1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2015 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
59 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM powerpc_elf64_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_TARGET_ID PPC64_ELF_DATA
65 #define ELF_MACHINE_CODE EM_PPC64
66 #define ELF_MAXPAGESIZE 0x10000
67 #define ELF_COMMONPAGESIZE 0x10000
68 #define elf_info_to_howto ppc64_elf_info_to_howto
70 #define elf_backend_want_got_sym 0
71 #define elf_backend_want_plt_sym 0
72 #define elf_backend_plt_alignment 3
73 #define elf_backend_plt_not_loaded 1
74 #define elf_backend_got_header_size 8
75 #define elf_backend_can_gc_sections 1
76 #define elf_backend_can_refcount 1
77 #define elf_backend_rela_normal 1
78 #define elf_backend_default_execstack 0
80 #define bfd_elf64_mkobject ppc64_elf_mkobject
81 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
82 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
83 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
84 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
85 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
86 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
87 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
88 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
90 #define elf_backend_object_p ppc64_elf_object_p
91 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
92 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
93 #define elf_backend_write_core_note ppc64_elf_write_core_note
94 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
95 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
96 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
97 #define elf_backend_check_directives ppc64_elf_before_check_relocs
98 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
99 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
100 #define elf_backend_check_relocs ppc64_elf_check_relocs
101 #define elf_backend_gc_keep ppc64_elf_gc_keep
102 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
103 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
104 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
105 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
106 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
107 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
108 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
109 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
110 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
111 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
112 #define elf_backend_action_discarded ppc64_elf_action_discarded
113 #define elf_backend_relocate_section ppc64_elf_relocate_section
114 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
115 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
116 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
117 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
118 #define elf_backend_special_sections ppc64_elf_special_sections
119 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
121 /* The name of the dynamic interpreter. This is put in the .interp
123 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
125 /* The size in bytes of an entry in the procedure linkage table. */
126 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
128 /* The initial size of the plt reserved for the dynamic linker. */
129 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
131 /* Offsets to some stack save slots. */
133 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
134 /* This one is dodgy. ELFv2 does not have a linker word, so use the
135 CR save slot. Used only by optimised __tls_get_addr call stub,
136 relying on __tls_get_addr_opt not saving CR.. */
137 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
139 /* TOC base pointers offset from start of TOC. */
140 #define TOC_BASE_OFF 0x8000
141 /* TOC base alignment. */
142 #define TOC_BASE_ALIGN 256
144 /* Offset of tp and dtp pointers from start of TLS block. */
145 #define TP_OFFSET 0x7000
146 #define DTP_OFFSET 0x8000
148 /* .plt call stub instructions. The normal stub is like this, but
149 sometimes the .plt entry crosses a 64k boundary and we need to
150 insert an addi to adjust r11. */
151 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
152 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
153 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
154 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
155 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
156 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
157 #define BCTR 0x4e800420 /* bctr */
159 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
160 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
161 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
163 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
164 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
165 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
166 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
167 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
168 #define BNECTR 0x4ca20420 /* bnectr+ */
169 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
171 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
172 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
173 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
175 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
177 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
178 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
179 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
181 /* glink call stub instructions. We enter with the index in R0. */
182 #define GLINK_CALL_STUB_SIZE (16*4)
186 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
187 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
189 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
190 /* ld %2,(0b-1b)(%11) */
191 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
192 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
198 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
199 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
200 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
201 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
202 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
205 #define NOP 0x60000000
207 /* Some other nops. */
208 #define CROR_151515 0x4def7b82
209 #define CROR_313131 0x4ffffb82
211 /* .glink entries for the first 32k functions are two instructions. */
212 #define LI_R0_0 0x38000000 /* li %r0,0 */
213 #define B_DOT 0x48000000 /* b . */
215 /* After that, we need two instructions to load the index, followed by
217 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
218 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
220 /* Instructions used by the save and restore reg functions. */
221 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
222 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
223 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
224 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
225 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
226 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
227 #define LI_R12_0 0x39800000 /* li %r12,0 */
228 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
229 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
230 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
231 #define BLR 0x4e800020 /* blr */
233 /* Since .opd is an array of descriptors and each entry will end up
234 with identical R_PPC64_RELATIVE relocs, there is really no need to
235 propagate .opd relocs; The dynamic linker should be taught to
236 relocate .opd without reloc entries. */
237 #ifndef NO_OPD_RELOCS
238 #define NO_OPD_RELOCS 0
242 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
246 abiversion (bfd *abfd)
248 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
252 set_abiversion (bfd *abfd, int ver)
254 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
255 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
258 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
260 /* Relocation HOWTO's. */
261 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
263 static reloc_howto_type ppc64_elf_howto_raw[] = {
264 /* This reloc does nothing. */
265 HOWTO (R_PPC64_NONE, /* type */
267 3, /* size (0 = byte, 1 = short, 2 = long) */
269 FALSE, /* pc_relative */
271 complain_overflow_dont, /* complain_on_overflow */
272 bfd_elf_generic_reloc, /* special_function */
273 "R_PPC64_NONE", /* name */
274 FALSE, /* partial_inplace */
277 FALSE), /* pcrel_offset */
279 /* A standard 32 bit relocation. */
280 HOWTO (R_PPC64_ADDR32, /* type */
282 2, /* size (0 = byte, 1 = short, 2 = long) */
284 FALSE, /* pc_relative */
286 complain_overflow_bitfield, /* complain_on_overflow */
287 bfd_elf_generic_reloc, /* special_function */
288 "R_PPC64_ADDR32", /* name */
289 FALSE, /* partial_inplace */
291 0xffffffff, /* dst_mask */
292 FALSE), /* pcrel_offset */
294 /* An absolute 26 bit branch; the lower two bits must be zero.
295 FIXME: we don't check that, we just clear them. */
296 HOWTO (R_PPC64_ADDR24, /* type */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
300 FALSE, /* pc_relative */
302 complain_overflow_bitfield, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_ADDR24", /* name */
305 FALSE, /* partial_inplace */
307 0x03fffffc, /* dst_mask */
308 FALSE), /* pcrel_offset */
310 /* A standard 16 bit relocation. */
311 HOWTO (R_PPC64_ADDR16, /* type */
313 1, /* size (0 = byte, 1 = short, 2 = long) */
315 FALSE, /* pc_relative */
317 complain_overflow_bitfield, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_ADDR16", /* name */
320 FALSE, /* partial_inplace */
322 0xffff, /* dst_mask */
323 FALSE), /* pcrel_offset */
325 /* A 16 bit relocation without overflow. */
326 HOWTO (R_PPC64_ADDR16_LO, /* type */
328 1, /* size (0 = byte, 1 = short, 2 = long) */
330 FALSE, /* pc_relative */
332 complain_overflow_dont,/* complain_on_overflow */
333 bfd_elf_generic_reloc, /* special_function */
334 "R_PPC64_ADDR16_LO", /* name */
335 FALSE, /* partial_inplace */
337 0xffff, /* dst_mask */
338 FALSE), /* pcrel_offset */
340 /* Bits 16-31 of an address. */
341 HOWTO (R_PPC64_ADDR16_HI, /* type */
343 1, /* size (0 = byte, 1 = short, 2 = long) */
345 FALSE, /* pc_relative */
347 complain_overflow_signed, /* complain_on_overflow */
348 bfd_elf_generic_reloc, /* special_function */
349 "R_PPC64_ADDR16_HI", /* name */
350 FALSE, /* partial_inplace */
352 0xffff, /* dst_mask */
353 FALSE), /* pcrel_offset */
355 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
356 bits, treated as a signed number, is negative. */
357 HOWTO (R_PPC64_ADDR16_HA, /* type */
359 1, /* size (0 = byte, 1 = short, 2 = long) */
361 FALSE, /* pc_relative */
363 complain_overflow_signed, /* complain_on_overflow */
364 ppc64_elf_ha_reloc, /* special_function */
365 "R_PPC64_ADDR16_HA", /* name */
366 FALSE, /* partial_inplace */
368 0xffff, /* dst_mask */
369 FALSE), /* pcrel_offset */
371 /* An absolute 16 bit branch; the lower two bits must be zero.
372 FIXME: we don't check that, we just clear them. */
373 HOWTO (R_PPC64_ADDR14, /* type */
375 2, /* size (0 = byte, 1 = short, 2 = long) */
377 FALSE, /* pc_relative */
379 complain_overflow_signed, /* complain_on_overflow */
380 ppc64_elf_branch_reloc, /* special_function */
381 "R_PPC64_ADDR14", /* name */
382 FALSE, /* partial_inplace */
384 0x0000fffc, /* dst_mask */
385 FALSE), /* pcrel_offset */
387 /* An absolute 16 bit branch, for which bit 10 should be set to
388 indicate that the branch is expected to be taken. The lower two
389 bits must be zero. */
390 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
392 2, /* size (0 = byte, 1 = short, 2 = long) */
394 FALSE, /* pc_relative */
396 complain_overflow_signed, /* complain_on_overflow */
397 ppc64_elf_brtaken_reloc, /* special_function */
398 "R_PPC64_ADDR14_BRTAKEN",/* name */
399 FALSE, /* partial_inplace */
401 0x0000fffc, /* dst_mask */
402 FALSE), /* pcrel_offset */
404 /* An absolute 16 bit branch, for which bit 10 should be set to
405 indicate that the branch is not expected to be taken. The lower
406 two bits must be zero. */
407 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
409 2, /* size (0 = byte, 1 = short, 2 = long) */
411 FALSE, /* pc_relative */
413 complain_overflow_signed, /* complain_on_overflow */
414 ppc64_elf_brtaken_reloc, /* special_function */
415 "R_PPC64_ADDR14_BRNTAKEN",/* name */
416 FALSE, /* partial_inplace */
418 0x0000fffc, /* dst_mask */
419 FALSE), /* pcrel_offset */
421 /* A relative 26 bit branch; the lower two bits must be zero. */
422 HOWTO (R_PPC64_REL24, /* type */
424 2, /* size (0 = byte, 1 = short, 2 = long) */
426 TRUE, /* pc_relative */
428 complain_overflow_signed, /* complain_on_overflow */
429 ppc64_elf_branch_reloc, /* special_function */
430 "R_PPC64_REL24", /* name */
431 FALSE, /* partial_inplace */
433 0x03fffffc, /* dst_mask */
434 TRUE), /* pcrel_offset */
436 /* A relative 16 bit branch; the lower two bits must be zero. */
437 HOWTO (R_PPC64_REL14, /* type */
439 2, /* size (0 = byte, 1 = short, 2 = long) */
441 TRUE, /* pc_relative */
443 complain_overflow_signed, /* complain_on_overflow */
444 ppc64_elf_branch_reloc, /* special_function */
445 "R_PPC64_REL14", /* name */
446 FALSE, /* partial_inplace */
448 0x0000fffc, /* dst_mask */
449 TRUE), /* pcrel_offset */
451 /* A relative 16 bit branch. Bit 10 should be set to indicate that
452 the branch is expected to be taken. The lower two bits must be
454 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
456 2, /* size (0 = byte, 1 = short, 2 = long) */
458 TRUE, /* pc_relative */
460 complain_overflow_signed, /* complain_on_overflow */
461 ppc64_elf_brtaken_reloc, /* special_function */
462 "R_PPC64_REL14_BRTAKEN", /* name */
463 FALSE, /* partial_inplace */
465 0x0000fffc, /* dst_mask */
466 TRUE), /* pcrel_offset */
468 /* A relative 16 bit branch. Bit 10 should be set to indicate that
469 the branch is not expected to be taken. The lower two bits must
471 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
473 2, /* size (0 = byte, 1 = short, 2 = long) */
475 TRUE, /* pc_relative */
477 complain_overflow_signed, /* complain_on_overflow */
478 ppc64_elf_brtaken_reloc, /* special_function */
479 "R_PPC64_REL14_BRNTAKEN",/* name */
480 FALSE, /* partial_inplace */
482 0x0000fffc, /* dst_mask */
483 TRUE), /* pcrel_offset */
485 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
487 HOWTO (R_PPC64_GOT16, /* type */
489 1, /* size (0 = byte, 1 = short, 2 = long) */
491 FALSE, /* pc_relative */
493 complain_overflow_signed, /* complain_on_overflow */
494 ppc64_elf_unhandled_reloc, /* special_function */
495 "R_PPC64_GOT16", /* name */
496 FALSE, /* partial_inplace */
498 0xffff, /* dst_mask */
499 FALSE), /* pcrel_offset */
501 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
503 HOWTO (R_PPC64_GOT16_LO, /* type */
505 1, /* size (0 = byte, 1 = short, 2 = long) */
507 FALSE, /* pc_relative */
509 complain_overflow_dont, /* complain_on_overflow */
510 ppc64_elf_unhandled_reloc, /* special_function */
511 "R_PPC64_GOT16_LO", /* name */
512 FALSE, /* partial_inplace */
514 0xffff, /* dst_mask */
515 FALSE), /* pcrel_offset */
517 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
519 HOWTO (R_PPC64_GOT16_HI, /* type */
521 1, /* size (0 = byte, 1 = short, 2 = long) */
523 FALSE, /* pc_relative */
525 complain_overflow_signed,/* complain_on_overflow */
526 ppc64_elf_unhandled_reloc, /* special_function */
527 "R_PPC64_GOT16_HI", /* name */
528 FALSE, /* partial_inplace */
530 0xffff, /* dst_mask */
531 FALSE), /* pcrel_offset */
533 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
535 HOWTO (R_PPC64_GOT16_HA, /* type */
537 1, /* size (0 = byte, 1 = short, 2 = long) */
539 FALSE, /* pc_relative */
541 complain_overflow_signed,/* complain_on_overflow */
542 ppc64_elf_unhandled_reloc, /* special_function */
543 "R_PPC64_GOT16_HA", /* name */
544 FALSE, /* partial_inplace */
546 0xffff, /* dst_mask */
547 FALSE), /* pcrel_offset */
549 /* This is used only by the dynamic linker. The symbol should exist
550 both in the object being run and in some shared library. The
551 dynamic linker copies the data addressed by the symbol from the
552 shared library into the object, because the object being
553 run has to have the data at some particular address. */
554 HOWTO (R_PPC64_COPY, /* type */
556 0, /* this one is variable size */
558 FALSE, /* pc_relative */
560 complain_overflow_dont, /* complain_on_overflow */
561 ppc64_elf_unhandled_reloc, /* special_function */
562 "R_PPC64_COPY", /* name */
563 FALSE, /* partial_inplace */
566 FALSE), /* pcrel_offset */
568 /* Like R_PPC64_ADDR64, but used when setting global offset table
570 HOWTO (R_PPC64_GLOB_DAT, /* type */
572 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
574 FALSE, /* pc_relative */
576 complain_overflow_dont, /* complain_on_overflow */
577 ppc64_elf_unhandled_reloc, /* special_function */
578 "R_PPC64_GLOB_DAT", /* name */
579 FALSE, /* partial_inplace */
581 ONES (64), /* dst_mask */
582 FALSE), /* pcrel_offset */
584 /* Created by the link editor. Marks a procedure linkage table
585 entry for a symbol. */
586 HOWTO (R_PPC64_JMP_SLOT, /* type */
588 0, /* size (0 = byte, 1 = short, 2 = long) */
590 FALSE, /* pc_relative */
592 complain_overflow_dont, /* complain_on_overflow */
593 ppc64_elf_unhandled_reloc, /* special_function */
594 "R_PPC64_JMP_SLOT", /* name */
595 FALSE, /* partial_inplace */
598 FALSE), /* pcrel_offset */
600 /* Used only by the dynamic linker. When the object is run, this
601 doubleword64 is set to the load address of the object, plus the
603 HOWTO (R_PPC64_RELATIVE, /* type */
605 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
607 FALSE, /* pc_relative */
609 complain_overflow_dont, /* complain_on_overflow */
610 bfd_elf_generic_reloc, /* special_function */
611 "R_PPC64_RELATIVE", /* name */
612 FALSE, /* partial_inplace */
614 ONES (64), /* dst_mask */
615 FALSE), /* pcrel_offset */
617 /* Like R_PPC64_ADDR32, but may be unaligned. */
618 HOWTO (R_PPC64_UADDR32, /* type */
620 2, /* size (0 = byte, 1 = short, 2 = long) */
622 FALSE, /* pc_relative */
624 complain_overflow_bitfield, /* complain_on_overflow */
625 bfd_elf_generic_reloc, /* special_function */
626 "R_PPC64_UADDR32", /* name */
627 FALSE, /* partial_inplace */
629 0xffffffff, /* dst_mask */
630 FALSE), /* pcrel_offset */
632 /* Like R_PPC64_ADDR16, but may be unaligned. */
633 HOWTO (R_PPC64_UADDR16, /* type */
635 1, /* size (0 = byte, 1 = short, 2 = long) */
637 FALSE, /* pc_relative */
639 complain_overflow_bitfield, /* complain_on_overflow */
640 bfd_elf_generic_reloc, /* special_function */
641 "R_PPC64_UADDR16", /* name */
642 FALSE, /* partial_inplace */
644 0xffff, /* dst_mask */
645 FALSE), /* pcrel_offset */
647 /* 32-bit PC relative. */
648 HOWTO (R_PPC64_REL32, /* type */
650 2, /* size (0 = byte, 1 = short, 2 = long) */
652 TRUE, /* pc_relative */
654 complain_overflow_signed, /* complain_on_overflow */
655 bfd_elf_generic_reloc, /* special_function */
656 "R_PPC64_REL32", /* name */
657 FALSE, /* partial_inplace */
659 0xffffffff, /* dst_mask */
660 TRUE), /* pcrel_offset */
662 /* 32-bit relocation to the symbol's procedure linkage table. */
663 HOWTO (R_PPC64_PLT32, /* type */
665 2, /* size (0 = byte, 1 = short, 2 = long) */
667 FALSE, /* pc_relative */
669 complain_overflow_bitfield, /* complain_on_overflow */
670 ppc64_elf_unhandled_reloc, /* special_function */
671 "R_PPC64_PLT32", /* name */
672 FALSE, /* partial_inplace */
674 0xffffffff, /* dst_mask */
675 FALSE), /* pcrel_offset */
677 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
678 FIXME: R_PPC64_PLTREL32 not supported. */
679 HOWTO (R_PPC64_PLTREL32, /* type */
681 2, /* size (0 = byte, 1 = short, 2 = long) */
683 TRUE, /* pc_relative */
685 complain_overflow_signed, /* complain_on_overflow */
686 bfd_elf_generic_reloc, /* special_function */
687 "R_PPC64_PLTREL32", /* name */
688 FALSE, /* partial_inplace */
690 0xffffffff, /* dst_mask */
691 TRUE), /* pcrel_offset */
693 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
695 HOWTO (R_PPC64_PLT16_LO, /* type */
697 1, /* size (0 = byte, 1 = short, 2 = long) */
699 FALSE, /* pc_relative */
701 complain_overflow_dont, /* complain_on_overflow */
702 ppc64_elf_unhandled_reloc, /* special_function */
703 "R_PPC64_PLT16_LO", /* name */
704 FALSE, /* partial_inplace */
706 0xffff, /* dst_mask */
707 FALSE), /* pcrel_offset */
709 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
711 HOWTO (R_PPC64_PLT16_HI, /* type */
713 1, /* size (0 = byte, 1 = short, 2 = long) */
715 FALSE, /* pc_relative */
717 complain_overflow_signed, /* complain_on_overflow */
718 ppc64_elf_unhandled_reloc, /* special_function */
719 "R_PPC64_PLT16_HI", /* name */
720 FALSE, /* partial_inplace */
722 0xffff, /* dst_mask */
723 FALSE), /* pcrel_offset */
725 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
727 HOWTO (R_PPC64_PLT16_HA, /* type */
729 1, /* size (0 = byte, 1 = short, 2 = long) */
731 FALSE, /* pc_relative */
733 complain_overflow_signed, /* complain_on_overflow */
734 ppc64_elf_unhandled_reloc, /* special_function */
735 "R_PPC64_PLT16_HA", /* name */
736 FALSE, /* partial_inplace */
738 0xffff, /* dst_mask */
739 FALSE), /* pcrel_offset */
741 /* 16-bit section relative relocation. */
742 HOWTO (R_PPC64_SECTOFF, /* type */
744 1, /* size (0 = byte, 1 = short, 2 = long) */
746 FALSE, /* pc_relative */
748 complain_overflow_signed, /* complain_on_overflow */
749 ppc64_elf_sectoff_reloc, /* special_function */
750 "R_PPC64_SECTOFF", /* name */
751 FALSE, /* partial_inplace */
753 0xffff, /* dst_mask */
754 FALSE), /* pcrel_offset */
756 /* Like R_PPC64_SECTOFF, but no overflow warning. */
757 HOWTO (R_PPC64_SECTOFF_LO, /* type */
759 1, /* size (0 = byte, 1 = short, 2 = long) */
761 FALSE, /* pc_relative */
763 complain_overflow_dont, /* complain_on_overflow */
764 ppc64_elf_sectoff_reloc, /* special_function */
765 "R_PPC64_SECTOFF_LO", /* name */
766 FALSE, /* partial_inplace */
768 0xffff, /* dst_mask */
769 FALSE), /* pcrel_offset */
771 /* 16-bit upper half section relative relocation. */
772 HOWTO (R_PPC64_SECTOFF_HI, /* type */
774 1, /* size (0 = byte, 1 = short, 2 = long) */
776 FALSE, /* pc_relative */
778 complain_overflow_signed, /* complain_on_overflow */
779 ppc64_elf_sectoff_reloc, /* special_function */
780 "R_PPC64_SECTOFF_HI", /* name */
781 FALSE, /* partial_inplace */
783 0xffff, /* dst_mask */
784 FALSE), /* pcrel_offset */
786 /* 16-bit upper half adjusted section relative relocation. */
787 HOWTO (R_PPC64_SECTOFF_HA, /* type */
789 1, /* size (0 = byte, 1 = short, 2 = long) */
791 FALSE, /* pc_relative */
793 complain_overflow_signed, /* complain_on_overflow */
794 ppc64_elf_sectoff_ha_reloc, /* special_function */
795 "R_PPC64_SECTOFF_HA", /* name */
796 FALSE, /* partial_inplace */
798 0xffff, /* dst_mask */
799 FALSE), /* pcrel_offset */
801 /* Like R_PPC64_REL24 without touching the two least significant bits. */
802 HOWTO (R_PPC64_REL30, /* type */
804 2, /* size (0 = byte, 1 = short, 2 = long) */
806 TRUE, /* pc_relative */
808 complain_overflow_dont, /* complain_on_overflow */
809 bfd_elf_generic_reloc, /* special_function */
810 "R_PPC64_REL30", /* name */
811 FALSE, /* partial_inplace */
813 0xfffffffc, /* dst_mask */
814 TRUE), /* pcrel_offset */
816 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
818 /* A standard 64-bit relocation. */
819 HOWTO (R_PPC64_ADDR64, /* type */
821 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
823 FALSE, /* pc_relative */
825 complain_overflow_dont, /* complain_on_overflow */
826 bfd_elf_generic_reloc, /* special_function */
827 "R_PPC64_ADDR64", /* name */
828 FALSE, /* partial_inplace */
830 ONES (64), /* dst_mask */
831 FALSE), /* pcrel_offset */
833 /* The bits 32-47 of an address. */
834 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
836 1, /* size (0 = byte, 1 = short, 2 = long) */
838 FALSE, /* pc_relative */
840 complain_overflow_dont, /* complain_on_overflow */
841 bfd_elf_generic_reloc, /* special_function */
842 "R_PPC64_ADDR16_HIGHER", /* name */
843 FALSE, /* partial_inplace */
845 0xffff, /* dst_mask */
846 FALSE), /* pcrel_offset */
848 /* The bits 32-47 of an address, plus 1 if the contents of the low
849 16 bits, treated as a signed number, is negative. */
850 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
852 1, /* size (0 = byte, 1 = short, 2 = long) */
854 FALSE, /* pc_relative */
856 complain_overflow_dont, /* complain_on_overflow */
857 ppc64_elf_ha_reloc, /* special_function */
858 "R_PPC64_ADDR16_HIGHERA", /* name */
859 FALSE, /* partial_inplace */
861 0xffff, /* dst_mask */
862 FALSE), /* pcrel_offset */
864 /* The bits 48-63 of an address. */
865 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
867 1, /* size (0 = byte, 1 = short, 2 = long) */
869 FALSE, /* pc_relative */
871 complain_overflow_dont, /* complain_on_overflow */
872 bfd_elf_generic_reloc, /* special_function */
873 "R_PPC64_ADDR16_HIGHEST", /* name */
874 FALSE, /* partial_inplace */
876 0xffff, /* dst_mask */
877 FALSE), /* pcrel_offset */
879 /* The bits 48-63 of an address, plus 1 if the contents of the low
880 16 bits, treated as a signed number, is negative. */
881 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
883 1, /* size (0 = byte, 1 = short, 2 = long) */
885 FALSE, /* pc_relative */
887 complain_overflow_dont, /* complain_on_overflow */
888 ppc64_elf_ha_reloc, /* special_function */
889 "R_PPC64_ADDR16_HIGHESTA", /* name */
890 FALSE, /* partial_inplace */
892 0xffff, /* dst_mask */
893 FALSE), /* pcrel_offset */
895 /* Like ADDR64, but may be unaligned. */
896 HOWTO (R_PPC64_UADDR64, /* type */
898 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
900 FALSE, /* pc_relative */
902 complain_overflow_dont, /* complain_on_overflow */
903 bfd_elf_generic_reloc, /* special_function */
904 "R_PPC64_UADDR64", /* name */
905 FALSE, /* partial_inplace */
907 ONES (64), /* dst_mask */
908 FALSE), /* pcrel_offset */
910 /* 64-bit relative relocation. */
911 HOWTO (R_PPC64_REL64, /* type */
913 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
915 TRUE, /* pc_relative */
917 complain_overflow_dont, /* complain_on_overflow */
918 bfd_elf_generic_reloc, /* special_function */
919 "R_PPC64_REL64", /* name */
920 FALSE, /* partial_inplace */
922 ONES (64), /* dst_mask */
923 TRUE), /* pcrel_offset */
925 /* 64-bit relocation to the symbol's procedure linkage table. */
926 HOWTO (R_PPC64_PLT64, /* type */
928 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
930 FALSE, /* pc_relative */
932 complain_overflow_dont, /* complain_on_overflow */
933 ppc64_elf_unhandled_reloc, /* special_function */
934 "R_PPC64_PLT64", /* name */
935 FALSE, /* partial_inplace */
937 ONES (64), /* dst_mask */
938 FALSE), /* pcrel_offset */
940 /* 64-bit PC relative relocation to the symbol's procedure linkage
942 /* FIXME: R_PPC64_PLTREL64 not supported. */
943 HOWTO (R_PPC64_PLTREL64, /* type */
945 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
947 TRUE, /* pc_relative */
949 complain_overflow_dont, /* complain_on_overflow */
950 ppc64_elf_unhandled_reloc, /* special_function */
951 "R_PPC64_PLTREL64", /* name */
952 FALSE, /* partial_inplace */
954 ONES (64), /* dst_mask */
955 TRUE), /* pcrel_offset */
957 /* 16 bit TOC-relative relocation. */
959 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
960 HOWTO (R_PPC64_TOC16, /* type */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
964 FALSE, /* pc_relative */
966 complain_overflow_signed, /* complain_on_overflow */
967 ppc64_elf_toc_reloc, /* special_function */
968 "R_PPC64_TOC16", /* name */
969 FALSE, /* partial_inplace */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
974 /* 16 bit TOC-relative relocation without overflow. */
976 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
977 HOWTO (R_PPC64_TOC16_LO, /* type */
979 1, /* size (0 = byte, 1 = short, 2 = long) */
981 FALSE, /* pc_relative */
983 complain_overflow_dont, /* complain_on_overflow */
984 ppc64_elf_toc_reloc, /* special_function */
985 "R_PPC64_TOC16_LO", /* name */
986 FALSE, /* partial_inplace */
988 0xffff, /* dst_mask */
989 FALSE), /* pcrel_offset */
991 /* 16 bit TOC-relative relocation, high 16 bits. */
993 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
994 HOWTO (R_PPC64_TOC16_HI, /* type */
996 1, /* size (0 = byte, 1 = short, 2 = long) */
998 FALSE, /* pc_relative */
1000 complain_overflow_signed, /* complain_on_overflow */
1001 ppc64_elf_toc_reloc, /* special_function */
1002 "R_PPC64_TOC16_HI", /* name */
1003 FALSE, /* partial_inplace */
1005 0xffff, /* dst_mask */
1006 FALSE), /* pcrel_offset */
1008 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1009 contents of the low 16 bits, treated as a signed number, is
1012 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1013 HOWTO (R_PPC64_TOC16_HA, /* type */
1014 16, /* rightshift */
1015 1, /* size (0 = byte, 1 = short, 2 = long) */
1017 FALSE, /* pc_relative */
1019 complain_overflow_signed, /* complain_on_overflow */
1020 ppc64_elf_toc_ha_reloc, /* special_function */
1021 "R_PPC64_TOC16_HA", /* name */
1022 FALSE, /* partial_inplace */
1024 0xffff, /* dst_mask */
1025 FALSE), /* pcrel_offset */
1027 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1029 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1030 HOWTO (R_PPC64_TOC, /* type */
1032 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1034 FALSE, /* pc_relative */
1036 complain_overflow_dont, /* complain_on_overflow */
1037 ppc64_elf_toc64_reloc, /* special_function */
1038 "R_PPC64_TOC", /* name */
1039 FALSE, /* partial_inplace */
1041 ONES (64), /* dst_mask */
1042 FALSE), /* pcrel_offset */
1044 /* Like R_PPC64_GOT16, but also informs the link editor that the
1045 value to relocate may (!) refer to a PLT entry which the link
1046 editor (a) may replace with the symbol value. If the link editor
1047 is unable to fully resolve the symbol, it may (b) create a PLT
1048 entry and store the address to the new PLT entry in the GOT.
1049 This permits lazy resolution of function symbols at run time.
1050 The link editor may also skip all of this and just (c) emit a
1051 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1052 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1053 HOWTO (R_PPC64_PLTGOT16, /* type */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1057 FALSE, /* pc_relative */
1059 complain_overflow_signed, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLTGOT16", /* name */
1062 FALSE, /* partial_inplace */
1064 0xffff, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1067 /* Like R_PPC64_PLTGOT16, but without overflow. */
1068 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1069 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1071 1, /* size (0 = byte, 1 = short, 2 = long) */
1073 FALSE, /* pc_relative */
1075 complain_overflow_dont, /* complain_on_overflow */
1076 ppc64_elf_unhandled_reloc, /* special_function */
1077 "R_PPC64_PLTGOT16_LO", /* name */
1078 FALSE, /* partial_inplace */
1080 0xffff, /* dst_mask */
1081 FALSE), /* pcrel_offset */
1083 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1084 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1085 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1086 16, /* rightshift */
1087 1, /* size (0 = byte, 1 = short, 2 = long) */
1089 FALSE, /* pc_relative */
1091 complain_overflow_signed, /* complain_on_overflow */
1092 ppc64_elf_unhandled_reloc, /* special_function */
1093 "R_PPC64_PLTGOT16_HI", /* name */
1094 FALSE, /* partial_inplace */
1096 0xffff, /* dst_mask */
1097 FALSE), /* pcrel_offset */
1099 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1100 1 if the contents of the low 16 bits, treated as a signed number,
1102 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1103 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1104 16, /* rightshift */
1105 1, /* size (0 = byte, 1 = short, 2 = long) */
1107 FALSE, /* pc_relative */
1109 complain_overflow_signed, /* complain_on_overflow */
1110 ppc64_elf_unhandled_reloc, /* special_function */
1111 "R_PPC64_PLTGOT16_HA", /* name */
1112 FALSE, /* partial_inplace */
1114 0xffff, /* dst_mask */
1115 FALSE), /* pcrel_offset */
1117 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1118 HOWTO (R_PPC64_ADDR16_DS, /* type */
1120 1, /* size (0 = byte, 1 = short, 2 = long) */
1122 FALSE, /* pc_relative */
1124 complain_overflow_signed, /* complain_on_overflow */
1125 bfd_elf_generic_reloc, /* special_function */
1126 "R_PPC64_ADDR16_DS", /* name */
1127 FALSE, /* partial_inplace */
1129 0xfffc, /* dst_mask */
1130 FALSE), /* pcrel_offset */
1132 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1133 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1135 1, /* size (0 = byte, 1 = short, 2 = long) */
1137 FALSE, /* pc_relative */
1139 complain_overflow_dont,/* complain_on_overflow */
1140 bfd_elf_generic_reloc, /* special_function */
1141 "R_PPC64_ADDR16_LO_DS",/* name */
1142 FALSE, /* partial_inplace */
1144 0xfffc, /* dst_mask */
1145 FALSE), /* pcrel_offset */
1147 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1148 HOWTO (R_PPC64_GOT16_DS, /* type */
1150 1, /* size (0 = byte, 1 = short, 2 = long) */
1152 FALSE, /* pc_relative */
1154 complain_overflow_signed, /* complain_on_overflow */
1155 ppc64_elf_unhandled_reloc, /* special_function */
1156 "R_PPC64_GOT16_DS", /* name */
1157 FALSE, /* partial_inplace */
1159 0xfffc, /* dst_mask */
1160 FALSE), /* pcrel_offset */
1162 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1163 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1165 1, /* size (0 = byte, 1 = short, 2 = long) */
1167 FALSE, /* pc_relative */
1169 complain_overflow_dont, /* complain_on_overflow */
1170 ppc64_elf_unhandled_reloc, /* special_function */
1171 "R_PPC64_GOT16_LO_DS", /* name */
1172 FALSE, /* partial_inplace */
1174 0xfffc, /* dst_mask */
1175 FALSE), /* pcrel_offset */
1177 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1178 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1180 1, /* size (0 = byte, 1 = short, 2 = long) */
1182 FALSE, /* pc_relative */
1184 complain_overflow_dont, /* complain_on_overflow */
1185 ppc64_elf_unhandled_reloc, /* special_function */
1186 "R_PPC64_PLT16_LO_DS", /* name */
1187 FALSE, /* partial_inplace */
1189 0xfffc, /* dst_mask */
1190 FALSE), /* pcrel_offset */
1192 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1193 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1195 1, /* size (0 = byte, 1 = short, 2 = long) */
1197 FALSE, /* pc_relative */
1199 complain_overflow_signed, /* complain_on_overflow */
1200 ppc64_elf_sectoff_reloc, /* special_function */
1201 "R_PPC64_SECTOFF_DS", /* name */
1202 FALSE, /* partial_inplace */
1204 0xfffc, /* dst_mask */
1205 FALSE), /* pcrel_offset */
1207 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1208 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1212 FALSE, /* pc_relative */
1214 complain_overflow_dont, /* complain_on_overflow */
1215 ppc64_elf_sectoff_reloc, /* special_function */
1216 "R_PPC64_SECTOFF_LO_DS",/* name */
1217 FALSE, /* partial_inplace */
1219 0xfffc, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1222 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1223 HOWTO (R_PPC64_TOC16_DS, /* type */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1227 FALSE, /* pc_relative */
1229 complain_overflow_signed, /* complain_on_overflow */
1230 ppc64_elf_toc_reloc, /* special_function */
1231 "R_PPC64_TOC16_DS", /* name */
1232 FALSE, /* partial_inplace */
1234 0xfffc, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1237 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1238 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1242 FALSE, /* pc_relative */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_toc_reloc, /* special_function */
1246 "R_PPC64_TOC16_LO_DS", /* name */
1247 FALSE, /* partial_inplace */
1249 0xfffc, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1252 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1253 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1254 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1256 1, /* size (0 = byte, 1 = short, 2 = long) */
1258 FALSE, /* pc_relative */
1260 complain_overflow_signed, /* complain_on_overflow */
1261 ppc64_elf_unhandled_reloc, /* special_function */
1262 "R_PPC64_PLTGOT16_DS", /* name */
1263 FALSE, /* partial_inplace */
1265 0xfffc, /* dst_mask */
1266 FALSE), /* pcrel_offset */
1268 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1269 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1270 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1272 1, /* size (0 = byte, 1 = short, 2 = long) */
1274 FALSE, /* pc_relative */
1276 complain_overflow_dont, /* complain_on_overflow */
1277 ppc64_elf_unhandled_reloc, /* special_function */
1278 "R_PPC64_PLTGOT16_LO_DS",/* name */
1279 FALSE, /* partial_inplace */
1281 0xfffc, /* dst_mask */
1282 FALSE), /* pcrel_offset */
1284 /* Marker relocs for TLS. */
1287 2, /* size (0 = byte, 1 = short, 2 = long) */
1289 FALSE, /* pc_relative */
1291 complain_overflow_dont, /* complain_on_overflow */
1292 bfd_elf_generic_reloc, /* special_function */
1293 "R_PPC64_TLS", /* name */
1294 FALSE, /* partial_inplace */
1297 FALSE), /* pcrel_offset */
1299 HOWTO (R_PPC64_TLSGD,
1301 2, /* size (0 = byte, 1 = short, 2 = long) */
1303 FALSE, /* pc_relative */
1305 complain_overflow_dont, /* complain_on_overflow */
1306 bfd_elf_generic_reloc, /* special_function */
1307 "R_PPC64_TLSGD", /* name */
1308 FALSE, /* partial_inplace */
1311 FALSE), /* pcrel_offset */
1313 HOWTO (R_PPC64_TLSLD,
1315 2, /* size (0 = byte, 1 = short, 2 = long) */
1317 FALSE, /* pc_relative */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 bfd_elf_generic_reloc, /* special_function */
1321 "R_PPC64_TLSLD", /* name */
1322 FALSE, /* partial_inplace */
1325 FALSE), /* pcrel_offset */
1327 HOWTO (R_PPC64_TOCSAVE,
1329 2, /* size (0 = byte, 1 = short, 2 = long) */
1331 FALSE, /* pc_relative */
1333 complain_overflow_dont, /* complain_on_overflow */
1334 bfd_elf_generic_reloc, /* special_function */
1335 "R_PPC64_TOCSAVE", /* name */
1336 FALSE, /* partial_inplace */
1339 FALSE), /* pcrel_offset */
1341 /* Computes the load module index of the load module that contains the
1342 definition of its TLS sym. */
1343 HOWTO (R_PPC64_DTPMOD64,
1345 4, /* size (0 = byte, 1 = short, 2 = long) */
1347 FALSE, /* pc_relative */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPMOD64", /* name */
1352 FALSE, /* partial_inplace */
1354 ONES (64), /* dst_mask */
1355 FALSE), /* pcrel_offset */
1357 /* Computes a dtv-relative displacement, the difference between the value
1358 of sym+add and the base address of the thread-local storage block that
1359 contains the definition of sym, minus 0x8000. */
1360 HOWTO (R_PPC64_DTPREL64,
1362 4, /* size (0 = byte, 1 = short, 2 = long) */
1364 FALSE, /* pc_relative */
1366 complain_overflow_dont, /* complain_on_overflow */
1367 ppc64_elf_unhandled_reloc, /* special_function */
1368 "R_PPC64_DTPREL64", /* name */
1369 FALSE, /* partial_inplace */
1371 ONES (64), /* dst_mask */
1372 FALSE), /* pcrel_offset */
1374 /* A 16 bit dtprel reloc. */
1375 HOWTO (R_PPC64_DTPREL16,
1377 1, /* size (0 = byte, 1 = short, 2 = long) */
1379 FALSE, /* pc_relative */
1381 complain_overflow_signed, /* complain_on_overflow */
1382 ppc64_elf_unhandled_reloc, /* special_function */
1383 "R_PPC64_DTPREL16", /* name */
1384 FALSE, /* partial_inplace */
1386 0xffff, /* dst_mask */
1387 FALSE), /* pcrel_offset */
1389 /* Like DTPREL16, but no overflow. */
1390 HOWTO (R_PPC64_DTPREL16_LO,
1392 1, /* size (0 = byte, 1 = short, 2 = long) */
1394 FALSE, /* pc_relative */
1396 complain_overflow_dont, /* complain_on_overflow */
1397 ppc64_elf_unhandled_reloc, /* special_function */
1398 "R_PPC64_DTPREL16_LO", /* name */
1399 FALSE, /* partial_inplace */
1401 0xffff, /* dst_mask */
1402 FALSE), /* pcrel_offset */
1404 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1405 HOWTO (R_PPC64_DTPREL16_HI,
1406 16, /* rightshift */
1407 1, /* size (0 = byte, 1 = short, 2 = long) */
1409 FALSE, /* pc_relative */
1411 complain_overflow_signed, /* complain_on_overflow */
1412 ppc64_elf_unhandled_reloc, /* special_function */
1413 "R_PPC64_DTPREL16_HI", /* name */
1414 FALSE, /* partial_inplace */
1416 0xffff, /* dst_mask */
1417 FALSE), /* pcrel_offset */
1419 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1420 HOWTO (R_PPC64_DTPREL16_HA,
1421 16, /* rightshift */
1422 1, /* size (0 = byte, 1 = short, 2 = long) */
1424 FALSE, /* pc_relative */
1426 complain_overflow_signed, /* complain_on_overflow */
1427 ppc64_elf_unhandled_reloc, /* special_function */
1428 "R_PPC64_DTPREL16_HA", /* name */
1429 FALSE, /* partial_inplace */
1431 0xffff, /* dst_mask */
1432 FALSE), /* pcrel_offset */
1434 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1435 HOWTO (R_PPC64_DTPREL16_HIGHER,
1436 32, /* rightshift */
1437 1, /* size (0 = byte, 1 = short, 2 = long) */
1439 FALSE, /* pc_relative */
1441 complain_overflow_dont, /* complain_on_overflow */
1442 ppc64_elf_unhandled_reloc, /* special_function */
1443 "R_PPC64_DTPREL16_HIGHER", /* name */
1444 FALSE, /* partial_inplace */
1446 0xffff, /* dst_mask */
1447 FALSE), /* pcrel_offset */
1449 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1450 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1451 32, /* rightshift */
1452 1, /* size (0 = byte, 1 = short, 2 = long) */
1454 FALSE, /* pc_relative */
1456 complain_overflow_dont, /* complain_on_overflow */
1457 ppc64_elf_unhandled_reloc, /* special_function */
1458 "R_PPC64_DTPREL16_HIGHERA", /* name */
1459 FALSE, /* partial_inplace */
1461 0xffff, /* dst_mask */
1462 FALSE), /* pcrel_offset */
1464 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1465 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1466 48, /* rightshift */
1467 1, /* size (0 = byte, 1 = short, 2 = long) */
1469 FALSE, /* pc_relative */
1471 complain_overflow_dont, /* complain_on_overflow */
1472 ppc64_elf_unhandled_reloc, /* special_function */
1473 "R_PPC64_DTPREL16_HIGHEST", /* name */
1474 FALSE, /* partial_inplace */
1476 0xffff, /* dst_mask */
1477 FALSE), /* pcrel_offset */
1479 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1480 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1481 48, /* rightshift */
1482 1, /* size (0 = byte, 1 = short, 2 = long) */
1484 FALSE, /* pc_relative */
1486 complain_overflow_dont, /* complain_on_overflow */
1487 ppc64_elf_unhandled_reloc, /* special_function */
1488 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1489 FALSE, /* partial_inplace */
1491 0xffff, /* dst_mask */
1492 FALSE), /* pcrel_offset */
1494 /* Like DTPREL16, but for insns with a DS field. */
1495 HOWTO (R_PPC64_DTPREL16_DS,
1497 1, /* size (0 = byte, 1 = short, 2 = long) */
1499 FALSE, /* pc_relative */
1501 complain_overflow_signed, /* complain_on_overflow */
1502 ppc64_elf_unhandled_reloc, /* special_function */
1503 "R_PPC64_DTPREL16_DS", /* name */
1504 FALSE, /* partial_inplace */
1506 0xfffc, /* dst_mask */
1507 FALSE), /* pcrel_offset */
1509 /* Like DTPREL16_DS, but no overflow. */
1510 HOWTO (R_PPC64_DTPREL16_LO_DS,
1512 1, /* size (0 = byte, 1 = short, 2 = long) */
1514 FALSE, /* pc_relative */
1516 complain_overflow_dont, /* complain_on_overflow */
1517 ppc64_elf_unhandled_reloc, /* special_function */
1518 "R_PPC64_DTPREL16_LO_DS", /* name */
1519 FALSE, /* partial_inplace */
1521 0xfffc, /* dst_mask */
1522 FALSE), /* pcrel_offset */
1524 /* Computes a tp-relative displacement, the difference between the value of
1525 sym+add and the value of the thread pointer (r13). */
1526 HOWTO (R_PPC64_TPREL64,
1528 4, /* size (0 = byte, 1 = short, 2 = long) */
1530 FALSE, /* pc_relative */
1532 complain_overflow_dont, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_TPREL64", /* name */
1535 FALSE, /* partial_inplace */
1537 ONES (64), /* dst_mask */
1538 FALSE), /* pcrel_offset */
1540 /* A 16 bit tprel reloc. */
1541 HOWTO (R_PPC64_TPREL16,
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1545 FALSE, /* pc_relative */
1547 complain_overflow_signed, /* complain_on_overflow */
1548 ppc64_elf_unhandled_reloc, /* special_function */
1549 "R_PPC64_TPREL16", /* name */
1550 FALSE, /* partial_inplace */
1552 0xffff, /* dst_mask */
1553 FALSE), /* pcrel_offset */
1555 /* Like TPREL16, but no overflow. */
1556 HOWTO (R_PPC64_TPREL16_LO,
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1560 FALSE, /* pc_relative */
1562 complain_overflow_dont, /* complain_on_overflow */
1563 ppc64_elf_unhandled_reloc, /* special_function */
1564 "R_PPC64_TPREL16_LO", /* name */
1565 FALSE, /* partial_inplace */
1567 0xffff, /* dst_mask */
1568 FALSE), /* pcrel_offset */
1570 /* Like TPREL16_LO, but next higher group of 16 bits. */
1571 HOWTO (R_PPC64_TPREL16_HI,
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1575 FALSE, /* pc_relative */
1577 complain_overflow_signed, /* complain_on_overflow */
1578 ppc64_elf_unhandled_reloc, /* special_function */
1579 "R_PPC64_TPREL16_HI", /* name */
1580 FALSE, /* partial_inplace */
1582 0xffff, /* dst_mask */
1583 FALSE), /* pcrel_offset */
1585 /* Like TPREL16_HI, but adjust for low 16 bits. */
1586 HOWTO (R_PPC64_TPREL16_HA,
1587 16, /* rightshift */
1588 1, /* size (0 = byte, 1 = short, 2 = long) */
1590 FALSE, /* pc_relative */
1592 complain_overflow_signed, /* complain_on_overflow */
1593 ppc64_elf_unhandled_reloc, /* special_function */
1594 "R_PPC64_TPREL16_HA", /* name */
1595 FALSE, /* partial_inplace */
1597 0xffff, /* dst_mask */
1598 FALSE), /* pcrel_offset */
1600 /* Like TPREL16_HI, but next higher group of 16 bits. */
1601 HOWTO (R_PPC64_TPREL16_HIGHER,
1602 32, /* rightshift */
1603 1, /* size (0 = byte, 1 = short, 2 = long) */
1605 FALSE, /* pc_relative */
1607 complain_overflow_dont, /* complain_on_overflow */
1608 ppc64_elf_unhandled_reloc, /* special_function */
1609 "R_PPC64_TPREL16_HIGHER", /* name */
1610 FALSE, /* partial_inplace */
1612 0xffff, /* dst_mask */
1613 FALSE), /* pcrel_offset */
1615 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1616 HOWTO (R_PPC64_TPREL16_HIGHERA,
1617 32, /* rightshift */
1618 1, /* size (0 = byte, 1 = short, 2 = long) */
1620 FALSE, /* pc_relative */
1622 complain_overflow_dont, /* complain_on_overflow */
1623 ppc64_elf_unhandled_reloc, /* special_function */
1624 "R_PPC64_TPREL16_HIGHERA", /* name */
1625 FALSE, /* partial_inplace */
1627 0xffff, /* dst_mask */
1628 FALSE), /* pcrel_offset */
1630 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1631 HOWTO (R_PPC64_TPREL16_HIGHEST,
1632 48, /* rightshift */
1633 1, /* size (0 = byte, 1 = short, 2 = long) */
1635 FALSE, /* pc_relative */
1637 complain_overflow_dont, /* complain_on_overflow */
1638 ppc64_elf_unhandled_reloc, /* special_function */
1639 "R_PPC64_TPREL16_HIGHEST", /* name */
1640 FALSE, /* partial_inplace */
1642 0xffff, /* dst_mask */
1643 FALSE), /* pcrel_offset */
1645 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1646 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1647 48, /* rightshift */
1648 1, /* size (0 = byte, 1 = short, 2 = long) */
1650 FALSE, /* pc_relative */
1652 complain_overflow_dont, /* complain_on_overflow */
1653 ppc64_elf_unhandled_reloc, /* special_function */
1654 "R_PPC64_TPREL16_HIGHESTA", /* name */
1655 FALSE, /* partial_inplace */
1657 0xffff, /* dst_mask */
1658 FALSE), /* pcrel_offset */
1660 /* Like TPREL16, but for insns with a DS field. */
1661 HOWTO (R_PPC64_TPREL16_DS,
1663 1, /* size (0 = byte, 1 = short, 2 = long) */
1665 FALSE, /* pc_relative */
1667 complain_overflow_signed, /* complain_on_overflow */
1668 ppc64_elf_unhandled_reloc, /* special_function */
1669 "R_PPC64_TPREL16_DS", /* name */
1670 FALSE, /* partial_inplace */
1672 0xfffc, /* dst_mask */
1673 FALSE), /* pcrel_offset */
1675 /* Like TPREL16_DS, but no overflow. */
1676 HOWTO (R_PPC64_TPREL16_LO_DS,
1678 1, /* size (0 = byte, 1 = short, 2 = long) */
1680 FALSE, /* pc_relative */
1682 complain_overflow_dont, /* complain_on_overflow */
1683 ppc64_elf_unhandled_reloc, /* special_function */
1684 "R_PPC64_TPREL16_LO_DS", /* name */
1685 FALSE, /* partial_inplace */
1687 0xfffc, /* dst_mask */
1688 FALSE), /* pcrel_offset */
1690 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1691 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1692 to the first entry relative to the TOC base (r2). */
1693 HOWTO (R_PPC64_GOT_TLSGD16,
1695 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 FALSE, /* pc_relative */
1699 complain_overflow_signed, /* complain_on_overflow */
1700 ppc64_elf_unhandled_reloc, /* special_function */
1701 "R_PPC64_GOT_TLSGD16", /* name */
1702 FALSE, /* partial_inplace */
1704 0xffff, /* dst_mask */
1705 FALSE), /* pcrel_offset */
1707 /* Like GOT_TLSGD16, but no overflow. */
1708 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1710 1, /* size (0 = byte, 1 = short, 2 = long) */
1712 FALSE, /* pc_relative */
1714 complain_overflow_dont, /* complain_on_overflow */
1715 ppc64_elf_unhandled_reloc, /* special_function */
1716 "R_PPC64_GOT_TLSGD16_LO", /* name */
1717 FALSE, /* partial_inplace */
1719 0xffff, /* dst_mask */
1720 FALSE), /* pcrel_offset */
1722 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1723 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1724 16, /* rightshift */
1725 1, /* size (0 = byte, 1 = short, 2 = long) */
1727 FALSE, /* pc_relative */
1729 complain_overflow_signed, /* complain_on_overflow */
1730 ppc64_elf_unhandled_reloc, /* special_function */
1731 "R_PPC64_GOT_TLSGD16_HI", /* name */
1732 FALSE, /* partial_inplace */
1734 0xffff, /* dst_mask */
1735 FALSE), /* pcrel_offset */
1737 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1738 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1739 16, /* rightshift */
