1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2018 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
59 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM powerpc_elf64_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_TARGET_ID PPC64_ELF_DATA
65 #define ELF_MACHINE_CODE EM_PPC64
66 #define ELF_MAXPAGESIZE 0x10000
67 #define ELF_COMMONPAGESIZE 0x1000
68 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
69 #define elf_info_to_howto ppc64_elf_info_to_howto
71 #define elf_backend_want_got_sym 0
72 #define elf_backend_want_plt_sym 0
73 #define elf_backend_plt_alignment 3
74 #define elf_backend_plt_not_loaded 1
75 #define elf_backend_got_header_size 8
76 #define elf_backend_want_dynrelro 1
77 #define elf_backend_can_gc_sections 1
78 #define elf_backend_can_refcount 1
79 #define elf_backend_rela_normal 1
80 #define elf_backend_dtrel_excludes_plt 1
81 #define elf_backend_default_execstack 0
83 #define bfd_elf64_mkobject ppc64_elf_mkobject
84 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
85 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
86 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
87 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
88 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
89 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
91 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
92 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
94 #define elf_backend_object_p ppc64_elf_object_p
95 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
96 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
97 #define elf_backend_write_core_note ppc64_elf_write_core_note
98 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
99 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
100 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
101 #define elf_backend_check_directives ppc64_elf_before_check_relocs
102 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
103 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
104 #define elf_backend_check_relocs ppc64_elf_check_relocs
105 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
106 #define elf_backend_gc_keep ppc64_elf_gc_keep
107 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
108 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
109 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
110 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
111 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
112 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
113 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
114 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
115 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
116 #define elf_backend_action_discarded ppc64_elf_action_discarded
117 #define elf_backend_relocate_section ppc64_elf_relocate_section
118 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
119 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
120 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
121 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
122 #define elf_backend_special_sections ppc64_elf_special_sections
123 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
124 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
125 #define elf_backend_get_reloc_section bfd_get_section_by_name
127 /* The name of the dynamic interpreter. This is put in the .interp
129 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
131 /* The size in bytes of an entry in the procedure linkage table. */
132 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
133 #define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
135 /* The initial size of the plt reserved for the dynamic linker. */
136 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
138 /* Offsets to some stack save slots. */
140 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
141 /* This one is dodgy. ELFv2 does not have a linker word, so use the
142 CR save slot. Used only by optimised __tls_get_addr call stub,
143 relying on __tls_get_addr_opt not saving CR.. */
144 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
146 /* TOC base pointers offset from start of TOC. */
147 #define TOC_BASE_OFF 0x8000
148 /* TOC base alignment. */
149 #define TOC_BASE_ALIGN 256
151 /* Offset of tp and dtp pointers from start of TLS block. */
152 #define TP_OFFSET 0x7000
153 #define DTP_OFFSET 0x8000
155 /* .plt call stub instructions. The normal stub is like this, but
156 sometimes the .plt entry crosses a 64k boundary and we need to
157 insert an addi to adjust r11. */
158 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
159 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
160 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
161 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
162 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
163 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
164 #define BCTR 0x4e800420 /* bctr */
166 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
167 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
168 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
170 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
171 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
172 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
173 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
174 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
175 #define BNECTR 0x4ca20420 /* bnectr+ */
176 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
178 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
179 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
180 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
182 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
183 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
184 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
186 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
187 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
188 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
189 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
190 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
192 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
193 #define GLINK_PLTRESOLVE_SIZE(htab) \
194 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
198 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
199 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
201 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
202 /* ld %2,(0b-1b)(%11) */
203 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
204 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
210 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
211 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
212 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
213 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
214 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
217 #define NOP 0x60000000
219 /* Some other nops. */
220 #define CROR_151515 0x4def7b82
221 #define CROR_313131 0x4ffffb82
223 /* .glink entries for the first 32k functions are two instructions. */
224 #define LI_R0_0 0x38000000 /* li %r0,0 */
225 #define B_DOT 0x48000000 /* b . */
227 /* After that, we need two instructions to load the index, followed by
229 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
230 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
232 /* Instructions used by the save and restore reg functions. */
233 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
234 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
235 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
236 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
237 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
238 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
239 #define LI_R12_0 0x39800000 /* li %r12,0 */
240 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
241 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
242 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
243 #define BLR 0x4e800020 /* blr */
245 /* Since .opd is an array of descriptors and each entry will end up
246 with identical R_PPC64_RELATIVE relocs, there is really no need to
247 propagate .opd relocs; The dynamic linker should be taught to
248 relocate .opd without reloc entries. */
249 #ifndef NO_OPD_RELOCS
250 #define NO_OPD_RELOCS 0
254 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
258 abiversion (bfd *abfd)
260 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
264 set_abiversion (bfd *abfd, int ver)
266 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
267 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
270 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
272 /* Relocation HOWTO's. */
273 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
275 static reloc_howto_type ppc64_elf_howto_raw[] =
277 /* This reloc does nothing. */
278 HOWTO (R_PPC64_NONE, /* type */
280 3, /* size (0 = byte, 1 = short, 2 = long) */
282 FALSE, /* pc_relative */
284 complain_overflow_dont, /* complain_on_overflow */
285 bfd_elf_generic_reloc, /* special_function */
286 "R_PPC64_NONE", /* name */
287 FALSE, /* partial_inplace */
290 FALSE), /* pcrel_offset */
292 /* A standard 32 bit relocation. */
293 HOWTO (R_PPC64_ADDR32, /* type */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
297 FALSE, /* pc_relative */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_PPC64_ADDR32", /* name */
302 FALSE, /* partial_inplace */
304 0xffffffff, /* dst_mask */
305 FALSE), /* pcrel_offset */
307 /* An absolute 26 bit branch; the lower two bits must be zero.
308 FIXME: we don't check that, we just clear them. */
309 HOWTO (R_PPC64_ADDR24, /* type */
311 2, /* size (0 = byte, 1 = short, 2 = long) */
313 FALSE, /* pc_relative */
315 complain_overflow_bitfield, /* complain_on_overflow */
316 bfd_elf_generic_reloc, /* special_function */
317 "R_PPC64_ADDR24", /* name */
318 FALSE, /* partial_inplace */
320 0x03fffffc, /* dst_mask */
321 FALSE), /* pcrel_offset */
323 /* A standard 16 bit relocation. */
324 HOWTO (R_PPC64_ADDR16, /* type */
326 1, /* size (0 = byte, 1 = short, 2 = long) */
328 FALSE, /* pc_relative */
330 complain_overflow_bitfield, /* complain_on_overflow */
331 bfd_elf_generic_reloc, /* special_function */
332 "R_PPC64_ADDR16", /* name */
333 FALSE, /* partial_inplace */
335 0xffff, /* dst_mask */
336 FALSE), /* pcrel_offset */
338 /* A 16 bit relocation without overflow. */
339 HOWTO (R_PPC64_ADDR16_LO, /* type */
341 1, /* size (0 = byte, 1 = short, 2 = long) */
343 FALSE, /* pc_relative */
345 complain_overflow_dont,/* complain_on_overflow */
346 bfd_elf_generic_reloc, /* special_function */
347 "R_PPC64_ADDR16_LO", /* name */
348 FALSE, /* partial_inplace */
350 0xffff, /* dst_mask */
351 FALSE), /* pcrel_offset */
353 /* Bits 16-31 of an address. */
354 HOWTO (R_PPC64_ADDR16_HI, /* type */
356 1, /* size (0 = byte, 1 = short, 2 = long) */
358 FALSE, /* pc_relative */
360 complain_overflow_signed, /* complain_on_overflow */
361 bfd_elf_generic_reloc, /* special_function */
362 "R_PPC64_ADDR16_HI", /* name */
363 FALSE, /* partial_inplace */
365 0xffff, /* dst_mask */
366 FALSE), /* pcrel_offset */
368 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
369 bits, treated as a signed number, is negative. */
370 HOWTO (R_PPC64_ADDR16_HA, /* type */
372 1, /* size (0 = byte, 1 = short, 2 = long) */
374 FALSE, /* pc_relative */
376 complain_overflow_signed, /* complain_on_overflow */
377 ppc64_elf_ha_reloc, /* special_function */
378 "R_PPC64_ADDR16_HA", /* name */
379 FALSE, /* partial_inplace */
381 0xffff, /* dst_mask */
382 FALSE), /* pcrel_offset */
384 /* An absolute 16 bit branch; the lower two bits must be zero.
385 FIXME: we don't check that, we just clear them. */
386 HOWTO (R_PPC64_ADDR14, /* type */
388 2, /* size (0 = byte, 1 = short, 2 = long) */
390 FALSE, /* pc_relative */
392 complain_overflow_signed, /* complain_on_overflow */
393 ppc64_elf_branch_reloc, /* special_function */
394 "R_PPC64_ADDR14", /* name */
395 FALSE, /* partial_inplace */
397 0x0000fffc, /* dst_mask */
398 FALSE), /* pcrel_offset */
400 /* An absolute 16 bit branch, for which bit 10 should be set to
401 indicate that the branch is expected to be taken. The lower two
402 bits must be zero. */
403 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
405 2, /* size (0 = byte, 1 = short, 2 = long) */
407 FALSE, /* pc_relative */
409 complain_overflow_signed, /* complain_on_overflow */
410 ppc64_elf_brtaken_reloc, /* special_function */
411 "R_PPC64_ADDR14_BRTAKEN",/* name */
412 FALSE, /* partial_inplace */
414 0x0000fffc, /* dst_mask */
415 FALSE), /* pcrel_offset */
417 /* An absolute 16 bit branch, for which bit 10 should be set to
418 indicate that the branch is not expected to be taken. The lower
419 two bits must be zero. */
420 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
422 2, /* size (0 = byte, 1 = short, 2 = long) */
424 FALSE, /* pc_relative */
426 complain_overflow_signed, /* complain_on_overflow */
427 ppc64_elf_brtaken_reloc, /* special_function */
428 "R_PPC64_ADDR14_BRNTAKEN",/* name */
429 FALSE, /* partial_inplace */
431 0x0000fffc, /* dst_mask */
432 FALSE), /* pcrel_offset */
434 /* A relative 26 bit branch; the lower two bits must be zero. */
435 HOWTO (R_PPC64_REL24, /* type */
437 2, /* size (0 = byte, 1 = short, 2 = long) */
439 TRUE, /* pc_relative */
441 complain_overflow_signed, /* complain_on_overflow */
442 ppc64_elf_branch_reloc, /* special_function */
443 "R_PPC64_REL24", /* name */
444 FALSE, /* partial_inplace */
446 0x03fffffc, /* dst_mask */
447 TRUE), /* pcrel_offset */
449 /* A relative 16 bit branch; the lower two bits must be zero. */
450 HOWTO (R_PPC64_REL14, /* type */
452 2, /* size (0 = byte, 1 = short, 2 = long) */
454 TRUE, /* pc_relative */
456 complain_overflow_signed, /* complain_on_overflow */
457 ppc64_elf_branch_reloc, /* special_function */
458 "R_PPC64_REL14", /* name */
459 FALSE, /* partial_inplace */
461 0x0000fffc, /* dst_mask */
462 TRUE), /* pcrel_offset */
464 /* A relative 16 bit branch. Bit 10 should be set to indicate that
465 the branch is expected to be taken. The lower two bits must be
467 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
471 TRUE, /* pc_relative */
473 complain_overflow_signed, /* complain_on_overflow */
474 ppc64_elf_brtaken_reloc, /* special_function */
475 "R_PPC64_REL14_BRTAKEN", /* name */
476 FALSE, /* partial_inplace */
478 0x0000fffc, /* dst_mask */
479 TRUE), /* pcrel_offset */
481 /* A relative 16 bit branch. Bit 10 should be set to indicate that
482 the branch is not expected to be taken. The lower two bits must
484 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
486 2, /* size (0 = byte, 1 = short, 2 = long) */
488 TRUE, /* pc_relative */
490 complain_overflow_signed, /* complain_on_overflow */
491 ppc64_elf_brtaken_reloc, /* special_function */
492 "R_PPC64_REL14_BRNTAKEN",/* name */
493 FALSE, /* partial_inplace */
495 0x0000fffc, /* dst_mask */
496 TRUE), /* pcrel_offset */
498 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
500 HOWTO (R_PPC64_GOT16, /* type */
502 1, /* size (0 = byte, 1 = short, 2 = long) */
504 FALSE, /* pc_relative */
506 complain_overflow_signed, /* complain_on_overflow */
507 ppc64_elf_unhandled_reloc, /* special_function */
508 "R_PPC64_GOT16", /* name */
509 FALSE, /* partial_inplace */
511 0xffff, /* dst_mask */
512 FALSE), /* pcrel_offset */
514 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
516 HOWTO (R_PPC64_GOT16_LO, /* type */
518 1, /* size (0 = byte, 1 = short, 2 = long) */
520 FALSE, /* pc_relative */
522 complain_overflow_dont, /* complain_on_overflow */
523 ppc64_elf_unhandled_reloc, /* special_function */
524 "R_PPC64_GOT16_LO", /* name */
525 FALSE, /* partial_inplace */
527 0xffff, /* dst_mask */
528 FALSE), /* pcrel_offset */
530 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
532 HOWTO (R_PPC64_GOT16_HI, /* type */
534 1, /* size (0 = byte, 1 = short, 2 = long) */
536 FALSE, /* pc_relative */
538 complain_overflow_signed,/* complain_on_overflow */
539 ppc64_elf_unhandled_reloc, /* special_function */
540 "R_PPC64_GOT16_HI", /* name */
541 FALSE, /* partial_inplace */
543 0xffff, /* dst_mask */
544 FALSE), /* pcrel_offset */
546 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
548 HOWTO (R_PPC64_GOT16_HA, /* type */
550 1, /* size (0 = byte, 1 = short, 2 = long) */
552 FALSE, /* pc_relative */
554 complain_overflow_signed,/* complain_on_overflow */
555 ppc64_elf_unhandled_reloc, /* special_function */
556 "R_PPC64_GOT16_HA", /* name */
557 FALSE, /* partial_inplace */
559 0xffff, /* dst_mask */
560 FALSE), /* pcrel_offset */
562 /* This is used only by the dynamic linker. The symbol should exist
563 both in the object being run and in some shared library. The
564 dynamic linker copies the data addressed by the symbol from the
565 shared library into the object, because the object being
566 run has to have the data at some particular address. */
567 HOWTO (R_PPC64_COPY, /* type */
569 0, /* this one is variable size */
571 FALSE, /* pc_relative */
573 complain_overflow_dont, /* complain_on_overflow */
574 ppc64_elf_unhandled_reloc, /* special_function */
575 "R_PPC64_COPY", /* name */
576 FALSE, /* partial_inplace */
579 FALSE), /* pcrel_offset */
581 /* Like R_PPC64_ADDR64, but used when setting global offset table
583 HOWTO (R_PPC64_GLOB_DAT, /* type */
585 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
587 FALSE, /* pc_relative */
589 complain_overflow_dont, /* complain_on_overflow */
590 ppc64_elf_unhandled_reloc, /* special_function */
591 "R_PPC64_GLOB_DAT", /* name */
592 FALSE, /* partial_inplace */
594 ONES (64), /* dst_mask */
595 FALSE), /* pcrel_offset */
597 /* Created by the link editor. Marks a procedure linkage table
598 entry for a symbol. */
599 HOWTO (R_PPC64_JMP_SLOT, /* type */
601 0, /* size (0 = byte, 1 = short, 2 = long) */
603 FALSE, /* pc_relative */
605 complain_overflow_dont, /* complain_on_overflow */
606 ppc64_elf_unhandled_reloc, /* special_function */
607 "R_PPC64_JMP_SLOT", /* name */
608 FALSE, /* partial_inplace */
611 FALSE), /* pcrel_offset */
613 /* Used only by the dynamic linker. When the object is run, this
614 doubleword64 is set to the load address of the object, plus the
616 HOWTO (R_PPC64_RELATIVE, /* type */
618 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
620 FALSE, /* pc_relative */
622 complain_overflow_dont, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "R_PPC64_RELATIVE", /* name */
625 FALSE, /* partial_inplace */
627 ONES (64), /* dst_mask */
628 FALSE), /* pcrel_offset */
630 /* Like R_PPC64_ADDR32, but may be unaligned. */
631 HOWTO (R_PPC64_UADDR32, /* type */
633 2, /* size (0 = byte, 1 = short, 2 = long) */
635 FALSE, /* pc_relative */
637 complain_overflow_bitfield, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "R_PPC64_UADDR32", /* name */
640 FALSE, /* partial_inplace */
642 0xffffffff, /* dst_mask */
643 FALSE), /* pcrel_offset */
645 /* Like R_PPC64_ADDR16, but may be unaligned. */
646 HOWTO (R_PPC64_UADDR16, /* type */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
650 FALSE, /* pc_relative */
652 complain_overflow_bitfield, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "R_PPC64_UADDR16", /* name */
655 FALSE, /* partial_inplace */
657 0xffff, /* dst_mask */
658 FALSE), /* pcrel_offset */
660 /* 32-bit PC relative. */
661 HOWTO (R_PPC64_REL32, /* type */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
665 TRUE, /* pc_relative */
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "R_PPC64_REL32", /* name */
670 FALSE, /* partial_inplace */
672 0xffffffff, /* dst_mask */
673 TRUE), /* pcrel_offset */
675 /* 32-bit relocation to the symbol's procedure linkage table. */
676 HOWTO (R_PPC64_PLT32, /* type */
678 2, /* size (0 = byte, 1 = short, 2 = long) */
680 FALSE, /* pc_relative */
682 complain_overflow_bitfield, /* complain_on_overflow */
683 ppc64_elf_unhandled_reloc, /* special_function */
684 "R_PPC64_PLT32", /* name */
685 FALSE, /* partial_inplace */
687 0xffffffff, /* dst_mask */
688 FALSE), /* pcrel_offset */
690 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
691 FIXME: R_PPC64_PLTREL32 not supported. */
692 HOWTO (R_PPC64_PLTREL32, /* type */
694 2, /* size (0 = byte, 1 = short, 2 = long) */
696 TRUE, /* pc_relative */
698 complain_overflow_signed, /* complain_on_overflow */
699 ppc64_elf_unhandled_reloc, /* special_function */
700 "R_PPC64_PLTREL32", /* name */
701 FALSE, /* partial_inplace */
703 0xffffffff, /* dst_mask */
704 TRUE), /* pcrel_offset */
706 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
708 HOWTO (R_PPC64_PLT16_LO, /* type */
710 1, /* size (0 = byte, 1 = short, 2 = long) */
712 FALSE, /* pc_relative */
714 complain_overflow_dont, /* complain_on_overflow */
715 ppc64_elf_unhandled_reloc, /* special_function */
716 "R_PPC64_PLT16_LO", /* name */
717 FALSE, /* partial_inplace */
719 0xffff, /* dst_mask */
720 FALSE), /* pcrel_offset */
722 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
724 HOWTO (R_PPC64_PLT16_HI, /* type */
726 1, /* size (0 = byte, 1 = short, 2 = long) */
728 FALSE, /* pc_relative */
730 complain_overflow_signed, /* complain_on_overflow */
731 ppc64_elf_unhandled_reloc, /* special_function */
732 "R_PPC64_PLT16_HI", /* name */
733 FALSE, /* partial_inplace */
735 0xffff, /* dst_mask */
736 FALSE), /* pcrel_offset */
738 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
740 HOWTO (R_PPC64_PLT16_HA, /* type */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
744 FALSE, /* pc_relative */
746 complain_overflow_signed, /* complain_on_overflow */
747 ppc64_elf_unhandled_reloc, /* special_function */
748 "R_PPC64_PLT16_HA", /* name */
749 FALSE, /* partial_inplace */
751 0xffff, /* dst_mask */
752 FALSE), /* pcrel_offset */
754 /* 16-bit section relative relocation. */
755 HOWTO (R_PPC64_SECTOFF, /* type */
757 1, /* size (0 = byte, 1 = short, 2 = long) */
759 FALSE, /* pc_relative */
761 complain_overflow_signed, /* complain_on_overflow */
762 ppc64_elf_sectoff_reloc, /* special_function */
763 "R_PPC64_SECTOFF", /* name */
764 FALSE, /* partial_inplace */
766 0xffff, /* dst_mask */
767 FALSE), /* pcrel_offset */
769 /* Like R_PPC64_SECTOFF, but no overflow warning. */
770 HOWTO (R_PPC64_SECTOFF_LO, /* type */
772 1, /* size (0 = byte, 1 = short, 2 = long) */
774 FALSE, /* pc_relative */
776 complain_overflow_dont, /* complain_on_overflow */
777 ppc64_elf_sectoff_reloc, /* special_function */
778 "R_PPC64_SECTOFF_LO", /* name */
779 FALSE, /* partial_inplace */
781 0xffff, /* dst_mask */
782 FALSE), /* pcrel_offset */
784 /* 16-bit upper half section relative relocation. */
785 HOWTO (R_PPC64_SECTOFF_HI, /* type */
787 1, /* size (0 = byte, 1 = short, 2 = long) */
789 FALSE, /* pc_relative */
791 complain_overflow_signed, /* complain_on_overflow */
792 ppc64_elf_sectoff_reloc, /* special_function */
793 "R_PPC64_SECTOFF_HI", /* name */
794 FALSE, /* partial_inplace */
796 0xffff, /* dst_mask */
797 FALSE), /* pcrel_offset */
799 /* 16-bit upper half adjusted section relative relocation. */
800 HOWTO (R_PPC64_SECTOFF_HA, /* type */
802 1, /* size (0 = byte, 1 = short, 2 = long) */
804 FALSE, /* pc_relative */
806 complain_overflow_signed, /* complain_on_overflow */
807 ppc64_elf_sectoff_ha_reloc, /* special_function */
808 "R_PPC64_SECTOFF_HA", /* name */
809 FALSE, /* partial_inplace */
811 0xffff, /* dst_mask */
812 FALSE), /* pcrel_offset */
814 /* Like R_PPC64_REL24 without touching the two least significant bits. */
815 HOWTO (R_PPC64_REL30, /* type */
817 2, /* size (0 = byte, 1 = short, 2 = long) */
819 TRUE, /* pc_relative */
821 complain_overflow_dont, /* complain_on_overflow */
822 bfd_elf_generic_reloc, /* special_function */
823 "R_PPC64_REL30", /* name */
824 FALSE, /* partial_inplace */
826 0xfffffffc, /* dst_mask */
827 TRUE), /* pcrel_offset */
829 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
831 /* A standard 64-bit relocation. */
832 HOWTO (R_PPC64_ADDR64, /* type */
834 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
836 FALSE, /* pc_relative */
838 complain_overflow_dont, /* complain_on_overflow */
839 bfd_elf_generic_reloc, /* special_function */
840 "R_PPC64_ADDR64", /* name */
841 FALSE, /* partial_inplace */
843 ONES (64), /* dst_mask */
844 FALSE), /* pcrel_offset */
846 /* The bits 32-47 of an address. */
847 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
849 1, /* size (0 = byte, 1 = short, 2 = long) */
851 FALSE, /* pc_relative */
853 complain_overflow_dont, /* complain_on_overflow */
854 bfd_elf_generic_reloc, /* special_function */
855 "R_PPC64_ADDR16_HIGHER", /* name */
856 FALSE, /* partial_inplace */
858 0xffff, /* dst_mask */
859 FALSE), /* pcrel_offset */
861 /* The bits 32-47 of an address, plus 1 if the contents of the low
862 16 bits, treated as a signed number, is negative. */
863 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
865 1, /* size (0 = byte, 1 = short, 2 = long) */
867 FALSE, /* pc_relative */
869 complain_overflow_dont, /* complain_on_overflow */
870 ppc64_elf_ha_reloc, /* special_function */
871 "R_PPC64_ADDR16_HIGHERA", /* name */
872 FALSE, /* partial_inplace */
874 0xffff, /* dst_mask */
875 FALSE), /* pcrel_offset */
877 /* The bits 48-63 of an address. */
878 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
880 1, /* size (0 = byte, 1 = short, 2 = long) */
882 FALSE, /* pc_relative */
884 complain_overflow_dont, /* complain_on_overflow */
885 bfd_elf_generic_reloc, /* special_function */
886 "R_PPC64_ADDR16_HIGHEST", /* name */
887 FALSE, /* partial_inplace */
889 0xffff, /* dst_mask */
890 FALSE), /* pcrel_offset */
892 /* The bits 48-63 of an address, plus 1 if the contents of the low
893 16 bits, treated as a signed number, is negative. */
894 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
896 1, /* size (0 = byte, 1 = short, 2 = long) */
898 FALSE, /* pc_relative */
900 complain_overflow_dont, /* complain_on_overflow */
901 ppc64_elf_ha_reloc, /* special_function */
902 "R_PPC64_ADDR16_HIGHESTA", /* name */
903 FALSE, /* partial_inplace */
905 0xffff, /* dst_mask */
906 FALSE), /* pcrel_offset */
908 /* Like ADDR64, but may be unaligned. */
909 HOWTO (R_PPC64_UADDR64, /* type */
911 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
913 FALSE, /* pc_relative */
915 complain_overflow_dont, /* complain_on_overflow */
916 bfd_elf_generic_reloc, /* special_function */
917 "R_PPC64_UADDR64", /* name */
918 FALSE, /* partial_inplace */
920 ONES (64), /* dst_mask */
921 FALSE), /* pcrel_offset */
923 /* 64-bit relative relocation. */
924 HOWTO (R_PPC64_REL64, /* type */
926 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
928 TRUE, /* pc_relative */
930 complain_overflow_dont, /* complain_on_overflow */
931 bfd_elf_generic_reloc, /* special_function */
932 "R_PPC64_REL64", /* name */
933 FALSE, /* partial_inplace */
935 ONES (64), /* dst_mask */
936 TRUE), /* pcrel_offset */
938 /* 64-bit relocation to the symbol's procedure linkage table. */
939 HOWTO (R_PPC64_PLT64, /* type */
941 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
943 FALSE, /* pc_relative */
945 complain_overflow_dont, /* complain_on_overflow */
946 ppc64_elf_unhandled_reloc, /* special_function */
947 "R_PPC64_PLT64", /* name */
948 FALSE, /* partial_inplace */
950 ONES (64), /* dst_mask */
951 FALSE), /* pcrel_offset */
953 /* 64-bit PC relative relocation to the symbol's procedure linkage
955 /* FIXME: R_PPC64_PLTREL64 not supported. */
956 HOWTO (R_PPC64_PLTREL64, /* type */
958 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
960 TRUE, /* pc_relative */
962 complain_overflow_dont, /* complain_on_overflow */
963 ppc64_elf_unhandled_reloc, /* special_function */
964 "R_PPC64_PLTREL64", /* name */
965 FALSE, /* partial_inplace */
967 ONES (64), /* dst_mask */
968 TRUE), /* pcrel_offset */
970 /* 16 bit TOC-relative relocation. */
972 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
973 HOWTO (R_PPC64_TOC16, /* type */
975 1, /* size (0 = byte, 1 = short, 2 = long) */
977 FALSE, /* pc_relative */
979 complain_overflow_signed, /* complain_on_overflow */
980 ppc64_elf_toc_reloc, /* special_function */
981 "R_PPC64_TOC16", /* name */
982 FALSE, /* partial_inplace */
984 0xffff, /* dst_mask */
985 FALSE), /* pcrel_offset */
987 /* 16 bit TOC-relative relocation without overflow. */
989 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
990 HOWTO (R_PPC64_TOC16_LO, /* type */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
994 FALSE, /* pc_relative */
996 complain_overflow_dont, /* complain_on_overflow */
997 ppc64_elf_toc_reloc, /* special_function */
998 "R_PPC64_TOC16_LO", /* name */
999 FALSE, /* partial_inplace */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1004 /* 16 bit TOC-relative relocation, high 16 bits. */
1006 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
1007 HOWTO (R_PPC64_TOC16_HI, /* type */
1008 16, /* rightshift */
1009 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 FALSE, /* pc_relative */
1013 complain_overflow_signed, /* complain_on_overflow */
1014 ppc64_elf_toc_reloc, /* special_function */
1015 "R_PPC64_TOC16_HI", /* name */
1016 FALSE, /* partial_inplace */
1018 0xffff, /* dst_mask */
1019 FALSE), /* pcrel_offset */
1021 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1022 contents of the low 16 bits, treated as a signed number, is
1025 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1026 HOWTO (R_PPC64_TOC16_HA, /* type */
1027 16, /* rightshift */
1028 1, /* size (0 = byte, 1 = short, 2 = long) */
1030 FALSE, /* pc_relative */
1032 complain_overflow_signed, /* complain_on_overflow */
1033 ppc64_elf_toc_ha_reloc, /* special_function */
1034 "R_PPC64_TOC16_HA", /* name */
1035 FALSE, /* partial_inplace */
1037 0xffff, /* dst_mask */
1038 FALSE), /* pcrel_offset */
1040 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1042 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1043 HOWTO (R_PPC64_TOC, /* type */
1045 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1047 FALSE, /* pc_relative */
1049 complain_overflow_dont, /* complain_on_overflow */
1050 ppc64_elf_toc64_reloc, /* special_function */
1051 "R_PPC64_TOC", /* name */
1052 FALSE, /* partial_inplace */
1054 ONES (64), /* dst_mask */
1055 FALSE), /* pcrel_offset */
1057 /* Like R_PPC64_GOT16, but also informs the link editor that the
1058 value to relocate may (!) refer to a PLT entry which the link
1059 editor (a) may replace with the symbol value. If the link editor
1060 is unable to fully resolve the symbol, it may (b) create a PLT
1061 entry and store the address to the new PLT entry in the GOT.
1062 This permits lazy resolution of function symbols at run time.
1063 The link editor may also skip all of this and just (c) emit a
1064 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1065 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1066 HOWTO (R_PPC64_PLTGOT16, /* type */
1068 1, /* size (0 = byte, 1 = short, 2 = long) */
1070 FALSE, /* pc_relative */
1072 complain_overflow_signed, /* complain_on_overflow */
1073 ppc64_elf_unhandled_reloc, /* special_function */
1074 "R_PPC64_PLTGOT16", /* name */
1075 FALSE, /* partial_inplace */
1077 0xffff, /* dst_mask */
1078 FALSE), /* pcrel_offset */
1080 /* Like R_PPC64_PLTGOT16, but without overflow. */
1081 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1082 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1084 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 FALSE, /* pc_relative */
1088 complain_overflow_dont, /* complain_on_overflow */
1089 ppc64_elf_unhandled_reloc, /* special_function */
1090 "R_PPC64_PLTGOT16_LO", /* name */
1091 FALSE, /* partial_inplace */
1093 0xffff, /* dst_mask */
1094 FALSE), /* pcrel_offset */
1096 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1097 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1098 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1099 16, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 FALSE, /* pc_relative */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_unhandled_reloc, /* special_function */
1106 "R_PPC64_PLTGOT16_HI", /* name */
1107 FALSE, /* partial_inplace */
1109 0xffff, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1112 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1113 1 if the contents of the low 16 bits, treated as a signed number,
1115 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1116 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1117 16, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1120 FALSE, /* pc_relative */
1122 complain_overflow_signed, /* complain_on_overflow */
1123 ppc64_elf_unhandled_reloc, /* special_function */
1124 "R_PPC64_PLTGOT16_HA", /* name */
1125 FALSE, /* partial_inplace */
1127 0xffff, /* dst_mask */
1128 FALSE), /* pcrel_offset */
1130 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1131 HOWTO (R_PPC64_ADDR16_DS, /* type */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1135 FALSE, /* pc_relative */
1137 complain_overflow_signed, /* complain_on_overflow */
1138 bfd_elf_generic_reloc, /* special_function */
1139 "R_PPC64_ADDR16_DS", /* name */
1140 FALSE, /* partial_inplace */
1142 0xfffc, /* dst_mask */
1143 FALSE), /* pcrel_offset */
1145 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1146 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1150 FALSE, /* pc_relative */
1152 complain_overflow_dont,/* complain_on_overflow */
1153 bfd_elf_generic_reloc, /* special_function */
1154 "R_PPC64_ADDR16_LO_DS",/* name */
1155 FALSE, /* partial_inplace */
1157 0xfffc, /* dst_mask */
1158 FALSE), /* pcrel_offset */
1160 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1161 HOWTO (R_PPC64_GOT16_DS, /* type */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1165 FALSE, /* pc_relative */
1167 complain_overflow_signed, /* complain_on_overflow */
1168 ppc64_elf_unhandled_reloc, /* special_function */
1169 "R_PPC64_GOT16_DS", /* name */
1170 FALSE, /* partial_inplace */
1172 0xfffc, /* dst_mask */
1173 FALSE), /* pcrel_offset */
1175 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1176 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1178 1, /* size (0 = byte, 1 = short, 2 = long) */
1180 FALSE, /* pc_relative */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_GOT16_LO_DS", /* name */
1185 FALSE, /* partial_inplace */
1187 0xfffc, /* dst_mask */
1188 FALSE), /* pcrel_offset */
1190 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1191 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1193 1, /* size (0 = byte, 1 = short, 2 = long) */
1195 FALSE, /* pc_relative */
1197 complain_overflow_dont, /* complain_on_overflow */
1198 ppc64_elf_unhandled_reloc, /* special_function */
1199 "R_PPC64_PLT16_LO_DS", /* name */
1200 FALSE, /* partial_inplace */
1202 0xfffc, /* dst_mask */
1203 FALSE), /* pcrel_offset */
1205 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1206 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 FALSE, /* pc_relative */
1212 complain_overflow_signed, /* complain_on_overflow */
1213 ppc64_elf_sectoff_reloc, /* special_function */
1214 "R_PPC64_SECTOFF_DS", /* name */
1215 FALSE, /* partial_inplace */
1217 0xfffc, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1220 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1221 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1225 FALSE, /* pc_relative */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc64_elf_sectoff_reloc, /* special_function */
1229 "R_PPC64_SECTOFF_LO_DS",/* name */
1230 FALSE, /* partial_inplace */
1232 0xfffc, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1235 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1236 HOWTO (R_PPC64_TOC16_DS, /* type */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1240 FALSE, /* pc_relative */
1242 complain_overflow_signed, /* complain_on_overflow */
1243 ppc64_elf_toc_reloc, /* special_function */
1244 "R_PPC64_TOC16_DS", /* name */
1245 FALSE, /* partial_inplace */
1247 0xfffc, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1250 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1251 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1255 FALSE, /* pc_relative */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc64_elf_toc_reloc, /* special_function */
1259 "R_PPC64_TOC16_LO_DS", /* name */
1260 FALSE, /* partial_inplace */
1262 0xfffc, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1265 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1266 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1267 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1269 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 FALSE, /* pc_relative */
1273 complain_overflow_signed, /* complain_on_overflow */
1274 ppc64_elf_unhandled_reloc, /* special_function */
1275 "R_PPC64_PLTGOT16_DS", /* name */
1276 FALSE, /* partial_inplace */
1278 0xfffc, /* dst_mask */
1279 FALSE), /* pcrel_offset */
1281 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1282 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1283 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 FALSE, /* pc_relative */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_PLTGOT16_LO_DS",/* name */
1292 FALSE, /* partial_inplace */
1294 0xfffc, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1297 /* Marker relocs for TLS. */
1300 2, /* size (0 = byte, 1 = short, 2 = long) */
1302 FALSE, /* pc_relative */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 bfd_elf_generic_reloc, /* special_function */
1306 "R_PPC64_TLS", /* name */
1307 FALSE, /* partial_inplace */
1310 FALSE), /* pcrel_offset */
1312 HOWTO (R_PPC64_TLSGD,
1314 2, /* size (0 = byte, 1 = short, 2 = long) */
1316 FALSE, /* pc_relative */
1318 complain_overflow_dont, /* complain_on_overflow */
1319 bfd_elf_generic_reloc, /* special_function */
1320 "R_PPC64_TLSGD", /* name */
1321 FALSE, /* partial_inplace */
1324 FALSE), /* pcrel_offset */
1326 HOWTO (R_PPC64_TLSLD,
1328 2, /* size (0 = byte, 1 = short, 2 = long) */
1330 FALSE, /* pc_relative */
1332 complain_overflow_dont, /* complain_on_overflow */
1333 bfd_elf_generic_reloc, /* special_function */
1334 "R_PPC64_TLSLD", /* name */
1335 FALSE, /* partial_inplace */
1338 FALSE), /* pcrel_offset */
1340 /* Marker reloc for optimizing r2 save in prologue rather than on
1341 each plt call stub. */
1342 HOWTO (R_PPC64_TOCSAVE,
1344 2, /* size (0 = byte, 1 = short, 2 = long) */
1346 FALSE, /* pc_relative */
1348 complain_overflow_dont, /* complain_on_overflow */
1349 bfd_elf_generic_reloc, /* special_function */
1350 "R_PPC64_TOCSAVE", /* name */
1351 FALSE, /* partial_inplace */
1354 FALSE), /* pcrel_offset */
1356 /* Marker relocs on inline plt call instructions. */
1357 HOWTO (R_PPC64_PLTSEQ,
1359 2, /* size (0 = byte, 1 = short, 2 = long) */
1361 FALSE, /* pc_relative */
1363 complain_overflow_dont, /* complain_on_overflow */
1364 bfd_elf_generic_reloc, /* special_function */
1365 "R_PPC64_PLTSEQ", /* name */
1366 FALSE, /* partial_inplace */
1369 FALSE), /* pcrel_offset */
1371 HOWTO (R_PPC64_PLTCALL,
1373 2, /* size (0 = byte, 1 = short, 2 = long) */
1375 FALSE, /* pc_relative */
1377 complain_overflow_dont, /* complain_on_overflow */
1378 bfd_elf_generic_reloc, /* special_function */
1379 "R_PPC64_PLTCALL", /* name */
1380 FALSE, /* partial_inplace */
1383 FALSE), /* pcrel_offset */
1385 /* Computes the load module index of the load module that contains the
1386 definition of its TLS sym. */
1387 HOWTO (R_PPC64_DTPMOD64,
1389 4, /* size (0 = byte, 1 = short, 2 = long) */
1391 FALSE, /* pc_relative */
1393 complain_overflow_dont, /* complain_on_overflow */
1394 ppc64_elf_unhandled_reloc, /* special_function */
1395 "R_PPC64_DTPMOD64", /* name */
1396 FALSE, /* partial_inplace */
1398 ONES (64), /* dst_mask */
1399 FALSE), /* pcrel_offset */
1401 /* Computes a dtv-relative displacement, the difference between the value
1402 of sym+add and the base address of the thread-local storage block that
1403 contains the definition of sym, minus 0x8000. */
1404 HOWTO (R_PPC64_DTPREL64,
1406 4, /* size (0 = byte, 1 = short, 2 = long) */
1408 FALSE, /* pc_relative */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_DTPREL64", /* name */
1413 FALSE, /* partial_inplace */
1415 ONES (64), /* dst_mask */
1416 FALSE), /* pcrel_offset */
1418 /* A 16 bit dtprel reloc. */
1419 HOWTO (R_PPC64_DTPREL16,
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1423 FALSE, /* pc_relative */
1425 complain_overflow_signed, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_DTPREL16", /* name */
1428 FALSE, /* partial_inplace */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1433 /* Like DTPREL16, but no overflow. */
1434 HOWTO (R_PPC64_DTPREL16_LO,
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1438 FALSE, /* pc_relative */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_DTPREL16_LO", /* name */
1443 FALSE, /* partial_inplace */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1448 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1449 HOWTO (R_PPC64_DTPREL16_HI,
1450 16, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1453 FALSE, /* pc_relative */
1455 complain_overflow_signed, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_DTPREL16_HI", /* name */
1458 FALSE, /* partial_inplace */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1463 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1464 HOWTO (R_PPC64_DTPREL16_HA,
1465 16, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1468 FALSE, /* pc_relative */
1470 complain_overflow_signed, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_DTPREL16_HA", /* name */
1473 FALSE, /* partial_inplace */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1478 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1479 HOWTO (R_PPC64_DTPREL16_HIGHER,
1480 32, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1483 FALSE, /* pc_relative */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_DTPREL16_HIGHER", /* name */
1488 FALSE, /* partial_inplace */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1493 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1494 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1495 32, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1498 FALSE, /* pc_relative */
1500 complain_overflow_dont, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_DTPREL16_HIGHERA", /* name */
1503 FALSE, /* partial_inplace */
1505 0xffff, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1508 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1509 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1510 48, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1513 FALSE, /* pc_relative */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_DTPREL16_HIGHEST", /* name */
1518 FALSE, /* partial_inplace */
1520 0xffff, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1523 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1524 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1525 48, /* rightshift */
1526 1, /* size (0 = byte, 1 = short, 2 = long) */
1528 FALSE, /* pc_relative */
1530 complain_overflow_dont, /* complain_on_overflow */
1531 ppc64_elf_unhandled_reloc, /* special_function */
1532 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1533 FALSE, /* partial_inplace */
1535 0xffff, /* dst_mask */
1536 FALSE), /* pcrel_offset */
1538 /* Like DTPREL16, but for insns with a DS field. */
1539 HOWTO (R_PPC64_DTPREL16_DS,
1541 1, /* size (0 = byte, 1 = short, 2 = long) */
1543 FALSE, /* pc_relative */
1545 complain_overflow_signed, /* complain_on_overflow */
1546 ppc64_elf_unhandled_reloc, /* special_function */
1547 "R_PPC64_DTPREL16_DS", /* name */
1548 FALSE, /* partial_inplace */
1550 0xfffc, /* dst_mask */
1551 FALSE), /* pcrel_offset */
1553 /* Like DTPREL16_DS, but no overflow. */
1554 HOWTO (R_PPC64_DTPREL16_LO_DS,
1556 1, /* size (0 = byte, 1 = short, 2 = long) */
1558 FALSE, /* pc_relative */
1560 complain_overflow_dont, /* complain_on_overflow */
1561 ppc64_elf_unhandled_reloc, /* special_function */
1562 "R_PPC64_DTPREL16_LO_DS", /* name */
1563 FALSE, /* partial_inplace */
1565 0xfffc, /* dst_mask */
1566 FALSE), /* pcrel_offset */
1568 /* Computes a tp-relative displacement, the difference between the value of
1569 sym+add and the value of the thread pointer (r13). */
1570 HOWTO (R_PPC64_TPREL64,
1572 4, /* size (0 = byte, 1 = short, 2 = long) */
1574 FALSE, /* pc_relative */
1576 complain_overflow_dont, /* complain_on_overflow */
1577 ppc64_elf_unhandled_reloc, /* special_function */
1578 "R_PPC64_TPREL64", /* name */
1579 FALSE, /* partial_inplace */
1581 ONES (64), /* dst_mask */
1582 FALSE), /* pcrel_offset */
1584 /* A 16 bit tprel reloc. */
1585 HOWTO (R_PPC64_TPREL16,
1587 1, /* size (0 = byte, 1 = short, 2 = long) */
1589 FALSE, /* pc_relative */
1591 complain_overflow_signed, /* complain_on_overflow */
1592 ppc64_elf_unhandled_reloc, /* special_function */
1593 "R_PPC64_TPREL16", /* name */
1594 FALSE, /* partial_inplace */
1596 0xffff, /* dst_mask */
1597 FALSE), /* pcrel_offset */
1599 /* Like TPREL16, but no overflow. */
1600 HOWTO (R_PPC64_TPREL16_LO,
1602 1, /* size (0 = byte, 1 = short, 2 = long) */
1604 FALSE, /* pc_relative */
1606 complain_overflow_dont, /* complain_on_overflow */
1607 ppc64_elf_unhandled_reloc, /* special_function */
1608 "R_PPC64_TPREL16_LO", /* name */
1609 FALSE, /* partial_inplace */
1611 0xffff, /* dst_mask */
1612 FALSE), /* pcrel_offset */
1614 /* Like TPREL16_LO, but next higher group of 16 bits. */
1615 HOWTO (R_PPC64_TPREL16_HI,
1616 16, /* rightshift */
1617 1, /* size (0 = byte, 1 = short, 2 = long) */
1619 FALSE, /* pc_relative */
1621 complain_overflow_signed, /* complain_on_overflow */
1622 ppc64_elf_unhandled_reloc, /* special_function */
1623 "R_PPC64_TPREL16_HI", /* name */
1624 FALSE, /* partial_inplace */
1626 0xffff, /* dst_mask */
1627 FALSE), /* pcrel_offset */
1629 /* Like TPREL16_HI, but adjust for low 16 bits. */
1630 HOWTO (R_PPC64_TPREL16_HA,
1631 16, /* rightshift */
1632 1, /* size (0 = byte, 1 = short, 2 = long) */
1634 FALSE, /* pc_relative */
1636 complain_overflow_signed, /* complain_on_overflow */
1637 ppc64_elf_unhandled_reloc, /* special_function */
1638 "R_PPC64_TPREL16_HA", /* name */
1639 FALSE, /* partial_inplace */
1641 0xffff, /* dst_mask */
1642 FALSE), /* pcrel_offset */
1644 /* Like TPREL16_HI, but next higher group of 16 bits. */
1645 HOWTO (R_PPC64_TPREL16_HIGHER,
1646 32, /* rightshift */
1647 1, /* size (0 = byte, 1 = short, 2 = long) */
1649 FALSE, /* pc_relative */
1651 complain_overflow_dont, /* complain_on_overflow */
1652 ppc64_elf_unhandled_reloc, /* special_function */
1653 "R_PPC64_TPREL16_HIGHER", /* name */
1654 FALSE, /* partial_inplace */
1656 0xffff, /* dst_mask */
1657 FALSE), /* pcrel_offset */
1659 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1660 HOWTO (R_PPC64_TPREL16_HIGHERA,
1661 32, /* rightshift */
1662 1, /* size (0 = byte, 1 = short, 2 = long) */
1664 FALSE, /* pc_relative */
1666 complain_overflow_dont, /* complain_on_overflow */
1667 ppc64_elf_unhandled_reloc, /* special_function */
1668 "R_PPC64_TPREL16_HIGHERA", /* name */
1669 FALSE, /* partial_inplace */
1671 0xffff, /* dst_mask */
1672 FALSE), /* pcrel_offset */
1674 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1675 HOWTO (R_PPC64_TPREL16_HIGHEST,
1676 48, /* rightshift */
1677 1, /* size (0 = byte, 1 = short, 2 = long) */
1679 FALSE, /* pc_relative */
1681 complain_overflow_dont, /* complain_on_overflow */
1682 ppc64_elf_unhandled_reloc, /* special_function */
1683 "R_PPC64_TPREL16_HIGHEST", /* name */
1684 FALSE, /* partial_inplace */
1686 0xffff, /* dst_mask */
1687 FALSE), /* pcrel_offset */
1689 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1690 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1691 48, /* rightshift */
1692 1, /* size (0 = byte, 1 = short, 2 = long) */
1694 FALSE, /* pc_relative */
1696 complain_overflow_dont, /* complain_on_overflow */
1697 ppc64_elf_unhandled_reloc, /* special_function */
1698 "R_PPC64_TPREL16_HIGHESTA", /* name */
1699 FALSE, /* partial_inplace */
1701 0xffff, /* dst_mask */
1702 FALSE), /* pcrel_offset */
1704 /* Like TPREL16, but for insns with a DS field. */
1705 HOWTO (R_PPC64_TPREL16_DS,
1707 1, /* size (0 = byte, 1 = short, 2 = long) */
1709 FALSE, /* pc_relative */
1711 complain_overflow_signed, /* complain_on_overflow */
1712 ppc64_elf_unhandled_reloc, /* special_function */
1713 "R_PPC64_TPREL16_DS", /* name */
1714 FALSE, /* partial_inplace */
1716 0xfffc, /* dst_mask */
1717 FALSE), /* pcrel_offset */
1719 /* Like TPREL16_DS, but no overflow. */
1720 HOWTO (R_PPC64_TPREL16_LO_DS,
1722 1, /* size (0 = byte, 1 = short, 2 = long) */
1724 FALSE, /* pc_relative */
1726 complain_overflow_dont, /* complain_on_overflow */
1727 ppc64_elf_unhandled_reloc, /* special_function */
1728 "R_PPC64_TPREL16_LO_DS", /* name */
1729 FALSE, /* partial_inplace */
1731 0xfffc, /* dst_mask */
1732 FALSE), /* pcrel_offset */
1734 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1735 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1736 to the first entry relative to the TOC base (r2). */
1737 HOWTO (R_PPC64_GOT_TLSGD16,
1739 1, /* size (0 = byte, 1 = short, 2 = long) */
1741 FALSE, /* pc_relative */
1743 complain_overflow_signed, /* complain_on_overflow */
1744 ppc64_elf_unhandled_reloc, /* special_function */
1745 "R_PPC64_GOT_TLSGD16", /* name */
1746 FALSE, /* partial_inplace */
1748 0xffff, /* dst_mask */
1749 FALSE), /* pcrel_offset */
1751 /* Like GOT_TLSGD16, but no overflow. */
1752 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1754 1, /* size (0 = byte, 1 = short, 2 = long) */
1756 FALSE, /* pc_relative */
1758 complain_overflow_dont, /* complain_on_overflow */
