1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2015 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
59 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM powerpc_elf64_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_TARGET_ID PPC64_ELF_DATA
65 #define ELF_MACHINE_CODE EM_PPC64
66 #define ELF_MAXPAGESIZE 0x10000
67 #define ELF_COMMONPAGESIZE 0x10000
68 #define elf_info_to_howto ppc64_elf_info_to_howto
70 #define elf_backend_want_got_sym 0
71 #define elf_backend_want_plt_sym 0
72 #define elf_backend_plt_alignment 3
73 #define elf_backend_plt_not_loaded 1
74 #define elf_backend_got_header_size 8
75 #define elf_backend_can_gc_sections 1
76 #define elf_backend_can_refcount 1
77 #define elf_backend_rela_normal 1
78 #define elf_backend_default_execstack 0
80 #define bfd_elf64_mkobject ppc64_elf_mkobject
81 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
82 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
83 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
84 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
85 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
86 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
87 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
88 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
90 #define elf_backend_object_p ppc64_elf_object_p
91 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
92 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
93 #define elf_backend_write_core_note ppc64_elf_write_core_note
94 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
95 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
96 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
97 #define elf_backend_check_directives ppc64_elf_before_check_relocs
98 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
99 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
100 #define elf_backend_check_relocs ppc64_elf_check_relocs
101 #define elf_backend_gc_keep ppc64_elf_gc_keep
102 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
103 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
104 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
105 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
106 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
107 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
108 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
109 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
110 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
111 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
112 #define elf_backend_action_discarded ppc64_elf_action_discarded
113 #define elf_backend_relocate_section ppc64_elf_relocate_section
114 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
115 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
116 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
117 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
118 #define elf_backend_special_sections ppc64_elf_special_sections
119 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
121 /* The name of the dynamic interpreter. This is put in the .interp
123 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
125 /* The size in bytes of an entry in the procedure linkage table. */
126 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
128 /* The initial size of the plt reserved for the dynamic linker. */
129 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
131 /* Offsets to some stack save slots. */
133 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
134 /* This one is dodgy. ELFv2 does not have a linker word, so use the
135 CR save slot. Used only by optimised __tls_get_addr call stub,
136 relying on __tls_get_addr_opt not saving CR.. */
137 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
139 /* TOC base pointers offset from start of TOC. */
140 #define TOC_BASE_OFF 0x8000
141 /* TOC base alignment. */
142 #define TOC_BASE_ALIGN 256
144 /* Offset of tp and dtp pointers from start of TLS block. */
145 #define TP_OFFSET 0x7000
146 #define DTP_OFFSET 0x8000
148 /* .plt call stub instructions. The normal stub is like this, but
149 sometimes the .plt entry crosses a 64k boundary and we need to
150 insert an addi to adjust r11. */
151 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
152 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
153 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
154 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
155 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
156 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
157 #define BCTR 0x4e800420 /* bctr */
159 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
160 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
161 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
163 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
164 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
165 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
166 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
167 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
168 #define BNECTR 0x4ca20420 /* bnectr+ */
169 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
171 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
172 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
173 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
175 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
177 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
178 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
179 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
181 /* glink call stub instructions. We enter with the index in R0. */
182 #define GLINK_CALL_STUB_SIZE (16*4)
186 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
187 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
189 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
190 /* ld %2,(0b-1b)(%11) */
191 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
192 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
198 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
199 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
200 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
201 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
202 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
205 #define NOP 0x60000000
207 /* Some other nops. */
208 #define CROR_151515 0x4def7b82
209 #define CROR_313131 0x4ffffb82
211 /* .glink entries for the first 32k functions are two instructions. */
212 #define LI_R0_0 0x38000000 /* li %r0,0 */
213 #define B_DOT 0x48000000 /* b . */
215 /* After that, we need two instructions to load the index, followed by
217 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
218 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
220 /* Instructions used by the save and restore reg functions. */
221 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
222 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
223 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
224 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
225 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
226 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
227 #define LI_R12_0 0x39800000 /* li %r12,0 */
228 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
229 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
230 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
231 #define BLR 0x4e800020 /* blr */
233 /* Since .opd is an array of descriptors and each entry will end up
234 with identical R_PPC64_RELATIVE relocs, there is really no need to
235 propagate .opd relocs; The dynamic linker should be taught to
236 relocate .opd without reloc entries. */
237 #ifndef NO_OPD_RELOCS
238 #define NO_OPD_RELOCS 0
242 abiversion (bfd *abfd)
244 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
248 set_abiversion (bfd *abfd, int ver)
250 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
251 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
254 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
256 /* Relocation HOWTO's. */
257 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
259 static reloc_howto_type ppc64_elf_howto_raw[] = {
260 /* This reloc does nothing. */
261 HOWTO (R_PPC64_NONE, /* type */
263 3, /* size (0 = byte, 1 = short, 2 = long) */
265 FALSE, /* pc_relative */
267 complain_overflow_dont, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_PPC64_NONE", /* name */
270 FALSE, /* partial_inplace */
273 FALSE), /* pcrel_offset */
275 /* A standard 32 bit relocation. */
276 HOWTO (R_PPC64_ADDR32, /* type */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
280 FALSE, /* pc_relative */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_PPC64_ADDR32", /* name */
285 FALSE, /* partial_inplace */
287 0xffffffff, /* dst_mask */
288 FALSE), /* pcrel_offset */
290 /* An absolute 26 bit branch; the lower two bits must be zero.
291 FIXME: we don't check that, we just clear them. */
292 HOWTO (R_PPC64_ADDR24, /* type */
294 2, /* size (0 = byte, 1 = short, 2 = long) */
296 FALSE, /* pc_relative */
298 complain_overflow_bitfield, /* complain_on_overflow */
299 bfd_elf_generic_reloc, /* special_function */
300 "R_PPC64_ADDR24", /* name */
301 FALSE, /* partial_inplace */
303 0x03fffffc, /* dst_mask */
304 FALSE), /* pcrel_offset */
306 /* A standard 16 bit relocation. */
307 HOWTO (R_PPC64_ADDR16, /* type */
309 1, /* size (0 = byte, 1 = short, 2 = long) */
311 FALSE, /* pc_relative */
313 complain_overflow_bitfield, /* complain_on_overflow */
314 bfd_elf_generic_reloc, /* special_function */
315 "R_PPC64_ADDR16", /* name */
316 FALSE, /* partial_inplace */
318 0xffff, /* dst_mask */
319 FALSE), /* pcrel_offset */
321 /* A 16 bit relocation without overflow. */
322 HOWTO (R_PPC64_ADDR16_LO, /* type */
324 1, /* size (0 = byte, 1 = short, 2 = long) */
326 FALSE, /* pc_relative */
328 complain_overflow_dont,/* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_PPC64_ADDR16_LO", /* name */
331 FALSE, /* partial_inplace */
333 0xffff, /* dst_mask */
334 FALSE), /* pcrel_offset */
336 /* Bits 16-31 of an address. */
337 HOWTO (R_PPC64_ADDR16_HI, /* type */
339 1, /* size (0 = byte, 1 = short, 2 = long) */
341 FALSE, /* pc_relative */
343 complain_overflow_signed, /* complain_on_overflow */
344 bfd_elf_generic_reloc, /* special_function */
345 "R_PPC64_ADDR16_HI", /* name */
346 FALSE, /* partial_inplace */
348 0xffff, /* dst_mask */
349 FALSE), /* pcrel_offset */
351 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
352 bits, treated as a signed number, is negative. */
353 HOWTO (R_PPC64_ADDR16_HA, /* type */
355 1, /* size (0 = byte, 1 = short, 2 = long) */
357 FALSE, /* pc_relative */
359 complain_overflow_signed, /* complain_on_overflow */
360 ppc64_elf_ha_reloc, /* special_function */
361 "R_PPC64_ADDR16_HA", /* name */
362 FALSE, /* partial_inplace */
364 0xffff, /* dst_mask */
365 FALSE), /* pcrel_offset */
367 /* An absolute 16 bit branch; the lower two bits must be zero.
368 FIXME: we don't check that, we just clear them. */
369 HOWTO (R_PPC64_ADDR14, /* type */
371 2, /* size (0 = byte, 1 = short, 2 = long) */
373 FALSE, /* pc_relative */
375 complain_overflow_signed, /* complain_on_overflow */
376 ppc64_elf_branch_reloc, /* special_function */
377 "R_PPC64_ADDR14", /* name */
378 FALSE, /* partial_inplace */
380 0x0000fffc, /* dst_mask */
381 FALSE), /* pcrel_offset */
383 /* An absolute 16 bit branch, for which bit 10 should be set to
384 indicate that the branch is expected to be taken. The lower two
385 bits must be zero. */
386 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
388 2, /* size (0 = byte, 1 = short, 2 = long) */
390 FALSE, /* pc_relative */
392 complain_overflow_signed, /* complain_on_overflow */
393 ppc64_elf_brtaken_reloc, /* special_function */
394 "R_PPC64_ADDR14_BRTAKEN",/* name */
395 FALSE, /* partial_inplace */
397 0x0000fffc, /* dst_mask */
398 FALSE), /* pcrel_offset */
400 /* An absolute 16 bit branch, for which bit 10 should be set to
401 indicate that the branch is not expected to be taken. The lower
402 two bits must be zero. */
403 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
405 2, /* size (0 = byte, 1 = short, 2 = long) */
407 FALSE, /* pc_relative */
409 complain_overflow_signed, /* complain_on_overflow */
410 ppc64_elf_brtaken_reloc, /* special_function */
411 "R_PPC64_ADDR14_BRNTAKEN",/* name */
412 FALSE, /* partial_inplace */
414 0x0000fffc, /* dst_mask */
415 FALSE), /* pcrel_offset */
417 /* A relative 26 bit branch; the lower two bits must be zero. */
418 HOWTO (R_PPC64_REL24, /* type */
420 2, /* size (0 = byte, 1 = short, 2 = long) */
422 TRUE, /* pc_relative */
424 complain_overflow_signed, /* complain_on_overflow */
425 ppc64_elf_branch_reloc, /* special_function */
426 "R_PPC64_REL24", /* name */
427 FALSE, /* partial_inplace */
429 0x03fffffc, /* dst_mask */
430 TRUE), /* pcrel_offset */
432 /* A relative 16 bit branch; the lower two bits must be zero. */
433 HOWTO (R_PPC64_REL14, /* type */
435 2, /* size (0 = byte, 1 = short, 2 = long) */
437 TRUE, /* pc_relative */
439 complain_overflow_signed, /* complain_on_overflow */
440 ppc64_elf_branch_reloc, /* special_function */
441 "R_PPC64_REL14", /* name */
442 FALSE, /* partial_inplace */
444 0x0000fffc, /* dst_mask */
445 TRUE), /* pcrel_offset */
447 /* A relative 16 bit branch. Bit 10 should be set to indicate that
448 the branch is expected to be taken. The lower two bits must be
450 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
452 2, /* size (0 = byte, 1 = short, 2 = long) */
454 TRUE, /* pc_relative */
456 complain_overflow_signed, /* complain_on_overflow */
457 ppc64_elf_brtaken_reloc, /* special_function */
458 "R_PPC64_REL14_BRTAKEN", /* name */
459 FALSE, /* partial_inplace */
461 0x0000fffc, /* dst_mask */
462 TRUE), /* pcrel_offset */
464 /* A relative 16 bit branch. Bit 10 should be set to indicate that
465 the branch is not expected to be taken. The lower two bits must
467 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
471 TRUE, /* pc_relative */
473 complain_overflow_signed, /* complain_on_overflow */
474 ppc64_elf_brtaken_reloc, /* special_function */
475 "R_PPC64_REL14_BRNTAKEN",/* name */
476 FALSE, /* partial_inplace */
478 0x0000fffc, /* dst_mask */
479 TRUE), /* pcrel_offset */
481 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
483 HOWTO (R_PPC64_GOT16, /* type */
485 1, /* size (0 = byte, 1 = short, 2 = long) */
487 FALSE, /* pc_relative */
489 complain_overflow_signed, /* complain_on_overflow */
490 ppc64_elf_unhandled_reloc, /* special_function */
491 "R_PPC64_GOT16", /* name */
492 FALSE, /* partial_inplace */
494 0xffff, /* dst_mask */
495 FALSE), /* pcrel_offset */
497 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
499 HOWTO (R_PPC64_GOT16_LO, /* type */
501 1, /* size (0 = byte, 1 = short, 2 = long) */
503 FALSE, /* pc_relative */
505 complain_overflow_dont, /* complain_on_overflow */
506 ppc64_elf_unhandled_reloc, /* special_function */
507 "R_PPC64_GOT16_LO", /* name */
508 FALSE, /* partial_inplace */
510 0xffff, /* dst_mask */
511 FALSE), /* pcrel_offset */
513 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
515 HOWTO (R_PPC64_GOT16_HI, /* type */
517 1, /* size (0 = byte, 1 = short, 2 = long) */
519 FALSE, /* pc_relative */
521 complain_overflow_signed,/* complain_on_overflow */
522 ppc64_elf_unhandled_reloc, /* special_function */
523 "R_PPC64_GOT16_HI", /* name */
524 FALSE, /* partial_inplace */
526 0xffff, /* dst_mask */
527 FALSE), /* pcrel_offset */
529 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
531 HOWTO (R_PPC64_GOT16_HA, /* type */
533 1, /* size (0 = byte, 1 = short, 2 = long) */
535 FALSE, /* pc_relative */
537 complain_overflow_signed,/* complain_on_overflow */
538 ppc64_elf_unhandled_reloc, /* special_function */
539 "R_PPC64_GOT16_HA", /* name */
540 FALSE, /* partial_inplace */
542 0xffff, /* dst_mask */
543 FALSE), /* pcrel_offset */
545 /* This is used only by the dynamic linker. The symbol should exist
546 both in the object being run and in some shared library. The
547 dynamic linker copies the data addressed by the symbol from the
548 shared library into the object, because the object being
549 run has to have the data at some particular address. */
550 HOWTO (R_PPC64_COPY, /* type */
552 0, /* this one is variable size */
554 FALSE, /* pc_relative */
556 complain_overflow_dont, /* complain_on_overflow */
557 ppc64_elf_unhandled_reloc, /* special_function */
558 "R_PPC64_COPY", /* name */
559 FALSE, /* partial_inplace */
562 FALSE), /* pcrel_offset */
564 /* Like R_PPC64_ADDR64, but used when setting global offset table
566 HOWTO (R_PPC64_GLOB_DAT, /* type */
568 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
570 FALSE, /* pc_relative */
572 complain_overflow_dont, /* complain_on_overflow */
573 ppc64_elf_unhandled_reloc, /* special_function */
574 "R_PPC64_GLOB_DAT", /* name */
575 FALSE, /* partial_inplace */
577 ONES (64), /* dst_mask */
578 FALSE), /* pcrel_offset */
580 /* Created by the link editor. Marks a procedure linkage table
581 entry for a symbol. */
582 HOWTO (R_PPC64_JMP_SLOT, /* type */
584 0, /* size (0 = byte, 1 = short, 2 = long) */
586 FALSE, /* pc_relative */
588 complain_overflow_dont, /* complain_on_overflow */
589 ppc64_elf_unhandled_reloc, /* special_function */
590 "R_PPC64_JMP_SLOT", /* name */
591 FALSE, /* partial_inplace */
594 FALSE), /* pcrel_offset */
596 /* Used only by the dynamic linker. When the object is run, this
597 doubleword64 is set to the load address of the object, plus the
599 HOWTO (R_PPC64_RELATIVE, /* type */
601 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
603 FALSE, /* pc_relative */
605 complain_overflow_dont, /* complain_on_overflow */
606 bfd_elf_generic_reloc, /* special_function */
607 "R_PPC64_RELATIVE", /* name */
608 FALSE, /* partial_inplace */
610 ONES (64), /* dst_mask */
611 FALSE), /* pcrel_offset */
613 /* Like R_PPC64_ADDR32, but may be unaligned. */
614 HOWTO (R_PPC64_UADDR32, /* type */
616 2, /* size (0 = byte, 1 = short, 2 = long) */
618 FALSE, /* pc_relative */
620 complain_overflow_bitfield, /* complain_on_overflow */
621 bfd_elf_generic_reloc, /* special_function */
622 "R_PPC64_UADDR32", /* name */
623 FALSE, /* partial_inplace */
625 0xffffffff, /* dst_mask */
626 FALSE), /* pcrel_offset */
628 /* Like R_PPC64_ADDR16, but may be unaligned. */
629 HOWTO (R_PPC64_UADDR16, /* type */
631 1, /* size (0 = byte, 1 = short, 2 = long) */
633 FALSE, /* pc_relative */
635 complain_overflow_bitfield, /* complain_on_overflow */
636 bfd_elf_generic_reloc, /* special_function */
637 "R_PPC64_UADDR16", /* name */
638 FALSE, /* partial_inplace */
640 0xffff, /* dst_mask */
641 FALSE), /* pcrel_offset */
643 /* 32-bit PC relative. */
644 HOWTO (R_PPC64_REL32, /* type */
646 2, /* size (0 = byte, 1 = short, 2 = long) */
648 TRUE, /* pc_relative */
650 complain_overflow_signed, /* complain_on_overflow */
651 bfd_elf_generic_reloc, /* special_function */
652 "R_PPC64_REL32", /* name */
653 FALSE, /* partial_inplace */
655 0xffffffff, /* dst_mask */
656 TRUE), /* pcrel_offset */
658 /* 32-bit relocation to the symbol's procedure linkage table. */
659 HOWTO (R_PPC64_PLT32, /* type */
661 2, /* size (0 = byte, 1 = short, 2 = long) */
663 FALSE, /* pc_relative */
665 complain_overflow_bitfield, /* complain_on_overflow */
666 ppc64_elf_unhandled_reloc, /* special_function */
667 "R_PPC64_PLT32", /* name */
668 FALSE, /* partial_inplace */
670 0xffffffff, /* dst_mask */
671 FALSE), /* pcrel_offset */
673 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
674 FIXME: R_PPC64_PLTREL32 not supported. */
675 HOWTO (R_PPC64_PLTREL32, /* type */
677 2, /* size (0 = byte, 1 = short, 2 = long) */
679 TRUE, /* pc_relative */
681 complain_overflow_signed, /* complain_on_overflow */
682 bfd_elf_generic_reloc, /* special_function */
683 "R_PPC64_PLTREL32", /* name */
684 FALSE, /* partial_inplace */
686 0xffffffff, /* dst_mask */
687 TRUE), /* pcrel_offset */
689 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
691 HOWTO (R_PPC64_PLT16_LO, /* type */
693 1, /* size (0 = byte, 1 = short, 2 = long) */
695 FALSE, /* pc_relative */
697 complain_overflow_dont, /* complain_on_overflow */
698 ppc64_elf_unhandled_reloc, /* special_function */
699 "R_PPC64_PLT16_LO", /* name */
700 FALSE, /* partial_inplace */
702 0xffff, /* dst_mask */
703 FALSE), /* pcrel_offset */
705 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
707 HOWTO (R_PPC64_PLT16_HI, /* type */
709 1, /* size (0 = byte, 1 = short, 2 = long) */
711 FALSE, /* pc_relative */
713 complain_overflow_signed, /* complain_on_overflow */
714 ppc64_elf_unhandled_reloc, /* special_function */
715 "R_PPC64_PLT16_HI", /* name */
716 FALSE, /* partial_inplace */
718 0xffff, /* dst_mask */
719 FALSE), /* pcrel_offset */
721 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
723 HOWTO (R_PPC64_PLT16_HA, /* type */
725 1, /* size (0 = byte, 1 = short, 2 = long) */
727 FALSE, /* pc_relative */
729 complain_overflow_signed, /* complain_on_overflow */
730 ppc64_elf_unhandled_reloc, /* special_function */
731 "R_PPC64_PLT16_HA", /* name */
732 FALSE, /* partial_inplace */
734 0xffff, /* dst_mask */
735 FALSE), /* pcrel_offset */
737 /* 16-bit section relative relocation. */
738 HOWTO (R_PPC64_SECTOFF, /* type */
740 1, /* size (0 = byte, 1 = short, 2 = long) */
742 FALSE, /* pc_relative */
744 complain_overflow_signed, /* complain_on_overflow */
745 ppc64_elf_sectoff_reloc, /* special_function */
746 "R_PPC64_SECTOFF", /* name */
747 FALSE, /* partial_inplace */
749 0xffff, /* dst_mask */
750 FALSE), /* pcrel_offset */
752 /* Like R_PPC64_SECTOFF, but no overflow warning. */
753 HOWTO (R_PPC64_SECTOFF_LO, /* type */
755 1, /* size (0 = byte, 1 = short, 2 = long) */
757 FALSE, /* pc_relative */
759 complain_overflow_dont, /* complain_on_overflow */
760 ppc64_elf_sectoff_reloc, /* special_function */
761 "R_PPC64_SECTOFF_LO", /* name */
762 FALSE, /* partial_inplace */
764 0xffff, /* dst_mask */
765 FALSE), /* pcrel_offset */
767 /* 16-bit upper half section relative relocation. */
768 HOWTO (R_PPC64_SECTOFF_HI, /* type */
770 1, /* size (0 = byte, 1 = short, 2 = long) */
772 FALSE, /* pc_relative */
774 complain_overflow_signed, /* complain_on_overflow */
775 ppc64_elf_sectoff_reloc, /* special_function */
776 "R_PPC64_SECTOFF_HI", /* name */
777 FALSE, /* partial_inplace */
779 0xffff, /* dst_mask */
780 FALSE), /* pcrel_offset */
782 /* 16-bit upper half adjusted section relative relocation. */
783 HOWTO (R_PPC64_SECTOFF_HA, /* type */
785 1, /* size (0 = byte, 1 = short, 2 = long) */
787 FALSE, /* pc_relative */
789 complain_overflow_signed, /* complain_on_overflow */
790 ppc64_elf_sectoff_ha_reloc, /* special_function */
791 "R_PPC64_SECTOFF_HA", /* name */
792 FALSE, /* partial_inplace */
794 0xffff, /* dst_mask */
795 FALSE), /* pcrel_offset */
797 /* Like R_PPC64_REL24 without touching the two least significant bits. */
798 HOWTO (R_PPC64_REL30, /* type */
800 2, /* size (0 = byte, 1 = short, 2 = long) */
802 TRUE, /* pc_relative */
804 complain_overflow_dont, /* complain_on_overflow */
805 bfd_elf_generic_reloc, /* special_function */
806 "R_PPC64_REL30", /* name */
807 FALSE, /* partial_inplace */
809 0xfffffffc, /* dst_mask */
810 TRUE), /* pcrel_offset */
812 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
814 /* A standard 64-bit relocation. */
815 HOWTO (R_PPC64_ADDR64, /* type */
817 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
819 FALSE, /* pc_relative */
821 complain_overflow_dont, /* complain_on_overflow */
822 bfd_elf_generic_reloc, /* special_function */
823 "R_PPC64_ADDR64", /* name */
824 FALSE, /* partial_inplace */
826 ONES (64), /* dst_mask */
827 FALSE), /* pcrel_offset */
829 /* The bits 32-47 of an address. */
830 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
832 1, /* size (0 = byte, 1 = short, 2 = long) */
834 FALSE, /* pc_relative */
836 complain_overflow_dont, /* complain_on_overflow */
837 bfd_elf_generic_reloc, /* special_function */
838 "R_PPC64_ADDR16_HIGHER", /* name */
839 FALSE, /* partial_inplace */
841 0xffff, /* dst_mask */
842 FALSE), /* pcrel_offset */
844 /* The bits 32-47 of an address, plus 1 if the contents of the low
845 16 bits, treated as a signed number, is negative. */
846 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
848 1, /* size (0 = byte, 1 = short, 2 = long) */
850 FALSE, /* pc_relative */
852 complain_overflow_dont, /* complain_on_overflow */
853 ppc64_elf_ha_reloc, /* special_function */
854 "R_PPC64_ADDR16_HIGHERA", /* name */
855 FALSE, /* partial_inplace */
857 0xffff, /* dst_mask */
858 FALSE), /* pcrel_offset */
860 /* The bits 48-63 of an address. */
861 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
863 1, /* size (0 = byte, 1 = short, 2 = long) */
865 FALSE, /* pc_relative */
867 complain_overflow_dont, /* complain_on_overflow */
868 bfd_elf_generic_reloc, /* special_function */
869 "R_PPC64_ADDR16_HIGHEST", /* name */
870 FALSE, /* partial_inplace */
872 0xffff, /* dst_mask */
873 FALSE), /* pcrel_offset */
875 /* The bits 48-63 of an address, plus 1 if the contents of the low
876 16 bits, treated as a signed number, is negative. */
877 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
879 1, /* size (0 = byte, 1 = short, 2 = long) */
881 FALSE, /* pc_relative */
883 complain_overflow_dont, /* complain_on_overflow */
884 ppc64_elf_ha_reloc, /* special_function */
885 "R_PPC64_ADDR16_HIGHESTA", /* name */
886 FALSE, /* partial_inplace */
888 0xffff, /* dst_mask */
889 FALSE), /* pcrel_offset */
891 /* Like ADDR64, but may be unaligned. */
892 HOWTO (R_PPC64_UADDR64, /* type */
894 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
896 FALSE, /* pc_relative */
898 complain_overflow_dont, /* complain_on_overflow */
899 bfd_elf_generic_reloc, /* special_function */
900 "R_PPC64_UADDR64", /* name */
901 FALSE, /* partial_inplace */
903 ONES (64), /* dst_mask */
904 FALSE), /* pcrel_offset */
906 /* 64-bit relative relocation. */
907 HOWTO (R_PPC64_REL64, /* type */
909 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
911 TRUE, /* pc_relative */
913 complain_overflow_dont, /* complain_on_overflow */
914 bfd_elf_generic_reloc, /* special_function */
915 "R_PPC64_REL64", /* name */
916 FALSE, /* partial_inplace */
918 ONES (64), /* dst_mask */
919 TRUE), /* pcrel_offset */
921 /* 64-bit relocation to the symbol's procedure linkage table. */
922 HOWTO (R_PPC64_PLT64, /* type */
924 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
926 FALSE, /* pc_relative */
928 complain_overflow_dont, /* complain_on_overflow */
929 ppc64_elf_unhandled_reloc, /* special_function */
930 "R_PPC64_PLT64", /* name */
931 FALSE, /* partial_inplace */
933 ONES (64), /* dst_mask */
934 FALSE), /* pcrel_offset */
936 /* 64-bit PC relative relocation to the symbol's procedure linkage
938 /* FIXME: R_PPC64_PLTREL64 not supported. */
939 HOWTO (R_PPC64_PLTREL64, /* type */
941 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
943 TRUE, /* pc_relative */
945 complain_overflow_dont, /* complain_on_overflow */
946 ppc64_elf_unhandled_reloc, /* special_function */
947 "R_PPC64_PLTREL64", /* name */
948 FALSE, /* partial_inplace */
950 ONES (64), /* dst_mask */
951 TRUE), /* pcrel_offset */
953 /* 16 bit TOC-relative relocation. */
955 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
956 HOWTO (R_PPC64_TOC16, /* type */
958 1, /* size (0 = byte, 1 = short, 2 = long) */
960 FALSE, /* pc_relative */
962 complain_overflow_signed, /* complain_on_overflow */
963 ppc64_elf_toc_reloc, /* special_function */
964 "R_PPC64_TOC16", /* name */
965 FALSE, /* partial_inplace */
967 0xffff, /* dst_mask */
968 FALSE), /* pcrel_offset */
970 /* 16 bit TOC-relative relocation without overflow. */
972 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
973 HOWTO (R_PPC64_TOC16_LO, /* type */
975 1, /* size (0 = byte, 1 = short, 2 = long) */
977 FALSE, /* pc_relative */
979 complain_overflow_dont, /* complain_on_overflow */
980 ppc64_elf_toc_reloc, /* special_function */
981 "R_PPC64_TOC16_LO", /* name */
982 FALSE, /* partial_inplace */
984 0xffff, /* dst_mask */
985 FALSE), /* pcrel_offset */
987 /* 16 bit TOC-relative relocation, high 16 bits. */
989 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
990 HOWTO (R_PPC64_TOC16_HI, /* type */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
994 FALSE, /* pc_relative */
996 complain_overflow_signed, /* complain_on_overflow */
997 ppc64_elf_toc_reloc, /* special_function */
998 "R_PPC64_TOC16_HI", /* name */
999 FALSE, /* partial_inplace */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1004 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1005 contents of the low 16 bits, treated as a signed number, is
1008 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1009 HOWTO (R_PPC64_TOC16_HA, /* type */
1010 16, /* rightshift */
1011 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 FALSE, /* pc_relative */
1015 complain_overflow_signed, /* complain_on_overflow */
1016 ppc64_elf_toc_ha_reloc, /* special_function */
1017 "R_PPC64_TOC16_HA", /* name */
1018 FALSE, /* partial_inplace */
1020 0xffff, /* dst_mask */
1021 FALSE), /* pcrel_offset */
1023 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1025 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1026 HOWTO (R_PPC64_TOC, /* type */
1028 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1030 FALSE, /* pc_relative */
1032 complain_overflow_dont, /* complain_on_overflow */
1033 ppc64_elf_toc64_reloc, /* special_function */
1034 "R_PPC64_TOC", /* name */
1035 FALSE, /* partial_inplace */
1037 ONES (64), /* dst_mask */
1038 FALSE), /* pcrel_offset */
1040 /* Like R_PPC64_GOT16, but also informs the link editor that the
1041 value to relocate may (!) refer to a PLT entry which the link
1042 editor (a) may replace with the symbol value. If the link editor
1043 is unable to fully resolve the symbol, it may (b) create a PLT
1044 entry and store the address to the new PLT entry in the GOT.
1045 This permits lazy resolution of function symbols at run time.
1046 The link editor may also skip all of this and just (c) emit a
1047 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1048 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1049 HOWTO (R_PPC64_PLTGOT16, /* type */
1051 1, /* size (0 = byte, 1 = short, 2 = long) */
1053 FALSE, /* pc_relative */
1055 complain_overflow_signed, /* complain_on_overflow */
1056 ppc64_elf_unhandled_reloc, /* special_function */
1057 "R_PPC64_PLTGOT16", /* name */
1058 FALSE, /* partial_inplace */
1060 0xffff, /* dst_mask */
1061 FALSE), /* pcrel_offset */
1063 /* Like R_PPC64_PLTGOT16, but without overflow. */
1064 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1065 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1067 1, /* size (0 = byte, 1 = short, 2 = long) */
1069 FALSE, /* pc_relative */
1071 complain_overflow_dont, /* complain_on_overflow */
1072 ppc64_elf_unhandled_reloc, /* special_function */
1073 "R_PPC64_PLTGOT16_LO", /* name */
1074 FALSE, /* partial_inplace */
1076 0xffff, /* dst_mask */
1077 FALSE), /* pcrel_offset */
1079 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1080 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1081 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1082 16, /* rightshift */
1083 1, /* size (0 = byte, 1 = short, 2 = long) */
1085 FALSE, /* pc_relative */
1087 complain_overflow_signed, /* complain_on_overflow */
1088 ppc64_elf_unhandled_reloc, /* special_function */
1089 "R_PPC64_PLTGOT16_HI", /* name */
1090 FALSE, /* partial_inplace */
1092 0xffff, /* dst_mask */
1093 FALSE), /* pcrel_offset */
1095 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1096 1 if the contents of the low 16 bits, treated as a signed number,
1098 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1099 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1100 16, /* rightshift */
1101 1, /* size (0 = byte, 1 = short, 2 = long) */
1103 FALSE, /* pc_relative */
1105 complain_overflow_signed, /* complain_on_overflow */
1106 ppc64_elf_unhandled_reloc, /* special_function */
1107 "R_PPC64_PLTGOT16_HA", /* name */
1108 FALSE, /* partial_inplace */
1110 0xffff, /* dst_mask */
1111 FALSE), /* pcrel_offset */
1113 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1114 HOWTO (R_PPC64_ADDR16_DS, /* type */
1116 1, /* size (0 = byte, 1 = short, 2 = long) */
1118 FALSE, /* pc_relative */
1120 complain_overflow_signed, /* complain_on_overflow */
1121 bfd_elf_generic_reloc, /* special_function */
1122 "R_PPC64_ADDR16_DS", /* name */
1123 FALSE, /* partial_inplace */
1125 0xfffc, /* dst_mask */
1126 FALSE), /* pcrel_offset */
1128 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1129 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1133 FALSE, /* pc_relative */
1135 complain_overflow_dont,/* complain_on_overflow */
1136 bfd_elf_generic_reloc, /* special_function */
1137 "R_PPC64_ADDR16_LO_DS",/* name */
1138 FALSE, /* partial_inplace */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1143 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1144 HOWTO (R_PPC64_GOT16_DS, /* type */
1146 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 FALSE, /* pc_relative */
1150 complain_overflow_signed, /* complain_on_overflow */
1151 ppc64_elf_unhandled_reloc, /* special_function */
1152 "R_PPC64_GOT16_DS", /* name */
1153 FALSE, /* partial_inplace */
1155 0xfffc, /* dst_mask */
1156 FALSE), /* pcrel_offset */
1158 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1159 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1161 1, /* size (0 = byte, 1 = short, 2 = long) */
1163 FALSE, /* pc_relative */
1165 complain_overflow_dont, /* complain_on_overflow */
1166 ppc64_elf_unhandled_reloc, /* special_function */
1167 "R_PPC64_GOT16_LO_DS", /* name */
1168 FALSE, /* partial_inplace */
1170 0xfffc, /* dst_mask */
1171 FALSE), /* pcrel_offset */
1173 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1174 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1176 1, /* size (0 = byte, 1 = short, 2 = long) */
1178 FALSE, /* pc_relative */
1180 complain_overflow_dont, /* complain_on_overflow */
1181 ppc64_elf_unhandled_reloc, /* special_function */
1182 "R_PPC64_PLT16_LO_DS", /* name */
1183 FALSE, /* partial_inplace */
1185 0xfffc, /* dst_mask */
1186 FALSE), /* pcrel_offset */
1188 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1189 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1191 1, /* size (0 = byte, 1 = short, 2 = long) */
1193 FALSE, /* pc_relative */
1195 complain_overflow_signed, /* complain_on_overflow */
1196 ppc64_elf_sectoff_reloc, /* special_function */
1197 "R_PPC64_SECTOFF_DS", /* name */
1198 FALSE, /* partial_inplace */
1200 0xfffc, /* dst_mask */
1201 FALSE), /* pcrel_offset */
1203 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1204 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1206 1, /* size (0 = byte, 1 = short, 2 = long) */
1208 FALSE, /* pc_relative */
1210 complain_overflow_dont, /* complain_on_overflow */
1211 ppc64_elf_sectoff_reloc, /* special_function */
1212 "R_PPC64_SECTOFF_LO_DS",/* name */
1213 FALSE, /* partial_inplace */
1215 0xfffc, /* dst_mask */
1216 FALSE), /* pcrel_offset */
1218 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1219 HOWTO (R_PPC64_TOC16_DS, /* type */
1221 1, /* size (0 = byte, 1 = short, 2 = long) */
1223 FALSE, /* pc_relative */
1225 complain_overflow_signed, /* complain_on_overflow */
1226 ppc64_elf_toc_reloc, /* special_function */
1227 "R_PPC64_TOC16_DS", /* name */
1228 FALSE, /* partial_inplace */
1230 0xfffc, /* dst_mask */
1231 FALSE), /* pcrel_offset */
1233 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1234 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1236 1, /* size (0 = byte, 1 = short, 2 = long) */
1238 FALSE, /* pc_relative */
1240 complain_overflow_dont, /* complain_on_overflow */
1241 ppc64_elf_toc_reloc, /* special_function */
1242 "R_PPC64_TOC16_LO_DS", /* name */
1243 FALSE, /* partial_inplace */
1245 0xfffc, /* dst_mask */
1246 FALSE), /* pcrel_offset */
1248 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1249 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1250 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1252 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 FALSE, /* pc_relative */
1256 complain_overflow_signed, /* complain_on_overflow */
1257 ppc64_elf_unhandled_reloc, /* special_function */
1258 "R_PPC64_PLTGOT16_DS", /* name */
1259 FALSE, /* partial_inplace */
1261 0xfffc, /* dst_mask */
1262 FALSE), /* pcrel_offset */
1264 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1265 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1266 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1268 1, /* size (0 = byte, 1 = short, 2 = long) */
1270 FALSE, /* pc_relative */
1272 complain_overflow_dont, /* complain_on_overflow */
1273 ppc64_elf_unhandled_reloc, /* special_function */
1274 "R_PPC64_PLTGOT16_LO_DS",/* name */
1275 FALSE, /* partial_inplace */
1277 0xfffc, /* dst_mask */
1278 FALSE), /* pcrel_offset */
1280 /* Marker relocs for TLS. */
1283 2, /* size (0 = byte, 1 = short, 2 = long) */
1285 FALSE, /* pc_relative */
1287 complain_overflow_dont, /* complain_on_overflow */
1288 bfd_elf_generic_reloc, /* special_function */
1289 "R_PPC64_TLS", /* name */
1290 FALSE, /* partial_inplace */
1293 FALSE), /* pcrel_offset */
1295 HOWTO (R_PPC64_TLSGD,
1297 2, /* size (0 = byte, 1 = short, 2 = long) */
1299 FALSE, /* pc_relative */
1301 complain_overflow_dont, /* complain_on_overflow */
1302 bfd_elf_generic_reloc, /* special_function */
1303 "R_PPC64_TLSGD", /* name */
1304 FALSE, /* partial_inplace */
1307 FALSE), /* pcrel_offset */
1309 HOWTO (R_PPC64_TLSLD,
1311 2, /* size (0 = byte, 1 = short, 2 = long) */
1313 FALSE, /* pc_relative */
1315 complain_overflow_dont, /* complain_on_overflow */
1316 bfd_elf_generic_reloc, /* special_function */
1317 "R_PPC64_TLSLD", /* name */
1318 FALSE, /* partial_inplace */
1321 FALSE), /* pcrel_offset */
1323 HOWTO (R_PPC64_TOCSAVE,
1325 2, /* size (0 = byte, 1 = short, 2 = long) */
1327 FALSE, /* pc_relative */
1329 complain_overflow_dont, /* complain_on_overflow */
1330 bfd_elf_generic_reloc, /* special_function */
1331 "R_PPC64_TOCSAVE", /* name */
1332 FALSE, /* partial_inplace */
1335 FALSE), /* pcrel_offset */
1337 /* Computes the load module index of the load module that contains the
1338 definition of its TLS sym. */
1339 HOWTO (R_PPC64_DTPMOD64,
1341 4, /* size (0 = byte, 1 = short, 2 = long) */
1343 FALSE, /* pc_relative */
1345 complain_overflow_dont, /* complain_on_overflow */
1346 ppc64_elf_unhandled_reloc, /* special_function */
1347 "R_PPC64_DTPMOD64", /* name */
1348 FALSE, /* partial_inplace */
1350 ONES (64), /* dst_mask */
1351 FALSE), /* pcrel_offset */
1353 /* Computes a dtv-relative displacement, the difference between the value
1354 of sym+add and the base address of the thread-local storage block that
1355 contains the definition of sym, minus 0x8000. */
1356 HOWTO (R_PPC64_DTPREL64,
1358 4, /* size (0 = byte, 1 = short, 2 = long) */
1360 FALSE, /* pc_relative */
1362 complain_overflow_dont, /* complain_on_overflow */
1363 ppc64_elf_unhandled_reloc, /* special_function */
1364 "R_PPC64_DTPREL64", /* name */
1365 FALSE, /* partial_inplace */
1367 ONES (64), /* dst_mask */
1368 FALSE), /* pcrel_offset */
1370 /* A 16 bit dtprel reloc. */
1371 HOWTO (R_PPC64_DTPREL16,
1373 1, /* size (0 = byte, 1 = short, 2 = long) */
1375 FALSE, /* pc_relative */
1377 complain_overflow_signed, /* complain_on_overflow */
1378 ppc64_elf_unhandled_reloc, /* special_function */
1379 "R_PPC64_DTPREL16", /* name */
1380 FALSE, /* partial_inplace */
1382 0xffff, /* dst_mask */
1383 FALSE), /* pcrel_offset */
1385 /* Like DTPREL16, but no overflow. */
1386 HOWTO (R_PPC64_DTPREL16_LO,
1388 1, /* size (0 = byte, 1 = short, 2 = long) */
1390 FALSE, /* pc_relative */
1392 complain_overflow_dont, /* complain_on_overflow */
1393 ppc64_elf_unhandled_reloc, /* special_function */
1394 "R_PPC64_DTPREL16_LO", /* name */
1395 FALSE, /* partial_inplace */
1397 0xffff, /* dst_mask */
1398 FALSE), /* pcrel_offset */
1400 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1401 HOWTO (R_PPC64_DTPREL16_HI,
1402 16, /* rightshift */
1403 1, /* size (0 = byte, 1 = short, 2 = long) */
1405 FALSE, /* pc_relative */
1407 complain_overflow_signed, /* complain_on_overflow */
1408 ppc64_elf_unhandled_reloc, /* special_function */
1409 "R_PPC64_DTPREL16_HI", /* name */
1410 FALSE, /* partial_inplace */
1412 0xffff, /* dst_mask */
1413 FALSE), /* pcrel_offset */
1415 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1416 HOWTO (R_PPC64_DTPREL16_HA,
1417 16, /* rightshift */
1418 1, /* size (0 = byte, 1 = short, 2 = long) */
1420 FALSE, /* pc_relative */
1422 complain_overflow_signed, /* complain_on_overflow */
1423 ppc64_elf_unhandled_reloc, /* special_function */
1424 "R_PPC64_DTPREL16_HA", /* name */
1425 FALSE, /* partial_inplace */
1427 0xffff, /* dst_mask */
1428 FALSE), /* pcrel_offset */
1430 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1431 HOWTO (R_PPC64_DTPREL16_HIGHER,
1432 32, /* rightshift */
1433 1, /* size (0 = byte, 1 = short, 2 = long) */
1435 FALSE, /* pc_relative */
1437 complain_overflow_dont, /* complain_on_overflow */
1438 ppc64_elf_unhandled_reloc, /* special_function */
1439 "R_PPC64_DTPREL16_HIGHER", /* name */
1440 FALSE, /* partial_inplace */
1442 0xffff, /* dst_mask */
1443 FALSE), /* pcrel_offset */
1445 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1446 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1447 32, /* rightshift */
1448 1, /* size (0 = byte, 1 = short, 2 = long) */
1450 FALSE, /* pc_relative */
1452 complain_overflow_dont, /* complain_on_overflow */
1453 ppc64_elf_unhandled_reloc, /* special_function */
1454 "R_PPC64_DTPREL16_HIGHERA", /* name */
1455 FALSE, /* partial_inplace */
1457 0xffff, /* dst_mask */
1458 FALSE), /* pcrel_offset */
1460 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1461 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1462 48, /* rightshift */
1463 1, /* size (0 = byte, 1 = short, 2 = long) */
1465 FALSE, /* pc_relative */
1467 complain_overflow_dont, /* complain_on_overflow */
1468 ppc64_elf_unhandled_reloc, /* special_function */
1469 "R_PPC64_DTPREL16_HIGHEST", /* name */
1470 FALSE, /* partial_inplace */
1472 0xffff, /* dst_mask */
1473 FALSE), /* pcrel_offset */
1475 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1476 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1477 48, /* rightshift */
1478 1, /* size (0 = byte, 1 = short, 2 = long) */
1480 FALSE, /* pc_relative */
1482 complain_overflow_dont, /* complain_on_overflow */
1483 ppc64_elf_unhandled_reloc, /* special_function */
1484 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1485 FALSE, /* partial_inplace */
1487 0xffff, /* dst_mask */
1488 FALSE), /* pcrel_offset */
1490 /* Like DTPREL16, but for insns with a DS field. */
1491 HOWTO (R_PPC64_DTPREL16_DS,
1493 1, /* size (0 = byte, 1 = short, 2 = long) */
1495 FALSE, /* pc_relative */
1497 complain_overflow_signed, /* complain_on_overflow */
1498 ppc64_elf_unhandled_reloc, /* special_function */
1499 "R_PPC64_DTPREL16_DS", /* name */
1500 FALSE, /* partial_inplace */
1502 0xfffc, /* dst_mask */
1503 FALSE), /* pcrel_offset */
1505 /* Like DTPREL16_DS, but no overflow. */
1506 HOWTO (R_PPC64_DTPREL16_LO_DS,
1508 1, /* size (0 = byte, 1 = short, 2 = long) */
1510 FALSE, /* pc_relative */
1512 complain_overflow_dont, /* complain_on_overflow */
1513 ppc64_elf_unhandled_reloc, /* special_function */
1514 "R_PPC64_DTPREL16_LO_DS", /* name */
1515 FALSE, /* partial_inplace */
1517 0xfffc, /* dst_mask */
1518 FALSE), /* pcrel_offset */
1520 /* Computes a tp-relative displacement, the difference between the value of
1521 sym+add and the value of the thread pointer (r13). */
1522 HOWTO (R_PPC64_TPREL64,
1524 4, /* size (0 = byte, 1 = short, 2 = long) */
1526 FALSE, /* pc_relative */
1528 complain_overflow_dont, /* complain_on_overflow */
1529 ppc64_elf_unhandled_reloc, /* special_function */
1530 "R_PPC64_TPREL64", /* name */
1531 FALSE, /* partial_inplace */
1533 ONES (64), /* dst_mask */
1534 FALSE), /* pcrel_offset */
1536 /* A 16 bit tprel reloc. */
1537 HOWTO (R_PPC64_TPREL16,
1539 1, /* size (0 = byte, 1 = short, 2 = long) */
1541 FALSE, /* pc_relative */
1543 complain_overflow_signed, /* complain_on_overflow */
1544 ppc64_elf_unhandled_reloc, /* special_function */
1545 "R_PPC64_TPREL16", /* name */
1546 FALSE, /* partial_inplace */
1548 0xffff, /* dst_mask */
1549 FALSE), /* pcrel_offset */
1551 /* Like TPREL16, but no overflow. */
1552 HOWTO (R_PPC64_TPREL16_LO,
1554 1, /* size (0 = byte, 1 = short, 2 = long) */
1556 FALSE, /* pc_relative */
1558 complain_overflow_dont, /* complain_on_overflow */
1559 ppc64_elf_unhandled_reloc, /* special_function */
1560 "R_PPC64_TPREL16_LO", /* name */
1561 FALSE, /* partial_inplace */
1563 0xffff, /* dst_mask */
1564 FALSE), /* pcrel_offset */
1566 /* Like TPREL16_LO, but next higher group of 16 bits. */
1567 HOWTO (R_PPC64_TPREL16_HI,
1568 16, /* rightshift */
1569 1, /* size (0 = byte, 1 = short, 2 = long) */
1571 FALSE, /* pc_relative */
1573 complain_overflow_signed, /* complain_on_overflow */
1574 ppc64_elf_unhandled_reloc, /* special_function */
1575 "R_PPC64_TPREL16_HI", /* name */
1576 FALSE, /* partial_inplace */
1578 0xffff, /* dst_mask */
1579 FALSE), /* pcrel_offset */
1581 /* Like TPREL16_HI, but adjust for low 16 bits. */
1582 HOWTO (R_PPC64_TPREL16_HA,
1583 16, /* rightshift */
1584 1, /* size (0 = byte, 1 = short, 2 = long) */
1586 FALSE, /* pc_relative */
1588 complain_overflow_signed, /* complain_on_overflow */
1589 ppc64_elf_unhandled_reloc, /* special_function */
1590 "R_PPC64_TPREL16_HA", /* name */
1591 FALSE, /* partial_inplace */
1593 0xffff, /* dst_mask */
1594 FALSE), /* pcrel_offset */
1596 /* Like TPREL16_HI, but next higher group of 16 bits. */
1597 HOWTO (R_PPC64_TPREL16_HIGHER,
1598 32, /* rightshift */
1599 1, /* size (0 = byte, 1 = short, 2 = long) */
1601 FALSE, /* pc_relative */
1603 complain_overflow_dont, /* complain_on_overflow */
1604 ppc64_elf_unhandled_reloc, /* special_function */
1605 "R_PPC64_TPREL16_HIGHER", /* name */
1606 FALSE, /* partial_inplace */
1608 0xffff, /* dst_mask */
1609 FALSE), /* pcrel_offset */
1611 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1612 HOWTO (R_PPC64_TPREL16_HIGHERA,
1613 32, /* rightshift */
1614 1, /* size (0 = byte, 1 = short, 2 = long) */
1616 FALSE, /* pc_relative */
1618 complain_overflow_dont, /* complain_on_overflow */
1619 ppc64_elf_unhandled_reloc, /* special_function */
1620 "R_PPC64_TPREL16_HIGHERA", /* name */
1621 FALSE, /* partial_inplace */
1623 0xffff, /* dst_mask */
1624 FALSE), /* pcrel_offset */
1626 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1627 HOWTO (R_PPC64_TPREL16_HIGHEST,
1628 48, /* rightshift */
1629 1, /* size (0 = byte, 1 = short, 2 = long) */
1631 FALSE, /* pc_relative */
1633 complain_overflow_dont, /* complain_on_overflow */
1634 ppc64_elf_unhandled_reloc, /* special_function */
1635 "R_PPC64_TPREL16_HIGHEST", /* name */
1636 FALSE, /* partial_inplace */
1638 0xffff, /* dst_mask */
1639 FALSE), /* pcrel_offset */
1641 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1642 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1643 48, /* rightshift */
1644 1, /* size (0 = byte, 1 = short, 2 = long) */
1646 FALSE, /* pc_relative */
1648 complain_overflow_dont, /* complain_on_overflow */
1649 ppc64_elf_unhandled_reloc, /* special_function */
1650 "R_PPC64_TPREL16_HIGHESTA", /* name */
1651 FALSE, /* partial_inplace */
1653 0xffff, /* dst_mask */
1654 FALSE), /* pcrel_offset */
1656 /* Like TPREL16, but for insns with a DS field. */
1657 HOWTO (R_PPC64_TPREL16_DS,
1659 1, /* size (0 = byte, 1 = short, 2 = long) */
1661 FALSE, /* pc_relative */
1663 complain_overflow_signed, /* complain_on_overflow */
1664 ppc64_elf_unhandled_reloc, /* special_function */
1665 "R_PPC64_TPREL16_DS", /* name */
1666 FALSE, /* partial_inplace */
1668 0xfffc, /* dst_mask */
1669 FALSE), /* pcrel_offset */
1671 /* Like TPREL16_DS, but no overflow. */
1672 HOWTO (R_PPC64_TPREL16_LO_DS,
1674 1, /* size (0 = byte, 1 = short, 2 = long) */
1676 FALSE, /* pc_relative */
1678 complain_overflow_dont, /* complain_on_overflow */
1679 ppc64_elf_unhandled_reloc, /* special_function */
1680 "R_PPC64_TPREL16_LO_DS", /* name */
1681 FALSE, /* partial_inplace */
1683 0xfffc, /* dst_mask */
1684 FALSE), /* pcrel_offset */
1686 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1687 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1688 to the first entry relative to the TOC base (r2). */
1689 HOWTO (R_PPC64_GOT_TLSGD16,
1691 1, /* size (0 = byte, 1 = short, 2 = long) */