1740 1, /* size (0 = byte, 1 = short, 2 = long) */
1742 FALSE, /* pc_relative */
1744 complain_overflow_signed, /* complain_on_overflow */
1745 ppc64_elf_unhandled_reloc, /* special_function */
1746 "R_PPC64_GOT_TLSGD16_HA", /* name */
1747 FALSE, /* partial_inplace */
1749 0xffff, /* dst_mask */
1750 FALSE), /* pcrel_offset */
1752 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1753 with values (sym+add)@dtpmod and zero, and computes the offset to the
1754 first entry relative to the TOC base (r2). */
1755 HOWTO (R_PPC64_GOT_TLSLD16,
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1759 FALSE, /* pc_relative */
1761 complain_overflow_signed, /* complain_on_overflow */
1762 ppc64_elf_unhandled_reloc, /* special_function */
1763 "R_PPC64_GOT_TLSLD16", /* name */
1764 FALSE, /* partial_inplace */
1766 0xffff, /* dst_mask */
1767 FALSE), /* pcrel_offset */
1769 /* Like GOT_TLSLD16, but no overflow. */
1770 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1772 1, /* size (0 = byte, 1 = short, 2 = long) */
1774 FALSE, /* pc_relative */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 ppc64_elf_unhandled_reloc, /* special_function */
1778 "R_PPC64_GOT_TLSLD16_LO", /* name */
1779 FALSE, /* partial_inplace */
1781 0xffff, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1784 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1785 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1786 16, /* rightshift */
1787 1, /* size (0 = byte, 1 = short, 2 = long) */
1789 FALSE, /* pc_relative */
1791 complain_overflow_signed, /* complain_on_overflow */
1792 ppc64_elf_unhandled_reloc, /* special_function */
1793 "R_PPC64_GOT_TLSLD16_HI", /* name */
1794 FALSE, /* partial_inplace */
1796 0xffff, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1799 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1800 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1801 16, /* rightshift */
1802 1, /* size (0 = byte, 1 = short, 2 = long) */
1804 FALSE, /* pc_relative */
1806 complain_overflow_signed, /* complain_on_overflow */
1807 ppc64_elf_unhandled_reloc, /* special_function */
1808 "R_PPC64_GOT_TLSLD16_HA", /* name */
1809 FALSE, /* partial_inplace */
1811 0xffff, /* dst_mask */
1812 FALSE), /* pcrel_offset */
1814 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1815 the offset to the entry relative to the TOC base (r2). */
1816 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1818 1, /* size (0 = byte, 1 = short, 2 = long) */
1820 FALSE, /* pc_relative */
1822 complain_overflow_signed, /* complain_on_overflow */
1823 ppc64_elf_unhandled_reloc, /* special_function */
1824 "R_PPC64_GOT_DTPREL16_DS", /* name */
1825 FALSE, /* partial_inplace */
1827 0xfffc, /* dst_mask */
1828 FALSE), /* pcrel_offset */
1830 /* Like GOT_DTPREL16_DS, but no overflow. */
1831 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1833 1, /* size (0 = byte, 1 = short, 2 = long) */
1835 FALSE, /* pc_relative */
1837 complain_overflow_dont, /* complain_on_overflow */
1838 ppc64_elf_unhandled_reloc, /* special_function */
1839 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1840 FALSE, /* partial_inplace */
1842 0xfffc, /* dst_mask */
1843 FALSE), /* pcrel_offset */
1845 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1846 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1847 16, /* rightshift */
1848 1, /* size (0 = byte, 1 = short, 2 = long) */
1850 FALSE, /* pc_relative */
1852 complain_overflow_signed, /* complain_on_overflow */
1853 ppc64_elf_unhandled_reloc, /* special_function */
1854 "R_PPC64_GOT_DTPREL16_HI", /* name */
1855 FALSE, /* partial_inplace */
1857 0xffff, /* dst_mask */
1858 FALSE), /* pcrel_offset */
1860 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1861 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1862 16, /* rightshift */
1863 1, /* size (0 = byte, 1 = short, 2 = long) */
1865 FALSE, /* pc_relative */
1867 complain_overflow_signed, /* complain_on_overflow */
1868 ppc64_elf_unhandled_reloc, /* special_function */
1869 "R_PPC64_GOT_DTPREL16_HA", /* name */
1870 FALSE, /* partial_inplace */
1872 0xffff, /* dst_mask */
1873 FALSE), /* pcrel_offset */
1875 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1876 offset to the entry relative to the TOC base (r2). */
1877 HOWTO (R_PPC64_GOT_TPREL16_DS,
1879 1, /* size (0 = byte, 1 = short, 2 = long) */
1881 FALSE, /* pc_relative */
1883 complain_overflow_signed, /* complain_on_overflow */
1884 ppc64_elf_unhandled_reloc, /* special_function */
1885 "R_PPC64_GOT_TPREL16_DS", /* name */
1886 FALSE, /* partial_inplace */
1888 0xfffc, /* dst_mask */
1889 FALSE), /* pcrel_offset */
1891 /* Like GOT_TPREL16_DS, but no overflow. */
1892 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1894 1, /* size (0 = byte, 1 = short, 2 = long) */
1896 FALSE, /* pc_relative */
1898 complain_overflow_dont, /* complain_on_overflow */
1899 ppc64_elf_unhandled_reloc, /* special_function */
1900 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1901 FALSE, /* partial_inplace */
1903 0xfffc, /* dst_mask */
1904 FALSE), /* pcrel_offset */
1906 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1907 HOWTO (R_PPC64_GOT_TPREL16_HI,
1908 16, /* rightshift */
1909 1, /* size (0 = byte, 1 = short, 2 = long) */
1911 FALSE, /* pc_relative */
1913 complain_overflow_signed, /* complain_on_overflow */
1914 ppc64_elf_unhandled_reloc, /* special_function */
1915 "R_PPC64_GOT_TPREL16_HI", /* name */
1916 FALSE, /* partial_inplace */
1918 0xffff, /* dst_mask */
1919 FALSE), /* pcrel_offset */
1921 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1922 HOWTO (R_PPC64_GOT_TPREL16_HA,
1923 16, /* rightshift */
1924 1, /* size (0 = byte, 1 = short, 2 = long) */
1926 FALSE, /* pc_relative */
1928 complain_overflow_signed, /* complain_on_overflow */
1929 ppc64_elf_unhandled_reloc, /* special_function */
1930 "R_PPC64_GOT_TPREL16_HA", /* name */
1931 FALSE, /* partial_inplace */
1933 0xffff, /* dst_mask */
1934 FALSE), /* pcrel_offset */
1936 HOWTO (R_PPC64_JMP_IREL, /* type */
1938 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1940 FALSE, /* pc_relative */
1942 complain_overflow_dont, /* complain_on_overflow */
1943 ppc64_elf_unhandled_reloc, /* special_function */
1944 "R_PPC64_JMP_IREL", /* name */
1945 FALSE, /* partial_inplace */
1948 FALSE), /* pcrel_offset */
1950 HOWTO (R_PPC64_IRELATIVE, /* type */
1952 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1954 FALSE, /* pc_relative */
1956 complain_overflow_dont, /* complain_on_overflow */
1957 bfd_elf_generic_reloc, /* special_function */
1958 "R_PPC64_IRELATIVE", /* name */
1959 FALSE, /* partial_inplace */
1961 ONES (64), /* dst_mask */
1962 FALSE), /* pcrel_offset */
1964 /* A 16 bit relative relocation. */
1965 HOWTO (R_PPC64_REL16, /* type */
1967 1, /* size (0 = byte, 1 = short, 2 = long) */
1969 TRUE, /* pc_relative */
1971 complain_overflow_signed, /* complain_on_overflow */
1972 bfd_elf_generic_reloc, /* special_function */
1973 "R_PPC64_REL16", /* name */
1974 FALSE, /* partial_inplace */
1976 0xffff, /* dst_mask */
1977 TRUE), /* pcrel_offset */
1979 /* A 16 bit relative relocation without overflow. */
1980 HOWTO (R_PPC64_REL16_LO, /* type */
1982 1, /* size (0 = byte, 1 = short, 2 = long) */
1984 TRUE, /* pc_relative */
1986 complain_overflow_dont,/* complain_on_overflow */
1987 bfd_elf_generic_reloc, /* special_function */
1988 "R_PPC64_REL16_LO", /* name */
1989 FALSE, /* partial_inplace */
1991 0xffff, /* dst_mask */
1992 TRUE), /* pcrel_offset */
1994 /* The high order 16 bits of a relative address. */
1995 HOWTO (R_PPC64_REL16_HI, /* type */
1996 16, /* rightshift */
1997 1, /* size (0 = byte, 1 = short, 2 = long) */
1999 TRUE, /* pc_relative */
2001 complain_overflow_signed, /* complain_on_overflow */
2002 bfd_elf_generic_reloc, /* special_function */
2003 "R_PPC64_REL16_HI", /* name */
2004 FALSE, /* partial_inplace */
2006 0xffff, /* dst_mask */
2007 TRUE), /* pcrel_offset */
2009 /* The high order 16 bits of a relative address, plus 1 if the contents of
2010 the low 16 bits, treated as a signed number, is negative. */
2011 HOWTO (R_PPC64_REL16_HA, /* type */
2012 16, /* rightshift */
2013 1, /* size (0 = byte, 1 = short, 2 = long) */
2015 TRUE, /* pc_relative */
2017 complain_overflow_signed, /* complain_on_overflow */
2018 ppc64_elf_ha_reloc, /* special_function */
2019 "R_PPC64_REL16_HA", /* name */
2020 FALSE, /* partial_inplace */
2022 0xffff, /* dst_mask */
2023 TRUE), /* pcrel_offset */
2025 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2026 HOWTO (R_PPC64_REL16DX_HA, /* type */
2027 16, /* rightshift */
2028 2, /* size (0 = byte, 1 = short, 2 = long) */
2030 TRUE, /* pc_relative */
2032 complain_overflow_signed, /* complain_on_overflow */
2033 ppc64_elf_ha_reloc, /* special_function */
2034 "R_PPC64_REL16DX_HA", /* name */
2035 FALSE, /* partial_inplace */
2037 0x1fffc1, /* dst_mask */
2038 TRUE), /* pcrel_offset */
2040 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2041 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2042 16, /* rightshift */
2043 1, /* size (0 = byte, 1 = short, 2 = long) */
2045 FALSE, /* pc_relative */
2047 complain_overflow_dont, /* complain_on_overflow */
2048 bfd_elf_generic_reloc, /* special_function */
2049 "R_PPC64_ADDR16_HIGH", /* name */
2050 FALSE, /* partial_inplace */
2052 0xffff, /* dst_mask */
2053 FALSE), /* pcrel_offset */
2055 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2056 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2057 16, /* rightshift */
2058 1, /* size (0 = byte, 1 = short, 2 = long) */
2060 FALSE, /* pc_relative */
2062 complain_overflow_dont, /* complain_on_overflow */
2063 ppc64_elf_ha_reloc, /* special_function */
2064 "R_PPC64_ADDR16_HIGHA", /* name */
2065 FALSE, /* partial_inplace */
2067 0xffff, /* dst_mask */
2068 FALSE), /* pcrel_offset */
2070 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2071 HOWTO (R_PPC64_DTPREL16_HIGH,
2072 16, /* rightshift */
2073 1, /* size (0 = byte, 1 = short, 2 = long) */
2075 FALSE, /* pc_relative */
2077 complain_overflow_dont, /* complain_on_overflow */
2078 ppc64_elf_unhandled_reloc, /* special_function */
2079 "R_PPC64_DTPREL16_HIGH", /* name */
2080 FALSE, /* partial_inplace */
2082 0xffff, /* dst_mask */
2083 FALSE), /* pcrel_offset */
2085 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2086 HOWTO (R_PPC64_DTPREL16_HIGHA,
2087 16, /* rightshift */
2088 1, /* size (0 = byte, 1 = short, 2 = long) */
2090 FALSE, /* pc_relative */
2092 complain_overflow_dont, /* complain_on_overflow */
2093 ppc64_elf_unhandled_reloc, /* special_function */
2094 "R_PPC64_DTPREL16_HIGHA", /* name */
2095 FALSE, /* partial_inplace */
2097 0xffff, /* dst_mask */
2098 FALSE), /* pcrel_offset */
2100 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2101 HOWTO (R_PPC64_TPREL16_HIGH,
2102 16, /* rightshift */
2103 1, /* size (0 = byte, 1 = short, 2 = long) */
2105 FALSE, /* pc_relative */
2107 complain_overflow_dont, /* complain_on_overflow */
2108 ppc64_elf_unhandled_reloc, /* special_function */
2109 "R_PPC64_TPREL16_HIGH", /* name */
2110 FALSE, /* partial_inplace */
2112 0xffff, /* dst_mask */
2113 FALSE), /* pcrel_offset */
2115 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2116 HOWTO (R_PPC64_TPREL16_HIGHA,
2117 16, /* rightshift */
2118 1, /* size (0 = byte, 1 = short, 2 = long) */
2120 FALSE, /* pc_relative */
2122 complain_overflow_dont, /* complain_on_overflow */
2123 ppc64_elf_unhandled_reloc, /* special_function */
2124 "R_PPC64_TPREL16_HIGHA", /* name */
2125 FALSE, /* partial_inplace */
2127 0xffff, /* dst_mask */
2128 FALSE), /* pcrel_offset */
2130 /* Like ADDR64, but use local entry point of function. */
2131 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2133 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2135 FALSE, /* pc_relative */
2137 complain_overflow_dont, /* complain_on_overflow */
2138 bfd_elf_generic_reloc, /* special_function */
2139 "R_PPC64_ADDR64_LOCAL", /* name */
2140 FALSE, /* partial_inplace */
2142 ONES (64), /* dst_mask */
2143 FALSE), /* pcrel_offset */
2145 /* GNU extension to record C++ vtable hierarchy. */
2146 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2148 0, /* size (0 = byte, 1 = short, 2 = long) */
2150 FALSE, /* pc_relative */
2152 complain_overflow_dont, /* complain_on_overflow */
2153 NULL, /* special_function */
2154 "R_PPC64_GNU_VTINHERIT", /* name */
2155 FALSE, /* partial_inplace */
2158 FALSE), /* pcrel_offset */
2160 /* GNU extension to record C++ vtable member usage. */
2161 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2163 0, /* size (0 = byte, 1 = short, 2 = long) */
2165 FALSE, /* pc_relative */
2167 complain_overflow_dont, /* complain_on_overflow */
2168 NULL, /* special_function */
2169 "R_PPC64_GNU_VTENTRY", /* name */
2170 FALSE, /* partial_inplace */
2173 FALSE), /* pcrel_offset */
2177 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
2181 ppc_howto_init (void)
2183 unsigned int i, type;
2185 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2187 type = ppc64_elf_howto_raw[i].type;
2188 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
2189 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2193 static reloc_howto_type *
2194 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2195 bfd_reloc_code_real_type code)
2197 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
2199 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2200 /* Initialize howto table if needed. */
2208 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2210 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2212 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2214 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2216 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2218 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2220 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2222 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
2224 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2226 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
2228 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
2230 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
2232 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
2234 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
2236 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
2238 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
2240 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
2242 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
2244 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
2246 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
2248 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
2250 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
2252 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
2254 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
2256 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
2258 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
2260 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
2262 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
2264 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
2266 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
2268 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
2270 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
2272 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
2274 case BFD_RELOC_64: r = R_PPC64_ADDR64;
2276 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
2278 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
2280 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
2282 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
2284 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
2286 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
2288 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
2290 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
2292 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
2294 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
2296 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
2298 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2300 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2302 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2304 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2306 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2308 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2310 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2312 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2314 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2316 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2318 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2320 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2322 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2324 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2326 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2328 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2330 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2332 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2334 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2336 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2338 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2340 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2342 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2344 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2346 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2348 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2350 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2352 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2354 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2356 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2358 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2360 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2362 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2364 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2366 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2368 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2370 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2372 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2374 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2376 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2378 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2380 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2382 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2384 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2386 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2388 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2390 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2392 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2394 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2396 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2398 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2400 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2402 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2404 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2406 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2408 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2410 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2412 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2414 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2416 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2418 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2420 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2422 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2424 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2426 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2428 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2430 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2432 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2434 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2436 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2440 return ppc64_elf_howto_table[r];
2443 static reloc_howto_type *
2444 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2449 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2450 if (ppc64_elf_howto_raw[i].name != NULL
2451 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2452 return &ppc64_elf_howto_raw[i];
2457 /* Set the howto pointer for a PowerPC ELF reloc. */
2460 ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2461 Elf_Internal_Rela *dst)
2465 /* Initialize howto table if needed. */
2466 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2469 type = ELF64_R_TYPE (dst->r_info);
2470 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
2472 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
2474 type = R_PPC64_NONE;
2476 cache_ptr->howto = ppc64_elf_howto_table[type];
2479 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2481 static bfd_reloc_status_type
2482 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2483 void *data, asection *input_section,
2484 bfd *output_bfd, char **error_message)
2486 enum elf_ppc64_reloc_type r_type;
2488 bfd_size_type octets;
2491 /* If this is a relocatable link (output_bfd test tells us), just
2492 call the generic function. Any adjustment will be done at final
2494 if (output_bfd != NULL)
2495 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2496 input_section, output_bfd, error_message);
2498 /* Adjust the addend for sign extension of the low 16 bits.
2499 We won't actually be using the low 16 bits, so trashing them
2501 reloc_entry->addend += 0x8000;
2502 r_type = reloc_entry->howto->type;
2503 if (r_type != R_PPC64_REL16DX_HA)
2504 return bfd_reloc_continue;
2507 if (!bfd_is_com_section (symbol->section))
2508 value = symbol->value;
2509 value += (reloc_entry->addend
2510 + symbol->section->output_offset
2511 + symbol->section->output_section->vma);
2512 value -= (reloc_entry->address
2513 + input_section->output_offset
2514 + input_section->output_section->vma);
2515 value = (bfd_signed_vma) value >> 16;
2517 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2518 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2520 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2521 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2522 if (value + 0x8000 > 0xffff)
2523 return bfd_reloc_overflow;
2524 return bfd_reloc_ok;
2527 static bfd_reloc_status_type
2528 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2529 void *data, asection *input_section,
2530 bfd *output_bfd, char **error_message)
2532 if (output_bfd != NULL)
2533 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2534 input_section, output_bfd, error_message);
2536 if (strcmp (symbol->section->name, ".opd") == 0
2537 && (symbol->section->owner->flags & DYNAMIC) == 0)
2539 bfd_vma dest = opd_entry_value (symbol->section,
2540 symbol->value + reloc_entry->addend,
2542 if (dest != (bfd_vma) -1)
2543 reloc_entry->addend = dest - (symbol->value
2544 + symbol->section->output_section->vma
2545 + symbol->section->output_offset);
2549 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2551 if (symbol->section->owner != abfd
2552 && abiversion (symbol->section->owner) >= 2)
2556 for (i = 0; i < symbol->section->owner->symcount; ++i)
2558 asymbol *symdef = symbol->section->owner->outsymbols[i];
2560 if (strcmp (symdef->name, symbol->name) == 0)
2562 elfsym = (elf_symbol_type *) symdef;
2568 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2570 return bfd_reloc_continue;
2573 static bfd_reloc_status_type
2574 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2575 void *data, asection *input_section,
2576 bfd *output_bfd, char **error_message)
2579 enum elf_ppc64_reloc_type r_type;
2580 bfd_size_type octets;
2581 /* Assume 'at' branch hints. */
2582 bfd_boolean is_isa_v2 = TRUE;
2584 /* If this is a relocatable link (output_bfd test tells us), just
2585 call the generic function. Any adjustment will be done at final
2587 if (output_bfd != NULL)
2588 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2589 input_section, output_bfd, error_message);
2591 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2592 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2593 insn &= ~(0x01 << 21);
2594 r_type = reloc_entry->howto->type;
2595 if (r_type == R_PPC64_ADDR14_BRTAKEN
2596 || r_type == R_PPC64_REL14_BRTAKEN)
2597 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2601 /* Set 'a' bit. This is 0b00010 in BO field for branch
2602 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2603 for branch on CTR insns (BO == 1a00t or 1a01t). */
2604 if ((insn & (0x14 << 21)) == (0x04 << 21))
2606 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2616 if (!bfd_is_com_section (symbol->section))
2617 target = symbol->value;
2618 target += symbol->section->output_section->vma;
2619 target += symbol->section->output_offset;
2620 target += reloc_entry->addend;
2622 from = (reloc_entry->address
2623 + input_section->output_offset
2624 + input_section->output_section->vma);
2626 /* Invert 'y' bit if not the default. */
2627 if ((bfd_signed_vma) (target - from) < 0)
2630 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2632 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2633 input_section, output_bfd, error_message);
2636 static bfd_reloc_status_type
2637 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2638 void *data, asection *input_section,
2639 bfd *output_bfd, char **error_message)
2641 /* If this is a relocatable link (output_bfd test tells us), just
2642 call the generic function. Any adjustment will be done at final
2644 if (output_bfd != NULL)
2645 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2646 input_section, output_bfd, error_message);
2648 /* Subtract the symbol section base address. */
2649 reloc_entry->addend -= symbol->section->output_section->vma;
2650 return bfd_reloc_continue;
2653 static bfd_reloc_status_type
2654 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2655 void *data, asection *input_section,
2656 bfd *output_bfd, char **error_message)
2658 /* If this is a relocatable link (output_bfd test tells us), just
2659 call the generic function. Any adjustment will be done at final
2661 if (output_bfd != NULL)
2662 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2663 input_section, output_bfd, error_message);
2665 /* Subtract the symbol section base address. */
2666 reloc_entry->addend -= symbol->section->output_section->vma;
2668 /* Adjust the addend for sign extension of the low 16 bits. */
2669 reloc_entry->addend += 0x8000;
2670 return bfd_reloc_continue;
2673 static bfd_reloc_status_type
2674 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2675 void *data, asection *input_section,
2676 bfd *output_bfd, char **error_message)
2680 /* If this is a relocatable link (output_bfd test tells us), just
2681 call the generic function. Any adjustment will be done at final
2683 if (output_bfd != NULL)
2684 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2685 input_section, output_bfd, error_message);
2687 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2689 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2691 /* Subtract the TOC base address. */
2692 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2693 return bfd_reloc_continue;
2696 static bfd_reloc_status_type
2697 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2698 void *data, asection *input_section,
2699 bfd *output_bfd, char **error_message)
2703 /* If this is a relocatable link (output_bfd test tells us), just
2704 call the generic function. Any adjustment will be done at final
2706 if (output_bfd != NULL)
2707 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2708 input_section, output_bfd, error_message);
2710 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2712 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2714 /* Subtract the TOC base address. */
2715 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2717 /* Adjust the addend for sign extension of the low 16 bits. */
2718 reloc_entry->addend += 0x8000;
2719 return bfd_reloc_continue;
2722 static bfd_reloc_status_type
2723 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2724 void *data, asection *input_section,
2725 bfd *output_bfd, char **error_message)
2728 bfd_size_type octets;
2730 /* If this is a relocatable link (output_bfd test tells us), just
2731 call the generic function. Any adjustment will be done at final
2733 if (output_bfd != NULL)
2734 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2735 input_section, output_bfd, error_message);
2737 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2739 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2741 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2742 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2743 return bfd_reloc_ok;
2746 static bfd_reloc_status_type
2747 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2748 void *data, asection *input_section,
2749 bfd *output_bfd, char **error_message)
2751 /* If this is a relocatable link (output_bfd test tells us), just
2752 call the generic function. Any adjustment will be done at final
2754 if (output_bfd != NULL)
2755 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2756 input_section, output_bfd, error_message);
2758 if (error_message != NULL)
2760 static char buf[60];
2761 sprintf (buf, "generic linker can't handle %s",
2762 reloc_entry->howto->name);
2763 *error_message = buf;
2765 return bfd_reloc_dangerous;
2768 /* Track GOT entries needed for a given symbol. We might need more
2769 than one got entry per symbol. */
2772 struct got_entry *next;
2774 /* The symbol addend that we'll be placing in the GOT. */
2777 /* Unlike other ELF targets, we use separate GOT entries for the same
2778 symbol referenced from different input files. This is to support
2779 automatic multiple TOC/GOT sections, where the TOC base can vary
2780 from one input file to another. After partitioning into TOC groups
2781 we merge entries within the group.
2783 Point to the BFD owning this GOT entry. */
2786 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2787 TLS_TPREL or TLS_DTPREL for tls entries. */
2788 unsigned char tls_type;
2790 /* Non-zero if got.ent points to real entry. */
2791 unsigned char is_indirect;
2793 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2796 bfd_signed_vma refcount;
2798 struct got_entry *ent;
2802 /* The same for PLT. */
2805 struct plt_entry *next;
2811 bfd_signed_vma refcount;
2816 struct ppc64_elf_obj_tdata
2818 struct elf_obj_tdata elf;
2820 /* Shortcuts to dynamic linker sections. */
2824 /* Used during garbage collection. We attach global symbols defined
2825 on removed .opd entries to this section so that the sym is removed. */
2826 asection *deleted_section;
2828 /* TLS local dynamic got entry handling. Support for multiple GOT
2829 sections means we potentially need one of these for each input bfd. */
2830 struct got_entry tlsld_got;
2833 /* A copy of relocs before they are modified for --emit-relocs. */
2834 Elf_Internal_Rela *relocs;
2836 /* Section contents. */
2840 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2841 the reloc to be in the range -32768 to 32767. */
2842 unsigned int has_small_toc_reloc : 1;
2844 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2845 instruction not one we handle. */
2846 unsigned int unexpected_toc_insn : 1;
2849 #define ppc64_elf_tdata(bfd) \
2850 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2852 #define ppc64_tlsld_got(bfd) \
2853 (&ppc64_elf_tdata (bfd)->tlsld_got)
2855 #define is_ppc64_elf(bfd) \
2856 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2857 && elf_object_id (bfd) == PPC64_ELF_DATA)
2859 /* Override the generic function because we store some extras. */
2862 ppc64_elf_mkobject (bfd *abfd)
2864 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
2868 /* Fix bad default arch selected for a 64 bit input bfd when the
2869 default is 32 bit. */
2872 ppc64_elf_object_p (bfd *abfd)
2874 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2876 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2878 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2880 /* Relies on arch after 32 bit default being 64 bit default. */
2881 abfd->arch_info = abfd->arch_info->next;
2882 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2888 /* Support for core dump NOTE sections. */
2891 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2893 size_t offset, size;
2895 if (note->descsz != 504)
2899 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2902 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
2908 /* Make a ".reg/999" section. */
2909 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2910 size, note->descpos + offset);
2914 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2916 if (note->descsz != 136)
2919 elf_tdata (abfd)->core->pid
2920 = bfd_get_32 (abfd, note->descdata + 24);
2921 elf_tdata (abfd)->core->program
2922 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2923 elf_tdata (abfd)->core->command
2924 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2930 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2943 va_start (ap, note_type);
2944 memset (data, 0, sizeof (data));
2945 strncpy (data + 40, va_arg (ap, const char *), 16);
2946 strncpy (data + 56, va_arg (ap, const char *), 80);
2948 return elfcore_write_note (abfd, buf, bufsiz,
2949 "CORE", note_type, data, sizeof (data));
2960 va_start (ap, note_type);
2961 memset (data, 0, 112);
2962 pid = va_arg (ap, long);
2963 bfd_put_32 (abfd, pid, data + 32);
2964 cursig = va_arg (ap, int);
2965 bfd_put_16 (abfd, cursig, data + 12);
2966 greg = va_arg (ap, const void *);
2967 memcpy (data + 112, greg, 384);
2968 memset (data + 496, 0, 8);
2970 return elfcore_write_note (abfd, buf, bufsiz,
2971 "CORE", note_type, data, sizeof (data));
2976 /* Add extra PPC sections. */
2978 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
2980 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
2981 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2982 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2983 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2984 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2985 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2986 { NULL, 0, 0, 0, 0 }
2989 enum _ppc64_sec_type {
2995 struct _ppc64_elf_section_data
2997 struct bfd_elf_section_data elf;
3001 /* An array with one entry for each opd function descriptor,
3002 and some spares since opd entries may be either 16 or 24 bytes. */
3003 #define OPD_NDX(OFF) ((OFF) >> 4)
3004 struct _opd_sec_data
3006 /* Points to the function code section for local opd entries. */
3007 asection **func_sec;
3009 /* After editing .opd, adjust references to opd local syms. */
3013 /* An array for toc sections, indexed by offset/8. */
3014 struct _toc_sec_data
3016 /* Specifies the relocation symbol index used at a given toc offset. */
3019 /* And the relocation addend. */
3024 enum _ppc64_sec_type sec_type:2;
3026 /* Flag set when small branches are detected. Used to
3027 select suitable defaults for the stub group size. */
3028 unsigned int has_14bit_branch:1;
3031 #define ppc64_elf_section_data(sec) \
3032 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
3035 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
3037 if (!sec->used_by_bfd)
3039 struct _ppc64_elf_section_data *sdata;
3040 bfd_size_type amt = sizeof (*sdata);
3042 sdata = bfd_zalloc (abfd, amt);
3045 sec->used_by_bfd = sdata;
3048 return _bfd_elf_new_section_hook (abfd, sec);
3051 static struct _opd_sec_data *
3052 get_opd_info (asection * sec)
3055 && ppc64_elf_section_data (sec) != NULL
3056 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
3057 return &ppc64_elf_section_data (sec)->u.opd;
3061 /* Parameters for the qsort hook. */
3062 static bfd_boolean synthetic_relocatable;
3064 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3067 compare_symbols (const void *ap, const void *bp)
3069 const asymbol *a = * (const asymbol **) ap;
3070 const asymbol *b = * (const asymbol **) bp;
3072 /* Section symbols first. */
3073 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
3075 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
3078 /* then .opd symbols. */
3079 if (strcmp (a->section->name, ".opd") == 0
3080 && strcmp (b->section->name, ".opd") != 0)
3082 if (strcmp (a->section->name, ".opd") != 0
3083 && strcmp (b->section->name, ".opd") == 0)
3086 /* then other code symbols. */
3087 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3088 == (SEC_CODE | SEC_ALLOC)
3089 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3090 != (SEC_CODE | SEC_ALLOC))
3093 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3094 != (SEC_CODE | SEC_ALLOC)
3095 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3096 == (SEC_CODE | SEC_ALLOC))
3099 if (synthetic_relocatable)
3101 if (a->section->id < b->section->id)
3104 if (a->section->id > b->section->id)
3108 if (a->value + a->section->vma < b->value + b->section->vma)
3111 if (a->value + a->section->vma > b->value + b->section->vma)
3114 /* For syms with the same value, prefer strong dynamic global function
3115 syms over other syms. */
3116 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3119 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3122 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3125 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3128 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3131 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3134 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3137 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3143 /* Search SYMS for a symbol of the given VALUE. */
3146 sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
3150 if (id == (unsigned) -1)
3154 mid = (lo + hi) >> 1;
3155 if (syms[mid]->value + syms[mid]->section->vma < value)
3157 else if (syms[mid]->value + syms[mid]->section->vma > value)
3167 mid = (lo + hi) >> 1;
3168 if (syms[mid]->section->id < id)
3170 else if (syms[mid]->section->id > id)
3172 else if (syms[mid]->value < value)
3174 else if (syms[mid]->value > value)
3184 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3186 bfd_vma vma = *(bfd_vma *) ptr;
3187 return ((section->flags & SEC_ALLOC) != 0
3188 && section->vma <= vma
3189 && vma < section->vma + section->size);
3192 /* Create synthetic symbols, effectively restoring "dot-symbol" function
3193 entry syms. Also generate @plt symbols for the glink branch table.
3194 Returns count of synthetic symbols in RET or -1 on error. */
3197 ppc64_elf_get_synthetic_symtab (bfd *abfd,
3198 long static_count, asymbol **static_syms,
3199 long dyn_count, asymbol **dyn_syms,
3206 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
3207 asection *opd = NULL;
3208 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
3210 int abi = abiversion (abfd);
3216 opd = bfd_get_section_by_name (abfd, ".opd");
3217 if (opd == NULL && abi == 1)
3221 symcount = static_count;
3223 symcount += dyn_count;
3227 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3231 if (!relocatable && static_count != 0 && dyn_count != 0)
3233 /* Use both symbol tables. */
3234 memcpy (syms, static_syms, static_count * sizeof (*syms));
3235 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3237 else if (!relocatable && static_count == 0)
3238 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3240 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3242 synthetic_relocatable = relocatable;
3243 qsort (syms, symcount, sizeof (*syms), compare_symbols);
3245 if (!relocatable && symcount > 1)
3248 /* Trim duplicate syms, since we may have merged the normal and
3249 dynamic symbols. Actually, we only care about syms that have
3250 different values, so trim any with the same value. */
3251 for (i = 1, j = 1; i < symcount; ++i)
3252 if (syms[i - 1]->value + syms[i - 1]->section->vma
3253 != syms[i]->value + syms[i]->section->vma)
3254 syms[j++] = syms[i];
3259 if (strcmp (syms[i]->section->name, ".opd") == 0)
3263 for (; i < symcount; ++i)
3264 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3265 != (SEC_CODE | SEC_ALLOC))
3266 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3270 for (; i < symcount; ++i)
3271 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3275 for (; i < symcount; ++i)
3276 if (strcmp (syms[i]->section->name, ".opd") != 0)
3280 for (; i < symcount; ++i)
3281 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3282 != (SEC_CODE | SEC_ALLOC))
3290 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3295 if (opdsymend == secsymend)
3298 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3299 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
3303 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3310 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3314 while (r < opd->relocation + relcount
3315 && r->address < syms[i]->value + opd->vma)
3318 if (r == opd->relocation + relcount)
3321 if (r->address != syms[i]->value + opd->vma)
3324 if (r->howto->type != R_PPC64_ADDR64)
3327 sym = *r->sym_ptr_ptr;
3328 if (!sym_exists_at (syms, opdsymend, symcount,
3329 sym->section->id, sym->value + r->addend))
3332 size += sizeof (asymbol);
3333 size += strlen (syms[i]->name) + 2;
3339 s = *ret = bfd_malloc (size);
3346 names = (char *) (s + count);
3348 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3352 while (r < opd->relocation + relcount
3353 && r->address < syms[i]->value + opd->vma)
3356 if (r == opd->relocation + relcount)
3359 if (r->address != syms[i]->value + opd->vma)
3362 if (r->howto->type != R_PPC64_ADDR64)
3365 sym = *r->sym_ptr_ptr;
3366 if (!sym_exists_at (syms, opdsymend, symcount,
3367 sym->section->id, sym->value + r->addend))
3372 s->flags |= BSF_SYNTHETIC;
3373 s->section = sym->section;
3374 s->value = sym->value + r->addend;
3377 len = strlen (syms[i]->name);
3378 memcpy (names, syms[i]->name, len + 1);
3380 /* Have udata.p point back to the original symbol this
3381 synthetic symbol was derived from. */
3382 s->udata.p = syms[i];
3389 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3390 bfd_byte *contents = NULL;
3393 bfd_vma glink_vma = 0, resolv_vma = 0;
3394 asection *dynamic, *glink = NULL, *relplt = NULL;
3397 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
3399 free_contents_and_exit_err:
3401 free_contents_and_exit:
3408 for (i = secsymend; i < opdsymend; ++i)
3412 /* Ignore bogus symbols. */
3413 if (syms[i]->value > opd->size - 8)
3416 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3417 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3420 size += sizeof (asymbol);
3421 size += strlen (syms[i]->name) + 2;
3425 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3427 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
3429 bfd_byte *dynbuf, *extdyn, *extdynend;
3431 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3433 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
3434 goto free_contents_and_exit_err;
3436 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3437 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3440 extdynend = extdyn + dynamic->size;
3441 for (; extdyn < extdynend; extdyn += extdynsize)
3443 Elf_Internal_Dyn dyn;
3444 (*swap_dyn_in) (abfd, extdyn, &dyn);
3446 if (dyn.d_tag == DT_NULL)
3449 if (dyn.d_tag == DT_PPC64_GLINK)
3451 /* The first glink stub starts at offset 32; see
3452 comment in ppc64_elf_finish_dynamic_sections. */
3453 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
3454 /* The .glink section usually does not survive the final
3455 link; search for the section (usually .text) where the
3456 glink stubs now reside. */
3457 glink = bfd_sections_find_if (abfd, section_covers_vma,
3468 /* Determine __glink trampoline by reading the relative branch
3469 from the first glink stub. */
3471 unsigned int off = 0;
3473 while (bfd_get_section_contents (abfd, glink, buf,
3474 glink_vma + off - glink->vma, 4))
3476 unsigned int insn = bfd_get_32 (abfd, buf);
3478 if ((insn & ~0x3fffffc) == 0)
3480 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3489 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3491 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3494 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3495 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
3496 goto free_contents_and_exit_err;
3498 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3499 size += plt_count * sizeof (asymbol);
3501 p = relplt->relocation;
3502 for (i = 0; i < plt_count; i++, p++)
3504 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3506 size += sizeof ("+0x") - 1 + 16;
3512 goto free_contents_and_exit;
3513 s = *ret = bfd_malloc (size);
3515 goto free_contents_and_exit_err;
3517 names = (char *) (s + count + plt_count + (resolv_vma != 0));
3519 for (i = secsymend; i < opdsymend; ++i)
3523 if (syms[i]->value > opd->size - 8)
3526 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3527 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3531 asection *sec = abfd->sections;
3538 long mid = (lo + hi) >> 1;
3539 if (syms[mid]->section->vma < ent)
3541 else if (syms[mid]->section->vma > ent)
3545 sec = syms[mid]->section;
3550 if (lo >= hi && lo > codesecsym)
3551 sec = syms[lo - 1]->section;
3553 for (; sec != NULL; sec = sec->next)
3557 /* SEC_LOAD may not be set if SEC is from a separate debug
3559 if ((sec->flags & SEC_ALLOC) == 0)
3561 if ((sec->flags & SEC_CODE) != 0)
3564 s->flags |= BSF_SYNTHETIC;
3565 s->value = ent - s->section->vma;
3568 len = strlen (syms[i]->name);
3569 memcpy (names, syms[i]->name, len + 1);
3571 /* Have udata.p point back to the original symbol this
3572 synthetic symbol was derived from. */
3573 s->udata.p = syms[i];
3579 if (glink != NULL && relplt != NULL)
3583 /* Add a symbol for the main glink trampoline. */
3584 memset (s, 0, sizeof *s);
3586 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3588 s->value = resolv_vma - glink->vma;
3590 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3591 names += sizeof ("__glink_PLTresolve");
3596 /* FIXME: It would be very much nicer to put sym@plt on the
3597 stub rather than on the glink branch table entry. The
3598 objdump disassembler would then use a sensible symbol
3599 name on plt calls. The difficulty in doing so is
3600 a) finding the stubs, and,
3601 b) matching stubs against plt entries, and,
3602 c) there can be multiple stubs for a given plt entry.
3604 Solving (a) could be done by code scanning, but older
3605 ppc64 binaries used different stubs to current code.
3606 (b) is the tricky one since you need to known the toc
3607 pointer for at least one function that uses a pic stub to
3608 be able to calculate the plt address referenced.
3609 (c) means gdb would need to set multiple breakpoints (or
3610 find the glink branch itself) when setting breakpoints
3611 for pending shared library loads. */
3612 p = relplt->relocation;
3613 for (i = 0; i < plt_count; i++, p++)
3617 *s = **p->sym_ptr_ptr;
3618 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3619 we are defining a symbol, ensure one of them is set. */
3620 if ((s->flags & BSF_LOCAL) == 0)
3621 s->flags |= BSF_GLOBAL;
3622 s->flags |= BSF_SYNTHETIC;
3624 s->value = glink_vma - glink->vma;
3627 len = strlen ((*p->sym_ptr_ptr)->name);
3628 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3632 memcpy (names, "+0x", sizeof ("+0x") - 1);
3633 names += sizeof ("+0x") - 1;
3634 bfd_sprintf_vma (abfd, names, p->addend);
3635 names += strlen (names);
3637 memcpy (names, "@plt", sizeof ("@plt"));
3638 names += sizeof ("@plt");
3658 /* The following functions are specific to the ELF linker, while
3659 functions above are used generally. Those named ppc64_elf_* are
3660 called by the main ELF linker code. They appear in this file more
3661 or less in the order in which they are called. eg.
3662 ppc64_elf_check_relocs is called early in the link process,
3663 ppc64_elf_finish_dynamic_sections is one of the last functions
3666 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3667 functions have both a function code symbol and a function descriptor
3668 symbol. A call to foo in a relocatable object file looks like:
3675 The function definition in another object file might be:
3679 . .quad .TOC.@tocbase
3685 When the linker resolves the call during a static link, the branch
3686 unsurprisingly just goes to .foo and the .opd information is unused.
3687 If the function definition is in a shared library, things are a little
3688 different: The call goes via a plt call stub, the opd information gets
3689 copied to the plt, and the linker patches the nop.
3697 . std 2,40(1) # in practice, the call stub
3698 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3699 . addi 11,11,Lfoo@toc@l # this is the general idea
3707 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3709 The "reloc ()" notation is supposed to indicate that the linker emits
3710 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3713 What are the difficulties here? Well, firstly, the relocations
3714 examined by the linker in check_relocs are against the function code
3715 sym .foo, while the dynamic relocation in the plt is emitted against
3716 the function descriptor symbol, foo. Somewhere along the line, we need
3717 to carefully copy dynamic link information from one symbol to the other.
3718 Secondly, the generic part of the elf linker will make .foo a dynamic
3719 symbol as is normal for most other backends. We need foo dynamic
3720 instead, at least for an application final link. However, when
3721 creating a shared library containing foo, we need to have both symbols
3722 dynamic so that references to .foo are satisfied during the early
3723 stages of linking. Otherwise the linker might decide to pull in a
3724 definition from some other object, eg. a static library.
