd_bfd)
5400 {
5401 val = rh->root.u.def.value;
5402 sec = rh->root.u.def.section;
5403 }
5404 }
5405 }
5406
5407 if (sec == NULL)
5408 {
5409 Elf_Internal_Sym *sym;
5410
5411 if (symndx < symtab_hdr->sh_info)
5412 {
5413 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5414 if (sym == NULL)
5415 {
5416 size_t symcnt = symtab_hdr->sh_info;
5417 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5418 symcnt, 0,
5419 NULL, NULL, NULL);
5420 if (sym == NULL)
5421 break;
5422 symtab_hdr->contents = (bfd_byte *) sym;
5423 }
5424 sym += symndx;
5425 }
5426 else
5427 {
5428 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5429 1, symndx,
5430 NULL, NULL, NULL);
5431 if (sym == NULL)
5432 break;
5433 }
5434 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5435 if (sec == NULL)
5436 break;
5437 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5438 val = sym->st_value;
5439 }
5440
5441 val += look->r_addend;
5442 if (code_off != NULL)
5443 *code_off = val;
5444 if (code_sec != NULL)
5445 {
5446 if (in_code_sec && *code_sec != sec)
5447 return -1;
5448 else
5449 *code_sec = sec;
5450 }
5451 if (sec->output_section != NULL)
5452 val += sec->output_section->vma + sec->output_offset;
5453 }
5454 break;
5455 }
5456 }
5457
5458 return val;
5459 }
5460
5461 /* If the ELF symbol SYM might be a function in SEC, return the
5462 function size and set *CODE_OFF to the function's entry point,
5463 otherwise return zero. */
5464
5465 static bfd_size_type
5466 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5467 bfd_vma *code_off)
5468 {
5469 bfd_size_type size;
5470
5471 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5472 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5473 return 0;
5474
5475 size = 0;
5476 if (!(sym->flags & BSF_SYNTHETIC))
5477 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5478
5479 if (strcmp (sym->section->name, ".opd") == 0)
5480 {
5481 struct _opd_sec_data *opd = get_opd_info (sym->section);
5482 bfd_vma symval = sym->value;
5483
5484 if (opd != NULL
5485 && opd->adjust != NULL
5486 && elf_section_data (sym->section)->relocs != NULL)
5487 {
5488 /* opd_entry_value will use cached relocs that have been
5489 adjusted, but with raw symbols. That means both local
5490 and global symbols need adjusting. */
5491 long adjust = opd->adjust[OPD_NDX (symval)];
5492 if (adjust == -1)
5493 return 0;
5494 symval += adjust;
5495 }
5496
5497 if (opd_entry_value (sym->section, symval,
5498 &sec, code_off, TRUE) == (bfd_vma) -1)
5499 return 0;
5500 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5501 symbol. This size has nothing to do with the code size of the
5502 function, which is what we're supposed to return, but the
5503 code size isn't available without looking up the dot-sym.
5504 However, doing that would be a waste of time particularly
5505 since elf_find_function will look at the dot-sym anyway.
5506 Now, elf_find_function will keep the largest size of any
5507 function sym found at the code address of interest, so return
5508 1 here to avoid it incorrectly caching a larger function size
5509 for a small function. This does mean we return the wrong
5510 size for a new-ABI function of size 24, but all that does is
5511 disable caching for such functions. */
5512 if (size == 24)
5513 size = 1;
5514 }
5515 else
5516 {
5517 if (sym->section != sec)
5518 return 0;
5519 *code_off = sym->value;
5520 }
5521 if (size == 0)
5522 size = 1;
5523 return size;
5524 }
5525
5526 /* Return true if symbol is a strong function defined in an ELFv2
5527 object with st_other localentry bits of zero, ie. its local entry
5528 point coincides with its global entry point. */
5529
5530 static bfd_boolean
5531 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5532 {
5533 return (h != NULL
5534 && h->type == STT_FUNC
5535 && h->root.type == bfd_link_hash_defined
5536 && (STO_PPC64_LOCAL_MASK & h->other) == 0
5537 && !ppc_elf_hash_entry (h)->non_zero_localentry
5538 && is_ppc64_elf (h->root.u.def.section->owner)
5539 && abiversion (h->root.u.def.section->owner) >= 2);
5540 }
5541
5542 /* Return true if symbol is defined in a regular object file. */
5543
5544 static bfd_boolean
5545 is_static_defined (struct elf_link_hash_entry *h)
5546 {
5547 return ((h->root.type == bfd_link_hash_defined
5548 || h->root.type == bfd_link_hash_defweak)
5549 && h->root.u.def.section != NULL
5550 && h->root.u.def.section->output_section != NULL);
5551 }
5552
5553 /* If FDH is a function descriptor symbol, return the associated code
5554 entry symbol if it is defined. Return NULL otherwise. */
5555
5556 static struct ppc_link_hash_entry *
5557 defined_code_entry (struct ppc_link_hash_entry *fdh)
5558 {
5559 if (fdh->is_func_descriptor)
5560 {
5561 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5562 if (fh->elf.root.type == bfd_link_hash_defined
5563 || fh->elf.root.type == bfd_link_hash_defweak)
5564 return fh;
5565 }
5566 return NULL;
5567 }
5568
5569 /* If FH is a function code entry symbol, return the associated
5570 function descriptor symbol if it is defined. Return NULL otherwise. */
5571
5572 static struct ppc_link_hash_entry *
5573 defined_func_desc (struct ppc_link_hash_entry *fh)
5574 {
5575 if (fh->oh != NULL
5576 && fh->oh->is_func_descriptor)
5577 {
5578 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5579 if (fdh->elf.root.type == bfd_link_hash_defined
5580 || fdh->elf.root.type == bfd_link_hash_defweak)
5581 return fdh;
5582 }
5583 return NULL;
5584 }
5585
5586 /* Given H is a symbol that satisfies is_static_defined, return the
5587 value in the output file. */
5588
5589 static bfd_vma
5590 defined_sym_val (struct elf_link_hash_entry *h)
5591 {
5592 return (h->root.u.def.section->output_section->vma
5593 + h->root.u.def.section->output_offset
5594 + h->root.u.def.value);
5595 }
5596
5597 /* Return true if H matches __tls_get_addr or one of its variants. */
5598
5599 static bfd_boolean
5600 is_tls_get_addr (struct elf_link_hash_entry *h,
5601 struct ppc_link_hash_table *htab)
5602 {
5603 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5604 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
5605 }
5606
5607 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5608
5609 /* Garbage collect sections, after first dealing with dot-symbols. */
5610
5611 static bfd_boolean
5612 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5613 {
5614 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5615
5616 if (htab != NULL && htab->need_func_desc_adj)
5617 {
5618 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5619 htab->need_func_desc_adj = 0;
5620 }
5621 return bfd_elf_gc_sections (abfd, info);
5622 }
5623
5624 /* Mark all our entry sym sections, both opd and code section. */
5625
5626 static void
5627 ppc64_elf_gc_keep (struct bfd_link_info *info)
5628 {
5629 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5630 struct bfd_sym_chain *sym;
5631
5632 if (htab == NULL)
5633 return;
5634
5635 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5636 {
5637 struct ppc_link_hash_entry *eh, *fh;
5638 asection *sec;
5639
5640 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5641 FALSE, FALSE, TRUE));
5642 if (eh == NULL)
5643 continue;
5644 if (eh->elf.root.type != bfd_link_hash_defined
5645 && eh->elf.root.type != bfd_link_hash_defweak)
5646 continue;
5647
5648 fh = defined_code_entry (eh);
5649 if (fh != NULL)
5650 {
5651 sec = fh->elf.root.u.def.section;
5652 sec->flags |= SEC_KEEP;
5653 }
5654 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5655 && opd_entry_value (eh->elf.root.u.def.section,
5656 eh->elf.root.u.def.value,
5657 &sec, NULL, FALSE) != (bfd_vma) -1)
5658 sec->flags |= SEC_KEEP;
5659
5660 sec = eh->elf.root.u.def.section;
5661 sec->flags |= SEC_KEEP;
5662 }
5663 }
5664
5665 /* Mark sections containing dynamically referenced symbols. When
5666 building shared libraries, we must assume that any visible symbol is
5667 referenced. */
5668
5669 static bfd_boolean
5670 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5671 {
5672 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5673 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
5674 struct ppc_link_hash_entry *fdh;
5675 struct bfd_elf_dynamic_list *d = info->dynamic_list;
5676
5677 /* Dynamic linking info is on the func descriptor sym. */
5678 fdh = defined_func_desc (eh);
5679 if (fdh != NULL)
5680 eh = fdh;
5681
5682 if ((eh->elf.root.type == bfd_link_hash_defined
5683 || eh->elf.root.type == bfd_link_hash_defweak)
5684 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
5685 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
5686 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5687 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
5688 && (!bfd_link_executable (info)
5689 || info->gc_keep_exported
5690 || info->export_dynamic
5691 || (eh->elf.dynamic
5692 && d != NULL
5693 && (*d->match) (&d->head, NULL,
5694 eh->elf.root.root.string)))
5695 && (eh->elf.versioned >= versioned
5696 || !bfd_hide_sym_by_version (info->version_info,
5697 eh->elf.root.root.string)))))
5698 {
5699 asection *code_sec;
5700 struct ppc_link_hash_entry *fh;
5701
5702 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5703
5704 /* Function descriptor syms cause the associated
5705 function code sym section to be marked. */
5706 fh = defined_code_entry (eh);
5707 if (fh != NULL)
5708 {
5709 code_sec = fh->elf.root.u.def.section;
5710 code_sec->flags |= SEC_KEEP;
5711 }
5712 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5713 && opd_entry_value (eh->elf.root.u.def.section,
5714 eh->elf.root.u.def.value,
5715 &code_sec, NULL, FALSE) != (bfd_vma) -1)
5716 code_sec->flags |= SEC_KEEP;
5717 }
5718
5719 return TRUE;
5720 }
5721
5722 /* Return the section that should be marked against GC for a given
5723 relocation. */
5724
5725 static asection *
5726 ppc64_elf_gc_mark_hook (asection *sec,
5727 struct bfd_link_info *info,
5728 Elf_Internal_Rela *rel,
5729 struct elf_link_hash_entry *h,
5730 Elf_Internal_Sym *sym)
5731 {
5732 asection *rsec;
5733
5734 /* Syms return NULL if we're marking .opd, so we avoid marking all
5735 function sections, as all functions are referenced in .opd. */
5736 rsec = NULL;
5737 if (get_opd_info (sec) != NULL)
5738 return rsec;
5739
5740 if (h != NULL)
5741 {
5742 enum elf_ppc64_reloc_type r_type;
5743 struct ppc_link_hash_entry *eh, *fh, *fdh;
5744
5745 r_type = ELF64_R_TYPE (rel->r_info);
5746 switch (r_type)
5747 {
5748 case R_PPC64_GNU_VTINHERIT:
5749 case R_PPC64_GNU_VTENTRY:
5750 break;
5751
5752 default:
5753 switch (h->root.type)
5754 {
5755 case bfd_link_hash_defined:
5756 case bfd_link_hash_defweak:
5757 eh = ppc_elf_hash_entry (h);
5758 fdh = defined_func_desc (eh);
5759 if (fdh != NULL)
5760 {
5761 /* -mcall-aixdesc code references the dot-symbol on
5762 a call reloc. Mark the function descriptor too
5763 against garbage collection. */
5764 fdh->elf.mark = 1;
5765 if (fdh->elf.is_weakalias)
5766 weakdef (&fdh->elf)->mark = 1;
5767 eh = fdh;
5768 }
5769
5770 /* Function descriptor syms cause the associated
5771 function code sym section to be marked. */
5772 fh = defined_code_entry (eh);
5773 if (fh != NULL)
5774 {
5775 /* They also mark their opd section. */
5776 eh->elf.root.u.def.section->gc_mark = 1;
5777
5778 rsec = fh->elf.root.u.def.section;
5779 }
5780 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5781 && opd_entry_value (eh->elf.root.u.def.section,
5782 eh->elf.root.u.def.value,
5783 &rsec, NULL, FALSE) != (bfd_vma) -1)
5784 eh->elf.root.u.def.section->gc_mark = 1;
5785 else
5786 rsec = h->root.u.def.section;
5787 break;
5788
5789 case bfd_link_hash_common:
5790 rsec = h->root.u.c.p->section;
5791 break;
5792
5793 default:
5794 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5795 }
5796 }
5797 }
5798 else
5799 {
5800 struct _opd_sec_data *opd;
5801
5802 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5803 opd = get_opd_info (rsec);
5804 if (opd != NULL && opd->func_sec != NULL)
5805 {
5806 rsec->gc_mark = 1;
5807
5808 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
5809 }
5810 }
5811
5812 return rsec;
5813 }
5814
5815 /* The maximum size of .sfpr. */
5816 #define SFPR_MAX (218*4)
5817
5818 struct sfpr_def_parms
5819 {
5820 const char name[12];
5821 unsigned char lo, hi;
5822 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5823 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
5824 };
5825
5826 /* Auto-generate _save*, _rest* functions in .sfpr.
5827 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5828 instead. */
5829
5830 static bfd_boolean
5831 sfpr_define (struct bfd_link_info *info,
5832 const struct sfpr_def_parms *parm,
5833 asection *stub_sec)
5834 {
5835 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5836 unsigned int i;
5837 size_t len = strlen (parm->name);
5838 bfd_boolean writing = FALSE;
5839 char sym[16];
5840
5841 if (htab == NULL)
5842 return FALSE;
5843
5844 memcpy (sym, parm->name, len);
5845 sym[len + 2] = 0;
5846
5847 for (i = parm->lo; i <= parm->hi; i++)
5848 {
5849 struct ppc_link_hash_entry *h;
5850
5851 sym[len + 0] = i / 10 + '0';
5852 sym[len + 1] = i % 10 + '0';
5853 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5854 writing, TRUE, TRUE));
5855 if (stub_sec != NULL)
5856 {
5857 if (h != NULL
5858 && h->elf.root.type == bfd_link_hash_defined
5859 && h->elf.root.u.def.section == htab->sfpr)
5860 {
5861 struct elf_link_hash_entry *s;
5862 char buf[32];
5863 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5864 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5865 if (s == NULL)
5866 return FALSE;
5867 if (s->root.type == bfd_link_hash_new)
5868 {
5869 s->root.type = bfd_link_hash_defined;
5870 s->root.u.def.section = stub_sec;
5871 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
5872 + h->elf.root.u.def.value);
5873 s->ref_regular = 1;
5874 s->def_regular = 1;
5875 s->ref_regular_nonweak = 1;
5876 s->forced_local = 1;
5877 s->non_elf = 0;
5878 s->root.linker_def = 1;
5879 }
5880 }
5881 continue;
5882 }
5883 if (h != NULL)
5884 {
5885 h->save_res = 1;
5886 if (!h->elf.def_regular)
5887 {
5888 h->elf.root.type = bfd_link_hash_defined;
5889 h->elf.root.u.def.section = htab->sfpr;
5890 h->elf.root.u.def.value = htab->sfpr->size;
5891 h->elf.type = STT_FUNC;
5892 h->elf.def_regular = 1;
5893 h->elf.non_elf = 0;
5894 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5895 writing = TRUE;
5896 if (htab->sfpr->contents == NULL)
5897 {
5898 htab->sfpr->contents
5899 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5900 if (htab->sfpr->contents == NULL)
5901 return FALSE;
5902 }
5903 }
5904 }
5905 if (writing)
5906 {
5907 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5908 if (i != parm->hi)
5909 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5910 else
5911 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5912 htab->sfpr->size = p - htab->sfpr->contents;
5913 }
5914 }
5915
5916 return TRUE;
5917 }
5918
5919 static bfd_byte *
5920 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5921 {
5922 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5923 return p + 4;
5924 }
5925
5926 static bfd_byte *
5927 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5928 {
5929 p = savegpr0 (abfd, p, r);
5930 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
5931 p = p + 4;
5932 bfd_put_32 (abfd, BLR, p);
5933 return p + 4;
5934 }
5935
5936 static bfd_byte *
5937 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5938 {
5939 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5940 return p + 4;
5941 }
5942
5943 static bfd_byte *
5944 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5945 {
5946 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
5947 p = p + 4;
5948 p = restgpr0 (abfd, p, r);
5949 bfd_put_32 (abfd, MTLR_R0, p);
5950 p = p + 4;
5951 if (r == 29)
5952 {
5953 p = restgpr0 (abfd, p, 30);
5954 p = restgpr0 (abfd, p, 31);
5955 }
5956 bfd_put_32 (abfd, BLR, p);
5957 return p + 4;
5958 }
5959
5960 static bfd_byte *
5961 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5962 {
5963 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5964 return p + 4;
5965 }
5966
5967 static bfd_byte *
5968 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5969 {
5970 p = savegpr1 (abfd, p, r);
5971 bfd_put_32 (abfd, BLR, p);
5972 return p + 4;
5973 }
5974
5975 static bfd_byte *
5976 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5977 {
5978 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5979 return p + 4;
5980 }
5981
5982 static bfd_byte *
5983 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5984 {
5985 p = restgpr1 (abfd, p, r);
5986 bfd_put_32 (abfd, BLR, p);
5987 return p + 4;
5988 }
5989
5990 static bfd_byte *
5991 savefpr (bfd *abfd, bfd_byte *p, int r)
5992 {
5993 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5994 return p + 4;
5995 }
5996
5997 static bfd_byte *
5998 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5999 {
6000 p = savefpr (abfd, p, r);
6001 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6002 p = p + 4;
6003 bfd_put_32 (abfd, BLR, p);
6004 return p + 4;
6005 }
6006
6007 static bfd_byte *
6008 restfpr (bfd *abfd, bfd_byte *p, int r)
6009 {
6010 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6011 return p + 4;
6012 }
6013
6014 static bfd_byte *
6015 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6016 {
6017 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6018 p = p + 4;
6019 p = restfpr (abfd, p, r);
6020 bfd_put_32 (abfd, MTLR_R0, p);
6021 p = p + 4;
6022 if (r == 29)
6023 {
6024 p = restfpr (abfd, p, 30);
6025 p = restfpr (abfd, p, 31);
6026 }
6027 bfd_put_32 (abfd, BLR, p);
6028 return p + 4;
6029 }
6030
6031 static bfd_byte *
6032 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6033 {
6034 p = savefpr (abfd, p, r);
6035 bfd_put_32 (abfd, BLR, p);
6036 return p + 4;
6037 }
6038
6039 static bfd_byte *
6040 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6041 {
6042 p = restfpr (abfd, p, r);
6043 bfd_put_32 (abfd, BLR, p);
6044 return p + 4;
6045 }
6046
6047 static bfd_byte *
6048 savevr (bfd *abfd, bfd_byte *p, int r)
6049 {
6050 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6051 p = p + 4;
6052 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6053 return p + 4;
6054 }
6055
6056 static bfd_byte *
6057 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6058 {
6059 p = savevr (abfd, p, r);
6060 bfd_put_32 (abfd, BLR, p);
6061 return p + 4;
6062 }
6063
6064 static bfd_byte *
6065 restvr (bfd *abfd, bfd_byte *p, int r)
6066 {
6067 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6068 p = p + 4;
6069 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6070 return p + 4;
6071 }
6072
6073 static bfd_byte *
6074 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6075 {
6076 p = restvr (abfd, p, r);
6077 bfd_put_32 (abfd, BLR, p);
6078 return p + 4;
6079 }
6080
6081 #define STDU_R1_0R1 0xf8210001
6082 #define ADDI_R1_R1 0x38210000
6083
6084 /* Emit prologue of wrapper preserving regs around a call to
6085 __tls_get_addr_opt. */
6086
6087 static bfd_byte *
6088 tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6089 {
6090 unsigned int i;
6091
6092 bfd_put_32 (obfd, MFLR_R0, p);
6093 p += 4;
6094 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6095 p += 4;
6096
6097 if (htab->opd_abi)
6098 {
6099 for (i = 4; i < 12; i++)
6100 {
6101 bfd_put_32 (obfd,
6102 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6103 p += 4;
6104 }
6105 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6106 p += 4;
6107 }
6108 else
6109 {
6110 for (i = 4; i < 12; i++)
6111 {
6112 bfd_put_32 (obfd,
6113 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6114 p += 4;
6115 }
6116 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6117 p += 4;
6118 }
6119 return p;
6120 }
6121
6122 /* Emit epilogue of wrapper preserving regs around a call to
6123 __tls_get_addr_opt. */
6124
6125 static bfd_byte *
6126 tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6127 {
6128 unsigned int i;
6129
6130 if (htab->opd_abi)
6131 {
6132 for (i = 4; i < 12; i++)
6133 {
6134 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6135 p += 4;
6136 }
6137 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6138 p += 4;
6139 }
6140 else
6141 {
6142 for (i = 4; i < 12; i++)
6143 {
6144 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6145 p += 4;
6146 }
6147 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6148 p += 4;
6149 }
6150 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6151 p += 4;
6152 bfd_put_32 (obfd, MTLR_R0, p);
6153 p += 4;
6154 bfd_put_32 (obfd, BLR, p);
6155 p += 4;
6156 return p;
6157 }
6158
6159 /* Called via elf_link_hash_traverse to transfer dynamic linking
6160 information on function code symbol entries to their corresponding
6161 function descriptor symbol entries. */
6162
6163 static bfd_boolean
6164 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6165 {
6166 struct bfd_link_info *info;
6167 struct ppc_link_hash_table *htab;
6168 struct ppc_link_hash_entry *fh;
6169 struct ppc_link_hash_entry *fdh;
6170 bfd_boolean force_local;
6171
6172 fh = ppc_elf_hash_entry (h);
6173 if (fh->elf.root.type == bfd_link_hash_indirect)
6174 return TRUE;
6175
6176 if (!fh->is_func)
6177 return TRUE;
6178
6179 if (fh->elf.root.root.string[0] != '.'
6180 || fh->elf.root.root.string[1] == '\0')
6181 return TRUE;
6182
6183 info = inf;
6184 htab = ppc_hash_table (info);
6185 if (htab == NULL)
6186 return FALSE;
6187
6188 /* Find the corresponding function descriptor symbol. */
6189 fdh = lookup_fdh (fh, htab);
6190
6191 /* Resolve undefined references to dot-symbols as the value
6192 in the function descriptor, if we have one in a regular object.
6193 This is to satisfy cases like ".quad .foo". Calls to functions
6194 in dynamic objects are handled elsewhere. */
6195 if ((fh->elf.root.type == bfd_link_hash_undefined
6196 || fh->elf.root.type == bfd_link_hash_undefweak)
6197 && (fdh->elf.root.type == bfd_link_hash_defined
6198 || fdh->elf.root.type == bfd_link_hash_defweak)
6199 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6200 && opd_entry_value (fdh->elf.root.u.def.section,
6201 fdh->elf.root.u.def.value,
6202 &fh->elf.root.u.def.section,
6203 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6204 {
6205 fh->elf.root.type = fdh->elf.root.type;
6206 fh->elf.forced_local = 1;
6207 fh->elf.def_regular = fdh->elf.def_regular;
6208 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6209 }
6210
6211 if (!fh->elf.dynamic)
6212 {
6213 struct plt_entry *ent;
6214
6215 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6216 if (ent->plt.refcount > 0)
6217 break;
6218 if (ent == NULL)
6219 return TRUE;
6220 }
6221
6222 /* Create a descriptor as undefined if necessary. */
6223 if (fdh == NULL
6224 && !bfd_link_executable (info)
6225 && (fh->elf.root.type == bfd_link_hash_undefined
6226 || fh->elf.root.type == bfd_link_hash_undefweak))
6227 {
6228 fdh = make_fdh (info, fh);
6229 if (fdh == NULL)
6230 return FALSE;
6231 }
6232
6233 /* We can't support overriding of symbols on a fake descriptor. */
6234 if (fdh != NULL
6235 && fdh->fake
6236 && (fh->elf.root.type == bfd_link_hash_defined
6237 || fh->elf.root.type == bfd_link_hash_defweak))
6238 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6239
6240 /* Transfer dynamic linking information to the function descriptor. */
6241 if (fdh != NULL)
6242 {
6243 fdh->elf.ref_regular |= fh->elf.ref_regular;
6244 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6245 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6246 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6247 fdh->elf.dynamic |= fh->elf.dynamic;
6248 fdh->elf.needs_plt |= (fh->elf.needs_plt
6249 || fh->elf.type == STT_FUNC
6250 || fh->elf.type == STT_GNU_IFUNC);
6251 move_plt_plist (fh, fdh);
6252
6253 if (!fdh->elf.forced_local
6254 && fh->elf.dynindx != -1)
6255 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6256 return FALSE;
6257 }
6258
6259 /* Now that the info is on the function descriptor, clear the
6260 function code sym info. Any function code syms for which we
6261 don't have a definition in a regular file, we force local.
6262 This prevents a shared library from exporting syms that have
6263 been imported from another library. Function code syms that
6264 are really in the library we must leave global to prevent the
6265 linker dragging in a definition from a static library. */
6266 force_local = (!fh->elf.def_regular
6267 || fdh == NULL
6268 || !fdh->elf.def_regular
6269 || fdh->elf.forced_local);
6270 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6271
6272 return TRUE;
6273 }
6274
6275 static const struct sfpr_def_parms save_res_funcs[] =
6276 {
6277 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6278 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6279 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6280 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6281 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6282 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6283 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6284 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6285 { "._savef", 14, 31, savefpr, savefpr1_tail },
6286 { "._restf", 14, 31, restfpr, restfpr1_tail },
6287 { "_savevr_", 20, 31, savevr, savevr_tail },
6288 { "_restvr_", 20, 31, restvr, restvr_tail }
6289 };
6290
6291 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6292 this hook to a) provide some gcc support functions, and b) transfer
6293 dynamic linking information gathered so far on function code symbol
6294 entries, to their corresponding function descriptor symbol entries. */
6295
6296 static bfd_boolean
6297 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6298 struct bfd_link_info *info)
6299 {
6300 struct ppc_link_hash_table *htab;
6301
6302 htab = ppc_hash_table (info);
6303 if (htab == NULL)
6304 return FALSE;
6305
6306 /* Provide any missing _save* and _rest* functions. */
6307 if (htab->sfpr != NULL)
6308 {
6309 unsigned int i;
6310
6311 htab->sfpr->size = 0;
6312 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6313 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6314 return FALSE;
6315 if (htab->sfpr->size == 0)
6316 htab->sfpr->flags |= SEC_EXCLUDE;
6317 }
6318
6319 if (bfd_link_relocatable (info))
6320 return TRUE;
6321
6322 if (htab->elf.hgot != NULL)
6323 {
6324 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6325 /* Make .TOC. defined so as to prevent it being made dynamic.
6326 The wrong value here is fixed later in ppc64_elf_set_toc. */
6327 if (!htab->elf.hgot->def_regular
6328 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6329 {
6330 htab->elf.hgot->root.type = bfd_link_hash_defined;
6331 htab->elf.hgot->root.u.def.value = 0;
6332 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6333 htab->elf.hgot->def_regular = 1;
6334 htab->elf.hgot->root.linker_def = 1;
6335 }
6336 htab->elf.hgot->type = STT_OBJECT;
6337 htab->elf.hgot->other
6338 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
6339 }
6340
6341 if (htab->need_func_desc_adj)
6342 {
6343 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6344 htab->need_func_desc_adj = 0;
6345 }
6346
6347 return TRUE;
6348 }
6349
6350 /* Return true if we have dynamic relocs against H or any of its weak
6351 aliases, that apply to read-only sections. Cannot be used after
6352 size_dynamic_sections. */
6353
6354 static bfd_boolean
6355 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6356 {
6357 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
6358 do
6359 {
6360 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
6361 return TRUE;
6362 eh = ppc_elf_hash_entry (eh->elf.u.alias);
6363 }
6364 while (eh != NULL && &eh->elf != h);
6365
6366 return FALSE;
6367 }
6368
6369 /* Return whether EH has pc-relative dynamic relocs. */
6370
6371 static bfd_boolean
6372 pc_dynrelocs (struct ppc_link_hash_entry *eh)
6373 {
6374 struct elf_dyn_relocs *p;
6375
6376 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
6377 if (p->pc_count != 0)
6378 return TRUE;
6379 return FALSE;
6380 }
6381
6382 /* Return true if a global entry stub will be created for H. Valid
6383 for ELFv2 before plt entries have been allocated. */
6384
6385 static bfd_boolean
6386 global_entry_stub (struct elf_link_hash_entry *h)
6387 {
6388 struct plt_entry *pent;
6389
6390 if (!h->pointer_equality_needed
6391 || h->def_regular)
6392 return FALSE;
6393
6394 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6395 if (pent->plt.refcount > 0
6396 && pent->addend == 0)
6397 return TRUE;
6398
6399 return FALSE;
6400 }
6401
6402 /* Adjust a symbol defined by a dynamic object and referenced by a
6403 regular object. The current definition is in some section of the
6404 dynamic object, but we're not including those sections. We have to
6405 change the definition to something the rest of the link can
6406 understand. */
6407
6408 static bfd_boolean
6409 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6410 struct elf_link_hash_entry *h)
6411 {
6412 struct ppc_link_hash_table *htab;
6413 asection *s, *srel;
6414
6415 htab = ppc_hash_table (info);
6416 if (htab == NULL)
6417 return FALSE;
6418
6419 /* Deal with function syms. */
6420 if (h->type == STT_FUNC
6421 || h->type == STT_GNU_IFUNC
6422 || h->needs_plt)
6423 {
6424 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
6425 || SYMBOL_CALLS_LOCAL (info, h)
6426 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6427 /* Discard dyn_relocs when non-pic if we've decided that a
6428 function symbol is local and not an ifunc. We keep dynamic
6429 relocs for ifuncs when local rather than always emitting a
6430 plt call stub for them and defining the symbol on the call
6431 stub. We can't do that for ELFv1 anyway (a function symbol
6432 is defined on a descriptor, not code) and it can be faster at
6433 run-time due to not needing to bounce through a stub. The
6434 dyn_relocs for ifuncs will be applied even in a static
6435 executable. */
6436 if (!bfd_link_pic (info)
6437 && h->type != STT_GNU_IFUNC
6438 && local)
6439 h->dyn_relocs = NULL;
6440
6441 /* Clear procedure linkage table information for any symbol that
6442 won't need a .plt entry. */
6443 struct plt_entry *ent;
6444 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6445 if (ent->plt.refcount > 0)
6446 break;
6447 if (ent == NULL
6448 || (h->type != STT_GNU_IFUNC
6449 && local
6450 && (htab->can_convert_all_inline_plt
6451 || (ppc_elf_hash_entry (h)->tls_mask
6452 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
6453 {
6454 h->plt.plist = NULL;
6455 h->needs_plt = 0;
6456 h->pointer_equality_needed = 0;
6457 }
6458 else if (abiversion (info->output_bfd) >= 2)
6459 {
6460 /* Taking a function's address in a read/write section
6461 doesn't require us to define the function symbol in the
6462 executable on a global entry stub. A dynamic reloc can
6463 be used instead. The reason we prefer a few more dynamic
6464 relocs is that calling via a global entry stub costs a
6465 few more instructions, and pointer_equality_needed causes
6466 extra work in ld.so when resolving these symbols. */
6467 if (global_entry_stub (h))
6468 {
6469 if (!_bfd_elf_readonly_dynrelocs (h))
6470 {
6471 h->pointer_equality_needed = 0;
6472 /* If we haven't seen a branch reloc and the symbol
6473 isn't an ifunc then we don't need a plt entry. */
6474 if (!h->needs_plt)
6475 h->plt.plist = NULL;
6476 }
6477 else if (!bfd_link_pic (info))
6478 /* We are going to be defining the function symbol on the
6479 plt stub, so no dyn_relocs needed when non-pic. */
6480 h->dyn_relocs = NULL;
6481 }
6482
6483 /* ELFv2 function symbols can't have copy relocs. */
6484 return TRUE;
6485 }
6486 else if (!h->needs_plt
6487 && !_bfd_elf_readonly_dynrelocs (h))
6488 {
6489 /* If we haven't seen a branch reloc and the symbol isn't an
6490 ifunc then we don't need a plt entry. */
6491 h->plt.plist = NULL;
6492 h->pointer_equality_needed = 0;
6493 return TRUE;
6494 }
6495 }
6496 else
6497 h->plt.plist = NULL;
6498
6499 /* If this is a weak symbol, and there is a real definition, the
6500 processor independent code will have arranged for us to see the
6501 real definition first, and we can just use the same value. */
6502 if (h->is_weakalias)
6503 {
6504 struct elf_link_hash_entry *def = weakdef (h);
6505 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6506 h->root.u.def.section = def->root.u.def.section;
6507 h->root.u.def.value = def->root.u.def.value;
6508 if (def->root.u.def.section == htab->elf.sdynbss
6509 || def->root.u.def.section == htab->elf.sdynrelro)
6510 h->dyn_relocs = NULL;
6511 return TRUE;
6512 }
6513
6514 /* If we are creating a shared library, we must presume that the
6515 only references to the symbol are via the global offset table.
6516 For such cases we need not do anything here; the relocations will
6517 be handled correctly by relocate_section. */
6518 if (!bfd_link_executable (info))
6519 return TRUE;
6520
6521 /* If there are no references to this symbol that do not use the
6522 GOT, we don't need to generate a copy reloc. */
6523 if (!h->non_got_ref)
6524 return TRUE;
6525
6526 /* Don't generate a copy reloc for symbols defined in the executable. */
6527 if (!h->def_dynamic || !h->ref_regular || h->def_regular
6528
6529 /* If -z nocopyreloc was given, don't generate them either. */
6530 || info->nocopyreloc
6531
6532 /* If we don't find any dynamic relocs in read-only sections, then
6533 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
6534 || (ELIMINATE_COPY_RELOCS
6535 && !h->needs_copy
6536 && !alias_readonly_dynrelocs (h))
6537
6538 /* Protected variables do not work with .dynbss. The copy in
6539 .dynbss won't be used by the shared library with the protected
6540 definition for the variable. Text relocations are preferable
6541 to an incorrect program. */
6542 || h->protected_def)
6543 return TRUE;
6544
6545 if (h->type == STT_FUNC
6546 || h->type == STT_GNU_IFUNC)
6547 {
6548 /* .dynbss copies of function symbols only work if we have
6549 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6550 use dot-symbols and set the function symbol size to the text
6551 size of the function rather than the size of the descriptor.
6552 That's wrong for copying a descriptor. */
6553 if (ppc_elf_hash_entry (h)->oh == NULL
6554 || !(h->size == 24 || h->size == 16))
6555 return TRUE;
6556
6557 /* We should never get here, but unfortunately there are old
6558 versions of gcc (circa gcc-3.2) that improperly for the
6559 ELFv1 ABI put initialized function pointers, vtable refs and
6560 suchlike in read-only sections. Allow them to proceed, but
6561 warn that this might break at runtime. */
6562 info->callbacks->einfo
6563 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
6564 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
6565 h->root.root.string);
6566 }
6567
6568 /* This is a reference to a symbol defined by a dynamic object which
6569 is not a function. */
6570
6571 /* We must allocate the symbol in our .dynbss section, which will
6572 become part of the .bss section of the executable. There will be
6573 an entry for this symbol in the .dynsym section. The dynamic
6574 object will contain position independent code, so all references
6575 from the dynamic object to this symbol will go through the global
6576 offset table. The dynamic linker will use the .dynsym entry to
6577 determine the address it must put in the global offset table, so
6578 both the dynamic object and the regular object will refer to the
6579 same memory location for the variable. */
6580 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6581 {
6582 s = htab->elf.sdynrelro;
6583 srel = htab->elf.sreldynrelro;
6584 }
6585 else
6586 {
6587 s = htab->elf.sdynbss;
6588 srel = htab->elf.srelbss;
6589 }
6590 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
6591 {
6592 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6593 linker to copy the initial value out of the dynamic object
6594 and into the runtime process image. */
6595 srel->size += sizeof (Elf64_External_Rela);
6596 h->needs_copy = 1;
6597 }
6598
6599 /* We no longer want dyn_relocs. */
6600 h->dyn_relocs = NULL;
6601 return _bfd_elf_adjust_dynamic_copy (info, h, s);
6602 }
6603
6604 /* If given a function descriptor symbol, hide both the function code
6605 sym and the descriptor. */
6606 static void
6607 ppc64_elf_hide_symbol (struct bfd_link_info *info,
6608 struct elf_link_hash_entry *h,
6609 bfd_boolean force_local)
6610 {
6611 struct ppc_link_hash_entry *eh;
6612 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6613
6614 if (ppc_hash_table (info) == NULL)
6615 return;
6616
6617 eh = ppc_elf_hash_entry (h);
6618 if (eh->is_func_descriptor)
6619 {
6620 struct ppc_link_hash_entry *fh = eh->oh;
6621
6622 if (fh == NULL)
6623 {
6624 const char *p, *q;
6625 struct elf_link_hash_table *htab = elf_hash_table (info);
6626 char save;
6627
6628 /* We aren't supposed to use alloca in BFD because on
6629 systems which do not have alloca the version in libiberty
6630 calls xmalloc, which might cause the program to crash
6631 when it runs out of memory. This function doesn't have a
6632 return status, so there's no way to gracefully return an
6633 error. So cheat. We know that string[-1] can be safely
6634 accessed; It's either a string in an ELF string table,
6635 or allocated in an objalloc structure. */
6636
6637 p = eh->elf.root.root.string - 1;
6638 save = *p;
6639 *(char *) p = '.';
6640 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6641 FALSE, FALSE));
6642 *(char *) p = save;
6643
6644 /* Unfortunately, if it so happens that the string we were
6645 looking for was allocated immediately before this string,
6646 then we overwrote the string terminator. That's the only
6647 reason the lookup should fail. */
6648 if (fh == NULL)
6649 {
6650 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6651 while (q >= eh->elf.root.root.string && *q == *p)
6652 --q, --p;
6653 if (q < eh->elf.root.root.string && *p == '.')
6654 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6655 FALSE, FALSE));
6656 }
6657 if (fh != NULL)
6658 {
6659 eh->oh = fh;
6660 fh->oh = eh;
6661 }
6662 }
6663 if (fh != NULL)
6664 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6665 }
6666 }
6667
6668 static bfd_boolean
6669 get_sym_h (struct elf_link_hash_entry **hp,
6670 Elf_Internal_Sym **symp,
6671 asection **symsecp,
6672 unsigned char **tls_maskp,
6673 Elf_Internal_Sym **locsymsp,
6674 unsigned long r_symndx,
6675 bfd *ibfd)
6676 {
6677 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
6678
6679 if (r_symndx >= symtab_hdr->sh_info)
6680 {
6681 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6682 struct elf_link_hash_entry *h;
6683
6684 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6685 h = elf_follow_link (h);
6686
6687 if (hp != NULL)
6688 *hp = h;
6689
6690 if (symp != NULL)
6691 *symp = NULL;
6692
6693 if (symsecp != NULL)
6694 {
6695 asection *symsec = NULL;
6696 if (h->root.type == bfd_link_hash_defined
6697 || h->root.type == bfd_link_hash_defweak)
6698 symsec = h->root.u.def.section;
6699 *symsecp = symsec;
6700 }
6701
6702 if (tls_maskp != NULL)
6703 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
6704 }
6705 else
6706 {
6707 Elf_Internal_Sym *sym;
6708 Elf_Internal_Sym *locsyms = *locsymsp;
6709
6710 if (locsyms == NULL)
6711 {
6712 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6713 if (locsyms == NULL)
6714 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6715 symtab_hdr->sh_info,
6716 0, NULL, NULL, NULL);
6717 if (locsyms == NULL)
6718 return FALSE;
6719 *locsymsp = locsyms;
6720 }
6721 sym = locsyms + r_symndx;
6722
6723 if (hp != NULL)
6724 *hp = NULL;
6725
6726 if (symp != NULL)
6727 *symp = sym;
6728
6729 if (symsecp != NULL)
6730 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6731
6732 if (tls_maskp != NULL)
6733 {
6734 struct got_entry **lgot_ents;
6735 unsigned char *tls_mask;
6736
6737 tls_mask = NULL;
6738 lgot_ents = elf_local_got_ents (ibfd);
6739 if (lgot_ents != NULL)
6740 {
6741 struct plt_entry **local_plt = (struct plt_entry **)
6742 (lgot_ents + symtab_hdr->sh_info);
6743 unsigned char *lgot_masks = (unsigned char *)
6744 (local_plt + symtab_hdr->sh_info);
6745 tls_mask = &lgot_masks[r_symndx];
6746 }
6747 *tls_maskp = tls_mask;
6748 }
6749 }
6750 return TRUE;
6751 }
6752
6753 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6754 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6755 type suitable for optimization, and 1 otherwise. */
6756
6757 static int
6758 get_tls_mask (unsigned char **tls_maskp,
6759 unsigned long *toc_symndx,
6760 bfd_vma *toc_addend,
6761 Elf_Internal_Sym **locsymsp,
6762 const Elf_Internal_Rela *rel,
6763 bfd *ibfd)
6764 {
6765 unsigned long r_symndx;
6766 int next_r;
6767 struct elf_link_hash_entry *h;
6768 Elf_Internal_Sym *sym;
6769 asection *sec;
6770 bfd_vma off;
6771
6772 r_symndx = ELF64_R_SYM (rel->r_info);
6773 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6774 return 0;
6775
6776 if ((*tls_maskp != NULL
6777 && (**tls_maskp & TLS_TLS) != 0
6778 && **tls_maskp != (TLS_TLS | TLS_MARK))
6779 || sec == NULL
6780 || ppc64_elf_section_data (sec) == NULL
6781 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6782 return 1;
6783
6784 /* Look inside a TOC section too. */
6785 if (h != NULL)
6786 {
6787 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6788 off = h->root.u.def.value;
6789 }
6790 else
6791 off = sym->st_value;
6792 off += rel->r_addend;
6793 BFD_ASSERT (off % 8 == 0);
6794 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6795 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
6796 if (toc_symndx != NULL)
6797 *toc_symndx = r_symndx;
6798 if (toc_addend != NULL)
6799 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6800 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6801 return 0;
6802 if ((h == NULL || is_static_defined (h))
6803 && (next_r == -1 || next_r == -2))
6804 return 1 - next_r;
6805 return 1;
6806 }
6807
6808 /* Find (or create) an entry in the tocsave hash table. */
6809
6810 static struct tocsave_entry *
6811 tocsave_find (struct ppc_link_hash_table *htab,
6812 enum insert_option insert,
6813 Elf_Internal_Sym **local_syms,
6814 const Elf_Internal_Rela *irela,
6815 bfd *ibfd)
6816 {
6817 unsigned long r_indx;
6818 struct elf_link_hash_entry *h;
6819 Elf_Internal_Sym *sym;
6820 struct tocsave_entry ent, *p;
6821 hashval_t hash;
6822 struct tocsave_entry **slot;
6823
6824 r_indx = ELF64_R_SYM (irela->r_info);
6825 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6826 return NULL;
6827 if (ent.sec == NULL || ent.sec->output_section == NULL)
6828 {
6829 _bfd_error_handler
6830 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
6831 return NULL;
6832 }
6833
6834 if (h != NULL)
6835 ent.offset = h->root.u.def.value;
6836 else
6837 ent.offset = sym->st_value;
6838 ent.offset += irela->r_addend;
6839
6840 hash = tocsave_htab_hash (&ent);
6841 slot = ((struct tocsave_entry **)
6842 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6843 if (slot == NULL)
6844 return NULL;
6845
6846 if (*slot == NULL)
6847 {
6848 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6849 if (p == NULL)
6850 return NULL;
6851 *p = ent;
6852 *slot = p;
6853 }
6854 return *slot;
6855 }
6856
6857 /* Adjust all global syms defined in opd sections. In gcc generated
6858 code for the old ABI, these will already have been done. */
6859
6860 static bfd_boolean
6861 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6862 {
6863 struct ppc_link_hash_entry *eh;
6864 asection *sym_sec;
6865 struct _opd_sec_data *opd;
6866
6867 if (h->root.type == bfd_link_hash_indirect)
6868 return TRUE;
6869
6870 if (h->root.type != bfd_link_hash_defined
6871 && h->root.type != bfd_link_hash_defweak)
6872 return TRUE;
6873
6874 eh = ppc_elf_hash_entry (h);
6875 if (eh->adjust_done)
6876 return TRUE;
6877
6878 sym_sec = eh->elf.root.u.def.section;
6879 opd = get_opd_info (sym_sec);
6880 if (opd != NULL && opd->adjust != NULL)
6881 {
6882 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
6883 if (adjust == -1)
6884 {
6885 /* This entry has been deleted. */
6886 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6887 if (dsec == NULL)
6888 {
6889 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6890 if (discarded_section (dsec))
6891 {
6892 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6893 break;
6894 }
6895 }
6896 eh->elf.root.u.def.value = 0;
6897 eh->elf.root.u.def.section = dsec;
6898 }
6899 else
6900 eh->elf.root.u.def.value += adjust;
6901 eh->adjust_done = 1;
6902 }
6903 return TRUE;
6904 }
6905
6906 /* Handles decrementing dynamic reloc counts for the reloc specified by
6907 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
6908 have already been determined. */
6909
6910 static bfd_boolean
6911 dec_dynrel_count (bfd_vma r_info,
6912 asection *sec,
6913 struct bfd_link_info *info,
6914 Elf_Internal_Sym **local_syms,
6915 struct elf_link_hash_entry *h,
6916 Elf_Internal_Sym *sym)
6917 {
6918 enum elf_ppc64_reloc_type r_type;
6919 asection *sym_sec = NULL;
6920
6921 /* Can this reloc be dynamic? This switch, and later tests here
6922 should be kept in sync with the code in check_relocs. */
6923 r_type = ELF64_R_TYPE (r_info);
6924 switch (r_type)
6925 {
6926 default:
6927 return TRUE;
6928
6929 case R_PPC64_TOC16:
6930 case R_PPC64_TOC16_DS:
6931 case R_PPC64_TOC16_LO:
6932 case R_PPC64_TOC16_HI:
6933 case R_PPC64_TOC16_HA:
6934 case R_PPC64_TOC16_LO_DS:
6935 if (h == NULL)
6936 return TRUE;
6937 break;
6938
6939 case R_PPC64_TPREL16:
6940 case R_PPC64_TPREL16_LO:
6941 case R_PPC64_TPREL16_HI:
6942 case R_PPC64_TPREL16_HA:
6943 case R_PPC64_TPREL16_DS:
6944 case R_PPC64_TPREL16_LO_DS:
6945 case R_PPC64_TPREL16_HIGH:
6946 case R_PPC64_TPREL16_HIGHA:
6947 case R_PPC64_TPREL16_HIGHER:
6948 case R_PPC64_TPREL16_HIGHERA:
6949 case R_PPC64_TPREL16_HIGHEST:
6950 case R_PPC64_TPREL16_HIGHESTA:
6951 case R_PPC64_TPREL64:
6952 case R_PPC64_TPREL34:
6953 case R_PPC64_DTPMOD64:
6954 case R_PPC64_DTPREL64:
6955 case R_PPC64_ADDR64:
6956 case R_PPC64_REL30:
6957 case R_PPC64_REL32:
6958 case R_PPC64_REL64:
6959 case R_PPC64_ADDR14:
6960 case R_PPC64_ADDR14_BRNTAKEN:
6961 case R_PPC64_ADDR14_BRTAKEN:
6962 case R_PPC64_ADDR16:
6963 case R_PPC64_ADDR16_DS:
6964 case R_PPC64_ADDR16_HA:
6965 case R_PPC64_ADDR16_HI:
6966 case R_PPC64_ADDR16_HIGH:
6967 case R_PPC64_ADDR16_HIGHA:
6968 case R_PPC64_ADDR16_HIGHER:
6969 case R_PPC64_ADDR16_HIGHERA:
6970 case R_PPC64_ADDR16_HIGHEST:
6971 case R_PPC64_ADDR16_HIGHESTA:
6972 case R_PPC64_ADDR16_LO:
6973 case R_PPC64_ADDR16_LO_DS:
6974 case R_PPC64_ADDR24:
6975 case R_PPC64_ADDR32:
6976 case R_PPC64_UADDR16:
6977 case R_PPC64_UADDR32:
6978 case R_PPC64_UADDR64:
6979 case R_PPC64_TOC:
6980 case R_PPC64_D34:
6981 case R_PPC64_D34_LO:
6982 case R_PPC64_D34_HI30:
6983 case R_PPC64_D34_HA30:
6984 case R_PPC64_ADDR16_HIGHER34:
6985 case R_PPC64_ADDR16_HIGHERA34:
6986 case R_PPC64_ADDR16_HIGHEST34:
6987 case R_PPC64_ADDR16_HIGHESTA34:
6988 case R_PPC64_D28:
6989 break;
6990 }
6991
6992 if (local_syms != NULL)
6993 {
6994 unsigned long r_symndx;
6995 bfd *ibfd = sec->owner;
6996
6997 r_symndx = ELF64_R_SYM (r_info);
6998 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6999 return FALSE;
7000 }
7001
7002 if ((h != NULL
7003 && (h->root.type == bfd_link_hash_defweak
7004 || !h->def_regular))
7005 || (h != NULL
7006 && !bfd_link_executable (info)
7007 && !SYMBOLIC_BIND (info, h))
7008 || (bfd_link_pic (info)
7009 && must_be_dyn_reloc (info, r_type))
7010 || (!bfd_link_pic (info)
7011 && (h != NULL
7012 ? h->type == STT_GNU_IFUNC
7013 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
7014 ;
7015 else
7016 return TRUE;
7017
7018 if (h != NULL)
7019 {
7020 struct elf_dyn_relocs *p;
7021 struct elf_dyn_relocs **pp;
7022 pp = &h->dyn_relocs;
7023
7024 /* elf_gc_sweep may have already removed all dyn relocs associated
7025 with local syms for a given section. Also, symbol flags are
7026 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7027 report a dynreloc miscount. */
7028 if (*pp == NULL && info->gc_sections)
7029 return TRUE;
7030
7031 while ((p = *pp) != NULL)
7032 {
7033 if (p->sec == sec)
7034 {
7035 if (!must_be_dyn_reloc (info, r_type))
7036 p->pc_count -= 1;
7037 p->count -= 1;
7038 if (p->count == 0)
7039 *pp = p->next;
7040 return TRUE;
7041 }
7042 pp = &p->next;
7043 }
7044 }
7045 else
7046 {
7047 struct ppc_dyn_relocs *p;
7048 struct ppc_dyn_relocs **pp;
7049 void *vpp;
7050 bfd_boolean is_ifunc;
7051
7052 if (local_syms == NULL)
7053 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7054 if (sym_sec == NULL)
7055 sym_sec = sec;
7056
7057 vpp = &elf_section_data (sym_sec)->local_dynrel;
7058 pp = (struct ppc_dyn_relocs **) vpp;
7059
7060 if (*pp == NULL && info->gc_sections)
7061 return TRUE;
7062
7063 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7064 while ((p = *pp) != NULL)
7065 {
7066 if (p->sec == sec && p->ifunc == is_ifunc)
7067 {
7068 p->count -= 1;
7069 if (p->count == 0)
7070 *pp = p->next;
7071 return TRUE;
7072 }
7073 pp = &p->next;
7074 }
7075 }
7076
7077 /* xgettext:c-format */
7078 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7079 sec->owner, sec);
7080 bfd_set_error (bfd_error_bad_value);
7081 return FALSE;
7082 }
7083
7084 /* Remove unused Official Procedure Descriptor entries. Currently we
7085 only remove those associated with functions in discarded link-once
7086 sections, or weakly defined functions that have been overridden. It
7087 would be possible to remove many more entries for statically linked
7088 applications. */
7089
7090 bfd_boolean
7091 ppc64_elf_edit_opd (struct bfd_link_info *info)
7092 {
7093 bfd *ibfd;
7094 bfd_boolean some_edited = FALSE;
7095 asection *need_pad = NULL;
7096 struct ppc_link_hash_table *htab;
7097
7098 htab = ppc_hash_table (info);
7099 if (htab == NULL)
7100 return FALSE;
7101
7102 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7103 {
7104 asection *sec;
7105 Elf_Internal_Rela *relstart, *rel, *relend;
7106 Elf_Internal_Shdr *symtab_hdr;
7107 Elf_Internal_Sym *local_syms;
7108 struct _opd_sec_data *opd;
7109 bfd_boolean need_edit, add_aux_fields, broken;
7110 bfd_size_type cnt_16b = 0;
7111
7112 if (!is_ppc64_elf (ibfd))
7113 continue;
7114
7115 sec = bfd_get_section_by_name (ibfd, ".opd");
7116 if (sec == NULL || sec->size == 0)
7117 continue;
7118
7119 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7120 continue;
7121
7122 if (sec->output_section == bfd_abs_section_ptr)
7123 continue;
7124
7125 /* Look through the section relocs. */
7126 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7127 continue;
7128
7129 local_syms = NULL;
7130 symtab_hdr = &elf_symtab_hdr (ibfd);
7131
7132 /* Read the relocations. */
7133 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7134 info->keep_memory);
7135 if (relstart == NULL)
7136 return FALSE;
7137
7138 /* First run through the relocs to check they are sane, and to
7139 determine whether we need to edit this opd section. */
7140 need_edit = FALSE;
7141 broken = FALSE;
7142 need_pad = sec;
7143 relend = relstart + sec->reloc_count;
7144 for (rel = relstart; rel < relend; )
7145 {
7146 enum elf_ppc64_reloc_type r_type;
7147 unsigned long r_symndx;
7148 asection *sym_sec;
7149 struct elf_link_hash_entry *h;
7150 Elf_Internal_Sym *sym;
7151 bfd_vma offset;
7152
7153 /* .opd contains an array of 16 or 24 byte entries. We're
7154 only interested in the reloc pointing to a function entry
7155 point. */
7156 offset = rel->r_offset;
7157 if (rel + 1 == relend
7158 || rel[1].r_offset != offset + 8)
7159 {
7160 /* If someone messes with .opd alignment then after a
7161 "ld -r" we might have padding in the middle of .opd.