1693 FALSE, /* pc_relative */
1695 complain_overflow_signed, /* complain_on_overflow */
1696 ppc64_elf_unhandled_reloc, /* special_function */
1697 "R_PPC64_GOT_TLSGD16", /* name */
1698 FALSE, /* partial_inplace */
1700 0xffff, /* dst_mask */
1701 FALSE), /* pcrel_offset */
1703 /* Like GOT_TLSGD16, but no overflow. */
1704 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1706 1, /* size (0 = byte, 1 = short, 2 = long) */
1708 FALSE, /* pc_relative */
1710 complain_overflow_dont, /* complain_on_overflow */
1711 ppc64_elf_unhandled_reloc, /* special_function */
1712 "R_PPC64_GOT_TLSGD16_LO", /* name */
1713 FALSE, /* partial_inplace */
1715 0xffff, /* dst_mask */
1716 FALSE), /* pcrel_offset */
1718 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1719 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1720 16, /* rightshift */
1721 1, /* size (0 = byte, 1 = short, 2 = long) */
1723 FALSE, /* pc_relative */
1725 complain_overflow_signed, /* complain_on_overflow */
1726 ppc64_elf_unhandled_reloc, /* special_function */
1727 "R_PPC64_GOT_TLSGD16_HI", /* name */
1728 FALSE, /* partial_inplace */
1730 0xffff, /* dst_mask */
1731 FALSE), /* pcrel_offset */
1733 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1734 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1735 16, /* rightshift */
1736 1, /* size (0 = byte, 1 = short, 2 = long) */
1738 FALSE, /* pc_relative */
1740 complain_overflow_signed, /* complain_on_overflow */
1741 ppc64_elf_unhandled_reloc, /* special_function */
1742 "R_PPC64_GOT_TLSGD16_HA", /* name */
1743 FALSE, /* partial_inplace */
1745 0xffff, /* dst_mask */
1746 FALSE), /* pcrel_offset */
1748 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1749 with values (sym+add)@dtpmod and zero, and computes the offset to the
1750 first entry relative to the TOC base (r2). */
1751 HOWTO (R_PPC64_GOT_TLSLD16,
1753 1, /* size (0 = byte, 1 = short, 2 = long) */
1755 FALSE, /* pc_relative */
1757 complain_overflow_signed, /* complain_on_overflow */
1758 ppc64_elf_unhandled_reloc, /* special_function */
1759 "R_PPC64_GOT_TLSLD16", /* name */
1760 FALSE, /* partial_inplace */
1762 0xffff, /* dst_mask */
1763 FALSE), /* pcrel_offset */
1765 /* Like GOT_TLSLD16, but no overflow. */
1766 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1768 1, /* size (0 = byte, 1 = short, 2 = long) */
1770 FALSE, /* pc_relative */
1772 complain_overflow_dont, /* complain_on_overflow */
1773 ppc64_elf_unhandled_reloc, /* special_function */
1774 "R_PPC64_GOT_TLSLD16_LO", /* name */
1775 FALSE, /* partial_inplace */
1777 0xffff, /* dst_mask */
1778 FALSE), /* pcrel_offset */
1780 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1781 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1782 16, /* rightshift */
1783 1, /* size (0 = byte, 1 = short, 2 = long) */
1785 FALSE, /* pc_relative */
1787 complain_overflow_signed, /* complain_on_overflow */
1788 ppc64_elf_unhandled_reloc, /* special_function */
1789 "R_PPC64_GOT_TLSLD16_HI", /* name */
1790 FALSE, /* partial_inplace */
1792 0xffff, /* dst_mask */
1793 FALSE), /* pcrel_offset */
1795 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1796 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1797 16, /* rightshift */
1798 1, /* size (0 = byte, 1 = short, 2 = long) */
1800 FALSE, /* pc_relative */
1802 complain_overflow_signed, /* complain_on_overflow */
1803 ppc64_elf_unhandled_reloc, /* special_function */
1804 "R_PPC64_GOT_TLSLD16_HA", /* name */
1805 FALSE, /* partial_inplace */
1807 0xffff, /* dst_mask */
1808 FALSE), /* pcrel_offset */
1810 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1811 the offset to the entry relative to the TOC base (r2). */
1812 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1814 1, /* size (0 = byte, 1 = short, 2 = long) */
1816 FALSE, /* pc_relative */
1818 complain_overflow_signed, /* complain_on_overflow */
1819 ppc64_elf_unhandled_reloc, /* special_function */
1820 "R_PPC64_GOT_DTPREL16_DS", /* name */
1821 FALSE, /* partial_inplace */
1823 0xfffc, /* dst_mask */
1824 FALSE), /* pcrel_offset */
1826 /* Like GOT_DTPREL16_DS, but no overflow. */
1827 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1829 1, /* size (0 = byte, 1 = short, 2 = long) */
1831 FALSE, /* pc_relative */
1833 complain_overflow_dont, /* complain_on_overflow */
1834 ppc64_elf_unhandled_reloc, /* special_function */
1835 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1836 FALSE, /* partial_inplace */
1838 0xfffc, /* dst_mask */
1839 FALSE), /* pcrel_offset */
1841 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1842 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1843 16, /* rightshift */
1844 1, /* size (0 = byte, 1 = short, 2 = long) */
1846 FALSE, /* pc_relative */
1848 complain_overflow_signed, /* complain_on_overflow */
1849 ppc64_elf_unhandled_reloc, /* special_function */
1850 "R_PPC64_GOT_DTPREL16_HI", /* name */
1851 FALSE, /* partial_inplace */
1853 0xffff, /* dst_mask */
1854 FALSE), /* pcrel_offset */
1856 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1857 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1858 16, /* rightshift */
1859 1, /* size (0 = byte, 1 = short, 2 = long) */
1861 FALSE, /* pc_relative */
1863 complain_overflow_signed, /* complain_on_overflow */
1864 ppc64_elf_unhandled_reloc, /* special_function */
1865 "R_PPC64_GOT_DTPREL16_HA", /* name */
1866 FALSE, /* partial_inplace */
1868 0xffff, /* dst_mask */
1869 FALSE), /* pcrel_offset */
1871 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1872 offset to the entry relative to the TOC base (r2). */
1873 HOWTO (R_PPC64_GOT_TPREL16_DS,
1875 1, /* size (0 = byte, 1 = short, 2 = long) */
1877 FALSE, /* pc_relative */
1879 complain_overflow_signed, /* complain_on_overflow */
1880 ppc64_elf_unhandled_reloc, /* special_function */
1881 "R_PPC64_GOT_TPREL16_DS", /* name */
1882 FALSE, /* partial_inplace */
1884 0xfffc, /* dst_mask */
1885 FALSE), /* pcrel_offset */
1887 /* Like GOT_TPREL16_DS, but no overflow. */
1888 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1890 1, /* size (0 = byte, 1 = short, 2 = long) */
1892 FALSE, /* pc_relative */
1894 complain_overflow_dont, /* complain_on_overflow */
1895 ppc64_elf_unhandled_reloc, /* special_function */
1896 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1897 FALSE, /* partial_inplace */
1899 0xfffc, /* dst_mask */
1900 FALSE), /* pcrel_offset */
1902 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1903 HOWTO (R_PPC64_GOT_TPREL16_HI,
1904 16, /* rightshift */
1905 1, /* size (0 = byte, 1 = short, 2 = long) */
1907 FALSE, /* pc_relative */
1909 complain_overflow_signed, /* complain_on_overflow */
1910 ppc64_elf_unhandled_reloc, /* special_function */
1911 "R_PPC64_GOT_TPREL16_HI", /* name */
1912 FALSE, /* partial_inplace */
1914 0xffff, /* dst_mask */
1915 FALSE), /* pcrel_offset */
1917 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1918 HOWTO (R_PPC64_GOT_TPREL16_HA,
1919 16, /* rightshift */
1920 1, /* size (0 = byte, 1 = short, 2 = long) */
1922 FALSE, /* pc_relative */
1924 complain_overflow_signed, /* complain_on_overflow */
1925 ppc64_elf_unhandled_reloc, /* special_function */
1926 "R_PPC64_GOT_TPREL16_HA", /* name */
1927 FALSE, /* partial_inplace */
1929 0xffff, /* dst_mask */
1930 FALSE), /* pcrel_offset */
1932 HOWTO (R_PPC64_JMP_IREL, /* type */
1934 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1936 FALSE, /* pc_relative */
1938 complain_overflow_dont, /* complain_on_overflow */
1939 ppc64_elf_unhandled_reloc, /* special_function */
1940 "R_PPC64_JMP_IREL", /* name */
1941 FALSE, /* partial_inplace */
1944 FALSE), /* pcrel_offset */
1946 HOWTO (R_PPC64_IRELATIVE, /* type */
1948 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1950 FALSE, /* pc_relative */
1952 complain_overflow_dont, /* complain_on_overflow */
1953 bfd_elf_generic_reloc, /* special_function */
1954 "R_PPC64_IRELATIVE", /* name */
1955 FALSE, /* partial_inplace */
1957 ONES (64), /* dst_mask */
1958 FALSE), /* pcrel_offset */
1960 /* A 16 bit relative relocation. */
1961 HOWTO (R_PPC64_REL16, /* type */
1963 1, /* size (0 = byte, 1 = short, 2 = long) */
1965 TRUE, /* pc_relative */
1967 complain_overflow_signed, /* complain_on_overflow */
1968 bfd_elf_generic_reloc, /* special_function */
1969 "R_PPC64_REL16", /* name */
1970 FALSE, /* partial_inplace */
1972 0xffff, /* dst_mask */
1973 TRUE), /* pcrel_offset */
1975 /* A 16 bit relative relocation without overflow. */
1976 HOWTO (R_PPC64_REL16_LO, /* type */
1978 1, /* size (0 = byte, 1 = short, 2 = long) */
1980 TRUE, /* pc_relative */
1982 complain_overflow_dont,/* complain_on_overflow */
1983 bfd_elf_generic_reloc, /* special_function */
1984 "R_PPC64_REL16_LO", /* name */
1985 FALSE, /* partial_inplace */
1987 0xffff, /* dst_mask */
1988 TRUE), /* pcrel_offset */
1990 /* The high order 16 bits of a relative address. */
1991 HOWTO (R_PPC64_REL16_HI, /* type */
1992 16, /* rightshift */
1993 1, /* size (0 = byte, 1 = short, 2 = long) */
1995 TRUE, /* pc_relative */
1997 complain_overflow_signed, /* complain_on_overflow */
1998 bfd_elf_generic_reloc, /* special_function */
1999 "R_PPC64_REL16_HI", /* name */
2000 FALSE, /* partial_inplace */
2002 0xffff, /* dst_mask */
2003 TRUE), /* pcrel_offset */
2005 /* The high order 16 bits of a relative address, plus 1 if the contents of
2006 the low 16 bits, treated as a signed number, is negative. */
2007 HOWTO (R_PPC64_REL16_HA, /* type */
2008 16, /* rightshift */
2009 1, /* size (0 = byte, 1 = short, 2 = long) */
2011 TRUE, /* pc_relative */
2013 complain_overflow_signed, /* complain_on_overflow */
2014 ppc64_elf_ha_reloc, /* special_function */
2015 "R_PPC64_REL16_HA", /* name */
2016 FALSE, /* partial_inplace */
2018 0xffff, /* dst_mask */
2019 TRUE), /* pcrel_offset */
2021 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2022 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2023 16, /* rightshift */
2024 1, /* size (0 = byte, 1 = short, 2 = long) */
2026 FALSE, /* pc_relative */
2028 complain_overflow_dont, /* complain_on_overflow */
2029 bfd_elf_generic_reloc, /* special_function */
2030 "R_PPC64_ADDR16_HIGH", /* name */
2031 FALSE, /* partial_inplace */
2033 0xffff, /* dst_mask */
2034 FALSE), /* pcrel_offset */
2036 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2037 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2038 16, /* rightshift */
2039 1, /* size (0 = byte, 1 = short, 2 = long) */
2041 FALSE, /* pc_relative */
2043 complain_overflow_dont, /* complain_on_overflow */
2044 ppc64_elf_ha_reloc, /* special_function */
2045 "R_PPC64_ADDR16_HIGHA", /* name */
2046 FALSE, /* partial_inplace */
2048 0xffff, /* dst_mask */
2049 FALSE), /* pcrel_offset */
2051 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2052 HOWTO (R_PPC64_DTPREL16_HIGH,
2053 16, /* rightshift */
2054 1, /* size (0 = byte, 1 = short, 2 = long) */
2056 FALSE, /* pc_relative */
2058 complain_overflow_dont, /* complain_on_overflow */
2059 ppc64_elf_unhandled_reloc, /* special_function */
2060 "R_PPC64_DTPREL16_HIGH", /* name */
2061 FALSE, /* partial_inplace */
2063 0xffff, /* dst_mask */
2064 FALSE), /* pcrel_offset */
2066 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2067 HOWTO (R_PPC64_DTPREL16_HIGHA,
2068 16, /* rightshift */
2069 1, /* size (0 = byte, 1 = short, 2 = long) */
2071 FALSE, /* pc_relative */
2073 complain_overflow_dont, /* complain_on_overflow */
2074 ppc64_elf_unhandled_reloc, /* special_function */
2075 "R_PPC64_DTPREL16_HIGHA", /* name */
2076 FALSE, /* partial_inplace */
2078 0xffff, /* dst_mask */
2079 FALSE), /* pcrel_offset */
2081 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2082 HOWTO (R_PPC64_TPREL16_HIGH,
2083 16, /* rightshift */
2084 1, /* size (0 = byte, 1 = short, 2 = long) */
2086 FALSE, /* pc_relative */
2088 complain_overflow_dont, /* complain_on_overflow */
2089 ppc64_elf_unhandled_reloc, /* special_function */
2090 "R_PPC64_TPREL16_HIGH", /* name */
2091 FALSE, /* partial_inplace */
2093 0xffff, /* dst_mask */
2094 FALSE), /* pcrel_offset */
2096 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2097 HOWTO (R_PPC64_TPREL16_HIGHA,
2098 16, /* rightshift */
2099 1, /* size (0 = byte, 1 = short, 2 = long) */
2101 FALSE, /* pc_relative */
2103 complain_overflow_dont, /* complain_on_overflow */
2104 ppc64_elf_unhandled_reloc, /* special_function */
2105 "R_PPC64_TPREL16_HIGHA", /* name */
2106 FALSE, /* partial_inplace */
2108 0xffff, /* dst_mask */
2109 FALSE), /* pcrel_offset */
2111 /* Like ADDR64, but use local entry point of function. */
2112 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2114 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2116 FALSE, /* pc_relative */
2118 complain_overflow_dont, /* complain_on_overflow */
2119 bfd_elf_generic_reloc, /* special_function */
2120 "R_PPC64_ADDR64_LOCAL", /* name */
2121 FALSE, /* partial_inplace */
2123 ONES (64), /* dst_mask */
2124 FALSE), /* pcrel_offset */
2126 /* GNU extension to record C++ vtable hierarchy. */
2127 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2129 0, /* size (0 = byte, 1 = short, 2 = long) */
2131 FALSE, /* pc_relative */
2133 complain_overflow_dont, /* complain_on_overflow */
2134 NULL, /* special_function */
2135 "R_PPC64_GNU_VTINHERIT", /* name */
2136 FALSE, /* partial_inplace */
2139 FALSE), /* pcrel_offset */
2141 /* GNU extension to record C++ vtable member usage. */
2142 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2144 0, /* size (0 = byte, 1 = short, 2 = long) */
2146 FALSE, /* pc_relative */
2148 complain_overflow_dont, /* complain_on_overflow */
2149 NULL, /* special_function */
2150 "R_PPC64_GNU_VTENTRY", /* name */
2151 FALSE, /* partial_inplace */
2154 FALSE), /* pcrel_offset */
2158 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
2162 ppc_howto_init (void)
2164 unsigned int i, type;
2167 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
2170 type = ppc64_elf_howto_raw[i].type;
2171 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2172 / sizeof (ppc64_elf_howto_table[0])));
2173 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2177 static reloc_howto_type *
2178 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2179 bfd_reloc_code_real_type code)
2181 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
2183 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2184 /* Initialize howto table if needed. */
2192 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2194 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2196 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2198 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2200 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2202 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2204 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2206 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
2208 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2210 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
2212 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
2214 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
2216 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
2218 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
2220 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
2222 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
2224 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
2226 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
2228 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
2230 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
2232 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
2234 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
2236 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
2238 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
2240 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
2242 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
2244 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
2246 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
2248 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
2250 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
2252 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
2254 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
2256 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
2258 case BFD_RELOC_64: r = R_PPC64_ADDR64;
2260 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
2262 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
2264 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
2266 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
2268 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
2270 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
2272 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
2274 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
2276 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
2278 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
2280 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
2282 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2284 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2286 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2288 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2290 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2292 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2294 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2296 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2298 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2300 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2302 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2304 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2306 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2308 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2310 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2312 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2314 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2316 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2318 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2320 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2322 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2324 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2326 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2328 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2330 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2332 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2334 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2336 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2338 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2340 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2342 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2344 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2346 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2348 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2350 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2352 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2354 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2356 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2358 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2360 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2362 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2364 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2366 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2368 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2370 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2372 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2374 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2376 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2378 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2380 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2382 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2384 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2386 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2388 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2390 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2392 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2394 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2396 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2398 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2400 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2402 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2404 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2406 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2408 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2410 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2412 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2414 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2416 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2418 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2422 return ppc64_elf_howto_table[r];
2425 static reloc_howto_type *
2426 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2432 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
2434 if (ppc64_elf_howto_raw[i].name != NULL
2435 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2436 return &ppc64_elf_howto_raw[i];
2441 /* Set the howto pointer for a PowerPC ELF reloc. */
2444 ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2445 Elf_Internal_Rela *dst)
2449 /* Initialize howto table if needed. */
2450 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2453 type = ELF64_R_TYPE (dst->r_info);
2454 if (type >= (sizeof (ppc64_elf_howto_table)
2455 / sizeof (ppc64_elf_howto_table[0])))
2457 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
2459 type = R_PPC64_NONE;
2461 cache_ptr->howto = ppc64_elf_howto_table[type];
2464 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2466 static bfd_reloc_status_type
2467 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2468 void *data, asection *input_section,
2469 bfd *output_bfd, char **error_message)
2471 /* If this is a relocatable link (output_bfd test tells us), just
2472 call the generic function. Any adjustment will be done at final
2474 if (output_bfd != NULL)
2475 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2476 input_section, output_bfd, error_message);
2478 /* Adjust the addend for sign extension of the low 16 bits.
2479 We won't actually be using the low 16 bits, so trashing them
2481 reloc_entry->addend += 0x8000;
2482 return bfd_reloc_continue;
2485 static bfd_reloc_status_type
2486 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2487 void *data, asection *input_section,
2488 bfd *output_bfd, char **error_message)
2490 if (output_bfd != NULL)
2491 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2492 input_section, output_bfd, error_message);
2494 if (strcmp (symbol->section->name, ".opd") == 0
2495 && (symbol->section->owner->flags & DYNAMIC) == 0)
2497 bfd_vma dest = opd_entry_value (symbol->section,
2498 symbol->value + reloc_entry->addend,
2500 if (dest != (bfd_vma) -1)
2501 reloc_entry->addend = dest - (symbol->value
2502 + symbol->section->output_section->vma
2503 + symbol->section->output_offset);
2507 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2509 if (symbol->section->owner != abfd
2510 && abiversion (symbol->section->owner) >= 2)
2514 for (i = 0; i < symbol->section->owner->symcount; ++i)
2516 asymbol *symdef = symbol->section->owner->outsymbols[i];
2518 if (strcmp (symdef->name, symbol->name) == 0)
2520 elfsym = (elf_symbol_type *) symdef;
2526 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2528 return bfd_reloc_continue;
2531 static bfd_reloc_status_type
2532 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2533 void *data, asection *input_section,
2534 bfd *output_bfd, char **error_message)
2537 enum elf_ppc64_reloc_type r_type;
2538 bfd_size_type octets;
2539 /* Assume 'at' branch hints. */
2540 bfd_boolean is_isa_v2 = TRUE;
2542 /* If this is a relocatable link (output_bfd test tells us), just
2543 call the generic function. Any adjustment will be done at final
2545 if (output_bfd != NULL)
2546 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2547 input_section, output_bfd, error_message);
2549 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2550 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2551 insn &= ~(0x01 << 21);
2552 r_type = reloc_entry->howto->type;
2553 if (r_type == R_PPC64_ADDR14_BRTAKEN
2554 || r_type == R_PPC64_REL14_BRTAKEN)
2555 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2559 /* Set 'a' bit. This is 0b00010 in BO field for branch
2560 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2561 for branch on CTR insns (BO == 1a00t or 1a01t). */
2562 if ((insn & (0x14 << 21)) == (0x04 << 21))
2564 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2574 if (!bfd_is_com_section (symbol->section))
2575 target = symbol->value;
2576 target += symbol->section->output_section->vma;
2577 target += symbol->section->output_offset;
2578 target += reloc_entry->addend;
2580 from = (reloc_entry->address
2581 + input_section->output_offset
2582 + input_section->output_section->vma);
2584 /* Invert 'y' bit if not the default. */
2585 if ((bfd_signed_vma) (target - from) < 0)
2588 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2590 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2591 input_section, output_bfd, error_message);
2594 static bfd_reloc_status_type
2595 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2596 void *data, asection *input_section,
2597 bfd *output_bfd, char **error_message)
2599 /* If this is a relocatable link (output_bfd test tells us), just
2600 call the generic function. Any adjustment will be done at final
2602 if (output_bfd != NULL)
2603 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2604 input_section, output_bfd, error_message);
2606 /* Subtract the symbol section base address. */
2607 reloc_entry->addend -= symbol->section->output_section->vma;
2608 return bfd_reloc_continue;
2611 static bfd_reloc_status_type
2612 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2613 void *data, asection *input_section,
2614 bfd *output_bfd, char **error_message)
2616 /* If this is a relocatable link (output_bfd test tells us), just
2617 call the generic function. Any adjustment will be done at final
2619 if (output_bfd != NULL)
2620 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2621 input_section, output_bfd, error_message);
2623 /* Subtract the symbol section base address. */
2624 reloc_entry->addend -= symbol->section->output_section->vma;
2626 /* Adjust the addend for sign extension of the low 16 bits. */
2627 reloc_entry->addend += 0x8000;
2628 return bfd_reloc_continue;
2631 static bfd_reloc_status_type
2632 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2633 void *data, asection *input_section,
2634 bfd *output_bfd, char **error_message)
2638 /* If this is a relocatable link (output_bfd test tells us), just
2639 call the generic function. Any adjustment will be done at final
2641 if (output_bfd != NULL)
2642 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2643 input_section, output_bfd, error_message);
2645 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2647 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2649 /* Subtract the TOC base address. */
2650 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2651 return bfd_reloc_continue;
2654 static bfd_reloc_status_type
2655 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2656 void *data, asection *input_section,
2657 bfd *output_bfd, char **error_message)
2661 /* If this is a relocatable link (output_bfd test tells us), just
2662 call the generic function. Any adjustment will be done at final
2664 if (output_bfd != NULL)
2665 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2666 input_section, output_bfd, error_message);
2668 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2670 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2672 /* Subtract the TOC base address. */
2673 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2675 /* Adjust the addend for sign extension of the low 16 bits. */
2676 reloc_entry->addend += 0x8000;
2677 return bfd_reloc_continue;
2680 static bfd_reloc_status_type
2681 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2682 void *data, asection *input_section,
2683 bfd *output_bfd, char **error_message)
2686 bfd_size_type octets;
2688 /* If this is a relocatable link (output_bfd test tells us), just
2689 call the generic function. Any adjustment will be done at final
2691 if (output_bfd != NULL)
2692 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2693 input_section, output_bfd, error_message);
2695 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2697 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2699 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2700 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2701 return bfd_reloc_ok;
2704 static bfd_reloc_status_type
2705 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2706 void *data, asection *input_section,
2707 bfd *output_bfd, char **error_message)
2709 /* If this is a relocatable link (output_bfd test tells us), just
2710 call the generic function. Any adjustment will be done at final
2712 if (output_bfd != NULL)
2713 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2714 input_section, output_bfd, error_message);
2716 if (error_message != NULL)
2718 static char buf[60];
2719 sprintf (buf, "generic linker can't handle %s",
2720 reloc_entry->howto->name);
2721 *error_message = buf;
2723 return bfd_reloc_dangerous;
2726 /* Track GOT entries needed for a given symbol. We might need more
2727 than one got entry per symbol. */
2730 struct got_entry *next;
2732 /* The symbol addend that we'll be placing in the GOT. */
2735 /* Unlike other ELF targets, we use separate GOT entries for the same
2736 symbol referenced from different input files. This is to support
2737 automatic multiple TOC/GOT sections, where the TOC base can vary
2738 from one input file to another. After partitioning into TOC groups
2739 we merge entries within the group.
2741 Point to the BFD owning this GOT entry. */
2744 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2745 TLS_TPREL or TLS_DTPREL for tls entries. */
2746 unsigned char tls_type;
2748 /* Non-zero if got.ent points to real entry. */
2749 unsigned char is_indirect;
2751 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2754 bfd_signed_vma refcount;
2756 struct got_entry *ent;
2760 /* The same for PLT. */
2763 struct plt_entry *next;
2769 bfd_signed_vma refcount;
2774 struct ppc64_elf_obj_tdata
2776 struct elf_obj_tdata elf;
2778 /* Shortcuts to dynamic linker sections. */
2782 /* Used during garbage collection. We attach global symbols defined
2783 on removed .opd entries to this section so that the sym is removed. */
2784 asection *deleted_section;
2786 /* TLS local dynamic got entry handling. Support for multiple GOT
2787 sections means we potentially need one of these for each input bfd. */
2788 struct got_entry tlsld_got;
2791 /* A copy of relocs before they are modified for --emit-relocs. */
2792 Elf_Internal_Rela *relocs;
2794 /* Section contents. */
2798 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2799 the reloc to be in the range -32768 to 32767. */
2800 unsigned int has_small_toc_reloc : 1;
2802 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2803 instruction not one we handle. */
2804 unsigned int unexpected_toc_insn : 1;
2807 #define ppc64_elf_tdata(bfd) \
2808 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2810 #define ppc64_tlsld_got(bfd) \
2811 (&ppc64_elf_tdata (bfd)->tlsld_got)
2813 #define is_ppc64_elf(bfd) \
2814 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2815 && elf_object_id (bfd) == PPC64_ELF_DATA)
2817 /* Override the generic function because we store some extras. */
2820 ppc64_elf_mkobject (bfd *abfd)
2822 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
2826 /* Fix bad default arch selected for a 64 bit input bfd when the
2827 default is 32 bit. */
2830 ppc64_elf_object_p (bfd *abfd)
2832 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2834 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2836 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2838 /* Relies on arch after 32 bit default being 64 bit default. */
2839 abfd->arch_info = abfd->arch_info->next;
2840 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2846 /* Support for core dump NOTE sections. */
2849 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2851 size_t offset, size;
2853 if (note->descsz != 504)
2857 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2860 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
2866 /* Make a ".reg/999" section. */
2867 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2868 size, note->descpos + offset);
2872 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2874 if (note->descsz != 136)
2877 elf_tdata (abfd)->core->pid
2878 = bfd_get_32 (abfd, note->descdata + 24);
2879 elf_tdata (abfd)->core->program
2880 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2881 elf_tdata (abfd)->core->command
2882 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2888 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2901 va_start (ap, note_type);
2902 memset (data, 0, sizeof (data));
2903 strncpy (data + 40, va_arg (ap, const char *), 16);
2904 strncpy (data + 56, va_arg (ap, const char *), 80);
2906 return elfcore_write_note (abfd, buf, bufsiz,
2907 "CORE", note_type, data, sizeof (data));
2918 va_start (ap, note_type);
2919 memset (data, 0, 112);
2920 pid = va_arg (ap, long);
2921 bfd_put_32 (abfd, pid, data + 32);
2922 cursig = va_arg (ap, int);
2923 bfd_put_16 (abfd, cursig, data + 12);
2924 greg = va_arg (ap, const void *);
2925 memcpy (data + 112, greg, 384);
2926 memset (data + 496, 0, 8);
2928 return elfcore_write_note (abfd, buf, bufsiz,
2929 "CORE", note_type, data, sizeof (data));
2934 /* Add extra PPC sections. */
2936 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
2938 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
2939 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2940 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2941 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2942 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2943 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2944 { NULL, 0, 0, 0, 0 }
2947 enum _ppc64_sec_type {
2953 struct _ppc64_elf_section_data
2955 struct bfd_elf_section_data elf;
2959 /* An array with one entry for each opd function descriptor,
2960 and some spares since opd entries may be either 16 or 24 bytes. */
2961 #define OPD_NDX(OFF) ((OFF) >> 4)
2962 struct _opd_sec_data
2964 /* Points to the function code section for local opd entries. */
2965 asection **func_sec;
2967 /* After editing .opd, adjust references to opd local syms. */
2971 /* An array for toc sections, indexed by offset/8. */
2972 struct _toc_sec_data
2974 /* Specifies the relocation symbol index used at a given toc offset. */
2977 /* And the relocation addend. */
2982 enum _ppc64_sec_type sec_type:2;
2984 /* Flag set when small branches are detected. Used to
2985 select suitable defaults for the stub group size. */
2986 unsigned int has_14bit_branch:1;
2989 #define ppc64_elf_section_data(sec) \
2990 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2993 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2995 if (!sec->used_by_bfd)
2997 struct _ppc64_elf_section_data *sdata;
2998 bfd_size_type amt = sizeof (*sdata);
3000 sdata = bfd_zalloc (abfd, amt);
3003 sec->used_by_bfd = sdata;
3006 return _bfd_elf_new_section_hook (abfd, sec);
3009 static struct _opd_sec_data *
3010 get_opd_info (asection * sec)
3013 && ppc64_elf_section_data (sec) != NULL
3014 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
3015 return &ppc64_elf_section_data (sec)->u.opd;
3019 /* Parameters for the qsort hook. */
3020 static bfd_boolean synthetic_relocatable;
3022 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3025 compare_symbols (const void *ap, const void *bp)
3027 const asymbol *a = * (const asymbol **) ap;
3028 const asymbol *b = * (const asymbol **) bp;
3030 /* Section symbols first. */
3031 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
3033 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
3036 /* then .opd symbols. */
3037 if (strcmp (a->section->name, ".opd") == 0
3038 && strcmp (b->section->name, ".opd") != 0)
3040 if (strcmp (a->section->name, ".opd") != 0
3041 && strcmp (b->section->name, ".opd") == 0)
3044 /* then other code symbols. */
3045 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3046 == (SEC_CODE | SEC_ALLOC)
3047 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3048 != (SEC_CODE | SEC_ALLOC))
3051 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3052 != (SEC_CODE | SEC_ALLOC)
3053 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3054 == (SEC_CODE | SEC_ALLOC))
3057 if (synthetic_relocatable)
3059 if (a->section->id < b->section->id)
3062 if (a->section->id > b->section->id)
3066 if (a->value + a->section->vma < b->value + b->section->vma)
3069 if (a->value + a->section->vma > b->value + b->section->vma)
3072 /* For syms with the same value, prefer strong dynamic global function
3073 syms over other syms. */
3074 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3077 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3080 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3083 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3086 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3089 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3092 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3095 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3101 /* Search SYMS for a symbol of the given VALUE. */
3104 sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
3108 if (id == (unsigned) -1)
3112 mid = (lo + hi) >> 1;
3113 if (syms[mid]->value + syms[mid]->section->vma < value)
3115 else if (syms[mid]->value + syms[mid]->section->vma > value)
3125 mid = (lo + hi) >> 1;
3126 if (syms[mid]->section->id < id)
3128 else if (syms[mid]->section->id > id)
3130 else if (syms[mid]->value < value)
3132 else if (syms[mid]->value > value)
3142 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3144 bfd_vma vma = *(bfd_vma *) ptr;
3145 return ((section->flags & SEC_ALLOC) != 0
3146 && section->vma <= vma
3147 && vma < section->vma + section->size);
3150 /* Create synthetic symbols, effectively restoring "dot-symbol" function
3151 entry syms. Also generate @plt symbols for the glink branch table.
3152 Returns count of synthetic symbols in RET or -1 on error. */
3155 ppc64_elf_get_synthetic_symtab (bfd *abfd,
3156 long static_count, asymbol **static_syms,
3157 long dyn_count, asymbol **dyn_syms,
3164 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
3165 asection *opd = NULL;
3166 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
3168 int abi = abiversion (abfd);
3174 opd = bfd_get_section_by_name (abfd, ".opd");
3175 if (opd == NULL && abi == 1)
3179 symcount = static_count;
3181 symcount += dyn_count;
3185 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3189 if (!relocatable && static_count != 0 && dyn_count != 0)
3191 /* Use both symbol tables. */
3192 memcpy (syms, static_syms, static_count * sizeof (*syms));
3193 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3195 else if (!relocatable && static_count == 0)
3196 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3198 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3200 synthetic_relocatable = relocatable;
3201 qsort (syms, symcount, sizeof (*syms), compare_symbols);
3203 if (!relocatable && symcount > 1)
3206 /* Trim duplicate syms, since we may have merged the normal and
3207 dynamic symbols. Actually, we only care about syms that have
3208 different values, so trim any with the same value. */
3209 for (i = 1, j = 1; i < symcount; ++i)
3210 if (syms[i - 1]->value + syms[i - 1]->section->vma
3211 != syms[i]->value + syms[i]->section->vma)
3212 syms[j++] = syms[i];
3217 if (strcmp (syms[i]->section->name, ".opd") == 0)
3221 for (; i < symcount; ++i)
3222 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3223 != (SEC_CODE | SEC_ALLOC))
3224 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3228 for (; i < symcount; ++i)
3229 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3233 for (; i < symcount; ++i)
3234 if (strcmp (syms[i]->section->name, ".opd") != 0)
3238 for (; i < symcount; ++i)
3239 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3240 != (SEC_CODE | SEC_ALLOC))
3248 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3253 if (opdsymend == secsymend)
3256 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3257 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
3261 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3268 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3272 while (r < opd->relocation + relcount
3273 && r->address < syms[i]->value + opd->vma)
3276 if (r == opd->relocation + relcount)
3279 if (r->address != syms[i]->value + opd->vma)
3282 if (r->howto->type != R_PPC64_ADDR64)
3285 sym = *r->sym_ptr_ptr;
3286 if (!sym_exists_at (syms, opdsymend, symcount,
3287 sym->section->id, sym->value + r->addend))
3290 size += sizeof (asymbol);
3291 size += strlen (syms[i]->name) + 2;
3297 s = *ret = bfd_malloc (size);
3304 names = (char *) (s + count);
3306 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3310 while (r < opd->relocation + relcount
3311 && r->address < syms[i]->value + opd->vma)
3314 if (r == opd->relocation + relcount)
3317 if (r->address != syms[i]->value + opd->vma)
3320 if (r->howto->type != R_PPC64_ADDR64)
3323 sym = *r->sym_ptr_ptr;
3324 if (!sym_exists_at (syms, opdsymend, symcount,
3325 sym->section->id, sym->value + r->addend))
3330 s->flags |= BSF_SYNTHETIC;
3331 s->section = sym->section;
3332 s->value = sym->value + r->addend;
3335 len = strlen (syms[i]->name);
3336 memcpy (names, syms[i]->name, len + 1);
3338 /* Have udata.p point back to the original symbol this
3339 synthetic symbol was derived from. */
3340 s->udata.p = syms[i];
3347 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3348 bfd_byte *contents = NULL;
3351 bfd_vma glink_vma = 0, resolv_vma = 0;
3352 asection *dynamic, *glink = NULL, *relplt = NULL;
3355 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
3357 free_contents_and_exit_err:
3359 free_contents_and_exit:
3366 for (i = secsymend; i < opdsymend; ++i)
3370 /* Ignore bogus symbols. */
3371 if (syms[i]->value > opd->size - 8)
3374 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3375 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3378 size += sizeof (asymbol);
3379 size += strlen (syms[i]->name) + 2;
3383 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3385 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
3387 bfd_byte *dynbuf, *extdyn, *extdynend;
3389 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3391 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
3392 goto free_contents_and_exit_err;
3394 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3395 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3398 extdynend = extdyn + dynamic->size;
3399 for (; extdyn < extdynend; extdyn += extdynsize)
3401 Elf_Internal_Dyn dyn;
3402 (*swap_dyn_in) (abfd, extdyn, &dyn);
3404 if (dyn.d_tag == DT_NULL)
3407 if (dyn.d_tag == DT_PPC64_GLINK)
3409 /* The first glink stub starts at offset 32; see
3410 comment in ppc64_elf_finish_dynamic_sections. */
3411 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
3412 /* The .glink section usually does not survive the final
3413 link; search for the section (usually .text) where the
3414 glink stubs now reside. */
3415 glink = bfd_sections_find_if (abfd, section_covers_vma,
3426 /* Determine __glink trampoline by reading the relative branch
3427 from the first glink stub. */
3429 unsigned int off = 0;
3431 while (bfd_get_section_contents (abfd, glink, buf,
3432 glink_vma + off - glink->vma, 4))
3434 unsigned int insn = bfd_get_32 (abfd, buf);
3436 if ((insn & ~0x3fffffc) == 0)
3438 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3447 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3449 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3452 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3453 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
3454 goto free_contents_and_exit_err;
3456 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3457 size += plt_count * sizeof (asymbol);
3459 p = relplt->relocation;
3460 for (i = 0; i < plt_count; i++, p++)
3462 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3464 size += sizeof ("+0x") - 1 + 16;
3470 goto free_contents_and_exit;
3471 s = *ret = bfd_malloc (size);
3473 goto free_contents_and_exit_err;
3475 names = (char *) (s + count + plt_count + (resolv_vma != 0));
3477 for (i = secsymend; i < opdsymend; ++i)
3481 if (syms[i]->value > opd->size - 8)
3484 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3485 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3489 asection *sec = abfd->sections;
3496 long mid = (lo + hi) >> 1;
3497 if (syms[mid]->section->vma < ent)
3499 else if (syms[mid]->section->vma > ent)
3503 sec = syms[mid]->section;
3508 if (lo >= hi && lo > codesecsym)
3509 sec = syms[lo - 1]->section;
3511 for (; sec != NULL; sec = sec->next)
3515 /* SEC_LOAD may not be set if SEC is from a separate debug
3517 if ((sec->flags & SEC_ALLOC) == 0)
3519 if ((sec->flags & SEC_CODE) != 0)
3522 s->flags |= BSF_SYNTHETIC;
3523 s->value = ent - s->section->vma;
3526 len = strlen (syms[i]->name);
3527 memcpy (names, syms[i]->name, len + 1);
3529 /* Have udata.p point back to the original symbol this
3530 synthetic symbol was derived from. */
3531 s->udata.p = syms[i];
3537 if (glink != NULL && relplt != NULL)
3541 /* Add a symbol for the main glink trampoline. */
3542 memset (s, 0, sizeof *s);
3544 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3546 s->value = resolv_vma - glink->vma;
3548 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3549 names += sizeof ("__glink_PLTresolve");
3554 /* FIXME: It would be very much nicer to put sym@plt on the
3555 stub rather than on the glink branch table entry. The
3556 objdump disassembler would then use a sensible symbol
3557 name on plt calls. The difficulty in doing so is
3558 a) finding the stubs, and,
3559 b) matching stubs against plt entries, and,
3560 c) there can be multiple stubs for a given plt entry.
3562 Solving (a) could be done by code scanning, but older
3563 ppc64 binaries used different stubs to current code.
3564 (b) is the tricky one since you need to known the toc
3565 pointer for at least one function that uses a pic stub to
3566 be able to calculate the plt address referenced.
3567 (c) means gdb would need to set multiple breakpoints (or
3568 find the glink branch itself) when setting breakpoints
3569 for pending shared library loads. */
3570 p = relplt->relocation;
3571 for (i = 0; i < plt_count; i++, p++)
3575 *s = **p->sym_ptr_ptr;
3576 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3577 we are defining a symbol, ensure one of them is set. */
3578 if ((s->flags & BSF_LOCAL) == 0)
3579 s->flags |= BSF_GLOBAL;
3580 s->flags |= BSF_SYNTHETIC;
3582 s->value = glink_vma - glink->vma;
3585 len = strlen ((*p->sym_ptr_ptr)->name);
3586 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3590 memcpy (names, "+0x", sizeof ("+0x") - 1);
3591 names += sizeof ("+0x") - 1;
3592 bfd_sprintf_vma (abfd, names, p->addend);
3593 names += strlen (names);
3595 memcpy (names, "@plt", sizeof ("@plt"));
3596 names += sizeof ("@plt");
3616 /* The following functions are specific to the ELF linker, while
3617 functions above are used generally. Those named ppc64_elf_* are
3618 called by the main ELF linker code. They appear in this file more
3619 or less in the order in which they are called. eg.
3620 ppc64_elf_check_relocs is called early in the link process,
3621 ppc64_elf_finish_dynamic_sections is one of the last functions
3624 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3625 functions have both a function code symbol and a function descriptor
3626 symbol. A call to foo in a relocatable object file looks like:
3633 The function definition in another object file might be:
3637 . .quad .TOC.@tocbase
3643 When the linker resolves the call during a static link, the branch
3644 unsurprisingly just goes to .foo and the .opd information is unused.
3645 If the function definition is in a shared library, things are a little
3646 different: The call goes via a plt call stub, the opd information gets
3647 copied to the plt, and the linker patches the nop.