3726 Update: As of August 2004, we support a new convention. Function
3727 calls may use the function descriptor symbol, ie. "bl foo". This
3728 behaves exactly as "bl .foo". */
3730 /* Of those relocs that might be copied as dynamic relocs, this function
3731 selects those that must be copied when linking a shared library,
3732 even when the symbol is local. */
3735 must_be_dyn_reloc (struct bfd_link_info *info,
3736 enum elf_ppc64_reloc_type r_type)
3748 case R_PPC64_TPREL16:
3749 case R_PPC64_TPREL16_LO:
3750 case R_PPC64_TPREL16_HI:
3751 case R_PPC64_TPREL16_HA:
3752 case R_PPC64_TPREL16_DS:
3753 case R_PPC64_TPREL16_LO_DS:
3754 case R_PPC64_TPREL16_HIGH:
3755 case R_PPC64_TPREL16_HIGHA:
3756 case R_PPC64_TPREL16_HIGHER:
3757 case R_PPC64_TPREL16_HIGHERA:
3758 case R_PPC64_TPREL16_HIGHEST:
3759 case R_PPC64_TPREL16_HIGHESTA:
3760 case R_PPC64_TPREL64:
3761 return !bfd_link_executable (info);
3765 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3766 copying dynamic variables from a shared lib into an app's dynbss
3767 section, and instead use a dynamic relocation to point into the
3768 shared lib. With code that gcc generates, it's vital that this be
3769 enabled; In the PowerPC64 ABI, the address of a function is actually
3770 the address of a function descriptor, which resides in the .opd
3771 section. gcc uses the descriptor directly rather than going via the
3772 GOT as some other ABI's do, which means that initialized function
3773 pointers must reference the descriptor. Thus, a function pointer
3774 initialized to the address of a function in a shared library will
3775 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3776 redefines the function descriptor symbol to point to the copy. This
3777 presents a problem as a plt entry for that function is also
3778 initialized from the function descriptor symbol and the copy reloc
3779 may not be initialized first. */
3780 #define ELIMINATE_COPY_RELOCS 1
3782 /* Section name for stubs is the associated section name plus this
3784 #define STUB_SUFFIX ".stub"
3787 ppc_stub_long_branch:
3788 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3789 destination, but a 24 bit branch in a stub section will reach.
3792 ppc_stub_plt_branch:
3793 Similar to the above, but a 24 bit branch in the stub section won't
3794 reach its destination.
3795 . addis %r11,%r2,xxx@toc@ha
3796 . ld %r12,xxx@toc@l(%r11)
3801 Used to call a function in a shared library. If it so happens that
3802 the plt entry referenced crosses a 64k boundary, then an extra
3803 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3805 . addis %r11,%r2,xxx@toc@ha
3806 . ld %r12,xxx+0@toc@l(%r11)
3808 . ld %r2,xxx+8@toc@l(%r11)
3809 . ld %r11,xxx+16@toc@l(%r11)
3812 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3813 code to adjust the value and save r2 to support multiple toc sections.
3814 A ppc_stub_long_branch with an r2 offset looks like:
3816 . addis %r2,%r2,off@ha
3817 . addi %r2,%r2,off@l
3820 A ppc_stub_plt_branch with an r2 offset looks like:
3822 . addis %r11,%r2,xxx@toc@ha
3823 . ld %r12,xxx@toc@l(%r11)
3824 . addis %r2,%r2,off@ha
3825 . addi %r2,%r2,off@l
3829 In cases where the "addis" instruction would add zero, the "addis" is
3830 omitted and following instructions modified slightly in some cases.
3833 enum ppc_stub_type {
3835 ppc_stub_long_branch,
3836 ppc_stub_long_branch_r2off,
3837 ppc_stub_plt_branch,
3838 ppc_stub_plt_branch_r2off,
3840 ppc_stub_plt_call_r2save,
3841 ppc_stub_global_entry,
3845 /* Information on stub grouping. */
3848 /* The stub section. */
3850 /* This is the section to which stubs in the group will be attached. */
3853 struct map_stub *next;
3854 /* Whether to emit a copy of register save/restore functions in this
3859 struct ppc_stub_hash_entry {
3861 /* Base hash table entry structure. */
3862 struct bfd_hash_entry root;
3864 enum ppc_stub_type stub_type;
3866 /* Group information. */
3867 struct map_stub *group;
3869 /* Offset within stub_sec of the beginning of this stub. */
3870 bfd_vma stub_offset;
3872 /* Given the symbol's value and its section we can determine its final
3873 value when building the stubs (so the stub knows where to jump. */
3874 bfd_vma target_value;
3875 asection *target_section;
3877 /* The symbol table entry, if any, that this was derived from. */
3878 struct ppc_link_hash_entry *h;
3879 struct plt_entry *plt_ent;
3881 /* Symbol st_other. */
3882 unsigned char other;
3885 struct ppc_branch_hash_entry {
3887 /* Base hash table entry structure. */
3888 struct bfd_hash_entry root;
3890 /* Offset within branch lookup table. */
3891 unsigned int offset;
3893 /* Generation marker. */
3897 /* Used to track dynamic relocations for local symbols. */
3898 struct ppc_dyn_relocs
3900 struct ppc_dyn_relocs *next;
3902 /* The input section of the reloc. */
3905 /* Total number of relocs copied for the input section. */
3906 unsigned int count : 31;
3908 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3909 unsigned int ifunc : 1;
3912 struct ppc_link_hash_entry
3914 struct elf_link_hash_entry elf;
3917 /* A pointer to the most recently used stub hash entry against this
3919 struct ppc_stub_hash_entry *stub_cache;
3921 /* A pointer to the next symbol starting with a '.' */
3922 struct ppc_link_hash_entry *next_dot_sym;
3925 /* Track dynamic relocs copied for this symbol. */
3926 struct elf_dyn_relocs *dyn_relocs;
3928 /* Link between function code and descriptor symbols. */
3929 struct ppc_link_hash_entry *oh;
3931 /* Flag function code and descriptor symbols. */
3932 unsigned int is_func:1;
3933 unsigned int is_func_descriptor:1;
3934 unsigned int fake:1;
3936 /* Whether global opd/toc sym has been adjusted or not.
3937 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3938 should be set for all globals defined in any opd/toc section. */
3939 unsigned int adjust_done:1;
3941 /* Set if we twiddled this symbol to weak at some stage. */
3942 unsigned int was_undefined:1;
3944 /* Set if this is an out-of-line register save/restore function,
3945 with non-standard calling convention. */
3946 unsigned int save_res:1;
3948 /* Contexts in which symbol is used in the GOT (or TOC).
3949 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3950 corresponding relocs are encountered during check_relocs.
3951 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3952 indicate the corresponding GOT entry type is not needed.
3953 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3954 a TPREL one. We use a separate flag rather than setting TPREL
3955 just for convenience in distinguishing the two cases. */
3956 #define TLS_GD 1 /* GD reloc. */
3957 #define TLS_LD 2 /* LD reloc. */
3958 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3959 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3960 #define TLS_TLS 16 /* Any TLS reloc. */
3961 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3962 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3963 #define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
3964 unsigned char tls_mask;
3967 /* ppc64 ELF linker hash table. */
3969 struct ppc_link_hash_table
3971 struct elf_link_hash_table elf;
3973 /* The stub hash table. */
3974 struct bfd_hash_table stub_hash_table;
3976 /* Another hash table for plt_branch stubs. */
3977 struct bfd_hash_table branch_hash_table;
3979 /* Hash table for function prologue tocsave. */
3980 htab_t tocsave_htab;
3982 /* Various options and other info passed from the linker. */
3983 struct ppc64_elf_params *params;
3985 /* The size of sec_info below. */
3986 unsigned int sec_info_arr_size;
3988 /* Per-section array of extra section info. Done this way rather
3989 than as part of ppc64_elf_section_data so we have the info for
3990 non-ppc64 sections. */
3993 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3998 /* The section group that this section belongs to. */
3999 struct map_stub *group;
4000 /* A temp section list pointer. */
4005 /* Linked list of groups. */
4006 struct map_stub *group;
4008 /* Temp used when calculating TOC pointers. */
4011 asection *toc_first_sec;
4013 /* Used when adding symbols. */
4014 struct ppc_link_hash_entry *dot_syms;
4016 /* Shortcuts to get to dynamic linker sections. */
4023 asection *glink_eh_frame;
4025 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4026 struct ppc_link_hash_entry *tls_get_addr;
4027 struct ppc_link_hash_entry *tls_get_addr_fd;
4029 /* The size of reliplt used by got entry relocs. */
4030 bfd_size_type got_reli_size;
4033 unsigned long stub_count[ppc_stub_global_entry];
4035 /* Number of stubs against global syms. */
4036 unsigned long stub_globals;
4038 /* Set if we're linking code with function descriptors. */
4039 unsigned int opd_abi:1;
4041 /* Support for multiple toc sections. */
4042 unsigned int do_multi_toc:1;
4043 unsigned int multi_toc_needed:1;
4044 unsigned int second_toc_pass:1;
4045 unsigned int do_toc_opt:1;
4048 unsigned int stub_error:1;
4050 /* Temp used by ppc64_elf_before_check_relocs. */
4051 unsigned int twiddled_syms:1;
4053 /* Incremented every time we size stubs. */
4054 unsigned int stub_iteration;
4056 /* Small local sym cache. */
4057 struct sym_cache sym_cache;
4060 /* Rename some of the generic section flags to better document how they
4063 /* Nonzero if this section has TLS related relocations. */
4064 #define has_tls_reloc sec_flg0
4066 /* Nonzero if this section has a call to __tls_get_addr. */
4067 #define has_tls_get_addr_call sec_flg1
4069 /* Nonzero if this section has any toc or got relocs. */
4070 #define has_toc_reloc sec_flg2
4072 /* Nonzero if this section has a call to another section that uses
4074 #define makes_toc_func_call sec_flg3
4076 /* Recursion protection when determining above flag. */
4077 #define call_check_in_progress sec_flg4
4078 #define call_check_done sec_flg5
4080 /* Get the ppc64 ELF linker hash table from a link_info structure. */
4082 #define ppc_hash_table(p) \
4083 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4084 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4086 #define ppc_stub_hash_lookup(table, string, create, copy) \
4087 ((struct ppc_stub_hash_entry *) \
4088 bfd_hash_lookup ((table), (string), (create), (copy)))
4090 #define ppc_branch_hash_lookup(table, string, create, copy) \
4091 ((struct ppc_branch_hash_entry *) \
4092 bfd_hash_lookup ((table), (string), (create), (copy)))
4094 /* Create an entry in the stub hash table. */
4096 static struct bfd_hash_entry *
4097 stub_hash_newfunc (struct bfd_hash_entry *entry,
4098 struct bfd_hash_table *table,
4101 /* Allocate the structure if it has not already been allocated by a
4105 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4110 /* Call the allocation method of the superclass. */
4111 entry = bfd_hash_newfunc (entry, table, string);
4114 struct ppc_stub_hash_entry *eh;
4116 /* Initialize the local fields. */
4117 eh = (struct ppc_stub_hash_entry *) entry;
4118 eh->stub_type = ppc_stub_none;
4120 eh->stub_offset = 0;
4121 eh->target_value = 0;
4122 eh->target_section = NULL;
4131 /* Create an entry in the branch hash table. */
4133 static struct bfd_hash_entry *
4134 branch_hash_newfunc (struct bfd_hash_entry *entry,
4135 struct bfd_hash_table *table,
4138 /* Allocate the structure if it has not already been allocated by a
4142 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4147 /* Call the allocation method of the superclass. */
4148 entry = bfd_hash_newfunc (entry, table, string);
4151 struct ppc_branch_hash_entry *eh;
4153 /* Initialize the local fields. */
4154 eh = (struct ppc_branch_hash_entry *) entry;
4162 /* Create an entry in a ppc64 ELF linker hash table. */
4164 static struct bfd_hash_entry *
4165 link_hash_newfunc (struct bfd_hash_entry *entry,
4166 struct bfd_hash_table *table,
4169 /* Allocate the structure if it has not already been allocated by a
4173 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4178 /* Call the allocation method of the superclass. */
4179 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4182 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4184 memset (&eh->u.stub_cache, 0,
4185 (sizeof (struct ppc_link_hash_entry)
4186 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4188 /* When making function calls, old ABI code references function entry
4189 points (dot symbols), while new ABI code references the function
4190 descriptor symbol. We need to make any combination of reference and
4191 definition work together, without breaking archive linking.
4193 For a defined function "foo" and an undefined call to "bar":
4194 An old object defines "foo" and ".foo", references ".bar" (possibly
4196 A new object defines "foo" and references "bar".
4198 A new object thus has no problem with its undefined symbols being
4199 satisfied by definitions in an old object. On the other hand, the
4200 old object won't have ".bar" satisfied by a new object.
4202 Keep a list of newly added dot-symbols. */
4204 if (string[0] == '.')
4206 struct ppc_link_hash_table *htab;
4208 htab = (struct ppc_link_hash_table *) table;
4209 eh->u.next_dot_sym = htab->dot_syms;
4210 htab->dot_syms = eh;
4217 struct tocsave_entry {
4223 tocsave_htab_hash (const void *p)
4225 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4226 return ((bfd_vma)(intptr_t) e->sec ^ e->offset) >> 3;
4230 tocsave_htab_eq (const void *p1, const void *p2)
4232 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4233 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4234 return e1->sec == e2->sec && e1->offset == e2->offset;
4237 /* Destroy a ppc64 ELF linker hash table. */
4240 ppc64_elf_link_hash_table_free (bfd *obfd)
4242 struct ppc_link_hash_table *htab;
4244 htab = (struct ppc_link_hash_table *) obfd->link.hash;
4245 if (htab->tocsave_htab)
4246 htab_delete (htab->tocsave_htab);
4247 bfd_hash_table_free (&htab->branch_hash_table);
4248 bfd_hash_table_free (&htab->stub_hash_table);
4249 _bfd_elf_link_hash_table_free (obfd);
4252 /* Create a ppc64 ELF linker hash table. */
4254 static struct bfd_link_hash_table *
4255 ppc64_elf_link_hash_table_create (bfd *abfd)
4257 struct ppc_link_hash_table *htab;
4258 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4260 htab = bfd_zmalloc (amt);
4264 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4265 sizeof (struct ppc_link_hash_entry),
4272 /* Init the stub hash table too. */
4273 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4274 sizeof (struct ppc_stub_hash_entry)))
4276 _bfd_elf_link_hash_table_free (abfd);
4280 /* And the branch hash table. */
4281 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4282 sizeof (struct ppc_branch_hash_entry)))
4284 bfd_hash_table_free (&htab->stub_hash_table);
4285 _bfd_elf_link_hash_table_free (abfd);
4289 htab->tocsave_htab = htab_try_create (1024,
4293 if (htab->tocsave_htab == NULL)
4295 ppc64_elf_link_hash_table_free (abfd);
4298 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
4300 /* Initializing two fields of the union is just cosmetic. We really
4301 only care about glist, but when compiled on a 32-bit host the
4302 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4303 debugger inspection of these fields look nicer. */
4304 htab->elf.init_got_refcount.refcount = 0;
4305 htab->elf.init_got_refcount.glist = NULL;
4306 htab->elf.init_plt_refcount.refcount = 0;
4307 htab->elf.init_plt_refcount.glist = NULL;
4308 htab->elf.init_got_offset.offset = 0;
4309 htab->elf.init_got_offset.glist = NULL;
4310 htab->elf.init_plt_offset.offset = 0;
4311 htab->elf.init_plt_offset.glist = NULL;
4313 return &htab->elf.root;
4316 /* Create sections for linker generated code. */
4319 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4321 struct ppc_link_hash_table *htab;
4324 htab = ppc_hash_table (info);
4326 /* Create .sfpr for code to save and restore fp regs. */
4327 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4328 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4329 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4331 if (htab->sfpr == NULL
4332 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4335 /* Create .glink for lazy dynamic linking support. */
4336 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4338 if (htab->glink == NULL
4339 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4342 if (!info->no_ld_generated_unwind_info)
4344 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4345 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4346 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4349 if (htab->glink_eh_frame == NULL
4350 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4354 flags = SEC_ALLOC | SEC_LINKER_CREATED;
4355 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4356 if (htab->elf.iplt == NULL
4357 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
4360 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4361 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4363 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4364 if (htab->elf.irelplt == NULL
4365 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
4368 /* Create branch lookup table for plt_branch stubs. */
4369 flags = (SEC_ALLOC | SEC_LOAD
4370 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4371 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4373 if (htab->brlt == NULL
4374 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4377 if (!bfd_link_pic (info))
4380 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4381 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4382 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4385 if (htab->relbrlt == NULL
4386 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4392 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4395 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4396 struct ppc64_elf_params *params)
4398 struct ppc_link_hash_table *htab;
4400 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
4402 /* Always hook our dynamic sections into the first bfd, which is the
4403 linker created stub bfd. This ensures that the GOT header is at
4404 the start of the output TOC section. */
4405 htab = ppc_hash_table (info);
4408 htab->elf.dynobj = params->stub_bfd;
4409 htab->params = params;
4411 if (bfd_link_relocatable (info))
4414 return create_linkage_sections (htab->elf.dynobj, info);
4417 /* Build a name for an entry in the stub hash table. */
4420 ppc_stub_name (const asection *input_section,
4421 const asection *sym_sec,
4422 const struct ppc_link_hash_entry *h,
4423 const Elf_Internal_Rela *rel)
4428 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4429 offsets from a sym as a branch target? In fact, we could
4430 probably assume the addend is always zero. */
4431 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4435 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4436 stub_name = bfd_malloc (len);
4437 if (stub_name == NULL)
4440 len = sprintf (stub_name, "%08x.%s+%x",
4441 input_section->id & 0xffffffff,
4442 h->elf.root.root.string,
4443 (int) rel->r_addend & 0xffffffff);
4447 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4448 stub_name = bfd_malloc (len);
4449 if (stub_name == NULL)
4452 len = sprintf (stub_name, "%08x.%x:%x+%x",
4453 input_section->id & 0xffffffff,
4454 sym_sec->id & 0xffffffff,
4455 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4456 (int) rel->r_addend & 0xffffffff);
4458 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
4459 stub_name[len - 2] = 0;
4463 /* Look up an entry in the stub hash. Stub entries are cached because
4464 creating the stub name takes a bit of time. */
4466 static struct ppc_stub_hash_entry *
4467 ppc_get_stub_entry (const asection *input_section,
4468 const asection *sym_sec,
4469 struct ppc_link_hash_entry *h,
4470 const Elf_Internal_Rela *rel,
4471 struct ppc_link_hash_table *htab)
4473 struct ppc_stub_hash_entry *stub_entry;
4474 struct map_stub *group;
4476 /* If this input section is part of a group of sections sharing one
4477 stub section, then use the id of the first section in the group.
4478 Stub names need to include a section id, as there may well be
4479 more than one stub used to reach say, printf, and we need to
4480 distinguish between them. */
4481 group = htab->sec_info[input_section->id].u.group;
4483 if (h != NULL && h->u.stub_cache != NULL
4484 && h->u.stub_cache->h == h
4485 && h->u.stub_cache->group == group)
4487 stub_entry = h->u.stub_cache;
4493 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
4494 if (stub_name == NULL)
4497 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
4498 stub_name, FALSE, FALSE);
4500 h->u.stub_cache = stub_entry;
4508 /* Add a new stub entry to the stub hash. Not all fields of the new
4509 stub entry are initialised. */
4511 static struct ppc_stub_hash_entry *
4512 ppc_add_stub (const char *stub_name,
4514 struct bfd_link_info *info)
4516 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4517 struct map_stub *group;
4520 struct ppc_stub_hash_entry *stub_entry;
4522 group = htab->sec_info[section->id].u.group;
4523 link_sec = group->link_sec;
4524 stub_sec = group->stub_sec;
4525 if (stub_sec == NULL)
4531 namelen = strlen (link_sec->name);
4532 len = namelen + sizeof (STUB_SUFFIX);
4533 s_name = bfd_alloc (htab->params->stub_bfd, len);
4537 memcpy (s_name, link_sec->name, namelen);
4538 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4539 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4540 if (stub_sec == NULL)
4542 group->stub_sec = stub_sec;
4545 /* Enter this entry into the linker stub hash table. */
4546 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
4548 if (stub_entry == NULL)
4550 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
4551 section->owner, stub_name);
4555 stub_entry->group = group;
4556 stub_entry->stub_offset = 0;
4560 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4561 not already done. */
4564 create_got_section (bfd *abfd, struct bfd_link_info *info)
4566 asection *got, *relgot;
4568 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4570 if (!is_ppc64_elf (abfd))
4576 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4579 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4580 | SEC_LINKER_CREATED);
4582 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4584 || !bfd_set_section_alignment (abfd, got, 3))
4587 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4588 flags | SEC_READONLY);
4590 || ! bfd_set_section_alignment (abfd, relgot, 3))
4593 ppc64_elf_tdata (abfd)->got = got;
4594 ppc64_elf_tdata (abfd)->relgot = relgot;
4598 /* Create the dynamic sections, and set up shortcuts. */
4601 ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
4603 struct ppc_link_hash_table *htab;
4605 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
4608 htab = ppc_hash_table (info);
4612 htab->dynbss = bfd_get_linker_section (dynobj, ".dynbss");
4613 if (!bfd_link_pic (info))
4614 htab->relbss = bfd_get_linker_section (dynobj, ".rela.bss");
4616 if (!htab->elf.sgot || !htab->elf.splt || !htab->elf.srelplt || !htab->dynbss
4617 || (!bfd_link_pic (info) && !htab->relbss))
4623 /* Follow indirect and warning symbol links. */
4625 static inline struct bfd_link_hash_entry *
4626 follow_link (struct bfd_link_hash_entry *h)
4628 while (h->type == bfd_link_hash_indirect
4629 || h->type == bfd_link_hash_warning)
4634 static inline struct elf_link_hash_entry *
4635 elf_follow_link (struct elf_link_hash_entry *h)
4637 return (struct elf_link_hash_entry *) follow_link (&h->root);
4640 static inline struct ppc_link_hash_entry *
4641 ppc_follow_link (struct ppc_link_hash_entry *h)
4643 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4646 /* Merge PLT info on FROM with that on TO. */
4649 move_plt_plist (struct ppc_link_hash_entry *from,
4650 struct ppc_link_hash_entry *to)
4652 if (from->elf.plt.plist != NULL)
4654 if (to->elf.plt.plist != NULL)
4656 struct plt_entry **entp;
4657 struct plt_entry *ent;
4659 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4661 struct plt_entry *dent;
4663 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4664 if (dent->addend == ent->addend)
4666 dent->plt.refcount += ent->plt.refcount;
4673 *entp = to->elf.plt.plist;
4676 to->elf.plt.plist = from->elf.plt.plist;
4677 from->elf.plt.plist = NULL;
4681 /* Copy the extra info we tack onto an elf_link_hash_entry. */
4684 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4685 struct elf_link_hash_entry *dir,
4686 struct elf_link_hash_entry *ind)
4688 struct ppc_link_hash_entry *edir, *eind;
4690 edir = (struct ppc_link_hash_entry *) dir;
4691 eind = (struct ppc_link_hash_entry *) ind;
4693 edir->is_func |= eind->is_func;
4694 edir->is_func_descriptor |= eind->is_func_descriptor;
4695 edir->tls_mask |= eind->tls_mask;
4696 if (eind->oh != NULL)
4697 edir->oh = ppc_follow_link (eind->oh);
4699 /* If called to transfer flags for a weakdef during processing
4700 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4701 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4702 if (!(ELIMINATE_COPY_RELOCS
4703 && eind->elf.root.type != bfd_link_hash_indirect
4704 && edir->elf.dynamic_adjusted))
4705 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4707 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4708 edir->elf.ref_regular |= eind->elf.ref_regular;
4709 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4710 edir->elf.needs_plt |= eind->elf.needs_plt;
4711 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
4713 /* Copy over any dynamic relocs we may have on the indirect sym. */
4714 if (eind->dyn_relocs != NULL)
4716 if (edir->dyn_relocs != NULL)
4718 struct elf_dyn_relocs **pp;
4719 struct elf_dyn_relocs *p;
4721 /* Add reloc counts against the indirect sym to the direct sym
4722 list. Merge any entries against the same section. */
4723 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4725 struct elf_dyn_relocs *q;
4727 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4728 if (q->sec == p->sec)
4730 q->pc_count += p->pc_count;
4731 q->count += p->count;
4738 *pp = edir->dyn_relocs;
4741 edir->dyn_relocs = eind->dyn_relocs;
4742 eind->dyn_relocs = NULL;
4745 /* If we were called to copy over info for a weak sym, that's all.
4746 You might think dyn_relocs need not be copied over; After all,
4747 both syms will be dynamic or both non-dynamic so we're just
4748 moving reloc accounting around. However, ELIMINATE_COPY_RELOCS
4749 code in ppc64_elf_adjust_dynamic_symbol needs to check for
4750 dyn_relocs in read-only sections, and it does so on what is the
4752 if (eind->elf.root.type != bfd_link_hash_indirect)
4755 /* Copy over got entries that we may have already seen to the
4756 symbol which just became indirect. */
4757 if (eind->elf.got.glist != NULL)
4759 if (edir->elf.got.glist != NULL)
4761 struct got_entry **entp;
4762 struct got_entry *ent;
4764 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4766 struct got_entry *dent;
4768 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4769 if (dent->addend == ent->addend
4770 && dent->owner == ent->owner
4771 && dent->tls_type == ent->tls_type)
4773 dent->got.refcount += ent->got.refcount;
4780 *entp = edir->elf.got.glist;
4783 edir->elf.got.glist = eind->elf.got.glist;
4784 eind->elf.got.glist = NULL;
4787 /* And plt entries. */
4788 move_plt_plist (eind, edir);
4790 if (eind->elf.dynindx != -1)
4792 if (edir->elf.dynindx != -1)
4793 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4794 edir->elf.dynstr_index);
4795 edir->elf.dynindx = eind->elf.dynindx;
4796 edir->elf.dynstr_index = eind->elf.dynstr_index;
4797 eind->elf.dynindx = -1;
4798 eind->elf.dynstr_index = 0;
4802 /* Find the function descriptor hash entry from the given function code
4803 hash entry FH. Link the entries via their OH fields. */
4805 static struct ppc_link_hash_entry *
4806 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4808 struct ppc_link_hash_entry *fdh = fh->oh;
4812 const char *fd_name = fh->elf.root.root.string + 1;
4814 fdh = (struct ppc_link_hash_entry *)
4815 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4819 fdh->is_func_descriptor = 1;
4825 return ppc_follow_link (fdh);
4828 /* Make a fake function descriptor sym for the code sym FH. */
4830 static struct ppc_link_hash_entry *
4831 make_fdh (struct bfd_link_info *info,
4832 struct ppc_link_hash_entry *fh)
4836 struct bfd_link_hash_entry *bh;
4837 struct ppc_link_hash_entry *fdh;
4839 abfd = fh->elf.root.u.undef.abfd;
4840 newsym = bfd_make_empty_symbol (abfd);
4841 newsym->name = fh->elf.root.root.string + 1;
4842 newsym->section = bfd_und_section_ptr;
4844 newsym->flags = BSF_WEAK;
4847 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4848 newsym->flags, newsym->section,
4849 newsym->value, NULL, FALSE, FALSE,
4853 fdh = (struct ppc_link_hash_entry *) bh;
4854 fdh->elf.non_elf = 0;
4856 fdh->is_func_descriptor = 1;
4863 /* Fix function descriptor symbols defined in .opd sections to be
4867 ppc64_elf_add_symbol_hook (bfd *ibfd,
4868 struct bfd_link_info *info,
4869 Elf_Internal_Sym *isym,
4871 flagword *flags ATTRIBUTE_UNUSED,
4875 if ((ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4876 || ELF_ST_BIND (isym->st_info) == STB_GNU_UNIQUE)
4877 && (ibfd->flags & DYNAMIC) == 0
4878 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
4879 elf_tdata (info->output_bfd)->has_gnu_symbols = elf_gnu_symbol_any;
4882 && strcmp ((*sec)->name, ".opd") == 0)
4886 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4887 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4888 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4890 /* If the symbol is a function defined in .opd, and the function
4891 code is in a discarded group, let it appear to be undefined. */
4892 if (!bfd_link_relocatable (info)
4893 && (*sec)->reloc_count != 0
4894 && opd_entry_value (*sec, *value, &code_sec, NULL,
4895 FALSE) != (bfd_vma) -1
4896 && discarded_section (code_sec))
4898 *sec = bfd_und_section_ptr;
4899 isym->st_shndx = SHN_UNDEF;
4902 else if (*sec != NULL
4903 && strcmp ((*sec)->name, ".toc") == 0
4904 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4906 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4908 htab->params->object_in_toc = 1;
4911 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4913 if (abiversion (ibfd) == 0)
4914 set_abiversion (ibfd, 2);
4915 else if (abiversion (ibfd) == 1)
4917 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4918 " for ABI version 1\n"), name);
4919 bfd_set_error (bfd_error_bad_value);
4927 /* Merge non-visibility st_other attributes: local entry point. */
4930 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4931 const Elf_Internal_Sym *isym,
4932 bfd_boolean definition,
4933 bfd_boolean dynamic)
4935 if (definition && !dynamic)
4936 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4937 | ELF_ST_VISIBILITY (h->other));
4940 /* This function makes an old ABI object reference to ".bar" cause the
4941 inclusion of a new ABI object archive that defines "bar".
4942 NAME is a symbol defined in an archive. Return a symbol in the hash
4943 table that might be satisfied by the archive symbols. */
4945 static struct elf_link_hash_entry *
4946 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4947 struct bfd_link_info *info,
4950 struct elf_link_hash_entry *h;
4954 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4956 /* Don't return this sym if it is a fake function descriptor
4957 created by add_symbol_adjust. */
4958 && !(h->root.type == bfd_link_hash_undefweak
4959 && ((struct ppc_link_hash_entry *) h)->fake))
4965 len = strlen (name);
4966 dot_name = bfd_alloc (abfd, len + 2);
4967 if (dot_name == NULL)
4968 return (struct elf_link_hash_entry *) 0 - 1;
4970 memcpy (dot_name + 1, name, len + 1);
4971 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4972 bfd_release (abfd, dot_name);
4976 /* This function satisfies all old ABI object references to ".bar" if a
4977 new ABI object defines "bar". Well, at least, undefined dot symbols
4978 are made weak. This stops later archive searches from including an
4979 object if we already have a function descriptor definition. It also
4980 prevents the linker complaining about undefined symbols.
4981 We also check and correct mismatched symbol visibility here. The
4982 most restrictive visibility of the function descriptor and the
4983 function entry symbol is used. */
4986 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4988 struct ppc_link_hash_table *htab;
4989 struct ppc_link_hash_entry *fdh;
4991 if (eh->elf.root.type == bfd_link_hash_indirect)
4994 if (eh->elf.root.type == bfd_link_hash_warning)
4995 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4997 if (eh->elf.root.root.string[0] != '.')
5000 htab = ppc_hash_table (info);
5004 fdh = lookup_fdh (eh, htab);
5007 if (!bfd_link_relocatable (info)
5008 && (eh->elf.root.type == bfd_link_hash_undefined
5009 || eh->elf.root.type == bfd_link_hash_undefweak)
5010 && eh->elf.ref_regular)
5012 /* Make an undefweak function descriptor sym, which is enough to
5013 pull in an --as-needed shared lib, but won't cause link
5014 errors. Archives are handled elsewhere. */
5015 fdh = make_fdh (info, eh);
5018 fdh->elf.ref_regular = 1;
5023 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5024 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5025 if (entry_vis < descr_vis)
5026 fdh->elf.other += entry_vis - descr_vis;
5027 else if (entry_vis > descr_vis)
5028 eh->elf.other += descr_vis - entry_vis;
5030 if ((fdh->elf.root.type == bfd_link_hash_defined
5031 || fdh->elf.root.type == bfd_link_hash_defweak)
5032 && eh->elf.root.type == bfd_link_hash_undefined)
5034 eh->elf.root.type = bfd_link_hash_undefweak;
5035 eh->was_undefined = 1;
5036 htab->twiddled_syms = 1;
5043 /* Set up opd section info and abiversion for IBFD, and process list
5044 of dot-symbols we made in link_hash_newfunc. */
5047 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
5049 struct ppc_link_hash_table *htab;
5050 struct ppc_link_hash_entry **p, *eh;
5051 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
5053 if (opd != NULL && opd->size != 0)
5055 if (abiversion (ibfd) == 0)
5056 set_abiversion (ibfd, 1);
5057 else if (abiversion (ibfd) == 2)
5059 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5061 ibfd, abiversion (ibfd));
5062 bfd_set_error (bfd_error_bad_value);
5066 if ((ibfd->flags & DYNAMIC) == 0
5067 && (opd->flags & SEC_RELOC) != 0
5068 && opd->reloc_count != 0
5069 && !bfd_is_abs_section (opd->output_section))
5071 /* Garbage collection needs some extra help with .opd sections.
5072 We don't want to necessarily keep everything referenced by
5073 relocs in .opd, as that would keep all functions. Instead,
5074 if we reference an .opd symbol (a function descriptor), we
5075 want to keep the function code symbol's section. This is
5076 easy for global symbols, but for local syms we need to keep
5077 information about the associated function section. */
5079 asection **opd_sym_map;
5081 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5082 opd_sym_map = bfd_zalloc (ibfd, amt);
5083 if (opd_sym_map == NULL)
5085 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5086 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5087 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5091 if (!is_ppc64_elf (info->output_bfd))
5093 htab = ppc_hash_table (info);
5097 /* For input files without an explicit abiversion in e_flags
5098 we should have flagged any with symbol st_other bits set
5099 as ELFv1 and above flagged those with .opd as ELFv2.
5100 Set the output abiversion if not yet set, and for any input
5101 still ambiguous, take its abiversion from the output.
5102 Differences in ABI are reported later. */
5103 if (abiversion (info->output_bfd) == 0)
5104 set_abiversion (info->output_bfd, abiversion (ibfd));
5105 else if (abiversion (ibfd) == 0)
5106 set_abiversion (ibfd, abiversion (info->output_bfd));
5108 p = &htab->dot_syms;
5109 while ((eh = *p) != NULL)
5112 if (&eh->elf == htab->elf.hgot)
5114 else if (htab->elf.hgot == NULL
5115 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5116 htab->elf.hgot = &eh->elf;
5117 else if (!add_symbol_adjust (eh, info))
5119 p = &eh->u.next_dot_sym;
5122 /* Clear the list for non-ppc64 input files. */
5123 p = &htab->dot_syms;
5124 while ((eh = *p) != NULL)
5127 p = &eh->u.next_dot_sym;
5130 /* We need to fix the undefs list for any syms we have twiddled to
5132 if (htab->twiddled_syms)
5134 bfd_link_repair_undef_list (&htab->elf.root);
5135 htab->twiddled_syms = 0;
5140 /* Undo hash table changes when an --as-needed input file is determined
5141 not to be needed. */
5144 ppc64_elf_notice_as_needed (bfd *ibfd,
5145 struct bfd_link_info *info,
5146 enum notice_asneeded_action act)
5148 if (act == notice_not_needed)
5150 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5155 htab->dot_syms = NULL;
5157 return _bfd_elf_notice_as_needed (ibfd, info, act);
5160 /* If --just-symbols against a final linked binary, then assume we need
5161 toc adjusting stubs when calling functions defined there. */
5164 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5166 if ((sec->flags & SEC_CODE) != 0
5167 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5168 && is_ppc64_elf (sec->owner))
5170 if (abiversion (sec->owner) >= 2
5171 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
5172 sec->has_toc_reloc = 1;
5174 _bfd_elf_link_just_syms (sec, info);
5177 static struct plt_entry **
5178 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5179 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
5181 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
5182 struct plt_entry **local_plt;
5183 unsigned char *local_got_tls_masks;
5185 if (local_got_ents == NULL)
5187 bfd_size_type size = symtab_hdr->sh_info;
5189 size *= (sizeof (*local_got_ents)
5190 + sizeof (*local_plt)
5191 + sizeof (*local_got_tls_masks));
5192 local_got_ents = bfd_zalloc (abfd, size);
5193 if (local_got_ents == NULL)
5195 elf_local_got_ents (abfd) = local_got_ents;
5198 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
5200 struct got_entry *ent;
5202 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
5203 if (ent->addend == r_addend
5204 && ent->owner == abfd
5205 && ent->tls_type == tls_type)
5209 bfd_size_type amt = sizeof (*ent);
5210 ent = bfd_alloc (abfd, amt);
5213 ent->next = local_got_ents[r_symndx];
5214 ent->addend = r_addend;
5216 ent->tls_type = tls_type;
5217 ent->is_indirect = FALSE;
5218 ent->got.refcount = 0;
5219 local_got_ents[r_symndx] = ent;
5221 ent->got.refcount += 1;
5224 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
5225 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
5226 local_got_tls_masks[r_symndx] |= tls_type;
5228 return local_plt + r_symndx;
5232 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
5234 struct plt_entry *ent;
5236 for (ent = *plist; ent != NULL; ent = ent->next)
5237 if (ent->addend == addend)
5241 bfd_size_type amt = sizeof (*ent);
5242 ent = bfd_alloc (abfd, amt);
5246 ent->addend = addend;
5247 ent->plt.refcount = 0;
5250 ent->plt.refcount += 1;
5255 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5257 return (r_type == R_PPC64_REL24
5258 || r_type == R_PPC64_REL14
5259 || r_type == R_PPC64_REL14_BRTAKEN
5260 || r_type == R_PPC64_REL14_BRNTAKEN
5261 || r_type == R_PPC64_ADDR24
5262 || r_type == R_PPC64_ADDR14
5263 || r_type == R_PPC64_ADDR14_BRTAKEN
5264 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5267 /* Look through the relocs for a section during the first phase, and
5268 calculate needed space in the global offset table, procedure
5269 linkage table, and dynamic reloc sections. */
5272 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5273 asection *sec, const Elf_Internal_Rela *relocs)
5275 struct ppc_link_hash_table *htab;
5276 Elf_Internal_Shdr *symtab_hdr;
5277 struct elf_link_hash_entry **sym_hashes;
5278 const Elf_Internal_Rela *rel;
5279 const Elf_Internal_Rela *rel_end;
5281 asection **opd_sym_map;
5282 struct elf_link_hash_entry *tga, *dottga;
5284 if (bfd_link_relocatable (info))
5287 /* Don't do anything special with non-loaded, non-alloced sections.
5288 In particular, any relocs in such sections should not affect GOT
5289 and PLT reference counting (ie. we don't allow them to create GOT
5290 or PLT entries), there's no possibility or desire to optimize TLS
5291 relocs, and there's not much point in propagating relocs to shared
5292 libs that the dynamic linker won't relocate. */
5293 if ((sec->flags & SEC_ALLOC) == 0)
5296 BFD_ASSERT (is_ppc64_elf (abfd));
5298 htab = ppc_hash_table (info);
5302 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5303 FALSE, FALSE, TRUE);
5304 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5305 FALSE, FALSE, TRUE);
5306 symtab_hdr = &elf_symtab_hdr (abfd);
5307 sym_hashes = elf_sym_hashes (abfd);
5310 if (ppc64_elf_section_data (sec) != NULL
5311 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5312 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5314 rel_end = relocs + sec->reloc_count;
5315 for (rel = relocs; rel < rel_end; rel++)
5317 unsigned long r_symndx;
5318 struct elf_link_hash_entry *h;
5319 enum elf_ppc64_reloc_type r_type;
5321 struct _ppc64_elf_section_data *ppc64_sec;
5322 struct plt_entry **ifunc;
5324 r_symndx = ELF64_R_SYM (rel->r_info);
5325 if (r_symndx < symtab_hdr->sh_info)
5329 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5330 h = elf_follow_link (h);
5332 /* PR15323, ref flags aren't set for references in the same
5334 h->root.non_ir_ref = 1;
5336 if (h == htab->elf.hgot)
5337 sec->has_toc_reloc = 1;
5344 if (h->type == STT_GNU_IFUNC)
5347 ifunc = &h->plt.plist;
5352 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5357 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5359 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5360 rel->r_addend, PLT_IFUNC);
5365 r_type = ELF64_R_TYPE (rel->r_info);
5366 if (is_branch_reloc (r_type))
5368 if (h != NULL && (h == tga || h == dottga))
5371 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5372 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5373 /* We have a new-style __tls_get_addr call with a marker
5377 /* Mark this section as having an old-style call. */
5378 sec->has_tls_get_addr_call = 1;
5381 /* STT_GNU_IFUNC symbols must have a PLT entry. */
5383 && !update_plt_info (abfd, ifunc, rel->r_addend))
5391 /* These special tls relocs tie a call to __tls_get_addr with
5392 its parameter symbol. */
5395 case R_PPC64_GOT_TLSLD16:
5396 case R_PPC64_GOT_TLSLD16_LO:
5397 case R_PPC64_GOT_TLSLD16_HI:
5398 case R_PPC64_GOT_TLSLD16_HA:
5399 tls_type = TLS_TLS | TLS_LD;
5402 case R_PPC64_GOT_TLSGD16:
5403 case R_PPC64_GOT_TLSGD16_LO:
5404 case R_PPC64_GOT_TLSGD16_HI:
5405 case R_PPC64_GOT_TLSGD16_HA:
5406 tls_type = TLS_TLS | TLS_GD;
5409 case R_PPC64_GOT_TPREL16_DS:
5410 case R_PPC64_GOT_TPREL16_LO_DS:
5411 case R_PPC64_GOT_TPREL16_HI:
5412 case R_PPC64_GOT_TPREL16_HA:
5413 if (bfd_link_pic (info))
5414 info->flags |= DF_STATIC_TLS;
5415 tls_type = TLS_TLS | TLS_TPREL;
5418 case R_PPC64_GOT_DTPREL16_DS:
5419 case R_PPC64_GOT_DTPREL16_LO_DS:
5420 case R_PPC64_GOT_DTPREL16_HI:
5421 case R_PPC64_GOT_DTPREL16_HA:
5422 tls_type = TLS_TLS | TLS_DTPREL;
5424 sec->has_tls_reloc = 1;
5428 case R_PPC64_GOT16_DS:
5429 case R_PPC64_GOT16_HA:
5430 case R_PPC64_GOT16_HI:
5431 case R_PPC64_GOT16_LO:
5432 case R_PPC64_GOT16_LO_DS:
5433 /* This symbol requires a global offset table entry. */
5434 sec->has_toc_reloc = 1;
5435 if (r_type == R_PPC64_GOT_TLSLD16
5436 || r_type == R_PPC64_GOT_TLSGD16
5437 || r_type == R_PPC64_GOT_TPREL16_DS
5438 || r_type == R_PPC64_GOT_DTPREL16_DS
5439 || r_type == R_PPC64_GOT16
5440 || r_type == R_PPC64_GOT16_DS)
5442 htab->do_multi_toc = 1;
5443 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5446 if (ppc64_elf_tdata (abfd)->got == NULL
5447 && !create_got_section (abfd, info))
5452 struct ppc_link_hash_entry *eh;
5453 struct got_entry *ent;
5455 eh = (struct ppc_link_hash_entry *) h;
5456 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5457 if (ent->addend == rel->r_addend
5458 && ent->owner == abfd
5459 && ent->tls_type == tls_type)
5463 bfd_size_type amt = sizeof (*ent);
5464 ent = bfd_alloc (abfd, amt);
5467 ent->next = eh->elf.got.glist;
5468 ent->addend = rel->r_addend;
5470 ent->tls_type = tls_type;
5471 ent->is_indirect = FALSE;
5472 ent->got.refcount = 0;
5473 eh->elf.got.glist = ent;
5475 ent->got.refcount += 1;
5476 eh->tls_mask |= tls_type;
5479 /* This is a global offset table entry for a local symbol. */
5480 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5481 rel->r_addend, tls_type))
5484 /* We may also need a plt entry if the symbol turns out to be
5486 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
5488 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5493 case R_PPC64_PLT16_HA:
5494 case R_PPC64_PLT16_HI:
5495 case R_PPC64_PLT16_LO:
5498 /* This symbol requires a procedure linkage table entry. We
5499 actually build the entry in adjust_dynamic_symbol,
5500 because this might be a case of linking PIC code without
5501 linking in any dynamic objects, in which case we don't
5502 need to generate a procedure linkage table after all. */
5505 /* It does not make sense to have a procedure linkage
5506 table entry for a local symbol. */
5507 bfd_set_error (bfd_error_bad_value);
5512 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5515 if (h->root.root.string[0] == '.'
5516 && h->root.root.string[1] != '\0')
5517 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5521 /* The following relocations don't need to propagate the
5522 relocation if linking a shared object since they are
5523 section relative. */
5524 case R_PPC64_SECTOFF:
5525 case R_PPC64_SECTOFF_LO:
5526 case R_PPC64_SECTOFF_HI:
5527 case R_PPC64_SECTOFF_HA:
5528 case R_PPC64_SECTOFF_DS:
5529 case R_PPC64_SECTOFF_LO_DS:
5530 case R_PPC64_DTPREL16:
5531 case R_PPC64_DTPREL16_LO:
5532 case R_PPC64_DTPREL16_HI:
5533 case R_PPC64_DTPREL16_HA:
5534 case R_PPC64_DTPREL16_DS:
5535 case R_PPC64_DTPREL16_LO_DS:
5536 case R_PPC64_DTPREL16_HIGH:
5537 case R_PPC64_DTPREL16_HIGHA:
5538 case R_PPC64_DTPREL16_HIGHER:
5539 case R_PPC64_DTPREL16_HIGHERA:
5540 case R_PPC64_DTPREL16_HIGHEST:
5541 case R_PPC64_DTPREL16_HIGHESTA:
5546 case R_PPC64_REL16_LO:
5547 case R_PPC64_REL16_HI:
5548 case R_PPC64_REL16_HA:
5549 case R_PPC64_REL16DX_HA:
5552 /* Not supported as a dynamic relocation. */
5553 case R_PPC64_ADDR64_LOCAL:
5554 if (bfd_link_pic (info))
5556 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5558 info->callbacks->einfo (_("%P: %H: %s reloc unsupported "
5559 "in shared libraries and PIEs.\n"),
5560 abfd, sec, rel->r_offset,
5561 ppc64_elf_howto_table[r_type]->name);
5562 bfd_set_error (bfd_error_bad_value);
5568 case R_PPC64_TOC16_DS:
5569 htab->do_multi_toc = 1;
5570 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5571 case R_PPC64_TOC16_LO:
5572 case R_PPC64_TOC16_HI:
5573 case R_PPC64_TOC16_HA:
5574 case R_PPC64_TOC16_LO_DS:
5575 sec->has_toc_reloc = 1;
5578 /* This relocation describes the C++ object vtable hierarchy.