1759 ppc64_elf_unhandled_reloc, /* special_function */
1760 "R_PPC64_GOT_TLSGD16_LO", /* name */
1761 FALSE, /* partial_inplace */
1763 0xffff, /* dst_mask */
1764 FALSE), /* pcrel_offset */
1766 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1767 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1768 16, /* rightshift */
1769 1, /* size (0 = byte, 1 = short, 2 = long) */
1771 FALSE, /* pc_relative */
1773 complain_overflow_signed, /* complain_on_overflow */
1774 ppc64_elf_unhandled_reloc, /* special_function */
1775 "R_PPC64_GOT_TLSGD16_HI", /* name */
1776 FALSE, /* partial_inplace */
1778 0xffff, /* dst_mask */
1779 FALSE), /* pcrel_offset */
1781 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1782 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1783 16, /* rightshift */
1784 1, /* size (0 = byte, 1 = short, 2 = long) */
1786 FALSE, /* pc_relative */
1788 complain_overflow_signed, /* complain_on_overflow */
1789 ppc64_elf_unhandled_reloc, /* special_function */
1790 "R_PPC64_GOT_TLSGD16_HA", /* name */
1791 FALSE, /* partial_inplace */
1793 0xffff, /* dst_mask */
1794 FALSE), /* pcrel_offset */
1796 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1797 with values (sym+add)@dtpmod and zero, and computes the offset to the
1798 first entry relative to the TOC base (r2). */
1799 HOWTO (R_PPC64_GOT_TLSLD16,
1801 1, /* size (0 = byte, 1 = short, 2 = long) */
1803 FALSE, /* pc_relative */
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc64_elf_unhandled_reloc, /* special_function */
1807 "R_PPC64_GOT_TLSLD16", /* name */
1808 FALSE, /* partial_inplace */
1810 0xffff, /* dst_mask */
1811 FALSE), /* pcrel_offset */
1813 /* Like GOT_TLSLD16, but no overflow. */
1814 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1816 1, /* size (0 = byte, 1 = short, 2 = long) */
1818 FALSE, /* pc_relative */
1820 complain_overflow_dont, /* complain_on_overflow */
1821 ppc64_elf_unhandled_reloc, /* special_function */
1822 "R_PPC64_GOT_TLSLD16_LO", /* name */
1823 FALSE, /* partial_inplace */
1825 0xffff, /* dst_mask */
1826 FALSE), /* pcrel_offset */
1828 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1829 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1830 16, /* rightshift */
1831 1, /* size (0 = byte, 1 = short, 2 = long) */
1833 FALSE, /* pc_relative */
1835 complain_overflow_signed, /* complain_on_overflow */
1836 ppc64_elf_unhandled_reloc, /* special_function */
1837 "R_PPC64_GOT_TLSLD16_HI", /* name */
1838 FALSE, /* partial_inplace */
1840 0xffff, /* dst_mask */
1841 FALSE), /* pcrel_offset */
1843 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1844 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1845 16, /* rightshift */
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1848 FALSE, /* pc_relative */
1850 complain_overflow_signed, /* complain_on_overflow */
1851 ppc64_elf_unhandled_reloc, /* special_function */
1852 "R_PPC64_GOT_TLSLD16_HA", /* name */
1853 FALSE, /* partial_inplace */
1855 0xffff, /* dst_mask */
1856 FALSE), /* pcrel_offset */
1858 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1859 the offset to the entry relative to the TOC base (r2). */
1860 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1862 1, /* size (0 = byte, 1 = short, 2 = long) */
1864 FALSE, /* pc_relative */
1866 complain_overflow_signed, /* complain_on_overflow */
1867 ppc64_elf_unhandled_reloc, /* special_function */
1868 "R_PPC64_GOT_DTPREL16_DS", /* name */
1869 FALSE, /* partial_inplace */
1871 0xfffc, /* dst_mask */
1872 FALSE), /* pcrel_offset */
1874 /* Like GOT_DTPREL16_DS, but no overflow. */
1875 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1877 1, /* size (0 = byte, 1 = short, 2 = long) */
1879 FALSE, /* pc_relative */
1881 complain_overflow_dont, /* complain_on_overflow */
1882 ppc64_elf_unhandled_reloc, /* special_function */
1883 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1884 FALSE, /* partial_inplace */
1886 0xfffc, /* dst_mask */
1887 FALSE), /* pcrel_offset */
1889 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1890 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1891 16, /* rightshift */
1892 1, /* size (0 = byte, 1 = short, 2 = long) */
1894 FALSE, /* pc_relative */
1896 complain_overflow_signed, /* complain_on_overflow */
1897 ppc64_elf_unhandled_reloc, /* special_function */
1898 "R_PPC64_GOT_DTPREL16_HI", /* name */
1899 FALSE, /* partial_inplace */
1901 0xffff, /* dst_mask */
1902 FALSE), /* pcrel_offset */
1904 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1905 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1906 16, /* rightshift */
1907 1, /* size (0 = byte, 1 = short, 2 = long) */
1909 FALSE, /* pc_relative */
1911 complain_overflow_signed, /* complain_on_overflow */
1912 ppc64_elf_unhandled_reloc, /* special_function */
1913 "R_PPC64_GOT_DTPREL16_HA", /* name */
1914 FALSE, /* partial_inplace */
1916 0xffff, /* dst_mask */
1917 FALSE), /* pcrel_offset */
1919 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1920 offset to the entry relative to the TOC base (r2). */
1921 HOWTO (R_PPC64_GOT_TPREL16_DS,
1923 1, /* size (0 = byte, 1 = short, 2 = long) */
1925 FALSE, /* pc_relative */
1927 complain_overflow_signed, /* complain_on_overflow */
1928 ppc64_elf_unhandled_reloc, /* special_function */
1929 "R_PPC64_GOT_TPREL16_DS", /* name */
1930 FALSE, /* partial_inplace */
1932 0xfffc, /* dst_mask */
1933 FALSE), /* pcrel_offset */
1935 /* Like GOT_TPREL16_DS, but no overflow. */
1936 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1938 1, /* size (0 = byte, 1 = short, 2 = long) */
1940 FALSE, /* pc_relative */
1942 complain_overflow_dont, /* complain_on_overflow */
1943 ppc64_elf_unhandled_reloc, /* special_function */
1944 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1945 FALSE, /* partial_inplace */
1947 0xfffc, /* dst_mask */
1948 FALSE), /* pcrel_offset */
1950 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1951 HOWTO (R_PPC64_GOT_TPREL16_HI,
1952 16, /* rightshift */
1953 1, /* size (0 = byte, 1 = short, 2 = long) */
1955 FALSE, /* pc_relative */
1957 complain_overflow_signed, /* complain_on_overflow */
1958 ppc64_elf_unhandled_reloc, /* special_function */
1959 "R_PPC64_GOT_TPREL16_HI", /* name */
1960 FALSE, /* partial_inplace */
1962 0xffff, /* dst_mask */
1963 FALSE), /* pcrel_offset */
1965 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1966 HOWTO (R_PPC64_GOT_TPREL16_HA,
1967 16, /* rightshift */
1968 1, /* size (0 = byte, 1 = short, 2 = long) */
1970 FALSE, /* pc_relative */
1972 complain_overflow_signed, /* complain_on_overflow */
1973 ppc64_elf_unhandled_reloc, /* special_function */
1974 "R_PPC64_GOT_TPREL16_HA", /* name */
1975 FALSE, /* partial_inplace */
1977 0xffff, /* dst_mask */
1978 FALSE), /* pcrel_offset */
1980 HOWTO (R_PPC64_JMP_IREL, /* type */
1982 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1984 FALSE, /* pc_relative */
1986 complain_overflow_dont, /* complain_on_overflow */
1987 ppc64_elf_unhandled_reloc, /* special_function */
1988 "R_PPC64_JMP_IREL", /* name */
1989 FALSE, /* partial_inplace */
1992 FALSE), /* pcrel_offset */
1994 HOWTO (R_PPC64_IRELATIVE, /* type */
1996 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1998 FALSE, /* pc_relative */
2000 complain_overflow_dont, /* complain_on_overflow */
2001 bfd_elf_generic_reloc, /* special_function */
2002 "R_PPC64_IRELATIVE", /* name */
2003 FALSE, /* partial_inplace */
2005 ONES (64), /* dst_mask */
2006 FALSE), /* pcrel_offset */
2008 /* A 16 bit relative relocation. */
2009 HOWTO (R_PPC64_REL16, /* type */
2011 1, /* size (0 = byte, 1 = short, 2 = long) */
2013 TRUE, /* pc_relative */
2015 complain_overflow_signed, /* complain_on_overflow */
2016 bfd_elf_generic_reloc, /* special_function */
2017 "R_PPC64_REL16", /* name */
2018 FALSE, /* partial_inplace */
2020 0xffff, /* dst_mask */
2021 TRUE), /* pcrel_offset */
2023 /* A 16 bit relative relocation without overflow. */
2024 HOWTO (R_PPC64_REL16_LO, /* type */
2026 1, /* size (0 = byte, 1 = short, 2 = long) */
2028 TRUE, /* pc_relative */
2030 complain_overflow_dont,/* complain_on_overflow */
2031 bfd_elf_generic_reloc, /* special_function */
2032 "R_PPC64_REL16_LO", /* name */
2033 FALSE, /* partial_inplace */
2035 0xffff, /* dst_mask */
2036 TRUE), /* pcrel_offset */
2038 /* The high order 16 bits of a relative address. */
2039 HOWTO (R_PPC64_REL16_HI, /* type */
2040 16, /* rightshift */
2041 1, /* size (0 = byte, 1 = short, 2 = long) */
2043 TRUE, /* pc_relative */
2045 complain_overflow_signed, /* complain_on_overflow */
2046 bfd_elf_generic_reloc, /* special_function */
2047 "R_PPC64_REL16_HI", /* name */
2048 FALSE, /* partial_inplace */
2050 0xffff, /* dst_mask */
2051 TRUE), /* pcrel_offset */
2053 /* The high order 16 bits of a relative address, plus 1 if the contents of
2054 the low 16 bits, treated as a signed number, is negative. */
2055 HOWTO (R_PPC64_REL16_HA, /* type */
2056 16, /* rightshift */
2057 1, /* size (0 = byte, 1 = short, 2 = long) */
2059 TRUE, /* pc_relative */
2061 complain_overflow_signed, /* complain_on_overflow */
2062 ppc64_elf_ha_reloc, /* special_function */
2063 "R_PPC64_REL16_HA", /* name */
2064 FALSE, /* partial_inplace */
2066 0xffff, /* dst_mask */
2067 TRUE), /* pcrel_offset */
2069 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2070 HOWTO (R_PPC64_REL16DX_HA, /* type */
2071 16, /* rightshift */
2072 2, /* size (0 = byte, 1 = short, 2 = long) */
2074 TRUE, /* pc_relative */
2076 complain_overflow_signed, /* complain_on_overflow */
2077 ppc64_elf_ha_reloc, /* special_function */
2078 "R_PPC64_REL16DX_HA", /* name */
2079 FALSE, /* partial_inplace */
2081 0x1fffc1, /* dst_mask */
2082 TRUE), /* pcrel_offset */
2084 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
2085 HOWTO (R_PPC64_16DX_HA, /* type */
2086 16, /* rightshift */
2087 2, /* size (0 = byte, 1 = short, 2 = long) */
2089 FALSE, /* pc_relative */
2091 complain_overflow_signed, /* complain_on_overflow */
2092 ppc64_elf_ha_reloc, /* special_function */
2093 "R_PPC64_16DX_HA", /* name */
2094 FALSE, /* partial_inplace */
2096 0x1fffc1, /* dst_mask */
2097 FALSE), /* pcrel_offset */
2099 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2100 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2101 16, /* rightshift */
2102 1, /* size (0 = byte, 1 = short, 2 = long) */
2104 FALSE, /* pc_relative */
2106 complain_overflow_dont, /* complain_on_overflow */
2107 bfd_elf_generic_reloc, /* special_function */
2108 "R_PPC64_ADDR16_HIGH", /* name */
2109 FALSE, /* partial_inplace */
2111 0xffff, /* dst_mask */
2112 FALSE), /* pcrel_offset */
2114 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2115 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2116 16, /* rightshift */
2117 1, /* size (0 = byte, 1 = short, 2 = long) */
2119 FALSE, /* pc_relative */
2121 complain_overflow_dont, /* complain_on_overflow */
2122 ppc64_elf_ha_reloc, /* special_function */
2123 "R_PPC64_ADDR16_HIGHA", /* name */
2124 FALSE, /* partial_inplace */
2126 0xffff, /* dst_mask */
2127 FALSE), /* pcrel_offset */
2129 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2130 HOWTO (R_PPC64_DTPREL16_HIGH,
2131 16, /* rightshift */
2132 1, /* size (0 = byte, 1 = short, 2 = long) */
2134 FALSE, /* pc_relative */
2136 complain_overflow_dont, /* complain_on_overflow */
2137 ppc64_elf_unhandled_reloc, /* special_function */
2138 "R_PPC64_DTPREL16_HIGH", /* name */
2139 FALSE, /* partial_inplace */
2141 0xffff, /* dst_mask */
2142 FALSE), /* pcrel_offset */
2144 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2145 HOWTO (R_PPC64_DTPREL16_HIGHA,
2146 16, /* rightshift */
2147 1, /* size (0 = byte, 1 = short, 2 = long) */
2149 FALSE, /* pc_relative */
2151 complain_overflow_dont, /* complain_on_overflow */
2152 ppc64_elf_unhandled_reloc, /* special_function */
2153 "R_PPC64_DTPREL16_HIGHA", /* name */
2154 FALSE, /* partial_inplace */
2156 0xffff, /* dst_mask */
2157 FALSE), /* pcrel_offset */
2159 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2160 HOWTO (R_PPC64_TPREL16_HIGH,
2161 16, /* rightshift */
2162 1, /* size (0 = byte, 1 = short, 2 = long) */
2164 FALSE, /* pc_relative */
2166 complain_overflow_dont, /* complain_on_overflow */
2167 ppc64_elf_unhandled_reloc, /* special_function */
2168 "R_PPC64_TPREL16_HIGH", /* name */
2169 FALSE, /* partial_inplace */
2171 0xffff, /* dst_mask */
2172 FALSE), /* pcrel_offset */
2174 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2175 HOWTO (R_PPC64_TPREL16_HIGHA,
2176 16, /* rightshift */
2177 1, /* size (0 = byte, 1 = short, 2 = long) */
2179 FALSE, /* pc_relative */
2181 complain_overflow_dont, /* complain_on_overflow */
2182 ppc64_elf_unhandled_reloc, /* special_function */
2183 "R_PPC64_TPREL16_HIGHA", /* name */
2184 FALSE, /* partial_inplace */
2186 0xffff, /* dst_mask */
2187 FALSE), /* pcrel_offset */
2189 /* Marker reloc on ELFv2 large-model function entry. */
2190 HOWTO (R_PPC64_ENTRY,
2192 2, /* size (0 = byte, 1 = short, 2 = long) */
2194 FALSE, /* pc_relative */
2196 complain_overflow_dont, /* complain_on_overflow */
2197 bfd_elf_generic_reloc, /* special_function */
2198 "R_PPC64_ENTRY", /* name */
2199 FALSE, /* partial_inplace */
2202 FALSE), /* pcrel_offset */
2204 /* Like ADDR64, but use local entry point of function. */
2205 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2207 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2209 FALSE, /* pc_relative */
2211 complain_overflow_dont, /* complain_on_overflow */
2212 bfd_elf_generic_reloc, /* special_function */
2213 "R_PPC64_ADDR64_LOCAL", /* name */
2214 FALSE, /* partial_inplace */
2216 ONES (64), /* dst_mask */
2217 FALSE), /* pcrel_offset */
2219 /* GNU extension to record C++ vtable hierarchy. */
2220 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2222 0, /* size (0 = byte, 1 = short, 2 = long) */
2224 FALSE, /* pc_relative */
2226 complain_overflow_dont, /* complain_on_overflow */
2227 NULL, /* special_function */
2228 "R_PPC64_GNU_VTINHERIT", /* name */
2229 FALSE, /* partial_inplace */
2232 FALSE), /* pcrel_offset */
2234 /* GNU extension to record C++ vtable member usage. */
2235 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2237 0, /* size (0 = byte, 1 = short, 2 = long) */
2239 FALSE, /* pc_relative */
2241 complain_overflow_dont, /* complain_on_overflow */
2242 NULL, /* special_function */
2243 "R_PPC64_GNU_VTENTRY", /* name */
2244 FALSE, /* partial_inplace */
2247 FALSE), /* pcrel_offset */
2251 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
2255 ppc_howto_init (void)
2257 unsigned int i, type;
2259 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2261 type = ppc64_elf_howto_raw[i].type;
2262 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
2263 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2267 static reloc_howto_type *
2268 ppc64_elf_reloc_type_lookup (bfd *abfd,
2269 bfd_reloc_code_real_type code)
2271 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
2273 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2274 /* Initialize howto table if needed. */
2280 /* xgettext:c-format */
2281 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd, (int) code);
2282 bfd_set_error (bfd_error_bad_value);
2285 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2287 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2289 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2291 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2293 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2295 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2297 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2299 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
2301 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2303 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
2305 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
2307 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
2309 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
2311 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
2313 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
2315 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
2317 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
2319 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
2321 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
2323 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
2325 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
2327 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
2329 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
2331 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
2333 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
2335 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
2337 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
2339 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
2341 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
2343 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
2345 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
2347 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
2349 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
2351 case BFD_RELOC_64: r = R_PPC64_ADDR64;
2353 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
2355 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
2357 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
2359 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
2361 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
2363 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
2365 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
2367 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
2369 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
2371 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
2373 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
2375 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2377 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2379 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2381 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2383 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2385 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2387 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2389 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2391 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2393 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2395 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2397 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2399 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2401 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2403 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2405 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2407 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2409 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2411 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2413 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2415 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2417 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2419 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2421 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2423 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2425 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2427 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2429 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2431 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2433 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2435 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2437 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2441 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2443 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2445 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2447 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2449 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2451 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2453 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2455 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2457 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2459 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2461 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2463 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2465 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2467 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2469 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2471 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2473 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2475 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2477 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2479 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2481 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2483 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2485 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2487 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2489 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2491 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2493 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2495 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2497 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2499 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2501 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2503 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2505 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2507 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
2509 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2511 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2513 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2515 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2517 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2521 return ppc64_elf_howto_table[r];
2524 static reloc_howto_type *
2525 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2530 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2531 if (ppc64_elf_howto_raw[i].name != NULL
2532 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2533 return &ppc64_elf_howto_raw[i];
2539 /* Set the howto pointer for a PowerPC ELF reloc. */
2542 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
2543 Elf_Internal_Rela *dst)
2547 /* Initialize howto table if needed. */
2548 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2551 type = ELF64_R_TYPE (dst->r_info);
2552 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
2554 /* xgettext:c-format */
2555 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2557 bfd_set_error (bfd_error_bad_value);
2560 cache_ptr->howto = ppc64_elf_howto_table[type];
2561 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
2563 /* xgettext:c-format */
2564 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2566 bfd_set_error (bfd_error_bad_value);
2573 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2575 static bfd_reloc_status_type
2576 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2577 void *data, asection *input_section,
2578 bfd *output_bfd, char **error_message)
2580 enum elf_ppc64_reloc_type r_type;
2582 bfd_size_type octets;
2585 /* If this is a relocatable link (output_bfd test tells us), just
2586 call the generic function. Any adjustment will be done at final
2588 if (output_bfd != NULL)
2589 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2590 input_section, output_bfd, error_message);
2592 /* Adjust the addend for sign extension of the low 16 bits.
2593 We won't actually be using the low 16 bits, so trashing them
2595 reloc_entry->addend += 0x8000;
2596 r_type = reloc_entry->howto->type;
2597 if (r_type != R_PPC64_REL16DX_HA)
2598 return bfd_reloc_continue;
2601 if (!bfd_is_com_section (symbol->section))
2602 value = symbol->value;
2603 value += (reloc_entry->addend
2604 + symbol->section->output_offset
2605 + symbol->section->output_section->vma);
2606 value -= (reloc_entry->address
2607 + input_section->output_offset
2608 + input_section->output_section->vma);
2609 value = (bfd_signed_vma) value >> 16;
2611 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2612 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2614 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2615 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2616 if (value + 0x8000 > 0xffff)
2617 return bfd_reloc_overflow;
2618 return bfd_reloc_ok;
2621 static bfd_reloc_status_type
2622 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2623 void *data, asection *input_section,
2624 bfd *output_bfd, char **error_message)
2626 if (output_bfd != NULL)
2627 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2628 input_section, output_bfd, error_message);
2630 if (strcmp (symbol->section->name, ".opd") == 0
2631 && (symbol->section->owner->flags & DYNAMIC) == 0)
2633 bfd_vma dest = opd_entry_value (symbol->section,
2634 symbol->value + reloc_entry->addend,
2636 if (dest != (bfd_vma) -1)
2637 reloc_entry->addend = dest - (symbol->value
2638 + symbol->section->output_section->vma
2639 + symbol->section->output_offset);
2643 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2645 if (symbol->section->owner != abfd
2646 && symbol->section->owner != NULL
2647 && abiversion (symbol->section->owner) >= 2)
2651 for (i = 0; i < symbol->section->owner->symcount; ++i)
2653 asymbol *symdef = symbol->section->owner->outsymbols[i];
2655 if (strcmp (symdef->name, symbol->name) == 0)
2657 elfsym = (elf_symbol_type *) symdef;
2663 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2665 return bfd_reloc_continue;
2668 static bfd_reloc_status_type
2669 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2670 void *data, asection *input_section,
2671 bfd *output_bfd, char **error_message)
2674 enum elf_ppc64_reloc_type r_type;
2675 bfd_size_type octets;
2676 /* Assume 'at' branch hints. */
2677 bfd_boolean is_isa_v2 = TRUE;
2679 /* If this is a relocatable link (output_bfd test tells us), just
2680 call the generic function. Any adjustment will be done at final
2682 if (output_bfd != NULL)
2683 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2684 input_section, output_bfd, error_message);
2686 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2687 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2688 insn &= ~(0x01 << 21);
2689 r_type = reloc_entry->howto->type;
2690 if (r_type == R_PPC64_ADDR14_BRTAKEN
2691 || r_type == R_PPC64_REL14_BRTAKEN)
2692 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2696 /* Set 'a' bit. This is 0b00010 in BO field for branch
2697 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2698 for branch on CTR insns (BO == 1a00t or 1a01t). */
2699 if ((insn & (0x14 << 21)) == (0x04 << 21))
2701 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2711 if (!bfd_is_com_section (symbol->section))
2712 target = symbol->value;
2713 target += symbol->section->output_section->vma;
2714 target += symbol->section->output_offset;
2715 target += reloc_entry->addend;
2717 from = (reloc_entry->address
2718 + input_section->output_offset
2719 + input_section->output_section->vma);
2721 /* Invert 'y' bit if not the default. */
2722 if ((bfd_signed_vma) (target - from) < 0)
2725 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2727 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2728 input_section, output_bfd, error_message);
2731 static bfd_reloc_status_type
2732 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2733 void *data, asection *input_section,
2734 bfd *output_bfd, char **error_message)
2736 /* If this is a relocatable link (output_bfd test tells us), just
2737 call the generic function. Any adjustment will be done at final
2739 if (output_bfd != NULL)
2740 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2741 input_section, output_bfd, error_message);
2743 /* Subtract the symbol section base address. */
2744 reloc_entry->addend -= symbol->section->output_section->vma;
2745 return bfd_reloc_continue;
2748 static bfd_reloc_status_type
2749 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2750 void *data, asection *input_section,
2751 bfd *output_bfd, char **error_message)
2753 /* If this is a relocatable link (output_bfd test tells us), just
2754 call the generic function. Any adjustment will be done at final
2756 if (output_bfd != NULL)
2757 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2758 input_section, output_bfd, error_message);
2760 /* Subtract the symbol section base address. */
2761 reloc_entry->addend -= symbol->section->output_section->vma;
2763 /* Adjust the addend for sign extension of the low 16 bits. */
2764 reloc_entry->addend += 0x8000;
2765 return bfd_reloc_continue;
2768 static bfd_reloc_status_type
2769 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2770 void *data, asection *input_section,
2771 bfd *output_bfd, char **error_message)
2775 /* If this is a relocatable link (output_bfd test tells us), just
2776 call the generic function. Any adjustment will be done at final
2778 if (output_bfd != NULL)
2779 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2780 input_section, output_bfd, error_message);
2782 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2784 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2786 /* Subtract the TOC base address. */
2787 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2788 return bfd_reloc_continue;
2791 static bfd_reloc_status_type
2792 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2793 void *data, asection *input_section,
2794 bfd *output_bfd, char **error_message)
2798 /* If this is a relocatable link (output_bfd test tells us), just
2799 call the generic function. Any adjustment will be done at final
2801 if (output_bfd != NULL)
2802 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2803 input_section, output_bfd, error_message);
2805 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2807 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2809 /* Subtract the TOC base address. */
2810 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2812 /* Adjust the addend for sign extension of the low 16 bits. */
2813 reloc_entry->addend += 0x8000;
2814 return bfd_reloc_continue;
2817 static bfd_reloc_status_type
2818 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2819 void *data, asection *input_section,
2820 bfd *output_bfd, char **error_message)
2823 bfd_size_type octets;
2825 /* If this is a relocatable link (output_bfd test tells us), just
2826 call the generic function. Any adjustment will be done at final
2828 if (output_bfd != NULL)
2829 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2830 input_section, output_bfd, error_message);
2832 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2834 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2836 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2837 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2838 return bfd_reloc_ok;
2841 static bfd_reloc_status_type
2842 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2843 void *data, asection *input_section,
2844 bfd *output_bfd, char **error_message)
2846 /* If this is a relocatable link (output_bfd test tells us), just
2847 call the generic function. Any adjustment will be done at final
2849 if (output_bfd != NULL)
2850 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2851 input_section, output_bfd, error_message);
2853 if (error_message != NULL)
2855 static char buf[60];
2856 sprintf (buf, "generic linker can't handle %s",
2857 reloc_entry->howto->name);
2858 *error_message = buf;
2860 return bfd_reloc_dangerous;
2863 /* Track GOT entries needed for a given symbol. We might need more
2864 than one got entry per symbol. */
2867 struct got_entry *next;
2869 /* The symbol addend that we'll be placing in the GOT. */
2872 /* Unlike other ELF targets, we use separate GOT entries for the same
2873 symbol referenced from different input files. This is to support
2874 automatic multiple TOC/GOT sections, where the TOC base can vary
2875 from one input file to another. After partitioning into TOC groups
2876 we merge entries within the group.
2878 Point to the BFD owning this GOT entry. */
2881 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2882 TLS_TPREL or TLS_DTPREL for tls entries. */
2883 unsigned char tls_type;
2885 /* Non-zero if got.ent points to real entry. */
2886 unsigned char is_indirect;
2888 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2891 bfd_signed_vma refcount;
2893 struct got_entry *ent;
2897 /* The same for PLT. */
2900 struct plt_entry *next;
2906 bfd_signed_vma refcount;
2911 struct ppc64_elf_obj_tdata
2913 struct elf_obj_tdata elf;
2915 /* Shortcuts to dynamic linker sections. */
2919 /* Used during garbage collection. We attach global symbols defined
2920 on removed .opd entries to this section so that the sym is removed. */
2921 asection *deleted_section;
2923 /* TLS local dynamic got entry handling. Support for multiple GOT
2924 sections means we potentially need one of these for each input bfd. */
2925 struct got_entry tlsld_got;
2928 /* A copy of relocs before they are modified for --emit-relocs. */
2929 Elf_Internal_Rela *relocs;
2931 /* Section contents. */
2935 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2936 the reloc to be in the range -32768 to 32767. */
2937 unsigned int has_small_toc_reloc : 1;
2939 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2940 instruction not one we handle. */
2941 unsigned int unexpected_toc_insn : 1;
2944 #define ppc64_elf_tdata(bfd) \
2945 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2947 #define ppc64_tlsld_got(bfd) \
2948 (&ppc64_elf_tdata (bfd)->tlsld_got)
2950 #define is_ppc64_elf(bfd) \
2951 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2952 && elf_object_id (bfd) == PPC64_ELF_DATA)
2954 /* Override the generic function because we store some extras. */
2957 ppc64_elf_mkobject (bfd *abfd)
2959 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
2963 /* Fix bad default arch selected for a 64 bit input bfd when the
2964 default is 32 bit. Also select arch based on apuinfo. */
2967 ppc64_elf_object_p (bfd *abfd)
2969 if (!abfd->arch_info->the_default)
2972 if (abfd->arch_info->bits_per_word == 32)
2974 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2976 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2978 /* Relies on arch after 32 bit default being 64 bit default. */
2979 abfd->arch_info = abfd->arch_info->next;
2980 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2983 return _bfd_elf_ppc_set_arch (abfd);
2986 /* Support for core dump NOTE sections. */
2989 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2991 size_t offset, size;
2993 if (note->descsz != 504)
2997 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3000 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3006 /* Make a ".reg/999" section. */
3007 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3008 size, note->descpos + offset);
3012 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3014 if (note->descsz != 136)
3017 elf_tdata (abfd)->core->pid
3018 = bfd_get_32 (abfd, note->descdata + 24);
3019 elf_tdata (abfd)->core->program
3020 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3021 elf_tdata (abfd)->core->command
3022 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3028 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
3038 char data[136] ATTRIBUTE_NONSTRING;
3041 va_start (ap, note_type);
3042 memset (data, 0, sizeof (data));
3043 strncpy (data + 40, va_arg (ap, const char *), 16);
3044 strncpy (data + 56, va_arg (ap, const char *), 80);
3046 return elfcore_write_note (abfd, buf, bufsiz,
3047 "CORE", note_type, data, sizeof (data));
3058 va_start (ap, note_type);
3059 memset (data, 0, 112);
3060 pid = va_arg (ap, long);
3061 bfd_put_32 (abfd, pid, data + 32);
3062 cursig = va_arg (ap, int);
3063 bfd_put_16 (abfd, cursig, data + 12);
3064 greg = va_arg (ap, const void *);
3065 memcpy (data + 112, greg, 384);
3066 memset (data + 496, 0, 8);
3068 return elfcore_write_note (abfd, buf, bufsiz,
3069 "CORE", note_type, data, sizeof (data));
3074 /* Add extra PPC sections. */
3076 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
3078 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3079 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3080 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3081 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3082 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3083 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3084 { NULL, 0, 0, 0, 0 }
3087 enum _ppc64_sec_type {
3093 struct _ppc64_elf_section_data
3095 struct bfd_elf_section_data elf;
3099 /* An array with one entry for each opd function descriptor,
3100 and some spares since opd entries may be either 16 or 24 bytes. */
3101 #define OPD_NDX(OFF) ((OFF) >> 4)
3102 struct _opd_sec_data
3104 /* Points to the function code section for local opd entries. */
3105 asection **func_sec;
3107 /* After editing .opd, adjust references to opd local syms. */
3111 /* An array for toc sections, indexed by offset/8. */
3112 struct _toc_sec_data
3114 /* Specifies the relocation symbol index used at a given toc offset. */
3117 /* And the relocation addend. */
3122 enum _ppc64_sec_type sec_type:2;
3124 /* Flag set when small branches are detected. Used to
3125 select suitable defaults for the stub group size. */
3126 unsigned int has_14bit_branch:1;
3128 /* Flag set when PLTCALL relocs are detected. */
3129 unsigned int has_pltcall:1;
3132 #define ppc64_elf_section_data(sec) \
3133 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
3136 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
3138 if (!sec->used_by_bfd)
3140 struct _ppc64_elf_section_data *sdata;
3141 bfd_size_type amt = sizeof (*sdata);
3143 sdata = bfd_zalloc (abfd, amt);
3146 sec->used_by_bfd = sdata;
3149 return _bfd_elf_new_section_hook (abfd, sec);
3152 static struct _opd_sec_data *
3153 get_opd_info (asection * sec)
3156 && ppc64_elf_section_data (sec) != NULL
3157 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
3158 return &ppc64_elf_section_data (sec)->u.opd;
3162 /* Parameters for the qsort hook. */
3163 static bfd_boolean synthetic_relocatable;
3164 static asection *synthetic_opd;
3166 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3169 compare_symbols (const void *ap, const void *bp)
3171 const asymbol *a = * (const asymbol **) ap;
3172 const asymbol *b = * (const asymbol **) bp;
3174 /* Section symbols first. */
3175 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
3177 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
3180 /* then .opd symbols. */
3181 if (synthetic_opd != NULL)
3183 if (strcmp (a->section->name, ".opd") == 0
3184 && strcmp (b->section->name, ".opd") != 0)
3186 if (strcmp (a->section->name, ".opd") != 0
3187 && strcmp (b->section->name, ".opd") == 0)
3191 /* then other code symbols. */
3192 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3193 == (SEC_CODE | SEC_ALLOC)
3194 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3195 != (SEC_CODE | SEC_ALLOC))
3198 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3199 != (SEC_CODE | SEC_ALLOC)
3200 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3201 == (SEC_CODE | SEC_ALLOC))
3204 if (synthetic_relocatable)
3206 if (a->section->id < b->section->id)
3209 if (a->section->id > b->section->id)
3213 if (a->value + a->section->vma < b->value + b->section->vma)
3216 if (a->value + a->section->vma > b->value + b->section->vma)
3219 /* For syms with the same value, prefer strong dynamic global function
3220 syms over other syms. */
3221 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3224 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3227 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3230 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3233 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3236 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3239 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3242 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3248 /* Search SYMS for a symbol of the given VALUE. */
3251 sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
3255 if (id == (unsigned) -1)
3259 mid = (lo + hi) >> 1;
3260 if (syms[mid]->value + syms[mid]->section->vma < value)
3262 else if (syms[mid]->value + syms[mid]->section->vma > value)
3272 mid = (lo + hi) >> 1;
3273 if (syms[mid]->section->id < id)
3275 else if (syms[mid]->section->id > id)
3277 else if (syms[mid]->value < value)
3279 else if (syms[mid]->value > value)
3289 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3291 bfd_vma vma = *(bfd_vma *) ptr;
3292 return ((section->flags & SEC_ALLOC) != 0
3293 && section->vma <= vma
3294 && vma < section->vma + section->size);
3297 /* Create synthetic symbols, effectively restoring "dot-symbol" function
3298 entry syms. Also generate @plt symbols for the glink branch table.
3299 Returns count of synthetic symbols in RET or -1 on error. */
3302 ppc64_elf_get_synthetic_symtab (bfd *abfd,
3303 long static_count, asymbol **static_syms,
3304 long dyn_count, asymbol **dyn_syms,
3310 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
3311 asection *opd = NULL;
3312 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
3314 int abi = abiversion (abfd);
3320 opd = bfd_get_section_by_name (abfd, ".opd");
3321 if (opd == NULL && abi == 1)
3333 symcount = static_count;
3335 symcount += dyn_count;
3339 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3343 if (!relocatable && static_count != 0 && dyn_count != 0)
3345 /* Use both symbol tables. */
3346 memcpy (syms, static_syms, static_count * sizeof (*syms));
3347 memcpy (syms + static_count, dyn_syms,
3348 (dyn_count + 1) * sizeof (*syms));
3350 else if (!relocatable && static_count == 0)
3351 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3353 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3355 /* Trim uninteresting symbols. Interesting symbols are section,
3356 function, and notype symbols. */
3357 for (i = 0, j = 0; i < symcount; ++i)
3358 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
3359 | BSF_RELC | BSF_SRELC)) == 0)
3360 syms[j++] = syms[i];
3363 synthetic_relocatable = relocatable;
3364 synthetic_opd = opd;
3365 qsort (syms, symcount, sizeof (*syms), compare_symbols);
3367 if (!relocatable && symcount > 1)
3369 /* Trim duplicate syms, since we may have merged the normal
3370 and dynamic symbols. Actually, we only care about syms
3371 that have different values, so trim any with the same
3372 value. Don't consider ifunc and ifunc resolver symbols
3373 duplicates however, because GDB wants to know whether a
3374 text symbol is an ifunc resolver. */
3375 for (i = 1, j = 1; i < symcount; ++i)
3377 const asymbol *s0 = syms[i - 1];
3378 const asymbol *s1 = syms[i];
3380 if ((s0->value + s0->section->vma
3381 != s1->value + s1->section->vma)
3382 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
3383 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
3384 syms[j++] = syms[i];
3390 /* Note that here and in compare_symbols we can't compare opd and
3391 sym->section directly. With separate debug info files, the
3392 symbols will be extracted from the debug file while abfd passed
3393 to this function is the real binary. */
3394 if (strcmp (syms[i]->section->name, ".opd") == 0)
3398 for (; i < symcount; ++i)
3399 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
3400 | SEC_THREAD_LOCAL))
3401 != (SEC_CODE | SEC_ALLOC))
3402 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3406 for (; i < symcount; ++i)
3407 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3411 for (; i < symcount; ++i)
3412 if (strcmp (syms[i]->section->name, ".opd") != 0)
3416 for (; i < symcount; ++i)
3417 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3418 != (SEC_CODE | SEC_ALLOC))
3426 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3431 if (opdsymend == secsymend)
3434 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3435 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
3439 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3446 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3450 while (r < opd->relocation + relcount
3451 && r->address < syms[i]->value + opd->vma)
3454 if (r == opd->relocation + relcount)
3457 if (r->address != syms[i]->value + opd->vma)
3460 if (r->howto->type != R_PPC64_ADDR64)
3463 sym = *r->sym_ptr_ptr;
3464 if (!sym_exists_at (syms, opdsymend, symcount,
3465 sym->section->id, sym->value + r->addend))
3468 size += sizeof (asymbol);
3469 size += strlen (syms[i]->name) + 2;
3475 s = *ret = bfd_malloc (size);
3482 names = (char *) (s + count);
3484 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3488 while (r < opd->relocation + relcount
3489 && r->address < syms[i]->value + opd->vma)
3492 if (r == opd->relocation + relcount)
3495 if (r->address != syms[i]->value + opd->vma)
3498 if (r->howto->type != R_PPC64_ADDR64)
3501 sym = *r->sym_ptr_ptr;
3502 if (!sym_exists_at (syms, opdsymend, symcount,
3503 sym->section->id, sym->value + r->addend))
3508 s->flags |= BSF_SYNTHETIC;
3509 s->section = sym->section;
3510 s->value = sym->value + r->addend;
3513 len = strlen (syms[i]->name);
3514 memcpy (names, syms[i]->name, len + 1);
3516 /* Have udata.p point back to the original symbol this
3517 synthetic symbol was derived from. */
3518 s->udata.p = syms[i];
3525 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3526 bfd_byte *contents = NULL;
3528 size_t plt_count = 0;
3529 bfd_vma glink_vma = 0, resolv_vma = 0;
3530 asection *dynamic, *glink = NULL, *relplt = NULL;
3533 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
3535 free_contents_and_exit_err:
3537 free_contents_and_exit:
3544 for (i = secsymend; i < opdsymend; ++i)
3548 /* Ignore bogus symbols. */
3549 if (syms[i]->value > opd->size - 8)
3552 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3553 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3556 size += sizeof (asymbol);
3557 size += strlen (syms[i]->name) + 2;
3561 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3563 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
3565 bfd_byte *dynbuf, *extdyn, *extdynend;
3567 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3569 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
3570 goto free_contents_and_exit_err;
3572 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3573 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3576 extdynend = extdyn + dynamic->size;
3577 for (; extdyn < extdynend; extdyn += extdynsize)
3579 Elf_Internal_Dyn dyn;
3580 (*swap_dyn_in) (abfd, extdyn, &dyn);
3582 if (dyn.d_tag == DT_NULL)
3585 if (dyn.d_tag == DT_PPC64_GLINK)
3587 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
3588 See comment in ppc64_elf_finish_dynamic_sections. */
3589 glink_vma = dyn.d_un.d_val + 8 * 4;
3590 /* The .glink section usually does not survive the final
3591 link; search for the section (usually .text) where the
3592 glink stubs now reside. */
3593 glink = bfd_sections_find_if (abfd, section_covers_vma,
3604 /* Determine __glink trampoline by reading the relative branch
3605 from the first glink stub. */
3607 unsigned int off = 0;
3609 while (bfd_get_section_contents (abfd, glink, buf,
3610 glink_vma + off - glink->vma, 4))
3612 unsigned int insn = bfd_get_32 (abfd, buf);
3614 if ((insn & ~0x3fffffc) == 0)
3616 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3625 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3627 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3630 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3631 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
3632 goto free_contents_and_exit_err;
3634 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3635 size += plt_count * sizeof (asymbol);
3637 p = relplt->relocation;
3638 for (i = 0; i < plt_count; i++, p++)
3640 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3642 size += sizeof ("+0x") - 1 + 16;
3648 goto free_contents_and_exit;
3649 s = *ret = bfd_malloc (size);
3651 goto free_contents_and_exit_err;
3653 names = (char *) (s + count + plt_count + (resolv_vma != 0));
3655 for (i = secsymend; i < opdsymend; ++i)
3659 if (syms[i]->value > opd->size - 8)
3662 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3663 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3667 asection *sec = abfd->sections;
3674 size_t mid = (lo + hi) >> 1;
3675 if (syms[mid]->section->vma < ent)
3677 else if (syms[mid]->section->vma > ent)
3681 sec = syms[mid]->section;
3686 if (lo >= hi && lo > codesecsym)
3687 sec = syms[lo - 1]->section;
3689 for (; sec != NULL; sec = sec->next)
3693 /* SEC_LOAD may not be set if SEC is from a separate debug
3695 if ((sec->flags & SEC_ALLOC) == 0)
3697 if ((sec->flags & SEC_CODE) != 0)
3700 s->flags |= BSF_SYNTHETIC;
3701 s->value = ent - s->section->vma;
3704 len = strlen (syms[i]->name);
3705 memcpy (names, syms[i]->name, len + 1);
3707 /* Have udata.p point back to the original symbol this
3708 synthetic symbol was derived from. */
3709 s->udata.p = syms[i];
3715 if (glink != NULL && relplt != NULL)
3719 /* Add a symbol for the main glink trampoline. */
3720 memset (s, 0, sizeof *s);
3722 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3724 s->value = resolv_vma - glink->vma;
3726 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3727 names += sizeof ("__glink_PLTresolve");
3732 /* FIXME: It would be very much nicer to put sym@plt on the
3733 stub rather than on the glink branch table entry. The
3734 objdump disassembler would then use a sensible symbol
3735 name on plt calls. The difficulty in doing so is
3736 a) finding the stubs, and,
3737 b) matching stubs against plt entries, and,
3738 c) there can be multiple stubs for a given plt entry.