3655 . std 2,40(1) # in practice, the call stub
3656 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3657 . addi 11,11,Lfoo@toc@l # this is the general idea
3665 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3667 The "reloc ()" notation is supposed to indicate that the linker emits
3668 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3671 What are the difficulties here? Well, firstly, the relocations
3672 examined by the linker in check_relocs are against the function code
3673 sym .foo, while the dynamic relocation in the plt is emitted against
3674 the function descriptor symbol, foo. Somewhere along the line, we need
3675 to carefully copy dynamic link information from one symbol to the other.
3676 Secondly, the generic part of the elf linker will make .foo a dynamic
3677 symbol as is normal for most other backends. We need foo dynamic
3678 instead, at least for an application final link. However, when
3679 creating a shared library containing foo, we need to have both symbols
3680 dynamic so that references to .foo are satisfied during the early
3681 stages of linking. Otherwise the linker might decide to pull in a
3682 definition from some other object, eg. a static library.
3684 Update: As of August 2004, we support a new convention. Function
3685 calls may use the function descriptor symbol, ie. "bl foo". This
3686 behaves exactly as "bl .foo". */
3688 /* Of those relocs that might be copied as dynamic relocs, this function
3689 selects those that must be copied when linking a shared library,
3690 even when the symbol is local. */
3693 must_be_dyn_reloc (struct bfd_link_info *info,
3694 enum elf_ppc64_reloc_type r_type)
3706 case R_PPC64_TPREL16:
3707 case R_PPC64_TPREL16_LO:
3708 case R_PPC64_TPREL16_HI:
3709 case R_PPC64_TPREL16_HA:
3710 case R_PPC64_TPREL16_DS:
3711 case R_PPC64_TPREL16_LO_DS:
3712 case R_PPC64_TPREL16_HIGH:
3713 case R_PPC64_TPREL16_HIGHA:
3714 case R_PPC64_TPREL16_HIGHER:
3715 case R_PPC64_TPREL16_HIGHERA:
3716 case R_PPC64_TPREL16_HIGHEST:
3717 case R_PPC64_TPREL16_HIGHESTA:
3718 case R_PPC64_TPREL64:
3719 return !bfd_link_executable (info);
3723 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3724 copying dynamic variables from a shared lib into an app's dynbss
3725 section, and instead use a dynamic relocation to point into the
3726 shared lib. With code that gcc generates, it's vital that this be
3727 enabled; In the PowerPC64 ABI, the address of a function is actually
3728 the address of a function descriptor, which resides in the .opd
3729 section. gcc uses the descriptor directly rather than going via the
3730 GOT as some other ABI's do, which means that initialized function
3731 pointers must reference the descriptor. Thus, a function pointer
3732 initialized to the address of a function in a shared library will
3733 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3734 redefines the function descriptor symbol to point to the copy. This
3735 presents a problem as a plt entry for that function is also
3736 initialized from the function descriptor symbol and the copy reloc
3737 may not be initialized first. */
3738 #define ELIMINATE_COPY_RELOCS 1
3740 /* Section name for stubs is the associated section name plus this
3742 #define STUB_SUFFIX ".stub"
3745 ppc_stub_long_branch:
3746 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3747 destination, but a 24 bit branch in a stub section will reach.
3750 ppc_stub_plt_branch:
3751 Similar to the above, but a 24 bit branch in the stub section won't
3752 reach its destination.
3753 . addis %r11,%r2,xxx@toc@ha
3754 . ld %r12,xxx@toc@l(%r11)
3759 Used to call a function in a shared library. If it so happens that
3760 the plt entry referenced crosses a 64k boundary, then an extra
3761 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3763 . addis %r11,%r2,xxx@toc@ha
3764 . ld %r12,xxx+0@toc@l(%r11)
3766 . ld %r2,xxx+8@toc@l(%r11)
3767 . ld %r11,xxx+16@toc@l(%r11)
3770 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3771 code to adjust the value and save r2 to support multiple toc sections.
3772 A ppc_stub_long_branch with an r2 offset looks like:
3774 . addis %r2,%r2,off@ha
3775 . addi %r2,%r2,off@l
3778 A ppc_stub_plt_branch with an r2 offset looks like:
3780 . addis %r11,%r2,xxx@toc@ha
3781 . ld %r12,xxx@toc@l(%r11)
3782 . addis %r2,%r2,off@ha
3783 . addi %r2,%r2,off@l
3787 In cases where the "addis" instruction would add zero, the "addis" is
3788 omitted and following instructions modified slightly in some cases.
3791 enum ppc_stub_type {
3793 ppc_stub_long_branch,
3794 ppc_stub_long_branch_r2off,
3795 ppc_stub_plt_branch,
3796 ppc_stub_plt_branch_r2off,
3798 ppc_stub_plt_call_r2save,
3799 ppc_stub_global_entry
3802 /* Information on stub grouping. */
3805 /* The stub section. */
3807 /* This is the section to which stubs in the group will be attached. */
3811 struct ppc_stub_hash_entry {
3813 /* Base hash table entry structure. */
3814 struct bfd_hash_entry root;
3816 enum ppc_stub_type stub_type;
3818 /* Group information. */
3819 struct map_stub *group;
3821 /* Offset within stub_sec of the beginning of this stub. */
3822 bfd_vma stub_offset;
3824 /* Given the symbol's value and its section we can determine its final
3825 value when building the stubs (so the stub knows where to jump. */
3826 bfd_vma target_value;
3827 asection *target_section;
3829 /* The symbol table entry, if any, that this was derived from. */
3830 struct ppc_link_hash_entry *h;
3831 struct plt_entry *plt_ent;
3833 /* Symbol st_other. */
3834 unsigned char other;
3837 struct ppc_branch_hash_entry {
3839 /* Base hash table entry structure. */
3840 struct bfd_hash_entry root;
3842 /* Offset within branch lookup table. */
3843 unsigned int offset;
3845 /* Generation marker. */
3849 /* Used to track dynamic relocations for local symbols. */
3850 struct ppc_dyn_relocs
3852 struct ppc_dyn_relocs *next;
3854 /* The input section of the reloc. */
3857 /* Total number of relocs copied for the input section. */
3858 unsigned int count : 31;
3860 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3861 unsigned int ifunc : 1;
3864 struct ppc_link_hash_entry
3866 struct elf_link_hash_entry elf;
3869 /* A pointer to the most recently used stub hash entry against this
3871 struct ppc_stub_hash_entry *stub_cache;
3873 /* A pointer to the next symbol starting with a '.' */
3874 struct ppc_link_hash_entry *next_dot_sym;
3877 /* Track dynamic relocs copied for this symbol. */
3878 struct elf_dyn_relocs *dyn_relocs;
3880 /* Link between function code and descriptor symbols. */
3881 struct ppc_link_hash_entry *oh;
3883 /* Flag function code and descriptor symbols. */
3884 unsigned int is_func:1;
3885 unsigned int is_func_descriptor:1;
3886 unsigned int fake:1;
3888 /* Whether global opd/toc sym has been adjusted or not.
3889 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3890 should be set for all globals defined in any opd/toc section. */
3891 unsigned int adjust_done:1;
3893 /* Set if we twiddled this symbol to weak at some stage. */
3894 unsigned int was_undefined:1;
3896 /* Contexts in which symbol is used in the GOT (or TOC).
3897 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3898 corresponding relocs are encountered during check_relocs.
3899 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3900 indicate the corresponding GOT entry type is not needed.
3901 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3902 a TPREL one. We use a separate flag rather than setting TPREL
3903 just for convenience in distinguishing the two cases. */
3904 #define TLS_GD 1 /* GD reloc. */
3905 #define TLS_LD 2 /* LD reloc. */
3906 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3907 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3908 #define TLS_TLS 16 /* Any TLS reloc. */
3909 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3910 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3911 #define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
3912 unsigned char tls_mask;
3915 /* ppc64 ELF linker hash table. */
3917 struct ppc_link_hash_table
3919 struct elf_link_hash_table elf;
3921 /* The stub hash table. */
3922 struct bfd_hash_table stub_hash_table;
3924 /* Another hash table for plt_branch stubs. */
3925 struct bfd_hash_table branch_hash_table;
3927 /* Hash table for function prologue tocsave. */
3928 htab_t tocsave_htab;
3930 /* Various options and other info passed from the linker. */
3931 struct ppc64_elf_params *params;
3933 /* The size of sec_info below. */
3934 unsigned int sec_info_arr_size;
3936 /* Per-section array of extra section info. Done this way rather
3937 than as part of ppc64_elf_section_data so we have the info for
3938 non-ppc64 sections. */
3941 /* Along with elf_gp, specifies the TOC pointer used by this section. */
3946 /* The section group that this section belongs to. */
3947 struct map_stub *group;
3948 /* A temp section list pointer. */
3953 /* Temp used when calculating TOC pointers. */
3956 asection *toc_first_sec;
3958 /* Used when adding symbols. */
3959 struct ppc_link_hash_entry *dot_syms;
3961 /* Shortcuts to get to dynamic linker sections. */
3968 asection *glink_eh_frame;
3970 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3971 struct ppc_link_hash_entry *tls_get_addr;
3972 struct ppc_link_hash_entry *tls_get_addr_fd;
3974 /* The size of reliplt used by got entry relocs. */
3975 bfd_size_type got_reli_size;
3978 unsigned long stub_count[ppc_stub_global_entry];
3980 /* Number of stubs against global syms. */
3981 unsigned long stub_globals;
3983 /* Set if we're linking code with function descriptors. */
3984 unsigned int opd_abi:1;
3986 /* Support for multiple toc sections. */
3987 unsigned int do_multi_toc:1;
3988 unsigned int multi_toc_needed:1;
3989 unsigned int second_toc_pass:1;
3990 unsigned int do_toc_opt:1;
3993 unsigned int stub_error:1;
3995 /* Temp used by ppc64_elf_before_check_relocs. */
3996 unsigned int twiddled_syms:1;
3998 /* Incremented every time we size stubs. */
3999 unsigned int stub_iteration;
4001 /* Small local sym cache. */
4002 struct sym_cache sym_cache;
4005 /* Rename some of the generic section flags to better document how they
4008 /* Nonzero if this section has TLS related relocations. */
4009 #define has_tls_reloc sec_flg0
4011 /* Nonzero if this section has a call to __tls_get_addr. */
4012 #define has_tls_get_addr_call sec_flg1
4014 /* Nonzero if this section has any toc or got relocs. */
4015 #define has_toc_reloc sec_flg2
4017 /* Nonzero if this section has a call to another section that uses
4019 #define makes_toc_func_call sec_flg3
4021 /* Recursion protection when determining above flag. */
4022 #define call_check_in_progress sec_flg4
4023 #define call_check_done sec_flg5
4025 /* Get the ppc64 ELF linker hash table from a link_info structure. */
4027 #define ppc_hash_table(p) \
4028 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4029 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4031 #define ppc_stub_hash_lookup(table, string, create, copy) \
4032 ((struct ppc_stub_hash_entry *) \
4033 bfd_hash_lookup ((table), (string), (create), (copy)))
4035 #define ppc_branch_hash_lookup(table, string, create, copy) \
4036 ((struct ppc_branch_hash_entry *) \
4037 bfd_hash_lookup ((table), (string), (create), (copy)))
4039 /* Create an entry in the stub hash table. */
4041 static struct bfd_hash_entry *
4042 stub_hash_newfunc (struct bfd_hash_entry *entry,
4043 struct bfd_hash_table *table,
4046 /* Allocate the structure if it has not already been allocated by a
4050 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4055 /* Call the allocation method of the superclass. */
4056 entry = bfd_hash_newfunc (entry, table, string);
4059 struct ppc_stub_hash_entry *eh;
4061 /* Initialize the local fields. */
4062 eh = (struct ppc_stub_hash_entry *) entry;
4063 eh->stub_type = ppc_stub_none;
4065 eh->stub_offset = 0;
4066 eh->target_value = 0;
4067 eh->target_section = NULL;
4076 /* Create an entry in the branch hash table. */
4078 static struct bfd_hash_entry *
4079 branch_hash_newfunc (struct bfd_hash_entry *entry,
4080 struct bfd_hash_table *table,
4083 /* Allocate the structure if it has not already been allocated by a
4087 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4092 /* Call the allocation method of the superclass. */
4093 entry = bfd_hash_newfunc (entry, table, string);
4096 struct ppc_branch_hash_entry *eh;
4098 /* Initialize the local fields. */
4099 eh = (struct ppc_branch_hash_entry *) entry;
4107 /* Create an entry in a ppc64 ELF linker hash table. */
4109 static struct bfd_hash_entry *
4110 link_hash_newfunc (struct bfd_hash_entry *entry,
4111 struct bfd_hash_table *table,
4114 /* Allocate the structure if it has not already been allocated by a
4118 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4123 /* Call the allocation method of the superclass. */
4124 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4127 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4129 memset (&eh->u.stub_cache, 0,
4130 (sizeof (struct ppc_link_hash_entry)
4131 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4133 /* When making function calls, old ABI code references function entry
4134 points (dot symbols), while new ABI code references the function
4135 descriptor symbol. We need to make any combination of reference and
4136 definition work together, without breaking archive linking.
4138 For a defined function "foo" and an undefined call to "bar":
4139 An old object defines "foo" and ".foo", references ".bar" (possibly
4141 A new object defines "foo" and references "bar".
4143 A new object thus has no problem with its undefined symbols being
4144 satisfied by definitions in an old object. On the other hand, the
4145 old object won't have ".bar" satisfied by a new object.
4147 Keep a list of newly added dot-symbols. */
4149 if (string[0] == '.')
4151 struct ppc_link_hash_table *htab;
4153 htab = (struct ppc_link_hash_table *) table;
4154 eh->u.next_dot_sym = htab->dot_syms;
4155 htab->dot_syms = eh;
4162 struct tocsave_entry {
4168 tocsave_htab_hash (const void *p)
4170 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4171 return ((bfd_vma)(intptr_t) e->sec ^ e->offset) >> 3;
4175 tocsave_htab_eq (const void *p1, const void *p2)
4177 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4178 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4179 return e1->sec == e2->sec && e1->offset == e2->offset;
4182 /* Destroy a ppc64 ELF linker hash table. */
4185 ppc64_elf_link_hash_table_free (bfd *obfd)
4187 struct ppc_link_hash_table *htab;
4189 htab = (struct ppc_link_hash_table *) obfd->link.hash;
4190 if (htab->tocsave_htab)
4191 htab_delete (htab->tocsave_htab);
4192 bfd_hash_table_free (&htab->branch_hash_table);
4193 bfd_hash_table_free (&htab->stub_hash_table);
4194 _bfd_elf_link_hash_table_free (obfd);
4197 /* Create a ppc64 ELF linker hash table. */
4199 static struct bfd_link_hash_table *
4200 ppc64_elf_link_hash_table_create (bfd *abfd)
4202 struct ppc_link_hash_table *htab;
4203 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4205 htab = bfd_zmalloc (amt);
4209 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4210 sizeof (struct ppc_link_hash_entry),
4217 /* Init the stub hash table too. */
4218 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4219 sizeof (struct ppc_stub_hash_entry)))
4221 _bfd_elf_link_hash_table_free (abfd);
4225 /* And the branch hash table. */
4226 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4227 sizeof (struct ppc_branch_hash_entry)))
4229 bfd_hash_table_free (&htab->stub_hash_table);
4230 _bfd_elf_link_hash_table_free (abfd);
4234 htab->tocsave_htab = htab_try_create (1024,
4238 if (htab->tocsave_htab == NULL)
4240 ppc64_elf_link_hash_table_free (abfd);
4243 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
4245 /* Initializing two fields of the union is just cosmetic. We really
4246 only care about glist, but when compiled on a 32-bit host the
4247 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4248 debugger inspection of these fields look nicer. */
4249 htab->elf.init_got_refcount.refcount = 0;
4250 htab->elf.init_got_refcount.glist = NULL;
4251 htab->elf.init_plt_refcount.refcount = 0;
4252 htab->elf.init_plt_refcount.glist = NULL;
4253 htab->elf.init_got_offset.offset = 0;
4254 htab->elf.init_got_offset.glist = NULL;
4255 htab->elf.init_plt_offset.offset = 0;
4256 htab->elf.init_plt_offset.glist = NULL;
4258 return &htab->elf.root;
4261 /* Create sections for linker generated code. */
4264 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4266 struct ppc_link_hash_table *htab;
4269 htab = ppc_hash_table (info);
4271 /* Create .sfpr for code to save and restore fp regs. */
4272 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4273 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4274 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4276 if (htab->sfpr == NULL
4277 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4280 /* Create .glink for lazy dynamic linking support. */
4281 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4283 if (htab->glink == NULL
4284 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4287 if (!info->no_ld_generated_unwind_info)
4289 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4290 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4291 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4294 if (htab->glink_eh_frame == NULL
4295 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4299 flags = SEC_ALLOC | SEC_LINKER_CREATED;
4300 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4301 if (htab->elf.iplt == NULL
4302 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
4305 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4306 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4308 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4309 if (htab->elf.irelplt == NULL
4310 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
4313 /* Create branch lookup table for plt_branch stubs. */
4314 flags = (SEC_ALLOC | SEC_LOAD
4315 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4316 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4318 if (htab->brlt == NULL
4319 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4322 if (!bfd_link_pic (info))
4325 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4326 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4327 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4330 if (htab->relbrlt == NULL
4331 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4337 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4340 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4341 struct ppc64_elf_params *params)
4343 struct ppc_link_hash_table *htab;
4345 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
4347 /* Always hook our dynamic sections into the first bfd, which is the
4348 linker created stub bfd. This ensures that the GOT header is at
4349 the start of the output TOC section. */
4350 htab = ppc_hash_table (info);
4353 htab->elf.dynobj = params->stub_bfd;
4354 htab->params = params;
4356 if (bfd_link_relocatable (info))
4359 return create_linkage_sections (htab->elf.dynobj, info);
4362 /* Build a name for an entry in the stub hash table. */
4365 ppc_stub_name (const asection *input_section,
4366 const asection *sym_sec,
4367 const struct ppc_link_hash_entry *h,
4368 const Elf_Internal_Rela *rel)
4373 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4374 offsets from a sym as a branch target? In fact, we could
4375 probably assume the addend is always zero. */
4376 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4380 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4381 stub_name = bfd_malloc (len);
4382 if (stub_name == NULL)
4385 len = sprintf (stub_name, "%08x.%s+%x",
4386 input_section->id & 0xffffffff,
4387 h->elf.root.root.string,
4388 (int) rel->r_addend & 0xffffffff);
4392 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4393 stub_name = bfd_malloc (len);
4394 if (stub_name == NULL)
4397 len = sprintf (stub_name, "%08x.%x:%x+%x",
4398 input_section->id & 0xffffffff,
4399 sym_sec->id & 0xffffffff,
4400 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4401 (int) rel->r_addend & 0xffffffff);
4403 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
4404 stub_name[len - 2] = 0;
4408 /* Look up an entry in the stub hash. Stub entries are cached because
4409 creating the stub name takes a bit of time. */
4411 static struct ppc_stub_hash_entry *
4412 ppc_get_stub_entry (const asection *input_section,
4413 const asection *sym_sec,
4414 struct ppc_link_hash_entry *h,
4415 const Elf_Internal_Rela *rel,
4416 struct ppc_link_hash_table *htab)
4418 struct ppc_stub_hash_entry *stub_entry;
4419 struct map_stub *group;
4421 /* If this input section is part of a group of sections sharing one
4422 stub section, then use the id of the first section in the group.
4423 Stub names need to include a section id, as there may well be
4424 more than one stub used to reach say, printf, and we need to
4425 distinguish between them. */
4426 group = htab->sec_info[input_section->id].u.group;
4428 if (h != NULL && h->u.stub_cache != NULL
4429 && h->u.stub_cache->h == h
4430 && h->u.stub_cache->group == group)
4432 stub_entry = h->u.stub_cache;
4438 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
4439 if (stub_name == NULL)
4442 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
4443 stub_name, FALSE, FALSE);
4445 h->u.stub_cache = stub_entry;
4453 /* Add a new stub entry to the stub hash. Not all fields of the new
4454 stub entry are initialised. */
4456 static struct ppc_stub_hash_entry *
4457 ppc_add_stub (const char *stub_name,
4459 struct bfd_link_info *info)
4461 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4462 struct map_stub *group;
4465 struct ppc_stub_hash_entry *stub_entry;
4467 group = htab->sec_info[section->id].u.group;
4468 link_sec = group->link_sec;
4469 stub_sec = group->stub_sec;
4470 if (stub_sec == NULL)
4476 namelen = strlen (link_sec->name);
4477 len = namelen + sizeof (STUB_SUFFIX);
4478 s_name = bfd_alloc (htab->params->stub_bfd, len);
4482 memcpy (s_name, link_sec->name, namelen);
4483 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4484 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4485 if (stub_sec == NULL)
4487 group->stub_sec = stub_sec;
4490 /* Enter this entry into the linker stub hash table. */
4491 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
4493 if (stub_entry == NULL)
4495 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
4496 section->owner, stub_name);
4500 stub_entry->group = group;
4501 stub_entry->stub_offset = 0;
4505 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4506 not already done. */
4509 create_got_section (bfd *abfd, struct bfd_link_info *info)
4511 asection *got, *relgot;
4513 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4515 if (!is_ppc64_elf (abfd))
4521 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4524 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4525 | SEC_LINKER_CREATED);
4527 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4529 || !bfd_set_section_alignment (abfd, got, 3))
4532 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4533 flags | SEC_READONLY);
4535 || ! bfd_set_section_alignment (abfd, relgot, 3))
4538 ppc64_elf_tdata (abfd)->got = got;
4539 ppc64_elf_tdata (abfd)->relgot = relgot;
4543 /* Create the dynamic sections, and set up shortcuts. */
4546 ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
4548 struct ppc_link_hash_table *htab;
4550 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
4553 htab = ppc_hash_table (info);
4557 htab->dynbss = bfd_get_linker_section (dynobj, ".dynbss");
4558 if (!bfd_link_pic (info))
4559 htab->relbss = bfd_get_linker_section (dynobj, ".rela.bss");
4561 if (!htab->elf.sgot || !htab->elf.splt || !htab->elf.srelplt || !htab->dynbss
4562 || (!bfd_link_pic (info) && !htab->relbss))
4568 /* Follow indirect and warning symbol links. */
4570 static inline struct bfd_link_hash_entry *
4571 follow_link (struct bfd_link_hash_entry *h)
4573 while (h->type == bfd_link_hash_indirect
4574 || h->type == bfd_link_hash_warning)
4579 static inline struct elf_link_hash_entry *
4580 elf_follow_link (struct elf_link_hash_entry *h)
4582 return (struct elf_link_hash_entry *) follow_link (&h->root);
4585 static inline struct ppc_link_hash_entry *
4586 ppc_follow_link (struct ppc_link_hash_entry *h)
4588 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4591 /* Merge PLT info on FROM with that on TO. */
4594 move_plt_plist (struct ppc_link_hash_entry *from,
4595 struct ppc_link_hash_entry *to)
4597 if (from->elf.plt.plist != NULL)
4599 if (to->elf.plt.plist != NULL)
4601 struct plt_entry **entp;
4602 struct plt_entry *ent;
4604 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4606 struct plt_entry *dent;
4608 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4609 if (dent->addend == ent->addend)
4611 dent->plt.refcount += ent->plt.refcount;
4618 *entp = to->elf.plt.plist;
4621 to->elf.plt.plist = from->elf.plt.plist;
4622 from->elf.plt.plist = NULL;
4626 /* Copy the extra info we tack onto an elf_link_hash_entry. */
4629 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4630 struct elf_link_hash_entry *dir,
4631 struct elf_link_hash_entry *ind)
4633 struct ppc_link_hash_entry *edir, *eind;
4635 edir = (struct ppc_link_hash_entry *) dir;
4636 eind = (struct ppc_link_hash_entry *) ind;
4638 edir->is_func |= eind->is_func;
4639 edir->is_func_descriptor |= eind->is_func_descriptor;
4640 edir->tls_mask |= eind->tls_mask;
4641 if (eind->oh != NULL)
4642 edir->oh = ppc_follow_link (eind->oh);
4644 /* If called to transfer flags for a weakdef during processing
4645 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4646 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4647 if (!(ELIMINATE_COPY_RELOCS
4648 && eind->elf.root.type != bfd_link_hash_indirect
4649 && edir->elf.dynamic_adjusted))
4650 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4652 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4653 edir->elf.ref_regular |= eind->elf.ref_regular;
4654 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4655 edir->elf.needs_plt |= eind->elf.needs_plt;
4656 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
4658 /* Copy over any dynamic relocs we may have on the indirect sym. */
4659 if (eind->dyn_relocs != NULL)
4661 if (edir->dyn_relocs != NULL)
4663 struct elf_dyn_relocs **pp;
4664 struct elf_dyn_relocs *p;
4666 /* Add reloc counts against the indirect sym to the direct sym
4667 list. Merge any entries against the same section. */
4668 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4670 struct elf_dyn_relocs *q;
4672 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4673 if (q->sec == p->sec)
4675 q->pc_count += p->pc_count;
4676 q->count += p->count;
4683 *pp = edir->dyn_relocs;
4686 edir->dyn_relocs = eind->dyn_relocs;
4687 eind->dyn_relocs = NULL;
4690 /* If we were called to copy over info for a weak sym, that's all.
4691 You might think dyn_relocs need not be copied over; After all,
4692 both syms will be dynamic or both non-dynamic so we're just
4693 moving reloc accounting around. However, ELIMINATE_COPY_RELOCS
4694 code in ppc64_elf_adjust_dynamic_symbol needs to check for
4695 dyn_relocs in read-only sections, and it does so on what is the
4697 if (eind->elf.root.type != bfd_link_hash_indirect)
4700 /* Copy over got entries that we may have already seen to the
4701 symbol which just became indirect. */
4702 if (eind->elf.got.glist != NULL)
4704 if (edir->elf.got.glist != NULL)
4706 struct got_entry **entp;
4707 struct got_entry *ent;
4709 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4711 struct got_entry *dent;
4713 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4714 if (dent->addend == ent->addend
4715 && dent->owner == ent->owner
4716 && dent->tls_type == ent->tls_type)
4718 dent->got.refcount += ent->got.refcount;
4725 *entp = edir->elf.got.glist;
4728 edir->elf.got.glist = eind->elf.got.glist;
4729 eind->elf.got.glist = NULL;
4732 /* And plt entries. */
4733 move_plt_plist (eind, edir);
4735 if (eind->elf.dynindx != -1)
4737 if (edir->elf.dynindx != -1)
4738 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4739 edir->elf.dynstr_index);
4740 edir->elf.dynindx = eind->elf.dynindx;
4741 edir->elf.dynstr_index = eind->elf.dynstr_index;
4742 eind->elf.dynindx = -1;
4743 eind->elf.dynstr_index = 0;
4747 /* Find the function descriptor hash entry from the given function code
4748 hash entry FH. Link the entries via their OH fields. */
4750 static struct ppc_link_hash_entry *
4751 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4753 struct ppc_link_hash_entry *fdh = fh->oh;
4757 const char *fd_name = fh->elf.root.root.string + 1;
4759 fdh = (struct ppc_link_hash_entry *)
4760 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4764 fdh->is_func_descriptor = 1;
4770 return ppc_follow_link (fdh);
4773 /* Make a fake function descriptor sym for the code sym FH. */
4775 static struct ppc_link_hash_entry *
4776 make_fdh (struct bfd_link_info *info,
4777 struct ppc_link_hash_entry *fh)
4781 struct bfd_link_hash_entry *bh;
4782 struct ppc_link_hash_entry *fdh;
4784 abfd = fh->elf.root.u.undef.abfd;
4785 newsym = bfd_make_empty_symbol (abfd);
4786 newsym->name = fh->elf.root.root.string + 1;
4787 newsym->section = bfd_und_section_ptr;
4789 newsym->flags = BSF_WEAK;
4792 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4793 newsym->flags, newsym->section,
4794 newsym->value, NULL, FALSE, FALSE,
4798 fdh = (struct ppc_link_hash_entry *) bh;
4799 fdh->elf.non_elf = 0;
4801 fdh->is_func_descriptor = 1;
4808 /* Fix function descriptor symbols defined in .opd sections to be
4812 ppc64_elf_add_symbol_hook (bfd *ibfd,
4813 struct bfd_link_info *info,
4814 Elf_Internal_Sym *isym,
4816 flagword *flags ATTRIBUTE_UNUSED,
4820 if ((ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4821 || ELF_ST_BIND (isym->st_info) == STB_GNU_UNIQUE)
4822 && (ibfd->flags & DYNAMIC) == 0
4823 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
4824 elf_tdata (info->output_bfd)->has_gnu_symbols = elf_gnu_symbol_any;
4827 && strcmp ((*sec)->name, ".opd") == 0)
4831 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4832 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4833 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4835 /* If the symbol is a function defined in .opd, and the function
4836 code is in a discarded group, let it appear to be undefined. */
4837 if (!bfd_link_relocatable (info)
4838 && (*sec)->reloc_count != 0
4839 && opd_entry_value (*sec, *value, &code_sec, NULL,
4840 FALSE) != (bfd_vma) -1
4841 && discarded_section (code_sec))
4843 *sec = bfd_und_section_ptr;
4844 isym->st_shndx = SHN_UNDEF;
4847 else if (*sec != NULL
4848 && strcmp ((*sec)->name, ".toc") == 0
4849 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4851 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4853 htab->params->object_in_toc = 1;
4856 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4858 if (abiversion (ibfd) == 0)
4859 set_abiversion (ibfd, 2);
4860 else if (abiversion (ibfd) == 1)
4862 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4863 " for ABI version 1\n"), name);
4864 bfd_set_error (bfd_error_bad_value);
4872 /* Merge non-visibility st_other attributes: local entry point. */
4875 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4876 const Elf_Internal_Sym *isym,
4877 bfd_boolean definition,
4878 bfd_boolean dynamic)
4880 if (definition && !dynamic)
4881 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4882 | ELF_ST_VISIBILITY (h->other));
4885 /* This function makes an old ABI object reference to ".bar" cause the
4886 inclusion of a new ABI object archive that defines "bar".
4887 NAME is a symbol defined in an archive. Return a symbol in the hash
4888 table that might be satisfied by the archive symbols. */
4890 static struct elf_link_hash_entry *
4891 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4892 struct bfd_link_info *info,
4895 struct elf_link_hash_entry *h;
4899 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4901 /* Don't return this sym if it is a fake function descriptor
4902 created by add_symbol_adjust. */
4903 && !(h->root.type == bfd_link_hash_undefweak
4904 && ((struct ppc_link_hash_entry *) h)->fake))
4910 len = strlen (name);
4911 dot_name = bfd_alloc (abfd, len + 2);
4912 if (dot_name == NULL)
4913 return (struct elf_link_hash_entry *) 0 - 1;
4915 memcpy (dot_name + 1, name, len + 1);
4916 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4917 bfd_release (abfd, dot_name);
4921 /* This function satisfies all old ABI object references to ".bar" if a
4922 new ABI object defines "bar". Well, at least, undefined dot symbols
4923 are made weak. This stops later archive searches from including an
4924 object if we already have a function descriptor definition. It also
4925 prevents the linker complaining about undefined symbols.
4926 We also check and correct mismatched symbol visibility here. The
4927 most restrictive visibility of the function descriptor and the
4928 function entry symbol is used. */
4931 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4933 struct ppc_link_hash_table *htab;
4934 struct ppc_link_hash_entry *fdh;
4936 if (eh->elf.root.type == bfd_link_hash_indirect)
4939 if (eh->elf.root.type == bfd_link_hash_warning)
4940 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4942 if (eh->elf.root.root.string[0] != '.')
4945 htab = ppc_hash_table (info);
4949 fdh = lookup_fdh (eh, htab);
4952 if (!bfd_link_relocatable (info)
4953 && (eh->elf.root.type == bfd_link_hash_undefined
4954 || eh->elf.root.type == bfd_link_hash_undefweak)
4955 && eh->elf.ref_regular)
4957 /* Make an undefweak function descriptor sym, which is enough to
4958 pull in an --as-needed shared lib, but won't cause link
4959 errors. Archives are handled elsewhere. */
4960 fdh = make_fdh (info, eh);
4963 fdh->elf.ref_regular = 1;
4968 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4969 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4970 if (entry_vis < descr_vis)
4971 fdh->elf.other += entry_vis - descr_vis;
4972 else if (entry_vis > descr_vis)
4973 eh->elf.other += descr_vis - entry_vis;
4975 if ((fdh->elf.root.type == bfd_link_hash_defined
4976 || fdh->elf.root.type == bfd_link_hash_defweak)
4977 && eh->elf.root.type == bfd_link_hash_undefined)
4979 eh->elf.root.type = bfd_link_hash_undefweak;
4980 eh->was_undefined = 1;
4981 htab->twiddled_syms = 1;
4988 /* Set up opd section info and abiversion for IBFD, and process list
4989 of dot-symbols we made in link_hash_newfunc. */
4992 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
4994 struct ppc_link_hash_table *htab;
4995 struct ppc_link_hash_entry **p, *eh;
4996 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
4998 if (opd != NULL && opd->size != 0)
5000 if (abiversion (ibfd) == 0)
5001 set_abiversion (ibfd, 1);
5002 else if (abiversion (ibfd) == 2)
5004 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5006 ibfd, abiversion (ibfd));
5007 bfd_set_error (bfd_error_bad_value);
5011 if ((ibfd->flags & DYNAMIC) == 0
5012 && (opd->flags & SEC_RELOC) != 0
5013 && opd->reloc_count != 0
5014 && !bfd_is_abs_section (opd->output_section))
5016 /* Garbage collection needs some extra help with .opd sections.
5017 We don't want to necessarily keep everything referenced by
5018 relocs in .opd, as that would keep all functions. Instead,
5019 if we reference an .opd symbol (a function descriptor), we
5020 want to keep the function code symbol's section. This is
5021 easy for global symbols, but for local syms we need to keep
5022 information about the associated function section. */
5024 asection **opd_sym_map;
5026 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5027 opd_sym_map = bfd_zalloc (ibfd, amt);
5028 if (opd_sym_map == NULL)
5030 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5031 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5032 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5036 if (!is_ppc64_elf (info->output_bfd))
5038 htab = ppc_hash_table (info);
5042 /* For input files without an explicit abiversion in e_flags
5043 we should have flagged any with symbol st_other bits set
5044 as ELFv1 and above flagged those with .opd as ELFv2.
5045 Set the output abiversion if not yet set, and for any input
5046 still ambiguous, take its abiversion from the output.
5047 Differences in ABI are reported later. */
5048 if (abiversion (info->output_bfd) == 0)
5049 set_abiversion (info->output_bfd, abiversion (ibfd));
5050 else if (abiversion (ibfd) == 0)
5051 set_abiversion (ibfd, abiversion (info->output_bfd));
5053 p = &htab->dot_syms;
5054 while ((eh = *p) != NULL)
5057 if (&eh->elf == htab->elf.hgot)
5059 else if (htab->elf.hgot == NULL
5060 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5061 htab->elf.hgot = &eh->elf;
5062 else if (!add_symbol_adjust (eh, info))
5064 p = &eh->u.next_dot_sym;
5067 /* Clear the list for non-ppc64 input files. */
5068 p = &htab->dot_syms;
5069 while ((eh = *p) != NULL)
5072 p = &eh->u.next_dot_sym;
5075 /* We need to fix the undefs list for any syms we have twiddled to
5077 if (htab->twiddled_syms)
5079 bfd_link_repair_undef_list (&htab->elf.root);
5080 htab->twiddled_syms = 0;
5085 /* Undo hash table changes when an --as-needed input file is determined
5086 not to be needed. */
5089 ppc64_elf_notice_as_needed (bfd *ibfd,
5090 struct bfd_link_info *info,
5091 enum notice_asneeded_action act)
5093 if (act == notice_not_needed)
5095 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5100 htab->dot_syms = NULL;
5102 return _bfd_elf_notice_as_needed (ibfd, info, act);
5105 /* If --just-symbols against a final linked binary, then assume we need
5106 toc adjusting stubs when calling functions defined there. */
5109 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5111 if ((sec->flags & SEC_CODE) != 0
5112 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5113 && is_ppc64_elf (sec->owner))
5115 if (abiversion (sec->owner) >= 2
5116 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
5117 sec->has_toc_reloc = 1;
5119 _bfd_elf_link_just_syms (sec, info);
5122 static struct plt_entry **
5123 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5124 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
5126 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
5127 struct plt_entry **local_plt;
5128 unsigned char *local_got_tls_masks;
5130 if (local_got_ents == NULL)
5132 bfd_size_type size = symtab_hdr->sh_info;
5134 size *= (sizeof (*local_got_ents)
5135 + sizeof (*local_plt)
5136 + sizeof (*local_got_tls_masks));
5137 local_got_ents = bfd_zalloc (abfd, size);
5138 if (local_got_ents == NULL)
5140 elf_local_got_ents (abfd) = local_got_ents;
5143 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
5145 struct got_entry *ent;
5147 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
5148 if (ent->addend == r_addend
5149 && ent->owner == abfd
5150 && ent->tls_type == tls_type)
5154 bfd_size_type amt = sizeof (*ent);
5155 ent = bfd_alloc (abfd, amt);
5158 ent->next = local_got_ents[r_symndx];
5159 ent->addend = r_addend;
5161 ent->tls_type = tls_type;
5162 ent->is_indirect = FALSE;
5163 ent->got.refcount = 0;
5164 local_got_ents[r_symndx] = ent;
5166 ent->got.refcount += 1;
5169 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
5170 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
5171 local_got_tls_masks[r_symndx] |= tls_type;
5173 return local_plt + r_symndx;
5177 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
5179 struct plt_entry *ent;
5181 for (ent = *plist; ent != NULL; ent = ent->next)
5182 if (ent->addend == addend)
5186 bfd_size_type amt = sizeof (*ent);
5187 ent = bfd_alloc (abfd, amt);
5191 ent->addend = addend;
5192 ent->plt.refcount = 0;
5195 ent->plt.refcount += 1;
5200 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5202 return (r_type == R_PPC64_REL24
5203 || r_type == R_PPC64_REL14
5204 || r_type == R_PPC64_REL14_BRTAKEN
5205 || r_type == R_PPC64_REL14_BRNTAKEN
5206 || r_type == R_PPC64_ADDR24
5207 || r_type == R_PPC64_ADDR14
5208 || r_type == R_PPC64_ADDR14_BRTAKEN
5209 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5212 /* Look through the relocs for a section during the first phase, and
5213 calculate needed space in the global offset table, procedure
5214 linkage table, and dynamic reloc sections. */
5217 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5218 asection *sec, const Elf_Internal_Rela *relocs)
5220 struct ppc_link_hash_table *htab;
5221 Elf_Internal_Shdr *symtab_hdr;
5222 struct elf_link_hash_entry **sym_hashes;
5223 const Elf_Internal_Rela *rel;
5224 const Elf_Internal_Rela *rel_end;
5226 asection **opd_sym_map;
5227 struct elf_link_hash_entry *tga, *dottga;
5229 if (bfd_link_relocatable (info))
5232 /* Don't do anything special with non-loaded, non-alloced sections.
5233 In particular, any relocs in such sections should not affect GOT
5234 and PLT reference counting (ie. we don't allow them to create GOT
5235 or PLT entries), there's no possibility or desire to optimize TLS
5236 relocs, and there's not much point in propagating relocs to shared
5237 libs that the dynamic linker won't relocate. */
5238 if ((sec->flags & SEC_ALLOC) == 0)
5241 BFD_ASSERT (is_ppc64_elf (abfd));
5243 htab = ppc_hash_table (info);
5247 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5248 FALSE, FALSE, TRUE);
5249 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5250 FALSE, FALSE, TRUE);
5251 symtab_hdr = &elf_symtab_hdr (abfd);
5252 sym_hashes = elf_sym_hashes (abfd);
5255 if (ppc64_elf_section_data (sec) != NULL
5256 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5257 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5259 rel_end = relocs + sec->reloc_count;
5260 for (rel = relocs; rel < rel_end; rel++)
5262 unsigned long r_symndx;
5263 struct elf_link_hash_entry *h;
5264 enum elf_ppc64_reloc_type r_type;
5266 struct _ppc64_elf_section_data *ppc64_sec;
5267 struct plt_entry **ifunc;
5269 r_symndx = ELF64_R_SYM (rel->r_info);
5270 if (r_symndx < symtab_hdr->sh_info)
5274 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5275 h = elf_follow_link (h);
5277 /* PR15323, ref flags aren't set for references in the same
5279 h->root.non_ir_ref = 1;
5281 if (h == htab->elf.hgot)
5282 sec->has_toc_reloc = 1;
5289 if (h->type == STT_GNU_IFUNC)
5292 ifunc = &h->plt.plist;
5297 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5302 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5304 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5305 rel->r_addend, PLT_IFUNC);
5310 r_type = ELF64_R_TYPE (rel->r_info);
5311 if (is_branch_reloc (r_type))
5313 if (h != NULL && (h == tga || h == dottga))
5316 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5317 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5318 /* We have a new-style __tls_get_addr call with a marker
5322 /* Mark this section as having an old-style call. */
5323 sec->has_tls_get_addr_call = 1;
5326 /* STT_GNU_IFUNC symbols must have a PLT entry. */
5328 && !update_plt_info (abfd, ifunc, rel->r_addend))
5336 /* These special tls relocs tie a call to __tls_get_addr with
5337 its parameter symbol. */
5340 case R_PPC64_GOT_TLSLD16:
5341 case R_PPC64_GOT_TLSLD16_LO:
5342 case R_PPC64_GOT_TLSLD16_HI:
5343 case R_PPC64_GOT_TLSLD16_HA:
5344 tls_type = TLS_TLS | TLS_LD;
5347 case R_PPC64_GOT_TLSGD16:
5348 case R_PPC64_GOT_TLSGD16_LO:
5349 case R_PPC64_GOT_TLSGD16_HI:
5350 case R_PPC64_GOT_TLSGD16_HA:
5351 tls_type = TLS_TLS | TLS_GD;
5354 case R_PPC64_GOT_TPREL16_DS:
5355 case R_PPC64_GOT_TPREL16_LO_DS:
5356 case R_PPC64_GOT_TPREL16_HI:
5357 case R_PPC64_GOT_TPREL16_HA:
5358 if (bfd_link_pic (info))
5359 info->flags |= DF_STATIC_TLS;
5360 tls_type = TLS_TLS | TLS_TPREL;
5363 case R_PPC64_GOT_DTPREL16_DS:
5364 case R_PPC64_GOT_DTPREL16_LO_DS:
5365 case R_PPC64_GOT_DTPREL16_HI:
5366 case R_PPC64_GOT_DTPREL16_HA:
5367 tls_type = TLS_TLS | TLS_DTPREL;
5369 sec->has_tls_reloc = 1;
5373 case R_PPC64_GOT16_DS:
5374 case R_PPC64_GOT16_HA:
5375 case R_PPC64_GOT16_HI:
5376 case R_PPC64_GOT16_LO:
5377 case R_PPC64_GOT16_LO_DS:
5378 /* This symbol requires a global offset table entry. */
5379 sec->has_toc_reloc = 1;
5380 if (r_type == R_PPC64_GOT_TLSLD16
5381 || r_type == R_PPC64_GOT_TLSGD16
5382 || r_type == R_PPC64_GOT_TPREL16_DS
5383 || r_type == R_PPC64_GOT_DTPREL16_DS
5384 || r_type == R_PPC64_GOT16
5385 || r_type == R_PPC64_GOT16_DS)
5387 htab->do_multi_toc = 1;
5388 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5391 if (ppc64_elf_tdata (abfd)->got == NULL
5392 && !create_got_section (abfd, info))
5397 struct ppc_link_hash_entry *eh;
5398 struct got_entry *ent;
5400 eh = (struct ppc_link_hash_entry *) h;
5401 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5402 if (ent->addend == rel->r_addend
5403 && ent->owner == abfd
5404 && ent->tls_type == tls_type)
5408 bfd_size_type amt = sizeof (*ent);
5409 ent = bfd_alloc (abfd, amt);
5412 ent->next = eh->elf.got.glist;
5413 ent->addend = rel->r_addend;
5415 ent->tls_type = tls_type;
5416 ent->is_indirect = FALSE;
5417 ent->got.refcount = 0;
5418 eh->elf.got.glist = ent;
5420 ent->got.refcount += 1;
5421 eh->tls_mask |= tls_type;
5424 /* This is a global offset table entry for a local symbol. */
5425 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5426 rel->r_addend, tls_type))
5429 /* We may also need a plt entry if the symbol turns out to be
5431 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
5433 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5438 case R_PPC64_PLT16_HA:
5439 case R_PPC64_PLT16_HI:
5440 case R_PPC64_PLT16_LO:
5443 /* This symbol requires a procedure linkage table entry. We
5444 actually build the entry in adjust_dynamic_symbol,
5445 because this might be a case of linking PIC code without
5446 linking in any dynamic objects, in which case we don't
5447 need to generate a procedure linkage table after all. */
5450 /* It does not make sense to have a procedure linkage
5451 table entry for a local symbol. */
5452 bfd_set_error (bfd_error_bad_value);
5457 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5460 if (h->root.root.string[0] == '.'