5579 Reconstruct it for later use during GC. */
5580 case R_PPC64_GNU_VTINHERIT:
5581 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5585 /* This relocation describes which C++ vtable entries are actually
5586 used. Record for later use during GC. */
5587 case R_PPC64_GNU_VTENTRY:
5588 BFD_ASSERT (h != NULL);
5590 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5595 case R_PPC64_REL14_BRTAKEN:
5596 case R_PPC64_REL14_BRNTAKEN:
5598 asection *dest = NULL;
5600 /* Heuristic: If jumping outside our section, chances are
5601 we are going to need a stub. */
5604 /* If the sym is weak it may be overridden later, so
5605 don't assume we know where a weak sym lives. */
5606 if (h->root.type == bfd_link_hash_defined)
5607 dest = h->root.u.def.section;
5611 Elf_Internal_Sym *isym;
5613 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5618 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5622 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
5627 if (h != NULL && ifunc == NULL)
5629 /* We may need a .plt entry if the function this reloc
5630 refers to is in a shared lib. */
5631 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5634 if (h->root.root.string[0] == '.'
5635 && h->root.root.string[1] != '\0')
5636 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5637 if (h == tga || h == dottga)
5638 sec->has_tls_reloc = 1;
5642 case R_PPC64_TPREL64:
5643 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
5644 if (bfd_link_pic (info))
5645 info->flags |= DF_STATIC_TLS;
5648 case R_PPC64_DTPMOD64:
5649 if (rel + 1 < rel_end
5650 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5651 && rel[1].r_offset == rel->r_offset + 8)
5652 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
5654 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
5657 case R_PPC64_DTPREL64:
5658 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5660 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5661 && rel[-1].r_offset == rel->r_offset - 8)
5662 /* This is the second reloc of a dtpmod, dtprel pair.
5663 Don't mark with TLS_DTPREL. */
5667 sec->has_tls_reloc = 1;
5670 struct ppc_link_hash_entry *eh;
5671 eh = (struct ppc_link_hash_entry *) h;
5672 eh->tls_mask |= tls_type;
5675 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5676 rel->r_addend, tls_type))
5679 ppc64_sec = ppc64_elf_section_data (sec);
5680 if (ppc64_sec->sec_type != sec_toc)
5684 /* One extra to simplify get_tls_mask. */
5685 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5686 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5687 if (ppc64_sec->u.toc.symndx == NULL)
5689 amt = sec->size * sizeof (bfd_vma) / 8;
5690 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5691 if (ppc64_sec->u.toc.add == NULL)
5693 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5694 ppc64_sec->sec_type = sec_toc;
5696 BFD_ASSERT (rel->r_offset % 8 == 0);
5697 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5698 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5700 /* Mark the second slot of a GD or LD entry.
5701 -1 to indicate GD and -2 to indicate LD. */
5702 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5703 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5704 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5705 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5708 case R_PPC64_TPREL16:
5709 case R_PPC64_TPREL16_LO:
5710 case R_PPC64_TPREL16_HI:
5711 case R_PPC64_TPREL16_HA:
5712 case R_PPC64_TPREL16_DS:
5713 case R_PPC64_TPREL16_LO_DS:
5714 case R_PPC64_TPREL16_HIGH:
5715 case R_PPC64_TPREL16_HIGHA:
5716 case R_PPC64_TPREL16_HIGHER:
5717 case R_PPC64_TPREL16_HIGHERA:
5718 case R_PPC64_TPREL16_HIGHEST:
5719 case R_PPC64_TPREL16_HIGHESTA:
5720 if (bfd_link_pic (info))
5722 info->flags |= DF_STATIC_TLS;
5727 case R_PPC64_ADDR64:
5728 if (opd_sym_map != NULL
5729 && rel + 1 < rel_end
5730 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5734 if (h->root.root.string[0] == '.'
5735 && h->root.root.string[1] != 0
5736 && lookup_fdh ((struct ppc_link_hash_entry *) h, htab))
5739 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5744 Elf_Internal_Sym *isym;
5746 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5751 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5752 if (s != NULL && s != sec)
5753 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5758 case R_PPC64_ADDR16:
5759 case R_PPC64_ADDR16_DS:
5760 case R_PPC64_ADDR16_HA:
5761 case R_PPC64_ADDR16_HI:
5762 case R_PPC64_ADDR16_HIGH:
5763 case R_PPC64_ADDR16_HIGHA:
5764 case R_PPC64_ADDR16_HIGHER:
5765 case R_PPC64_ADDR16_HIGHERA:
5766 case R_PPC64_ADDR16_HIGHEST:
5767 case R_PPC64_ADDR16_HIGHESTA:
5768 case R_PPC64_ADDR16_LO:
5769 case R_PPC64_ADDR16_LO_DS:
5770 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5771 && rel->r_addend == 0)
5773 /* We may need a .plt entry if this reloc refers to a
5774 function in a shared lib. */
5775 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5777 h->pointer_equality_needed = 1;
5784 case R_PPC64_ADDR14:
5785 case R_PPC64_ADDR14_BRNTAKEN:
5786 case R_PPC64_ADDR14_BRTAKEN:
5787 case R_PPC64_ADDR24:
5788 case R_PPC64_ADDR32:
5789 case R_PPC64_UADDR16:
5790 case R_PPC64_UADDR32:
5791 case R_PPC64_UADDR64:
5793 if (h != NULL && !bfd_link_pic (info))
5794 /* We may need a copy reloc. */
5797 /* Don't propagate .opd relocs. */
5798 if (NO_OPD_RELOCS && opd_sym_map != NULL)
5801 /* If we are creating a shared library, and this is a reloc
5802 against a global symbol, or a non PC relative reloc
5803 against a local symbol, then we need to copy the reloc
5804 into the shared library. However, if we are linking with
5805 -Bsymbolic, we do not need to copy a reloc against a
5806 global symbol which is defined in an object we are
5807 including in the link (i.e., DEF_REGULAR is set). At
5808 this point we have not seen all the input files, so it is
5809 possible that DEF_REGULAR is not set now but will be set
5810 later (it is never cleared). In case of a weak definition,
5811 DEF_REGULAR may be cleared later by a strong definition in
5812 a shared library. We account for that possibility below by
5813 storing information in the dyn_relocs field of the hash
5814 table entry. A similar situation occurs when creating
5815 shared libraries and symbol visibility changes render the
5818 If on the other hand, we are creating an executable, we
5819 may need to keep relocations for symbols satisfied by a
5820 dynamic library if we manage to avoid copy relocs for the
5823 if ((bfd_link_pic (info)
5824 && (must_be_dyn_reloc (info, r_type)
5826 && (!SYMBOLIC_BIND (info, h)
5827 || h->root.type == bfd_link_hash_defweak
5828 || !h->def_regular))))
5829 || (ELIMINATE_COPY_RELOCS
5830 && !bfd_link_pic (info)
5832 && (h->root.type == bfd_link_hash_defweak
5833 || !h->def_regular))
5834 || (!bfd_link_pic (info)
5837 /* We must copy these reloc types into the output file.
5838 Create a reloc section in dynobj and make room for
5842 sreloc = _bfd_elf_make_dynamic_reloc_section
5843 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5849 /* If this is a global symbol, we count the number of
5850 relocations we need for this symbol. */
5853 struct elf_dyn_relocs *p;
5854 struct elf_dyn_relocs **head;
5856 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5858 if (p == NULL || p->sec != sec)
5860 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5870 if (!must_be_dyn_reloc (info, r_type))
5875 /* Track dynamic relocs needed for local syms too.
5876 We really need local syms available to do this
5878 struct ppc_dyn_relocs *p;
5879 struct ppc_dyn_relocs **head;
5880 bfd_boolean is_ifunc;
5883 Elf_Internal_Sym *isym;
5885 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5890 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5894 vpp = &elf_section_data (s)->local_dynrel;
5895 head = (struct ppc_dyn_relocs **) vpp;
5896 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5898 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5900 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5902 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5908 p->ifunc = is_ifunc;
5924 /* Merge backend specific data from an object file to the output
5925 object file when linking. */
5928 ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
5930 unsigned long iflags, oflags;
5932 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5935 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5938 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
5941 iflags = elf_elfheader (ibfd)->e_flags;
5942 oflags = elf_elfheader (obfd)->e_flags;
5944 if (iflags & ~EF_PPC64_ABI)
5946 (*_bfd_error_handler)
5947 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
5948 bfd_set_error (bfd_error_bad_value);
5951 else if (iflags != oflags && iflags != 0)
5953 (*_bfd_error_handler)
5954 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
5955 ibfd, iflags, oflags);
5956 bfd_set_error (bfd_error_bad_value);
5960 /* Merge Tag_compatibility attributes and any common GNU ones. */
5961 _bfd_elf_merge_object_attributes (ibfd, obfd);
5967 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5969 /* Print normal ELF private data. */
5970 _bfd_elf_print_private_bfd_data (abfd, ptr);
5972 if (elf_elfheader (abfd)->e_flags != 0)
5976 /* xgettext:c-format */
5977 fprintf (file, _("private flags = 0x%lx:"),
5978 elf_elfheader (abfd)->e_flags);
5980 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5981 fprintf (file, _(" [abiv%ld]"),
5982 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5989 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5990 of the code entry point, and its section, which must be in the same
5991 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5994 opd_entry_value (asection *opd_sec,
5996 asection **code_sec,
5998 bfd_boolean in_code_sec)
6000 bfd *opd_bfd = opd_sec->owner;
6001 Elf_Internal_Rela *relocs;
6002 Elf_Internal_Rela *lo, *hi, *look;
6005 /* No relocs implies we are linking a --just-symbols object, or looking
6006 at a final linked executable with addr2line or somesuch. */
6007 if (opd_sec->reloc_count == 0)
6009 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
6011 if (contents == NULL)
6013 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6014 return (bfd_vma) -1;
6015 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6018 /* PR 17512: file: 64b9dfbb. */
6019 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
6020 return (bfd_vma) -1;
6022 val = bfd_get_64 (opd_bfd, contents + offset);
6023 if (code_sec != NULL)
6025 asection *sec, *likely = NULL;
6031 && val < sec->vma + sec->size)
6037 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6039 && (sec->flags & SEC_LOAD) != 0
6040 && (sec->flags & SEC_ALLOC) != 0)
6045 if (code_off != NULL)
6046 *code_off = val - likely->vma;
6052 BFD_ASSERT (is_ppc64_elf (opd_bfd));
6054 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
6056 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
6057 /* PR 17512: file: df8e1fd6. */
6059 return (bfd_vma) -1;
6061 /* Go find the opd reloc at the sym address. */
6063 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
6067 look = lo + (hi - lo) / 2;
6068 if (look->r_offset < offset)
6070 else if (look->r_offset > offset)
6074 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6076 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6077 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6079 unsigned long symndx = ELF64_R_SYM (look->r_info);
6080 asection *sec = NULL;
6082 if (symndx >= symtab_hdr->sh_info
6083 && elf_sym_hashes (opd_bfd) != NULL)
6085 struct elf_link_hash_entry **sym_hashes;
6086 struct elf_link_hash_entry *rh;
6088 sym_hashes = elf_sym_hashes (opd_bfd);
6089 rh = sym_hashes[symndx - symtab_hdr->sh_info];
6092 rh = elf_follow_link (rh);
6093 if (rh->root.type != bfd_link_hash_defined
6094 && rh->root.type != bfd_link_hash_defweak)
6096 if (rh->root.u.def.section->owner == opd_bfd)
6098 val = rh->root.u.def.value;
6099 sec = rh->root.u.def.section;
6106 Elf_Internal_Sym *sym;
6108 if (symndx < symtab_hdr->sh_info)
6110 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6113 size_t symcnt = symtab_hdr->sh_info;
6114 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6119 symtab_hdr->contents = (bfd_byte *) sym;
6125 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6131 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6134 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6135 val = sym->st_value;
6138 val += look->r_addend;
6139 if (code_off != NULL)
6141 if (code_sec != NULL)
6143 if (in_code_sec && *code_sec != sec)
6148 if (sec->output_section != NULL)
6149 val += sec->output_section->vma + sec->output_offset;
6158 /* If the ELF symbol SYM might be a function in SEC, return the
6159 function size and set *CODE_OFF to the function's entry point,
6160 otherwise return zero. */
6162 static bfd_size_type
6163 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6168 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6169 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6173 if (!(sym->flags & BSF_SYNTHETIC))
6174 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6176 if (strcmp (sym->section->name, ".opd") == 0)
6178 struct _opd_sec_data *opd = get_opd_info (sym->section);
6179 bfd_vma symval = sym->value;
6182 && opd->adjust != NULL
6183 && elf_section_data (sym->section)->relocs != NULL)
6185 /* opd_entry_value will use cached relocs that have been
6186 adjusted, but with raw symbols. That means both local
6187 and global symbols need adjusting. */
6188 long adjust = opd->adjust[OPD_NDX (symval)];
6194 if (opd_entry_value (sym->section, symval,
6195 &sec, code_off, TRUE) == (bfd_vma) -1)
6197 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6198 symbol. This size has nothing to do with the code size of the
6199 function, which is what we're supposed to return, but the
6200 code size isn't available without looking up the dot-sym.
6201 However, doing that would be a waste of time particularly
6202 since elf_find_function will look at the dot-sym anyway.
6203 Now, elf_find_function will keep the largest size of any
6204 function sym found at the code address of interest, so return
6205 1 here to avoid it incorrectly caching a larger function size
6206 for a small function. This does mean we return the wrong
6207 size for a new-ABI function of size 24, but all that does is
6208 disable caching for such functions. */
6214 if (sym->section != sec)
6216 *code_off = sym->value;
6223 /* Return true if symbol is defined in a regular object file. */
6226 is_static_defined (struct elf_link_hash_entry *h)
6228 return ((h->root.type == bfd_link_hash_defined
6229 || h->root.type == bfd_link_hash_defweak)
6230 && h->root.u.def.section != NULL
6231 && h->root.u.def.section->output_section != NULL);
6234 /* If FDH is a function descriptor symbol, return the associated code
6235 entry symbol if it is defined. Return NULL otherwise. */
6237 static struct ppc_link_hash_entry *
6238 defined_code_entry (struct ppc_link_hash_entry *fdh)
6240 if (fdh->is_func_descriptor)
6242 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6243 if (fh->elf.root.type == bfd_link_hash_defined
6244 || fh->elf.root.type == bfd_link_hash_defweak)
6250 /* If FH is a function code entry symbol, return the associated
6251 function descriptor symbol if it is defined. Return NULL otherwise. */
6253 static struct ppc_link_hash_entry *
6254 defined_func_desc (struct ppc_link_hash_entry *fh)
6257 && fh->oh->is_func_descriptor)
6259 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6260 if (fdh->elf.root.type == bfd_link_hash_defined
6261 || fdh->elf.root.type == bfd_link_hash_defweak)
6267 /* Mark all our entry sym sections, both opd and code section. */
6270 ppc64_elf_gc_keep (struct bfd_link_info *info)
6272 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6273 struct bfd_sym_chain *sym;
6278 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6280 struct ppc_link_hash_entry *eh, *fh;
6283 eh = (struct ppc_link_hash_entry *)
6284 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
6287 if (eh->elf.root.type != bfd_link_hash_defined
6288 && eh->elf.root.type != bfd_link_hash_defweak)
6291 fh = defined_code_entry (eh);
6294 sec = fh->elf.root.u.def.section;
6295 sec->flags |= SEC_KEEP;
6297 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6298 && opd_entry_value (eh->elf.root.u.def.section,
6299 eh->elf.root.u.def.value,
6300 &sec, NULL, FALSE) != (bfd_vma) -1)
6301 sec->flags |= SEC_KEEP;
6303 sec = eh->elf.root.u.def.section;
6304 sec->flags |= SEC_KEEP;
6308 /* Mark sections containing dynamically referenced symbols. When
6309 building shared libraries, we must assume that any visible symbol is
6313 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6315 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6316 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
6317 struct ppc_link_hash_entry *fdh;
6318 struct bfd_elf_dynamic_list *d = info->dynamic_list;
6320 /* Dynamic linking info is on the func descriptor sym. */
6321 fdh = defined_func_desc (eh);
6325 if ((eh->elf.root.type == bfd_link_hash_defined
6326 || eh->elf.root.type == bfd_link_hash_defweak)
6327 && (eh->elf.ref_dynamic
6328 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
6329 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
6330 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
6331 && (!bfd_link_executable (info)
6332 || info->export_dynamic
6335 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
6336 && (strchr (eh->elf.root.root.string, ELF_VER_CHR) != NULL
6337 || !bfd_hide_sym_by_version (info->version_info,
6338 eh->elf.root.root.string)))))
6341 struct ppc_link_hash_entry *fh;
6343 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6345 /* Function descriptor syms cause the associated
6346 function code sym section to be marked. */
6347 fh = defined_code_entry (eh);
6350 code_sec = fh->elf.root.u.def.section;
6351 code_sec->flags |= SEC_KEEP;
6353 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6354 && opd_entry_value (eh->elf.root.u.def.section,
6355 eh->elf.root.u.def.value,
6356 &code_sec, NULL, FALSE) != (bfd_vma) -1)
6357 code_sec->flags |= SEC_KEEP;
6363 /* Return the section that should be marked against GC for a given
6367 ppc64_elf_gc_mark_hook (asection *sec,
6368 struct bfd_link_info *info,
6369 Elf_Internal_Rela *rel,
6370 struct elf_link_hash_entry *h,
6371 Elf_Internal_Sym *sym)
6375 /* Syms return NULL if we're marking .opd, so we avoid marking all
6376 function sections, as all functions are referenced in .opd. */
6378 if (get_opd_info (sec) != NULL)
6383 enum elf_ppc64_reloc_type r_type;
6384 struct ppc_link_hash_entry *eh, *fh, *fdh;
6386 r_type = ELF64_R_TYPE (rel->r_info);
6389 case R_PPC64_GNU_VTINHERIT:
6390 case R_PPC64_GNU_VTENTRY:
6394 switch (h->root.type)
6396 case bfd_link_hash_defined:
6397 case bfd_link_hash_defweak:
6398 eh = (struct ppc_link_hash_entry *) h;
6399 fdh = defined_func_desc (eh);
6403 /* Function descriptor syms cause the associated
6404 function code sym section to be marked. */
6405 fh = defined_code_entry (eh);
6408 /* They also mark their opd section. */
6409 eh->elf.root.u.def.section->gc_mark = 1;
6411 rsec = fh->elf.root.u.def.section;
6413 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6414 && opd_entry_value (eh->elf.root.u.def.section,
6415 eh->elf.root.u.def.value,
6416 &rsec, NULL, FALSE) != (bfd_vma) -1)
6417 eh->elf.root.u.def.section->gc_mark = 1;
6419 rsec = h->root.u.def.section;
6422 case bfd_link_hash_common:
6423 rsec = h->root.u.c.p->section;
6427 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
6433 struct _opd_sec_data *opd;
6435 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6436 opd = get_opd_info (rsec);
6437 if (opd != NULL && opd->func_sec != NULL)
6441 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
6448 /* Update the .got, .plt. and dynamic reloc reference counts for the
6449 section being removed. */
6452 ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6453 asection *sec, const Elf_Internal_Rela *relocs)
6455 struct ppc_link_hash_table *htab;
6456 Elf_Internal_Shdr *symtab_hdr;
6457 struct elf_link_hash_entry **sym_hashes;
6458 struct got_entry **local_got_ents;
6459 const Elf_Internal_Rela *rel, *relend;
6461 if (bfd_link_relocatable (info))
6464 if ((sec->flags & SEC_ALLOC) == 0)
6467 elf_section_data (sec)->local_dynrel = NULL;
6469 htab = ppc_hash_table (info);
6473 symtab_hdr = &elf_symtab_hdr (abfd);
6474 sym_hashes = elf_sym_hashes (abfd);
6475 local_got_ents = elf_local_got_ents (abfd);
6477 relend = relocs + sec->reloc_count;
6478 for (rel = relocs; rel < relend; rel++)
6480 unsigned long r_symndx;
6481 enum elf_ppc64_reloc_type r_type;
6482 struct elf_link_hash_entry *h = NULL;
6483 unsigned char tls_type = 0;
6485 r_symndx = ELF64_R_SYM (rel->r_info);
6486 r_type = ELF64_R_TYPE (rel->r_info);
6487 if (r_symndx >= symtab_hdr->sh_info)
6489 struct ppc_link_hash_entry *eh;
6490 struct elf_dyn_relocs **pp;
6491 struct elf_dyn_relocs *p;
6493 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6494 h = elf_follow_link (h);
6495 eh = (struct ppc_link_hash_entry *) h;
6497 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6500 /* Everything must go for SEC. */
6506 if (is_branch_reloc (r_type))
6508 struct plt_entry **ifunc = NULL;
6511 if (h->type == STT_GNU_IFUNC)
6512 ifunc = &h->plt.plist;
6514 else if (local_got_ents != NULL)
6516 struct plt_entry **local_plt = (struct plt_entry **)
6517 (local_got_ents + symtab_hdr->sh_info);
6518 unsigned char *local_got_tls_masks = (unsigned char *)
6519 (local_plt + symtab_hdr->sh_info);
6520 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6521 ifunc = local_plt + r_symndx;
6525 struct plt_entry *ent;
6527 for (ent = *ifunc; ent != NULL; ent = ent->next)
6528 if (ent->addend == rel->r_addend)
6532 if (ent->plt.refcount > 0)
6533 ent->plt.refcount -= 1;
6540 case R_PPC64_GOT_TLSLD16:
6541 case R_PPC64_GOT_TLSLD16_LO:
6542 case R_PPC64_GOT_TLSLD16_HI:
6543 case R_PPC64_GOT_TLSLD16_HA:
6544 tls_type = TLS_TLS | TLS_LD;
6547 case R_PPC64_GOT_TLSGD16:
6548 case R_PPC64_GOT_TLSGD16_LO:
6549 case R_PPC64_GOT_TLSGD16_HI:
6550 case R_PPC64_GOT_TLSGD16_HA:
6551 tls_type = TLS_TLS | TLS_GD;
6554 case R_PPC64_GOT_TPREL16_DS:
6555 case R_PPC64_GOT_TPREL16_LO_DS:
6556 case R_PPC64_GOT_TPREL16_HI:
6557 case R_PPC64_GOT_TPREL16_HA:
6558 tls_type = TLS_TLS | TLS_TPREL;
6561 case R_PPC64_GOT_DTPREL16_DS:
6562 case R_PPC64_GOT_DTPREL16_LO_DS:
6563 case R_PPC64_GOT_DTPREL16_HI:
6564 case R_PPC64_GOT_DTPREL16_HA:
6565 tls_type = TLS_TLS | TLS_DTPREL;
6569 case R_PPC64_GOT16_DS:
6570 case R_PPC64_GOT16_HA:
6571 case R_PPC64_GOT16_HI:
6572 case R_PPC64_GOT16_LO:
6573 case R_PPC64_GOT16_LO_DS:
6576 struct got_entry *ent;
6581 ent = local_got_ents[r_symndx];
6583 for (; ent != NULL; ent = ent->next)
6584 if (ent->addend == rel->r_addend
6585 && ent->owner == abfd
6586 && ent->tls_type == tls_type)
6590 if (ent->got.refcount > 0)
6591 ent->got.refcount -= 1;
6595 case R_PPC64_PLT16_HA:
6596 case R_PPC64_PLT16_HI:
6597 case R_PPC64_PLT16_LO:
6601 case R_PPC64_REL14_BRNTAKEN:
6602 case R_PPC64_REL14_BRTAKEN:
6606 struct plt_entry *ent;
6608 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6609 if (ent->addend == rel->r_addend)
6611 if (ent != NULL && ent->plt.refcount > 0)
6612 ent->plt.refcount -= 1;
6623 /* The maximum size of .sfpr. */
6624 #define SFPR_MAX (218*4)
6626 struct sfpr_def_parms
6628 const char name[12];
6629 unsigned char lo, hi;
6630 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6631 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6634 /* Auto-generate _save*, _rest* functions in .sfpr.
6635 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6639 sfpr_define (struct bfd_link_info *info,
6640 const struct sfpr_def_parms *parm,
6643 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6645 size_t len = strlen (parm->name);
6646 bfd_boolean writing = FALSE;
6652 memcpy (sym, parm->name, len);
6655 for (i = parm->lo; i <= parm->hi; i++)
6657 struct ppc_link_hash_entry *h;
6659 sym[len + 0] = i / 10 + '0';
6660 sym[len + 1] = i % 10 + '0';
6661 h = (struct ppc_link_hash_entry *)
6662 elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
6663 if (stub_sec != NULL)
6666 && h->elf.root.type == bfd_link_hash_defined
6667 && h->elf.root.u.def.section == htab->sfpr)
6669 struct elf_link_hash_entry *s;
6671 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6672 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6675 if (s->root.type == bfd_link_hash_new
6676 || (s->root.type = bfd_link_hash_defined
6677 && s->root.u.def.section == stub_sec))
6679 s->root.type = bfd_link_hash_defined;
6680 s->root.u.def.section = stub_sec;
6681 s->root.u.def.value = (stub_sec->size
6682 + h->elf.root.u.def.value);
6685 s->ref_regular_nonweak = 1;
6686 s->forced_local = 1;
6688 s->root.linker_def = 1;
6696 if (!h->elf.def_regular)
6698 h->elf.root.type = bfd_link_hash_defined;
6699 h->elf.root.u.def.section = htab->sfpr;
6700 h->elf.root.u.def.value = htab->sfpr->size;
6701 h->elf.type = STT_FUNC;
6702 h->elf.def_regular = 1;
6703 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6705 if (htab->sfpr->contents == NULL)
6707 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6708 if (htab->sfpr->contents == NULL)
6715 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6717 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6719 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6720 htab->sfpr->size = p - htab->sfpr->contents;
6728 savegpr0 (bfd *abfd, bfd_byte *p, int r)
6730 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6735 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6737 p = savegpr0 (abfd, p, r);
6738 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6740 bfd_put_32 (abfd, BLR, p);
6745 restgpr0 (bfd *abfd, bfd_byte *p, int r)
6747 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6752 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6754 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6756 p = restgpr0 (abfd, p, r);
6757 bfd_put_32 (abfd, MTLR_R0, p);
6761 p = restgpr0 (abfd, p, 30);
6762 p = restgpr0 (abfd, p, 31);
6764 bfd_put_32 (abfd, BLR, p);
6769 savegpr1 (bfd *abfd, bfd_byte *p, int r)
6771 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6776 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6778 p = savegpr1 (abfd, p, r);
6779 bfd_put_32 (abfd, BLR, p);
6784 restgpr1 (bfd *abfd, bfd_byte *p, int r)
6786 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6791 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6793 p = restgpr1 (abfd, p, r);
6794 bfd_put_32 (abfd, BLR, p);
6799 savefpr (bfd *abfd, bfd_byte *p, int r)
6801 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6806 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6808 p = savefpr (abfd, p, r);
6809 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6811 bfd_put_32 (abfd, BLR, p);
6816 restfpr (bfd *abfd, bfd_byte *p, int r)
6818 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6823 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6825 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6827 p = restfpr (abfd, p, r);
6828 bfd_put_32 (abfd, MTLR_R0, p);
6832 p = restfpr (abfd, p, 30);
6833 p = restfpr (abfd, p, 31);
6835 bfd_put_32 (abfd, BLR, p);
6840 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6842 p = savefpr (abfd, p, r);
6843 bfd_put_32 (abfd, BLR, p);
6848 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6850 p = restfpr (abfd, p, r);
6851 bfd_put_32 (abfd, BLR, p);
6856 savevr (bfd *abfd, bfd_byte *p, int r)
6858 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6860 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6865 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6867 p = savevr (abfd, p, r);
6868 bfd_put_32 (abfd, BLR, p);
6873 restvr (bfd *abfd, bfd_byte *p, int r)
6875 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6877 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6882 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6884 p = restvr (abfd, p, r);
6885 bfd_put_32 (abfd, BLR, p);
6889 /* Called via elf_link_hash_traverse to transfer dynamic linking
6890 information on function code symbol entries to their corresponding
6891 function descriptor symbol entries. */
6894 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6896 struct bfd_link_info *info;
6897 struct ppc_link_hash_table *htab;
6898 struct plt_entry *ent;
6899 struct ppc_link_hash_entry *fh;
6900 struct ppc_link_hash_entry *fdh;
6901 bfd_boolean force_local;
6903 fh = (struct ppc_link_hash_entry *) h;
6904 if (fh->elf.root.type == bfd_link_hash_indirect)
6908 htab = ppc_hash_table (info);
6912 /* Resolve undefined references to dot-symbols as the value
6913 in the function descriptor, if we have one in a regular object.
6914 This is to satisfy cases like ".quad .foo". Calls to functions
6915 in dynamic objects are handled elsewhere. */
6916 if (fh->elf.root.type == bfd_link_hash_undefweak
6917 && fh->was_undefined
6918 && (fdh = defined_func_desc (fh)) != NULL
6919 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6920 && opd_entry_value (fdh->elf.root.u.def.section,
6921 fdh->elf.root.u.def.value,
6922 &fh->elf.root.u.def.section,
6923 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6925 fh->elf.root.type = fdh->elf.root.type;
6926 fh->elf.forced_local = 1;
6927 fh->elf.def_regular = fdh->elf.def_regular;
6928 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6931 /* If this is a function code symbol, transfer dynamic linking
6932 information to the function descriptor symbol. */
6936 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6937 if (ent->plt.refcount > 0)
6940 || fh->elf.root.root.string[0] != '.'
6941 || fh->elf.root.root.string[1] == '\0')
6944 /* Find the corresponding function descriptor symbol. Create it
6945 as undefined if necessary. */
6947 fdh = lookup_fdh (fh, htab);
6949 && !bfd_link_executable (info)
6950 && (fh->elf.root.type == bfd_link_hash_undefined
6951 || fh->elf.root.type == bfd_link_hash_undefweak))
6953 fdh = make_fdh (info, fh);
6958 /* Fake function descriptors are made undefweak. If the function
6959 code symbol is strong undefined, make the fake sym the same.
6960 If the function code symbol is defined, then force the fake
6961 descriptor local; We can't support overriding of symbols in a
6962 shared library on a fake descriptor. */
6966 && fdh->elf.root.type == bfd_link_hash_undefweak)
6968 if (fh->elf.root.type == bfd_link_hash_undefined)
6970 fdh->elf.root.type = bfd_link_hash_undefined;
6971 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
6973 else if (fh->elf.root.type == bfd_link_hash_defined
6974 || fh->elf.root.type == bfd_link_hash_defweak)
6976 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6981 && !fdh->elf.forced_local
6982 && (!bfd_link_executable (info)
6983 || fdh->elf.def_dynamic
6984 || fdh->elf.ref_dynamic
6985 || (fdh->elf.root.type == bfd_link_hash_undefweak
6986 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
6988 if (fdh->elf.dynindx == -1)
6989 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6991 fdh->elf.ref_regular |= fh->elf.ref_regular;
6992 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6993 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6994 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6995 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
6997 move_plt_plist (fh, fdh);
6998 fdh->elf.needs_plt = 1;
7000 fdh->is_func_descriptor = 1;
7005 /* Now that the info is on the function descriptor, clear the
7006 function code sym info. Any function code syms for which we
7007 don't have a definition in a regular file, we force local.
7008 This prevents a shared library from exporting syms that have
7009 been imported from another library. Function code syms that
7010 are really in the library we must leave global to prevent the
7011 linker dragging in a definition from a static library. */
7012 force_local = (!fh->elf.def_regular
7014 || !fdh->elf.def_regular
7015 || fdh->elf.forced_local);
7016 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7021 static const struct sfpr_def_parms save_res_funcs[] =
7023 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7024 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7025 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7026 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7027 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7028 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7029 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7030 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7031 { "._savef", 14, 31, savefpr, savefpr1_tail },
7032 { "._restf", 14, 31, restfpr, restfpr1_tail },
7033 { "_savevr_", 20, 31, savevr, savevr_tail },
7034 { "_restvr_", 20, 31, restvr, restvr_tail }
7037 /* Called near the start of bfd_elf_size_dynamic_sections. We use
7038 this hook to a) provide some gcc support functions, and b) transfer
7039 dynamic linking information gathered so far on function code symbol
7040 entries, to their corresponding function descriptor symbol entries. */
7043 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7044 struct bfd_link_info *info)
7046 struct ppc_link_hash_table *htab;
7049 htab = ppc_hash_table (info);
7053 if (!bfd_link_relocatable (info)
7054 && htab->elf.hgot != NULL)
7056 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7057 /* Make .TOC. defined so as to prevent it being made dynamic.
7058 The wrong value here is fixed later in ppc64_elf_set_toc. */
7059 if (!htab->elf.hgot->def_regular
7060 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7062 htab->elf.hgot->root.type = bfd_link_hash_defined;
7063 htab->elf.hgot->root.u.def.value = 0;
7064 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7065 htab->elf.hgot->def_regular = 1;
7066 htab->elf.hgot->root.linker_def = 1;
7068 htab->elf.hgot->type = STT_OBJECT;
7069 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7073 if (htab->sfpr == NULL)
7074 /* We don't have any relocs. */
7077 /* Provide any missing _save* and _rest* functions. */
7078 htab->sfpr->size = 0;
7079 if (htab->params->save_restore_funcs)
7080 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7081 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7084 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7086 if (htab->sfpr->size == 0)
7087 htab->sfpr->flags |= SEC_EXCLUDE;
7092 /* Return true if we have dynamic relocs that apply to read-only sections. */
7095 readonly_dynrelocs (struct elf_link_hash_entry *h)
7097 struct ppc_link_hash_entry *eh;
7098 struct elf_dyn_relocs *p;
7100 eh = (struct ppc_link_hash_entry *) h;
7101 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7103 asection *s = p->sec->output_section;
7105 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7111 /* Adjust a symbol defined by a dynamic object and referenced by a
7112 regular object. The current definition is in some section of the
7113 dynamic object, but we're not including those sections. We have to
7114 change the definition to something the rest of the link can
7118 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7119 struct elf_link_hash_entry *h)
7121 struct ppc_link_hash_table *htab;
7124 htab = ppc_hash_table (info);
7128 /* Deal with function syms. */
7129 if (h->type == STT_FUNC
7130 || h->type == STT_GNU_IFUNC
7133 /* Clear procedure linkage table information for any symbol that
7134 won't need a .plt entry. */
7135 struct plt_entry *ent;
7136 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7137 if (ent->plt.refcount > 0)
7140 || (h->type != STT_GNU_IFUNC
7141 && (SYMBOL_CALLS_LOCAL (info, h)
7142 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
7143 && h->root.type == bfd_link_hash_undefweak)))
7144 || ((struct ppc_link_hash_entry *) h)->save_res)
7146 h->plt.plist = NULL;
7148 h->pointer_equality_needed = 0;
7150 else if (abiversion (info->output_bfd) == 2)
7152 /* Taking a function's address in a read/write section
7153 doesn't require us to define the function symbol in the
7154 executable on a global entry stub. A dynamic reloc can
7156 if (h->pointer_equality_needed
7157 && h->type != STT_GNU_IFUNC
7158 && !readonly_dynrelocs (h))
7160 h->pointer_equality_needed = 0;
7164 /* After adjust_dynamic_symbol, non_got_ref set in the
7165 non-shared case means that we have allocated space in
7166 .dynbss for the symbol and thus dyn_relocs for this
7167 symbol should be discarded.
7168 If we get here we know we are making a PLT entry for this
7169 symbol, and in an executable we'd normally resolve
7170 relocations against this symbol to the PLT entry. Allow
7171 dynamic relocs if the reference is weak, and the dynamic
7172 relocs will not cause text relocation. */
7173 else if (!h->ref_regular_nonweak
7175 && h->type != STT_GNU_IFUNC
7176 && !readonly_dynrelocs (h))
7179 /* If making a plt entry, then we don't need copy relocs. */
7184 h->plt.plist = NULL;
7186 /* If this is a weak symbol, and there is a real definition, the
7187 processor independent code will have arranged for us to see the
7188 real definition first, and we can just use the same value. */
7189 if (h->u.weakdef != NULL)
7191 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7192 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7193 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7194 h->root.u.def.value = h->u.weakdef->root.u.def.value;
7195 if (ELIMINATE_COPY_RELOCS)
7196 h->non_got_ref = h->u.weakdef->non_got_ref;
7200 /* If we are creating a shared library, we must presume that the
7201 only references to the symbol are via the global offset table.
7202 For such cases we need not do anything here; the relocations will
7203 be handled correctly by relocate_section. */
7204 if (bfd_link_pic (info))
7207 /* If there are no references to this symbol that do not use the
7208 GOT, we don't need to generate a copy reloc. */
7209 if (!h->non_got_ref)
7212 /* Don't generate a copy reloc for symbols defined in the executable. */
7213 if (!h->def_dynamic || !h->ref_regular || h->def_regular)
7216 /* If -z nocopyreloc was given, don't generate them either. */
7217 if (info->nocopyreloc)
7223 /* If we didn't find any dynamic relocs in read-only sections, then
7224 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7225 if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
7231 /* Protected variables do not work with .dynbss. The copy in
7232 .dynbss won't be used by the shared library with the protected
7233 definition for the variable. Text relocations are preferable
7234 to an incorrect program. */
7235 if (h->protected_def)
7241 if (h->plt.plist != NULL)
7243 /* We should never get here, but unfortunately there are versions
7244 of gcc out there that improperly (for this ABI) put initialized
7245 function pointers, vtable refs and suchlike in read-only
7246 sections. Allow them to proceed, but warn that this might
7247 break at runtime. */
7248 info->callbacks->einfo
7249 (_("%P: copy reloc against `%T' requires lazy plt linking; "
7250 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7251 h->root.root.string);
7254 /* This is a reference to a symbol defined by a dynamic object which
7255 is not a function. */
7257 /* We must allocate the symbol in our .dynbss section, which will
7258 become part of the .bss section of the executable. There will be
7259 an entry for this symbol in the .dynsym section. The dynamic
7260 object will contain position independent code, so all references
7261 from the dynamic object to this symbol will go through the global
7262 offset table. The dynamic linker will use the .dynsym entry to
7263 determine the address it must put in the global offset table, so
7264 both the dynamic object and the regular object will refer to the
7265 same memory location for the variable. */
7267 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7268 to copy the initial value out of the dynamic object and into the
7269 runtime process image. We need to remember the offset into the
7270 .rela.bss section we are going to use. */
7271 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
7273 htab->relbss->size += sizeof (Elf64_External_Rela);
7279 return _bfd_elf_adjust_dynamic_copy (info, h, s);
7282 /* If given a function descriptor symbol, hide both the function code
7283 sym and the descriptor. */
7285 ppc64_elf_hide_symbol (struct bfd_link_info *info,
7286 struct elf_link_hash_entry *h,
7287 bfd_boolean force_local)
7289 struct ppc_link_hash_entry *eh;
7290 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7292 eh = (struct ppc_link_hash_entry *) h;
7293 if (eh->is_func_descriptor)
7295 struct ppc_link_hash_entry *fh = eh->oh;
7300 struct ppc_link_hash_table *htab;
7303 /* We aren't supposed to use alloca in BFD because on
7304 systems which do not have alloca the version in libiberty
7305 calls xmalloc, which might cause the program to crash
7306 when it runs out of memory. This function doesn't have a
7307 return status, so there's no way to gracefully return an
7308 error. So cheat. We know that string[-1] can be safely
7309 accessed; It's either a string in an ELF string table,
7310 or allocated in an objalloc structure. */
7312 p = eh->elf.root.root.string - 1;
7315 htab = ppc_hash_table (info);
7319 fh = (struct ppc_link_hash_entry *)
7320 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
7323 /* Unfortunately, if it so happens that the string we were
7324 looking for was allocated immediately before this string,
7325 then we overwrote the string terminator. That's the only
7326 reason the lookup should fail. */
7329 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7330 while (q >= eh->elf.root.root.string && *q == *p)
7332 if (q < eh->elf.root.root.string && *p == '.')
7333 fh = (struct ppc_link_hash_entry *)
7334 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
7343 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7348 get_sym_h (struct elf_link_hash_entry **hp,
7349 Elf_Internal_Sym **symp,
7351 unsigned char **tls_maskp,
7352 Elf_Internal_Sym **locsymsp,
7353 unsigned long r_symndx,
7356 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7358 if (r_symndx >= symtab_hdr->sh_info)
7360 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7361 struct elf_link_hash_entry *h;
7363 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7364 h = elf_follow_link (h);
7372 if (symsecp != NULL)
7374 asection *symsec = NULL;
7375 if (h->root.type == bfd_link_hash_defined
7376 || h->root.type == bfd_link_hash_defweak)
7377 symsec = h->root.u.def.section;
7381 if (tls_maskp != NULL)
7383 struct ppc_link_hash_entry *eh;
7385 eh = (struct ppc_link_hash_entry *) h;
7386 *tls_maskp = &eh->tls_mask;
7391 Elf_Internal_Sym *sym;
7392 Elf_Internal_Sym *locsyms = *locsymsp;
7394 if (locsyms == NULL)
7396 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7397 if (locsyms == NULL)
7398 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7399 symtab_hdr->sh_info,
7400 0, NULL, NULL, NULL);
7401 if (locsyms == NULL)
7403 *locsymsp = locsyms;
7405 sym = locsyms + r_symndx;
7413 if (symsecp != NULL)
7414 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
7416 if (tls_maskp != NULL)
7418 struct got_entry **lgot_ents;
7419 unsigned char *tls_mask;
7422 lgot_ents = elf_local_got_ents (ibfd);
7423 if (lgot_ents != NULL)
7425 struct plt_entry **local_plt = (struct plt_entry **)
7426 (lgot_ents + symtab_hdr->sh_info);
7427 unsigned char *lgot_masks = (unsigned char *)
7428 (local_plt + symtab_hdr->sh_info);
7429 tls_mask = &lgot_masks[r_symndx];
7431 *tls_maskp = tls_mask;
7437 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7438 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7439 type suitable for optimization, and 1 otherwise. */
7442 get_tls_mask (unsigned char **tls_maskp,
7443 unsigned long *toc_symndx,
7444 bfd_vma *toc_addend,
7445 Elf_Internal_Sym **locsymsp,
7446 const Elf_Internal_Rela *rel,
7449 unsigned long r_symndx;
7451 struct elf_link_hash_entry *h;
7452 Elf_Internal_Sym *sym;
7456 r_symndx = ELF64_R_SYM (rel->r_info);
7457 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7460 if ((*tls_maskp != NULL && **tls_maskp != 0)
7462 || ppc64_elf_section_data (sec) == NULL
7463 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
7466 /* Look inside a TOC section too. */
7469 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7470 off = h->root.u.def.value;
7473 off = sym->st_value;
7474 off += rel->r_addend;
7475 BFD_ASSERT (off % 8 == 0);
7476 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7477 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
7478 if (toc_symndx != NULL)
7479 *toc_symndx = r_symndx;
7480 if (toc_addend != NULL)
7481 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7482 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7484 if ((h == NULL || is_static_defined (h))
7485 && (next_r == -1 || next_r == -2))
7490 /* Find (or create) an entry in the tocsave hash table. */
7492 static struct tocsave_entry *
7493 tocsave_find (struct ppc_link_hash_table *htab,
7494 enum insert_option insert,
7495 Elf_Internal_Sym **local_syms,
7496 const Elf_Internal_Rela *irela,
7499 unsigned long r_indx;
7500 struct elf_link_hash_entry *h;
7501 Elf_Internal_Sym *sym;
7502 struct tocsave_entry ent, *p;
7504 struct tocsave_entry **slot;
7506 r_indx = ELF64_R_SYM (irela->r_info);
7507 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7509 if (ent.sec == NULL || ent.sec->output_section == NULL)
7511 (*_bfd_error_handler)
7512 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7517 ent.offset = h->root.u.def.value;
7519 ent.offset = sym->st_value;
7520 ent.offset += irela->r_addend;
7522 hash = tocsave_htab_hash (&ent);
7523 slot = ((struct tocsave_entry **)
7524 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7530 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7539 /* Adjust all global syms defined in opd sections. In gcc generated
7540 code for the old ABI, these will already have been done. */
7543 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7545 struct ppc_link_hash_entry *eh;
7547 struct _opd_sec_data *opd;
7549 if (h->root.type == bfd_link_hash_indirect)
7552 if (h->root.type != bfd_link_hash_defined
7553 && h->root.type != bfd_link_hash_defweak)
7556 eh = (struct ppc_link_hash_entry *) h;
7557 if (eh->adjust_done)
7560 sym_sec = eh->elf.root.u.def.section;
7561 opd = get_opd_info (sym_sec);
7562 if (opd != NULL && opd->adjust != NULL)
7564 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
7567 /* This entry has been deleted. */
7568 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
7571 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
7572 if (discarded_section (dsec))
7574 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
7578 eh->elf.root.u.def.value = 0;
7579 eh->elf.root.u.def.section = dsec;
7582 eh->elf.root.u.def.value += adjust;
7583 eh->adjust_done = 1;
7588 /* Handles decrementing dynamic reloc counts for the reloc specified by
7589 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7590 have already been determined. */
7593 dec_dynrel_count (bfd_vma r_info,
7595 struct bfd_link_info *info,
7596 Elf_Internal_Sym **local_syms,
7597 struct elf_link_hash_entry *h,
7598 Elf_Internal_Sym *sym)
7600 enum elf_ppc64_reloc_type r_type;
7601 asection *sym_sec = NULL;
7603 /* Can this reloc be dynamic? This switch, and later tests here
7604 should be kept in sync with the code in check_relocs. */
7605 r_type = ELF64_R_TYPE (r_info);
7611 case R_PPC64_TPREL16:
7612 case R_PPC64_TPREL16_LO:
7613 case R_PPC64_TPREL16_HI:
7614 case R_PPC64_TPREL16_HA:
7615 case R_PPC64_TPREL16_DS:
7616 case R_PPC64_TPREL16_LO_DS:
7617 case R_PPC64_TPREL16_HIGH:
7618 case R_PPC64_TPREL16_HIGHA:
7619 case R_PPC64_TPREL16_HIGHER:
7620 case R_PPC64_TPREL16_HIGHERA:
7621 case R_PPC64_TPREL16_HIGHEST:
7622 case R_PPC64_TPREL16_HIGHESTA:
7623 if (!bfd_link_pic (info))
7626 case R_PPC64_TPREL64:
7627 case R_PPC64_DTPMOD64:
7628 case R_PPC64_DTPREL64:
7629 case R_PPC64_ADDR64:
7633 case R_PPC64_ADDR14:
7634 case R_PPC64_ADDR14_BRNTAKEN:
7635 case R_PPC64_ADDR14_BRTAKEN:
7636 case R_PPC64_ADDR16:
7637 case R_PPC64_ADDR16_DS:
7638 case R_PPC64_ADDR16_HA:
7639 case R_PPC64_ADDR16_HI:
7640 case R_PPC64_ADDR16_HIGH:
7641 case R_PPC64_ADDR16_HIGHA:
7642 case R_PPC64_ADDR16_HIGHER:
7643 case R_PPC64_ADDR16_HIGHERA:
7644 case R_PPC64_ADDR16_HIGHEST:
7645 case R_PPC64_ADDR16_HIGHESTA:
7646 case R_PPC64_ADDR16_LO:
7647 case R_PPC64_ADDR16_LO_DS:
7648 case R_PPC64_ADDR24:
7649 case R_PPC64_ADDR32:
7650 case R_PPC64_UADDR16:
7651 case R_PPC64_UADDR32:
7652 case R_PPC64_UADDR64:
7657 if (local_syms != NULL)
7659 unsigned long r_symndx;
7660 bfd *ibfd = sec->owner;
7662 r_symndx = ELF64_R_SYM (r_info);
7663 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7667 if ((bfd_link_pic (info)
7668 && (must_be_dyn_reloc (info, r_type)
7670 && (!SYMBOLIC_BIND (info, h)
7671 || h->root.type == bfd_link_hash_defweak
7672 || !h->def_regular))))
7673 || (ELIMINATE_COPY_RELOCS
7674 && !bfd_link_pic (info)
7676 && (h->root.type == bfd_link_hash_defweak
7677 || !h->def_regular)))
7684 struct elf_dyn_relocs *p;
7685 struct elf_dyn_relocs **pp;
7686 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7688 /* elf_gc_sweep may have already removed all dyn relocs associated
7689 with local syms for a given section. Also, symbol flags are
7690 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7691 report a dynreloc miscount. */
7692 if (*pp == NULL && info->gc_sections)
7695 while ((p = *pp) != NULL)
7699 if (!must_be_dyn_reloc (info, r_type))
7711 struct ppc_dyn_relocs *p;
7712 struct ppc_dyn_relocs **pp;
7714 bfd_boolean is_ifunc;
7716 if (local_syms == NULL)
7717 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7718 if (sym_sec == NULL)
7721 vpp = &elf_section_data (sym_sec)->local_dynrel;
7722 pp = (struct ppc_dyn_relocs **) vpp;
7724 if (*pp == NULL && info->gc_sections)
7727 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7728 while ((p = *pp) != NULL)
7730 if (p->sec == sec && p->ifunc == is_ifunc)
7741 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
7743 bfd_set_error (bfd_error_bad_value);
7747 /* Remove unused Official Procedure Descriptor entries. Currently we
7748 only remove those associated with functions in discarded link-once
7749 sections, or weakly defined functions that have been overridden. It
7750 would be possible to remove many more entries for statically linked
7754 ppc64_elf_edit_opd (struct bfd_link_info *info)
7757 bfd_boolean some_edited = FALSE;
7758 asection *need_pad = NULL;
7759 struct ppc_link_hash_table *htab;
7761 htab = ppc_hash_table (info);
7765 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7768 Elf_Internal_Rela *relstart, *rel, *relend;
7769 Elf_Internal_Shdr *symtab_hdr;
7770 Elf_Internal_Sym *local_syms;
7771 struct _opd_sec_data *opd;
7772 bfd_boolean need_edit, add_aux_fields, broken;
7773 bfd_size_type cnt_16b = 0;
7775 if (!is_ppc64_elf (ibfd))
7778 sec = bfd_get_section_by_name (ibfd, ".opd");
7779 if (sec == NULL || sec->size == 0)
7782 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7785 if (sec->output_section == bfd_abs_section_ptr)
7788 /* Look through the section relocs. */
7789 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7793 symtab_hdr = &elf_symtab_hdr (ibfd);
7795 /* Read the relocations. */
7796 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7798 if (relstart == NULL)
7801 /* First run through the relocs to check they are sane, and to
7802 determine whether we need to edit this opd section. */
7806 relend = relstart + sec->reloc_count;
7807 for (rel = relstart; rel < relend; )
7809 enum elf_ppc64_reloc_type r_type;
7810 unsigned long r_symndx;
7812 struct elf_link_hash_entry *h;
7813 Elf_Internal_Sym *sym;
7816 /* .opd contains an array of 16 or 24 byte entries. We're
7817 only interested in the reloc pointing to a function entry
7819 offset = rel->r_offset;
7820 if (rel + 1 == relend
7821 || rel[1].r_offset != offset + 8)
7823 /* If someone messes with .opd alignment then after a
7824 "ld -r" we might have padding in the middle of .opd.