3740 Solving (a) could be done by code scanning, but older
3741 ppc64 binaries used different stubs to current code.
3742 (b) is the tricky one since you need to known the toc
3743 pointer for at least one function that uses a pic stub to
3744 be able to calculate the plt address referenced.
3745 (c) means gdb would need to set multiple breakpoints (or
3746 find the glink branch itself) when setting breakpoints
3747 for pending shared library loads. */
3748 p = relplt->relocation;
3749 for (i = 0; i < plt_count; i++, p++)
3753 *s = **p->sym_ptr_ptr;
3754 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3755 we are defining a symbol, ensure one of them is set. */
3756 if ((s->flags & BSF_LOCAL) == 0)
3757 s->flags |= BSF_GLOBAL;
3758 s->flags |= BSF_SYNTHETIC;
3760 s->value = glink_vma - glink->vma;
3763 len = strlen ((*p->sym_ptr_ptr)->name);
3764 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3768 memcpy (names, "+0x", sizeof ("+0x") - 1);
3769 names += sizeof ("+0x") - 1;
3770 bfd_sprintf_vma (abfd, names, p->addend);
3771 names += strlen (names);
3773 memcpy (names, "@plt", sizeof ("@plt"));
3774 names += sizeof ("@plt");
3794 /* The following functions are specific to the ELF linker, while
3795 functions above are used generally. Those named ppc64_elf_* are
3796 called by the main ELF linker code. They appear in this file more
3797 or less in the order in which they are called. eg.
3798 ppc64_elf_check_relocs is called early in the link process,
3799 ppc64_elf_finish_dynamic_sections is one of the last functions
3802 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3803 functions have both a function code symbol and a function descriptor
3804 symbol. A call to foo in a relocatable object file looks like:
3811 The function definition in another object file might be:
3815 . .quad .TOC.@tocbase
3821 When the linker resolves the call during a static link, the branch
3822 unsurprisingly just goes to .foo and the .opd information is unused.
3823 If the function definition is in a shared library, things are a little
3824 different: The call goes via a plt call stub, the opd information gets
3825 copied to the plt, and the linker patches the nop.
3833 . std 2,40(1) # in practice, the call stub
3834 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3835 . addi 11,11,Lfoo@toc@l # this is the general idea
3843 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3845 The "reloc ()" notation is supposed to indicate that the linker emits
3846 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3849 What are the difficulties here? Well, firstly, the relocations
3850 examined by the linker in check_relocs are against the function code
3851 sym .foo, while the dynamic relocation in the plt is emitted against
3852 the function descriptor symbol, foo. Somewhere along the line, we need
3853 to carefully copy dynamic link information from one symbol to the other.
3854 Secondly, the generic part of the elf linker will make .foo a dynamic
3855 symbol as is normal for most other backends. We need foo dynamic
3856 instead, at least for an application final link. However, when
3857 creating a shared library containing foo, we need to have both symbols
3858 dynamic so that references to .foo are satisfied during the early
3859 stages of linking. Otherwise the linker might decide to pull in a
3860 definition from some other object, eg. a static library.
3862 Update: As of August 2004, we support a new convention. Function
3863 calls may use the function descriptor symbol, ie. "bl foo". This
3864 behaves exactly as "bl .foo". */
3866 /* Of those relocs that might be copied as dynamic relocs, this
3867 function selects those that must be copied when linking a shared
3868 library or PIE, even when the symbol is local. */
3871 must_be_dyn_reloc (struct bfd_link_info *info,
3872 enum elf_ppc64_reloc_type r_type)
3877 /* Only relative relocs can be resolved when the object load
3878 address isn't fixed. DTPREL64 is excluded because the
3879 dynamic linker needs to differentiate global dynamic from
3880 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
3888 case R_PPC64_TPREL16:
3889 case R_PPC64_TPREL16_LO:
3890 case R_PPC64_TPREL16_HI:
3891 case R_PPC64_TPREL16_HA:
3892 case R_PPC64_TPREL16_DS:
3893 case R_PPC64_TPREL16_LO_DS:
3894 case R_PPC64_TPREL16_HIGH:
3895 case R_PPC64_TPREL16_HIGHA:
3896 case R_PPC64_TPREL16_HIGHER:
3897 case R_PPC64_TPREL16_HIGHERA:
3898 case R_PPC64_TPREL16_HIGHEST:
3899 case R_PPC64_TPREL16_HIGHESTA:
3900 case R_PPC64_TPREL64:
3901 /* These relocations are relative but in a shared library the
3902 linker doesn't know the thread pointer base. */
3903 return bfd_link_dll (info);
3907 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3908 copying dynamic variables from a shared lib into an app's dynbss
3909 section, and instead use a dynamic relocation to point into the
3910 shared lib. With code that gcc generates, it's vital that this be
3911 enabled; In the PowerPC64 ABI, the address of a function is actually
3912 the address of a function descriptor, which resides in the .opd
3913 section. gcc uses the descriptor directly rather than going via the
3914 GOT as some other ABI's do, which means that initialized function
3915 pointers must reference the descriptor. Thus, a function pointer
3916 initialized to the address of a function in a shared library will
3917 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3918 redefines the function descriptor symbol to point to the copy. This
3919 presents a problem as a plt entry for that function is also
3920 initialized from the function descriptor symbol and the copy reloc
3921 may not be initialized first. */
3922 #define ELIMINATE_COPY_RELOCS 1
3924 /* Section name for stubs is the associated section name plus this
3926 #define STUB_SUFFIX ".stub"
3929 ppc_stub_long_branch:
3930 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3931 destination, but a 24 bit branch in a stub section will reach.
3934 ppc_stub_plt_branch:
3935 Similar to the above, but a 24 bit branch in the stub section won't
3936 reach its destination.
3937 . addis %r11,%r2,xxx@toc@ha
3938 . ld %r12,xxx@toc@l(%r11)
3943 Used to call a function in a shared library. If it so happens that
3944 the plt entry referenced crosses a 64k boundary, then an extra
3945 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3947 . addis %r11,%r2,xxx@toc@ha
3948 . ld %r12,xxx+0@toc@l(%r11)
3950 . ld %r2,xxx+8@toc@l(%r11)
3951 . ld %r11,xxx+16@toc@l(%r11)
3954 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3955 code to adjust the value and save r2 to support multiple toc sections.
3956 A ppc_stub_long_branch with an r2 offset looks like:
3958 . addis %r2,%r2,off@ha
3959 . addi %r2,%r2,off@l
3962 A ppc_stub_plt_branch with an r2 offset looks like:
3964 . addis %r11,%r2,xxx@toc@ha
3965 . ld %r12,xxx@toc@l(%r11)
3966 . addis %r2,%r2,off@ha
3967 . addi %r2,%r2,off@l
3971 In cases where the "addis" instruction would add zero, the "addis" is
3972 omitted and following instructions modified slightly in some cases.
3975 enum ppc_stub_type {
3977 ppc_stub_long_branch,
3978 ppc_stub_long_branch_r2off,
3979 ppc_stub_plt_branch,
3980 ppc_stub_plt_branch_r2off,
3982 ppc_stub_plt_call_r2save,
3983 ppc_stub_global_entry,
3987 /* Information on stub grouping. */
3990 /* The stub section. */
3992 /* This is the section to which stubs in the group will be attached. */
3995 struct map_stub *next;
3996 /* Whether to emit a copy of register save/restore functions in this
3999 /* The offset of the __tls_get_addr_opt plt stub bctrl in this group,
4000 or -1u if no such stub with bctrl exists. */
4001 unsigned int tls_get_addr_opt_bctrl;
4004 struct ppc_stub_hash_entry {
4006 /* Base hash table entry structure. */
4007 struct bfd_hash_entry root;
4009 enum ppc_stub_type stub_type;
4011 /* Group information. */
4012 struct map_stub *group;
4014 /* Offset within stub_sec of the beginning of this stub. */
4015 bfd_vma stub_offset;
4017 /* Given the symbol's value and its section we can determine its final
4018 value when building the stubs (so the stub knows where to jump. */
4019 bfd_vma target_value;
4020 asection *target_section;
4022 /* The symbol table entry, if any, that this was derived from. */
4023 struct ppc_link_hash_entry *h;
4024 struct plt_entry *plt_ent;
4027 unsigned char symtype;
4029 /* Symbol st_other. */
4030 unsigned char other;
4033 struct ppc_branch_hash_entry {
4035 /* Base hash table entry structure. */
4036 struct bfd_hash_entry root;
4038 /* Offset within branch lookup table. */
4039 unsigned int offset;
4041 /* Generation marker. */
4045 /* Used to track dynamic relocations for local symbols. */
4046 struct ppc_dyn_relocs
4048 struct ppc_dyn_relocs *next;
4050 /* The input section of the reloc. */
4053 /* Total number of relocs copied for the input section. */
4054 unsigned int count : 31;
4056 /* Whether this entry is for STT_GNU_IFUNC symbols. */
4057 unsigned int ifunc : 1;
4060 struct ppc_link_hash_entry
4062 struct elf_link_hash_entry elf;
4065 /* A pointer to the most recently used stub hash entry against this
4067 struct ppc_stub_hash_entry *stub_cache;
4069 /* A pointer to the next symbol starting with a '.' */
4070 struct ppc_link_hash_entry *next_dot_sym;
4073 /* Track dynamic relocs copied for this symbol. */
4074 struct elf_dyn_relocs *dyn_relocs;
4076 /* Link between function code and descriptor symbols. */
4077 struct ppc_link_hash_entry *oh;
4079 /* Flag function code and descriptor symbols. */
4080 unsigned int is_func:1;
4081 unsigned int is_func_descriptor:1;
4082 unsigned int fake:1;
4084 /* Whether global opd/toc sym has been adjusted or not.
4085 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
4086 should be set for all globals defined in any opd/toc section. */
4087 unsigned int adjust_done:1;
4089 /* Set if this is an out-of-line register save/restore function,
4090 with non-standard calling convention. */
4091 unsigned int save_res:1;
4093 /* Set if a duplicate symbol with non-zero localentry is detected,
4094 even when the duplicate symbol does not provide a definition. */
4095 unsigned int non_zero_localentry:1;
4097 /* Contexts in which symbol is used in the GOT (or TOC).
4098 Bits are or'd into the mask as the corresponding relocs are
4099 encountered during check_relocs, with TLS_TLS being set when any
4100 of the other TLS bits are set. tls_optimize clears bits when
4101 optimizing to indicate the corresponding GOT entry type is not
4102 needed. If set, TLS_TLS is never cleared. tls_optimize may also
4103 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
4104 separate flag rather than setting TPREL just for convenience in
4105 distinguishing the two cases.
4106 These flags are also kept for local symbols. */
4107 #define TLS_TLS 1 /* Any TLS reloc. */
4108 #define TLS_GD 2 /* GD reloc. */
4109 #define TLS_LD 4 /* LD reloc. */
4110 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
4111 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
4112 #define TLS_MARK 32 /* __tls_get_addr call marked. */
4113 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
4114 #define TLS_EXPLICIT 128 /* Marks TOC section TLS relocs. */
4115 unsigned char tls_mask;
4117 /* The above field is also used to mark function symbols. In which
4118 case TLS_TLS will be 0. */
4119 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
4120 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
4121 #define NON_GOT 256 /* local symbol plt, not stored. */
4124 /* ppc64 ELF linker hash table. */
4126 struct ppc_link_hash_table
4128 struct elf_link_hash_table elf;
4130 /* The stub hash table. */
4131 struct bfd_hash_table stub_hash_table;
4133 /* Another hash table for plt_branch stubs. */
4134 struct bfd_hash_table branch_hash_table;
4136 /* Hash table for function prologue tocsave. */
4137 htab_t tocsave_htab;
4139 /* Various options and other info passed from the linker. */
4140 struct ppc64_elf_params *params;
4142 /* The size of sec_info below. */
4143 unsigned int sec_info_arr_size;
4145 /* Per-section array of extra section info. Done this way rather
4146 than as part of ppc64_elf_section_data so we have the info for
4147 non-ppc64 sections. */
4150 /* Along with elf_gp, specifies the TOC pointer used by this section. */
4155 /* The section group that this section belongs to. */
4156 struct map_stub *group;
4157 /* A temp section list pointer. */
4162 /* Linked list of groups. */
4163 struct map_stub *group;
4165 /* Temp used when calculating TOC pointers. */
4168 asection *toc_first_sec;
4170 /* Used when adding symbols. */
4171 struct ppc_link_hash_entry *dot_syms;
4173 /* Shortcuts to get to dynamic linker sections. */
4175 asection *global_entry;
4178 asection *relpltlocal;
4181 asection *glink_eh_frame;
4183 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4184 struct ppc_link_hash_entry *tls_get_addr;
4185 struct ppc_link_hash_entry *tls_get_addr_fd;
4187 /* The size of reliplt used by got entry relocs. */
4188 bfd_size_type got_reli_size;
4191 unsigned long stub_count[ppc_stub_global_entry];
4193 /* Number of stubs against global syms. */
4194 unsigned long stub_globals;
4196 /* Set if we're linking code with function descriptors. */
4197 unsigned int opd_abi:1;
4199 /* Support for multiple toc sections. */
4200 unsigned int do_multi_toc:1;
4201 unsigned int multi_toc_needed:1;
4202 unsigned int second_toc_pass:1;
4203 unsigned int do_toc_opt:1;
4205 /* Set if tls optimization is enabled. */
4206 unsigned int do_tls_opt:1;
4208 /* Set if inline plt calls should be converted to direct calls. */
4209 unsigned int can_convert_all_inline_plt:1;
4212 unsigned int stub_error:1;
4214 /* Whether func_desc_adjust needs to be run over symbols. */
4215 unsigned int need_func_desc_adj:1;
4217 /* Whether there exist local gnu indirect function resolvers,
4218 referenced by dynamic relocations. */
4219 unsigned int local_ifunc_resolver:1;
4220 unsigned int maybe_local_ifunc_resolver:1;
4222 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
4223 unsigned int has_plt_localentry0:1;
4225 /* Incremented every time we size stubs. */
4226 unsigned int stub_iteration;
4228 /* Small local sym cache. */
4229 struct sym_cache sym_cache;
4232 /* Rename some of the generic section flags to better document how they
4235 /* Nonzero if this section has TLS related relocations. */
4236 #define has_tls_reloc sec_flg0
4238 /* Nonzero if this section has an old-style call to __tls_get_addr. */
4239 #define has_tls_get_addr_call sec_flg1
4241 /* Nonzero if this section has any toc or got relocs. */
4242 #define has_toc_reloc sec_flg2
4244 /* Nonzero if this section has a call to another section that uses
4246 #define makes_toc_func_call sec_flg3
4248 /* Recursion protection when determining above flag. */
4249 #define call_check_in_progress sec_flg4
4250 #define call_check_done sec_flg5
4252 /* Get the ppc64 ELF linker hash table from a link_info structure. */
4254 #define ppc_hash_table(p) \
4255 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4256 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4258 #define ppc_stub_hash_lookup(table, string, create, copy) \
4259 ((struct ppc_stub_hash_entry *) \
4260 bfd_hash_lookup ((table), (string), (create), (copy)))
4262 #define ppc_branch_hash_lookup(table, string, create, copy) \
4263 ((struct ppc_branch_hash_entry *) \
4264 bfd_hash_lookup ((table), (string), (create), (copy)))
4266 /* Create an entry in the stub hash table. */
4268 static struct bfd_hash_entry *
4269 stub_hash_newfunc (struct bfd_hash_entry *entry,
4270 struct bfd_hash_table *table,
4273 /* Allocate the structure if it has not already been allocated by a
4277 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4282 /* Call the allocation method of the superclass. */
4283 entry = bfd_hash_newfunc (entry, table, string);
4286 struct ppc_stub_hash_entry *eh;
4288 /* Initialize the local fields. */
4289 eh = (struct ppc_stub_hash_entry *) entry;
4290 eh->stub_type = ppc_stub_none;
4292 eh->stub_offset = 0;
4293 eh->target_value = 0;
4294 eh->target_section = NULL;
4303 /* Create an entry in the branch hash table. */
4305 static struct bfd_hash_entry *
4306 branch_hash_newfunc (struct bfd_hash_entry *entry,
4307 struct bfd_hash_table *table,
4310 /* Allocate the structure if it has not already been allocated by a
4314 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4319 /* Call the allocation method of the superclass. */
4320 entry = bfd_hash_newfunc (entry, table, string);
4323 struct ppc_branch_hash_entry *eh;
4325 /* Initialize the local fields. */
4326 eh = (struct ppc_branch_hash_entry *) entry;
4334 /* Create an entry in a ppc64 ELF linker hash table. */
4336 static struct bfd_hash_entry *
4337 link_hash_newfunc (struct bfd_hash_entry *entry,
4338 struct bfd_hash_table *table,
4341 /* Allocate the structure if it has not already been allocated by a
4345 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4350 /* Call the allocation method of the superclass. */
4351 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4354 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4356 memset (&eh->u.stub_cache, 0,
4357 (sizeof (struct ppc_link_hash_entry)
4358 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4360 /* When making function calls, old ABI code references function entry
4361 points (dot symbols), while new ABI code references the function
4362 descriptor symbol. We need to make any combination of reference and
4363 definition work together, without breaking archive linking.
4365 For a defined function "foo" and an undefined call to "bar":
4366 An old object defines "foo" and ".foo", references ".bar" (possibly
4368 A new object defines "foo" and references "bar".
4370 A new object thus has no problem with its undefined symbols being
4371 satisfied by definitions in an old object. On the other hand, the
4372 old object won't have ".bar" satisfied by a new object.
4374 Keep a list of newly added dot-symbols. */
4376 if (string[0] == '.')
4378 struct ppc_link_hash_table *htab;
4380 htab = (struct ppc_link_hash_table *) table;
4381 eh->u.next_dot_sym = htab->dot_syms;
4382 htab->dot_syms = eh;
4389 struct tocsave_entry {
4395 tocsave_htab_hash (const void *p)
4397 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4398 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
4402 tocsave_htab_eq (const void *p1, const void *p2)
4404 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4405 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4406 return e1->sec == e2->sec && e1->offset == e2->offset;
4409 /* Destroy a ppc64 ELF linker hash table. */
4412 ppc64_elf_link_hash_table_free (bfd *obfd)
4414 struct ppc_link_hash_table *htab;
4416 htab = (struct ppc_link_hash_table *) obfd->link.hash;
4417 if (htab->tocsave_htab)
4418 htab_delete (htab->tocsave_htab);
4419 bfd_hash_table_free (&htab->branch_hash_table);
4420 bfd_hash_table_free (&htab->stub_hash_table);
4421 _bfd_elf_link_hash_table_free (obfd);
4424 /* Create a ppc64 ELF linker hash table. */
4426 static struct bfd_link_hash_table *
4427 ppc64_elf_link_hash_table_create (bfd *abfd)
4429 struct ppc_link_hash_table *htab;
4430 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4432 htab = bfd_zmalloc (amt);
4436 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4437 sizeof (struct ppc_link_hash_entry),
4444 /* Init the stub hash table too. */
4445 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4446 sizeof (struct ppc_stub_hash_entry)))
4448 _bfd_elf_link_hash_table_free (abfd);
4452 /* And the branch hash table. */
4453 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4454 sizeof (struct ppc_branch_hash_entry)))
4456 bfd_hash_table_free (&htab->stub_hash_table);
4457 _bfd_elf_link_hash_table_free (abfd);
4461 htab->tocsave_htab = htab_try_create (1024,
4465 if (htab->tocsave_htab == NULL)
4467 ppc64_elf_link_hash_table_free (abfd);
4470 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
4472 /* Initializing two fields of the union is just cosmetic. We really
4473 only care about glist, but when compiled on a 32-bit host the
4474 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4475 debugger inspection of these fields look nicer. */
4476 htab->elf.init_got_refcount.refcount = 0;
4477 htab->elf.init_got_refcount.glist = NULL;
4478 htab->elf.init_plt_refcount.refcount = 0;
4479 htab->elf.init_plt_refcount.glist = NULL;
4480 htab->elf.init_got_offset.offset = 0;
4481 htab->elf.init_got_offset.glist = NULL;
4482 htab->elf.init_plt_offset.offset = 0;
4483 htab->elf.init_plt_offset.glist = NULL;
4485 return &htab->elf.root;
4488 /* Create sections for linker generated code. */
4491 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4493 struct ppc_link_hash_table *htab;
4496 htab = ppc_hash_table (info);
4498 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4499 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4500 if (htab->params->save_restore_funcs)
4502 /* Create .sfpr for code to save and restore fp regs. */
4503 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4505 if (htab->sfpr == NULL
4506 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4510 if (bfd_link_relocatable (info))
4513 /* Create .glink for lazy dynamic linking support. */
4514 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4516 if (htab->glink == NULL
4517 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4520 /* The part of .glink used by global entry stubs, separate so that
4521 it can be aligned appropriately without affecting htab->glink. */
4522 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4524 if (htab->global_entry == NULL
4525 || ! bfd_set_section_alignment (dynobj, htab->global_entry, 2))
4528 if (!info->no_ld_generated_unwind_info)
4530 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4531 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4532 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4535 if (htab->glink_eh_frame == NULL
4536 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4540 flags = SEC_ALLOC | SEC_LINKER_CREATED;
4541 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4542 if (htab->elf.iplt == NULL
4543 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
4546 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4547 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4549 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4550 if (htab->elf.irelplt == NULL
4551 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
4554 /* Create branch lookup table for plt_branch stubs. */
4555 flags = (SEC_ALLOC | SEC_LOAD
4556 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4557 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4559 if (htab->brlt == NULL
4560 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4563 /* Local plt entries, put in .branch_lt but a separate section for
4565 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4567 if (htab->pltlocal == NULL
4568 || ! bfd_set_section_alignment (dynobj, htab->pltlocal, 3))
4571 if (!bfd_link_pic (info))
4574 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4575 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4577 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
4578 if (htab->relbrlt == NULL
4579 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4583 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
4584 if (htab->relpltlocal == NULL
4585 || ! bfd_set_section_alignment (dynobj, htab->relpltlocal, 3))
4591 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4594 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4595 struct ppc64_elf_params *params)
4597 struct ppc_link_hash_table *htab;
4599 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
4601 /* Always hook our dynamic sections into the first bfd, which is the
4602 linker created stub bfd. This ensures that the GOT header is at
4603 the start of the output TOC section. */
4604 htab = ppc_hash_table (info);
4605 htab->elf.dynobj = params->stub_bfd;
4606 htab->params = params;
4608 return create_linkage_sections (htab->elf.dynobj, info);
4611 /* Build a name for an entry in the stub hash table. */
4614 ppc_stub_name (const asection *input_section,
4615 const asection *sym_sec,
4616 const struct ppc_link_hash_entry *h,
4617 const Elf_Internal_Rela *rel)
4622 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4623 offsets from a sym as a branch target? In fact, we could
4624 probably assume the addend is always zero. */
4625 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4629 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4630 stub_name = bfd_malloc (len);
4631 if (stub_name == NULL)
4634 len = sprintf (stub_name, "%08x.%s+%x",
4635 input_section->id & 0xffffffff,
4636 h->elf.root.root.string,
4637 (int) rel->r_addend & 0xffffffff);
4641 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4642 stub_name = bfd_malloc (len);
4643 if (stub_name == NULL)
4646 len = sprintf (stub_name, "%08x.%x:%x+%x",
4647 input_section->id & 0xffffffff,
4648 sym_sec->id & 0xffffffff,
4649 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4650 (int) rel->r_addend & 0xffffffff);
4652 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
4653 stub_name[len - 2] = 0;
4657 /* Look up an entry in the stub hash. Stub entries are cached because
4658 creating the stub name takes a bit of time. */
4660 static struct ppc_stub_hash_entry *
4661 ppc_get_stub_entry (const asection *input_section,
4662 const asection *sym_sec,
4663 struct ppc_link_hash_entry *h,
4664 const Elf_Internal_Rela *rel,
4665 struct ppc_link_hash_table *htab)
4667 struct ppc_stub_hash_entry *stub_entry;
4668 struct map_stub *group;
4670 /* If this input section is part of a group of sections sharing one
4671 stub section, then use the id of the first section in the group.
4672 Stub names need to include a section id, as there may well be
4673 more than one stub used to reach say, printf, and we need to
4674 distinguish between them. */
4675 group = htab->sec_info[input_section->id].u.group;
4679 if (h != NULL && h->u.stub_cache != NULL
4680 && h->u.stub_cache->h == h
4681 && h->u.stub_cache->group == group)
4683 stub_entry = h->u.stub_cache;
4689 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
4690 if (stub_name == NULL)
4693 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
4694 stub_name, FALSE, FALSE);
4696 h->u.stub_cache = stub_entry;
4704 /* Add a new stub entry to the stub hash. Not all fields of the new
4705 stub entry are initialised. */
4707 static struct ppc_stub_hash_entry *
4708 ppc_add_stub (const char *stub_name,
4710 struct bfd_link_info *info)
4712 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4713 struct map_stub *group;
4716 struct ppc_stub_hash_entry *stub_entry;
4718 group = htab->sec_info[section->id].u.group;
4719 link_sec = group->link_sec;
4720 stub_sec = group->stub_sec;
4721 if (stub_sec == NULL)
4727 namelen = strlen (link_sec->name);
4728 len = namelen + sizeof (STUB_SUFFIX);
4729 s_name = bfd_alloc (htab->params->stub_bfd, len);
4733 memcpy (s_name, link_sec->name, namelen);
4734 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4735 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4736 if (stub_sec == NULL)
4738 group->stub_sec = stub_sec;
4741 /* Enter this entry into the linker stub hash table. */
4742 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
4744 if (stub_entry == NULL)
4746 /* xgettext:c-format */
4747 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
4748 section->owner, stub_name);
4752 stub_entry->group = group;
4753 stub_entry->stub_offset = 0;
4757 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4758 not already done. */
4761 create_got_section (bfd *abfd, struct bfd_link_info *info)
4763 asection *got, *relgot;
4765 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4767 if (!is_ppc64_elf (abfd))
4773 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4776 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4777 | SEC_LINKER_CREATED);
4779 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4781 || !bfd_set_section_alignment (abfd, got, 3))
4784 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4785 flags | SEC_READONLY);
4787 || ! bfd_set_section_alignment (abfd, relgot, 3))
4790 ppc64_elf_tdata (abfd)->got = got;
4791 ppc64_elf_tdata (abfd)->relgot = relgot;
4795 /* Follow indirect and warning symbol links. */
4797 static inline struct bfd_link_hash_entry *
4798 follow_link (struct bfd_link_hash_entry *h)
4800 while (h->type == bfd_link_hash_indirect
4801 || h->type == bfd_link_hash_warning)
4806 static inline struct elf_link_hash_entry *
4807 elf_follow_link (struct elf_link_hash_entry *h)
4809 return (struct elf_link_hash_entry *) follow_link (&h->root);
4812 static inline struct ppc_link_hash_entry *
4813 ppc_follow_link (struct ppc_link_hash_entry *h)
4815 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4818 /* Merge PLT info on FROM with that on TO. */
4821 move_plt_plist (struct ppc_link_hash_entry *from,
4822 struct ppc_link_hash_entry *to)
4824 if (from->elf.plt.plist != NULL)
4826 if (to->elf.plt.plist != NULL)
4828 struct plt_entry **entp;
4829 struct plt_entry *ent;
4831 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4833 struct plt_entry *dent;
4835 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4836 if (dent->addend == ent->addend)
4838 dent->plt.refcount += ent->plt.refcount;
4845 *entp = to->elf.plt.plist;
4848 to->elf.plt.plist = from->elf.plt.plist;
4849 from->elf.plt.plist = NULL;
4853 /* Copy the extra info we tack onto an elf_link_hash_entry. */
4856 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4857 struct elf_link_hash_entry *dir,
4858 struct elf_link_hash_entry *ind)
4860 struct ppc_link_hash_entry *edir, *eind;
4862 edir = (struct ppc_link_hash_entry *) dir;
4863 eind = (struct ppc_link_hash_entry *) ind;
4865 edir->is_func |= eind->is_func;
4866 edir->is_func_descriptor |= eind->is_func_descriptor;
4867 edir->tls_mask |= eind->tls_mask;
4868 if (eind->oh != NULL)
4869 edir->oh = ppc_follow_link (eind->oh);
4871 if (edir->elf.versioned != versioned_hidden)
4872 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4873 edir->elf.ref_regular |= eind->elf.ref_regular;
4874 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4875 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4876 edir->elf.needs_plt |= eind->elf.needs_plt;
4877 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
4879 /* If we were called to copy over info for a weak sym, don't copy
4880 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4881 in order to simplify readonly_dynrelocs and save a field in the
4882 symbol hash entry, but that means dyn_relocs can't be used in any
4883 tests about a specific symbol, or affect other symbol flags which
4885 if (eind->elf.root.type != bfd_link_hash_indirect)
4888 /* Copy over any dynamic relocs we may have on the indirect sym. */
4889 if (eind->dyn_relocs != NULL)
4891 if (edir->dyn_relocs != NULL)
4893 struct elf_dyn_relocs **pp;
4894 struct elf_dyn_relocs *p;
4896 /* Add reloc counts against the indirect sym to the direct sym
4897 list. Merge any entries against the same section. */
4898 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4900 struct elf_dyn_relocs *q;
4902 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4903 if (q->sec == p->sec)
4905 q->pc_count += p->pc_count;
4906 q->count += p->count;
4913 *pp = edir->dyn_relocs;
4916 edir->dyn_relocs = eind->dyn_relocs;
4917 eind->dyn_relocs = NULL;
4920 /* Copy over got entries that we may have already seen to the
4921 symbol which just became indirect. */
4922 if (eind->elf.got.glist != NULL)
4924 if (edir->elf.got.glist != NULL)
4926 struct got_entry **entp;
4927 struct got_entry *ent;
4929 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4931 struct got_entry *dent;
4933 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4934 if (dent->addend == ent->addend
4935 && dent->owner == ent->owner
4936 && dent->tls_type == ent->tls_type)
4938 dent->got.refcount += ent->got.refcount;
4945 *entp = edir->elf.got.glist;
4948 edir->elf.got.glist = eind->elf.got.glist;
4949 eind->elf.got.glist = NULL;
4952 /* And plt entries. */
4953 move_plt_plist (eind, edir);
4955 if (eind->elf.dynindx != -1)
4957 if (edir->elf.dynindx != -1)
4958 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4959 edir->elf.dynstr_index);
4960 edir->elf.dynindx = eind->elf.dynindx;
4961 edir->elf.dynstr_index = eind->elf.dynstr_index;
4962 eind->elf.dynindx = -1;
4963 eind->elf.dynstr_index = 0;
4967 /* Find the function descriptor hash entry from the given function code
4968 hash entry FH. Link the entries via their OH fields. */
4970 static struct ppc_link_hash_entry *
4971 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4973 struct ppc_link_hash_entry *fdh = fh->oh;
4977 const char *fd_name = fh->elf.root.root.string + 1;
4979 fdh = (struct ppc_link_hash_entry *)
4980 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4984 fdh->is_func_descriptor = 1;
4990 fdh = ppc_follow_link (fdh);
4991 fdh->is_func_descriptor = 1;
4996 /* Make a fake function descriptor sym for the undefined code sym FH. */
4998 static struct ppc_link_hash_entry *
4999 make_fdh (struct bfd_link_info *info,
5000 struct ppc_link_hash_entry *fh)
5002 bfd *abfd = fh->elf.root.u.undef.abfd;
5003 struct bfd_link_hash_entry *bh = NULL;
5004 struct ppc_link_hash_entry *fdh;
5005 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
5009 if (!_bfd_generic_link_add_one_symbol (info, abfd,
5010 fh->elf.root.root.string + 1,
5011 flags, bfd_und_section_ptr, 0,
5012 NULL, FALSE, FALSE, &bh))
5015 fdh = (struct ppc_link_hash_entry *) bh;
5016 fdh->elf.non_elf = 0;
5018 fdh->is_func_descriptor = 1;
5025 /* Fix function descriptor symbols defined in .opd sections to be
5029 ppc64_elf_add_symbol_hook (bfd *ibfd,
5030 struct bfd_link_info *info,
5031 Elf_Internal_Sym *isym,
5033 flagword *flags ATTRIBUTE_UNUSED,
5038 && strcmp ((*sec)->name, ".opd") == 0)
5042 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
5043 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
5044 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
5046 /* If the symbol is a function defined in .opd, and the function
5047 code is in a discarded group, let it appear to be undefined. */
5048 if (!bfd_link_relocatable (info)
5049 && (*sec)->reloc_count != 0
5050 && opd_entry_value (*sec, *value, &code_sec, NULL,
5051 FALSE) != (bfd_vma) -1
5052 && discarded_section (code_sec))
5054 *sec = bfd_und_section_ptr;
5055 isym->st_shndx = SHN_UNDEF;
5058 else if (*sec != NULL
5059 && strcmp ((*sec)->name, ".toc") == 0
5060 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
5062 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5064 htab->params->object_in_toc = 1;
5067 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
5069 if (abiversion (ibfd) == 0)
5070 set_abiversion (ibfd, 2);
5071 else if (abiversion (ibfd) == 1)
5073 _bfd_error_handler (_("symbol '%s' has invalid st_other"
5074 " for ABI version 1"), *name);
5075 bfd_set_error (bfd_error_bad_value);
5083 /* Merge non-visibility st_other attributes: local entry point. */
5086 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
5087 const Elf_Internal_Sym *isym,
5088 bfd_boolean definition,
5089 bfd_boolean dynamic)
5091 if (definition && (!dynamic || !h->def_regular))
5092 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
5093 | ELF_ST_VISIBILITY (h->other));
5096 /* Hook called on merging a symbol. We use this to clear "fake" since
5097 we now have a real symbol. */
5100 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
5101 const Elf_Internal_Sym *isym,
5102 asection **psec ATTRIBUTE_UNUSED,
5103 bfd_boolean newdef ATTRIBUTE_UNUSED,
5104 bfd_boolean olddef ATTRIBUTE_UNUSED,
5105 bfd *oldbfd ATTRIBUTE_UNUSED,
5106 const asection *oldsec ATTRIBUTE_UNUSED)
5108 ((struct ppc_link_hash_entry *) h)->fake = 0;
5109 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
5110 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
5114 /* This function makes an old ABI object reference to ".bar" cause the
5115 inclusion of a new ABI object archive that defines "bar".
5116 NAME is a symbol defined in an archive. Return a symbol in the hash
5117 table that might be satisfied by the archive symbols. */
5119 static struct elf_link_hash_entry *
5120 ppc64_elf_archive_symbol_lookup (bfd *abfd,
5121 struct bfd_link_info *info,
5124 struct elf_link_hash_entry *h;
5128 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
5130 /* Don't return this sym if it is a fake function descriptor
5131 created by add_symbol_adjust. */
5132 && !((struct ppc_link_hash_entry *) h)->fake)
5138 len = strlen (name);
5139 dot_name = bfd_alloc (abfd, len + 2);
5140 if (dot_name == NULL)
5141 return (struct elf_link_hash_entry *) -1;
5143 memcpy (dot_name + 1, name, len + 1);
5144 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5145 bfd_release (abfd, dot_name);
5149 /* This function satisfies all old ABI object references to ".bar" if a
5150 new ABI object defines "bar". Well, at least, undefined dot symbols
5151 are made weak. This stops later archive searches from including an
5152 object if we already have a function descriptor definition. It also
5153 prevents the linker complaining about undefined symbols.
5154 We also check and correct mismatched symbol visibility here. The
5155 most restrictive visibility of the function descriptor and the
5156 function entry symbol is used. */
5159 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
5161 struct ppc_link_hash_table *htab;
5162 struct ppc_link_hash_entry *fdh;
5164 if (eh->elf.root.type == bfd_link_hash_warning)
5165 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
5167 if (eh->elf.root.type == bfd_link_hash_indirect)
5170 if (eh->elf.root.root.string[0] != '.')
5173 htab = ppc_hash_table (info);
5177 fdh = lookup_fdh (eh, htab);
5179 && !bfd_link_relocatable (info)
5180 && (eh->elf.root.type == bfd_link_hash_undefined
5181 || eh->elf.root.type == bfd_link_hash_undefweak)
5182 && eh->elf.ref_regular)
5184 /* Make an undefined function descriptor sym, in order to
5185 pull in an --as-needed shared lib. Archives are handled
5187 fdh = make_fdh (info, eh);
5194 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5195 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5197 /* Make both descriptor and entry symbol have the most
5198 constraining visibility of either symbol. */
5199 if (entry_vis < descr_vis)
5200 fdh->elf.other += entry_vis - descr_vis;
5201 else if (entry_vis > descr_vis)
5202 eh->elf.other += descr_vis - entry_vis;
5204 /* Propagate reference flags from entry symbol to function
5205 descriptor symbol. */
5206 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
5207 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
5208 fdh->elf.ref_regular |= eh->elf.ref_regular;
5209 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
5211 if (!fdh->elf.forced_local
5212 && fdh->elf.dynindx == -1
5213 && fdh->elf.versioned != versioned_hidden
5214 && (bfd_link_dll (info)
5215 || fdh->elf.def_dynamic
5216 || fdh->elf.ref_dynamic)
5217 && (eh->elf.ref_regular
5218 || eh->elf.def_regular))
5220 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5228 /* Set up opd section info and abiversion for IBFD, and process list
5229 of dot-symbols we made in link_hash_newfunc. */
5232 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
5234 struct ppc_link_hash_table *htab;
5235 struct ppc_link_hash_entry **p, *eh;
5236 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
5238 if (opd != NULL && opd->size != 0)
5240 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5241 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5243 if (abiversion (ibfd) == 0)
5244 set_abiversion (ibfd, 1);
5245 else if (abiversion (ibfd) >= 2)
5247 /* xgettext:c-format */
5248 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
5249 ibfd, abiversion (ibfd));
5250 bfd_set_error (bfd_error_bad_value);
5255 if (is_ppc64_elf (info->output_bfd))
5257 /* For input files without an explicit abiversion in e_flags
5258 we should have flagged any with symbol st_other bits set
5259 as ELFv1 and above flagged those with .opd as ELFv2.
5260 Set the output abiversion if not yet set, and for any input
5261 still ambiguous, take its abiversion from the output.
5262 Differences in ABI are reported later. */
5263 if (abiversion (info->output_bfd) == 0)
5264 set_abiversion (info->output_bfd, abiversion (ibfd));
5265 else if (abiversion (ibfd) == 0)
5266 set_abiversion (ibfd, abiversion (info->output_bfd));
5269 htab = ppc_hash_table (info);
5273 if (opd != NULL && opd->size != 0
5274 && (ibfd->flags & DYNAMIC) == 0
5275 && (opd->flags & SEC_RELOC) != 0
5276 && opd->reloc_count != 0
5277 && !bfd_is_abs_section (opd->output_section)
5278 && info->gc_sections)
5280 /* Garbage collection needs some extra help with .opd sections.
5281 We don't want to necessarily keep everything referenced by
5282 relocs in .opd, as that would keep all functions. Instead,
5283 if we reference an .opd symbol (a function descriptor), we
5284 want to keep the function code symbol's section. This is
5285 easy for global symbols, but for local syms we need to keep
5286 information about the associated function section. */
5288 asection **opd_sym_map;
5289 Elf_Internal_Shdr *symtab_hdr;
5290 Elf_Internal_Rela *relocs, *rel_end, *rel;
5292 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5293 opd_sym_map = bfd_zalloc (ibfd, amt);
5294 if (opd_sym_map == NULL)
5296 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5297 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
5301 symtab_hdr = &elf_symtab_hdr (ibfd);
5302 rel_end = relocs + opd->reloc_count - 1;
5303 for (rel = relocs; rel < rel_end; rel++)
5305 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
5306 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
5308 if (r_type == R_PPC64_ADDR64
5309 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
5310 && r_symndx < symtab_hdr->sh_info)
5312 Elf_Internal_Sym *isym;
5315 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
5318 if (elf_section_data (opd)->relocs != relocs)
5323 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
5324 if (s != NULL && s != opd)
5325 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5328 if (elf_section_data (opd)->relocs != relocs)
5332 p = &htab->dot_syms;
5333 while ((eh = *p) != NULL)
5336 if (&eh->elf == htab->elf.hgot)
5338 else if (htab->elf.hgot == NULL
5339 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5340 htab->elf.hgot = &eh->elf;
5341 else if (abiversion (ibfd) <= 1)
5343 htab->need_func_desc_adj = 1;
5344 if (!add_symbol_adjust (eh, info))
5347 p = &eh->u.next_dot_sym;
5352 /* Undo hash table changes when an --as-needed input file is determined
5353 not to be needed. */
5356 ppc64_elf_notice_as_needed (bfd *ibfd,
5357 struct bfd_link_info *info,
5358 enum notice_asneeded_action act)
5360 if (act == notice_not_needed)
5362 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5367 htab->dot_syms = NULL;
5369 return _bfd_elf_notice_as_needed (ibfd, info, act);
5372 /* If --just-symbols against a final linked binary, then assume we need
5373 toc adjusting stubs when calling functions defined there. */
5376 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5378 if ((sec->flags & SEC_CODE) != 0
5379 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5380 && is_ppc64_elf (sec->owner))
5382 if (abiversion (sec->owner) >= 2
5383 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
5384 sec->has_toc_reloc = 1;
5386 _bfd_elf_link_just_syms (sec, info);
5389 static struct plt_entry **
5390 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5391 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
5393 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
5394 struct plt_entry **local_plt;
5395 unsigned char *local_got_tls_masks;
5397 if (local_got_ents == NULL)
5399 bfd_size_type size = symtab_hdr->sh_info;
5401 size *= (sizeof (*local_got_ents)
5402 + sizeof (*local_plt)
5403 + sizeof (*local_got_tls_masks));
5404 local_got_ents = bfd_zalloc (abfd, size);
5405 if (local_got_ents == NULL)
5407 elf_local_got_ents (abfd) = local_got_ents;
5410 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
5412 struct got_entry *ent;
5414 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
5415 if (ent->addend == r_addend
5416 && ent->owner == abfd
5417 && ent->tls_type == tls_type)
5421 bfd_size_type amt = sizeof (*ent);
5422 ent = bfd_alloc (abfd, amt);
5425 ent->next = local_got_ents[r_symndx];
5426 ent->addend = r_addend;
5428 ent->tls_type = tls_type;
5429 ent->is_indirect = FALSE;
5430 ent->got.refcount = 0;
5431 local_got_ents[r_symndx] = ent;
5433 ent->got.refcount += 1;
5436 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
5437 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
5438 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
5440 return local_plt + r_symndx;
5444 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
5446 struct plt_entry *ent;
5448 for (ent = *plist; ent != NULL; ent = ent->next)
5449 if (ent->addend == addend)
5453 bfd_size_type amt = sizeof (*ent);
5454 ent = bfd_alloc (abfd, amt);
5458 ent->addend = addend;
5459 ent->plt.refcount = 0;
5462 ent->plt.refcount += 1;
5467 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5469 return (r_type == R_PPC64_REL24
5470 || r_type == R_PPC64_REL14
5471 || r_type == R_PPC64_REL14_BRTAKEN
5472 || r_type == R_PPC64_REL14_BRNTAKEN
5473 || r_type == R_PPC64_ADDR24
5474 || r_type == R_PPC64_ADDR14
5475 || r_type == R_PPC64_ADDR14_BRTAKEN
5476 || r_type == R_PPC64_ADDR14_BRNTAKEN
5477 || r_type == R_PPC64_PLTCALL);
5480 /* Relocs on inline plt call sequence insns prior to the call. */
5483 is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
5485 return (r_type == R_PPC64_PLT16_HA
5486 || r_type == R_PPC64_PLT16_HI
5487 || r_type == R_PPC64_PLT16_LO
5488 || r_type == R_PPC64_PLT16_LO_DS
5489 || r_type == R_PPC64_PLTSEQ);
5492 /* Look through the relocs for a section during the first phase, and
5493 calculate needed space in the global offset table, procedure
5494 linkage table, and dynamic reloc sections. */
5497 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5498 asection *sec, const Elf_Internal_Rela *relocs)
5500 struct ppc_link_hash_table *htab;
5501 Elf_Internal_Shdr *symtab_hdr;
5502 struct elf_link_hash_entry **sym_hashes;
5503 const Elf_Internal_Rela *rel;
5504 const Elf_Internal_Rela *rel_end;
5506 struct elf_link_hash_entry *tga, *dottga;
5509 if (bfd_link_relocatable (info))
5512 /* Don't do anything special with non-loaded, non-alloced sections.