5461 && h->root.root.string[1] != '\0')
5462 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5466 /* The following relocations don't need to propagate the
5467 relocation if linking a shared object since they are
5468 section relative. */
5469 case R_PPC64_SECTOFF:
5470 case R_PPC64_SECTOFF_LO:
5471 case R_PPC64_SECTOFF_HI:
5472 case R_PPC64_SECTOFF_HA:
5473 case R_PPC64_SECTOFF_DS:
5474 case R_PPC64_SECTOFF_LO_DS:
5475 case R_PPC64_DTPREL16:
5476 case R_PPC64_DTPREL16_LO:
5477 case R_PPC64_DTPREL16_HI:
5478 case R_PPC64_DTPREL16_HA:
5479 case R_PPC64_DTPREL16_DS:
5480 case R_PPC64_DTPREL16_LO_DS:
5481 case R_PPC64_DTPREL16_HIGH:
5482 case R_PPC64_DTPREL16_HIGHA:
5483 case R_PPC64_DTPREL16_HIGHER:
5484 case R_PPC64_DTPREL16_HIGHERA:
5485 case R_PPC64_DTPREL16_HIGHEST:
5486 case R_PPC64_DTPREL16_HIGHESTA:
5491 case R_PPC64_REL16_LO:
5492 case R_PPC64_REL16_HI:
5493 case R_PPC64_REL16_HA:
5496 /* Not supported as a dynamic relocation. */
5497 case R_PPC64_ADDR64_LOCAL:
5498 if (bfd_link_pic (info))
5500 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5502 info->callbacks->einfo (_("%P: %H: %s reloc unsupported "
5503 "in shared libraries and PIEs.\n"),
5504 abfd, sec, rel->r_offset,
5505 ppc64_elf_howto_table[r_type]->name);
5506 bfd_set_error (bfd_error_bad_value);
5512 case R_PPC64_TOC16_DS:
5513 htab->do_multi_toc = 1;
5514 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5515 case R_PPC64_TOC16_LO:
5516 case R_PPC64_TOC16_HI:
5517 case R_PPC64_TOC16_HA:
5518 case R_PPC64_TOC16_LO_DS:
5519 sec->has_toc_reloc = 1;
5522 /* This relocation describes the C++ object vtable hierarchy.
5523 Reconstruct it for later use during GC. */
5524 case R_PPC64_GNU_VTINHERIT:
5525 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5529 /* This relocation describes which C++ vtable entries are actually
5530 used. Record for later use during GC. */
5531 case R_PPC64_GNU_VTENTRY:
5532 BFD_ASSERT (h != NULL);
5534 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5539 case R_PPC64_REL14_BRTAKEN:
5540 case R_PPC64_REL14_BRNTAKEN:
5542 asection *dest = NULL;
5544 /* Heuristic: If jumping outside our section, chances are
5545 we are going to need a stub. */
5548 /* If the sym is weak it may be overridden later, so
5549 don't assume we know where a weak sym lives. */
5550 if (h->root.type == bfd_link_hash_defined)
5551 dest = h->root.u.def.section;
5555 Elf_Internal_Sym *isym;
5557 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5562 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5566 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
5571 if (h != NULL && ifunc == NULL)
5573 /* We may need a .plt entry if the function this reloc
5574 refers to is in a shared lib. */
5575 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5578 if (h->root.root.string[0] == '.'
5579 && h->root.root.string[1] != '\0')
5580 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5581 if (h == tga || h == dottga)
5582 sec->has_tls_reloc = 1;
5586 case R_PPC64_TPREL64:
5587 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
5588 if (bfd_link_pic (info))
5589 info->flags |= DF_STATIC_TLS;
5592 case R_PPC64_DTPMOD64:
5593 if (rel + 1 < rel_end
5594 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5595 && rel[1].r_offset == rel->r_offset + 8)
5596 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
5598 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
5601 case R_PPC64_DTPREL64:
5602 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5604 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5605 && rel[-1].r_offset == rel->r_offset - 8)
5606 /* This is the second reloc of a dtpmod, dtprel pair.
5607 Don't mark with TLS_DTPREL. */
5611 sec->has_tls_reloc = 1;
5614 struct ppc_link_hash_entry *eh;
5615 eh = (struct ppc_link_hash_entry *) h;
5616 eh->tls_mask |= tls_type;
5619 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5620 rel->r_addend, tls_type))
5623 ppc64_sec = ppc64_elf_section_data (sec);
5624 if (ppc64_sec->sec_type != sec_toc)
5628 /* One extra to simplify get_tls_mask. */
5629 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5630 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5631 if (ppc64_sec->u.toc.symndx == NULL)
5633 amt = sec->size * sizeof (bfd_vma) / 8;
5634 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5635 if (ppc64_sec->u.toc.add == NULL)
5637 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5638 ppc64_sec->sec_type = sec_toc;
5640 BFD_ASSERT (rel->r_offset % 8 == 0);
5641 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5642 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5644 /* Mark the second slot of a GD or LD entry.
5645 -1 to indicate GD and -2 to indicate LD. */
5646 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5647 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5648 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5649 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5652 case R_PPC64_TPREL16:
5653 case R_PPC64_TPREL16_LO:
5654 case R_PPC64_TPREL16_HI:
5655 case R_PPC64_TPREL16_HA:
5656 case R_PPC64_TPREL16_DS:
5657 case R_PPC64_TPREL16_LO_DS:
5658 case R_PPC64_TPREL16_HIGH:
5659 case R_PPC64_TPREL16_HIGHA:
5660 case R_PPC64_TPREL16_HIGHER:
5661 case R_PPC64_TPREL16_HIGHERA:
5662 case R_PPC64_TPREL16_HIGHEST:
5663 case R_PPC64_TPREL16_HIGHESTA:
5664 if (bfd_link_pic (info))
5666 info->flags |= DF_STATIC_TLS;
5671 case R_PPC64_ADDR64:
5672 if (opd_sym_map != NULL
5673 && rel + 1 < rel_end
5674 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5678 if (h->root.root.string[0] == '.'
5679 && h->root.root.string[1] != 0
5680 && lookup_fdh ((struct ppc_link_hash_entry *) h, htab))
5683 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5688 Elf_Internal_Sym *isym;
5690 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5695 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5696 if (s != NULL && s != sec)
5697 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5702 case R_PPC64_ADDR16:
5703 case R_PPC64_ADDR16_DS:
5704 case R_PPC64_ADDR16_HA:
5705 case R_PPC64_ADDR16_HI:
5706 case R_PPC64_ADDR16_HIGH:
5707 case R_PPC64_ADDR16_HIGHA:
5708 case R_PPC64_ADDR16_HIGHER:
5709 case R_PPC64_ADDR16_HIGHERA:
5710 case R_PPC64_ADDR16_HIGHEST:
5711 case R_PPC64_ADDR16_HIGHESTA:
5712 case R_PPC64_ADDR16_LO:
5713 case R_PPC64_ADDR16_LO_DS:
5714 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5715 && rel->r_addend == 0)
5717 /* We may need a .plt entry if this reloc refers to a
5718 function in a shared lib. */
5719 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5721 h->pointer_equality_needed = 1;
5728 case R_PPC64_ADDR14:
5729 case R_PPC64_ADDR14_BRNTAKEN:
5730 case R_PPC64_ADDR14_BRTAKEN:
5731 case R_PPC64_ADDR24:
5732 case R_PPC64_ADDR32:
5733 case R_PPC64_UADDR16:
5734 case R_PPC64_UADDR32:
5735 case R_PPC64_UADDR64:
5737 if (h != NULL && !bfd_link_pic (info))
5738 /* We may need a copy reloc. */
5741 /* Don't propagate .opd relocs. */
5742 if (NO_OPD_RELOCS && opd_sym_map != NULL)
5745 /* If we are creating a shared library, and this is a reloc
5746 against a global symbol, or a non PC relative reloc
5747 against a local symbol, then we need to copy the reloc
5748 into the shared library. However, if we are linking with
5749 -Bsymbolic, we do not need to copy a reloc against a
5750 global symbol which is defined in an object we are
5751 including in the link (i.e., DEF_REGULAR is set). At
5752 this point we have not seen all the input files, so it is
5753 possible that DEF_REGULAR is not set now but will be set
5754 later (it is never cleared). In case of a weak definition,
5755 DEF_REGULAR may be cleared later by a strong definition in
5756 a shared library. We account for that possibility below by
5757 storing information in the dyn_relocs field of the hash
5758 table entry. A similar situation occurs when creating
5759 shared libraries and symbol visibility changes render the
5762 If on the other hand, we are creating an executable, we
5763 may need to keep relocations for symbols satisfied by a
5764 dynamic library if we manage to avoid copy relocs for the
5767 if ((bfd_link_pic (info)
5768 && (must_be_dyn_reloc (info, r_type)
5770 && (!SYMBOLIC_BIND (info, h)
5771 || h->root.type == bfd_link_hash_defweak
5772 || !h->def_regular))))
5773 || (ELIMINATE_COPY_RELOCS
5774 && !bfd_link_pic (info)
5776 && (h->root.type == bfd_link_hash_defweak
5777 || !h->def_regular))
5778 || (!bfd_link_pic (info)
5781 /* We must copy these reloc types into the output file.
5782 Create a reloc section in dynobj and make room for
5786 sreloc = _bfd_elf_make_dynamic_reloc_section
5787 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5793 /* If this is a global symbol, we count the number of
5794 relocations we need for this symbol. */
5797 struct elf_dyn_relocs *p;
5798 struct elf_dyn_relocs **head;
5800 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5802 if (p == NULL || p->sec != sec)
5804 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5814 if (!must_be_dyn_reloc (info, r_type))
5819 /* Track dynamic relocs needed for local syms too.
5820 We really need local syms available to do this
5822 struct ppc_dyn_relocs *p;
5823 struct ppc_dyn_relocs **head;
5824 bfd_boolean is_ifunc;
5827 Elf_Internal_Sym *isym;
5829 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5834 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5838 vpp = &elf_section_data (s)->local_dynrel;
5839 head = (struct ppc_dyn_relocs **) vpp;
5840 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5842 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5844 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5846 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5852 p->ifunc = is_ifunc;
5868 /* Merge backend specific data from an object file to the output
5869 object file when linking. */
5872 ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
5874 unsigned long iflags, oflags;
5876 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5879 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5882 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
5885 iflags = elf_elfheader (ibfd)->e_flags;
5886 oflags = elf_elfheader (obfd)->e_flags;
5888 if (iflags & ~EF_PPC64_ABI)
5890 (*_bfd_error_handler)
5891 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
5892 bfd_set_error (bfd_error_bad_value);
5895 else if (iflags != oflags && iflags != 0)
5897 (*_bfd_error_handler)
5898 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
5899 ibfd, iflags, oflags);
5900 bfd_set_error (bfd_error_bad_value);
5904 /* Merge Tag_compatibility attributes and any common GNU ones. */
5905 _bfd_elf_merge_object_attributes (ibfd, obfd);
5911 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5913 /* Print normal ELF private data. */
5914 _bfd_elf_print_private_bfd_data (abfd, ptr);
5916 if (elf_elfheader (abfd)->e_flags != 0)
5920 /* xgettext:c-format */
5921 fprintf (file, _("private flags = 0x%lx:"),
5922 elf_elfheader (abfd)->e_flags);
5924 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5925 fprintf (file, _(" [abiv%ld]"),
5926 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5933 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
5934 of the code entry point, and its section, which must be in the same
5935 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
5938 opd_entry_value (asection *opd_sec,
5940 asection **code_sec,
5942 bfd_boolean in_code_sec)
5944 bfd *opd_bfd = opd_sec->owner;
5945 Elf_Internal_Rela *relocs;
5946 Elf_Internal_Rela *lo, *hi, *look;
5949 /* No relocs implies we are linking a --just-symbols object, or looking
5950 at a final linked executable with addr2line or somesuch. */
5951 if (opd_sec->reloc_count == 0)
5953 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
5955 if (contents == NULL)
5957 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5958 return (bfd_vma) -1;
5959 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5962 /* PR 17512: file: 64b9dfbb. */
5963 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
5964 return (bfd_vma) -1;
5966 val = bfd_get_64 (opd_bfd, contents + offset);
5967 if (code_sec != NULL)
5969 asection *sec, *likely = NULL;
5975 && val < sec->vma + sec->size)
5981 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5983 && (sec->flags & SEC_LOAD) != 0
5984 && (sec->flags & SEC_ALLOC) != 0)
5989 if (code_off != NULL)
5990 *code_off = val - likely->vma;
5996 BFD_ASSERT (is_ppc64_elf (opd_bfd));
5998 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
6000 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
6001 /* PR 17512: file: df8e1fd6. */
6003 return (bfd_vma) -1;
6005 /* Go find the opd reloc at the sym address. */
6007 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
6011 look = lo + (hi - lo) / 2;
6012 if (look->r_offset < offset)
6014 else if (look->r_offset > offset)
6018 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6020 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6021 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6023 unsigned long symndx = ELF64_R_SYM (look->r_info);
6024 asection *sec = NULL;
6026 if (symndx >= symtab_hdr->sh_info
6027 && elf_sym_hashes (opd_bfd) != NULL)
6029 struct elf_link_hash_entry **sym_hashes;
6030 struct elf_link_hash_entry *rh;
6032 sym_hashes = elf_sym_hashes (opd_bfd);
6033 rh = sym_hashes[symndx - symtab_hdr->sh_info];
6036 rh = elf_follow_link (rh);
6037 if (rh->root.type != bfd_link_hash_defined
6038 && rh->root.type != bfd_link_hash_defweak)
6040 if (rh->root.u.def.section->owner == opd_bfd)
6042 val = rh->root.u.def.value;
6043 sec = rh->root.u.def.section;
6050 Elf_Internal_Sym *sym;
6052 if (symndx < symtab_hdr->sh_info)
6054 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6057 size_t symcnt = symtab_hdr->sh_info;
6058 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6063 symtab_hdr->contents = (bfd_byte *) sym;
6069 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6075 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6078 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6079 val = sym->st_value;
6082 val += look->r_addend;
6083 if (code_off != NULL)
6085 if (code_sec != NULL)
6087 if (in_code_sec && *code_sec != sec)
6092 if (sec->output_section != NULL)
6093 val += sec->output_section->vma + sec->output_offset;
6102 /* If the ELF symbol SYM might be a function in SEC, return the
6103 function size and set *CODE_OFF to the function's entry point,
6104 otherwise return zero. */
6106 static bfd_size_type
6107 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6112 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6113 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6117 if (!(sym->flags & BSF_SYNTHETIC))
6118 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6120 if (strcmp (sym->section->name, ".opd") == 0)
6122 if (opd_entry_value (sym->section, sym->value,
6123 &sec, code_off, TRUE) == (bfd_vma) -1)
6125 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6126 symbol. This size has nothing to do with the code size of the
6127 function, which is what we're supposed to return, but the
6128 code size isn't available without looking up the dot-sym.
6129 However, doing that would be a waste of time particularly
6130 since elf_find_function will look at the dot-sym anyway.
6131 Now, elf_find_function will keep the largest size of any
6132 function sym found at the code address of interest, so return
6133 1 here to avoid it incorrectly caching a larger function size
6134 for a small function. This does mean we return the wrong
6135 size for a new-ABI function of size 24, but all that does is
6136 disable caching for such functions. */
6142 if (sym->section != sec)
6144 *code_off = sym->value;
6151 /* Return true if symbol is defined in a regular object file. */
6154 is_static_defined (struct elf_link_hash_entry *h)
6156 return ((h->root.type == bfd_link_hash_defined
6157 || h->root.type == bfd_link_hash_defweak)
6158 && h->root.u.def.section != NULL
6159 && h->root.u.def.section->output_section != NULL);
6162 /* If FDH is a function descriptor symbol, return the associated code
6163 entry symbol if it is defined. Return NULL otherwise. */
6165 static struct ppc_link_hash_entry *
6166 defined_code_entry (struct ppc_link_hash_entry *fdh)
6168 if (fdh->is_func_descriptor)
6170 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6171 if (fh->elf.root.type == bfd_link_hash_defined
6172 || fh->elf.root.type == bfd_link_hash_defweak)
6178 /* If FH is a function code entry symbol, return the associated
6179 function descriptor symbol if it is defined. Return NULL otherwise. */
6181 static struct ppc_link_hash_entry *
6182 defined_func_desc (struct ppc_link_hash_entry *fh)
6185 && fh->oh->is_func_descriptor)
6187 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6188 if (fdh->elf.root.type == bfd_link_hash_defined
6189 || fdh->elf.root.type == bfd_link_hash_defweak)
6195 /* Mark all our entry sym sections, both opd and code section. */
6198 ppc64_elf_gc_keep (struct bfd_link_info *info)
6200 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6201 struct bfd_sym_chain *sym;
6206 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6208 struct ppc_link_hash_entry *eh, *fh;
6211 eh = (struct ppc_link_hash_entry *)
6212 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
6215 if (eh->elf.root.type != bfd_link_hash_defined
6216 && eh->elf.root.type != bfd_link_hash_defweak)
6219 fh = defined_code_entry (eh);
6222 sec = fh->elf.root.u.def.section;
6223 sec->flags |= SEC_KEEP;
6225 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6226 && opd_entry_value (eh->elf.root.u.def.section,
6227 eh->elf.root.u.def.value,
6228 &sec, NULL, FALSE) != (bfd_vma) -1)
6229 sec->flags |= SEC_KEEP;
6231 sec = eh->elf.root.u.def.section;
6232 sec->flags |= SEC_KEEP;
6236 /* Mark sections containing dynamically referenced symbols. When
6237 building shared libraries, we must assume that any visible symbol is
6241 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6243 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6244 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
6245 struct ppc_link_hash_entry *fdh;
6246 struct bfd_elf_dynamic_list *d = info->dynamic_list;
6248 /* Dynamic linking info is on the func descriptor sym. */
6249 fdh = defined_func_desc (eh);
6253 if ((eh->elf.root.type == bfd_link_hash_defined
6254 || eh->elf.root.type == bfd_link_hash_defweak)
6255 && (eh->elf.ref_dynamic
6256 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
6257 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
6258 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
6259 && (!bfd_link_executable (info)
6260 || info->export_dynamic
6263 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
6264 && (strchr (eh->elf.root.root.string, ELF_VER_CHR) != NULL
6265 || !bfd_hide_sym_by_version (info->version_info,
6266 eh->elf.root.root.string)))))
6269 struct ppc_link_hash_entry *fh;
6271 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6273 /* Function descriptor syms cause the associated
6274 function code sym section to be marked. */
6275 fh = defined_code_entry (eh);
6278 code_sec = fh->elf.root.u.def.section;
6279 code_sec->flags |= SEC_KEEP;
6281 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6282 && opd_entry_value (eh->elf.root.u.def.section,
6283 eh->elf.root.u.def.value,
6284 &code_sec, NULL, FALSE) != (bfd_vma) -1)
6285 code_sec->flags |= SEC_KEEP;
6291 /* Return the section that should be marked against GC for a given
6295 ppc64_elf_gc_mark_hook (asection *sec,
6296 struct bfd_link_info *info,
6297 Elf_Internal_Rela *rel,
6298 struct elf_link_hash_entry *h,
6299 Elf_Internal_Sym *sym)
6303 /* Syms return NULL if we're marking .opd, so we avoid marking all
6304 function sections, as all functions are referenced in .opd. */
6306 if (get_opd_info (sec) != NULL)
6311 enum elf_ppc64_reloc_type r_type;
6312 struct ppc_link_hash_entry *eh, *fh, *fdh;
6314 r_type = ELF64_R_TYPE (rel->r_info);
6317 case R_PPC64_GNU_VTINHERIT:
6318 case R_PPC64_GNU_VTENTRY:
6322 switch (h->root.type)
6324 case bfd_link_hash_defined:
6325 case bfd_link_hash_defweak:
6326 eh = (struct ppc_link_hash_entry *) h;
6327 fdh = defined_func_desc (eh);
6331 /* Function descriptor syms cause the associated
6332 function code sym section to be marked. */
6333 fh = defined_code_entry (eh);
6336 /* They also mark their opd section. */
6337 eh->elf.root.u.def.section->gc_mark = 1;
6339 rsec = fh->elf.root.u.def.section;
6341 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6342 && opd_entry_value (eh->elf.root.u.def.section,
6343 eh->elf.root.u.def.value,
6344 &rsec, NULL, FALSE) != (bfd_vma) -1)
6345 eh->elf.root.u.def.section->gc_mark = 1;
6347 rsec = h->root.u.def.section;
6350 case bfd_link_hash_common:
6351 rsec = h->root.u.c.p->section;
6355 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
6361 struct _opd_sec_data *opd;
6363 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6364 opd = get_opd_info (rsec);
6365 if (opd != NULL && opd->func_sec != NULL)
6369 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
6376 /* Update the .got, .plt. and dynamic reloc reference counts for the
6377 section being removed. */
6380 ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6381 asection *sec, const Elf_Internal_Rela *relocs)
6383 struct ppc_link_hash_table *htab;
6384 Elf_Internal_Shdr *symtab_hdr;
6385 struct elf_link_hash_entry **sym_hashes;
6386 struct got_entry **local_got_ents;
6387 const Elf_Internal_Rela *rel, *relend;
6389 if (bfd_link_relocatable (info))
6392 if ((sec->flags & SEC_ALLOC) == 0)
6395 elf_section_data (sec)->local_dynrel = NULL;
6397 htab = ppc_hash_table (info);
6401 symtab_hdr = &elf_symtab_hdr (abfd);
6402 sym_hashes = elf_sym_hashes (abfd);
6403 local_got_ents = elf_local_got_ents (abfd);
6405 relend = relocs + sec->reloc_count;
6406 for (rel = relocs; rel < relend; rel++)
6408 unsigned long r_symndx;
6409 enum elf_ppc64_reloc_type r_type;
6410 struct elf_link_hash_entry *h = NULL;
6411 unsigned char tls_type = 0;
6413 r_symndx = ELF64_R_SYM (rel->r_info);
6414 r_type = ELF64_R_TYPE (rel->r_info);
6415 if (r_symndx >= symtab_hdr->sh_info)
6417 struct ppc_link_hash_entry *eh;
6418 struct elf_dyn_relocs **pp;
6419 struct elf_dyn_relocs *p;
6421 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6422 h = elf_follow_link (h);
6423 eh = (struct ppc_link_hash_entry *) h;
6425 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6428 /* Everything must go for SEC. */
6434 if (is_branch_reloc (r_type))
6436 struct plt_entry **ifunc = NULL;
6439 if (h->type == STT_GNU_IFUNC)
6440 ifunc = &h->plt.plist;
6442 else if (local_got_ents != NULL)
6444 struct plt_entry **local_plt = (struct plt_entry **)
6445 (local_got_ents + symtab_hdr->sh_info);
6446 unsigned char *local_got_tls_masks = (unsigned char *)
6447 (local_plt + symtab_hdr->sh_info);
6448 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6449 ifunc = local_plt + r_symndx;
6453 struct plt_entry *ent;
6455 for (ent = *ifunc; ent != NULL; ent = ent->next)
6456 if (ent->addend == rel->r_addend)
6460 if (ent->plt.refcount > 0)
6461 ent->plt.refcount -= 1;
6468 case R_PPC64_GOT_TLSLD16:
6469 case R_PPC64_GOT_TLSLD16_LO:
6470 case R_PPC64_GOT_TLSLD16_HI:
6471 case R_PPC64_GOT_TLSLD16_HA:
6472 tls_type = TLS_TLS | TLS_LD;
6475 case R_PPC64_GOT_TLSGD16:
6476 case R_PPC64_GOT_TLSGD16_LO:
6477 case R_PPC64_GOT_TLSGD16_HI:
6478 case R_PPC64_GOT_TLSGD16_HA:
6479 tls_type = TLS_TLS | TLS_GD;
6482 case R_PPC64_GOT_TPREL16_DS:
6483 case R_PPC64_GOT_TPREL16_LO_DS:
6484 case R_PPC64_GOT_TPREL16_HI:
6485 case R_PPC64_GOT_TPREL16_HA:
6486 tls_type = TLS_TLS | TLS_TPREL;
6489 case R_PPC64_GOT_DTPREL16_DS:
6490 case R_PPC64_GOT_DTPREL16_LO_DS:
6491 case R_PPC64_GOT_DTPREL16_HI:
6492 case R_PPC64_GOT_DTPREL16_HA:
6493 tls_type = TLS_TLS | TLS_DTPREL;
6497 case R_PPC64_GOT16_DS:
6498 case R_PPC64_GOT16_HA:
6499 case R_PPC64_GOT16_HI:
6500 case R_PPC64_GOT16_LO:
6501 case R_PPC64_GOT16_LO_DS:
6504 struct got_entry *ent;
6509 ent = local_got_ents[r_symndx];
6511 for (; ent != NULL; ent = ent->next)
6512 if (ent->addend == rel->r_addend
6513 && ent->owner == abfd
6514 && ent->tls_type == tls_type)
6518 if (ent->got.refcount > 0)
6519 ent->got.refcount -= 1;
6523 case R_PPC64_PLT16_HA:
6524 case R_PPC64_PLT16_HI:
6525 case R_PPC64_PLT16_LO:
6529 case R_PPC64_REL14_BRNTAKEN:
6530 case R_PPC64_REL14_BRTAKEN:
6534 struct plt_entry *ent;
6536 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6537 if (ent->addend == rel->r_addend)
6539 if (ent != NULL && ent->plt.refcount > 0)
6540 ent->plt.refcount -= 1;
6551 /* The maximum size of .sfpr. */
6552 #define SFPR_MAX (218*4)
6554 struct sfpr_def_parms
6556 const char name[12];
6557 unsigned char lo, hi;
6558 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6559 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6562 /* Auto-generate _save*, _rest* functions in .sfpr. */
6565 sfpr_define (struct bfd_link_info *info, const struct sfpr_def_parms *parm)
6567 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6569 size_t len = strlen (parm->name);
6570 bfd_boolean writing = FALSE;
6576 memcpy (sym, parm->name, len);
6579 for (i = parm->lo; i <= parm->hi; i++)
6581 struct elf_link_hash_entry *h;
6583 sym[len + 0] = i / 10 + '0';
6584 sym[len + 1] = i % 10 + '0';
6585 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
6589 h->root.type = bfd_link_hash_defined;
6590 h->root.u.def.section = htab->sfpr;
6591 h->root.u.def.value = htab->sfpr->size;
6594 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
6596 if (htab->sfpr->contents == NULL)
6598 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6599 if (htab->sfpr->contents == NULL)
6605 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6607 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6609 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6610 htab->sfpr->size = p - htab->sfpr->contents;
6618 savegpr0 (bfd *abfd, bfd_byte *p, int r)
6620 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6625 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6627 p = savegpr0 (abfd, p, r);
6628 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6630 bfd_put_32 (abfd, BLR, p);
6635 restgpr0 (bfd *abfd, bfd_byte *p, int r)
6637 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6642 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6644 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6646 p = restgpr0 (abfd, p, r);
6647 bfd_put_32 (abfd, MTLR_R0, p);
6651 p = restgpr0 (abfd, p, 30);
6652 p = restgpr0 (abfd, p, 31);
6654 bfd_put_32 (abfd, BLR, p);
6659 savegpr1 (bfd *abfd, bfd_byte *p, int r)
6661 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6666 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6668 p = savegpr1 (abfd, p, r);
6669 bfd_put_32 (abfd, BLR, p);
6674 restgpr1 (bfd *abfd, bfd_byte *p, int r)
6676 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6681 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6683 p = restgpr1 (abfd, p, r);
6684 bfd_put_32 (abfd, BLR, p);
6689 savefpr (bfd *abfd, bfd_byte *p, int r)
6691 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6696 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6698 p = savefpr (abfd, p, r);
6699 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6701 bfd_put_32 (abfd, BLR, p);
6706 restfpr (bfd *abfd, bfd_byte *p, int r)
6708 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6713 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6715 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6717 p = restfpr (abfd, p, r);
6718 bfd_put_32 (abfd, MTLR_R0, p);
6722 p = restfpr (abfd, p, 30);
6723 p = restfpr (abfd, p, 31);
6725 bfd_put_32 (abfd, BLR, p);
6730 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6732 p = savefpr (abfd, p, r);
6733 bfd_put_32 (abfd, BLR, p);
6738 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6740 p = restfpr (abfd, p, r);
6741 bfd_put_32 (abfd, BLR, p);
6746 savevr (bfd *abfd, bfd_byte *p, int r)
6748 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6750 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6755 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6757 p = savevr (abfd, p, r);
6758 bfd_put_32 (abfd, BLR, p);
6763 restvr (bfd *abfd, bfd_byte *p, int r)
6765 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6767 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6772 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6774 p = restvr (abfd, p, r);
6775 bfd_put_32 (abfd, BLR, p);
6779 /* Called via elf_link_hash_traverse to transfer dynamic linking
6780 information on function code symbol entries to their corresponding
6781 function descriptor symbol entries. */
6784 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6786 struct bfd_link_info *info;
6787 struct ppc_link_hash_table *htab;
6788 struct plt_entry *ent;
6789 struct ppc_link_hash_entry *fh;
6790 struct ppc_link_hash_entry *fdh;
6791 bfd_boolean force_local;
6793 fh = (struct ppc_link_hash_entry *) h;
6794 if (fh->elf.root.type == bfd_link_hash_indirect)
6798 htab = ppc_hash_table (info);
6802 /* Resolve undefined references to dot-symbols as the value
6803 in the function descriptor, if we have one in a regular object.
6804 This is to satisfy cases like ".quad .foo". Calls to functions
6805 in dynamic objects are handled elsewhere. */
6806 if (fh->elf.root.type == bfd_link_hash_undefweak
6807 && fh->was_undefined
6808 && (fdh = defined_func_desc (fh)) != NULL
6809 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6810 && opd_entry_value (fdh->elf.root.u.def.section,
6811 fdh->elf.root.u.def.value,
6812 &fh->elf.root.u.def.section,
6813 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6815 fh->elf.root.type = fdh->elf.root.type;
6816 fh->elf.forced_local = 1;
6817 fh->elf.def_regular = fdh->elf.def_regular;
6818 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6821 /* If this is a function code symbol, transfer dynamic linking
6822 information to the function descriptor symbol. */
6826 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6827 if (ent->plt.refcount > 0)
6830 || fh->elf.root.root.string[0] != '.'
6831 || fh->elf.root.root.string[1] == '\0')
6834 /* Find the corresponding function descriptor symbol. Create it
6835 as undefined if necessary. */
6837 fdh = lookup_fdh (fh, htab);
6839 && !bfd_link_executable (info)
6840 && (fh->elf.root.type == bfd_link_hash_undefined
6841 || fh->elf.root.type == bfd_link_hash_undefweak))
6843 fdh = make_fdh (info, fh);
6848 /* Fake function descriptors are made undefweak. If the function
6849 code symbol is strong undefined, make the fake sym the same.
6850 If the function code symbol is defined, then force the fake
6851 descriptor local; We can't support overriding of symbols in a
6852 shared library on a fake descriptor. */
6856 && fdh->elf.root.type == bfd_link_hash_undefweak)
6858 if (fh->elf.root.type == bfd_link_hash_undefined)
6860 fdh->elf.root.type = bfd_link_hash_undefined;
6861 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
6863 else if (fh->elf.root.type == bfd_link_hash_defined
6864 || fh->elf.root.type == bfd_link_hash_defweak)
6866 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6871 && !fdh->elf.forced_local
6872 && (!bfd_link_executable (info)
6873 || fdh->elf.def_dynamic
6874 || fdh->elf.ref_dynamic
6875 || (fdh->elf.root.type == bfd_link_hash_undefweak
6876 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
6878 if (fdh->elf.dynindx == -1)
6879 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6881 fdh->elf.ref_regular |= fh->elf.ref_regular;
6882 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6883 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6884 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6885 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
6887 move_plt_plist (fh, fdh);
6888 fdh->elf.needs_plt = 1;
6890 fdh->is_func_descriptor = 1;
6895 /* Now that the info is on the function descriptor, clear the
6896 function code sym info. Any function code syms for which we
6897 don't have a definition in a regular file, we force local.
6898 This prevents a shared library from exporting syms that have
6899 been imported from another library. Function code syms that
6900 are really in the library we must leave global to prevent the
6901 linker dragging in a definition from a static library. */
6902 force_local = (!fh->elf.def_regular
6904 || !fdh->elf.def_regular
6905 || fdh->elf.forced_local);
6906 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6911 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6912 this hook to a) provide some gcc support functions, and b) transfer
6913 dynamic linking information gathered so far on function code symbol
6914 entries, to their corresponding function descriptor symbol entries. */
6917 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6918 struct bfd_link_info *info)
6920 struct ppc_link_hash_table *htab;
6922 static const struct sfpr_def_parms funcs[] =
6924 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6925 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6926 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6927 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6928 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6929 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6930 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6931 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6932 { "._savef", 14, 31, savefpr, savefpr1_tail },
6933 { "._restf", 14, 31, restfpr, restfpr1_tail },
6934 { "_savevr_", 20, 31, savevr, savevr_tail },
6935 { "_restvr_", 20, 31, restvr, restvr_tail }
6938 htab = ppc_hash_table (info);
6942 if (!bfd_link_relocatable (info)
6943 && htab->elf.hgot != NULL)
6945 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6946 /* Make .TOC. defined so as to prevent it being made dynamic.
6947 The wrong value here is fixed later in ppc64_elf_set_toc. */
6948 if (!htab->elf.hgot->def_regular
6949 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6951 htab->elf.hgot->root.type = bfd_link_hash_defined;
6952 htab->elf.hgot->root.u.def.value = 0;
6953 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6954 htab->elf.hgot->def_regular = 1;
6955 htab->elf.hgot->root.linker_def = 1;
6957 htab->elf.hgot->type = STT_OBJECT;
6958 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
6962 if (htab->sfpr == NULL)
6963 /* We don't have any relocs. */
6966 /* Provide any missing _save* and _rest* functions. */
6967 htab->sfpr->size = 0;
6968 if (htab->params->save_restore_funcs)
6969 for (i = 0; i < sizeof (funcs) / sizeof (funcs[0]); i++)
6970 if (!sfpr_define (info, &funcs[i]))
6973 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6975 if (htab->sfpr->size == 0)
6976 htab->sfpr->flags |= SEC_EXCLUDE;
6981 /* Return true if we have dynamic relocs that apply to read-only sections. */
6984 readonly_dynrelocs (struct elf_link_hash_entry *h)
6986 struct ppc_link_hash_entry *eh;
6987 struct elf_dyn_relocs *p;
6989 eh = (struct ppc_link_hash_entry *) h;
6990 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6992 asection *s = p->sec->output_section;
6994 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7000 /* Adjust a symbol defined by a dynamic object and referenced by a
7001 regular object. The current definition is in some section of the
7002 dynamic object, but we're not including those sections. We have to
7003 change the definition to something the rest of the link can
7007 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7008 struct elf_link_hash_entry *h)
7010 struct ppc_link_hash_table *htab;
7013 htab = ppc_hash_table (info);
7017 /* Deal with function syms. */
7018 if (h->type == STT_FUNC
7019 || h->type == STT_GNU_IFUNC
7022 /* Clear procedure linkage table information for any symbol that
7023 won't need a .plt entry. */
7024 struct plt_entry *ent;
7025 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7026 if (ent->plt.refcount > 0)
7029 || (h->type != STT_GNU_IFUNC
7030 && (SYMBOL_CALLS_LOCAL (info, h)
7031 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
7032 && h->root.type == bfd_link_hash_undefweak))))
7034 h->plt.plist = NULL;
7036 h->pointer_equality_needed = 0;
7038 else if (abiversion (info->output_bfd) == 2)
7040 /* Taking a function's address in a read/write section
7041 doesn't require us to define the function symbol in the
7042 executable on a global entry stub. A dynamic reloc can
7044 if (h->pointer_equality_needed
7045 && h->type != STT_GNU_IFUNC
7046 && !readonly_dynrelocs (h))
7048 h->pointer_equality_needed = 0;
7052 /* After adjust_dynamic_symbol, non_got_ref set in the
7053 non-shared case means that we have allocated space in
7054 .dynbss for the symbol and thus dyn_relocs for this
7055 symbol should be discarded.
7056 If we get here we know we are making a PLT entry for this
7057 symbol, and in an executable we'd normally resolve
7058 relocations against this symbol to the PLT entry. Allow
7059 dynamic relocs if the reference is weak, and the dynamic
7060 relocs will not cause text relocation. */
7061 else if (!h->ref_regular_nonweak
7063 && h->type != STT_GNU_IFUNC
7064 && !readonly_dynrelocs (h))
7067 /* If making a plt entry, then we don't need copy relocs. */
7072 h->plt.plist = NULL;
7074 /* If this is a weak symbol, and there is a real definition, the
7075 processor independent code will have arranged for us to see the
7076 real definition first, and we can just use the same value. */
7077 if (h->u.weakdef != NULL)
7079 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7080 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7081 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7082 h->root.u.def.value = h->u.weakdef->root.u.def.value;
7083 if (ELIMINATE_COPY_RELOCS)
7084 h->non_got_ref = h->u.weakdef->non_got_ref;
7088 /* If we are creating a shared library, we must presume that the
7089 only references to the symbol are via the global offset table.
7090 For such cases we need not do anything here; the relocations will
7091 be handled correctly by relocate_section. */
7092 if (bfd_link_pic (info))
7095 /* If there are no references to this symbol that do not use the
7096 GOT, we don't need to generate a copy reloc. */
7097 if (!h->non_got_ref)
7100 /* Don't generate a copy reloc for symbols defined in the executable. */
7101 if (!h->def_dynamic || !h->ref_regular || h->def_regular)
7104 /* If -z nocopyreloc was given, don't generate them either. */
7105 if (info->nocopyreloc)
7111 /* If we didn't find any dynamic relocs in read-only sections, then
7112 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7113 if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
7119 /* Protected variables do not work with .dynbss. The copy in
7120 .dynbss won't be used by the shared library with the protected
7121 definition for the variable. Text relocations are preferable
7122 to an incorrect program. */
7123 if (h->protected_def)
7129 if (h->plt.plist != NULL)
7131 /* We should never get here, but unfortunately there are versions
7132 of gcc out there that improperly (for this ABI) put initialized
7133 function pointers, vtable refs and suchlike in read-only
7134 sections. Allow them to proceed, but warn that this might
7135 break at runtime. */
7136 info->callbacks->einfo
7137 (_("%P: copy reloc against `%T' requires lazy plt linking; "
7138 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7139 h->root.root.string);
7142 /* This is a reference to a symbol defined by a dynamic object which
7143 is not a function. */
7145 /* We must allocate the symbol in our .dynbss section, which will
7146 become part of the .bss section of the executable. There will be
7147 an entry for this symbol in the .dynsym section. The dynamic
7148 object will contain position independent code, so all references
7149 from the dynamic object to this symbol will go through the global
7150 offset table. The dynamic linker will use the .dynsym entry to
7151 determine the address it must put in the global offset table, so
7152 both the dynamic object and the regular object will refer to the
7153 same memory location for the variable. */
7155 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7156 to copy the initial value out of the dynamic object and into the
7157 runtime process image. We need to remember the offset into the
7158 .rela.bss section we are going to use. */
7159 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
7161 htab->relbss->size += sizeof (Elf64_External_Rela);
7167 return _bfd_elf_adjust_dynamic_copy (info, h, s);
7170 /* If given a function descriptor symbol, hide both the function code
7171 sym and the descriptor. */
7173 ppc64_elf_hide_symbol (struct bfd_link_info *info,
7174 struct elf_link_hash_entry *h,
7175 bfd_boolean force_local)
7177 struct ppc_link_hash_entry *eh;
7178 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7180 eh = (struct ppc_link_hash_entry *) h;
7181 if (eh->is_func_descriptor)
7183 struct ppc_link_hash_entry *fh = eh->oh;
7188 struct ppc_link_hash_table *htab;
7191 /* We aren't supposed to use alloca in BFD because on
7192 systems which do not have alloca the version in libiberty
7193 calls xmalloc, which might cause the program to crash
7194 when it runs out of memory. This function doesn't have a
7195 return status, so there's no way to gracefully return an
7196 error. So cheat. We know that string[-1] can be safely
7197 accessed; It's either a string in an ELF string table,
7198 or allocated in an objalloc structure. */
7200 p = eh->elf.root.root.string - 1;
7203 htab = ppc_hash_table (info);
7207 fh = (struct ppc_link_hash_entry *)
7208 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
7211 /* Unfortunately, if it so happens that the string we were
7212 looking for was allocated immediately before this string,
7213 then we overwrote the string terminator. That's the only
7214 reason the lookup should fail. */
7217 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7218 while (q >= eh->elf.root.root.string && *q == *p)
7220 if (q < eh->elf.root.root.string && *p == '.')
7221 fh = (struct ppc_link_hash_entry *)
7222 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
7231 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7236 get_sym_h (struct elf_link_hash_entry **hp,
7237 Elf_Internal_Sym **symp,
7239 unsigned char **tls_maskp,
7240 Elf_Internal_Sym **locsymsp,
7241 unsigned long r_symndx,
7244 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7246 if (r_symndx >= symtab_hdr->sh_info)
7248 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7249 struct elf_link_hash_entry *h;
7251 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7252 h = elf_follow_link (h);
7260 if (symsecp != NULL)
7262 asection *symsec = NULL;
7263 if (h->root.type == bfd_link_hash_defined
7264 || h->root.type == bfd_link_hash_defweak)
7265 symsec = h->root.u.def.section;
7269 if (tls_maskp != NULL)
7271 struct ppc_link_hash_entry *eh;
7273 eh = (struct ppc_link_hash_entry *) h;
7274 *tls_maskp = &eh->tls_mask;
7279 Elf_Internal_Sym *sym;
7280 Elf_Internal_Sym *locsyms = *locsymsp;
7282 if (locsyms == NULL)
7284 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7285 if (locsyms == NULL)
7286 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7287 symtab_hdr->sh_info,
7288 0, NULL, NULL, NULL);
7289 if (locsyms == NULL)
7291 *locsymsp = locsyms;
7293 sym = locsyms + r_symndx;
7301 if (symsecp != NULL)
7302 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
7304 if (tls_maskp != NULL)
7306 struct got_entry **lgot_ents;
7307 unsigned char *tls_mask;
7310 lgot_ents = elf_local_got_ents (ibfd);
7311 if (lgot_ents != NULL)
7313 struct plt_entry **local_plt = (struct plt_entry **)
7314 (lgot_ents + symtab_hdr->sh_info);
7315 unsigned char *lgot_masks = (unsigned char *)
7316 (local_plt + symtab_hdr->sh_info);
7317 tls_mask = &lgot_masks[r_symndx];
7319 *tls_maskp = tls_mask;
7325 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7326 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7327 type suitable for optimization, and 1 otherwise. */
7330 get_tls_mask (unsigned char **tls_maskp,
7331 unsigned long *toc_symndx,
7332 bfd_vma *toc_addend,
7333 Elf_Internal_Sym **locsymsp,
7334 const Elf_Internal_Rela *rel,
7337 unsigned long r_symndx;
7339 struct elf_link_hash_entry *h;
7340 Elf_Internal_Sym *sym;
7344 r_symndx = ELF64_R_SYM (rel->r_info);
7345 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7348 if ((*tls_maskp != NULL && **tls_maskp != 0)
7350 || ppc64_elf_section_data (sec) == NULL
7351 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
7354 /* Look inside a TOC section too. */
7357 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7358 off = h->root.u.def.value;
7361 off = sym->st_value;
7362 off += rel->r_addend;
7363 BFD_ASSERT (off % 8 == 0);
7364 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7365 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
7366 if (toc_symndx != NULL)
7367 *toc_symndx = r_symndx;
7368 if (toc_addend != NULL)
7369 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7370 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7372 if ((h == NULL || is_static_defined (h))
7373 && (next_r == -1 || next_r == -2))
7378 /* Find (or create) an entry in the tocsave hash table. */
7380 static struct tocsave_entry *
7381 tocsave_find (struct ppc_link_hash_table *htab,
7382 enum insert_option insert,
7383 Elf_Internal_Sym **local_syms,
7384 const Elf_Internal_Rela *irela,
7387 unsigned long r_indx;
7388 struct elf_link_hash_entry *h;
7389 Elf_Internal_Sym *sym;
7390 struct tocsave_entry ent, *p;
7392 struct tocsave_entry **slot;
7394 r_indx = ELF64_R_SYM (irela->r_info);
7395 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7397 if (ent.sec == NULL || ent.sec->output_section == NULL)
7399 (*_bfd_error_handler)
7400 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7405 ent.offset = h->root.u.def.value;
7407 ent.offset = sym->st_value;
7408 ent.offset += irela->r_addend;
7410 hash = tocsave_htab_hash (&ent);
7411 slot = ((struct tocsave_entry **)
7412 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7418 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7427 /* Adjust all global syms defined in opd sections. In gcc generated
7428 code for the old ABI, these will already have been done. */
7431 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7433 struct ppc_link_hash_entry *eh;
7435 struct _opd_sec_data *opd;
7437 if (h->root.type == bfd_link_hash_indirect)
7440 if (h->root.type != bfd_link_hash_defined
7441 && h->root.type != bfd_link_hash_defweak)
7444 eh = (struct ppc_link_hash_entry *) h;
7445 if (eh->adjust_done)
7448 sym_sec = eh->elf.root.u.def.section;
7449 opd = get_opd_info (sym_sec);
7450 if (opd != NULL && opd->adjust != NULL)
7452 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
7455 /* This entry has been deleted. */
7456 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
7459 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
7460 if (discarded_section (dsec))
7462 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
7466 eh->elf.root.u.def.value = 0;
7467 eh->elf.root.u.def.section = dsec;
7470 eh->elf.root.u.def.value += adjust;
7471 eh->adjust_done = 1;
7476 /* Handles decrementing dynamic reloc counts for the reloc specified by
7477 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7478 have already been determined. */
7481 dec_dynrel_count (bfd_vma r_info,
7483 struct bfd_link_info *info,
7484 Elf_Internal_Sym **local_syms,
7485 struct elf_link_hash_entry *h,
7486 Elf_Internal_Sym *sym)
7488 enum elf_ppc64_reloc_type r_type;
7489 asection *sym_sec = NULL;
7491 /* Can this reloc be dynamic? This switch, and later tests here
7492 should be kept in sync with the code in check_relocs. */
7493 r_type = ELF64_R_TYPE (r_info);
7499 case R_PPC64_TPREL16:
7500 case R_PPC64_TPREL16_LO:
7501 case R_PPC64_TPREL16_HI:
7502 case R_PPC64_TPREL16_HA:
7503 case R_PPC64_TPREL16_DS:
7504 case R_PPC64_TPREL16_LO_DS:
7505 case R_PPC64_TPREL16_HIGH:
7506 case R_PPC64_TPREL16_HIGHA:
7507 case R_PPC64_TPREL16_HIGHER:
7508 case R_PPC64_TPREL16_HIGHERA:
7509 case R_PPC64_TPREL16_HIGHEST:
7510 case R_PPC64_TPREL16_HIGHESTA:
7511 if (!bfd_link_pic (info))
7514 case R_PPC64_TPREL64:
7515 case R_PPC64_DTPMOD64:
7516 case R_PPC64_DTPREL64:
7517 case R_PPC64_ADDR64:
7521 case R_PPC64_ADDR14:
7522 case R_PPC64_ADDR14_BRNTAKEN:
7523 case R_PPC64_ADDR14_BRTAKEN:
7524 case R_PPC64_ADDR16:
7525 case R_PPC64_ADDR16_DS:
7526 case R_PPC64_ADDR16_HA:
7527 case R_PPC64_ADDR16_HI:
7528 case R_PPC64_ADDR16_HIGH:
7529 case R_PPC64_ADDR16_HIGHA:
7530 case R_PPC64_ADDR16_HIGHER:
7531 case R_PPC64_ADDR16_HIGHERA:
7532 case R_PPC64_ADDR16_HIGHEST:
7533 case R_PPC64_ADDR16_HIGHESTA:
7534 case R_PPC64_ADDR16_LO:
7535 case R_PPC64_ADDR16_LO_DS:
7536 case R_PPC64_ADDR24:
7537 case R_PPC64_ADDR32:
7538 case R_PPC64_UADDR16:
7539 case R_PPC64_UADDR32:
7540 case R_PPC64_UADDR64:
7545 if (local_syms != NULL)
7547 unsigned long r_symndx;
7548 bfd *ibfd = sec->owner;
7550 r_symndx = ELF64_R_SYM (r_info);
7551 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7555 if ((bfd_link_pic (info)
7556 && (must_be_dyn_reloc (info, r_type)
7558 && (!SYMBOLIC_BIND (info, h)
7559 || h->root.type == bfd_link_hash_defweak
7560 || !h->def_regular))))
7561 || (ELIMINATE_COPY_RELOCS
7562 && !bfd_link_pic (info)
7564 && (h->root.type == bfd_link_hash_defweak
7565 || !h->def_regular)))
7572 struct elf_dyn_relocs *p;
7573 struct elf_dyn_relocs **pp;
7574 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7576 /* elf_gc_sweep may have already removed all dyn relocs associated
7577 with local syms for a given section. Also, symbol flags are
7578 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7579 report a dynreloc miscount. */
7580 if (*pp == NULL && info->gc_sections)
7583 while ((p = *pp) != NULL)
7587 if (!must_be_dyn_reloc (info, r_type))
7599 struct ppc_dyn_relocs *p;
7600 struct ppc_dyn_relocs **pp;
7602 bfd_boolean is_ifunc;
7604 if (local_syms == NULL)
7605 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7606 if (sym_sec == NULL)
7609 vpp = &elf_section_data (sym_sec)->local_dynrel;
7610 pp = (struct ppc_dyn_relocs **) vpp;
7612 if (*pp == NULL && info->gc_sections)
7615 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7616 while ((p = *pp) != NULL)
7618 if (p->sec == sec && p->ifunc == is_ifunc)
7629 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
7631 bfd_set_error (bfd_error_bad_value);
7635 /* Remove unused Official Procedure Descriptor entries. Currently we
7636 only remove those associated with functions in discarded link-once
7637 sections, or weakly defined functions that have been overridden. It
7638 would be possible to remove many more entries for statically linked
7642 ppc64_elf_edit_opd (struct bfd_link_info *info)
7645 bfd_boolean some_edited = FALSE;
7646 asection *need_pad = NULL;
7647 struct ppc_link_hash_table *htab;
7649 htab = ppc_hash_table (info);
7653 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7656 Elf_Internal_Rela *relstart, *rel, *relend;
7657 Elf_Internal_Shdr *symtab_hdr;
7658 Elf_Internal_Sym *local_syms;
7659 struct _opd_sec_data *opd;
7660 bfd_boolean need_edit, add_aux_fields, broken;
7661 bfd_size_type cnt_16b = 0;
7663 if (!is_ppc64_elf (ibfd))
7666 sec = bfd_get_section_by_name (ibfd, ".opd");
7667 if (sec == NULL || sec->size == 0)
7670 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7673 if (sec->output_section == bfd_abs_section_ptr)
7676 /* Look through the section relocs. */
7677 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7681 symtab_hdr = &elf_symtab_hdr (ibfd);
7683 /* Read the relocations. */
7684 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7686 if (relstart == NULL)
7689 /* First run through the relocs to check they are sane, and to
7690 determine whether we need to edit this opd section. */
7694 relend = relstart + sec->reloc_count;
7695 for (rel = relstart; rel < relend; )
7697 enum elf_ppc64_reloc_type r_type;
7698 unsigned long r_symndx;
7700 struct elf_link_hash_entry *h;
7701 Elf_Internal_Sym *sym;
7704 /* .opd contains an array of 16 or 24 byte entries. We're
7705 only interested in the reloc pointing to a function entry
7707 offset = rel->r_offset;
7708 if (rel + 1 == relend
7709 || rel[1].r_offset != offset + 8)
7711 /* If someone messes with .opd alignment then after a
7712 "ld -r" we might have padding in the middle of .opd.