7825 Also, there's nothing to prevent someone putting
7826 something silly in .opd with the assembler. No .opd
7827 optimization for them! */
7829 (*_bfd_error_handler)
7830 (_("%B: .opd is not a regular array of opd entries"), ibfd);
7835 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7836 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7838 (*_bfd_error_handler)
7839 (_("%B: unexpected reloc type %u in .opd section"),
7845 r_symndx = ELF64_R_SYM (rel->r_info);
7846 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7850 if (sym_sec == NULL || sym_sec->owner == NULL)
7852 const char *sym_name;
7854 sym_name = h->root.root.string;
7856 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7859 (*_bfd_error_handler)
7860 (_("%B: undefined sym `%s' in .opd section"),
7866 /* opd entries are always for functions defined in the
7867 current input bfd. If the symbol isn't defined in the
7868 input bfd, then we won't be using the function in this
7869 bfd; It must be defined in a linkonce section in another
7870 bfd, or is weak. It's also possible that we are
7871 discarding the function due to a linker script /DISCARD/,
7872 which we test for via the output_section. */
7873 if (sym_sec->owner != ibfd
7874 || sym_sec->output_section == bfd_abs_section_ptr)
7878 if (rel + 1 == relend
7879 || (rel + 2 < relend
7880 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7885 if (sec->size == offset + 24)
7890 if (sec->size == offset + 16)
7897 else if (rel + 1 < relend
7898 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7899 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7901 if (rel[0].r_offset == offset + 16)
7903 else if (rel[0].r_offset != offset + 24)
7910 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7912 if (!broken && (need_edit || add_aux_fields))
7914 Elf_Internal_Rela *write_rel;
7915 Elf_Internal_Shdr *rel_hdr;
7916 bfd_byte *rptr, *wptr;
7917 bfd_byte *new_contents;
7920 new_contents = NULL;
7921 amt = OPD_NDX (sec->size) * sizeof (long);
7922 opd = &ppc64_elf_section_data (sec)->u.opd;
7923 opd->adjust = bfd_zalloc (sec->owner, amt);
7924 if (opd->adjust == NULL)
7926 ppc64_elf_section_data (sec)->sec_type = sec_opd;
7928 /* This seems a waste of time as input .opd sections are all
7929 zeros as generated by gcc, but I suppose there's no reason
7930 this will always be so. We might start putting something in
7931 the third word of .opd entries. */
7932 if ((sec->flags & SEC_IN_MEMORY) == 0)
7935 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7940 if (local_syms != NULL
7941 && symtab_hdr->contents != (unsigned char *) local_syms)
7943 if (elf_section_data (sec)->relocs != relstart)
7947 sec->contents = loc;
7948 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7951 elf_section_data (sec)->relocs = relstart;
7953 new_contents = sec->contents;
7956 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7957 if (new_contents == NULL)
7961 wptr = new_contents;
7962 rptr = sec->contents;
7963 write_rel = relstart;
7964 for (rel = relstart; rel < relend; )
7966 unsigned long r_symndx;
7968 struct elf_link_hash_entry *h;
7969 struct ppc_link_hash_entry *fdh = NULL;
7970 Elf_Internal_Sym *sym;
7972 Elf_Internal_Rela *next_rel;
7975 r_symndx = ELF64_R_SYM (rel->r_info);
7976 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7981 if (next_rel + 1 == relend
7982 || (next_rel + 2 < relend
7983 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7986 /* See if the .opd entry is full 24 byte or
7987 16 byte (with fd_aux entry overlapped with next
7990 if (next_rel == relend)
7992 if (sec->size == rel->r_offset + 16)
7995 else if (next_rel->r_offset == rel->r_offset + 16)
7999 && h->root.root.string[0] == '.')
8001 fdh = lookup_fdh ((struct ppc_link_hash_entry *) h, htab);
8003 && fdh->elf.root.type != bfd_link_hash_defined
8004 && fdh->elf.root.type != bfd_link_hash_defweak)
8008 skip = (sym_sec->owner != ibfd
8009 || sym_sec->output_section == bfd_abs_section_ptr);
8012 if (fdh != NULL && sym_sec->owner == ibfd)
8014 /* Arrange for the function descriptor sym
8016 fdh->elf.root.u.def.value = 0;
8017 fdh->elf.root.u.def.section = sym_sec;
8019 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
8021 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
8026 if (!dec_dynrel_count (rel->r_info, sec, info,
8030 if (++rel == next_rel)
8033 r_symndx = ELF64_R_SYM (rel->r_info);
8034 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8041 /* We'll be keeping this opd entry. */
8046 /* Redefine the function descriptor symbol to
8047 this location in the opd section. It is
8048 necessary to update the value here rather
8049 than using an array of adjustments as we do
8050 for local symbols, because various places
8051 in the generic ELF code use the value
8052 stored in u.def.value. */
8053 fdh->elf.root.u.def.value = wptr - new_contents;
8054 fdh->adjust_done = 1;
8057 /* Local syms are a bit tricky. We could
8058 tweak them as they can be cached, but
8059 we'd need to look through the local syms
8060 for the function descriptor sym which we
8061 don't have at the moment. So keep an
8062 array of adjustments. */
8063 adjust = (wptr - new_contents) - (rptr - sec->contents);
8064 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8067 memcpy (wptr, rptr, opd_ent_size);
8068 wptr += opd_ent_size;
8069 if (add_aux_fields && opd_ent_size == 16)
8071 memset (wptr, '\0', 8);
8075 /* We need to adjust any reloc offsets to point to the
8077 for ( ; rel != next_rel; ++rel)
8079 rel->r_offset += adjust;
8080 if (write_rel != rel)
8081 memcpy (write_rel, rel, sizeof (*rel));
8086 rptr += opd_ent_size;
8089 sec->size = wptr - new_contents;
8090 sec->reloc_count = write_rel - relstart;
8093 free (sec->contents);
8094 sec->contents = new_contents;
8097 /* Fudge the header size too, as this is used later in
8098 elf_bfd_final_link if we are emitting relocs. */
8099 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8100 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
8103 else if (elf_section_data (sec)->relocs != relstart)
8106 if (local_syms != NULL
8107 && symtab_hdr->contents != (unsigned char *) local_syms)
8109 if (!info->keep_memory)
8112 symtab_hdr->contents = (unsigned char *) local_syms;
8117 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8119 /* If we are doing a final link and the last .opd entry is just 16 byte
8120 long, add a 8 byte padding after it. */
8121 if (need_pad != NULL && !bfd_link_relocatable (info))
8125 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8127 BFD_ASSERT (need_pad->size > 0);
8129 p = bfd_malloc (need_pad->size + 8);
8133 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8134 p, 0, need_pad->size))
8137 need_pad->contents = p;
8138 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8142 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8146 need_pad->contents = p;
8149 memset (need_pad->contents + need_pad->size, 0, 8);
8150 need_pad->size += 8;
8156 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8159 ppc64_elf_tls_setup (struct bfd_link_info *info)
8161 struct ppc_link_hash_table *htab;
8163 htab = ppc_hash_table (info);
8167 if (abiversion (info->output_bfd) == 1)
8170 if (htab->params->no_multi_toc)
8171 htab->do_multi_toc = 0;
8172 else if (!htab->do_multi_toc)
8173 htab->params->no_multi_toc = 1;
8175 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8176 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8177 FALSE, FALSE, TRUE));
8178 /* Move dynamic linking info to the function descriptor sym. */
8179 if (htab->tls_get_addr != NULL)
8180 func_desc_adjust (&htab->tls_get_addr->elf, info);
8181 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8182 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8183 FALSE, FALSE, TRUE));
8184 if (htab->params->tls_get_addr_opt)
8186 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8188 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8189 FALSE, FALSE, TRUE);
8191 func_desc_adjust (opt, info);
8192 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8193 FALSE, FALSE, TRUE);
8195 && (opt_fd->root.type == bfd_link_hash_defined
8196 || opt_fd->root.type == bfd_link_hash_defweak))
8198 /* If glibc supports an optimized __tls_get_addr call stub,
8199 signalled by the presence of __tls_get_addr_opt, and we'll
8200 be calling __tls_get_addr via a plt call stub, then
8201 make __tls_get_addr point to __tls_get_addr_opt. */
8202 tga_fd = &htab->tls_get_addr_fd->elf;
8203 if (htab->elf.dynamic_sections_created
8205 && (tga_fd->type == STT_FUNC
8206 || tga_fd->needs_plt)
8207 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8208 || (ELF_ST_VISIBILITY (tga_fd->other) != STV_DEFAULT
8209 && tga_fd->root.type == bfd_link_hash_undefweak)))
8211 struct plt_entry *ent;
8213 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8214 if (ent->plt.refcount > 0)
8218 tga_fd->root.type = bfd_link_hash_indirect;
8219 tga_fd->root.u.i.link = &opt_fd->root;
8220 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
8221 if (opt_fd->dynindx != -1)
8223 /* Use __tls_get_addr_opt in dynamic relocations. */
8224 opt_fd->dynindx = -1;
8225 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8226 opt_fd->dynstr_index);
8227 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
8230 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8231 tga = &htab->tls_get_addr->elf;
8232 if (opt != NULL && tga != NULL)
8234 tga->root.type = bfd_link_hash_indirect;
8235 tga->root.u.i.link = &opt->root;
8236 ppc64_elf_copy_indirect_symbol (info, opt, tga);
8237 _bfd_elf_link_hash_hide_symbol (info, opt,
8239 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8241 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8242 htab->tls_get_addr_fd->is_func_descriptor = 1;
8243 if (htab->tls_get_addr != NULL)
8245 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8246 htab->tls_get_addr->is_func = 1;
8251 else if (htab->params->tls_get_addr_opt < 0)
8252 htab->params->tls_get_addr_opt = 0;
8254 return _bfd_elf_tls_setup (info->output_bfd, info);
8257 /* Return TRUE iff REL is a branch reloc with a global symbol matching
8261 branch_reloc_hash_match (const bfd *ibfd,
8262 const Elf_Internal_Rela *rel,
8263 const struct ppc_link_hash_entry *hash1,
8264 const struct ppc_link_hash_entry *hash2)
8266 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8267 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8268 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8270 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8272 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8273 struct elf_link_hash_entry *h;
8275 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8276 h = elf_follow_link (h);
8277 if (h == &hash1->elf || h == &hash2->elf)
8283 /* Run through all the TLS relocs looking for optimization
8284 opportunities. The linker has been hacked (see ppc64elf.em) to do
8285 a preliminary section layout so that we know the TLS segment
8286 offsets. We can't optimize earlier because some optimizations need
8287 to know the tp offset, and we need to optimize before allocating
8288 dynamic relocations. */
8291 ppc64_elf_tls_optimize (struct bfd_link_info *info)
8295 struct ppc_link_hash_table *htab;
8296 unsigned char *toc_ref;
8299 if (!bfd_link_executable (info))
8302 htab = ppc_hash_table (info);
8306 /* Make two passes over the relocs. On the first pass, mark toc
8307 entries involved with tls relocs, and check that tls relocs
8308 involved in setting up a tls_get_addr call are indeed followed by
8309 such a call. If they are not, we can't do any tls optimization.
8310 On the second pass twiddle tls_mask flags to notify
8311 relocate_section that optimization can be done, and adjust got
8312 and plt refcounts. */
8314 for (pass = 0; pass < 2; ++pass)
8315 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8317 Elf_Internal_Sym *locsyms = NULL;
8318 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8320 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8321 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8323 Elf_Internal_Rela *relstart, *rel, *relend;
8324 bfd_boolean found_tls_get_addr_arg = 0;
8326 /* Read the relocations. */
8327 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8329 if (relstart == NULL)
8335 relend = relstart + sec->reloc_count;
8336 for (rel = relstart; rel < relend; rel++)
8338 enum elf_ppc64_reloc_type r_type;
8339 unsigned long r_symndx;
8340 struct elf_link_hash_entry *h;
8341 Elf_Internal_Sym *sym;
8343 unsigned char *tls_mask;
8344 unsigned char tls_set, tls_clear, tls_type = 0;
8346 bfd_boolean ok_tprel, is_local;
8347 long toc_ref_index = 0;
8348 int expecting_tls_get_addr = 0;
8349 bfd_boolean ret = FALSE;
8351 r_symndx = ELF64_R_SYM (rel->r_info);
8352 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8356 if (elf_section_data (sec)->relocs != relstart)
8358 if (toc_ref != NULL)
8361 && (elf_symtab_hdr (ibfd).contents
8362 != (unsigned char *) locsyms))
8369 if (h->root.type == bfd_link_hash_defined
8370 || h->root.type == bfd_link_hash_defweak)
8371 value = h->root.u.def.value;
8372 else if (h->root.type == bfd_link_hash_undefweak)
8376 found_tls_get_addr_arg = 0;
8381 /* Symbols referenced by TLS relocs must be of type
8382 STT_TLS. So no need for .opd local sym adjust. */
8383 value = sym->st_value;
8392 && h->root.type == bfd_link_hash_undefweak)
8396 value += sym_sec->output_offset;
8397 value += sym_sec->output_section->vma;
8398 value -= htab->elf.tls_sec->vma;
8399 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8400 < (bfd_vma) 1 << 32);
8404 r_type = ELF64_R_TYPE (rel->r_info);
8405 /* If this section has old-style __tls_get_addr calls
8406 without marker relocs, then check that each
8407 __tls_get_addr call reloc is preceded by a reloc
8408 that conceivably belongs to the __tls_get_addr arg
8409 setup insn. If we don't find matching arg setup
8410 relocs, don't do any tls optimization. */
8412 && sec->has_tls_get_addr_call
8414 && (h == &htab->tls_get_addr->elf
8415 || h == &htab->tls_get_addr_fd->elf)
8416 && !found_tls_get_addr_arg
8417 && is_branch_reloc (r_type))
8419 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8420 "TLS optimization disabled\n"),
8421 ibfd, sec, rel->r_offset);
8426 found_tls_get_addr_arg = 0;
8429 case R_PPC64_GOT_TLSLD16:
8430 case R_PPC64_GOT_TLSLD16_LO:
8431 expecting_tls_get_addr = 1;
8432 found_tls_get_addr_arg = 1;
8435 case R_PPC64_GOT_TLSLD16_HI:
8436 case R_PPC64_GOT_TLSLD16_HA:
8437 /* These relocs should never be against a symbol
8438 defined in a shared lib. Leave them alone if
8439 that turns out to be the case. */
8446 tls_type = TLS_TLS | TLS_LD;
8449 case R_PPC64_GOT_TLSGD16:
8450 case R_PPC64_GOT_TLSGD16_LO:
8451 expecting_tls_get_addr = 1;
8452 found_tls_get_addr_arg = 1;
8455 case R_PPC64_GOT_TLSGD16_HI:
8456 case R_PPC64_GOT_TLSGD16_HA:
8462 tls_set = TLS_TLS | TLS_TPRELGD;
8464 tls_type = TLS_TLS | TLS_GD;
8467 case R_PPC64_GOT_TPREL16_DS:
8468 case R_PPC64_GOT_TPREL16_LO_DS:
8469 case R_PPC64_GOT_TPREL16_HI:
8470 case R_PPC64_GOT_TPREL16_HA:
8475 tls_clear = TLS_TPREL;
8476 tls_type = TLS_TLS | TLS_TPREL;
8483 found_tls_get_addr_arg = 1;
8488 case R_PPC64_TOC16_LO:
8489 if (sym_sec == NULL || sym_sec != toc)
8492 /* Mark this toc entry as referenced by a TLS
8493 code sequence. We can do that now in the
8494 case of R_PPC64_TLS, and after checking for
8495 tls_get_addr for the TOC16 relocs. */
8496 if (toc_ref == NULL)
8497 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8498 if (toc_ref == NULL)
8502 value = h->root.u.def.value;
8504 value = sym->st_value;
8505 value += rel->r_addend;
8508 BFD_ASSERT (value < toc->size
8509 && toc->output_offset % 8 == 0);
8510 toc_ref_index = (value + toc->output_offset) / 8;
8511 if (r_type == R_PPC64_TLS
8512 || r_type == R_PPC64_TLSGD
8513 || r_type == R_PPC64_TLSLD)
8515 toc_ref[toc_ref_index] = 1;
8519 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8524 expecting_tls_get_addr = 2;
8527 case R_PPC64_TPREL64:
8531 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8536 tls_set = TLS_EXPLICIT;
8537 tls_clear = TLS_TPREL;
8542 case R_PPC64_DTPMOD64:
8546 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8548 if (rel + 1 < relend
8550 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8551 && rel[1].r_offset == rel->r_offset + 8)
8555 tls_set = TLS_EXPLICIT | TLS_GD;
8558 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8567 tls_set = TLS_EXPLICIT;
8578 if (!expecting_tls_get_addr
8579 || !sec->has_tls_get_addr_call)
8582 if (rel + 1 < relend
8583 && branch_reloc_hash_match (ibfd, rel + 1,
8585 htab->tls_get_addr_fd))
8587 if (expecting_tls_get_addr == 2)
8589 /* Check for toc tls entries. */
8590 unsigned char *toc_tls;
8593 retval = get_tls_mask (&toc_tls, NULL, NULL,
8598 if (toc_tls != NULL)
8600 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8601 found_tls_get_addr_arg = 1;
8603 toc_ref[toc_ref_index] = 1;
8609 if (expecting_tls_get_addr != 1)
8612 /* Uh oh, we didn't find the expected call. We
8613 could just mark this symbol to exclude it
8614 from tls optimization but it's safer to skip
8615 the entire optimization. */
8616 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8617 "TLS optimization disabled\n"),
8618 ibfd, sec, rel->r_offset);
8623 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
8625 struct plt_entry *ent;
8626 for (ent = htab->tls_get_addr->elf.plt.plist;
8629 if (ent->addend == 0)
8631 if (ent->plt.refcount > 0)
8633 ent->plt.refcount -= 1;
8634 expecting_tls_get_addr = 0;
8640 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
8642 struct plt_entry *ent;
8643 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8646 if (ent->addend == 0)
8648 if (ent->plt.refcount > 0)
8649 ent->plt.refcount -= 1;
8657 if ((tls_set & TLS_EXPLICIT) == 0)
8659 struct got_entry *ent;
8661 /* Adjust got entry for this reloc. */
8665 ent = elf_local_got_ents (ibfd)[r_symndx];
8667 for (; ent != NULL; ent = ent->next)
8668 if (ent->addend == rel->r_addend
8669 && ent->owner == ibfd
8670 && ent->tls_type == tls_type)
8677 /* We managed to get rid of a got entry. */
8678 if (ent->got.refcount > 0)
8679 ent->got.refcount -= 1;
8684 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8685 we'll lose one or two dyn relocs. */
8686 if (!dec_dynrel_count (rel->r_info, sec, info,
8690 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8692 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8698 *tls_mask |= tls_set;
8699 *tls_mask &= ~tls_clear;
8702 if (elf_section_data (sec)->relocs != relstart)
8707 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8709 if (!info->keep_memory)
8712 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8716 if (toc_ref != NULL)
8721 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8722 the values of any global symbols in a toc section that has been
8723 edited. Globals in toc sections should be a rarity, so this function
8724 sets a flag if any are found in toc sections other than the one just
8725 edited, so that futher hash table traversals can be avoided. */
8727 struct adjust_toc_info
8730 unsigned long *skip;
8731 bfd_boolean global_toc_syms;
8734 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8737 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8739 struct ppc_link_hash_entry *eh;
8740 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8743 if (h->root.type != bfd_link_hash_defined
8744 && h->root.type != bfd_link_hash_defweak)
8747 eh = (struct ppc_link_hash_entry *) h;
8748 if (eh->adjust_done)
8751 if (eh->elf.root.u.def.section == toc_inf->toc)
8753 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8754 i = toc_inf->toc->rawsize >> 3;
8756 i = eh->elf.root.u.def.value >> 3;
8758 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8760 (*_bfd_error_handler)
8761 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8764 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8765 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8768 eh->elf.root.u.def.value -= toc_inf->skip[i];
8769 eh->adjust_done = 1;
8771 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8772 toc_inf->global_toc_syms = TRUE;
8777 /* Return TRUE iff INSN is one we expect on a _LO variety toc/got reloc. */
8780 ok_lo_toc_insn (unsigned int insn)
8782 return ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8783 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8784 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8785 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8786 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8787 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8788 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8789 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8790 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8791 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8792 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8793 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8794 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8795 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8796 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8798 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8799 && ((insn & 3) == 0 || (insn & 3) == 3))
8800 || (insn & (0x3f << 26)) == 12u << 26 /* addic */);
8803 /* Examine all relocs referencing .toc sections in order to remove
8804 unused .toc entries. */
8807 ppc64_elf_edit_toc (struct bfd_link_info *info)
8810 struct adjust_toc_info toc_inf;
8811 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8813 htab->do_toc_opt = 1;
8814 toc_inf.global_toc_syms = TRUE;
8815 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8817 asection *toc, *sec;
8818 Elf_Internal_Shdr *symtab_hdr;
8819 Elf_Internal_Sym *local_syms;
8820 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8821 unsigned long *skip, *drop;
8822 unsigned char *used;
8823 unsigned char *keep, last, some_unused;
8825 if (!is_ppc64_elf (ibfd))
8828 toc = bfd_get_section_by_name (ibfd, ".toc");
8831 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8832 || discarded_section (toc))
8837 symtab_hdr = &elf_symtab_hdr (ibfd);
8839 /* Look at sections dropped from the final link. */
8842 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8844 if (sec->reloc_count == 0
8845 || !discarded_section (sec)
8846 || get_opd_info (sec)
8847 || (sec->flags & SEC_ALLOC) == 0
8848 || (sec->flags & SEC_DEBUGGING) != 0)
8851 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8852 if (relstart == NULL)
8855 /* Run through the relocs to see which toc entries might be
8857 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8859 enum elf_ppc64_reloc_type r_type;
8860 unsigned long r_symndx;
8862 struct elf_link_hash_entry *h;
8863 Elf_Internal_Sym *sym;
8866 r_type = ELF64_R_TYPE (rel->r_info);
8873 case R_PPC64_TOC16_LO:
8874 case R_PPC64_TOC16_HI:
8875 case R_PPC64_TOC16_HA:
8876 case R_PPC64_TOC16_DS:
8877 case R_PPC64_TOC16_LO_DS:
8881 r_symndx = ELF64_R_SYM (rel->r_info);
8882 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8890 val = h->root.u.def.value;
8892 val = sym->st_value;
8893 val += rel->r_addend;
8895 if (val >= toc->size)
8898 /* Anything in the toc ought to be aligned to 8 bytes.
8899 If not, don't mark as unused. */
8905 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8910 skip[val >> 3] = ref_from_discarded;
8913 if (elf_section_data (sec)->relocs != relstart)
8917 /* For largetoc loads of address constants, we can convert
8918 . addis rx,2,addr@got@ha
8919 . ld ry,addr@got@l(rx)
8921 . addis rx,2,addr@toc@ha
8922 . addi ry,rx,addr@toc@l
8923 when addr is within 2G of the toc pointer. This then means
8924 that the word storing "addr" in the toc is no longer needed. */
8926 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8927 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8928 && toc->reloc_count != 0)
8930 /* Read toc relocs. */
8931 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8933 if (toc_relocs == NULL)
8936 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8938 enum elf_ppc64_reloc_type r_type;
8939 unsigned long r_symndx;
8941 struct elf_link_hash_entry *h;
8942 Elf_Internal_Sym *sym;
8945 r_type = ELF64_R_TYPE (rel->r_info);
8946 if (r_type != R_PPC64_ADDR64)
8949 r_symndx = ELF64_R_SYM (rel->r_info);
8950 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8955 || discarded_section (sym_sec))
8958 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8963 if (h->type == STT_GNU_IFUNC)
8965 val = h->root.u.def.value;
8969 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8971 val = sym->st_value;
8973 val += rel->r_addend;
8974 val += sym_sec->output_section->vma + sym_sec->output_offset;
8976 /* We don't yet know the exact toc pointer value, but we
8977 know it will be somewhere in the toc section. Don't
8978 optimize if the difference from any possible toc
8979 pointer is outside [ff..f80008000, 7fff7fff]. */
8980 addr = toc->output_section->vma + TOC_BASE_OFF;
8981 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8984 addr = toc->output_section->vma + toc->output_section->rawsize;
8985 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8990 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8995 skip[rel->r_offset >> 3]
8996 |= can_optimize | ((rel - toc_relocs) << 2);
9003 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9007 if (local_syms != NULL
9008 && symtab_hdr->contents != (unsigned char *) local_syms)
9012 && elf_section_data (sec)->relocs != relstart)
9014 if (toc_relocs != NULL
9015 && elf_section_data (toc)->relocs != toc_relocs)
9022 /* Now check all kept sections that might reference the toc.
9023 Check the toc itself last. */
9024 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9027 sec = (sec == toc ? NULL
9028 : sec->next == NULL ? toc
9029 : sec->next == toc && toc->next ? toc->next
9034 if (sec->reloc_count == 0
9035 || discarded_section (sec)
9036 || get_opd_info (sec)
9037 || (sec->flags & SEC_ALLOC) == 0
9038 || (sec->flags & SEC_DEBUGGING) != 0)
9041 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9043 if (relstart == NULL)
9049 /* Mark toc entries referenced as used. */
9053 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9055 enum elf_ppc64_reloc_type r_type;
9056 unsigned long r_symndx;
9058 struct elf_link_hash_entry *h;
9059 Elf_Internal_Sym *sym;
9061 enum {no_check, check_lo, check_ha} insn_check;
9063 r_type = ELF64_R_TYPE (rel->r_info);
9067 insn_check = no_check;
9070 case R_PPC64_GOT_TLSLD16_HA:
9071 case R_PPC64_GOT_TLSGD16_HA:
9072 case R_PPC64_GOT_TPREL16_HA:
9073 case R_PPC64_GOT_DTPREL16_HA:
9074 case R_PPC64_GOT16_HA:
9075 case R_PPC64_TOC16_HA:
9076 insn_check = check_ha;
9079 case R_PPC64_GOT_TLSLD16_LO:
9080 case R_PPC64_GOT_TLSGD16_LO:
9081 case R_PPC64_GOT_TPREL16_LO_DS:
9082 case R_PPC64_GOT_DTPREL16_LO_DS:
9083 case R_PPC64_GOT16_LO:
9084 case R_PPC64_GOT16_LO_DS:
9085 case R_PPC64_TOC16_LO:
9086 case R_PPC64_TOC16_LO_DS:
9087 insn_check = check_lo;
9091 if (insn_check != no_check)
9093 bfd_vma off = rel->r_offset & ~3;
9094 unsigned char buf[4];
9097 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9102 insn = bfd_get_32 (ibfd, buf);
9103 if (insn_check == check_lo
9104 ? !ok_lo_toc_insn (insn)
9105 : ((insn & ((0x3f << 26) | 0x1f << 16))
9106 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9110 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9111 sprintf (str, "%#08x", insn);
9112 info->callbacks->einfo
9113 (_("%P: %H: toc optimization is not supported for"
9114 " %s instruction.\n"),
9115 ibfd, sec, rel->r_offset & ~3, str);
9122 case R_PPC64_TOC16_LO:
9123 case R_PPC64_TOC16_HI:
9124 case R_PPC64_TOC16_HA:
9125 case R_PPC64_TOC16_DS:
9126 case R_PPC64_TOC16_LO_DS:
9127 /* In case we're taking addresses of toc entries. */
9128 case R_PPC64_ADDR64:
9135 r_symndx = ELF64_R_SYM (rel->r_info);
9136 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9147 val = h->root.u.def.value;
9149 val = sym->st_value;
9150 val += rel->r_addend;
9152 if (val >= toc->size)
9155 if ((skip[val >> 3] & can_optimize) != 0)
9162 case R_PPC64_TOC16_HA:
9165 case R_PPC64_TOC16_LO_DS:
9166 off = rel->r_offset;
9167 off += (bfd_big_endian (ibfd) ? -2 : 3);
9168 if (!bfd_get_section_contents (ibfd, sec, &opc,
9174 if ((opc & (0x3f << 2)) == (58u << 2))
9179 /* Wrong sort of reloc, or not a ld. We may
9180 as well clear ref_from_discarded too. */
9187 /* For the toc section, we only mark as used if this
9188 entry itself isn't unused. */
9189 else if ((used[rel->r_offset >> 3]
9190 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9193 /* Do all the relocs again, to catch reference
9202 if (elf_section_data (sec)->relocs != relstart)
9206 /* Merge the used and skip arrays. Assume that TOC
9207 doublewords not appearing as either used or unused belong
9208 to to an entry more than one doubleword in size. */
9209 for (drop = skip, keep = used, last = 0, some_unused = 0;
9210 drop < skip + (toc->size + 7) / 8;
9215 *drop &= ~ref_from_discarded;
9216 if ((*drop & can_optimize) != 0)
9220 else if ((*drop & ref_from_discarded) != 0)
9223 last = ref_from_discarded;
9233 bfd_byte *contents, *src;
9235 Elf_Internal_Sym *sym;
9236 bfd_boolean local_toc_syms = FALSE;
9238 /* Shuffle the toc contents, and at the same time convert the
9239 skip array from booleans into offsets. */
9240 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9243 elf_section_data (toc)->this_hdr.contents = contents;
9245 for (src = contents, off = 0, drop = skip;
9246 src < contents + toc->size;
9249 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9254 memcpy (src - off, src, 8);
9258 toc->rawsize = toc->size;
9259 toc->size = src - contents - off;
9261 /* Adjust addends for relocs against the toc section sym,
9262 and optimize any accesses we can. */
9263 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9265 if (sec->reloc_count == 0
9266 || discarded_section (sec))
9269 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9271 if (relstart == NULL)
9274 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9276 enum elf_ppc64_reloc_type r_type;
9277 unsigned long r_symndx;
9279 struct elf_link_hash_entry *h;
9282 r_type = ELF64_R_TYPE (rel->r_info);
9289 case R_PPC64_TOC16_LO:
9290 case R_PPC64_TOC16_HI:
9291 case R_PPC64_TOC16_HA:
9292 case R_PPC64_TOC16_DS:
9293 case R_PPC64_TOC16_LO_DS:
9294 case R_PPC64_ADDR64:
9298 r_symndx = ELF64_R_SYM (rel->r_info);
9299 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9307 val = h->root.u.def.value;
9310 val = sym->st_value;
9312 local_toc_syms = TRUE;
9315 val += rel->r_addend;
9317 if (val > toc->rawsize)
9319 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9321 else if ((skip[val >> 3] & can_optimize) != 0)
9323 Elf_Internal_Rela *tocrel
9324 = toc_relocs + (skip[val >> 3] >> 2);
9325 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9329 case R_PPC64_TOC16_HA:
9330 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9333 case R_PPC64_TOC16_LO_DS:
9334 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9338 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9340 info->callbacks->einfo
9341 (_("%P: %H: %s references "
9342 "optimized away TOC entry\n"),
9343 ibfd, sec, rel->r_offset,
9344 ppc64_elf_howto_table[r_type]->name);
9345 bfd_set_error (bfd_error_bad_value);
9348 rel->r_addend = tocrel->r_addend;
9349 elf_section_data (sec)->relocs = relstart;
9353 if (h != NULL || sym->st_value != 0)
9356 rel->r_addend -= skip[val >> 3];
9357 elf_section_data (sec)->relocs = relstart;
9360 if (elf_section_data (sec)->relocs != relstart)
9364 /* We shouldn't have local or global symbols defined in the TOC,
9365 but handle them anyway. */
9366 if (local_syms != NULL)
9367 for (sym = local_syms;
9368 sym < local_syms + symtab_hdr->sh_info;
9370 if (sym->st_value != 0
9371 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9375 if (sym->st_value > toc->rawsize)
9376 i = toc->rawsize >> 3;
9378 i = sym->st_value >> 3;
9380 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9383 (*_bfd_error_handler)
9384 (_("%s defined on removed toc entry"),
9385 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9388 while ((skip[i] & (ref_from_discarded | can_optimize)));
9389 sym->st_value = (bfd_vma) i << 3;
9392 sym->st_value -= skip[i];
9393 symtab_hdr->contents = (unsigned char *) local_syms;
9396 /* Adjust any global syms defined in this toc input section. */
9397 if (toc_inf.global_toc_syms)
9400 toc_inf.skip = skip;
9401 toc_inf.global_toc_syms = FALSE;
9402 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9406 if (toc->reloc_count != 0)
9408 Elf_Internal_Shdr *rel_hdr;
9409 Elf_Internal_Rela *wrel;
9412 /* Remove unused toc relocs, and adjust those we keep. */
9413 if (toc_relocs == NULL)
9414 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9416 if (toc_relocs == NULL)
9420 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9421 if ((skip[rel->r_offset >> 3]
9422 & (ref_from_discarded | can_optimize)) == 0)
9424 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9425 wrel->r_info = rel->r_info;
9426 wrel->r_addend = rel->r_addend;
9429 else if (!dec_dynrel_count (rel->r_info, toc, info,
9430 &local_syms, NULL, NULL))
9433 elf_section_data (toc)->relocs = toc_relocs;
9434 toc->reloc_count = wrel - toc_relocs;
9435 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9436 sz = rel_hdr->sh_entsize;
9437 rel_hdr->sh_size = toc->reloc_count * sz;
9440 else if (toc_relocs != NULL
9441 && elf_section_data (toc)->relocs != toc_relocs)
9444 if (local_syms != NULL
9445 && symtab_hdr->contents != (unsigned char *) local_syms)
9447 if (!info->keep_memory)
9450 symtab_hdr->contents = (unsigned char *) local_syms;
9458 /* Return true iff input section I references the TOC using
9459 instructions limited to +/-32k offsets. */
9462 ppc64_elf_has_small_toc_reloc (asection *i)
9464 return (is_ppc64_elf (i->owner)
9465 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9468 /* Allocate space for one GOT entry. */
9471 allocate_got (struct elf_link_hash_entry *h,
9472 struct bfd_link_info *info,
9473 struct got_entry *gent)
9475 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9477 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9478 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9480 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9481 ? 2 : 1) * sizeof (Elf64_External_Rela);
9482 asection *got = ppc64_elf_tdata (gent->owner)->got;
9484 gent->got.offset = got->size;
9485 got->size += entsize;
9487 dyn = htab->elf.dynamic_sections_created;
9488 if (h->type == STT_GNU_IFUNC)
9490 htab->elf.irelplt->size += rentsize;
9491 htab->got_reli_size += rentsize;
9493 else if ((bfd_link_pic (info)
9494 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
9495 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
9496 || h->root.type != bfd_link_hash_undefweak))
9498 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9499 relgot->size += rentsize;
9503 /* This function merges got entries in the same toc group. */
9506 merge_got_entries (struct got_entry **pent)
9508 struct got_entry *ent, *ent2;
9510 for (ent = *pent; ent != NULL; ent = ent->next)
9511 if (!ent->is_indirect)
9512 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9513 if (!ent2->is_indirect
9514 && ent2->addend == ent->addend
9515 && ent2->tls_type == ent->tls_type
9516 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9518 ent2->is_indirect = TRUE;
9519 ent2->got.ent = ent;
9523 /* Allocate space in .plt, .got and associated reloc sections for
9527 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9529 struct bfd_link_info *info;
9530 struct ppc_link_hash_table *htab;
9532 struct ppc_link_hash_entry *eh;
9533 struct elf_dyn_relocs *p;
9534 struct got_entry **pgent, *gent;
9536 if (h->root.type == bfd_link_hash_indirect)
9539 info = (struct bfd_link_info *) inf;
9540 htab = ppc_hash_table (info);
9544 if ((htab->elf.dynamic_sections_created
9546 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
9547 || h->type == STT_GNU_IFUNC)
9549 struct plt_entry *pent;
9550 bfd_boolean doneone = FALSE;
9551 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9552 if (pent->plt.refcount > 0)
9554 if (!htab->elf.dynamic_sections_created
9555 || h->dynindx == -1)
9558 pent->plt.offset = s->size;
9559 s->size += PLT_ENTRY_SIZE (htab);
9560 s = htab->elf.irelplt;
9564 /* If this is the first .plt entry, make room for the special
9568 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9570 pent->plt.offset = s->size;
9572 /* Make room for this entry. */
9573 s->size += PLT_ENTRY_SIZE (htab);
9575 /* Make room for the .glink code. */
9578 s->size += GLINK_CALL_STUB_SIZE;
9581 /* We need bigger stubs past index 32767. */
9582 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9589 /* We also need to make an entry in the .rela.plt section. */
9590 s = htab->elf.srelplt;
9592 s->size += sizeof (Elf64_External_Rela);
9596 pent->plt.offset = (bfd_vma) -1;
9599 h->plt.plist = NULL;
9605 h->plt.plist = NULL;
9609 eh = (struct ppc_link_hash_entry *) h;
9610 /* Run through the TLS GD got entries first if we're changing them
9612 if ((eh->tls_mask & TLS_TPRELGD) != 0)
9613 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9614 if (gent->got.refcount > 0
9615 && (gent->tls_type & TLS_GD) != 0)
9617 /* This was a GD entry that has been converted to TPREL. If
9618 there happens to be a TPREL entry we can use that one. */
9619 struct got_entry *ent;
9620 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9621 if (ent->got.refcount > 0
9622 && (ent->tls_type & TLS_TPREL) != 0
9623 && ent->addend == gent->addend
9624 && ent->owner == gent->owner)
9626 gent->got.refcount = 0;
9630 /* If not, then we'll be using our own TPREL entry. */
9631 if (gent->got.refcount != 0)
9632 gent->tls_type = TLS_TLS | TLS_TPREL;
9635 /* Remove any list entry that won't generate a word in the GOT before
9636 we call merge_got_entries. Otherwise we risk merging to empty
9638 pgent = &h->got.glist;
9639 while ((gent = *pgent) != NULL)
9640 if (gent->got.refcount > 0)
9642 if ((gent->tls_type & TLS_LD) != 0
9645 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9646 *pgent = gent->next;
9649 pgent = &gent->next;
9652 *pgent = gent->next;
9654 if (!htab->do_multi_toc)
9655 merge_got_entries (&h->got.glist);
9657 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9658 if (!gent->is_indirect)
9660 /* Make sure this symbol is output as a dynamic symbol.
9661 Undefined weak syms won't yet be marked as dynamic,
9662 nor will all TLS symbols. */
9663 if (h->dynindx == -1
9665 && h->type != STT_GNU_IFUNC
9666 && htab->elf.dynamic_sections_created)
9668 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9672 if (!is_ppc64_elf (gent->owner))
9675 allocate_got (h, info, gent);
9678 if (eh->dyn_relocs == NULL
9679 || (!htab->elf.dynamic_sections_created
9680 && h->type != STT_GNU_IFUNC))
9683 /* In the shared -Bsymbolic case, discard space allocated for
9684 dynamic pc-relative relocs against symbols which turn out to be
9685 defined in regular objects. For the normal shared case, discard
9686 space for relocs that have become local due to symbol visibility
9689 if (bfd_link_pic (info))
9691 /* Relocs that use pc_count are those that appear on a call insn,
9692 or certain REL relocs (see must_be_dyn_reloc) that can be
9693 generated via assembly. We want calls to protected symbols to
9694 resolve directly to the function rather than going via the plt.
9695 If people want function pointer comparisons to work as expected
9696 then they should avoid writing weird assembly. */
9697 if (SYMBOL_CALLS_LOCAL (info, h))
9699 struct elf_dyn_relocs **pp;
9701 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9703 p->count -= p->pc_count;
9712 /* Also discard relocs on undefined weak syms with non-default
9714 if (eh->dyn_relocs != NULL
9715 && h->root.type == bfd_link_hash_undefweak)
9717 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9718 eh->dyn_relocs = NULL;
9720 /* Make sure this symbol is output as a dynamic symbol.
9721 Undefined weak syms won't yet be marked as dynamic. */
9722 else if (h->dynindx == -1
9723 && !h->forced_local)
9725 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9730 else if (h->type == STT_GNU_IFUNC)
9732 if (!h->non_got_ref)
9733 eh->dyn_relocs = NULL;
9735 else if (ELIMINATE_COPY_RELOCS)
9737 /* For the non-shared case, discard space for relocs against
9738 symbols which turn out to need copy relocs or are not
9744 /* Make sure this symbol is output as a dynamic symbol.
9745 Undefined weak syms won't yet be marked as dynamic. */
9746 if (h->dynindx == -1
9747 && !h->forced_local)
9749 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9753 /* If that succeeded, we know we'll be keeping all the
9755 if (h->dynindx != -1)
9759 eh->dyn_relocs = NULL;
9764 /* Finally, allocate space. */
9765 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9767 asection *sreloc = elf_section_data (p->sec)->sreloc;
9768 if (eh->elf.type == STT_GNU_IFUNC)
9769 sreloc = htab->elf.irelplt;
9770 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9776 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9777 to set up space for global entry stubs. These are put in glink,
9778 after the branch table. */
9781 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9783 struct bfd_link_info *info;
9784 struct ppc_link_hash_table *htab;
9785 struct plt_entry *pent;
9788 if (h->root.type == bfd_link_hash_indirect)
9791 if (!h->pointer_equality_needed)
9798 htab = ppc_hash_table (info);
9803 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9804 if (pent->plt.offset != (bfd_vma) -1
9805 && pent->addend == 0)
9807 /* For ELFv2, if this symbol is not defined in a regular file
9808 and we are not generating a shared library or pie, then we
9809 need to define the symbol in the executable on a call stub.