5513 In particular, any relocs in such sections should not affect GOT
5514 and PLT reference counting (ie. we don't allow them to create GOT
5515 or PLT entries), there's no possibility or desire to optimize TLS
5516 relocs, and there's not much point in propagating relocs to shared
5517 libs that the dynamic linker won't relocate. */
5518 if ((sec->flags & SEC_ALLOC) == 0)
5521 BFD_ASSERT (is_ppc64_elf (abfd));
5523 htab = ppc_hash_table (info);
5527 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5528 FALSE, FALSE, TRUE);
5529 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5530 FALSE, FALSE, TRUE);
5531 symtab_hdr = &elf_symtab_hdr (abfd);
5532 sym_hashes = elf_sym_hashes (abfd);
5534 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5535 rel_end = relocs + sec->reloc_count;
5536 for (rel = relocs; rel < rel_end; rel++)
5538 unsigned long r_symndx;
5539 struct elf_link_hash_entry *h;
5540 enum elf_ppc64_reloc_type r_type;
5542 struct _ppc64_elf_section_data *ppc64_sec;
5543 struct plt_entry **ifunc, **plt_list;
5545 r_symndx = ELF64_R_SYM (rel->r_info);
5546 if (r_symndx < symtab_hdr->sh_info)
5550 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5551 h = elf_follow_link (h);
5553 if (h == htab->elf.hgot)
5554 sec->has_toc_reloc = 1;
5561 if (h->type == STT_GNU_IFUNC)
5564 ifunc = &h->plt.plist;
5569 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5574 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5576 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5578 NON_GOT | PLT_IFUNC);
5584 r_type = ELF64_R_TYPE (rel->r_info);
5589 /* These special tls relocs tie a call to __tls_get_addr with
5590 its parameter symbol. */
5592 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
5594 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5596 NON_GOT | TLS_TLS | TLS_MARK))
5598 sec->has_tls_reloc = 1;
5601 case R_PPC64_GOT_TLSLD16:
5602 case R_PPC64_GOT_TLSLD16_LO:
5603 case R_PPC64_GOT_TLSLD16_HI:
5604 case R_PPC64_GOT_TLSLD16_HA:
5605 tls_type = TLS_TLS | TLS_LD;
5608 case R_PPC64_GOT_TLSGD16:
5609 case R_PPC64_GOT_TLSGD16_LO:
5610 case R_PPC64_GOT_TLSGD16_HI:
5611 case R_PPC64_GOT_TLSGD16_HA:
5612 tls_type = TLS_TLS | TLS_GD;
5615 case R_PPC64_GOT_TPREL16_DS:
5616 case R_PPC64_GOT_TPREL16_LO_DS:
5617 case R_PPC64_GOT_TPREL16_HI:
5618 case R_PPC64_GOT_TPREL16_HA:
5619 if (bfd_link_dll (info))
5620 info->flags |= DF_STATIC_TLS;
5621 tls_type = TLS_TLS | TLS_TPREL;
5624 case R_PPC64_GOT_DTPREL16_DS:
5625 case R_PPC64_GOT_DTPREL16_LO_DS:
5626 case R_PPC64_GOT_DTPREL16_HI:
5627 case R_PPC64_GOT_DTPREL16_HA:
5628 tls_type = TLS_TLS | TLS_DTPREL;
5630 sec->has_tls_reloc = 1;
5634 case R_PPC64_GOT16_DS:
5635 case R_PPC64_GOT16_HA:
5636 case R_PPC64_GOT16_HI:
5637 case R_PPC64_GOT16_LO:
5638 case R_PPC64_GOT16_LO_DS:
5639 /* This symbol requires a global offset table entry. */
5640 sec->has_toc_reloc = 1;
5641 if (r_type == R_PPC64_GOT_TLSLD16
5642 || r_type == R_PPC64_GOT_TLSGD16
5643 || r_type == R_PPC64_GOT_TPREL16_DS
5644 || r_type == R_PPC64_GOT_DTPREL16_DS
5645 || r_type == R_PPC64_GOT16
5646 || r_type == R_PPC64_GOT16_DS)
5648 htab->do_multi_toc = 1;
5649 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5652 if (ppc64_elf_tdata (abfd)->got == NULL
5653 && !create_got_section (abfd, info))
5658 struct ppc_link_hash_entry *eh;
5659 struct got_entry *ent;
5661 eh = (struct ppc_link_hash_entry *) h;
5662 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5663 if (ent->addend == rel->r_addend
5664 && ent->owner == abfd
5665 && ent->tls_type == tls_type)
5669 bfd_size_type amt = sizeof (*ent);
5670 ent = bfd_alloc (abfd, amt);
5673 ent->next = eh->elf.got.glist;
5674 ent->addend = rel->r_addend;
5676 ent->tls_type = tls_type;
5677 ent->is_indirect = FALSE;
5678 ent->got.refcount = 0;
5679 eh->elf.got.glist = ent;
5681 ent->got.refcount += 1;
5682 eh->tls_mask |= tls_type;
5685 /* This is a global offset table entry for a local symbol. */
5686 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5687 rel->r_addend, tls_type))
5690 /* We may also need a plt entry if the symbol turns out to be
5692 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
5694 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5699 case R_PPC64_PLT16_HA:
5700 case R_PPC64_PLT16_HI:
5701 case R_PPC64_PLT16_LO:
5702 case R_PPC64_PLT16_LO_DS:
5705 /* This symbol requires a procedure linkage table entry. */
5710 if (h->root.root.string[0] == '.'
5711 && h->root.root.string[1] != '\0')
5712 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5713 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
5714 plt_list = &h->plt.plist;
5716 if (plt_list == NULL)
5717 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5719 NON_GOT | PLT_KEEP);
5720 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5724 /* The following relocations don't need to propagate the
5725 relocation if linking a shared object since they are
5726 section relative. */
5727 case R_PPC64_SECTOFF:
5728 case R_PPC64_SECTOFF_LO:
5729 case R_PPC64_SECTOFF_HI:
5730 case R_PPC64_SECTOFF_HA:
5731 case R_PPC64_SECTOFF_DS:
5732 case R_PPC64_SECTOFF_LO_DS:
5733 case R_PPC64_DTPREL16:
5734 case R_PPC64_DTPREL16_LO:
5735 case R_PPC64_DTPREL16_HI:
5736 case R_PPC64_DTPREL16_HA:
5737 case R_PPC64_DTPREL16_DS:
5738 case R_PPC64_DTPREL16_LO_DS:
5739 case R_PPC64_DTPREL16_HIGH:
5740 case R_PPC64_DTPREL16_HIGHA:
5741 case R_PPC64_DTPREL16_HIGHER:
5742 case R_PPC64_DTPREL16_HIGHERA:
5743 case R_PPC64_DTPREL16_HIGHEST:
5744 case R_PPC64_DTPREL16_HIGHESTA:
5749 case R_PPC64_REL16_LO:
5750 case R_PPC64_REL16_HI:
5751 case R_PPC64_REL16_HA:
5752 case R_PPC64_REL16DX_HA:
5755 /* Not supported as a dynamic relocation. */
5756 case R_PPC64_ADDR64_LOCAL:
5757 if (bfd_link_pic (info))
5759 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5761 /* xgettext:c-format */
5762 info->callbacks->einfo (_("%H: %s reloc unsupported "
5763 "in shared libraries and PIEs\n"),
5764 abfd, sec, rel->r_offset,
5765 ppc64_elf_howto_table[r_type]->name);
5766 bfd_set_error (bfd_error_bad_value);
5772 case R_PPC64_TOC16_DS:
5773 htab->do_multi_toc = 1;
5774 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5776 case R_PPC64_TOC16_LO:
5777 case R_PPC64_TOC16_HI:
5778 case R_PPC64_TOC16_HA:
5779 case R_PPC64_TOC16_LO_DS:
5780 sec->has_toc_reloc = 1;
5787 /* This relocation describes the C++ object vtable hierarchy.
5788 Reconstruct it for later use during GC. */
5789 case R_PPC64_GNU_VTINHERIT:
5790 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5794 /* This relocation describes which C++ vtable entries are actually
5795 used. Record for later use during GC. */
5796 case R_PPC64_GNU_VTENTRY:
5797 BFD_ASSERT (h != NULL);
5799 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5804 case R_PPC64_REL14_BRTAKEN:
5805 case R_PPC64_REL14_BRNTAKEN:
5807 asection *dest = NULL;
5809 /* Heuristic: If jumping outside our section, chances are
5810 we are going to need a stub. */
5813 /* If the sym is weak it may be overridden later, so
5814 don't assume we know where a weak sym lives. */
5815 if (h->root.type == bfd_link_hash_defined)
5816 dest = h->root.u.def.section;
5820 Elf_Internal_Sym *isym;
5822 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5827 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5831 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
5835 case R_PPC64_PLTCALL:
5836 ppc64_elf_section_data (sec)->has_pltcall = 1;
5845 if (h->root.root.string[0] == '.'
5846 && h->root.root.string[1] != '\0')
5847 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5849 if (h == tga || h == dottga)
5851 sec->has_tls_reloc = 1;
5853 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5854 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5855 /* We have a new-style __tls_get_addr call with
5859 /* Mark this section as having an old-style call. */
5860 sec->has_tls_get_addr_call = 1;
5862 plt_list = &h->plt.plist;
5865 /* We may need a .plt entry if the function this reloc
5866 refers to is in a shared lib. */
5868 && !update_plt_info (abfd, plt_list, rel->r_addend))
5872 case R_PPC64_ADDR14:
5873 case R_PPC64_ADDR14_BRNTAKEN:
5874 case R_PPC64_ADDR14_BRTAKEN:
5875 case R_PPC64_ADDR24:
5878 case R_PPC64_TPREL64:
5879 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
5880 if (bfd_link_dll (info))
5881 info->flags |= DF_STATIC_TLS;
5884 case R_PPC64_DTPMOD64:
5885 if (rel + 1 < rel_end
5886 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5887 && rel[1].r_offset == rel->r_offset + 8)
5888 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
5890 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
5893 case R_PPC64_DTPREL64:
5894 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5896 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5897 && rel[-1].r_offset == rel->r_offset - 8)
5898 /* This is the second reloc of a dtpmod, dtprel pair.
5899 Don't mark with TLS_DTPREL. */
5903 sec->has_tls_reloc = 1;
5906 struct ppc_link_hash_entry *eh;
5907 eh = (struct ppc_link_hash_entry *) h;
5908 eh->tls_mask |= tls_type;
5911 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5912 rel->r_addend, tls_type))
5915 ppc64_sec = ppc64_elf_section_data (sec);
5916 if (ppc64_sec->sec_type != sec_toc)
5920 /* One extra to simplify get_tls_mask. */
5921 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5922 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5923 if (ppc64_sec->u.toc.symndx == NULL)
5925 amt = sec->size * sizeof (bfd_vma) / 8;
5926 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5927 if (ppc64_sec->u.toc.add == NULL)
5929 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5930 ppc64_sec->sec_type = sec_toc;
5932 BFD_ASSERT (rel->r_offset % 8 == 0);
5933 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5934 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5936 /* Mark the second slot of a GD or LD entry.
5937 -1 to indicate GD and -2 to indicate LD. */
5938 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5939 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5940 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5941 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5944 case R_PPC64_TPREL16:
5945 case R_PPC64_TPREL16_LO:
5946 case R_PPC64_TPREL16_HI:
5947 case R_PPC64_TPREL16_HA:
5948 case R_PPC64_TPREL16_DS:
5949 case R_PPC64_TPREL16_LO_DS:
5950 case R_PPC64_TPREL16_HIGH:
5951 case R_PPC64_TPREL16_HIGHA:
5952 case R_PPC64_TPREL16_HIGHER:
5953 case R_PPC64_TPREL16_HIGHERA:
5954 case R_PPC64_TPREL16_HIGHEST:
5955 case R_PPC64_TPREL16_HIGHESTA:
5956 if (bfd_link_dll (info))
5957 info->flags |= DF_STATIC_TLS;
5960 case R_PPC64_ADDR64:
5962 && rel + 1 < rel_end
5963 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5966 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5970 case R_PPC64_ADDR16:
5971 case R_PPC64_ADDR16_DS:
5972 case R_PPC64_ADDR16_HA:
5973 case R_PPC64_ADDR16_HI:
5974 case R_PPC64_ADDR16_HIGH:
5975 case R_PPC64_ADDR16_HIGHA:
5976 case R_PPC64_ADDR16_HIGHER:
5977 case R_PPC64_ADDR16_HIGHERA:
5978 case R_PPC64_ADDR16_HIGHEST:
5979 case R_PPC64_ADDR16_HIGHESTA:
5980 case R_PPC64_ADDR16_LO:
5981 case R_PPC64_ADDR16_LO_DS:
5982 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5983 && rel->r_addend == 0)
5985 /* We may need a .plt entry if this reloc refers to a
5986 function in a shared lib. */
5987 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5989 h->pointer_equality_needed = 1;
5996 case R_PPC64_ADDR32:
5997 case R_PPC64_UADDR16:
5998 case R_PPC64_UADDR32:
5999 case R_PPC64_UADDR64:
6001 if (h != NULL && !bfd_link_pic (info))
6002 /* We may need a copy reloc. */
6005 /* Don't propagate .opd relocs. */
6006 if (NO_OPD_RELOCS && is_opd)
6009 /* If we are creating a shared library, and this is a reloc
6010 against a global symbol, or a non PC relative reloc
6011 against a local symbol, then we need to copy the reloc
6012 into the shared library. However, if we are linking with
6013 -Bsymbolic, we do not need to copy a reloc against a
6014 global symbol which is defined in an object we are
6015 including in the link (i.e., DEF_REGULAR is set). At
6016 this point we have not seen all the input files, so it is
6017 possible that DEF_REGULAR is not set now but will be set
6018 later (it is never cleared). In case of a weak definition,
6019 DEF_REGULAR may be cleared later by a strong definition in
6020 a shared library. We account for that possibility below by
6021 storing information in the dyn_relocs field of the hash
6022 table entry. A similar situation occurs when creating
6023 shared libraries and symbol visibility changes render the
6026 If on the other hand, we are creating an executable, we
6027 may need to keep relocations for symbols satisfied by a
6028 dynamic library if we manage to avoid copy relocs for the
6031 if ((bfd_link_pic (info)
6032 && (must_be_dyn_reloc (info, r_type)
6034 && (!SYMBOLIC_BIND (info, h)
6035 || h->root.type == bfd_link_hash_defweak
6036 || !h->def_regular))))
6037 || (ELIMINATE_COPY_RELOCS
6038 && !bfd_link_pic (info)
6040 && (h->root.type == bfd_link_hash_defweak
6041 || !h->def_regular))
6042 || (!bfd_link_pic (info)
6045 /* We must copy these reloc types into the output file.
6046 Create a reloc section in dynobj and make room for
6050 sreloc = _bfd_elf_make_dynamic_reloc_section
6051 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
6057 /* If this is a global symbol, we count the number of
6058 relocations we need for this symbol. */
6061 struct elf_dyn_relocs *p;
6062 struct elf_dyn_relocs **head;
6064 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6066 if (p == NULL || p->sec != sec)
6068 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
6078 if (!must_be_dyn_reloc (info, r_type))
6083 /* Track dynamic relocs needed for local syms too.
6084 We really need local syms available to do this
6086 struct ppc_dyn_relocs *p;
6087 struct ppc_dyn_relocs **head;
6088 bfd_boolean is_ifunc;
6091 Elf_Internal_Sym *isym;
6093 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6098 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6102 vpp = &elf_section_data (s)->local_dynrel;
6103 head = (struct ppc_dyn_relocs **) vpp;
6104 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
6106 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
6108 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
6110 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
6116 p->ifunc = is_ifunc;
6132 /* Merge backend specific data from an object file to the output
6133 object file when linking. */
6136 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
6138 bfd *obfd = info->output_bfd;
6139 unsigned long iflags, oflags;
6141 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
6144 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
6147 if (!_bfd_generic_verify_endian_match (ibfd, info))
6150 iflags = elf_elfheader (ibfd)->e_flags;
6151 oflags = elf_elfheader (obfd)->e_flags;
6153 if (iflags & ~EF_PPC64_ABI)
6156 /* xgettext:c-format */
6157 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
6158 bfd_set_error (bfd_error_bad_value);
6161 else if (iflags != oflags && iflags != 0)
6164 /* xgettext:c-format */
6165 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
6166 ibfd, iflags, oflags);
6167 bfd_set_error (bfd_error_bad_value);
6171 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
6173 /* Merge Tag_compatibility attributes and any common GNU ones. */
6174 _bfd_elf_merge_object_attributes (ibfd, info);
6180 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6182 /* Print normal ELF private data. */
6183 _bfd_elf_print_private_bfd_data (abfd, ptr);
6185 if (elf_elfheader (abfd)->e_flags != 0)
6189 fprintf (file, _("private flags = 0x%lx:"),
6190 elf_elfheader (abfd)->e_flags);
6192 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6193 fprintf (file, _(" [abiv%ld]"),
6194 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6201 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
6202 of the code entry point, and its section, which must be in the same
6203 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
6206 opd_entry_value (asection *opd_sec,
6208 asection **code_sec,
6210 bfd_boolean in_code_sec)
6212 bfd *opd_bfd = opd_sec->owner;
6213 Elf_Internal_Rela *relocs;
6214 Elf_Internal_Rela *lo, *hi, *look;
6217 /* No relocs implies we are linking a --just-symbols object, or looking
6218 at a final linked executable with addr2line or somesuch. */
6219 if (opd_sec->reloc_count == 0)
6221 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
6223 if (contents == NULL)
6225 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6226 return (bfd_vma) -1;
6227 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6230 /* PR 17512: file: 64b9dfbb. */
6231 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
6232 return (bfd_vma) -1;
6234 val = bfd_get_64 (opd_bfd, contents + offset);
6235 if (code_sec != NULL)
6237 asection *sec, *likely = NULL;
6243 && val < sec->vma + sec->size)
6249 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6251 && (sec->flags & SEC_LOAD) != 0
6252 && (sec->flags & SEC_ALLOC) != 0)
6257 if (code_off != NULL)
6258 *code_off = val - likely->vma;
6264 BFD_ASSERT (is_ppc64_elf (opd_bfd));
6266 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
6268 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
6269 /* PR 17512: file: df8e1fd6. */
6271 return (bfd_vma) -1;
6273 /* Go find the opd reloc at the sym address. */
6275 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
6279 look = lo + (hi - lo) / 2;
6280 if (look->r_offset < offset)
6282 else if (look->r_offset > offset)
6286 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6288 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6289 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6291 unsigned long symndx = ELF64_R_SYM (look->r_info);
6292 asection *sec = NULL;
6294 if (symndx >= symtab_hdr->sh_info
6295 && elf_sym_hashes (opd_bfd) != NULL)
6297 struct elf_link_hash_entry **sym_hashes;
6298 struct elf_link_hash_entry *rh;
6300 sym_hashes = elf_sym_hashes (opd_bfd);
6301 rh = sym_hashes[symndx - symtab_hdr->sh_info];
6304 rh = elf_follow_link (rh);
6305 if (rh->root.type != bfd_link_hash_defined
6306 && rh->root.type != bfd_link_hash_defweak)
6308 if (rh->root.u.def.section->owner == opd_bfd)
6310 val = rh->root.u.def.value;
6311 sec = rh->root.u.def.section;
6318 Elf_Internal_Sym *sym;
6320 if (symndx < symtab_hdr->sh_info)
6322 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6325 size_t symcnt = symtab_hdr->sh_info;
6326 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6331 symtab_hdr->contents = (bfd_byte *) sym;
6337 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6343 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6346 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6347 val = sym->st_value;
6350 val += look->r_addend;
6351 if (code_off != NULL)
6353 if (code_sec != NULL)
6355 if (in_code_sec && *code_sec != sec)
6360 if (sec->output_section != NULL)
6361 val += sec->output_section->vma + sec->output_offset;
6370 /* If the ELF symbol SYM might be a function in SEC, return the
6371 function size and set *CODE_OFF to the function's entry point,
6372 otherwise return zero. */
6374 static bfd_size_type
6375 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6380 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6381 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6385 if (!(sym->flags & BSF_SYNTHETIC))
6386 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6388 if (strcmp (sym->section->name, ".opd") == 0)
6390 struct _opd_sec_data *opd = get_opd_info (sym->section);
6391 bfd_vma symval = sym->value;
6394 && opd->adjust != NULL
6395 && elf_section_data (sym->section)->relocs != NULL)
6397 /* opd_entry_value will use cached relocs that have been
6398 adjusted, but with raw symbols. That means both local
6399 and global symbols need adjusting. */
6400 long adjust = opd->adjust[OPD_NDX (symval)];
6406 if (opd_entry_value (sym->section, symval,
6407 &sec, code_off, TRUE) == (bfd_vma) -1)
6409 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6410 symbol. This size has nothing to do with the code size of the
6411 function, which is what we're supposed to return, but the
6412 code size isn't available without looking up the dot-sym.
6413 However, doing that would be a waste of time particularly
6414 since elf_find_function will look at the dot-sym anyway.
6415 Now, elf_find_function will keep the largest size of any
6416 function sym found at the code address of interest, so return
6417 1 here to avoid it incorrectly caching a larger function size
6418 for a small function. This does mean we return the wrong
6419 size for a new-ABI function of size 24, but all that does is
6420 disable caching for such functions. */
6426 if (sym->section != sec)
6428 *code_off = sym->value;
6435 /* Return true if symbol is a strong function defined in an ELFv2
6436 object with st_other localentry bits of zero, ie. its local entry
6437 point coincides with its global entry point. */
6440 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
6443 && h->type == STT_FUNC
6444 && h->root.type == bfd_link_hash_defined
6445 && (STO_PPC64_LOCAL_MASK & h->other) == 0
6446 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
6447 && is_ppc64_elf (h->root.u.def.section->owner)
6448 && abiversion (h->root.u.def.section->owner) >= 2);
6451 /* Return true if symbol is defined in a regular object file. */
6454 is_static_defined (struct elf_link_hash_entry *h)
6456 return ((h->root.type == bfd_link_hash_defined
6457 || h->root.type == bfd_link_hash_defweak)
6458 && h->root.u.def.section != NULL
6459 && h->root.u.def.section->output_section != NULL);
6462 /* If FDH is a function descriptor symbol, return the associated code
6463 entry symbol if it is defined. Return NULL otherwise. */
6465 static struct ppc_link_hash_entry *
6466 defined_code_entry (struct ppc_link_hash_entry *fdh)
6468 if (fdh->is_func_descriptor)
6470 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6471 if (fh->elf.root.type == bfd_link_hash_defined
6472 || fh->elf.root.type == bfd_link_hash_defweak)
6478 /* If FH is a function code entry symbol, return the associated
6479 function descriptor symbol if it is defined. Return NULL otherwise. */
6481 static struct ppc_link_hash_entry *
6482 defined_func_desc (struct ppc_link_hash_entry *fh)
6485 && fh->oh->is_func_descriptor)
6487 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6488 if (fdh->elf.root.type == bfd_link_hash_defined
6489 || fdh->elf.root.type == bfd_link_hash_defweak)
6495 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
6497 /* Garbage collect sections, after first dealing with dot-symbols. */
6500 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
6502 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6504 if (htab != NULL && htab->need_func_desc_adj)
6506 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6507 htab->need_func_desc_adj = 0;
6509 return bfd_elf_gc_sections (abfd, info);
6512 /* Mark all our entry sym sections, both opd and code section. */
6515 ppc64_elf_gc_keep (struct bfd_link_info *info)
6517 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6518 struct bfd_sym_chain *sym;
6523 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6525 struct ppc_link_hash_entry *eh, *fh;
6528 eh = (struct ppc_link_hash_entry *)
6529 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
6532 if (eh->elf.root.type != bfd_link_hash_defined
6533 && eh->elf.root.type != bfd_link_hash_defweak)
6536 fh = defined_code_entry (eh);
6539 sec = fh->elf.root.u.def.section;
6540 sec->flags |= SEC_KEEP;
6542 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6543 && opd_entry_value (eh->elf.root.u.def.section,
6544 eh->elf.root.u.def.value,
6545 &sec, NULL, FALSE) != (bfd_vma) -1)
6546 sec->flags |= SEC_KEEP;
6548 sec = eh->elf.root.u.def.section;
6549 sec->flags |= SEC_KEEP;
6553 /* Mark sections containing dynamically referenced symbols. When
6554 building shared libraries, we must assume that any visible symbol is
6558 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6560 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6561 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
6562 struct ppc_link_hash_entry *fdh;
6563 struct bfd_elf_dynamic_list *d = info->dynamic_list;
6565 /* Dynamic linking info is on the func descriptor sym. */
6566 fdh = defined_func_desc (eh);
6570 if ((eh->elf.root.type == bfd_link_hash_defined
6571 || eh->elf.root.type == bfd_link_hash_defweak)
6572 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
6573 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
6574 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
6575 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
6576 && (!bfd_link_executable (info)
6577 || info->gc_keep_exported
6578 || info->export_dynamic
6581 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
6582 && (eh->elf.versioned >= versioned
6583 || !bfd_hide_sym_by_version (info->version_info,
6584 eh->elf.root.root.string)))))
6587 struct ppc_link_hash_entry *fh;
6589 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6591 /* Function descriptor syms cause the associated
6592 function code sym section to be marked. */
6593 fh = defined_code_entry (eh);
6596 code_sec = fh->elf.root.u.def.section;
6597 code_sec->flags |= SEC_KEEP;
6599 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6600 && opd_entry_value (eh->elf.root.u.def.section,
6601 eh->elf.root.u.def.value,
6602 &code_sec, NULL, FALSE) != (bfd_vma) -1)
6603 code_sec->flags |= SEC_KEEP;
6609 /* Return the section that should be marked against GC for a given
6613 ppc64_elf_gc_mark_hook (asection *sec,
6614 struct bfd_link_info *info,
6615 Elf_Internal_Rela *rel,
6616 struct elf_link_hash_entry *h,
6617 Elf_Internal_Sym *sym)
6621 /* Syms return NULL if we're marking .opd, so we avoid marking all
6622 function sections, as all functions are referenced in .opd. */
6624 if (get_opd_info (sec) != NULL)
6629 enum elf_ppc64_reloc_type r_type;
6630 struct ppc_link_hash_entry *eh, *fh, *fdh;
6632 r_type = ELF64_R_TYPE (rel->r_info);
6635 case R_PPC64_GNU_VTINHERIT:
6636 case R_PPC64_GNU_VTENTRY:
6640 switch (h->root.type)
6642 case bfd_link_hash_defined:
6643 case bfd_link_hash_defweak:
6644 eh = (struct ppc_link_hash_entry *) h;
6645 fdh = defined_func_desc (eh);
6648 /* -mcall-aixdesc code references the dot-symbol on
6649 a call reloc. Mark the function descriptor too
6650 against garbage collection. */
6652 if (fdh->elf.is_weakalias)
6653 weakdef (&fdh->elf)->mark = 1;
6657 /* Function descriptor syms cause the associated
6658 function code sym section to be marked. */
6659 fh = defined_code_entry (eh);
6662 /* They also mark their opd section. */
6663 eh->elf.root.u.def.section->gc_mark = 1;
6665 rsec = fh->elf.root.u.def.section;
6667 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6668 && opd_entry_value (eh->elf.root.u.def.section,
6669 eh->elf.root.u.def.value,
6670 &rsec, NULL, FALSE) != (bfd_vma) -1)
6671 eh->elf.root.u.def.section->gc_mark = 1;
6673 rsec = h->root.u.def.section;
6676 case bfd_link_hash_common:
6677 rsec = h->root.u.c.p->section;
6681 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
6687 struct _opd_sec_data *opd;
6689 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6690 opd = get_opd_info (rsec);
6691 if (opd != NULL && opd->func_sec != NULL)
6695 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
6702 /* The maximum size of .sfpr. */
6703 #define SFPR_MAX (218*4)
6705 struct sfpr_def_parms
6707 const char name[12];
6708 unsigned char lo, hi;
6709 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6710 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6713 /* Auto-generate _save*, _rest* functions in .sfpr.
6714 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6718 sfpr_define (struct bfd_link_info *info,
6719 const struct sfpr_def_parms *parm,
6722 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6724 size_t len = strlen (parm->name);
6725 bfd_boolean writing = FALSE;
6731 memcpy (sym, parm->name, len);
6734 for (i = parm->lo; i <= parm->hi; i++)
6736 struct ppc_link_hash_entry *h;
6738 sym[len + 0] = i / 10 + '0';
6739 sym[len + 1] = i % 10 + '0';
6740 h = (struct ppc_link_hash_entry *)
6741 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
6742 if (stub_sec != NULL)
6745 && h->elf.root.type == bfd_link_hash_defined
6746 && h->elf.root.u.def.section == htab->sfpr)
6748 struct elf_link_hash_entry *s;
6750 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6751 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6754 if (s->root.type == bfd_link_hash_new
6755 || (s->root.type = bfd_link_hash_defined
6756 && s->root.u.def.section == stub_sec))
6758 s->root.type = bfd_link_hash_defined;
6759 s->root.u.def.section = stub_sec;
6760 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
6761 + h->elf.root.u.def.value);
6764 s->ref_regular_nonweak = 1;
6765 s->forced_local = 1;
6767 s->root.linker_def = 1;
6775 if (!h->elf.def_regular)
6777 h->elf.root.type = bfd_link_hash_defined;
6778 h->elf.root.u.def.section = htab->sfpr;
6779 h->elf.root.u.def.value = htab->sfpr->size;
6780 h->elf.type = STT_FUNC;
6781 h->elf.def_regular = 1;
6783 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6785 if (htab->sfpr->contents == NULL)
6787 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6788 if (htab->sfpr->contents == NULL)
6795 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6797 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6799 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6800 htab->sfpr->size = p - htab->sfpr->contents;
6808 savegpr0 (bfd *abfd, bfd_byte *p, int r)
6810 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6815 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6817 p = savegpr0 (abfd, p, r);
6818 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6820 bfd_put_32 (abfd, BLR, p);
6825 restgpr0 (bfd *abfd, bfd_byte *p, int r)
6827 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6832 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6834 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6836 p = restgpr0 (abfd, p, r);
6837 bfd_put_32 (abfd, MTLR_R0, p);
6841 p = restgpr0 (abfd, p, 30);
6842 p = restgpr0 (abfd, p, 31);
6844 bfd_put_32 (abfd, BLR, p);
6849 savegpr1 (bfd *abfd, bfd_byte *p, int r)
6851 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6856 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6858 p = savegpr1 (abfd, p, r);
6859 bfd_put_32 (abfd, BLR, p);
6864 restgpr1 (bfd *abfd, bfd_byte *p, int r)
6866 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6871 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6873 p = restgpr1 (abfd, p, r);
6874 bfd_put_32 (abfd, BLR, p);
6879 savefpr (bfd *abfd, bfd_byte *p, int r)
6881 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6886 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6888 p = savefpr (abfd, p, r);
6889 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6891 bfd_put_32 (abfd, BLR, p);
6896 restfpr (bfd *abfd, bfd_byte *p, int r)
6898 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6903 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6905 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6907 p = restfpr (abfd, p, r);
6908 bfd_put_32 (abfd, MTLR_R0, p);
6912 p = restfpr (abfd, p, 30);
6913 p = restfpr (abfd, p, 31);
6915 bfd_put_32 (abfd, BLR, p);
6920 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6922 p = savefpr (abfd, p, r);
6923 bfd_put_32 (abfd, BLR, p);
6928 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6930 p = restfpr (abfd, p, r);
6931 bfd_put_32 (abfd, BLR, p);
6936 savevr (bfd *abfd, bfd_byte *p, int r)
6938 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6940 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6945 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6947 p = savevr (abfd, p, r);
6948 bfd_put_32 (abfd, BLR, p);
6953 restvr (bfd *abfd, bfd_byte *p, int r)
6955 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6957 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6962 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6964 p = restvr (abfd, p, r);
6965 bfd_put_32 (abfd, BLR, p);
6969 /* Called via elf_link_hash_traverse to transfer dynamic linking
6970 information on function code symbol entries to their corresponding
6971 function descriptor symbol entries. */
6974 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6976 struct bfd_link_info *info;
6977 struct ppc_link_hash_table *htab;
6978 struct ppc_link_hash_entry *fh;
6979 struct ppc_link_hash_entry *fdh;
6980 bfd_boolean force_local;
6982 fh = (struct ppc_link_hash_entry *) h;
6983 if (fh->elf.root.type == bfd_link_hash_indirect)
6989 if (fh->elf.root.root.string[0] != '.'
6990 || fh->elf.root.root.string[1] == '\0')
6994 htab = ppc_hash_table (info);
6998 /* Find the corresponding function descriptor symbol. */
6999 fdh = lookup_fdh (fh, htab);
7001 /* Resolve undefined references to dot-symbols as the value
7002 in the function descriptor, if we have one in a regular object.
7003 This is to satisfy cases like ".quad .foo". Calls to functions
7004 in dynamic objects are handled elsewhere. */
7005 if ((fh->elf.root.type == bfd_link_hash_undefined
7006 || fh->elf.root.type == bfd_link_hash_undefweak)
7007 && (fdh->elf.root.type == bfd_link_hash_defined
7008 || fdh->elf.root.type == bfd_link_hash_defweak)
7009 && get_opd_info (fdh->elf.root.u.def.section) != NULL
7010 && opd_entry_value (fdh->elf.root.u.def.section,
7011 fdh->elf.root.u.def.value,
7012 &fh->elf.root.u.def.section,
7013 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
7015 fh->elf.root.type = fdh->elf.root.type;
7016 fh->elf.forced_local = 1;
7017 fh->elf.def_regular = fdh->elf.def_regular;
7018 fh->elf.def_dynamic = fdh->elf.def_dynamic;
7021 if (!fh->elf.dynamic)
7023 struct plt_entry *ent;
7025 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
7026 if (ent->plt.refcount > 0)
7032 /* Create a descriptor as undefined if necessary. */
7034 && !bfd_link_executable (info)
7035 && (fh->elf.root.type == bfd_link_hash_undefined
7036 || fh->elf.root.type == bfd_link_hash_undefweak))
7038 fdh = make_fdh (info, fh);
7043 /* We can't support overriding of symbols on a fake descriptor. */
7046 && (fh->elf.root.type == bfd_link_hash_defined
7047 || fh->elf.root.type == bfd_link_hash_defweak))
7048 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
7050 /* Transfer dynamic linking information to the function descriptor. */
7053 fdh->elf.ref_regular |= fh->elf.ref_regular;
7054 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7055 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7056 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
7057 fdh->elf.dynamic |= fh->elf.dynamic;
7058 fdh->elf.needs_plt |= (fh->elf.needs_plt
7059 || fh->elf.type == STT_FUNC
7060 || fh->elf.type == STT_GNU_IFUNC);
7061 move_plt_plist (fh, fdh);
7063 if (!fdh->elf.forced_local
7064 && fh->elf.dynindx != -1)
7065 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
7069 /* Now that the info is on the function descriptor, clear the
7070 function code sym info. Any function code syms for which we
7071 don't have a definition in a regular file, we force local.
7072 This prevents a shared library from exporting syms that have
7073 been imported from another library. Function code syms that
7074 are really in the library we must leave global to prevent the
7075 linker dragging in a definition from a static library. */
7076 force_local = (!fh->elf.def_regular
7078 || !fdh->elf.def_regular
7079 || fdh->elf.forced_local);
7080 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7085 static const struct sfpr_def_parms save_res_funcs[] =
7087 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7088 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7089 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7090 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7091 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7092 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7093 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7094 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7095 { "._savef", 14, 31, savefpr, savefpr1_tail },
7096 { "._restf", 14, 31, restfpr, restfpr1_tail },
7097 { "_savevr_", 20, 31, savevr, savevr_tail },
7098 { "_restvr_", 20, 31, restvr, restvr_tail }
7101 /* Called near the start of bfd_elf_size_dynamic_sections. We use
7102 this hook to a) provide some gcc support functions, and b) transfer
7103 dynamic linking information gathered so far on function code symbol
7104 entries, to their corresponding function descriptor symbol entries. */
7107 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7108 struct bfd_link_info *info)
7110 struct ppc_link_hash_table *htab;
7112 htab = ppc_hash_table (info);
7116 /* Provide any missing _save* and _rest* functions. */
7117 if (htab->sfpr != NULL)
7121 htab->sfpr->size = 0;
7122 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7123 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7125 if (htab->sfpr->size == 0)
7126 htab->sfpr->flags |= SEC_EXCLUDE;
7129 if (bfd_link_relocatable (info))
7132 if (htab->elf.hgot != NULL)
7134 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7135 /* Make .TOC. defined so as to prevent it being made dynamic.
7136 The wrong value here is fixed later in ppc64_elf_set_toc. */
7137 if (!htab->elf.hgot->def_regular
7138 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7140 htab->elf.hgot->root.type = bfd_link_hash_defined;
7141 htab->elf.hgot->root.u.def.value = 0;
7142 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7143 htab->elf.hgot->def_regular = 1;
7144 htab->elf.hgot->root.linker_def = 1;
7146 htab->elf.hgot->type = STT_OBJECT;
7147 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7151 if (htab->need_func_desc_adj)
7153 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7154 htab->need_func_desc_adj = 0;
7160 /* Find dynamic relocs for H that apply to read-only sections. */
7163 readonly_dynrelocs (struct elf_link_hash_entry *h)
7165 struct ppc_link_hash_entry *eh;
7166 struct elf_dyn_relocs *p;
7168 eh = (struct ppc_link_hash_entry *) h;
7169 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7171 asection *s = p->sec->output_section;
7173 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7179 /* Return true if we have dynamic relocs against H or any of its weak
7180 aliases, that apply to read-only sections. Cannot be used after
7181 size_dynamic_sections. */
7184 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7186 struct ppc_link_hash_entry *eh;
7188 eh = (struct ppc_link_hash_entry *) h;
7191 if (readonly_dynrelocs (&eh->elf))
7193 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
7194 } while (eh != NULL && &eh->elf != h);
7199 /* Return whether EH has pc-relative dynamic relocs. */
7202 pc_dynrelocs (struct ppc_link_hash_entry *eh)
7204 struct elf_dyn_relocs *p;
7206 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7207 if (p->pc_count != 0)
7212 /* Return true if a global entry stub will be created for H. Valid
7213 for ELFv2 before plt entries have been allocated. */
7216 global_entry_stub (struct elf_link_hash_entry *h)
7218 struct plt_entry *pent;
7220 if (!h->pointer_equality_needed
7224 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7225 if (pent->plt.refcount > 0
7226 && pent->addend == 0)
7232 /* Adjust a symbol defined by a dynamic object and referenced by a
7233 regular object. The current definition is in some section of the
7234 dynamic object, but we're not including those sections. We have to
7235 change the definition to something the rest of the link can
7239 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7240 struct elf_link_hash_entry *h)
7242 struct ppc_link_hash_table *htab;
7245 htab = ppc_hash_table (info);
7249 /* Deal with function syms. */
7250 if (h->type == STT_FUNC
7251 || h->type == STT_GNU_IFUNC
7254 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
7255 || SYMBOL_CALLS_LOCAL (info, h)
7256 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
7257 /* Discard dyn_relocs when non-pic if we've decided that a
7258 function symbol is local and not an ifunc. We keep dynamic
7259 relocs for ifuncs when local rather than always emitting a
7260 plt call stub for them and defining the symbol on the call
7261 stub. We can't do that for ELFv1 anyway (a function symbol
7262 is defined on a descriptor, not code) and it can be faster at
7263 run-time due to not needing to bounce through a stub. The
7264 dyn_relocs for ifuncs will be applied even in a static
7266 if (!bfd_link_pic (info)
7267 && h->type != STT_GNU_IFUNC
7269 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7271 /* Clear procedure linkage table information for any symbol that
7272 won't need a .plt entry. */
7273 struct plt_entry *ent;
7274 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7275 if (ent->plt.refcount > 0)
7278 || (h->type != STT_GNU_IFUNC
7280 && (htab->can_convert_all_inline_plt
7281 || (((struct ppc_link_hash_entry *) h)->tls_mask
7282 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
7284 h->plt.plist = NULL;
7286 h->pointer_equality_needed = 0;
7288 else if (abiversion (info->output_bfd) >= 2)
7290 /* Taking a function's address in a read/write section
7291 doesn't require us to define the function symbol in the
7292 executable on a global entry stub. A dynamic reloc can
7293 be used instead. The reason we prefer a few more dynamic
7294 relocs is that calling via a global entry stub costs a
7295 few more instructions, and pointer_equality_needed causes
7296 extra work in ld.so when resolving these symbols. */
7297 if (global_entry_stub (h))
7299 if (!readonly_dynrelocs (h))
7301 h->pointer_equality_needed = 0;
7302 /* If we haven't seen a branch reloc and the symbol
7303 isn't an ifunc then we don't need a plt entry. */
7305 h->plt.plist = NULL;
7307 else if (!bfd_link_pic (info))
7308 /* We are going to be defining the function symbol on the
7309 plt stub, so no dyn_relocs needed when non-pic. */
7310 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7313 /* ELFv2 function symbols can't have copy relocs. */
7316 else if (!h->needs_plt
7317 && !readonly_dynrelocs (h))
7319 /* If we haven't seen a branch reloc and the symbol isn't an
7320 ifunc then we don't need a plt entry. */
7321 h->plt.plist = NULL;
7322 h->pointer_equality_needed = 0;
7327 h->plt.plist = NULL;
7329 /* If this is a weak symbol, and there is a real definition, the
7330 processor independent code will have arranged for us to see the
7331 real definition first, and we can just use the same value. */
7332 if (h->is_weakalias)
7334 struct elf_link_hash_entry *def = weakdef (h);
7335 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
7336 h->root.u.def.section = def->root.u.def.section;
7337 h->root.u.def.value = def->root.u.def.value;
7338 if (def->root.u.def.section == htab->elf.sdynbss
7339 || def->root.u.def.section == htab->elf.sdynrelro)
7340 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7344 /* If we are creating a shared library, we must presume that the
7345 only references to the symbol are via the global offset table.