7713 Also, there's nothing to prevent someone putting
7714 something silly in .opd with the assembler. No .opd
7715 optimization for them! */
7717 (*_bfd_error_handler)
7718 (_("%B: .opd is not a regular array of opd entries"), ibfd);
7723 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7724 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7726 (*_bfd_error_handler)
7727 (_("%B: unexpected reloc type %u in .opd section"),
7733 r_symndx = ELF64_R_SYM (rel->r_info);
7734 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7738 if (sym_sec == NULL || sym_sec->owner == NULL)
7740 const char *sym_name;
7742 sym_name = h->root.root.string;
7744 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7747 (*_bfd_error_handler)
7748 (_("%B: undefined sym `%s' in .opd section"),
7754 /* opd entries are always for functions defined in the
7755 current input bfd. If the symbol isn't defined in the
7756 input bfd, then we won't be using the function in this
7757 bfd; It must be defined in a linkonce section in another
7758 bfd, or is weak. It's also possible that we are
7759 discarding the function due to a linker script /DISCARD/,
7760 which we test for via the output_section. */
7761 if (sym_sec->owner != ibfd
7762 || sym_sec->output_section == bfd_abs_section_ptr)
7766 if (rel + 1 == relend
7767 || (rel + 2 < relend
7768 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7773 if (sec->size == offset + 24)
7778 if (sec->size == offset + 16)
7785 else if (rel + 1 < relend
7786 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7787 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7789 if (rel[0].r_offset == offset + 16)
7791 else if (rel[0].r_offset != offset + 24)
7798 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7800 if (!broken && (need_edit || add_aux_fields))
7802 Elf_Internal_Rela *write_rel;
7803 Elf_Internal_Shdr *rel_hdr;
7804 bfd_byte *rptr, *wptr;
7805 bfd_byte *new_contents;
7808 new_contents = NULL;
7809 amt = OPD_NDX (sec->size) * sizeof (long);
7810 opd = &ppc64_elf_section_data (sec)->u.opd;
7811 opd->adjust = bfd_zalloc (sec->owner, amt);
7812 if (opd->adjust == NULL)
7814 ppc64_elf_section_data (sec)->sec_type = sec_opd;
7816 /* This seems a waste of time as input .opd sections are all
7817 zeros as generated by gcc, but I suppose there's no reason
7818 this will always be so. We might start putting something in
7819 the third word of .opd entries. */
7820 if ((sec->flags & SEC_IN_MEMORY) == 0)
7823 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7828 if (local_syms != NULL
7829 && symtab_hdr->contents != (unsigned char *) local_syms)
7831 if (elf_section_data (sec)->relocs != relstart)
7835 sec->contents = loc;
7836 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7839 elf_section_data (sec)->relocs = relstart;
7841 new_contents = sec->contents;
7844 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7845 if (new_contents == NULL)
7849 wptr = new_contents;
7850 rptr = sec->contents;
7851 write_rel = relstart;
7852 for (rel = relstart; rel < relend; )
7854 unsigned long r_symndx;
7856 struct elf_link_hash_entry *h;
7857 struct ppc_link_hash_entry *fdh = NULL;
7858 Elf_Internal_Sym *sym;
7860 Elf_Internal_Rela *next_rel;
7863 r_symndx = ELF64_R_SYM (rel->r_info);
7864 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7869 if (next_rel + 1 == relend
7870 || (next_rel + 2 < relend
7871 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7874 /* See if the .opd entry is full 24 byte or
7875 16 byte (with fd_aux entry overlapped with next
7878 if (next_rel == relend)
7880 if (sec->size == rel->r_offset + 16)
7883 else if (next_rel->r_offset == rel->r_offset + 16)
7887 && h->root.root.string[0] == '.')
7889 fdh = lookup_fdh ((struct ppc_link_hash_entry *) h, htab);
7891 && fdh->elf.root.type != bfd_link_hash_defined
7892 && fdh->elf.root.type != bfd_link_hash_defweak)
7896 skip = (sym_sec->owner != ibfd
7897 || sym_sec->output_section == bfd_abs_section_ptr);
7900 if (fdh != NULL && sym_sec->owner == ibfd)
7902 /* Arrange for the function descriptor sym
7904 fdh->elf.root.u.def.value = 0;
7905 fdh->elf.root.u.def.section = sym_sec;
7907 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
7909 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
7914 if (!dec_dynrel_count (rel->r_info, sec, info,
7918 if (++rel == next_rel)
7921 r_symndx = ELF64_R_SYM (rel->r_info);
7922 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7929 /* We'll be keeping this opd entry. */
7934 /* Redefine the function descriptor symbol to
7935 this location in the opd section. It is
7936 necessary to update the value here rather
7937 than using an array of adjustments as we do
7938 for local symbols, because various places
7939 in the generic ELF code use the value
7940 stored in u.def.value. */
7941 fdh->elf.root.u.def.value = wptr - new_contents;
7942 fdh->adjust_done = 1;
7945 /* Local syms are a bit tricky. We could
7946 tweak them as they can be cached, but
7947 we'd need to look through the local syms
7948 for the function descriptor sym which we
7949 don't have at the moment. So keep an
7950 array of adjustments. */
7951 adjust = (wptr - new_contents) - (rptr - sec->contents);
7952 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7955 memcpy (wptr, rptr, opd_ent_size);
7956 wptr += opd_ent_size;
7957 if (add_aux_fields && opd_ent_size == 16)
7959 memset (wptr, '\0', 8);
7963 /* We need to adjust any reloc offsets to point to the
7965 for ( ; rel != next_rel; ++rel)
7967 rel->r_offset += adjust;
7968 if (write_rel != rel)
7969 memcpy (write_rel, rel, sizeof (*rel));
7974 rptr += opd_ent_size;
7977 sec->size = wptr - new_contents;
7978 sec->reloc_count = write_rel - relstart;
7981 free (sec->contents);
7982 sec->contents = new_contents;
7985 /* Fudge the header size too, as this is used later in
7986 elf_bfd_final_link if we are emitting relocs. */
7987 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7988 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
7991 else if (elf_section_data (sec)->relocs != relstart)
7994 if (local_syms != NULL
7995 && symtab_hdr->contents != (unsigned char *) local_syms)
7997 if (!info->keep_memory)
8000 symtab_hdr->contents = (unsigned char *) local_syms;
8005 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8007 /* If we are doing a final link and the last .opd entry is just 16 byte
8008 long, add a 8 byte padding after it. */
8009 if (need_pad != NULL && !bfd_link_relocatable (info))
8013 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8015 BFD_ASSERT (need_pad->size > 0);
8017 p = bfd_malloc (need_pad->size + 8);
8021 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8022 p, 0, need_pad->size))
8025 need_pad->contents = p;
8026 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8030 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8034 need_pad->contents = p;
8037 memset (need_pad->contents + need_pad->size, 0, 8);
8038 need_pad->size += 8;
8044 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8047 ppc64_elf_tls_setup (struct bfd_link_info *info)
8049 struct ppc_link_hash_table *htab;
8051 htab = ppc_hash_table (info);
8055 if (abiversion (info->output_bfd) == 1)
8058 if (htab->params->no_multi_toc)
8059 htab->do_multi_toc = 0;
8060 else if (!htab->do_multi_toc)
8061 htab->params->no_multi_toc = 1;
8063 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8064 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8065 FALSE, FALSE, TRUE));
8066 /* Move dynamic linking info to the function descriptor sym. */
8067 if (htab->tls_get_addr != NULL)
8068 func_desc_adjust (&htab->tls_get_addr->elf, info);
8069 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8070 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8071 FALSE, FALSE, TRUE));
8072 if (!htab->params->no_tls_get_addr_opt)
8074 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8076 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8077 FALSE, FALSE, TRUE);
8079 func_desc_adjust (opt, info);
8080 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8081 FALSE, FALSE, TRUE);
8083 && (opt_fd->root.type == bfd_link_hash_defined
8084 || opt_fd->root.type == bfd_link_hash_defweak))
8086 /* If glibc supports an optimized __tls_get_addr call stub,
8087 signalled by the presence of __tls_get_addr_opt, and we'll
8088 be calling __tls_get_addr via a plt call stub, then
8089 make __tls_get_addr point to __tls_get_addr_opt. */
8090 tga_fd = &htab->tls_get_addr_fd->elf;
8091 if (htab->elf.dynamic_sections_created
8093 && (tga_fd->type == STT_FUNC
8094 || tga_fd->needs_plt)
8095 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8096 || (ELF_ST_VISIBILITY (tga_fd->other) != STV_DEFAULT
8097 && tga_fd->root.type == bfd_link_hash_undefweak)))
8099 struct plt_entry *ent;
8101 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8102 if (ent->plt.refcount > 0)
8106 tga_fd->root.type = bfd_link_hash_indirect;
8107 tga_fd->root.u.i.link = &opt_fd->root;
8108 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
8109 if (opt_fd->dynindx != -1)
8111 /* Use __tls_get_addr_opt in dynamic relocations. */
8112 opt_fd->dynindx = -1;
8113 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8114 opt_fd->dynstr_index);
8115 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
8118 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8119 tga = &htab->tls_get_addr->elf;
8120 if (opt != NULL && tga != NULL)
8122 tga->root.type = bfd_link_hash_indirect;
8123 tga->root.u.i.link = &opt->root;
8124 ppc64_elf_copy_indirect_symbol (info, opt, tga);
8125 _bfd_elf_link_hash_hide_symbol (info, opt,
8127 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8129 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8130 htab->tls_get_addr_fd->is_func_descriptor = 1;
8131 if (htab->tls_get_addr != NULL)
8133 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8134 htab->tls_get_addr->is_func = 1;
8140 htab->params->no_tls_get_addr_opt = TRUE;
8142 return _bfd_elf_tls_setup (info->output_bfd, info);
8145 /* Return TRUE iff REL is a branch reloc with a global symbol matching
8149 branch_reloc_hash_match (const bfd *ibfd,
8150 const Elf_Internal_Rela *rel,
8151 const struct ppc_link_hash_entry *hash1,
8152 const struct ppc_link_hash_entry *hash2)
8154 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8155 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8156 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8158 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8160 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8161 struct elf_link_hash_entry *h;
8163 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8164 h = elf_follow_link (h);
8165 if (h == &hash1->elf || h == &hash2->elf)
8171 /* Run through all the TLS relocs looking for optimization
8172 opportunities. The linker has been hacked (see ppc64elf.em) to do
8173 a preliminary section layout so that we know the TLS segment
8174 offsets. We can't optimize earlier because some optimizations need
8175 to know the tp offset, and we need to optimize before allocating
8176 dynamic relocations. */
8179 ppc64_elf_tls_optimize (struct bfd_link_info *info)
8183 struct ppc_link_hash_table *htab;
8184 unsigned char *toc_ref;
8187 if (!bfd_link_executable (info))
8190 htab = ppc_hash_table (info);
8194 /* Make two passes over the relocs. On the first pass, mark toc
8195 entries involved with tls relocs, and check that tls relocs
8196 involved in setting up a tls_get_addr call are indeed followed by
8197 such a call. If they are not, we can't do any tls optimization.
8198 On the second pass twiddle tls_mask flags to notify
8199 relocate_section that optimization can be done, and adjust got
8200 and plt refcounts. */
8202 for (pass = 0; pass < 2; ++pass)
8203 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8205 Elf_Internal_Sym *locsyms = NULL;
8206 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8208 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8209 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8211 Elf_Internal_Rela *relstart, *rel, *relend;
8212 bfd_boolean found_tls_get_addr_arg = 0;
8214 /* Read the relocations. */
8215 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8217 if (relstart == NULL)
8223 relend = relstart + sec->reloc_count;
8224 for (rel = relstart; rel < relend; rel++)
8226 enum elf_ppc64_reloc_type r_type;
8227 unsigned long r_symndx;
8228 struct elf_link_hash_entry *h;
8229 Elf_Internal_Sym *sym;
8231 unsigned char *tls_mask;
8232 unsigned char tls_set, tls_clear, tls_type = 0;
8234 bfd_boolean ok_tprel, is_local;
8235 long toc_ref_index = 0;
8236 int expecting_tls_get_addr = 0;
8237 bfd_boolean ret = FALSE;
8239 r_symndx = ELF64_R_SYM (rel->r_info);
8240 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8244 if (elf_section_data (sec)->relocs != relstart)
8246 if (toc_ref != NULL)
8249 && (elf_symtab_hdr (ibfd).contents
8250 != (unsigned char *) locsyms))
8257 if (h->root.type == bfd_link_hash_defined
8258 || h->root.type == bfd_link_hash_defweak)
8259 value = h->root.u.def.value;
8260 else if (h->root.type == bfd_link_hash_undefweak)
8264 found_tls_get_addr_arg = 0;
8269 /* Symbols referenced by TLS relocs must be of type
8270 STT_TLS. So no need for .opd local sym adjust. */
8271 value = sym->st_value;
8280 && h->root.type == bfd_link_hash_undefweak)
8284 value += sym_sec->output_offset;
8285 value += sym_sec->output_section->vma;
8286 value -= htab->elf.tls_sec->vma;
8287 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8288 < (bfd_vma) 1 << 32);
8292 r_type = ELF64_R_TYPE (rel->r_info);
8293 /* If this section has old-style __tls_get_addr calls
8294 without marker relocs, then check that each
8295 __tls_get_addr call reloc is preceded by a reloc
8296 that conceivably belongs to the __tls_get_addr arg
8297 setup insn. If we don't find matching arg setup
8298 relocs, don't do any tls optimization. */
8300 && sec->has_tls_get_addr_call
8302 && (h == &htab->tls_get_addr->elf
8303 || h == &htab->tls_get_addr_fd->elf)
8304 && !found_tls_get_addr_arg
8305 && is_branch_reloc (r_type))
8307 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8308 "TLS optimization disabled\n"),
8309 ibfd, sec, rel->r_offset);
8314 found_tls_get_addr_arg = 0;
8317 case R_PPC64_GOT_TLSLD16:
8318 case R_PPC64_GOT_TLSLD16_LO:
8319 expecting_tls_get_addr = 1;
8320 found_tls_get_addr_arg = 1;
8323 case R_PPC64_GOT_TLSLD16_HI:
8324 case R_PPC64_GOT_TLSLD16_HA:
8325 /* These relocs should never be against a symbol
8326 defined in a shared lib. Leave them alone if
8327 that turns out to be the case. */
8334 tls_type = TLS_TLS | TLS_LD;
8337 case R_PPC64_GOT_TLSGD16:
8338 case R_PPC64_GOT_TLSGD16_LO:
8339 expecting_tls_get_addr = 1;
8340 found_tls_get_addr_arg = 1;
8343 case R_PPC64_GOT_TLSGD16_HI:
8344 case R_PPC64_GOT_TLSGD16_HA:
8350 tls_set = TLS_TLS | TLS_TPRELGD;
8352 tls_type = TLS_TLS | TLS_GD;
8355 case R_PPC64_GOT_TPREL16_DS:
8356 case R_PPC64_GOT_TPREL16_LO_DS:
8357 case R_PPC64_GOT_TPREL16_HI:
8358 case R_PPC64_GOT_TPREL16_HA:
8363 tls_clear = TLS_TPREL;
8364 tls_type = TLS_TLS | TLS_TPREL;
8371 found_tls_get_addr_arg = 1;
8376 case R_PPC64_TOC16_LO:
8377 if (sym_sec == NULL || sym_sec != toc)
8380 /* Mark this toc entry as referenced by a TLS
8381 code sequence. We can do that now in the
8382 case of R_PPC64_TLS, and after checking for
8383 tls_get_addr for the TOC16 relocs. */
8384 if (toc_ref == NULL)
8385 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8386 if (toc_ref == NULL)
8390 value = h->root.u.def.value;
8392 value = sym->st_value;
8393 value += rel->r_addend;
8396 BFD_ASSERT (value < toc->size
8397 && toc->output_offset % 8 == 0);
8398 toc_ref_index = (value + toc->output_offset) / 8;
8399 if (r_type == R_PPC64_TLS
8400 || r_type == R_PPC64_TLSGD
8401 || r_type == R_PPC64_TLSLD)
8403 toc_ref[toc_ref_index] = 1;
8407 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8412 expecting_tls_get_addr = 2;
8415 case R_PPC64_TPREL64:
8419 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8424 tls_set = TLS_EXPLICIT;
8425 tls_clear = TLS_TPREL;
8430 case R_PPC64_DTPMOD64:
8434 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8436 if (rel + 1 < relend
8438 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8439 && rel[1].r_offset == rel->r_offset + 8)
8443 tls_set = TLS_EXPLICIT | TLS_GD;
8446 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8455 tls_set = TLS_EXPLICIT;
8466 if (!expecting_tls_get_addr
8467 || !sec->has_tls_get_addr_call)
8470 if (rel + 1 < relend
8471 && branch_reloc_hash_match (ibfd, rel + 1,
8473 htab->tls_get_addr_fd))
8475 if (expecting_tls_get_addr == 2)
8477 /* Check for toc tls entries. */
8478 unsigned char *toc_tls;
8481 retval = get_tls_mask (&toc_tls, NULL, NULL,
8486 if (toc_tls != NULL)
8488 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8489 found_tls_get_addr_arg = 1;
8491 toc_ref[toc_ref_index] = 1;
8497 if (expecting_tls_get_addr != 1)
8500 /* Uh oh, we didn't find the expected call. We
8501 could just mark this symbol to exclude it
8502 from tls optimization but it's safer to skip
8503 the entire optimization. */
8504 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8505 "TLS optimization disabled\n"),
8506 ibfd, sec, rel->r_offset);
8511 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
8513 struct plt_entry *ent;
8514 for (ent = htab->tls_get_addr->elf.plt.plist;
8517 if (ent->addend == 0)
8519 if (ent->plt.refcount > 0)
8521 ent->plt.refcount -= 1;
8522 expecting_tls_get_addr = 0;
8528 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
8530 struct plt_entry *ent;
8531 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8534 if (ent->addend == 0)
8536 if (ent->plt.refcount > 0)
8537 ent->plt.refcount -= 1;
8545 if ((tls_set & TLS_EXPLICIT) == 0)
8547 struct got_entry *ent;
8549 /* Adjust got entry for this reloc. */
8553 ent = elf_local_got_ents (ibfd)[r_symndx];
8555 for (; ent != NULL; ent = ent->next)
8556 if (ent->addend == rel->r_addend
8557 && ent->owner == ibfd
8558 && ent->tls_type == tls_type)
8565 /* We managed to get rid of a got entry. */
8566 if (ent->got.refcount > 0)
8567 ent->got.refcount -= 1;
8572 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8573 we'll lose one or two dyn relocs. */
8574 if (!dec_dynrel_count (rel->r_info, sec, info,
8578 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8580 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8586 *tls_mask |= tls_set;
8587 *tls_mask &= ~tls_clear;
8590 if (elf_section_data (sec)->relocs != relstart)
8595 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8597 if (!info->keep_memory)
8600 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8604 if (toc_ref != NULL)
8609 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8610 the values of any global symbols in a toc section that has been
8611 edited. Globals in toc sections should be a rarity, so this function
8612 sets a flag if any are found in toc sections other than the one just
8613 edited, so that futher hash table traversals can be avoided. */
8615 struct adjust_toc_info
8618 unsigned long *skip;
8619 bfd_boolean global_toc_syms;
8622 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8625 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8627 struct ppc_link_hash_entry *eh;
8628 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8631 if (h->root.type != bfd_link_hash_defined
8632 && h->root.type != bfd_link_hash_defweak)
8635 eh = (struct ppc_link_hash_entry *) h;
8636 if (eh->adjust_done)
8639 if (eh->elf.root.u.def.section == toc_inf->toc)
8641 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8642 i = toc_inf->toc->rawsize >> 3;
8644 i = eh->elf.root.u.def.value >> 3;
8646 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8648 (*_bfd_error_handler)
8649 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8652 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8653 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8656 eh->elf.root.u.def.value -= toc_inf->skip[i];
8657 eh->adjust_done = 1;
8659 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8660 toc_inf->global_toc_syms = TRUE;
8665 /* Return TRUE iff INSN is one we expect on a _LO variety toc/got reloc. */
8668 ok_lo_toc_insn (unsigned int insn)
8670 return ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8671 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8672 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8673 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8674 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8675 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8676 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8677 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8678 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8679 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8680 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8681 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8682 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8683 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8684 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8686 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8687 && ((insn & 3) == 0 || (insn & 3) == 3))
8688 || (insn & (0x3f << 26)) == 12u << 26 /* addic */);
8691 /* Examine all relocs referencing .toc sections in order to remove
8692 unused .toc entries. */
8695 ppc64_elf_edit_toc (struct bfd_link_info *info)
8698 struct adjust_toc_info toc_inf;
8699 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8701 htab->do_toc_opt = 1;
8702 toc_inf.global_toc_syms = TRUE;
8703 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8705 asection *toc, *sec;
8706 Elf_Internal_Shdr *symtab_hdr;
8707 Elf_Internal_Sym *local_syms;
8708 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8709 unsigned long *skip, *drop;
8710 unsigned char *used;
8711 unsigned char *keep, last, some_unused;
8713 if (!is_ppc64_elf (ibfd))
8716 toc = bfd_get_section_by_name (ibfd, ".toc");
8719 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8720 || discarded_section (toc))
8725 symtab_hdr = &elf_symtab_hdr (ibfd);
8727 /* Look at sections dropped from the final link. */
8730 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8732 if (sec->reloc_count == 0
8733 || !discarded_section (sec)
8734 || get_opd_info (sec)
8735 || (sec->flags & SEC_ALLOC) == 0
8736 || (sec->flags & SEC_DEBUGGING) != 0)
8739 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8740 if (relstart == NULL)
8743 /* Run through the relocs to see which toc entries might be
8745 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8747 enum elf_ppc64_reloc_type r_type;
8748 unsigned long r_symndx;
8750 struct elf_link_hash_entry *h;
8751 Elf_Internal_Sym *sym;
8754 r_type = ELF64_R_TYPE (rel->r_info);
8761 case R_PPC64_TOC16_LO:
8762 case R_PPC64_TOC16_HI:
8763 case R_PPC64_TOC16_HA:
8764 case R_PPC64_TOC16_DS:
8765 case R_PPC64_TOC16_LO_DS:
8769 r_symndx = ELF64_R_SYM (rel->r_info);
8770 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8778 val = h->root.u.def.value;
8780 val = sym->st_value;
8781 val += rel->r_addend;
8783 if (val >= toc->size)
8786 /* Anything in the toc ought to be aligned to 8 bytes.
8787 If not, don't mark as unused. */
8793 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8798 skip[val >> 3] = ref_from_discarded;
8801 if (elf_section_data (sec)->relocs != relstart)
8805 /* For largetoc loads of address constants, we can convert
8806 . addis rx,2,addr@got@ha
8807 . ld ry,addr@got@l(rx)
8809 . addis rx,2,addr@toc@ha
8810 . addi ry,rx,addr@toc@l
8811 when addr is within 2G of the toc pointer. This then means
8812 that the word storing "addr" in the toc is no longer needed. */
8814 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8815 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8816 && toc->reloc_count != 0)
8818 /* Read toc relocs. */
8819 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8821 if (toc_relocs == NULL)
8824 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8826 enum elf_ppc64_reloc_type r_type;
8827 unsigned long r_symndx;
8829 struct elf_link_hash_entry *h;
8830 Elf_Internal_Sym *sym;
8833 r_type = ELF64_R_TYPE (rel->r_info);
8834 if (r_type != R_PPC64_ADDR64)
8837 r_symndx = ELF64_R_SYM (rel->r_info);
8838 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8843 || discarded_section (sym_sec))
8846 if (!SYMBOL_REFERENCES_LOCAL (info, h))
8851 if (h->type == STT_GNU_IFUNC)
8853 val = h->root.u.def.value;
8857 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8859 val = sym->st_value;
8861 val += rel->r_addend;
8862 val += sym_sec->output_section->vma + sym_sec->output_offset;
8864 /* We don't yet know the exact toc pointer value, but we
8865 know it will be somewhere in the toc section. Don't
8866 optimize if the difference from any possible toc
8867 pointer is outside [ff..f80008000, 7fff7fff]. */
8868 addr = toc->output_section->vma + TOC_BASE_OFF;
8869 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8872 addr = toc->output_section->vma + toc->output_section->rawsize;
8873 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8878 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8883 skip[rel->r_offset >> 3]
8884 |= can_optimize | ((rel - toc_relocs) << 2);
8891 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8895 if (local_syms != NULL
8896 && symtab_hdr->contents != (unsigned char *) local_syms)
8900 && elf_section_data (sec)->relocs != relstart)
8902 if (toc_relocs != NULL
8903 && elf_section_data (toc)->relocs != toc_relocs)
8910 /* Now check all kept sections that might reference the toc.
8911 Check the toc itself last. */
8912 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8915 sec = (sec == toc ? NULL
8916 : sec->next == NULL ? toc
8917 : sec->next == toc && toc->next ? toc->next
8922 if (sec->reloc_count == 0
8923 || discarded_section (sec)
8924 || get_opd_info (sec)
8925 || (sec->flags & SEC_ALLOC) == 0
8926 || (sec->flags & SEC_DEBUGGING) != 0)
8929 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8931 if (relstart == NULL)
8937 /* Mark toc entries referenced as used. */
8941 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8943 enum elf_ppc64_reloc_type r_type;
8944 unsigned long r_symndx;
8946 struct elf_link_hash_entry *h;
8947 Elf_Internal_Sym *sym;
8949 enum {no_check, check_lo, check_ha} insn_check;
8951 r_type = ELF64_R_TYPE (rel->r_info);
8955 insn_check = no_check;
8958 case R_PPC64_GOT_TLSLD16_HA:
8959 case R_PPC64_GOT_TLSGD16_HA:
8960 case R_PPC64_GOT_TPREL16_HA:
8961 case R_PPC64_GOT_DTPREL16_HA:
8962 case R_PPC64_GOT16_HA:
8963 case R_PPC64_TOC16_HA:
8964 insn_check = check_ha;
8967 case R_PPC64_GOT_TLSLD16_LO:
8968 case R_PPC64_GOT_TLSGD16_LO:
8969 case R_PPC64_GOT_TPREL16_LO_DS:
8970 case R_PPC64_GOT_DTPREL16_LO_DS:
8971 case R_PPC64_GOT16_LO:
8972 case R_PPC64_GOT16_LO_DS:
8973 case R_PPC64_TOC16_LO:
8974 case R_PPC64_TOC16_LO_DS:
8975 insn_check = check_lo;
8979 if (insn_check != no_check)
8981 bfd_vma off = rel->r_offset & ~3;
8982 unsigned char buf[4];
8985 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
8990 insn = bfd_get_32 (ibfd, buf);
8991 if (insn_check == check_lo
8992 ? !ok_lo_toc_insn (insn)
8993 : ((insn & ((0x3f << 26) | 0x1f << 16))
8994 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
8998 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
8999 sprintf (str, "%#08x", insn);
9000 info->callbacks->einfo
9001 (_("%P: %H: toc optimization is not supported for"
9002 " %s instruction.\n"),
9003 ibfd, sec, rel->r_offset & ~3, str);
9010 case R_PPC64_TOC16_LO:
9011 case R_PPC64_TOC16_HI:
9012 case R_PPC64_TOC16_HA:
9013 case R_PPC64_TOC16_DS:
9014 case R_PPC64_TOC16_LO_DS:
9015 /* In case we're taking addresses of toc entries. */
9016 case R_PPC64_ADDR64:
9023 r_symndx = ELF64_R_SYM (rel->r_info);
9024 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9035 val = h->root.u.def.value;
9037 val = sym->st_value;
9038 val += rel->r_addend;
9040 if (val >= toc->size)
9043 if ((skip[val >> 3] & can_optimize) != 0)
9050 case R_PPC64_TOC16_HA:
9053 case R_PPC64_TOC16_LO_DS:
9054 off = rel->r_offset;
9055 off += (bfd_big_endian (ibfd) ? -2 : 3);
9056 if (!bfd_get_section_contents (ibfd, sec, &opc,
9062 if ((opc & (0x3f << 2)) == (58u << 2))
9067 /* Wrong sort of reloc, or not a ld. We may
9068 as well clear ref_from_discarded too. */
9075 /* For the toc section, we only mark as used if this
9076 entry itself isn't unused. */
9077 else if ((used[rel->r_offset >> 3]
9078 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9081 /* Do all the relocs again, to catch reference
9090 if (elf_section_data (sec)->relocs != relstart)
9094 /* Merge the used and skip arrays. Assume that TOC
9095 doublewords not appearing as either used or unused belong
9096 to to an entry more than one doubleword in size. */
9097 for (drop = skip, keep = used, last = 0, some_unused = 0;
9098 drop < skip + (toc->size + 7) / 8;
9103 *drop &= ~ref_from_discarded;
9104 if ((*drop & can_optimize) != 0)
9108 else if ((*drop & ref_from_discarded) != 0)
9111 last = ref_from_discarded;
9121 bfd_byte *contents, *src;
9123 Elf_Internal_Sym *sym;
9124 bfd_boolean local_toc_syms = FALSE;
9126 /* Shuffle the toc contents, and at the same time convert the
9127 skip array from booleans into offsets. */
9128 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9131 elf_section_data (toc)->this_hdr.contents = contents;
9133 for (src = contents, off = 0, drop = skip;
9134 src < contents + toc->size;
9137 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9142 memcpy (src - off, src, 8);
9146 toc->rawsize = toc->size;
9147 toc->size = src - contents - off;
9149 /* Adjust addends for relocs against the toc section sym,
9150 and optimize any accesses we can. */
9151 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9153 if (sec->reloc_count == 0
9154 || discarded_section (sec))
9157 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9159 if (relstart == NULL)
9162 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9164 enum elf_ppc64_reloc_type r_type;
9165 unsigned long r_symndx;
9167 struct elf_link_hash_entry *h;
9170 r_type = ELF64_R_TYPE (rel->r_info);
9177 case R_PPC64_TOC16_LO:
9178 case R_PPC64_TOC16_HI:
9179 case R_PPC64_TOC16_HA:
9180 case R_PPC64_TOC16_DS:
9181 case R_PPC64_TOC16_LO_DS:
9182 case R_PPC64_ADDR64:
9186 r_symndx = ELF64_R_SYM (rel->r_info);
9187 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9195 val = h->root.u.def.value;
9198 val = sym->st_value;
9200 local_toc_syms = TRUE;
9203 val += rel->r_addend;
9205 if (val > toc->rawsize)
9207 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9209 else if ((skip[val >> 3] & can_optimize) != 0)
9211 Elf_Internal_Rela *tocrel
9212 = toc_relocs + (skip[val >> 3] >> 2);
9213 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9217 case R_PPC64_TOC16_HA:
9218 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9221 case R_PPC64_TOC16_LO_DS:
9222 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9226 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9228 info->callbacks->einfo
9229 (_("%P: %H: %s references "
9230 "optimized away TOC entry\n"),
9231 ibfd, sec, rel->r_offset,
9232 ppc64_elf_howto_table[r_type]->name);
9233 bfd_set_error (bfd_error_bad_value);
9236 rel->r_addend = tocrel->r_addend;
9237 elf_section_data (sec)->relocs = relstart;
9241 if (h != NULL || sym->st_value != 0)
9244 rel->r_addend -= skip[val >> 3];
9245 elf_section_data (sec)->relocs = relstart;
9248 if (elf_section_data (sec)->relocs != relstart)
9252 /* We shouldn't have local or global symbols defined in the TOC,
9253 but handle them anyway. */
9254 if (local_syms != NULL)
9255 for (sym = local_syms;
9256 sym < local_syms + symtab_hdr->sh_info;
9258 if (sym->st_value != 0
9259 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9263 if (sym->st_value > toc->rawsize)
9264 i = toc->rawsize >> 3;
9266 i = sym->st_value >> 3;
9268 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9271 (*_bfd_error_handler)
9272 (_("%s defined on removed toc entry"),
9273 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9276 while ((skip[i] & (ref_from_discarded | can_optimize)));
9277 sym->st_value = (bfd_vma) i << 3;
9280 sym->st_value -= skip[i];
9281 symtab_hdr->contents = (unsigned char *) local_syms;
9284 /* Adjust any global syms defined in this toc input section. */
9285 if (toc_inf.global_toc_syms)
9288 toc_inf.skip = skip;
9289 toc_inf.global_toc_syms = FALSE;
9290 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9294 if (toc->reloc_count != 0)
9296 Elf_Internal_Shdr *rel_hdr;
9297 Elf_Internal_Rela *wrel;
9300 /* Remove unused toc relocs, and adjust those we keep. */
9301 if (toc_relocs == NULL)
9302 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9304 if (toc_relocs == NULL)
9308 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9309 if ((skip[rel->r_offset >> 3]
9310 & (ref_from_discarded | can_optimize)) == 0)
9312 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9313 wrel->r_info = rel->r_info;
9314 wrel->r_addend = rel->r_addend;
9317 else if (!dec_dynrel_count (rel->r_info, toc, info,
9318 &local_syms, NULL, NULL))
9321 elf_section_data (toc)->relocs = toc_relocs;
9322 toc->reloc_count = wrel - toc_relocs;
9323 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9324 sz = rel_hdr->sh_entsize;
9325 rel_hdr->sh_size = toc->reloc_count * sz;
9328 else if (toc_relocs != NULL
9329 && elf_section_data (toc)->relocs != toc_relocs)
9332 if (local_syms != NULL
9333 && symtab_hdr->contents != (unsigned char *) local_syms)
9335 if (!info->keep_memory)
9338 symtab_hdr->contents = (unsigned char *) local_syms;
9346 /* Return true iff input section I references the TOC using
9347 instructions limited to +/-32k offsets. */
9350 ppc64_elf_has_small_toc_reloc (asection *i)
9352 return (is_ppc64_elf (i->owner)
9353 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9356 /* Allocate space for one GOT entry. */
9359 allocate_got (struct elf_link_hash_entry *h,
9360 struct bfd_link_info *info,
9361 struct got_entry *gent)
9363 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9365 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9366 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9368 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9369 ? 2 : 1) * sizeof (Elf64_External_Rela);
9370 asection *got = ppc64_elf_tdata (gent->owner)->got;
9372 gent->got.offset = got->size;
9373 got->size += entsize;
9375 dyn = htab->elf.dynamic_sections_created;
9376 if (h->type == STT_GNU_IFUNC)
9378 htab->elf.irelplt->size += rentsize;
9379 htab->got_reli_size += rentsize;
9381 else if ((bfd_link_pic (info)
9382 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
9383 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
9384 || h->root.type != bfd_link_hash_undefweak))
9386 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9387 relgot->size += rentsize;
9391 /* This function merges got entries in the same toc group. */
9394 merge_got_entries (struct got_entry **pent)
9396 struct got_entry *ent, *ent2;
9398 for (ent = *pent; ent != NULL; ent = ent->next)
9399 if (!ent->is_indirect)
9400 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9401 if (!ent2->is_indirect
9402 && ent2->addend == ent->addend
9403 && ent2->tls_type == ent->tls_type
9404 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9406 ent2->is_indirect = TRUE;
9407 ent2->got.ent = ent;
9411 /* Allocate space in .plt, .got and associated reloc sections for
9415 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9417 struct bfd_link_info *info;
9418 struct ppc_link_hash_table *htab;
9420 struct ppc_link_hash_entry *eh;
9421 struct elf_dyn_relocs *p;
9422 struct got_entry **pgent, *gent;
9424 if (h->root.type == bfd_link_hash_indirect)
9427 info = (struct bfd_link_info *) inf;
9428 htab = ppc_hash_table (info);
9432 if ((htab->elf.dynamic_sections_created
9434 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
9435 || h->type == STT_GNU_IFUNC)
9437 struct plt_entry *pent;
9438 bfd_boolean doneone = FALSE;
9439 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9440 if (pent->plt.refcount > 0)
9442 if (!htab->elf.dynamic_sections_created
9443 || h->dynindx == -1)
9446 pent->plt.offset = s->size;
9447 s->size += PLT_ENTRY_SIZE (htab);
9448 s = htab->elf.irelplt;
9452 /* If this is the first .plt entry, make room for the special
9456 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9458 pent->plt.offset = s->size;
9460 /* Make room for this entry. */
9461 s->size += PLT_ENTRY_SIZE (htab);
9463 /* Make room for the .glink code. */
9466 s->size += GLINK_CALL_STUB_SIZE;
9469 /* We need bigger stubs past index 32767. */
9470 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9477 /* We also need to make an entry in the .rela.plt section. */
9478 s = htab->elf.srelplt;
9480 s->size += sizeof (Elf64_External_Rela);
9484 pent->plt.offset = (bfd_vma) -1;
9487 h->plt.plist = NULL;
9493 h->plt.plist = NULL;
9497 eh = (struct ppc_link_hash_entry *) h;
9498 /* Run through the TLS GD got entries first if we're changing them
9500 if ((eh->tls_mask & TLS_TPRELGD) != 0)
9501 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9502 if (gent->got.refcount > 0
9503 && (gent->tls_type & TLS_GD) != 0)
9505 /* This was a GD entry that has been converted to TPREL. If
9506 there happens to be a TPREL entry we can use that one. */
9507 struct got_entry *ent;
9508 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9509 if (ent->got.refcount > 0
9510 && (ent->tls_type & TLS_TPREL) != 0
9511 && ent->addend == gent->addend
9512 && ent->owner == gent->owner)
9514 gent->got.refcount = 0;
9518 /* If not, then we'll be using our own TPREL entry. */
9519 if (gent->got.refcount != 0)
9520 gent->tls_type = TLS_TLS | TLS_TPREL;
9523 /* Remove any list entry that won't generate a word in the GOT before
9524 we call merge_got_entries. Otherwise we risk merging to empty
9526 pgent = &h->got.glist;
9527 while ((gent = *pgent) != NULL)
9528 if (gent->got.refcount > 0)
9530 if ((gent->tls_type & TLS_LD) != 0
9533 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9534 *pgent = gent->next;
9537 pgent = &gent->next;
9540 *pgent = gent->next;
9542 if (!htab->do_multi_toc)
9543 merge_got_entries (&h->got.glist);
9545 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9546 if (!gent->is_indirect)
9548 /* Make sure this symbol is output as a dynamic symbol.
9549 Undefined weak syms won't yet be marked as dynamic,
9550 nor will all TLS symbols. */
9551 if (h->dynindx == -1
9553 && h->type != STT_GNU_IFUNC
9554 && htab->elf.dynamic_sections_created)
9556 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9560 if (!is_ppc64_elf (gent->owner))
9563 allocate_got (h, info, gent);
9566 if (eh->dyn_relocs == NULL
9567 || (!htab->elf.dynamic_sections_created
9568 && h->type != STT_GNU_IFUNC))
9571 /* In the shared -Bsymbolic case, discard space allocated for
9572 dynamic pc-relative relocs against symbols which turn out to be
9573 defined in regular objects. For the normal shared case, discard
9574 space for relocs that have become local due to symbol visibility
9577 if (bfd_link_pic (info))
9579 /* Relocs that use pc_count are those that appear on a call insn,
9580 or certain REL relocs (see must_be_dyn_reloc) that can be
9581 generated via assembly. We want calls to protected symbols to
9582 resolve directly to the function rather than going via the plt.
9583 If people want function pointer comparisons to work as expected
9584 then they should avoid writing weird assembly. */
9585 if (SYMBOL_CALLS_LOCAL (info, h))
9587 struct elf_dyn_relocs **pp;
9589 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9591 p->count -= p->pc_count;
9600 /* Also discard relocs on undefined weak syms with non-default
9602 if (eh->dyn_relocs != NULL
9603 && h->root.type == bfd_link_hash_undefweak)
9605 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9606 eh->dyn_relocs = NULL;
9608 /* Make sure this symbol is output as a dynamic symbol.
9609 Undefined weak syms won't yet be marked as dynamic. */
9610 else if (h->dynindx == -1
9611 && !h->forced_local)
9613 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9618 else if (h->type == STT_GNU_IFUNC)
9620 if (!h->non_got_ref)
9621 eh->dyn_relocs = NULL;
9623 else if (ELIMINATE_COPY_RELOCS)
9625 /* For the non-shared case, discard space for relocs against
9626 symbols which turn out to need copy relocs or are not
9632 /* Make sure this symbol is output as a dynamic symbol.
9633 Undefined weak syms won't yet be marked as dynamic. */
9634 if (h->dynindx == -1
9635 && !h->forced_local)
9637 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9641 /* If that succeeded, we know we'll be keeping all the
9643 if (h->dynindx != -1)
9647 eh->dyn_relocs = NULL;
9652 /* Finally, allocate space. */
9653 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9655 asection *sreloc = elf_section_data (p->sec)->sreloc;
9656 if (eh->elf.type == STT_GNU_IFUNC)
9657 sreloc = htab->elf.irelplt;
9658 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9664 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9665 to set up space for global entry stubs. These are put in glink,
9666 after the branch table. */
9669 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9671 struct bfd_link_info *info;
9672 struct ppc_link_hash_table *htab;
9673 struct plt_entry *pent;
9676 if (h->root.type == bfd_link_hash_indirect)
9679 if (!h->pointer_equality_needed)
9686 htab = ppc_hash_table (info);
9691 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9692 if (pent->plt.offset != (bfd_vma) -1
9693 && pent->addend == 0)
9695 /* For ELFv2, if this symbol is not defined in a regular file
9696 and we are not generating a shared library or pie, then we
9697 need to define the symbol in the executable on a call stub.