9810 This is to avoid text relocations. */
9811 s->size = (s->size + 15) & -16;
9812 h->root.u.def.section = s;
9813 h->root.u.def.value = s->size;
9820 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9821 read-only sections. */
9824 maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
9826 if (h->root.type == bfd_link_hash_indirect)
9829 if (readonly_dynrelocs (h))
9831 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
9833 /* Not an error, just cut short the traversal. */
9839 /* Set the sizes of the dynamic sections. */
9842 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9843 struct bfd_link_info *info)
9845 struct ppc_link_hash_table *htab;
9850 struct got_entry *first_tlsld;
9852 htab = ppc_hash_table (info);
9856 dynobj = htab->elf.dynobj;
9860 if (htab->elf.dynamic_sections_created)
9862 /* Set the contents of the .interp section to the interpreter. */
9863 if (bfd_link_executable (info) && !info->nointerp)
9865 s = bfd_get_linker_section (dynobj, ".interp");
9868 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9869 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9873 /* Set up .got offsets for local syms, and space for local dynamic
9875 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9877 struct got_entry **lgot_ents;
9878 struct got_entry **end_lgot_ents;
9879 struct plt_entry **local_plt;
9880 struct plt_entry **end_local_plt;
9881 unsigned char *lgot_masks;
9882 bfd_size_type locsymcount;
9883 Elf_Internal_Shdr *symtab_hdr;
9885 if (!is_ppc64_elf (ibfd))
9888 for (s = ibfd->sections; s != NULL; s = s->next)
9890 struct ppc_dyn_relocs *p;
9892 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9894 if (!bfd_is_abs_section (p->sec)
9895 && bfd_is_abs_section (p->sec->output_section))
9897 /* Input section has been discarded, either because
9898 it is a copy of a linkonce section or due to
9899 linker script /DISCARD/, so we'll be discarding
9902 else if (p->count != 0)
9904 asection *srel = elf_section_data (p->sec)->sreloc;
9906 srel = htab->elf.irelplt;
9907 srel->size += p->count * sizeof (Elf64_External_Rela);
9908 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9909 info->flags |= DF_TEXTREL;
9914 lgot_ents = elf_local_got_ents (ibfd);
9918 symtab_hdr = &elf_symtab_hdr (ibfd);
9919 locsymcount = symtab_hdr->sh_info;
9920 end_lgot_ents = lgot_ents + locsymcount;
9921 local_plt = (struct plt_entry **) end_lgot_ents;
9922 end_local_plt = local_plt + locsymcount;
9923 lgot_masks = (unsigned char *) end_local_plt;
9924 s = ppc64_elf_tdata (ibfd)->got;
9925 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9927 struct got_entry **pent, *ent;
9930 while ((ent = *pent) != NULL)
9931 if (ent->got.refcount > 0)
9933 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9935 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9940 unsigned int ent_size = 8;
9941 unsigned int rel_size = sizeof (Elf64_External_Rela);
9943 ent->got.offset = s->size;
9944 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9949 s->size += ent_size;
9950 if ((*lgot_masks & PLT_IFUNC) != 0)
9952 htab->elf.irelplt->size += rel_size;
9953 htab->got_reli_size += rel_size;
9955 else if (bfd_link_pic (info))
9957 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9958 srel->size += rel_size;
9967 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
9968 for (; local_plt < end_local_plt; ++local_plt)
9970 struct plt_entry *ent;
9972 for (ent = *local_plt; ent != NULL; ent = ent->next)
9973 if (ent->plt.refcount > 0)
9976 ent->plt.offset = s->size;
9977 s->size += PLT_ENTRY_SIZE (htab);
9979 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9982 ent->plt.offset = (bfd_vma) -1;
9986 /* Allocate global sym .plt and .got entries, and space for global
9987 sym dynamic relocs. */
9988 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
9989 /* Stash the end of glink branch table. */
9990 if (htab->glink != NULL)
9991 htab->glink->rawsize = htab->glink->size;
9993 if (!htab->opd_abi && !bfd_link_pic (info))
9994 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
9997 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9999 struct got_entry *ent;
10001 if (!is_ppc64_elf (ibfd))
10004 ent = ppc64_tlsld_got (ibfd);
10005 if (ent->got.refcount > 0)
10007 if (!htab->do_multi_toc && first_tlsld != NULL)
10009 ent->is_indirect = TRUE;
10010 ent->got.ent = first_tlsld;
10014 if (first_tlsld == NULL)
10016 s = ppc64_elf_tdata (ibfd)->got;
10017 ent->got.offset = s->size;
10020 if (bfd_link_pic (info))
10022 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10023 srel->size += sizeof (Elf64_External_Rela);
10028 ent->got.offset = (bfd_vma) -1;
10031 /* We now have determined the sizes of the various dynamic sections.
10032 Allocate memory for them. */
10034 for (s = dynobj->sections; s != NULL; s = s->next)
10036 if ((s->flags & SEC_LINKER_CREATED) == 0)
10039 if (s == htab->brlt || s == htab->relbrlt)
10040 /* These haven't been allocated yet; don't strip. */
10042 else if (s == htab->elf.sgot
10043 || s == htab->elf.splt
10044 || s == htab->elf.iplt
10045 || s == htab->glink
10046 || s == htab->dynbss)
10048 /* Strip this section if we don't need it; see the
10051 else if (s == htab->glink_eh_frame)
10053 if (!bfd_is_abs_section (s->output_section))
10054 /* Not sized yet. */
10057 else if (CONST_STRNEQ (s->name, ".rela"))
10061 if (s != htab->elf.srelplt)
10064 /* We use the reloc_count field as a counter if we need
10065 to copy relocs into the output file. */
10066 s->reloc_count = 0;
10071 /* It's not one of our sections, so don't allocate space. */
10077 /* If we don't need this section, strip it from the
10078 output file. This is mostly to handle .rela.bss and
10079 .rela.plt. We must create both sections in
10080 create_dynamic_sections, because they must be created
10081 before the linker maps input sections to output
10082 sections. The linker does that before
10083 adjust_dynamic_symbol is called, and it is that
10084 function which decides whether anything needs to go
10085 into these sections. */
10086 s->flags |= SEC_EXCLUDE;
10090 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10093 /* Allocate memory for the section contents. We use bfd_zalloc
10094 here in case unused entries are not reclaimed before the
10095 section's contents are written out. This should not happen,
10096 but this way if it does we get a R_PPC64_NONE reloc in .rela
10097 sections instead of garbage.
10098 We also rely on the section contents being zero when writing
10100 s->contents = bfd_zalloc (dynobj, s->size);
10101 if (s->contents == NULL)
10105 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10107 if (!is_ppc64_elf (ibfd))
10110 s = ppc64_elf_tdata (ibfd)->got;
10111 if (s != NULL && s != htab->elf.sgot)
10114 s->flags |= SEC_EXCLUDE;
10117 s->contents = bfd_zalloc (ibfd, s->size);
10118 if (s->contents == NULL)
10122 s = ppc64_elf_tdata (ibfd)->relgot;
10126 s->flags |= SEC_EXCLUDE;
10129 s->contents = bfd_zalloc (ibfd, s->size);
10130 if (s->contents == NULL)
10133 s->reloc_count = 0;
10138 if (htab->elf.dynamic_sections_created)
10140 bfd_boolean tls_opt;
10142 /* Add some entries to the .dynamic section. We fill in the
10143 values later, in ppc64_elf_finish_dynamic_sections, but we
10144 must add the entries now so that we get the correct size for
10145 the .dynamic section. The DT_DEBUG entry is filled in by the
10146 dynamic linker and used by the debugger. */
10147 #define add_dynamic_entry(TAG, VAL) \
10148 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10150 if (bfd_link_executable (info))
10152 if (!add_dynamic_entry (DT_DEBUG, 0))
10156 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10158 if (!add_dynamic_entry (DT_PLTGOT, 0)
10159 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10160 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10161 || !add_dynamic_entry (DT_JMPREL, 0)
10162 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10166 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10168 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10169 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10173 tls_opt = (htab->params->tls_get_addr_opt
10174 && htab->tls_get_addr_fd != NULL
10175 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10176 if (tls_opt || !htab->opd_abi)
10178 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10184 if (!add_dynamic_entry (DT_RELA, 0)
10185 || !add_dynamic_entry (DT_RELASZ, 0)
10186 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10189 /* If any dynamic relocs apply to a read-only section,
10190 then we need a DT_TEXTREL entry. */
10191 if ((info->flags & DF_TEXTREL) == 0)
10192 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10194 if ((info->flags & DF_TEXTREL) != 0)
10196 if (!add_dynamic_entry (DT_TEXTREL, 0))
10201 #undef add_dynamic_entry
10206 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10209 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10211 if (h->plt.plist != NULL
10213 && !h->pointer_equality_needed)
10216 return _bfd_elf_hash_symbol (h);
10219 /* Determine the type of stub needed, if any, for a call. */
10221 static inline enum ppc_stub_type
10222 ppc_type_of_stub (asection *input_sec,
10223 const Elf_Internal_Rela *rel,
10224 struct ppc_link_hash_entry **hash,
10225 struct plt_entry **plt_ent,
10226 bfd_vma destination,
10227 unsigned long local_off)
10229 struct ppc_link_hash_entry *h = *hash;
10231 bfd_vma branch_offset;
10232 bfd_vma max_branch_offset;
10233 enum elf_ppc64_reloc_type r_type;
10237 struct plt_entry *ent;
10238 struct ppc_link_hash_entry *fdh = h;
10240 && h->oh->is_func_descriptor)
10242 fdh = ppc_follow_link (h->oh);
10246 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10247 if (ent->addend == rel->r_addend
10248 && ent->plt.offset != (bfd_vma) -1)
10251 return ppc_stub_plt_call;
10254 /* Here, we know we don't have a plt entry. If we don't have a
10255 either a defined function descriptor or a defined entry symbol
10256 in a regular object file, then it is pointless trying to make
10257 any other type of stub. */
10258 if (!is_static_defined (&fdh->elf)
10259 && !is_static_defined (&h->elf))
10260 return ppc_stub_none;
10262 else if (elf_local_got_ents (input_sec->owner) != NULL)
10264 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10265 struct plt_entry **local_plt = (struct plt_entry **)
10266 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10267 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10269 if (local_plt[r_symndx] != NULL)
10271 struct plt_entry *ent;
10273 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10274 if (ent->addend == rel->r_addend
10275 && ent->plt.offset != (bfd_vma) -1)
10278 return ppc_stub_plt_call;
10283 /* Determine where the call point is. */
10284 location = (input_sec->output_offset
10285 + input_sec->output_section->vma
10288 branch_offset = destination - location;
10289 r_type = ELF64_R_TYPE (rel->r_info);
10291 /* Determine if a long branch stub is needed. */
10292 max_branch_offset = 1 << 25;
10293 if (r_type != R_PPC64_REL24)
10294 max_branch_offset = 1 << 15;
10296 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10297 /* We need a stub. Figure out whether a long_branch or plt_branch
10298 is needed later. */
10299 return ppc_stub_long_branch;
10301 return ppc_stub_none;
10304 /* With power7 weakly ordered memory model, it is possible for ld.so
10305 to update a plt entry in one thread and have another thread see a
10306 stale zero toc entry. To avoid this we need some sort of acquire
10307 barrier in the call stub. One solution is to make the load of the
10308 toc word seem to appear to depend on the load of the function entry
10309 word. Another solution is to test for r2 being zero, and branch to
10310 the appropriate glink entry if so.
10312 . fake dep barrier compare
10313 . ld 12,xxx(2) ld 12,xxx(2)
10314 . mtctr 12 mtctr 12
10315 . xor 11,12,12 ld 2,xxx+8(2)
10316 . add 2,2,11 cmpldi 2,0
10317 . ld 2,xxx+8(2) bnectr+
10318 . bctr b <glink_entry>
10320 The solution involving the compare turns out to be faster, so
10321 that's what we use unless the branch won't reach. */
10323 #define ALWAYS_USE_FAKE_DEP 0
10324 #define ALWAYS_EMIT_R2SAVE 0
10326 #define PPC_LO(v) ((v) & 0xffff)
10327 #define PPC_HI(v) (((v) >> 16) & 0xffff)
10328 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
10330 static inline unsigned int
10331 plt_stub_size (struct ppc_link_hash_table *htab,
10332 struct ppc_stub_hash_entry *stub_entry,
10335 unsigned size = 12;
10337 if (ALWAYS_EMIT_R2SAVE
10338 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10340 if (PPC_HA (off) != 0)
10345 if (htab->params->plt_static_chain)
10347 if (htab->params->plt_thread_safe
10348 && htab->elf.dynamic_sections_created
10349 && stub_entry->h != NULL
10350 && stub_entry->h->elf.dynindx != -1)
10352 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10355 if (stub_entry->h != NULL
10356 && (stub_entry->h == htab->tls_get_addr_fd
10357 || stub_entry->h == htab->tls_get_addr)
10358 && htab->params->tls_get_addr_opt)
10363 /* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10364 then return the padding needed to do so. */
10365 static inline unsigned int
10366 plt_stub_pad (struct ppc_link_hash_table *htab,
10367 struct ppc_stub_hash_entry *stub_entry,
10370 int stub_align = 1 << htab->params->plt_stub_align;
10371 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
10372 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10374 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10375 > ((stub_size - 1) & -stub_align))
10376 return stub_align - (stub_off & (stub_align - 1));
10380 /* Build a .plt call stub. */
10382 static inline bfd_byte *
10383 build_plt_stub (struct ppc_link_hash_table *htab,
10384 struct ppc_stub_hash_entry *stub_entry,
10385 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10387 bfd *obfd = htab->params->stub_bfd;
10388 bfd_boolean plt_load_toc = htab->opd_abi;
10389 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10390 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10391 && htab->elf.dynamic_sections_created
10392 && stub_entry->h != NULL
10393 && stub_entry->h->elf.dynindx != -1);
10394 bfd_boolean use_fake_dep = plt_thread_safe;
10395 bfd_vma cmp_branch_off = 0;
10397 if (!ALWAYS_USE_FAKE_DEP
10400 && !((stub_entry->h == htab->tls_get_addr_fd
10401 || stub_entry->h == htab->tls_get_addr)
10402 && htab->params->tls_get_addr_opt))
10404 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10405 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10406 / PLT_ENTRY_SIZE (htab));
10407 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10410 if (pltindex > 32768)
10411 glinkoff += (pltindex - 32768) * 4;
10413 + htab->glink->output_offset
10414 + htab->glink->output_section->vma);
10415 from = (p - stub_entry->group->stub_sec->contents
10416 + 4 * (ALWAYS_EMIT_R2SAVE
10417 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10418 + 4 * (PPC_HA (offset) != 0)
10419 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10420 != PPC_HA (offset))
10421 + 4 * (plt_static_chain != 0)
10423 + stub_entry->group->stub_sec->output_offset
10424 + stub_entry->group->stub_sec->output_section->vma);
10425 cmp_branch_off = to - from;
10426 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10429 if (PPC_HA (offset) != 0)
10433 if (ALWAYS_EMIT_R2SAVE
10434 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10435 r[0].r_offset += 4;
10436 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10437 r[1].r_offset = r[0].r_offset + 4;
10438 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10439 r[1].r_addend = r[0].r_addend;
10442 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10444 r[2].r_offset = r[1].r_offset + 4;
10445 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10446 r[2].r_addend = r[0].r_addend;
10450 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10451 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10452 r[2].r_addend = r[0].r_addend + 8;
10453 if (plt_static_chain)
10455 r[3].r_offset = r[2].r_offset + 4;
10456 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10457 r[3].r_addend = r[0].r_addend + 16;
10462 if (ALWAYS_EMIT_R2SAVE
10463 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10464 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10467 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10468 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10472 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10473 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10476 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10478 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10481 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10486 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10487 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10489 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10490 if (plt_static_chain)
10491 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10498 if (ALWAYS_EMIT_R2SAVE
10499 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10500 r[0].r_offset += 4;
10501 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10504 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10506 r[1].r_offset = r[0].r_offset + 4;
10507 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10508 r[1].r_addend = r[0].r_addend;
10512 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10513 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10514 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10515 if (plt_static_chain)
10517 r[2].r_offset = r[1].r_offset + 4;
10518 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10519 r[2].r_addend = r[0].r_addend + 8;
10524 if (ALWAYS_EMIT_R2SAVE
10525 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10526 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10527 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10529 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10531 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10534 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10539 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10540 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10542 if (plt_static_chain)
10543 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10544 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10547 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10549 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10550 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10551 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10554 bfd_put_32 (obfd, BCTR, p), p += 4;
10558 /* Build a special .plt call stub for __tls_get_addr. */
10560 #define LD_R11_0R3 0xe9630000
10561 #define LD_R12_0R3 0xe9830000
10562 #define MR_R0_R3 0x7c601b78
10563 #define CMPDI_R11_0 0x2c2b0000
10564 #define ADD_R3_R12_R13 0x7c6c6a14
10565 #define BEQLR 0x4d820020
10566 #define MR_R3_R0 0x7c030378
10567 #define STD_R11_0R1 0xf9610000
10568 #define BCTRL 0x4e800421
10569 #define LD_R11_0R1 0xe9610000
10570 #define MTLR_R11 0x7d6803a6
10572 static inline bfd_byte *
10573 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10574 struct ppc_stub_hash_entry *stub_entry,
10575 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10577 bfd *obfd = htab->params->stub_bfd;
10579 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10580 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10581 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10582 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10583 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10584 bfd_put_32 (obfd, BEQLR, p), p += 4;
10585 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10586 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10587 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10590 r[0].r_offset += 9 * 4;
10591 p = build_plt_stub (htab, stub_entry, p, offset, r);
10592 bfd_put_32 (obfd, BCTRL, p - 4);
10594 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10595 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10596 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10597 bfd_put_32 (obfd, BLR, p), p += 4;
10602 static Elf_Internal_Rela *
10603 get_relocs (asection *sec, int count)
10605 Elf_Internal_Rela *relocs;
10606 struct bfd_elf_section_data *elfsec_data;
10608 elfsec_data = elf_section_data (sec);
10609 relocs = elfsec_data->relocs;
10610 if (relocs == NULL)
10612 bfd_size_type relsize;
10613 relsize = sec->reloc_count * sizeof (*relocs);
10614 relocs = bfd_alloc (sec->owner, relsize);
10615 if (relocs == NULL)
10617 elfsec_data->relocs = relocs;
10618 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10619 sizeof (Elf_Internal_Shdr));
10620 if (elfsec_data->rela.hdr == NULL)
10622 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10623 * sizeof (Elf64_External_Rela));
10624 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10625 sec->reloc_count = 0;
10627 relocs += sec->reloc_count;
10628 sec->reloc_count += count;
10633 get_r2off (struct bfd_link_info *info,
10634 struct ppc_stub_hash_entry *stub_entry)
10636 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10637 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
10641 /* Support linking -R objects. Get the toc pointer from the
10644 if (!htab->opd_abi)
10646 asection *opd = stub_entry->h->elf.root.u.def.section;
10647 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10649 if (strcmp (opd->name, ".opd") != 0
10650 || opd->reloc_count != 0)
10652 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
10653 stub_entry->h->elf.root.root.string);
10654 bfd_set_error (bfd_error_bad_value);
10655 return (bfd_vma) -1;
10657 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
10658 return (bfd_vma) -1;
10659 r2off = bfd_get_64 (opd->owner, buf);
10660 r2off -= elf_gp (info->output_bfd);
10662 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
10667 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
10669 struct ppc_stub_hash_entry *stub_entry;
10670 struct ppc_branch_hash_entry *br_entry;
10671 struct bfd_link_info *info;
10672 struct ppc_link_hash_table *htab;
10677 Elf_Internal_Rela *r;
10680 /* Massage our args to the form they really have. */
10681 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
10684 htab = ppc_hash_table (info);
10688 /* Make a note of the offset within the stubs for this entry. */
10689 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10690 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
10692 htab->stub_count[stub_entry->stub_type - 1] += 1;
10693 switch (stub_entry->stub_type)
10695 case ppc_stub_long_branch:
10696 case ppc_stub_long_branch_r2off:
10697 /* Branches are relative. This is where we are going to. */
10698 dest = (stub_entry->target_value
10699 + stub_entry->target_section->output_offset
10700 + stub_entry->target_section->output_section->vma);
10701 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10704 /* And this is where we are coming from. */
10705 off -= (stub_entry->stub_offset
10706 + stub_entry->group->stub_sec->output_offset
10707 + stub_entry->group->stub_sec->output_section->vma);
10710 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10712 bfd_vma r2off = get_r2off (info, stub_entry);
10714 if (r2off == (bfd_vma) -1)
10716 htab->stub_error = TRUE;
10719 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
10722 if (PPC_HA (r2off) != 0)
10724 bfd_put_32 (htab->params->stub_bfd,
10725 ADDIS_R2_R2 | PPC_HA (r2off), loc);
10729 if (PPC_LO (r2off) != 0)
10731 bfd_put_32 (htab->params->stub_bfd,
10732 ADDI_R2_R2 | PPC_LO (r2off), loc);
10738 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
10740 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10742 info->callbacks->einfo
10743 (_("%P: long branch stub `%s' offset overflow\n"),
10744 stub_entry->root.string);
10745 htab->stub_error = TRUE;
10749 if (info->emitrelocations)
10751 r = get_relocs (stub_entry->group->stub_sec, 1);
10754 r->r_offset = loc - stub_entry->group->stub_sec->contents;
10755 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10756 r->r_addend = dest;
10757 if (stub_entry->h != NULL)
10759 struct elf_link_hash_entry **hashes;
10760 unsigned long symndx;
10761 struct ppc_link_hash_entry *h;
10763 hashes = elf_sym_hashes (htab->params->stub_bfd);
10764 if (hashes == NULL)
10766 bfd_size_type hsize;
10768 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10769 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10770 if (hashes == NULL)
10772 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10773 htab->stub_globals = 1;
10775 symndx = htab->stub_globals++;
10777 hashes[symndx] = &h->elf;
10778 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10779 if (h->oh != NULL && h->oh->is_func)
10780 h = ppc_follow_link (h->oh);
10781 if (h->elf.root.u.def.section != stub_entry->target_section)
10782 /* H is an opd symbol. The addend must be zero. */
10786 off = (h->elf.root.u.def.value
10787 + h->elf.root.u.def.section->output_offset
10788 + h->elf.root.u.def.section->output_section->vma);
10789 r->r_addend -= off;
10795 case ppc_stub_plt_branch:
10796 case ppc_stub_plt_branch_r2off:
10797 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10798 stub_entry->root.string + 9,
10800 if (br_entry == NULL)
10802 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
10803 stub_entry->root.string);
10804 htab->stub_error = TRUE;
10808 dest = (stub_entry->target_value
10809 + stub_entry->target_section->output_offset
10810 + stub_entry->target_section->output_section->vma);
10811 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10812 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10814 bfd_put_64 (htab->brlt->owner, dest,
10815 htab->brlt->contents + br_entry->offset);
10817 if (br_entry->iter == htab->stub_iteration)
10819 br_entry->iter = 0;
10821 if (htab->relbrlt != NULL)
10823 /* Create a reloc for the branch lookup table entry. */
10824 Elf_Internal_Rela rela;
10827 rela.r_offset = (br_entry->offset
10828 + htab->brlt->output_offset
10829 + htab->brlt->output_section->vma);
10830 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10831 rela.r_addend = dest;
10833 rl = htab->relbrlt->contents;
10834 rl += (htab->relbrlt->reloc_count++
10835 * sizeof (Elf64_External_Rela));
10836 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10838 else if (info->emitrelocations)
10840 r = get_relocs (htab->brlt, 1);
10843 /* brlt, being SEC_LINKER_CREATED does not go through the
10844 normal reloc processing. Symbols and offsets are not
10845 translated from input file to output file form, so
10846 set up the offset per the output file. */
10847 r->r_offset = (br_entry->offset
10848 + htab->brlt->output_offset
10849 + htab->brlt->output_section->vma);
10850 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10851 r->r_addend = dest;
10855 dest = (br_entry->offset
10856 + htab->brlt->output_offset
10857 + htab->brlt->output_section->vma);
10860 - elf_gp (htab->brlt->output_section->owner)
10861 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10863 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
10865 info->callbacks->einfo
10866 (_("%P: linkage table error against `%T'\n"),
10867 stub_entry->root.string);
10868 bfd_set_error (bfd_error_bad_value);
10869 htab->stub_error = TRUE;
10873 if (info->emitrelocations)
10875 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
10878 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
10879 if (bfd_big_endian (info->output_bfd))
10880 r[0].r_offset += 2;
10881 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
10882 r[0].r_offset += 4;
10883 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10884 r[0].r_addend = dest;
10885 if (PPC_HA (off) != 0)
10887 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10888 r[1].r_offset = r[0].r_offset + 4;
10889 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10890 r[1].r_addend = r[0].r_addend;
10894 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10896 if (PPC_HA (off) != 0)
10899 bfd_put_32 (htab->params->stub_bfd,
10900 ADDIS_R12_R2 | PPC_HA (off), loc);
10902 bfd_put_32 (htab->params->stub_bfd,
10903 LD_R12_0R12 | PPC_LO (off), loc);
10908 bfd_put_32 (htab->params->stub_bfd,
10909 LD_R12_0R2 | PPC_LO (off), loc);
10914 bfd_vma r2off = get_r2off (info, stub_entry);
10916 if (r2off == (bfd_vma) -1)
10918 htab->stub_error = TRUE;
10922 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
10925 if (PPC_HA (off) != 0)
10928 bfd_put_32 (htab->params->stub_bfd,
10929 ADDIS_R12_R2 | PPC_HA (off), loc);
10931 bfd_put_32 (htab->params->stub_bfd,
10932 LD_R12_0R12 | PPC_LO (off), loc);
10935 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
10937 if (PPC_HA (r2off) != 0)
10941 bfd_put_32 (htab->params->stub_bfd,
10942 ADDIS_R2_R2 | PPC_HA (r2off), loc);
10944 if (PPC_LO (r2off) != 0)
10948 bfd_put_32 (htab->params->stub_bfd,
10949 ADDI_R2_R2 | PPC_LO (r2off), loc);
10953 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
10955 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
10958 case ppc_stub_plt_call:
10959 case ppc_stub_plt_call_r2save:
10960 if (stub_entry->h != NULL
10961 && stub_entry->h->is_func_descriptor
10962 && stub_entry->h->oh != NULL)
10964 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
10966 /* If the old-ABI "dot-symbol" is undefined make it weak so
10967 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
10968 if (fh->elf.root.type == bfd_link_hash_undefined)
10969 fh->elf.root.type = bfd_link_hash_undefweak;
10970 /* Stop undo_symbol_twiddle changing it back to undefined. */
10971 fh->was_undefined = 0;
10974 /* Now build the stub. */
10975 dest = stub_entry->plt_ent->plt.offset & ~1;
10976 if (dest >= (bfd_vma) -2)
10979 plt = htab->elf.splt;
10980 if (!htab->elf.dynamic_sections_created
10981 || stub_entry->h == NULL
10982 || stub_entry->h->elf.dynindx == -1)
10983 plt = htab->elf.iplt;
10985 dest += plt->output_offset + plt->output_section->vma;
10987 if (stub_entry->h == NULL
10988 && (stub_entry->plt_ent->plt.offset & 1) == 0)
10990 Elf_Internal_Rela rela;
10993 rela.r_offset = dest;
10995 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
10997 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
10998 rela.r_addend = (stub_entry->target_value
10999 + stub_entry->target_section->output_offset
11000 + stub_entry->target_section->output_section->vma);
11002 rl = (htab->elf.irelplt->contents
11003 + (htab->elf.irelplt->reloc_count++
11004 * sizeof (Elf64_External_Rela)));
11005 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
11006 stub_entry->plt_ent->plt.offset |= 1;
11010 - elf_gp (plt->output_section->owner)
11011 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11013 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11015 info->callbacks->einfo
11016 (_("%P: linkage table error against `%T'\n"),
11017 stub_entry->h != NULL
11018 ? stub_entry->h->elf.root.root.string
11020 bfd_set_error (bfd_error_bad_value);
11021 htab->stub_error = TRUE;
11025 if (htab->params->plt_stub_align != 0)
11027 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11029 stub_entry->group->stub_sec->size += pad;
11030 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11035 if (info->emitrelocations)
11037 r = get_relocs (stub_entry->group->stub_sec,
11038 ((PPC_HA (off) != 0)
11040 ? 2 + (htab->params->plt_static_chain
11041 && PPC_HA (off + 16) == PPC_HA (off))
11045 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11046 if (bfd_big_endian (info->output_bfd))
11047 r[0].r_offset += 2;
11048 r[0].r_addend = dest;
11050 if (stub_entry->h != NULL
11051 && (stub_entry->h == htab->tls_get_addr_fd
11052 || stub_entry->h == htab->tls_get_addr)
11053 && htab->params->tls_get_addr_opt)
11054 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11056 p = build_plt_stub (htab, stub_entry, loc, off, r);
11060 case ppc_stub_save_res:
11068 stub_entry->group->stub_sec->size += size;
11070 if (htab->params->emit_stub_syms)
11072 struct elf_link_hash_entry *h;
11075 const char *const stub_str[] = { "long_branch",
11076 "long_branch_r2off",
11078 "plt_branch_r2off",
11082 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11083 len2 = strlen (stub_entry->root.string);
11084 name = bfd_malloc (len1 + len2 + 2);
11087 memcpy (name, stub_entry->root.string, 9);
11088 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11089 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11090 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11093 if (h->root.type == bfd_link_hash_new)
11095 h->root.type = bfd_link_hash_defined;
11096 h->root.u.def.section = stub_entry->group->stub_sec;
11097 h->root.u.def.value = stub_entry->stub_offset;
11098 h->ref_regular = 1;
11099 h->def_regular = 1;
11100 h->ref_regular_nonweak = 1;
11101 h->forced_local = 1;
11103 h->root.linker_def = 1;
11110 /* As above, but don't actually build the stub. Just bump offset so
11111 we know stub section sizes, and select plt_branch stubs where
11112 long_branch stubs won't do. */
11115 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11117 struct ppc_stub_hash_entry *stub_entry;
11118 struct bfd_link_info *info;
11119 struct ppc_link_hash_table *htab;
11123 /* Massage our args to the form they really have. */
11124 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11127 htab = ppc_hash_table (info);
11131 if (stub_entry->h != NULL
11132 && stub_entry->h->save_res
11133 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11134 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11136 /* Don't make stubs to out-of-line register save/restore
11137 functions. Instead, emit copies of the functions. */
11138 stub_entry->group->needs_save_res = 1;
11139 stub_entry->stub_type = ppc_stub_save_res;
11143 if (stub_entry->stub_type == ppc_stub_plt_call
11144 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11147 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11148 if (off >= (bfd_vma) -2)
11150 plt = htab->elf.splt;
11151 if (!htab->elf.dynamic_sections_created
11152 || stub_entry->h == NULL
11153 || stub_entry->h->elf.dynindx == -1)
11154 plt = htab->elf.iplt;
11155 off += (plt->output_offset
11156 + plt->output_section->vma
11157 - elf_gp (plt->output_section->owner)
11158 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11160 size = plt_stub_size (htab, stub_entry, off);
11161 if (htab->params->plt_stub_align)
11162 size += plt_stub_pad (htab, stub_entry, off);
11163 if (info->emitrelocations)
11165 stub_entry->group->stub_sec->reloc_count
11166 += ((PPC_HA (off) != 0)
11168 ? 2 + (htab->params->plt_static_chain
11169 && PPC_HA (off + 16) == PPC_HA (off))
11171 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11176 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11179 bfd_vma local_off = 0;
11181 off = (stub_entry->target_value
11182 + stub_entry->target_section->output_offset
11183 + stub_entry->target_section->output_section->vma);
11184 off -= (stub_entry->group->stub_sec->size
11185 + stub_entry->group->stub_sec->output_offset
11186 + stub_entry->group->stub_sec->output_section->vma);
11188 /* Reset the stub type from the plt variant in case we now
11189 can reach with a shorter stub. */
11190 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11191 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11194 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11196 r2off = get_r2off (info, stub_entry);
11197 if (r2off == (bfd_vma) -1)
11199 htab->stub_error = TRUE;
11203 if (PPC_HA (r2off) != 0)
11205 if (PPC_LO (r2off) != 0)
11210 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11212 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11213 Do the same for -R objects without function descriptors. */
11214 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11215 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
11217 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
11219 struct ppc_branch_hash_entry *br_entry;
11221 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11222 stub_entry->root.string + 9,
11224 if (br_entry == NULL)
11226 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
11227 stub_entry->root.string);
11228 htab->stub_error = TRUE;
11232 if (br_entry->iter != htab->stub_iteration)
11234 br_entry->iter = htab->stub_iteration;
11235 br_entry->offset = htab->brlt->size;
11236 htab->brlt->size += 8;
11238 if (htab->relbrlt != NULL)
11239 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11240 else if (info->emitrelocations)
11242 htab->brlt->reloc_count += 1;
11243 htab->brlt->flags |= SEC_RELOC;
11247 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11248 off = (br_entry->offset
11249 + htab->brlt->output_offset
11250 + htab->brlt->output_section->vma
11251 - elf_gp (htab->brlt->output_section->owner)
11252 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11254 if (info->emitrelocations)
11256 stub_entry->group->stub_sec->reloc_count
11257 += 1 + (PPC_HA (off) != 0);
11258 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11261 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11264 if (PPC_HA (off) != 0)
11270 if (PPC_HA (off) != 0)
11273 if (PPC_HA (r2off) != 0)
11275 if (PPC_LO (r2off) != 0)
11279 else if (info->emitrelocations)
11281 stub_entry->group->stub_sec->reloc_count += 1;
11282 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11286 stub_entry->group->stub_sec->size += size;
11290 /* Set up various things so that we can make a list of input sections
11291 for each output section included in the link. Returns -1 on error,
11292 0 when no stubs will be needed, and 1 on success. */
11295 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11299 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11304 htab->sec_info_arr_size = bfd_get_next_section_id ();
11305 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11306 htab->sec_info = bfd_zmalloc (amt);
11307 if (htab->sec_info == NULL)
11310 /* Set toc_off for com, und, abs and ind sections. */
11311 for (id = 0; id < 3; id++)
11312 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11317 /* Set up for first pass at multitoc partitioning. */
11320 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11322 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11324 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11325 htab->toc_bfd = NULL;
11326 htab->toc_first_sec = NULL;
11329 /* The linker repeatedly calls this function for each TOC input section
11330 and linker generated GOT section. Group input bfds such that the toc
11331 within a group is less than 64k in size. */
11334 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11336 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11337 bfd_vma addr, off, limit;
11342 if (!htab->second_toc_pass)
11344 /* Keep track of the first .toc or .got section for this input bfd. */
11345 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11349 htab->toc_bfd = isec->owner;
11350 htab->toc_first_sec = isec;
11353 addr = isec->output_offset + isec->output_section->vma;
11354 off = addr - htab->toc_curr;
11355 limit = 0x80008000;
11356 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11358 if (off + isec->size > limit)
11360 addr = (htab->toc_first_sec->output_offset
11361 + htab->toc_first_sec->output_section->vma);
11362 htab->toc_curr = addr;
11363 htab->toc_curr &= -TOC_BASE_ALIGN;
11366 /* toc_curr is the base address of this toc group. Set elf_gp
11367 for the input section to be the offset relative to the
11368 output toc base plus 0x8000. Making the input elf_gp an
11369 offset allows us to move the toc as a whole without
11370 recalculating input elf_gp. */
11371 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11372 off += TOC_BASE_OFF;
11374 /* Die if someone uses a linker script that doesn't keep input
11375 file .toc and .got together. */
11377 && elf_gp (isec->owner) != 0
11378 && elf_gp (isec->owner) != off)
11381 elf_gp (isec->owner) = off;
11385 /* During the second pass toc_first_sec points to the start of
11386 a toc group, and toc_curr is used to track the old elf_gp.
11387 We use toc_bfd to ensure we only look at each bfd once. */
11388 if (htab->toc_bfd == isec->owner)
11390 htab->toc_bfd = isec->owner;
11392 if (htab->toc_first_sec == NULL
11393 || htab->toc_curr != elf_gp (isec->owner))
11395 htab->toc_curr = elf_gp (isec->owner);
11396 htab->toc_first_sec = isec;
11398 addr = (htab->toc_first_sec->output_offset
11399 + htab->toc_first_sec->output_section->vma);
11400 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11401 elf_gp (isec->owner) = off;
11406 /* Called via elf_link_hash_traverse to merge GOT entries for global
11410 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11412 if (h->root.type == bfd_link_hash_indirect)
11415 merge_got_entries (&h->got.glist);
11420 /* Called via elf_link_hash_traverse to allocate GOT entries for global
11424 reallocate_got (struct elf_link_hash_entry *h, void *inf)
11426 struct got_entry *gent;
11428 if (h->root.type == bfd_link_hash_indirect)
11431 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11432 if (!gent->is_indirect)
11433 allocate_got (h, (struct bfd_link_info *) inf, gent);
11437 /* Called on the first multitoc pass after the last call to
11438 ppc64_elf_next_toc_section. This function removes duplicate GOT
11442 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
11444 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11445 struct bfd *ibfd, *ibfd2;
11446 bfd_boolean done_something;
11448 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
11450 if (!htab->do_multi_toc)
11453 /* Merge global sym got entries within a toc group. */
11454 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11456 /* And tlsld_got. */
11457 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11459 struct got_entry *ent, *ent2;
11461 if (!is_ppc64_elf (ibfd))
11464 ent = ppc64_tlsld_got (ibfd);
11465 if (!ent->is_indirect
11466 && ent->got.offset != (bfd_vma) -1)
11468 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
11470 if (!is_ppc64_elf (ibfd2))
11473 ent2 = ppc64_tlsld_got (ibfd2);
11474 if (!ent2->is_indirect
11475 && ent2->got.offset != (bfd_vma) -1
11476 && elf_gp (ibfd2) == elf_gp (ibfd))
11478 ent2->is_indirect = TRUE;
11479 ent2->got.ent = ent;
11485 /* Zap sizes of got sections. */
11486 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11487 htab->elf.irelplt->size -= htab->got_reli_size;
11488 htab->got_reli_size = 0;
11490 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11492 asection *got, *relgot;
11494 if (!is_ppc64_elf (ibfd))
11497 got = ppc64_elf_tdata (ibfd)->got;
11500 got->rawsize = got->size;
11502 relgot = ppc64_elf_tdata (ibfd)->relgot;
11503 relgot->rawsize = relgot->size;
11508 /* Now reallocate the got, local syms first. We don't need to
11509 allocate section contents again since we never increase size. */
11510 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11512 struct got_entry **lgot_ents;
11513 struct got_entry **end_lgot_ents;
11514 struct plt_entry **local_plt;
11515 struct plt_entry **end_local_plt;
11516 unsigned char *lgot_masks;
11517 bfd_size_type locsymcount;
11518 Elf_Internal_Shdr *symtab_hdr;
11521 if (!is_ppc64_elf (ibfd))
11524 lgot_ents = elf_local_got_ents (ibfd);
11528 symtab_hdr = &elf_symtab_hdr (ibfd);
11529 locsymcount = symtab_hdr->sh_info;
11530 end_lgot_ents = lgot_ents + locsymcount;
11531 local_plt = (struct plt_entry **) end_lgot_ents;
11532 end_local_plt = local_plt + locsymcount;
11533 lgot_masks = (unsigned char *) end_local_plt;
11534 s = ppc64_elf_tdata (ibfd)->got;
11535 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11537 struct got_entry *ent;
11539 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
11541 unsigned int ent_size = 8;
11542 unsigned int rel_size = sizeof (Elf64_External_Rela);
11544 ent->got.offset = s->size;
11545 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
11550 s->size += ent_size;
11551 if ((*lgot_masks & PLT_IFUNC) != 0)
11553 htab->elf.irelplt->size += rel_size;
11554 htab->got_reli_size += rel_size;
11556 else if (bfd_link_pic (info))
11558 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11559 srel->size += rel_size;
11565 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11567 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11569 struct got_entry *ent;
11571 if (!is_ppc64_elf (ibfd))
11574 ent = ppc64_tlsld_got (ibfd);
11575 if (!ent->is_indirect
11576 && ent->got.offset != (bfd_vma) -1)
11578 asection *s = ppc64_elf_tdata (ibfd)->got;
11579 ent->got.offset = s->size;
11581 if (bfd_link_pic (info))
11583 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11584 srel->size += sizeof (Elf64_External_Rela);
11589 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
11590 if (!done_something)
11591 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11595 if (!is_ppc64_elf (ibfd))
11598 got = ppc64_elf_tdata (ibfd)->got;
11601 done_something = got->rawsize != got->size;
11602 if (done_something)
11607 if (done_something)
11608 (*htab->params->layout_sections_again) ();
11610 /* Set up for second pass over toc sections to recalculate elf_gp
11611 on input sections. */
11612 htab->toc_bfd = NULL;
11613 htab->toc_first_sec = NULL;
11614 htab->second_toc_pass = TRUE;
11615 return done_something;
11618 /* Called after second pass of multitoc partitioning. */
11621 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11623 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11625 /* After the second pass, toc_curr tracks the TOC offset used
11626 for code sections below in ppc64_elf_next_input_section. */
11627 htab->toc_curr = TOC_BASE_OFF;
11630 /* No toc references were found in ISEC. If the code in ISEC makes no
11631 calls, then there's no need to use toc adjusting stubs when branching
11632 into ISEC. Actually, indirect calls from ISEC are OK as they will
11633 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11634 needed, and 2 if a cyclical call-graph was found but no other reason
11635 for a stub was detected. If called from the top level, a return of
11636 2 means the same as a return of 0. */
11639 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
11643 /* Mark this section as checked. */
11644 isec->call_check_done = 1;
11646 /* We know none of our code bearing sections will need toc stubs. */
11647 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11650 if (isec->size == 0)
11653 if (isec->output_section == NULL)
11657 if (isec->reloc_count != 0)
11659 Elf_Internal_Rela *relstart, *rel;
11660 Elf_Internal_Sym *local_syms;
11661 struct ppc_link_hash_table *htab;
11663 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11664 info->keep_memory);
11665 if (relstart == NULL)
11668 /* Look for branches to outside of this section. */
11670 htab = ppc_hash_table (info);
11674 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
11676 enum elf_ppc64_reloc_type r_type;
11677 unsigned long r_symndx;
11678 struct elf_link_hash_entry *h;
11679 struct ppc_link_hash_entry *eh;
11680 Elf_Internal_Sym *sym;
11682 struct _opd_sec_data *opd;
11686 r_type = ELF64_R_TYPE (rel->r_info);
11687 if (r_type != R_PPC64_REL24
11688 && r_type != R_PPC64_REL14
11689 && r_type != R_PPC64_REL14_BRTAKEN
11690 && r_type != R_PPC64_REL14_BRNTAKEN)
11693 r_symndx = ELF64_R_SYM (rel->r_info);
11694 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11701 /* Calls to dynamic lib functions go through a plt call stub
11703 eh = (struct ppc_link_hash_entry *) h;
11705 && (eh->elf.plt.plist != NULL
11707 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11713 if (sym_sec == NULL)
11714 /* Ignore other undefined symbols. */
11717 /* Assume branches to other sections not included in the
11718 link need stubs too, to cover -R and absolute syms. */
11719 if (sym_sec->output_section == NULL)
11726 sym_value = sym->st_value;
11729 if (h->root.type != bfd_link_hash_defined
11730 && h->root.type != bfd_link_hash_defweak)
11732 sym_value = h->root.u.def.value;
11734 sym_value += rel->r_addend;
11736 /* If this branch reloc uses an opd sym, find the code section. */
11737 opd = get_opd_info (sym_sec);
11740 if (h == NULL && opd->adjust != NULL)
11744 adjust = opd->adjust[OPD_NDX (sym_value)];
11746 /* Assume deleted functions won't ever be called. */
11748 sym_value += adjust;
11751 dest = opd_entry_value (sym_sec, sym_value,
11752 &sym_sec, NULL, FALSE);
11753 if (dest == (bfd_vma) -1)
11758 + sym_sec->output_offset
11759 + sym_sec->output_section->vma);
11761 /* Ignore branch to self. */
11762 if (sym_sec == isec)
11765 /* If the called function uses the toc, we need a stub. */
11766 if (sym_sec->has_toc_reloc
11767 || sym_sec->makes_toc_func_call)
11773 /* Assume any branch that needs a long branch stub might in fact
11774 need a plt_branch stub. A plt_branch stub uses r2. */
11775 else if (dest - (isec->output_offset
11776 + isec->output_section->vma
11777 + rel->r_offset) + (1 << 25)
11778 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11786 /* If calling back to a section in the process of being
11787 tested, we can't say for sure that no toc adjusting stubs
11788 are needed, so don't return zero. */
11789 else if (sym_sec->call_check_in_progress)
11792 /* Branches to another section that itself doesn't have any TOC
11793 references are OK. Recursively call ourselves to check. */
11794 else if (!sym_sec->call_check_done)
11798 /* Mark current section as indeterminate, so that other
11799 sections that call back to current won't be marked as
11801 isec->call_check_in_progress = 1;
11802 recur = toc_adjusting_stub_needed (info, sym_sec);
11803 isec->call_check_in_progress = 0;
11814 if (local_syms != NULL
11815 && (elf_symtab_hdr (isec->owner).contents
11816 != (unsigned char *) local_syms))
11818 if (elf_section_data (isec)->relocs != relstart)
11823 && isec->map_head.s != NULL
11824 && (strcmp (isec->output_section->name, ".init") == 0
11825 || strcmp (isec->output_section->name, ".fini") == 0))
11827 if (isec->map_head.s->has_toc_reloc
11828 || isec->map_head.s->makes_toc_func_call)
11830 else if (!isec->map_head.s->call_check_done)
11833 isec->call_check_in_progress = 1;
11834 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11835 isec->call_check_in_progress = 0;
11842 isec->makes_toc_func_call = 1;
11847 /* The linker repeatedly calls this function for each input section,
11848 in the order that input sections are linked into output sections.
11849 Build lists of input sections to determine groupings between which
11850 we may insert linker stubs. */
11853 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
11855 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11860 if ((isec->output_section->flags & SEC_CODE) != 0
11861 && isec->output_section->id < htab->sec_info_arr_size)
11863 /* This happens to make the list in reverse order,
11864 which is what we want. */
11865 htab->sec_info[isec->id].u.list
11866 = htab->sec_info[isec->output_section->id].u.list;
11867 htab->sec_info[isec->output_section->id].u.list = isec;
11870 if (htab->multi_toc_needed)
11872 /* Analyse sections that aren't already flagged as needing a
11873 valid toc pointer. Exclude .fixup for the linux kernel.
11874 .fixup contains branches, but only back to the function that
11875 hit an exception. */
11876 if (!(isec->has_toc_reloc
11877 || (isec->flags & SEC_CODE) == 0
11878 || strcmp (isec->name, ".fixup") == 0
11879 || isec->call_check_done))
11881 if (toc_adjusting_stub_needed (info, isec) < 0)
11884 /* Make all sections use the TOC assigned for this object file.