7162 Also, there's nothing to prevent someone putting
7163 something silly in .opd with the assembler. No .opd
7164 optimization for them! */
7165 broken_opd:
7166 _bfd_error_handler
7167 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7168 broken = TRUE;
7169 break;
7170 }
7171
7172 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7173 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7174 {
7175 _bfd_error_handler
7176 /* xgettext:c-format */
7177 (_("%pB: unexpected reloc type %u in .opd section"),
7178 ibfd, r_type);
7179 broken = TRUE;
7180 break;
7181 }
7182
7183 r_symndx = ELF64_R_SYM (rel->r_info);
7184 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7185 r_symndx, ibfd))
7186 goto error_ret;
7187
7188 if (sym_sec == NULL || sym_sec->owner == NULL)
7189 {
7190 const char *sym_name;
7191 if (h != NULL)
7192 sym_name = h->root.root.string;
7193 else
7194 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7195 sym_sec);
7196
7197 _bfd_error_handler
7198 /* xgettext:c-format */
7199 (_("%pB: undefined sym `%s' in .opd section"),
7200 ibfd, sym_name);
7201 broken = TRUE;
7202 break;
7203 }
7204
7205 /* opd entries are always for functions defined in the
7206 current input bfd. If the symbol isn't defined in the
7207 input bfd, then we won't be using the function in this
7208 bfd; It must be defined in a linkonce section in another
7209 bfd, or is weak. It's also possible that we are
7210 discarding the function due to a linker script /DISCARD/,
7211 which we test for via the output_section. */
7212 if (sym_sec->owner != ibfd
7213 || sym_sec->output_section == bfd_abs_section_ptr)
7214 need_edit = TRUE;
7215
7216 rel += 2;
7217 if (rel + 1 == relend
7218 || (rel + 2 < relend
7219 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7220 ++rel;
7221
7222 if (rel == relend)
7223 {
7224 if (sec->size == offset + 24)
7225 {
7226 need_pad = NULL;
7227 break;
7228 }
7229 if (sec->size == offset + 16)
7230 {
7231 cnt_16b++;
7232 break;
7233 }
7234 goto broken_opd;
7235 }
7236 else if (rel + 1 < relend
7237 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7238 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7239 {
7240 if (rel[0].r_offset == offset + 16)
7241 cnt_16b++;
7242 else if (rel[0].r_offset != offset + 24)
7243 goto broken_opd;
7244 }
7245 else
7246 goto broken_opd;
7247 }
7248
7249 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7250
7251 if (!broken && (need_edit || add_aux_fields))
7252 {
7253 Elf_Internal_Rela *write_rel;
7254 Elf_Internal_Shdr *rel_hdr;
7255 bfd_byte *rptr, *wptr;
7256 bfd_byte *new_contents;
7257 bfd_size_type amt;
7258
7259 new_contents = NULL;
7260 amt = OPD_NDX (sec->size) * sizeof (long);
7261 opd = &ppc64_elf_section_data (sec)->u.opd;
7262 opd->adjust = bfd_zalloc (sec->owner, amt);
7263 if (opd->adjust == NULL)
7264 return FALSE;
7265
7266 /* This seems a waste of time as input .opd sections are all
7267 zeros as generated by gcc, but I suppose there's no reason
7268 this will always be so. We might start putting something in
7269 the third word of .opd entries. */
7270 if ((sec->flags & SEC_IN_MEMORY) == 0)
7271 {
7272 bfd_byte *loc;
7273 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7274 {
7275 free (loc);
7276 error_ret:
7277 if (symtab_hdr->contents != (unsigned char *) local_syms)
7278 free (local_syms);
7279 if (elf_section_data (sec)->relocs != relstart)
7280 free (relstart);
7281 return FALSE;
7282 }
7283 sec->contents = loc;
7284 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7285 }
7286
7287 elf_section_data (sec)->relocs = relstart;
7288
7289 new_contents = sec->contents;
7290 if (add_aux_fields)
7291 {
7292 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7293 if (new_contents == NULL)
7294 return FALSE;
7295 need_pad = NULL;
7296 }
7297 wptr = new_contents;
7298 rptr = sec->contents;
7299 write_rel = relstart;
7300 for (rel = relstart; rel < relend; )
7301 {
7302 unsigned long r_symndx;
7303 asection *sym_sec;
7304 struct elf_link_hash_entry *h;
7305 struct ppc_link_hash_entry *fdh = NULL;
7306 Elf_Internal_Sym *sym;
7307 long opd_ent_size;
7308 Elf_Internal_Rela *next_rel;
7309 bfd_boolean skip;
7310
7311 r_symndx = ELF64_R_SYM (rel->r_info);
7312 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7313 r_symndx, ibfd))
7314 goto error_ret;
7315
7316 next_rel = rel + 2;
7317 if (next_rel + 1 == relend
7318 || (next_rel + 2 < relend
7319 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7320 ++next_rel;
7321
7322 /* See if the .opd entry is full 24 byte or
7323 16 byte (with fd_aux entry overlapped with next
7324 fd_func). */
7325 opd_ent_size = 24;
7326 if (next_rel == relend)
7327 {
7328 if (sec->size == rel->r_offset + 16)
7329 opd_ent_size = 16;
7330 }
7331 else if (next_rel->r_offset == rel->r_offset + 16)
7332 opd_ent_size = 16;
7333
7334 if (h != NULL
7335 && h->root.root.string[0] == '.')
7336 {
7337 fdh = ppc_elf_hash_entry (h)->oh;
7338 if (fdh != NULL)
7339 {
7340 fdh = ppc_follow_link (fdh);
7341 if (fdh->elf.root.type != bfd_link_hash_defined
7342 && fdh->elf.root.type != bfd_link_hash_defweak)
7343 fdh = NULL;
7344 }
7345 }
7346
7347 skip = (sym_sec->owner != ibfd
7348 || sym_sec->output_section == bfd_abs_section_ptr);
7349 if (skip)
7350 {
7351 if (fdh != NULL && sym_sec->owner == ibfd)
7352 {
7353 /* Arrange for the function descriptor sym
7354 to be dropped. */
7355 fdh->elf.root.u.def.value = 0;
7356 fdh->elf.root.u.def.section = sym_sec;
7357 }
7358 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7359
7360 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7361 rel = next_rel;
7362 else
7363 while (1)
7364 {
7365 if (!dec_dynrel_count (rel->r_info, sec, info,
7366 NULL, h, sym))
7367 goto error_ret;
7368
7369 if (++rel == next_rel)
7370 break;
7371
7372 r_symndx = ELF64_R_SYM (rel->r_info);
7373 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7374 r_symndx, ibfd))
7375 goto error_ret;
7376 }
7377 }
7378 else
7379 {
7380 /* We'll be keeping this opd entry. */
7381 long adjust;
7382
7383 if (fdh != NULL)
7384 {
7385 /* Redefine the function descriptor symbol to
7386 this location in the opd section. It is
7387 necessary to update the value here rather
7388 than using an array of adjustments as we do
7389 for local symbols, because various places
7390 in the generic ELF code use the value
7391 stored in u.def.value. */
7392 fdh->elf.root.u.def.value = wptr - new_contents;
7393 fdh->adjust_done = 1;
7394 }
7395
7396 /* Local syms are a bit tricky. We could
7397 tweak them as they can be cached, but
7398 we'd need to look through the local syms
7399 for the function descriptor sym which we
7400 don't have at the moment. So keep an
7401 array of adjustments. */
7402 adjust = (wptr - new_contents) - (rptr - sec->contents);
7403 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7404
7405 if (wptr != rptr)
7406 memcpy (wptr, rptr, opd_ent_size);
7407 wptr += opd_ent_size;
7408 if (add_aux_fields && opd_ent_size == 16)
7409 {
7410 memset (wptr, '\0', 8);
7411 wptr += 8;
7412 }
7413
7414 /* We need to adjust any reloc offsets to point to the
7415 new opd entries. */
7416 for ( ; rel != next_rel; ++rel)
7417 {
7418 rel->r_offset += adjust;
7419 if (write_rel != rel)
7420 memcpy (write_rel, rel, sizeof (*rel));
7421 ++write_rel;
7422 }
7423 }
7424
7425 rptr += opd_ent_size;
7426 }
7427
7428 sec->size = wptr - new_contents;
7429 sec->reloc_count = write_rel - relstart;
7430 if (add_aux_fields)
7431 {
7432 free (sec->contents);
7433 sec->contents = new_contents;
7434 }
7435
7436 /* Fudge the header size too, as this is used later in
7437 elf_bfd_final_link if we are emitting relocs. */
7438 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7439 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7440 some_edited = TRUE;
7441 }
7442 else if (elf_section_data (sec)->relocs != relstart)
7443 free (relstart);
7444
7445 if (local_syms != NULL
7446 && symtab_hdr->contents != (unsigned char *) local_syms)
7447 {
7448 if (!info->keep_memory)
7449 free (local_syms);
7450 else
7451 symtab_hdr->contents = (unsigned char *) local_syms;
7452 }
7453 }
7454
7455 if (some_edited)
7456 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7457
7458 /* If we are doing a final link and the last .opd entry is just 16 byte
7459 long, add a 8 byte padding after it. */
7460 if (need_pad != NULL && !bfd_link_relocatable (info))
7461 {
7462 bfd_byte *p;
7463
7464 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7465 {
7466 BFD_ASSERT (need_pad->size > 0);
7467
7468 p = bfd_malloc (need_pad->size + 8);
7469 if (p == NULL)
7470 return FALSE;
7471
7472 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7473 p, 0, need_pad->size))
7474 return FALSE;
7475
7476 need_pad->contents = p;
7477 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7478 }
7479 else
7480 {
7481 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7482 if (p == NULL)
7483 return FALSE;
7484
7485 need_pad->contents = p;
7486 }
7487
7488 memset (need_pad->contents + need_pad->size, 0, 8);
7489 need_pad->size += 8;
7490 }
7491
7492 return TRUE;
7493 }
7494
7495 /* Analyze inline PLT call relocations to see whether calls to locally
7496 defined functions can be converted to direct calls. */
7497
7498 bfd_boolean
7499 ppc64_elf_inline_plt (struct bfd_link_info *info)
7500 {
7501 struct ppc_link_hash_table *htab;
7502 bfd *ibfd;
7503 asection *sec;
7504 bfd_vma low_vma, high_vma, limit;
7505
7506 htab = ppc_hash_table (info);
7507 if (htab == NULL)
7508 return FALSE;
7509
7510 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7511 reduced somewhat to cater for possible stubs that might be added
7512 between the call and its destination. */
7513 if (htab->params->group_size < 0)
7514 {
7515 limit = -htab->params->group_size;
7516 if (limit == 1)
7517 limit = 0x1e00000;
7518 }
7519 else
7520 {
7521 limit = htab->params->group_size;
7522 if (limit == 1)
7523 limit = 0x1c00000;
7524 }
7525
7526 low_vma = -1;
7527 high_vma = 0;
7528 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7529 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7530 {
7531 if (low_vma > sec->vma)
7532 low_vma = sec->vma;
7533 if (high_vma < sec->vma + sec->size)
7534 high_vma = sec->vma + sec->size;
7535 }
7536
7537 /* If a "bl" can reach anywhere in local code sections, then we can
7538 convert all inline PLT sequences to direct calls when the symbol
7539 is local. */
7540 if (high_vma - low_vma < limit)
7541 {
7542 htab->can_convert_all_inline_plt = 1;
7543 return TRUE;
7544 }
7545
7546 /* Otherwise, go looking through relocs for cases where a direct
7547 call won't reach. Mark the symbol on any such reloc to disable
7548 the optimization and keep the PLT entry as it seems likely that
7549 this will be better than creating trampolines. Note that this
7550 will disable the optimization for all inline PLT calls to a
7551 particular symbol, not just those that won't reach. The
7552 difficulty in doing a more precise optimization is that the
7553 linker needs to make a decision depending on whether a
7554 particular R_PPC64_PLTCALL insn can be turned into a direct
7555 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7556 the sequence, and there is nothing that ties those relocs
7557 together except their symbol. */
7558
7559 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7560 {
7561 Elf_Internal_Shdr *symtab_hdr;
7562 Elf_Internal_Sym *local_syms;
7563
7564 if (!is_ppc64_elf (ibfd))
7565 continue;
7566
7567 local_syms = NULL;
7568 symtab_hdr = &elf_symtab_hdr (ibfd);
7569
7570 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7571 if (ppc64_elf_section_data (sec)->has_pltcall
7572 && !bfd_is_abs_section (sec->output_section))
7573 {
7574 Elf_Internal_Rela *relstart, *rel, *relend;
7575
7576 /* Read the relocations. */
7577 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7578 info->keep_memory);
7579 if (relstart == NULL)
7580 return FALSE;
7581
7582 relend = relstart + sec->reloc_count;
7583 for (rel = relstart; rel < relend; rel++)
7584 {
7585 enum elf_ppc64_reloc_type r_type;
7586 unsigned long r_symndx;
7587 asection *sym_sec;
7588 struct elf_link_hash_entry *h;
7589 Elf_Internal_Sym *sym;
7590 unsigned char *tls_maskp;
7591
7592 r_type = ELF64_R_TYPE (rel->r_info);
7593 if (r_type != R_PPC64_PLTCALL
7594 && r_type != R_PPC64_PLTCALL_NOTOC)
7595 continue;
7596
7597 r_symndx = ELF64_R_SYM (rel->r_info);
7598 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7599 r_symndx, ibfd))
7600 {
7601 if (elf_section_data (sec)->relocs != relstart)
7602 free (relstart);
7603 if (symtab_hdr->contents != (bfd_byte *) local_syms)
7604 free (local_syms);
7605 return FALSE;
7606 }
7607
7608 if (sym_sec != NULL && sym_sec->output_section != NULL)
7609 {
7610 bfd_vma from, to;
7611 if (h != NULL)
7612 to = h->root.u.def.value;
7613 else
7614 to = sym->st_value;
7615 to += (rel->r_addend
7616 + sym_sec->output_offset
7617 + sym_sec->output_section->vma);
7618 from = (rel->r_offset
7619 + sec->output_offset
7620 + sec->output_section->vma);
7621 if (to - from + limit < 2 * limit
7622 && !(r_type == R_PPC64_PLTCALL_NOTOC
7623 && (((h ? h->other : sym->st_other)
7624 & STO_PPC64_LOCAL_MASK)
7625 > 1 << STO_PPC64_LOCAL_BIT)))
7626 *tls_maskp &= ~PLT_KEEP;
7627 }
7628 }
7629 if (elf_section_data (sec)->relocs != relstart)
7630 free (relstart);
7631 }
7632
7633 if (local_syms != NULL
7634 && symtab_hdr->contents != (unsigned char *) local_syms)
7635 {
7636 if (!info->keep_memory)
7637 free (local_syms);
7638 else
7639 symtab_hdr->contents = (unsigned char *) local_syms;
7640 }
7641 }
7642
7643 return TRUE;
7644 }
7645
7646 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
7647
7648 asection *
7649 ppc64_elf_tls_setup (struct bfd_link_info *info)
7650 {
7651 struct ppc_link_hash_table *htab;
7652 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
7653
7654 htab = ppc_hash_table (info);
7655 if (htab == NULL)
7656 return NULL;
7657
7658 if (abiversion (info->output_bfd) == 1)
7659 htab->opd_abi = 1;
7660
7661 if (htab->params->no_multi_toc)
7662 htab->do_multi_toc = 0;
7663 else if (!htab->do_multi_toc)
7664 htab->params->no_multi_toc = 1;
7665
7666 /* Default to --no-plt-localentry, as this option can cause problems
7667 with symbol interposition. For example, glibc libpthread.so and
7668 libc.so duplicate many pthread symbols, with a fallback
7669 implementation in libc.so. In some cases the fallback does more
7670 work than the pthread implementation. __pthread_condattr_destroy
7671 is one such symbol: the libpthread.so implementation is
7672 localentry:0 while the libc.so implementation is localentry:8.
7673 An app that "cleverly" uses dlopen to only load necessary
7674 libraries at runtime may omit loading libpthread.so when not
7675 running multi-threaded, which then results in the libc.so
7676 fallback symbols being used and ld.so complaining. Now there
7677 are workarounds in ld (see non_zero_localentry) to detect the
7678 pthread situation, but that may not be the only case where
7679 --plt-localentry can cause trouble. */
7680 if (htab->params->plt_localentry0 < 0)
7681 htab->params->plt_localentry0 = 0;
7682 if (htab->params->plt_localentry0
7683 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7684 FALSE, FALSE, FALSE) == NULL)
7685 _bfd_error_handler
7686 (_("warning: --plt-localentry is especially dangerous without "
7687 "ld.so support to detect ABI violations"));
7688
7689 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7690 FALSE, FALSE, TRUE);
7691 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7692
7693 /* Move dynamic linking info to the function descriptor sym. */
7694 if (tga != NULL)
7695 func_desc_adjust (tga, info);
7696 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7697 FALSE, FALSE, TRUE);
7698 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7699
7700 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7701 FALSE, FALSE, TRUE);
7702 htab->tga_desc = ppc_elf_hash_entry (desc);
7703 if (desc != NULL)
7704 func_desc_adjust (desc, info);
7705 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7706 FALSE, FALSE, TRUE);
7707 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7708
7709 if (htab->params->tls_get_addr_opt)
7710 {
7711 struct elf_link_hash_entry *opt, *opt_fd;
7712
7713 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7714 FALSE, FALSE, TRUE);
7715 if (opt != NULL)
7716 func_desc_adjust (opt, info);
7717 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7718 FALSE, FALSE, TRUE);
7719 if (opt_fd != NULL
7720 && (opt_fd->root.type == bfd_link_hash_defined
7721 || opt_fd->root.type == bfd_link_hash_defweak))
7722 {
7723 /* If glibc supports an optimized __tls_get_addr call stub,
7724 signalled by the presence of __tls_get_addr_opt, and we'll
7725 be calling __tls_get_addr via a plt call stub, then
7726 make __tls_get_addr point to __tls_get_addr_opt. */
7727 if (!(htab->elf.dynamic_sections_created
7728 && tga_fd != NULL
7729 && (tga_fd->type == STT_FUNC
7730 || tga_fd->needs_plt)
7731 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7732 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7733 tga_fd = NULL;
7734 if (!(htab->elf.dynamic_sections_created
7735 && desc_fd != NULL
7736 && (desc_fd->type == STT_FUNC
7737 || desc_fd->needs_plt)
7738 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7739 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7740 desc_fd = NULL;
7741
7742 if (tga_fd != NULL || desc_fd != NULL)
7743 {
7744 struct plt_entry *ent = NULL;
7745
7746 if (tga_fd != NULL)
7747 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7748 if (ent->plt.refcount > 0)
7749 break;
7750 if (ent == NULL && desc_fd != NULL)
7751 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7752 if (ent->plt.refcount > 0)
7753 break;
7754 if (ent != NULL)
7755 {
7756 if (tga_fd != NULL)
7757 {
7758 tga_fd->root.type = bfd_link_hash_indirect;
7759 tga_fd->root.u.i.link = &opt_fd->root;
7760 tga_fd->root.u.i.warning = NULL;
7761 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7762 }
7763 if (desc_fd != NULL)
7764 {
7765 desc_fd->root.type = bfd_link_hash_indirect;
7766 desc_fd->root.u.i.link = &opt_fd->root;
7767 desc_fd->root.u.i.warning = NULL;
7768 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7769 }
7770 opt_fd->mark = 1;
7771 if (opt_fd->dynindx != -1)
7772 {
7773 /* Use __tls_get_addr_opt in dynamic relocations. */
7774 opt_fd->dynindx = -1;
7775 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7776 opt_fd->dynstr_index);
7777 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
7778 return NULL;
7779 }
7780 if (tga_fd != NULL)
7781 {
7782 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7783 tga = &htab->tls_get_addr->elf;
7784 if (opt != NULL && tga != NULL)
7785 {
7786 tga->root.type = bfd_link_hash_indirect;
7787 tga->root.u.i.link = &opt->root;
7788 tga->root.u.i.warning = NULL;
7789 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7790 opt->mark = 1;
7791 _bfd_elf_link_hash_hide_symbol (info, opt,
7792 tga->forced_local);
7793 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7794 }
7795 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7796 htab->tls_get_addr_fd->is_func_descriptor = 1;
7797 if (htab->tls_get_addr != NULL)
7798 {
7799 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7800 htab->tls_get_addr->is_func = 1;
7801 }
7802 }
7803 if (desc_fd != NULL)
7804 {
7805 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7806 if (opt != NULL && desc != NULL)
7807 {
7808 desc->root.type = bfd_link_hash_indirect;
7809 desc->root.u.i.link = &opt->root;
7810 desc->root.u.i.warning = NULL;
7811 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7812 opt->mark = 1;
7813 _bfd_elf_link_hash_hide_symbol (info, opt,
7814 desc->forced_local);
7815 htab->tga_desc = ppc_elf_hash_entry (opt);
7816 }
7817 htab->tga_desc_fd->oh = htab->tga_desc;
7818 htab->tga_desc_fd->is_func_descriptor = 1;
7819 if (htab->tga_desc != NULL)
7820 {
7821 htab->tga_desc->oh = htab->tga_desc_fd;
7822 htab->tga_desc->is_func = 1;
7823 }
7824 }
7825 }
7826 }
7827 }
7828 else if (htab->params->tls_get_addr_opt < 0)
7829 htab->params->tls_get_addr_opt = 0;
7830 }
7831
7832 if (htab->tga_desc_fd != NULL
7833 && htab->params->tls_get_addr_opt
7834 && htab->params->no_tls_get_addr_regsave == -1)
7835 htab->params->no_tls_get_addr_regsave = 0;
7836
7837 return _bfd_elf_tls_setup (info->output_bfd, info);
7838 }
7839
7840 /* Return TRUE iff REL is a branch reloc with a global symbol matching
7841 any of HASH1, HASH2, HASH3, or HASH4. */
7842
7843 static bfd_boolean
7844 branch_reloc_hash_match (const bfd *ibfd,
7845 const Elf_Internal_Rela *rel,
7846 const struct ppc_link_hash_entry *hash1,
7847 const struct ppc_link_hash_entry *hash2,
7848 const struct ppc_link_hash_entry *hash3,
7849 const struct ppc_link_hash_entry *hash4)
7850 {
7851 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7852 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7853 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7854
7855 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
7856 {
7857 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7858 struct elf_link_hash_entry *h;
7859
7860 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7861 h = elf_follow_link (h);
7862 if (h == &hash1->elf || h == &hash2->elf
7863 || h == &hash3->elf || h == &hash4->elf)
7864 return TRUE;
7865 }
7866 return FALSE;
7867 }
7868
7869 /* Run through all the TLS relocs looking for optimization
7870 opportunities. The linker has been hacked (see ppc64elf.em) to do
7871 a preliminary section layout so that we know the TLS segment
7872 offsets. We can't optimize earlier because some optimizations need
7873 to know the tp offset, and we need to optimize before allocating
7874 dynamic relocations. */
7875
7876 bfd_boolean
7877 ppc64_elf_tls_optimize (struct bfd_link_info *info)
7878 {
7879 bfd *ibfd;
7880 asection *sec;
7881 struct ppc_link_hash_table *htab;
7882 unsigned char *toc_ref;
7883 int pass;
7884
7885 if (!bfd_link_executable (info))
7886 return TRUE;
7887
7888 htab = ppc_hash_table (info);
7889 if (htab == NULL)
7890 return FALSE;
7891
7892 /* Make two passes over the relocs. On the first pass, mark toc
7893 entries involved with tls relocs, and check that tls relocs
7894 involved in setting up a tls_get_addr call are indeed followed by
7895 such a call. If they are not, we can't do any tls optimization.
7896 On the second pass twiddle tls_mask flags to notify
7897 relocate_section that optimization can be done, and adjust got
7898 and plt refcounts. */
7899 toc_ref = NULL;
7900 for (pass = 0; pass < 2; ++pass)
7901 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7902 {
7903 Elf_Internal_Sym *locsyms = NULL;
7904 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7905
7906 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7907 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7908 {
7909 Elf_Internal_Rela *relstart, *rel, *relend;
7910 bfd_boolean found_tls_get_addr_arg = 0;
7911
7912 /* Read the relocations. */
7913 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7914 info->keep_memory);
7915 if (relstart == NULL)
7916 {
7917 free (toc_ref);
7918 return FALSE;
7919 }
7920
7921 relend = relstart + sec->reloc_count;
7922 for (rel = relstart; rel < relend; rel++)
7923 {
7924 enum elf_ppc64_reloc_type r_type;
7925 unsigned long r_symndx;
7926 struct elf_link_hash_entry *h;
7927 Elf_Internal_Sym *sym;
7928 asection *sym_sec;
7929 unsigned char *tls_mask;
7930 unsigned int tls_set, tls_clear, tls_type = 0;
7931 bfd_vma value;
7932 bfd_boolean ok_tprel, is_local;
7933 long toc_ref_index = 0;
7934 int expecting_tls_get_addr = 0;
7935 bfd_boolean ret = FALSE;
7936
7937 r_symndx = ELF64_R_SYM (rel->r_info);
7938 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7939 r_symndx, ibfd))
7940 {
7941 err_free_rel:
7942 if (elf_section_data (sec)->relocs != relstart)
7943 free (relstart);
7944 free (toc_ref);
7945 if (elf_symtab_hdr (ibfd).contents
7946 != (unsigned char *) locsyms)
7947 free (locsyms);
7948 return ret;
7949 }
7950
7951 if (h != NULL)
7952 {
7953 if (h->root.type == bfd_link_hash_defined
7954 || h->root.type == bfd_link_hash_defweak)
7955 value = h->root.u.def.value;
7956 else if (h->root.type == bfd_link_hash_undefweak)
7957 value = 0;
7958 else
7959 {
7960 found_tls_get_addr_arg = 0;
7961 continue;
7962 }
7963 }
7964 else
7965 /* Symbols referenced by TLS relocs must be of type
7966 STT_TLS. So no need for .opd local sym adjust. */
7967 value = sym->st_value;
7968
7969 ok_tprel = FALSE;
7970 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7971 if (is_local)
7972 {
7973 if (h != NULL
7974 && h->root.type == bfd_link_hash_undefweak)
7975 ok_tprel = TRUE;
7976 else if (sym_sec != NULL
7977 && sym_sec->output_section != NULL)
7978 {
7979 value += sym_sec->output_offset;
7980 value += sym_sec->output_section->vma;
7981 value -= htab->elf.tls_sec->vma + TP_OFFSET;
7982 /* Note that even though the prefix insns
7983 allow a 1<<33 offset we use the same test
7984 as for addis;addi. There may be a mix of
7985 pcrel and non-pcrel code and the decision
7986 to optimise is per symbol, not per TLS
7987 sequence. */
7988 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
7989 }
7990 }
7991
7992 r_type = ELF64_R_TYPE (rel->r_info);
7993 /* If this section has old-style __tls_get_addr calls
7994 without marker relocs, then check that each
7995 __tls_get_addr call reloc is preceded by a reloc
7996 that conceivably belongs to the __tls_get_addr arg
7997 setup insn. If we don't find matching arg setup
7998 relocs, don't do any tls optimization. */
7999 if (pass == 0
8000 && sec->nomark_tls_get_addr
8001 && h != NULL
8002 && is_tls_get_addr (h, htab)
8003 && !found_tls_get_addr_arg
8004 && is_branch_reloc (r_type))
8005 {
8006 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8007 "TLS optimization disabled\n"),
8008 ibfd, sec, rel->r_offset);
8009 ret = TRUE;
8010 goto err_free_rel;
8011 }
8012
8013 found_tls_get_addr_arg = 0;
8014 switch (r_type)
8015 {
8016 case R_PPC64_GOT_TLSLD16:
8017 case R_PPC64_GOT_TLSLD16_LO:
8018 case R_PPC64_GOT_TLSLD34:
8019 expecting_tls_get_addr = 1;
8020 found_tls_get_addr_arg = 1;
8021 /* Fall through. */
8022
8023 case R_PPC64_GOT_TLSLD16_HI:
8024 case R_PPC64_GOT_TLSLD16_HA:
8025 /* These relocs should never be against a symbol
8026 defined in a shared lib. Leave them alone if
8027 that turns out to be the case. */
8028 if (!is_local)
8029 continue;
8030
8031 /* LD -> LE */
8032 tls_set = 0;
8033 tls_clear = TLS_LD;
8034 tls_type = TLS_TLS | TLS_LD;
8035 break;
8036
8037 case R_PPC64_GOT_TLSGD16:
8038 case R_PPC64_GOT_TLSGD16_LO:
8039 case R_PPC64_GOT_TLSGD34:
8040 expecting_tls_get_addr = 1;
8041 found_tls_get_addr_arg = 1;
8042 /* Fall through. */
8043
8044 case R_PPC64_GOT_TLSGD16_HI:
8045 case R_PPC64_GOT_TLSGD16_HA:
8046 if (ok_tprel)
8047 /* GD -> LE */
8048 tls_set = 0;
8049 else
8050 /* GD -> IE */
8051 tls_set = TLS_TLS | TLS_GDIE;
8052 tls_clear = TLS_GD;
8053 tls_type = TLS_TLS | TLS_GD;
8054 break;
8055
8056 case R_PPC64_GOT_TPREL34:
8057 case R_PPC64_GOT_TPREL16_DS:
8058 case R_PPC64_GOT_TPREL16_LO_DS:
8059 case R_PPC64_GOT_TPREL16_HI:
8060 case R_PPC64_GOT_TPREL16_HA:
8061 if (ok_tprel)
8062 {
8063 /* IE -> LE */
8064 tls_set = 0;
8065 tls_clear = TLS_TPREL;
8066 tls_type = TLS_TLS | TLS_TPREL;
8067 break;
8068 }
8069 continue;
8070
8071 case R_PPC64_TLSLD:
8072 if (!is_local)
8073 continue;
8074 /* Fall through. */
8075 case R_PPC64_TLSGD:
8076 if (rel + 1 < relend
8077 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8078 {
8079 if (pass != 0
8080 && (ELF64_R_TYPE (rel[1].r_info)
8081 != R_PPC64_PLTSEQ)
8082 && (ELF64_R_TYPE (rel[1].r_info)
8083 != R_PPC64_PLTSEQ_NOTOC))
8084 {
8085 r_symndx = ELF64_R_SYM (rel[1].r_info);
8086 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8087 r_symndx, ibfd))
8088 goto err_free_rel;
8089 if (h != NULL)
8090 {
8091 struct plt_entry *ent = NULL;
8092
8093 for (ent = h->plt.plist;
8094 ent != NULL;
8095 ent = ent->next)
8096 if (ent->addend == rel[1].r_addend)
8097 break;
8098
8099 if (ent != NULL
8100 && ent->plt.refcount > 0)
8101 ent->plt.refcount -= 1;
8102 }
8103 }
8104 continue;
8105 }
8106 found_tls_get_addr_arg = 1;
8107 /* Fall through. */
8108
8109 case R_PPC64_TLS:
8110 case R_PPC64_TOC16:
8111 case R_PPC64_TOC16_LO:
8112 if (sym_sec == NULL || sym_sec != toc)
8113 continue;
8114
8115 /* Mark this toc entry as referenced by a TLS
8116 code sequence. We can do that now in the
8117 case of R_PPC64_TLS, and after checking for
8118 tls_get_addr for the TOC16 relocs. */
8119 if (toc_ref == NULL)
8120 toc_ref
8121 = bfd_zmalloc (toc->output_section->rawsize / 8);
8122 if (toc_ref == NULL)
8123 goto err_free_rel;
8124
8125 if (h != NULL)
8126 value = h->root.u.def.value;
8127 else
8128 value = sym->st_value;
8129 value += rel->r_addend;
8130 if (value % 8 != 0)
8131 continue;
8132 BFD_ASSERT (value < toc->size
8133 && toc->output_offset % 8 == 0);
8134 toc_ref_index = (value + toc->output_offset) / 8;
8135 if (r_type == R_PPC64_TLS
8136 || r_type == R_PPC64_TLSGD
8137 || r_type == R_PPC64_TLSLD)
8138 {
8139 toc_ref[toc_ref_index] = 1;
8140 continue;
8141 }
8142
8143 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8144 continue;
8145
8146 tls_set = 0;
8147 tls_clear = 0;
8148 expecting_tls_get_addr = 2;
8149 break;
8150
8151 case R_PPC64_TPREL64:
8152 if (pass == 0
8153 || sec != toc
8154 || toc_ref == NULL
8155 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8156 continue;
8157 if (ok_tprel)
8158 {
8159 /* IE -> LE */
8160 tls_set = TLS_EXPLICIT;
8161 tls_clear = TLS_TPREL;
8162 break;
8163 }
8164 continue;
8165
8166 case R_PPC64_DTPMOD64:
8167 if (pass == 0
8168 || sec != toc
8169 || toc_ref == NULL
8170 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8171 continue;
8172 if (rel + 1 < relend
8173 && (rel[1].r_info
8174 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8175 && rel[1].r_offset == rel->r_offset + 8)
8176 {
8177 if (ok_tprel)
8178 /* GD -> LE */
8179 tls_set = TLS_EXPLICIT | TLS_GD;
8180 else
8181 /* GD -> IE */
8182 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
8183 tls_clear = TLS_GD;
8184 }
8185 else
8186 {
8187 if (!is_local)
8188 continue;
8189
8190 /* LD -> LE */
8191 tls_set = TLS_EXPLICIT;
8192 tls_clear = TLS_LD;
8193 }
8194 break;
8195
8196 default:
8197 continue;
8198 }
8199
8200 if (pass == 0)
8201 {
8202 if (!expecting_tls_get_addr
8203 || !sec->nomark_tls_get_addr)
8204 continue;
8205
8206 if (rel + 1 < relend
8207 && branch_reloc_hash_match (ibfd, rel + 1,
8208 htab->tls_get_addr_fd,
8209 htab->tga_desc_fd,
8210 htab->tls_get_addr,
8211 htab->tga_desc))
8212 {
8213 if (expecting_tls_get_addr == 2)
8214 {
8215 /* Check for toc tls entries. */
8216 unsigned char *toc_tls;
8217 int retval;
8218
8219 retval = get_tls_mask (&toc_tls, NULL, NULL,
8220 &locsyms,
8221 rel, ibfd);
8222 if (retval == 0)
8223 goto err_free_rel;
8224 if (toc_tls != NULL)
8225 {
8226 if ((*toc_tls & TLS_TLS) != 0
8227 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8228 found_tls_get_addr_arg = 1;
8229 if (retval > 1)
8230 toc_ref[toc_ref_index] = 1;
8231 }
8232 }
8233 continue;
8234 }
8235
8236 /* Uh oh, we didn't find the expected call. We
8237 could just mark this symbol to exclude it
8238 from tls optimization but it's safer to skip
8239 the entire optimization. */
8240 /* xgettext:c-format */
8241 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8242 "TLS optimization disabled\n"),
8243 ibfd, sec, rel->r_offset);
8244 ret = TRUE;
8245 goto err_free_rel;
8246 }
8247
8248 /* If we don't have old-style __tls_get_addr calls
8249 without TLSGD/TLSLD marker relocs, and we haven't
8250 found a new-style __tls_get_addr call with a
8251 marker for this symbol, then we either have a
8252 broken object file or an -mlongcall style
8253 indirect call to __tls_get_addr without a marker.
8254 Disable optimization in this case. */
8255 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8256 && (tls_set & TLS_EXPLICIT) == 0
8257 && !sec->nomark_tls_get_addr
8258 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8259 != (TLS_TLS | TLS_MARK)))
8260 continue;
8261
8262 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
8263 {
8264 struct plt_entry *ent = NULL;
8265
8266 if (htab->tls_get_addr_fd != NULL)
8267 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8268 ent != NULL;
8269 ent = ent->next)
8270 if (ent->addend == 0)
8271 break;
8272
8273 if (ent == NULL && htab->tga_desc_fd != NULL)
8274 for (ent = htab->tga_desc_fd->elf.plt.plist;
8275 ent != NULL;
8276 ent = ent->next)
8277 if (ent->addend == 0)
8278 break;
8279
8280 if (ent == NULL && htab->tls_get_addr != NULL)
8281 for (ent = htab->tls_get_addr->elf.plt.plist;
8282 ent != NULL;
8283 ent = ent->next)
8284 if (ent->addend == 0)
8285 break;
8286
8287 if (ent == NULL && htab->tga_desc != NULL)
8288 for (ent = htab->tga_desc->elf.plt.plist;
8289 ent != NULL;
8290 ent = ent->next)
8291 if (ent->addend == 0)
8292 break;
8293
8294 if (ent != NULL
8295 && ent->plt.refcount > 0)
8296 ent->plt.refcount -= 1;
8297 }
8298
8299 if (tls_clear == 0)
8300 continue;
8301
8302 if ((tls_set & TLS_EXPLICIT) == 0)
8303 {
8304 struct got_entry *ent;
8305
8306 /* Adjust got entry for this reloc. */
8307 if (h != NULL)
8308 ent = h->got.glist;
8309 else
8310 ent = elf_local_got_ents (ibfd)[r_symndx];
8311
8312 for (; ent != NULL; ent = ent->next)
8313 if (ent->addend == rel->r_addend
8314 && ent->owner == ibfd
8315 && ent->tls_type == tls_type)
8316 break;
8317 if (ent == NULL)
8318 abort ();
8319
8320 if (tls_set == 0)
8321 {
8322 /* We managed to get rid of a got entry. */
8323 if (ent->got.refcount > 0)
8324 ent->got.refcount -= 1;
8325 }
8326 }
8327 else
8328 {
8329 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8330 we'll lose one or two dyn relocs. */
8331 if (!dec_dynrel_count (rel->r_info, sec, info,
8332 NULL, h, sym))
8333 return FALSE;
8334
8335 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8336 {
8337 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8338 NULL, h, sym))
8339 return FALSE;
8340 }
8341 }
8342
8343 *tls_mask |= tls_set & 0xff;
8344 *tls_mask &= ~tls_clear;
8345 }
8346
8347 if (elf_section_data (sec)->relocs != relstart)
8348 free (relstart);
8349 }
8350
8351 if (locsyms != NULL
8352 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8353 {
8354 if (!info->keep_memory)
8355 free (locsyms);
8356 else
8357 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8358 }
8359 }
8360
8361 free (toc_ref);
8362 htab->do_tls_opt = 1;
8363 return TRUE;
8364 }
8365
8366 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8367 the values of any global symbols in a toc section that has been
8368 edited. Globals in toc sections should be a rarity, so this function
8369 sets a flag if any are found in toc sections other than the one just
8370 edited, so that further hash table traversals can be avoided. */
8371
8372 struct adjust_toc_info
8373 {
8374 asection *toc;
8375 unsigned long *skip;
8376 bfd_boolean global_toc_syms;
8377 };
8378
8379 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8380
8381 static bfd_boolean
8382 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8383 {
8384 struct ppc_link_hash_entry *eh;
8385 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8386 unsigned long i;
8387
8388 if (h->root.type != bfd_link_hash_defined
8389 && h->root.type != bfd_link_hash_defweak)
8390 return TRUE;
8391
8392 eh = ppc_elf_hash_entry (h);
8393 if (eh->adjust_done)
8394 return TRUE;
8395
8396 if (eh->elf.root.u.def.section == toc_inf->toc)
8397 {
8398 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8399 i = toc_inf->toc->rawsize >> 3;
8400 else
8401 i = eh->elf.root.u.def.value >> 3;
8402
8403 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8404 {
8405 _bfd_error_handler
8406 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8407 do
8408 ++i;
8409 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8410 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8411 }
8412
8413 eh->elf.root.u.def.value -= toc_inf->skip[i];
8414 eh->adjust_done = 1;
8415 }
8416 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8417 toc_inf->global_toc_syms = TRUE;
8418
8419 return TRUE;
8420 }
8421
8422 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8423 on a _LO variety toc/got reloc. */
8424
8425 static bfd_boolean
8426 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8427 {
8428 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8429 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8430 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8431 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8432 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8433 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8434 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8435 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8436 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8437 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8438 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8439 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8440 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8441 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8442 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8443 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8444 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8445 /* Exclude lfqu by testing reloc. If relocs are ever
8446 defined for the reduced D field in psq_lu then those
8447 will need testing too. */
8448 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8449 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
8450 && (insn & 1) == 0)
8451 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8452 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8453 /* Exclude stfqu. psq_stu as above for psq_lu. */
8454 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8455 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
8456 && (insn & 1) == 0));
8457 }
8458
8459 /* PCREL_OPT in one instance flags to the linker that a pair of insns:
8460 pld ra,symbol@got@pcrel
8461 load/store rt,off(ra)
8462 or
8463 pla ra,symbol@pcrel
8464 load/store rt,off(ra)
8465 may be translated to
8466 pload/pstore rt,symbol+off@pcrel
8467 nop.