9698 This is to avoid text relocations. */
9699 s->size = (s->size + 15) & -16;
9700 h->root.u.def.section = s;
9701 h->root.u.def.value = s->size;
9708 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9709 read-only sections. */
9712 maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
9714 if (h->root.type == bfd_link_hash_indirect)
9717 if (readonly_dynrelocs (h))
9719 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
9721 /* Not an error, just cut short the traversal. */
9727 /* Set the sizes of the dynamic sections. */
9730 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9731 struct bfd_link_info *info)
9733 struct ppc_link_hash_table *htab;
9738 struct got_entry *first_tlsld;
9740 htab = ppc_hash_table (info);
9744 dynobj = htab->elf.dynobj;
9748 if (htab->elf.dynamic_sections_created)
9750 /* Set the contents of the .interp section to the interpreter. */
9751 if (bfd_link_executable (info))
9753 s = bfd_get_linker_section (dynobj, ".interp");
9756 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9757 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9761 /* Set up .got offsets for local syms, and space for local dynamic
9763 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9765 struct got_entry **lgot_ents;
9766 struct got_entry **end_lgot_ents;
9767 struct plt_entry **local_plt;
9768 struct plt_entry **end_local_plt;
9769 unsigned char *lgot_masks;
9770 bfd_size_type locsymcount;
9771 Elf_Internal_Shdr *symtab_hdr;
9773 if (!is_ppc64_elf (ibfd))
9776 for (s = ibfd->sections; s != NULL; s = s->next)
9778 struct ppc_dyn_relocs *p;
9780 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9782 if (!bfd_is_abs_section (p->sec)
9783 && bfd_is_abs_section (p->sec->output_section))
9785 /* Input section has been discarded, either because
9786 it is a copy of a linkonce section or due to
9787 linker script /DISCARD/, so we'll be discarding
9790 else if (p->count != 0)
9792 asection *srel = elf_section_data (p->sec)->sreloc;
9794 srel = htab->elf.irelplt;
9795 srel->size += p->count * sizeof (Elf64_External_Rela);
9796 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9797 info->flags |= DF_TEXTREL;
9802 lgot_ents = elf_local_got_ents (ibfd);
9806 symtab_hdr = &elf_symtab_hdr (ibfd);
9807 locsymcount = symtab_hdr->sh_info;
9808 end_lgot_ents = lgot_ents + locsymcount;
9809 local_plt = (struct plt_entry **) end_lgot_ents;
9810 end_local_plt = local_plt + locsymcount;
9811 lgot_masks = (unsigned char *) end_local_plt;
9812 s = ppc64_elf_tdata (ibfd)->got;
9813 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
9815 struct got_entry **pent, *ent;
9818 while ((ent = *pent) != NULL)
9819 if (ent->got.refcount > 0)
9821 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
9823 ppc64_tlsld_got (ibfd)->got.refcount += 1;
9828 unsigned int ent_size = 8;
9829 unsigned int rel_size = sizeof (Elf64_External_Rela);
9831 ent->got.offset = s->size;
9832 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
9837 s->size += ent_size;
9838 if ((*lgot_masks & PLT_IFUNC) != 0)
9840 htab->elf.irelplt->size += rel_size;
9841 htab->got_reli_size += rel_size;
9843 else if (bfd_link_pic (info))
9845 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9846 srel->size += rel_size;
9855 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
9856 for (; local_plt < end_local_plt; ++local_plt)
9858 struct plt_entry *ent;
9860 for (ent = *local_plt; ent != NULL; ent = ent->next)
9861 if (ent->plt.refcount > 0)
9864 ent->plt.offset = s->size;
9865 s->size += PLT_ENTRY_SIZE (htab);
9867 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9870 ent->plt.offset = (bfd_vma) -1;
9874 /* Allocate global sym .plt and .got entries, and space for global
9875 sym dynamic relocs. */
9876 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
9877 /* Stash the end of glink branch table. */
9878 if (htab->glink != NULL)
9879 htab->glink->rawsize = htab->glink->size;
9881 if (!htab->opd_abi && !bfd_link_pic (info))
9882 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
9885 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9887 struct got_entry *ent;
9889 if (!is_ppc64_elf (ibfd))
9892 ent = ppc64_tlsld_got (ibfd);
9893 if (ent->got.refcount > 0)
9895 if (!htab->do_multi_toc && first_tlsld != NULL)
9897 ent->is_indirect = TRUE;
9898 ent->got.ent = first_tlsld;
9902 if (first_tlsld == NULL)
9904 s = ppc64_elf_tdata (ibfd)->got;
9905 ent->got.offset = s->size;
9908 if (bfd_link_pic (info))
9910 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9911 srel->size += sizeof (Elf64_External_Rela);
9916 ent->got.offset = (bfd_vma) -1;
9919 /* We now have determined the sizes of the various dynamic sections.
9920 Allocate memory for them. */
9922 for (s = dynobj->sections; s != NULL; s = s->next)
9924 if ((s->flags & SEC_LINKER_CREATED) == 0)
9927 if (s == htab->brlt || s == htab->relbrlt)
9928 /* These haven't been allocated yet; don't strip. */
9930 else if (s == htab->elf.sgot
9931 || s == htab->elf.splt
9932 || s == htab->elf.iplt
9934 || s == htab->dynbss)
9936 /* Strip this section if we don't need it; see the
9939 else if (s == htab->glink_eh_frame)
9941 if (!bfd_is_abs_section (s->output_section))
9942 /* Not sized yet. */
9945 else if (CONST_STRNEQ (s->name, ".rela"))
9949 if (s != htab->elf.srelplt)
9952 /* We use the reloc_count field as a counter if we need
9953 to copy relocs into the output file. */
9959 /* It's not one of our sections, so don't allocate space. */
9965 /* If we don't need this section, strip it from the
9966 output file. This is mostly to handle .rela.bss and
9967 .rela.plt. We must create both sections in
9968 create_dynamic_sections, because they must be created
9969 before the linker maps input sections to output
9970 sections. The linker does that before
9971 adjust_dynamic_symbol is called, and it is that
9972 function which decides whether anything needs to go
9973 into these sections. */
9974 s->flags |= SEC_EXCLUDE;
9978 if ((s->flags & SEC_HAS_CONTENTS) == 0)
9981 /* Allocate memory for the section contents. We use bfd_zalloc
9982 here in case unused entries are not reclaimed before the
9983 section's contents are written out. This should not happen,
9984 but this way if it does we get a R_PPC64_NONE reloc in .rela
9985 sections instead of garbage.
9986 We also rely on the section contents being zero when writing
9988 s->contents = bfd_zalloc (dynobj, s->size);
9989 if (s->contents == NULL)
9993 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9995 if (!is_ppc64_elf (ibfd))
9998 s = ppc64_elf_tdata (ibfd)->got;
9999 if (s != NULL && s != htab->elf.sgot)
10002 s->flags |= SEC_EXCLUDE;
10005 s->contents = bfd_zalloc (ibfd, s->size);
10006 if (s->contents == NULL)
10010 s = ppc64_elf_tdata (ibfd)->relgot;
10014 s->flags |= SEC_EXCLUDE;
10017 s->contents = bfd_zalloc (ibfd, s->size);
10018 if (s->contents == NULL)
10021 s->reloc_count = 0;
10026 if (htab->elf.dynamic_sections_created)
10028 bfd_boolean tls_opt;
10030 /* Add some entries to the .dynamic section. We fill in the
10031 values later, in ppc64_elf_finish_dynamic_sections, but we
10032 must add the entries now so that we get the correct size for
10033 the .dynamic section. The DT_DEBUG entry is filled in by the
10034 dynamic linker and used by the debugger. */
10035 #define add_dynamic_entry(TAG, VAL) \
10036 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10038 if (bfd_link_executable (info))
10040 if (!add_dynamic_entry (DT_DEBUG, 0))
10044 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10046 if (!add_dynamic_entry (DT_PLTGOT, 0)
10047 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10048 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10049 || !add_dynamic_entry (DT_JMPREL, 0)
10050 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10054 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10056 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10057 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10061 tls_opt = (!htab->params->no_tls_get_addr_opt
10062 && htab->tls_get_addr_fd != NULL
10063 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10064 if (tls_opt || !htab->opd_abi)
10066 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10072 if (!add_dynamic_entry (DT_RELA, 0)
10073 || !add_dynamic_entry (DT_RELASZ, 0)
10074 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10077 /* If any dynamic relocs apply to a read-only section,
10078 then we need a DT_TEXTREL entry. */
10079 if ((info->flags & DF_TEXTREL) == 0)
10080 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10082 if ((info->flags & DF_TEXTREL) != 0)
10084 if (!add_dynamic_entry (DT_TEXTREL, 0))
10089 #undef add_dynamic_entry
10094 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10097 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10099 if (h->plt.plist != NULL
10101 && !h->pointer_equality_needed)
10104 return _bfd_elf_hash_symbol (h);
10107 /* Determine the type of stub needed, if any, for a call. */
10109 static inline enum ppc_stub_type
10110 ppc_type_of_stub (asection *input_sec,
10111 const Elf_Internal_Rela *rel,
10112 struct ppc_link_hash_entry **hash,
10113 struct plt_entry **plt_ent,
10114 bfd_vma destination,
10115 unsigned long local_off)
10117 struct ppc_link_hash_entry *h = *hash;
10119 bfd_vma branch_offset;
10120 bfd_vma max_branch_offset;
10121 enum elf_ppc64_reloc_type r_type;
10125 struct plt_entry *ent;
10126 struct ppc_link_hash_entry *fdh = h;
10128 && h->oh->is_func_descriptor)
10130 fdh = ppc_follow_link (h->oh);
10134 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10135 if (ent->addend == rel->r_addend
10136 && ent->plt.offset != (bfd_vma) -1)
10139 return ppc_stub_plt_call;
10142 /* Here, we know we don't have a plt entry. If we don't have a
10143 either a defined function descriptor or a defined entry symbol
10144 in a regular object file, then it is pointless trying to make
10145 any other type of stub. */
10146 if (!is_static_defined (&fdh->elf)
10147 && !is_static_defined (&h->elf))
10148 return ppc_stub_none;
10150 else if (elf_local_got_ents (input_sec->owner) != NULL)
10152 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10153 struct plt_entry **local_plt = (struct plt_entry **)
10154 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10155 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10157 if (local_plt[r_symndx] != NULL)
10159 struct plt_entry *ent;
10161 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10162 if (ent->addend == rel->r_addend
10163 && ent->plt.offset != (bfd_vma) -1)
10166 return ppc_stub_plt_call;
10171 /* Determine where the call point is. */
10172 location = (input_sec->output_offset
10173 + input_sec->output_section->vma
10176 branch_offset = destination - location;
10177 r_type = ELF64_R_TYPE (rel->r_info);
10179 /* Determine if a long branch stub is needed. */
10180 max_branch_offset = 1 << 25;
10181 if (r_type != R_PPC64_REL24)
10182 max_branch_offset = 1 << 15;
10184 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10185 /* We need a stub. Figure out whether a long_branch or plt_branch
10186 is needed later. */
10187 return ppc_stub_long_branch;
10189 return ppc_stub_none;
10192 /* With power7 weakly ordered memory model, it is possible for ld.so
10193 to update a plt entry in one thread and have another thread see a
10194 stale zero toc entry. To avoid this we need some sort of acquire
10195 barrier in the call stub. One solution is to make the load of the
10196 toc word seem to appear to depend on the load of the function entry
10197 word. Another solution is to test for r2 being zero, and branch to
10198 the appropriate glink entry if so.
10200 . fake dep barrier compare
10201 . ld 12,xxx(2) ld 12,xxx(2)
10202 . mtctr 12 mtctr 12
10203 . xor 11,12,12 ld 2,xxx+8(2)
10204 . add 2,2,11 cmpldi 2,0
10205 . ld 2,xxx+8(2) bnectr+
10206 . bctr b <glink_entry>
10208 The solution involving the compare turns out to be faster, so
10209 that's what we use unless the branch won't reach. */
10211 #define ALWAYS_USE_FAKE_DEP 0
10212 #define ALWAYS_EMIT_R2SAVE 0
10214 #define PPC_LO(v) ((v) & 0xffff)
10215 #define PPC_HI(v) (((v) >> 16) & 0xffff)
10216 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
10218 static inline unsigned int
10219 plt_stub_size (struct ppc_link_hash_table *htab,
10220 struct ppc_stub_hash_entry *stub_entry,
10223 unsigned size = 12;
10225 if (ALWAYS_EMIT_R2SAVE
10226 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10228 if (PPC_HA (off) != 0)
10233 if (htab->params->plt_static_chain)
10235 if (htab->params->plt_thread_safe
10236 && htab->elf.dynamic_sections_created
10237 && stub_entry->h != NULL
10238 && stub_entry->h->elf.dynindx != -1)
10240 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10243 if (stub_entry->h != NULL
10244 && (stub_entry->h == htab->tls_get_addr_fd
10245 || stub_entry->h == htab->tls_get_addr)
10246 && !htab->params->no_tls_get_addr_opt)
10251 /* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10252 then return the padding needed to do so. */
10253 static inline unsigned int
10254 plt_stub_pad (struct ppc_link_hash_table *htab,
10255 struct ppc_stub_hash_entry *stub_entry,
10258 int stub_align = 1 << htab->params->plt_stub_align;
10259 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
10260 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10262 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10263 > ((stub_size - 1) & -stub_align))
10264 return stub_align - (stub_off & (stub_align - 1));
10268 /* Build a .plt call stub. */
10270 static inline bfd_byte *
10271 build_plt_stub (struct ppc_link_hash_table *htab,
10272 struct ppc_stub_hash_entry *stub_entry,
10273 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10275 bfd *obfd = htab->params->stub_bfd;
10276 bfd_boolean plt_load_toc = htab->opd_abi;
10277 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10278 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10279 && htab->elf.dynamic_sections_created
10280 && stub_entry->h != NULL
10281 && stub_entry->h->elf.dynindx != -1);
10282 bfd_boolean use_fake_dep = plt_thread_safe;
10283 bfd_vma cmp_branch_off = 0;
10285 if (!ALWAYS_USE_FAKE_DEP
10288 && !((stub_entry->h == htab->tls_get_addr_fd
10289 || stub_entry->h == htab->tls_get_addr)
10290 && !htab->params->no_tls_get_addr_opt))
10292 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10293 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10294 / PLT_ENTRY_SIZE (htab));
10295 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10298 if (pltindex > 32768)
10299 glinkoff += (pltindex - 32768) * 4;
10301 + htab->glink->output_offset
10302 + htab->glink->output_section->vma);
10303 from = (p - stub_entry->group->stub_sec->contents
10304 + 4 * (ALWAYS_EMIT_R2SAVE
10305 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10306 + 4 * (PPC_HA (offset) != 0)
10307 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10308 != PPC_HA (offset))
10309 + 4 * (plt_static_chain != 0)
10311 + stub_entry->group->stub_sec->output_offset
10312 + stub_entry->group->stub_sec->output_section->vma);
10313 cmp_branch_off = to - from;
10314 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10317 if (PPC_HA (offset) != 0)
10321 if (ALWAYS_EMIT_R2SAVE
10322 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10323 r[0].r_offset += 4;
10324 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10325 r[1].r_offset = r[0].r_offset + 4;
10326 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10327 r[1].r_addend = r[0].r_addend;
10330 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10332 r[2].r_offset = r[1].r_offset + 4;
10333 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10334 r[2].r_addend = r[0].r_addend;
10338 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10339 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10340 r[2].r_addend = r[0].r_addend + 8;
10341 if (plt_static_chain)
10343 r[3].r_offset = r[2].r_offset + 4;
10344 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10345 r[3].r_addend = r[0].r_addend + 16;
10350 if (ALWAYS_EMIT_R2SAVE
10351 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10352 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10355 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10356 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10360 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10361 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10364 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10366 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10369 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10374 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10375 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10377 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10378 if (plt_static_chain)
10379 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10386 if (ALWAYS_EMIT_R2SAVE
10387 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10388 r[0].r_offset += 4;
10389 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10392 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10394 r[1].r_offset = r[0].r_offset + 4;
10395 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10396 r[1].r_addend = r[0].r_addend;
10400 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10401 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10402 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10403 if (plt_static_chain)
10405 r[2].r_offset = r[1].r_offset + 4;
10406 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10407 r[2].r_addend = r[0].r_addend + 8;
10412 if (ALWAYS_EMIT_R2SAVE
10413 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10414 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10415 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10417 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10419 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10422 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10427 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10428 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10430 if (plt_static_chain)
10431 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10432 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10435 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10437 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10438 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10439 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10442 bfd_put_32 (obfd, BCTR, p), p += 4;
10446 /* Build a special .plt call stub for __tls_get_addr. */
10448 #define LD_R11_0R3 0xe9630000
10449 #define LD_R12_0R3 0xe9830000
10450 #define MR_R0_R3 0x7c601b78
10451 #define CMPDI_R11_0 0x2c2b0000
10452 #define ADD_R3_R12_R13 0x7c6c6a14
10453 #define BEQLR 0x4d820020
10454 #define MR_R3_R0 0x7c030378
10455 #define STD_R11_0R1 0xf9610000
10456 #define BCTRL 0x4e800421
10457 #define LD_R11_0R1 0xe9610000
10458 #define MTLR_R11 0x7d6803a6
10460 static inline bfd_byte *
10461 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10462 struct ppc_stub_hash_entry *stub_entry,
10463 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10465 bfd *obfd = htab->params->stub_bfd;
10467 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10468 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10469 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10470 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10471 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10472 bfd_put_32 (obfd, BEQLR, p), p += 4;
10473 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10474 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10475 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10478 r[0].r_offset += 9 * 4;
10479 p = build_plt_stub (htab, stub_entry, p, offset, r);
10480 bfd_put_32 (obfd, BCTRL, p - 4);
10482 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10483 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10484 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10485 bfd_put_32 (obfd, BLR, p), p += 4;
10490 static Elf_Internal_Rela *
10491 get_relocs (asection *sec, int count)
10493 Elf_Internal_Rela *relocs;
10494 struct bfd_elf_section_data *elfsec_data;
10496 elfsec_data = elf_section_data (sec);
10497 relocs = elfsec_data->relocs;
10498 if (relocs == NULL)
10500 bfd_size_type relsize;
10501 relsize = sec->reloc_count * sizeof (*relocs);
10502 relocs = bfd_alloc (sec->owner, relsize);
10503 if (relocs == NULL)
10505 elfsec_data->relocs = relocs;
10506 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10507 sizeof (Elf_Internal_Shdr));
10508 if (elfsec_data->rela.hdr == NULL)
10510 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10511 * sizeof (Elf64_External_Rela));
10512 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10513 sec->reloc_count = 0;
10515 relocs += sec->reloc_count;
10516 sec->reloc_count += count;
10521 get_r2off (struct bfd_link_info *info,
10522 struct ppc_stub_hash_entry *stub_entry)
10524 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10525 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
10529 /* Support linking -R objects. Get the toc pointer from the
10532 if (!htab->opd_abi)
10534 asection *opd = stub_entry->h->elf.root.u.def.section;
10535 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10537 if (strcmp (opd->name, ".opd") != 0
10538 || opd->reloc_count != 0)
10540 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
10541 stub_entry->h->elf.root.root.string);
10542 bfd_set_error (bfd_error_bad_value);
10543 return (bfd_vma) -1;
10545 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
10546 return (bfd_vma) -1;
10547 r2off = bfd_get_64 (opd->owner, buf);
10548 r2off -= elf_gp (info->output_bfd);
10550 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
10555 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
10557 struct ppc_stub_hash_entry *stub_entry;
10558 struct ppc_branch_hash_entry *br_entry;
10559 struct bfd_link_info *info;
10560 struct ppc_link_hash_table *htab;
10565 Elf_Internal_Rela *r;
10568 /* Massage our args to the form they really have. */
10569 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
10572 htab = ppc_hash_table (info);
10576 /* Make a note of the offset within the stubs for this entry. */
10577 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10578 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
10580 htab->stub_count[stub_entry->stub_type - 1] += 1;
10581 switch (stub_entry->stub_type)
10583 case ppc_stub_long_branch:
10584 case ppc_stub_long_branch_r2off:
10585 /* Branches are relative. This is where we are going to. */
10586 dest = (stub_entry->target_value
10587 + stub_entry->target_section->output_offset
10588 + stub_entry->target_section->output_section->vma);
10589 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10592 /* And this is where we are coming from. */
10593 off -= (stub_entry->stub_offset
10594 + stub_entry->group->stub_sec->output_offset
10595 + stub_entry->group->stub_sec->output_section->vma);
10598 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10600 bfd_vma r2off = get_r2off (info, stub_entry);
10602 if (r2off == (bfd_vma) -1)
10604 htab->stub_error = TRUE;
10607 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
10610 if (PPC_HA (r2off) != 0)
10612 bfd_put_32 (htab->params->stub_bfd,
10613 ADDIS_R2_R2 | PPC_HA (r2off), loc);
10617 if (PPC_LO (r2off) != 0)
10619 bfd_put_32 (htab->params->stub_bfd,
10620 ADDI_R2_R2 | PPC_LO (r2off), loc);
10626 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
10628 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10630 info->callbacks->einfo
10631 (_("%P: long branch stub `%s' offset overflow\n"),
10632 stub_entry->root.string);
10633 htab->stub_error = TRUE;
10637 if (info->emitrelocations)
10639 r = get_relocs (stub_entry->group->stub_sec, 1);
10642 r->r_offset = loc - stub_entry->group->stub_sec->contents;
10643 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10644 r->r_addend = dest;
10645 if (stub_entry->h != NULL)
10647 struct elf_link_hash_entry **hashes;
10648 unsigned long symndx;
10649 struct ppc_link_hash_entry *h;
10651 hashes = elf_sym_hashes (htab->params->stub_bfd);
10652 if (hashes == NULL)
10654 bfd_size_type hsize;
10656 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10657 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10658 if (hashes == NULL)
10660 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10661 htab->stub_globals = 1;
10663 symndx = htab->stub_globals++;
10665 hashes[symndx] = &h->elf;
10666 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10667 if (h->oh != NULL && h->oh->is_func)
10668 h = ppc_follow_link (h->oh);
10669 if (h->elf.root.u.def.section != stub_entry->target_section)
10670 /* H is an opd symbol. The addend must be zero. */
10674 off = (h->elf.root.u.def.value
10675 + h->elf.root.u.def.section->output_offset
10676 + h->elf.root.u.def.section->output_section->vma);
10677 r->r_addend -= off;
10683 case ppc_stub_plt_branch:
10684 case ppc_stub_plt_branch_r2off:
10685 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10686 stub_entry->root.string + 9,
10688 if (br_entry == NULL)
10690 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
10691 stub_entry->root.string);
10692 htab->stub_error = TRUE;
10696 dest = (stub_entry->target_value
10697 + stub_entry->target_section->output_offset
10698 + stub_entry->target_section->output_section->vma);
10699 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10700 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10702 bfd_put_64 (htab->brlt->owner, dest,
10703 htab->brlt->contents + br_entry->offset);
10705 if (br_entry->iter == htab->stub_iteration)
10707 br_entry->iter = 0;
10709 if (htab->relbrlt != NULL)
10711 /* Create a reloc for the branch lookup table entry. */
10712 Elf_Internal_Rela rela;
10715 rela.r_offset = (br_entry->offset
10716 + htab->brlt->output_offset
10717 + htab->brlt->output_section->vma);
10718 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10719 rela.r_addend = dest;
10721 rl = htab->relbrlt->contents;
10722 rl += (htab->relbrlt->reloc_count++
10723 * sizeof (Elf64_External_Rela));
10724 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10726 else if (info->emitrelocations)
10728 r = get_relocs (htab->brlt, 1);
10731 /* brlt, being SEC_LINKER_CREATED does not go through the
10732 normal reloc processing. Symbols and offsets are not
10733 translated from input file to output file form, so
10734 set up the offset per the output file. */
10735 r->r_offset = (br_entry->offset
10736 + htab->brlt->output_offset
10737 + htab->brlt->output_section->vma);
10738 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10739 r->r_addend = dest;
10743 dest = (br_entry->offset
10744 + htab->brlt->output_offset
10745 + htab->brlt->output_section->vma);
10748 - elf_gp (htab->brlt->output_section->owner)
10749 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10751 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
10753 info->callbacks->einfo
10754 (_("%P: linkage table error against `%T'\n"),
10755 stub_entry->root.string);
10756 bfd_set_error (bfd_error_bad_value);
10757 htab->stub_error = TRUE;
10761 if (info->emitrelocations)
10763 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
10766 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
10767 if (bfd_big_endian (info->output_bfd))
10768 r[0].r_offset += 2;
10769 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
10770 r[0].r_offset += 4;
10771 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10772 r[0].r_addend = dest;
10773 if (PPC_HA (off) != 0)
10775 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10776 r[1].r_offset = r[0].r_offset + 4;
10777 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10778 r[1].r_addend = r[0].r_addend;
10782 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10784 if (PPC_HA (off) != 0)
10787 bfd_put_32 (htab->params->stub_bfd,
10788 ADDIS_R12_R2 | PPC_HA (off), loc);
10790 bfd_put_32 (htab->params->stub_bfd,
10791 LD_R12_0R12 | PPC_LO (off), loc);
10796 bfd_put_32 (htab->params->stub_bfd,
10797 LD_R12_0R2 | PPC_LO (off), loc);
10802 bfd_vma r2off = get_r2off (info, stub_entry);
10804 if (r2off == (bfd_vma) -1)
10806 htab->stub_error = TRUE;
10810 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
10813 if (PPC_HA (off) != 0)
10816 bfd_put_32 (htab->params->stub_bfd,
10817 ADDIS_R12_R2 | PPC_HA (off), loc);
10819 bfd_put_32 (htab->params->stub_bfd,
10820 LD_R12_0R12 | PPC_LO (off), loc);
10823 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
10825 if (PPC_HA (r2off) != 0)
10829 bfd_put_32 (htab->params->stub_bfd,
10830 ADDIS_R2_R2 | PPC_HA (r2off), loc);
10832 if (PPC_LO (r2off) != 0)
10836 bfd_put_32 (htab->params->stub_bfd,
10837 ADDI_R2_R2 | PPC_LO (r2off), loc);
10841 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
10843 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
10846 case ppc_stub_plt_call:
10847 case ppc_stub_plt_call_r2save:
10848 if (stub_entry->h != NULL
10849 && stub_entry->h->is_func_descriptor
10850 && stub_entry->h->oh != NULL)
10852 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
10854 /* If the old-ABI "dot-symbol" is undefined make it weak so
10855 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
10856 if (fh->elf.root.type == bfd_link_hash_undefined)
10857 fh->elf.root.type = bfd_link_hash_undefweak;
10858 /* Stop undo_symbol_twiddle changing it back to undefined. */
10859 fh->was_undefined = 0;
10862 /* Now build the stub. */
10863 dest = stub_entry->plt_ent->plt.offset & ~1;
10864 if (dest >= (bfd_vma) -2)
10867 plt = htab->elf.splt;
10868 if (!htab->elf.dynamic_sections_created
10869 || stub_entry->h == NULL
10870 || stub_entry->h->elf.dynindx == -1)
10871 plt = htab->elf.iplt;
10873 dest += plt->output_offset + plt->output_section->vma;
10875 if (stub_entry->h == NULL
10876 && (stub_entry->plt_ent->plt.offset & 1) == 0)
10878 Elf_Internal_Rela rela;
10881 rela.r_offset = dest;
10883 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
10885 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
10886 rela.r_addend = (stub_entry->target_value
10887 + stub_entry->target_section->output_offset
10888 + stub_entry->target_section->output_section->vma);
10890 rl = (htab->elf.irelplt->contents
10891 + (htab->elf.irelplt->reloc_count++
10892 * sizeof (Elf64_External_Rela)));
10893 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
10894 stub_entry->plt_ent->plt.offset |= 1;
10898 - elf_gp (plt->output_section->owner)
10899 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10901 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
10903 info->callbacks->einfo
10904 (_("%P: linkage table error against `%T'\n"),
10905 stub_entry->h != NULL
10906 ? stub_entry->h->elf.root.root.string
10908 bfd_set_error (bfd_error_bad_value);
10909 htab->stub_error = TRUE;
10913 if (htab->params->plt_stub_align != 0)
10915 unsigned pad = plt_stub_pad (htab, stub_entry, off);
10917 stub_entry->group->stub_sec->size += pad;
10918 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10923 if (info->emitrelocations)
10925 r = get_relocs (stub_entry->group->stub_sec,
10926 ((PPC_HA (off) != 0)
10928 ? 2 + (htab->params->plt_static_chain
10929 && PPC_HA (off + 16) == PPC_HA (off))
10933 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
10934 if (bfd_big_endian (info->output_bfd))
10935 r[0].r_offset += 2;
10936 r[0].r_addend = dest;
10938 if (stub_entry->h != NULL
10939 && (stub_entry->h == htab->tls_get_addr_fd
10940 || stub_entry->h == htab->tls_get_addr)
10941 && !htab->params->no_tls_get_addr_opt)
10942 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
10944 p = build_plt_stub (htab, stub_entry, loc, off, r);
10953 stub_entry->group->stub_sec->size += size;
10955 if (htab->params->emit_stub_syms)
10957 struct elf_link_hash_entry *h;
10960 const char *const stub_str[] = { "long_branch",
10961 "long_branch_r2off",
10963 "plt_branch_r2off",
10967 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
10968 len2 = strlen (stub_entry->root.string);
10969 name = bfd_malloc (len1 + len2 + 2);
10972 memcpy (name, stub_entry->root.string, 9);
10973 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
10974 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
10975 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
10978 if (h->root.type == bfd_link_hash_new)
10980 h->root.type = bfd_link_hash_defined;
10981 h->root.u.def.section = stub_entry->group->stub_sec;
10982 h->root.u.def.value = stub_entry->stub_offset;
10983 h->ref_regular = 1;
10984 h->def_regular = 1;
10985 h->ref_regular_nonweak = 1;
10986 h->forced_local = 1;
10988 h->root.linker_def = 1;
10995 /* As above, but don't actually build the stub. Just bump offset so
10996 we know stub section sizes, and select plt_branch stubs where
10997 long_branch stubs won't do. */
11000 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11002 struct ppc_stub_hash_entry *stub_entry;
11003 struct bfd_link_info *info;
11004 struct ppc_link_hash_table *htab;
11008 /* Massage our args to the form they really have. */
11009 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11012 htab = ppc_hash_table (info);
11016 if (stub_entry->stub_type == ppc_stub_plt_call
11017 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11020 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11021 if (off >= (bfd_vma) -2)
11023 plt = htab->elf.splt;
11024 if (!htab->elf.dynamic_sections_created
11025 || stub_entry->h == NULL
11026 || stub_entry->h->elf.dynindx == -1)
11027 plt = htab->elf.iplt;
11028 off += (plt->output_offset
11029 + plt->output_section->vma
11030 - elf_gp (plt->output_section->owner)
11031 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11033 size = plt_stub_size (htab, stub_entry, off);
11034 if (htab->params->plt_stub_align)
11035 size += plt_stub_pad (htab, stub_entry, off);
11036 if (info->emitrelocations)
11038 stub_entry->group->stub_sec->reloc_count
11039 += ((PPC_HA (off) != 0)
11041 ? 2 + (htab->params->plt_static_chain
11042 && PPC_HA (off + 16) == PPC_HA (off))
11044 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11049 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11052 bfd_vma local_off = 0;
11054 off = (stub_entry->target_value
11055 + stub_entry->target_section->output_offset
11056 + stub_entry->target_section->output_section->vma);
11057 off -= (stub_entry->group->stub_sec->size
11058 + stub_entry->group->stub_sec->output_offset
11059 + stub_entry->group->stub_sec->output_section->vma);
11061 /* Reset the stub type from the plt variant in case we now
11062 can reach with a shorter stub. */
11063 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11064 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11067 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11069 r2off = get_r2off (info, stub_entry);
11070 if (r2off == (bfd_vma) -1)
11072 htab->stub_error = TRUE;
11076 if (PPC_HA (r2off) != 0)
11078 if (PPC_LO (r2off) != 0)
11083 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11085 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11086 Do the same for -R objects without function descriptors. */
11087 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11088 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
11090 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
11092 struct ppc_branch_hash_entry *br_entry;
11094 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11095 stub_entry->root.string + 9,
11097 if (br_entry == NULL)
11099 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
11100 stub_entry->root.string);
11101 htab->stub_error = TRUE;
11105 if (br_entry->iter != htab->stub_iteration)
11107 br_entry->iter = htab->stub_iteration;
11108 br_entry->offset = htab->brlt->size;
11109 htab->brlt->size += 8;
11111 if (htab->relbrlt != NULL)
11112 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11113 else if (info->emitrelocations)
11115 htab->brlt->reloc_count += 1;
11116 htab->brlt->flags |= SEC_RELOC;
11120 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11121 off = (br_entry->offset
11122 + htab->brlt->output_offset
11123 + htab->brlt->output_section->vma
11124 - elf_gp (htab->brlt->output_section->owner)
11125 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11127 if (info->emitrelocations)
11129 stub_entry->group->stub_sec->reloc_count
11130 += 1 + (PPC_HA (off) != 0);
11131 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11134 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11137 if (PPC_HA (off) != 0)
11143 if (PPC_HA (off) != 0)
11146 if (PPC_HA (r2off) != 0)
11148 if (PPC_LO (r2off) != 0)
11152 else if (info->emitrelocations)
11154 stub_entry->group->stub_sec->reloc_count += 1;
11155 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11159 stub_entry->group->stub_sec->size += size;
11163 /* Set up various things so that we can make a list of input sections
11164 for each output section included in the link. Returns -1 on error,
11165 0 when no stubs will be needed, and 1 on success. */
11168 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11172 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11177 htab->sec_info_arr_size = bfd_get_next_section_id ();
11178 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11179 htab->sec_info = bfd_zmalloc (amt);
11180 if (htab->sec_info == NULL)
11183 /* Set toc_off for com, und, abs and ind sections. */
11184 for (id = 0; id < 3; id++)
11185 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11190 /* Set up for first pass at multitoc partitioning. */
11193 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11195 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11197 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11198 htab->toc_bfd = NULL;
11199 htab->toc_first_sec = NULL;
11202 /* The linker repeatedly calls this function for each TOC input section
11203 and linker generated GOT section. Group input bfds such that the toc
11204 within a group is less than 64k in size. */
11207 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11209 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11210 bfd_vma addr, off, limit;
11215 if (!htab->second_toc_pass)
11217 /* Keep track of the first .toc or .got section for this input bfd. */
11218 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11222 htab->toc_bfd = isec->owner;
11223 htab->toc_first_sec = isec;
11226 addr = isec->output_offset + isec->output_section->vma;
11227 off = addr - htab->toc_curr;
11228 limit = 0x80008000;
11229 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11231 if (off + isec->size > limit)
11233 addr = (htab->toc_first_sec->output_offset
11234 + htab->toc_first_sec->output_section->vma);
11235 htab->toc_curr = addr;
11236 htab->toc_curr &= -TOC_BASE_ALIGN;
11239 /* toc_curr is the base address of this toc group. Set elf_gp
11240 for the input section to be the offset relative to the
11241 output toc base plus 0x8000. Making the input elf_gp an
11242 offset allows us to move the toc as a whole without
11243 recalculating input elf_gp. */
11244 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11245 off += TOC_BASE_OFF;
11247 /* Die if someone uses a linker script that doesn't keep input
11248 file .toc and .got together. */
11250 && elf_gp (isec->owner) != 0
11251 && elf_gp (isec->owner) != off)
11254 elf_gp (isec->owner) = off;
11258 /* During the second pass toc_first_sec points to the start of
11259 a toc group, and toc_curr is used to track the old elf_gp.
11260 We use toc_bfd to ensure we only look at each bfd once. */
11261 if (htab->toc_bfd == isec->owner)
11263 htab->toc_bfd = isec->owner;
11265 if (htab->toc_first_sec == NULL
11266 || htab->toc_curr != elf_gp (isec->owner))
11268 htab->toc_curr = elf_gp (isec->owner);
11269 htab->toc_first_sec = isec;
11271 addr = (htab->toc_first_sec->output_offset
11272 + htab->toc_first_sec->output_section->vma);
11273 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11274 elf_gp (isec->owner) = off;
11279 /* Called via elf_link_hash_traverse to merge GOT entries for global
11283 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11285 if (h->root.type == bfd_link_hash_indirect)
11288 merge_got_entries (&h->got.glist);
11293 /* Called via elf_link_hash_traverse to allocate GOT entries for global
11297 reallocate_got (struct elf_link_hash_entry *h, void *inf)
11299 struct got_entry *gent;
11301 if (h->root.type == bfd_link_hash_indirect)
11304 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11305 if (!gent->is_indirect)
11306 allocate_got (h, (struct bfd_link_info *) inf, gent);
11310 /* Called on the first multitoc pass after the last call to
11311 ppc64_elf_next_toc_section. This function removes duplicate GOT
11315 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
11317 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11318 struct bfd *ibfd, *ibfd2;
11319 bfd_boolean done_something;
11321 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
11323 if (!htab->do_multi_toc)
11326 /* Merge global sym got entries within a toc group. */
11327 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11329 /* And tlsld_got. */
11330 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11332 struct got_entry *ent, *ent2;
11334 if (!is_ppc64_elf (ibfd))
11337 ent = ppc64_tlsld_got (ibfd);
11338 if (!ent->is_indirect
11339 && ent->got.offset != (bfd_vma) -1)
11341 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
11343 if (!is_ppc64_elf (ibfd2))
11346 ent2 = ppc64_tlsld_got (ibfd2);
11347 if (!ent2->is_indirect
11348 && ent2->got.offset != (bfd_vma) -1
11349 && elf_gp (ibfd2) == elf_gp (ibfd))
11351 ent2->is_indirect = TRUE;
11352 ent2->got.ent = ent;
11358 /* Zap sizes of got sections. */
11359 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11360 htab->elf.irelplt->size -= htab->got_reli_size;
11361 htab->got_reli_size = 0;
11363 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11365 asection *got, *relgot;
11367 if (!is_ppc64_elf (ibfd))
11370 got = ppc64_elf_tdata (ibfd)->got;
11373 got->rawsize = got->size;
11375 relgot = ppc64_elf_tdata (ibfd)->relgot;
11376 relgot->rawsize = relgot->size;
11381 /* Now reallocate the got, local syms first. We don't need to
11382 allocate section contents again since we never increase size. */
11383 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11385 struct got_entry **lgot_ents;
11386 struct got_entry **end_lgot_ents;
11387 struct plt_entry **local_plt;
11388 struct plt_entry **end_local_plt;
11389 unsigned char *lgot_masks;
11390 bfd_size_type locsymcount;
11391 Elf_Internal_Shdr *symtab_hdr;
11394 if (!is_ppc64_elf (ibfd))
11397 lgot_ents = elf_local_got_ents (ibfd);
11401 symtab_hdr = &elf_symtab_hdr (ibfd);
11402 locsymcount = symtab_hdr->sh_info;
11403 end_lgot_ents = lgot_ents + locsymcount;
11404 local_plt = (struct plt_entry **) end_lgot_ents;
11405 end_local_plt = local_plt + locsymcount;
11406 lgot_masks = (unsigned char *) end_local_plt;
11407 s = ppc64_elf_tdata (ibfd)->got;
11408 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11410 struct got_entry *ent;
11412 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
11414 unsigned int ent_size = 8;
11415 unsigned int rel_size = sizeof (Elf64_External_Rela);
11417 ent->got.offset = s->size;
11418 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
11423 s->size += ent_size;
11424 if ((*lgot_masks & PLT_IFUNC) != 0)
11426 htab->elf.irelplt->size += rel_size;
11427 htab->got_reli_size += rel_size;
11429 else if (bfd_link_pic (info))
11431 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11432 srel->size += rel_size;
11438 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11440 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11442 struct got_entry *ent;
11444 if (!is_ppc64_elf (ibfd))
11447 ent = ppc64_tlsld_got (ibfd);
11448 if (!ent->is_indirect
11449 && ent->got.offset != (bfd_vma) -1)
11451 asection *s = ppc64_elf_tdata (ibfd)->got;
11452 ent->got.offset = s->size;
11454 if (bfd_link_pic (info))
11456 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11457 srel->size += sizeof (Elf64_External_Rela);
11462 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
11463 if (!done_something)
11464 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11468 if (!is_ppc64_elf (ibfd))
11471 got = ppc64_elf_tdata (ibfd)->got;
11474 done_something = got->rawsize != got->size;
11475 if (done_something)
11480 if (done_something)
11481 (*htab->params->layout_sections_again) ();
11483 /* Set up for second pass over toc sections to recalculate elf_gp
11484 on input sections. */
11485 htab->toc_bfd = NULL;
11486 htab->toc_first_sec = NULL;
11487 htab->second_toc_pass = TRUE;
11488 return done_something;
11491 /* Called after second pass of multitoc partitioning. */
11494 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11496 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11498 /* After the second pass, toc_curr tracks the TOC offset used
11499 for code sections below in ppc64_elf_next_input_section. */
11500 htab->toc_curr = TOC_BASE_OFF;
11503 /* No toc references were found in ISEC. If the code in ISEC makes no
11504 calls, then there's no need to use toc adjusting stubs when branching
11505 into ISEC. Actually, indirect calls from ISEC are OK as they will
11506 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11507 needed, and 2 if a cyclical call-graph was found but no other reason
11508 for a stub was detected. If called from the top level, a return of
11509 2 means the same as a return of 0. */
11512 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
11516 /* Mark this section as checked. */
11517 isec->call_check_done = 1;
11519 /* We know none of our code bearing sections will need toc stubs. */
11520 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11523 if (isec->size == 0)
11526 if (isec->output_section == NULL)
11530 if (isec->reloc_count != 0)
11532 Elf_Internal_Rela *relstart, *rel;
11533 Elf_Internal_Sym *local_syms;
11534 struct ppc_link_hash_table *htab;
11536 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11537 info->keep_memory);
11538 if (relstart == NULL)
11541 /* Look for branches to outside of this section. */
11543 htab = ppc_hash_table (info);
11547 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
11549 enum elf_ppc64_reloc_type r_type;
11550 unsigned long r_symndx;
11551 struct elf_link_hash_entry *h;
11552 struct ppc_link_hash_entry *eh;
11553 Elf_Internal_Sym *sym;
11555 struct _opd_sec_data *opd;
11559 r_type = ELF64_R_TYPE (rel->r_info);
11560 if (r_type != R_PPC64_REL24
11561 && r_type != R_PPC64_REL14
11562 && r_type != R_PPC64_REL14_BRTAKEN
11563 && r_type != R_PPC64_REL14_BRNTAKEN)
11566 r_symndx = ELF64_R_SYM (rel->r_info);
11567 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11574 /* Calls to dynamic lib functions go through a plt call stub
11576 eh = (struct ppc_link_hash_entry *) h;
11578 && (eh->elf.plt.plist != NULL
11580 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11586 if (sym_sec == NULL)
11587 /* Ignore other undefined symbols. */
11590 /* Assume branches to other sections not included in the
11591 link need stubs too, to cover -R and absolute syms. */
11592 if (sym_sec->output_section == NULL)
11599 sym_value = sym->st_value;
11602 if (h->root.type != bfd_link_hash_defined
11603 && h->root.type != bfd_link_hash_defweak)
11605 sym_value = h->root.u.def.value;
11607 sym_value += rel->r_addend;
11609 /* If this branch reloc uses an opd sym, find the code section. */
11610 opd = get_opd_info (sym_sec);
11613 if (h == NULL && opd->adjust != NULL)
11617 adjust = opd->adjust[OPD_NDX (sym_value)];
11619 /* Assume deleted functions won't ever be called. */
11621 sym_value += adjust;
11624 dest = opd_entry_value (sym_sec, sym_value,
11625 &sym_sec, NULL, FALSE);
11626 if (dest == (bfd_vma) -1)
11631 + sym_sec->output_offset
11632 + sym_sec->output_section->vma);
11634 /* Ignore branch to self. */
11635 if (sym_sec == isec)
11638 /* If the called function uses the toc, we need a stub. */
11639 if (sym_sec->has_toc_reloc
11640 || sym_sec->makes_toc_func_call)
11646 /* Assume any branch that needs a long branch stub might in fact
11647 need a plt_branch stub. A plt_branch stub uses r2. */
11648 else if (dest - (isec->output_offset
11649 + isec->output_section->vma
11650 + rel->r_offset) + (1 << 25)
11651 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11659 /* If calling back to a section in the process of being
11660 tested, we can't say for sure that no toc adjusting stubs
11661 are needed, so don't return zero. */
11662 else if (sym_sec->call_check_in_progress)
11665 /* Branches to another section that itself doesn't have any TOC
11666 references are OK. Recursively call ourselves to check. */
11667 else if (!sym_sec->call_check_done)
11671 /* Mark current section as indeterminate, so that other
11672 sections that call back to current won't be marked as
11674 isec->call_check_in_progress = 1;
11675 recur = toc_adjusting_stub_needed (info, sym_sec);
11676 isec->call_check_in_progress = 0;
11687 if (local_syms != NULL
11688 && (elf_symtab_hdr (isec->owner).contents
11689 != (unsigned char *) local_syms))
11691 if (elf_section_data (isec)->relocs != relstart)
11696 && isec->map_head.s != NULL
11697 && (strcmp (isec->output_section->name, ".init") == 0
11698 || strcmp (isec->output_section->name, ".fini") == 0))
11700 if (isec->map_head.s->has_toc_reloc
11701 || isec->map_head.s->makes_toc_func_call)
11703 else if (!isec->map_head.s->call_check_done)
11706 isec->call_check_in_progress = 1;
11707 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11708 isec->call_check_in_progress = 0;
11715 isec->makes_toc_func_call = 1;
11720 /* The linker repeatedly calls this function for each input section,
11721 in the order that input sections are linked into output sections.
11722 Build lists of input sections to determine groupings between which
11723 we may insert linker stubs. */
11726 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
11728 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11733 if ((isec->output_section->flags & SEC_CODE) != 0
11734 && isec->output_section->id < htab->sec_info_arr_size)
11736 /* This happens to make the list in reverse order,
11737 which is what we want. */
11738 htab->sec_info[isec->id].u.list
11739 = htab->sec_info[isec->output_section->id].u.list;
11740 htab->sec_info[isec->output_section->id].u.list = isec;
11743 if (htab->multi_toc_needed)
11745 /* Analyse sections that aren't already flagged as needing a
11746 valid toc pointer. Exclude .fixup for the linux kernel.
11747 .fixup contains branches, but only back to the function that
11748 hit an exception. */
11749 if (!(isec->has_toc_reloc
11750 || (isec->flags & SEC_CODE) == 0
11751 || strcmp (isec->name, ".fixup") == 0
11752 || isec->call_check_done))
11754 if (toc_adjusting_stub_needed (info, isec) < 0)
11757 /* Make all sections use the TOC assigned for this object file.