11885 This will be wrong for pasted sections; We fix that in
11886 check_pasted_section(). */
11887 if (elf_gp (isec->owner) != 0)
11888 htab->toc_curr = elf_gp (isec->owner);
11891 htab->sec_info[isec->id].toc_off = htab->toc_curr;
11895 /* Check that all .init and .fini sections use the same toc, if they
11896 have toc relocs. */
11899 check_pasted_section (struct bfd_link_info *info, const char *name)
11901 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11905 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11906 bfd_vma toc_off = 0;
11909 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11910 if (i->has_toc_reloc)
11913 toc_off = htab->sec_info[i->id].toc_off;
11914 else if (toc_off != htab->sec_info[i->id].toc_off)
11919 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11920 if (i->makes_toc_func_call)
11922 toc_off = htab->sec_info[i->id].toc_off;
11926 /* Make sure the whole pasted function uses the same toc offset. */
11928 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11929 htab->sec_info[i->id].toc_off = toc_off;
11935 ppc64_elf_check_init_fini (struct bfd_link_info *info)
11937 return (check_pasted_section (info, ".init")
11938 & check_pasted_section (info, ".fini"));
11941 /* See whether we can group stub sections together. Grouping stub
11942 sections may result in fewer stubs. More importantly, we need to
11943 put all .init* and .fini* stubs at the beginning of the .init or
11944 .fini output sections respectively, because glibc splits the
11945 _init and _fini functions into multiple parts. Putting a stub in
11946 the middle of a function is not a good idea. */
11949 group_sections (struct bfd_link_info *info,
11950 bfd_size_type stub_group_size,
11951 bfd_boolean stubs_always_before_branch)
11953 struct ppc_link_hash_table *htab;
11955 bfd_size_type stub14_group_size;
11956 bfd_boolean suppress_size_errors;
11958 htab = ppc_hash_table (info);
11962 suppress_size_errors = FALSE;
11963 stub14_group_size = stub_group_size >> 10;
11964 if (stub_group_size == 1)
11966 /* Default values. */
11967 if (stubs_always_before_branch)
11969 stub_group_size = 0x1e00000;
11970 stub14_group_size = 0x7800;
11974 stub_group_size = 0x1c00000;
11975 stub14_group_size = 0x7000;
11977 suppress_size_errors = TRUE;
11980 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
11984 if (osec->id >= htab->sec_info_arr_size)
11987 tail = htab->sec_info[osec->id].u.list;
11988 while (tail != NULL)
11992 bfd_size_type total;
11993 bfd_boolean big_sec;
11995 struct map_stub *group;
11998 total = tail->size;
11999 big_sec = total > (ppc64_elf_section_data (tail) != NULL
12000 && ppc64_elf_section_data (tail)->has_14bit_branch
12001 ? stub14_group_size : stub_group_size);
12002 if (big_sec && !suppress_size_errors)
12003 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
12004 tail->owner, tail);
12005 curr_toc = htab->sec_info[tail->id].toc_off;
12007 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12008 && ((total += curr->output_offset - prev->output_offset)
12009 < (ppc64_elf_section_data (prev) != NULL
12010 && ppc64_elf_section_data (prev)->has_14bit_branch
12011 ? stub14_group_size : stub_group_size))
12012 && htab->sec_info[prev->id].toc_off == curr_toc)
12015 /* OK, the size from the start of CURR to the end is less
12016 than stub_group_size and thus can be handled by one stub
12017 section. (or the tail section is itself larger than
12018 stub_group_size, in which case we may be toast.) We
12019 should really be keeping track of the total size of stubs
12020 added here, as stubs contribute to the final output
12021 section size. That's a little tricky, and this way will
12022 only break if stubs added make the total size more than
12023 2^25, ie. for the default stub_group_size, if stubs total
12024 more than 2097152 bytes, or nearly 75000 plt call stubs. */
12025 group = bfd_alloc (curr->owner, sizeof (*group));
12028 group->link_sec = curr;
12029 group->stub_sec = NULL;
12030 group->needs_save_res = 0;
12031 group->next = htab->group;
12032 htab->group = group;
12035 prev = htab->sec_info[tail->id].u.list;
12036 /* Set up this stub group. */
12037 htab->sec_info[tail->id].u.group = group;
12039 while (tail != curr && (tail = prev) != NULL);
12041 /* But wait, there's more! Input sections up to stub_group_size
12042 bytes before the stub section can be handled by it too.
12043 Don't do this if we have a really large section after the
12044 stubs, as adding more stubs increases the chance that
12045 branches may not reach into the stub section. */
12046 if (!stubs_always_before_branch && !big_sec)
12049 while (prev != NULL
12050 && ((total += tail->output_offset - prev->output_offset)
12051 < (ppc64_elf_section_data (prev) != NULL
12052 && ppc64_elf_section_data (prev)->has_14bit_branch
12053 ? stub14_group_size : stub_group_size))
12054 && htab->sec_info[prev->id].toc_off == curr_toc)
12057 prev = htab->sec_info[tail->id].u.list;
12058 htab->sec_info[tail->id].u.group = group;
12067 static const unsigned char glink_eh_frame_cie[] =
12069 0, 0, 0, 16, /* length. */
12070 0, 0, 0, 0, /* id. */
12071 1, /* CIE version. */
12072 'z', 'R', 0, /* Augmentation string. */
12073 4, /* Code alignment. */
12074 0x78, /* Data alignment. */
12076 1, /* Augmentation size. */
12077 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12078 DW_CFA_def_cfa, 1, 0, /* def_cfa: r1 offset 0. */
12082 /* Stripping output sections is normally done before dynamic section
12083 symbols have been allocated. This function is called later, and
12084 handles cases like htab->brlt which is mapped to its own output
12088 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12090 if (isec->size == 0
12091 && isec->output_section->size == 0
12092 && !(isec->output_section->flags & SEC_KEEP)
12093 && !bfd_section_removed_from_list (info->output_bfd,
12094 isec->output_section)
12095 && elf_section_data (isec->output_section)->dynindx == 0)
12097 isec->output_section->flags |= SEC_EXCLUDE;
12098 bfd_section_list_remove (info->output_bfd, isec->output_section);
12099 info->output_bfd->section_count--;
12103 /* Determine and set the size of the stub section for a final link.
12105 The basic idea here is to examine all the relocations looking for
12106 PC-relative calls to a target that is unreachable with a "bl"
12110 ppc64_elf_size_stubs (struct bfd_link_info *info)
12112 bfd_size_type stub_group_size;
12113 bfd_boolean stubs_always_before_branch;
12114 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12119 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12120 htab->params->plt_thread_safe = 1;
12121 if (!htab->opd_abi)
12122 htab->params->plt_thread_safe = 0;
12123 else if (htab->params->plt_thread_safe == -1)
12125 static const char *const thread_starter[] =
12129 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12131 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12132 "mq_notify", "create_timer",
12137 "GOMP_parallel_start",
12138 "GOMP_parallel_loop_static",
12139 "GOMP_parallel_loop_static_start",
12140 "GOMP_parallel_loop_dynamic",
12141 "GOMP_parallel_loop_dynamic_start",
12142 "GOMP_parallel_loop_guided",
12143 "GOMP_parallel_loop_guided_start",
12144 "GOMP_parallel_loop_runtime",
12145 "GOMP_parallel_loop_runtime_start",
12146 "GOMP_parallel_sections",
12147 "GOMP_parallel_sections_start",
12153 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12155 struct elf_link_hash_entry *h;
12156 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12157 FALSE, FALSE, TRUE);
12158 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12159 if (htab->params->plt_thread_safe)
12163 stubs_always_before_branch = htab->params->group_size < 0;
12164 if (htab->params->group_size < 0)
12165 stub_group_size = -htab->params->group_size;
12167 stub_group_size = htab->params->group_size;
12169 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12175 unsigned int bfd_indx;
12176 struct map_stub *group;
12177 asection *stub_sec;
12179 htab->stub_iteration += 1;
12181 for (input_bfd = info->input_bfds, bfd_indx = 0;
12183 input_bfd = input_bfd->link.next, bfd_indx++)
12185 Elf_Internal_Shdr *symtab_hdr;
12187 Elf_Internal_Sym *local_syms = NULL;
12189 if (!is_ppc64_elf (input_bfd))
12192 /* We'll need the symbol table in a second. */
12193 symtab_hdr = &elf_symtab_hdr (input_bfd);
12194 if (symtab_hdr->sh_info == 0)
12197 /* Walk over each section attached to the input bfd. */
12198 for (section = input_bfd->sections;
12200 section = section->next)
12202 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12204 /* If there aren't any relocs, then there's nothing more
12206 if ((section->flags & SEC_RELOC) == 0
12207 || (section->flags & SEC_ALLOC) == 0
12208 || (section->flags & SEC_LOAD) == 0
12209 || (section->flags & SEC_CODE) == 0
12210 || section->reloc_count == 0)
12213 /* If this section is a link-once section that will be
12214 discarded, then don't create any stubs. */
12215 if (section->output_section == NULL
12216 || section->output_section->owner != info->output_bfd)
12219 /* Get the relocs. */
12221 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12222 info->keep_memory);
12223 if (internal_relocs == NULL)
12224 goto error_ret_free_local;
12226 /* Now examine each relocation. */
12227 irela = internal_relocs;
12228 irelaend = irela + section->reloc_count;
12229 for (; irela < irelaend; irela++)
12231 enum elf_ppc64_reloc_type r_type;
12232 unsigned int r_indx;
12233 enum ppc_stub_type stub_type;
12234 struct ppc_stub_hash_entry *stub_entry;
12235 asection *sym_sec, *code_sec;
12236 bfd_vma sym_value, code_value;
12237 bfd_vma destination;
12238 unsigned long local_off;
12239 bfd_boolean ok_dest;
12240 struct ppc_link_hash_entry *hash;
12241 struct ppc_link_hash_entry *fdh;
12242 struct elf_link_hash_entry *h;
12243 Elf_Internal_Sym *sym;
12245 const asection *id_sec;
12246 struct _opd_sec_data *opd;
12247 struct plt_entry *plt_ent;
12249 r_type = ELF64_R_TYPE (irela->r_info);
12250 r_indx = ELF64_R_SYM (irela->r_info);
12252 if (r_type >= R_PPC64_max)
12254 bfd_set_error (bfd_error_bad_value);
12255 goto error_ret_free_internal;
12258 /* Only look for stubs on branch instructions. */
12259 if (r_type != R_PPC64_REL24
12260 && r_type != R_PPC64_REL14
12261 && r_type != R_PPC64_REL14_BRTAKEN
12262 && r_type != R_PPC64_REL14_BRNTAKEN)
12265 /* Now determine the call target, its name, value,
12267 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12268 r_indx, input_bfd))
12269 goto error_ret_free_internal;
12270 hash = (struct ppc_link_hash_entry *) h;
12277 sym_value = sym->st_value;
12280 else if (hash->elf.root.type == bfd_link_hash_defined
12281 || hash->elf.root.type == bfd_link_hash_defweak)
12283 sym_value = hash->elf.root.u.def.value;
12284 if (sym_sec->output_section != NULL)
12287 else if (hash->elf.root.type == bfd_link_hash_undefweak
12288 || hash->elf.root.type == bfd_link_hash_undefined)
12290 /* Recognise an old ABI func code entry sym, and
12291 use the func descriptor sym instead if it is
12293 if (hash->elf.root.root.string[0] == '.'
12294 && (fdh = lookup_fdh (hash, htab)) != NULL)
12296 if (fdh->elf.root.type == bfd_link_hash_defined
12297 || fdh->elf.root.type == bfd_link_hash_defweak)
12299 sym_sec = fdh->elf.root.u.def.section;
12300 sym_value = fdh->elf.root.u.def.value;
12301 if (sym_sec->output_section != NULL)
12310 bfd_set_error (bfd_error_bad_value);
12311 goto error_ret_free_internal;
12318 sym_value += irela->r_addend;
12319 destination = (sym_value
12320 + sym_sec->output_offset
12321 + sym_sec->output_section->vma);
12322 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12327 code_sec = sym_sec;
12328 code_value = sym_value;
12329 opd = get_opd_info (sym_sec);
12334 if (hash == NULL && opd->adjust != NULL)
12336 long adjust = opd->adjust[OPD_NDX (sym_value)];
12339 code_value += adjust;
12340 sym_value += adjust;
12342 dest = opd_entry_value (sym_sec, sym_value,
12343 &code_sec, &code_value, FALSE);
12344 if (dest != (bfd_vma) -1)
12346 destination = dest;
12349 /* Fixup old ABI sym to point at code
12351 hash->elf.root.type = bfd_link_hash_defweak;
12352 hash->elf.root.u.def.section = code_sec;
12353 hash->elf.root.u.def.value = code_value;
12358 /* Determine what (if any) linker stub is needed. */
12360 stub_type = ppc_type_of_stub (section, irela, &hash,
12361 &plt_ent, destination,
12364 if (stub_type != ppc_stub_plt_call)
12366 /* Check whether we need a TOC adjusting stub.
12367 Since the linker pastes together pieces from
12368 different object files when creating the
12369 _init and _fini functions, it may be that a
12370 call to what looks like a local sym is in
12371 fact a call needing a TOC adjustment. */
12372 if (code_sec != NULL
12373 && code_sec->output_section != NULL
12374 && (htab->sec_info[code_sec->id].toc_off
12375 != htab->sec_info[section->id].toc_off)
12376 && (code_sec->has_toc_reloc
12377 || code_sec->makes_toc_func_call))
12378 stub_type = ppc_stub_long_branch_r2off;
12381 if (stub_type == ppc_stub_none)
12384 /* __tls_get_addr calls might be eliminated. */
12385 if (stub_type != ppc_stub_plt_call
12387 && (hash == htab->tls_get_addr
12388 || hash == htab->tls_get_addr_fd)
12389 && section->has_tls_reloc
12390 && irela != internal_relocs)
12392 /* Get tls info. */
12393 unsigned char *tls_mask;
12395 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
12396 irela - 1, input_bfd))
12397 goto error_ret_free_internal;
12398 if (*tls_mask != 0)
12402 if (stub_type == ppc_stub_plt_call
12403 && irela + 1 < irelaend
12404 && irela[1].r_offset == irela->r_offset + 4
12405 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12407 if (!tocsave_find (htab, INSERT,
12408 &local_syms, irela + 1, input_bfd))
12409 goto error_ret_free_internal;
12411 else if (stub_type == ppc_stub_plt_call)
12412 stub_type = ppc_stub_plt_call_r2save;
12414 /* Support for grouping stub sections. */
12415 id_sec = htab->sec_info[section->id].u.group->link_sec;
12417 /* Get the name of this stub. */
12418 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12420 goto error_ret_free_internal;
12422 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
12423 stub_name, FALSE, FALSE);
12424 if (stub_entry != NULL)
12426 /* The proper stub has already been created. */
12428 if (stub_type == ppc_stub_plt_call_r2save)
12429 stub_entry->stub_type = stub_type;
12433 stub_entry = ppc_add_stub (stub_name, section, info);
12434 if (stub_entry == NULL)
12437 error_ret_free_internal:
12438 if (elf_section_data (section)->relocs == NULL)
12439 free (internal_relocs);
12440 error_ret_free_local:
12441 if (local_syms != NULL
12442 && (symtab_hdr->contents
12443 != (unsigned char *) local_syms))
12448 stub_entry->stub_type = stub_type;
12449 if (stub_type != ppc_stub_plt_call
12450 && stub_type != ppc_stub_plt_call_r2save)
12452 stub_entry->target_value = code_value;
12453 stub_entry->target_section = code_sec;
12457 stub_entry->target_value = sym_value;
12458 stub_entry->target_section = sym_sec;
12460 stub_entry->h = hash;
12461 stub_entry->plt_ent = plt_ent;
12462 stub_entry->other = hash ? hash->elf.other : sym->st_other;
12464 if (stub_entry->h != NULL)
12465 htab->stub_globals += 1;
12468 /* We're done with the internal relocs, free them. */
12469 if (elf_section_data (section)->relocs != internal_relocs)
12470 free (internal_relocs);
12473 if (local_syms != NULL
12474 && symtab_hdr->contents != (unsigned char *) local_syms)
12476 if (!info->keep_memory)
12479 symtab_hdr->contents = (unsigned char *) local_syms;
12483 /* We may have added some stubs. Find out the new size of the
12485 for (stub_sec = htab->params->stub_bfd->sections;
12487 stub_sec = stub_sec->next)
12488 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12490 stub_sec->rawsize = stub_sec->size;
12491 stub_sec->size = 0;
12492 stub_sec->reloc_count = 0;
12493 stub_sec->flags &= ~SEC_RELOC;
12496 htab->brlt->size = 0;
12497 htab->brlt->reloc_count = 0;
12498 htab->brlt->flags &= ~SEC_RELOC;
12499 if (htab->relbrlt != NULL)
12500 htab->relbrlt->size = 0;
12502 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
12504 for (group = htab->group; group != NULL; group = group->next)
12505 if (group->needs_save_res)
12506 group->stub_sec->size += htab->sfpr->size;
12508 if (info->emitrelocations
12509 && htab->glink != NULL && htab->glink->size != 0)
12511 htab->glink->reloc_count = 1;
12512 htab->glink->flags |= SEC_RELOC;
12515 if (htab->glink_eh_frame != NULL
12516 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
12517 && htab->glink_eh_frame->output_section->size != 0)
12519 size_t size = 0, align;
12521 for (stub_sec = htab->params->stub_bfd->sections;
12523 stub_sec = stub_sec->next)
12524 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12526 if (htab->glink != NULL && htab->glink->size != 0)
12529 size += sizeof (glink_eh_frame_cie);
12531 align <<= htab->glink_eh_frame->output_section->alignment_power;
12533 size = (size + align) & ~align;
12534 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12535 htab->glink_eh_frame->size = size;
12538 if (htab->params->plt_stub_align != 0)
12539 for (stub_sec = htab->params->stub_bfd->sections;
12541 stub_sec = stub_sec->next)
12542 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12543 stub_sec->size = ((stub_sec->size
12544 + (1 << htab->params->plt_stub_align) - 1)
12545 & -(1 << htab->params->plt_stub_align));
12547 for (stub_sec = htab->params->stub_bfd->sections;
12549 stub_sec = stub_sec->next)
12550 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12551 && stub_sec->rawsize != stub_sec->size)
12554 /* Exit from this loop when no stubs have been added, and no stubs
12555 have changed size. */
12556 if (stub_sec == NULL
12557 && (htab->glink_eh_frame == NULL
12558 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
12561 /* Ask the linker to do its stuff. */
12562 (*htab->params->layout_sections_again) ();
12565 if (htab->glink_eh_frame != NULL
12566 && htab->glink_eh_frame->size != 0)
12569 bfd_byte *p, *last_fde;
12570 size_t last_fde_len, size, align, pad;
12571 asection *stub_sec;
12573 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12576 htab->glink_eh_frame->contents = p;
12579 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12580 /* CIE length (rewrite in case little-endian). */
12581 last_fde_len = sizeof (glink_eh_frame_cie) - 4;
12582 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12583 p += sizeof (glink_eh_frame_cie);
12585 for (stub_sec = htab->params->stub_bfd->sections;
12587 stub_sec = stub_sec->next)
12588 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12593 bfd_put_32 (htab->elf.dynobj, 20, p);
12596 val = p - htab->glink_eh_frame->contents;
12597 bfd_put_32 (htab->elf.dynobj, val, p);
12599 /* Offset to stub section, written later. */
12601 /* stub section size. */
12602 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12604 /* Augmentation. */
12609 if (htab->glink != NULL && htab->glink->size != 0)
12614 bfd_put_32 (htab->elf.dynobj, 20, p);
12617 val = p - htab->glink_eh_frame->contents;
12618 bfd_put_32 (htab->elf.dynobj, val, p);
12620 /* Offset to .glink, written later. */
12623 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12625 /* Augmentation. */
12628 *p++ = DW_CFA_advance_loc + 1;
12629 *p++ = DW_CFA_register;
12631 *p++ = htab->opd_abi ? 12 : 0;
12632 *p++ = DW_CFA_advance_loc + 4;
12633 *p++ = DW_CFA_restore_extended;
12636 /* Subsume any padding into the last FDE if user .eh_frame
12637 sections are aligned more than glink_eh_frame. Otherwise any
12638 zero padding will be seen as a terminator. */
12639 size = p - htab->glink_eh_frame->contents;
12641 align <<= htab->glink_eh_frame->output_section->alignment_power;
12643 pad = ((size + align) & ~align) - size;
12644 htab->glink_eh_frame->size = size + pad;
12645 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12648 maybe_strip_output (info, htab->brlt);
12649 if (htab->glink_eh_frame != NULL)
12650 maybe_strip_output (info, htab->glink_eh_frame);
12655 /* Called after we have determined section placement. If sections
12656 move, we'll be called again. Provide a value for TOCstart. */
12659 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
12662 bfd_vma TOCstart, adjust;
12666 struct elf_link_hash_entry *h;
12667 struct elf_link_hash_table *htab = elf_hash_table (info);
12669 if (is_elf_hash_table (htab)
12670 && htab->hgot != NULL)
12674 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12675 if (is_elf_hash_table (htab))
12679 && h->root.type == bfd_link_hash_defined
12680 && !h->root.linker_def
12681 && (!is_elf_hash_table (htab)
12682 || h->def_regular))
12684 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12685 + h->root.u.def.section->output_offset
12686 + h->root.u.def.section->output_section->vma);
12687 _bfd_set_gp_value (obfd, TOCstart);
12692 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12693 order. The TOC starts where the first of these sections starts. */
12694 s = bfd_get_section_by_name (obfd, ".got");
12695 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12696 s = bfd_get_section_by_name (obfd, ".toc");
12697 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12698 s = bfd_get_section_by_name (obfd, ".tocbss");
12699 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12700 s = bfd_get_section_by_name (obfd, ".plt");
12701 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12703 /* This may happen for
12704 o references to TOC base (SYM@toc / TOC[tc0]) without a
12706 o bad linker script
12707 o --gc-sections and empty TOC sections
12709 FIXME: Warn user? */
12711 /* Look for a likely section. We probably won't even be
12713 for (s = obfd->sections; s != NULL; s = s->next)
12714 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12716 == (SEC_ALLOC | SEC_SMALL_DATA))
12719 for (s = obfd->sections; s != NULL; s = s->next)
12720 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
12721 == (SEC_ALLOC | SEC_SMALL_DATA))
12724 for (s = obfd->sections; s != NULL; s = s->next)
12725 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12729 for (s = obfd->sections; s != NULL; s = s->next)
12730 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
12736 TOCstart = s->output_section->vma + s->output_offset;
12738 /* Force alignment. */
12739 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12740 TOCstart -= adjust;
12741 _bfd_set_gp_value (obfd, TOCstart);
12743 if (info != NULL && s != NULL)
12745 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12749 if (htab->elf.hgot != NULL)
12751 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
12752 htab->elf.hgot->root.u.def.section = s;
12757 struct bfd_link_hash_entry *bh = NULL;
12758 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
12759 s, TOC_BASE_OFF - adjust,
12760 NULL, FALSE, FALSE, &bh);
12766 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12767 write out any global entry stubs. */
12770 build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12772 struct bfd_link_info *info;
12773 struct ppc_link_hash_table *htab;
12774 struct plt_entry *pent;
12777 if (h->root.type == bfd_link_hash_indirect)
12780 if (!h->pointer_equality_needed)
12783 if (h->def_regular)
12787 htab = ppc_hash_table (info);
12792 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12793 if (pent->plt.offset != (bfd_vma) -1
12794 && pent->addend == 0)
12800 p = s->contents + h->root.u.def.value;
12801 plt = htab->elf.splt;
12802 if (!htab->elf.dynamic_sections_created
12803 || h->dynindx == -1)
12804 plt = htab->elf.iplt;
12805 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
12806 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12808 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12810 info->callbacks->einfo
12811 (_("%P: linkage table error against `%T'\n"),
12812 h->root.root.string);
12813 bfd_set_error (bfd_error_bad_value);
12814 htab->stub_error = TRUE;
12817 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12818 if (htab->params->emit_stub_syms)
12820 size_t len = strlen (h->root.root.string);
12821 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12826 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12827 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12830 if (h->root.type == bfd_link_hash_new)
12832 h->root.type = bfd_link_hash_defined;
12833 h->root.u.def.section = s;
12834 h->root.u.def.value = p - s->contents;
12835 h->ref_regular = 1;
12836 h->def_regular = 1;
12837 h->ref_regular_nonweak = 1;
12838 h->forced_local = 1;
12840 h->root.linker_def = 1;
12844 if (PPC_HA (off) != 0)
12846 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12849 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12851 bfd_put_32 (s->owner, MTCTR_R12, p);
12853 bfd_put_32 (s->owner, BCTR, p);
12859 /* Build all the stubs associated with the current output file.
12860 The stubs are kept in a hash table attached to the main linker
12861 hash table. This function is called via gldelf64ppc_finish. */
12864 ppc64_elf_build_stubs (struct bfd_link_info *info,
12867 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12868 struct map_stub *group;
12869 asection *stub_sec;
12871 int stub_sec_count = 0;
12876 /* Allocate memory to hold the linker stubs. */
12877 for (stub_sec = htab->params->stub_bfd->sections;
12879 stub_sec = stub_sec->next)
12880 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12881 && stub_sec->size != 0)
12883 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
12884 if (stub_sec->contents == NULL)
12886 /* We want to check that built size is the same as calculated
12887 size. rawsize is a convenient location to use. */
12888 stub_sec->rawsize = stub_sec->size;
12889 stub_sec->size = 0;
12892 if (htab->glink != NULL && htab->glink->size != 0)
12897 /* Build the .glink plt call stub. */
12898 if (htab->params->emit_stub_syms)
12900 struct elf_link_hash_entry *h;
12901 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
12902 TRUE, FALSE, FALSE);
12905 if (h->root.type == bfd_link_hash_new)
12907 h->root.type = bfd_link_hash_defined;
12908 h->root.u.def.section = htab->glink;
12909 h->root.u.def.value = 8;
12910 h->ref_regular = 1;
12911 h->def_regular = 1;
12912 h->ref_regular_nonweak = 1;
12913 h->forced_local = 1;
12915 h->root.linker_def = 1;
12918 plt0 = (htab->elf.splt->output_section->vma
12919 + htab->elf.splt->output_offset
12921 if (info->emitrelocations)
12923 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
12926 r->r_offset = (htab->glink->output_offset
12927 + htab->glink->output_section->vma);
12928 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
12929 r->r_addend = plt0;
12931 p = htab->glink->contents;
12932 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
12933 bfd_put_64 (htab->glink->owner, plt0, p);
12937 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
12939 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12941 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12943 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12945 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
12947 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12949 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12951 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
12953 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12955 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
12960 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
12962 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12964 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12966 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12968 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
12970 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
12972 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12974 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
12976 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12978 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
12980 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12982 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
12985 bfd_put_32 (htab->glink->owner, BCTR, p);
12987 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
12989 bfd_put_32 (htab->glink->owner, NOP, p);
12993 /* Build the .glink lazy link call stubs. */
12995 while (p < htab->glink->contents + htab->glink->rawsize)
13001 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13006 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13008 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13013 bfd_put_32 (htab->glink->owner,
13014 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13019 /* Build .glink global entry stubs. */
13020 if (htab->glink->size > htab->glink->rawsize)
13021 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
13024 if (htab->brlt != NULL && htab->brlt->size != 0)
13026 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13028 if (htab->brlt->contents == NULL)
13031 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13033 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13034 htab->relbrlt->size);
13035 if (htab->relbrlt->contents == NULL)
13039 /* Build the stubs as directed by the stub hash table. */
13040 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
13042 for (group = htab->group; group != NULL; group = group->next)
13043 if (group->needs_save_res)
13045 stub_sec = group->stub_sec;
13046 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13048 if (htab->params->emit_stub_syms)
13052 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13053 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13056 stub_sec->size += htab->sfpr->size;
13059 if (htab->relbrlt != NULL)
13060 htab->relbrlt->reloc_count = 0;
13062 if (htab->params->plt_stub_align != 0)
13063 for (stub_sec = htab->params->stub_bfd->sections;
13065 stub_sec = stub_sec->next)
13066 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13067 stub_sec->size = ((stub_sec->size
13068 + (1 << htab->params->plt_stub_align) - 1)
13069 & -(1 << htab->params->plt_stub_align));
13071 for (stub_sec = htab->params->stub_bfd->sections;
13073 stub_sec = stub_sec->next)
13074 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13076 stub_sec_count += 1;
13077 if (stub_sec->rawsize != stub_sec->size)
13081 /* Note that the glink_eh_frame check here is not only testing that
13082 the generated size matched the calculated size but also that
13083 bfd_elf_discard_info didn't make any changes to the section. */
13084 if (stub_sec != NULL
13085 || (htab->glink_eh_frame != NULL
13086 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
13088 htab->stub_error = TRUE;
13089 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
13092 if (htab->stub_error)
13097 *stats = bfd_malloc (500);
13098 if (*stats == NULL)
13101 sprintf (*stats, _("linker stubs in %u group%s\n"
13103 " toc adjust %lu\n"
13104 " long branch %lu\n"
13105 " long toc adj %lu\n"
13107 " plt call toc %lu\n"
13108 " global entry %lu"),
13110 stub_sec_count == 1 ? "" : "s",
13111 htab->stub_count[ppc_stub_long_branch - 1],
13112 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13113 htab->stub_count[ppc_stub_plt_branch - 1],
13114 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
13115 htab->stub_count[ppc_stub_plt_call - 1],
13116 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13117 htab->stub_count[ppc_stub_global_entry - 1]);
13122 /* This function undoes the changes made by add_symbol_adjust. */
13125 undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
13127 struct ppc_link_hash_entry *eh;
13129 if (h->root.type == bfd_link_hash_indirect)
13132 eh = (struct ppc_link_hash_entry *) h;
13133 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
13136 eh->elf.root.type = bfd_link_hash_undefined;
13141 ppc64_elf_restore_symbols (struct bfd_link_info *info)
13143 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13146 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
13149 /* What to do when ld finds relocations against symbols defined in
13150 discarded sections. */
13152 static unsigned int
13153 ppc64_elf_action_discarded (asection *sec)
13155 if (strcmp (".opd", sec->name) == 0)
13158 if (strcmp (".toc", sec->name) == 0)
13161 if (strcmp (".toc1", sec->name) == 0)
13164 return _bfd_elf_default_action_discarded (sec);
13167 /* The RELOCATE_SECTION function is called by the ELF backend linker
13168 to handle the relocations for a section.
13170 The relocs are always passed as Rela structures; if the section
13171 actually uses Rel structures, the r_addend field will always be
13174 This function is responsible for adjust the section contents as
13175 necessary, and (if using Rela relocs and generating a
13176 relocatable output file) adjusting the reloc addend as
13179 This function does not have to worry about setting the reloc
13180 address or the reloc symbol index.
13182 LOCAL_SYMS is a pointer to the swapped in local symbols.
13184 LOCAL_SECTIONS is an array giving the section in the input file
13185 corresponding to the st_shndx field of each local symbol.
13187 The global hash table entry for the global symbols can be found
13188 via elf_sym_hashes (input_bfd).
13190 When generating relocatable output, this function must handle
13191 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13192 going to be the section symbol corresponding to the output
13193 section, which means that the addend must be adjusted
13197 ppc64_elf_relocate_section (bfd *output_bfd,
13198 struct bfd_link_info *info,
13200 asection *input_section,
13201 bfd_byte *contents,
13202 Elf_Internal_Rela *relocs,
13203 Elf_Internal_Sym *local_syms,
13204 asection **local_sections)
13206 struct ppc_link_hash_table *htab;
13207 Elf_Internal_Shdr *symtab_hdr;
13208 struct elf_link_hash_entry **sym_hashes;
13209 Elf_Internal_Rela *rel;
13210 Elf_Internal_Rela *wrel;
13211 Elf_Internal_Rela *relend;
13212 Elf_Internal_Rela outrel;
13214 struct got_entry **local_got_ents;
13216 bfd_boolean ret = TRUE;
13217 bfd_boolean is_opd;
13218 /* Assume 'at' branch hints. */
13219 bfd_boolean is_isa_v2 = TRUE;
13220 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
13222 /* Initialize howto table if needed. */
13223 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
13226 htab = ppc_hash_table (info);
13230 /* Don't relocate stub sections. */
13231 if (input_section->owner == htab->params->stub_bfd)
13234 BFD_ASSERT (is_ppc64_elf (input_bfd));
13236 local_got_ents = elf_local_got_ents (input_bfd);
13237 TOCstart = elf_gp (output_bfd);
13238 symtab_hdr = &elf_symtab_hdr (input_bfd);
13239 sym_hashes = elf_sym_hashes (input_bfd);
13240 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
13242 rel = wrel = relocs;
13243 relend = relocs + input_section->reloc_count;
13244 for (; rel < relend; wrel++, rel++)
13246 enum elf_ppc64_reloc_type r_type;
13248 bfd_reloc_status_type r;
13249 Elf_Internal_Sym *sym;
13251 struct elf_link_hash_entry *h_elf;
13252 struct ppc_link_hash_entry *h;
13253 struct ppc_link_hash_entry *fdh;
13254 const char *sym_name;
13255 unsigned long r_symndx, toc_symndx;
13256 bfd_vma toc_addend;
13257 unsigned char tls_mask, tls_gd, tls_type;
13258 unsigned char sym_type;
13259 bfd_vma relocation;
13260 bfd_boolean unresolved_reloc;
13261 bfd_boolean warned;
13262 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
13265 struct ppc_stub_hash_entry *stub_entry;
13266 bfd_vma max_br_offset;
13268 Elf_Internal_Rela orig_rel;
13269 reloc_howto_type *howto;
13270 struct reloc_howto_struct alt_howto;
13275 r_type = ELF64_R_TYPE (rel->r_info);
13276 r_symndx = ELF64_R_SYM (rel->r_info);
13278 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13279 symbol of the previous ADDR64 reloc. The symbol gives us the
13280 proper TOC base to use. */
13281 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
13283 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
13285 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
13291 unresolved_reloc = FALSE;
13294 if (r_symndx < symtab_hdr->sh_info)
13296 /* It's a local symbol. */
13297 struct _opd_sec_data *opd;
13299 sym = local_syms + r_symndx;
13300 sec = local_sections[r_symndx];
13301 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
13302 sym_type = ELF64_ST_TYPE (sym->st_info);
13303 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
13304 opd = get_opd_info (sec);
13305 if (opd != NULL && opd->adjust != NULL)
13307 long adjust = opd->adjust[OPD_NDX (sym->st_value
13313 /* If this is a relocation against the opd section sym
13314 and we have edited .opd, adjust the reloc addend so
13315 that ld -r and ld --emit-relocs output is correct.
13316 If it is a reloc against some other .opd symbol,
13317 then the symbol value will be adjusted later. */
13318 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13319 rel->r_addend += adjust;
13321 relocation += adjust;
13327 bfd_boolean ignored;
13329 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13330 r_symndx, symtab_hdr, sym_hashes,
13331 h_elf, sec, relocation,
13332 unresolved_reloc, warned, ignored);
13333 sym_name = h_elf->root.root.string;
13334 sym_type = h_elf->type;
13336 && sec->owner == output_bfd
13337 && strcmp (sec->name, ".opd") == 0)
13339 /* This is a symbol defined in a linker script. All
13340 such are defined in output sections, even those
13341 defined by simple assignment from a symbol defined in
13342 an input section. Transfer the symbol to an
13343 appropriate input .opd section, so that a branch to
13344 this symbol will be mapped to the location specified
13345 by the opd entry. */
13346 struct bfd_link_order *lo;
13347 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13348 if (lo->type == bfd_indirect_link_order)
13350 asection *isec = lo->u.indirect.section;
13351 if (h_elf->root.u.def.value >= isec->output_offset
13352 && h_elf->root.u.def.value < (isec->output_offset
13355 h_elf->root.u.def.value -= isec->output_offset;
13356 h_elf->root.u.def.section = isec;
13363 h = (struct ppc_link_hash_entry *) h_elf;
13365 if (sec != NULL && discarded_section (sec))
13367 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13368 input_bfd, input_section,
13369 contents + rel->r_offset);
13370 wrel->r_offset = rel->r_offset;
13372 wrel->r_addend = 0;
13374 /* For ld -r, remove relocations in debug sections against
13375 sections defined in discarded sections. Not done for
13376 non-debug to preserve relocs in .eh_frame which the
13377 eh_frame editing code expects to be present. */
13378 if (bfd_link_relocatable (info)
13379 && (input_section->flags & SEC_DEBUGGING))
13385 if (bfd_link_relocatable (info))
13388 if (h != NULL && &h->elf == htab->elf.hgot)
13390 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13391 sec = bfd_abs_section_ptr;
13392 unresolved_reloc = FALSE;
13395 /* TLS optimizations. Replace instruction sequences and relocs
13396 based on information we collected in tls_optimize. We edit
13397 RELOCS so that --emit-relocs will output something sensible
13398 for the final instruction stream. */
13403 tls_mask = h->tls_mask;
13404 else if (local_got_ents != NULL)
13406 struct plt_entry **local_plt = (struct plt_entry **)
13407 (local_got_ents + symtab_hdr->sh_info);
13408 unsigned char *lgot_masks = (unsigned char *)
13409 (local_plt + symtab_hdr->sh_info);
13410 tls_mask = lgot_masks[r_symndx];
13413 && (r_type == R_PPC64_TLS
13414 || r_type == R_PPC64_TLSGD
13415 || r_type == R_PPC64_TLSLD))
13417 /* Check for toc tls entries. */
13418 unsigned char *toc_tls;
13420 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13421 &local_syms, rel, input_bfd))
13425 tls_mask = *toc_tls;
13428 /* Check that tls relocs are used with tls syms, and non-tls
13429 relocs are used with non-tls syms. */
13430 if (r_symndx != STN_UNDEF
13431 && r_type != R_PPC64_NONE
13433 || h->elf.root.type == bfd_link_hash_defined
13434 || h->elf.root.type == bfd_link_hash_defweak)
13435 && (IS_PPC64_TLS_RELOC (r_type)
13436 != (sym_type == STT_TLS
13437 || (sym_type == STT_SECTION
13438 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
13441 && (r_type == R_PPC64_TLS
13442 || r_type == R_PPC64_TLSGD
13443 || r_type == R_PPC64_TLSLD))
13444 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13447 info->callbacks->einfo
13448 (!IS_PPC64_TLS_RELOC (r_type)
13449 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13450 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
13451 input_bfd, input_section, rel->r_offset,
13452 ppc64_elf_howto_table[r_type]->name,
13456 /* Ensure reloc mapping code below stays sane. */
13457 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13458 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13459 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13460 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13461 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13462 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13463 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13464 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13465 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13466 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13474 case R_PPC64_LO_DS_OPT:
13475 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
13476 if ((insn & (0x3f << 26)) != 58u << 26)
13478 insn += (14u << 26) - (58u << 26);
13479 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
13480 r_type = R_PPC64_TOC16_LO;
13481 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13484 case R_PPC64_TOC16:
13485 case R_PPC64_TOC16_LO:
13486 case R_PPC64_TOC16_DS:
13487 case R_PPC64_TOC16_LO_DS:
13489 /* Check for toc tls entries. */
13490 unsigned char *toc_tls;
13493 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13494 &local_syms, rel, input_bfd);
13500 tls_mask = *toc_tls;
13501 if (r_type == R_PPC64_TOC16_DS
13502 || r_type == R_PPC64_TOC16_LO_DS)
13505 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13510 /* If we found a GD reloc pair, then we might be
13511 doing a GD->IE transition. */
13514 tls_gd = TLS_TPRELGD;
13515 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13518 else if (retval == 3)
13520 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13528 case R_PPC64_GOT_TPREL16_HI:
13529 case R_PPC64_GOT_TPREL16_HA:
13531 && (tls_mask & TLS_TPREL) == 0)
13533 rel->r_offset -= d_offset;
13534 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13535 r_type = R_PPC64_NONE;
13536 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13540 case R_PPC64_GOT_TPREL16_DS:
13541 case R_PPC64_GOT_TPREL16_LO_DS:
13543 && (tls_mask & TLS_TPREL) == 0)
13546 insn = bfd_get_32 (output_bfd,
13547 contents + rel->r_offset - d_offset);
13549 insn |= 0x3c0d0000; /* addis 0,13,0 */
13550 bfd_put_32 (output_bfd, insn,
13551 contents + rel->r_offset - d_offset);
13552 r_type = R_PPC64_TPREL16_HA;
13553 if (toc_symndx != 0)
13555 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13556 rel->r_addend = toc_addend;
13557 /* We changed the symbol. Start over in order to
13558 get h, sym, sec etc. right. */
13562 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13568 && (tls_mask & TLS_TPREL) == 0)
13570 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
13571 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13574 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
13575 /* Was PPC64_TLS which sits on insn boundary, now
13576 PPC64_TPREL16_LO which is at low-order half-word. */
13577 rel->r_offset += d_offset;
13578 r_type = R_PPC64_TPREL16_LO;
13579 if (toc_symndx != 0)
13581 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13582 rel->r_addend = toc_addend;
13583 /* We changed the symbol. Start over in order to
13584 get h, sym, sec etc. right. */
13588 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13592 case R_PPC64_GOT_TLSGD16_HI:
13593 case R_PPC64_GOT_TLSGD16_HA:
13594 tls_gd = TLS_TPRELGD;
13595 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13599 case R_PPC64_GOT_TLSLD16_HI:
13600 case R_PPC64_GOT_TLSLD16_HA:
13601 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13604 if ((tls_mask & tls_gd) != 0)
13605 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13606 + R_PPC64_GOT_TPREL16_DS);
13609 rel->r_offset -= d_offset;
13610 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13611 r_type = R_PPC64_NONE;
13613 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13617 case R_PPC64_GOT_TLSGD16:
13618 case R_PPC64_GOT_TLSGD16_LO:
13619 tls_gd = TLS_TPRELGD;
13620 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13624 case R_PPC64_GOT_TLSLD16:
13625 case R_PPC64_GOT_TLSLD16_LO:
13626 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13628 unsigned int insn1, insn2, insn3;
13632 offset = (bfd_vma) -1;
13633 /* If not using the newer R_PPC64_TLSGD/LD to mark
13634 __tls_get_addr calls, we must trust that the call
13635 stays with its arg setup insns, ie. that the next
13636 reloc is the __tls_get_addr call associated with
13637 the current reloc. Edit both insns. */
13638 if (input_section->has_tls_get_addr_call
13639 && rel + 1 < relend
13640 && branch_reloc_hash_match (input_bfd, rel + 1,
13641 htab->tls_get_addr,
13642 htab->tls_get_addr_fd))
13643 offset = rel[1].r_offset;
13644 /* We read the low GOT_TLS (or TOC16) insn because we
13645 need to keep the destination reg. It may be
13646 something other than the usual r3, and moved to r3
13647 before the call by intervening code. */
13648 insn1 = bfd_get_32 (output_bfd,
13649 contents + rel->r_offset - d_offset);
13650 if ((tls_mask & tls_gd) != 0)
13653 insn1 &= (0x1f << 21) | (0x1f << 16);
13654 insn1 |= 58 << 26; /* ld */
13655 insn2 = 0x7c636a14; /* add 3,3,13 */
13656 if (offset != (bfd_vma) -1)
13657 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13658 if ((tls_mask & TLS_EXPLICIT) == 0)
13659 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13660 + R_PPC64_GOT_TPREL16_DS);
13662 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13663 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13668 insn1 &= 0x1f << 21;
13669 insn1 |= 0x3c0d0000; /* addis r,13,0 */
13670 insn2 = 0x38630000; /* addi 3,3,0 */
13673 /* Was an LD reloc. */
13675 sec = local_sections[toc_symndx];
13677 r_symndx < symtab_hdr->sh_info;
13679 if (local_sections[r_symndx] == sec)
13681 if (r_symndx >= symtab_hdr->sh_info)
13682 r_symndx = STN_UNDEF;
13683 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13684 if (r_symndx != STN_UNDEF)
13685 rel->r_addend -= (local_syms[r_symndx].st_value
13686 + sec->output_offset
13687 + sec->output_section->vma);
13689 else if (toc_symndx != 0)
13691 r_symndx = toc_symndx;
13692 rel->r_addend = toc_addend;
13694 r_type = R_PPC64_TPREL16_HA;
13695 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13696 if (offset != (bfd_vma) -1)
13698 rel[1].r_info = ELF64_R_INFO (r_symndx,
13699 R_PPC64_TPREL16_LO);
13700 rel[1].r_offset = offset + d_offset;
13701 rel[1].r_addend = rel->r_addend;
13704 bfd_put_32 (output_bfd, insn1,
13705 contents + rel->r_offset - d_offset);
13706 if (offset != (bfd_vma) -1)
13708 insn3 = bfd_get_32 (output_bfd,
13709 contents + offset + 4);
13711 || insn3 == CROR_151515 || insn3 == CROR_313131)
13713 rel[1].r_offset += 4;
13714 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13717 bfd_put_32 (output_bfd, insn2, contents + offset);
13719 if ((tls_mask & tls_gd) == 0
13720 && (tls_gd == 0 || toc_symndx != 0))
13722 /* We changed the symbol. Start over in order
13723 to get h, sym, sec etc. right. */
13729 case R_PPC64_TLSGD:
13730 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13732 unsigned int insn2, insn3;
13733 bfd_vma offset = rel->r_offset;
13735 if ((tls_mask & TLS_TPRELGD) != 0)
13738 r_type = R_PPC64_NONE;
13739 insn2 = 0x7c636a14; /* add 3,3,13 */
13744 if (toc_symndx != 0)
13746 r_symndx = toc_symndx;
13747 rel->r_addend = toc_addend;
13749 r_type = R_PPC64_TPREL16_LO;
13750 rel->r_offset = offset + d_offset;
13751 insn2 = 0x38630000; /* addi 3,3,0 */
13753 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13754 /* Zap the reloc on the _tls_get_addr call too. */
13755 BFD_ASSERT (offset == rel[1].r_offset);
13756 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13757 insn3 = bfd_get_32 (output_bfd,
13758 contents + offset + 4);
13760 || insn3 == CROR_151515 || insn3 == CROR_313131)
13762 rel->r_offset += 4;
13763 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13766 bfd_put_32 (output_bfd, insn2, contents + offset);
13767 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
13772 case R_PPC64_TLSLD:
13773 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13775 unsigned int insn2, insn3;
13776 bfd_vma offset = rel->r_offset;
13779 sec = local_sections[toc_symndx];
13781 r_symndx < symtab_hdr->sh_info;
13783 if (local_sections[r_symndx] == sec)
13785 if (r_symndx >= symtab_hdr->sh_info)
13786 r_symndx = STN_UNDEF;
13787 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13788 if (r_symndx != STN_UNDEF)
13789 rel->r_addend -= (local_syms[r_symndx].st_value
13790 + sec->output_offset
13791 + sec->output_section->vma);
13793 r_type = R_PPC64_TPREL16_LO;
13794 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13795 rel->r_offset = offset + d_offset;
13796 /* Zap the reloc on the _tls_get_addr call too. */
13797 BFD_ASSERT (offset == rel[1].r_offset);
13798 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13799 insn2 = 0x38630000; /* addi 3,3,0 */
13800 insn3 = bfd_get_32 (output_bfd,
13801 contents + offset + 4);
13803 || insn3 == CROR_151515 || insn3 == CROR_313131)
13805 rel->r_offset += 4;
13806 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13809 bfd_put_32 (output_bfd, insn2, contents + offset);
13814 case R_PPC64_DTPMOD64:
13815 if (rel + 1 < relend
13816 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13817 && rel[1].r_offset == rel->r_offset + 8)
13819 if ((tls_mask & TLS_GD) == 0)
13821 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13822 if ((tls_mask & TLS_TPRELGD) != 0)
13823 r_type = R_PPC64_TPREL64;
13826 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13827 r_type = R_PPC64_NONE;
13829 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13834 if ((tls_mask & TLS_LD) == 0)
13836 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13837 r_type = R_PPC64_NONE;
13838 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13843 case R_PPC64_TPREL64:
13844 if ((tls_mask & TLS_TPREL) == 0)
13846 r_type = R_PPC64_NONE;
13847 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13851 case R_PPC64_REL16_HA:
13852 /* If we are generating a non-PIC executable, edit
13853 . 0: addis 2,12,.TOC.-0b@ha
13854 . addi 2,2,.TOC.-0b@l
13855 used by ELFv2 global entry points to set up r2, to
13858 if .TOC. is in range. */
13859 if (!bfd_link_pic (info)
13860 && !info->traditional_format
13861 && h != NULL && &h->elf == htab->elf.hgot
13862 && rel + 1 < relend
13863 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
13864 && rel[1].r_offset == rel->r_offset + 4
13865 && rel[1].r_addend == rel->r_addend + 4
13866 && relocation + 0x80008000 <= 0xffffffff)
13868 unsigned int insn1, insn2;
13869 bfd_vma offset = rel->r_offset - d_offset;
13870 insn1 = bfd_get_32 (output_bfd, contents + offset);
13871 insn2 = bfd_get_32 (output_bfd, contents + offset + 4);
13872 if ((insn1 & 0xffff0000) == 0x3c4c0000 /* addis 2,12 */
13873 && (insn2 & 0xffff0000) == 0x38420000 /* addi 2,2 */)
13875 r_type = R_PPC64_ADDR16_HA;
13876 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13877 rel->r_addend -= d_offset;
13878 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
13879 rel[1].r_addend -= d_offset + 4;
13880 bfd_put_32 (output_bfd, 0x3c400000, contents + offset);
13886 /* Handle other relocations that tweak non-addend part of insn. */
13888 max_br_offset = 1 << 25;
13889 addend = rel->r_addend;
13890 reloc_dest = DEST_NORMAL;
13896 case R_PPC64_TOCSAVE:
13897 if (relocation + addend == (rel->r_offset
13898 + input_section->output_offset
13899 + input_section->output_section->vma)
13900 && tocsave_find (htab, NO_INSERT,
13901 &local_syms, rel, input_bfd))
13903 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
13905 || insn == CROR_151515 || insn == CROR_313131)
13906 bfd_put_32 (input_bfd,
13907 STD_R2_0R1 + STK_TOC (htab),
13908 contents + rel->r_offset);
13912 /* Branch taken prediction relocations. */
13913 case R_PPC64_ADDR14_BRTAKEN:
13914 case R_PPC64_REL14_BRTAKEN:
13915 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
13918 /* Branch not taken prediction relocations. */
13919 case R_PPC64_ADDR14_BRNTAKEN:
13920 case R_PPC64_REL14_BRNTAKEN:
13921 insn |= bfd_get_32 (output_bfd,
13922 contents + rel->r_offset) & ~(0x01 << 21);
13925 case R_PPC64_REL14:
13926 max_br_offset = 1 << 15;
13929 case R_PPC64_REL24:
13930 /* Calls to functions with a different TOC, such as calls to
13931 shared objects, need to alter the TOC pointer. This is
13932 done using a linkage stub. A REL24 branching to these
13933 linkage stubs needs to be followed by a nop, as the nop
13934 will be replaced with an instruction to restore the TOC
13939 && h->oh->is_func_descriptor)
13940 fdh = ppc_follow_link (h->oh);
13941 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
13943 if (stub_entry != NULL
13944 && (stub_entry->stub_type == ppc_stub_plt_call
13945 || stub_entry->stub_type == ppc_stub_plt_call_r2save
13946 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
13947 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
13949 bfd_boolean can_plt_call = FALSE;
13951 /* All of these stubs will modify r2, so there must be a
13952 branch and link followed by a nop. The nop is
13953 replaced by an insn to restore r2. */
13954 if (rel->r_offset + 8 <= input_section->size)
13958 br = bfd_get_32 (input_bfd,
13959 contents + rel->r_offset);
13964 nop = bfd_get_32 (input_bfd,
13965 contents + rel->r_offset + 4);
13967 || nop == CROR_151515 || nop == CROR_313131)
13970 && (h == htab->tls_get_addr_fd
13971 || h == htab->tls_get_addr)
13972 && htab->params->tls_get_addr_opt)
13974 /* Special stub used, leave nop alone. */
13977 bfd_put_32 (input_bfd,
13978 LD_R2_0R1 + STK_TOC (htab),
13979 contents + rel->r_offset + 4);
13980 can_plt_call = TRUE;
13985 if (!can_plt_call && h != NULL)
13987 const char *name = h->elf.root.root.string;
13992 if (strncmp (name, "__libc_start_main", 17) == 0
13993 && (name[17] == 0 || name[17] == '@'))
13995 /* Allow crt1 branch to go via a toc adjusting
13996 stub. Other calls that never return could do
13997 the same, if we could detect such. */
13998 can_plt_call = TRUE;
14004 /* g++ as of 20130507 emits self-calls without a
14005 following nop. This is arguably wrong since we
14006 have conflicting information. On the one hand a
14007 global symbol and on the other a local call
14008 sequence, but don't error for this special case.