8468 This function returns true if the optimization is possible, placing
8469 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
8470
8471 On entry to this function, the linker has already determined that
8472 the pld can be replaced with pla: *PINSN1 is that pla insn,
8473 while *PINSN2 is the second instruction. */
8474
8475 static bfd_boolean
8476 xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
8477 {
8478 uint64_t insn1 = *pinsn1;
8479 uint64_t insn2 = *pinsn2;
8480 bfd_signed_vma off;
8481
8482 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8483 {
8484 /* Check that regs match. */
8485 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8486 return FALSE;
8487
8488 /* P8LS or PMLS form, non-pcrel. */
8489 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8490 return FALSE;
8491
8492 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8493 *pinsn2 = PNOP;
8494 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8495 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8496 return TRUE;
8497 }
8498
8499 insn2 >>= 32;
8500
8501 /* Check that regs match. */
8502 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8503 return FALSE;
8504
8505 switch ((insn2 >> 26) & 63)
8506 {
8507 default:
8508 return FALSE;
8509
8510 case 32: /* lwz */
8511 case 34: /* lbz */
8512 case 36: /* stw */
8513 case 38: /* stb */
8514 case 40: /* lhz */
8515 case 42: /* lha */
8516 case 44: /* sth */
8517 case 48: /* lfs */
8518 case 50: /* lfd */
8519 case 52: /* stfs */
8520 case 54: /* stfd */
8521 /* These are the PMLS cases, where we just need to tack a prefix
8522 on the insn. */
8523 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8524 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8525 off = insn2 & 0xffff;
8526 break;
8527
8528 case 58: /* lwa, ld */
8529 if ((insn2 & 1) != 0)
8530 return FALSE;
8531 insn1 = ((1ULL << 58) | (1ULL << 52)
8532 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8533 | (insn2 & (31ULL << 21)));
8534 off = insn2 & 0xfffc;
8535 break;
8536
8537 case 57: /* lxsd, lxssp */
8538 if ((insn2 & 3) < 2)
8539 return FALSE;
8540 insn1 = ((1ULL << 58) | (1ULL << 52)
8541 | ((40ULL | (insn2 & 3)) << 26)
8542 | (insn2 & (31ULL << 21)));
8543 off = insn2 & 0xfffc;
8544 break;
8545
8546 case 61: /* stxsd, stxssp, lxv, stxv */
8547 if ((insn2 & 3) == 0)
8548 return FALSE;
8549 else if ((insn2 & 3) >= 2)
8550 {
8551 insn1 = ((1ULL << 58) | (1ULL << 52)
8552 | ((44ULL | (insn2 & 3)) << 26)
8553 | (insn2 & (31ULL << 21)));
8554 off = insn2 & 0xfffc;
8555 }
8556 else
8557 {
8558 insn1 = ((1ULL << 58) | (1ULL << 52)
8559 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8560 | (insn2 & (31ULL << 21)));
8561 off = insn2 & 0xfff0;
8562 }
8563 break;
8564
8565 case 56: /* lq */
8566 insn1 = ((1ULL << 58) | (1ULL << 52)
8567 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8568 off = insn2 & 0xffff;
8569 break;
8570
8571 case 6: /* lxvp, stxvp */
8572 if ((insn2 & 0xe) != 0)
8573 return FALSE;
8574 insn1 = ((1ULL << 58) | (1ULL << 52)
8575 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8576 | (insn2 & (31ULL << 21)));
8577 off = insn2 & 0xfff0;
8578 break;
8579
8580 case 62: /* std, stq */
8581 if ((insn2 & 1) != 0)
8582 return FALSE;
8583 insn1 = ((1ULL << 58) | (1ULL << 52)
8584 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8585 | (insn2 & (31ULL << 21)));
8586 off = insn2 & 0xfffc;
8587 break;
8588 }
8589
8590 *pinsn1 = insn1;
8591 *pinsn2 = (uint64_t) NOP << 32;
8592 *poff = (off ^ 0x8000) - 0x8000;
8593 return TRUE;
8594 }
8595
8596 /* Examine all relocs referencing .toc sections in order to remove
8597 unused .toc entries. */
8598
8599 bfd_boolean
8600 ppc64_elf_edit_toc (struct bfd_link_info *info)
8601 {
8602 bfd *ibfd;
8603 struct adjust_toc_info toc_inf;
8604 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8605
8606 htab->do_toc_opt = 1;
8607 toc_inf.global_toc_syms = TRUE;
8608 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8609 {
8610 asection *toc, *sec;
8611 Elf_Internal_Shdr *symtab_hdr;
8612 Elf_Internal_Sym *local_syms;
8613 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8614 unsigned long *skip, *drop;
8615 unsigned char *used;
8616 unsigned char *keep, last, some_unused;
8617
8618 if (!is_ppc64_elf (ibfd))
8619 continue;
8620
8621 toc = bfd_get_section_by_name (ibfd, ".toc");
8622 if (toc == NULL
8623 || toc->size == 0
8624 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8625 || discarded_section (toc))
8626 continue;
8627
8628 toc_relocs = NULL;
8629 local_syms = NULL;
8630 symtab_hdr = &elf_symtab_hdr (ibfd);
8631
8632 /* Look at sections dropped from the final link. */
8633 skip = NULL;
8634 relstart = NULL;
8635 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8636 {
8637 if (sec->reloc_count == 0
8638 || !discarded_section (sec)
8639 || get_opd_info (sec)
8640 || (sec->flags & SEC_ALLOC) == 0
8641 || (sec->flags & SEC_DEBUGGING) != 0)
8642 continue;
8643
8644 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8645 if (relstart == NULL)
8646 goto error_ret;
8647
8648 /* Run through the relocs to see which toc entries might be
8649 unused. */
8650 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8651 {
8652 enum elf_ppc64_reloc_type r_type;
8653 unsigned long r_symndx;
8654 asection *sym_sec;
8655 struct elf_link_hash_entry *h;
8656 Elf_Internal_Sym *sym;
8657 bfd_vma val;
8658
8659 r_type = ELF64_R_TYPE (rel->r_info);
8660 switch (r_type)
8661 {
8662 default:
8663 continue;
8664
8665 case R_PPC64_TOC16:
8666 case R_PPC64_TOC16_LO:
8667 case R_PPC64_TOC16_HI:
8668 case R_PPC64_TOC16_HA:
8669 case R_PPC64_TOC16_DS:
8670 case R_PPC64_TOC16_LO_DS:
8671 break;
8672 }
8673
8674 r_symndx = ELF64_R_SYM (rel->r_info);
8675 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8676 r_symndx, ibfd))
8677 goto error_ret;
8678
8679 if (sym_sec != toc)
8680 continue;
8681
8682 if (h != NULL)
8683 val = h->root.u.def.value;
8684 else
8685 val = sym->st_value;
8686 val += rel->r_addend;
8687
8688 if (val >= toc->size)
8689 continue;
8690
8691 /* Anything in the toc ought to be aligned to 8 bytes.
8692 If not, don't mark as unused. */
8693 if (val & 7)
8694 continue;
8695
8696 if (skip == NULL)
8697 {
8698 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8699 if (skip == NULL)
8700 goto error_ret;
8701 }
8702
8703 skip[val >> 3] = ref_from_discarded;
8704 }
8705
8706 if (elf_section_data (sec)->relocs != relstart)
8707 free (relstart);
8708 }
8709
8710 /* For largetoc loads of address constants, we can convert
8711 . addis rx,2,addr@got@ha
8712 . ld ry,addr@got@l(rx)
8713 to
8714 . addis rx,2,addr@toc@ha
8715 . addi ry,rx,addr@toc@l
8716 when addr is within 2G of the toc pointer. This then means
8717 that the word storing "addr" in the toc is no longer needed. */
8718
8719 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8720 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8721 && toc->reloc_count != 0)
8722 {
8723 /* Read toc relocs. */
8724 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8725 info->keep_memory);
8726 if (toc_relocs == NULL)
8727 goto error_ret;
8728
8729 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8730 {
8731 enum elf_ppc64_reloc_type r_type;
8732 unsigned long r_symndx;
8733 asection *sym_sec;
8734 struct elf_link_hash_entry *h;
8735 Elf_Internal_Sym *sym;
8736 bfd_vma val, addr;
8737
8738 r_type = ELF64_R_TYPE (rel->r_info);
8739 if (r_type != R_PPC64_ADDR64)
8740 continue;
8741
8742 r_symndx = ELF64_R_SYM (rel->r_info);
8743 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8744 r_symndx, ibfd))
8745 goto error_ret;
8746
8747 if (sym_sec == NULL
8748 || sym_sec->output_section == NULL
8749 || discarded_section (sym_sec))
8750 continue;
8751
8752 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8753 continue;
8754
8755 if (h != NULL)
8756 {
8757 if (h->type == STT_GNU_IFUNC)
8758 continue;
8759 val = h->root.u.def.value;
8760 }
8761 else
8762 {
8763 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8764 continue;
8765 val = sym->st_value;
8766 }
8767 val += rel->r_addend;
8768 val += sym_sec->output_section->vma + sym_sec->output_offset;
8769
8770 /* We don't yet know the exact toc pointer value, but we
8771 know it will be somewhere in the toc section. Don't
8772 optimize if the difference from any possible toc
8773 pointer is outside [ff..f80008000, 7fff7fff]. */
8774 addr = toc->output_section->vma + TOC_BASE_OFF;
8775 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8776 continue;
8777
8778 addr = toc->output_section->vma + toc->output_section->rawsize;
8779 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8780 continue;
8781
8782 if (skip == NULL)
8783 {
8784 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8785 if (skip == NULL)
8786 goto error_ret;
8787 }
8788
8789 skip[rel->r_offset >> 3]
8790 |= can_optimize | ((rel - toc_relocs) << 2);
8791 }
8792 }
8793
8794 if (skip == NULL)
8795 continue;
8796
8797 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8798 if (used == NULL)
8799 {
8800 error_ret:
8801 if (symtab_hdr->contents != (unsigned char *) local_syms)
8802 free (local_syms);
8803 if (sec != NULL
8804 && elf_section_data (sec)->relocs != relstart)
8805 free (relstart);
8806 if (elf_section_data (toc)->relocs != toc_relocs)
8807 free (toc_relocs);
8808 free (skip);
8809 return FALSE;
8810 }
8811
8812 /* Now check all kept sections that might reference the toc.
8813 Check the toc itself last. */
8814 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8815 : ibfd->sections);
8816 sec != NULL;
8817 sec = (sec == toc ? NULL
8818 : sec->next == NULL ? toc
8819 : sec->next == toc && toc->next ? toc->next
8820 : sec->next))
8821 {
8822 int repeat;
8823
8824 if (sec->reloc_count == 0
8825 || discarded_section (sec)
8826 || get_opd_info (sec)
8827 || (sec->flags & SEC_ALLOC) == 0
8828 || (sec->flags & SEC_DEBUGGING) != 0)
8829 continue;
8830
8831 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8832 info->keep_memory);
8833 if (relstart == NULL)
8834 {
8835 free (used);
8836 goto error_ret;
8837 }
8838
8839 /* Mark toc entries referenced as used. */
8840 do
8841 {
8842 repeat = 0;
8843 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8844 {
8845 enum elf_ppc64_reloc_type r_type;
8846 unsigned long r_symndx;
8847 asection *sym_sec;
8848 struct elf_link_hash_entry *h;
8849 Elf_Internal_Sym *sym;
8850 bfd_vma val;
8851
8852 r_type = ELF64_R_TYPE (rel->r_info);
8853 switch (r_type)
8854 {
8855 case R_PPC64_TOC16:
8856 case R_PPC64_TOC16_LO:
8857 case R_PPC64_TOC16_HI:
8858 case R_PPC64_TOC16_HA:
8859 case R_PPC64_TOC16_DS:
8860 case R_PPC64_TOC16_LO_DS:
8861 /* In case we're taking addresses of toc entries. */
8862 case R_PPC64_ADDR64:
8863 break;
8864
8865 default:
8866 continue;
8867 }
8868
8869 r_symndx = ELF64_R_SYM (rel->r_info);
8870 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8871 r_symndx, ibfd))
8872 {
8873 free (used);
8874 goto error_ret;
8875 }
8876
8877 if (sym_sec != toc)
8878 continue;
8879
8880 if (h != NULL)
8881 val = h->root.u.def.value;
8882 else
8883 val = sym->st_value;
8884 val += rel->r_addend;
8885
8886 if (val >= toc->size)
8887 continue;
8888
8889 if ((skip[val >> 3] & can_optimize) != 0)
8890 {
8891 bfd_vma off;
8892 unsigned char opc;
8893
8894 switch (r_type)
8895 {
8896 case R_PPC64_TOC16_HA:
8897 break;
8898
8899 case R_PPC64_TOC16_LO_DS:
8900 off = rel->r_offset;
8901 off += (bfd_big_endian (ibfd) ? -2 : 3);
8902 if (!bfd_get_section_contents (ibfd, sec, &opc,
8903 off, 1))
8904 {
8905 free (used);
8906 goto error_ret;
8907 }
8908 if ((opc & (0x3f << 2)) == (58u << 2))
8909 break;
8910 /* Fall through. */
8911
8912 default:
8913 /* Wrong sort of reloc, or not a ld. We may
8914 as well clear ref_from_discarded too. */
8915 skip[val >> 3] = 0;
8916 }
8917 }
8918
8919 if (sec != toc)
8920 used[val >> 3] = 1;
8921 /* For the toc section, we only mark as used if this
8922 entry itself isn't unused. */
8923 else if ((used[rel->r_offset >> 3]
8924 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8925 && !used[val >> 3])
8926 {
8927 /* Do all the relocs again, to catch reference
8928 chains. */
8929 repeat = 1;
8930 used[val >> 3] = 1;
8931 }
8932 }
8933 }
8934 while (repeat);
8935
8936 if (elf_section_data (sec)->relocs != relstart)
8937 free (relstart);
8938 }
8939
8940 /* Merge the used and skip arrays. Assume that TOC
8941 doublewords not appearing as either used or unused belong
8942 to an entry more than one doubleword in size. */
8943 for (drop = skip, keep = used, last = 0, some_unused = 0;
8944 drop < skip + (toc->size + 7) / 8;
8945 ++drop, ++keep)
8946 {
8947 if (*keep)
8948 {
8949 *drop &= ~ref_from_discarded;
8950 if ((*drop & can_optimize) != 0)
8951 some_unused = 1;
8952 last = 0;
8953 }
8954 else if ((*drop & ref_from_discarded) != 0)
8955 {
8956 some_unused = 1;
8957 last = ref_from_discarded;
8958 }
8959 else
8960 *drop = last;
8961 }
8962
8963 free (used);
8964
8965 if (some_unused)
8966 {
8967 bfd_byte *contents, *src;
8968 unsigned long off;
8969 Elf_Internal_Sym *sym;
8970 bfd_boolean local_toc_syms = FALSE;
8971
8972 /* Shuffle the toc contents, and at the same time convert the
8973 skip array from booleans into offsets. */
8974 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8975 goto error_ret;
8976
8977 elf_section_data (toc)->this_hdr.contents = contents;
8978
8979 for (src = contents, off = 0, drop = skip;
8980 src < contents + toc->size;
8981 src += 8, ++drop)
8982 {
8983 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8984 off += 8;
8985 else if (off != 0)
8986 {
8987 *drop = off;
8988 memcpy (src - off, src, 8);
8989 }
8990 }
8991 *drop = off;
8992 toc->rawsize = toc->size;
8993 toc->size = src - contents - off;
8994
8995 /* Adjust addends for relocs against the toc section sym,
8996 and optimize any accesses we can. */
8997 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8998 {
8999 if (sec->reloc_count == 0
9000 || discarded_section (sec))
9001 continue;
9002
9003 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9004 info->keep_memory);
9005 if (relstart == NULL)
9006 goto error_ret;
9007
9008 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9009 {
9010 enum elf_ppc64_reloc_type r_type;
9011 unsigned long r_symndx;
9012 asection *sym_sec;
9013 struct elf_link_hash_entry *h;
9014 bfd_vma val;
9015
9016 r_type = ELF64_R_TYPE (rel->r_info);
9017 switch (r_type)
9018 {
9019 default:
9020 continue;
9021
9022 case R_PPC64_TOC16:
9023 case R_PPC64_TOC16_LO:
9024 case R_PPC64_TOC16_HI:
9025 case R_PPC64_TOC16_HA:
9026 case R_PPC64_TOC16_DS:
9027 case R_PPC64_TOC16_LO_DS:
9028 case R_PPC64_ADDR64:
9029 break;
9030 }
9031
9032 r_symndx = ELF64_R_SYM (rel->r_info);
9033 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9034 r_symndx, ibfd))
9035 goto error_ret;
9036
9037 if (sym_sec != toc)
9038 continue;
9039
9040 if (h != NULL)
9041 val = h->root.u.def.value;
9042 else
9043 {
9044 val = sym->st_value;
9045 if (val != 0)
9046 local_toc_syms = TRUE;
9047 }
9048
9049 val += rel->r_addend;
9050
9051 if (val > toc->rawsize)
9052 val = toc->rawsize;
9053 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9054 continue;
9055 else if ((skip[val >> 3] & can_optimize) != 0)
9056 {
9057 Elf_Internal_Rela *tocrel
9058 = toc_relocs + (skip[val >> 3] >> 2);
9059 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9060
9061 switch (r_type)
9062 {
9063 case R_PPC64_TOC16_HA:
9064 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9065 break;
9066
9067 case R_PPC64_TOC16_LO_DS:
9068 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9069 break;
9070
9071 default:
9072 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9073 ppc_howto_init ();
9074 info->callbacks->einfo
9075 /* xgettext:c-format */
9076 (_("%H: %s references "
9077 "optimized away TOC entry\n"),
9078 ibfd, sec, rel->r_offset,
9079 ppc64_elf_howto_table[r_type]->name);
9080 bfd_set_error (bfd_error_bad_value);
9081 goto error_ret;
9082 }
9083 rel->r_addend = tocrel->r_addend;
9084 elf_section_data (sec)->relocs = relstart;
9085 continue;
9086 }
9087
9088 if (h != NULL || sym->st_value != 0)
9089 continue;
9090
9091 rel->r_addend -= skip[val >> 3];
9092 elf_section_data (sec)->relocs = relstart;
9093 }
9094
9095 if (elf_section_data (sec)->relocs != relstart)
9096 free (relstart);
9097 }
9098
9099 /* We shouldn't have local or global symbols defined in the TOC,
9100 but handle them anyway. */
9101 if (local_syms != NULL)
9102 for (sym = local_syms;
9103 sym < local_syms + symtab_hdr->sh_info;
9104 ++sym)
9105 if (sym->st_value != 0
9106 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9107 {
9108 unsigned long i;
9109
9110 if (sym->st_value > toc->rawsize)
9111 i = toc->rawsize >> 3;
9112 else
9113 i = sym->st_value >> 3;
9114
9115 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9116 {
9117 if (local_toc_syms)
9118 _bfd_error_handler
9119 (_("%s defined on removed toc entry"),
9120 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9121 do
9122 ++i;
9123 while ((skip[i] & (ref_from_discarded | can_optimize)));
9124 sym->st_value = (bfd_vma) i << 3;
9125 }
9126
9127 sym->st_value -= skip[i];
9128 symtab_hdr->contents = (unsigned char *) local_syms;
9129 }
9130
9131 /* Adjust any global syms defined in this toc input section. */
9132 if (toc_inf.global_toc_syms)
9133 {
9134 toc_inf.toc = toc;
9135 toc_inf.skip = skip;
9136 toc_inf.global_toc_syms = FALSE;
9137 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9138 &toc_inf);
9139 }
9140
9141 if (toc->reloc_count != 0)
9142 {
9143 Elf_Internal_Shdr *rel_hdr;
9144 Elf_Internal_Rela *wrel;
9145 bfd_size_type sz;
9146
9147 /* Remove unused toc relocs, and adjust those we keep. */
9148 if (toc_relocs == NULL)
9149 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9150 info->keep_memory);
9151 if (toc_relocs == NULL)
9152 goto error_ret;
9153
9154 wrel = toc_relocs;
9155 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9156 if ((skip[rel->r_offset >> 3]
9157 & (ref_from_discarded | can_optimize)) == 0)
9158 {
9159 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9160 wrel->r_info = rel->r_info;
9161 wrel->r_addend = rel->r_addend;
9162 ++wrel;
9163 }
9164 else if (!dec_dynrel_count (rel->r_info, toc, info,
9165 &local_syms, NULL, NULL))
9166 goto error_ret;
9167
9168 elf_section_data (toc)->relocs = toc_relocs;
9169 toc->reloc_count = wrel - toc_relocs;
9170 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9171 sz = rel_hdr->sh_entsize;
9172 rel_hdr->sh_size = toc->reloc_count * sz;
9173 }
9174 }
9175 else if (elf_section_data (toc)->relocs != toc_relocs)
9176 free (toc_relocs);
9177
9178 if (local_syms != NULL
9179 && symtab_hdr->contents != (unsigned char *) local_syms)
9180 {
9181 if (!info->keep_memory)
9182 free (local_syms);
9183 else
9184 symtab_hdr->contents = (unsigned char *) local_syms;
9185 }
9186 free (skip);
9187 }
9188
9189 /* Look for cases where we can change an indirect GOT access to
9190 a GOT relative or PC relative access, possibly reducing the
9191 number of GOT entries. */
9192 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9193 {
9194 asection *sec;
9195 Elf_Internal_Shdr *symtab_hdr;
9196 Elf_Internal_Sym *local_syms;
9197 Elf_Internal_Rela *relstart, *rel;
9198 bfd_vma got;
9199
9200 if (!is_ppc64_elf (ibfd))
9201 continue;
9202
9203 if (!ppc64_elf_tdata (ibfd)->has_optrel)
9204 continue;
9205
9206 sec = ppc64_elf_tdata (ibfd)->got;
9207 got = 0;
9208 if (sec != NULL)
9209 got = sec->output_section->vma + sec->output_offset + 0x8000;
9210
9211 local_syms = NULL;
9212 symtab_hdr = &elf_symtab_hdr (ibfd);
9213
9214 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9215 {
9216 if (sec->reloc_count == 0
9217 || !ppc64_elf_section_data (sec)->has_optrel
9218 || discarded_section (sec))
9219 continue;
9220
9221 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9222 info->keep_memory);
9223 if (relstart == NULL)
9224 {
9225 got_error_ret:
9226 if (symtab_hdr->contents != (unsigned char *) local_syms)
9227 free (local_syms);
9228 if (sec != NULL
9229 && elf_section_data (sec)->relocs != relstart)
9230 free (relstart);
9231 return FALSE;
9232 }
9233
9234 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9235 {
9236 enum elf_ppc64_reloc_type r_type;
9237 unsigned long r_symndx;
9238 Elf_Internal_Sym *sym;
9239 asection *sym_sec;
9240 struct elf_link_hash_entry *h;
9241 struct got_entry *ent;
9242 bfd_vma val, pc;
9243 unsigned char buf[8];
9244 unsigned int insn;
9245 enum {no_check, check_lo, check_ha} insn_check;
9246
9247 r_type = ELF64_R_TYPE (rel->r_info);
9248 switch (r_type)
9249 {
9250 default:
9251 insn_check = no_check;
9252 break;
9253
9254 case R_PPC64_PLT16_HA:
9255 case R_PPC64_GOT_TLSLD16_HA:
9256 case R_PPC64_GOT_TLSGD16_HA:
9257 case R_PPC64_GOT_TPREL16_HA:
9258 case R_PPC64_GOT_DTPREL16_HA:
9259 case R_PPC64_GOT16_HA:
9260 case R_PPC64_TOC16_HA:
9261 insn_check = check_ha;
9262 break;
9263
9264 case R_PPC64_PLT16_LO:
9265 case R_PPC64_PLT16_LO_DS:
9266 case R_PPC64_GOT_TLSLD16_LO:
9267 case R_PPC64_GOT_TLSGD16_LO:
9268 case R_PPC64_GOT_TPREL16_LO_DS:
9269 case R_PPC64_GOT_DTPREL16_LO_DS:
9270 case R_PPC64_GOT16_LO:
9271 case R_PPC64_GOT16_LO_DS:
9272 case R_PPC64_TOC16_LO:
9273 case R_PPC64_TOC16_LO_DS:
9274 insn_check = check_lo;
9275 break;
9276 }
9277
9278 if (insn_check != no_check)
9279 {
9280 bfd_vma off = rel->r_offset & ~3;
9281
9282 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9283 goto got_error_ret;
9284
9285 insn = bfd_get_32 (ibfd, buf);
9286 if (insn_check == check_lo
9287 ? !ok_lo_toc_insn (insn, r_type)
9288 : ((insn & ((0x3fu << 26) | 0x1f << 16))
9289 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9290 {
9291 char str[12];
9292
9293 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9294 sprintf (str, "%#08x", insn);
9295 info->callbacks->einfo
9296 /* xgettext:c-format */
9297 (_("%H: got/toc optimization is not supported for"
9298 " %s instruction\n"),
9299 ibfd, sec, rel->r_offset & ~3, str);
9300 continue;
9301 }
9302 }
9303
9304 switch (r_type)
9305 {
9306 /* Note that we don't delete GOT entries for
9307 R_PPC64_GOT16_DS since we'd need a lot more
9308 analysis. For starters, the preliminary layout is
9309 before the GOT, PLT, dynamic sections and stubs are
9310 laid out. Then we'd need to allow for changes in
9311 distance between sections caused by alignment. */
9312 default:
9313 continue;
9314
9315 case R_PPC64_GOT16_HA:
9316 case R_PPC64_GOT16_LO_DS:
9317 case R_PPC64_GOT_PCREL34:
9318 break;
9319 }
9320
9321 r_symndx = ELF64_R_SYM (rel->r_info);
9322 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9323 r_symndx, ibfd))
9324 goto got_error_ret;
9325
9326 if (sym_sec == NULL
9327 || sym_sec->output_section == NULL
9328 || discarded_section (sym_sec))
9329 continue;
9330
9331 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9332 continue;
9333
9334 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9335 continue;
9336
9337 if (h != NULL)
9338 val = h->root.u.def.value;
9339 else
9340 val = sym->st_value;
9341 val += rel->r_addend;
9342 val += sym_sec->output_section->vma + sym_sec->output_offset;
9343
9344 /* Fudge factor to allow for the fact that the preliminary layout
9345 isn't exact. Reduce limits by this factor. */
9346 #define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9347
9348 switch (r_type)
9349 {
9350 default:
9351 continue;
9352
9353 case R_PPC64_GOT16_HA:
9354 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9355 >= LIMIT_ADJUST (0x100000000ULL))
9356 continue;
9357
9358 if (!bfd_get_section_contents (ibfd, sec, buf,
9359 rel->r_offset & ~3, 4))
9360 goto got_error_ret;
9361 insn = bfd_get_32 (ibfd, buf);
9362 if (((insn & ((0x3fu << 26) | 0x1f << 16))
9363 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9364 continue;
9365 break;
9366
9367 case R_PPC64_GOT16_LO_DS:
9368 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9369 >= LIMIT_ADJUST (0x100000000ULL))
9370 continue;
9371 if (!bfd_get_section_contents (ibfd, sec, buf,
9372 rel->r_offset & ~3, 4))
9373 goto got_error_ret;
9374 insn = bfd_get_32 (ibfd, buf);
9375 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
9376 continue;
9377 break;
9378
9379 case R_PPC64_GOT_PCREL34:
9380 pc = rel->r_offset;
9381 pc += sec->output_section->vma + sec->output_offset;
9382 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9383 >= LIMIT_ADJUST (1ULL << 34))
9384 continue;
9385 if (!bfd_get_section_contents (ibfd, sec, buf,
9386 rel->r_offset & ~3, 8))
9387 goto got_error_ret;
9388 insn = bfd_get_32 (ibfd, buf);
9389 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9390 continue;
9391 insn = bfd_get_32 (ibfd, buf + 4);
9392 if ((insn & (0x3fu << 26)) != 57u << 26)
9393 continue;
9394 break;
9395 }
9396 #undef LIMIT_ADJUST
9397
9398 if (h != NULL)
9399 ent = h->got.glist;
9400 else
9401 {
9402 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9403 ent = local_got_ents[r_symndx];
9404 }
9405 for (; ent != NULL; ent = ent->next)
9406 if (ent->addend == rel->r_addend
9407 && ent->owner == ibfd
9408 && ent->tls_type == 0)
9409 break;
9410 BFD_ASSERT (ent && ent->got.refcount > 0);
9411 ent->got.refcount -= 1;
9412 }
9413
9414 if (elf_section_data (sec)->relocs != relstart)
9415 free (relstart);
9416 }
9417
9418 if (local_syms != NULL
9419 && symtab_hdr->contents != (unsigned char *) local_syms)
9420 {
9421 if (!info->keep_memory)
9422 free (local_syms);
9423 else
9424 symtab_hdr->contents = (unsigned char *) local_syms;
9425 }
9426 }
9427
9428 return TRUE;
9429 }
9430
9431 /* Return true iff input section I references the TOC using
9432 instructions limited to +/-32k offsets. */
9433
9434 bfd_boolean
9435 ppc64_elf_has_small_toc_reloc (asection *i)
9436 {
9437 return (is_ppc64_elf (i->owner)
9438 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9439 }
9440
9441 /* Allocate space for one GOT entry. */
9442
9443 static void
9444 allocate_got (struct elf_link_hash_entry *h,
9445 struct bfd_link_info *info,
9446 struct got_entry *gent)
9447 {
9448 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9449 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
9450 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9451 ? 16 : 8);
9452 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9453 ? 2 : 1) * sizeof (Elf64_External_Rela);
9454 asection *got = ppc64_elf_tdata (gent->owner)->got;
9455
9456 gent->got.offset = got->size;
9457 got->size += entsize;
9458
9459 if (h->type == STT_GNU_IFUNC)
9460 {
9461 htab->elf.irelplt->size += rentsize;
9462 htab->got_reli_size += rentsize;
9463 }
9464 else if (((bfd_link_pic (info)
9465 && !(gent->tls_type != 0
9466 && bfd_link_executable (info)
9467 && SYMBOL_REFERENCES_LOCAL (info, h)))
9468 || (htab->elf.dynamic_sections_created
9469 && h->dynindx != -1
9470 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9471 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9472 {
9473 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9474 relgot->size += rentsize;
9475 }
9476 }
9477
9478 /* This function merges got entries in the same toc group. */
9479
9480 static void
9481 merge_got_entries (struct got_entry **pent)
9482 {
9483 struct got_entry *ent, *ent2;
9484
9485 for (ent = *pent; ent != NULL; ent = ent->next)
9486 if (!ent->is_indirect)
9487 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9488 if (!ent2->is_indirect
9489 && ent2->addend == ent->addend
9490 && ent2->tls_type == ent->tls_type
9491 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9492 {
9493 ent2->is_indirect = TRUE;
9494 ent2->got.ent = ent;
9495 }
9496 }
9497
9498 /* If H is undefined, make it dynamic if that makes sense. */
9499
9500 static bfd_boolean
9501 ensure_undef_dynamic (struct bfd_link_info *info,
9502 struct elf_link_hash_entry *h)
9503 {
9504 struct elf_link_hash_table *htab = elf_hash_table (info);
9505
9506 if (htab->dynamic_sections_created
9507 && ((info->dynamic_undefined_weak != 0
9508 && h->root.type == bfd_link_hash_undefweak)
9509 || h->root.type == bfd_link_hash_undefined)
9510 && h->dynindx == -1
9511 && !h->forced_local
9512 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9513 return bfd_elf_link_record_dynamic_symbol (info, h);
9514 return TRUE;
9515 }
9516
9517 /* Allocate space in .plt, .got and associated reloc sections for
9518 dynamic relocs. */
9519
9520 static bfd_boolean
9521 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9522 {
9523 struct bfd_link_info *info;
9524 struct ppc_link_hash_table *htab;
9525 asection *s;
9526 struct ppc_link_hash_entry *eh;
9527 struct got_entry **pgent, *gent;
9528
9529 if (h->root.type == bfd_link_hash_indirect)
9530 return TRUE;
9531
9532 info = (struct bfd_link_info *) inf;
9533 htab = ppc_hash_table (info);
9534 if (htab == NULL)
9535 return FALSE;
9536
9537 eh = ppc_elf_hash_entry (h);
9538 /* Run through the TLS GD got entries first if we're changing them
9539 to TPREL. */
9540 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
9541 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9542 if (gent->got.refcount > 0
9543 && (gent->tls_type & TLS_GD) != 0)
9544 {
9545 /* This was a GD entry that has been converted to TPREL. If
9546 there happens to be a TPREL entry we can use that one. */
9547 struct got_entry *ent;
9548 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9549 if (ent->got.refcount > 0
9550 && (ent->tls_type & TLS_TPREL) != 0
9551 && ent->addend == gent->addend
9552 && ent->owner == gent->owner)
9553 {
9554 gent->got.refcount = 0;
9555 break;
9556 }
9557
9558 /* If not, then we'll be using our own TPREL entry. */
9559 if (gent->got.refcount != 0)
9560 gent->tls_type = TLS_TLS | TLS_TPREL;
9561 }
9562
9563 /* Remove any list entry that won't generate a word in the GOT before
9564 we call merge_got_entries. Otherwise we risk merging to empty
9565 entries. */
9566 pgent = &h->got.glist;
9567 while ((gent = *pgent) != NULL)
9568 if (gent->got.refcount > 0)
9569 {
9570 if ((gent->tls_type & TLS_LD) != 0
9571 && SYMBOL_REFERENCES_LOCAL (info, h))
9572 {
9573 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9574 *pgent = gent->next;
9575 }
9576 else
9577 pgent = &gent->next;
9578 }
9579 else
9580 *pgent = gent->next;
9581
9582 if (!htab->do_multi_toc)
9583 merge_got_entries (&h->got.glist);
9584
9585 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9586 if (!gent->is_indirect)
9587 {
9588 /* Ensure we catch all the cases where this symbol should
9589 be made dynamic. */
9590 if (!ensure_undef_dynamic (info, h))
9591 return FALSE;
9592
9593 if (!is_ppc64_elf (gent->owner))
9594 abort ();
9595
9596 allocate_got (h, info, gent);
9597 }
9598
9599 /* If no dynamic sections we can't have dynamic relocs, except for
9600 IFUNCs which are handled even in static executables. */
9601 if (!htab->elf.dynamic_sections_created
9602 && h->type != STT_GNU_IFUNC)
9603 h->dyn_relocs = NULL;
9604
9605 /* Discard relocs on undefined symbols that must be local. */
9606 else if (h->root.type == bfd_link_hash_undefined
9607 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9608 h->dyn_relocs = NULL;
9609
9610 /* Also discard relocs on undefined weak syms with non-default
9611 visibility, or when dynamic_undefined_weak says so. */
9612 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9613 h->dyn_relocs = NULL;
9614
9615 if (h->dyn_relocs != NULL)
9616 {
9617 struct elf_dyn_relocs *p, **pp;
9618
9619 /* In the shared -Bsymbolic case, discard space allocated for
9620 dynamic pc-relative relocs against symbols which turn out to
9621 be defined in regular objects. For the normal shared case,
9622 discard space for relocs that have become local due to symbol
9623 visibility changes. */
9624 if (bfd_link_pic (info))
9625 {
9626 /* Relocs that use pc_count are those that appear on a call
9627 insn, or certain REL relocs (see must_be_dyn_reloc) that
9628 can be generated via assembly. We want calls to
9629 protected symbols to resolve directly to the function
9630 rather than going via the plt. If people want function
9631 pointer comparisons to work as expected then they should
9632 avoid writing weird assembly. */
9633 if (SYMBOL_CALLS_LOCAL (info, h))
9634 {
9635 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
9636 {
9637 p->count -= p->pc_count;
9638 p->pc_count = 0;
9639 if (p->count == 0)
9640 *pp = p->next;
9641 else
9642 pp = &p->next;
9643 }
9644 }
9645
9646 if (h->dyn_relocs != NULL)
9647 {
9648 /* Ensure we catch all the cases where this symbol
9649 should be made dynamic. */
9650 if (!ensure_undef_dynamic (info, h))
9651 return FALSE;
9652 }
9653 }
9654
9655 /* For a fixed position executable, discard space for
9656 relocs against symbols which are not dynamic. */
9657 else if (h->type != STT_GNU_IFUNC)
9658 {
9659 if (h->dynamic_adjusted
9660 && !h->def_regular
9661 && !ELF_COMMON_DEF_P (h))
9662 {
9663 /* Ensure we catch all the cases where this symbol
9664 should be made dynamic. */
9665 if (!ensure_undef_dynamic (info, h))
9666 return FALSE;
9667
9668 /* But if that didn't work out, discard dynamic relocs. */
9669 if (h->dynindx == -1)
9670 h->dyn_relocs = NULL;
9671 }
9672 else
9673 h->dyn_relocs = NULL;
9674 }
9675
9676 /* Finally, allocate space. */
9677 for (p = h->dyn_relocs; p != NULL; p = p->next)
9678 {
9679 asection *sreloc = elf_section_data (p->sec)->sreloc;
9680 if (eh->elf.type == STT_GNU_IFUNC)
9681 sreloc = htab->elf.irelplt;
9682 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9683 }
9684 }
9685
9686 /* We might need a PLT entry when the symbol
9687 a) is dynamic, or
9688 b) is an ifunc, or
9689 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9690 d) has plt16 relocs and we are linking statically. */
9691 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9692 || h->type == STT_GNU_IFUNC
9693 || (h->needs_plt && h->dynamic_adjusted)
9694 || (h->needs_plt
9695 && h->def_regular
9696 && !htab->elf.dynamic_sections_created
9697 && !htab->can_convert_all_inline_plt
9698 && (ppc_elf_hash_entry (h)->tls_mask
9699 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
9700 {
9701 struct plt_entry *pent;
9702 bfd_boolean doneone = FALSE;
9703 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9704 if (pent->plt.refcount > 0)
9705 {
9706 if (!htab->elf.dynamic_sections_created
9707 || h->dynindx == -1)
9708 {
9709 if (h->type == STT_GNU_IFUNC)
9710 {
9711 s = htab->elf.iplt;
9712 pent->plt.offset = s->size;
9713 s->size += PLT_ENTRY_SIZE (htab);
9714 s = htab->elf.irelplt;
9715 }
9716 else
9717 {
9718 s = htab->pltlocal;
9719 pent->plt.offset = s->size;
9720 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9721 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9722 }
9723 }
9724 else
9725 {
9726 /* If this is the first .plt entry, make room for the special
9727 first entry. */
9728 s = htab->elf.splt;
9729 if (s->size == 0)
9730 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9731
9732 pent->plt.offset = s->size;
9733
9734 /* Make room for this entry. */
9735 s->size += PLT_ENTRY_SIZE (htab);
9736
9737 /* Make room for the .glink code. */
9738 s = htab->glink;
9739 if (s->size == 0)
9740 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9741 if (htab->opd_abi)
9742 {
9743 /* We need bigger stubs past index 32767. */
9744 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9745 s->size += 4;
9746 s->size += 2*4;
9747 }
9748 else
9749 s->size += 4;
9750
9751 /* We also need to make an entry in the .rela.plt section. */
9752 s = htab->elf.srelplt;
9753 }
9754 if (s != NULL)
9755 s->size += sizeof (Elf64_External_Rela);
9756 doneone = TRUE;
9757 }
9758 else
9759 pent->plt.offset = (bfd_vma) -1;
9760 if (!doneone)
9761 {
9762 h->plt.plist = NULL;
9763 h->needs_plt = 0;
9764 }
9765 }
9766 else
9767 {
9768 h->plt.plist = NULL;
9769 h->needs_plt = 0;
9770 }
9771
9772 return TRUE;
9773 }
9774
9775 #define PPC_LO(v) ((v) & 0xffff)
9776 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9777 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9778 #define D34(v) \
9779 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9780 #define HA34(v) ((v + (1ULL << 33)) >> 34)
9781
9782 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9783 to set up space for global entry stubs. These are put in glink,
9784 after the branch table. */
9785
9786 static bfd_boolean
9787 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9788 {
9789 struct bfd_link_info *info;
9790 struct ppc_link_hash_table *htab;
9791 struct plt_entry *pent;
9792 asection *s, *plt;
9793
9794 if (h->root.type == bfd_link_hash_indirect)
9795 return TRUE;
9796
9797 if (!h->pointer_equality_needed)
9798 return TRUE;
9799
9800 if (h->def_regular)
9801 return TRUE;
9802
9803 info = inf;
9804 htab = ppc_hash_table (info);
9805 if (htab == NULL)
9806 return FALSE;
9807
9808 s = htab->global_entry;
9809 plt = htab->elf.splt;
9810 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9811 if (pent->plt.offset != (bfd_vma) -1
9812 && pent->addend == 0)
9813 {
9814 /* For ELFv2, if this symbol is not defined in a regular file
9815 and we are not generating a shared library or pie, then we
9816 need to define the symbol in the executable on a call stub.
9817 This is to avoid text relocations. */
9818 bfd_vma off, stub_align, stub_off, stub_size;
9819 unsigned int align_power;
9820
9821 stub_size = 16;
9822 stub_off = s->size;
9823 if (htab->params->plt_stub_align >= 0)
9824 align_power = htab->params->plt_stub_align;
9825 else
9826 align_power = -htab->params->plt_stub_align;
9827 /* Setting section alignment is delayed until we know it is
9828 non-empty. Otherwise the .text output section will be
9829 aligned at least to plt_stub_align even when no global
9830 entry stubs are needed. */
9831 if (s->alignment_power < align_power)
9832 s->alignment_power = align_power;
9833 stub_align = (bfd_vma) 1 << align_power;
9834 if (htab->params->plt_stub_align >= 0
9835 || ((((stub_off + stub_size - 1) & -stub_align)
9836 - (stub_off & -stub_align))
9837 > ((stub_size - 1) & -stub_align)))
9838 stub_off = (stub_off + stub_align - 1) & -stub_align;
9839 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9840 off -= stub_off + s->output_offset + s->output_section->vma;
9841 /* Note that for --plt-stub-align negative we have a possible
9842 dependency between stub offset and size. Break that
9843 dependency by assuming the max stub size when calculating
9844 the stub offset. */
9845 if (PPC_HA (off) == 0)
9846 stub_size -= 4;
9847 h->root.type = bfd_link_hash_defined;
9848 h->root.u.def.section = s;
9849 h->root.u.def.value = stub_off;
9850 s->size = stub_off + stub_size;
9851 break;
9852 }
9853 return TRUE;
9854 }
9855
9856 /* Set the sizes of the dynamic sections. */
9857
9858 static bfd_boolean
9859 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9860 struct bfd_link_info *info)
9861 {
9862 struct ppc_link_hash_table *htab;
9863 bfd *dynobj;
9864 asection *s;
9865 bfd_boolean relocs;
9866 bfd *ibfd;
9867 struct got_entry *first_tlsld;
9868
9869 htab = ppc_hash_table (info);
9870 if (htab == NULL)
9871 return FALSE;
9872
9873 dynobj = htab->elf.dynobj;
9874 if (dynobj == NULL)
9875 abort ();
9876
9877 if (htab->elf.dynamic_sections_created)
9878 {
9879 /* Set the contents of the .interp section to the interpreter. */
9880 if (bfd_link_executable (info) && !info->nointerp)
9881 {
9882 s = bfd_get_linker_section (dynobj, ".interp");
9883 if (s == NULL)
9884 abort ();
9885 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9886 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9887 }
9888 }
9889
9890 /* Set up .got offsets for local syms, and space for local dynamic
9891 relocs. */
9892 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9893 {
9894 struct got_entry **lgot_ents;
9895 struct got_entry **end_lgot_ents;
9896 struct plt_entry **local_plt;
9897 struct plt_entry **end_local_plt;
9898 unsigned char *lgot_masks;
9899 bfd_size_type locsymcount;
9900 Elf_Internal_Shdr *symtab_hdr;
9901
9902 if (!is_ppc64_elf (ibfd))
9903 continue;
9904
9905 for (s = ibfd->sections; s != NULL; s = s->next)
9906 {
9907 struct ppc_dyn_relocs *p;
9908
9909 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9910 {
9911 if (!bfd_is_abs_section (p->sec)
9912 && bfd_is_abs_section (p->sec->output_section))
9913 {
9914 /* Input section has been discarded, either because
9915 it is a copy of a linkonce section or due to
9916 linker script /DISCARD/, so we'll be discarding
9917 the relocs too. */
9918 }
9919 else if (p->count != 0)
9920 {
9921 asection *srel = elf_section_data (p->sec)->sreloc;
9922 if (p->ifunc)
9923 srel = htab->elf.irelplt;
9924 srel->size += p->count * sizeof (Elf64_External_Rela);
9925 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9926 info->flags |= DF_TEXTREL;
9927 }
9928 }
9929 }
9930
9931 lgot_ents = elf_local_got_ents (ibfd);
9932 if (!lgot_ents)
9933 continue;
9934
9935 symtab_hdr = &elf_symtab_hdr (ibfd);
9936 locsymcount = symtab_hdr->sh_info;
9937 end_lgot_ents = lgot_ents + locsymcount;
9938 local_plt = (struct plt_entry **) end_lgot_ents;
9939 end_local_plt = local_plt + locsymcount;
9940 lgot_masks = (unsigned char *) end_local_plt;
9941 s = ppc64_elf_tdata (ibfd)->got;
9942 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9943 {
9944 struct got_entry **pent, *ent;
9945
9946 pent = lgot_ents;
9947 while ((ent = *pent) != NULL)
9948 if (ent->got.refcount > 0)
9949 {
9950 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9951 {
9952 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9953 *pent = ent->next;
9954 }
9955 else
9956 {
9957 unsigned int ent_size = 8;
9958 unsigned int rel_size = sizeof (Elf64_External_Rela);
9959
9960 ent->got.offset = s->size;
9961 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9962 {
9963 ent_size *= 2;
9964 rel_size *= 2;
9965 }
9966 s->size += ent_size;
9967 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9968 {
9969 htab->elf.irelplt->size += rel_size;
9970 htab->got_reli_size += rel_size;
9971 }
9972 else if (bfd_link_pic (info)
9973 && !(ent->tls_type != 0
9974 && bfd_link_executable (info)))
9975 {
9976 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9977 srel->size += rel_size;
9978 }
9979 pent = &ent->next;
9980 }
9981 }
9982 else
9983 *pent = ent->next;
9984 }
9985
9986 /* Allocate space for plt calls to local syms. */
9987 lgot_masks = (unsigned char *) end_local_plt;
9988 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
9989 {
9990 struct plt_entry *ent;
9991
9992 for (ent = *local_plt; ent != NULL; ent = ent->next)
9993 if (ent->plt.refcount > 0)
9994 {
9995 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9996 {
9997 s = htab->elf.iplt;
9998 ent->plt.offset = s->size;
9999 s->size += PLT_ENTRY_SIZE (htab);
10000 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10001 }
10002 else if (htab->can_convert_all_inline_plt
10003 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
10004 ent->plt.offset = (bfd_vma) -1;
10005 else
10006 {
10007 s = htab->pltlocal;
10008 ent->plt.offset = s->size;
10009 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10010 if (bfd_link_pic (info))
10011 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10012 }
10013 }
10014 else
10015 ent->plt.offset = (bfd_vma) -1;
10016 }
10017 }
10018
10019 /* Allocate global sym .plt and .got entries, and space for global
10020 sym dynamic relocs. */
10021 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10022
10023 if (!htab->opd_abi && !bfd_link_pic (info))
10024 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10025
10026 first_tlsld = NULL;
10027 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10028 {
10029 struct got_entry *ent;
10030
10031 if (!is_ppc64_elf (ibfd))
10032 continue;
10033
10034 ent = ppc64_tlsld_got (ibfd);
10035 if (ent->got.refcount > 0)
10036 {
10037 if (!htab->do_multi_toc && first_tlsld != NULL)
10038 {
10039 ent->is_indirect = TRUE;
10040 ent->got.ent = first_tlsld;
10041 }
10042 else
10043 {
10044 if (first_tlsld == NULL)
10045 first_tlsld = ent;
10046 s = ppc64_elf_tdata (ibfd)->got;
10047 ent->got.offset = s->size;
10048 ent->owner = ibfd;
10049 s->size += 16;
10050 if (bfd_link_dll (info))
10051 {
10052 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10053 srel->size += sizeof (Elf64_External_Rela);
10054 }
10055 }
10056 }
10057 else
10058 ent->got.offset = (bfd_vma) -1;
10059 }
10060
10061 /* We now have determined the sizes of the various dynamic sections.