11758 This will be wrong for pasted sections; We fix that in
11759 check_pasted_section(). */
11760 if (elf_gp (isec->owner) != 0)
11761 htab->toc_curr = elf_gp (isec->owner);
11764 htab->sec_info[isec->id].toc_off = htab->toc_curr;
11768 /* Check that all .init and .fini sections use the same toc, if they
11769 have toc relocs. */
11772 check_pasted_section (struct bfd_link_info *info, const char *name)
11774 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11778 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11779 bfd_vma toc_off = 0;
11782 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11783 if (i->has_toc_reloc)
11786 toc_off = htab->sec_info[i->id].toc_off;
11787 else if (toc_off != htab->sec_info[i->id].toc_off)
11792 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11793 if (i->makes_toc_func_call)
11795 toc_off = htab->sec_info[i->id].toc_off;
11799 /* Make sure the whole pasted function uses the same toc offset. */
11801 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11802 htab->sec_info[i->id].toc_off = toc_off;
11808 ppc64_elf_check_init_fini (struct bfd_link_info *info)
11810 return (check_pasted_section (info, ".init")
11811 & check_pasted_section (info, ".fini"));
11814 /* See whether we can group stub sections together. Grouping stub
11815 sections may result in fewer stubs. More importantly, we need to
11816 put all .init* and .fini* stubs at the beginning of the .init or
11817 .fini output sections respectively, because glibc splits the
11818 _init and _fini functions into multiple parts. Putting a stub in
11819 the middle of a function is not a good idea. */
11822 group_sections (struct bfd_link_info *info,
11823 bfd_size_type stub_group_size,
11824 bfd_boolean stubs_always_before_branch)
11826 struct ppc_link_hash_table *htab;
11828 bfd_size_type stub14_group_size;
11829 bfd_boolean suppress_size_errors;
11831 htab = ppc_hash_table (info);
11835 suppress_size_errors = FALSE;
11836 stub14_group_size = stub_group_size >> 10;
11837 if (stub_group_size == 1)
11839 /* Default values. */
11840 if (stubs_always_before_branch)
11842 stub_group_size = 0x1e00000;
11843 stub14_group_size = 0x7800;
11847 stub_group_size = 0x1c00000;
11848 stub14_group_size = 0x7000;
11850 suppress_size_errors = TRUE;
11853 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
11857 if (osec->id >= htab->sec_info_arr_size)
11860 tail = htab->sec_info[osec->id].u.list;
11861 while (tail != NULL)
11865 bfd_size_type total;
11866 bfd_boolean big_sec;
11868 struct map_stub *group;
11871 total = tail->size;
11872 big_sec = total > (ppc64_elf_section_data (tail) != NULL
11873 && ppc64_elf_section_data (tail)->has_14bit_branch
11874 ? stub14_group_size : stub_group_size);
11875 if (big_sec && !suppress_size_errors)
11876 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
11877 tail->owner, tail);
11878 curr_toc = htab->sec_info[tail->id].toc_off;
11880 while ((prev = htab->sec_info[curr->id].u.list) != NULL
11881 && ((total += curr->output_offset - prev->output_offset)
11882 < (ppc64_elf_section_data (prev) != NULL
11883 && ppc64_elf_section_data (prev)->has_14bit_branch
11884 ? stub14_group_size : stub_group_size))
11885 && htab->sec_info[prev->id].toc_off == curr_toc)
11888 /* OK, the size from the start of CURR to the end is less
11889 than stub_group_size and thus can be handled by one stub
11890 section. (or the tail section is itself larger than
11891 stub_group_size, in which case we may be toast.) We
11892 should really be keeping track of the total size of stubs
11893 added here, as stubs contribute to the final output
11894 section size. That's a little tricky, and this way will
11895 only break if stubs added make the total size more than
11896 2^25, ie. for the default stub_group_size, if stubs total
11897 more than 2097152 bytes, or nearly 75000 plt call stubs. */
11898 group = bfd_alloc (curr->owner, sizeof (*group));
11901 group->link_sec = curr;
11902 group->stub_sec = NULL;
11905 prev = htab->sec_info[tail->id].u.list;
11906 /* Set up this stub group. */
11907 htab->sec_info[tail->id].u.group = group;
11909 while (tail != curr && (tail = prev) != NULL);
11911 /* But wait, there's more! Input sections up to stub_group_size
11912 bytes before the stub section can be handled by it too.
11913 Don't do this if we have a really large section after the
11914 stubs, as adding more stubs increases the chance that
11915 branches may not reach into the stub section. */
11916 if (!stubs_always_before_branch && !big_sec)
11919 while (prev != NULL
11920 && ((total += tail->output_offset - prev->output_offset)
11921 < (ppc64_elf_section_data (prev) != NULL
11922 && ppc64_elf_section_data (prev)->has_14bit_branch
11923 ? stub14_group_size : stub_group_size))
11924 && htab->sec_info[prev->id].toc_off == curr_toc)
11927 prev = htab->sec_info[tail->id].u.list;
11928 htab->sec_info[tail->id].u.group = group;
11937 static const unsigned char glink_eh_frame_cie[] =
11939 0, 0, 0, 16, /* length. */
11940 0, 0, 0, 0, /* id. */
11941 1, /* CIE version. */
11942 'z', 'R', 0, /* Augmentation string. */
11943 4, /* Code alignment. */
11944 0x78, /* Data alignment. */
11946 1, /* Augmentation size. */
11947 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
11948 DW_CFA_def_cfa, 1, 0, /* def_cfa: r1 offset 0. */
11952 /* Stripping output sections is normally done before dynamic section
11953 symbols have been allocated. This function is called later, and
11954 handles cases like htab->brlt which is mapped to its own output
11958 maybe_strip_output (struct bfd_link_info *info, asection *isec)
11960 if (isec->size == 0
11961 && isec->output_section->size == 0
11962 && !(isec->output_section->flags & SEC_KEEP)
11963 && !bfd_section_removed_from_list (info->output_bfd,
11964 isec->output_section)
11965 && elf_section_data (isec->output_section)->dynindx == 0)
11967 isec->output_section->flags |= SEC_EXCLUDE;
11968 bfd_section_list_remove (info->output_bfd, isec->output_section);
11969 info->output_bfd->section_count--;
11973 /* Determine and set the size of the stub section for a final link.
11975 The basic idea here is to examine all the relocations looking for
11976 PC-relative calls to a target that is unreachable with a "bl"
11980 ppc64_elf_size_stubs (struct bfd_link_info *info)
11982 bfd_size_type stub_group_size;
11983 bfd_boolean stubs_always_before_branch;
11984 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11989 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
11990 htab->params->plt_thread_safe = 1;
11991 if (!htab->opd_abi)
11992 htab->params->plt_thread_safe = 0;
11993 else if (htab->params->plt_thread_safe == -1)
11995 static const char *const thread_starter[] =
11999 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12001 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12002 "mq_notify", "create_timer",
12007 "GOMP_parallel_start",
12008 "GOMP_parallel_loop_static",
12009 "GOMP_parallel_loop_static_start",
12010 "GOMP_parallel_loop_dynamic",
12011 "GOMP_parallel_loop_dynamic_start",
12012 "GOMP_parallel_loop_guided",
12013 "GOMP_parallel_loop_guided_start",
12014 "GOMP_parallel_loop_runtime",
12015 "GOMP_parallel_loop_runtime_start",
12016 "GOMP_parallel_sections",
12017 "GOMP_parallel_sections_start",
12023 for (i = 0; i < sizeof (thread_starter)/ sizeof (thread_starter[0]); i++)
12025 struct elf_link_hash_entry *h;
12026 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12027 FALSE, FALSE, TRUE);
12028 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12029 if (htab->params->plt_thread_safe)
12033 stubs_always_before_branch = htab->params->group_size < 0;
12034 if (htab->params->group_size < 0)
12035 stub_group_size = -htab->params->group_size;
12037 stub_group_size = htab->params->group_size;
12039 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12045 unsigned int bfd_indx;
12046 asection *stub_sec;
12048 htab->stub_iteration += 1;
12050 for (input_bfd = info->input_bfds, bfd_indx = 0;
12052 input_bfd = input_bfd->link.next, bfd_indx++)
12054 Elf_Internal_Shdr *symtab_hdr;
12056 Elf_Internal_Sym *local_syms = NULL;
12058 if (!is_ppc64_elf (input_bfd))
12061 /* We'll need the symbol table in a second. */
12062 symtab_hdr = &elf_symtab_hdr (input_bfd);
12063 if (symtab_hdr->sh_info == 0)
12066 /* Walk over each section attached to the input bfd. */
12067 for (section = input_bfd->sections;
12069 section = section->next)
12071 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12073 /* If there aren't any relocs, then there's nothing more
12075 if ((section->flags & SEC_RELOC) == 0
12076 || (section->flags & SEC_ALLOC) == 0
12077 || (section->flags & SEC_LOAD) == 0
12078 || (section->flags & SEC_CODE) == 0
12079 || section->reloc_count == 0)
12082 /* If this section is a link-once section that will be
12083 discarded, then don't create any stubs. */
12084 if (section->output_section == NULL
12085 || section->output_section->owner != info->output_bfd)
12088 /* Get the relocs. */
12090 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12091 info->keep_memory);
12092 if (internal_relocs == NULL)
12093 goto error_ret_free_local;
12095 /* Now examine each relocation. */
12096 irela = internal_relocs;
12097 irelaend = irela + section->reloc_count;
12098 for (; irela < irelaend; irela++)
12100 enum elf_ppc64_reloc_type r_type;
12101 unsigned int r_indx;
12102 enum ppc_stub_type stub_type;
12103 struct ppc_stub_hash_entry *stub_entry;
12104 asection *sym_sec, *code_sec;
12105 bfd_vma sym_value, code_value;
12106 bfd_vma destination;
12107 unsigned long local_off;
12108 bfd_boolean ok_dest;
12109 struct ppc_link_hash_entry *hash;
12110 struct ppc_link_hash_entry *fdh;
12111 struct elf_link_hash_entry *h;
12112 Elf_Internal_Sym *sym;
12114 const asection *id_sec;
12115 struct _opd_sec_data *opd;
12116 struct plt_entry *plt_ent;
12118 r_type = ELF64_R_TYPE (irela->r_info);
12119 r_indx = ELF64_R_SYM (irela->r_info);
12121 if (r_type >= R_PPC64_max)
12123 bfd_set_error (bfd_error_bad_value);
12124 goto error_ret_free_internal;
12127 /* Only look for stubs on branch instructions. */
12128 if (r_type != R_PPC64_REL24
12129 && r_type != R_PPC64_REL14
12130 && r_type != R_PPC64_REL14_BRTAKEN
12131 && r_type != R_PPC64_REL14_BRNTAKEN)
12134 /* Now determine the call target, its name, value,
12136 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12137 r_indx, input_bfd))
12138 goto error_ret_free_internal;
12139 hash = (struct ppc_link_hash_entry *) h;
12146 sym_value = sym->st_value;
12149 else if (hash->elf.root.type == bfd_link_hash_defined
12150 || hash->elf.root.type == bfd_link_hash_defweak)
12152 sym_value = hash->elf.root.u.def.value;
12153 if (sym_sec->output_section != NULL)
12156 else if (hash->elf.root.type == bfd_link_hash_undefweak
12157 || hash->elf.root.type == bfd_link_hash_undefined)
12159 /* Recognise an old ABI func code entry sym, and
12160 use the func descriptor sym instead if it is
12162 if (hash->elf.root.root.string[0] == '.'
12163 && (fdh = lookup_fdh (hash, htab)) != NULL)
12165 if (fdh->elf.root.type == bfd_link_hash_defined
12166 || fdh->elf.root.type == bfd_link_hash_defweak)
12168 sym_sec = fdh->elf.root.u.def.section;
12169 sym_value = fdh->elf.root.u.def.value;
12170 if (sym_sec->output_section != NULL)
12179 bfd_set_error (bfd_error_bad_value);
12180 goto error_ret_free_internal;
12187 sym_value += irela->r_addend;
12188 destination = (sym_value
12189 + sym_sec->output_offset
12190 + sym_sec->output_section->vma);
12191 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12196 code_sec = sym_sec;
12197 code_value = sym_value;
12198 opd = get_opd_info (sym_sec);
12203 if (hash == NULL && opd->adjust != NULL)
12205 long adjust = opd->adjust[OPD_NDX (sym_value)];
12208 code_value += adjust;
12209 sym_value += adjust;
12211 dest = opd_entry_value (sym_sec, sym_value,
12212 &code_sec, &code_value, FALSE);
12213 if (dest != (bfd_vma) -1)
12215 destination = dest;
12218 /* Fixup old ABI sym to point at code
12220 hash->elf.root.type = bfd_link_hash_defweak;
12221 hash->elf.root.u.def.section = code_sec;
12222 hash->elf.root.u.def.value = code_value;
12227 /* Determine what (if any) linker stub is needed. */
12229 stub_type = ppc_type_of_stub (section, irela, &hash,
12230 &plt_ent, destination,
12233 if (stub_type != ppc_stub_plt_call)
12235 /* Check whether we need a TOC adjusting stub.
12236 Since the linker pastes together pieces from
12237 different object files when creating the
12238 _init and _fini functions, it may be that a
12239 call to what looks like a local sym is in
12240 fact a call needing a TOC adjustment. */
12241 if (code_sec != NULL
12242 && code_sec->output_section != NULL
12243 && (htab->sec_info[code_sec->id].toc_off
12244 != htab->sec_info[section->id].toc_off)
12245 && (code_sec->has_toc_reloc
12246 || code_sec->makes_toc_func_call))
12247 stub_type = ppc_stub_long_branch_r2off;
12250 if (stub_type == ppc_stub_none)
12253 /* __tls_get_addr calls might be eliminated. */
12254 if (stub_type != ppc_stub_plt_call
12256 && (hash == htab->tls_get_addr
12257 || hash == htab->tls_get_addr_fd)
12258 && section->has_tls_reloc
12259 && irela != internal_relocs)
12261 /* Get tls info. */
12262 unsigned char *tls_mask;
12264 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
12265 irela - 1, input_bfd))
12266 goto error_ret_free_internal;
12267 if (*tls_mask != 0)
12271 if (stub_type == ppc_stub_plt_call
12272 && irela + 1 < irelaend
12273 && irela[1].r_offset == irela->r_offset + 4
12274 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12276 if (!tocsave_find (htab, INSERT,
12277 &local_syms, irela + 1, input_bfd))
12278 goto error_ret_free_internal;
12280 else if (stub_type == ppc_stub_plt_call)
12281 stub_type = ppc_stub_plt_call_r2save;
12283 /* Support for grouping stub sections. */
12284 id_sec = htab->sec_info[section->id].u.group->link_sec;
12286 /* Get the name of this stub. */
12287 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12289 goto error_ret_free_internal;
12291 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
12292 stub_name, FALSE, FALSE);
12293 if (stub_entry != NULL)
12295 /* The proper stub has already been created. */
12297 if (stub_type == ppc_stub_plt_call_r2save)
12298 stub_entry->stub_type = stub_type;
12302 stub_entry = ppc_add_stub (stub_name, section, info);
12303 if (stub_entry == NULL)
12306 error_ret_free_internal:
12307 if (elf_section_data (section)->relocs == NULL)
12308 free (internal_relocs);
12309 error_ret_free_local:
12310 if (local_syms != NULL
12311 && (symtab_hdr->contents
12312 != (unsigned char *) local_syms))
12317 stub_entry->stub_type = stub_type;
12318 if (stub_type != ppc_stub_plt_call
12319 && stub_type != ppc_stub_plt_call_r2save)
12321 stub_entry->target_value = code_value;
12322 stub_entry->target_section = code_sec;
12326 stub_entry->target_value = sym_value;
12327 stub_entry->target_section = sym_sec;
12329 stub_entry->h = hash;
12330 stub_entry->plt_ent = plt_ent;
12331 stub_entry->other = hash ? hash->elf.other : sym->st_other;
12333 if (stub_entry->h != NULL)
12334 htab->stub_globals += 1;
12337 /* We're done with the internal relocs, free them. */
12338 if (elf_section_data (section)->relocs != internal_relocs)
12339 free (internal_relocs);
12342 if (local_syms != NULL
12343 && symtab_hdr->contents != (unsigned char *) local_syms)
12345 if (!info->keep_memory)
12348 symtab_hdr->contents = (unsigned char *) local_syms;
12352 /* We may have added some stubs. Find out the new size of the
12354 for (stub_sec = htab->params->stub_bfd->sections;
12356 stub_sec = stub_sec->next)
12357 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12359 stub_sec->rawsize = stub_sec->size;
12360 stub_sec->size = 0;
12361 stub_sec->reloc_count = 0;
12362 stub_sec->flags &= ~SEC_RELOC;
12365 htab->brlt->size = 0;
12366 htab->brlt->reloc_count = 0;
12367 htab->brlt->flags &= ~SEC_RELOC;
12368 if (htab->relbrlt != NULL)
12369 htab->relbrlt->size = 0;
12371 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
12373 if (info->emitrelocations
12374 && htab->glink != NULL && htab->glink->size != 0)
12376 htab->glink->reloc_count = 1;
12377 htab->glink->flags |= SEC_RELOC;
12380 if (htab->glink_eh_frame != NULL
12381 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
12382 && htab->glink_eh_frame->output_section->size != 0)
12384 size_t size = 0, align;
12386 for (stub_sec = htab->params->stub_bfd->sections;
12388 stub_sec = stub_sec->next)
12389 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12391 if (htab->glink != NULL && htab->glink->size != 0)
12394 size += sizeof (glink_eh_frame_cie);
12396 align <<= htab->glink_eh_frame->output_section->alignment_power;
12398 size = (size + align) & ~align;
12399 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12400 htab->glink_eh_frame->size = size;
12403 if (htab->params->plt_stub_align != 0)
12404 for (stub_sec = htab->params->stub_bfd->sections;
12406 stub_sec = stub_sec->next)
12407 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12408 stub_sec->size = ((stub_sec->size
12409 + (1 << htab->params->plt_stub_align) - 1)
12410 & (-1 << htab->params->plt_stub_align));
12412 for (stub_sec = htab->params->stub_bfd->sections;
12414 stub_sec = stub_sec->next)
12415 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12416 && stub_sec->rawsize != stub_sec->size)
12419 /* Exit from this loop when no stubs have been added, and no stubs
12420 have changed size. */
12421 if (stub_sec == NULL
12422 && (htab->glink_eh_frame == NULL
12423 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
12426 /* Ask the linker to do its stuff. */
12427 (*htab->params->layout_sections_again) ();
12430 if (htab->glink_eh_frame != NULL
12431 && htab->glink_eh_frame->size != 0)
12434 bfd_byte *p, *last_fde;
12435 size_t last_fde_len, size, align, pad;
12436 asection *stub_sec;
12438 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12441 htab->glink_eh_frame->contents = p;
12444 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12445 /* CIE length (rewrite in case little-endian). */
12446 last_fde_len = sizeof (glink_eh_frame_cie) - 4;
12447 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12448 p += sizeof (glink_eh_frame_cie);
12450 for (stub_sec = htab->params->stub_bfd->sections;
12452 stub_sec = stub_sec->next)
12453 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12458 bfd_put_32 (htab->elf.dynobj, 20, p);
12461 val = p - htab->glink_eh_frame->contents;
12462 bfd_put_32 (htab->elf.dynobj, val, p);
12464 /* Offset to stub section, written later. */
12466 /* stub section size. */
12467 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12469 /* Augmentation. */
12474 if (htab->glink != NULL && htab->glink->size != 0)
12479 bfd_put_32 (htab->elf.dynobj, 20, p);
12482 val = p - htab->glink_eh_frame->contents;
12483 bfd_put_32 (htab->elf.dynobj, val, p);
12485 /* Offset to .glink, written later. */
12488 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12490 /* Augmentation. */
12493 *p++ = DW_CFA_advance_loc + 1;
12494 *p++ = DW_CFA_register;
12497 *p++ = DW_CFA_advance_loc + 4;
12498 *p++ = DW_CFA_restore_extended;
12501 /* Subsume any padding into the last FDE if user .eh_frame
12502 sections are aligned more than glink_eh_frame. Otherwise any
12503 zero padding will be seen as a terminator. */
12504 size = p - htab->glink_eh_frame->contents;
12506 align <<= htab->glink_eh_frame->output_section->alignment_power;
12508 pad = ((size + align) & ~align) - size;
12509 htab->glink_eh_frame->size = size + pad;
12510 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12513 maybe_strip_output (info, htab->brlt);
12514 if (htab->glink_eh_frame != NULL)
12515 maybe_strip_output (info, htab->glink_eh_frame);
12520 /* Called after we have determined section placement. If sections
12521 move, we'll be called again. Provide a value for TOCstart. */
12524 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
12527 bfd_vma TOCstart, adjust;
12531 struct elf_link_hash_entry *h;
12532 struct elf_link_hash_table *htab = elf_hash_table (info);
12534 if (is_elf_hash_table (htab)
12535 && htab->hgot != NULL)
12539 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12540 if (is_elf_hash_table (htab))
12544 && h->root.type == bfd_link_hash_defined
12545 && !h->root.linker_def
12546 && (!is_elf_hash_table (htab)
12547 || h->def_regular))
12549 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12550 + h->root.u.def.section->output_offset
12551 + h->root.u.def.section->output_section->vma);
12552 _bfd_set_gp_value (obfd, TOCstart);
12557 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12558 order. The TOC starts where the first of these sections starts. */
12559 s = bfd_get_section_by_name (obfd, ".got");
12560 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12561 s = bfd_get_section_by_name (obfd, ".toc");
12562 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12563 s = bfd_get_section_by_name (obfd, ".tocbss");
12564 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12565 s = bfd_get_section_by_name (obfd, ".plt");
12566 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12568 /* This may happen for
12569 o references to TOC base (SYM@toc / TOC[tc0]) without a
12571 o bad linker script
12572 o --gc-sections and empty TOC sections
12574 FIXME: Warn user? */
12576 /* Look for a likely section. We probably won't even be
12578 for (s = obfd->sections; s != NULL; s = s->next)
12579 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12581 == (SEC_ALLOC | SEC_SMALL_DATA))
12584 for (s = obfd->sections; s != NULL; s = s->next)
12585 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
12586 == (SEC_ALLOC | SEC_SMALL_DATA))
12589 for (s = obfd->sections; s != NULL; s = s->next)
12590 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12594 for (s = obfd->sections; s != NULL; s = s->next)
12595 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
12601 TOCstart = s->output_section->vma + s->output_offset;
12603 /* Force alignment. */
12604 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12605 TOCstart -= adjust;
12606 _bfd_set_gp_value (obfd, TOCstart);
12608 if (info != NULL && s != NULL)
12610 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12614 if (htab->elf.hgot != NULL)
12616 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
12617 htab->elf.hgot->root.u.def.section = s;
12622 struct bfd_link_hash_entry *bh = NULL;
12623 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
12624 s, TOC_BASE_OFF - adjust,
12625 NULL, FALSE, FALSE, &bh);
12631 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12632 write out any global entry stubs. */
12635 build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12637 struct bfd_link_info *info;
12638 struct ppc_link_hash_table *htab;
12639 struct plt_entry *pent;
12642 if (h->root.type == bfd_link_hash_indirect)
12645 if (!h->pointer_equality_needed)
12648 if (h->def_regular)
12652 htab = ppc_hash_table (info);
12657 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12658 if (pent->plt.offset != (bfd_vma) -1
12659 && pent->addend == 0)
12665 p = s->contents + h->root.u.def.value;
12666 plt = htab->elf.splt;
12667 if (!htab->elf.dynamic_sections_created
12668 || h->dynindx == -1)
12669 plt = htab->elf.iplt;
12670 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
12671 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12673 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12675 info->callbacks->einfo
12676 (_("%P: linkage table error against `%T'\n"),
12677 h->root.root.string);
12678 bfd_set_error (bfd_error_bad_value);
12679 htab->stub_error = TRUE;
12682 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12683 if (htab->params->emit_stub_syms)
12685 size_t len = strlen (h->root.root.string);
12686 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12691 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12692 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12695 if (h->root.type == bfd_link_hash_new)
12697 h->root.type = bfd_link_hash_defined;
12698 h->root.u.def.section = s;
12699 h->root.u.def.value = p - s->contents;
12700 h->ref_regular = 1;
12701 h->def_regular = 1;
12702 h->ref_regular_nonweak = 1;
12703 h->forced_local = 1;
12705 h->root.linker_def = 1;
12709 if (PPC_HA (off) != 0)
12711 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12714 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12716 bfd_put_32 (s->owner, MTCTR_R12, p);
12718 bfd_put_32 (s->owner, BCTR, p);
12724 /* Build all the stubs associated with the current output file.
12725 The stubs are kept in a hash table attached to the main linker
12726 hash table. This function is called via gldelf64ppc_finish. */
12729 ppc64_elf_build_stubs (struct bfd_link_info *info,
12732 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12733 asection *stub_sec;
12735 int stub_sec_count = 0;
12740 /* Allocate memory to hold the linker stubs. */
12741 for (stub_sec = htab->params->stub_bfd->sections;
12743 stub_sec = stub_sec->next)
12744 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12745 && stub_sec->size != 0)
12747 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
12748 if (stub_sec->contents == NULL)
12750 /* We want to check that built size is the same as calculated
12751 size. rawsize is a convenient location to use. */
12752 stub_sec->rawsize = stub_sec->size;
12753 stub_sec->size = 0;
12756 if (htab->glink != NULL && htab->glink->size != 0)
12761 /* Build the .glink plt call stub. */
12762 if (htab->params->emit_stub_syms)
12764 struct elf_link_hash_entry *h;
12765 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
12766 TRUE, FALSE, FALSE);
12769 if (h->root.type == bfd_link_hash_new)
12771 h->root.type = bfd_link_hash_defined;
12772 h->root.u.def.section = htab->glink;
12773 h->root.u.def.value = 8;
12774 h->ref_regular = 1;
12775 h->def_regular = 1;
12776 h->ref_regular_nonweak = 1;
12777 h->forced_local = 1;
12779 h->root.linker_def = 1;
12782 plt0 = (htab->elf.splt->output_section->vma
12783 + htab->elf.splt->output_offset
12785 if (info->emitrelocations)
12787 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
12790 r->r_offset = (htab->glink->output_offset
12791 + htab->glink->output_section->vma);
12792 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
12793 r->r_addend = plt0;
12795 p = htab->glink->contents;
12796 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
12797 bfd_put_64 (htab->glink->owner, plt0, p);
12801 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
12803 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12805 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12807 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12809 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
12811 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12813 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12815 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
12817 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12819 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
12824 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
12826 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12828 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12830 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12832 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
12834 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
12836 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12838 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
12840 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12842 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
12844 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12846 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
12849 bfd_put_32 (htab->glink->owner, BCTR, p);
12851 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
12853 bfd_put_32 (htab->glink->owner, NOP, p);
12857 /* Build the .glink lazy link call stubs. */
12859 while (p < htab->glink->contents + htab->glink->rawsize)
12865 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
12870 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
12872 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
12877 bfd_put_32 (htab->glink->owner,
12878 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
12883 /* Build .glink global entry stubs. */
12884 if (htab->glink->size > htab->glink->rawsize)
12885 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
12888 if (htab->brlt != NULL && htab->brlt->size != 0)
12890 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
12892 if (htab->brlt->contents == NULL)
12895 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
12897 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
12898 htab->relbrlt->size);
12899 if (htab->relbrlt->contents == NULL)
12903 /* Build the stubs as directed by the stub hash table. */
12904 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
12906 if (htab->relbrlt != NULL)
12907 htab->relbrlt->reloc_count = 0;
12909 if (htab->params->plt_stub_align != 0)
12910 for (stub_sec = htab->params->stub_bfd->sections;
12912 stub_sec = stub_sec->next)
12913 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12914 stub_sec->size = ((stub_sec->size
12915 + (1 << htab->params->plt_stub_align) - 1)
12916 & (-1 << htab->params->plt_stub_align));
12918 for (stub_sec = htab->params->stub_bfd->sections;
12920 stub_sec = stub_sec->next)
12921 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12923 stub_sec_count += 1;
12924 if (stub_sec->rawsize != stub_sec->size)
12928 /* Note that the glink_eh_frame check here is not only testing that
12929 the generated size matched the calculated size but also that
12930 bfd_elf_discard_info didn't make any changes to the section. */
12931 if (stub_sec != NULL
12932 || (htab->glink_eh_frame != NULL
12933 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
12935 htab->stub_error = TRUE;
12936 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
12939 if (htab->stub_error)
12944 *stats = bfd_malloc (500);
12945 if (*stats == NULL)
12948 sprintf (*stats, _("linker stubs in %u group%s\n"
12950 " toc adjust %lu\n"
12951 " long branch %lu\n"
12952 " long toc adj %lu\n"
12954 " plt call toc %lu\n"
12955 " global entry %lu"),
12957 stub_sec_count == 1 ? "" : "s",
12958 htab->stub_count[ppc_stub_long_branch - 1],
12959 htab->stub_count[ppc_stub_long_branch_r2off - 1],
12960 htab->stub_count[ppc_stub_plt_branch - 1],
12961 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
12962 htab->stub_count[ppc_stub_plt_call - 1],
12963 htab->stub_count[ppc_stub_plt_call_r2save - 1],
12964 htab->stub_count[ppc_stub_global_entry - 1]);
12969 /* This function undoes the changes made by add_symbol_adjust. */
12972 undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12974 struct ppc_link_hash_entry *eh;
12976 if (h->root.type == bfd_link_hash_indirect)
12979 eh = (struct ppc_link_hash_entry *) h;
12980 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
12983 eh->elf.root.type = bfd_link_hash_undefined;
12988 ppc64_elf_restore_symbols (struct bfd_link_info *info)
12990 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12993 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
12996 /* What to do when ld finds relocations against symbols defined in
12997 discarded sections. */
12999 static unsigned int
13000 ppc64_elf_action_discarded (asection *sec)
13002 if (strcmp (".opd", sec->name) == 0)
13005 if (strcmp (".toc", sec->name) == 0)
13008 if (strcmp (".toc1", sec->name) == 0)
13011 return _bfd_elf_default_action_discarded (sec);
13014 /* The RELOCATE_SECTION function is called by the ELF backend linker
13015 to handle the relocations for a section.
13017 The relocs are always passed as Rela structures; if the section
13018 actually uses Rel structures, the r_addend field will always be
13021 This function is responsible for adjust the section contents as
13022 necessary, and (if using Rela relocs and generating a
13023 relocatable output file) adjusting the reloc addend as
13026 This function does not have to worry about setting the reloc
13027 address or the reloc symbol index.
13029 LOCAL_SYMS is a pointer to the swapped in local symbols.
13031 LOCAL_SECTIONS is an array giving the section in the input file
13032 corresponding to the st_shndx field of each local symbol.
13034 The global hash table entry for the global symbols can be found
13035 via elf_sym_hashes (input_bfd).
13037 When generating relocatable output, this function must handle
13038 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13039 going to be the section symbol corresponding to the output
13040 section, which means that the addend must be adjusted
13044 ppc64_elf_relocate_section (bfd *output_bfd,
13045 struct bfd_link_info *info,
13047 asection *input_section,
13048 bfd_byte *contents,
13049 Elf_Internal_Rela *relocs,
13050 Elf_Internal_Sym *local_syms,
13051 asection **local_sections)
13053 struct ppc_link_hash_table *htab;
13054 Elf_Internal_Shdr *symtab_hdr;
13055 struct elf_link_hash_entry **sym_hashes;
13056 Elf_Internal_Rela *rel;
13057 Elf_Internal_Rela *relend;
13058 Elf_Internal_Rela outrel;
13060 struct got_entry **local_got_ents;
13062 bfd_boolean ret = TRUE;
13063 bfd_boolean is_opd;
13064 /* Assume 'at' branch hints. */
13065 bfd_boolean is_isa_v2 = TRUE;
13066 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
13068 /* Initialize howto table if needed. */
13069 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
13072 htab = ppc_hash_table (info);
13076 /* Don't relocate stub sections. */
13077 if (input_section->owner == htab->params->stub_bfd)
13080 BFD_ASSERT (is_ppc64_elf (input_bfd));
13082 local_got_ents = elf_local_got_ents (input_bfd);
13083 TOCstart = elf_gp (output_bfd);
13084 symtab_hdr = &elf_symtab_hdr (input_bfd);
13085 sym_hashes = elf_sym_hashes (input_bfd);
13086 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
13089 relend = relocs + input_section->reloc_count;
13090 for (; rel < relend; rel++)
13092 enum elf_ppc64_reloc_type r_type;
13094 bfd_reloc_status_type r;
13095 Elf_Internal_Sym *sym;
13097 struct elf_link_hash_entry *h_elf;
13098 struct ppc_link_hash_entry *h;
13099 struct ppc_link_hash_entry *fdh;
13100 const char *sym_name;
13101 unsigned long r_symndx, toc_symndx;
13102 bfd_vma toc_addend;
13103 unsigned char tls_mask, tls_gd, tls_type;
13104 unsigned char sym_type;
13105 bfd_vma relocation;
13106 bfd_boolean unresolved_reloc;
13107 bfd_boolean warned;
13108 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
13111 struct ppc_stub_hash_entry *stub_entry;
13112 bfd_vma max_br_offset;
13114 const Elf_Internal_Rela orig_rel = *rel;
13115 reloc_howto_type *howto;
13116 struct reloc_howto_struct alt_howto;
13118 r_type = ELF64_R_TYPE (rel->r_info);
13119 r_symndx = ELF64_R_SYM (rel->r_info);
13121 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13122 symbol of the previous ADDR64 reloc. The symbol gives us the
13123 proper TOC base to use. */
13124 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
13126 && ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_ADDR64
13128 r_symndx = ELF64_R_SYM (rel[-1].r_info);
13134 unresolved_reloc = FALSE;
13137 if (r_symndx < symtab_hdr->sh_info)
13139 /* It's a local symbol. */
13140 struct _opd_sec_data *opd;
13142 sym = local_syms + r_symndx;
13143 sec = local_sections[r_symndx];
13144 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
13145 sym_type = ELF64_ST_TYPE (sym->st_info);
13146 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
13147 opd = get_opd_info (sec);
13148 if (opd != NULL && opd->adjust != NULL)
13150 long adjust = opd->adjust[OPD_NDX (sym->st_value
13156 /* If this is a relocation against the opd section sym
13157 and we have edited .opd, adjust the reloc addend so
13158 that ld -r and ld --emit-relocs output is correct.
13159 If it is a reloc against some other .opd symbol,
13160 then the symbol value will be adjusted later. */
13161 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13162 rel->r_addend += adjust;
13164 relocation += adjust;
13170 bfd_boolean ignored;
13172 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13173 r_symndx, symtab_hdr, sym_hashes,
13174 h_elf, sec, relocation,
13175 unresolved_reloc, warned, ignored);
13176 sym_name = h_elf->root.root.string;
13177 sym_type = h_elf->type;
13179 && sec->owner == output_bfd
13180 && strcmp (sec->name, ".opd") == 0)
13182 /* This is a symbol defined in a linker script. All
13183 such are defined in output sections, even those
13184 defined by simple assignment from a symbol defined in
13185 an input section. Transfer the symbol to an
13186 appropriate input .opd section, so that a branch to
13187 this symbol will be mapped to the location specified
13188 by the opd entry. */
13189 struct bfd_link_order *lo;
13190 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13191 if (lo->type == bfd_indirect_link_order)
13193 asection *isec = lo->u.indirect.section;
13194 if (h_elf->root.u.def.value >= isec->output_offset
13195 && h_elf->root.u.def.value < (isec->output_offset
13198 h_elf->root.u.def.value -= isec->output_offset;
13199 h_elf->root.u.def.section = isec;
13206 h = (struct ppc_link_hash_entry *) h_elf;
13208 if (sec != NULL && discarded_section (sec))
13209 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
13211 ppc64_elf_howto_table[r_type], 0,
13214 if (bfd_link_relocatable (info))
13217 if (h != NULL && &h->elf == htab->elf.hgot)
13219 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13220 sec = bfd_abs_section_ptr;
13221 unresolved_reloc = FALSE;
13224 /* TLS optimizations. Replace instruction sequences and relocs
13225 based on information we collected in tls_optimize. We edit
13226 RELOCS so that --emit-relocs will output something sensible
13227 for the final instruction stream. */
13232 tls_mask = h->tls_mask;
13233 else if (local_got_ents != NULL)
13235 struct plt_entry **local_plt = (struct plt_entry **)
13236 (local_got_ents + symtab_hdr->sh_info);
13237 unsigned char *lgot_masks = (unsigned char *)
13238 (local_plt + symtab_hdr->sh_info);
13239 tls_mask = lgot_masks[r_symndx];
13242 && (r_type == R_PPC64_TLS
13243 || r_type == R_PPC64_TLSGD
13244 || r_type == R_PPC64_TLSLD))
13246 /* Check for toc tls entries. */
13247 unsigned char *toc_tls;
13249 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13250 &local_syms, rel, input_bfd))
13254 tls_mask = *toc_tls;
13257 /* Check that tls relocs are used with tls syms, and non-tls
13258 relocs are used with non-tls syms. */
13259 if (r_symndx != STN_UNDEF
13260 && r_type != R_PPC64_NONE
13262 || h->elf.root.type == bfd_link_hash_defined
13263 || h->elf.root.type == bfd_link_hash_defweak)
13264 && (IS_PPC64_TLS_RELOC (r_type)
13265 != (sym_type == STT_TLS
13266 || (sym_type == STT_SECTION
13267 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
13270 && (r_type == R_PPC64_TLS
13271 || r_type == R_PPC64_TLSGD
13272 || r_type == R_PPC64_TLSLD))
13273 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13276 info->callbacks->einfo
13277 (!IS_PPC64_TLS_RELOC (r_type)
13278 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13279 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
13280 input_bfd, input_section, rel->r_offset,
13281 ppc64_elf_howto_table[r_type]->name,
13285 /* Ensure reloc mapping code below stays sane. */
13286 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13287 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13288 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13289 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13290 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13291 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13292 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13293 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13294 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13295 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13303 case R_PPC64_LO_DS_OPT:
13304 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
13305 if ((insn & (0x3f << 26)) != 58u << 26)
13307 insn += (14u << 26) - (58u << 26);
13308 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
13309 r_type = R_PPC64_TOC16_LO;
13310 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13313 case R_PPC64_TOC16:
13314 case R_PPC64_TOC16_LO:
13315 case R_PPC64_TOC16_DS:
13316 case R_PPC64_TOC16_LO_DS:
13318 /* Check for toc tls entries. */
13319 unsigned char *toc_tls;
13322 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13323 &local_syms, rel, input_bfd);
13329 tls_mask = *toc_tls;
13330 if (r_type == R_PPC64_TOC16_DS
13331 || r_type == R_PPC64_TOC16_LO_DS)
13334 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13339 /* If we found a GD reloc pair, then we might be
13340 doing a GD->IE transition. */
13343 tls_gd = TLS_TPRELGD;
13344 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13347 else if (retval == 3)
13349 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13357 case R_PPC64_GOT_TPREL16_HI:
13358 case R_PPC64_GOT_TPREL16_HA:
13360 && (tls_mask & TLS_TPREL) == 0)
13362 rel->r_offset -= d_offset;
13363 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13364 r_type = R_PPC64_NONE;
13365 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13369 case R_PPC64_GOT_TPREL16_DS:
13370 case R_PPC64_GOT_TPREL16_LO_DS:
13372 && (tls_mask & TLS_TPREL) == 0)
13375 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
13377 insn |= 0x3c0d0000; /* addis 0,13,0 */
13378 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
13379 r_type = R_PPC64_TPREL16_HA;
13380 if (toc_symndx != 0)
13382 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13383 rel->r_addend = toc_addend;
13384 /* We changed the symbol. Start over in order to
13385 get h, sym, sec etc. right. */
13390 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13396 && (tls_mask & TLS_TPREL) == 0)
13398 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
13399 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13402 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
13403 /* Was PPC64_TLS which sits on insn boundary, now
13404 PPC64_TPREL16_LO which is at low-order half-word. */
13405 rel->r_offset += d_offset;
13406 r_type = R_PPC64_TPREL16_LO;
13407 if (toc_symndx != 0)
13409 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13410 rel->r_addend = toc_addend;
13411 /* We changed the symbol. Start over in order to
13412 get h, sym, sec etc. right. */
13417 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13421 case R_PPC64_GOT_TLSGD16_HI:
13422 case R_PPC64_GOT_TLSGD16_HA:
13423 tls_gd = TLS_TPRELGD;
13424 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13428 case R_PPC64_GOT_TLSLD16_HI:
13429 case R_PPC64_GOT_TLSLD16_HA:
13430 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13433 if ((tls_mask & tls_gd) != 0)
13434 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13435 + R_PPC64_GOT_TPREL16_DS);
13438 rel->r_offset -= d_offset;
13439 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13440 r_type = R_PPC64_NONE;
13442 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13446 case R_PPC64_GOT_TLSGD16:
13447 case R_PPC64_GOT_TLSGD16_LO:
13448 tls_gd = TLS_TPRELGD;
13449 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13453 case R_PPC64_GOT_TLSLD16:
13454 case R_PPC64_GOT_TLSLD16_LO:
13455 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13457 unsigned int insn1, insn2, insn3;
13461 offset = (bfd_vma) -1;
13462 /* If not using the newer R_PPC64_TLSGD/LD to mark
13463 __tls_get_addr calls, we must trust that the call
13464 stays with its arg setup insns, ie. that the next
13465 reloc is the __tls_get_addr call associated with
13466 the current reloc. Edit both insns. */
13467 if (input_section->has_tls_get_addr_call
13468 && rel + 1 < relend
13469 && branch_reloc_hash_match (input_bfd, rel + 1,
13470 htab->tls_get_addr,
13471 htab->tls_get_addr_fd))
13472 offset = rel[1].r_offset;
13473 /* We read the low GOT_TLS (or TOC16) insn because we
13474 need to keep the destination reg. It may be
13475 something other than the usual r3, and moved to r3
13476 before the call by intervening code. */
13477 insn1 = bfd_get_32 (output_bfd,
13478 contents + rel->r_offset - d_offset);
13479 if ((tls_mask & tls_gd) != 0)
13482 insn1 &= (0x1f << 21) | (0x1f << 16);
13483 insn1 |= 58 << 26; /* ld */
13484 insn2 = 0x7c636a14; /* add 3,3,13 */
13485 if (offset != (bfd_vma) -1)
13486 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13487 if ((tls_mask & TLS_EXPLICIT) == 0)
13488 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13489 + R_PPC64_GOT_TPREL16_DS);
13491 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13492 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13497 insn1 &= 0x1f << 21;
13498 insn1 |= 0x3c0d0000; /* addis r,13,0 */
13499 insn2 = 0x38630000; /* addi 3,3,0 */
13502 /* Was an LD reloc. */
13504 sec = local_sections[toc_symndx];
13506 r_symndx < symtab_hdr->sh_info;
13508 if (local_sections[r_symndx] == sec)
13510 if (r_symndx >= symtab_hdr->sh_info)
13511 r_symndx = STN_UNDEF;
13512 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13513 if (r_symndx != STN_UNDEF)
13514 rel->r_addend -= (local_syms[r_symndx].st_value
13515 + sec->output_offset
13516 + sec->output_section->vma);
13518 else if (toc_symndx != 0)
13520 r_symndx = toc_symndx;
13521 rel->r_addend = toc_addend;
13523 r_type = R_PPC64_TPREL16_HA;
13524 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13525 if (offset != (bfd_vma) -1)
13527 rel[1].r_info = ELF64_R_INFO (r_symndx,
13528 R_PPC64_TPREL16_LO);
13529 rel[1].r_offset = offset + d_offset;
13530 rel[1].r_addend = rel->r_addend;
13533 bfd_put_32 (output_bfd, insn1,
13534 contents + rel->r_offset - d_offset);
13535 if (offset != (bfd_vma) -1)
13537 insn3 = bfd_get_32 (output_bfd,
13538 contents + offset + 4);
13540 || insn3 == CROR_151515 || insn3 == CROR_313131)
13542 rel[1].r_offset += 4;
13543 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13546 bfd_put_32 (output_bfd, insn2, contents + offset);
13548 if ((tls_mask & tls_gd) == 0
13549 && (tls_gd == 0 || toc_symndx != 0))
13551 /* We changed the symbol. Start over in order
13552 to get h, sym, sec etc. right. */
13559 case R_PPC64_TLSGD:
13560 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13562 unsigned int insn2, insn3;
13563 bfd_vma offset = rel->r_offset;
13565 if ((tls_mask & TLS_TPRELGD) != 0)
13568 r_type = R_PPC64_NONE;
13569 insn2 = 0x7c636a14; /* add 3,3,13 */
13574 if (toc_symndx != 0)
13576 r_symndx = toc_symndx;
13577 rel->r_addend = toc_addend;
13579 r_type = R_PPC64_TPREL16_LO;
13580 rel->r_offset = offset + d_offset;
13581 insn2 = 0x38630000; /* addi 3,3,0 */
13583 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13584 /* Zap the reloc on the _tls_get_addr call too. */
13585 BFD_ASSERT (offset == rel[1].r_offset);
13586 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13587 insn3 = bfd_get_32 (output_bfd,
13588 contents + offset + 4);
13590 || insn3 == CROR_151515 || insn3 == CROR_313131)
13592 rel->r_offset += 4;
13593 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13596 bfd_put_32 (output_bfd, insn2, contents + offset);
13597 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
13605 case R_PPC64_TLSLD:
13606 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13608 unsigned int insn2, insn3;
13609 bfd_vma offset = rel->r_offset;
13612 sec = local_sections[toc_symndx];
13614 r_symndx < symtab_hdr->sh_info;
13616 if (local_sections[r_symndx] == sec)
13618 if (r_symndx >= symtab_hdr->sh_info)
13619 r_symndx = STN_UNDEF;
13620 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13621 if (r_symndx != STN_UNDEF)
13622 rel->r_addend -= (local_syms[r_symndx].st_value
13623 + sec->output_offset
13624 + sec->output_section->vma);
13626 r_type = R_PPC64_TPREL16_LO;
13627 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13628 rel->r_offset = offset + d_offset;
13629 /* Zap the reloc on the _tls_get_addr call too. */
13630 BFD_ASSERT (offset == rel[1].r_offset);
13631 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13632 insn2 = 0x38630000; /* addi 3,3,0 */
13633 insn3 = bfd_get_32 (output_bfd,
13634 contents + offset + 4);
13636 || insn3 == CROR_151515 || insn3 == CROR_313131)
13638 rel->r_offset += 4;
13639 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13642 bfd_put_32 (output_bfd, insn2, contents + offset);
13648 case R_PPC64_DTPMOD64:
13649 if (rel + 1 < relend
13650 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13651 && rel[1].r_offset == rel->r_offset + 8)
13653 if ((tls_mask & TLS_GD) == 0)
13655 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13656 if ((tls_mask & TLS_TPRELGD) != 0)
13657 r_type = R_PPC64_TPREL64;
13660 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13661 r_type = R_PPC64_NONE;
13663 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13668 if ((tls_mask & TLS_LD) == 0)
13670 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13671 r_type = R_PPC64_NONE;
13672 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13677 case R_PPC64_TPREL64:
13678 if ((tls_mask & TLS_TPREL) == 0)
13680 r_type = R_PPC64_NONE;
13681 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13685 case R_PPC64_REL16_HA:
13686 /* If we are generating a non-PIC executable, edit
13687 . 0: addis 2,12,.TOC.-0b@ha
13688 . addi 2,2,.TOC.-0b@l
13689 used by ELFv2 global entry points to set up r2, to
13692 if .TOC. is in range. */
13693 if (!bfd_link_pic (info)
13694 && !info->traditional_format
13695 && h != NULL && &h->elf == htab->elf.hgot
13696 && rel + 1 < relend
13697 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
13698 && rel[1].r_offset == rel->r_offset + 4
13699 && rel[1].r_addend == rel->r_addend + 4
13700 && relocation + 0x80008000 <= 0xffffffff)
13702 unsigned int insn1, insn2;
13703 bfd_vma offset = rel->r_offset - d_offset;
13704 insn1 = bfd_get_32 (output_bfd, contents + offset);
13705 insn2 = bfd_get_32 (output_bfd, contents + offset + 4);
13706 if ((insn1 & 0xffff0000) == 0x3c4c0000 /* addis 2,12 */
13707 && (insn2 & 0xffff0000) == 0x38420000 /* addi 2,2 */)
13709 r_type = R_PPC64_ADDR16_HA;
13710 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13711 rel->r_addend -= d_offset;
13712 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
13713 rel[1].r_addend -= d_offset + 4;
13714 bfd_put_32 (output_bfd, 0x3c400000, contents + offset);
13720 /* Handle other relocations that tweak non-addend part of insn. */
13722 max_br_offset = 1 << 25;
13723 addend = rel->r_addend;
13724 reloc_dest = DEST_NORMAL;
13730 case R_PPC64_TOCSAVE:
13731 if (relocation + addend == (rel->r_offset
13732 + input_section->output_offset
13733 + input_section->output_section->vma)
13734 && tocsave_find (htab, NO_INSERT,
13735 &local_syms, rel, input_bfd))
13737 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
13739 || insn == CROR_151515 || insn == CROR_313131)
13740 bfd_put_32 (input_bfd,
13741 STD_R2_0R1 + STK_TOC (htab),
13742 contents + rel->r_offset);
13746 /* Branch taken prediction relocations. */
13747 case R_PPC64_ADDR14_BRTAKEN:
13748 case R_PPC64_REL14_BRTAKEN:
13749 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
13752 /* Branch not taken prediction relocations. */
13753 case R_PPC64_ADDR14_BRNTAKEN:
13754 case R_PPC64_REL14_BRNTAKEN:
13755 insn |= bfd_get_32 (output_bfd,
13756 contents + rel->r_offset) & ~(0x01 << 21);
13759 case R_PPC64_REL14:
13760 max_br_offset = 1 << 15;
13763 case R_PPC64_REL24:
13764 /* Calls to functions with a different TOC, such as calls to
13765 shared objects, need to alter the TOC pointer. This is
13766 done using a linkage stub. A REL24 branching to these
13767 linkage stubs needs to be followed by a nop, as the nop
13768 will be replaced with an instruction to restore the TOC
13773 && h->oh->is_func_descriptor)
13774 fdh = ppc_follow_link (h->oh);
13775 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
13777 if (stub_entry != NULL
13778 && (stub_entry->stub_type == ppc_stub_plt_call
13779 || stub_entry->stub_type == ppc_stub_plt_call_r2save
13780 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
13781 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
13783 bfd_boolean can_plt_call = FALSE;
13785 /* All of these stubs will modify r2, so there must be a
13786 branch and link followed by a nop. The nop is
13787 replaced by an insn to restore r2. */
13788 if (rel->r_offset + 8 <= input_section->size)
13792 br = bfd_get_32 (input_bfd,
13793 contents + rel->r_offset);
13798 nop = bfd_get_32 (input_bfd,
13799 contents + rel->r_offset + 4);
13801 || nop == CROR_151515 || nop == CROR_313131)
13804 && (h == htab->tls_get_addr_fd
13805 || h == htab->tls_get_addr)
13806 && !htab->params->no_tls_get_addr_opt)
13808 /* Special stub used, leave nop alone. */
13811 bfd_put_32 (input_bfd,
13812 LD_R2_0R1 + STK_TOC (htab),
13813 contents + rel->r_offset + 4);
13814 can_plt_call = TRUE;
13819 if (!can_plt_call && h != NULL)
13821 const char *name = h->elf.root.root.string;
13826 if (strncmp (name, "__libc_start_main", 17) == 0
13827 && (name[17] == 0 || name[17] == '@'))
13829 /* Allow crt1 branch to go via a toc adjusting
13830 stub. Other calls that never return could do
13831 the same, if we could detect such. */
13832 can_plt_call = TRUE;
13838 /* g++ as of 20130507 emits self-calls without a
13839 following nop. This is arguably wrong since we
13840 have conflicting information. On the one hand a
13841 global symbol and on the other a local call
13842 sequence, but don't error for this special case.