7346 For such cases we need not do anything here; the relocations will
7347 be handled correctly by relocate_section. */
7348 if (bfd_link_pic (info))
7351 /* If there are no references to this symbol that do not use the
7352 GOT, we don't need to generate a copy reloc. */
7353 if (!h->non_got_ref)
7356 /* Don't generate a copy reloc for symbols defined in the executable. */
7357 if (!h->def_dynamic || !h->ref_regular || h->def_regular
7359 /* If -z nocopyreloc was given, don't generate them either. */
7360 || info->nocopyreloc
7362 /* If we don't find any dynamic relocs in read-only sections, then
7363 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7364 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
7366 /* Protected variables do not work with .dynbss. The copy in
7367 .dynbss won't be used by the shared library with the protected
7368 definition for the variable. Text relocations are preferable
7369 to an incorrect program. */
7370 || h->protected_def)
7373 if (h->plt.plist != NULL)
7375 /* We should never get here, but unfortunately there are versions
7376 of gcc out there that improperly (for this ABI) put initialized
7377 function pointers, vtable refs and suchlike in read-only
7378 sections. Allow them to proceed, but warn that this might
7379 break at runtime. */
7380 info->callbacks->einfo
7381 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
7382 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7383 h->root.root.string);
7386 /* This is a reference to a symbol defined by a dynamic object which
7387 is not a function. */
7389 /* We must allocate the symbol in our .dynbss section, which will
7390 become part of the .bss section of the executable. There will be
7391 an entry for this symbol in the .dynsym section. The dynamic
7392 object will contain position independent code, so all references
7393 from the dynamic object to this symbol will go through the global
7394 offset table. The dynamic linker will use the .dynsym entry to
7395 determine the address it must put in the global offset table, so
7396 both the dynamic object and the regular object will refer to the
7397 same memory location for the variable. */
7398 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
7400 s = htab->elf.sdynrelro;
7401 srel = htab->elf.sreldynrelro;
7405 s = htab->elf.sdynbss;
7406 srel = htab->elf.srelbss;
7408 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
7410 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
7411 linker to copy the initial value out of the dynamic object
7412 and into the runtime process image. */
7413 srel->size += sizeof (Elf64_External_Rela);
7417 /* We no longer want dyn_relocs. */
7418 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7419 return _bfd_elf_adjust_dynamic_copy (info, h, s);
7422 /* If given a function descriptor symbol, hide both the function code
7423 sym and the descriptor. */
7425 ppc64_elf_hide_symbol (struct bfd_link_info *info,
7426 struct elf_link_hash_entry *h,
7427 bfd_boolean force_local)
7429 struct ppc_link_hash_entry *eh;
7430 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7432 eh = (struct ppc_link_hash_entry *) h;
7433 if (eh->is_func_descriptor)
7435 struct ppc_link_hash_entry *fh = eh->oh;
7440 struct elf_link_hash_table *htab = elf_hash_table (info);
7443 /* We aren't supposed to use alloca in BFD because on
7444 systems which do not have alloca the version in libiberty
7445 calls xmalloc, which might cause the program to crash
7446 when it runs out of memory. This function doesn't have a
7447 return status, so there's no way to gracefully return an
7448 error. So cheat. We know that string[-1] can be safely
7449 accessed; It's either a string in an ELF string table,
7450 or allocated in an objalloc structure. */
7452 p = eh->elf.root.root.string - 1;
7455 fh = (struct ppc_link_hash_entry *)
7456 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7459 /* Unfortunately, if it so happens that the string we were
7460 looking for was allocated immediately before this string,
7461 then we overwrote the string terminator. That's the only
7462 reason the lookup should fail. */
7465 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7466 while (q >= eh->elf.root.root.string && *q == *p)
7468 if (q < eh->elf.root.root.string && *p == '.')
7469 fh = (struct ppc_link_hash_entry *)
7470 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7479 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7484 get_sym_h (struct elf_link_hash_entry **hp,
7485 Elf_Internal_Sym **symp,
7487 unsigned char **tls_maskp,
7488 Elf_Internal_Sym **locsymsp,
7489 unsigned long r_symndx,
7492 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7494 if (r_symndx >= symtab_hdr->sh_info)
7496 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7497 struct elf_link_hash_entry *h;
7499 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7500 h = elf_follow_link (h);
7508 if (symsecp != NULL)
7510 asection *symsec = NULL;
7511 if (h->root.type == bfd_link_hash_defined
7512 || h->root.type == bfd_link_hash_defweak)
7513 symsec = h->root.u.def.section;
7517 if (tls_maskp != NULL)
7519 struct ppc_link_hash_entry *eh;
7521 eh = (struct ppc_link_hash_entry *) h;
7522 *tls_maskp = &eh->tls_mask;
7527 Elf_Internal_Sym *sym;
7528 Elf_Internal_Sym *locsyms = *locsymsp;
7530 if (locsyms == NULL)
7532 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7533 if (locsyms == NULL)
7534 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7535 symtab_hdr->sh_info,
7536 0, NULL, NULL, NULL);
7537 if (locsyms == NULL)
7539 *locsymsp = locsyms;
7541 sym = locsyms + r_symndx;
7549 if (symsecp != NULL)
7550 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
7552 if (tls_maskp != NULL)
7554 struct got_entry **lgot_ents;
7555 unsigned char *tls_mask;
7558 lgot_ents = elf_local_got_ents (ibfd);
7559 if (lgot_ents != NULL)
7561 struct plt_entry **local_plt = (struct plt_entry **)
7562 (lgot_ents + symtab_hdr->sh_info);
7563 unsigned char *lgot_masks = (unsigned char *)
7564 (local_plt + symtab_hdr->sh_info);
7565 tls_mask = &lgot_masks[r_symndx];
7567 *tls_maskp = tls_mask;
7573 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7574 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7575 type suitable for optimization, and 1 otherwise. */
7578 get_tls_mask (unsigned char **tls_maskp,
7579 unsigned long *toc_symndx,
7580 bfd_vma *toc_addend,
7581 Elf_Internal_Sym **locsymsp,
7582 const Elf_Internal_Rela *rel,
7585 unsigned long r_symndx;
7587 struct elf_link_hash_entry *h;
7588 Elf_Internal_Sym *sym;
7592 r_symndx = ELF64_R_SYM (rel->r_info);
7593 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7596 if ((*tls_maskp != NULL
7597 && (**tls_maskp & TLS_TLS) != 0
7598 && **tls_maskp != (TLS_TLS | TLS_MARK))
7600 || ppc64_elf_section_data (sec) == NULL
7601 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
7604 /* Look inside a TOC section too. */
7607 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7608 off = h->root.u.def.value;
7611 off = sym->st_value;
7612 off += rel->r_addend;
7613 BFD_ASSERT (off % 8 == 0);
7614 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7615 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
7616 if (toc_symndx != NULL)
7617 *toc_symndx = r_symndx;
7618 if (toc_addend != NULL)
7619 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7620 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7622 if ((h == NULL || is_static_defined (h))
7623 && (next_r == -1 || next_r == -2))
7628 /* Find (or create) an entry in the tocsave hash table. */
7630 static struct tocsave_entry *
7631 tocsave_find (struct ppc_link_hash_table *htab,
7632 enum insert_option insert,
7633 Elf_Internal_Sym **local_syms,
7634 const Elf_Internal_Rela *irela,
7637 unsigned long r_indx;
7638 struct elf_link_hash_entry *h;
7639 Elf_Internal_Sym *sym;
7640 struct tocsave_entry ent, *p;
7642 struct tocsave_entry **slot;
7644 r_indx = ELF64_R_SYM (irela->r_info);
7645 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7647 if (ent.sec == NULL || ent.sec->output_section == NULL)
7650 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
7655 ent.offset = h->root.u.def.value;
7657 ent.offset = sym->st_value;
7658 ent.offset += irela->r_addend;
7660 hash = tocsave_htab_hash (&ent);
7661 slot = ((struct tocsave_entry **)
7662 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7668 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7677 /* Adjust all global syms defined in opd sections. In gcc generated
7678 code for the old ABI, these will already have been done. */
7681 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7683 struct ppc_link_hash_entry *eh;
7685 struct _opd_sec_data *opd;
7687 if (h->root.type == bfd_link_hash_indirect)
7690 if (h->root.type != bfd_link_hash_defined
7691 && h->root.type != bfd_link_hash_defweak)
7694 eh = (struct ppc_link_hash_entry *) h;
7695 if (eh->adjust_done)
7698 sym_sec = eh->elf.root.u.def.section;
7699 opd = get_opd_info (sym_sec);
7700 if (opd != NULL && opd->adjust != NULL)
7702 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
7705 /* This entry has been deleted. */
7706 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
7709 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
7710 if (discarded_section (dsec))
7712 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
7716 eh->elf.root.u.def.value = 0;
7717 eh->elf.root.u.def.section = dsec;
7720 eh->elf.root.u.def.value += adjust;
7721 eh->adjust_done = 1;
7726 /* Handles decrementing dynamic reloc counts for the reloc specified by
7727 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7728 have already been determined. */
7731 dec_dynrel_count (bfd_vma r_info,
7733 struct bfd_link_info *info,
7734 Elf_Internal_Sym **local_syms,
7735 struct elf_link_hash_entry *h,
7736 Elf_Internal_Sym *sym)
7738 enum elf_ppc64_reloc_type r_type;
7739 asection *sym_sec = NULL;
7741 /* Can this reloc be dynamic? This switch, and later tests here
7742 should be kept in sync with the code in check_relocs. */
7743 r_type = ELF64_R_TYPE (r_info);
7749 case R_PPC64_TPREL16:
7750 case R_PPC64_TPREL16_LO:
7751 case R_PPC64_TPREL16_HI:
7752 case R_PPC64_TPREL16_HA:
7753 case R_PPC64_TPREL16_DS:
7754 case R_PPC64_TPREL16_LO_DS:
7755 case R_PPC64_TPREL16_HIGH:
7756 case R_PPC64_TPREL16_HIGHA:
7757 case R_PPC64_TPREL16_HIGHER:
7758 case R_PPC64_TPREL16_HIGHERA:
7759 case R_PPC64_TPREL16_HIGHEST:
7760 case R_PPC64_TPREL16_HIGHESTA:
7761 case R_PPC64_TPREL64:
7762 case R_PPC64_DTPMOD64:
7763 case R_PPC64_DTPREL64:
7764 case R_PPC64_ADDR64:
7768 case R_PPC64_ADDR14:
7769 case R_PPC64_ADDR14_BRNTAKEN:
7770 case R_PPC64_ADDR14_BRTAKEN:
7771 case R_PPC64_ADDR16:
7772 case R_PPC64_ADDR16_DS:
7773 case R_PPC64_ADDR16_HA:
7774 case R_PPC64_ADDR16_HI:
7775 case R_PPC64_ADDR16_HIGH:
7776 case R_PPC64_ADDR16_HIGHA:
7777 case R_PPC64_ADDR16_HIGHER:
7778 case R_PPC64_ADDR16_HIGHERA:
7779 case R_PPC64_ADDR16_HIGHEST:
7780 case R_PPC64_ADDR16_HIGHESTA:
7781 case R_PPC64_ADDR16_LO:
7782 case R_PPC64_ADDR16_LO_DS:
7783 case R_PPC64_ADDR24:
7784 case R_PPC64_ADDR32:
7785 case R_PPC64_UADDR16:
7786 case R_PPC64_UADDR32:
7787 case R_PPC64_UADDR64:
7792 if (local_syms != NULL)
7794 unsigned long r_symndx;
7795 bfd *ibfd = sec->owner;
7797 r_symndx = ELF64_R_SYM (r_info);
7798 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7802 if ((bfd_link_pic (info)
7803 && (must_be_dyn_reloc (info, r_type)
7805 && (!SYMBOLIC_BIND (info, h)
7806 || h->root.type == bfd_link_hash_defweak
7807 || !h->def_regular))))
7808 || (ELIMINATE_COPY_RELOCS
7809 && !bfd_link_pic (info)
7811 && (h->root.type == bfd_link_hash_defweak
7812 || !h->def_regular)))
7819 struct elf_dyn_relocs *p;
7820 struct elf_dyn_relocs **pp;
7821 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7823 /* elf_gc_sweep may have already removed all dyn relocs associated
7824 with local syms for a given section. Also, symbol flags are
7825 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7826 report a dynreloc miscount. */
7827 if (*pp == NULL && info->gc_sections)
7830 while ((p = *pp) != NULL)
7834 if (!must_be_dyn_reloc (info, r_type))
7846 struct ppc_dyn_relocs *p;
7847 struct ppc_dyn_relocs **pp;
7849 bfd_boolean is_ifunc;
7851 if (local_syms == NULL)
7852 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7853 if (sym_sec == NULL)
7856 vpp = &elf_section_data (sym_sec)->local_dynrel;
7857 pp = (struct ppc_dyn_relocs **) vpp;
7859 if (*pp == NULL && info->gc_sections)
7862 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7863 while ((p = *pp) != NULL)
7865 if (p->sec == sec && p->ifunc == is_ifunc)
7876 /* xgettext:c-format */
7877 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7879 bfd_set_error (bfd_error_bad_value);
7883 /* Remove unused Official Procedure Descriptor entries. Currently we
7884 only remove those associated with functions in discarded link-once
7885 sections, or weakly defined functions that have been overridden. It
7886 would be possible to remove many more entries for statically linked
7890 ppc64_elf_edit_opd (struct bfd_link_info *info)
7893 bfd_boolean some_edited = FALSE;
7894 asection *need_pad = NULL;
7895 struct ppc_link_hash_table *htab;
7897 htab = ppc_hash_table (info);
7901 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7904 Elf_Internal_Rela *relstart, *rel, *relend;
7905 Elf_Internal_Shdr *symtab_hdr;
7906 Elf_Internal_Sym *local_syms;
7907 struct _opd_sec_data *opd;
7908 bfd_boolean need_edit, add_aux_fields, broken;
7909 bfd_size_type cnt_16b = 0;
7911 if (!is_ppc64_elf (ibfd))
7914 sec = bfd_get_section_by_name (ibfd, ".opd");
7915 if (sec == NULL || sec->size == 0)
7918 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7921 if (sec->output_section == bfd_abs_section_ptr)
7924 /* Look through the section relocs. */
7925 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7929 symtab_hdr = &elf_symtab_hdr (ibfd);
7931 /* Read the relocations. */
7932 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7934 if (relstart == NULL)
7937 /* First run through the relocs to check they are sane, and to
7938 determine whether we need to edit this opd section. */
7942 relend = relstart + sec->reloc_count;
7943 for (rel = relstart; rel < relend; )
7945 enum elf_ppc64_reloc_type r_type;
7946 unsigned long r_symndx;
7948 struct elf_link_hash_entry *h;
7949 Elf_Internal_Sym *sym;
7952 /* .opd contains an array of 16 or 24 byte entries. We're
7953 only interested in the reloc pointing to a function entry
7955 offset = rel->r_offset;
7956 if (rel + 1 == relend
7957 || rel[1].r_offset != offset + 8)
7959 /* If someone messes with .opd alignment then after a
7960 "ld -r" we might have padding in the middle of .opd.
7961 Also, there's nothing to prevent someone putting
7962 something silly in .opd with the assembler. No .opd
7963 optimization for them! */
7966 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7971 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7972 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7975 /* xgettext:c-format */
7976 (_("%pB: unexpected reloc type %u in .opd section"),
7982 r_symndx = ELF64_R_SYM (rel->r_info);
7983 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7987 if (sym_sec == NULL || sym_sec->owner == NULL)
7989 const char *sym_name;
7991 sym_name = h->root.root.string;
7993 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7997 /* xgettext:c-format */
7998 (_("%pB: undefined sym `%s' in .opd section"),
8004 /* opd entries are always for functions defined in the
8005 current input bfd. If the symbol isn't defined in the
8006 input bfd, then we won't be using the function in this
8007 bfd; It must be defined in a linkonce section in another
8008 bfd, or is weak. It's also possible that we are
8009 discarding the function due to a linker script /DISCARD/,
8010 which we test for via the output_section. */
8011 if (sym_sec->owner != ibfd
8012 || sym_sec->output_section == bfd_abs_section_ptr)
8016 if (rel + 1 == relend
8017 || (rel + 2 < relend
8018 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
8023 if (sec->size == offset + 24)
8028 if (sec->size == offset + 16)
8035 else if (rel + 1 < relend
8036 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
8037 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
8039 if (rel[0].r_offset == offset + 16)
8041 else if (rel[0].r_offset != offset + 24)
8048 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
8050 if (!broken && (need_edit || add_aux_fields))
8052 Elf_Internal_Rela *write_rel;
8053 Elf_Internal_Shdr *rel_hdr;
8054 bfd_byte *rptr, *wptr;
8055 bfd_byte *new_contents;
8058 new_contents = NULL;
8059 amt = OPD_NDX (sec->size) * sizeof (long);
8060 opd = &ppc64_elf_section_data (sec)->u.opd;
8061 opd->adjust = bfd_zalloc (sec->owner, amt);
8062 if (opd->adjust == NULL)
8065 /* This seems a waste of time as input .opd sections are all
8066 zeros as generated by gcc, but I suppose there's no reason
8067 this will always be so. We might start putting something in
8068 the third word of .opd entries. */
8069 if ((sec->flags & SEC_IN_MEMORY) == 0)
8072 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
8077 if (local_syms != NULL
8078 && symtab_hdr->contents != (unsigned char *) local_syms)
8080 if (elf_section_data (sec)->relocs != relstart)
8084 sec->contents = loc;
8085 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8088 elf_section_data (sec)->relocs = relstart;
8090 new_contents = sec->contents;
8093 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8094 if (new_contents == NULL)
8098 wptr = new_contents;
8099 rptr = sec->contents;
8100 write_rel = relstart;
8101 for (rel = relstart; rel < relend; )
8103 unsigned long r_symndx;
8105 struct elf_link_hash_entry *h;
8106 struct ppc_link_hash_entry *fdh = NULL;
8107 Elf_Internal_Sym *sym;
8109 Elf_Internal_Rela *next_rel;
8112 r_symndx = ELF64_R_SYM (rel->r_info);
8113 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8118 if (next_rel + 1 == relend
8119 || (next_rel + 2 < relend
8120 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8123 /* See if the .opd entry is full 24 byte or
8124 16 byte (with fd_aux entry overlapped with next
8127 if (next_rel == relend)
8129 if (sec->size == rel->r_offset + 16)
8132 else if (next_rel->r_offset == rel->r_offset + 16)
8136 && h->root.root.string[0] == '.')
8138 fdh = ((struct ppc_link_hash_entry *) h)->oh;
8141 fdh = ppc_follow_link (fdh);
8142 if (fdh->elf.root.type != bfd_link_hash_defined
8143 && fdh->elf.root.type != bfd_link_hash_defweak)
8148 skip = (sym_sec->owner != ibfd
8149 || sym_sec->output_section == bfd_abs_section_ptr);
8152 if (fdh != NULL && sym_sec->owner == ibfd)
8154 /* Arrange for the function descriptor sym
8156 fdh->elf.root.u.def.value = 0;
8157 fdh->elf.root.u.def.section = sym_sec;
8159 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
8161 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
8166 if (!dec_dynrel_count (rel->r_info, sec, info,
8170 if (++rel == next_rel)
8173 r_symndx = ELF64_R_SYM (rel->r_info);
8174 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8181 /* We'll be keeping this opd entry. */
8186 /* Redefine the function descriptor symbol to
8187 this location in the opd section. It is
8188 necessary to update the value here rather
8189 than using an array of adjustments as we do
8190 for local symbols, because various places
8191 in the generic ELF code use the value
8192 stored in u.def.value. */
8193 fdh->elf.root.u.def.value = wptr - new_contents;
8194 fdh->adjust_done = 1;
8197 /* Local syms are a bit tricky. We could
8198 tweak them as they can be cached, but
8199 we'd need to look through the local syms
8200 for the function descriptor sym which we
8201 don't have at the moment. So keep an
8202 array of adjustments. */
8203 adjust = (wptr - new_contents) - (rptr - sec->contents);
8204 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8207 memcpy (wptr, rptr, opd_ent_size);
8208 wptr += opd_ent_size;
8209 if (add_aux_fields && opd_ent_size == 16)
8211 memset (wptr, '\0', 8);
8215 /* We need to adjust any reloc offsets to point to the
8217 for ( ; rel != next_rel; ++rel)
8219 rel->r_offset += adjust;
8220 if (write_rel != rel)
8221 memcpy (write_rel, rel, sizeof (*rel));
8226 rptr += opd_ent_size;
8229 sec->size = wptr - new_contents;
8230 sec->reloc_count = write_rel - relstart;
8233 free (sec->contents);
8234 sec->contents = new_contents;
8237 /* Fudge the header size too, as this is used later in
8238 elf_bfd_final_link if we are emitting relocs. */
8239 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8240 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
8243 else if (elf_section_data (sec)->relocs != relstart)
8246 if (local_syms != NULL
8247 && symtab_hdr->contents != (unsigned char *) local_syms)
8249 if (!info->keep_memory)
8252 symtab_hdr->contents = (unsigned char *) local_syms;
8257 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8259 /* If we are doing a final link and the last .opd entry is just 16 byte
8260 long, add a 8 byte padding after it. */
8261 if (need_pad != NULL && !bfd_link_relocatable (info))
8265 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8267 BFD_ASSERT (need_pad->size > 0);
8269 p = bfd_malloc (need_pad->size + 8);
8273 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8274 p, 0, need_pad->size))
8277 need_pad->contents = p;
8278 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8282 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8286 need_pad->contents = p;
8289 memset (need_pad->contents + need_pad->size, 0, 8);
8290 need_pad->size += 8;
8296 /* Analyze inline PLT call relocations to see whether calls to locally
8297 defined functions can be converted to direct calls. */
8300 ppc64_elf_inline_plt (struct bfd_link_info *info)
8302 struct ppc_link_hash_table *htab;
8305 bfd_vma low_vma, high_vma, limit;
8307 htab = ppc_hash_table (info);
8311 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
8312 reduced somewhat to cater for possible stubs that might be added
8313 between the call and its destination. */
8314 if (htab->params->group_size < 0)
8316 limit = -htab->params->group_size;
8322 limit = htab->params->group_size;
8329 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
8330 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
8332 if (low_vma > sec->vma)
8334 if (high_vma < sec->vma + sec->size)
8335 high_vma = sec->vma + sec->size;
8338 /* If a "bl" can reach anywhere in local code sections, then we can
8339 convert all inline PLT sequences to direct calls when the symbol
8341 if (high_vma - low_vma < limit)
8343 htab->can_convert_all_inline_plt = 1;
8347 /* Otherwise, go looking through relocs for cases where a direct
8348 call won't reach. Mark the symbol on any such reloc to disable
8349 the optimization and keep the PLT entry as it seems likely that
8350 this will be better than creating trampolines. Note that this
8351 will disable the optimization for all inline PLT calls to a
8352 particular symbol, not just those that won't reach. The
8353 difficulty in doing a more precise optimization is that the
8354 linker needs to make a decision depending on whether a
8355 particular R_PPC64_PLTCALL insn can be turned into a direct
8356 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
8357 the sequence, and there is nothing that ties those relocs
8358 together except their symbol. */
8360 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8362 Elf_Internal_Shdr *symtab_hdr;
8363 Elf_Internal_Sym *local_syms;
8365 if (!is_ppc64_elf (ibfd))
8369 symtab_hdr = &elf_symtab_hdr (ibfd);
8371 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8372 if (ppc64_elf_section_data (sec)->has_pltcall
8373 && !bfd_is_abs_section (sec->output_section))
8375 Elf_Internal_Rela *relstart, *rel, *relend;
8377 /* Read the relocations. */
8378 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8380 if (relstart == NULL)
8383 relend = relstart + sec->reloc_count;
8384 for (rel = relstart; rel < relend; )
8386 enum elf_ppc64_reloc_type r_type;
8387 unsigned long r_symndx;
8389 struct elf_link_hash_entry *h;
8390 Elf_Internal_Sym *sym;
8391 unsigned char *tls_maskp;
8393 r_type = ELF64_R_TYPE (rel->r_info);
8394 if (r_type != R_PPC64_PLTCALL)
8397 r_symndx = ELF64_R_SYM (rel->r_info);
8398 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
8401 if (elf_section_data (sec)->relocs != relstart)
8403 if (local_syms != NULL
8404 && symtab_hdr->contents != (unsigned char *) local_syms)
8409 if (sym_sec != NULL && sym_sec->output_section != NULL)
8413 to = h->root.u.def.value;
8416 to += (rel->r_addend
8417 + sym_sec->output_offset
8418 + sym_sec->output_section->vma);
8419 from = (rel->r_offset
8420 + sec->output_offset
8421 + sec->output_section->vma);
8422 if (to - from + limit < 2 * limit)
8423 *tls_maskp &= ~PLT_KEEP;
8426 if (elf_section_data (sec)->relocs != relstart)
8430 if (local_syms != NULL
8431 && symtab_hdr->contents != (unsigned char *) local_syms)
8433 if (!info->keep_memory)
8436 symtab_hdr->contents = (unsigned char *) local_syms;
8443 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8446 ppc64_elf_tls_setup (struct bfd_link_info *info)
8448 struct ppc_link_hash_table *htab;
8450 htab = ppc_hash_table (info);
8454 if (abiversion (info->output_bfd) == 1)
8457 if (htab->params->no_multi_toc)
8458 htab->do_multi_toc = 0;
8459 else if (!htab->do_multi_toc)
8460 htab->params->no_multi_toc = 1;
8462 /* Default to --no-plt-localentry, as this option can cause problems
8463 with symbol interposition. For example, glibc libpthread.so and
8464 libc.so duplicate many pthread symbols, with a fallback
8465 implementation in libc.so. In some cases the fallback does more
8466 work than the pthread implementation. __pthread_condattr_destroy
8467 is one such symbol: the libpthread.so implementation is
8468 localentry:0 while the libc.so implementation is localentry:8.
8469 An app that "cleverly" uses dlopen to only load necessary
8470 libraries at runtime may omit loading libpthread.so when not
8471 running multi-threaded, which then results in the libc.so
8472 fallback symbols being used and ld.so complaining. Now there
8473 are workarounds in ld (see non_zero_localentry) to detect the
8474 pthread situation, but that may not be the only case where
8475 --plt-localentry can cause trouble. */
8476 if (htab->params->plt_localentry0 < 0)
8477 htab->params->plt_localentry0 = 0;
8478 if (htab->params->plt_localentry0
8479 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
8480 FALSE, FALSE, FALSE) == NULL)
8482 (_("warning: --plt-localentry is especially dangerous without "
8483 "ld.so support to detect ABI violations"));
8485 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8486 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8487 FALSE, FALSE, TRUE));
8488 /* Move dynamic linking info to the function descriptor sym. */
8489 if (htab->tls_get_addr != NULL)
8490 func_desc_adjust (&htab->tls_get_addr->elf, info);
8491 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8492 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8493 FALSE, FALSE, TRUE));
8494 if (htab->params->tls_get_addr_opt)
8496 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8498 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8499 FALSE, FALSE, TRUE);
8501 func_desc_adjust (opt, info);
8502 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8503 FALSE, FALSE, TRUE);
8505 && (opt_fd->root.type == bfd_link_hash_defined
8506 || opt_fd->root.type == bfd_link_hash_defweak))
8508 /* If glibc supports an optimized __tls_get_addr call stub,
8509 signalled by the presence of __tls_get_addr_opt, and we'll
8510 be calling __tls_get_addr via a plt call stub, then
8511 make __tls_get_addr point to __tls_get_addr_opt. */
8512 tga_fd = &htab->tls_get_addr_fd->elf;
8513 if (htab->elf.dynamic_sections_created
8515 && (tga_fd->type == STT_FUNC
8516 || tga_fd->needs_plt)
8517 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8518 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
8520 struct plt_entry *ent;
8522 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8523 if (ent->plt.refcount > 0)
8527 tga_fd->root.type = bfd_link_hash_indirect;
8528 tga_fd->root.u.i.link = &opt_fd->root;
8529 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
8531 if (opt_fd->dynindx != -1)
8533 /* Use __tls_get_addr_opt in dynamic relocations. */
8534 opt_fd->dynindx = -1;
8535 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8536 opt_fd->dynstr_index);
8537 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
8540 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8541 tga = &htab->tls_get_addr->elf;
8542 if (opt != NULL && tga != NULL)
8544 tga->root.type = bfd_link_hash_indirect;
8545 tga->root.u.i.link = &opt->root;
8546 ppc64_elf_copy_indirect_symbol (info, opt, tga);
8548 _bfd_elf_link_hash_hide_symbol (info, opt,
8550 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8552 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8553 htab->tls_get_addr_fd->is_func_descriptor = 1;
8554 if (htab->tls_get_addr != NULL)
8556 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8557 htab->tls_get_addr->is_func = 1;
8562 else if (htab->params->tls_get_addr_opt < 0)
8563 htab->params->tls_get_addr_opt = 0;
8565 return _bfd_elf_tls_setup (info->output_bfd, info);
8568 /* Return TRUE iff REL is a branch reloc with a global symbol matching
8572 branch_reloc_hash_match (const bfd *ibfd,
8573 const Elf_Internal_Rela *rel,
8574 const struct ppc_link_hash_entry *hash1,
8575 const struct ppc_link_hash_entry *hash2)
8577 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8578 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8579 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8581 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8583 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8584 struct elf_link_hash_entry *h;
8586 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8587 h = elf_follow_link (h);
8588 if (h == &hash1->elf || h == &hash2->elf)
8594 /* Run through all the TLS relocs looking for optimization
8595 opportunities. The linker has been hacked (see ppc64elf.em) to do
8596 a preliminary section layout so that we know the TLS segment
8597 offsets. We can't optimize earlier because some optimizations need
8598 to know the tp offset, and we need to optimize before allocating
8599 dynamic relocations. */
8602 ppc64_elf_tls_optimize (struct bfd_link_info *info)
8606 struct ppc_link_hash_table *htab;
8607 unsigned char *toc_ref;
8610 if (!bfd_link_executable (info))
8613 htab = ppc_hash_table (info);
8617 /* Make two passes over the relocs. On the first pass, mark toc
8618 entries involved with tls relocs, and check that tls relocs
8619 involved in setting up a tls_get_addr call are indeed followed by
8620 such a call. If they are not, we can't do any tls optimization.
8621 On the second pass twiddle tls_mask flags to notify
8622 relocate_section that optimization can be done, and adjust got
8623 and plt refcounts. */
8625 for (pass = 0; pass < 2; ++pass)
8626 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8628 Elf_Internal_Sym *locsyms = NULL;
8629 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8631 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8632 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8634 Elf_Internal_Rela *relstart, *rel, *relend;
8635 bfd_boolean found_tls_get_addr_arg = 0;
8637 /* Read the relocations. */
8638 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8640 if (relstart == NULL)
8646 relend = relstart + sec->reloc_count;
8647 for (rel = relstart; rel < relend; rel++)
8649 enum elf_ppc64_reloc_type r_type;
8650 unsigned long r_symndx;
8651 struct elf_link_hash_entry *h;
8652 Elf_Internal_Sym *sym;
8654 unsigned char *tls_mask;
8655 unsigned char tls_set, tls_clear, tls_type = 0;
8657 bfd_boolean ok_tprel, is_local;
8658 long toc_ref_index = 0;
8659 int expecting_tls_get_addr = 0;
8660 bfd_boolean ret = FALSE;
8662 r_symndx = ELF64_R_SYM (rel->r_info);
8663 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8667 if (elf_section_data (sec)->relocs != relstart)
8669 if (toc_ref != NULL)
8672 && (elf_symtab_hdr (ibfd).contents
8673 != (unsigned char *) locsyms))
8680 if (h->root.type == bfd_link_hash_defined
8681 || h->root.type == bfd_link_hash_defweak)
8682 value = h->root.u.def.value;
8683 else if (h->root.type == bfd_link_hash_undefweak)
8687 found_tls_get_addr_arg = 0;
8692 /* Symbols referenced by TLS relocs must be of type
8693 STT_TLS. So no need for .opd local sym adjust. */
8694 value = sym->st_value;
8703 && h->root.type == bfd_link_hash_undefweak)
8705 else if (sym_sec != NULL
8706 && sym_sec->output_section != NULL)
8708 value += sym_sec->output_offset;
8709 value += sym_sec->output_section->vma;
8710 value -= htab->elf.tls_sec->vma;
8711 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8712 < (bfd_vma) 1 << 32);
8716 r_type = ELF64_R_TYPE (rel->r_info);
8717 /* If this section has old-style __tls_get_addr calls
8718 without marker relocs, then check that each
8719 __tls_get_addr call reloc is preceded by a reloc
8720 that conceivably belongs to the __tls_get_addr arg
8721 setup insn. If we don't find matching arg setup
8722 relocs, don't do any tls optimization. */
8724 && sec->has_tls_get_addr_call
8726 && (h == &htab->tls_get_addr->elf
8727 || h == &htab->tls_get_addr_fd->elf)
8728 && !found_tls_get_addr_arg
8729 && is_branch_reloc (r_type))
8731 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8732 "TLS optimization disabled\n"),
8733 ibfd, sec, rel->r_offset);
8738 found_tls_get_addr_arg = 0;
8741 case R_PPC64_GOT_TLSLD16:
8742 case R_PPC64_GOT_TLSLD16_LO:
8743 expecting_tls_get_addr = 1;
8744 found_tls_get_addr_arg = 1;
8747 case R_PPC64_GOT_TLSLD16_HI:
8748 case R_PPC64_GOT_TLSLD16_HA:
8749 /* These relocs should never be against a symbol
8750 defined in a shared lib. Leave them alone if
8751 that turns out to be the case. */
8758 tls_type = TLS_TLS | TLS_LD;
8761 case R_PPC64_GOT_TLSGD16:
8762 case R_PPC64_GOT_TLSGD16_LO:
8763 expecting_tls_get_addr = 1;
8764 found_tls_get_addr_arg = 1;
8767 case R_PPC64_GOT_TLSGD16_HI:
8768 case R_PPC64_GOT_TLSGD16_HA:
8774 tls_set = TLS_TLS | TLS_TPRELGD;
8776 tls_type = TLS_TLS | TLS_GD;
8779 case R_PPC64_GOT_TPREL16_DS:
8780 case R_PPC64_GOT_TPREL16_LO_DS:
8781 case R_PPC64_GOT_TPREL16_HI:
8782 case R_PPC64_GOT_TPREL16_HA:
8787 tls_clear = TLS_TPREL;
8788 tls_type = TLS_TLS | TLS_TPREL;
8795 if (rel + 1 < relend
8796 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8799 && ELF64_R_TYPE (rel[1].r_info) != R_PPC64_PLTSEQ)
8801 r_symndx = ELF64_R_SYM (rel[1].r_info);
8802 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8807 struct plt_entry *ent = NULL;
8809 for (ent = h->plt.plist;
8812 if (ent->addend == rel[1].r_addend)
8816 && ent->plt.refcount > 0)
8817 ent->plt.refcount -= 1;
8822 found_tls_get_addr_arg = 1;
8827 case R_PPC64_TOC16_LO:
8828 if (sym_sec == NULL || sym_sec != toc)
8831 /* Mark this toc entry as referenced by a TLS
8832 code sequence. We can do that now in the
8833 case of R_PPC64_TLS, and after checking for
8834 tls_get_addr for the TOC16 relocs. */
8835 if (toc_ref == NULL)
8836 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8837 if (toc_ref == NULL)
8841 value = h->root.u.def.value;
8843 value = sym->st_value;
8844 value += rel->r_addend;
8847 BFD_ASSERT (value < toc->size
8848 && toc->output_offset % 8 == 0);
8849 toc_ref_index = (value + toc->output_offset) / 8;
8850 if (r_type == R_PPC64_TLS
8851 || r_type == R_PPC64_TLSGD
8852 || r_type == R_PPC64_TLSLD)
8854 toc_ref[toc_ref_index] = 1;
8858 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8863 expecting_tls_get_addr = 2;
8866 case R_PPC64_TPREL64:
8870 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8875 tls_set = TLS_EXPLICIT;
8876 tls_clear = TLS_TPREL;
8881 case R_PPC64_DTPMOD64:
8885 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8887 if (rel + 1 < relend
8889 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8890 && rel[1].r_offset == rel->r_offset + 8)
8894 tls_set = TLS_EXPLICIT | TLS_GD;
8897 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8906 tls_set = TLS_EXPLICIT;
8917 if (!expecting_tls_get_addr
8918 || !sec->has_tls_get_addr_call)
8921 if (rel + 1 < relend
8922 && branch_reloc_hash_match (ibfd, rel + 1,
8924 htab->tls_get_addr_fd))
8926 if (expecting_tls_get_addr == 2)
8928 /* Check for toc tls entries. */
8929 unsigned char *toc_tls;
8932 retval = get_tls_mask (&toc_tls, NULL, NULL,
8937 if (toc_tls != NULL)
8939 if ((*toc_tls & TLS_TLS) != 0
8940 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
8941 found_tls_get_addr_arg = 1;
8943 toc_ref[toc_ref_index] = 1;
8949 /* Uh oh, we didn't find the expected call. We
8950 could just mark this symbol to exclude it
8951 from tls optimization but it's safer to skip
8952 the entire optimization. */
8953 /* xgettext:c-format */
8954 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8955 "TLS optimization disabled\n"),
8956 ibfd, sec, rel->r_offset);
8961 /* If we don't have old-style __tls_get_addr calls
8962 without TLSGD/TLSLD marker relocs, and we haven't
8963 found a new-style __tls_get_addr call with a
8964 marker for this symbol, then we either have a
8965 broken object file or an -mlongcall style
8966 indirect call to __tls_get_addr without a marker.
8967 Disable optimization in this case. */
8968 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8969 && (tls_set & TLS_EXPLICIT) == 0
8970 && !sec->has_tls_get_addr_call
8971 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8972 != (TLS_TLS | TLS_MARK)))
8975 if (expecting_tls_get_addr)
8977 struct plt_entry *ent = NULL;
8979 if (htab->tls_get_addr != NULL)
8980 for (ent = htab->tls_get_addr->elf.plt.plist;
8983 if (ent->addend == 0)
8986 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8987 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8990 if (ent->addend == 0)
8994 && ent->plt.refcount > 0)
8995 ent->plt.refcount -= 1;
9001 if ((tls_set & TLS_EXPLICIT) == 0)
9003 struct got_entry *ent;
9005 /* Adjust got entry for this reloc. */
9009 ent = elf_local_got_ents (ibfd)[r_symndx];
9011 for (; ent != NULL; ent = ent->next)
9012 if (ent->addend == rel->r_addend
9013 && ent->owner == ibfd
9014 && ent->tls_type == tls_type)
9021 /* We managed to get rid of a got entry. */
9022 if (ent->got.refcount > 0)
9023 ent->got.refcount -= 1;
9028 /* If we got rid of a DTPMOD/DTPREL reloc pair then
9029 we'll lose one or two dyn relocs. */
9030 if (!dec_dynrel_count (rel->r_info, sec, info,
9034 if (tls_set == (TLS_EXPLICIT | TLS_GD))
9036 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
9042 *tls_mask |= tls_set;
9043 *tls_mask &= ~tls_clear;
9046 if (elf_section_data (sec)->relocs != relstart)
9051 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
9053 if (!info->keep_memory)
9056 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
9060 if (toc_ref != NULL)
9062 htab->do_tls_opt = 1;
9066 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
9067 the values of any global symbols in a toc section that has been
9068 edited. Globals in toc sections should be a rarity, so this function
9069 sets a flag if any are found in toc sections other than the one just
9070 edited, so that further hash table traversals can be avoided. */
9072 struct adjust_toc_info
9075 unsigned long *skip;
9076 bfd_boolean global_toc_syms;
9079 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
9082 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
9084 struct ppc_link_hash_entry *eh;
9085 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
9088 if (h->root.type != bfd_link_hash_defined
9089 && h->root.type != bfd_link_hash_defweak)
9092 eh = (struct ppc_link_hash_entry *) h;
9093 if (eh->adjust_done)
9096 if (eh->elf.root.u.def.section == toc_inf->toc)
9098 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
9099 i = toc_inf->toc->rawsize >> 3;
9101 i = eh->elf.root.u.def.value >> 3;
9103 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
9106 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
9109 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
9110 eh->elf.root.u.def.value = (bfd_vma) i << 3;
9113 eh->elf.root.u.def.value -= toc_inf->skip[i];
9114 eh->adjust_done = 1;
9116 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
9117 toc_inf->global_toc_syms = TRUE;
9122 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
9123 on a _LO variety toc/got reloc. */
9126 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
9128 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
9129 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
9130 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
9131 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
9132 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
9133 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
9134 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
9135 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
9136 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
9137 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
9138 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
9139 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
9140 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
9141 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
9142 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
9143 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
9144 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
9145 /* Exclude lfqu by testing reloc. If relocs are ever
9146 defined for the reduced D field in psq_lu then those
9147 will need testing too. */
9148 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
9149 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
9151 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
9152 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
9153 /* Exclude stfqu. psq_stu as above for psq_lu. */
9154 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
9155 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
9156 && (insn & 1) == 0));
9159 /* Examine all relocs referencing .toc sections in order to remove
9160 unused .toc entries. */
9163 ppc64_elf_edit_toc (struct bfd_link_info *info)
9166 struct adjust_toc_info toc_inf;
9167 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9169 htab->do_toc_opt = 1;
9170 toc_inf.global_toc_syms = TRUE;
9171 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9173 asection *toc, *sec;
9174 Elf_Internal_Shdr *symtab_hdr;
9175 Elf_Internal_Sym *local_syms;
9176 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
9177 unsigned long *skip, *drop;
9178 unsigned char *used;
9179 unsigned char *keep, last, some_unused;
9181 if (!is_ppc64_elf (ibfd))
9184 toc = bfd_get_section_by_name (ibfd, ".toc");
9187 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
9188 || discarded_section (toc))
9193 symtab_hdr = &elf_symtab_hdr (ibfd);
9195 /* Look at sections dropped from the final link. */
9198 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9200 if (sec->reloc_count == 0
9201 || !discarded_section (sec)
9202 || get_opd_info (sec)
9203 || (sec->flags & SEC_ALLOC) == 0
9204 || (sec->flags & SEC_DEBUGGING) != 0)
9207 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
9208 if (relstart == NULL)
9211 /* Run through the relocs to see which toc entries might be
9213 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9215 enum elf_ppc64_reloc_type r_type;
9216 unsigned long r_symndx;
9218 struct elf_link_hash_entry *h;
9219 Elf_Internal_Sym *sym;
9222 r_type = ELF64_R_TYPE (rel->r_info);
9229 case R_PPC64_TOC16_LO:
9230 case R_PPC64_TOC16_HI:
9231 case R_PPC64_TOC16_HA:
9232 case R_PPC64_TOC16_DS:
9233 case R_PPC64_TOC16_LO_DS:
9237 r_symndx = ELF64_R_SYM (rel->r_info);
9238 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9246 val = h->root.u.def.value;
9248 val = sym->st_value;
9249 val += rel->r_addend;
9251 if (val >= toc->size)
9254 /* Anything in the toc ought to be aligned to 8 bytes.