10062 Allocate memory for them. */
10063 relocs = FALSE;
10064 for (s = dynobj->sections; s != NULL; s = s->next)
10065 {
10066 if ((s->flags & SEC_LINKER_CREATED) == 0)
10067 continue;
10068
10069 if (s == htab->brlt || s == htab->relbrlt)
10070 /* These haven't been allocated yet; don't strip. */
10071 continue;
10072 else if (s == htab->elf.sgot
10073 || s == htab->elf.splt
10074 || s == htab->elf.iplt
10075 || s == htab->pltlocal
10076 || s == htab->glink
10077 || s == htab->global_entry
10078 || s == htab->elf.sdynbss
10079 || s == htab->elf.sdynrelro)
10080 {
10081 /* Strip this section if we don't need it; see the
10082 comment below. */
10083 }
10084 else if (s == htab->glink_eh_frame)
10085 {
10086 if (!bfd_is_abs_section (s->output_section))
10087 /* Not sized yet. */
10088 continue;
10089 }
10090 else if (CONST_STRNEQ (s->name, ".rela"))
10091 {
10092 if (s->size != 0)
10093 {
10094 if (s != htab->elf.srelplt)
10095 relocs = TRUE;
10096
10097 /* We use the reloc_count field as a counter if we need
10098 to copy relocs into the output file. */
10099 s->reloc_count = 0;
10100 }
10101 }
10102 else
10103 {
10104 /* It's not one of our sections, so don't allocate space. */
10105 continue;
10106 }
10107
10108 if (s->size == 0)
10109 {
10110 /* If we don't need this section, strip it from the
10111 output file. This is mostly to handle .rela.bss and
10112 .rela.plt. We must create both sections in
10113 create_dynamic_sections, because they must be created
10114 before the linker maps input sections to output
10115 sections. The linker does that before
10116 adjust_dynamic_symbol is called, and it is that
10117 function which decides whether anything needs to go
10118 into these sections. */
10119 s->flags |= SEC_EXCLUDE;
10120 continue;
10121 }
10122
10123 if (bfd_is_abs_section (s->output_section))
10124 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10125 s->name);
10126
10127 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10128 continue;
10129
10130 /* Allocate memory for the section contents. We use bfd_zalloc
10131 here in case unused entries are not reclaimed before the
10132 section's contents are written out. This should not happen,
10133 but this way if it does we get a R_PPC64_NONE reloc in .rela
10134 sections instead of garbage.
10135 We also rely on the section contents being zero when writing
10136 the GOT and .dynrelro. */
10137 s->contents = bfd_zalloc (dynobj, s->size);
10138 if (s->contents == NULL)
10139 return FALSE;
10140 }
10141
10142 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10143 {
10144 if (!is_ppc64_elf (ibfd))
10145 continue;
10146
10147 s = ppc64_elf_tdata (ibfd)->got;
10148 if (s != NULL && s != htab->elf.sgot)
10149 {
10150 if (s->size == 0)
10151 s->flags |= SEC_EXCLUDE;
10152 else
10153 {
10154 s->contents = bfd_zalloc (ibfd, s->size);
10155 if (s->contents == NULL)
10156 return FALSE;
10157 }
10158 }
10159 s = ppc64_elf_tdata (ibfd)->relgot;
10160 if (s != NULL)
10161 {
10162 if (s->size == 0)
10163 s->flags |= SEC_EXCLUDE;
10164 else
10165 {
10166 s->contents = bfd_zalloc (ibfd, s->size);
10167 if (s->contents == NULL)
10168 return FALSE;
10169 relocs = TRUE;
10170 s->reloc_count = 0;
10171 }
10172 }
10173 }
10174
10175 if (htab->elf.dynamic_sections_created)
10176 {
10177 bfd_boolean tls_opt;
10178
10179 /* Add some entries to the .dynamic section. We fill in the
10180 values later, in ppc64_elf_finish_dynamic_sections, but we
10181 must add the entries now so that we get the correct size for
10182 the .dynamic section. The DT_DEBUG entry is filled in by the
10183 dynamic linker and used by the debugger. */
10184 #define add_dynamic_entry(TAG, VAL) \
10185 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10186
10187 if (bfd_link_executable (info))
10188 {
10189 if (!add_dynamic_entry (DT_DEBUG, 0))
10190 return FALSE;
10191 }
10192
10193 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10194 {
10195 if (!add_dynamic_entry (DT_PLTGOT, 0)
10196 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10197 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10198 || !add_dynamic_entry (DT_JMPREL, 0)
10199 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10200 return FALSE;
10201 }
10202
10203 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10204 {
10205 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10206 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10207 return FALSE;
10208 }
10209
10210 tls_opt = (htab->params->tls_get_addr_opt
10211 && ((htab->tls_get_addr_fd != NULL
10212 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10213 || (htab->tga_desc_fd != NULL
10214 && htab->tga_desc_fd->elf.plt.plist != NULL)));
10215 if (tls_opt || !htab->opd_abi)
10216 {
10217 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10218 return FALSE;
10219 }
10220
10221 if (relocs)
10222 {
10223 if (!add_dynamic_entry (DT_RELA, 0)
10224 || !add_dynamic_entry (DT_RELASZ, 0)
10225 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10226 return FALSE;
10227
10228 /* If any dynamic relocs apply to a read-only section,
10229 then we need a DT_TEXTREL entry. */
10230 if ((info->flags & DF_TEXTREL) == 0)
10231 elf_link_hash_traverse (&htab->elf,
10232 _bfd_elf_maybe_set_textrel, info);
10233
10234 if ((info->flags & DF_TEXTREL) != 0)
10235 {
10236 if (!add_dynamic_entry (DT_TEXTREL, 0))
10237 return FALSE;
10238 }
10239 }
10240 }
10241 #undef add_dynamic_entry
10242
10243 return TRUE;
10244 }
10245
10246 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10247
10248 static bfd_boolean
10249 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10250 {
10251 if (h->plt.plist != NULL
10252 && !h->def_regular
10253 && !h->pointer_equality_needed)
10254 return FALSE;
10255
10256 return _bfd_elf_hash_symbol (h);
10257 }
10258
10259 /* Determine the type of stub needed, if any, for a call. */
10260
10261 static inline enum ppc_stub_type
10262 ppc_type_of_stub (asection *input_sec,
10263 const Elf_Internal_Rela *rel,
10264 struct ppc_link_hash_entry **hash,
10265 struct plt_entry **plt_ent,
10266 bfd_vma destination,
10267 unsigned long local_off)
10268 {
10269 struct ppc_link_hash_entry *h = *hash;
10270 bfd_vma location;
10271 bfd_vma branch_offset;
10272 bfd_vma max_branch_offset;
10273 enum elf_ppc64_reloc_type r_type;
10274
10275 if (h != NULL)
10276 {
10277 struct plt_entry *ent;
10278 struct ppc_link_hash_entry *fdh = h;
10279 if (h->oh != NULL
10280 && h->oh->is_func_descriptor)
10281 {
10282 fdh = ppc_follow_link (h->oh);
10283 *hash = fdh;
10284 }
10285
10286 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10287 if (ent->addend == rel->r_addend
10288 && ent->plt.offset != (bfd_vma) -1)
10289 {
10290 *plt_ent = ent;
10291 return ppc_stub_plt_call;
10292 }
10293
10294 /* Here, we know we don't have a plt entry. If we don't have a
10295 either a defined function descriptor or a defined entry symbol
10296 in a regular object file, then it is pointless trying to make
10297 any other type of stub. */
10298 if (!is_static_defined (&fdh->elf)
10299 && !is_static_defined (&h->elf))
10300 return ppc_stub_none;
10301 }
10302 else if (elf_local_got_ents (input_sec->owner) != NULL)
10303 {
10304 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10305 struct plt_entry **local_plt = (struct plt_entry **)
10306 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10307 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10308
10309 if (local_plt[r_symndx] != NULL)
10310 {
10311 struct plt_entry *ent;
10312
10313 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10314 if (ent->addend == rel->r_addend
10315 && ent->plt.offset != (bfd_vma) -1)
10316 {
10317 *plt_ent = ent;
10318 return ppc_stub_plt_call;
10319 }
10320 }
10321 }
10322
10323 /* Determine where the call point is. */
10324 location = (input_sec->output_offset
10325 + input_sec->output_section->vma
10326 + rel->r_offset);
10327
10328 branch_offset = destination - location;
10329 r_type = ELF64_R_TYPE (rel->r_info);
10330
10331 /* Determine if a long branch stub is needed. */
10332 max_branch_offset = 1 << 25;
10333 if (r_type == R_PPC64_REL14
10334 || r_type == R_PPC64_REL14_BRTAKEN
10335 || r_type == R_PPC64_REL14_BRNTAKEN)
10336 max_branch_offset = 1 << 15;
10337
10338 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10339 /* We need a stub. Figure out whether a long_branch or plt_branch
10340 is needed later. */
10341 return ppc_stub_long_branch;
10342
10343 return ppc_stub_none;
10344 }
10345
10346 /* Gets the address of a label (1:) in r11 and builds an offset in r12,
10347 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10348 . mflr %r12
10349 . bcl 20,31,1f
10350 .1: mflr %r11
10351 . mtlr %r12
10352 . lis %r12,xxx-1b@highest
10353 . ori %r12,%r12,xxx-1b@higher
10354 . sldi %r12,%r12,32
10355 . oris %r12,%r12,xxx-1b@high
10356 . ori %r12,%r12,xxx-1b@l
10357 . add/ldx %r12,%r11,%r12 */
10358
10359 static bfd_byte *
10360 build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10361 {
10362 bfd_put_32 (abfd, MFLR_R12, p);
10363 p += 4;
10364 bfd_put_32 (abfd, BCL_20_31, p);
10365 p += 4;
10366 bfd_put_32 (abfd, MFLR_R11, p);
10367 p += 4;
10368 bfd_put_32 (abfd, MTLR_R12, p);
10369 p += 4;
10370 if (off + 0x8000 < 0x10000)
10371 {
10372 if (load)
10373 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10374 else
10375 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10376 p += 4;
10377 }
10378 else if (off + 0x80008000ULL < 0x100000000ULL)
10379 {
10380 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10381 p += 4;
10382 if (load)
10383 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10384 else
10385 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10386 p += 4;
10387 }
10388 else
10389 {
10390 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10391 {
10392 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10393 p += 4;
10394 }
10395 else
10396 {
10397 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10398 p += 4;
10399 if (((off >> 32) & 0xffff) != 0)
10400 {
10401 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10402 p += 4;
10403 }
10404 }
10405 if (((off >> 32) & 0xffffffffULL) != 0)
10406 {
10407 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10408 p += 4;
10409 }
10410 if (PPC_HI (off) != 0)
10411 {
10412 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10413 p += 4;
10414 }
10415 if (PPC_LO (off) != 0)
10416 {
10417 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10418 p += 4;
10419 }
10420 if (load)
10421 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10422 else
10423 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10424 p += 4;
10425 }
10426 return p;
10427 }
10428
10429 static unsigned int
10430 size_offset (bfd_vma off)
10431 {
10432 unsigned int size;
10433 if (off + 0x8000 < 0x10000)
10434 size = 4;
10435 else if (off + 0x80008000ULL < 0x100000000ULL)
10436 size = 8;
10437 else
10438 {
10439 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10440 size = 4;
10441 else
10442 {
10443 size = 4;
10444 if (((off >> 32) & 0xffff) != 0)
10445 size += 4;
10446 }
10447 if (((off >> 32) & 0xffffffffULL) != 0)
10448 size += 4;
10449 if (PPC_HI (off) != 0)
10450 size += 4;
10451 if (PPC_LO (off) != 0)
10452 size += 4;
10453 size += 4;
10454 }
10455 return size + 16;
10456 }
10457
10458 static unsigned int
10459 num_relocs_for_offset (bfd_vma off)
10460 {
10461 unsigned int num_rel;
10462 if (off + 0x8000 < 0x10000)
10463 num_rel = 1;
10464 else if (off + 0x80008000ULL < 0x100000000ULL)
10465 num_rel = 2;
10466 else
10467 {
10468 num_rel = 1;
10469 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10470 && ((off >> 32) & 0xffff) != 0)
10471 num_rel += 1;
10472 if (PPC_HI (off) != 0)
10473 num_rel += 1;
10474 if (PPC_LO (off) != 0)
10475 num_rel += 1;
10476 }
10477 return num_rel;
10478 }
10479
10480 static Elf_Internal_Rela *
10481 emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10482 bfd_vma roff, bfd_vma targ, bfd_vma off)
10483 {
10484 bfd_vma relative_targ = targ - (roff - 8);
10485 if (bfd_big_endian (info->output_bfd))
10486 roff += 2;
10487 r->r_offset = roff;
10488 r->r_addend = relative_targ + roff;
10489 if (off + 0x8000 < 0x10000)
10490 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10491 else if (off + 0x80008000ULL < 0x100000000ULL)
10492 {
10493 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10494 ++r;
10495 roff += 4;
10496 r->r_offset = roff;
10497 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10498 r->r_addend = relative_targ + roff;
10499 }
10500 else
10501 {
10502 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10503 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10504 else
10505 {
10506 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10507 if (((off >> 32) & 0xffff) != 0)
10508 {
10509 ++r;
10510 roff += 4;
10511 r->r_offset = roff;
10512 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10513 r->r_addend = relative_targ + roff;
10514 }
10515 }
10516 if (((off >> 32) & 0xffffffffULL) != 0)
10517 roff += 4;
10518 if (PPC_HI (off) != 0)
10519 {
10520 ++r;
10521 roff += 4;
10522 r->r_offset = roff;
10523 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10524 r->r_addend = relative_targ + roff;
10525 }
10526 if (PPC_LO (off) != 0)
10527 {
10528 ++r;
10529 roff += 4;
10530 r->r_offset = roff;
10531 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10532 r->r_addend = relative_targ + roff;
10533 }
10534 }
10535 return r;
10536 }
10537
10538 static bfd_byte *
10539 build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10540 bfd_boolean load)
10541 {
10542 uint64_t insn;
10543 if (off - odd + (1ULL << 33) < 1ULL << 34)
10544 {
10545 off -= odd;
10546 if (odd)
10547 {
10548 bfd_put_32 (abfd, NOP, p);
10549 p += 4;
10550 }
10551 if (load)
10552 insn = PLD_R12_PC;
10553 else
10554 insn = PADDI_R12_PC;
10555 insn |= D34 (off);
10556 bfd_put_32 (abfd, insn >> 32, p);
10557 p += 4;
10558 bfd_put_32 (abfd, insn, p);
10559 }
10560 /* The minimum value for paddi is -0x200000000. The minimum value
10561 for li is -0x8000, which when shifted by 34 and added gives a
10562 minimum value of -0x2000200000000. The maximum value is
10563 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10564 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10565 {
10566 off -= 8 - odd;
10567 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10568 p += 4;
10569 if (!odd)
10570 {
10571 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10572 p += 4;
10573 }
10574 insn = PADDI_R12_PC | D34 (off);
10575 bfd_put_32 (abfd, insn >> 32, p);
10576 p += 4;
10577 bfd_put_32 (abfd, insn, p);
10578 p += 4;
10579 if (odd)
10580 {
10581 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10582 p += 4;
10583 }
10584 if (load)
10585 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10586 else
10587 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10588 }
10589 else
10590 {
10591 off -= odd + 8;
10592 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10593 p += 4;
10594 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10595 p += 4;
10596 if (odd)
10597 {
10598 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10599 p += 4;
10600 }
10601 insn = PADDI_R12_PC | D34 (off);
10602 bfd_put_32 (abfd, insn >> 32, p);
10603 p += 4;
10604 bfd_put_32 (abfd, insn, p);
10605 p += 4;
10606 if (!odd)
10607 {
10608 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10609 p += 4;
10610 }
10611 if (load)
10612 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10613 else
10614 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10615 }
10616 p += 4;
10617 return p;
10618 }
10619
10620 static unsigned int
10621 size_power10_offset (bfd_vma off, int odd)
10622 {
10623 if (off - odd + (1ULL << 33) < 1ULL << 34)
10624 return odd + 8;
10625 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10626 return 20;
10627 else
10628 return 24;
10629 }
10630
10631 static unsigned int
10632 num_relocs_for_power10_offset (bfd_vma off, int odd)
10633 {
10634 if (off - odd + (1ULL << 33) < 1ULL << 34)
10635 return 1;
10636 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10637 return 2;
10638 else
10639 return 3;
10640 }
10641
10642 static Elf_Internal_Rela *
10643 emit_relocs_for_power10_offset (struct bfd_link_info *info,
10644 Elf_Internal_Rela *r, bfd_vma roff,
10645 bfd_vma targ, bfd_vma off, int odd)
10646 {
10647 if (off - odd + (1ULL << 33) < 1ULL << 34)
10648 roff += odd;
10649 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10650 {
10651 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10652 r->r_offset = roff + d_offset;
10653 r->r_addend = targ + 8 - odd - d_offset;
10654 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10655 ++r;
10656 roff += 8 - odd;
10657 }
10658 else
10659 {
10660 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10661 r->r_offset = roff + d_offset;
10662 r->r_addend = targ + 8 + odd - d_offset;
10663 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10664 ++r;
10665 roff += 4;
10666 r->r_offset = roff + d_offset;
10667 r->r_addend = targ + 4 + odd - d_offset;
10668 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10669 ++r;
10670 roff += 4 + odd;
10671 }
10672 r->r_offset = roff;
10673 r->r_addend = targ;
10674 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10675 return r;
10676 }
10677
10678 /* Emit .eh_frame opcode to advance pc by DELTA. */
10679
10680 static bfd_byte *
10681 eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10682 {
10683 delta /= 4;
10684 if (delta < 64)
10685 *eh++ = DW_CFA_advance_loc + delta;
10686 else if (delta < 256)
10687 {
10688 *eh++ = DW_CFA_advance_loc1;
10689 *eh++ = delta;
10690 }
10691 else if (delta < 65536)
10692 {
10693 *eh++ = DW_CFA_advance_loc2;
10694 bfd_put_16 (abfd, delta, eh);
10695 eh += 2;
10696 }
10697 else
10698 {
10699 *eh++ = DW_CFA_advance_loc4;
10700 bfd_put_32 (abfd, delta, eh);
10701 eh += 4;
10702 }
10703 return eh;
10704 }
10705
10706 /* Size of required .eh_frame opcode to advance pc by DELTA. */
10707
10708 static unsigned int
10709 eh_advance_size (unsigned int delta)
10710 {
10711 if (delta < 64 * 4)
10712 /* DW_CFA_advance_loc+[1..63]. */
10713 return 1;
10714 if (delta < 256 * 4)
10715 /* DW_CFA_advance_loc1, byte. */
10716 return 2;
10717 if (delta < 65536 * 4)
10718 /* DW_CFA_advance_loc2, 2 bytes. */
10719 return 3;
10720 /* DW_CFA_advance_loc4, 4 bytes. */
10721 return 5;
10722 }
10723
10724 /* With power7 weakly ordered memory model, it is possible for ld.so
10725 to update a plt entry in one thread and have another thread see a
10726 stale zero toc entry. To avoid this we need some sort of acquire
10727 barrier in the call stub. One solution is to make the load of the
10728 toc word seem to appear to depend on the load of the function entry
10729 word. Another solution is to test for r2 being zero, and branch to
10730 the appropriate glink entry if so.
10731
10732 . fake dep barrier compare
10733 . ld 12,xxx(2) ld 12,xxx(2)
10734 . mtctr 12 mtctr 12
10735 . xor 11,12,12 ld 2,xxx+8(2)
10736 . add 2,2,11 cmpldi 2,0
10737 . ld 2,xxx+8(2) bnectr+
10738 . bctr b <glink_entry>
10739
10740 The solution involving the compare turns out to be faster, so
10741 that's what we use unless the branch won't reach. */
10742
10743 #define ALWAYS_USE_FAKE_DEP 0
10744 #define ALWAYS_EMIT_R2SAVE 0
10745
10746 static inline unsigned int
10747 plt_stub_size (struct ppc_link_hash_table *htab,
10748 struct ppc_stub_hash_entry *stub_entry,
10749 bfd_vma off)
10750 {
10751 unsigned size;
10752
10753 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10754 {
10755 if (htab->power10_stubs)
10756 {
10757 bfd_vma start = (stub_entry->stub_offset
10758 + stub_entry->group->stub_sec->output_offset
10759 + stub_entry->group->stub_sec->output_section->vma);
10760 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10761 start += 4;
10762 size = 8 + size_power10_offset (off, start & 4);
10763 }
10764 else
10765 size = 8 + size_offset (off - 8);
10766 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10767 size += 4;
10768 return size;
10769 }
10770
10771 size = 12;
10772 if (ALWAYS_EMIT_R2SAVE
10773 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10774 size += 4;
10775 if (PPC_HA (off) != 0)
10776 size += 4;
10777 if (htab->opd_abi)
10778 {
10779 size += 4;
10780 if (htab->params->plt_static_chain)
10781 size += 4;
10782 if (htab->params->plt_thread_safe
10783 && htab->elf.dynamic_sections_created
10784 && stub_entry->h != NULL
10785 && stub_entry->h->elf.dynindx != -1)
10786 size += 8;
10787 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10788 size += 4;
10789 }
10790 if (stub_entry->h != NULL
10791 && is_tls_get_addr (&stub_entry->h->elf, htab)
10792 && htab->params->tls_get_addr_opt)
10793 {
10794 if (htab->params->no_tls_get_addr_regsave)
10795 {
10796 size += 7 * 4;
10797 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10798 size += 6 * 4;
10799 }
10800 else
10801 {
10802 size += 30 * 4;
10803 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10804 size += 4;
10805 }
10806 }
10807 return size;
10808 }
10809
10810 /* Depending on the sign of plt_stub_align:
10811 If positive, return the padding to align to a 2**plt_stub_align
10812 boundary.
10813 If negative, if this stub would cross fewer 2**plt_stub_align
10814 boundaries if we align, then return the padding needed to do so. */
10815
10816 static inline unsigned int
10817 plt_stub_pad (struct ppc_link_hash_table *htab,
10818 struct ppc_stub_hash_entry *stub_entry,
10819 bfd_vma plt_off)
10820 {
10821 int stub_align;
10822 unsigned stub_size;
10823 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10824
10825 if (htab->params->plt_stub_align >= 0)
10826 {
10827 stub_align = 1 << htab->params->plt_stub_align;
10828 if ((stub_off & (stub_align - 1)) != 0)
10829 return stub_align - (stub_off & (stub_align - 1));
10830 return 0;
10831 }
10832
10833 stub_align = 1 << -htab->params->plt_stub_align;
10834 stub_size = plt_stub_size (htab, stub_entry, plt_off);
10835 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10836 > ((stub_size - 1) & -stub_align))
10837 return stub_align - (stub_off & (stub_align - 1));
10838 return 0;
10839 }
10840
10841 /* Build a .plt call stub. */
10842
10843 static inline bfd_byte *
10844 build_plt_stub (struct ppc_link_hash_table *htab,
10845 struct ppc_stub_hash_entry *stub_entry,
10846 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10847 {
10848 bfd *obfd = htab->params->stub_bfd;
10849 bfd_boolean plt_load_toc = htab->opd_abi;
10850 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10851 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10852 && htab->elf.dynamic_sections_created
10853 && stub_entry->h != NULL
10854 && stub_entry->h->elf.dynindx != -1);
10855 bfd_boolean use_fake_dep = plt_thread_safe;
10856 bfd_vma cmp_branch_off = 0;
10857
10858 if (!ALWAYS_USE_FAKE_DEP
10859 && plt_load_toc
10860 && plt_thread_safe
10861 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
10862 && htab->params->tls_get_addr_opt))
10863 {
10864 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10865 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10866 / PLT_ENTRY_SIZE (htab));
10867 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10868 bfd_vma to, from;
10869
10870 if (pltindex > 32768)
10871 glinkoff += (pltindex - 32768) * 4;
10872 to = (glinkoff
10873 + htab->glink->output_offset
10874 + htab->glink->output_section->vma);
10875 from = (p - stub_entry->group->stub_sec->contents
10876 + 4 * (ALWAYS_EMIT_R2SAVE
10877 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10878 + 4 * (PPC_HA (offset) != 0)
10879 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10880 != PPC_HA (offset))
10881 + 4 * (plt_static_chain != 0)
10882 + 20
10883 + stub_entry->group->stub_sec->output_offset
10884 + stub_entry->group->stub_sec->output_section->vma);
10885 cmp_branch_off = to - from;
10886 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10887 }
10888
10889 if (PPC_HA (offset) != 0)
10890 {
10891 if (r != NULL)
10892 {
10893 if (ALWAYS_EMIT_R2SAVE
10894 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10895 r[0].r_offset += 4;
10896 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10897 r[1].r_offset = r[0].r_offset + 4;
10898 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10899 r[1].r_addend = r[0].r_addend;
10900 if (plt_load_toc)
10901 {
10902 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10903 {
10904 r[2].r_offset = r[1].r_offset + 4;
10905 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10906 r[2].r_addend = r[0].r_addend;
10907 }
10908 else
10909 {
10910 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10911 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10912 r[2].r_addend = r[0].r_addend + 8;
10913 if (plt_static_chain)
10914 {
10915 r[3].r_offset = r[2].r_offset + 4;
10916 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10917 r[3].r_addend = r[0].r_addend + 16;
10918 }
10919 }
10920 }
10921 }
10922 if (ALWAYS_EMIT_R2SAVE
10923 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10924 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10925 if (plt_load_toc)
10926 {
10927 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10928 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10929 }
10930 else
10931 {
10932 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10933 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10934 }
10935 if (plt_load_toc
10936 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10937 {
10938 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10939 offset = 0;
10940 }
10941 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10942 if (plt_load_toc)
10943 {
10944 if (use_fake_dep)
10945 {
10946 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10947 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10948 }
10949 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10950 if (plt_static_chain)
10951 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10952 }
10953 }
10954 else
10955 {
10956 if (r != NULL)
10957 {
10958 if (ALWAYS_EMIT_R2SAVE
10959 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10960 r[0].r_offset += 4;
10961 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10962 if (plt_load_toc)
10963 {
10964 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10965 {
10966 r[1].r_offset = r[0].r_offset + 4;
10967 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10968 r[1].r_addend = r[0].r_addend;
10969 }
10970 else
10971 {
10972 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10973 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10974 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10975 if (plt_static_chain)
10976 {
10977 r[2].r_offset = r[1].r_offset + 4;
10978 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10979 r[2].r_addend = r[0].r_addend + 8;
10980 }
10981 }
10982 }
10983 }
10984 if (ALWAYS_EMIT_R2SAVE
10985 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10986 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10987 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10988 if (plt_load_toc
10989 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10990 {
10991 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10992 offset = 0;
10993 }
10994 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10995 if (plt_load_toc)
10996 {
10997 if (use_fake_dep)
10998 {
10999 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11000 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11001 }
11002 if (plt_static_chain)
11003 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11004 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
11005 }
11006 }
11007 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
11008 {
11009 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11010 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
11011 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
11012 }
11013 else
11014 bfd_put_32 (obfd, BCTR, p), p += 4;
11015 return p;
11016 }
11017
11018 /* Build a special .plt call stub for __tls_get_addr. */
11019
11020 #define LD_R0_0R3 0xe8030000
11021 #define LD_R12_0R3 0xe9830000
11022 #define MR_R0_R3 0x7c601b78
11023 #define CMPDI_R0_0 0x2c200000
11024 #define ADD_R3_R12_R13 0x7c6c6a14
11025 #define BEQLR 0x4d820020
11026 #define MR_R3_R0 0x7c030378
11027 #define BCTRL 0x4e800421
11028
11029 static inline bfd_byte *
11030 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11031 struct ppc_stub_hash_entry *stub_entry,
11032 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
11033 {
11034 bfd *obfd = htab->params->stub_bfd;
11035 bfd_byte *loc = p;
11036 unsigned int i;
11037
11038 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
11039 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11040 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
11041 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11042 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11043 bfd_put_32 (obfd, BEQLR, p), p += 4;
11044 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
11045 if (htab->params->no_tls_get_addr_regsave)
11046 {
11047 if (r != NULL)
11048 r[0].r_offset += 7 * 4;
11049 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11050 return build_plt_stub (htab, stub_entry, p, offset, r);
11051
11052 bfd_put_32 (obfd, MFLR_R0, p);
11053 p += 4;
11054 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11055 p += 4;
11056
11057 if (r != NULL)
11058 r[0].r_offset += 2 * 4;
11059 p = build_plt_stub (htab, stub_entry, p, offset, r);
11060 bfd_put_32 (obfd, BCTRL, p - 4);
11061
11062 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11063 p += 4;
11064 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11065 p += 4;
11066 bfd_put_32 (obfd, MTLR_R0, p);
11067 p += 4;
11068 bfd_put_32 (obfd, BLR, p);
11069 p += 4;
11070 }
11071 else
11072 {
11073 p = tls_get_addr_prologue (obfd, p, htab);
11074
11075 if (r != NULL)
11076 r[0].r_offset += 18 * 4;
11077
11078 p = build_plt_stub (htab, stub_entry, p, offset, r);
11079 bfd_put_32 (obfd, BCTRL, p - 4);
11080
11081 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11082 {
11083 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11084 p += 4;
11085 }
11086
11087 p = tls_get_addr_epilogue (obfd, p, htab);
11088 }
11089
11090 if (htab->glink_eh_frame != NULL
11091 && htab->glink_eh_frame->size != 0)
11092 {
11093 bfd_byte *base, *eh;
11094
11095 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11096 eh = base + stub_entry->group->eh_size;
11097 if (htab->params->no_tls_get_addr_regsave)
11098 {
11099 unsigned int lr_used, delta;
11100 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11101 delta = lr_used - stub_entry->group->lr_restore;
11102 stub_entry->group->lr_restore = lr_used + 16;
11103 eh = eh_advance (htab->elf.dynobj, eh, delta);
11104 *eh++ = DW_CFA_offset_extended_sf;
11105 *eh++ = 65;
11106 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11107 *eh++ = DW_CFA_advance_loc + 4;
11108 }
11109 else
11110 {
11111 unsigned int cfa_updt, delta;
11112 /* After the bctrl, lr has been modified so we need to emit
11113 .eh_frame info saying the return address is on the stack. In
11114 fact we must put the EH info at or before the call rather
11115 than after it, because the EH info for a call needs to be
11116 specified by that point.
11117 See libgcc/unwind-dw2.c execute_cfa_program.
11118 Any stack pointer update must be described immediately after
11119 the instruction making the change, and since the stdu occurs
11120 after saving regs we put all the reg saves and the cfa
11121 change there. */
11122 cfa_updt = stub_entry->stub_offset + 18 * 4;
11123 delta = cfa_updt - stub_entry->group->lr_restore;
11124 stub_entry->group->lr_restore
11125 = stub_entry->stub_offset + (p - loc) - 4;
11126 eh = eh_advance (htab->elf.dynobj, eh, delta);
11127 *eh++ = DW_CFA_def_cfa_offset;
11128 if (htab->opd_abi)
11129 {
11130 *eh++ = 128;
11131 *eh++ = 1;
11132 }
11133 else
11134 *eh++ = 96;
11135 *eh++ = DW_CFA_offset_extended_sf;
11136 *eh++ = 65;
11137 *eh++ = (-16 / 8) & 0x7f;
11138 for (i = 4; i < 12; i++)
11139 {
11140 *eh++ = DW_CFA_offset + i;
11141 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11142 }
11143 *eh++ = (DW_CFA_advance_loc
11144 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11145 *eh++ = DW_CFA_def_cfa_offset;
11146 *eh++ = 0;
11147 for (i = 4; i < 12; i++)
11148 *eh++ = DW_CFA_restore + i;
11149 *eh++ = DW_CFA_advance_loc + 2;
11150 }
11151 *eh++ = DW_CFA_restore_extended;
11152 *eh++ = 65;
11153 stub_entry->group->eh_size = eh - base;
11154 }
11155 return p;
11156 }
11157
11158 static Elf_Internal_Rela *
11159 get_relocs (asection *sec, int count)
11160 {
11161 Elf_Internal_Rela *relocs;
11162 struct bfd_elf_section_data *elfsec_data;
11163
11164 elfsec_data = elf_section_data (sec);
11165 relocs = elfsec_data->relocs;
11166 if (relocs == NULL)
11167 {
11168 bfd_size_type relsize;
11169 relsize = sec->reloc_count * sizeof (*relocs);
11170 relocs = bfd_alloc (sec->owner, relsize);
11171 if (relocs == NULL)
11172 return NULL;
11173 elfsec_data->relocs = relocs;
11174 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11175 sizeof (Elf_Internal_Shdr));
11176 if (elfsec_data->rela.hdr == NULL)
11177 return NULL;
11178 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11179 * sizeof (Elf64_External_Rela));
11180 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
11181 sec->reloc_count = 0;
11182 }
11183 relocs += sec->reloc_count;
11184 sec->reloc_count += count;
11185 return relocs;
11186 }
11187
11188 /* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11189 forms, to the equivalent relocs against the global symbol given by
11190 STUB_ENTRY->H. */
11191
11192 static bfd_boolean
11193 use_global_in_relocs (struct ppc_link_hash_table *htab,
11194 struct ppc_stub_hash_entry *stub_entry,
11195 Elf_Internal_Rela *r, unsigned int num_rel)
11196 {
11197 struct elf_link_hash_entry **hashes;
11198 unsigned long symndx;
11199 struct ppc_link_hash_entry *h;
11200 bfd_vma symval;
11201
11202 /* Relocs are always against symbols in their own object file. Fake
11203 up global sym hashes for the stub bfd (which has no symbols). */
11204 hashes = elf_sym_hashes (htab->params->stub_bfd);
11205 if (hashes == NULL)
11206 {
11207 bfd_size_type hsize;
11208
11209 /* When called the first time, stub_globals will contain the
11210 total number of symbols seen during stub sizing. After
11211 allocating, stub_globals is used as an index to fill the
11212 hashes array. */
11213 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11214 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11215 if (hashes == NULL)
11216 return FALSE;
11217 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11218 htab->stub_globals = 1;
11219 }
11220 symndx = htab->stub_globals++;
11221 h = stub_entry->h;
11222 hashes[symndx] = &h->elf;
11223 if (h->oh != NULL && h->oh->is_func)
11224 h = ppc_follow_link (h->oh);
11225 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11226 || h->elf.root.type == bfd_link_hash_defweak);
11227 symval = defined_sym_val (&h->elf);
11228 while (num_rel-- != 0)
11229 {
11230 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11231 if (h->elf.root.u.def.section != stub_entry->target_section)
11232 {
11233 /* H is an opd symbol. The addend must be zero, and the
11234 branch reloc is the only one we can convert. */
11235 r->r_addend = 0;
11236 break;
11237 }
11238 else
11239 r->r_addend -= symval;
11240 --r;
11241 }
11242 return TRUE;
11243 }
11244
11245 static bfd_vma
11246 get_r2off (struct bfd_link_info *info,
11247 struct ppc_stub_hash_entry *stub_entry)
11248 {
11249 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11250 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11251
11252 if (r2off == 0)
11253 {
11254 /* Support linking -R objects. Get the toc pointer from the
11255 opd entry. */
11256 char buf[8];
11257 if (!htab->opd_abi)
11258 return r2off;
11259 asection *opd = stub_entry->h->elf.root.u.def.section;
11260 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11261
11262 if (strcmp (opd->name, ".opd") != 0
11263 || opd->reloc_count != 0)
11264 {
11265 info->callbacks->einfo
11266 (_("%P: cannot find opd entry toc for `%pT'\n"),
11267 stub_entry->h->elf.root.root.string);
11268 bfd_set_error (bfd_error_bad_value);
11269 return (bfd_vma) -1;
11270 }
11271 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11272 return (bfd_vma) -1;
11273 r2off = bfd_get_64 (opd->owner, buf);
11274 r2off -= elf_gp (info->output_bfd);
11275 }
11276 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11277 return r2off;
11278 }
11279
11280 static bfd_boolean
11281 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11282 {
11283 struct ppc_stub_hash_entry *stub_entry;
11284 struct ppc_branch_hash_entry *br_entry;
11285 struct bfd_link_info *info;
11286 struct ppc_link_hash_table *htab;
11287 bfd_byte *loc;
11288 bfd_byte *p, *relp;
11289 bfd_vma targ, off;
11290 Elf_Internal_Rela *r;
11291 asection *plt;
11292 int num_rel;
11293 int odd;
11294
11295 /* Massage our args to the form they really have. */
11296 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11297 info = in_arg;
11298
11299 /* Fail if the target section could not be assigned to an output
11300 section. The user should fix his linker script. */
11301 if (stub_entry->target_section != NULL
11302 && stub_entry->target_section->output_section == NULL
11303 && info->non_contiguous_regions)
11304 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11305 "Retry without --enable-non-contiguous-regions.\n"),
11306 stub_entry->target_section);
11307
11308 /* Same for the group. */
11309 if (stub_entry->group->stub_sec != NULL
11310 && stub_entry->group->stub_sec->output_section == NULL
11311 && info->non_contiguous_regions)
11312 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11313 "output section. Retry without "
11314 "--enable-non-contiguous-regions.\n"),
11315 stub_entry->group->stub_sec,
11316 stub_entry->target_section);
11317
11318 htab = ppc_hash_table (info);
11319 if (htab == NULL)
11320 return FALSE;
11321
11322 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
11323 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11324
11325 htab->stub_count[stub_entry->stub_type - 1] += 1;
11326 switch (stub_entry->stub_type)
11327 {
11328 case ppc_stub_long_branch:
11329 case ppc_stub_long_branch_r2off:
11330 /* Branches are relative. This is where we are going to. */
11331 targ = (stub_entry->target_value
11332 + stub_entry->target_section->output_offset
11333 + stub_entry->target_section->output_section->vma);
11334 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11335
11336 /* And this is where we are coming from. */
11337 off = (stub_entry->stub_offset
11338 + stub_entry->group->stub_sec->output_offset
11339 + stub_entry->group->stub_sec->output_section->vma);
11340 off = targ - off;
11341
11342 p = loc;
11343 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11344 {
11345 bfd_vma r2off = get_r2off (info, stub_entry);
11346
11347 if (r2off == (bfd_vma) -1)
11348 {
11349 htab->stub_error = TRUE;
11350 return FALSE;
11351 }
11352 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11353 p += 4;
11354 if (PPC_HA (r2off) != 0)
11355 {
11356 bfd_put_32 (htab->params->stub_bfd,
11357 ADDIS_R2_R2 | PPC_HA (r2off), p);
11358 p += 4;
11359 }
11360 if (PPC_LO (r2off) != 0)
11361 {
11362 bfd_put_32 (htab->params->stub_bfd,
11363 ADDI_R2_R2 | PPC_LO (r2off), p);
11364 p += 4;
11365 }
11366 off -= p - loc;
11367 }
11368 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11369 p += 4;
11370
11371 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11372 {
11373 _bfd_error_handler
11374 (_("long branch stub `%s' offset overflow"),
11375 stub_entry->root.string);
11376 htab->stub_error = TRUE;
11377 return FALSE;
11378 }
11379
11380 if (info->emitrelocations)
11381 {
11382 r = get_relocs (stub_entry->group->stub_sec, 1);
11383 if (r == NULL)
11384 return FALSE;
11385 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11386 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11387 r->r_addend = targ;
11388 if (stub_entry->h != NULL
11389 && !use_global_in_relocs (htab, stub_entry, r, 1))
11390 return FALSE;
11391 }
11392 break;
11393
11394 case ppc_stub_plt_branch:
11395 case ppc_stub_plt_branch_r2off:
11396 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11397 stub_entry->root.string + 9,
11398 FALSE, FALSE);
11399 if (br_entry == NULL)
11400 {
11401 _bfd_error_handler (_("can't find branch stub `%s'"),
11402 stub_entry->root.string);
11403 htab->stub_error = TRUE;
11404 return FALSE;
11405 }
11406
11407 targ = (stub_entry->target_value
11408 + stub_entry->target_section->output_offset
11409 + stub_entry->target_section->output_section->vma);
11410 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11411 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11412
11413 bfd_put_64 (htab->brlt->owner, targ,
11414 htab->brlt->contents + br_entry->offset);
11415
11416 if (br_entry->iter == htab->stub_iteration)
11417 {
11418 br_entry->iter = 0;
11419
11420 if (htab->relbrlt != NULL)
11421 {
11422 /* Create a reloc for the branch lookup table entry. */
11423 Elf_Internal_Rela rela;
11424 bfd_byte *rl;
11425
11426 rela.r_offset = (br_entry->offset
11427 + htab->brlt->output_offset
11428 + htab->brlt->output_section->vma);
11429 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11430 rela.r_addend = targ;
11431
11432 rl = htab->relbrlt->contents;
11433 rl += (htab->relbrlt->reloc_count++
11434 * sizeof (Elf64_External_Rela));
11435 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11436 }
11437 else if (info->emitrelocations)
11438 {
11439 r = get_relocs (htab->brlt, 1);
11440 if (r == NULL)
11441 return FALSE;
11442 /* brlt, being SEC_LINKER_CREATED does not go through the
11443 normal reloc processing. Symbols and offsets are not
11444 translated from input file to output file form, so
11445 set up the offset per the output file. */
11446 r->r_offset = (br_entry->offset
11447 + htab->brlt->output_offset
11448 + htab->brlt->output_section->vma);
11449 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11450 r->r_addend = targ;
11451 }
11452 }
11453
11454 targ = (br_entry->offset
11455 + htab->brlt->output_offset
11456 + htab->brlt->output_section->vma);
11457
11458 off = (elf_gp (info->output_bfd)
11459 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11460 off = targ - off;
11461
11462 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11463 {
11464 info->callbacks->einfo
11465 (_("%P: linkage table error against `%pT'\n"),
11466 stub_entry->root.string);
11467 bfd_set_error (bfd_error_bad_value);
11468 htab->stub_error = TRUE;
11469 return FALSE;
11470 }
11471
11472 if (info->emitrelocations)
11473 {
11474 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11475 if (r == NULL)
11476 return FALSE;
11477 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11478 if (bfd_big_endian (info->output_bfd))
11479 r[0].r_offset += 2;
11480 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11481 r[0].r_offset += 4;
11482 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11483 r[0].r_addend = targ;
11484 if (PPC_HA (off) != 0)
11485 {
11486 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11487 r[1].r_offset = r[0].r_offset + 4;
11488 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11489 r[1].r_addend = r[0].r_addend;
11490 }
11491 }
11492
11493 p = loc;
11494 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11495 {
11496 if (PPC_HA (off) != 0)
11497 {
11498 bfd_put_32 (htab->params->stub_bfd,
11499 ADDIS_R12_R2 | PPC_HA (off), p);
11500 p += 4;
11501 bfd_put_32 (htab->params->stub_bfd,
11502 LD_R12_0R12 | PPC_LO (off), p);
11503 }
11504 else
11505 bfd_put_32 (htab->params->stub_bfd,
11506 LD_R12_0R2 | PPC_LO (off), p);
11507 }
11508 else
11509 {
11510 bfd_vma r2off = get_r2off (info, stub_entry);
11511
11512 if (r2off == (bfd_vma) -1)
11513 {
11514 htab->stub_error = TRUE;
11515 return FALSE;
11516 }
11517
11518 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11519 p += 4;
11520 if (PPC_HA (off) != 0)
11521 {
11522 bfd_put_32 (htab->params->stub_bfd,
11523 ADDIS_R12_R2 | PPC_HA (off), p);
11524 p += 4;
11525 bfd_put_32 (htab->params->stub_bfd,
11526 LD_R12_0R12 | PPC_LO (off), p);
11527 }
11528 else
11529 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11530
11531 if (PPC_HA (r2off) != 0)
11532 {
11533 p += 4;
11534 bfd_put_32 (htab->params->stub_bfd,
11535 ADDIS_R2_R2 | PPC_HA (r2off), p);
11536 }
11537 if (PPC_LO (r2off) != 0)
11538 {
11539 p += 4;
11540 bfd_put_32 (htab->params->stub_bfd,
11541 ADDI_R2_R2 | PPC_LO (r2off), p);
11542 }
11543 }
11544 p += 4;
11545 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11546 p += 4;
11547 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11548 p += 4;
11549 break;
11550
11551 case ppc_stub_long_branch_notoc:
11552 case ppc_stub_long_branch_both:
11553 case ppc_stub_plt_branch_notoc:
11554 case ppc_stub_plt_branch_both:
11555 case ppc_stub_plt_call_notoc:
11556 case ppc_stub_plt_call_both:
11557 p = loc;
11558 off = (stub_entry->stub_offset
11559 + stub_entry->group->stub_sec->output_offset
11560 + stub_entry->group->stub_sec->output_section->vma);
11561 if (stub_entry->stub_type == ppc_stub_long_branch_both
11562 || stub_entry->stub_type == ppc_stub_plt_branch_both
11563 || stub_entry->stub_type == ppc_stub_plt_call_both)
11564 {
11565 off += 4;
11566 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11567 p += 4;
11568 }
11569 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11570 {
11571 targ = stub_entry->plt_ent->plt.offset & ~1;
11572 if (targ >= (bfd_vma) -2)
11573 abort ();
11574
11575 plt = htab->elf.splt;
11576 if (!htab->elf.dynamic_sections_created
11577 || stub_entry->h == NULL
11578 || stub_entry->h->elf.dynindx == -1)
11579 {
11580 if (stub_entry->symtype == STT_GNU_IFUNC)
11581 plt = htab->elf.iplt;
11582 else
11583 plt = htab->pltlocal;
11584 }
11585 targ += plt->output_offset + plt->output_section->vma;
11586 }
11587 else
11588 targ = (stub_entry->target_value
11589 + stub_entry->target_section->output_offset
11590 + stub_entry->target_section->output_section->vma);
11591 odd = off & 4;
11592 off = targ - off;
11593
11594 relp = p;
11595 num_rel = 0;
11596 if (htab->power10_stubs)
11597 {
11598 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11599 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
11600 }
11601 else
11602 {
11603 /* The notoc stubs calculate their target (either a PLT entry or
11604 the global entry point of a function) relative to the PC
11605 returned by the "bcl" two instructions past the start of the
11606 sequence emitted by build_offset. The offset is therefore 8
11607 less than calculated from the start of the sequence. */
11608 off -= 8;
11609 p = build_offset (htab->params->stub_bfd, p, off,
11610 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11611 }
11612
11613 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
11614 {
11615 bfd_vma from;
11616 num_rel = 1;
11617 from = (stub_entry->stub_offset
11618 + stub_entry->group->stub_sec->output_offset
11619 + stub_entry->group->stub_sec->output_section->vma
11620 + (p - loc));
11621 bfd_put_32 (htab->params->stub_bfd,
11622 B_DOT | ((targ - from) & 0x3fffffc), p);
11623 }
11624 else
11625 {
11626 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11627 p += 4;
11628 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11629 }
11630 p += 4;
11631
11632 if (info->emitrelocations)
11633 {
11634 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11635 if (htab->power10_stubs)
11636 num_rel += num_relocs_for_power10_offset (off, odd);
11637 else
11638 {
11639 num_rel += num_relocs_for_offset (off);
11640 roff += 16;
11641 }
11642 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11643 if (r == NULL)
11644 return FALSE;
11645 if (htab->power10_stubs)
11646 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
11647 else
11648 r = emit_relocs_for_offset (info, r, roff, targ, off);
11649 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11650 || stub_entry->stub_type == ppc_stub_long_branch_both)
11651 {
11652 ++r;
11653 roff = p - 4 - stub_entry->group->stub_sec->contents;
11654 r->r_offset = roff;
11655 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11656 r->r_addend = targ;
11657 if (stub_entry->h != NULL
11658 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11659 return FALSE;
11660 }
11661 }
11662
11663 if (!htab->power10_stubs
11664 && htab->glink_eh_frame != NULL
11665 && htab->glink_eh_frame->size != 0)
11666 {
11667 bfd_byte *base, *eh;
11668 unsigned int lr_used, delta;
11669
11670 base = (htab->glink_eh_frame->contents
11671 + stub_entry->group->eh_base + 17);
11672 eh = base + stub_entry->group->eh_size;
11673 lr_used = stub_entry->stub_offset + 8;
11674 if (stub_entry->stub_type == ppc_stub_long_branch_both
11675 || stub_entry->stub_type == ppc_stub_plt_branch_both
11676 || stub_entry->stub_type == ppc_stub_plt_call_both)
11677 lr_used += 4;
11678 delta = lr_used - stub_entry->group->lr_restore;