14009 It isn't possible to cheaply verify we have
14010 exactly such a call. Allow all calls to the same
14012 asection *code_sec = sec;
14014 if (get_opd_info (sec) != NULL)
14016 bfd_vma off = (relocation + addend
14017 - sec->output_section->vma
14018 - sec->output_offset);
14020 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
14022 if (code_sec == input_section)
14023 can_plt_call = TRUE;
14028 if (stub_entry->stub_type == ppc_stub_plt_call
14029 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14030 info->callbacks->einfo
14031 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14032 "recompile with -fPIC\n"),
14033 input_bfd, input_section, rel->r_offset, sym_name);
14035 info->callbacks->einfo
14036 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14037 "(-mcmodel=small toc adjust stub)\n"),
14038 input_bfd, input_section, rel->r_offset, sym_name);
14040 bfd_set_error (bfd_error_bad_value);
14045 && (stub_entry->stub_type == ppc_stub_plt_call
14046 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14047 unresolved_reloc = FALSE;
14050 if ((stub_entry == NULL
14051 || stub_entry->stub_type == ppc_stub_long_branch
14052 || stub_entry->stub_type == ppc_stub_plt_branch)
14053 && get_opd_info (sec) != NULL)
14055 /* The branch destination is the value of the opd entry. */
14056 bfd_vma off = (relocation + addend
14057 - sec->output_section->vma
14058 - sec->output_offset);
14059 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
14060 if (dest != (bfd_vma) -1)
14064 reloc_dest = DEST_OPD;
14068 /* If the branch is out of reach we ought to have a long
14070 from = (rel->r_offset
14071 + input_section->output_offset
14072 + input_section->output_section->vma);
14074 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14078 if (stub_entry != NULL
14079 && (stub_entry->stub_type == ppc_stub_long_branch
14080 || stub_entry->stub_type == ppc_stub_plt_branch)
14081 && (r_type == R_PPC64_ADDR14_BRTAKEN
14082 || r_type == R_PPC64_ADDR14_BRNTAKEN
14083 || (relocation + addend - from + max_br_offset
14084 < 2 * max_br_offset)))
14085 /* Don't use the stub if this branch is in range. */
14088 if (stub_entry != NULL)
14090 /* Munge up the value and addend so that we call the stub
14091 rather than the procedure directly. */
14092 asection *stub_sec = stub_entry->group->stub_sec;
14094 if (stub_entry->stub_type == ppc_stub_save_res)
14095 relocation += (stub_sec->output_offset
14096 + stub_sec->output_section->vma
14097 + stub_sec->size - htab->sfpr->size
14098 - htab->sfpr->output_offset
14099 - htab->sfpr->output_section->vma);
14101 relocation = (stub_entry->stub_offset
14102 + stub_sec->output_offset
14103 + stub_sec->output_section->vma);
14105 reloc_dest = DEST_STUB;
14107 if ((stub_entry->stub_type == ppc_stub_plt_call
14108 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14109 && (ALWAYS_EMIT_R2SAVE
14110 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14111 && rel + 1 < relend
14112 && rel[1].r_offset == rel->r_offset + 4
14113 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14121 /* Set 'a' bit. This is 0b00010 in BO field for branch
14122 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14123 for branch on CTR insns (BO == 1a00t or 1a01t). */
14124 if ((insn & (0x14 << 21)) == (0x04 << 21))
14125 insn |= 0x02 << 21;
14126 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14127 insn |= 0x08 << 21;
14133 /* Invert 'y' bit if not the default. */
14134 if ((bfd_signed_vma) (relocation + addend - from) < 0)
14135 insn ^= 0x01 << 21;
14138 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
14141 /* NOP out calls to undefined weak functions.
14142 We can thus call a weak function without first
14143 checking whether the function is defined. */
14145 && h->elf.root.type == bfd_link_hash_undefweak
14146 && h->elf.dynindx == -1
14147 && r_type == R_PPC64_REL24
14151 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
14157 /* Set `addend'. */
14162 info->callbacks->einfo
14163 (_("%P: %B: unknown relocation type %d for `%T'\n"),
14164 input_bfd, (int) r_type, sym_name);
14166 bfd_set_error (bfd_error_bad_value);
14172 case R_PPC64_TLSGD:
14173 case R_PPC64_TLSLD:
14174 case R_PPC64_TOCSAVE:
14175 case R_PPC64_GNU_VTINHERIT:
14176 case R_PPC64_GNU_VTENTRY:
14179 /* GOT16 relocations. Like an ADDR16 using the symbol's
14180 address in the GOT as relocation value instead of the
14181 symbol's value itself. Also, create a GOT entry for the
14182 symbol and put the symbol value there. */
14183 case R_PPC64_GOT_TLSGD16:
14184 case R_PPC64_GOT_TLSGD16_LO:
14185 case R_PPC64_GOT_TLSGD16_HI:
14186 case R_PPC64_GOT_TLSGD16_HA:
14187 tls_type = TLS_TLS | TLS_GD;
14190 case R_PPC64_GOT_TLSLD16:
14191 case R_PPC64_GOT_TLSLD16_LO:
14192 case R_PPC64_GOT_TLSLD16_HI:
14193 case R_PPC64_GOT_TLSLD16_HA:
14194 tls_type = TLS_TLS | TLS_LD;
14197 case R_PPC64_GOT_TPREL16_DS:
14198 case R_PPC64_GOT_TPREL16_LO_DS:
14199 case R_PPC64_GOT_TPREL16_HI:
14200 case R_PPC64_GOT_TPREL16_HA:
14201 tls_type = TLS_TLS | TLS_TPREL;
14204 case R_PPC64_GOT_DTPREL16_DS:
14205 case R_PPC64_GOT_DTPREL16_LO_DS:
14206 case R_PPC64_GOT_DTPREL16_HI:
14207 case R_PPC64_GOT_DTPREL16_HA:
14208 tls_type = TLS_TLS | TLS_DTPREL;
14211 case R_PPC64_GOT16:
14212 case R_PPC64_GOT16_LO:
14213 case R_PPC64_GOT16_HI:
14214 case R_PPC64_GOT16_HA:
14215 case R_PPC64_GOT16_DS:
14216 case R_PPC64_GOT16_LO_DS:
14219 /* Relocation is to the entry for this symbol in the global
14224 unsigned long indx = 0;
14225 struct got_entry *ent;
14227 if (tls_type == (TLS_TLS | TLS_LD)
14229 || !h->elf.def_dynamic))
14230 ent = ppc64_tlsld_got (input_bfd);
14236 bfd_boolean dyn = htab->elf.dynamic_sections_created;
14237 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info),
14239 || (bfd_link_pic (info)
14240 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
14241 /* This is actually a static link, or it is a
14242 -Bsymbolic link and the symbol is defined
14243 locally, or the symbol was forced to be local
14244 because of a version file. */
14248 BFD_ASSERT (h->elf.dynindx != -1);
14249 indx = h->elf.dynindx;
14250 unresolved_reloc = FALSE;
14252 ent = h->elf.got.glist;
14256 if (local_got_ents == NULL)
14258 ent = local_got_ents[r_symndx];
14261 for (; ent != NULL; ent = ent->next)
14262 if (ent->addend == orig_rel.r_addend
14263 && ent->owner == input_bfd
14264 && ent->tls_type == tls_type)
14270 if (ent->is_indirect)
14271 ent = ent->got.ent;
14272 offp = &ent->got.offset;
14273 got = ppc64_elf_tdata (ent->owner)->got;
14277 /* The offset must always be a multiple of 8. We use the
14278 least significant bit to record whether we have already
14279 processed this entry. */
14281 if ((off & 1) != 0)
14285 /* Generate relocs for the dynamic linker, except in
14286 the case of TLSLD where we'll use one entry per
14294 ? h->elf.type == STT_GNU_IFUNC
14295 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
14297 relgot = htab->elf.irelplt;
14298 else if ((bfd_link_pic (info) || indx != 0)
14300 || (tls_type == (TLS_TLS | TLS_LD)
14301 && !h->elf.def_dynamic)
14302 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14303 || h->elf.root.type != bfd_link_hash_undefweak))
14304 relgot = ppc64_elf_tdata (ent->owner)->relgot;
14305 if (relgot != NULL)
14307 outrel.r_offset = (got->output_section->vma
14308 + got->output_offset
14310 outrel.r_addend = addend;
14311 if (tls_type & (TLS_LD | TLS_GD))
14313 outrel.r_addend = 0;
14314 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
14315 if (tls_type == (TLS_TLS | TLS_GD))
14317 loc = relgot->contents;
14318 loc += (relgot->reloc_count++
14319 * sizeof (Elf64_External_Rela));
14320 bfd_elf64_swap_reloca_out (output_bfd,
14322 outrel.r_offset += 8;
14323 outrel.r_addend = addend;
14325 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14328 else if (tls_type == (TLS_TLS | TLS_DTPREL))
14329 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14330 else if (tls_type == (TLS_TLS | TLS_TPREL))
14331 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
14332 else if (indx != 0)
14333 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14337 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14339 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14341 /* Write the .got section contents for the sake
14343 loc = got->contents + off;
14344 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14348 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
14350 outrel.r_addend += relocation;
14351 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
14353 if (htab->elf.tls_sec == NULL)
14354 outrel.r_addend = 0;
14356 outrel.r_addend -= htab->elf.tls_sec->vma;
14359 loc = relgot->contents;
14360 loc += (relgot->reloc_count++
14361 * sizeof (Elf64_External_Rela));
14362 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14365 /* Init the .got section contents here if we're not
14366 emitting a reloc. */
14369 relocation += addend;
14370 if (tls_type == (TLS_TLS | TLS_LD))
14372 else if (tls_type != 0)
14374 if (htab->elf.tls_sec == NULL)
14378 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14379 if (tls_type == (TLS_TLS | TLS_TPREL))
14380 relocation += DTP_OFFSET - TP_OFFSET;
14383 if (tls_type == (TLS_TLS | TLS_GD))
14385 bfd_put_64 (output_bfd, relocation,
14386 got->contents + off + 8);
14391 bfd_put_64 (output_bfd, relocation,
14392 got->contents + off);
14396 if (off >= (bfd_vma) -2)
14399 relocation = got->output_section->vma + got->output_offset + off;
14400 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
14404 case R_PPC64_PLT16_HA:
14405 case R_PPC64_PLT16_HI:
14406 case R_PPC64_PLT16_LO:
14407 case R_PPC64_PLT32:
14408 case R_PPC64_PLT64:
14409 /* Relocation is to the entry for this symbol in the
14410 procedure linkage table. */
14412 /* Resolve a PLT reloc against a local symbol directly,
14413 without using the procedure linkage table. */
14417 /* It's possible that we didn't make a PLT entry for this
14418 symbol. This happens when statically linking PIC code,
14419 or when using -Bsymbolic. Go find a match if there is a
14421 if (htab->elf.splt != NULL)
14423 struct plt_entry *ent;
14424 for (ent = h->elf.plt.plist; ent != NULL; ent = ent->next)
14425 if (ent->plt.offset != (bfd_vma) -1
14426 && ent->addend == orig_rel.r_addend)
14428 relocation = (htab->elf.splt->output_section->vma
14429 + htab->elf.splt->output_offset
14430 + ent->plt.offset);
14431 unresolved_reloc = FALSE;
14438 /* Relocation value is TOC base. */
14439 relocation = TOCstart;
14440 if (r_symndx == STN_UNDEF)
14441 relocation += htab->sec_info[input_section->id].toc_off;
14442 else if (unresolved_reloc)
14444 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14445 relocation += htab->sec_info[sec->id].toc_off;
14447 unresolved_reloc = TRUE;
14450 /* TOC16 relocs. We want the offset relative to the TOC base,
14451 which is the address of the start of the TOC plus 0x8000.
14452 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14454 case R_PPC64_TOC16:
14455 case R_PPC64_TOC16_LO:
14456 case R_PPC64_TOC16_HI:
14457 case R_PPC64_TOC16_DS:
14458 case R_PPC64_TOC16_LO_DS:
14459 case R_PPC64_TOC16_HA:
14460 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
14463 /* Relocate against the beginning of the section. */
14464 case R_PPC64_SECTOFF:
14465 case R_PPC64_SECTOFF_LO:
14466 case R_PPC64_SECTOFF_HI:
14467 case R_PPC64_SECTOFF_DS:
14468 case R_PPC64_SECTOFF_LO_DS:
14469 case R_PPC64_SECTOFF_HA:
14471 addend -= sec->output_section->vma;
14474 case R_PPC64_REL16:
14475 case R_PPC64_REL16_LO:
14476 case R_PPC64_REL16_HI:
14477 case R_PPC64_REL16_HA:
14478 case R_PPC64_REL16DX_HA:
14481 case R_PPC64_REL14:
14482 case R_PPC64_REL14_BRNTAKEN:
14483 case R_PPC64_REL14_BRTAKEN:
14484 case R_PPC64_REL24:
14487 case R_PPC64_TPREL16:
14488 case R_PPC64_TPREL16_LO:
14489 case R_PPC64_TPREL16_HI:
14490 case R_PPC64_TPREL16_HA:
14491 case R_PPC64_TPREL16_DS:
14492 case R_PPC64_TPREL16_LO_DS:
14493 case R_PPC64_TPREL16_HIGH:
14494 case R_PPC64_TPREL16_HIGHA:
14495 case R_PPC64_TPREL16_HIGHER:
14496 case R_PPC64_TPREL16_HIGHERA:
14497 case R_PPC64_TPREL16_HIGHEST:
14498 case R_PPC64_TPREL16_HIGHESTA:
14500 && h->elf.root.type == bfd_link_hash_undefweak
14501 && h->elf.dynindx == -1)
14503 /* Make this relocation against an undefined weak symbol
14504 resolve to zero. This is really just a tweak, since
14505 code using weak externs ought to check that they are
14506 defined before using them. */
14507 bfd_byte *p = contents + rel->r_offset - d_offset;
14509 insn = bfd_get_32 (output_bfd, p);
14510 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14512 bfd_put_32 (output_bfd, insn, p);
14515 if (htab->elf.tls_sec != NULL)
14516 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14517 if (bfd_link_pic (info))
14518 /* The TPREL16 relocs shouldn't really be used in shared
14519 libs as they will result in DT_TEXTREL being set, but
14520 support them anyway. */
14524 case R_PPC64_DTPREL16:
14525 case R_PPC64_DTPREL16_LO:
14526 case R_PPC64_DTPREL16_HI:
14527 case R_PPC64_DTPREL16_HA:
14528 case R_PPC64_DTPREL16_DS:
14529 case R_PPC64_DTPREL16_LO_DS:
14530 case R_PPC64_DTPREL16_HIGH:
14531 case R_PPC64_DTPREL16_HIGHA:
14532 case R_PPC64_DTPREL16_HIGHER:
14533 case R_PPC64_DTPREL16_HIGHERA:
14534 case R_PPC64_DTPREL16_HIGHEST:
14535 case R_PPC64_DTPREL16_HIGHESTA:
14536 if (htab->elf.tls_sec != NULL)
14537 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14540 case R_PPC64_ADDR64_LOCAL:
14541 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14546 case R_PPC64_DTPMOD64:
14551 case R_PPC64_TPREL64:
14552 if (htab->elf.tls_sec != NULL)
14553 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14556 case R_PPC64_DTPREL64:
14557 if (htab->elf.tls_sec != NULL)
14558 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14561 /* Relocations that may need to be propagated if this is a
14563 case R_PPC64_REL30:
14564 case R_PPC64_REL32:
14565 case R_PPC64_REL64:
14566 case R_PPC64_ADDR14:
14567 case R_PPC64_ADDR14_BRNTAKEN:
14568 case R_PPC64_ADDR14_BRTAKEN:
14569 case R_PPC64_ADDR16:
14570 case R_PPC64_ADDR16_DS:
14571 case R_PPC64_ADDR16_HA:
14572 case R_PPC64_ADDR16_HI:
14573 case R_PPC64_ADDR16_HIGH:
14574 case R_PPC64_ADDR16_HIGHA:
14575 case R_PPC64_ADDR16_HIGHER:
14576 case R_PPC64_ADDR16_HIGHERA:
14577 case R_PPC64_ADDR16_HIGHEST:
14578 case R_PPC64_ADDR16_HIGHESTA:
14579 case R_PPC64_ADDR16_LO:
14580 case R_PPC64_ADDR16_LO_DS:
14581 case R_PPC64_ADDR24:
14582 case R_PPC64_ADDR32:
14583 case R_PPC64_ADDR64:
14584 case R_PPC64_UADDR16:
14585 case R_PPC64_UADDR32:
14586 case R_PPC64_UADDR64:
14588 if ((input_section->flags & SEC_ALLOC) == 0)
14591 if (NO_OPD_RELOCS && is_opd)
14594 if ((bfd_link_pic (info)
14596 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14597 || h->elf.root.type != bfd_link_hash_undefweak)
14598 && (must_be_dyn_reloc (info, r_type)
14599 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
14600 || (ELIMINATE_COPY_RELOCS
14601 && !bfd_link_pic (info)
14603 && h->elf.dynindx != -1
14604 && !h->elf.non_got_ref
14605 && !h->elf.def_regular)
14606 || (!bfd_link_pic (info)
14608 ? h->elf.type == STT_GNU_IFUNC
14609 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
14611 bfd_boolean skip, relocate;
14615 /* When generating a dynamic object, these relocations
14616 are copied into the output file to be resolved at run
14622 out_off = _bfd_elf_section_offset (output_bfd, info,
14623 input_section, rel->r_offset);
14624 if (out_off == (bfd_vma) -1)
14626 else if (out_off == (bfd_vma) -2)
14627 skip = TRUE, relocate = TRUE;
14628 out_off += (input_section->output_section->vma
14629 + input_section->output_offset);
14630 outrel.r_offset = out_off;
14631 outrel.r_addend = rel->r_addend;
14633 /* Optimize unaligned reloc use. */
14634 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14635 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14636 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14637 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14638 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14639 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14640 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14641 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14642 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14645 memset (&outrel, 0, sizeof outrel);
14646 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14648 && r_type != R_PPC64_TOC)
14650 BFD_ASSERT (h->elf.dynindx != -1);
14651 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
14655 /* This symbol is local, or marked to become local,
14656 or this is an opd section reloc which must point
14657 at a local function. */
14658 outrel.r_addend += relocation;
14659 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
14661 if (is_opd && h != NULL)
14663 /* Lie about opd entries. This case occurs
14664 when building shared libraries and we
14665 reference a function in another shared
14666 lib. The same thing happens for a weak
14667 definition in an application that's
14668 overridden by a strong definition in a
14669 shared lib. (I believe this is a generic
14670 bug in binutils handling of weak syms.)
14671 In these cases we won't use the opd
14672 entry in this lib. */
14673 unresolved_reloc = FALSE;
14676 && r_type == R_PPC64_ADDR64
14678 ? h->elf.type == STT_GNU_IFUNC
14679 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14680 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14683 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14685 /* We need to relocate .opd contents for ld.so.
14686 Prelink also wants simple and consistent rules
14687 for relocs. This make all RELATIVE relocs have
14688 *r_offset equal to r_addend. */
14697 ? h->elf.type == STT_GNU_IFUNC
14698 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14700 info->callbacks->einfo
14701 (_("%P: %H: %s for indirect "
14702 "function `%T' unsupported\n"),
14703 input_bfd, input_section, rel->r_offset,
14704 ppc64_elf_howto_table[r_type]->name,
14708 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
14710 else if (sec == NULL || sec->owner == NULL)
14712 bfd_set_error (bfd_error_bad_value);
14719 osec = sec->output_section;
14720 indx = elf_section_data (osec)->dynindx;
14724 if ((osec->flags & SEC_READONLY) == 0
14725 && htab->elf.data_index_section != NULL)
14726 osec = htab->elf.data_index_section;
14728 osec = htab->elf.text_index_section;
14729 indx = elf_section_data (osec)->dynindx;
14731 BFD_ASSERT (indx != 0);
14733 /* We are turning this relocation into one
14734 against a section symbol, so subtract out
14735 the output section's address but not the
14736 offset of the input section in the output
14738 outrel.r_addend -= osec->vma;
14741 outrel.r_info = ELF64_R_INFO (indx, r_type);
14745 sreloc = elf_section_data (input_section)->sreloc;
14747 ? h->elf.type == STT_GNU_IFUNC
14748 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14749 sreloc = htab->elf.irelplt;
14750 if (sreloc == NULL)
14753 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14756 loc = sreloc->contents;
14757 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
14758 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14760 /* If this reloc is against an external symbol, it will
14761 be computed at runtime, so there's no need to do
14762 anything now. However, for the sake of prelink ensure
14763 that the section contents are a known value. */
14766 unresolved_reloc = FALSE;
14767 /* The value chosen here is quite arbitrary as ld.so
14768 ignores section contents except for the special
14769 case of .opd where the contents might be accessed
14770 before relocation. Choose zero, as that won't
14771 cause reloc overflow. */
14774 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14775 to improve backward compatibility with older
14777 if (r_type == R_PPC64_ADDR64)
14778 addend = outrel.r_addend;
14779 /* Adjust pc_relative relocs to have zero in *r_offset. */
14780 else if (ppc64_elf_howto_table[r_type]->pc_relative)
14781 addend = (input_section->output_section->vma
14782 + input_section->output_offset
14789 case R_PPC64_GLOB_DAT:
14790 case R_PPC64_JMP_SLOT:
14791 case R_PPC64_JMP_IREL:
14792 case R_PPC64_RELATIVE:
14793 /* We shouldn't ever see these dynamic relocs in relocatable
14795 /* Fall through. */
14797 case R_PPC64_PLTGOT16:
14798 case R_PPC64_PLTGOT16_DS:
14799 case R_PPC64_PLTGOT16_HA:
14800 case R_PPC64_PLTGOT16_HI:
14801 case R_PPC64_PLTGOT16_LO:
14802 case R_PPC64_PLTGOT16_LO_DS:
14803 case R_PPC64_PLTREL32:
14804 case R_PPC64_PLTREL64:
14805 /* These ones haven't been implemented yet. */
14807 info->callbacks->einfo
14808 (_("%P: %B: %s is not supported for `%T'\n"),
14810 ppc64_elf_howto_table[r_type]->name, sym_name);
14812 bfd_set_error (bfd_error_invalid_operation);
14817 /* Multi-instruction sequences that access the TOC can be
14818 optimized, eg. addis ra,r2,0; addi rb,ra,x;
14819 to nop; addi rb,r2,x; */
14825 case R_PPC64_GOT_TLSLD16_HI:
14826 case R_PPC64_GOT_TLSGD16_HI:
14827 case R_PPC64_GOT_TPREL16_HI:
14828 case R_PPC64_GOT_DTPREL16_HI:
14829 case R_PPC64_GOT16_HI:
14830 case R_PPC64_TOC16_HI:
14831 /* These relocs would only be useful if building up an
14832 offset to later add to r2, perhaps in an indexed
14833 addressing mode instruction. Don't try to optimize.
14834 Unfortunately, the possibility of someone building up an
14835 offset like this or even with the HA relocs, means that
14836 we need to check the high insn when optimizing the low
14840 case R_PPC64_GOT_TLSLD16_HA:
14841 case R_PPC64_GOT_TLSGD16_HA:
14842 case R_PPC64_GOT_TPREL16_HA:
14843 case R_PPC64_GOT_DTPREL16_HA:
14844 case R_PPC64_GOT16_HA:
14845 case R_PPC64_TOC16_HA:
14846 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
14847 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
14849 bfd_byte *p = contents + (rel->r_offset & ~3);
14850 bfd_put_32 (input_bfd, NOP, p);
14854 case R_PPC64_GOT_TLSLD16_LO:
14855 case R_PPC64_GOT_TLSGD16_LO:
14856 case R_PPC64_GOT_TPREL16_LO_DS:
14857 case R_PPC64_GOT_DTPREL16_LO_DS:
14858 case R_PPC64_GOT16_LO:
14859 case R_PPC64_GOT16_LO_DS:
14860 case R_PPC64_TOC16_LO:
14861 case R_PPC64_TOC16_LO_DS:
14862 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
14863 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
14865 bfd_byte *p = contents + (rel->r_offset & ~3);
14866 insn = bfd_get_32 (input_bfd, p);
14867 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
14869 /* Transform addic to addi when we change reg. */
14870 insn &= ~((0x3f << 26) | (0x1f << 16));
14871 insn |= (14u << 26) | (2 << 16);
14875 insn &= ~(0x1f << 16);
14878 bfd_put_32 (input_bfd, insn, p);
14883 /* Do any further special processing. */
14884 howto = ppc64_elf_howto_table[(int) r_type];
14890 case R_PPC64_REL16_HA:
14891 case R_PPC64_REL16DX_HA:
14892 case R_PPC64_ADDR16_HA:
14893 case R_PPC64_ADDR16_HIGHA:
14894 case R_PPC64_ADDR16_HIGHERA:
14895 case R_PPC64_ADDR16_HIGHESTA:
14896 case R_PPC64_TOC16_HA:
14897 case R_PPC64_SECTOFF_HA:
14898 case R_PPC64_TPREL16_HA:
14899 case R_PPC64_TPREL16_HIGHA:
14900 case R_PPC64_TPREL16_HIGHERA:
14901 case R_PPC64_TPREL16_HIGHESTA:
14902 case R_PPC64_DTPREL16_HA:
14903 case R_PPC64_DTPREL16_HIGHA:
14904 case R_PPC64_DTPREL16_HIGHERA:
14905 case R_PPC64_DTPREL16_HIGHESTA:
14906 /* It's just possible that this symbol is a weak symbol
14907 that's not actually defined anywhere. In that case,
14908 'sec' would be NULL, and we should leave the symbol
14909 alone (it will be set to zero elsewhere in the link). */
14914 case R_PPC64_GOT16_HA:
14915 case R_PPC64_PLTGOT16_HA:
14916 case R_PPC64_PLT16_HA:
14917 case R_PPC64_GOT_TLSGD16_HA:
14918 case R_PPC64_GOT_TLSLD16_HA:
14919 case R_PPC64_GOT_TPREL16_HA:
14920 case R_PPC64_GOT_DTPREL16_HA:
14921 /* Add 0x10000 if sign bit in 0:15 is set.
14922 Bits 0:15 are not used. */
14926 case R_PPC64_ADDR16_DS:
14927 case R_PPC64_ADDR16_LO_DS:
14928 case R_PPC64_GOT16_DS:
14929 case R_PPC64_GOT16_LO_DS:
14930 case R_PPC64_PLT16_LO_DS:
14931 case R_PPC64_SECTOFF_DS:
14932 case R_PPC64_SECTOFF_LO_DS:
14933 case R_PPC64_TOC16_DS:
14934 case R_PPC64_TOC16_LO_DS:
14935 case R_PPC64_PLTGOT16_DS:
14936 case R_PPC64_PLTGOT16_LO_DS:
14937 case R_PPC64_GOT_TPREL16_DS:
14938 case R_PPC64_GOT_TPREL16_LO_DS:
14939 case R_PPC64_GOT_DTPREL16_DS:
14940 case R_PPC64_GOT_DTPREL16_LO_DS:
14941 case R_PPC64_TPREL16_DS:
14942 case R_PPC64_TPREL16_LO_DS:
14943 case R_PPC64_DTPREL16_DS:
14944 case R_PPC64_DTPREL16_LO_DS:
14945 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
14947 /* If this reloc is against an lq, lxv, or stxv insn, then
14948 the value must be a multiple of 16. This is somewhat of
14949 a hack, but the "correct" way to do this by defining _DQ
14950 forms of all the _DS relocs bloats all reloc switches in
14951 this file. It doesn't make much sense to use these
14952 relocs in data, so testing the insn should be safe. */
14953 if ((insn & (0x3f << 26)) == (56u << 26)
14954 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
14956 relocation += addend;
14957 addend = insn & (mask ^ 3);
14958 if ((relocation & mask) != 0)
14960 relocation ^= relocation & mask;
14961 info->callbacks->einfo
14962 (_("%P: %H: error: %s not a multiple of %u\n"),
14963 input_bfd, input_section, rel->r_offset,
14966 bfd_set_error (bfd_error_bad_value);
14973 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
14974 because such sections are not SEC_ALLOC and thus ld.so will
14975 not process them. */
14976 if (unresolved_reloc
14977 && !((input_section->flags & SEC_DEBUGGING) != 0
14978 && h->elf.def_dynamic)
14979 && _bfd_elf_section_offset (output_bfd, info, input_section,
14980 rel->r_offset) != (bfd_vma) -1)
14982 info->callbacks->einfo
14983 (_("%P: %H: unresolvable %s against `%T'\n"),
14984 input_bfd, input_section, rel->r_offset,
14986 h->elf.root.root.string);
14990 /* 16-bit fields in insns mostly have signed values, but a
14991 few insns have 16-bit unsigned values. Really, we should
14992 have different reloc types. */
14993 if (howto->complain_on_overflow != complain_overflow_dont
14994 && howto->dst_mask == 0xffff
14995 && (input_section->flags & SEC_CODE) != 0)
14997 enum complain_overflow complain = complain_overflow_signed;
14999 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15000 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15001 complain = complain_overflow_bitfield;
15002 else if (howto->rightshift == 0
15003 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15004 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15005 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15006 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15007 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15008 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
15009 complain = complain_overflow_unsigned;
15010 if (howto->complain_on_overflow != complain)
15012 alt_howto = *howto;
15013 alt_howto.complain_on_overflow = complain;
15014 howto = &alt_howto;
15018 if (r_type == R_PPC64_REL16DX_HA)
15020 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15021 if (rel->r_offset + 4 > input_section->size)
15022 r = bfd_reloc_outofrange;
15025 relocation += addend;
15026 relocation -= (rel->r_offset
15027 + input_section->output_offset
15028 + input_section->output_section->vma);
15029 relocation = (bfd_signed_vma) relocation >> 16;
15030 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15032 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15033 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15035 if (relocation + 0x8000 > 0xffff)
15036 r = bfd_reloc_overflow;
15040 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15041 rel->r_offset, relocation, addend);
15043 if (r != bfd_reloc_ok)
15045 char *more_info = NULL;
15046 const char *reloc_name = howto->name;
15048 if (reloc_dest != DEST_NORMAL)
15050 more_info = bfd_malloc (strlen (reloc_name) + 8);
15051 if (more_info != NULL)
15053 strcpy (more_info, reloc_name);
15054 strcat (more_info, (reloc_dest == DEST_OPD
15055 ? " (OPD)" : " (stub)"));
15056 reloc_name = more_info;
15060 if (r == bfd_reloc_overflow)
15062 /* On code like "if (foo) foo();" don't report overflow
15063 on a branch to zero when foo is undefined. */
15065 && (reloc_dest == DEST_STUB
15067 && (h->elf.root.type == bfd_link_hash_undefweak
15068 || h->elf.root.type == bfd_link_hash_undefined)
15069 && is_branch_reloc (r_type))))
15071 if (!((*info->callbacks->reloc_overflow)
15072 (info, &h->elf.root, sym_name,
15073 reloc_name, orig_rel.r_addend,
15074 input_bfd, input_section, rel->r_offset)))
15080 info->callbacks->einfo
15081 (_("%P: %H: %s against `%T': error %d\n"),
15082 input_bfd, input_section, rel->r_offset,
15083 reloc_name, sym_name, (int) r);
15086 if (more_info != NULL)
15096 Elf_Internal_Shdr *rel_hdr;
15097 size_t deleted = rel - wrel;
15099 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15100 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15101 if (rel_hdr->sh_size == 0)
15103 /* It is too late to remove an empty reloc section. Leave
15105 ??? What is wrong with an empty section??? */
15106 rel_hdr->sh_size = rel_hdr->sh_entsize;
15109 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15110 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15111 input_section->reloc_count -= deleted;
15114 /* If we're emitting relocations, then shortly after this function
15115 returns, reloc offsets and addends for this section will be
15116 adjusted. Worse, reloc symbol indices will be for the output
15117 file rather than the input. Save a copy of the relocs for
15118 opd_entry_value. */
15119 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
15122 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15123 rel = bfd_alloc (input_bfd, amt);
15124 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15125 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
15128 memcpy (rel, relocs, amt);
15133 /* Adjust the value of any local symbols in opd sections. */
15136 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15137 const char *name ATTRIBUTE_UNUSED,
15138 Elf_Internal_Sym *elfsym,
15139 asection *input_sec,
15140 struct elf_link_hash_entry *h)
15142 struct _opd_sec_data *opd;
15149 opd = get_opd_info (input_sec);
15150 if (opd == NULL || opd->adjust == NULL)
15153 value = elfsym->st_value - input_sec->output_offset;
15154 if (!bfd_link_relocatable (info))
15155 value -= input_sec->output_section->vma;
15157 adjust = opd->adjust[OPD_NDX (value)];
15161 elfsym->st_value += adjust;
15165 /* Finish up dynamic symbol handling. We set the contents of various
15166 dynamic sections here. */
15169 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15170 struct bfd_link_info *info,
15171 struct elf_link_hash_entry *h,
15172 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
15174 struct ppc_link_hash_table *htab;
15175 struct plt_entry *ent;
15176 Elf_Internal_Rela rela;
15179 htab = ppc_hash_table (info);
15183 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15184 if (ent->plt.offset != (bfd_vma) -1)
15186 /* This symbol has an entry in the procedure linkage
15187 table. Set it up. */
15188 if (!htab->elf.dynamic_sections_created
15189 || h->dynindx == -1)
15191 BFD_ASSERT (h->type == STT_GNU_IFUNC
15193 && (h->root.type == bfd_link_hash_defined
15194 || h->root.type == bfd_link_hash_defweak));
15195 rela.r_offset = (htab->elf.iplt->output_section->vma
15196 + htab->elf.iplt->output_offset
15197 + ent->plt.offset);
15199 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15201 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15202 rela.r_addend = (h->root.u.def.value
15203 + h->root.u.def.section->output_offset
15204 + h->root.u.def.section->output_section->vma
15206 loc = (htab->elf.irelplt->contents
15207 + (htab->elf.irelplt->reloc_count++
15208 * sizeof (Elf64_External_Rela)));
15212 rela.r_offset = (htab->elf.splt->output_section->vma
15213 + htab->elf.splt->output_offset
15214 + ent->plt.offset);
15215 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15216 rela.r_addend = ent->addend;
15217 loc = (htab->elf.srelplt->contents
15218 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15219 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
15221 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15223 if (!htab->opd_abi)
15225 if (!h->def_regular)
15227 /* Mark the symbol as undefined, rather than as
15228 defined in glink. Leave the value if there were
15229 any relocations where pointer equality matters
15230 (this is a clue for the dynamic linker, to make
15231 function pointer comparisons work between an
15232 application and shared library), otherwise set it
15234 sym->st_shndx = SHN_UNDEF;
15235 if (!h->pointer_equality_needed)
15237 else if (!h->ref_regular_nonweak)
15239 /* This breaks function pointer comparisons, but
15240 that is better than breaking tests for a NULL
15241 function pointer. */
15250 /* This symbol needs a copy reloc. Set it up. */
15252 if (h->dynindx == -1
15253 || (h->root.type != bfd_link_hash_defined
15254 && h->root.type != bfd_link_hash_defweak)
15255 || htab->relbss == NULL)
15258 rela.r_offset = (h->root.u.def.value
15259 + h->root.u.def.section->output_section->vma
15260 + h->root.u.def.section->output_offset);
15261 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15263 loc = htab->relbss->contents;
15264 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
15265 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15271 /* Used to decide how to sort relocs in an optimal manner for the
15272 dynamic linker, before writing them out. */
15274 static enum elf_reloc_type_class
15275 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15276 const asection *rel_sec,
15277 const Elf_Internal_Rela *rela)
15279 enum elf_ppc64_reloc_type r_type;
15280 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15282 if (rel_sec == htab->elf.irelplt)
15283 return reloc_class_ifunc;
15285 r_type = ELF64_R_TYPE (rela->r_info);
15288 case R_PPC64_RELATIVE:
15289 return reloc_class_relative;
15290 case R_PPC64_JMP_SLOT:
15291 return reloc_class_plt;
15293 return reloc_class_copy;
15295 return reloc_class_normal;
15299 /* Finish up the dynamic sections. */
15302 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15303 struct bfd_link_info *info)
15305 struct ppc_link_hash_table *htab;
15309 htab = ppc_hash_table (info);
15313 dynobj = htab->elf.dynobj;
15314 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
15316 if (htab->elf.dynamic_sections_created)
15318 Elf64_External_Dyn *dyncon, *dynconend;
15320 if (sdyn == NULL || htab->elf.sgot == NULL)
15323 dyncon = (Elf64_External_Dyn *) sdyn->contents;
15324 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
15325 for (; dyncon < dynconend; dyncon++)
15327 Elf_Internal_Dyn dyn;
15330 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15337 case DT_PPC64_GLINK:
15339 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15340 /* We stupidly defined DT_PPC64_GLINK to be the start
15341 of glink rather than the first entry point, which is
15342 what ld.so needs, and now have a bigger stub to
15343 support automatic multiple TOCs. */
15344 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
15348 s = bfd_get_section_by_name (output_bfd, ".opd");
15351 dyn.d_un.d_ptr = s->vma;
15355 if (htab->do_multi_toc && htab->multi_toc_needed)
15356 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15359 case DT_PPC64_OPDSZ:
15360 s = bfd_get_section_by_name (output_bfd, ".opd");
15363 dyn.d_un.d_val = s->size;
15367 s = htab->elf.splt;
15368 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15372 s = htab->elf.srelplt;
15373 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15377 dyn.d_un.d_val = htab->elf.srelplt->size;
15381 /* Don't count procedure linkage table relocs in the
15382 overall reloc count. */
15383 s = htab->elf.srelplt;
15386 dyn.d_un.d_val -= s->size;
15390 /* We may not be using the standard ELF linker script.
15391 If .rela.plt is the first .rela section, we adjust
15392 DT_RELA to not include it. */
15393 s = htab->elf.srelplt;
15396 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
15398 dyn.d_un.d_ptr += s->size;
15402 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
15406 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0)
15408 /* Fill in the first entry in the global offset table.
15409 We use it to hold the link-time TOCbase. */
15410 bfd_put_64 (output_bfd,
15411 elf_gp (output_bfd) + TOC_BASE_OFF,
15412 htab->elf.sgot->contents);
15414 /* Set .got entry size. */
15415 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
15418 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
15420 /* Set .plt entry size. */
15421 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
15422 = PLT_ENTRY_SIZE (htab);
15425 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15426 brlt ourselves if emitrelocations. */
15427 if (htab->brlt != NULL
15428 && htab->brlt->reloc_count != 0
15429 && !_bfd_elf_link_output_relocs (output_bfd,
15431 elf_section_data (htab->brlt)->rela.hdr,
15432 elf_section_data (htab->brlt)->relocs,
15436 if (htab->glink != NULL
15437 && htab->glink->reloc_count != 0
15438 && !_bfd_elf_link_output_relocs (output_bfd,
15440 elf_section_data (htab->glink)->rela.hdr,
15441 elf_section_data (htab->glink)->relocs,
15445 if (htab->glink_eh_frame != NULL
15446 && htab->glink_eh_frame->size != 0)
15450 asection *stub_sec;
15452 p = htab->glink_eh_frame->contents + sizeof (glink_eh_frame_cie);
15453 for (stub_sec = htab->params->stub_bfd->sections;
15455 stub_sec = stub_sec->next)
15456 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15462 /* Offset to stub section. */
15463 val = (stub_sec->output_section->vma
15464 + stub_sec->output_offset);
15465 val -= (htab->glink_eh_frame->output_section->vma
15466 + htab->glink_eh_frame->output_offset
15467 + (p - htab->glink_eh_frame->contents));
15468 if (val + 0x80000000 > 0xffffffff)
15470 info->callbacks->einfo
15471 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15475 bfd_put_32 (dynobj, val, p);
15477 /* stub section size. */
15479 /* Augmentation. */
15484 if (htab->glink != NULL && htab->glink->size != 0)
15490 /* Offset to .glink. */
15491 val = (htab->glink->output_section->vma
15492 + htab->glink->output_offset
15494 val -= (htab->glink_eh_frame->output_section->vma
15495 + htab->glink_eh_frame->output_offset
15496 + (p - htab->glink_eh_frame->contents));
15497 if (val + 0x80000000 > 0xffffffff)
15499 info->callbacks->einfo
15500 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15501 htab->glink->name);
15504 bfd_put_32 (dynobj, val, p);
15508 /* Augmentation. */
15514 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15515 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15516 htab->glink_eh_frame,
15517 htab->glink_eh_frame->contents))
15521 /* We need to handle writing out multiple GOT sections ourselves,
15522 since we didn't add them to DYNOBJ. We know dynobj is the first
15524 while ((dynobj = dynobj->link.next) != NULL)
15528 if (!is_ppc64_elf (dynobj))
15531 s = ppc64_elf_tdata (dynobj)->got;
15534 && s->output_section != bfd_abs_section_ptr
15535 && !bfd_set_section_contents (output_bfd, s->output_section,
15536 s->contents, s->output_offset,
15539 s = ppc64_elf_tdata (dynobj)->relgot;
15542 && s->output_section != bfd_abs_section_ptr
15543 && !bfd_set_section_contents (output_bfd, s->output_section,
15544 s->contents, s->output_offset,
15552 #include "elf64-target.h"
15554 /* FreeBSD support */
15556 #undef TARGET_LITTLE_SYM
15557 #undef TARGET_LITTLE_NAME
15559 #undef TARGET_BIG_SYM
15560 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
15561 #undef TARGET_BIG_NAME
15562 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15565 #define ELF_OSABI ELFOSABI_FREEBSD
15568 #define elf64_bed elf64_powerpc_fbsd_bed
15570 #include "elf64-target.h"