9255 If not, don't mark as unused. */
9261 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9266 skip[val >> 3] = ref_from_discarded;
9269 if (elf_section_data (sec)->relocs != relstart)
9273 /* For largetoc loads of address constants, we can convert
9274 . addis rx,2,addr@got@ha
9275 . ld ry,addr@got@l(rx)
9277 . addis rx,2,addr@toc@ha
9278 . addi ry,rx,addr@toc@l
9279 when addr is within 2G of the toc pointer. This then means
9280 that the word storing "addr" in the toc is no longer needed. */
9282 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
9283 && toc->output_section->rawsize < (bfd_vma) 1 << 31
9284 && toc->reloc_count != 0)
9286 /* Read toc relocs. */
9287 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9289 if (toc_relocs == NULL)
9292 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9294 enum elf_ppc64_reloc_type r_type;
9295 unsigned long r_symndx;
9297 struct elf_link_hash_entry *h;
9298 Elf_Internal_Sym *sym;
9301 r_type = ELF64_R_TYPE (rel->r_info);
9302 if (r_type != R_PPC64_ADDR64)
9305 r_symndx = ELF64_R_SYM (rel->r_info);
9306 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9311 || sym_sec->output_section == NULL
9312 || discarded_section (sym_sec))
9315 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9320 if (h->type == STT_GNU_IFUNC)
9322 val = h->root.u.def.value;
9326 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9328 val = sym->st_value;
9330 val += rel->r_addend;
9331 val += sym_sec->output_section->vma + sym_sec->output_offset;
9333 /* We don't yet know the exact toc pointer value, but we
9334 know it will be somewhere in the toc section. Don't
9335 optimize if the difference from any possible toc
9336 pointer is outside [ff..f80008000, 7fff7fff]. */
9337 addr = toc->output_section->vma + TOC_BASE_OFF;
9338 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9341 addr = toc->output_section->vma + toc->output_section->rawsize;
9342 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9347 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9352 skip[rel->r_offset >> 3]
9353 |= can_optimize | ((rel - toc_relocs) << 2);
9360 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9364 if (local_syms != NULL
9365 && symtab_hdr->contents != (unsigned char *) local_syms)
9369 && elf_section_data (sec)->relocs != relstart)
9371 if (toc_relocs != NULL
9372 && elf_section_data (toc)->relocs != toc_relocs)
9379 /* Now check all kept sections that might reference the toc.
9380 Check the toc itself last. */
9381 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9384 sec = (sec == toc ? NULL
9385 : sec->next == NULL ? toc
9386 : sec->next == toc && toc->next ? toc->next
9391 if (sec->reloc_count == 0
9392 || discarded_section (sec)
9393 || get_opd_info (sec)
9394 || (sec->flags & SEC_ALLOC) == 0
9395 || (sec->flags & SEC_DEBUGGING) != 0)
9398 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9400 if (relstart == NULL)
9406 /* Mark toc entries referenced as used. */
9410 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9412 enum elf_ppc64_reloc_type r_type;
9413 unsigned long r_symndx;
9415 struct elf_link_hash_entry *h;
9416 Elf_Internal_Sym *sym;
9418 enum {no_check, check_lo, check_ha} insn_check;
9420 r_type = ELF64_R_TYPE (rel->r_info);
9424 insn_check = no_check;
9427 case R_PPC64_GOT_TLSLD16_HA:
9428 case R_PPC64_GOT_TLSGD16_HA:
9429 case R_PPC64_GOT_TPREL16_HA:
9430 case R_PPC64_GOT_DTPREL16_HA:
9431 case R_PPC64_GOT16_HA:
9432 case R_PPC64_TOC16_HA:
9433 insn_check = check_ha;
9436 case R_PPC64_GOT_TLSLD16_LO:
9437 case R_PPC64_GOT_TLSGD16_LO:
9438 case R_PPC64_GOT_TPREL16_LO_DS:
9439 case R_PPC64_GOT_DTPREL16_LO_DS:
9440 case R_PPC64_GOT16_LO:
9441 case R_PPC64_GOT16_LO_DS:
9442 case R_PPC64_TOC16_LO:
9443 case R_PPC64_TOC16_LO_DS:
9444 insn_check = check_lo;
9448 if (insn_check != no_check)
9450 bfd_vma off = rel->r_offset & ~3;
9451 unsigned char buf[4];
9454 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9459 insn = bfd_get_32 (ibfd, buf);
9460 if (insn_check == check_lo
9461 ? !ok_lo_toc_insn (insn, r_type)
9462 : ((insn & ((0x3f << 26) | 0x1f << 16))
9463 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9467 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9468 sprintf (str, "%#08x", insn);
9469 info->callbacks->einfo
9470 /* xgettext:c-format */
9471 (_("%H: toc optimization is not supported for"
9472 " %s instruction\n"),
9473 ibfd, sec, rel->r_offset & ~3, str);
9480 case R_PPC64_TOC16_LO:
9481 case R_PPC64_TOC16_HI:
9482 case R_PPC64_TOC16_HA:
9483 case R_PPC64_TOC16_DS:
9484 case R_PPC64_TOC16_LO_DS:
9485 /* In case we're taking addresses of toc entries. */
9486 case R_PPC64_ADDR64:
9493 r_symndx = ELF64_R_SYM (rel->r_info);
9494 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9505 val = h->root.u.def.value;
9507 val = sym->st_value;
9508 val += rel->r_addend;
9510 if (val >= toc->size)
9513 if ((skip[val >> 3] & can_optimize) != 0)
9520 case R_PPC64_TOC16_HA:
9523 case R_PPC64_TOC16_LO_DS:
9524 off = rel->r_offset;
9525 off += (bfd_big_endian (ibfd) ? -2 : 3);
9526 if (!bfd_get_section_contents (ibfd, sec, &opc,
9532 if ((opc & (0x3f << 2)) == (58u << 2))
9537 /* Wrong sort of reloc, or not a ld. We may
9538 as well clear ref_from_discarded too. */
9545 /* For the toc section, we only mark as used if this
9546 entry itself isn't unused. */
9547 else if ((used[rel->r_offset >> 3]
9548 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9551 /* Do all the relocs again, to catch reference
9560 if (elf_section_data (sec)->relocs != relstart)
9564 /* Merge the used and skip arrays. Assume that TOC
9565 doublewords not appearing as either used or unused belong
9566 to an entry more than one doubleword in size. */
9567 for (drop = skip, keep = used, last = 0, some_unused = 0;
9568 drop < skip + (toc->size + 7) / 8;
9573 *drop &= ~ref_from_discarded;
9574 if ((*drop & can_optimize) != 0)
9578 else if ((*drop & ref_from_discarded) != 0)
9581 last = ref_from_discarded;
9591 bfd_byte *contents, *src;
9593 Elf_Internal_Sym *sym;
9594 bfd_boolean local_toc_syms = FALSE;
9596 /* Shuffle the toc contents, and at the same time convert the
9597 skip array from booleans into offsets. */
9598 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9601 elf_section_data (toc)->this_hdr.contents = contents;
9603 for (src = contents, off = 0, drop = skip;
9604 src < contents + toc->size;
9607 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9612 memcpy (src - off, src, 8);
9616 toc->rawsize = toc->size;
9617 toc->size = src - contents - off;
9619 /* Adjust addends for relocs against the toc section sym,
9620 and optimize any accesses we can. */
9621 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9623 if (sec->reloc_count == 0
9624 || discarded_section (sec))
9627 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9629 if (relstart == NULL)
9632 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9634 enum elf_ppc64_reloc_type r_type;
9635 unsigned long r_symndx;
9637 struct elf_link_hash_entry *h;
9640 r_type = ELF64_R_TYPE (rel->r_info);
9647 case R_PPC64_TOC16_LO:
9648 case R_PPC64_TOC16_HI:
9649 case R_PPC64_TOC16_HA:
9650 case R_PPC64_TOC16_DS:
9651 case R_PPC64_TOC16_LO_DS:
9652 case R_PPC64_ADDR64:
9656 r_symndx = ELF64_R_SYM (rel->r_info);
9657 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9665 val = h->root.u.def.value;
9668 val = sym->st_value;
9670 local_toc_syms = TRUE;
9673 val += rel->r_addend;
9675 if (val > toc->rawsize)
9677 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9679 else if ((skip[val >> 3] & can_optimize) != 0)
9681 Elf_Internal_Rela *tocrel
9682 = toc_relocs + (skip[val >> 3] >> 2);
9683 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9687 case R_PPC64_TOC16_HA:
9688 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9691 case R_PPC64_TOC16_LO_DS:
9692 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9696 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9698 info->callbacks->einfo
9699 /* xgettext:c-format */
9700 (_("%H: %s references "
9701 "optimized away TOC entry\n"),
9702 ibfd, sec, rel->r_offset,
9703 ppc64_elf_howto_table[r_type]->name);
9704 bfd_set_error (bfd_error_bad_value);
9707 rel->r_addend = tocrel->r_addend;
9708 elf_section_data (sec)->relocs = relstart;
9712 if (h != NULL || sym->st_value != 0)
9715 rel->r_addend -= skip[val >> 3];
9716 elf_section_data (sec)->relocs = relstart;
9719 if (elf_section_data (sec)->relocs != relstart)
9723 /* We shouldn't have local or global symbols defined in the TOC,
9724 but handle them anyway. */
9725 if (local_syms != NULL)
9726 for (sym = local_syms;
9727 sym < local_syms + symtab_hdr->sh_info;
9729 if (sym->st_value != 0
9730 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9734 if (sym->st_value > toc->rawsize)
9735 i = toc->rawsize >> 3;
9737 i = sym->st_value >> 3;
9739 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9743 (_("%s defined on removed toc entry"),
9744 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9747 while ((skip[i] & (ref_from_discarded | can_optimize)));
9748 sym->st_value = (bfd_vma) i << 3;
9751 sym->st_value -= skip[i];
9752 symtab_hdr->contents = (unsigned char *) local_syms;
9755 /* Adjust any global syms defined in this toc input section. */
9756 if (toc_inf.global_toc_syms)
9759 toc_inf.skip = skip;
9760 toc_inf.global_toc_syms = FALSE;
9761 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9765 if (toc->reloc_count != 0)
9767 Elf_Internal_Shdr *rel_hdr;
9768 Elf_Internal_Rela *wrel;
9771 /* Remove unused toc relocs, and adjust those we keep. */
9772 if (toc_relocs == NULL)
9773 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9775 if (toc_relocs == NULL)
9779 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9780 if ((skip[rel->r_offset >> 3]
9781 & (ref_from_discarded | can_optimize)) == 0)
9783 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9784 wrel->r_info = rel->r_info;
9785 wrel->r_addend = rel->r_addend;
9788 else if (!dec_dynrel_count (rel->r_info, toc, info,
9789 &local_syms, NULL, NULL))
9792 elf_section_data (toc)->relocs = toc_relocs;
9793 toc->reloc_count = wrel - toc_relocs;
9794 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9795 sz = rel_hdr->sh_entsize;
9796 rel_hdr->sh_size = toc->reloc_count * sz;
9799 else if (toc_relocs != NULL
9800 && elf_section_data (toc)->relocs != toc_relocs)
9803 if (local_syms != NULL
9804 && symtab_hdr->contents != (unsigned char *) local_syms)
9806 if (!info->keep_memory)
9809 symtab_hdr->contents = (unsigned char *) local_syms;
9817 /* Return true iff input section I references the TOC using
9818 instructions limited to +/-32k offsets. */
9821 ppc64_elf_has_small_toc_reloc (asection *i)
9823 return (is_ppc64_elf (i->owner)
9824 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9827 /* Allocate space for one GOT entry. */
9830 allocate_got (struct elf_link_hash_entry *h,
9831 struct bfd_link_info *info,
9832 struct got_entry *gent)
9834 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9835 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9836 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9838 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9839 ? 2 : 1) * sizeof (Elf64_External_Rela);
9840 asection *got = ppc64_elf_tdata (gent->owner)->got;
9842 gent->got.offset = got->size;
9843 got->size += entsize;
9845 if (h->type == STT_GNU_IFUNC)
9847 htab->elf.irelplt->size += rentsize;
9848 htab->got_reli_size += rentsize;
9850 else if (((bfd_link_pic (info)
9851 && !((gent->tls_type & TLS_TPREL) != 0
9852 && bfd_link_executable (info)
9853 && SYMBOL_REFERENCES_LOCAL (info, h)))
9854 || (htab->elf.dynamic_sections_created
9856 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9857 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9859 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9860 relgot->size += rentsize;
9864 /* This function merges got entries in the same toc group. */
9867 merge_got_entries (struct got_entry **pent)
9869 struct got_entry *ent, *ent2;
9871 for (ent = *pent; ent != NULL; ent = ent->next)
9872 if (!ent->is_indirect)
9873 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9874 if (!ent2->is_indirect
9875 && ent2->addend == ent->addend
9876 && ent2->tls_type == ent->tls_type
9877 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9879 ent2->is_indirect = TRUE;
9880 ent2->got.ent = ent;
9884 /* If H is undefined, make it dynamic if that makes sense. */
9887 ensure_undef_dynamic (struct bfd_link_info *info,
9888 struct elf_link_hash_entry *h)
9890 struct elf_link_hash_table *htab = elf_hash_table (info);
9892 if (htab->dynamic_sections_created
9893 && ((info->dynamic_undefined_weak != 0
9894 && h->root.type == bfd_link_hash_undefweak)
9895 || h->root.type == bfd_link_hash_undefined)
9898 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9899 return bfd_elf_link_record_dynamic_symbol (info, h);
9903 /* Allocate space in .plt, .got and associated reloc sections for
9907 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9909 struct bfd_link_info *info;
9910 struct ppc_link_hash_table *htab;
9912 struct ppc_link_hash_entry *eh;
9913 struct got_entry **pgent, *gent;
9915 if (h->root.type == bfd_link_hash_indirect)
9918 info = (struct bfd_link_info *) inf;
9919 htab = ppc_hash_table (info);
9923 eh = (struct ppc_link_hash_entry *) h;
9924 /* Run through the TLS GD got entries first if we're changing them
9926 if ((eh->tls_mask & (TLS_TLS | TLS_TPRELGD)) == (TLS_TLS | TLS_TPRELGD))
9927 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9928 if (gent->got.refcount > 0
9929 && (gent->tls_type & TLS_GD) != 0)
9931 /* This was a GD entry that has been converted to TPREL. If
9932 there happens to be a TPREL entry we can use that one. */
9933 struct got_entry *ent;
9934 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9935 if (ent->got.refcount > 0
9936 && (ent->tls_type & TLS_TPREL) != 0
9937 && ent->addend == gent->addend
9938 && ent->owner == gent->owner)
9940 gent->got.refcount = 0;
9944 /* If not, then we'll be using our own TPREL entry. */
9945 if (gent->got.refcount != 0)
9946 gent->tls_type = TLS_TLS | TLS_TPREL;
9949 /* Remove any list entry that won't generate a word in the GOT before
9950 we call merge_got_entries. Otherwise we risk merging to empty
9952 pgent = &h->got.glist;
9953 while ((gent = *pgent) != NULL)
9954 if (gent->got.refcount > 0)
9956 if ((gent->tls_type & TLS_LD) != 0
9959 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9960 *pgent = gent->next;
9963 pgent = &gent->next;
9966 *pgent = gent->next;
9968 if (!htab->do_multi_toc)
9969 merge_got_entries (&h->got.glist);
9971 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9972 if (!gent->is_indirect)
9974 /* Make sure this symbol is output as a dynamic symbol. */
9975 if (!ensure_undef_dynamic (info, h))
9978 if (!is_ppc64_elf (gent->owner))
9981 allocate_got (h, info, gent);
9984 /* If no dynamic sections we can't have dynamic relocs, except for
9985 IFUNCs which are handled even in static executables. */
9986 if (!htab->elf.dynamic_sections_created
9987 && h->type != STT_GNU_IFUNC)
9988 eh->dyn_relocs = NULL;
9990 /* Discard relocs on undefined symbols that must be local. */
9991 else if (h->root.type == bfd_link_hash_undefined
9992 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9993 eh->dyn_relocs = NULL;
9995 /* Also discard relocs on undefined weak syms with non-default
9996 visibility, or when dynamic_undefined_weak says so. */
9997 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9998 eh->dyn_relocs = NULL;
10000 if (eh->dyn_relocs != NULL)
10002 struct elf_dyn_relocs *p, **pp;
10004 /* In the shared -Bsymbolic case, discard space allocated for
10005 dynamic pc-relative relocs against symbols which turn out to
10006 be defined in regular objects. For the normal shared case,
10007 discard space for relocs that have become local due to symbol
10008 visibility changes. */
10010 if (bfd_link_pic (info))
10012 /* Relocs that use pc_count are those that appear on a call
10013 insn, or certain REL relocs (see must_be_dyn_reloc) that
10014 can be generated via assembly. We want calls to
10015 protected symbols to resolve directly to the function
10016 rather than going via the plt. If people want function
10017 pointer comparisons to work as expected then they should
10018 avoid writing weird assembly. */
10019 if (SYMBOL_CALLS_LOCAL (info, h))
10021 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
10023 p->count -= p->pc_count;
10032 if (eh->dyn_relocs != NULL)
10034 /* Make sure this symbol is output as a dynamic symbol. */
10035 if (!ensure_undef_dynamic (info, h))
10039 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
10041 /* For the non-pic case, discard space for relocs against
10042 symbols which turn out to need copy relocs or are not
10044 if (h->dynamic_adjusted
10046 && !ELF_COMMON_DEF_P (h))
10048 /* Make sure this symbol is output as a dynamic symbol. */
10049 if (!ensure_undef_dynamic (info, h))
10052 if (h->dynindx == -1)
10053 eh->dyn_relocs = NULL;
10056 eh->dyn_relocs = NULL;
10059 /* Finally, allocate space. */
10060 for (p = eh->dyn_relocs; p != NULL; p = p->next)
10062 asection *sreloc = elf_section_data (p->sec)->sreloc;
10063 if (eh->elf.type == STT_GNU_IFUNC)
10064 sreloc = htab->elf.irelplt;
10065 sreloc->size += p->count * sizeof (Elf64_External_Rela);
10069 /* We might need a PLT entry when the symbol
10072 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
10073 d) has plt16 relocs and we are linking statically. */
10074 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
10075 || h->type == STT_GNU_IFUNC
10076 || (h->needs_plt && h->dynamic_adjusted)
10079 && !htab->elf.dynamic_sections_created
10080 && !htab->can_convert_all_inline_plt
10081 && (((struct ppc_link_hash_entry *) h)->tls_mask
10082 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
10084 struct plt_entry *pent;
10085 bfd_boolean doneone = FALSE;
10086 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
10087 if (pent->plt.refcount > 0)
10089 if (!htab->elf.dynamic_sections_created
10090 || h->dynindx == -1)
10092 if (h->type == STT_GNU_IFUNC)
10094 s = htab->elf.iplt;
10095 pent->plt.offset = s->size;
10096 s->size += PLT_ENTRY_SIZE (htab);
10097 s = htab->elf.irelplt;
10101 s = htab->pltlocal;
10102 pent->plt.offset = s->size;
10103 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10104 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10109 /* If this is the first .plt entry, make room for the special
10111 s = htab->elf.splt;
10113 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
10115 pent->plt.offset = s->size;
10117 /* Make room for this entry. */
10118 s->size += PLT_ENTRY_SIZE (htab);
10120 /* Make room for the .glink code. */
10123 s->size += GLINK_PLTRESOLVE_SIZE (htab);
10126 /* We need bigger stubs past index 32767. */
10127 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
10134 /* We also need to make an entry in the .rela.plt section. */
10135 s = htab->elf.srelplt;
10138 s->size += sizeof (Elf64_External_Rela);
10142 pent->plt.offset = (bfd_vma) -1;
10145 h->plt.plist = NULL;
10151 h->plt.plist = NULL;
10158 #define PPC_LO(v) ((v) & 0xffff)
10159 #define PPC_HI(v) (((v) >> 16) & 0xffff)
10160 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
10162 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
10163 to set up space for global entry stubs. These are put in glink,
10164 after the branch table. */
10167 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
10169 struct bfd_link_info *info;
10170 struct ppc_link_hash_table *htab;
10171 struct plt_entry *pent;
10174 if (h->root.type == bfd_link_hash_indirect)
10177 if (!h->pointer_equality_needed)
10180 if (h->def_regular)
10184 htab = ppc_hash_table (info);
10188 s = htab->global_entry;
10189 plt = htab->elf.splt;
10190 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
10191 if (pent->plt.offset != (bfd_vma) -1
10192 && pent->addend == 0)
10194 /* For ELFv2, if this symbol is not defined in a regular file
10195 and we are not generating a shared library or pie, then we
10196 need to define the symbol in the executable on a call stub.
10197 This is to avoid text relocations. */
10198 bfd_vma off, stub_align, stub_off, stub_size;
10199 unsigned int align_power;
10202 stub_off = s->size;
10203 if (htab->params->plt_stub_align >= 0)
10204 align_power = htab->params->plt_stub_align;
10206 align_power = -htab->params->plt_stub_align;
10207 /* Setting section alignment is delayed until we know it is
10208 non-empty. Otherwise the .text output section will be
10209 aligned at least to plt_stub_align even when no global
10210 entry stubs are needed. */
10211 if (s->alignment_power < align_power)
10212 s->alignment_power = align_power;
10213 stub_align = (bfd_vma) 1 << align_power;
10214 if (htab->params->plt_stub_align >= 0
10215 || ((((stub_off + stub_size - 1) & -stub_align)
10216 - (stub_off & -stub_align))
10217 > ((stub_size - 1) & -stub_align)))
10218 stub_off = (stub_off + stub_align - 1) & -stub_align;
10219 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
10220 off -= stub_off + s->output_offset + s->output_section->vma;
10221 /* Note that for --plt-stub-align negative we have a possible
10222 dependency between stub offset and size. Break that
10223 dependency by assuming the max stub size when calculating
10224 the stub offset. */
10225 if (PPC_HA (off) == 0)
10227 h->root.type = bfd_link_hash_defined;
10228 h->root.u.def.section = s;
10229 h->root.u.def.value = stub_off;
10230 s->size = stub_off + stub_size;
10236 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
10237 read-only sections. */
10240 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
10244 if (h->root.type == bfd_link_hash_indirect)
10247 sec = readonly_dynrelocs (h);
10250 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10252 info->flags |= DF_TEXTREL;
10253 info->callbacks->minfo
10254 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
10255 sec->owner, h->root.root.string, sec);
10257 /* Not an error, just cut short the traversal. */
10263 /* Set the sizes of the dynamic sections. */
10266 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
10267 struct bfd_link_info *info)
10269 struct ppc_link_hash_table *htab;
10272 bfd_boolean relocs;
10274 struct got_entry *first_tlsld;
10276 htab = ppc_hash_table (info);
10280 dynobj = htab->elf.dynobj;
10281 if (dynobj == NULL)
10284 if (htab->elf.dynamic_sections_created)
10286 /* Set the contents of the .interp section to the interpreter. */
10287 if (bfd_link_executable (info) && !info->nointerp)
10289 s = bfd_get_linker_section (dynobj, ".interp");
10292 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
10293 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
10297 /* Set up .got offsets for local syms, and space for local dynamic
10299 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10301 struct got_entry **lgot_ents;
10302 struct got_entry **end_lgot_ents;
10303 struct plt_entry **local_plt;
10304 struct plt_entry **end_local_plt;
10305 unsigned char *lgot_masks;
10306 bfd_size_type locsymcount;
10307 Elf_Internal_Shdr *symtab_hdr;
10309 if (!is_ppc64_elf (ibfd))
10312 for (s = ibfd->sections; s != NULL; s = s->next)
10314 struct ppc_dyn_relocs *p;
10316 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
10318 if (!bfd_is_abs_section (p->sec)
10319 && bfd_is_abs_section (p->sec->output_section))
10321 /* Input section has been discarded, either because
10322 it is a copy of a linkonce section or due to
10323 linker script /DISCARD/, so we'll be discarding
10326 else if (p->count != 0)
10328 asection *srel = elf_section_data (p->sec)->sreloc;
10330 srel = htab->elf.irelplt;
10331 srel->size += p->count * sizeof (Elf64_External_Rela);
10332 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10333 info->flags |= DF_TEXTREL;
10338 lgot_ents = elf_local_got_ents (ibfd);
10342 symtab_hdr = &elf_symtab_hdr (ibfd);
10343 locsymcount = symtab_hdr->sh_info;
10344 end_lgot_ents = lgot_ents + locsymcount;
10345 local_plt = (struct plt_entry **) end_lgot_ents;
10346 end_local_plt = local_plt + locsymcount;
10347 lgot_masks = (unsigned char *) end_local_plt;
10348 s = ppc64_elf_tdata (ibfd)->got;
10349 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
10351 struct got_entry **pent, *ent;
10354 while ((ent = *pent) != NULL)
10355 if (ent->got.refcount > 0)
10357 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
10359 ppc64_tlsld_got (ibfd)->got.refcount += 1;
10364 unsigned int ent_size = 8;
10365 unsigned int rel_size = sizeof (Elf64_External_Rela);
10367 ent->got.offset = s->size;
10368 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
10373 s->size += ent_size;
10374 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10376 htab->elf.irelplt->size += rel_size;
10377 htab->got_reli_size += rel_size;
10379 else if (bfd_link_pic (info)
10380 && !((ent->tls_type & TLS_TPREL) != 0
10381 && bfd_link_executable (info)))
10383 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10384 srel->size += rel_size;
10393 /* Allocate space for plt calls to local syms. */
10394 lgot_masks = (unsigned char *) end_local_plt;
10395 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
10397 struct plt_entry *ent;
10399 for (ent = *local_plt; ent != NULL; ent = ent->next)
10400 if (ent->plt.refcount > 0)
10402 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10404 s = htab->elf.iplt;
10405 ent->plt.offset = s->size;
10406 s->size += PLT_ENTRY_SIZE (htab);
10407 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10409 else if (htab->can_convert_all_inline_plt
10410 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
10411 ent->plt.offset = (bfd_vma) -1;
10414 s = htab->pltlocal;
10415 ent->plt.offset = s->size;
10416 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10417 if (bfd_link_pic (info))
10418 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10422 ent->plt.offset = (bfd_vma) -1;
10426 /* Allocate global sym .plt and .got entries, and space for global
10427 sym dynamic relocs. */
10428 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10430 if (!htab->opd_abi && !bfd_link_pic (info))
10431 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10433 first_tlsld = NULL;
10434 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10436 struct got_entry *ent;
10438 if (!is_ppc64_elf (ibfd))
10441 ent = ppc64_tlsld_got (ibfd);
10442 if (ent->got.refcount > 0)
10444 if (!htab->do_multi_toc && first_tlsld != NULL)
10446 ent->is_indirect = TRUE;
10447 ent->got.ent = first_tlsld;
10451 if (first_tlsld == NULL)
10453 s = ppc64_elf_tdata (ibfd)->got;
10454 ent->got.offset = s->size;
10457 if (bfd_link_pic (info))
10459 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10460 srel->size += sizeof (Elf64_External_Rela);
10465 ent->got.offset = (bfd_vma) -1;
10468 /* We now have determined the sizes of the various dynamic sections.
10469 Allocate memory for them. */
10471 for (s = dynobj->sections; s != NULL; s = s->next)
10473 if ((s->flags & SEC_LINKER_CREATED) == 0)
10476 if (s == htab->brlt || s == htab->relbrlt)
10477 /* These haven't been allocated yet; don't strip. */
10479 else if (s == htab->elf.sgot
10480 || s == htab->elf.splt
10481 || s == htab->elf.iplt
10482 || s == htab->pltlocal
10483 || s == htab->glink
10484 || s == htab->global_entry
10485 || s == htab->elf.sdynbss
10486 || s == htab->elf.sdynrelro)
10488 /* Strip this section if we don't need it; see the
10491 else if (s == htab->glink_eh_frame)
10493 if (!bfd_is_abs_section (s->output_section))
10494 /* Not sized yet. */
10497 else if (CONST_STRNEQ (s->name, ".rela"))
10501 if (s != htab->elf.srelplt)
10504 /* We use the reloc_count field as a counter if we need
10505 to copy relocs into the output file. */
10506 s->reloc_count = 0;
10511 /* It's not one of our sections, so don't allocate space. */
10517 /* If we don't need this section, strip it from the
10518 output file. This is mostly to handle .rela.bss and
10519 .rela.plt. We must create both sections in
10520 create_dynamic_sections, because they must be created
10521 before the linker maps input sections to output
10522 sections. The linker does that before
10523 adjust_dynamic_symbol is called, and it is that
10524 function which decides whether anything needs to go
10525 into these sections. */
10526 s->flags |= SEC_EXCLUDE;
10530 if (bfd_is_abs_section (s->output_section))
10531 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10534 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10537 /* Allocate memory for the section contents. We use bfd_zalloc
10538 here in case unused entries are not reclaimed before the
10539 section's contents are written out. This should not happen,
10540 but this way if it does we get a R_PPC64_NONE reloc in .rela
10541 sections instead of garbage.
10542 We also rely on the section contents being zero when writing
10543 the GOT and .dynrelro. */
10544 s->contents = bfd_zalloc (dynobj, s->size);
10545 if (s->contents == NULL)
10549 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10551 if (!is_ppc64_elf (ibfd))
10554 s = ppc64_elf_tdata (ibfd)->got;
10555 if (s != NULL && s != htab->elf.sgot)
10558 s->flags |= SEC_EXCLUDE;
10561 s->contents = bfd_zalloc (ibfd, s->size);
10562 if (s->contents == NULL)
10566 s = ppc64_elf_tdata (ibfd)->relgot;
10570 s->flags |= SEC_EXCLUDE;
10573 s->contents = bfd_zalloc (ibfd, s->size);
10574 if (s->contents == NULL)
10577 s->reloc_count = 0;
10582 if (htab->elf.dynamic_sections_created)
10584 bfd_boolean tls_opt;
10586 /* Add some entries to the .dynamic section. We fill in the
10587 values later, in ppc64_elf_finish_dynamic_sections, but we
10588 must add the entries now so that we get the correct size for
10589 the .dynamic section. The DT_DEBUG entry is filled in by the
10590 dynamic linker and used by the debugger. */
10591 #define add_dynamic_entry(TAG, VAL) \
10592 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10594 if (bfd_link_executable (info))
10596 if (!add_dynamic_entry (DT_DEBUG, 0))
10600 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10602 if (!add_dynamic_entry (DT_PLTGOT, 0)
10603 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10604 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10605 || !add_dynamic_entry (DT_JMPREL, 0)
10606 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10610 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10612 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10613 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10617 tls_opt = (htab->params->tls_get_addr_opt
10618 && htab->tls_get_addr_fd != NULL
10619 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10620 if (tls_opt || !htab->opd_abi)
10622 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10628 if (!add_dynamic_entry (DT_RELA, 0)
10629 || !add_dynamic_entry (DT_RELASZ, 0)
10630 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10633 /* If any dynamic relocs apply to a read-only section,
10634 then we need a DT_TEXTREL entry. */
10635 if ((info->flags & DF_TEXTREL) == 0)
10636 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10638 if ((info->flags & DF_TEXTREL) != 0)
10640 if (!add_dynamic_entry (DT_TEXTREL, 0))
10645 #undef add_dynamic_entry
10650 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10653 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10655 if (h->plt.plist != NULL
10657 && !h->pointer_equality_needed)
10660 return _bfd_elf_hash_symbol (h);
10663 /* Determine the type of stub needed, if any, for a call. */
10665 static inline enum ppc_stub_type
10666 ppc_type_of_stub (asection *input_sec,
10667 const Elf_Internal_Rela *rel,
10668 struct ppc_link_hash_entry **hash,
10669 struct plt_entry **plt_ent,
10670 bfd_vma destination,
10671 unsigned long local_off)
10673 struct ppc_link_hash_entry *h = *hash;
10675 bfd_vma branch_offset;
10676 bfd_vma max_branch_offset;
10677 enum elf_ppc64_reloc_type r_type;
10681 struct plt_entry *ent;
10682 struct ppc_link_hash_entry *fdh = h;
10684 && h->oh->is_func_descriptor)
10686 fdh = ppc_follow_link (h->oh);
10690 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10691 if (ent->addend == rel->r_addend
10692 && ent->plt.offset != (bfd_vma) -1)
10695 return ppc_stub_plt_call;
10698 /* Here, we know we don't have a plt entry. If we don't have a
10699 either a defined function descriptor or a defined entry symbol
10700 in a regular object file, then it is pointless trying to make
10701 any other type of stub. */
10702 if (!is_static_defined (&fdh->elf)
10703 && !is_static_defined (&h->elf))
10704 return ppc_stub_none;
10706 else if (elf_local_got_ents (input_sec->owner) != NULL)
10708 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10709 struct plt_entry **local_plt = (struct plt_entry **)
10710 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10711 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10713 if (local_plt[r_symndx] != NULL)
10715 struct plt_entry *ent;
10717 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10718 if (ent->addend == rel->r_addend
10719 && ent->plt.offset != (bfd_vma) -1)
10722 return ppc_stub_plt_call;
10727 /* Determine where the call point is. */
10728 location = (input_sec->output_offset
10729 + input_sec->output_section->vma
10732 branch_offset = destination - location;
10733 r_type = ELF64_R_TYPE (rel->r_info);
10735 /* Determine if a long branch stub is needed. */
10736 max_branch_offset = 1 << 25;
10737 if (r_type == R_PPC64_REL14
10738 || r_type == R_PPC64_REL14_BRTAKEN
10739 || r_type == R_PPC64_REL14_BRNTAKEN)
10740 max_branch_offset = 1 << 15;
10742 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10743 /* We need a stub. Figure out whether a long_branch or plt_branch
10744 is needed later. */
10745 return ppc_stub_long_branch;
10747 return ppc_stub_none;
10750 /* With power7 weakly ordered memory model, it is possible for ld.so
10751 to update a plt entry in one thread and have another thread see a
10752 stale zero toc entry. To avoid this we need some sort of acquire
10753 barrier in the call stub. One solution is to make the load of the
10754 toc word seem to appear to depend on the load of the function entry
10755 word. Another solution is to test for r2 being zero, and branch to
10756 the appropriate glink entry if so.