11679 stub_entry->group->lr_restore = lr_used + 8;
11680 eh = eh_advance (htab->elf.dynobj, eh, delta);
11681 *eh++ = DW_CFA_register;
11682 *eh++ = 65;
11683 *eh++ = 12;
11684 *eh++ = DW_CFA_advance_loc + 2;
11685 *eh++ = DW_CFA_restore_extended;
11686 *eh++ = 65;
11687 stub_entry->group->eh_size = eh - base;
11688 }
11689 break;
11690
11691 case ppc_stub_plt_call:
11692 case ppc_stub_plt_call_r2save:
11693 if (stub_entry->h != NULL
11694 && stub_entry->h->is_func_descriptor
11695 && stub_entry->h->oh != NULL)
11696 {
11697 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11698
11699 /* If the old-ABI "dot-symbol" is undefined make it weak so
11700 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11701 if (fh->elf.root.type == bfd_link_hash_undefined
11702 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11703 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11704 fh->elf.root.type = bfd_link_hash_undefweak;
11705 }
11706
11707 /* Now build the stub. */
11708 targ = stub_entry->plt_ent->plt.offset & ~1;
11709 if (targ >= (bfd_vma) -2)
11710 abort ();
11711
11712 plt = htab->elf.splt;
11713 if (!htab->elf.dynamic_sections_created
11714 || stub_entry->h == NULL
11715 || stub_entry->h->elf.dynindx == -1)
11716 {
11717 if (stub_entry->symtype == STT_GNU_IFUNC)
11718 plt = htab->elf.iplt;
11719 else
11720 plt = htab->pltlocal;
11721 }
11722 targ += plt->output_offset + plt->output_section->vma;
11723
11724 off = (elf_gp (info->output_bfd)
11725 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11726 off = targ - off;
11727
11728 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11729 {
11730 info->callbacks->einfo
11731 /* xgettext:c-format */
11732 (_("%P: linkage table error against `%pT'\n"),
11733 stub_entry->h != NULL
11734 ? stub_entry->h->elf.root.root.string
11735 : "<local sym>");
11736 bfd_set_error (bfd_error_bad_value);
11737 htab->stub_error = TRUE;
11738 return FALSE;
11739 }
11740
11741 r = NULL;
11742 if (info->emitrelocations)
11743 {
11744 r = get_relocs (stub_entry->group->stub_sec,
11745 ((PPC_HA (off) != 0)
11746 + (htab->opd_abi
11747 ? 2 + (htab->params->plt_static_chain
11748 && PPC_HA (off + 16) == PPC_HA (off))
11749 : 1)));
11750 if (r == NULL)
11751 return FALSE;
11752 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11753 if (bfd_big_endian (info->output_bfd))
11754 r[0].r_offset += 2;
11755 r[0].r_addend = targ;
11756 }
11757 if (stub_entry->h != NULL
11758 && is_tls_get_addr (&stub_entry->h->elf, htab)
11759 && htab->params->tls_get_addr_opt)
11760 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11761 else
11762 p = build_plt_stub (htab, stub_entry, loc, off, r);
11763 break;
11764
11765 case ppc_stub_save_res:
11766 return TRUE;
11767
11768 default:
11769 BFD_FAIL ();
11770 return FALSE;
11771 }
11772
11773 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
11774
11775 if (htab->params->emit_stub_syms)
11776 {
11777 struct elf_link_hash_entry *h;
11778 size_t len1, len2;
11779 char *name;
11780 const char *const stub_str[] = { "long_branch",
11781 "long_branch",
11782 "long_branch",
11783 "long_branch",
11784 "plt_branch",
11785 "plt_branch",
11786 "plt_branch",
11787 "plt_branch",
11788 "plt_call",
11789 "plt_call",
11790 "plt_call",
11791 "plt_call" };
11792
11793 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11794 len2 = strlen (stub_entry->root.string);
11795 name = bfd_malloc (len1 + len2 + 2);
11796 if (name == NULL)
11797 return FALSE;
11798 memcpy (name, stub_entry->root.string, 9);
11799 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11800 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11801 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11802 if (h == NULL)
11803 return FALSE;
11804 if (h->root.type == bfd_link_hash_new)
11805 {
11806 h->root.type = bfd_link_hash_defined;
11807 h->root.u.def.section = stub_entry->group->stub_sec;
11808 h->root.u.def.value = stub_entry->stub_offset;
11809 h->ref_regular = 1;
11810 h->def_regular = 1;
11811 h->ref_regular_nonweak = 1;
11812 h->forced_local = 1;
11813 h->non_elf = 0;
11814 h->root.linker_def = 1;
11815 }
11816 }
11817
11818 return TRUE;
11819 }
11820
11821 /* As above, but don't actually build the stub. Just bump offset so
11822 we know stub section sizes, and select plt_branch stubs where
11823 long_branch stubs won't do. */
11824
11825 static bfd_boolean
11826 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11827 {
11828 struct ppc_stub_hash_entry *stub_entry;
11829 struct bfd_link_info *info;
11830 struct ppc_link_hash_table *htab;
11831 asection *plt;
11832 bfd_vma targ, off, r2off;
11833 unsigned int size, extra, lr_used, delta, odd;
11834
11835 /* Massage our args to the form they really have. */
11836 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11837 info = in_arg;
11838
11839 htab = ppc_hash_table (info);
11840 if (htab == NULL)
11841 return FALSE;
11842
11843 /* Fail if the target section could not be assigned to an output
11844 section. The user should fix his linker script. */
11845 if (stub_entry->target_section != NULL
11846 && stub_entry->target_section->output_section == NULL
11847 && info->non_contiguous_regions)
11848 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11849 "Retry without --enable-non-contiguous-regions.\n"),
11850 stub_entry->target_section);
11851
11852 /* Same for the group. */
11853 if (stub_entry->group->stub_sec != NULL
11854 && stub_entry->group->stub_sec->output_section == NULL
11855 && info->non_contiguous_regions)
11856 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11857 "output section. Retry without "
11858 "--enable-non-contiguous-regions.\n"),
11859 stub_entry->group->stub_sec,
11860 stub_entry->target_section);
11861
11862 /* Make a note of the offset within the stubs for this entry. */
11863 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11864
11865 if (stub_entry->h != NULL
11866 && stub_entry->h->save_res
11867 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11868 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11869 {
11870 /* Don't make stubs to out-of-line register save/restore
11871 functions. Instead, emit copies of the functions. */
11872 stub_entry->group->needs_save_res = 1;
11873 stub_entry->stub_type = ppc_stub_save_res;
11874 return TRUE;
11875 }
11876
11877 switch (stub_entry->stub_type)
11878 {
11879 case ppc_stub_plt_branch:
11880 case ppc_stub_plt_branch_r2off:
11881 /* Reset the stub type from the plt branch variant in case we now
11882 can reach with a shorter stub. */
11883 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11884 /* Fall through. */
11885 case ppc_stub_long_branch:
11886 case ppc_stub_long_branch_r2off:
11887 targ = (stub_entry->target_value
11888 + stub_entry->target_section->output_offset
11889 + stub_entry->target_section->output_section->vma);
11890 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11891 off = (stub_entry->stub_offset
11892 + stub_entry->group->stub_sec->output_offset
11893 + stub_entry->group->stub_sec->output_section->vma);
11894
11895 size = 4;
11896 r2off = 0;
11897 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11898 {
11899 r2off = get_r2off (info, stub_entry);
11900 if (r2off == (bfd_vma) -1)
11901 {
11902 htab->stub_error = TRUE;
11903 return FALSE;
11904 }
11905 size = 8;
11906 if (PPC_HA (r2off) != 0)
11907 size += 4;
11908 if (PPC_LO (r2off) != 0)
11909 size += 4;
11910 off += size - 4;
11911 }
11912 off = targ - off;
11913
11914 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11915 Do the same for -R objects without function descriptors. */
11916 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11917 && r2off == 0
11918 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11919 || off + (1 << 25) >= (bfd_vma) (1 << 26))
11920 {
11921 struct ppc_branch_hash_entry *br_entry;
11922
11923 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11924 stub_entry->root.string + 9,
11925 TRUE, FALSE);
11926 if (br_entry == NULL)
11927 {
11928 _bfd_error_handler (_("can't build branch stub `%s'"),
11929 stub_entry->root.string);
11930 htab->stub_error = TRUE;
11931 return FALSE;
11932 }
11933
11934 if (br_entry->iter != htab->stub_iteration)
11935 {
11936 br_entry->iter = htab->stub_iteration;
11937 br_entry->offset = htab->brlt->size;
11938 htab->brlt->size += 8;
11939
11940 if (htab->relbrlt != NULL)
11941 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11942 else if (info->emitrelocations)
11943 {
11944 htab->brlt->reloc_count += 1;
11945 htab->brlt->flags |= SEC_RELOC;
11946 }
11947 }
11948
11949 targ = (br_entry->offset
11950 + htab->brlt->output_offset
11951 + htab->brlt->output_section->vma);
11952 off = (elf_gp (info->output_bfd)
11953 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11954 off = targ - off;
11955
11956 if (info->emitrelocations)
11957 {
11958 stub_entry->group->stub_sec->reloc_count
11959 += 1 + (PPC_HA (off) != 0);
11960 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11961 }
11962
11963 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11964 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11965 {
11966 size = 12;
11967 if (PPC_HA (off) != 0)
11968 size = 16;
11969 }
11970 else
11971 {
11972 size = 16;
11973 if (PPC_HA (off) != 0)
11974 size += 4;
11975
11976 if (PPC_HA (r2off) != 0)
11977 size += 4;
11978 if (PPC_LO (r2off) != 0)
11979 size += 4;
11980 }
11981 }
11982 else if (info->emitrelocations)
11983 {
11984 stub_entry->group->stub_sec->reloc_count += 1;
11985 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11986 }
11987 break;
11988
11989 case ppc_stub_plt_branch_notoc:
11990 case ppc_stub_plt_branch_both:
11991 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11992 /* Fall through. */
11993 case ppc_stub_long_branch_notoc:
11994 case ppc_stub_long_branch_both:
11995 off = (stub_entry->stub_offset
11996 + stub_entry->group->stub_sec->output_offset
11997 + stub_entry->group->stub_sec->output_section->vma);
11998 size = 0;
11999 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12000 size = 4;
12001 off += size;
12002 targ = (stub_entry->target_value
12003 + stub_entry->target_section->output_offset
12004 + stub_entry->target_section->output_section->vma);
12005 odd = off & 4;
12006 off = targ - off;
12007
12008 if (info->emitrelocations)
12009 {
12010 unsigned int num_rel;
12011 if (htab->power10_stubs)
12012 num_rel = num_relocs_for_power10_offset (off, odd);
12013 else
12014 num_rel = num_relocs_for_offset (off - 8);
12015 stub_entry->group->stub_sec->reloc_count += num_rel;
12016 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12017 }
12018
12019 if (htab->power10_stubs)
12020 extra = size_power10_offset (off, odd);
12021 else
12022 extra = size_offset (off - 8);
12023 /* Include branch insn plus those in the offset sequence. */
12024 size += 4 + extra;
12025 /* The branch insn is at the end, or "extra" bytes along. So
12026 its offset will be "extra" bytes less that that already
12027 calculated. */
12028 off -= extra;
12029
12030 if (!htab->power10_stubs)
12031 {
12032 /* After the bcl, lr has been modified so we need to emit
12033 .eh_frame info saying the return address is in r12. */
12034 lr_used = stub_entry->stub_offset + 8;
12035 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12036 lr_used += 4;
12037 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12038 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12039 DW_CFA_restore_extended 65. */
12040 delta = lr_used - stub_entry->group->lr_restore;
12041 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12042 stub_entry->group->lr_restore = lr_used + 8;
12043 }
12044
12045 /* If the branch can't reach, use a plt_branch. */
12046 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12047 {
12048 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12049 - ppc_stub_long_branch_notoc);
12050 size += 4;
12051 }
12052 else if (info->emitrelocations)
12053 stub_entry->group->stub_sec->reloc_count +=1;
12054 break;
12055
12056 case ppc_stub_plt_call_notoc:
12057 case ppc_stub_plt_call_both:
12058 off = (stub_entry->stub_offset
12059 + stub_entry->group->stub_sec->output_offset
12060 + stub_entry->group->stub_sec->output_section->vma);
12061 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12062 off += 4;
12063 targ = stub_entry->plt_ent->plt.offset & ~1;
12064 if (targ >= (bfd_vma) -2)
12065 abort ();
12066
12067 plt = htab->elf.splt;
12068 if (!htab->elf.dynamic_sections_created
12069 || stub_entry->h == NULL
12070 || stub_entry->h->elf.dynindx == -1)
12071 {
12072 if (stub_entry->symtype == STT_GNU_IFUNC)
12073 plt = htab->elf.iplt;
12074 else
12075 plt = htab->pltlocal;
12076 }
12077 targ += plt->output_offset + plt->output_section->vma;
12078 odd = off & 4;
12079 off = targ - off;
12080
12081 if (htab->params->plt_stub_align != 0)
12082 {
12083 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12084
12085 stub_entry->group->stub_sec->size += pad;
12086 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12087 off -= pad;
12088 }
12089
12090 if (info->emitrelocations)
12091 {
12092 unsigned int num_rel;
12093 if (htab->power10_stubs)
12094 num_rel = num_relocs_for_power10_offset (off, odd);
12095 else
12096 num_rel = num_relocs_for_offset (off - 8);
12097 stub_entry->group->stub_sec->reloc_count += num_rel;
12098 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12099 }
12100
12101 size = plt_stub_size (htab, stub_entry, off);
12102
12103 if (!htab->power10_stubs)
12104 {
12105 /* After the bcl, lr has been modified so we need to emit
12106 .eh_frame info saying the return address is in r12. */
12107 lr_used = stub_entry->stub_offset + 8;
12108 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12109 lr_used += 4;
12110 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12111 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12112 DW_CFA_restore_extended 65. */
12113 delta = lr_used - stub_entry->group->lr_restore;
12114 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12115 stub_entry->group->lr_restore = lr_used + 8;
12116 }
12117 break;
12118
12119 case ppc_stub_plt_call:
12120 case ppc_stub_plt_call_r2save:
12121 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12122 if (targ >= (bfd_vma) -2)
12123 abort ();
12124 plt = htab->elf.splt;
12125 if (!htab->elf.dynamic_sections_created
12126 || stub_entry->h == NULL
12127 || stub_entry->h->elf.dynindx == -1)
12128 {
12129 if (stub_entry->symtype == STT_GNU_IFUNC)
12130 plt = htab->elf.iplt;
12131 else
12132 plt = htab->pltlocal;
12133 }
12134 targ += plt->output_offset + plt->output_section->vma;
12135
12136 off = (elf_gp (info->output_bfd)
12137 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12138 off = targ - off;
12139
12140 if (htab->params->plt_stub_align != 0)
12141 {
12142 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12143
12144 stub_entry->group->stub_sec->size += pad;
12145 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12146 }
12147
12148 if (info->emitrelocations)
12149 {
12150 stub_entry->group->stub_sec->reloc_count
12151 += ((PPC_HA (off) != 0)
12152 + (htab->opd_abi
12153 ? 2 + (htab->params->plt_static_chain
12154 && PPC_HA (off + 16) == PPC_HA (off))
12155 : 1));
12156 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12157 }
12158
12159 size = plt_stub_size (htab, stub_entry, off);
12160
12161 if (stub_entry->h != NULL
12162 && is_tls_get_addr (&stub_entry->h->elf, htab)
12163 && htab->params->tls_get_addr_opt
12164 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12165 {
12166 if (htab->params->no_tls_get_addr_regsave)
12167 {
12168 lr_used = stub_entry->stub_offset + size - 20;
12169 /* The eh_frame info will consist of a DW_CFA_advance_loc
12170 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12171 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12172 delta = lr_used - stub_entry->group->lr_restore;
12173 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12174 }
12175 else
12176 {
12177 /* Adjustments to r1 need to be described. */
12178 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12179 delta = cfa_updt - stub_entry->group->lr_restore;
12180 stub_entry->group->eh_size += eh_advance_size (delta);
12181 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12182 }
12183 stub_entry->group->lr_restore = size - 4;
12184 }
12185 break;
12186
12187 default:
12188 BFD_FAIL ();
12189 return FALSE;
12190 }
12191
12192 stub_entry->group->stub_sec->size += size;
12193 return TRUE;
12194 }
12195
12196 /* Set up various things so that we can make a list of input sections
12197 for each output section included in the link. Returns -1 on error,
12198 0 when no stubs will be needed, and 1 on success. */
12199
12200 int
12201 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
12202 {
12203 unsigned int id;
12204 size_t amt;
12205 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12206
12207 if (htab == NULL)
12208 return -1;
12209
12210 htab->sec_info_arr_size = _bfd_section_id;
12211 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12212 htab->sec_info = bfd_zmalloc (amt);
12213 if (htab->sec_info == NULL)
12214 return -1;
12215
12216 /* Set toc_off for com, und, abs and ind sections. */
12217 for (id = 0; id < 3; id++)
12218 htab->sec_info[id].toc_off = TOC_BASE_OFF;
12219
12220 return 1;
12221 }
12222
12223 /* Set up for first pass at multitoc partitioning. */
12224
12225 void
12226 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12227 {
12228 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12229
12230 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
12231 htab->toc_bfd = NULL;
12232 htab->toc_first_sec = NULL;
12233 }
12234
12235 /* The linker repeatedly calls this function for each TOC input section
12236 and linker generated GOT section. Group input bfds such that the toc
12237 within a group is less than 64k in size. */
12238
12239 bfd_boolean
12240 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
12241 {
12242 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12243 bfd_vma addr, off, limit;
12244
12245 if (htab == NULL)
12246 return FALSE;
12247
12248 if (!htab->second_toc_pass)
12249 {
12250 /* Keep track of the first .toc or .got section for this input bfd. */
12251 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12252
12253 if (new_bfd)
12254 {
12255 htab->toc_bfd = isec->owner;
12256 htab->toc_first_sec = isec;
12257 }
12258
12259 addr = isec->output_offset + isec->output_section->vma;
12260 off = addr - htab->toc_curr;
12261 limit = 0x80008000;
12262 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12263 limit = 0x10000;
12264 if (off + isec->size > limit)
12265 {
12266 addr = (htab->toc_first_sec->output_offset
12267 + htab->toc_first_sec->output_section->vma);
12268 htab->toc_curr = addr;
12269 htab->toc_curr &= -TOC_BASE_ALIGN;
12270 }
12271
12272 /* toc_curr is the base address of this toc group. Set elf_gp
12273 for the input section to be the offset relative to the
12274 output toc base plus 0x8000. Making the input elf_gp an
12275 offset allows us to move the toc as a whole without
12276 recalculating input elf_gp. */
12277 off = htab->toc_curr - elf_gp (info->output_bfd);
12278 off += TOC_BASE_OFF;
12279
12280 /* Die if someone uses a linker script that doesn't keep input
12281 file .toc and .got together. */
12282 if (new_bfd
12283 && elf_gp (isec->owner) != 0
12284 && elf_gp (isec->owner) != off)
12285 return FALSE;
12286
12287 elf_gp (isec->owner) = off;
12288 return TRUE;
12289 }
12290
12291 /* During the second pass toc_first_sec points to the start of
12292 a toc group, and toc_curr is used to track the old elf_gp.
12293 We use toc_bfd to ensure we only look at each bfd once. */
12294 if (htab->toc_bfd == isec->owner)
12295 return TRUE;
12296 htab->toc_bfd = isec->owner;
12297
12298 if (htab->toc_first_sec == NULL
12299 || htab->toc_curr != elf_gp (isec->owner))
12300 {
12301 htab->toc_curr = elf_gp (isec->owner);
12302 htab->toc_first_sec = isec;
12303 }
12304 addr = (htab->toc_first_sec->output_offset
12305 + htab->toc_first_sec->output_section->vma);
12306 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
12307 elf_gp (isec->owner) = off;
12308
12309 return TRUE;
12310 }
12311
12312 /* Called via elf_link_hash_traverse to merge GOT entries for global
12313 symbol H. */
12314
12315 static bfd_boolean
12316 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12317 {
12318 if (h->root.type == bfd_link_hash_indirect)
12319 return TRUE;
12320
12321 merge_got_entries (&h->got.glist);
12322
12323 return TRUE;
12324 }
12325
12326 /* Called via elf_link_hash_traverse to allocate GOT entries for global
12327 symbol H. */
12328
12329 static bfd_boolean
12330 reallocate_got (struct elf_link_hash_entry *h, void *inf)
12331 {
12332 struct got_entry *gent;
12333
12334 if (h->root.type == bfd_link_hash_indirect)
12335 return TRUE;
12336
12337 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12338 if (!gent->is_indirect)
12339 allocate_got (h, (struct bfd_link_info *) inf, gent);
12340 return TRUE;
12341 }
12342
12343 /* Called on the first multitoc pass after the last call to
12344 ppc64_elf_next_toc_section. This function removes duplicate GOT
12345 entries. */
12346
12347 bfd_boolean
12348 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
12349 {
12350 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12351 struct bfd *ibfd, *ibfd2;
12352 bfd_boolean done_something;
12353
12354 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
12355
12356 if (!htab->do_multi_toc)
12357 return FALSE;
12358
12359 /* Merge global sym got entries within a toc group. */
12360 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12361
12362 /* And tlsld_got. */
12363 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12364 {
12365 struct got_entry *ent, *ent2;
12366
12367 if (!is_ppc64_elf (ibfd))
12368 continue;
12369
12370 ent = ppc64_tlsld_got (ibfd);
12371 if (!ent->is_indirect
12372 && ent->got.offset != (bfd_vma) -1)
12373 {
12374 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
12375 {
12376 if (!is_ppc64_elf (ibfd2))
12377 continue;
12378
12379 ent2 = ppc64_tlsld_got (ibfd2);
12380 if (!ent2->is_indirect
12381 && ent2->got.offset != (bfd_vma) -1
12382 && elf_gp (ibfd2) == elf_gp (ibfd))
12383 {
12384 ent2->is_indirect = TRUE;
12385 ent2->got.ent = ent;
12386 }
12387 }
12388 }
12389 }
12390
12391 /* Zap sizes of got sections. */
12392 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12393 htab->elf.irelplt->size -= htab->got_reli_size;
12394 htab->got_reli_size = 0;
12395
12396 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12397 {
12398 asection *got, *relgot;
12399
12400 if (!is_ppc64_elf (ibfd))
12401 continue;
12402
12403 got = ppc64_elf_tdata (ibfd)->got;
12404 if (got != NULL)
12405 {
12406 got->rawsize = got->size;
12407 got->size = 0;
12408 relgot = ppc64_elf_tdata (ibfd)->relgot;
12409 relgot->rawsize = relgot->size;
12410 relgot->size = 0;
12411 }
12412 }
12413
12414 /* Now reallocate the got, local syms first. We don't need to
12415 allocate section contents again since we never increase size. */
12416 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12417 {
12418 struct got_entry **lgot_ents;
12419 struct got_entry **end_lgot_ents;
12420 struct plt_entry **local_plt;
12421 struct plt_entry **end_local_plt;
12422 unsigned char *lgot_masks;
12423 bfd_size_type locsymcount;
12424 Elf_Internal_Shdr *symtab_hdr;
12425 asection *s;
12426
12427 if (!is_ppc64_elf (ibfd))
12428 continue;
12429
12430 lgot_ents = elf_local_got_ents (ibfd);
12431 if (!lgot_ents)
12432 continue;
12433
12434 symtab_hdr = &elf_symtab_hdr (ibfd);
12435 locsymcount = symtab_hdr->sh_info;
12436 end_lgot_ents = lgot_ents + locsymcount;
12437 local_plt = (struct plt_entry **) end_lgot_ents;
12438 end_local_plt = local_plt + locsymcount;
12439 lgot_masks = (unsigned char *) end_local_plt;
12440 s = ppc64_elf_tdata (ibfd)->got;
12441 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12442 {
12443 struct got_entry *ent;
12444
12445 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
12446 {
12447 unsigned int ent_size = 8;
12448 unsigned int rel_size = sizeof (Elf64_External_Rela);
12449
12450 ent->got.offset = s->size;
12451 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12452 {
12453 ent_size *= 2;
12454 rel_size *= 2;
12455 }
12456 s->size += ent_size;
12457 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12458 {
12459 htab->elf.irelplt->size += rel_size;
12460 htab->got_reli_size += rel_size;
12461 }
12462 else if (bfd_link_pic (info)
12463 && !(ent->tls_type != 0
12464 && bfd_link_executable (info)))
12465 {
12466 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12467 srel->size += rel_size;
12468 }
12469 }
12470 }
12471 }
12472
12473 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12474
12475 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12476 {
12477 struct got_entry *ent;
12478
12479 if (!is_ppc64_elf (ibfd))
12480 continue;
12481
12482 ent = ppc64_tlsld_got (ibfd);
12483 if (!ent->is_indirect
12484 && ent->got.offset != (bfd_vma) -1)
12485 {
12486 asection *s = ppc64_elf_tdata (ibfd)->got;
12487 ent->got.offset = s->size;
12488 s->size += 16;
12489 if (bfd_link_dll (info))
12490 {
12491 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12492 srel->size += sizeof (Elf64_External_Rela);
12493 }
12494 }
12495 }
12496
12497 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12498 if (!done_something)
12499 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12500 {
12501 asection *got;
12502
12503 if (!is_ppc64_elf (ibfd))
12504 continue;
12505
12506 got = ppc64_elf_tdata (ibfd)->got;
12507 if (got != NULL)
12508 {
12509 done_something = got->rawsize != got->size;
12510 if (done_something)
12511 break;
12512 }
12513 }
12514
12515 if (done_something)
12516 (*htab->params->layout_sections_again) ();
12517
12518 /* Set up for second pass over toc sections to recalculate elf_gp
12519 on input sections. */
12520 htab->toc_bfd = NULL;
12521 htab->toc_first_sec = NULL;
12522 htab->second_toc_pass = TRUE;
12523 return done_something;
12524 }
12525
12526 /* Called after second pass of multitoc partitioning. */
12527
12528 void
12529 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12530 {
12531 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12532
12533 /* After the second pass, toc_curr tracks the TOC offset used
12534 for code sections below in ppc64_elf_next_input_section. */
12535 htab->toc_curr = TOC_BASE_OFF;
12536 }
12537
12538 /* No toc references were found in ISEC. If the code in ISEC makes no
12539 calls, then there's no need to use toc adjusting stubs when branching
12540 into ISEC. Actually, indirect calls from ISEC are OK as they will
12541 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12542 needed, and 2 if a cyclical call-graph was found but no other reason
12543 for a stub was detected. If called from the top level, a return of
12544 2 means the same as a return of 0. */
12545
12546 static int
12547 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12548 {
12549 int ret;
12550
12551 /* Mark this section as checked. */
12552 isec->call_check_done = 1;
12553
12554 /* We know none of our code bearing sections will need toc stubs. */
12555 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12556 return 0;
12557
12558 if (isec->size == 0)
12559 return 0;
12560
12561 if (isec->output_section == NULL)
12562 return 0;
12563
12564 ret = 0;
12565 if (isec->reloc_count != 0)
12566 {
12567 Elf_Internal_Rela *relstart, *rel;
12568 Elf_Internal_Sym *local_syms;
12569 struct ppc_link_hash_table *htab;
12570
12571 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12572 info->keep_memory);
12573 if (relstart == NULL)
12574 return -1;
12575
12576 /* Look for branches to outside of this section. */
12577 local_syms = NULL;
12578 htab = ppc_hash_table (info);
12579 if (htab == NULL)
12580 return -1;
12581
12582 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12583 {
12584 enum elf_ppc64_reloc_type r_type;
12585 unsigned long r_symndx;
12586 struct elf_link_hash_entry *h;
12587 struct ppc_link_hash_entry *eh;
12588 Elf_Internal_Sym *sym;
12589 asection *sym_sec;
12590 struct _opd_sec_data *opd;
12591 bfd_vma sym_value;
12592 bfd_vma dest;
12593
12594 r_type = ELF64_R_TYPE (rel->r_info);
12595 if (r_type != R_PPC64_REL24
12596 && r_type != R_PPC64_REL24_NOTOC
12597 && r_type != R_PPC64_REL14
12598 && r_type != R_PPC64_REL14_BRTAKEN
12599 && r_type != R_PPC64_REL14_BRNTAKEN
12600 && r_type != R_PPC64_PLTCALL
12601 && r_type != R_PPC64_PLTCALL_NOTOC)
12602 continue;
12603
12604 r_symndx = ELF64_R_SYM (rel->r_info);
12605 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12606 isec->owner))
12607 {
12608 ret = -1;
12609 break;
12610 }
12611
12612 /* Calls to dynamic lib functions go through a plt call stub
12613 that uses r2. */
12614 eh = ppc_elf_hash_entry (h);
12615 if (eh != NULL
12616 && (eh->elf.plt.plist != NULL
12617 || (eh->oh != NULL
12618 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12619 {
12620 ret = 1;
12621 break;
12622 }
12623
12624 if (sym_sec == NULL)
12625 /* Ignore other undefined symbols. */
12626 continue;
12627
12628 /* Assume branches to other sections not included in the
12629 link need stubs too, to cover -R and absolute syms. */
12630 if (sym_sec->output_section == NULL)
12631 {
12632 ret = 1;
12633 break;
12634 }
12635
12636 if (h == NULL)
12637 sym_value = sym->st_value;
12638 else
12639 {
12640 if (h->root.type != bfd_link_hash_defined
12641 && h->root.type != bfd_link_hash_defweak)
12642 abort ();
12643 sym_value = h->root.u.def.value;
12644 }
12645 sym_value += rel->r_addend;
12646
12647 /* If this branch reloc uses an opd sym, find the code section. */
12648 opd = get_opd_info (sym_sec);
12649 if (opd != NULL)
12650 {
12651 if (h == NULL && opd->adjust != NULL)
12652 {
12653 long adjust;
12654
12655 adjust = opd->adjust[OPD_NDX (sym_value)];
12656 if (adjust == -1)
12657 /* Assume deleted functions won't ever be called. */
12658 continue;
12659 sym_value += adjust;
12660 }
12661
12662 dest = opd_entry_value (sym_sec, sym_value,
12663 &sym_sec, NULL, FALSE);
12664 if (dest == (bfd_vma) -1)
12665 continue;
12666 }
12667 else
12668 dest = (sym_value
12669 + sym_sec->output_offset
12670 + sym_sec->output_section->vma);
12671
12672 /* Ignore branch to self. */
12673 if (sym_sec == isec)
12674 continue;
12675
12676 /* If the called function uses the toc, we need a stub. */
12677 if (sym_sec->has_toc_reloc
12678 || sym_sec->makes_toc_func_call)
12679 {
12680 ret = 1;
12681 break;
12682 }
12683
12684 /* Assume any branch that needs a long branch stub might in fact
12685 need a plt_branch stub. A plt_branch stub uses r2. */
12686 else if (dest - (isec->output_offset
12687 + isec->output_section->vma
12688 + rel->r_offset) + (1 << 25)
12689 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12690 ? h->other
12691 : sym->st_other))
12692 {
12693 ret = 1;
12694 break;
12695 }
12696
12697 /* If calling back to a section in the process of being
12698 tested, we can't say for sure that no toc adjusting stubs
12699 are needed, so don't return zero. */
12700 else if (sym_sec->call_check_in_progress)
12701 ret = 2;
12702
12703 /* Branches to another section that itself doesn't have any TOC
12704 references are OK. Recursively call ourselves to check. */
12705 else if (!sym_sec->call_check_done)
12706 {
12707 int recur;
12708
12709 /* Mark current section as indeterminate, so that other
12710 sections that call back to current won't be marked as
12711 known. */
12712 isec->call_check_in_progress = 1;
12713 recur = toc_adjusting_stub_needed (info, sym_sec);
12714 isec->call_check_in_progress = 0;
12715
12716 if (recur != 0)
12717 {
12718 ret = recur;
12719 if (recur != 2)
12720 break;
12721 }
12722 }
12723 }
12724
12725 if (elf_symtab_hdr (isec->owner).contents
12726 != (unsigned char *) local_syms)
12727 free (local_syms);
12728 if (elf_section_data (isec)->relocs != relstart)
12729 free (relstart);
12730 }
12731
12732 if ((ret & 1) == 0
12733 && isec->map_head.s != NULL
12734 && (strcmp (isec->output_section->name, ".init") == 0
12735 || strcmp (isec->output_section->name, ".fini") == 0))
12736 {
12737 if (isec->map_head.s->has_toc_reloc
12738 || isec->map_head.s->makes_toc_func_call)
12739 ret = 1;
12740 else if (!isec->map_head.s->call_check_done)
12741 {
12742 int recur;
12743 isec->call_check_in_progress = 1;
12744 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12745 isec->call_check_in_progress = 0;
12746 if (recur != 0)
12747 ret = recur;
12748 }
12749 }
12750
12751 if (ret == 1)
12752 isec->makes_toc_func_call = 1;
12753
12754 return ret;
12755 }
12756
12757 /* The linker repeatedly calls this function for each input section,
12758 in the order that input sections are linked into output sections.
12759 Build lists of input sections to determine groupings between which
12760 we may insert linker stubs. */
12761
12762 bfd_boolean
12763 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12764 {
12765 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12766
12767 if (htab == NULL)
12768 return FALSE;
12769
12770 if ((isec->output_section->flags & SEC_CODE) != 0
12771 && isec->output_section->id < htab->sec_info_arr_size)
12772 {
12773 /* This happens to make the list in reverse order,
12774 which is what we want. */
12775 htab->sec_info[isec->id].u.list
12776 = htab->sec_info[isec->output_section->id].u.list;
12777 htab->sec_info[isec->output_section->id].u.list = isec;
12778 }
12779
12780 if (htab->multi_toc_needed)
12781 {
12782 /* Analyse sections that aren't already flagged as needing a
12783 valid toc pointer. Exclude .fixup for the linux kernel.
12784 .fixup contains branches, but only back to the function that
12785 hit an exception. */
12786 if (!(isec->has_toc_reloc
12787 || (isec->flags & SEC_CODE) == 0
12788 || strcmp (isec->name, ".fixup") == 0
12789 || isec->call_check_done))
12790 {
12791 if (toc_adjusting_stub_needed (info, isec) < 0)
12792 return FALSE;
12793 }
12794 /* Make all sections use the TOC assigned for this object file.
12795 This will be wrong for pasted sections; We fix that in
12796 check_pasted_section(). */
12797 if (elf_gp (isec->owner) != 0)
12798 htab->toc_curr = elf_gp (isec->owner);
12799 }
12800
12801 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12802 return TRUE;
12803 }
12804
12805 /* Check that all .init and .fini sections use the same toc, if they
12806 have toc relocs. */
12807
12808 static bfd_boolean
12809 check_pasted_section (struct bfd_link_info *info, const char *name)
12810 {
12811 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12812
12813 if (o != NULL)
12814 {
12815 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12816 bfd_vma toc_off = 0;
12817 asection *i;
12818
12819 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12820 if (i->has_toc_reloc)
12821 {
12822 if (toc_off == 0)
12823 toc_off = htab->sec_info[i->id].toc_off;
12824 else if (toc_off != htab->sec_info[i->id].toc_off)
12825 return FALSE;
12826 }
12827
12828 if (toc_off == 0)
12829 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12830 if (i->makes_toc_func_call)
12831 {
12832 toc_off = htab->sec_info[i->id].toc_off;
12833 break;
12834 }
12835
12836 /* Make sure the whole pasted function uses the same toc offset. */
12837 if (toc_off != 0)
12838 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12839 htab->sec_info[i->id].toc_off = toc_off;
12840 }
12841 return TRUE;
12842 }
12843
12844 bfd_boolean
12845 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12846 {
12847 return (check_pasted_section (info, ".init")
12848 & check_pasted_section (info, ".fini"));
12849 }
12850
12851 /* See whether we can group stub sections together. Grouping stub
12852 sections may result in fewer stubs. More importantly, we need to
12853 put all .init* and .fini* stubs at the beginning of the .init or
12854 .fini output sections respectively, because glibc splits the
12855 _init and _fini functions into multiple parts. Putting a stub in
12856 the middle of a function is not a good idea. */
12857
12858 static bfd_boolean
12859 group_sections (struct bfd_link_info *info,
12860 bfd_size_type stub_group_size,
12861 bfd_boolean stubs_always_before_branch)
12862 {
12863 struct ppc_link_hash_table *htab;
12864 asection *osec;
12865 bfd_boolean suppress_size_errors;
12866
12867 htab = ppc_hash_table (info);
12868 if (htab == NULL)
12869 return FALSE;
12870
12871 suppress_size_errors = FALSE;
12872 if (stub_group_size == 1)
12873 {
12874 /* Default values. */
12875 if (stubs_always_before_branch)
12876 stub_group_size = 0x1e00000;
12877 else
12878 stub_group_size = 0x1c00000;
12879 suppress_size_errors = TRUE;
12880 }
12881
12882 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12883 {
12884 asection *tail;
12885
12886 if (osec->id >= htab->sec_info_arr_size)
12887 continue;
12888
12889 tail = htab->sec_info[osec->id].u.list;
12890 while (tail != NULL)
12891 {
12892 asection *curr;
12893 asection *prev;
12894 bfd_size_type total;
12895 bfd_boolean big_sec;
12896 bfd_vma curr_toc;
12897 struct map_stub *group;
12898 bfd_size_type group_size;
12899
12900 curr = tail;
12901 total = tail->size;
12902 group_size = (ppc64_elf_section_data (tail) != NULL
12903 && ppc64_elf_section_data (tail)->has_14bit_branch
12904 ? stub_group_size >> 10 : stub_group_size);
12905
12906 big_sec = total > group_size;
12907 if (big_sec && !suppress_size_errors)
12908 /* xgettext:c-format */
12909 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12910 tail->owner, tail);
12911 curr_toc = htab->sec_info[tail->id].toc_off;
12912
12913 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12914 && ((total += curr->output_offset - prev->output_offset)
12915 < (ppc64_elf_section_data (prev) != NULL
12916 && ppc64_elf_section_data (prev)->has_14bit_branch
12917 ? (group_size = stub_group_size >> 10) : group_size))
12918 && htab->sec_info[prev->id].toc_off == curr_toc)
12919 curr = prev;
12920
12921 /* OK, the size from the start of CURR to the end is less
12922 than group_size and thus can be handled by one stub
12923 section. (or the tail section is itself larger than
12924 group_size, in which case we may be toast.) We should
12925 really be keeping track of the total size of stubs added
12926 here, as stubs contribute to the final output section
12927 size. That's a little tricky, and this way will only
12928 break if stubs added make the total size more than 2^25,
12929 ie. for the default stub_group_size, if stubs total more
12930 than 2097152 bytes, or nearly 75000 plt call stubs. */
12931 group = bfd_alloc (curr->owner, sizeof (*group));
12932 if (group == NULL)
12933 return FALSE;
12934 group->link_sec = curr;
12935 group->stub_sec = NULL;
12936 group->needs_save_res = 0;
12937 group->lr_restore = 0;
12938 group->eh_size = 0;
12939 group->eh_base = 0;
12940 group->next = htab->group;
12941 htab->group = group;
12942 do
12943 {
12944 prev = htab->sec_info[tail->id].u.list;
12945 /* Set up this stub group. */
12946 htab->sec_info[tail->id].u.group = group;
12947 }
12948 while (tail != curr && (tail = prev) != NULL);
12949
12950 /* But wait, there's more! Input sections up to group_size
12951 bytes before the stub section can be handled by it too.
12952 Don't do this if we have a really large section after the
12953 stubs, as adding more stubs increases the chance that
12954 branches may not reach into the stub section. */
12955 if (!stubs_always_before_branch && !big_sec)
12956 {
12957 total = 0;
12958 while (prev != NULL
12959 && ((total += tail->output_offset - prev->output_offset)
12960 < (ppc64_elf_section_data (prev) != NULL
12961 && ppc64_elf_section_data (prev)->has_14bit_branch
12962 ? (group_size = stub_group_size >> 10)
12963 : group_size))
12964 && htab->sec_info[prev->id].toc_off == curr_toc)
12965 {
12966 tail = prev;
12967 prev = htab->sec_info[tail->id].u.list;
12968 htab->sec_info[tail->id].u.group = group;
12969 }
12970 }
12971 tail = prev;
12972 }
12973 }
12974 return TRUE;
12975 }
12976
12977 static const unsigned char glink_eh_frame_cie[] =
12978 {
12979 0, 0, 0, 16, /* length. */
12980 0, 0, 0, 0, /* id. */
12981 1, /* CIE version. */
12982 'z', 'R', 0, /* Augmentation string. */
12983 4, /* Code alignment. */
12984 0x78, /* Data alignment. */
12985 65, /* RA reg. */
12986 1, /* Augmentation size. */
12987 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12988 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
12989 };
12990
12991 /* Stripping output sections is normally done before dynamic section
12992 symbols have been allocated. This function is called later, and
12993 handles cases like htab->brlt which is mapped to its own output
12994 section. */
12995
12996 static void
12997 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12998 {
12999 if (isec->size == 0
13000 && isec->output_section->size == 0
13001 && !(isec->output_section->flags & SEC_KEEP)
13002 && !bfd_section_removed_from_list (info->output_bfd,
13003 isec->output_section)
13004 && elf_section_data (isec->output_section)->dynindx == 0)
13005 {
13006 isec->output_section->flags |= SEC_EXCLUDE;
13007 bfd_section_list_remove (info->output_bfd, isec->output_section);
13008 info->output_bfd->section_count--;
13009 }
13010 }
13011
13012 /* Determine and set the size of the stub section for a final link.
13013
13014 The basic idea here is to examine all the relocations looking for
13015 PC-relative calls to a target that is unreachable with a "bl"
13016 instruction. */
13017
13018 bfd_boolean
13019 ppc64_elf_size_stubs (struct bfd_link_info *info)
13020 {
13021 bfd_size_type stub_group_size;
13022 bfd_boolean stubs_always_before_branch;
13023 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13024
13025 if (htab == NULL)
13026 return FALSE;
13027
13028 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
13029 htab->params->plt_thread_safe = 1;
13030 if (!htab->opd_abi)
13031 htab->params->plt_thread_safe = 0;
13032 else if (htab->params->plt_thread_safe == -1)
13033 {
13034 static const char *const thread_starter[] =
13035 {
13036 "pthread_create",
13037 /* libstdc++ */
13038 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13039 /* librt */
13040 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13041 "mq_notify", "create_timer",
13042 /* libanl */
13043 "getaddrinfo_a",
13044 /* libgomp */
13045 "GOMP_parallel",
13046 "GOMP_parallel_start",
13047 "GOMP_parallel_loop_static",
13048 "GOMP_parallel_loop_static_start",
13049 "GOMP_parallel_loop_dynamic",
13050 "GOMP_parallel_loop_dynamic_start",
13051 "GOMP_parallel_loop_guided",
13052 "GOMP_parallel_loop_guided_start",
13053 "GOMP_parallel_loop_runtime",
13054 "GOMP_parallel_loop_runtime_start",
13055 "GOMP_parallel_sections",
13056 "GOMP_parallel_sections_start",
13057 /* libgo */
13058 "__go_go",
13059 };
13060 unsigned i;
13061
13062 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
13063 {
13064 struct elf_link_hash_entry *h;
13065 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13066 FALSE, FALSE, TRUE);
13067 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13068 if (htab->params->plt_thread_safe)
13069 break;
13070 }
13071 }
13072 stubs_always_before_branch = htab->params->group_size < 0;
13073 if (htab->params->group_size < 0)
13074 stub_group_size = -htab->params->group_size;
13075 else
13076 stub_group_size = htab->params->group_size;
13077
13078 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13079 return FALSE;
13080
13081 htab->tga_group = NULL;
13082 if (!htab->params->no_tls_get_addr_regsave
13083 && htab->tga_desc_fd != NULL
13084 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13085 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13086 && htab->tls_get_addr_fd != NULL
13087 && is_static_defined (&htab->tls_get_addr_fd->elf))
13088 {
13089 asection *sym_sec, *code_sec, *stub_sec;
13090 bfd_vma sym_value;
13091 struct _opd_sec_data *opd;
13092
13093 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13094 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13095 code_sec = sym_sec;
13096 opd = get_opd_info (sym_sec);
13097 if (opd != NULL)
13098 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13099 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13100 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13101 htab->tga_group->link_sec);
13102 if (stub_sec == NULL)
13103 return FALSE;
13104 htab->tga_group->stub_sec = stub_sec;
13105
13106 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13107 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13108 htab->tga_desc_fd->elf.root.u.def.value = 0;
13109 htab->tga_desc_fd->elf.type = STT_FUNC;
13110 htab->tga_desc_fd->elf.def_regular = 1;
13111 htab->tga_desc_fd->elf.non_elf = 0;
13112 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13113 }
13114
13115 #define STUB_SHRINK_ITER 20
13116 /* Loop until no stubs added. After iteration 20 of this loop we may
13117 exit on a stub section shrinking. This is to break out of a
13118 pathological case where adding stubs on one iteration decreases
13119 section gaps (perhaps due to alignment), which then requires
13120 fewer or smaller stubs on the next iteration. */
13121
13122 while (1)
13123 {
13124 bfd *input_bfd;
13125 unsigned int bfd_indx;
13126 struct map_stub *group;
13127
13128 htab->stub_iteration += 1;
13129
13130 for (input_bfd = info->input_bfds, bfd_indx = 0;
13131 input_bfd != NULL;
13132 input_bfd = input_bfd->link.next, bfd_indx++)
13133 {
13134 Elf_Internal_Shdr *symtab_hdr;
13135 asection *section;
13136 Elf_Internal_Sym *local_syms = NULL;
13137
13138 if (!is_ppc64_elf (input_bfd))
13139 continue;
13140
13141 /* We'll need the symbol table in a second. */
13142 symtab_hdr = &elf_symtab_hdr (input_bfd);
13143 if (symtab_hdr->sh_info == 0)
13144 continue;
13145
13146 /* Walk over each section attached to the input bfd. */
13147 for (section = input_bfd->sections;
13148 section != NULL;
13149 section = section->next)
13150 {
13151 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
13152
13153 /* If there aren't any relocs, then there's nothing more
13154 to do. */
13155 if ((section->flags & SEC_RELOC) == 0
13156 || (section->flags & SEC_ALLOC) == 0
13157 || (section->flags & SEC_LOAD) == 0
13158 || (section->flags & SEC_CODE) == 0
13159 || section->reloc_count == 0)
13160 continue;
13161
13162 /* If this section is a link-once section that will be
13163 discarded, then don't create any stubs. */
13164 if (section->output_section == NULL
13165 || section->output_section->owner != info->output_bfd)
13166 continue;
13167
13168 /* Get the relocs. */
13169 internal_relocs
13170 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
13171 info->keep_memory);
13172 if (internal_relocs == NULL)
13173 goto error_ret_free_local;
13174
13175 /* Now examine each relocation. */
13176 irela = internal_relocs;
13177 irelaend = irela + section->reloc_count;
13178 for (; irela < irelaend; irela++)
13179 {
13180 enum elf_ppc64_reloc_type r_type;
13181 unsigned int r_indx;
13182 enum ppc_stub_type stub_type;
13183 struct ppc_stub_hash_entry *stub_entry;
13184 asection *sym_sec, *code_sec;
13185 bfd_vma sym_value, code_value;
13186 bfd_vma destination;
13187 unsigned long local_off;
13188 bfd_boolean ok_dest;
13189 struct ppc_link_hash_entry *hash;
13190 struct ppc_link_hash_entry *fdh;
13191 struct elf_link_hash_entry *h;
13192 Elf_Internal_Sym *sym;
13193 char *stub_name;
13194 const asection *id_sec;
13195 struct _opd_sec_data *opd;
13196 struct plt_entry *plt_ent;
13197
13198 r_type = ELF64_R_TYPE (irela->r_info);
13199 r_indx = ELF64_R_SYM (irela->r_info);
13200
13201 if (r_type >= R_PPC64_max)
13202 {
13203 bfd_set_error (bfd_error_bad_value);
13204 goto error_ret_free_internal;
13205 }
13206
13207 /* Only look for stubs on branch instructions. */
13208 if (r_type != R_PPC64_REL24
13209 && r_type != R_PPC64_REL24_NOTOC
13210 && r_type != R_PPC64_REL14
13211 && r_type != R_PPC64_REL14_BRTAKEN
13212 && r_type != R_PPC64_REL14_BRNTAKEN)
13213 continue;
13214
13215 /* Now determine the call target, its name, value,
13216 section. */
13217 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13218 r_indx, input_bfd))
13219 goto error_ret_free_internal;
13220 hash = ppc_elf_hash_entry (h);
13221
13222 ok_dest = FALSE;
13223 fdh = NULL;
13224 sym_value = 0;
13225 if (hash == NULL)
13226 {
13227 sym_value = sym->st_value;
13228 if (sym_sec != NULL
13229 && sym_sec->output_section != NULL)
13230 ok_dest = TRUE;
13231 }
13232 else if (hash->elf.root.type == bfd_link_hash_defined
13233 || hash->elf.root.type == bfd_link_hash_defweak)
13234 {
13235 sym_value = hash->elf.root.u.def.value;
13236 if (sym_sec->output_section != NULL)
13237 ok_dest = TRUE;
13238 }
13239 else if (hash->elf.root.type == bfd_link_hash_undefweak
13240 || hash->elf.root.type == bfd_link_hash_undefined)
13241 {
13242 /* Recognise an old ABI func code entry sym, and
13243 use the func descriptor sym instead if it is
13244 defined. */
13245 if (hash->elf.root.root.string[0] == '.'