13843 It isn't possible to cheaply verify we have
13844 exactly such a call. Allow all calls to the same
13846 asection *code_sec = sec;
13848 if (get_opd_info (sec) != NULL)
13850 bfd_vma off = (relocation + addend
13851 - sec->output_section->vma
13852 - sec->output_offset);
13854 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
13856 if (code_sec == input_section)
13857 can_plt_call = TRUE;
13862 if (stub_entry->stub_type == ppc_stub_plt_call
13863 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
13864 info->callbacks->einfo
13865 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
13866 "recompile with -fPIC\n"),
13867 input_bfd, input_section, rel->r_offset, sym_name);
13869 info->callbacks->einfo
13870 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
13871 "(-mcmodel=small toc adjust stub)\n"),
13872 input_bfd, input_section, rel->r_offset, sym_name);
13874 bfd_set_error (bfd_error_bad_value);
13879 && (stub_entry->stub_type == ppc_stub_plt_call
13880 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
13881 unresolved_reloc = FALSE;
13884 if ((stub_entry == NULL
13885 || stub_entry->stub_type == ppc_stub_long_branch
13886 || stub_entry->stub_type == ppc_stub_plt_branch)
13887 && get_opd_info (sec) != NULL)
13889 /* The branch destination is the value of the opd entry. */
13890 bfd_vma off = (relocation + addend
13891 - sec->output_section->vma
13892 - sec->output_offset);
13893 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
13894 if (dest != (bfd_vma) -1)
13898 reloc_dest = DEST_OPD;
13902 /* If the branch is out of reach we ought to have a long
13904 from = (rel->r_offset
13905 + input_section->output_offset
13906 + input_section->output_section->vma);
13908 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
13912 if (stub_entry != NULL
13913 && (stub_entry->stub_type == ppc_stub_long_branch
13914 || stub_entry->stub_type == ppc_stub_plt_branch)
13915 && (r_type == R_PPC64_ADDR14_BRTAKEN
13916 || r_type == R_PPC64_ADDR14_BRNTAKEN
13917 || (relocation + addend - from + max_br_offset
13918 < 2 * max_br_offset)))
13919 /* Don't use the stub if this branch is in range. */
13922 if (stub_entry != NULL)
13924 /* Munge up the value and addend so that we call the stub
13925 rather than the procedure directly. */
13926 relocation = (stub_entry->stub_offset
13927 + stub_entry->group->stub_sec->output_offset
13928 + stub_entry->group->stub_sec->output_section->vma);
13930 reloc_dest = DEST_STUB;
13932 if ((stub_entry->stub_type == ppc_stub_plt_call
13933 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
13934 && (ALWAYS_EMIT_R2SAVE
13935 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
13936 && rel + 1 < relend
13937 && rel[1].r_offset == rel->r_offset + 4
13938 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
13946 /* Set 'a' bit. This is 0b00010 in BO field for branch
13947 on CR(BI) insns (BO == 001at or 011at), and 0b01000
13948 for branch on CTR insns (BO == 1a00t or 1a01t). */
13949 if ((insn & (0x14 << 21)) == (0x04 << 21))
13950 insn |= 0x02 << 21;
13951 else if ((insn & (0x14 << 21)) == (0x10 << 21))
13952 insn |= 0x08 << 21;
13958 /* Invert 'y' bit if not the default. */
13959 if ((bfd_signed_vma) (relocation + addend - from) < 0)
13960 insn ^= 0x01 << 21;
13963 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
13966 /* NOP out calls to undefined weak functions.
13967 We can thus call a weak function without first
13968 checking whether the function is defined. */
13970 && h->elf.root.type == bfd_link_hash_undefweak
13971 && h->elf.dynindx == -1
13972 && r_type == R_PPC64_REL24
13976 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13982 /* Set `addend'. */
13987 info->callbacks->einfo
13988 (_("%P: %B: unknown relocation type %d for `%T'\n"),
13989 input_bfd, (int) r_type, sym_name);
13991 bfd_set_error (bfd_error_bad_value);
13997 case R_PPC64_TLSGD:
13998 case R_PPC64_TLSLD:
13999 case R_PPC64_TOCSAVE:
14000 case R_PPC64_GNU_VTINHERIT:
14001 case R_PPC64_GNU_VTENTRY:
14004 /* GOT16 relocations. Like an ADDR16 using the symbol's
14005 address in the GOT as relocation value instead of the
14006 symbol's value itself. Also, create a GOT entry for the
14007 symbol and put the symbol value there. */
14008 case R_PPC64_GOT_TLSGD16:
14009 case R_PPC64_GOT_TLSGD16_LO:
14010 case R_PPC64_GOT_TLSGD16_HI:
14011 case R_PPC64_GOT_TLSGD16_HA:
14012 tls_type = TLS_TLS | TLS_GD;
14015 case R_PPC64_GOT_TLSLD16:
14016 case R_PPC64_GOT_TLSLD16_LO:
14017 case R_PPC64_GOT_TLSLD16_HI:
14018 case R_PPC64_GOT_TLSLD16_HA:
14019 tls_type = TLS_TLS | TLS_LD;
14022 case R_PPC64_GOT_TPREL16_DS:
14023 case R_PPC64_GOT_TPREL16_LO_DS:
14024 case R_PPC64_GOT_TPREL16_HI:
14025 case R_PPC64_GOT_TPREL16_HA:
14026 tls_type = TLS_TLS | TLS_TPREL;
14029 case R_PPC64_GOT_DTPREL16_DS:
14030 case R_PPC64_GOT_DTPREL16_LO_DS:
14031 case R_PPC64_GOT_DTPREL16_HI:
14032 case R_PPC64_GOT_DTPREL16_HA:
14033 tls_type = TLS_TLS | TLS_DTPREL;
14036 case R_PPC64_GOT16:
14037 case R_PPC64_GOT16_LO:
14038 case R_PPC64_GOT16_HI:
14039 case R_PPC64_GOT16_HA:
14040 case R_PPC64_GOT16_DS:
14041 case R_PPC64_GOT16_LO_DS:
14044 /* Relocation is to the entry for this symbol in the global
14049 unsigned long indx = 0;
14050 struct got_entry *ent;
14052 if (tls_type == (TLS_TLS | TLS_LD)
14054 || !h->elf.def_dynamic))
14055 ent = ppc64_tlsld_got (input_bfd);
14061 bfd_boolean dyn = htab->elf.dynamic_sections_created;
14062 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info),
14064 || (bfd_link_pic (info)
14065 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
14066 /* This is actually a static link, or it is a
14067 -Bsymbolic link and the symbol is defined
14068 locally, or the symbol was forced to be local
14069 because of a version file. */
14073 BFD_ASSERT (h->elf.dynindx != -1);
14074 indx = h->elf.dynindx;
14075 unresolved_reloc = FALSE;
14077 ent = h->elf.got.glist;
14081 if (local_got_ents == NULL)
14083 ent = local_got_ents[r_symndx];
14086 for (; ent != NULL; ent = ent->next)
14087 if (ent->addend == orig_rel.r_addend
14088 && ent->owner == input_bfd
14089 && ent->tls_type == tls_type)
14095 if (ent->is_indirect)
14096 ent = ent->got.ent;
14097 offp = &ent->got.offset;
14098 got = ppc64_elf_tdata (ent->owner)->got;
14102 /* The offset must always be a multiple of 8. We use the
14103 least significant bit to record whether we have already
14104 processed this entry. */
14106 if ((off & 1) != 0)
14110 /* Generate relocs for the dynamic linker, except in
14111 the case of TLSLD where we'll use one entry per
14119 ? h->elf.type == STT_GNU_IFUNC
14120 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
14122 relgot = htab->elf.irelplt;
14123 else if ((bfd_link_pic (info) || indx != 0)
14125 || (tls_type == (TLS_TLS | TLS_LD)
14126 && !h->elf.def_dynamic)
14127 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14128 || h->elf.root.type != bfd_link_hash_undefweak))
14129 relgot = ppc64_elf_tdata (ent->owner)->relgot;
14130 if (relgot != NULL)
14132 outrel.r_offset = (got->output_section->vma
14133 + got->output_offset
14135 outrel.r_addend = addend;
14136 if (tls_type & (TLS_LD | TLS_GD))
14138 outrel.r_addend = 0;
14139 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
14140 if (tls_type == (TLS_TLS | TLS_GD))
14142 loc = relgot->contents;
14143 loc += (relgot->reloc_count++
14144 * sizeof (Elf64_External_Rela));
14145 bfd_elf64_swap_reloca_out (output_bfd,
14147 outrel.r_offset += 8;
14148 outrel.r_addend = addend;
14150 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14153 else if (tls_type == (TLS_TLS | TLS_DTPREL))
14154 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14155 else if (tls_type == (TLS_TLS | TLS_TPREL))
14156 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
14157 else if (indx != 0)
14158 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14162 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14164 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14166 /* Write the .got section contents for the sake
14168 loc = got->contents + off;
14169 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14173 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
14175 outrel.r_addend += relocation;
14176 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
14178 if (htab->elf.tls_sec == NULL)
14179 outrel.r_addend = 0;
14181 outrel.r_addend -= htab->elf.tls_sec->vma;
14184 loc = relgot->contents;
14185 loc += (relgot->reloc_count++
14186 * sizeof (Elf64_External_Rela));
14187 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14190 /* Init the .got section contents here if we're not
14191 emitting a reloc. */
14194 relocation += addend;
14195 if (tls_type == (TLS_TLS | TLS_LD))
14197 else if (tls_type != 0)
14199 if (htab->elf.tls_sec == NULL)
14203 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14204 if (tls_type == (TLS_TLS | TLS_TPREL))
14205 relocation += DTP_OFFSET - TP_OFFSET;
14208 if (tls_type == (TLS_TLS | TLS_GD))
14210 bfd_put_64 (output_bfd, relocation,
14211 got->contents + off + 8);
14216 bfd_put_64 (output_bfd, relocation,
14217 got->contents + off);
14221 if (off >= (bfd_vma) -2)
14224 relocation = got->output_section->vma + got->output_offset + off;
14225 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
14229 case R_PPC64_PLT16_HA:
14230 case R_PPC64_PLT16_HI:
14231 case R_PPC64_PLT16_LO:
14232 case R_PPC64_PLT32:
14233 case R_PPC64_PLT64:
14234 /* Relocation is to the entry for this symbol in the
14235 procedure linkage table. */
14237 /* Resolve a PLT reloc against a local symbol directly,
14238 without using the procedure linkage table. */
14242 /* It's possible that we didn't make a PLT entry for this
14243 symbol. This happens when statically linking PIC code,
14244 or when using -Bsymbolic. Go find a match if there is a
14246 if (htab->elf.splt != NULL)
14248 struct plt_entry *ent;
14249 for (ent = h->elf.plt.plist; ent != NULL; ent = ent->next)
14250 if (ent->plt.offset != (bfd_vma) -1
14251 && ent->addend == orig_rel.r_addend)
14253 relocation = (htab->elf.splt->output_section->vma
14254 + htab->elf.splt->output_offset
14255 + ent->plt.offset);
14256 unresolved_reloc = FALSE;
14263 /* Relocation value is TOC base. */
14264 relocation = TOCstart;
14265 if (r_symndx == STN_UNDEF)
14266 relocation += htab->sec_info[input_section->id].toc_off;
14267 else if (unresolved_reloc)
14269 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14270 relocation += htab->sec_info[sec->id].toc_off;
14272 unresolved_reloc = TRUE;
14275 /* TOC16 relocs. We want the offset relative to the TOC base,
14276 which is the address of the start of the TOC plus 0x8000.
14277 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14279 case R_PPC64_TOC16:
14280 case R_PPC64_TOC16_LO:
14281 case R_PPC64_TOC16_HI:
14282 case R_PPC64_TOC16_DS:
14283 case R_PPC64_TOC16_LO_DS:
14284 case R_PPC64_TOC16_HA:
14285 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
14288 /* Relocate against the beginning of the section. */
14289 case R_PPC64_SECTOFF:
14290 case R_PPC64_SECTOFF_LO:
14291 case R_PPC64_SECTOFF_HI:
14292 case R_PPC64_SECTOFF_DS:
14293 case R_PPC64_SECTOFF_LO_DS:
14294 case R_PPC64_SECTOFF_HA:
14296 addend -= sec->output_section->vma;
14299 case R_PPC64_REL16:
14300 case R_PPC64_REL16_LO:
14301 case R_PPC64_REL16_HI:
14302 case R_PPC64_REL16_HA:
14305 case R_PPC64_REL14:
14306 case R_PPC64_REL14_BRNTAKEN:
14307 case R_PPC64_REL14_BRTAKEN:
14308 case R_PPC64_REL24:
14311 case R_PPC64_TPREL16:
14312 case R_PPC64_TPREL16_LO:
14313 case R_PPC64_TPREL16_HI:
14314 case R_PPC64_TPREL16_HA:
14315 case R_PPC64_TPREL16_DS:
14316 case R_PPC64_TPREL16_LO_DS:
14317 case R_PPC64_TPREL16_HIGH:
14318 case R_PPC64_TPREL16_HIGHA:
14319 case R_PPC64_TPREL16_HIGHER:
14320 case R_PPC64_TPREL16_HIGHERA:
14321 case R_PPC64_TPREL16_HIGHEST:
14322 case R_PPC64_TPREL16_HIGHESTA:
14324 && h->elf.root.type == bfd_link_hash_undefweak
14325 && h->elf.dynindx == -1)
14327 /* Make this relocation against an undefined weak symbol
14328 resolve to zero. This is really just a tweak, since
14329 code using weak externs ought to check that they are
14330 defined before using them. */
14331 bfd_byte *p = contents + rel->r_offset - d_offset;
14333 insn = bfd_get_32 (output_bfd, p);
14334 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14336 bfd_put_32 (output_bfd, insn, p);
14339 if (htab->elf.tls_sec != NULL)
14340 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14341 if (bfd_link_pic (info))
14342 /* The TPREL16 relocs shouldn't really be used in shared
14343 libs as they will result in DT_TEXTREL being set, but
14344 support them anyway. */
14348 case R_PPC64_DTPREL16:
14349 case R_PPC64_DTPREL16_LO:
14350 case R_PPC64_DTPREL16_HI:
14351 case R_PPC64_DTPREL16_HA:
14352 case R_PPC64_DTPREL16_DS:
14353 case R_PPC64_DTPREL16_LO_DS:
14354 case R_PPC64_DTPREL16_HIGH:
14355 case R_PPC64_DTPREL16_HIGHA:
14356 case R_PPC64_DTPREL16_HIGHER:
14357 case R_PPC64_DTPREL16_HIGHERA:
14358 case R_PPC64_DTPREL16_HIGHEST:
14359 case R_PPC64_DTPREL16_HIGHESTA:
14360 if (htab->elf.tls_sec != NULL)
14361 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14364 case R_PPC64_ADDR64_LOCAL:
14365 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14370 case R_PPC64_DTPMOD64:
14375 case R_PPC64_TPREL64:
14376 if (htab->elf.tls_sec != NULL)
14377 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14380 case R_PPC64_DTPREL64:
14381 if (htab->elf.tls_sec != NULL)
14382 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14385 /* Relocations that may need to be propagated if this is a
14387 case R_PPC64_REL30:
14388 case R_PPC64_REL32:
14389 case R_PPC64_REL64:
14390 case R_PPC64_ADDR14:
14391 case R_PPC64_ADDR14_BRNTAKEN:
14392 case R_PPC64_ADDR14_BRTAKEN:
14393 case R_PPC64_ADDR16:
14394 case R_PPC64_ADDR16_DS:
14395 case R_PPC64_ADDR16_HA:
14396 case R_PPC64_ADDR16_HI:
14397 case R_PPC64_ADDR16_HIGH:
14398 case R_PPC64_ADDR16_HIGHA:
14399 case R_PPC64_ADDR16_HIGHER:
14400 case R_PPC64_ADDR16_HIGHERA:
14401 case R_PPC64_ADDR16_HIGHEST:
14402 case R_PPC64_ADDR16_HIGHESTA:
14403 case R_PPC64_ADDR16_LO:
14404 case R_PPC64_ADDR16_LO_DS:
14405 case R_PPC64_ADDR24:
14406 case R_PPC64_ADDR32:
14407 case R_PPC64_ADDR64:
14408 case R_PPC64_UADDR16:
14409 case R_PPC64_UADDR32:
14410 case R_PPC64_UADDR64:
14412 if ((input_section->flags & SEC_ALLOC) == 0)
14415 if (NO_OPD_RELOCS && is_opd)
14418 if ((bfd_link_pic (info)
14420 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14421 || h->elf.root.type != bfd_link_hash_undefweak)
14422 && (must_be_dyn_reloc (info, r_type)
14423 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
14424 || (ELIMINATE_COPY_RELOCS
14425 && !bfd_link_pic (info)
14427 && h->elf.dynindx != -1
14428 && !h->elf.non_got_ref
14429 && !h->elf.def_regular)
14430 || (!bfd_link_pic (info)
14432 ? h->elf.type == STT_GNU_IFUNC
14433 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
14435 bfd_boolean skip, relocate;
14439 /* When generating a dynamic object, these relocations
14440 are copied into the output file to be resolved at run
14446 out_off = _bfd_elf_section_offset (output_bfd, info,
14447 input_section, rel->r_offset);
14448 if (out_off == (bfd_vma) -1)
14450 else if (out_off == (bfd_vma) -2)
14451 skip = TRUE, relocate = TRUE;
14452 out_off += (input_section->output_section->vma
14453 + input_section->output_offset);
14454 outrel.r_offset = out_off;
14455 outrel.r_addend = rel->r_addend;
14457 /* Optimize unaligned reloc use. */
14458 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14459 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14460 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14461 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14462 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14463 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14464 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14465 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14466 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14469 memset (&outrel, 0, sizeof outrel);
14470 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14472 && r_type != R_PPC64_TOC)
14474 BFD_ASSERT (h->elf.dynindx != -1);
14475 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
14479 /* This symbol is local, or marked to become local,
14480 or this is an opd section reloc which must point
14481 at a local function. */
14482 outrel.r_addend += relocation;
14483 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
14485 if (is_opd && h != NULL)
14487 /* Lie about opd entries. This case occurs
14488 when building shared libraries and we
14489 reference a function in another shared
14490 lib. The same thing happens for a weak
14491 definition in an application that's
14492 overridden by a strong definition in a
14493 shared lib. (I believe this is a generic
14494 bug in binutils handling of weak syms.)
14495 In these cases we won't use the opd
14496 entry in this lib. */
14497 unresolved_reloc = FALSE;
14500 && r_type == R_PPC64_ADDR64
14502 ? h->elf.type == STT_GNU_IFUNC
14503 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14504 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14507 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14509 /* We need to relocate .opd contents for ld.so.
14510 Prelink also wants simple and consistent rules
14511 for relocs. This make all RELATIVE relocs have
14512 *r_offset equal to r_addend. */
14521 ? h->elf.type == STT_GNU_IFUNC
14522 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14524 info->callbacks->einfo
14525 (_("%P: %H: %s for indirect "
14526 "function `%T' unsupported\n"),
14527 input_bfd, input_section, rel->r_offset,
14528 ppc64_elf_howto_table[r_type]->name,
14532 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
14534 else if (sec == NULL || sec->owner == NULL)
14536 bfd_set_error (bfd_error_bad_value);
14543 osec = sec->output_section;
14544 indx = elf_section_data (osec)->dynindx;
14548 if ((osec->flags & SEC_READONLY) == 0
14549 && htab->elf.data_index_section != NULL)
14550 osec = htab->elf.data_index_section;
14552 osec = htab->elf.text_index_section;
14553 indx = elf_section_data (osec)->dynindx;
14555 BFD_ASSERT (indx != 0);
14557 /* We are turning this relocation into one
14558 against a section symbol, so subtract out
14559 the output section's address but not the
14560 offset of the input section in the output
14562 outrel.r_addend -= osec->vma;
14565 outrel.r_info = ELF64_R_INFO (indx, r_type);
14569 sreloc = elf_section_data (input_section)->sreloc;
14571 ? h->elf.type == STT_GNU_IFUNC
14572 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14573 sreloc = htab->elf.irelplt;
14574 if (sreloc == NULL)
14577 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14580 loc = sreloc->contents;
14581 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
14582 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14584 /* If this reloc is against an external symbol, it will
14585 be computed at runtime, so there's no need to do
14586 anything now. However, for the sake of prelink ensure
14587 that the section contents are a known value. */
14590 unresolved_reloc = FALSE;
14591 /* The value chosen here is quite arbitrary as ld.so
14592 ignores section contents except for the special
14593 case of .opd where the contents might be accessed
14594 before relocation. Choose zero, as that won't
14595 cause reloc overflow. */
14598 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14599 to improve backward compatibility with older
14601 if (r_type == R_PPC64_ADDR64)
14602 addend = outrel.r_addend;
14603 /* Adjust pc_relative relocs to have zero in *r_offset. */
14604 else if (ppc64_elf_howto_table[r_type]->pc_relative)
14605 addend = (input_section->output_section->vma
14606 + input_section->output_offset
14613 case R_PPC64_GLOB_DAT:
14614 case R_PPC64_JMP_SLOT:
14615 case R_PPC64_JMP_IREL:
14616 case R_PPC64_RELATIVE:
14617 /* We shouldn't ever see these dynamic relocs in relocatable
14619 /* Fall through. */
14621 case R_PPC64_PLTGOT16:
14622 case R_PPC64_PLTGOT16_DS:
14623 case R_PPC64_PLTGOT16_HA:
14624 case R_PPC64_PLTGOT16_HI:
14625 case R_PPC64_PLTGOT16_LO:
14626 case R_PPC64_PLTGOT16_LO_DS:
14627 case R_PPC64_PLTREL32:
14628 case R_PPC64_PLTREL64:
14629 /* These ones haven't been implemented yet. */
14631 info->callbacks->einfo
14632 (_("%P: %B: %s is not supported for `%T'\n"),
14634 ppc64_elf_howto_table[r_type]->name, sym_name);
14636 bfd_set_error (bfd_error_invalid_operation);
14641 /* Multi-instruction sequences that access the TOC can be
14642 optimized, eg. addis ra,r2,0; addi rb,ra,x;
14643 to nop; addi rb,r2,x; */
14649 case R_PPC64_GOT_TLSLD16_HI:
14650 case R_PPC64_GOT_TLSGD16_HI:
14651 case R_PPC64_GOT_TPREL16_HI:
14652 case R_PPC64_GOT_DTPREL16_HI:
14653 case R_PPC64_GOT16_HI:
14654 case R_PPC64_TOC16_HI:
14655 /* These relocs would only be useful if building up an
14656 offset to later add to r2, perhaps in an indexed
14657 addressing mode instruction. Don't try to optimize.
14658 Unfortunately, the possibility of someone building up an
14659 offset like this or even with the HA relocs, means that
14660 we need to check the high insn when optimizing the low
14664 case R_PPC64_GOT_TLSLD16_HA:
14665 case R_PPC64_GOT_TLSGD16_HA:
14666 case R_PPC64_GOT_TPREL16_HA:
14667 case R_PPC64_GOT_DTPREL16_HA:
14668 case R_PPC64_GOT16_HA:
14669 case R_PPC64_TOC16_HA:
14670 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
14671 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
14673 bfd_byte *p = contents + (rel->r_offset & ~3);
14674 bfd_put_32 (input_bfd, NOP, p);
14678 case R_PPC64_GOT_TLSLD16_LO:
14679 case R_PPC64_GOT_TLSGD16_LO:
14680 case R_PPC64_GOT_TPREL16_LO_DS:
14681 case R_PPC64_GOT_DTPREL16_LO_DS:
14682 case R_PPC64_GOT16_LO:
14683 case R_PPC64_GOT16_LO_DS:
14684 case R_PPC64_TOC16_LO:
14685 case R_PPC64_TOC16_LO_DS:
14686 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
14687 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
14689 bfd_byte *p = contents + (rel->r_offset & ~3);
14690 insn = bfd_get_32 (input_bfd, p);
14691 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
14693 /* Transform addic to addi when we change reg. */
14694 insn &= ~((0x3f << 26) | (0x1f << 16));
14695 insn |= (14u << 26) | (2 << 16);
14699 insn &= ~(0x1f << 16);
14702 bfd_put_32 (input_bfd, insn, p);
14707 /* Do any further special processing. */
14708 howto = ppc64_elf_howto_table[(int) r_type];
14714 case R_PPC64_REL16_HA:
14715 case R_PPC64_ADDR16_HA:
14716 case R_PPC64_ADDR16_HIGHA:
14717 case R_PPC64_ADDR16_HIGHERA:
14718 case R_PPC64_ADDR16_HIGHESTA:
14719 case R_PPC64_TOC16_HA:
14720 case R_PPC64_SECTOFF_HA:
14721 case R_PPC64_TPREL16_HA:
14722 case R_PPC64_TPREL16_HIGHA:
14723 case R_PPC64_TPREL16_HIGHERA:
14724 case R_PPC64_TPREL16_HIGHESTA:
14725 case R_PPC64_DTPREL16_HA:
14726 case R_PPC64_DTPREL16_HIGHA:
14727 case R_PPC64_DTPREL16_HIGHERA:
14728 case R_PPC64_DTPREL16_HIGHESTA:
14729 /* It's just possible that this symbol is a weak symbol
14730 that's not actually defined anywhere. In that case,
14731 'sec' would be NULL, and we should leave the symbol
14732 alone (it will be set to zero elsewhere in the link). */
14737 case R_PPC64_GOT16_HA:
14738 case R_PPC64_PLTGOT16_HA:
14739 case R_PPC64_PLT16_HA:
14740 case R_PPC64_GOT_TLSGD16_HA:
14741 case R_PPC64_GOT_TLSLD16_HA:
14742 case R_PPC64_GOT_TPREL16_HA:
14743 case R_PPC64_GOT_DTPREL16_HA:
14744 /* Add 0x10000 if sign bit in 0:15 is set.
14745 Bits 0:15 are not used. */
14749 case R_PPC64_ADDR16_DS:
14750 case R_PPC64_ADDR16_LO_DS:
14751 case R_PPC64_GOT16_DS:
14752 case R_PPC64_GOT16_LO_DS:
14753 case R_PPC64_PLT16_LO_DS:
14754 case R_PPC64_SECTOFF_DS:
14755 case R_PPC64_SECTOFF_LO_DS:
14756 case R_PPC64_TOC16_DS:
14757 case R_PPC64_TOC16_LO_DS:
14758 case R_PPC64_PLTGOT16_DS:
14759 case R_PPC64_PLTGOT16_LO_DS:
14760 case R_PPC64_GOT_TPREL16_DS:
14761 case R_PPC64_GOT_TPREL16_LO_DS:
14762 case R_PPC64_GOT_DTPREL16_DS:
14763 case R_PPC64_GOT_DTPREL16_LO_DS:
14764 case R_PPC64_TPREL16_DS:
14765 case R_PPC64_TPREL16_LO_DS:
14766 case R_PPC64_DTPREL16_DS:
14767 case R_PPC64_DTPREL16_LO_DS:
14768 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
14770 /* If this reloc is against an lq insn, then the value must be
14771 a multiple of 16. This is somewhat of a hack, but the
14772 "correct" way to do this by defining _DQ forms of all the
14773 _DS relocs bloats all reloc switches in this file. It
14774 doesn't seem to make much sense to use any of these relocs
14775 in data, so testing the insn should be safe. */
14776 if ((insn & (0x3f << 26)) == (56u << 26))
14778 if (((relocation + addend) & mask) != 0)
14780 info->callbacks->einfo
14781 (_("%P: %H: error: %s not a multiple of %u\n"),
14782 input_bfd, input_section, rel->r_offset,
14785 bfd_set_error (bfd_error_bad_value);
14792 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
14793 because such sections are not SEC_ALLOC and thus ld.so will
14794 not process them. */
14795 if (unresolved_reloc
14796 && !((input_section->flags & SEC_DEBUGGING) != 0
14797 && h->elf.def_dynamic)
14798 && _bfd_elf_section_offset (output_bfd, info, input_section,
14799 rel->r_offset) != (bfd_vma) -1)
14801 info->callbacks->einfo
14802 (_("%P: %H: unresolvable %s against `%T'\n"),
14803 input_bfd, input_section, rel->r_offset,
14805 h->elf.root.root.string);
14809 /* 16-bit fields in insns mostly have signed values, but a
14810 few insns have 16-bit unsigned values. Really, we should
14811 have different reloc types. */
14812 if (howto->complain_on_overflow != complain_overflow_dont
14813 && howto->dst_mask == 0xffff
14814 && (input_section->flags & SEC_CODE) != 0)
14816 enum complain_overflow complain = complain_overflow_signed;
14818 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
14819 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
14820 complain = complain_overflow_bitfield;
14821 else if (howto->rightshift == 0
14822 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
14823 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
14824 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
14825 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
14826 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
14827 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
14828 complain = complain_overflow_unsigned;
14829 if (howto->complain_on_overflow != complain)
14831 alt_howto = *howto;
14832 alt_howto.complain_on_overflow = complain;
14833 howto = &alt_howto;
14837 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
14838 rel->r_offset, relocation, addend);
14840 if (r != bfd_reloc_ok)
14842 char *more_info = NULL;
14843 const char *reloc_name = howto->name;
14845 if (reloc_dest != DEST_NORMAL)
14847 more_info = bfd_malloc (strlen (reloc_name) + 8);
14848 if (more_info != NULL)
14850 strcpy (more_info, reloc_name);
14851 strcat (more_info, (reloc_dest == DEST_OPD
14852 ? " (OPD)" : " (stub)"));
14853 reloc_name = more_info;
14857 if (r == bfd_reloc_overflow)
14859 /* On code like "if (foo) foo();" don't report overflow
14860 on a branch to zero when foo is undefined. */
14862 && (reloc_dest == DEST_STUB
14864 && (h->elf.root.type == bfd_link_hash_undefweak
14865 || h->elf.root.type == bfd_link_hash_undefined)
14866 && is_branch_reloc (r_type))))
14868 if (!((*info->callbacks->reloc_overflow)
14869 (info, &h->elf.root, sym_name,
14870 reloc_name, orig_rel.r_addend,
14871 input_bfd, input_section, rel->r_offset)))
14877 info->callbacks->einfo
14878 (_("%P: %H: %s against `%T': error %d\n"),
14879 input_bfd, input_section, rel->r_offset,
14880 reloc_name, sym_name, (int) r);
14883 if (more_info != NULL)
14888 /* If we're emitting relocations, then shortly after this function
14889 returns, reloc offsets and addends for this section will be
14890 adjusted. Worse, reloc symbol indices will be for the output
14891 file rather than the input. Save a copy of the relocs for
14892 opd_entry_value. */
14893 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
14896 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
14897 rel = bfd_alloc (input_bfd, amt);
14898 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
14899 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
14902 memcpy (rel, relocs, amt);
14907 /* Adjust the value of any local symbols in opd sections. */
14910 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
14911 const char *name ATTRIBUTE_UNUSED,
14912 Elf_Internal_Sym *elfsym,
14913 asection *input_sec,
14914 struct elf_link_hash_entry *h)
14916 struct _opd_sec_data *opd;
14923 opd = get_opd_info (input_sec);
14924 if (opd == NULL || opd->adjust == NULL)
14927 value = elfsym->st_value - input_sec->output_offset;
14928 if (!bfd_link_relocatable (info))
14929 value -= input_sec->output_section->vma;
14931 adjust = opd->adjust[OPD_NDX (value)];
14935 elfsym->st_value += adjust;
14939 /* Finish up dynamic symbol handling. We set the contents of various
14940 dynamic sections here. */
14943 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
14944 struct bfd_link_info *info,
14945 struct elf_link_hash_entry *h,
14946 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
14948 struct ppc_link_hash_table *htab;
14949 struct plt_entry *ent;
14950 Elf_Internal_Rela rela;
14953 htab = ppc_hash_table (info);
14957 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
14958 if (ent->plt.offset != (bfd_vma) -1)
14960 /* This symbol has an entry in the procedure linkage
14961 table. Set it up. */
14962 if (!htab->elf.dynamic_sections_created
14963 || h->dynindx == -1)
14965 BFD_ASSERT (h->type == STT_GNU_IFUNC
14967 && (h->root.type == bfd_link_hash_defined
14968 || h->root.type == bfd_link_hash_defweak));
14969 rela.r_offset = (htab->elf.iplt->output_section->vma
14970 + htab->elf.iplt->output_offset
14971 + ent->plt.offset);
14973 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14975 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14976 rela.r_addend = (h->root.u.def.value
14977 + h->root.u.def.section->output_offset
14978 + h->root.u.def.section->output_section->vma
14980 loc = (htab->elf.irelplt->contents
14981 + (htab->elf.irelplt->reloc_count++
14982 * sizeof (Elf64_External_Rela)));
14986 rela.r_offset = (htab->elf.splt->output_section->vma
14987 + htab->elf.splt->output_offset
14988 + ent->plt.offset);
14989 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
14990 rela.r_addend = ent->addend;
14991 loc = (htab->elf.srelplt->contents
14992 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
14993 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
14995 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
14997 if (!htab->opd_abi)
14999 if (!h->def_regular)
15001 /* Mark the symbol as undefined, rather than as
15002 defined in glink. Leave the value if there were
15003 any relocations where pointer equality matters
15004 (this is a clue for the dynamic linker, to make
15005 function pointer comparisons work between an
15006 application and shared library), otherwise set it
15008 sym->st_shndx = SHN_UNDEF;
15009 if (!h->pointer_equality_needed)
15011 else if (!h->ref_regular_nonweak)
15013 /* This breaks function pointer comparisons, but
15014 that is better than breaking tests for a NULL
15015 function pointer. */
15024 /* This symbol needs a copy reloc. Set it up. */
15026 if (h->dynindx == -1
15027 || (h->root.type != bfd_link_hash_defined
15028 && h->root.type != bfd_link_hash_defweak)
15029 || htab->relbss == NULL)
15032 rela.r_offset = (h->root.u.def.value
15033 + h->root.u.def.section->output_section->vma
15034 + h->root.u.def.section->output_offset);
15035 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15037 loc = htab->relbss->contents;
15038 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
15039 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15045 /* Used to decide how to sort relocs in an optimal manner for the
15046 dynamic linker, before writing them out. */
15048 static enum elf_reloc_type_class
15049 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15050 const asection *rel_sec,
15051 const Elf_Internal_Rela *rela)
15053 enum elf_ppc64_reloc_type r_type;
15054 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15056 if (rel_sec == htab->elf.irelplt)
15057 return reloc_class_ifunc;
15059 r_type = ELF64_R_TYPE (rela->r_info);
15062 case R_PPC64_RELATIVE:
15063 return reloc_class_relative;
15064 case R_PPC64_JMP_SLOT:
15065 return reloc_class_plt;
15067 return reloc_class_copy;
15069 return reloc_class_normal;
15073 /* Finish up the dynamic sections. */
15076 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15077 struct bfd_link_info *info)
15079 struct ppc_link_hash_table *htab;
15083 htab = ppc_hash_table (info);
15087 dynobj = htab->elf.dynobj;
15088 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
15090 if (htab->elf.dynamic_sections_created)
15092 Elf64_External_Dyn *dyncon, *dynconend;
15094 if (sdyn == NULL || htab->elf.sgot == NULL)
15097 dyncon = (Elf64_External_Dyn *) sdyn->contents;
15098 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
15099 for (; dyncon < dynconend; dyncon++)
15101 Elf_Internal_Dyn dyn;
15104 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15111 case DT_PPC64_GLINK:
15113 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15114 /* We stupidly defined DT_PPC64_GLINK to be the start
15115 of glink rather than the first entry point, which is
15116 what ld.so needs, and now have a bigger stub to
15117 support automatic multiple TOCs. */
15118 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
15122 s = bfd_get_section_by_name (output_bfd, ".opd");
15125 dyn.d_un.d_ptr = s->vma;
15129 if (htab->do_multi_toc && htab->multi_toc_needed)
15130 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15133 case DT_PPC64_OPDSZ:
15134 s = bfd_get_section_by_name (output_bfd, ".opd");
15137 dyn.d_un.d_val = s->size;
15141 s = htab->elf.splt;
15142 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15146 s = htab->elf.srelplt;
15147 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15151 dyn.d_un.d_val = htab->elf.srelplt->size;
15155 /* Don't count procedure linkage table relocs in the
15156 overall reloc count. */
15157 s = htab->elf.srelplt;
15160 dyn.d_un.d_val -= s->size;
15164 /* We may not be using the standard ELF linker script.
15165 If .rela.plt is the first .rela section, we adjust
15166 DT_RELA to not include it. */
15167 s = htab->elf.srelplt;
15170 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
15172 dyn.d_un.d_ptr += s->size;
15176 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
15180 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0)
15182 /* Fill in the first entry in the global offset table.
15183 We use it to hold the link-time TOCbase. */
15184 bfd_put_64 (output_bfd,
15185 elf_gp (output_bfd) + TOC_BASE_OFF,
15186 htab->elf.sgot->contents);
15188 /* Set .got entry size. */
15189 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
15192 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
15194 /* Set .plt entry size. */
15195 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
15196 = PLT_ENTRY_SIZE (htab);
15199 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15200 brlt ourselves if emitrelocations. */
15201 if (htab->brlt != NULL
15202 && htab->brlt->reloc_count != 0
15203 && !_bfd_elf_link_output_relocs (output_bfd,
15205 elf_section_data (htab->brlt)->rela.hdr,
15206 elf_section_data (htab->brlt)->relocs,
15210 if (htab->glink != NULL
15211 && htab->glink->reloc_count != 0
15212 && !_bfd_elf_link_output_relocs (output_bfd,
15214 elf_section_data (htab->glink)->rela.hdr,
15215 elf_section_data (htab->glink)->relocs,
15219 if (htab->glink_eh_frame != NULL
15220 && htab->glink_eh_frame->size != 0)
15224 asection *stub_sec;
15226 p = htab->glink_eh_frame->contents + sizeof (glink_eh_frame_cie);
15227 for (stub_sec = htab->params->stub_bfd->sections;
15229 stub_sec = stub_sec->next)
15230 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15236 /* Offset to stub section. */
15237 val = (stub_sec->output_section->vma
15238 + stub_sec->output_offset);
15239 val -= (htab->glink_eh_frame->output_section->vma
15240 + htab->glink_eh_frame->output_offset
15241 + (p - htab->glink_eh_frame->contents));
15242 if (val + 0x80000000 > 0xffffffff)
15244 info->callbacks->einfo
15245 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15249 bfd_put_32 (dynobj, val, p);
15251 /* stub section size. */
15253 /* Augmentation. */
15258 if (htab->glink != NULL && htab->glink->size != 0)
15264 /* Offset to .glink. */
15265 val = (htab->glink->output_section->vma
15266 + htab->glink->output_offset
15268 val -= (htab->glink_eh_frame->output_section->vma
15269 + htab->glink_eh_frame->output_offset
15270 + (p - htab->glink_eh_frame->contents));
15271 if (val + 0x80000000 > 0xffffffff)
15273 info->callbacks->einfo
15274 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15275 htab->glink->name);
15278 bfd_put_32 (dynobj, val, p);
15282 /* Augmentation. */
15288 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15289 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15290 htab->glink_eh_frame,
15291 htab->glink_eh_frame->contents))
15295 /* We need to handle writing out multiple GOT sections ourselves,
15296 since we didn't add them to DYNOBJ. We know dynobj is the first
15298 while ((dynobj = dynobj->link.next) != NULL)
15302 if (!is_ppc64_elf (dynobj))
15305 s = ppc64_elf_tdata (dynobj)->got;
15308 && s->output_section != bfd_abs_section_ptr
15309 && !bfd_set_section_contents (output_bfd, s->output_section,
15310 s->contents, s->output_offset,
15313 s = ppc64_elf_tdata (dynobj)->relgot;
15316 && s->output_section != bfd_abs_section_ptr
15317 && !bfd_set_section_contents (output_bfd, s->output_section,
15318 s->contents, s->output_offset,
15326 #include "elf64-target.h"
15328 /* FreeBSD support */
15330 #undef TARGET_LITTLE_SYM
15331 #undef TARGET_LITTLE_NAME
15333 #undef TARGET_BIG_SYM
15334 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
15335 #undef TARGET_BIG_NAME
15336 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15339 #define ELF_OSABI ELFOSABI_FREEBSD
15342 #define elf64_bed elf64_powerpc_fbsd_bed
15344 #include "elf64-target.h"