10758 . fake dep barrier compare
10759 . ld 12,xxx(2) ld 12,xxx(2)
10760 . mtctr 12 mtctr 12
10761 . xor 11,12,12 ld 2,xxx+8(2)
10762 . add 2,2,11 cmpldi 2,0
10763 . ld 2,xxx+8(2) bnectr+
10764 . bctr b <glink_entry>
10766 The solution involving the compare turns out to be faster, so
10767 that's what we use unless the branch won't reach. */
10769 #define ALWAYS_USE_FAKE_DEP 0
10770 #define ALWAYS_EMIT_R2SAVE 0
10772 static inline unsigned int
10773 plt_stub_size (struct ppc_link_hash_table *htab,
10774 struct ppc_stub_hash_entry *stub_entry,
10777 unsigned size = 12;
10779 if (ALWAYS_EMIT_R2SAVE
10780 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10782 if (PPC_HA (off) != 0)
10787 if (htab->params->plt_static_chain)
10789 if (htab->params->plt_thread_safe
10790 && htab->elf.dynamic_sections_created
10791 && stub_entry->h != NULL
10792 && stub_entry->h->elf.dynindx != -1)
10794 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10797 if (stub_entry->h != NULL
10798 && (stub_entry->h == htab->tls_get_addr_fd
10799 || stub_entry->h == htab->tls_get_addr)
10800 && htab->params->tls_get_addr_opt)
10803 if (ALWAYS_EMIT_R2SAVE
10804 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10810 /* Depending on the sign of plt_stub_align:
10811 If positive, return the padding to align to a 2**plt_stub_align
10813 If negative, if this stub would cross fewer 2**plt_stub_align
10814 boundaries if we align, then return the padding needed to do so. */
10816 static inline unsigned int
10817 plt_stub_pad (struct ppc_link_hash_table *htab,
10818 struct ppc_stub_hash_entry *stub_entry,
10822 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
10823 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10825 if (htab->params->plt_stub_align >= 0)
10827 stub_align = 1 << htab->params->plt_stub_align;
10828 if ((stub_off & (stub_align - 1)) != 0)
10829 return stub_align - (stub_off & (stub_align - 1));
10833 stub_align = 1 << -htab->params->plt_stub_align;
10834 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10835 > ((stub_size - 1) & -stub_align))
10836 return stub_align - (stub_off & (stub_align - 1));
10840 /* Build a .plt call stub. */
10842 static inline bfd_byte *
10843 build_plt_stub (struct ppc_link_hash_table *htab,
10844 struct ppc_stub_hash_entry *stub_entry,
10845 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10847 bfd *obfd = htab->params->stub_bfd;
10848 bfd_boolean plt_load_toc = htab->opd_abi;
10849 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10850 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10851 && htab->elf.dynamic_sections_created
10852 && stub_entry->h != NULL
10853 && stub_entry->h->elf.dynindx != -1);
10854 bfd_boolean use_fake_dep = plt_thread_safe;
10855 bfd_vma cmp_branch_off = 0;
10857 if (!ALWAYS_USE_FAKE_DEP
10860 && !((stub_entry->h == htab->tls_get_addr_fd
10861 || stub_entry->h == htab->tls_get_addr)
10862 && htab->params->tls_get_addr_opt))
10864 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10865 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10866 / PLT_ENTRY_SIZE (htab));
10867 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10870 if (pltindex > 32768)
10871 glinkoff += (pltindex - 32768) * 4;
10873 + htab->glink->output_offset
10874 + htab->glink->output_section->vma);
10875 from = (p - stub_entry->group->stub_sec->contents
10876 + 4 * (ALWAYS_EMIT_R2SAVE
10877 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10878 + 4 * (PPC_HA (offset) != 0)
10879 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10880 != PPC_HA (offset))
10881 + 4 * (plt_static_chain != 0)
10883 + stub_entry->group->stub_sec->output_offset
10884 + stub_entry->group->stub_sec->output_section->vma);
10885 cmp_branch_off = to - from;
10886 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10889 if (PPC_HA (offset) != 0)
10893 if (ALWAYS_EMIT_R2SAVE
10894 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10895 r[0].r_offset += 4;
10896 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10897 r[1].r_offset = r[0].r_offset + 4;
10898 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10899 r[1].r_addend = r[0].r_addend;
10902 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10904 r[2].r_offset = r[1].r_offset + 4;
10905 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10906 r[2].r_addend = r[0].r_addend;
10910 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10911 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10912 r[2].r_addend = r[0].r_addend + 8;
10913 if (plt_static_chain)
10915 r[3].r_offset = r[2].r_offset + 4;
10916 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10917 r[3].r_addend = r[0].r_addend + 16;
10922 if (ALWAYS_EMIT_R2SAVE
10923 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10924 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10927 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10928 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10932 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10933 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10936 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10938 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10941 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10946 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10947 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10949 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10950 if (plt_static_chain)
10951 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10958 if (ALWAYS_EMIT_R2SAVE
10959 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10960 r[0].r_offset += 4;
10961 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10964 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10966 r[1].r_offset = r[0].r_offset + 4;
10967 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10968 r[1].r_addend = r[0].r_addend;
10972 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10973 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10974 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10975 if (plt_static_chain)
10977 r[2].r_offset = r[1].r_offset + 4;
10978 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10979 r[2].r_addend = r[0].r_addend + 8;
10984 if (ALWAYS_EMIT_R2SAVE
10985 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10986 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10987 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10989 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10991 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10994 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10999 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11000 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11002 if (plt_static_chain)
11003 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11004 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
11007 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
11009 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11010 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
11011 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
11014 bfd_put_32 (obfd, BCTR, p), p += 4;
11018 /* Build a special .plt call stub for __tls_get_addr. */
11020 #define LD_R11_0R3 0xe9630000
11021 #define LD_R12_0R3 0xe9830000
11022 #define MR_R0_R3 0x7c601b78
11023 #define CMPDI_R11_0 0x2c2b0000
11024 #define ADD_R3_R12_R13 0x7c6c6a14
11025 #define BEQLR 0x4d820020
11026 #define MR_R3_R0 0x7c030378
11027 #define STD_R11_0R1 0xf9610000
11028 #define BCTRL 0x4e800421
11029 #define LD_R11_0R1 0xe9610000
11030 #define MTLR_R11 0x7d6803a6
11032 static inline bfd_byte *
11033 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11034 struct ppc_stub_hash_entry *stub_entry,
11035 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
11037 bfd *obfd = htab->params->stub_bfd;
11039 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
11040 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11041 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11042 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
11043 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11044 bfd_put_32 (obfd, BEQLR, p), p += 4;
11045 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
11047 r[0].r_offset += 7 * 4;
11048 if (!ALWAYS_EMIT_R2SAVE
11049 && stub_entry->stub_type != ppc_stub_plt_call_r2save)
11050 return build_plt_stub (htab, stub_entry, p, offset, r);
11052 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
11053 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
11056 r[0].r_offset += 2 * 4;
11057 p = build_plt_stub (htab, stub_entry, p, offset, r);
11058 bfd_put_32 (obfd, BCTRL, p - 4);
11060 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
11061 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
11062 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
11063 bfd_put_32 (obfd, BLR, p), p += 4;
11068 static Elf_Internal_Rela *
11069 get_relocs (asection *sec, int count)
11071 Elf_Internal_Rela *relocs;
11072 struct bfd_elf_section_data *elfsec_data;
11074 elfsec_data = elf_section_data (sec);
11075 relocs = elfsec_data->relocs;
11076 if (relocs == NULL)
11078 bfd_size_type relsize;
11079 relsize = sec->reloc_count * sizeof (*relocs);
11080 relocs = bfd_alloc (sec->owner, relsize);
11081 if (relocs == NULL)
11083 elfsec_data->relocs = relocs;
11084 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11085 sizeof (Elf_Internal_Shdr));
11086 if (elfsec_data->rela.hdr == NULL)
11088 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11089 * sizeof (Elf64_External_Rela));
11090 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
11091 sec->reloc_count = 0;
11093 relocs += sec->reloc_count;
11094 sec->reloc_count += count;
11099 get_r2off (struct bfd_link_info *info,
11100 struct ppc_stub_hash_entry *stub_entry)
11102 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11103 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
11107 /* Support linking -R objects. Get the toc pointer from the
11110 if (!htab->opd_abi)
11112 asection *opd = stub_entry->h->elf.root.u.def.section;
11113 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11115 if (strcmp (opd->name, ".opd") != 0
11116 || opd->reloc_count != 0)
11118 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%pT'\n"),
11119 stub_entry->h->elf.root.root.string);
11120 bfd_set_error (bfd_error_bad_value);
11121 return (bfd_vma) -1;
11123 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
11124 return (bfd_vma) -1;
11125 r2off = bfd_get_64 (opd->owner, buf);
11126 r2off -= elf_gp (info->output_bfd);
11128 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
11133 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11135 struct ppc_stub_hash_entry *stub_entry;
11136 struct ppc_branch_hash_entry *br_entry;
11137 struct bfd_link_info *info;
11138 struct ppc_link_hash_table *htab;
11142 Elf_Internal_Rela *r;
11145 /* Massage our args to the form they really have. */
11146 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11149 htab = ppc_hash_table (info);
11153 /* Make a note of the offset within the stubs for this entry. */
11154 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11155 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
11157 htab->stub_count[stub_entry->stub_type - 1] += 1;
11158 switch (stub_entry->stub_type)
11160 case ppc_stub_long_branch:
11161 case ppc_stub_long_branch_r2off:
11162 /* Branches are relative. This is where we are going to. */
11163 dest = (stub_entry->target_value
11164 + stub_entry->target_section->output_offset
11165 + stub_entry->target_section->output_section->vma);
11166 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11169 /* And this is where we are coming from. */
11170 off -= (stub_entry->stub_offset
11171 + stub_entry->group->stub_sec->output_offset
11172 + stub_entry->group->stub_sec->output_section->vma);
11175 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11177 bfd_vma r2off = get_r2off (info, stub_entry);
11179 if (r2off == (bfd_vma) -1)
11181 htab->stub_error = TRUE;
11184 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11186 if (PPC_HA (r2off) != 0)
11188 bfd_put_32 (htab->params->stub_bfd,
11189 ADDIS_R2_R2 | PPC_HA (r2off), p);
11192 if (PPC_LO (r2off) != 0)
11194 bfd_put_32 (htab->params->stub_bfd,
11195 ADDI_R2_R2 | PPC_LO (r2off), p);
11200 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11203 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11206 (_("long branch stub `%s' offset overflow"),
11207 stub_entry->root.string);
11208 htab->stub_error = TRUE;
11212 if (info->emitrelocations)
11214 r = get_relocs (stub_entry->group->stub_sec, 1);
11217 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
11218 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11219 r->r_addend = dest;
11220 if (stub_entry->h != NULL)
11222 struct elf_link_hash_entry **hashes;
11223 unsigned long symndx;
11224 struct ppc_link_hash_entry *h;
11226 hashes = elf_sym_hashes (htab->params->stub_bfd);
11227 if (hashes == NULL)
11229 bfd_size_type hsize;
11231 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11232 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11233 if (hashes == NULL)
11235 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11236 htab->stub_globals = 1;
11238 symndx = htab->stub_globals++;
11240 hashes[symndx] = &h->elf;
11241 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
11242 if (h->oh != NULL && h->oh->is_func)
11243 h = ppc_follow_link (h->oh);
11244 if (h->elf.root.u.def.section != stub_entry->target_section)
11245 /* H is an opd symbol. The addend must be zero. */
11249 off = (h->elf.root.u.def.value
11250 + h->elf.root.u.def.section->output_offset
11251 + h->elf.root.u.def.section->output_section->vma);
11252 r->r_addend -= off;
11258 case ppc_stub_plt_branch:
11259 case ppc_stub_plt_branch_r2off:
11260 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11261 stub_entry->root.string + 9,
11263 if (br_entry == NULL)
11265 _bfd_error_handler (_("can't find branch stub `%s'"),
11266 stub_entry->root.string);
11267 htab->stub_error = TRUE;
11271 dest = (stub_entry->target_value
11272 + stub_entry->target_section->output_offset
11273 + stub_entry->target_section->output_section->vma);
11274 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11275 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11277 bfd_put_64 (htab->brlt->owner, dest,
11278 htab->brlt->contents + br_entry->offset);
11280 if (br_entry->iter == htab->stub_iteration)
11282 br_entry->iter = 0;
11284 if (htab->relbrlt != NULL)
11286 /* Create a reloc for the branch lookup table entry. */
11287 Elf_Internal_Rela rela;
11290 rela.r_offset = (br_entry->offset
11291 + htab->brlt->output_offset
11292 + htab->brlt->output_section->vma);
11293 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11294 rela.r_addend = dest;
11296 rl = htab->relbrlt->contents;
11297 rl += (htab->relbrlt->reloc_count++
11298 * sizeof (Elf64_External_Rela));
11299 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11301 else if (info->emitrelocations)
11303 r = get_relocs (htab->brlt, 1);
11306 /* brlt, being SEC_LINKER_CREATED does not go through the
11307 normal reloc processing. Symbols and offsets are not
11308 translated from input file to output file form, so
11309 set up the offset per the output file. */
11310 r->r_offset = (br_entry->offset
11311 + htab->brlt->output_offset
11312 + htab->brlt->output_section->vma);
11313 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11314 r->r_addend = dest;
11318 dest = (br_entry->offset
11319 + htab->brlt->output_offset
11320 + htab->brlt->output_section->vma);
11323 - elf_gp (info->output_bfd)
11324 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11326 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11328 info->callbacks->einfo
11329 (_("%P: linkage table error against `%pT'\n"),
11330 stub_entry->root.string);
11331 bfd_set_error (bfd_error_bad_value);
11332 htab->stub_error = TRUE;
11336 if (info->emitrelocations)
11338 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11341 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11342 if (bfd_big_endian (info->output_bfd))
11343 r[0].r_offset += 2;
11344 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11345 r[0].r_offset += 4;
11346 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11347 r[0].r_addend = dest;
11348 if (PPC_HA (off) != 0)
11350 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11351 r[1].r_offset = r[0].r_offset + 4;
11352 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11353 r[1].r_addend = r[0].r_addend;
11358 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11360 if (PPC_HA (off) != 0)
11362 bfd_put_32 (htab->params->stub_bfd,
11363 ADDIS_R12_R2 | PPC_HA (off), p);
11365 bfd_put_32 (htab->params->stub_bfd,
11366 LD_R12_0R12 | PPC_LO (off), p);
11369 bfd_put_32 (htab->params->stub_bfd,
11370 LD_R12_0R2 | PPC_LO (off), p);
11374 bfd_vma r2off = get_r2off (info, stub_entry);
11376 if (r2off == (bfd_vma) -1)
11378 htab->stub_error = TRUE;
11382 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11384 if (PPC_HA (off) != 0)
11386 bfd_put_32 (htab->params->stub_bfd,
11387 ADDIS_R12_R2 | PPC_HA (off), p);
11389 bfd_put_32 (htab->params->stub_bfd,
11390 LD_R12_0R12 | PPC_LO (off), p);
11393 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11395 if (PPC_HA (r2off) != 0)
11398 bfd_put_32 (htab->params->stub_bfd,
11399 ADDIS_R2_R2 | PPC_HA (r2off), p);
11401 if (PPC_LO (r2off) != 0)
11404 bfd_put_32 (htab->params->stub_bfd,
11405 ADDI_R2_R2 | PPC_LO (r2off), p);
11409 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11411 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11415 case ppc_stub_plt_call:
11416 case ppc_stub_plt_call_r2save:
11417 if (stub_entry->h != NULL
11418 && stub_entry->h->is_func_descriptor
11419 && stub_entry->h->oh != NULL)
11421 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11423 /* If the old-ABI "dot-symbol" is undefined make it weak so
11424 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11425 if (fh->elf.root.type == bfd_link_hash_undefined
11426 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11427 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11428 fh->elf.root.type = bfd_link_hash_undefweak;
11431 /* Now build the stub. */
11432 dest = stub_entry->plt_ent->plt.offset & ~1;
11433 if (dest >= (bfd_vma) -2)
11436 plt = htab->elf.splt;
11437 if (!htab->elf.dynamic_sections_created
11438 || stub_entry->h == NULL
11439 || stub_entry->h->elf.dynindx == -1)
11441 if (stub_entry->symtype == STT_GNU_IFUNC)
11442 plt = htab->elf.iplt;
11444 plt = htab->pltlocal;
11447 dest += plt->output_offset + plt->output_section->vma;
11450 - elf_gp (info->output_bfd)
11451 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11453 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11455 info->callbacks->einfo
11456 /* xgettext:c-format */
11457 (_("%P: linkage table error against `%pT'\n"),
11458 stub_entry->h != NULL
11459 ? stub_entry->h->elf.root.root.string
11461 bfd_set_error (bfd_error_bad_value);
11462 htab->stub_error = TRUE;
11466 if (htab->params->plt_stub_align != 0)
11468 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11470 stub_entry->group->stub_sec->size += pad;
11471 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11476 if (info->emitrelocations)
11478 r = get_relocs (stub_entry->group->stub_sec,
11479 ((PPC_HA (off) != 0)
11481 ? 2 + (htab->params->plt_static_chain
11482 && PPC_HA (off + 16) == PPC_HA (off))
11486 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11487 if (bfd_big_endian (info->output_bfd))
11488 r[0].r_offset += 2;
11489 r[0].r_addend = dest;
11491 if (stub_entry->h != NULL
11492 && (stub_entry->h == htab->tls_get_addr_fd
11493 || stub_entry->h == htab->tls_get_addr)
11494 && htab->params->tls_get_addr_opt)
11495 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11497 p = build_plt_stub (htab, stub_entry, loc, off, r);
11500 case ppc_stub_save_res:
11508 stub_entry->group->stub_sec->size += p - loc;
11510 if (htab->params->emit_stub_syms)
11512 struct elf_link_hash_entry *h;
11515 const char *const stub_str[] = { "long_branch",
11516 "long_branch_r2off",
11518 "plt_branch_r2off",
11522 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11523 len2 = strlen (stub_entry->root.string);
11524 name = bfd_malloc (len1 + len2 + 2);
11527 memcpy (name, stub_entry->root.string, 9);
11528 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11529 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11530 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11533 if (h->root.type == bfd_link_hash_new)
11535 h->root.type = bfd_link_hash_defined;
11536 h->root.u.def.section = stub_entry->group->stub_sec;
11537 h->root.u.def.value = stub_entry->stub_offset;
11538 h->ref_regular = 1;
11539 h->def_regular = 1;
11540 h->ref_regular_nonweak = 1;
11541 h->forced_local = 1;
11543 h->root.linker_def = 1;
11550 /* As above, but don't actually build the stub. Just bump offset so
11551 we know stub section sizes, and select plt_branch stubs where
11552 long_branch stubs won't do. */
11555 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11557 struct ppc_stub_hash_entry *stub_entry;
11558 struct bfd_link_info *info;
11559 struct ppc_link_hash_table *htab;
11563 /* Massage our args to the form they really have. */
11564 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11567 htab = ppc_hash_table (info);
11571 if (stub_entry->h != NULL
11572 && stub_entry->h->save_res
11573 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11574 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11576 /* Don't make stubs to out-of-line register save/restore
11577 functions. Instead, emit copies of the functions. */
11578 stub_entry->group->needs_save_res = 1;
11579 stub_entry->stub_type = ppc_stub_save_res;
11583 if (stub_entry->stub_type == ppc_stub_plt_call
11584 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11587 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11588 if (off >= (bfd_vma) -2)
11590 plt = htab->elf.splt;
11591 if (!htab->elf.dynamic_sections_created
11592 || stub_entry->h == NULL
11593 || stub_entry->h->elf.dynindx == -1)
11595 if (stub_entry->symtype == STT_GNU_IFUNC)
11596 plt = htab->elf.iplt;
11598 plt = htab->pltlocal;
11600 off += (plt->output_offset
11601 + plt->output_section->vma
11602 - elf_gp (info->output_bfd)
11603 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11605 size = plt_stub_size (htab, stub_entry, off);
11606 if (stub_entry->h != NULL
11607 && (stub_entry->h == htab->tls_get_addr_fd
11608 || stub_entry->h == htab->tls_get_addr)
11609 && htab->params->tls_get_addr_opt
11610 && (ALWAYS_EMIT_R2SAVE
11611 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
11612 stub_entry->group->tls_get_addr_opt_bctrl
11613 = stub_entry->group->stub_sec->size + size - 5 * 4;
11615 if (htab->params->plt_stub_align)
11616 size += plt_stub_pad (htab, stub_entry, off);
11617 if (info->emitrelocations)
11619 stub_entry->group->stub_sec->reloc_count
11620 += ((PPC_HA (off) != 0)
11622 ? 2 + (htab->params->plt_static_chain
11623 && PPC_HA (off + 16) == PPC_HA (off))
11625 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11630 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11633 bfd_vma local_off = 0;
11635 off = (stub_entry->target_value
11636 + stub_entry->target_section->output_offset
11637 + stub_entry->target_section->output_section->vma);
11638 off -= (stub_entry->group->stub_sec->size
11639 + stub_entry->group->stub_sec->output_offset
11640 + stub_entry->group->stub_sec->output_section->vma);
11642 /* Reset the stub type from the plt variant in case we now
11643 can reach with a shorter stub. */
11644 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11645 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11648 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11650 r2off = get_r2off (info, stub_entry);
11651 if (r2off == (bfd_vma) -1)
11653 htab->stub_error = TRUE;
11657 if (PPC_HA (r2off) != 0)
11659 if (PPC_LO (r2off) != 0)
11664 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11666 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11667 Do the same for -R objects without function descriptors. */
11668 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11669 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
11671 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
11673 struct ppc_branch_hash_entry *br_entry;
11675 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11676 stub_entry->root.string + 9,
11678 if (br_entry == NULL)
11680 _bfd_error_handler (_("can't build branch stub `%s'"),
11681 stub_entry->root.string);
11682 htab->stub_error = TRUE;
11686 if (br_entry->iter != htab->stub_iteration)
11688 br_entry->iter = htab->stub_iteration;
11689 br_entry->offset = htab->brlt->size;
11690 htab->brlt->size += 8;
11692 if (htab->relbrlt != NULL)
11693 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11694 else if (info->emitrelocations)
11696 htab->brlt->reloc_count += 1;
11697 htab->brlt->flags |= SEC_RELOC;
11701 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11702 off = (br_entry->offset
11703 + htab->brlt->output_offset
11704 + htab->brlt->output_section->vma
11705 - elf_gp (info->output_bfd)
11706 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11708 if (info->emitrelocations)
11710 stub_entry->group->stub_sec->reloc_count
11711 += 1 + (PPC_HA (off) != 0);
11712 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11715 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11718 if (PPC_HA (off) != 0)
11724 if (PPC_HA (off) != 0)
11727 if (PPC_HA (r2off) != 0)
11729 if (PPC_LO (r2off) != 0)
11733 else if (info->emitrelocations)
11735 stub_entry->group->stub_sec->reloc_count += 1;
11736 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11740 stub_entry->group->stub_sec->size += size;
11744 /* Set up various things so that we can make a list of input sections
11745 for each output section included in the link. Returns -1 on error,
11746 0 when no stubs will be needed, and 1 on success. */
11749 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11753 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11758 htab->sec_info_arr_size = _bfd_section_id;
11759 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11760 htab->sec_info = bfd_zmalloc (amt);
11761 if (htab->sec_info == NULL)
11764 /* Set toc_off for com, und, abs and ind sections. */
11765 for (id = 0; id < 3; id++)
11766 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11771 /* Set up for first pass at multitoc partitioning. */
11774 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11776 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11778 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11779 htab->toc_bfd = NULL;
11780 htab->toc_first_sec = NULL;
11783 /* The linker repeatedly calls this function for each TOC input section
11784 and linker generated GOT section. Group input bfds such that the toc
11785 within a group is less than 64k in size. */
11788 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11790 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11791 bfd_vma addr, off, limit;
11796 if (!htab->second_toc_pass)
11798 /* Keep track of the first .toc or .got section for this input bfd. */
11799 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11803 htab->toc_bfd = isec->owner;
11804 htab->toc_first_sec = isec;
11807 addr = isec->output_offset + isec->output_section->vma;
11808 off = addr - htab->toc_curr;
11809 limit = 0x80008000;
11810 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11812 if (off + isec->size > limit)
11814 addr = (htab->toc_first_sec->output_offset
11815 + htab->toc_first_sec->output_section->vma);
11816 htab->toc_curr = addr;
11817 htab->toc_curr &= -TOC_BASE_ALIGN;
11820 /* toc_curr is the base address of this toc group. Set elf_gp
11821 for the input section to be the offset relative to the
11822 output toc base plus 0x8000. Making the input elf_gp an
11823 offset allows us to move the toc as a whole without
11824 recalculating input elf_gp. */
11825 off = htab->toc_curr - elf_gp (info->output_bfd);
11826 off += TOC_BASE_OFF;
11828 /* Die if someone uses a linker script that doesn't keep input
11829 file .toc and .got together. */
11831 && elf_gp (isec->owner) != 0
11832 && elf_gp (isec->owner) != off)
11835 elf_gp (isec->owner) = off;
11839 /* During the second pass toc_first_sec points to the start of
11840 a toc group, and toc_curr is used to track the old elf_gp.
11841 We use toc_bfd to ensure we only look at each bfd once. */
11842 if (htab->toc_bfd == isec->owner)
11844 htab->toc_bfd = isec->owner;
11846 if (htab->toc_first_sec == NULL
11847 || htab->toc_curr != elf_gp (isec->owner))
11849 htab->toc_curr = elf_gp (isec->owner);
11850 htab->toc_first_sec = isec;
11852 addr = (htab->toc_first_sec->output_offset
11853 + htab->toc_first_sec->output_section->vma);
11854 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
11855 elf_gp (isec->owner) = off;
11860 /* Called via elf_link_hash_traverse to merge GOT entries for global
11864 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11866 if (h->root.type == bfd_link_hash_indirect)
11869 merge_got_entries (&h->got.glist);
11874 /* Called via elf_link_hash_traverse to allocate GOT entries for global
11878 reallocate_got (struct elf_link_hash_entry *h, void *inf)
11880 struct got_entry *gent;
11882 if (h->root.type == bfd_link_hash_indirect)
11885 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11886 if (!gent->is_indirect)
11887 allocate_got (h, (struct bfd_link_info *) inf, gent);
11891 /* Called on the first multitoc pass after the last call to
11892 ppc64_elf_next_toc_section. This function removes duplicate GOT
11896 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
11898 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11899 struct bfd *ibfd, *ibfd2;
11900 bfd_boolean done_something;
11902 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
11904 if (!htab->do_multi_toc)
11907 /* Merge global sym got entries within a toc group. */
11908 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11910 /* And tlsld_got. */
11911 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11913 struct got_entry *ent, *ent2;
11915 if (!is_ppc64_elf (ibfd))
11918 ent = ppc64_tlsld_got (ibfd);
11919 if (!ent->is_indirect
11920 && ent->got.offset != (bfd_vma) -1)
11922 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
11924 if (!is_ppc64_elf (ibfd2))
11927 ent2 = ppc64_tlsld_got (ibfd2);
11928 if (!ent2->is_indirect
11929 && ent2->got.offset != (bfd_vma) -1
11930 && elf_gp (ibfd2) == elf_gp (ibfd))
11932 ent2->is_indirect = TRUE;
11933 ent2->got.ent = ent;
11939 /* Zap sizes of got sections. */
11940 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11941 htab->elf.irelplt->size -= htab->got_reli_size;
11942 htab->got_reli_size = 0;
11944 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11946 asection *got, *relgot;
11948 if (!is_ppc64_elf (ibfd))
11951 got = ppc64_elf_tdata (ibfd)->got;
11954 got->rawsize = got->size;
11956 relgot = ppc64_elf_tdata (ibfd)->relgot;
11957 relgot->rawsize = relgot->size;
11962 /* Now reallocate the got, local syms first. We don't need to
11963 allocate section contents again since we never increase size. */
11964 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11966 struct got_entry **lgot_ents;
11967 struct got_entry **end_lgot_ents;
11968 struct plt_entry **local_plt;
11969 struct plt_entry **end_local_plt;
11970 unsigned char *lgot_masks;
11971 bfd_size_type locsymcount;
11972 Elf_Internal_Shdr *symtab_hdr;
11975 if (!is_ppc64_elf (ibfd))
11978 lgot_ents = elf_local_got_ents (ibfd);
11982 symtab_hdr = &elf_symtab_hdr (ibfd);
11983 locsymcount = symtab_hdr->sh_info;
11984 end_lgot_ents = lgot_ents + locsymcount;
11985 local_plt = (struct plt_entry **) end_lgot_ents;
11986 end_local_plt = local_plt + locsymcount;
11987 lgot_masks = (unsigned char *) end_local_plt;
11988 s = ppc64_elf_tdata (ibfd)->got;
11989 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11991 struct got_entry *ent;
11993 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
11995 unsigned int ent_size = 8;
11996 unsigned int rel_size = sizeof (Elf64_External_Rela);
11998 ent->got.offset = s->size;
11999 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
12004 s->size += ent_size;
12005 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
12007 htab->elf.irelplt->size += rel_size;
12008 htab->got_reli_size += rel_size;
12010 else if (bfd_link_pic (info)
12011 && !((ent->tls_type & TLS_TPREL) != 0
12012 && bfd_link_executable (info)))
12014 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12015 srel->size += rel_size;
12021 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12023 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12025 struct got_entry *ent;
12027 if (!is_ppc64_elf (ibfd))
12030 ent = ppc64_tlsld_got (ibfd);
12031 if (!ent->is_indirect
12032 && ent->got.offset != (bfd_vma) -1)
12034 asection *s = ppc64_elf_tdata (ibfd)->got;
12035 ent->got.offset = s->size;
12037 if (bfd_link_pic (info))
12039 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12040 srel->size += sizeof (Elf64_External_Rela);
12045 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
12046 if (!done_something)
12047 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12051 if (!is_ppc64_elf (ibfd))
12054 got = ppc64_elf_tdata (ibfd)->got;
12057 done_something = got->rawsize != got->size;
12058 if (done_something)
12063 if (done_something)
12064 (*htab->params->layout_sections_again) ();
12066 /* Set up for second pass over toc sections to recalculate elf_gp
12067 on input sections. */
12068 htab->toc_bfd = NULL;
12069 htab->toc_first_sec = NULL;
12070 htab->second_toc_pass = TRUE;
12071 return done_something;
12074 /* Called after second pass of multitoc partitioning. */
12077 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12079 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12081 /* After the second pass, toc_curr tracks the TOC offset used
12082 for code sections below in ppc64_elf_next_input_section. */
12083 htab->toc_curr = TOC_BASE_OFF;
12086 /* No toc references were found in ISEC. If the code in ISEC makes no
12087 calls, then there's no need to use toc adjusting stubs when branching
12088 into ISEC. Actually, indirect calls from ISEC are OK as they will
12089 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12090 needed, and 2 if a cyclical call-graph was found but no other reason
12091 for a stub was detected. If called from the top level, a return of
12092 2 means the same as a return of 0. */
12095 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
12099 /* Mark this section as checked. */
12100 isec->call_check_done = 1;
12102 /* We know none of our code bearing sections will need toc stubs. */
12103 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12106 if (isec->size == 0)
12109 if (isec->output_section == NULL)
12113 if (isec->reloc_count != 0)
12115 Elf_Internal_Rela *relstart, *rel;
12116 Elf_Internal_Sym *local_syms;
12117 struct ppc_link_hash_table *htab;
12119 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12120 info->keep_memory);
12121 if (relstart == NULL)
12124 /* Look for branches to outside of this section. */
12126 htab = ppc_hash_table (info);
12130 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
12132 enum elf_ppc64_reloc_type r_type;
12133 unsigned long r_symndx;
12134 struct elf_link_hash_entry *h;
12135 struct ppc_link_hash_entry *eh;
12136 Elf_Internal_Sym *sym;
12138 struct _opd_sec_data *opd;
12142 r_type = ELF64_R_TYPE (rel->r_info);
12143 if (r_type != R_PPC64_REL24
12144 && r_type != R_PPC64_REL14
12145 && r_type != R_PPC64_REL14_BRTAKEN
12146 && r_type != R_PPC64_REL14_BRNTAKEN
12147 && r_type != R_PPC64_PLTCALL)
12150 r_symndx = ELF64_R_SYM (rel->r_info);
12151 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12158 /* Calls to dynamic lib functions go through a plt call stub
12160 eh = (struct ppc_link_hash_entry *) h;
12162 && (eh->elf.plt.plist != NULL
12164 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12170 if (sym_sec == NULL)
12171 /* Ignore other undefined symbols. */
12174 /* Assume branches to other sections not included in the
12175 link need stubs too, to cover -R and absolute syms. */
12176 if (sym_sec->output_section == NULL)
12183 sym_value = sym->st_value;
12186 if (h->root.type != bfd_link_hash_defined
12187 && h->root.type != bfd_link_hash_defweak)
12189 sym_value = h->root.u.def.value;
12191 sym_value += rel->r_addend;
12193 /* If this branch reloc uses an opd sym, find the code section. */
12194 opd = get_opd_info (sym_sec);
12197 if (h == NULL && opd->adjust != NULL)
12201 adjust = opd->adjust[OPD_NDX (sym_value)];
12203 /* Assume deleted functions won't ever be called. */
12205 sym_value += adjust;
12208 dest = opd_entry_value (sym_sec, sym_value,
12209 &sym_sec, NULL, FALSE);
12210 if (dest == (bfd_vma) -1)
12215 + sym_sec->output_offset
12216 + sym_sec->output_section->vma);
12218 /* Ignore branch to self. */
12219 if (sym_sec == isec)
12222 /* If the called function uses the toc, we need a stub. */
12223 if (sym_sec->has_toc_reloc
12224 || sym_sec->makes_toc_func_call)
12230 /* Assume any branch that needs a long branch stub might in fact
12231 need a plt_branch stub. A plt_branch stub uses r2. */
12232 else if (dest - (isec->output_offset
12233 + isec->output_section->vma
12234 + rel->r_offset) + (1 << 25)
12235 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12243 /* If calling back to a section in the process of being
12244 tested, we can't say for sure that no toc adjusting stubs
12245 are needed, so don't return zero. */
12246 else if (sym_sec->call_check_in_progress)
12249 /* Branches to another section that itself doesn't have any TOC
12250 references are OK. Recursively call ourselves to check. */
12251 else if (!sym_sec->call_check_done)
12255 /* Mark current section as indeterminate, so that other
12256 sections that call back to current won't be marked as
12258 isec->call_check_in_progress = 1;
12259 recur = toc_adjusting_stub_needed (info, sym_sec);
12260 isec->call_check_in_progress = 0;
12271 if (local_syms != NULL
12272 && (elf_symtab_hdr (isec->owner).contents
12273 != (unsigned char *) local_syms))
12275 if (elf_section_data (isec)->relocs != relstart)
12280 && isec->map_head.s != NULL
12281 && (strcmp (isec->output_section->name, ".init") == 0
12282 || strcmp (isec->output_section->name, ".fini") == 0))
12284 if (isec->map_head.s->has_toc_reloc
12285 || isec->map_head.s->makes_toc_func_call)
12287 else if (!isec->map_head.s->call_check_done)
12290 isec->call_check_in_progress = 1;
12291 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12292 isec->call_check_in_progress = 0;
12299 isec->makes_toc_func_call = 1;
12304 /* The linker repeatedly calls this function for each input section,
12305 in the order that input sections are linked into output sections.
12306 Build lists of input sections to determine groupings between which
12307 we may insert linker stubs. */
12310 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
12312 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12317 if ((isec->output_section->flags & SEC_CODE) != 0
12318 && isec->output_section->id < htab->sec_info_arr_size)
12320 /* This happens to make the list in reverse order,
12321 which is what we want. */
12322 htab->sec_info[isec->id].u.list
12323 = htab->sec_info[isec->output_section->id].u.list;
12324 htab->sec_info[isec->output_section->id].u.list = isec;
12327 if (htab->multi_toc_needed)
12329 /* Analyse sections that aren't already flagged as needing a
12330 valid toc pointer. Exclude .fixup for the linux kernel.
12331 .fixup contains branches, but only back to the function that
12332 hit an exception. */
12333 if (!(isec->has_toc_reloc
12334 || (isec->flags & SEC_CODE) == 0
12335 || strcmp (isec->name, ".fixup") == 0
12336 || isec->call_check_done))
12338 if (toc_adjusting_stub_needed (info, isec) < 0)
12341 /* Make all sections use the TOC assigned for this object file.
12342 This will be wrong for pasted sections; We fix that in
12343 check_pasted_section(). */
12344 if (elf_gp (isec->owner) != 0)
12345 htab->toc_curr = elf_gp (isec->owner);
12348 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12352 /* Check that all .init and .fini sections use the same toc, if they
12353 have toc relocs. */
12356 check_pasted_section (struct bfd_link_info *info, const char *name)
12358 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12362 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12363 bfd_vma toc_off = 0;
12366 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12367 if (i->has_toc_reloc)
12370 toc_off = htab->sec_info[i->id].toc_off;
12371 else if (toc_off != htab->sec_info[i->id].toc_off)
12376 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12377 if (i->makes_toc_func_call)
12379 toc_off = htab->sec_info[i->id].toc_off;
12383 /* Make sure the whole pasted function uses the same toc offset. */
12385 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12386 htab->sec_info[i->id].toc_off = toc_off;
12392 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12394 return (check_pasted_section (info, ".init")
12395 & check_pasted_section (info, ".fini"));
12398 /* See whether we can group stub sections together. Grouping stub
12399 sections may result in fewer stubs. More importantly, we need to
12400 put all .init* and .fini* stubs at the beginning of the .init or
12401 .fini output sections respectively, because glibc splits the
12402 _init and _fini functions into multiple parts. Putting a stub in
12403 the middle of a function is not a good idea. */
12406 group_sections (struct bfd_link_info *info,
12407 bfd_size_type stub_group_size,
12408 bfd_boolean stubs_always_before_branch)
12410 struct ppc_link_hash_table *htab;
12412 bfd_boolean suppress_size_errors;
12414 htab = ppc_hash_table (info);
12418 suppress_size_errors = FALSE;
12419 if (stub_group_size == 1)
12421 /* Default values. */
12422 if (stubs_always_before_branch)
12423 stub_group_size = 0x1e00000;
12425 stub_group_size = 0x1c00000;
12426 suppress_size_errors = TRUE;
12429 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12433 if (osec->id >= htab->sec_info_arr_size)
12436 tail = htab->sec_info[osec->id].u.list;
12437 while (tail != NULL)
12441 bfd_size_type total;
12442 bfd_boolean big_sec;
12444 struct map_stub *group;
12445 bfd_size_type group_size;
12448 total = tail->size;
12449 group_size = (ppc64_elf_section_data (tail) != NULL
12450 && ppc64_elf_section_data (tail)->has_14bit_branch
12451 ? stub_group_size >> 10 : stub_group_size);
12453 big_sec = total > group_size;
12454 if (big_sec && !suppress_size_errors)
12455 /* xgettext:c-format */
12456 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12457 tail->owner, tail);
12458 curr_toc = htab->sec_info[tail->id].toc_off;
12460 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12461 && ((total += curr->output_offset - prev->output_offset)
12462 < (ppc64_elf_section_data (prev) != NULL
12463 && ppc64_elf_section_data (prev)->has_14bit_branch
12464 ? (group_size = stub_group_size >> 10) : group_size))
12465 && htab->sec_info[prev->id].toc_off == curr_toc)
12468 /* OK, the size from the start of CURR to the end is less
12469 than group_size and thus can be handled by one stub
12470 section. (or the tail section is itself larger than
12471 group_size, in which case we may be toast.) We should
12472 really be keeping track of the total size of stubs added
12473 here, as stubs contribute to the final output section
12474 size. That's a little tricky, and this way will only
12475 break if stubs added make the total size more than 2^25,
12476 ie. for the default stub_group_size, if stubs total more
12477 than 2097152 bytes, or nearly 75000 plt call stubs. */
12478 group = bfd_alloc (curr->owner, sizeof (*group));
12481 group->link_sec = curr;
12482 group->stub_sec = NULL;
12483 group->needs_save_res = 0;
12484 group->tls_get_addr_opt_bctrl = -1u;
12485 group->next = htab->group;
12486 htab->group = group;
12489 prev = htab->sec_info[tail->id].u.list;
12490 /* Set up this stub group. */
12491 htab->sec_info[tail->id].u.group = group;
12493 while (tail != curr && (tail = prev) != NULL);
12495 /* But wait, there's more! Input sections up to group_size
12496 bytes before the stub section can be handled by it too.
12497 Don't do this if we have a really large section after the
12498 stubs, as adding more stubs increases the chance that
12499 branches may not reach into the stub section. */
12500 if (!stubs_always_before_branch && !big_sec)
12503 while (prev != NULL
12504 && ((total += tail->output_offset - prev->output_offset)
12505 < (ppc64_elf_section_data (prev) != NULL
12506 && ppc64_elf_section_data (prev)->has_14bit_branch
12507 ? (group_size = stub_group_size >> 10) : group_size))
12508 && htab->sec_info[prev->id].toc_off == curr_toc)
12511 prev = htab->sec_info[tail->id].u.list;
12512 htab->sec_info[tail->id].u.group = group;
12521 static const unsigned char glink_eh_frame_cie[] =
12523 0, 0, 0, 16, /* length. */
12524 0, 0, 0, 0, /* id. */
12525 1, /* CIE version. */
12526 'z', 'R', 0, /* Augmentation string. */
12527 4, /* Code alignment. */
12528 0x78, /* Data alignment. */
12530 1, /* Augmentation size. */
12531 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12532 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
12536 stub_eh_frame_size (struct map_stub *group, size_t align)
12538 size_t this_size = 17;
12539 if (group->tls_get_addr_opt_bctrl != -1u)
12541 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
12544 else if (to_bctrl < 256)
12546 else if (to_bctrl < 65536)
12552 this_size = (this_size + align - 1) & -align;
12556 /* Stripping output sections is normally done before dynamic section
12557 symbols have been allocated. This function is called later, and
12558 handles cases like htab->brlt which is mapped to its own output
12562 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12564 if (isec->size == 0
12565 && isec->output_section->size == 0
12566 && !(isec->output_section->flags & SEC_KEEP)
12567 && !bfd_section_removed_from_list (info->output_bfd,
12568 isec->output_section)
12569 && elf_section_data (isec->output_section)->dynindx == 0)
12571 isec->output_section->flags |= SEC_EXCLUDE;
12572 bfd_section_list_remove (info->output_bfd, isec->output_section);
12573 info->output_bfd->section_count--;
12577 /* Determine and set the size of the stub section for a final link.
12579 The basic idea here is to examine all the relocations looking for
12580 PC-relative calls to a target that is unreachable with a "bl"
12584 ppc64_elf_size_stubs (struct bfd_link_info *info)
12586 bfd_size_type stub_group_size;
12587 bfd_boolean stubs_always_before_branch;
12588 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12593 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12594 htab->params->plt_thread_safe = 1;
12595 if (!htab->opd_abi)
12596 htab->params->plt_thread_safe = 0;
12597 else if (htab->params->plt_thread_safe == -1)
12599 static const char *const thread_starter[] =
12603 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12605 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12606 "mq_notify", "create_timer",
12611 "GOMP_parallel_start",
12612 "GOMP_parallel_loop_static",
12613 "GOMP_parallel_loop_static_start",
12614 "GOMP_parallel_loop_dynamic",
12615 "GOMP_parallel_loop_dynamic_start",
12616 "GOMP_parallel_loop_guided",
12617 "GOMP_parallel_loop_guided_start",
12618 "GOMP_parallel_loop_runtime",
12619 "GOMP_parallel_loop_runtime_start",
12620 "GOMP_parallel_sections",
12621 "GOMP_parallel_sections_start",
12627 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12629 struct elf_link_hash_entry *h;
12630 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12631 FALSE, FALSE, TRUE);
12632 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12633 if (htab->params->plt_thread_safe)
12637 stubs_always_before_branch = htab->params->group_size < 0;
12638 if (htab->params->group_size < 0)
12639 stub_group_size = -htab->params->group_size;
12641 stub_group_size = htab->params->group_size;
12643 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12646 #define STUB_SHRINK_ITER 20
12647 /* Loop until no stubs added. After iteration 20 of this loop we may
12648 exit on a stub section shrinking. This is to break out of a
12649 pathological case where adding stubs on one iteration decreases
12650 section gaps (perhaps due to alignment), which then requires
12651 fewer or smaller stubs on the next iteration. */
12656 unsigned int bfd_indx;
12657 struct map_stub *group;
12659 htab->stub_iteration += 1;
12661 for (input_bfd = info->input_bfds, bfd_indx = 0;
12663 input_bfd = input_bfd->link.next, bfd_indx++)
12665 Elf_Internal_Shdr *symtab_hdr;
12667 Elf_Internal_Sym *local_syms = NULL;
12669 if (!is_ppc64_elf (input_bfd))
12672 /* We'll need the symbol table in a second. */
12673 symtab_hdr = &elf_symtab_hdr (input_bfd);
12674 if (symtab_hdr->sh_info == 0)
12677 /* Walk over each section attached to the input bfd. */
12678 for (section = input_bfd->sections;
12680 section = section->next)
12682 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12684 /* If there aren't any relocs, then there's nothing more
12686 if ((section->flags & SEC_RELOC) == 0
12687 || (section->flags & SEC_ALLOC) == 0
12688 || (section->flags & SEC_LOAD) == 0
12689 || (section->flags & SEC_CODE) == 0
12690 || section->reloc_count == 0)
12693 /* If this section is a link-once section that will be
12694 discarded, then don't create any stubs. */
12695 if (section->output_section == NULL
12696 || section->output_section->owner != info->output_bfd)
12699 /* Get the relocs. */
12701 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12702 info->keep_memory);
12703 if (internal_relocs == NULL)
12704 goto error_ret_free_local;
12706 /* Now examine each relocation. */
12707 irela = internal_relocs;
12708 irelaend = irela + section->reloc_count;
12709 for (; irela < irelaend; irela++)
12711 enum elf_ppc64_reloc_type r_type;
12712 unsigned int r_indx;
12713 enum ppc_stub_type stub_type;
12714 struct ppc_stub_hash_entry *stub_entry;
12715 asection *sym_sec, *code_sec;
12716 bfd_vma sym_value, code_value;
12717 bfd_vma destination;
12718 unsigned long local_off;
12719 bfd_boolean ok_dest;
12720 struct ppc_link_hash_entry *hash;
12721 struct ppc_link_hash_entry *fdh;
12722 struct elf_link_hash_entry *h;
12723 Elf_Internal_Sym *sym;
12725 const asection *id_sec;
12726 struct _opd_sec_data *opd;
12727 struct plt_entry *plt_ent;
12729 r_type = ELF64_R_TYPE (irela->r_info);
12730 r_indx = ELF64_R_SYM (irela->r_info);
12732 if (r_type >= R_PPC64_max)
12734 bfd_set_error (bfd_error_bad_value);
12735 goto error_ret_free_internal;
12738 /* Only look for stubs on branch instructions. */
12739 if (r_type != R_PPC64_REL24
12740 && r_type != R_PPC64_REL14
12741 && r_type != R_PPC64_REL14_BRTAKEN
12742 && r_type != R_PPC64_REL14_BRNTAKEN)
12745 /* Now determine the call target, its name, value,
12747 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12748 r_indx, input_bfd))
12749 goto error_ret_free_internal;
12750 hash = (struct ppc_link_hash_entry *) h;
12757 sym_value = sym->st_value;
12758 if (sym_sec != NULL
12759 && sym_sec->output_section != NULL)
12762 else if (hash->elf.root.type == bfd_link_hash_defined
12763 || hash->elf.root.type == bfd_link_hash_defweak)
12765 sym_value = hash->elf.root.u.def.value;
12766 if (sym_sec->output_section != NULL)
12769 else if (hash->elf.root.type == bfd_link_hash_undefweak
12770 || hash->elf.root.type == bfd_link_hash_undefined)
12772 /* Recognise an old ABI func code entry sym, and
12773 use the func descriptor sym instead if it is
12775 if (hash->elf.root.root.string[0] == '.'
12776 && hash->oh != NULL)
12778 fdh = ppc_follow_link (hash->oh);
12779 if (fdh->elf.root.type == bfd_link_hash_defined
12780 || fdh->elf.root.type == bfd_link_hash_defweak)
12782 sym_sec = fdh->elf.root.u.def.section;
12783 sym_value = fdh->elf.root.u.def.value;
12784 if (sym_sec->output_section != NULL)
12793 bfd_set_error (bfd_error_bad_value);
12794 goto error_ret_free_internal;
12801 sym_value += irela->r_addend;
12802 destination = (sym_value
12803 + sym_sec->output_offset
12804 + sym_sec->output_section->vma);
12805 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12810 code_sec = sym_sec;
12811 code_value = sym_value;
12812 opd = get_opd_info (sym_sec);
12817 if (hash == NULL && opd->adjust != NULL)
12819 long adjust = opd->adjust[OPD_NDX (sym_value)];
12822 code_value += adjust;
12823 sym_value += adjust;
12825 dest = opd_entry_value (sym_sec, sym_value,
12826 &code_sec, &code_value, FALSE);
12827 if (dest != (bfd_vma) -1)
12829 destination = dest;
12832 /* Fixup old ABI sym to point at code
12834 hash->elf.root.type = bfd_link_hash_defweak;
12835 hash->elf.root.u.def.section = code_sec;
12836 hash->elf.root.u.def.value = code_value;
12841 /* Determine what (if any) linker stub is needed. */
12843 stub_type = ppc_type_of_stub (section, irela, &hash,
12844 &plt_ent, destination,
12847 if (stub_type != ppc_stub_plt_call)
12849 /* Check whether we need a TOC adjusting stub.
12850 Since the linker pastes together pieces from
12851 different object files when creating the
12852 _init and _fini functions, it may be that a
12853 call to what looks like a local sym is in
12854 fact a call needing a TOC adjustment. */
12855 if (code_sec != NULL
12856 && code_sec->output_section != NULL
12857 && (htab->sec_info[code_sec->id].toc_off
12858 != htab->sec_info[section->id].toc_off)
12859 && (code_sec->has_toc_reloc
12860 || code_sec->makes_toc_func_call))
12861 stub_type = ppc_stub_long_branch_r2off;
12864 if (stub_type == ppc_stub_none)
12867 /* __tls_get_addr calls might be eliminated. */
12868 if (stub_type != ppc_stub_plt_call
12870 && (hash == htab->tls_get_addr
12871 || hash == htab->tls_get_addr_fd)
12872 && section->has_tls_reloc
12873 && irela != internal_relocs)
12875 /* Get tls info. */
12876 unsigned char *tls_mask;
12878 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
12879 irela - 1, input_bfd))
12880 goto error_ret_free_internal;
12881 if ((*tls_mask & TLS_TLS) != 0)
12885 if (stub_type == ppc_stub_plt_call)
12888 && htab->params->plt_localentry0 != 0
12889 && is_elfv2_localentry0 (&hash->elf))
12890 htab->has_plt_localentry0 = 1;
12891 else if (irela + 1 < irelaend
12892 && irela[1].r_offset == irela->r_offset + 4
12893 && (ELF64_R_TYPE (irela[1].r_info)
12894 == R_PPC64_TOCSAVE))
12896 if (!tocsave_find (htab, INSERT,
12897 &local_syms, irela + 1, input_bfd))
12898 goto error_ret_free_internal;
12901 stub_type = ppc_stub_plt_call_r2save;
12904 /* Support for grouping stub sections. */
12905 id_sec = htab->sec_info[section->id].u.group->link_sec;
12907 /* Get the name of this stub. */
12908 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12910 goto error_ret_free_internal;
12912 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
12913 stub_name, FALSE, FALSE);
12914 if (stub_entry != NULL)
12916 /* The proper stub has already been created. */
12918 if (stub_type == ppc_stub_plt_call_r2save)
12919 stub_entry->stub_type = stub_type;
12923 stub_entry = ppc_add_stub (stub_name, section, info);
12924 if (stub_entry == NULL)
12927 error_ret_free_internal:
12928 if (elf_section_data (section)->relocs == NULL)
12929 free (internal_relocs);
12930 error_ret_free_local:
12931 if (local_syms != NULL
12932 && (symtab_hdr->contents
12933 != (unsigned char *) local_syms))
12938 stub_entry->stub_type = stub_type;
12939 if (stub_type != ppc_stub_plt_call
12940 && stub_type != ppc_stub_plt_call_r2save)
12942 stub_entry->target_value = code_value;
12943 stub_entry->target_section = code_sec;
12947 stub_entry->target_value = sym_value;
12948 stub_entry->target_section = sym_sec;
12950 stub_entry->h = hash;
12951 stub_entry->plt_ent = plt_ent;
12952 stub_entry->symtype
12953 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
12954 stub_entry->other = hash ? hash->elf.other : sym->st_other;
12956 if (stub_entry->h != NULL)
12957 htab->stub_globals += 1;
12960 /* We're done with the internal relocs, free them. */
12961 if (elf_section_data (section)->relocs != internal_relocs)
12962 free (internal_relocs);
12965 if (local_syms != NULL
12966 && symtab_hdr->contents != (unsigned char *) local_syms)
12968 if (!info->keep_memory)
12971 symtab_hdr->contents = (unsigned char *) local_syms;
12975 /* We may have added some stubs. Find out the new size of the
12977 for (group = htab->group; group != NULL; group = group->next)
12978 if (group->stub_sec != NULL)
12980 asection *stub_sec = group->stub_sec;
12982 if (htab->stub_iteration <= STUB_SHRINK_ITER
12983 || stub_sec->rawsize < stub_sec->size)
12984 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12985 stub_sec->rawsize = stub_sec->size;
12986 stub_sec->size = 0;
12987 stub_sec->reloc_count = 0;
12988 stub_sec->flags &= ~SEC_RELOC;
12991 if (htab->stub_iteration <= STUB_SHRINK_ITER
12992 || htab->brlt->rawsize < htab->brlt->size)
12993 htab->brlt->rawsize = htab->brlt->size;
12994 htab->brlt->size = 0;
12995 htab->brlt->reloc_count = 0;
12996 htab->brlt->flags &= ~SEC_RELOC;
12997 if (htab->relbrlt != NULL)
12998 htab->relbrlt->size = 0;
13000 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
13002 for (group = htab->group; group != NULL; group = group->next)
13003 if (group->needs_save_res)
13004 group->stub_sec->size += htab->sfpr->size;
13006 if (info->emitrelocations
13007 && htab->glink != NULL && htab->glink->size != 0)
13009 htab->glink->reloc_count = 1;
13010 htab->glink->flags |= SEC_RELOC;
13013 if (htab->glink_eh_frame != NULL
13014 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
13015 && htab->glink_eh_frame->output_section->size > 8)
13017 size_t size = 0, align = 4;
13019 for (group = htab->group; group != NULL; group = group->next)
13020 if (group->stub_sec != NULL)
13021 size += stub_eh_frame_size (group, align);
13022 if (htab->glink != NULL && htab->glink->size != 0)
13023 size += (24 + align - 1) & -align;
13025 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13026 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13027 size = (size + align - 1) & -align;
13028 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13029 htab->glink_eh_frame->size = size;
13032 if (htab->params->plt_stub_align != 0)
13033 for (group = htab->group; group != NULL; group = group->next)
13034 if (group->stub_sec != NULL)
13036 int align = abs (htab->params->plt_stub_align);
13037 group->stub_sec->size
13038 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13041 for (group = htab->group; group != NULL; group = group->next)
13042 if (group->stub_sec != NULL
13043 && group->stub_sec->rawsize != group->stub_sec->size
13044 && (htab->stub_iteration <= STUB_SHRINK_ITER
13045 || group->stub_sec->rawsize < group->stub_sec->size))
13049 && (htab->brlt->rawsize == htab->brlt->size
13050 || (htab->stub_iteration > STUB_SHRINK_ITER
13051 && htab->brlt->rawsize > htab->brlt->size))
13052 && (htab->glink_eh_frame == NULL
13053 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
13056 /* Ask the linker to do its stuff. */
13057 (*htab->params->layout_sections_again) ();
13060 if (htab->glink_eh_frame != NULL
13061 && htab->glink_eh_frame->size != 0)
13064 bfd_byte *p, *last_fde;
13065 size_t last_fde_len, size, align, pad;
13066 struct map_stub *group;
13068 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13071 htab->glink_eh_frame->contents = p;
13075 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13076 /* CIE length (rewrite in case little-endian). */
13077 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
13078 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13079 p += last_fde_len + 4;
13081 for (group = htab->group; group != NULL; group = group->next)
13082 if (group->stub_sec != NULL)
13085 last_fde_len = stub_eh_frame_size (group, align) - 4;
13087 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13090 val = p - htab->glink_eh_frame->contents;
13091 bfd_put_32 (htab->elf.dynobj, val, p);
13093 /* Offset to stub section, written later. */
13095 /* stub section size. */
13096 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
13098 /* Augmentation. */
13100 if (group->tls_get_addr_opt_bctrl != -1u)
13102 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
13104 /* This FDE needs more than just the default.