13246 && hash->oh != NULL)
13247 {
13248 fdh = ppc_follow_link (hash->oh);
13249 if (fdh->elf.root.type == bfd_link_hash_defined
13250 || fdh->elf.root.type == bfd_link_hash_defweak)
13251 {
13252 sym_sec = fdh->elf.root.u.def.section;
13253 sym_value = fdh->elf.root.u.def.value;
13254 if (sym_sec->output_section != NULL)
13255 ok_dest = TRUE;
13256 }
13257 else
13258 fdh = NULL;
13259 }
13260 }
13261 else
13262 {
13263 bfd_set_error (bfd_error_bad_value);
13264 goto error_ret_free_internal;
13265 }
13266
13267 destination = 0;
13268 local_off = 0;
13269 if (ok_dest)
13270 {
13271 sym_value += irela->r_addend;
13272 destination = (sym_value
13273 + sym_sec->output_offset
13274 + sym_sec->output_section->vma);
13275 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13276 ? hash->elf.other
13277 : sym->st_other);
13278 }
13279
13280 code_sec = sym_sec;
13281 code_value = sym_value;
13282 opd = get_opd_info (sym_sec);
13283 if (opd != NULL)
13284 {
13285 bfd_vma dest;
13286
13287 if (hash == NULL && opd->adjust != NULL)
13288 {
13289 long adjust = opd->adjust[OPD_NDX (sym_value)];
13290 if (adjust == -1)
13291 continue;
13292 code_value += adjust;
13293 sym_value += adjust;
13294 }
13295 dest = opd_entry_value (sym_sec, sym_value,
13296 &code_sec, &code_value, FALSE);
13297 if (dest != (bfd_vma) -1)
13298 {
13299 destination = dest;
13300 if (fdh != NULL)
13301 {
13302 /* Fixup old ABI sym to point at code
13303 entry. */
13304 hash->elf.root.type = bfd_link_hash_defweak;
13305 hash->elf.root.u.def.section = code_sec;
13306 hash->elf.root.u.def.value = code_value;
13307 }
13308 }
13309 }
13310
13311 /* Determine what (if any) linker stub is needed. */
13312 plt_ent = NULL;
13313 stub_type = ppc_type_of_stub (section, irela, &hash,
13314 &plt_ent, destination,
13315 local_off);
13316
13317 if (r_type == R_PPC64_REL24_NOTOC)
13318 {
13319 if (stub_type == ppc_stub_plt_call)
13320 stub_type = ppc_stub_plt_call_notoc;
13321 else if (stub_type == ppc_stub_long_branch
13322 || (code_sec != NULL
13323 && code_sec->output_section != NULL
13324 && (((hash ? hash->elf.other : sym->st_other)
13325 & STO_PPC64_LOCAL_MASK)
13326 > 1 << STO_PPC64_LOCAL_BIT)))
13327 stub_type = ppc_stub_long_branch_notoc;
13328 }
13329 else if (stub_type != ppc_stub_plt_call)
13330 {
13331 /* Check whether we need a TOC adjusting stub.
13332 Since the linker pastes together pieces from
13333 different object files when creating the
13334 _init and _fini functions, it may be that a
13335 call to what looks like a local sym is in
13336 fact a call needing a TOC adjustment. */
13337 if ((code_sec != NULL
13338 && code_sec->output_section != NULL
13339 && (htab->sec_info[code_sec->id].toc_off
13340 != htab->sec_info[section->id].toc_off)
13341 && (code_sec->has_toc_reloc
13342 || code_sec->makes_toc_func_call))
13343 || (((hash ? hash->elf.other : sym->st_other)
13344 & STO_PPC64_LOCAL_MASK)
13345 == 1 << STO_PPC64_LOCAL_BIT))
13346 stub_type = ppc_stub_long_branch_r2off;
13347 }
13348
13349 if (stub_type == ppc_stub_none)
13350 continue;
13351
13352 /* __tls_get_addr calls might be eliminated. */
13353 if (stub_type != ppc_stub_plt_call
13354 && stub_type != ppc_stub_plt_call_notoc
13355 && hash != NULL
13356 && is_tls_get_addr (&hash->elf, htab)
13357 && section->has_tls_reloc
13358 && irela != internal_relocs)
13359 {
13360 /* Get tls info. */
13361 unsigned char *tls_mask;
13362
13363 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
13364 irela - 1, input_bfd))
13365 goto error_ret_free_internal;
13366 if ((*tls_mask & TLS_TLS) != 0
13367 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
13368 continue;
13369 }
13370
13371 if (stub_type == ppc_stub_plt_call)
13372 {
13373 if (!htab->opd_abi
13374 && htab->params->plt_localentry0 != 0
13375 && is_elfv2_localentry0 (&hash->elf))
13376 htab->has_plt_localentry0 = 1;
13377 else if (irela + 1 < irelaend
13378 && irela[1].r_offset == irela->r_offset + 4
13379 && (ELF64_R_TYPE (irela[1].r_info)
13380 == R_PPC64_TOCSAVE))
13381 {
13382 if (!tocsave_find (htab, INSERT,
13383 &local_syms, irela + 1, input_bfd))
13384 goto error_ret_free_internal;
13385 }
13386 else
13387 stub_type = ppc_stub_plt_call_r2save;
13388 }
13389
13390 /* Support for grouping stub sections. */
13391 id_sec = htab->sec_info[section->id].u.group->link_sec;
13392
13393 /* Get the name of this stub. */
13394 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13395 if (!stub_name)
13396 goto error_ret_free_internal;
13397
13398 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
13399 stub_name, FALSE, FALSE);
13400 if (stub_entry != NULL)
13401 {
13402 enum ppc_stub_type old_type;
13403 /* A stub has already been created, but it may
13404 not be the required type. We shouldn't be
13405 transitioning from plt_call to long_branch
13406 stubs or vice versa, but we might be
13407 upgrading from plt_call to plt_call_r2save or
13408 from long_branch to long_branch_r2off. */
13409 free (stub_name);
13410 old_type = stub_entry->stub_type;
13411 switch (old_type)
13412 {
13413 default:
13414 abort ();
13415
13416 case ppc_stub_save_res:
13417 continue;
13418
13419 case ppc_stub_plt_call:
13420 case ppc_stub_plt_call_r2save:
13421 case ppc_stub_plt_call_notoc:
13422 case ppc_stub_plt_call_both:
13423 if (stub_type == ppc_stub_plt_call)
13424 continue;
13425 else if (stub_type == ppc_stub_plt_call_r2save)
13426 {
13427 if (old_type == ppc_stub_plt_call_notoc)
13428 stub_type = ppc_stub_plt_call_both;
13429 }
13430 else if (stub_type == ppc_stub_plt_call_notoc)
13431 {
13432 if (old_type == ppc_stub_plt_call_r2save)
13433 stub_type = ppc_stub_plt_call_both;
13434 }
13435 else
13436 abort ();
13437 break;
13438
13439 case ppc_stub_plt_branch:
13440 case ppc_stub_plt_branch_r2off:
13441 case ppc_stub_plt_branch_notoc:
13442 case ppc_stub_plt_branch_both:
13443 old_type += (ppc_stub_long_branch
13444 - ppc_stub_plt_branch);
13445 /* Fall through. */
13446 case ppc_stub_long_branch:
13447 case ppc_stub_long_branch_r2off:
13448 case ppc_stub_long_branch_notoc:
13449 case ppc_stub_long_branch_both:
13450 if (stub_type == ppc_stub_long_branch)
13451 continue;
13452 else if (stub_type == ppc_stub_long_branch_r2off)
13453 {
13454 if (old_type == ppc_stub_long_branch_notoc)
13455 stub_type = ppc_stub_long_branch_both;
13456 }
13457 else if (stub_type == ppc_stub_long_branch_notoc)
13458 {
13459 if (old_type == ppc_stub_long_branch_r2off)
13460 stub_type = ppc_stub_long_branch_both;
13461 }
13462 else
13463 abort ();
13464 break;
13465 }
13466 if (old_type < stub_type)
13467 stub_entry->stub_type = stub_type;
13468 continue;
13469 }
13470
13471 stub_entry = ppc_add_stub (stub_name, section, info);
13472 if (stub_entry == NULL)
13473 {
13474 free (stub_name);
13475 error_ret_free_internal:
13476 if (elf_section_data (section)->relocs == NULL)
13477 free (internal_relocs);
13478 error_ret_free_local:
13479 if (symtab_hdr->contents
13480 != (unsigned char *) local_syms)
13481 free (local_syms);
13482 return FALSE;
13483 }
13484
13485 stub_entry->stub_type = stub_type;
13486 if (stub_type >= ppc_stub_plt_call
13487 && stub_type <= ppc_stub_plt_call_both)
13488 {
13489 stub_entry->target_value = sym_value;
13490 stub_entry->target_section = sym_sec;
13491 }
13492 else
13493 {
13494 stub_entry->target_value = code_value;
13495 stub_entry->target_section = code_sec;
13496 }
13497 stub_entry->h = hash;
13498 stub_entry->plt_ent = plt_ent;
13499 stub_entry->symtype
13500 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
13501 stub_entry->other = hash ? hash->elf.other : sym->st_other;
13502
13503 if (hash != NULL
13504 && (hash->elf.root.type == bfd_link_hash_defined
13505 || hash->elf.root.type == bfd_link_hash_defweak))
13506 htab->stub_globals += 1;
13507 }
13508
13509 /* We're done with the internal relocs, free them. */
13510 if (elf_section_data (section)->relocs != internal_relocs)
13511 free (internal_relocs);
13512 }
13513
13514 if (local_syms != NULL
13515 && symtab_hdr->contents != (unsigned char *) local_syms)
13516 {
13517 if (!info->keep_memory)
13518 free (local_syms);
13519 else
13520 symtab_hdr->contents = (unsigned char *) local_syms;
13521 }
13522 }
13523
13524 /* We may have added some stubs. Find out the new size of the
13525 stub sections. */
13526 for (group = htab->group; group != NULL; group = group->next)
13527 {
13528 group->lr_restore = 0;
13529 group->eh_size = 0;
13530 if (group->stub_sec != NULL)
13531 {
13532 asection *stub_sec = group->stub_sec;
13533
13534 if (htab->stub_iteration <= STUB_SHRINK_ITER
13535 || stub_sec->rawsize < stub_sec->size)
13536 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13537 stub_sec->rawsize = stub_sec->size;
13538 stub_sec->size = 0;
13539 stub_sec->reloc_count = 0;
13540 stub_sec->flags &= ~SEC_RELOC;
13541 }
13542 }
13543 if (htab->tga_group != NULL)
13544 {
13545 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13546 htab->tga_group->eh_size
13547 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13548 htab->tga_group->lr_restore = 23 * 4;
13549 htab->tga_group->stub_sec->size = 24 * 4;
13550 }
13551
13552 if (htab->stub_iteration <= STUB_SHRINK_ITER
13553 || htab->brlt->rawsize < htab->brlt->size)
13554 htab->brlt->rawsize = htab->brlt->size;
13555 htab->brlt->size = 0;
13556 htab->brlt->reloc_count = 0;
13557 htab->brlt->flags &= ~SEC_RELOC;
13558 if (htab->relbrlt != NULL)
13559 htab->relbrlt->size = 0;
13560
13561 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13562
13563 for (group = htab->group; group != NULL; group = group->next)
13564 if (group->needs_save_res)
13565 group->stub_sec->size += htab->sfpr->size;
13566
13567 if (info->emitrelocations
13568 && htab->glink != NULL && htab->glink->size != 0)
13569 {
13570 htab->glink->reloc_count = 1;
13571 htab->glink->flags |= SEC_RELOC;
13572 }
13573
13574 if (htab->glink_eh_frame != NULL
13575 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13576 && htab->glink_eh_frame->output_section->size > 8)
13577 {
13578 size_t size = 0, align = 4;
13579
13580 for (group = htab->group; group != NULL; group = group->next)
13581 if (group->eh_size != 0)
13582 size += (group->eh_size + 17 + align - 1) & -align;
13583 if (htab->glink != NULL && htab->glink->size != 0)
13584 size += (24 + align - 1) & -align;
13585 if (size != 0)
13586 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13587 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13588 size = (size + align - 1) & -align;
13589 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13590 htab->glink_eh_frame->size = size;
13591 }
13592
13593 if (htab->params->plt_stub_align != 0)
13594 for (group = htab->group; group != NULL; group = group->next)
13595 if (group->stub_sec != NULL)
13596 {
13597 int align = abs (htab->params->plt_stub_align);
13598 group->stub_sec->size
13599 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13600 }
13601
13602 for (group = htab->group; group != NULL; group = group->next)
13603 if (group->stub_sec != NULL
13604 && group->stub_sec->rawsize != group->stub_sec->size
13605 && (htab->stub_iteration <= STUB_SHRINK_ITER
13606 || group->stub_sec->rawsize < group->stub_sec->size))
13607 break;
13608
13609 if (group == NULL
13610 && (htab->brlt->rawsize == htab->brlt->size
13611 || (htab->stub_iteration > STUB_SHRINK_ITER
13612 && htab->brlt->rawsize > htab->brlt->size))
13613 && (htab->glink_eh_frame == NULL
13614 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13615 && (htab->tga_group == NULL
13616 || htab->stub_iteration > 1))
13617 break;
13618
13619 /* Ask the linker to do its stuff. */
13620 (*htab->params->layout_sections_again) ();
13621 }
13622
13623 if (htab->glink_eh_frame != NULL
13624 && htab->glink_eh_frame->size != 0)
13625 {
13626 bfd_vma val;
13627 bfd_byte *p, *last_fde;
13628 size_t last_fde_len, size, align, pad;
13629 struct map_stub *group;
13630
13631 /* It is necessary to at least have a rough outline of the
13632 linker generated CIEs and FDEs written before
13633 bfd_elf_discard_info is run, in order for these FDEs to be
13634 indexed in .eh_frame_hdr. */
13635 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13636 if (p == NULL)
13637 return FALSE;
13638 htab->glink_eh_frame->contents = p;
13639 last_fde = p;
13640 align = 4;
13641
13642 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13643 /* CIE length (rewrite in case little-endian). */
13644 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13645 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13646 p += last_fde_len + 4;
13647
13648 for (group = htab->group; group != NULL; group = group->next)
13649 if (group->eh_size != 0)
13650 {
13651 group->eh_base = p - htab->glink_eh_frame->contents;
13652 last_fde = p;
13653 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
13654 /* FDE length. */
13655 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13656 p += 4;
13657 /* CIE pointer. */
13658 val = p - htab->glink_eh_frame->contents;
13659 bfd_put_32 (htab->elf.dynobj, val, p);
13660 p += 4;
13661 /* Offset to stub section, written later. */
13662 p += 4;
13663 /* stub section size. */
13664 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13665 p += 4;
13666 /* Augmentation. */
13667 p += 1;
13668 /* Make sure we don't have all nops. This is enough for
13669 elf-eh-frame.c to detect the last non-nop opcode. */
13670 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
13671 p = last_fde + last_fde_len + 4;
13672 }
13673 if (htab->glink != NULL && htab->glink->size != 0)
13674 {
13675 last_fde = p;
13676 last_fde_len = ((24 + align - 1) & -align) - 4;
13677 /* FDE length. */
13678 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13679 p += 4;
13680 /* CIE pointer. */
13681 val = p - htab->glink_eh_frame->contents;
13682 bfd_put_32 (htab->elf.dynobj, val, p);
13683 p += 4;
13684 /* Offset to .glink, written later. */
13685 p += 4;
13686 /* .glink size. */
13687 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13688 p += 4;
13689 /* Augmentation. */
13690 p += 1;
13691
13692 *p++ = DW_CFA_advance_loc + 1;
13693 *p++ = DW_CFA_register;
13694 *p++ = 65;
13695 *p++ = htab->opd_abi ? 12 : 0;
13696 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13697 *p++ = DW_CFA_restore_extended;
13698 *p++ = 65;
13699 p += ((24 + align - 1) & -align) - 24;
13700 }
13701 /* Subsume any padding into the last FDE if user .eh_frame
13702 sections are aligned more than glink_eh_frame. Otherwise any
13703 zero padding will be seen as a terminator. */
13704 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13705 size = p - htab->glink_eh_frame->contents;
13706 pad = ((size + align - 1) & -align) - size;
13707 htab->glink_eh_frame->size = size + pad;
13708 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13709 }
13710
13711 maybe_strip_output (info, htab->brlt);
13712 if (htab->relbrlt != NULL)
13713 maybe_strip_output (info, htab->relbrlt);
13714 if (htab->glink_eh_frame != NULL)
13715 maybe_strip_output (info, htab->glink_eh_frame);
13716
13717 return TRUE;
13718 }
13719
13720 /* Called after we have determined section placement. If sections
13721 move, we'll be called again. Provide a value for TOCstart. */
13722
13723 bfd_vma
13724 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13725 {
13726 asection *s;
13727 bfd_vma TOCstart, adjust;
13728
13729 if (info != NULL)
13730 {
13731 struct elf_link_hash_entry *h;
13732 struct elf_link_hash_table *htab = elf_hash_table (info);
13733
13734 if (is_elf_hash_table (htab)
13735 && htab->hgot != NULL)
13736 h = htab->hgot;
13737 else
13738 {
13739 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13740 if (is_elf_hash_table (htab))
13741 htab->hgot = h;
13742 }
13743 if (h != NULL
13744 && h->root.type == bfd_link_hash_defined
13745 && !h->root.linker_def
13746 && (!is_elf_hash_table (htab)
13747 || h->def_regular))
13748 {
13749 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
13750 _bfd_set_gp_value (obfd, TOCstart);
13751 return TOCstart;
13752 }
13753 }
13754
13755 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13756 order. The TOC starts where the first of these sections starts. */
13757 s = bfd_get_section_by_name (obfd, ".got");
13758 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13759 s = bfd_get_section_by_name (obfd, ".toc");
13760 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13761 s = bfd_get_section_by_name (obfd, ".tocbss");
13762 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13763 s = bfd_get_section_by_name (obfd, ".plt");
13764 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13765 {
13766 /* This may happen for
13767 o references to TOC base (SYM@toc / TOC[tc0]) without a
13768 .toc directive
13769 o bad linker script
13770 o --gc-sections and empty TOC sections
13771
13772 FIXME: Warn user? */
13773
13774 /* Look for a likely section. We probably won't even be
13775 using TOCstart. */
13776 for (s = obfd->sections; s != NULL; s = s->next)
13777 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13778 | SEC_EXCLUDE))
13779 == (SEC_ALLOC | SEC_SMALL_DATA))
13780 break;
13781 if (s == NULL)
13782 for (s = obfd->sections; s != NULL; s = s->next)
13783 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13784 == (SEC_ALLOC | SEC_SMALL_DATA))
13785 break;
13786 if (s == NULL)
13787 for (s = obfd->sections; s != NULL; s = s->next)
13788 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13789 == SEC_ALLOC)
13790 break;
13791 if (s == NULL)
13792 for (s = obfd->sections; s != NULL; s = s->next)
13793 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13794 break;
13795 }
13796
13797 TOCstart = 0;
13798 if (s != NULL)
13799 TOCstart = s->output_section->vma + s->output_offset;
13800
13801 /* Force alignment. */
13802 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13803 TOCstart -= adjust;
13804 _bfd_set_gp_value (obfd, TOCstart);
13805
13806 if (info != NULL && s != NULL)
13807 {
13808 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13809
13810 if (htab != NULL)
13811 {
13812 if (htab->elf.hgot != NULL)
13813 {
13814 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13815 htab->elf.hgot->root.u.def.section = s;
13816 }
13817 }
13818 else
13819 {
13820 struct bfd_link_hash_entry *bh = NULL;
13821 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13822 s, TOC_BASE_OFF - adjust,
13823 NULL, FALSE, FALSE, &bh);
13824 }
13825 }
13826 return TOCstart;
13827 }
13828
13829 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13830 write out any global entry stubs, and PLT relocations. */
13831
13832 static bfd_boolean
13833 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13834 {
13835 struct bfd_link_info *info;
13836 struct ppc_link_hash_table *htab;
13837 struct plt_entry *ent;
13838 asection *s;
13839
13840 if (h->root.type == bfd_link_hash_indirect)
13841 return TRUE;
13842
13843 info = inf;
13844 htab = ppc_hash_table (info);
13845 if (htab == NULL)
13846 return FALSE;
13847
13848 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13849 if (ent->plt.offset != (bfd_vma) -1)
13850 {
13851 /* This symbol has an entry in the procedure linkage
13852 table. Set it up. */
13853 Elf_Internal_Rela rela;
13854 asection *plt, *relplt;
13855 bfd_byte *loc;
13856
13857 if (!htab->elf.dynamic_sections_created
13858 || h->dynindx == -1)
13859 {
13860 if (!(h->def_regular
13861 && (h->root.type == bfd_link_hash_defined
13862 || h->root.type == bfd_link_hash_defweak)))
13863 continue;
13864 if (h->type == STT_GNU_IFUNC)
13865 {
13866 plt = htab->elf.iplt;
13867 relplt = htab->elf.irelplt;
13868 htab->local_ifunc_resolver = 1;
13869 if (htab->opd_abi)
13870 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13871 else
13872 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13873 }
13874 else
13875 {
13876 plt = htab->pltlocal;
13877 if (bfd_link_pic (info))
13878 {
13879 relplt = htab->relpltlocal;
13880 if (htab->opd_abi)
13881 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13882 else
13883 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13884 }
13885 else
13886 relplt = NULL;
13887 }
13888 rela.r_addend = defined_sym_val (h) + ent->addend;
13889
13890 if (relplt == NULL)
13891 {
13892 loc = plt->contents + ent->plt.offset;
13893 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13894 if (htab->opd_abi)
13895 {
13896 bfd_vma toc = elf_gp (info->output_bfd);
13897 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13898 bfd_put_64 (info->output_bfd, toc, loc + 8);
13899 }
13900 }
13901 else
13902 {
13903 rela.r_offset = (plt->output_section->vma
13904 + plt->output_offset
13905 + ent->plt.offset);
13906 loc = relplt->contents + (relplt->reloc_count++
13907 * sizeof (Elf64_External_Rela));
13908 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13909 }
13910 }
13911 else
13912 {
13913 rela.r_offset = (htab->elf.splt->output_section->vma
13914 + htab->elf.splt->output_offset
13915 + ent->plt.offset);
13916 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13917 rela.r_addend = ent->addend;
13918 loc = (htab->elf.srelplt->contents
13919 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13920 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13921 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13922 htab->maybe_local_ifunc_resolver = 1;
13923 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13924 }
13925 }
13926
13927 if (!h->pointer_equality_needed)
13928 return TRUE;
13929
13930 if (h->def_regular)
13931 return TRUE;
13932
13933 s = htab->global_entry;
13934 if (s == NULL || s->size == 0)
13935 return TRUE;
13936
13937 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13938 if (ent->plt.offset != (bfd_vma) -1
13939 && ent->addend == 0)
13940 {
13941 bfd_byte *p;
13942 asection *plt;
13943 bfd_vma off;
13944
13945 p = s->contents + h->root.u.def.value;
13946 plt = htab->elf.splt;
13947 if (!htab->elf.dynamic_sections_created
13948 || h->dynindx == -1)
13949 {
13950 if (h->type == STT_GNU_IFUNC)
13951 plt = htab->elf.iplt;
13952 else
13953 plt = htab->pltlocal;
13954 }
13955 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13956 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13957
13958 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13959 {
13960 info->callbacks->einfo
13961 (_("%P: linkage table error against `%pT'\n"),
13962 h->root.root.string);
13963 bfd_set_error (bfd_error_bad_value);
13964 htab->stub_error = TRUE;
13965 }
13966
13967 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13968 if (htab->params->emit_stub_syms)
13969 {
13970 size_t len = strlen (h->root.root.string);
13971 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13972
13973 if (name == NULL)
13974 return FALSE;
13975
13976 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13977 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13978 if (h == NULL)
13979 return FALSE;
13980 if (h->root.type == bfd_link_hash_new)
13981 {
13982 h->root.type = bfd_link_hash_defined;
13983 h->root.u.def.section = s;
13984 h->root.u.def.value = p - s->contents;
13985 h->ref_regular = 1;
13986 h->def_regular = 1;
13987 h->ref_regular_nonweak = 1;
13988 h->forced_local = 1;
13989 h->non_elf = 0;
13990 h->root.linker_def = 1;
13991 }
13992 }
13993
13994 if (PPC_HA (off) != 0)
13995 {
13996 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13997 p += 4;
13998 }
13999 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14000 p += 4;
14001 bfd_put_32 (s->owner, MTCTR_R12, p);
14002 p += 4;
14003 bfd_put_32 (s->owner, BCTR, p);
14004 break;
14005 }
14006 return TRUE;
14007 }
14008
14009 /* Write PLT relocs for locals. */
14010
14011 static bfd_boolean
14012 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14013 {
14014 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14015 bfd *ibfd;
14016
14017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14018 {
14019 struct got_entry **lgot_ents, **end_lgot_ents;
14020 struct plt_entry **local_plt, **lplt, **end_local_plt;
14021 Elf_Internal_Shdr *symtab_hdr;
14022 bfd_size_type locsymcount;
14023 Elf_Internal_Sym *local_syms = NULL;
14024 struct plt_entry *ent;
14025
14026 if (!is_ppc64_elf (ibfd))
14027 continue;
14028
14029 lgot_ents = elf_local_got_ents (ibfd);
14030 if (!lgot_ents)
14031 continue;
14032
14033 symtab_hdr = &elf_symtab_hdr (ibfd);
14034 locsymcount = symtab_hdr->sh_info;
14035 end_lgot_ents = lgot_ents + locsymcount;
14036 local_plt = (struct plt_entry **) end_lgot_ents;
14037 end_local_plt = local_plt + locsymcount;
14038 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14039 for (ent = *lplt; ent != NULL; ent = ent->next)
14040 if (ent->plt.offset != (bfd_vma) -1)
14041 {
14042 Elf_Internal_Sym *sym;
14043 asection *sym_sec;
14044 asection *plt, *relplt;
14045 bfd_byte *loc;
14046 bfd_vma val;
14047
14048 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14049 lplt - local_plt, ibfd))
14050 {
14051 if (symtab_hdr->contents != (unsigned char *) local_syms)
14052 free (local_syms);
14053 return FALSE;
14054 }
14055
14056 val = sym->st_value + ent->addend;
14057 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14058 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
14059 if (sym_sec != NULL && sym_sec->output_section != NULL)
14060 val += sym_sec->output_offset + sym_sec->output_section->vma;
14061
14062 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14063 {
14064 htab->local_ifunc_resolver = 1;
14065 plt = htab->elf.iplt;
14066 relplt = htab->elf.irelplt;
14067 }
14068 else
14069 {
14070 plt = htab->pltlocal;
14071 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14072 }
14073
14074 if (relplt == NULL)
14075 {
14076 loc = plt->contents + ent->plt.offset;
14077 bfd_put_64 (info->output_bfd, val, loc);
14078 if (htab->opd_abi)
14079 {
14080 bfd_vma toc = elf_gp (ibfd);
14081 bfd_put_64 (info->output_bfd, toc, loc + 8);
14082 }
14083 }
14084 else
14085 {
14086 Elf_Internal_Rela rela;
14087 rela.r_offset = (ent->plt.offset
14088 + plt->output_offset
14089 + plt->output_section->vma);
14090 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14091 {
14092 if (htab->opd_abi)
14093 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14094 else
14095 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14096 }
14097 else
14098 {
14099 if (htab->opd_abi)
14100 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14101 else
14102 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14103 }
14104 rela.r_addend = val;
14105 loc = relplt->contents + (relplt->reloc_count++
14106 * sizeof (Elf64_External_Rela));
14107 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14108 }
14109 }
14110
14111 if (local_syms != NULL
14112 && symtab_hdr->contents != (unsigned char *) local_syms)
14113 {
14114 if (!info->keep_memory)
14115 free (local_syms);
14116 else
14117 symtab_hdr->contents = (unsigned char *) local_syms;
14118 }
14119 }
14120 return TRUE;
14121 }
14122
14123 /* Emit the static wrapper function preserving registers around a
14124 __tls_get_addr_opt call. */
14125
14126 static bfd_boolean
14127 emit_tga_desc (struct ppc_link_hash_table *htab)
14128 {
14129 asection *stub_sec = htab->tga_group->stub_sec;
14130 unsigned int cfa_updt = 11 * 4;
14131 bfd_byte *p;
14132 bfd_vma to, from, delta;
14133
14134 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14135 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14136 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14137 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14138 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14139 delta = to - from;
14140 if (delta + (1 << 25) >= 1 << 26)
14141 {
14142 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14143 htab->stub_error = TRUE;
14144 return FALSE;
14145 }
14146
14147 p = stub_sec->contents;
14148 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14149 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14150 p += 4;
14151 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14152 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14153 }
14154
14155 /* Emit eh_frame describing the static wrapper function. */
14156
14157 static bfd_byte *
14158 emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14159 {
14160 unsigned int cfa_updt = 11 * 4;
14161 unsigned int i;
14162
14163 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14164 *p++ = DW_CFA_def_cfa_offset;
14165 if (htab->opd_abi)
14166 {
14167 *p++ = 128;
14168 *p++ = 1;
14169 }
14170 else
14171 *p++ = 96;
14172 *p++ = DW_CFA_offset_extended_sf;
14173 *p++ = 65;
14174 *p++ = (-16 / 8) & 0x7f;
14175 for (i = 4; i < 12; i++)
14176 {
14177 *p++ = DW_CFA_offset + i;
14178 *p++ = (htab->opd_abi ? 13 : 12) - i;
14179 }
14180 *p++ = DW_CFA_advance_loc + 10;
14181 *p++ = DW_CFA_def_cfa_offset;
14182 *p++ = 0;
14183 for (i = 4; i < 12; i++)
14184 *p++ = DW_CFA_restore + i;
14185 *p++ = DW_CFA_advance_loc + 2;
14186 *p++ = DW_CFA_restore_extended;
14187 *p++ = 65;
14188 return p;
14189 }
14190
14191 /* Build all the stubs associated with the current output file.
14192 The stubs are kept in a hash table attached to the main linker
14193 hash table. This function is called via gldelf64ppc_finish. */
14194
14195 bfd_boolean
14196 ppc64_elf_build_stubs (struct bfd_link_info *info,
14197 char **stats)
14198 {
14199 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14200 struct map_stub *group;
14201 asection *stub_sec;
14202 bfd_byte *p;
14203 int stub_sec_count = 0;
14204
14205 if (htab == NULL)
14206 return FALSE;
14207
14208 /* Allocate memory to hold the linker stubs. */
14209 for (group = htab->group; group != NULL; group = group->next)
14210 {
14211 group->eh_size = 0;
14212 group->lr_restore = 0;
14213 if ((stub_sec = group->stub_sec) != NULL
14214 && stub_sec->size != 0)
14215 {
14216 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14217 stub_sec->size);
14218 if (stub_sec->contents == NULL)
14219 return FALSE;
14220 stub_sec->size = 0;
14221 }
14222 }
14223
14224 if (htab->glink != NULL && htab->glink->size != 0)
14225 {
14226 unsigned int indx;
14227 bfd_vma plt0;
14228
14229 /* Build the .glink plt call stub. */
14230 if (htab->params->emit_stub_syms)
14231 {
14232 struct elf_link_hash_entry *h;
14233 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14234 TRUE, FALSE, FALSE);
14235 if (h == NULL)
14236 return FALSE;
14237 if (h->root.type == bfd_link_hash_new)
14238 {
14239 h->root.type = bfd_link_hash_defined;
14240 h->root.u.def.section = htab->glink;
14241 h->root.u.def.value = 8;
14242 h->ref_regular = 1;
14243 h->def_regular = 1;
14244 h->ref_regular_nonweak = 1;
14245 h->forced_local = 1;
14246 h->non_elf = 0;
14247 h->root.linker_def = 1;
14248 }
14249 }
14250 plt0 = (htab->elf.splt->output_section->vma
14251 + htab->elf.splt->output_offset
14252 - 16);
14253 if (info->emitrelocations)
14254 {
14255 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14256 if (r == NULL)
14257 return FALSE;
14258 r->r_offset = (htab->glink->output_offset
14259 + htab->glink->output_section->vma);
14260 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14261 r->r_addend = plt0;
14262 }
14263 p = htab->glink->contents;
14264 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
14265 bfd_put_64 (htab->glink->owner, plt0, p);
14266 p += 8;
14267 if (htab->opd_abi)
14268 {
14269 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14270 p += 4;
14271 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14272 p += 4;
14273 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14274 p += 4;
14275 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14276 p += 4;
14277 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14278 p += 4;
14279 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14280 p += 4;
14281 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14282 p += 4;
14283 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14284 p += 4;
14285 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14286 p += 4;
14287 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14288 p += 4;
14289 }
14290 else
14291 {
14292 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14293 p += 4;
14294 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14295 p += 4;
14296 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14297 p += 4;
14298 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14299 p += 4;
14300 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14301 p += 4;
14302 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14303 p += 4;
14304 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14305 p += 4;
14306 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14307 p += 4;
14308 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14309 p += 4;
14310 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14311 p += 4;
14312 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14313 p += 4;
14314 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14315 p += 4;
14316 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14317 p += 4;
14318 }
14319 bfd_put_32 (htab->glink->owner, BCTR, p);
14320 p += 4;
14321 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
14322
14323 /* Build the .glink lazy link call stubs. */
14324 indx = 0;
14325 while (p < htab->glink->contents + htab->glink->size)
14326 {
14327 if (htab->opd_abi)
14328 {
14329 if (indx < 0x8000)
14330 {
14331 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14332 p += 4;
14333 }
14334 else
14335 {
14336 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14337 p += 4;
14338 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14339 p);
14340 p += 4;
14341 }
14342 }
14343 bfd_put_32 (htab->glink->owner,
14344 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
14345 indx++;
14346 p += 4;
14347 }
14348 }
14349
14350 if (htab->tga_group != NULL)
14351 {
14352 htab->tga_group->lr_restore = 23 * 4;
14353 htab->tga_group->stub_sec->size = 24 * 4;
14354 if (!emit_tga_desc (htab))
14355 return FALSE;
14356 if (htab->glink_eh_frame != NULL
14357 && htab->glink_eh_frame->size != 0)
14358 {
14359 size_t align = 4;
14360
14361 p = htab->glink_eh_frame->contents;
14362 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14363 p += 17;
14364 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14365 }
14366 }
14367
14368 /* Build .glink global entry stubs, and PLT relocs for globals. */
14369 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14370
14371 if (!write_plt_relocs_for_local_syms (info))
14372 return FALSE;
14373
14374 if (htab->brlt != NULL && htab->brlt->size != 0)
14375 {
14376 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
14377 htab->brlt->size);
14378 if (htab->brlt->contents == NULL)
14379 return FALSE;
14380 }
14381 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
14382 {
14383 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
14384 htab->relbrlt->size);
14385 if (htab->relbrlt->contents == NULL)
14386 return FALSE;
14387 }
14388
14389 /* Build the stubs as directed by the stub hash table. */
14390 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
14391
14392 for (group = htab->group; group != NULL; group = group->next)
14393 if (group->needs_save_res)
14394 group->stub_sec->size += htab->sfpr->size;
14395
14396 if (htab->relbrlt != NULL)
14397 htab->relbrlt->reloc_count = 0;
14398
14399 if (htab->params->plt_stub_align != 0)
14400 for (group = htab->group; group != NULL; group = group->next)
14401 if ((stub_sec = group->stub_sec) != NULL)
14402 {
14403 int align = abs (htab->params->plt_stub_align);
14404 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14405 }
14406
14407 for (group = htab->group; group != NULL; group = group->next)
14408 if (group->needs_save_res)
14409 {
14410 stub_sec = group->stub_sec;
14411 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14412 htab->sfpr->contents, htab->sfpr->size);
14413 if (htab->params->emit_stub_syms)
14414 {
14415 unsigned int i;
14416
14417 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14418 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14419 return FALSE;
14420 }
14421 }
14422
14423 if (htab->glink_eh_frame != NULL
14424 && htab->glink_eh_frame->size != 0)
14425 {
14426 bfd_vma val;
14427 size_t align = 4;
14428
14429 p = htab->glink_eh_frame->contents;
14430 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14431
14432 for (group = htab->group; group != NULL; group = group->next)
14433 if (group->eh_size != 0)
14434 {
14435 /* Offset to stub section. */
14436 val = (group->stub_sec->output_section->vma
14437 + group->stub_sec->output_offset);
14438 val -= (htab->glink_eh_frame->output_section->vma
14439 + htab->glink_eh_frame->output_offset
14440 + (p + 8 - htab->glink_eh_frame->contents));
14441 if (val + 0x80000000 > 0xffffffff)
14442 {
14443 _bfd_error_handler
14444 (_("%s offset too large for .eh_frame sdata4 encoding"),
14445 group->stub_sec->name);
14446 return FALSE;
14447 }
14448 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14449 p += (group->eh_size + 17 + 3) & -4;
14450 }
14451 if (htab->glink != NULL && htab->glink->size != 0)
14452 {
14453 /* Offset to .glink. */
14454 val = (htab->glink->output_section->vma
14455 + htab->glink->output_offset
14456 + 8);
14457 val -= (htab->glink_eh_frame->output_section->vma
14458 + htab->glink_eh_frame->output_offset
14459 + (p + 8 - htab->glink_eh_frame->contents));
14460 if (val + 0x80000000 > 0xffffffff)
14461 {
14462 _bfd_error_handler
14463 (_("%s offset too large for .eh_frame sdata4 encoding"),
14464 htab->glink->name);
14465 return FALSE;
14466 }
14467 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14468 p += (24 + align - 1) & -align;
14469 }
14470 }
14471
14472 for (group = htab->group; group != NULL; group = group->next)
14473 if ((stub_sec = group->stub_sec) != NULL)
14474 {
14475 stub_sec_count += 1;
14476 if (stub_sec->rawsize != stub_sec->size
14477 && (htab->stub_iteration <= STUB_SHRINK_ITER
14478 || stub_sec->rawsize < stub_sec->size))
14479 break;
14480 }
14481
14482 if (group != NULL)
14483 {
14484 htab->stub_error = TRUE;
14485 _bfd_error_handler (_("stubs don't match calculated size"));
14486 }
14487
14488 if (htab->stub_error)
14489 return FALSE;
14490
14491 if (stats != NULL)
14492 {
14493 char *groupmsg;
14494 if (asprintf (&groupmsg,
14495 ngettext ("linker stubs in %u group\n",
14496 "linker stubs in %u groups\n",
14497 stub_sec_count),
14498 stub_sec_count) < 0)
14499 *stats = NULL;
14500 else
14501 {
14502 if (asprintf (stats, _("%s"
14503 " branch %lu\n"
14504 " branch toc adj %lu\n"
14505 " branch notoc %lu\n"
14506 " branch both %lu\n"
14507 " long branch %lu\n"
14508 " long toc adj %lu\n"
14509 " long notoc %lu\n"
14510 " long both %lu\n"
14511 " plt call %lu\n"
14512 " plt call save %lu\n"
14513 " plt call notoc %lu\n"
14514 " plt call both %lu\n"
14515 " global entry %lu"),
14516 groupmsg,
14517 htab->stub_count[ppc_stub_long_branch - 1],
14518 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14519 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14520 htab->stub_count[ppc_stub_long_branch_both - 1],
14521 htab->stub_count[ppc_stub_plt_branch - 1],
14522 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14523 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14524 htab->stub_count[ppc_stub_plt_branch_both - 1],
14525 htab->stub_count[ppc_stub_plt_call - 1],
14526 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14527 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14528 htab->stub_count[ppc_stub_plt_call_both - 1],
14529 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14530 *stats = NULL;
14531 free (groupmsg);
14532 }
14533 }
14534 return TRUE;
14535 }
14536
14537 /* What to do when ld finds relocations against symbols defined in
14538 discarded sections. */
14539
14540 static unsigned int
14541 ppc64_elf_action_discarded (asection *sec)
14542 {
14543 if (strcmp (".opd", sec->name) == 0)
14544 return 0;
14545
14546 if (strcmp (".toc", sec->name) == 0)
14547 return 0;
14548
14549 if (strcmp (".toc1", sec->name) == 0)
14550 return 0;
14551
14552 return _bfd_elf_default_action_discarded (sec);
14553 }
14554
14555 /* These are the dynamic relocations supported by glibc. */
14556
14557 static bfd_boolean
14558 ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14559 {
14560 switch (r_type)
14561 {
14562 case R_PPC64_RELATIVE:
14563 case R_PPC64_NONE:
14564 case R_PPC64_ADDR64:
14565 case R_PPC64_GLOB_DAT:
14566 case R_PPC64_IRELATIVE:
14567 case R_PPC64_JMP_IREL:
14568 case R_PPC64_JMP_SLOT:
14569 case R_PPC64_DTPMOD64:
14570 case R_PPC64_DTPREL64:
14571 case R_PPC64_TPREL64:
14572 case R_PPC64_TPREL16_LO_DS:
14573 case R_PPC64_TPREL16_DS:
14574 case R_PPC64_TPREL16:
14575 case R_PPC64_TPREL16_LO:
14576 case R_PPC64_TPREL16_HI:
14577 case R_PPC64_TPREL16_HIGH:
14578 case R_PPC64_TPREL16_HA:
14579 case R_PPC64_TPREL16_HIGHA:
14580 case R_PPC64_TPREL16_HIGHER:
14581 case R_PPC64_TPREL16_HIGHEST:
14582 case R_PPC64_TPREL16_HIGHERA:
14583 case R_PPC64_TPREL16_HIGHESTA:
14584 case R_PPC64_ADDR16_LO_DS:
14585 case R_PPC64_ADDR16_LO:
14586 case R_PPC64_ADDR16_HI:
14587 case R_PPC64_ADDR16_HIGH:
14588 case R_PPC64_ADDR16_HA:
14589 case R_PPC64_ADDR16_HIGHA:
14590 case R_PPC64_REL30:
14591 case R_PPC64_COPY:
14592 case R_PPC64_UADDR64:
14593 case R_PPC64_UADDR32:
14594 case R_PPC64_ADDR32:
14595 case R_PPC64_ADDR24:
14596 case R_PPC64_ADDR16:
14597 case R_PPC64_UADDR16:
14598 case R_PPC64_ADDR16_DS:
14599 case R_PPC64_ADDR16_HIGHER:
14600 case R_PPC64_ADDR16_HIGHEST:
14601 case R_PPC64_ADDR16_HIGHERA:
14602 case R_PPC64_ADDR16_HIGHESTA:
14603 case R_PPC64_ADDR14:
14604 case R_PPC64_ADDR14_BRTAKEN:
14605 case R_PPC64_ADDR14_BRNTAKEN:
14606 case R_PPC64_REL32:
14607 case R_PPC64_REL64:
14608 return TRUE;
14609
14610 default:
14611 return FALSE;
14612 }
14613 }
14614
14615 /* The RELOCATE_SECTION function is called by the ELF backend linker
14616 to handle the relocations for a section.
14617
14618 The relocs are always passed as Rela structures; if the section
14619 actually uses Rel structures, the r_addend field will always be
14620 zero.
14621
14622 This function is responsible for adjust the section contents as
14623 necessary, and (if using Rela relocs and generating a
14624 relocatable output file) adjusting the reloc addend as
14625 necessary.
14626
14627 This function does not have to worry about setting the reloc
14628 address or the reloc symbol index.
14629
14630 LOCAL_SYMS is a pointer to the swapped in local symbols.
14631
14632 LOCAL_SECTIONS is an array giving the section in the input file
14633 corresponding to the st_shndx field of each local symbol.
14634
14635 The global hash table entry for the global symbols can be found
14636 via elf_sym_hashes (input_bfd).
14637
14638 When generating relocatable output, this function must handle
14639 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14640 going to be the section symbol corresponding to the output
14641 section, which means that the addend must be adjusted
14642 accordingly. */
14643
14644 static bfd_boolean
14645 ppc64_elf_relocate_section (bfd *output_bfd,
14646 struct bfd_link_info *info,
14647 bfd *input_bfd,
14648 asection *input_section,
14649 bfd_byte *contents,
14650 Elf_Internal_Rela *relocs,
14651 Elf_Internal_Sym *local_syms,
14652 asection **local_sections)
14653 {
14654 struct ppc_link_hash_table *htab;
14655 Elf_Internal_Shdr *symtab_hdr;
14656 struct elf_link_hash_entry **sym_hashes;
14657 Elf_Internal_Rela *rel;
14658 Elf_Internal_Rela *wrel;
14659 Elf_Internal_Rela *relend;
14660 Elf_Internal_Rela outrel;
14661 bfd_byte *loc;
14662 struct got_entry **local_got_ents;
14663 bfd_vma TOCstart;
14664 bfd_boolean ret = TRUE;
14665 bfd_boolean is_opd;
14666 /* Assume 'at' branch hints. */
14667 bfd_boolean is_isa_v2 = TRUE;
14668 bfd_boolean warned_dynamic = FALSE;
14669 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
14670
14671 /* Initialize howto table if needed. */
14672 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
14673 ppc_howto_init ();
14674
14675 htab = ppc_hash_table (info);
14676 if (htab == NULL)
14677 return FALSE;
14678
14679 /* Don't relocate stub sections. */
14680 if (input_section->owner == htab->params->stub_bfd)
14681 return TRUE;
14682
14683 if (!is_ppc64_elf (input_bfd))
14684 {
14685 bfd_set_error (bfd_error_wrong_format);
14686 return FALSE;
14687 }
14688
14689 local_got_ents = elf_local_got_ents (input_bfd);
14690 TOCstart = elf_gp (output_bfd);
14691 symtab_hdr = &elf_symtab_hdr (input_bfd);
14692 sym_hashes = elf_sym_hashes (input_bfd);
14693 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
14694
14695 rel = wrel = relocs;
14696 relend = relocs + input_section->reloc_count;
14697 for (; rel < relend; wrel++, rel++)
14698 {
14699 enum elf_ppc64_reloc_type r_type;
14700 bfd_vma addend;
14701 bfd_reloc_status_type r;
14702 Elf_Internal_Sym *sym;
14703 asection *sec;
14704 struct elf_link_hash_entry *h_elf;
14705 struct ppc_link_hash_entry *h;
14706 struct ppc_link_hash_entry *fdh;
14707 const char *sym_name;
14708 unsigned long r_symndx, toc_symndx;
14709 bfd_vma toc_addend;
14710 unsigned char tls_mask, tls_gd, tls_type;
14711 unsigned char sym_type;
14712 bfd_vma relocation;
14713 bfd_boolean unresolved_reloc, save_unresolved_reloc;
14714 bfd_boolean warned;
14715 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
14716 unsigned int insn;
14717 unsigned int mask;
14718 struct ppc_stub_hash_entry *stub_entry;
14719 bfd_vma max_br_offset;
14720 bfd_vma from;
14721 Elf_Internal_Rela orig_rel;
14722 reloc_howto_type *howto;
14723 struct reloc_howto_struct alt_howto;
14724 uint64_t pinsn;
14725 bfd_vma offset;
14726
14727 again:
14728 orig_rel = *rel;
14729
14730 r_type = ELF64_R_TYPE (rel->r_info);
14731 r_symndx = ELF64_R_SYM (rel->r_info);
14732
14733 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14734 symbol of the previous ADDR64 reloc. The symbol gives us the
14735 proper TOC base to use. */
14736 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
14737 && wrel != relocs
14738 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
14739 && is_opd)
14740 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
14741
14742 sym = NULL;
14743 sec = NULL;
14744 h_elf = NULL;
14745 sym_name = NULL;
14746 unresolved_reloc = FALSE;
14747 warned = FALSE;
14748
14749 if (r_symndx < symtab_hdr->sh_info)
14750 {
14751 /* It's a local symbol. */
14752 struct _opd_sec_data *opd;
14753
14754 sym = local_syms + r_symndx;
14755 sec = local_sections[r_symndx];
14756 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
14757 sym_type = ELF64_ST_TYPE (sym->st_info);
14758 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14759 opd = get_opd_info (sec);
14760 if (opd != NULL && opd->adjust != NULL)
14761 {
14762 long adjust = opd->adjust[OPD_NDX (sym->st_value
14763 + rel->r_addend)];
14764 if (adjust == -1)
14765 relocation = 0;
14766 else
14767 {
14768 /* If this is a relocation against the opd section sym
14769 and we have edited .opd, adjust the reloc addend so
14770 that ld -r and ld --emit-relocs output is correct.
14771 If it is a reloc against some other .opd symbol,
14772 then the symbol value will be adjusted later. */
14773 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14774 rel->r_addend += adjust;
14775 else
14776 relocation += adjust;
14777 }
14778 }
14779 }
14780 else
14781 {
14782 bfd_boolean ignored;
14783
14784 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14785 r_symndx, symtab_hdr, sym_hashes,
14786 h_elf, sec, relocation,
14787 unresolved_reloc, warned, ignored);
14788 sym_name = h_elf->root.root.string;
14789 sym_type = h_elf->type;
14790 if (sec != NULL
14791 && sec->owner == output_bfd
14792 && strcmp (sec->name, ".opd") == 0)
14793 {
14794 /* This is a symbol defined in a linker script. All
14795 such are defined in output sections, even those
14796 defined by simple assignment from a symbol defined in
14797 an input section. Transfer the symbol to an
14798 appropriate input .opd section, so that a branch to
14799 this symbol will be mapped to the location specified
14800 by the opd entry. */
14801 struct bfd_link_order *lo;
14802 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14803 if (lo->type == bfd_indirect_link_order)
14804 {
14805 asection *isec = lo->u.indirect.section;
14806 if (h_elf->root.u.def.value >= isec->output_offset
14807 && h_elf->root.u.def.value < (isec->output_offset
14808 + isec->size))
14809 {
14810 h_elf->root.u.def.value -= isec->output_offset;
14811 h_elf->root.u.def.section = isec;
14812 sec = isec;
14813 break;
14814 }
14815 }
14816 }
14817 }
14818 h = ppc_elf_hash_entry (h_elf);
14819
14820 if (sec != NULL && discarded_section (sec))
14821 {
14822 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14823 input_bfd, input_section,
14824 contents, rel->r_offset);
14825 wrel->r_offset = rel->r_offset;
14826 wrel->r_info = 0;
14827 wrel->r_addend = 0;
14828
14829 /* For ld -r, remove relocations in debug sections against
14830 symbols defined in discarded sections. Not done for
14831 non-debug to preserve relocs in .eh_frame which the
14832 eh_frame editing code expects to be present. */
14833 if (bfd_link_relocatable (info)
14834 && (input_section->flags & SEC_DEBUGGING))
14835 wrel--;
14836
14837 continue;
14838 }
14839
14840 if (bfd_link_relocatable (info))
14841 goto copy_reloc;
14842
14843 if (h != NULL && &h->elf == htab->elf.hgot)
14844 {
14845 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14846 sec = bfd_abs_section_ptr;
14847 unresolved_reloc = FALSE;
14848 }
14849
14850 /* TLS optimizations. Replace instruction sequences and relocs
14851 based on information we collected in tls_optimize. We edit
14852 RELOCS so that --emit-relocs will output something sensible
14853 for the final instruction stream. */
14854 tls_mask = 0;
14855 tls_gd = 0;
14856 toc_symndx = 0;
14857 if (h != NULL)
14858 tls_mask = h->tls_mask;
14859 else if (local_got_ents != NULL)
14860 {
14861 struct plt_entry **local_plt = (struct plt_entry **)
14862 (local_got_ents + symtab_hdr->sh_info);
14863 unsigned char *lgot_masks = (unsigned char *)
14864 (local_plt + symtab_hdr->sh_info);
14865 tls_mask = lgot_masks[r_symndx];
14866 }
14867 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14868 && (r_type == R_PPC64_TLS
14869 || r_type == R_PPC64_TLSGD
14870 || r_type == R_PPC64_TLSLD))
14871 {
14872 /* Check for toc tls entries. */
14873 unsigned char *toc_tls;
14874
14875 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14876 &local_syms, rel, input_bfd))
14877 return FALSE;
14878
14879 if (toc_tls)
14880 tls_mask = *toc_tls;
14881 }
14882
14883 /* Check that tls relocs are used with tls syms, and non-tls
14884 relocs are used with non-tls syms. */
14885 if (r_symndx != STN_UNDEF
14886 && r_type != R_PPC64_NONE
14887 && (h == NULL
14888 || h->elf.root.type == bfd_link_hash_defined
14889 || h->elf.root.type == bfd_link_hash_defweak)
14890 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
14891 {
14892 if ((tls_mask & TLS_TLS) != 0
14893 && (r_type == R_PPC64_TLS
14894 || r_type == R_PPC64_TLSGD
14895 || r_type == R_PPC64_TLSLD))
14896 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14897 ;
14898 else
14899 info->callbacks->einfo
14900 (!IS_PPC64_TLS_RELOC (r_type)
14901 /* xgettext:c-format */
14902 ? _("%H: %s used with TLS symbol `%pT'\n")
14903 /* xgettext:c-format */
14904 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14905 input_bfd, input_section, rel->r_offset,
14906 ppc64_elf_howto_table[r_type]->name,
14907 sym_name);
14908 }
14909
14910 /* Ensure reloc mapping code below stays sane. */
14911 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14912 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14913 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14914 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14915 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14916 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14917 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14918 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14919 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14920 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14921 abort ();
14922
14923 switch (r_type)
14924 {
14925 default:
14926 break;
14927
14928 case R_PPC64_LO_DS_OPT:
14929 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14930 if ((insn & (0x3fu << 26)) != 58u << 26)
14931 abort ();
14932 insn += (14u << 26) - (58u << 26);
14933 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14934 r_type = R_PPC64_TOC16_LO;
14935 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14936 break;
14937
14938 case R_PPC64_TOC16:
14939 case R_PPC64_TOC16_LO:
14940 case R_PPC64_TOC16_DS:
14941 case R_PPC64_TOC16_LO_DS:
14942 {
14943 /* Check for toc tls entries. */
14944 unsigned char *toc_tls;
14945 int retval;
14946
14947 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14948 &local_syms, rel, input_bfd);
14949 if (retval == 0)
14950 return FALSE;
14951
14952 if (toc_tls)
14953 {
14954 tls_mask = *toc_tls;
14955 if (r_type == R_PPC64_TOC16_DS
14956 || r_type == R_PPC64_TOC16_LO_DS)
14957 {
14958 if ((tls_mask & TLS_TLS) != 0
14959 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14960 goto toctprel;
14961 }
14962 else
14963 {
14964 /* If we found a GD reloc pair, then we might be
14965 doing a GD->IE transition. */
14966 if (retval == 2)
14967 {
14968 tls_gd = TLS_GDIE;
14969 if ((tls_mask & TLS_TLS) != 0
14970 && (tls_mask & TLS_GD) == 0)
14971 goto tls_ldgd_opt;
14972 }
14973 else if (retval == 3)
14974 {
14975 if ((tls_mask & TLS_TLS) != 0
14976 && (tls_mask & TLS_LD) == 0)
14977 goto tls_ldgd_opt;
14978 }
14979 }
14980 }
14981 }
14982 break;
14983
14984 case R_PPC64_GOT_TPREL16_HI:
14985 case R_PPC64_GOT_TPREL16_HA:
14986 if ((tls_mask & TLS_TLS) != 0
14987 && (tls_mask & TLS_TPREL) == 0)
14988 {
14989 rel->r_offset -= d_offset;
14990 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14991 r_type = R_PPC64_NONE;
14992 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14993 }
14994 break;
14995
14996 case R_PPC64_GOT_TPREL16_DS:
14997 case R_PPC64_GOT_TPREL16_LO_DS:
14998 if ((tls_mask & TLS_TLS) != 0
14999 && (tls_mask & TLS_TPREL) == 0)
15000 {
15001 toctprel:
15002 insn = bfd_get_32 (input_bfd,
15003 contents + rel->r_offset - d_offset);
15004 insn &= 31 << 21;
15005 insn |= 0x3c0d0000; /* addis 0,13,0 */
15006 bfd_put_32 (input_bfd, insn,
15007 contents + rel->r_offset - d_offset);
15008 r_type = R_PPC64_TPREL16_HA;
15009 if (toc_symndx != 0)
15010 {
15011 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15012 rel->r_addend = toc_addend;
15013 /* We changed the symbol. Start over in order to
15014 get h, sym, sec etc. right. */
15015 goto again;
15016 }
15017 else
15018 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15019 }
15020 break;
15021
15022 case R_PPC64_GOT_TPREL34:
15023 if ((tls_mask & TLS_TLS) != 0
15024 && (tls_mask & TLS_TPREL) == 0)
15025 {
15026 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15027 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15028 pinsn <<= 32;
15029 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15030 pinsn += ((2ULL << 56) + (-1ULL << 52)
15031 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15032 bfd_put_32 (input_bfd, pinsn >> 32,
15033 contents + rel->r_offset);
15034 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15035 contents + rel->r_offset + 4);
15036 r_type = R_PPC64_TPREL34;
15037 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15038 }
15039 break;
15040
15041 case R_PPC64_TLS:
15042 if ((tls_mask & TLS_TLS) != 0
15043 && (tls_mask & TLS_TPREL) == 0)
15044 {
15045 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15046 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15047 if (insn == 0)
15048 break;
15049 if ((rel->r_offset & 3) == 0)
15050 {
15051 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15052 /* Was PPC64_TLS which sits on insn boundary, now
15053 PPC64_TPREL16_LO which is at low-order half-word. */
15054 rel->r_offset += d_offset;
15055 r_type = R_PPC64_TPREL16_LO;
15056 if (toc_symndx != 0)
15057 {
15058 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15059 rel->r_addend = toc_addend;
15060 /* We changed the symbol. Start over in order to
15061 get h, sym, sec etc. right. */
15062 goto again;
15063 }
15064 else
15065 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15066 }
15067 else if ((rel->r_offset & 3) == 1)
15068 {
15069 /* For pcrel IE to LE we already have the full
15070 offset and thus don't need an addi here. A nop
15071 or mr will do. */
15072 if ((insn & (0x3fu << 26)) == 14 << 26)
15073 {
15074 /* Extract regs from addi rt,ra,si. */
15075 unsigned int rt = (insn >> 21) & 0x1f;
15076 unsigned int ra = (insn >> 16) & 0x1f;
15077 if (rt == ra)
15078 insn = NOP;
15079 else
15080 {
15081 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15082 insn = (rt << 16) | (ra << 21) | (ra << 11);
15083 insn |= (31u << 26) | (444u << 1);
15084 }
15085 }
15086 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
15087 }
15088 }
15089 break;
15090
15091 case R_PPC64_GOT_TLSGD16_HI:
15092 case R_PPC64_GOT_TLSGD16_HA:
15093 tls_gd = TLS_GDIE;
15094 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15095 goto tls_gdld_hi;
15096 break;
15097
15098 case R_PPC64_GOT_TLSLD16_HI:
15099 case R_PPC64_GOT_TLSLD16_HA:
15100 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15101 {
15102 tls_gdld_hi:
15103 if ((tls_mask & tls_gd) != 0)
15104 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15105 + R_PPC64_GOT_TPREL16_DS);
15106 else
15107 {
15108 rel->r_offset -= d_offset;
15109 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15110 r_type = R_PPC64_NONE;
15111 }
15112 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15113 }
15114 break;
15115
15116 case R_PPC64_GOT_TLSGD16:
15117 case R_PPC64_GOT_TLSGD16_LO:
15118 tls_gd = TLS_GDIE;
15119 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15120 goto tls_ldgd_opt;
15121 break;
15122
15123 case R_PPC64_GOT_TLSLD16:
15124 case R_PPC64_GOT_TLSLD16_LO:
15125 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15126 {
15127 unsigned int insn1, insn2;
15128
15129 tls_ldgd_opt:
15130 offset = (bfd_vma) -1;
15131 /* If not using the newer R_PPC64_TLSGD/LD to mark
15132 __tls_get_addr calls, we must trust that the call
15133 stays with its arg setup insns, ie. that the next
15134 reloc is the __tls_get_addr call associated with
15135 the current reloc. Edit both insns. */
15136 if (input_section->nomark_tls_get_addr
15137 && rel + 1 < relend
15138 && branch_reloc_hash_match (input_bfd, rel + 1,
15139 htab->tls_get_addr_fd,
15140 htab->tga_desc_fd,
15141 htab->tls_get_addr,
15142 htab->tga_desc))
15143 offset = rel[1].r_offset;
15144 /* We read the low GOT_TLS (or TOC16) insn because we
15145 need to keep the destination reg. It may be
15146 something other than the usual r3, and moved to r3
15147 before the call by intervening code. */
15148 insn1 = bfd_get_32 (input_bfd,
15149 contents + rel->r_offset - d_offset);
15150 if ((tls_mask & tls_gd) != 0)
15151 {
15152 /* IE */
15153 insn1 &= (0x1f << 21) | (0x1f << 16);
15154 insn1 |= 58u << 26; /* ld */
15155 insn2 = 0x7c636a14; /* add 3,3,13 */
15156 if (offset != (bfd_vma) -1)
15157 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15158 if (r_type == R_PPC64_TOC16
15159 || r_type == R_PPC64_TOC16_LO)
15160 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
15161 else
15162 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15163 + R_PPC64_GOT_TPREL16_DS);
15164 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15165 }
15166 else
15167 {
15168 /* LE */
15169 insn1 &= 0x1f << 21;
15170 insn1 |= 0x3c0d0000; /* addis r,13,0 */
15171 insn2 = 0x38630000; /* addi 3,3,0 */
15172 if (tls_gd == 0)
15173 {
15174 /* Was an LD reloc. */
15175 r_symndx = STN_UNDEF;
15176 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15177 }
15178 else if (toc_symndx != 0)
15179 {
15180 r_symndx = toc_symndx;
15181 rel->r_addend = toc_addend;
15182 }
15183 r_type = R_PPC64_TPREL16_HA;
15184 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15185 if (offset != (bfd_vma) -1)
15186 {
15187 rel[1].r_info = ELF64_R_INFO (r_symndx,
15188 R_PPC64_TPREL16_LO);
15189 rel[1].r_offset = offset + d_offset;
15190 rel[1].r_addend = rel->r_addend;
15191 }
15192 }
15193 bfd_put_32 (input_bfd, insn1,
15194 contents + rel->r_offset - d_offset);
15195 if (offset != (bfd_vma) -1)
15196 {
15197 bfd_put_32 (input_bfd, insn2, contents + offset);
15198 if (offset + 8 <= input_section->size)
15199 {
15200 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15201 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15202 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15203 }
15204 }
15205 if ((tls_mask & tls_gd) == 0
15206 && (tls_gd == 0 || toc_symndx != 0))
15207 {
15208 /* We changed the symbol. Start over in order
15209 to get h, sym, sec etc. right. */
15210 goto again;
15211 }
15212 }
15213 break;
15214
15215 case R_PPC64_GOT_TLSGD34:
15216 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15217 {
15218 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15219 pinsn <<= 32;
15220 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15221 if ((tls_mask & TLS_GDIE) != 0)
15222 {
15223 /* IE, pla -> pld */
15224 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15225 r_type = R_PPC64_GOT_TPREL34;
15226 }
15227 else
15228 {
15229 /* LE, pla pcrel -> paddi r13 */
15230 pinsn += (-1ULL << 52) + (13ULL << 16);
15231 r_type = R_PPC64_TPREL34;
15232 }
15233 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15234 bfd_put_32 (input_bfd, pinsn >> 32,
15235 contents + rel->r_offset);
15236 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15237 contents + rel->r_offset + 4);
15238 }
15239 break;
15240
15241 case R_PPC64_GOT_TLSLD34:
15242 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15243 {
15244 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15245 pinsn <<= 32;
15246 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15247 pinsn += (-1ULL << 52) + (13ULL << 16);
15248 bfd_put_32 (input_bfd, pinsn >> 32,
15249 contents + rel->r_offset);
15250 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15251 contents + rel->r_offset + 4);
15252 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15253 r_symndx = STN_UNDEF;
15254 r_type = R_PPC64_TPREL34;
15255 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15256 goto again;
15257 }
15258 break;
15259
15260 case R_PPC64_TLSGD:
15261 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
15262 && rel + 1 < relend)
15263 {
15264 unsigned int insn2;
15265 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15266
15267 offset = rel->r_offset;
15268 if (is_plt_seq_reloc (r_type1))
15269 {
15270 bfd_put_32 (output_bfd, NOP, contents + offset);
15271 if (r_type1 == R_PPC64_PLT_PCREL34
15272 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15273 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15274 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15275 break;
15276 }
15277
15278 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15279 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15280
15281 if ((tls_mask & TLS_GDIE) != 0)
15282 {
15283 /* IE */
15284 r_type = R_PPC64_NONE;
15285 insn2 = 0x7c636a14; /* add 3,3,13 */
15286 }
15287 else
15288 {
15289 /* LE */
15290 if (toc_symndx != 0)
15291 {
15292 r_symndx = toc_symndx;
15293 rel->r_addend = toc_addend;
15294 }
15295 if (r_type1 == R_PPC64_REL24_NOTOC
15296 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15297 {
15298 r_type = R_PPC64_NONE;
15299 insn2 = NOP;
15300 }
15301 else
15302 {
15303 rel->r_offset = offset + d_offset;
15304 r_type = R_PPC64_TPREL16_LO;
15305 insn2 = 0x38630000; /* addi 3,3,0 */
15306 }
15307 }
15308 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15309 /* Zap the reloc on the _tls_get_addr call too. */
15310 BFD_ASSERT (offset == rel[1].r_offset);
15311 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15312 bfd_put_32 (input_bfd, insn2, contents + offset);
15313 if ((tls_mask & TLS_GDIE) == 0
15314 && toc_symndx != 0
15315 && r_type != R_PPC64_NONE)
15316 goto again;
15317 }
15318 break;
15319
15320 case R_PPC64_TLSLD:
15321 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
15322 && rel + 1 < relend)
15323 {
15324 unsigned int insn2;
15325 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
15326
15327 offset = rel->r_offset;
15328 if (is_plt_seq_reloc (r_type1))
15329 {
15330 bfd_put_32 (output_bfd, NOP, contents + offset);
15331 if (r_type1 == R_PPC64_PLT_PCREL34
15332 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15333 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15334 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15335 break;
15336 }
15337
15338 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15339 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15340
15341 if (r_type1 == R_PPC64_REL24_NOTOC
15342 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15343 {
15344 r_type = R_PPC64_NONE;
15345 insn2 = NOP;
15346 }
15347 else
15348 {
15349 rel->r_offset = offset + d_offset;
15350 r_symndx = STN_UNDEF;
15351 r_type = R_PPC64_TPREL16_LO;
15352 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15353 insn2 = 0x38630000; /* addi 3,3,0 */
15354 }
15355 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15356 /* Zap the reloc on the _tls_get_addr call too. */
15357 BFD_ASSERT (offset == rel[1].r_offset);
15358 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15359 bfd_put_32 (input_bfd, insn2, contents + offset);
15360 if (r_type != R_PPC64_NONE)
15361 goto again;
15362 }
15363 break;
15364
15365 case R_PPC64_DTPMOD64:
15366 if (rel + 1 < relend
15367 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15368 && rel[1].r_offset == rel->r_offset + 8)
15369 {
15370 if ((tls_mask & TLS_GD) == 0)
15371 {
15372 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
15373 if ((tls_mask & TLS_GDIE) != 0)
15374 r_type = R_PPC64_TPREL64;
15375 else
15376 {
15377 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15378 r_type = R_PPC64_NONE;
15379 }
15380 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15381 }
15382 }
15383 else
15384 {
15385 if ((tls_mask & TLS_LD) == 0)
15386 {
15387 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
15388 r_type = R_PPC64_NONE;
15389 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15390 }
15391 }
15392 break;
15393
15394 case R_PPC64_TPREL64:
15395 if ((tls_mask & TLS_TPREL) == 0)
15396 {
15397 r_type = R_PPC64_NONE;
15398 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15399 }
15400 break;
15401
15402 case R_PPC64_ENTRY:
15403 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15404 if (!bfd_link_pic (info)
15405 && !info->traditional_format
15406 && relocation + 0x80008000 <= 0xffffffff)
15407 {
15408 unsigned int insn1, insn2;
15409
15410 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15411 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15412 if ((insn1 & ~0xfffc) == LD_R2_0R12
15413 && insn2 == ADD_R2_R2_R12)
15414 {
15415 bfd_put_32 (input_bfd,
15416 LIS_R2 + PPC_HA (relocation),
15417 contents + rel->r_offset);
15418 bfd_put_32 (input_bfd,
15419 ADDI_R2_R2 + PPC_LO (relocation),
15420 contents + rel->r_offset + 4);
15421 }
15422 }
15423 else
15424 {
15425 relocation -= (rel->r_offset
15426 + input_section->output_offset
15427 + input_section->output_section->vma);
15428 if (relocation + 0x80008000 <= 0xffffffff)
15429 {
15430 unsigned int insn1, insn2;
15431
15432 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15433 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15434 if ((insn1 & ~0xfffc) == LD_R2_0R12
15435 && insn2 == ADD_R2_R2_R12)
15436 {
15437 bfd_put_32 (input_bfd,
15438 ADDIS_R2_R12 + PPC_HA (relocation),
15439 contents + rel->r_offset);
15440 bfd_put_32 (input_bfd,
15441 ADDI_R2_R2 + PPC_LO (relocation),
15442 contents + rel->r_offset + 4);
15443 }
15444 }
15445 }
15446 break;
15447
15448 case R_PPC64_REL16_HA:
15449 /* If we are generating a non-PIC executable, edit
15450 . 0: addis 2,12,.TOC.-0b@ha
15451 . addi 2,2,.TOC.-0b@l
15452 used by ELFv2 global entry points to set up r2, to
15453 . lis 2,.TOC.@ha
15454 . addi 2,2,.TOC.@l
15455 if .TOC. is in range. */
15456 if (!bfd_link_pic (info)
15457 && !info->traditional_format
15458 && !htab->opd_abi
15459 && rel->r_addend == d_offset
15460 && h != NULL && &h->elf == htab->elf.hgot
15461 && rel + 1 < relend
15462 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15463 && rel[1].r_offset == rel->r_offset + 4
15464 && rel[1].r_addend == rel->r_addend + 4
15465 && relocation + 0x80008000 <= 0xffffffff)
15466 {
15467 unsigned int insn1, insn2;
15468 offset = rel->r_offset - d_offset;
15469 insn1 = bfd_get_32 (input_bfd, contents + offset);
15470 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15471 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15472 && (insn2 & 0xffff0000) == ADDI_R2_R2)
15473 {
15474 r_type = R_PPC64_ADDR16_HA;
15475 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15476 rel->r_addend -= d_offset;
15477 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15478 rel[1].r_addend -= d_offset + 4;
15479 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
15480 }
15481 }
15482 break;
15483 }
15484
15485 /* Handle other relocations that tweak non-addend part of insn. */
15486 insn = 0;
15487 max_br_offset = 1 << 25;
15488 addend = rel->r_addend;
15489 reloc_dest = DEST_NORMAL;
15490 switch (r_type)
15491 {
15492 default:
15493 break;
15494
15495 case R_PPC64_TOCSAVE:
15496 if (relocation + addend == (rel->r_offset
15497 + input_section->output_offset
15498 + input_section->output_section->vma)
15499 && tocsave_find (htab, NO_INSERT,
15500 &local_syms, rel, input_bfd))
15501 {
15502 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15503 if (insn == NOP
15504 || insn == CROR_151515 || insn == CROR_313131)
15505 bfd_put_32 (input_bfd,
15506 STD_R2_0R1 + STK_TOC (htab),
15507 contents + rel->r_offset);
15508 }
15509 break;
15510
15511 /* Branch taken prediction relocations. */
15512 case R_PPC64_ADDR14_BRTAKEN:
15513 case R_PPC64_REL14_BRTAKEN:
15514 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
15515 /* Fall through. */
15516
15517 /* Branch not taken prediction relocations. */
15518 case R_PPC64_ADDR14_BRNTAKEN:
15519 case R_PPC64_REL14_BRNTAKEN:
15520 insn |= bfd_get_32 (input_bfd,
15521 contents + rel->r_offset) & ~(0x01 << 21);
15522 /* Fall through. */
15523
15524 case R_PPC64_REL14:
15525 max_br_offset = 1 << 15;
15526 /* Fall through. */
15527
15528 case R_PPC64_REL24:
15529 case R_PPC64_REL24_NOTOC:
15530 case R_PPC64_PLTCALL:
15531 case R_PPC64_PLTCALL_NOTOC:
15532 /* Calls to functions with a different TOC, such as calls to
15533 shared objects, need to alter the TOC pointer. This is
15534 done using a linkage stub. A REL24 branching to these
15535 linkage stubs needs to be followed by a nop, as the nop
15536 will be replaced with an instruction to restore the TOC
15537 base pointer. */
15538 fdh = h;
15539 if (h != NULL
15540 && h->oh != NULL
15541 && h->oh->is_func_descriptor)
15542 fdh = ppc_follow_link (h->oh);
15543 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15544 htab);
15545 if ((r_type == R_PPC64_PLTCALL
15546 || r_type == R_PPC64_PLTCALL_NOTOC)
15547 && stub_entry != NULL
15548 && stub_entry->stub_type >= ppc_stub_plt_call
15549 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15550 stub_entry = NULL;
15551
15552 if (stub_entry != NULL
15553 && ((stub_entry->stub_type >= ppc_stub_plt_call
15554 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15555 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15556 || stub_entry->stub_type == ppc_stub_plt_branch_both
15557 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15558 || stub_entry->stub_type == ppc_stub_long_branch_both))
15559 {
15560 bfd_boolean can_plt_call = FALSE;
15561
15562 if (stub_entry->stub_type == ppc_stub_plt_call
15563 && !htab->opd_abi
15564 && htab->params->plt_localentry0 != 0
15565 && is_elfv2_localentry0 (&h->elf))
15566 {
15567 /* The function doesn't use or change r2. */
15568 can_plt_call = TRUE;
15569 }
15570 else if (r_type == R_PPC64_REL24_NOTOC)
15571 {
15572 /* NOTOC calls don't need to restore r2. */
15573 can_plt_call = TRUE;
15574 }
15575
15576 /* All of these stubs may modify r2, so there must be a
15577 branch and link followed by a nop. The nop is
15578 replaced by an insn to restore r2. */
15579 else if (rel->r_offset + 8 <= input_section->size)
15580 {
15581 unsigned long br;
15582
15583 br = bfd_get_32 (input_bfd,
15584 contents + rel->r_offset);
15585 if ((br & 1) != 0)
15586 {
15587 unsigned long nop;
15588
15589 nop = bfd_get_32 (input_bfd,
15590 contents + rel->r_offset + 4);
15591 if (nop == LD_R2_0R1 + STK_TOC (htab))
15592 can_plt_call = TRUE;
15593 else if (nop == NOP
15594 || nop == CROR_151515
15595 || nop == CROR_313131)
15596 {
15597 if (h != NULL
15598 && is_tls_get_addr (&h->elf, htab)
15599 && htab->params->tls_get_addr_opt)
15600 {
15601 /* Special stub used, leave nop alone. */
15602 }
15603 else
15604 bfd_put_32 (input_bfd,
15605 LD_R2_0R1 + STK_TOC (htab),
15606 contents + rel->r_offset + 4);
15607 can_plt_call = TRUE;
15608 }
15609 }
15610 }
15611
15612 if (!can_plt_call && h != NULL)
15613 {
15614 const char *name = h->elf.root.root.string;
15615
15616 if (*name == '.')
15617 ++name;
15618
15619 if (strncmp (name, "__libc_start_main", 17) == 0
15620 && (name[17] == 0 || name[17] == '@'))
15621 {
15622 /* Allow crt1 branch to go via a toc adjusting
15623 stub. Other calls that never return could do
15624 the same, if we could detect such. */
15625 can_plt_call = TRUE;
15626 }
15627 }
15628
15629 if (!can_plt_call)
15630 {
15631 /* g++ as of 20130507 emits self-calls without a
15632 following nop. This is arguably wrong since we
15633 have conflicting information. On the one hand a
15634 global symbol and on the other a local call
15635 sequence, but don't error for this special case.
15636 It isn't possible to cheaply verify we have
15637 exactly such a call. Allow all calls to the same
15638 section. */
15639 asection *code_sec = sec;
15640
15641 if (get_opd_info (sec) != NULL)
15642 {
15643 bfd_vma off = (relocation + addend
15644 - sec->output_section->vma
15645 - sec->output_offset);
15646
15647 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
15648 }
15649 if (code_sec == input_section)
15650 can_plt_call = TRUE;
15651 }
15652
15653 if (!can_plt_call)
15654 {
15655 if (stub_entry->stub_type >= ppc_stub_plt_call
15656 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15657 info->callbacks->einfo
15658 /* xgettext:c-format */
15659 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15660 "(plt call stub)\n"),
15661 input_bfd, input_section, rel->r_offset, sym_name);
15662 else
15663 info->callbacks->einfo
15664 /* xgettext:c-format */
15665 (_("%H: call to `%pT' lacks nop, can't restore toc; "
15666 "(toc save/adjust stub)\n"),
15667 input_bfd, input_section, rel->r_offset, sym_name);
15668
15669 bfd_set_error (bfd_error_bad_value);
15670 ret = FALSE;
15671 }
15672
15673 if (can_plt_call
15674 && stub_entry->stub_type >= ppc_stub_plt_call
15675 && stub_entry->stub_type <= ppc_stub_plt_call_both)
15676 unresolved_reloc = FALSE;
15677 }
15678
15679 if ((stub_entry == NULL
15680 || stub_entry->stub_type == ppc_stub_long_branch
15681 || stub_entry->stub_type == ppc_stub_plt_branch)
15682 && get_opd_info (sec) != NULL)
15683 {
15684 /* The branch destination is the value of the opd entry. */
15685 bfd_vma off = (relocation + addend
15686 - sec->output_section->vma
15687 - sec->output_offset);
15688 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
15689 if (dest != (bfd_vma) -1)
15690 {
15691 relocation = dest;
15692 addend = 0;
15693 reloc_dest = DEST_OPD;
15694 }
15695 }
15696
15697 /* If the branch is out of reach we ought to have a long
15698 branch stub. */
15699 from = (rel->r_offset
15700 + input_section->output_offset
15701 + input_section->output_section->vma);
15702
15703 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15704 ? fdh->elf.other
15705 : sym->st_other);
15706
15707 if (stub_entry != NULL
15708 && (stub_entry->stub_type == ppc_stub_long_branch
15709 || stub_entry->stub_type == ppc_stub_plt_branch)
15710 && (r_type == R_PPC64_ADDR14_BRTAKEN
15711 || r_type == R_PPC64_ADDR14_BRNTAKEN
15712 || (relocation + addend - from + max_br_offset
15713 < 2 * max_br_offset)))
15714 /* Don't use the stub if this branch is in range. */
15715 stub_entry = NULL;
15716
15717 if (stub_entry != NULL
15718 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15719 || stub_entry->stub_type == ppc_stub_long_branch_both
15720 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15721 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15722 && (r_type != R_PPC64_REL24_NOTOC
15723 || ((fdh ? fdh->elf.other : sym->st_other)
15724 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
15725 && (relocation + addend - from + max_br_offset
15726 < 2 * max_br_offset))
15727 stub_entry = NULL;
15728
15729 if (stub_entry != NULL
15730 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15731 || stub_entry->stub_type == ppc_stub_long_branch_both
15732 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15733 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15734 && r_type == R_PPC64_REL24_NOTOC
15735 && (relocation + addend - from + max_br_offset
15736 < 2 * max_br_offset))
15737 stub_entry = NULL;
15738
15739 if (stub_entry != NULL)
15740 {
15741 /* Munge up the value and addend so that we call the stub
15742 rather than the procedure directly. */
15743 asection *stub_sec = stub_entry->group->stub_sec;
15744
15745 if (stub_entry->stub_type == ppc_stub_save_res)
15746 relocation += (stub_sec->output_offset
15747 + stub_sec->output_section->vma
15748 + stub_sec->size - htab->sfpr->size
15749 - htab->sfpr->output_offset
15750 - htab->sfpr->output_section->vma);
15751 else
15752 relocation = (stub_entry->stub_offset
15753 + stub_sec->output_offset
15754 + stub_sec->output_section->vma);
15755 addend = 0;
15756 reloc_dest = DEST_STUB;
15757
15758 if (((stub_entry->stub_type == ppc_stub_plt_call
15759 && ALWAYS_EMIT_R2SAVE)
15760 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15761 || stub_entry->stub_type == ppc_stub_plt_call_both)
15762 && !(h != NULL
15763 && is_tls_get_addr (&h->elf, htab)
15764 && htab->params->tls_get_addr_opt)
15765 && rel + 1 < relend
15766 && rel[1].r_offset == rel->r_offset + 4
15767 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15768 relocation += 4;
15769 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15770 || stub_entry->stub_type == ppc_stub_plt_branch_both
15771 || stub_entry->stub_type == ppc_stub_plt_call_both)
15772 && r_type == R_PPC64_REL24_NOTOC)
15773 relocation += 4;
15774
15775 if (r_type == R_PPC64_REL24_NOTOC
15776 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15777 || stub_entry->stub_type == ppc_stub_plt_call_both))
15778 htab->notoc_plt = 1;
15779 }
15780
15781 if (insn != 0)
15782 {
15783 if (is_isa_v2)
15784 {
15785 /* Set 'a' bit. This is 0b00010 in BO field for branch
15786 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15787 for branch on CTR insns (BO == 1a00t or 1a01t). */
15788 if ((insn & (0x14 << 21)) == (0x04 << 21))
15789 insn |= 0x02 << 21;
15790 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15791 insn |= 0x08 << 21;
15792 else
15793 break;
15794 }
15795 else
15796 {
15797 /* Invert 'y' bit if not the default. */
15798 if ((bfd_signed_vma) (relocation + addend - from) < 0)
15799 insn ^= 0x01 << 21;
15800 }
15801
15802 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15803 }
15804
15805 /* NOP out calls to undefined weak functions.
15806 We can thus call a weak function without first
15807 checking whether the function is defined. */
15808 else if (h != NULL
15809 && h->elf.root.type == bfd_link_hash_undefweak
15810 && h->elf.dynindx == -1
15811 && (r_type == R_PPC64_REL24
15812 || r_type == R_PPC64_REL24_NOTOC)
15813 && relocation == 0
15814 && addend == 0)
15815 {
15816 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
15817 goto copy_reloc;
15818 }
15819 break;
15820
15821 case R_PPC64_GOT16_DS:
15822 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15823 break;
15824 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15825 if (relocation + addend - from + 0x8000 < 0x10000
15826 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15827 {
15828 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15829 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15830 {
15831 insn += (14u << 26) - (58u << 26);
15832 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15833 r_type = R_PPC64_TOC16;
15834 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15835 }
15836 }
15837 break;
15838
15839 case R_PPC64_GOT16_LO_DS:
15840 case R_PPC64_GOT16_HA:
15841 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15842 break;
15843 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15844 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15845 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15846 {
15847 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15848 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
15849 {
15850 insn += (14u << 26) - (58u << 26);
15851 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15852 r_type = R_PPC64_TOC16_LO;
15853 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15854 }
15855 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
15856 {
15857 r_type = R_PPC64_TOC16_HA;
15858 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15859 }
15860 }
15861 break;
15862
15863 case R_PPC64_GOT_PCREL34:
15864 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15865 break;
15866 from = (rel->r_offset
15867 + input_section->output_section->vma
15868 + input_section->output_offset);
15869 if (relocation - from + (1ULL << 33) < 1ULL << 34
15870 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15871 {
15872 offset = rel->r_offset;
15873 pinsn = bfd_get_32 (input_bfd, contents + offset);
15874 pinsn <<= 32;
15875 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15876 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15877 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15878 {
15879 /* Replace with paddi. */
15880 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15881 r_type = R_PPC64_PCREL34;
15882 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15883 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15884 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15885 goto pcrelopt;
15886 }
15887 }
15888 break;
15889
15890 case R_PPC64_PCREL34:
15891 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15892 {
15893 offset = rel->r_offset;
15894 pinsn = bfd_get_32 (input_bfd, contents + offset);
15895 pinsn <<= 32;
15896 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15897 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15898 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15899 | (14ULL << 26) /* paddi */))
15900 {
15901 pcrelopt:
15902 if (rel + 1 < relend
15903 && rel[1].r_offset == offset
15904 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15905 {
15906 bfd_vma off2 = rel[1].r_addend;
15907 if (off2 == 0)
15908 /* zero means next insn. */
15909 off2 = 8;
15910 off2 += offset;
15911 if (off2 + 4 <= input_section->size)
15912 {
15913 uint64_t pinsn2;
15914 bfd_signed_vma addend_off;
15915 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15916 pinsn2 <<= 32;
15917 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15918 {
15919 if (off2 + 8 > input_section->size)
15920 break;
15921 pinsn2 |= bfd_get_32 (input_bfd,
15922 contents + off2 + 4);
15923 }
15924 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
15925 {
15926 addend += addend_off;
15927 rel->r_addend = addend;
15928 bfd_put_32 (input_bfd, pinsn >> 32,
15929 contents + offset);
15930 bfd_put_32 (input_bfd, pinsn,
15931 contents + offset + 4);
15932 bfd_put_32 (input_bfd, pinsn2 >> 32,
15933 contents + off2);
15934 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15935 bfd_put_32 (input_bfd, pinsn2,
15936 contents + off2 + 4);
15937 }
15938 }
15939 }
15940 }
15941 }
15942 break;
15943 }
15944
15945 tls_type = 0;
15946 save_unresolved_reloc = unresolved_reloc;
15947 switch (r_type)
15948 {
15949 default:
15950 /* xgettext:c-format */
15951 _bfd_error_handler (_("%pB: %s unsupported"),
15952 input_bfd, ppc64_elf_howto_table[r_type]->name);
15953
15954 bfd_set_error (bfd_error_bad_value);
15955 ret = FALSE;
15956 goto copy_reloc;
15957
15958 case R_PPC64_NONE:
15959 case R_PPC64_TLS:
15960 case R_PPC64_TLSGD:
15961 case R_PPC64_TLSLD:
15962 case R_PPC64_TOCSAVE:
15963 case R_PPC64_GNU_VTINHERIT:
15964 case R_PPC64_GNU_VTENTRY:
15965 case R_PPC64_ENTRY:
15966 case R_PPC64_PCREL_OPT:
15967 goto copy_reloc;
15968
15969 /* GOT16 relocations. Like an ADDR16 using the symbol's
15970 address in the GOT as relocation value instead of the
15971 symbol's value itself. Also, create a GOT entry for the
15972 symbol and put the symbol value there. */
15973 case R_PPC64_GOT_TLSGD16:
15974 case R_PPC64_GOT_TLSGD16_LO:
15975 case R_PPC64_GOT_TLSGD16_HI:
15976 case R_PPC64_GOT_TLSGD16_HA:
15977 case R_PPC64_GOT_TLSGD34:
15978 tls_type = TLS_TLS | TLS_GD;
15979 goto dogot;
15980
15981 case R_PPC64_GOT_TLSLD16:
15982 case R_PPC64_GOT_TLSLD16_LO:
15983 case R_PPC64_GOT_TLSLD16_HI:
15984 case R_PPC64_GOT_TLSLD16_HA:
15985 case R_PPC64_GOT_TLSLD34:
15986 tls_type = TLS_TLS | TLS_LD;
15987 goto dogot;
15988
15989 case R_PPC64_GOT_TPREL16_DS:
15990 case R_PPC64_GOT_TPREL16_LO_DS:
15991 case R_PPC64_GOT_TPREL16_HI:
15992 case R_PPC64_GOT_TPREL16_HA:
15993 case R_PPC64_GOT_TPREL34:
15994 tls_type = TLS_TLS | TLS_TPREL;
15995 goto dogot;
15996
15997 case R_PPC64_GOT_DTPREL16_DS:
15998 case R_PPC64_GOT_DTPREL16_LO_DS:
15999 case R_PPC64_GOT_DTPREL16_HI:
16000 case R_PPC64_GOT_DTPREL16_HA:
16001 case R_PPC64_GOT_DTPREL34:
16002 tls_type = TLS_TLS | TLS_DTPREL;
16003 goto dogot;
16004
16005 case R_PPC64_GOT16:
16006 case R_PPC64_GOT16_LO:
16007 case R_PPC64_GOT16_HI:
16008 case R_PPC64_GOT16_HA:
16009 case R_PPC64_GOT16_DS:
16010 case R_PPC64_GOT16_LO_DS:
16011 case R_PPC64_GOT_PCREL34:
16012 dogot:
16013 {
16014 /* Relocation is to the entry for this symbol in the global
16015 offset table. */
16016 asection *got;
16017 bfd_vma *offp;
16018 bfd_vma off;
16019 unsigned long indx = 0;
16020 struct got_entry *ent;
16021
16022 if (tls_type == (TLS_TLS | TLS_LD)
16023 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
16024 ent = ppc64_tlsld_got (input_bfd);
16025 else
16026 {
16027 if (h != NULL)
16028 {
16029 if (!htab->elf.dynamic_sections_created
16030 || h->elf.dynindx == -1
16031 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16032 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16033 /* This is actually a static link, or it is a
16034 -Bsymbolic link and the symbol is defined
16035 locally, or the symbol was forced to be local
16036 because of a version file. */
16037 ;
16038 else
16039 {
16040 indx = h->elf.dynindx;
16041 unresolved_reloc = FALSE;
16042 }
16043 ent = h->elf.got.glist;
16044 }
16045 else
16046 {
16047 if (local_got_ents == NULL)
16048 abort ();
16049 ent = local_got_ents[r_symndx];
16050 }
16051
16052 for (; ent != NULL; ent = ent->next)
16053 if (ent->addend == orig_rel.r_addend
16054 && ent->owner == input_bfd
16055 && ent->tls_type == tls_type)
16056 break;
16057 }
16058
16059 if (ent == NULL)
16060 abort ();
16061 if (ent->is_indirect)
16062 ent = ent->got.ent;
16063 offp = &ent->got.offset;
16064 got = ppc64_elf_tdata (ent->owner)->got;
16065 if (got == NULL)
16066 abort ();
16067
16068 /* The offset must always be a multiple of 8. We use the
16069 least significant bit to record whether we have already
16070 processed this entry. */
16071 off = *offp;
16072 if ((off & 1) != 0)
16073 off &= ~1;
16074 else
16075 {
16076 /* Generate relocs for the dynamic linker, except in
16077 the case of TLSLD where we'll use one entry per
16078 module. */
16079 asection *relgot;
16080 bfd_boolean ifunc;
16081
16082 *offp = off | 1;
16083 relgot = NULL;
16084 ifunc = (h != NULL
16085 ? h->elf.type == STT_GNU_IFUNC
16086 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
16087 if (ifunc)
16088 {
16089 relgot = htab->elf.irelplt;
16090 if (indx == 0)
16091 htab->local_ifunc_resolver = 1;
16092 else if (is_static_defined (&h->elf))
16093 htab->maybe_local_ifunc_resolver = 1;
16094 }
16095 else if (indx != 0
16096 || (bfd_link_pic (info)
16097 && (h == NULL
16098 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16099 && !(tls_type != 0
16100 && bfd_link_executable (info)
16101 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
16102 relgot = ppc64_elf_tdata (ent->owner)->relgot;
16103 if (relgot != NULL)
16104 {
16105 outrel.r_offset = (got->output_section->vma
16106 + got->output_offset
16107 + off);
16108 outrel.r_addend = orig_rel.r_addend;
16109 if (tls_type & (TLS_LD | TLS_GD))
16110 {
16111 outrel.r_addend = 0;
16112 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
16113 if (tls_type == (TLS_TLS | TLS_GD))
16114 {
16115 loc = relgot->contents;
16116 loc += (relgot->reloc_count++
16117 * sizeof (Elf64_External_Rela));
16118 bfd_elf64_swap_reloca_out (output_bfd,
16119 &outrel, loc);
16120 outrel.r_offset += 8;
16121 outrel.r_addend = orig_rel.r_addend;
16122 outrel.r_info
16123 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16124 }
16125 }
16126 else if (tls_type == (TLS_TLS | TLS_DTPREL))
16127 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
16128 else if (tls_type == (TLS_TLS | TLS_TPREL))
16129 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
16130 else if (indx != 0)
16131 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16132 else
16133 {
16134 if (ifunc)
16135 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16136 else
16137 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16138
16139 /* Write the .got section contents for the sake
16140 of prelink. */
16141 loc = got->contents + off;
16142 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16143 loc);
16144 }
16145
16146 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
16147 {
16148 outrel.r_addend += relocation;
16149 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
16150 {
16151 if (htab->elf.tls_sec == NULL)
16152 outrel.r_addend = 0;
16153 else
16154 outrel.r_addend -= htab->elf.tls_sec->vma;
16155 }
16156 }
16157 loc = relgot->contents;
16158 loc += (relgot->reloc_count++
16159 * sizeof (Elf64_External_Rela));
16160 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16161 }
16162
16163 /* Init the .got section contents here if we're not
16164 emitting a reloc. */
16165 else
16166 {
16167 relocation += orig_rel.r_addend;
16168 if (tls_type != 0)
16169 {
16170 if (htab->elf.tls_sec == NULL)
16171 relocation = 0;
16172 else
16173 {
16174 if (tls_type & TLS_LD)
16175 relocation = 0;
16176 else
16177 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
16178 if (tls_type & TLS_TPREL)
16179 relocation += DTP_OFFSET - TP_OFFSET;
16180 }
16181
16182 if (tls_type & (TLS_GD | TLS_LD))
16183 {
16184 bfd_put_64 (output_bfd, relocation,
16185 got->contents + off + 8);
16186 relocation = 1;
16187 }
16188 }
16189 bfd_put_64 (output_bfd, relocation,
16190 got->contents + off);
16191 }
16192 }
16193
16194 if (off >= (bfd_vma) -2)
16195 abort ();
16196
16197 relocation = got->output_section->vma + got->output_offset + off;
16198 addend = 0;
16199 if (!(r_type == R_PPC64_GOT_PCREL34
16200 || r_type == R_PPC64_GOT_TLSGD34
16201 || r_type == R_PPC64_GOT_TLSLD34
16202 || r_type == R_PPC64_GOT_TPREL34
16203 || r_type == R_PPC64_GOT_DTPREL34))
16204 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
16205 }
16206 break;
16207
16208 case R_PPC64_PLT16_HA:
16209 case R_PPC64_PLT16_HI:
16210 case R_PPC64_PLT16_LO:
16211 case R_PPC64_PLT16_LO_DS:
16212 case R_PPC64_PLT_PCREL34:
16213 case R_PPC64_PLT_PCREL34_NOTOC:
16214 case R_PPC64_PLT32:
16215 case R_PPC64_PLT64:
16216 case R_PPC64_PLTSEQ:
16217 case R_PPC64_PLTSEQ_NOTOC:
16218 case R_PPC64_PLTCALL:
16219 case R_PPC64_PLTCALL_NOTOC:
16220 /* Relocation is to the entry for this symbol in the
16221 procedure linkage table. */
16222 unresolved_reloc = TRUE;
16223 {
16224 struct plt_entry **plt_list = NULL;
16225 if (h != NULL)
16226 plt_list = &h->elf.plt.plist;
16227 else if (local_got_ents != NULL)
16228 {
16229 struct plt_entry **local_plt = (struct plt_entry **)
16230 (local_got_ents + symtab_hdr->sh_info);
16231 plt_list = local_plt + r_symndx;
16232 }
16233 if (plt_list)
16234 {
16235 struct plt_entry *ent;
16236
16237 for (ent = *plt_list; ent != NULL; ent = ent->next)
16238 if (ent->plt.offset != (bfd_vma) -1
16239 && ent->addend == orig_rel.r_addend)
16240 {
16241 asection *plt;
16242 bfd_vma got;
16243
16244 plt = htab->elf.splt;
16245 if (!htab->elf.dynamic_sections_created
16246 || h == NULL
16247 || h->elf.dynindx == -1)
16248 {
16249 if (h != NULL
16250 ? h->elf.type == STT_GNU_IFUNC
16251 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16252 plt = htab->elf.iplt;
16253 else
16254 plt = htab->pltlocal;
16255 }
16256 relocation = (plt->output_section->vma
16257 + plt->output_offset
16258 + ent->plt.offset);
16259 if (r_type == R_PPC64_PLT16_HA
16260 || r_type == R_PPC64_PLT16_HI
16261 || r_type == R_PPC64_PLT16_LO
16262 || r_type == R_PPC64_PLT16_LO_DS)
16263 {
16264 got = (elf_gp (output_bfd)
16265 + htab->sec_info[input_section->id].toc_off);
16266 relocation -= got;
16267 }
16268 addend = 0;
16269 unresolved_reloc = FALSE;
16270 break;
16271 }
16272 }
16273 }
16274 break;
16275
16276 case R_PPC64_TOC:
16277 /* Relocation value is TOC base. */
16278 relocation = TOCstart;
16279 if (r_symndx == STN_UNDEF)
16280 relocation += htab->sec_info[input_section->id].toc_off;
16281 else if (unresolved_reloc)
16282 ;
16283 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16284 relocation += htab->sec_info[sec->id].toc_off;
16285 else
16286 unresolved_reloc = TRUE;
16287 goto dodyn;
16288
16289 /* TOC16 relocs. We want the offset relative to the TOC base,
16290 which is the address of the start of the TOC plus 0x8000.
16291 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16292 in this order. */
16293 case R_PPC64_TOC16:
16294 case R_PPC64_TOC16_LO:
16295 case R_PPC64_TOC16_HI:
16296 case R_PPC64_TOC16_DS:
16297 case R_PPC64_TOC16_LO_DS:
16298 case R_PPC64_TOC16_HA:
16299 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
16300 if (h != NULL)
16301 goto dodyn;
16302 break;
16303
16304 /* Relocate against the beginning of the section. */
16305 case R_PPC64_SECTOFF:
16306 case R_PPC64_SECTOFF_LO:
16307 case R_PPC64_SECTOFF_HI:
16308 case R_PPC64_SECTOFF_DS:
16309 case R_PPC64_SECTOFF_LO_DS:
16310 case R_PPC64_SECTOFF_HA:
16311 if (sec != NULL)
16312 addend -= sec->output_section->vma;
16313 break;
16314
16315 case R_PPC64_REL16:
16316 case R_PPC64_REL16_LO:
16317 case R_PPC64_REL16_HI:
16318 case R_PPC64_REL16_HA:
16319 case R_PPC64_REL16_HIGH:
16320 case R_PPC64_REL16_HIGHA:
16321 case R_PPC64_REL16_HIGHER:
16322 case R_PPC64_REL16_HIGHERA:
16323 case R_PPC64_REL16_HIGHEST:
16324 case R_PPC64_REL16_HIGHESTA:
16325 case R_PPC64_REL16_HIGHER34:
16326 case R_PPC64_REL16_HIGHERA34:
16327 case R_PPC64_REL16_HIGHEST34:
16328 case R_PPC64_REL16_HIGHESTA34:
16329 case R_PPC64_REL16DX_HA:
16330 case R_PPC64_REL14:
16331 case R_PPC64_REL14_BRNTAKEN:
16332 case R_PPC64_REL14_BRTAKEN:
16333 case R_PPC64_REL24:
16334 case R_PPC64_REL24_NOTOC:
16335 case R_PPC64_PCREL34:
16336 case R_PPC64_PCREL28:
16337 break;
16338
16339 case R_PPC64_TPREL16:
16340 case R_PPC64_TPREL16_LO:
16341 case R_PPC64_TPREL16_HI:
16342 case R_PPC64_TPREL16_HA:
16343 case R_PPC64_TPREL16_DS:
16344 case R_PPC64_TPREL16_LO_DS:
16345 case R_PPC64_TPREL16_HIGH:
16346 case R_PPC64_TPREL16_HIGHA:
16347 case R_PPC64_TPREL16_HIGHER:
16348 case R_PPC64_TPREL16_HIGHERA:
16349 case R_PPC64_TPREL16_HIGHEST:
16350 case R_PPC64_TPREL16_HIGHESTA:
16351 case R_PPC64_TPREL34:
16352 if (h != NULL
16353 && h->elf.root.type == bfd_link_hash_undefweak
16354 && h->elf.dynindx == -1)
16355 {
16356 /* Make this relocation against an undefined weak symbol
16357 resolve to zero. This is really just a tweak, since
16358 code using weak externs ought to check that they are
16359 defined before using them. */
16360 bfd_byte *p = contents + rel->r_offset - d_offset;
16361
16362 insn = bfd_get_32 (input_bfd, p);
16363 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16364 if (insn != 0)
16365 bfd_put_32 (input_bfd, insn, p);
16366 break;
16367 }
16368 if (htab->elf.tls_sec != NULL)
16369 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16370 /* The TPREL16 relocs shouldn't really be used in shared
16371 libs or with non-local symbols as that will result in
16372 DT_TEXTREL being set, but support them anyway. */
16373 goto dodyn;
16374
16375 case R_PPC64_DTPREL16:
16376 case R_PPC64_DTPREL16_LO:
16377 case R_PPC64_DTPREL16_HI:
16378 case R_PPC64_DTPREL16_HA:
16379 case R_PPC64_DTPREL16_DS:
16380 case R_PPC64_DTPREL16_LO_DS:
16381 case R_PPC64_DTPREL16_HIGH:
16382 case R_PPC64_DTPREL16_HIGHA:
16383 case R_PPC64_DTPREL16_HIGHER:
16384 case R_PPC64_DTPREL16_HIGHERA:
16385 case R_PPC64_DTPREL16_HIGHEST:
16386 case R_PPC64_DTPREL16_HIGHESTA:
16387 case R_PPC64_DTPREL34:
16388 if (htab->elf.tls_sec != NULL)
16389 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16390 break;
16391
16392 case R_PPC64_ADDR64_LOCAL:
16393 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16394 ? h->elf.other
16395 : sym->st_other);
16396 break;
16397
16398 case R_PPC64_DTPMOD64:
16399 relocation = 1;
16400 addend = 0;
16401 goto dodyn;
16402
16403 case R_PPC64_TPREL64:
16404 if (htab->elf.tls_sec != NULL)
16405 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
16406 goto dodyn;
16407
16408 case R_PPC64_DTPREL64:
16409 if (htab->elf.tls_sec != NULL)
16410 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
16411 /* Fall through. */
16412
16413 /* Relocations that may need to be propagated if this is a
16414 dynamic object. */
16415 case R_PPC64_REL30:
16416 case R_PPC64_REL32:
16417 case R_PPC64_REL64:
16418 case R_PPC64_ADDR14:
16419 case R_PPC64_ADDR14_BRNTAKEN:
16420 case R_PPC64_ADDR14_BRTAKEN:
16421 case R_PPC64_ADDR16:
16422 case R_PPC64_ADDR16_DS:
16423 case R_PPC64_ADDR16_HA:
16424 case R_PPC64_ADDR16_HI:
16425 case R_PPC64_ADDR16_HIGH:
16426 case R_PPC64_ADDR16_HIGHA:
16427 case R_PPC64_ADDR16_HIGHER:
16428 case R_PPC64_ADDR16_HIGHERA:
16429 case R_PPC64_ADDR16_HIGHEST:
16430 case R_PPC64_ADDR16_HIGHESTA:
16431 case R_PPC64_ADDR16_LO:
16432 case R_PPC64_ADDR16_LO_DS:
16433 case R_PPC64_ADDR16_HIGHER34:
16434 case R_PPC64_ADDR16_HIGHERA34:
16435 case R_PPC64_ADDR16_HIGHEST34:
16436 case R_PPC64_ADDR16_HIGHESTA34:
16437 case R_PPC64_ADDR24:
16438 case R_PPC64_ADDR32:
16439 case R_PPC64_ADDR64:
16440 case R_PPC64_UADDR16:
16441 case R_PPC64_UADDR32:
16442 case R_PPC64_UADDR64:
16443 case R_PPC64_D34:
16444 case R_PPC64_D34_LO:
16445 case R_PPC64_D34_HI30:
16446 case R_PPC64_D34_HA30:
16447 case R_PPC64_D28:
16448 dodyn:
16449 if ((input_section->flags & SEC_ALLOC) == 0)
16450 break;
16451
16452 if (NO_OPD_RELOCS && is_opd)
16453 break;
16454
16455 if (bfd_link_pic (info)
16456 ? ((h == NULL
16457 || h->elf.dyn_relocs != NULL)
16458 && ((h != NULL && pc_dynrelocs (h))
16459 || must_be_dyn_reloc (info, r_type)))
16460 : (h != NULL
16461 ? h->elf.dyn_relocs != NULL
16462 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16463 {
16464 bfd_boolean skip, relocate;
16465 asection *sreloc;
16466 bfd_vma out_off;
16467 long indx = 0;
16468
16469 /* When generating a dynamic object, these relocations
16470 are copied into the output file to be resolved at run
16471 time. */
16472
16473 skip = FALSE;
16474 relocate = FALSE;
16475
16476 out_off = _bfd_elf_section_offset (output_bfd, info,
16477 input_section, rel->r_offset);
16478 if (out_off == (bfd_vma) -1)
16479 skip = TRUE;
16480 else if (out_off == (bfd_vma) -2)
16481 skip = TRUE, relocate = TRUE;
16482 out_off += (input_section->output_section->vma
16483 + input_section->output_offset);
16484 outrel.r_offset = out_off;
16485 outrel.r_addend = rel->r_addend;
16486
16487 /* Optimize unaligned reloc use. */
16488 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16489 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16490 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16491 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16492 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16493 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16494 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16495 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16496 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16497
16498 if (skip)
16499 memset (&outrel, 0, sizeof outrel);
16500 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
16501 && !is_opd
16502 && r_type != R_PPC64_TOC)
16503 {
16504 indx = h->elf.dynindx;
16505 BFD_ASSERT (indx != -1);
16506 outrel.r_info = ELF64_R_INFO (indx, r_type);
16507 }
16508 else
16509 {
16510 /* This symbol is local, or marked to become local,
16511 or this is an opd section reloc which must point
16512 at a local function. */
16513 outrel.r_addend += relocation;
16514 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
16515 {
16516 if (is_opd && h != NULL)
16517 {
16518 /* Lie about opd entries. This case occurs
16519 when building shared libraries and we
16520 reference a function in another shared
16521 lib. The same thing happens for a weak
16522 definition in an application that's
16523 overridden by a strong definition in a
16524 shared lib. (I believe this is a generic
16525 bug in binutils handling of weak syms.)
16526 In these cases we won't use the opd
16527 entry in this lib. */
16528 unresolved_reloc = FALSE;
16529 }
16530 if (!is_opd
16531 && r_type == R_PPC64_ADDR64
16532 && (h != NULL
16533 ? h->elf.type == STT_GNU_IFUNC
16534 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16535 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16536 else
16537 {
16538 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
16539
16540 /* We need to relocate .opd contents for ld.so.
16541 Prelink also wants simple and consistent rules
16542 for relocs. This make all RELATIVE relocs have
16543 *r_offset equal to r_addend. */
16544 relocate = TRUE;
16545 }
16546 }
16547 else
16548 {
16549 if (h != NULL
16550 ? h->elf.type == STT_GNU_IFUNC
16551 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16552 {
16553 info->callbacks->einfo
16554 /* xgettext:c-format */
16555 (_("%H: %s for indirect "
16556 "function `%pT' unsupported\n"),
16557 input_bfd, input_section, rel->r_offset,
16558 ppc64_elf_howto_table[r_type]->name,
16559 sym_name);
16560 ret = FALSE;
16561 }
16562 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
16563 ;
16564 else if (sec == NULL || sec->owner == NULL)
16565 {
16566 bfd_set_error (bfd_error_bad_value);
16567 return FALSE;
16568 }
16569 else
16570 {
16571 asection *osec = sec->output_section;
16572
16573 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16574 {
16575 /* TLS symbol values are relative to the
16576 TLS segment. Dynamic relocations for
16577 local TLS symbols therefore can't be
16578 reduced to a relocation against their
16579 section symbol because it holds the
16580 address of the section, not a value
16581 relative to the TLS segment. We could
16582 change the .tdata dynamic section symbol
16583 to be zero value but STN_UNDEF works
16584 and is used elsewhere, eg. for TPREL64
16585 GOT relocs against local TLS symbols. */
16586 osec = htab->elf.tls_sec;
16587 indx = 0;
16588 }
16589 else
16590 {
16591 indx = elf_section_data (osec)->dynindx;
16592 if (indx == 0)
16593 {
16594 if ((osec->flags & SEC_READONLY) == 0
16595 && htab->elf.data_index_section != NULL)
16596 osec = htab->elf.data_index_section;
16597 else
16598 osec = htab->elf.text_index_section;
16599 indx = elf_section_data (osec)->dynindx;
16600 }
16601 BFD_ASSERT (indx != 0);
16602 }
16603
16604 /* We are turning this relocation into one
16605 against a section symbol, so subtract out
16606 the output section's address but not the
16607 offset of the input section in the output
16608 section. */
16609 outrel.r_addend -= osec->vma;
16610 }
16611
16612 outrel.r_info = ELF64_R_INFO (indx, r_type);
16613 }
16614 }
16615
16616 sreloc = elf_section_data (input_section)->sreloc;
16617 if (h != NULL
16618 ? h->elf.type == STT_GNU_IFUNC
16619 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16620 {
16621 sreloc = htab->elf.irelplt;
16622 if (indx == 0)
16623 htab->local_ifunc_resolver = 1;
16624 else if (is_static_defined (&h->elf))
16625 htab->maybe_local_ifunc_resolver = 1;
16626 }
16627 if (sreloc == NULL)
16628 abort ();
16629
16630 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16631 >= sreloc->size)
16632 abort ();
16633 loc = sreloc->contents;
16634 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
16635 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16636
16637 if (!warned_dynamic
16638 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16639 {
16640 info->callbacks->einfo
16641 /* xgettext:c-format */
16642 (_("%X%P: %pB: %s against %pT "
16643 "is not supported by glibc as a dynamic relocation\n"),
16644 input_bfd,
16645 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16646 sym_name);
16647 warned_dynamic = TRUE;
16648 }
16649
16650 /* If this reloc is against an external symbol, it will
16651 be computed at runtime, so there's no need to do
16652 anything now. However, for the sake of prelink ensure
16653 that the section contents are a known value. */
16654 if (!relocate)
16655 {
16656 unresolved_reloc = FALSE;
16657 /* The value chosen here is quite arbitrary as ld.so
16658 ignores section contents except for the special
16659 case of .opd where the contents might be accessed
16660 before relocation. Choose zero, as that won't
16661 cause reloc overflow. */
16662 relocation = 0;
16663 addend = 0;
16664 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16665 to improve backward compatibility with older
16666 versions of ld. */
16667 if (r_type == R_PPC64_ADDR64)
16668 addend = outrel.r_addend;
16669 /* Adjust pc_relative relocs to have zero in *r_offset. */
16670 else if (ppc64_elf_howto_table[r_type]->pc_relative)
16671 addend = outrel.r_offset;
16672 }
16673 }
16674 break;
16675
16676 case R_PPC64_COPY:
16677 case R_PPC64_GLOB_DAT:
16678 case R_PPC64_JMP_SLOT:
16679 case R_PPC64_JMP_IREL:
16680 case R_PPC64_RELATIVE:
16681 /* We shouldn't ever see these dynamic relocs in relocatable
16682 files. */
16683 /* Fall through. */
16684
16685 case R_PPC64_PLTGOT16:
16686 case R_PPC64_PLTGOT16_DS:
16687 case R_PPC64_PLTGOT16_HA:
16688 case R_PPC64_PLTGOT16_HI:
16689 case R_PPC64_PLTGOT16_LO:
16690 case R_PPC64_PLTGOT16_LO_DS:
16691 case R_PPC64_PLTREL32:
16692 case R_PPC64_PLTREL64:
16693 /* These ones haven't been implemented yet. */
16694
16695 info->callbacks->einfo
16696 /* xgettext:c-format */
16697 (_("%P: %pB: %s is not supported for `%pT'\n"),
16698 input_bfd,
16699 ppc64_elf_howto_table[r_type]->name, sym_name);
16700
16701 bfd_set_error (bfd_error_invalid_operation);
16702 ret = FALSE;
16703 goto copy_reloc;
16704 }
16705
16706 /* Multi-instruction sequences that access the TOC can be
16707 optimized, eg. addis ra,r2,0; addi rb,ra,x;
16708 to nop; addi rb,r2,x; */
16709 switch (r_type)
16710 {
16711 default:
16712 break;
16713
16714 case R_PPC64_GOT_TLSLD16_HI:
16715 case R_PPC64_GOT_TLSGD16_HI:
16716 case R_PPC64_GOT_TPREL16_HI:
16717 case R_PPC64_GOT_DTPREL16_HI:
16718 case R_PPC64_GOT16_HI:
16719 case R_PPC64_TOC16_HI:
16720 /* These relocs would only be useful if building up an
16721 offset to later add to r2, perhaps in an indexed
16722 addressing mode instruction. Don't try to optimize.
16723 Unfortunately, the possibility of someone building up an
16724 offset like this or even with the HA relocs, means that
16725 we need to check the high insn when optimizing the low
16726 insn. */
16727 break;
16728
16729 case R_PPC64_PLTCALL_NOTOC:
16730 if (!unresolved_reloc)
16731 htab->notoc_plt = 1;
16732 /* Fall through. */
16733 case R_PPC64_PLTCALL:
16734 if (unresolved_reloc)
16735 {
16736 /* No plt entry. Make this into a direct call. */
16737 bfd_byte *p = contents + rel->r_offset;
16738 insn = bfd_get_32 (input_bfd, p);
16739 insn &= 1;
16740 bfd_put_32 (input_bfd, B_DOT | insn, p);
16741 if (r_type == R_PPC64_PLTCALL)
16742 bfd_put_32 (input_bfd, NOP, p + 4);
16743 unresolved_reloc = save_unresolved_reloc;
16744 r_type = R_PPC64_REL24;
16745 }
16746 break;
16747
16748 case R_PPC64_PLTSEQ_NOTOC:
16749 case R_PPC64_PLTSEQ:
16750 if (unresolved_reloc)
16751 {
16752 unresolved_reloc = FALSE;
16753 goto nop_it;
16754 }
16755 break;
16756
16757 case R_PPC64_PLT_PCREL34_NOTOC:
16758 if (!unresolved_reloc)
16759 htab->notoc_plt = 1;
16760 /* Fall through. */
16761 case R_PPC64_PLT_PCREL34:
16762 if (unresolved_reloc)
16763 {
16764 bfd_byte *p = contents + rel->r_offset;
16765 bfd_put_32 (input_bfd, PNOP >> 32, p);
16766 bfd_put_32 (input_bfd, PNOP, p + 4);
16767 unresolved_reloc = FALSE;
16768 goto copy_reloc;
16769 }
16770 break;
16771
16772 case R_PPC64_PLT16_HA:
16773 if (unresolved_reloc)
16774 {
16775 unresolved_reloc = FALSE;
16776 goto nop_it;
16777 }
16778 /* Fall through. */
16779 case R_PPC64_GOT_TLSLD16_HA:
16780 case R_PPC64_GOT_TLSGD16_HA:
16781 case R_PPC64_GOT_TPREL16_HA:
16782 case R_PPC64_GOT_DTPREL16_HA:
16783 case R_PPC64_GOT16_HA:
16784 case R_PPC64_TOC16_HA:
16785 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16786 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16787 {
16788 bfd_byte *p;
16789 nop_it:
16790 p = contents + (rel->r_offset & ~3);
16791 bfd_put_32 (input_bfd, NOP, p);
16792 goto copy_reloc;
16793 }
16794 break;
16795
16796 case R_PPC64_PLT16_LO:
16797 case R_PPC64_PLT16_LO_DS:
16798 if (unresolved_reloc)
16799 {
16800 unresolved_reloc = FALSE;
16801 goto nop_it;
16802 }
16803 /* Fall through. */
16804 case R_PPC64_GOT_TLSLD16_LO:
16805 case R_PPC64_GOT_TLSGD16_LO:
16806 case R_PPC64_GOT_TPREL16_LO_DS:
16807 case R_PPC64_GOT_DTPREL16_LO_DS:
16808 case R_PPC64_GOT16_LO:
16809 case R_PPC64_GOT16_LO_DS:
16810 case R_PPC64_TOC16_LO:
16811 case R_PPC64_TOC16_LO_DS:
16812 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
16813 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
16814 {
16815 bfd_byte *p = contents + (rel->r_offset & ~3);
16816 insn = bfd_get_32 (input_bfd, p);
16817 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
16818 {
16819 /* Transform addic to addi when we change reg. */
16820 insn &= ~((0x3fu << 26) | (0x1f << 16));
16821 insn |= (14u << 26) | (2 << 16);
16822 }
16823 else
16824 {
16825 insn &= ~(0x1f << 16);
16826 insn |= 2 << 16;
16827 }
16828 bfd_put_32 (input_bfd, insn, p);
16829 }
16830 break;
16831
16832 case R_PPC64_TPREL16_HA:
16833 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16834 {
16835 bfd_byte *p = contents + (rel->r_offset & ~3);
16836 insn = bfd_get_32 (input_bfd, p);
16837 if ((insn & ((0x3fu << 26) | 0x1f << 16))
16838 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16839 /* xgettext:c-format */
16840 info->callbacks->minfo
16841 (_("%H: warning: %s unexpected insn %#x.\n"),
16842 input_bfd, input_section, rel->r_offset,
16843 ppc64_elf_howto_table[r_type]->name, insn);
16844 else
16845 {
16846 bfd_put_32 (input_bfd, NOP, p);
16847 goto copy_reloc;
16848 }
16849 }
16850 break;
16851
16852 case R_PPC64_TPREL16_LO:
16853 case R_PPC64_TPREL16_LO_DS:
16854 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16855 {
16856 bfd_byte *p = contents + (rel->r_offset & ~3);
16857 insn = bfd_get_32 (input_bfd, p);
16858 insn &= ~(0x1f << 16);
16859 insn |= 13 << 16;
16860 bfd_put_32 (input_bfd, insn, p);
16861 }
16862 break;
16863 }
16864
16865 /* Do any further special processing. */
16866 switch (r_type)
16867 {
16868 default:
16869 break;
16870
16871 case R_PPC64_REL16_HA:
16872 case R_PPC64_REL16_HIGHA:
16873 case R_PPC64_REL16_HIGHERA:
16874 case R_PPC64_REL16_HIGHESTA:
16875 case R_PPC64_REL16DX_HA:
16876 case R_PPC64_ADDR16_HA:
16877 case R_PPC64_ADDR16_HIGHA:
16878 case R_PPC64_ADDR16_HIGHERA:
16879 case R_PPC64_ADDR16_HIGHESTA:
16880 case R_PPC64_TOC16_HA:
16881 case R_PPC64_SECTOFF_HA:
16882 case R_PPC64_TPREL16_HA:
16883 case R_PPC64_TPREL16_HIGHA:
16884 case R_PPC64_TPREL16_HIGHERA:
16885 case R_PPC64_TPREL16_HIGHESTA:
16886 case R_PPC64_DTPREL16_HA:
16887 case R_PPC64_DTPREL16_HIGHA:
16888 case R_PPC64_DTPREL16_HIGHERA:
16889 case R_PPC64_DTPREL16_HIGHESTA:
16890 /* It's just possible that this symbol is a weak symbol
16891 that's not actually defined anywhere. In that case,
16892 'sec' would be NULL, and we should leave the symbol
16893 alone (it will be set to zero elsewhere in the link). */
16894 if (sec == NULL)
16895 break;
16896 /* Fall through. */
16897
16898 case R_PPC64_GOT16_HA:
16899 case R_PPC64_PLTGOT16_HA:
16900 case R_PPC64_PLT16_HA:
16901 case R_PPC64_GOT_TLSGD16_HA:
16902 case R_PPC64_GOT_TLSLD16_HA:
16903 case R_PPC64_GOT_TPREL16_HA:
16904 case R_PPC64_GOT_DTPREL16_HA:
16905 /* Add 0x10000 if sign bit in 0:15 is set.
16906 Bits 0:15 are not used. */
16907 addend += 0x8000;
16908 break;
16909
16910 case R_PPC64_D34_HA30:
16911 case R_PPC64_ADDR16_HIGHERA34:
16912 case R_PPC64_ADDR16_HIGHESTA34:
16913 case R_PPC64_REL16_HIGHERA34:
16914 case R_PPC64_REL16_HIGHESTA34:
16915 if (sec != NULL)
16916 addend += 1ULL << 33;
16917 break;
16918
16919 case R_PPC64_ADDR16_DS:
16920 case R_PPC64_ADDR16_LO_DS:
16921 case R_PPC64_GOT16_DS:
16922 case R_PPC64_GOT16_LO_DS:
16923 case R_PPC64_PLT16_LO_DS:
16924 case R_PPC64_SECTOFF_DS:
16925 case R_PPC64_SECTOFF_LO_DS:
16926 case R_PPC64_TOC16_DS:
16927 case R_PPC64_TOC16_LO_DS:
16928 case R_PPC64_PLTGOT16_DS:
16929 case R_PPC64_PLTGOT16_LO_DS:
16930 case R_PPC64_GOT_TPREL16_DS:
16931 case R_PPC64_GOT_TPREL16_LO_DS:
16932 case R_PPC64_GOT_DTPREL16_DS:
16933 case R_PPC64_GOT_DTPREL16_LO_DS:
16934 case R_PPC64_TPREL16_DS:
16935 case R_PPC64_TPREL16_LO_DS:
16936 case R_PPC64_DTPREL16_DS:
16937 case R_PPC64_DTPREL16_LO_DS:
16938 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16939 mask = 3;
16940 /* If this reloc is against an lq, lxv, or stxv insn, then
16941 the value must be a multiple of 16. This is somewhat of
16942 a hack, but the "correct" way to do this by defining _DQ
16943 forms of all the _DS relocs bloats all reloc switches in
16944 this file. It doesn't make much sense to use these
16945 relocs in data, so testing the insn should be safe. */
16946 if ((insn & (0x3fu << 26)) == (56u << 26)
16947 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
16948 mask = 15;
16949 relocation += addend;
16950 addend = insn & (mask ^ 3);
16951 if ((relocation & mask) != 0)
16952 {
16953 relocation ^= relocation & mask;
16954 info->callbacks->einfo
16955 /* xgettext:c-format */
16956 (_("%H: error: %s not a multiple of %u\n"),
16957 input_bfd, input_section, rel->r_offset,
16958 ppc64_elf_howto_table[r_type]->name,
16959 mask + 1);
16960 bfd_set_error (bfd_error_bad_value);
16961 ret = FALSE;
16962 goto copy_reloc;
16963 }
16964 break;
16965 }
16966
16967 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16968 because such sections are not SEC_ALLOC and thus ld.so will
16969 not process them. */
16970 howto = ppc64_elf_howto_table[(int) r_type];
16971 if (unresolved_reloc
16972 && !((input_section->flags & SEC_DEBUGGING) != 0
16973 && h->elf.def_dynamic)
16974 && _bfd_elf_section_offset (output_bfd, info, input_section,
16975 rel->r_offset) != (bfd_vma) -1)
16976 {
16977 info->callbacks->einfo
16978 /* xgettext:c-format */
16979 (_("%H: unresolvable %s against `%pT'\n"),
16980 input_bfd, input_section, rel->r_offset,
16981 howto->name,
16982 h->elf.root.root.string);
16983 ret = FALSE;
16984 }
16985
16986 /* 16-bit fields in insns mostly have signed values, but a
16987 few insns have 16-bit unsigned values. Really, we should
16988 have different reloc types. */
16989 if (howto->complain_on_overflow != complain_overflow_dont
16990 && howto->dst_mask == 0xffff
16991 && (input_section->flags & SEC_CODE) != 0)
16992 {
16993 enum complain_overflow complain = complain_overflow_signed;
16994
16995 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16996 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
16997 complain = complain_overflow_bitfield;
16998 else if (howto->rightshift == 0
16999 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17000 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17001 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17002 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17003 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17004 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
17005 complain = complain_overflow_unsigned;
17006 if (howto->complain_on_overflow != complain)
17007 {
17008 alt_howto = *howto;
17009 alt_howto.complain_on_overflow = complain;
17010 howto = &alt_howto;
17011 }
17012 }
17013
17014 switch (r_type)
17015 {
17016 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17017 case R_PPC64_D34:
17018 case R_PPC64_D34_LO:
17019 case R_PPC64_D34_HI30:
17020 case R_PPC64_D34_HA30:
17021 case R_PPC64_PCREL34:
17022 case R_PPC64_GOT_PCREL34:
17023 case R_PPC64_TPREL34:
17024 case R_PPC64_DTPREL34:
17025 case R_PPC64_GOT_TLSGD34:
17026 case R_PPC64_GOT_TLSLD34:
17027 case R_PPC64_GOT_TPREL34:
17028 case R_PPC64_GOT_DTPREL34:
17029 case R_PPC64_PLT_PCREL34:
17030 case R_PPC64_PLT_PCREL34_NOTOC:
17031 case R_PPC64_D28:
17032 case R_PPC64_PCREL28:
17033 if (rel->r_offset + 8 > input_section->size)
17034 r = bfd_reloc_outofrange;
17035 else
17036 {
17037 relocation += addend;
17038 if (howto->pc_relative)
17039 relocation -= (rel->r_offset
17040 + input_section->output_offset
17041 + input_section->output_section->vma);
17042 relocation >>= howto->rightshift;
17043
17044 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17045 pinsn <<= 32;
17046 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17047
17048 pinsn &= ~howto->dst_mask;
17049 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17050 & howto->dst_mask);
17051 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17052 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17053 r = bfd_reloc_ok;
17054 if (howto->complain_on_overflow == complain_overflow_signed
17055 && (relocation + (1ULL << (howto->bitsize - 1))
17056 >= 1ULL << howto->bitsize))
17057 r = bfd_reloc_overflow;
17058 }
17059 break;
17060
17061 case R_PPC64_REL16DX_HA:
17062 if (rel->r_offset + 4 > input_section->size)
17063 r = bfd_reloc_outofrange;
17064 else
17065 {
17066 relocation += addend;
17067 relocation -= (rel->r_offset
17068 + input_section->output_offset
17069 + input_section->output_section->vma);
17070 relocation = (bfd_signed_vma) relocation >> 16;
17071 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17072 insn &= ~0x1fffc1;
17073 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
17074 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17075 r = bfd_reloc_ok;
17076 if (relocation + 0x8000 > 0xffff)
17077 r = bfd_reloc_overflow;
17078 }
17079 break;
17080
17081 default:
17082 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17083 contents, rel->r_offset,
17084 relocation, addend);
17085 }
17086
17087 if (r != bfd_reloc_ok)
17088 {
17089 char *more_info = NULL;
17090 const char *reloc_name = howto->name;
17091
17092 if (reloc_dest != DEST_NORMAL)
17093 {
17094 more_info = bfd_malloc (strlen (reloc_name) + 8);
17095 if (more_info != NULL)
17096 {
17097 strcpy (more_info, reloc_name);
17098 strcat (more_info, (reloc_dest == DEST_OPD
17099 ? " (OPD)" : " (stub)"));
17100 reloc_name = more_info;
17101 }
17102 }
17103
17104 if (r == bfd_reloc_overflow)
17105 {
17106 /* On code like "if (foo) foo();" don't report overflow
17107 on a branch to zero when foo is undefined. */
17108 if (!warned
17109 && (reloc_dest == DEST_STUB
17110 || !(h != NULL
17111 && (h->elf.root.type == bfd_link_hash_undefweak
17112 || h->elf.root.type == bfd_link_hash_undefined)
17113 && is_branch_reloc (r_type))))
17114 info->callbacks->reloc_overflow (info, &h->elf.root,
17115 sym_name, reloc_name,
17116 orig_rel.r_addend,
17117 input_bfd, input_section,
17118 rel->r_offset);
17119 }
17120 else
17121 {
17122 info->callbacks->einfo
17123 /* xgettext:c-format */
17124 (_("%H: %s against `%pT': error %d\n"),
17125 input_bfd, input_section, rel->r_offset,
17126 reloc_name, sym_name, (int) r);
17127 ret = FALSE;
17128 }
17129 free (more_info);
17130 }
17131 copy_reloc:
17132 if (wrel != rel)
17133 *wrel = *rel;
17134 }
17135
17136 if (wrel != rel)
17137 {
17138 Elf_Internal_Shdr *rel_hdr;
17139 size_t deleted = rel - wrel;
17140
17141 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17142 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17143 if (rel_hdr->sh_size == 0)
17144 {
17145 /* It is too late to remove an empty reloc section. Leave
17146 one NONE reloc.
17147 ??? What is wrong with an empty section??? */
17148 rel_hdr->sh_size = rel_hdr->sh_entsize;
17149 deleted -= 1;
17150 }
17151 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17152 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17153 input_section->reloc_count -= deleted;
17154 }
17155
17156 /* If we're emitting relocations, then shortly after this function
17157 returns, reloc offsets and addends for this section will be
17158 adjusted. Worse, reloc symbol indices will be for the output
17159 file rather than the input. Save a copy of the relocs for
17160 opd_entry_value. */
17161 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
17162 {
17163 bfd_size_type amt;
17164 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17165 rel = bfd_alloc (input_bfd, amt);
17166 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17167 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
17168 if (rel == NULL)
17169 return FALSE;
17170 memcpy (rel, relocs, amt);
17171 }
17172 return ret;
17173 }
17174
17175 /* Adjust the value of any local symbols in opd sections. */
17176
17177 static int
17178 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17179 const char *name ATTRIBUTE_UNUSED,
17180 Elf_Internal_Sym *elfsym,
17181 asection *input_sec,
17182 struct elf_link_hash_entry *h)
17183 {
17184 struct _opd_sec_data *opd;
17185 long adjust;
17186 bfd_vma value;
17187
17188 if (h != NULL)
17189 return 1;
17190
17191 opd = get_opd_info (input_sec);
17192 if (opd == NULL || opd->adjust == NULL)
17193 return 1;
17194
17195 value = elfsym->st_value - input_sec->output_offset;
17196 if (!bfd_link_relocatable (info))
17197 value -= input_sec->output_section->vma;
17198
17199 adjust = opd->adjust[OPD_NDX (value)];
17200 if (adjust == -1)
17201 return 2;
17202
17203 elfsym->st_value += adjust;
17204 return 1;
17205 }
17206
17207 /* Finish up dynamic symbol handling. We set the contents of various
17208 dynamic sections here. */
17209
17210 static bfd_boolean
17211 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17212 struct bfd_link_info *info,
17213 struct elf_link_hash_entry *h,
17214 Elf_Internal_Sym *sym)
17215 {
17216 struct ppc_link_hash_table *htab;
17217 struct plt_entry *ent;
17218
17219 htab = ppc_hash_table (info);
17220 if (htab == NULL)
17221 return FALSE;
17222
17223 if (!htab->opd_abi && !h->def_regular)
17224 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17225 if (ent->plt.offset != (bfd_vma) -1)
17226 {
17227 /* Mark the symbol as undefined, rather than as
17228 defined in glink. Leave the value if there were
17229 any relocations where pointer equality matters
17230 (this is a clue for the dynamic linker, to make
17231 function pointer comparisons work between an
17232 application and shared library), otherwise set it
17233 to zero. */
17234 sym->st_shndx = SHN_UNDEF;
17235 if (!h->pointer_equality_needed)
17236 sym->st_value = 0;
17237 else if (!h->ref_regular_nonweak)
17238 {
17239 /* This breaks function pointer comparisons, but
17240 that is better than breaking tests for a NULL
17241 function pointer. */
17242 sym->st_value = 0;
17243 }
17244 break;
17245 }
17246
17247 if (h->needs_copy
17248 && (h->root.type == bfd_link_hash_defined
17249 || h->root.type == bfd_link_hash_defweak)
17250 && (h->root.u.def.section == htab->elf.sdynbss
17251 || h->root.u.def.section == htab->elf.sdynrelro))
17252 {
17253 /* This symbol needs a copy reloc. Set it up. */
17254 Elf_Internal_Rela rela;
17255 asection *srel;
17256 bfd_byte *loc;
17257
17258 if (h->dynindx == -1)
17259 abort ();
17260
17261 rela.r_offset = defined_sym_val (h);
17262 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17263 rela.r_addend = 0;
17264 if (h->root.u.def.section == htab->elf.sdynrelro)
17265 srel = htab->elf.sreldynrelro;
17266 else
17267 srel = htab->elf.srelbss;
17268 loc = srel->contents;
17269 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
17270 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
17271 }
17272
17273 return TRUE;
17274 }
17275
17276 /* Used to decide how to sort relocs in an optimal manner for the
17277 dynamic linker, before writing them out. */
17278
17279 static enum elf_reloc_type_class
17280 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17281 const asection *rel_sec,
17282 const Elf_Internal_Rela *rela)
17283 {
17284 enum elf_ppc64_reloc_type r_type;
17285 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17286
17287 if (rel_sec == htab->elf.irelplt)
17288 return reloc_class_ifunc;
17289
17290 r_type = ELF64_R_TYPE (rela->r_info);
17291 switch (r_type)
17292 {
17293 case R_PPC64_RELATIVE:
17294 return reloc_class_relative;
17295 case R_PPC64_JMP_SLOT:
17296 return reloc_class_plt;
17297 case R_PPC64_COPY:
17298 return reloc_class_copy;
17299 default:
17300 return reloc_class_normal;
17301 }
17302 }
17303
17304 /* Finish up the dynamic sections. */
17305
17306 static bfd_boolean
17307 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17308 struct bfd_link_info *info)
17309 {
17310 struct ppc_link_hash_table *htab;
17311 bfd *dynobj;
17312 asection *sdyn;
17313
17314 htab = ppc_hash_table (info);
17315 if (htab == NULL)
17316 return FALSE;
17317
17318 dynobj = htab->elf.dynobj;
17319 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
17320
17321 if (htab->elf.dynamic_sections_created)
17322 {
17323 Elf64_External_Dyn *dyncon, *dynconend;
17324
17325 if (sdyn == NULL || htab->elf.sgot == NULL)
17326 abort ();
17327
17328 dyncon = (Elf64_External_Dyn *) sdyn->contents;
17329 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
17330 for (; dyncon < dynconend; dyncon++)
17331 {
17332 Elf_Internal_Dyn dyn;
17333 asection *s;
17334
17335 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17336
17337 switch (dyn.d_tag)
17338 {
17339 default:
17340 continue;
17341
17342 case DT_PPC64_GLINK:
17343 s = htab->glink;
17344 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17345 /* We stupidly defined DT_PPC64_GLINK to be the start
17346 of glink rather than the first entry point, which is
17347 what ld.so needs, and now have a bigger stub to
17348 support automatic multiple TOCs. */
17349 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
17350 break;
17351
17352 case DT_PPC64_OPD:
17353 s = bfd_get_section_by_name (output_bfd, ".opd");
17354 if (s == NULL)
17355 continue;
17356 dyn.d_un.d_ptr = s->vma;
17357 break;
17358
17359 case DT_PPC64_OPT:
17360 if ((htab->do_multi_toc && htab->multi_toc_needed)
17361 || htab->notoc_plt)
17362 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
17363 if (htab->has_plt_localentry0)
17364 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
17365 break;
17366
17367 case DT_PPC64_OPDSZ:
17368 s = bfd_get_section_by_name (output_bfd, ".opd");
17369 if (s == NULL)
17370 continue;
17371 dyn.d_un.d_val = s->size;
17372 break;
17373
17374 case DT_PLTGOT:
17375 s = htab->elf.splt;
17376 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17377 break;
17378
17379 case DT_JMPREL:
17380 s = htab->elf.srelplt;
17381 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
17382 break;
17383
17384 case DT_PLTRELSZ:
17385 dyn.d_un.d_val = htab->elf.srelplt->size;
17386 break;
17387
17388 case DT_TEXTREL:
17389 if (htab->local_ifunc_resolver)
17390 info->callbacks->einfo
17391 (_("%X%P: text relocations and GNU indirect "
17392 "functions will result in a segfault at runtime\n"));
17393 else if (htab->maybe_local_ifunc_resolver)
17394 info->callbacks->einfo
17395 (_("%P: warning: text relocations and GNU indirect "
17396 "functions may result in a segfault at runtime\n"));
17397 continue;
17398 }
17399
17400 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
17401 }
17402 }
17403
17404 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17405 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
17406 {
17407 /* Fill in the first entry in the global offset table.
17408 We use it to hold the link-time TOCbase. */
17409 bfd_put_64 (output_bfd,
17410 elf_gp (output_bfd) + TOC_BASE_OFF,
17411 htab->elf.sgot->contents);
17412
17413 /* Set .got entry size. */
17414 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17415 = 8;
17416 }
17417
17418 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17419 && htab->elf.splt->output_section != bfd_abs_section_ptr)
17420 {
17421 /* Set .plt entry size. */
17422 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
17423 = PLT_ENTRY_SIZE (htab);
17424 }
17425
17426 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17427 brlt ourselves if emitrelocations. */
17428 if (htab->brlt != NULL
17429 && htab->brlt->reloc_count != 0
17430 && !_bfd_elf_link_output_relocs (output_bfd,
17431 htab->brlt,
17432 elf_section_data (htab->brlt)->rela.hdr,
17433 elf_section_data (htab->brlt)->relocs,
17434 NULL))
17435 return FALSE;
17436
17437 if (htab->glink != NULL
17438 && htab->glink->reloc_count != 0
17439 && !_bfd_elf_link_output_relocs (output_bfd,
17440 htab->glink,
17441 elf_section_data (htab->glink)->rela.hdr,
17442 elf_section_data (htab->glink)->relocs,
17443 NULL))
17444 return FALSE;
17445
17446
17447 if (htab->glink_eh_frame != NULL
17448 && htab->glink_eh_frame->size != 0
17449 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17450 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17451 htab->glink_eh_frame,
17452 htab->glink_eh_frame->contents))
17453 return FALSE;
17454
17455 /* We need to handle writing out multiple GOT sections ourselves,
17456 since we didn't add them to DYNOBJ. We know dynobj is the first
17457 bfd. */
17458 while ((dynobj = dynobj->link.next) != NULL)
17459 {
17460 asection *s;
17461
17462 if (!is_ppc64_elf (dynobj))
17463 continue;
17464
17465 s = ppc64_elf_tdata (dynobj)->got;
17466 if (s != NULL
17467 && s->size != 0
17468 && s->output_section != bfd_abs_section_ptr
17469 && !bfd_set_section_contents (output_bfd, s->output_section,
17470 s->contents, s->output_offset,
17471 s->size))
17472 return FALSE;
17473 s = ppc64_elf_tdata (dynobj)->relgot;
17474 if (s != NULL
17475 && s->size != 0
17476 && s->output_section != bfd_abs_section_ptr
17477 && !bfd_set_section_contents (output_bfd, s->output_section,
17478 s->contents, s->output_offset,
17479 s->size))
17480 return FALSE;
17481 }
17482
17483 return TRUE;
17484 }
17485
17486 #include "elf64-target.h"
17487
17488 /* FreeBSD support */
17489
17490 #undef TARGET_LITTLE_SYM
17491 #undef TARGET_LITTLE_NAME
17492
17493 #undef TARGET_BIG_SYM
17494 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
17495 #undef TARGET_BIG_NAME
17496 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17497
17498 #undef ELF_OSABI
17499 #define ELF_OSABI ELFOSABI_FREEBSD
17500
17501 #undef elf64_bed
17502 #define elf64_bed elf64_powerpc_fbsd_bed
17503
17504 #include "elf64-target.h"
This page took 0.400762 seconds and 4 git commands to generate.