13105 Describe __tls_get_addr_opt stub LR. */
13107 *p++ = DW_CFA_advance_loc + to_bctrl;
13108 else if (to_bctrl < 256)
13110 *p++ = DW_CFA_advance_loc1;
13113 else if (to_bctrl < 65536)
13115 *p++ = DW_CFA_advance_loc2;
13116 bfd_put_16 (htab->elf.dynobj, to_bctrl, p);
13121 *p++ = DW_CFA_advance_loc4;
13122 bfd_put_32 (htab->elf.dynobj, to_bctrl, p);
13125 *p++ = DW_CFA_offset_extended_sf;
13127 *p++ = -(STK_LINKER (htab) / 8) & 0x7f;
13128 *p++ = DW_CFA_advance_loc + 4;
13129 *p++ = DW_CFA_restore_extended;
13133 p = last_fde + last_fde_len + 4;
13135 if (htab->glink != NULL && htab->glink->size != 0)
13138 last_fde_len = ((24 + align - 1) & -align) - 4;
13140 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
13143 val = p - htab->glink_eh_frame->contents;
13144 bfd_put_32 (htab->elf.dynobj, val, p);
13146 /* Offset to .glink, written later. */
13149 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13151 /* Augmentation. */
13154 *p++ = DW_CFA_advance_loc + 1;
13155 *p++ = DW_CFA_register;
13157 *p++ = htab->opd_abi ? 12 : 0;
13158 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
13159 *p++ = DW_CFA_restore_extended;
13161 p += ((24 + align - 1) & -align) - 24;
13163 /* Subsume any padding into the last FDE if user .eh_frame
13164 sections are aligned more than glink_eh_frame. Otherwise any
13165 zero padding will be seen as a terminator. */
13166 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13167 size = p - htab->glink_eh_frame->contents;
13168 pad = ((size + align - 1) & -align) - size;
13169 htab->glink_eh_frame->size = size + pad;
13170 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13173 maybe_strip_output (info, htab->brlt);
13174 if (htab->glink_eh_frame != NULL)
13175 maybe_strip_output (info, htab->glink_eh_frame);
13180 /* Called after we have determined section placement. If sections
13181 move, we'll be called again. Provide a value for TOCstart. */
13184 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
13187 bfd_vma TOCstart, adjust;
13191 struct elf_link_hash_entry *h;
13192 struct elf_link_hash_table *htab = elf_hash_table (info);
13194 if (is_elf_hash_table (htab)
13195 && htab->hgot != NULL)
13199 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13200 if (is_elf_hash_table (htab))
13204 && h->root.type == bfd_link_hash_defined
13205 && !h->root.linker_def
13206 && (!is_elf_hash_table (htab)
13207 || h->def_regular))
13209 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13210 + h->root.u.def.section->output_offset
13211 + h->root.u.def.section->output_section->vma);
13212 _bfd_set_gp_value (obfd, TOCstart);
13217 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13218 order. The TOC starts where the first of these sections starts. */
13219 s = bfd_get_section_by_name (obfd, ".got");
13220 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13221 s = bfd_get_section_by_name (obfd, ".toc");
13222 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13223 s = bfd_get_section_by_name (obfd, ".tocbss");
13224 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13225 s = bfd_get_section_by_name (obfd, ".plt");
13226 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
13228 /* This may happen for
13229 o references to TOC base (SYM@toc / TOC[tc0]) without a
13231 o bad linker script
13232 o --gc-sections and empty TOC sections
13234 FIXME: Warn user? */
13236 /* Look for a likely section. We probably won't even be
13238 for (s = obfd->sections; s != NULL; s = s->next)
13239 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13241 == (SEC_ALLOC | SEC_SMALL_DATA))
13244 for (s = obfd->sections; s != NULL; s = s->next)
13245 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
13246 == (SEC_ALLOC | SEC_SMALL_DATA))
13249 for (s = obfd->sections; s != NULL; s = s->next)
13250 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13254 for (s = obfd->sections; s != NULL; s = s->next)
13255 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
13261 TOCstart = s->output_section->vma + s->output_offset;
13263 /* Force alignment. */
13264 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13265 TOCstart -= adjust;
13266 _bfd_set_gp_value (obfd, TOCstart);
13268 if (info != NULL && s != NULL)
13270 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13274 if (htab->elf.hgot != NULL)
13276 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
13277 htab->elf.hgot->root.u.def.section = s;
13282 struct bfd_link_hash_entry *bh = NULL;
13283 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
13284 s, TOC_BASE_OFF - adjust,
13285 NULL, FALSE, FALSE, &bh);
13291 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
13292 write out any global entry stubs, and PLT relocations. */
13295 build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
13297 struct bfd_link_info *info;
13298 struct ppc_link_hash_table *htab;
13299 struct plt_entry *ent;
13302 if (h->root.type == bfd_link_hash_indirect)
13306 htab = ppc_hash_table (info);
13310 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13311 if (ent->plt.offset != (bfd_vma) -1)
13313 /* This symbol has an entry in the procedure linkage
13314 table. Set it up. */
13315 Elf_Internal_Rela rela;
13316 asection *plt, *relplt;
13319 if (!htab->elf.dynamic_sections_created
13320 || h->dynindx == -1)
13322 if (!(h->def_regular
13323 && (h->root.type == bfd_link_hash_defined
13324 || h->root.type == bfd_link_hash_defweak)))
13326 if (h->type == STT_GNU_IFUNC)
13328 plt = htab->elf.iplt;
13329 relplt = htab->elf.irelplt;
13330 htab->local_ifunc_resolver = 1;
13332 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13334 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13338 plt = htab->pltlocal;
13339 if (bfd_link_pic (info))
13341 relplt = htab->relpltlocal;
13343 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13345 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13350 rela.r_addend = (h->root.u.def.value
13351 + h->root.u.def.section->output_offset
13352 + h->root.u.def.section->output_section->vma
13355 if (relplt == NULL)
13357 loc = plt->contents + ent->plt.offset;
13358 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13361 bfd_vma toc = elf_gp (info->output_bfd);
13362 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13363 bfd_put_64 (info->output_bfd, toc, loc + 8);
13368 rela.r_offset = (plt->output_section->vma
13369 + plt->output_offset
13370 + ent->plt.offset);
13371 loc = relplt->contents + (relplt->reloc_count++
13372 * sizeof (Elf64_External_Rela));
13373 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13378 rela.r_offset = (htab->elf.splt->output_section->vma
13379 + htab->elf.splt->output_offset
13380 + ent->plt.offset);
13381 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13382 rela.r_addend = ent->addend;
13383 loc = (htab->elf.srelplt->contents
13384 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13385 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13386 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13387 htab->maybe_local_ifunc_resolver = 1;
13388 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13392 if (!h->pointer_equality_needed)
13395 if (h->def_regular)
13398 s = htab->global_entry;
13399 if (s == NULL || s->size == 0)
13402 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13403 if (ent->plt.offset != (bfd_vma) -1
13404 && ent->addend == 0)
13410 p = s->contents + h->root.u.def.value;
13411 plt = htab->elf.splt;
13412 if (!htab->elf.dynamic_sections_created
13413 || h->dynindx == -1)
13415 if (h->type == STT_GNU_IFUNC)
13416 plt = htab->elf.iplt;
13418 plt = htab->pltlocal;
13420 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
13421 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13423 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13425 info->callbacks->einfo
13426 (_("%P: linkage table error against `%pT'\n"),
13427 h->root.root.string);
13428 bfd_set_error (bfd_error_bad_value);
13429 htab->stub_error = TRUE;
13432 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13433 if (htab->params->emit_stub_syms)
13435 size_t len = strlen (h->root.root.string);
13436 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13441 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13442 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13445 if (h->root.type == bfd_link_hash_new)
13447 h->root.type = bfd_link_hash_defined;
13448 h->root.u.def.section = s;
13449 h->root.u.def.value = p - s->contents;
13450 h->ref_regular = 1;
13451 h->def_regular = 1;
13452 h->ref_regular_nonweak = 1;
13453 h->forced_local = 1;
13455 h->root.linker_def = 1;
13459 if (PPC_HA (off) != 0)
13461 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13464 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13466 bfd_put_32 (s->owner, MTCTR_R12, p);
13468 bfd_put_32 (s->owner, BCTR, p);
13474 /* Write PLT relocs for locals. */
13477 write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13479 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13482 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13484 struct got_entry **lgot_ents, **end_lgot_ents;
13485 struct plt_entry **local_plt, **lplt, **end_local_plt;
13486 Elf_Internal_Shdr *symtab_hdr;
13487 bfd_size_type locsymcount;
13488 Elf_Internal_Sym *local_syms = NULL;
13489 struct plt_entry *ent;
13491 if (!is_ppc64_elf (ibfd))
13494 lgot_ents = elf_local_got_ents (ibfd);
13498 symtab_hdr = &elf_symtab_hdr (ibfd);
13499 locsymcount = symtab_hdr->sh_info;
13500 end_lgot_ents = lgot_ents + locsymcount;
13501 local_plt = (struct plt_entry **) end_lgot_ents;
13502 end_local_plt = local_plt + locsymcount;
13503 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13504 for (ent = *lplt; ent != NULL; ent = ent->next)
13505 if (ent->plt.offset != (bfd_vma) -1)
13507 Elf_Internal_Sym *sym;
13509 asection *plt, *relplt;
13513 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13514 lplt - local_plt, ibfd))
13516 if (local_syms != NULL
13517 && symtab_hdr->contents != (unsigned char *) local_syms)
13522 val = sym->st_value + ent->addend;
13523 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
13524 if (sym_sec != NULL && sym_sec->output_section != NULL)
13525 val += sym_sec->output_offset + sym_sec->output_section->vma;
13527 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13529 htab->local_ifunc_resolver = 1;
13530 plt = htab->elf.iplt;
13531 relplt = htab->elf.irelplt;
13535 plt = htab->pltlocal;
13536 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13539 if (relplt == NULL)
13541 loc = plt->contents + ent->plt.offset;
13542 bfd_put_64 (info->output_bfd, val, loc);
13545 bfd_vma toc = elf_gp (ibfd);
13546 bfd_put_64 (info->output_bfd, toc, loc + 8);
13551 Elf_Internal_Rela rela;
13552 rela.r_offset = (ent->plt.offset
13553 + plt->output_offset
13554 + plt->output_section->vma);
13555 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13558 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13560 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13565 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13567 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13569 rela.r_addend = val;
13570 loc = relplt->contents + (relplt->reloc_count++
13571 * sizeof (Elf64_External_Rela));
13572 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13576 if (local_syms != NULL
13577 && symtab_hdr->contents != (unsigned char *) local_syms)
13579 if (!info->keep_memory)
13582 symtab_hdr->contents = (unsigned char *) local_syms;
13588 /* Build all the stubs associated with the current output file.
13589 The stubs are kept in a hash table attached to the main linker
13590 hash table. This function is called via gldelf64ppc_finish. */
13593 ppc64_elf_build_stubs (struct bfd_link_info *info,
13596 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13597 struct map_stub *group;
13598 asection *stub_sec;
13600 int stub_sec_count = 0;
13605 /* Allocate memory to hold the linker stubs. */
13606 for (group = htab->group; group != NULL; group = group->next)
13607 if ((stub_sec = group->stub_sec) != NULL
13608 && stub_sec->size != 0)
13610 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
13611 if (stub_sec->contents == NULL)
13613 stub_sec->size = 0;
13616 if (htab->glink != NULL && htab->glink->size != 0)
13621 /* Build the .glink plt call stub. */
13622 if (htab->params->emit_stub_syms)
13624 struct elf_link_hash_entry *h;
13625 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13626 TRUE, FALSE, FALSE);
13629 if (h->root.type == bfd_link_hash_new)
13631 h->root.type = bfd_link_hash_defined;
13632 h->root.u.def.section = htab->glink;
13633 h->root.u.def.value = 8;
13634 h->ref_regular = 1;
13635 h->def_regular = 1;
13636 h->ref_regular_nonweak = 1;
13637 h->forced_local = 1;
13639 h->root.linker_def = 1;
13642 plt0 = (htab->elf.splt->output_section->vma
13643 + htab->elf.splt->output_offset
13645 if (info->emitrelocations)
13647 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13650 r->r_offset = (htab->glink->output_offset
13651 + htab->glink->output_section->vma);
13652 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13653 r->r_addend = plt0;
13655 p = htab->glink->contents;
13656 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
13657 bfd_put_64 (htab->glink->owner, plt0, p);
13661 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13663 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13665 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13667 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13669 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13671 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13673 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13675 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13677 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13679 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13684 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13686 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13688 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13690 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13692 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13694 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13696 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13698 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13700 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13702 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13704 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13706 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13708 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13711 bfd_put_32 (htab->glink->owner, BCTR, p);
13713 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
13715 /* Build the .glink lazy link call stubs. */
13717 while (p < htab->glink->contents + htab->glink->size)
13723 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13728 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13730 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13735 bfd_put_32 (htab->glink->owner,
13736 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13742 /* Build .glink global entry stubs, and PLT relocs for globals. */
13743 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13745 if (!write_plt_relocs_for_local_syms (info))
13748 if (htab->brlt != NULL && htab->brlt->size != 0)
13750 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13752 if (htab->brlt->contents == NULL)
13755 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13757 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13758 htab->relbrlt->size);
13759 if (htab->relbrlt->contents == NULL)
13763 /* Build the stubs as directed by the stub hash table. */
13764 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
13766 for (group = htab->group; group != NULL; group = group->next)
13767 if (group->needs_save_res)
13768 group->stub_sec->size += htab->sfpr->size;
13770 if (htab->relbrlt != NULL)
13771 htab->relbrlt->reloc_count = 0;
13773 if (htab->params->plt_stub_align != 0)
13774 for (group = htab->group; group != NULL; group = group->next)
13775 if ((stub_sec = group->stub_sec) != NULL)
13777 int align = abs (htab->params->plt_stub_align);
13778 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
13781 for (group = htab->group; group != NULL; group = group->next)
13782 if (group->needs_save_res)
13784 stub_sec = group->stub_sec;
13785 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
13786 htab->sfpr->contents, htab->sfpr->size);
13787 if (htab->params->emit_stub_syms)
13791 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13792 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13797 for (group = htab->group; group != NULL; group = group->next)
13798 if ((stub_sec = group->stub_sec) != NULL)
13800 stub_sec_count += 1;
13801 if (stub_sec->rawsize != stub_sec->size
13802 && (htab->stub_iteration <= STUB_SHRINK_ITER
13803 || stub_sec->rawsize < stub_sec->size))
13809 htab->stub_error = TRUE;
13810 _bfd_error_handler (_("stubs don't match calculated size"));
13813 if (htab->stub_error)
13819 *stats = bfd_malloc (500);
13820 if (*stats == NULL)
13823 len = sprintf (*stats,
13824 ngettext ("linker stubs in %u group\n",
13825 "linker stubs in %u groups\n",
13828 sprintf (*stats + len, _(" branch %lu\n"
13829 " toc adjust %lu\n"
13830 " long branch %lu\n"
13831 " long toc adj %lu\n"
13833 " plt call toc %lu\n"
13834 " global entry %lu"),
13835 htab->stub_count[ppc_stub_long_branch - 1],
13836 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13837 htab->stub_count[ppc_stub_plt_branch - 1],
13838 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
13839 htab->stub_count[ppc_stub_plt_call - 1],
13840 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13841 htab->stub_count[ppc_stub_global_entry - 1]);
13846 /* What to do when ld finds relocations against symbols defined in
13847 discarded sections. */
13849 static unsigned int
13850 ppc64_elf_action_discarded (asection *sec)
13852 if (strcmp (".opd", sec->name) == 0)
13855 if (strcmp (".toc", sec->name) == 0)
13858 if (strcmp (".toc1", sec->name) == 0)
13861 return _bfd_elf_default_action_discarded (sec);
13864 /* The RELOCATE_SECTION function is called by the ELF backend linker
13865 to handle the relocations for a section.
13867 The relocs are always passed as Rela structures; if the section
13868 actually uses Rel structures, the r_addend field will always be
13871 This function is responsible for adjust the section contents as
13872 necessary, and (if using Rela relocs and generating a
13873 relocatable output file) adjusting the reloc addend as
13876 This function does not have to worry about setting the reloc
13877 address or the reloc symbol index.
13879 LOCAL_SYMS is a pointer to the swapped in local symbols.
13881 LOCAL_SECTIONS is an array giving the section in the input file
13882 corresponding to the st_shndx field of each local symbol.
13884 The global hash table entry for the global symbols can be found
13885 via elf_sym_hashes (input_bfd).
13887 When generating relocatable output, this function must handle
13888 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13889 going to be the section symbol corresponding to the output
13890 section, which means that the addend must be adjusted
13894 ppc64_elf_relocate_section (bfd *output_bfd,
13895 struct bfd_link_info *info,
13897 asection *input_section,
13898 bfd_byte *contents,
13899 Elf_Internal_Rela *relocs,
13900 Elf_Internal_Sym *local_syms,
13901 asection **local_sections)
13903 struct ppc_link_hash_table *htab;
13904 Elf_Internal_Shdr *symtab_hdr;
13905 struct elf_link_hash_entry **sym_hashes;
13906 Elf_Internal_Rela *rel;
13907 Elf_Internal_Rela *wrel;
13908 Elf_Internal_Rela *relend;
13909 Elf_Internal_Rela outrel;
13911 struct got_entry **local_got_ents;
13913 bfd_boolean ret = TRUE;
13914 bfd_boolean is_opd;
13915 /* Assume 'at' branch hints. */
13916 bfd_boolean is_isa_v2 = TRUE;
13917 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
13919 /* Initialize howto table if needed. */
13920 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
13923 htab = ppc_hash_table (info);
13927 /* Don't relocate stub sections. */
13928 if (input_section->owner == htab->params->stub_bfd)
13931 BFD_ASSERT (is_ppc64_elf (input_bfd));
13933 local_got_ents = elf_local_got_ents (input_bfd);
13934 TOCstart = elf_gp (output_bfd);
13935 symtab_hdr = &elf_symtab_hdr (input_bfd);
13936 sym_hashes = elf_sym_hashes (input_bfd);
13937 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
13939 rel = wrel = relocs;
13940 relend = relocs + input_section->reloc_count;
13941 for (; rel < relend; wrel++, rel++)
13943 enum elf_ppc64_reloc_type r_type;
13945 bfd_reloc_status_type r;
13946 Elf_Internal_Sym *sym;
13948 struct elf_link_hash_entry *h_elf;
13949 struct ppc_link_hash_entry *h;
13950 struct ppc_link_hash_entry *fdh;
13951 const char *sym_name;
13952 unsigned long r_symndx, toc_symndx;
13953 bfd_vma toc_addend;
13954 unsigned char tls_mask, tls_gd, tls_type;
13955 unsigned char sym_type;
13956 bfd_vma relocation;
13957 bfd_boolean unresolved_reloc, save_unresolved_reloc;
13958 bfd_boolean warned;
13959 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
13962 struct ppc_stub_hash_entry *stub_entry;
13963 bfd_vma max_br_offset;
13965 Elf_Internal_Rela orig_rel;
13966 reloc_howto_type *howto;
13967 struct reloc_howto_struct alt_howto;
13972 r_type = ELF64_R_TYPE (rel->r_info);
13973 r_symndx = ELF64_R_SYM (rel->r_info);
13975 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13976 symbol of the previous ADDR64 reloc. The symbol gives us the
13977 proper TOC base to use. */
13978 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
13980 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
13982 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
13988 unresolved_reloc = FALSE;
13991 if (r_symndx < symtab_hdr->sh_info)
13993 /* It's a local symbol. */
13994 struct _opd_sec_data *opd;
13996 sym = local_syms + r_symndx;
13997 sec = local_sections[r_symndx];
13998 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
13999 sym_type = ELF64_ST_TYPE (sym->st_info);
14000 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
14001 opd = get_opd_info (sec);
14002 if (opd != NULL && opd->adjust != NULL)
14004 long adjust = opd->adjust[OPD_NDX (sym->st_value
14010 /* If this is a relocation against the opd section sym
14011 and we have edited .opd, adjust the reloc addend so
14012 that ld -r and ld --emit-relocs output is correct.
14013 If it is a reloc against some other .opd symbol,
14014 then the symbol value will be adjusted later. */
14015 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14016 rel->r_addend += adjust;
14018 relocation += adjust;
14024 bfd_boolean ignored;
14026 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14027 r_symndx, symtab_hdr, sym_hashes,
14028 h_elf, sec, relocation,
14029 unresolved_reloc, warned, ignored);
14030 sym_name = h_elf->root.root.string;
14031 sym_type = h_elf->type;
14033 && sec->owner == output_bfd
14034 && strcmp (sec->name, ".opd") == 0)
14036 /* This is a symbol defined in a linker script. All
14037 such are defined in output sections, even those
14038 defined by simple assignment from a symbol defined in
14039 an input section. Transfer the symbol to an
14040 appropriate input .opd section, so that a branch to
14041 this symbol will be mapped to the location specified
14042 by the opd entry. */
14043 struct bfd_link_order *lo;
14044 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14045 if (lo->type == bfd_indirect_link_order)
14047 asection *isec = lo->u.indirect.section;
14048 if (h_elf->root.u.def.value >= isec->output_offset
14049 && h_elf->root.u.def.value < (isec->output_offset
14052 h_elf->root.u.def.value -= isec->output_offset;
14053 h_elf->root.u.def.section = isec;
14060 h = (struct ppc_link_hash_entry *) h_elf;
14062 if (sec != NULL && discarded_section (sec))
14064 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14065 input_bfd, input_section,
14066 contents + rel->r_offset);
14067 wrel->r_offset = rel->r_offset;
14069 wrel->r_addend = 0;
14071 /* For ld -r, remove relocations in debug sections against
14072 symbols defined in discarded sections. Not done for
14073 non-debug to preserve relocs in .eh_frame which the
14074 eh_frame editing code expects to be present. */
14075 if (bfd_link_relocatable (info)
14076 && (input_section->flags & SEC_DEBUGGING))
14082 if (bfd_link_relocatable (info))
14085 if (h != NULL && &h->elf == htab->elf.hgot)
14087 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14088 sec = bfd_abs_section_ptr;
14089 unresolved_reloc = FALSE;
14092 /* TLS optimizations. Replace instruction sequences and relocs
14093 based on information we collected in tls_optimize. We edit
14094 RELOCS so that --emit-relocs will output something sensible
14095 for the final instruction stream. */
14100 tls_mask = h->tls_mask;
14101 else if (local_got_ents != NULL)
14103 struct plt_entry **local_plt = (struct plt_entry **)
14104 (local_got_ents + symtab_hdr->sh_info);
14105 unsigned char *lgot_masks = (unsigned char *)
14106 (local_plt + symtab_hdr->sh_info);
14107 tls_mask = lgot_masks[r_symndx];
14109 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
14110 && (r_type == R_PPC64_TLS
14111 || r_type == R_PPC64_TLSGD
14112 || r_type == R_PPC64_TLSLD))
14114 /* Check for toc tls entries. */
14115 unsigned char *toc_tls;
14117 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14118 &local_syms, rel, input_bfd))
14122 tls_mask = *toc_tls;
14125 /* Check that tls relocs are used with tls syms, and non-tls
14126 relocs are used with non-tls syms. */
14127 if (r_symndx != STN_UNDEF
14128 && r_type != R_PPC64_NONE
14130 || h->elf.root.type == bfd_link_hash_defined
14131 || h->elf.root.type == bfd_link_hash_defweak)
14132 && (IS_PPC64_TLS_RELOC (r_type)
14133 != (sym_type == STT_TLS
14134 || (sym_type == STT_SECTION
14135 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
14137 if ((tls_mask & TLS_TLS) != 0
14138 && (r_type == R_PPC64_TLS
14139 || r_type == R_PPC64_TLSGD
14140 || r_type == R_PPC64_TLSLD))
14141 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14144 info->callbacks->einfo
14145 (!IS_PPC64_TLS_RELOC (r_type)
14146 /* xgettext:c-format */
14147 ? _("%H: %s used with TLS symbol `%pT'\n")
14148 /* xgettext:c-format */
14149 : _("%H: %s used with non-TLS symbol `%pT'\n"),
14150 input_bfd, input_section, rel->r_offset,
14151 ppc64_elf_howto_table[r_type]->name,
14155 /* Ensure reloc mapping code below stays sane. */
14156 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14157 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14158 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14159 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14160 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14161 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14162 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14163 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14164 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14165 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14173 case R_PPC64_LO_DS_OPT:
14174 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
14175 if ((insn & (0x3f << 26)) != 58u << 26)
14177 insn += (14u << 26) - (58u << 26);
14178 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
14179 r_type = R_PPC64_TOC16_LO;
14180 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14183 case R_PPC64_TOC16:
14184 case R_PPC64_TOC16_LO:
14185 case R_PPC64_TOC16_DS:
14186 case R_PPC64_TOC16_LO_DS:
14188 /* Check for toc tls entries. */
14189 unsigned char *toc_tls;
14192 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14193 &local_syms, rel, input_bfd);
14199 tls_mask = *toc_tls;
14200 if (r_type == R_PPC64_TOC16_DS
14201 || r_type == R_PPC64_TOC16_LO_DS)
14203 if ((tls_mask & TLS_TLS) != 0
14204 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14209 /* If we found a GD reloc pair, then we might be
14210 doing a GD->IE transition. */
14213 tls_gd = TLS_TPRELGD;
14214 if ((tls_mask & TLS_TLS) != 0
14215 && (tls_mask & TLS_GD) == 0)
14218 else if (retval == 3)
14220 if ((tls_mask & TLS_TLS) != 0
14221 && (tls_mask & TLS_LD) == 0)
14229 case R_PPC64_GOT_TPREL16_HI:
14230 case R_PPC64_GOT_TPREL16_HA:
14231 if ((tls_mask & TLS_TLS) != 0
14232 && (tls_mask & TLS_TPREL) == 0)
14234 rel->r_offset -= d_offset;
14235 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14236 r_type = R_PPC64_NONE;
14237 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14241 case R_PPC64_GOT_TPREL16_DS:
14242 case R_PPC64_GOT_TPREL16_LO_DS:
14243 if ((tls_mask & TLS_TLS) != 0
14244 && (tls_mask & TLS_TPREL) == 0)
14247 insn = bfd_get_32 (input_bfd,
14248 contents + rel->r_offset - d_offset);
14250 insn |= 0x3c0d0000; /* addis 0,13,0 */
14251 bfd_put_32 (input_bfd, insn,
14252 contents + rel->r_offset - d_offset);
14253 r_type = R_PPC64_TPREL16_HA;
14254 if (toc_symndx != 0)
14256 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14257 rel->r_addend = toc_addend;
14258 /* We changed the symbol. Start over in order to
14259 get h, sym, sec etc. right. */
14263 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14268 if ((tls_mask & TLS_TLS) != 0
14269 && (tls_mask & TLS_TPREL) == 0)
14271 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14272 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14275 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14276 /* Was PPC64_TLS which sits on insn boundary, now
14277 PPC64_TPREL16_LO which is at low-order half-word. */
14278 rel->r_offset += d_offset;
14279 r_type = R_PPC64_TPREL16_LO;
14280 if (toc_symndx != 0)
14282 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14283 rel->r_addend = toc_addend;
14284 /* We changed the symbol. Start over in order to
14285 get h, sym, sec etc. right. */
14289 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14293 case R_PPC64_GOT_TLSGD16_HI:
14294 case R_PPC64_GOT_TLSGD16_HA:
14295 tls_gd = TLS_TPRELGD;
14296 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14300 case R_PPC64_GOT_TLSLD16_HI:
14301 case R_PPC64_GOT_TLSLD16_HA:
14302 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14305 if ((tls_mask & tls_gd) != 0)
14306 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14307 + R_PPC64_GOT_TPREL16_DS);
14310 rel->r_offset -= d_offset;
14311 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14312 r_type = R_PPC64_NONE;
14314 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14318 case R_PPC64_GOT_TLSGD16:
14319 case R_PPC64_GOT_TLSGD16_LO:
14320 tls_gd = TLS_TPRELGD;
14321 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14325 case R_PPC64_GOT_TLSLD16:
14326 case R_PPC64_GOT_TLSLD16_LO:
14327 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14329 unsigned int insn1, insn2;
14333 offset = (bfd_vma) -1;
14334 /* If not using the newer R_PPC64_TLSGD/LD to mark
14335 __tls_get_addr calls, we must trust that the call
14336 stays with its arg setup insns, ie. that the next
14337 reloc is the __tls_get_addr call associated with
14338 the current reloc. Edit both insns. */
14339 if (input_section->has_tls_get_addr_call
14340 && rel + 1 < relend
14341 && branch_reloc_hash_match (input_bfd, rel + 1,
14342 htab->tls_get_addr,
14343 htab->tls_get_addr_fd))
14344 offset = rel[1].r_offset;
14345 /* We read the low GOT_TLS (or TOC16) insn because we
14346 need to keep the destination reg. It may be
14347 something other than the usual r3, and moved to r3
14348 before the call by intervening code. */
14349 insn1 = bfd_get_32 (input_bfd,
14350 contents + rel->r_offset - d_offset);
14351 if ((tls_mask & tls_gd) != 0)
14354 insn1 &= (0x1f << 21) | (0x1f << 16);
14355 insn1 |= 58 << 26; /* ld */
14356 insn2 = 0x7c636a14; /* add 3,3,13 */
14357 if (offset != (bfd_vma) -1)
14358 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14359 if ((tls_mask & TLS_EXPLICIT) == 0)
14360 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14361 + R_PPC64_GOT_TPREL16_DS);
14363 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
14364 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14369 insn1 &= 0x1f << 21;
14370 insn1 |= 0x3c0d0000; /* addis r,13,0 */
14371 insn2 = 0x38630000; /* addi 3,3,0 */
14374 /* Was an LD reloc. */
14376 sec = local_sections[toc_symndx];
14378 r_symndx < symtab_hdr->sh_info;
14380 if (local_sections[r_symndx] == sec)
14382 if (r_symndx >= symtab_hdr->sh_info)
14383 r_symndx = STN_UNDEF;
14384 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14385 if (r_symndx != STN_UNDEF)
14386 rel->r_addend -= (local_syms[r_symndx].st_value
14387 + sec->output_offset
14388 + sec->output_section->vma);
14390 else if (toc_symndx != 0)
14392 r_symndx = toc_symndx;
14393 rel->r_addend = toc_addend;
14395 r_type = R_PPC64_TPREL16_HA;
14396 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14397 if (offset != (bfd_vma) -1)
14399 rel[1].r_info = ELF64_R_INFO (r_symndx,
14400 R_PPC64_TPREL16_LO);
14401 rel[1].r_offset = offset + d_offset;
14402 rel[1].r_addend = rel->r_addend;
14405 bfd_put_32 (input_bfd, insn1,
14406 contents + rel->r_offset - d_offset);
14407 if (offset != (bfd_vma) -1)
14408 bfd_put_32 (input_bfd, insn2, contents + offset);
14409 if ((tls_mask & tls_gd) == 0
14410 && (tls_gd == 0 || toc_symndx != 0))
14412 /* We changed the symbol. Start over in order
14413 to get h, sym, sec etc. right. */
14419 case R_PPC64_TLSGD:
14420 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
14421 && rel + 1 < relend)
14423 unsigned int insn2;
14424 bfd_vma offset = rel->r_offset;
14426 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
14428 bfd_put_32 (output_bfd, NOP, contents + offset);
14429 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14433 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14434 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14436 if ((tls_mask & TLS_TPRELGD) != 0)
14439 r_type = R_PPC64_NONE;
14440 insn2 = 0x7c636a14; /* add 3,3,13 */
14445 if (toc_symndx != 0)
14447 r_symndx = toc_symndx;
14448 rel->r_addend = toc_addend;
14450 r_type = R_PPC64_TPREL16_LO;
14451 rel->r_offset = offset + d_offset;
14452 insn2 = 0x38630000; /* addi 3,3,0 */
14454 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14455 /* Zap the reloc on the _tls_get_addr call too. */
14456 BFD_ASSERT (offset == rel[1].r_offset);
14457 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14458 bfd_put_32 (input_bfd, insn2, contents + offset);
14459 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
14464 case R_PPC64_TLSLD:
14465 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
14466 && rel + 1 < relend)
14468 unsigned int insn2;
14469 bfd_vma offset = rel->r_offset;
14471 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
14473 bfd_put_32 (output_bfd, NOP, contents + offset);
14474 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14478 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14479 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14482 sec = local_sections[toc_symndx];
14484 r_symndx < symtab_hdr->sh_info;
14486 if (local_sections[r_symndx] == sec)
14488 if (r_symndx >= symtab_hdr->sh_info)
14489 r_symndx = STN_UNDEF;
14490 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14491 if (r_symndx != STN_UNDEF)
14492 rel->r_addend -= (local_syms[r_symndx].st_value
14493 + sec->output_offset
14494 + sec->output_section->vma);
14496 r_type = R_PPC64_TPREL16_LO;
14497 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14498 rel->r_offset = offset + d_offset;
14499 /* Zap the reloc on the _tls_get_addr call too. */
14500 BFD_ASSERT (offset == rel[1].r_offset);
14501 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14502 insn2 = 0x38630000; /* addi 3,3,0 */
14503 bfd_put_32 (input_bfd, insn2, contents + offset);
14508 case R_PPC64_DTPMOD64:
14509 if (rel + 1 < relend
14510 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14511 && rel[1].r_offset == rel->r_offset + 8)
14513 if ((tls_mask & TLS_GD) == 0)
14515 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
14516 if ((tls_mask & TLS_TPRELGD) != 0)
14517 r_type = R_PPC64_TPREL64;
14520 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14521 r_type = R_PPC64_NONE;
14523 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14528 if ((tls_mask & TLS_LD) == 0)
14530 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
14531 r_type = R_PPC64_NONE;
14532 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14537 case R_PPC64_TPREL64:
14538 if ((tls_mask & TLS_TPREL) == 0)
14540 r_type = R_PPC64_NONE;
14541 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14545 case R_PPC64_ENTRY:
14546 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14547 if (!bfd_link_pic (info)
14548 && !info->traditional_format
14549 && relocation + 0x80008000 <= 0xffffffff)
14551 unsigned int insn1, insn2;
14553 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14554 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14555 if ((insn1 & ~0xfffc) == LD_R2_0R12
14556 && insn2 == ADD_R2_R2_R12)
14558 bfd_put_32 (input_bfd,
14559 LIS_R2 + PPC_HA (relocation),
14560 contents + rel->r_offset);
14561 bfd_put_32 (input_bfd,
14562 ADDI_R2_R2 + PPC_LO (relocation),
14563 contents + rel->r_offset + 4);
14568 relocation -= (rel->r_offset
14569 + input_section->output_offset
14570 + input_section->output_section->vma);
14571 if (relocation + 0x80008000 <= 0xffffffff)
14573 unsigned int insn1, insn2;
14575 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14576 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14577 if ((insn1 & ~0xfffc) == LD_R2_0R12
14578 && insn2 == ADD_R2_R2_R12)
14580 bfd_put_32 (input_bfd,
14581 ADDIS_R2_R12 + PPC_HA (relocation),
14582 contents + rel->r_offset);
14583 bfd_put_32 (input_bfd,
14584 ADDI_R2_R2 + PPC_LO (relocation),
14585 contents + rel->r_offset + 4);
14591 case R_PPC64_REL16_HA:
14592 /* If we are generating a non-PIC executable, edit
14593 . 0: addis 2,12,.TOC.-0b@ha
14594 . addi 2,2,.TOC.-0b@l
14595 used by ELFv2 global entry points to set up r2, to
14598 if .TOC. is in range. */
14599 if (!bfd_link_pic (info)
14600 && !info->traditional_format
14602 && rel->r_addend == d_offset
14603 && h != NULL && &h->elf == htab->elf.hgot
14604 && rel + 1 < relend
14605 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14606 && rel[1].r_offset == rel->r_offset + 4
14607 && rel[1].r_addend == rel->r_addend + 4
14608 && relocation + 0x80008000 <= 0xffffffff)
14610 unsigned int insn1, insn2;
14611 bfd_vma offset = rel->r_offset - d_offset;
14612 insn1 = bfd_get_32 (input_bfd, contents + offset);
14613 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14614 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14615 && (insn2 & 0xffff0000) == ADDI_R2_R2)
14617 r_type = R_PPC64_ADDR16_HA;
14618 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14619 rel->r_addend -= d_offset;
14620 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14621 rel[1].r_addend -= d_offset + 4;
14622 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
14628 /* Handle other relocations that tweak non-addend part of insn. */
14630 max_br_offset = 1 << 25;
14631 addend = rel->r_addend;
14632 reloc_dest = DEST_NORMAL;
14638 case R_PPC64_TOCSAVE:
14639 if (relocation + addend == (rel->r_offset
14640 + input_section->output_offset
14641 + input_section->output_section->vma)
14642 && tocsave_find (htab, NO_INSERT,
14643 &local_syms, rel, input_bfd))
14645 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14647 || insn == CROR_151515 || insn == CROR_313131)
14648 bfd_put_32 (input_bfd,
14649 STD_R2_0R1 + STK_TOC (htab),
14650 contents + rel->r_offset);
14654 /* Branch taken prediction relocations. */
14655 case R_PPC64_ADDR14_BRTAKEN:
14656 case R_PPC64_REL14_BRTAKEN:
14657 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14658 /* Fall through. */
14660 /* Branch not taken prediction relocations. */
14661 case R_PPC64_ADDR14_BRNTAKEN:
14662 case R_PPC64_REL14_BRNTAKEN:
14663 insn |= bfd_get_32 (input_bfd,
14664 contents + rel->r_offset) & ~(0x01 << 21);
14665 /* Fall through. */
14667 case R_PPC64_REL14:
14668 max_br_offset = 1 << 15;
14669 /* Fall through. */
14671 case R_PPC64_REL24:
14672 case R_PPC64_PLTCALL:
14673 /* Calls to functions with a different TOC, such as calls to
14674 shared objects, need to alter the TOC pointer. This is
14675 done using a linkage stub. A REL24 branching to these
14676 linkage stubs needs to be followed by a nop, as the nop
14677 will be replaced with an instruction to restore the TOC
14682 && h->oh->is_func_descriptor)
14683 fdh = ppc_follow_link (h->oh);
14684 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14686 if (r_type == R_PPC64_PLTCALL
14687 && stub_entry != NULL
14688 && (stub_entry->stub_type == ppc_stub_plt_call
14689 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14692 if (stub_entry != NULL
14693 && (stub_entry->stub_type == ppc_stub_plt_call
14694 || stub_entry->stub_type == ppc_stub_plt_call_r2save
14695 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14696 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
14698 bfd_boolean can_plt_call = FALSE;
14700 if (stub_entry->stub_type == ppc_stub_plt_call
14702 && htab->params->plt_localentry0 != 0
14703 && is_elfv2_localentry0 (&h->elf))
14705 /* The function doesn't use or change r2. */
14706 can_plt_call = TRUE;
14709 /* All of these stubs may modify r2, so there must be a
14710 branch and link followed by a nop. The nop is
14711 replaced by an insn to restore r2. */
14712 else if (rel->r_offset + 8 <= input_section->size)
14716 br = bfd_get_32 (input_bfd,
14717 contents + rel->r_offset);
14722 nop = bfd_get_32 (input_bfd,
14723 contents + rel->r_offset + 4);
14724 if (nop == LD_R2_0R1 + STK_TOC (htab))
14725 can_plt_call = TRUE;
14726 else if (nop == NOP
14727 || nop == CROR_151515
14728 || nop == CROR_313131)
14731 && (h == htab->tls_get_addr_fd
14732 || h == htab->tls_get_addr)
14733 && htab->params->tls_get_addr_opt)
14735 /* Special stub used, leave nop alone. */
14738 bfd_put_32 (input_bfd,
14739 LD_R2_0R1 + STK_TOC (htab),
14740 contents + rel->r_offset + 4);
14741 can_plt_call = TRUE;
14746 if (!can_plt_call && h != NULL)
14748 const char *name = h->elf.root.root.string;
14753 if (strncmp (name, "__libc_start_main", 17) == 0
14754 && (name[17] == 0 || name[17] == '@'))
14756 /* Allow crt1 branch to go via a toc adjusting
14757 stub. Other calls that never return could do
14758 the same, if we could detect such. */
14759 can_plt_call = TRUE;
14765 /* g++ as of 20130507 emits self-calls without a
14766 following nop. This is arguably wrong since we
14767 have conflicting information. On the one hand a
14768 global symbol and on the other a local call
14769 sequence, but don't error for this special case.
14770 It isn't possible to cheaply verify we have
14771 exactly such a call. Allow all calls to the same
14773 asection *code_sec = sec;
14775 if (get_opd_info (sec) != NULL)
14777 bfd_vma off = (relocation + addend
14778 - sec->output_section->vma
14779 - sec->output_offset);
14781 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
14783 if (code_sec == input_section)
14784 can_plt_call = TRUE;
14789 if (stub_entry->stub_type == ppc_stub_plt_call
14790 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14791 info->callbacks->einfo
14792 /* xgettext:c-format */
14793 (_("%H: call to `%pT' lacks nop, can't restore toc; "
14794 "recompile with -fPIC\n"),
14795 input_bfd, input_section, rel->r_offset, sym_name);
14797 info->callbacks->einfo
14798 /* xgettext:c-format */
14799 (_("%H: call to `%pT' lacks nop, can't restore toc; "
14800 "(-mcmodel=small toc adjust stub)\n"),
14801 input_bfd, input_section, rel->r_offset, sym_name);
14803 bfd_set_error (bfd_error_bad_value);
14808 && (stub_entry->stub_type == ppc_stub_plt_call
14809 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14810 unresolved_reloc = FALSE;
14813 if ((stub_entry == NULL
14814 || stub_entry->stub_type == ppc_stub_long_branch
14815 || stub_entry->stub_type == ppc_stub_plt_branch)
14816 && get_opd_info (sec) != NULL)
14818 /* The branch destination is the value of the opd entry. */
14819 bfd_vma off = (relocation + addend
14820 - sec->output_section->vma
14821 - sec->output_offset);
14822 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
14823 if (dest != (bfd_vma) -1)
14827 reloc_dest = DEST_OPD;
14831 /* If the branch is out of reach we ought to have a long
14833 from = (rel->r_offset
14834 + input_section->output_offset
14835 + input_section->output_section->vma);
14837 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14841 if (stub_entry != NULL
14842 && (stub_entry->stub_type == ppc_stub_long_branch
14843 || stub_entry->stub_type == ppc_stub_plt_branch)
14844 && (r_type == R_PPC64_ADDR14_BRTAKEN
14845 || r_type == R_PPC64_ADDR14_BRNTAKEN
14846 || (relocation + addend - from + max_br_offset
14847 < 2 * max_br_offset)))
14848 /* Don't use the stub if this branch is in range. */
14851 if (stub_entry != NULL)
14853 /* Munge up the value and addend so that we call the stub
14854 rather than the procedure directly. */
14855 asection *stub_sec = stub_entry->group->stub_sec;
14857 if (stub_entry->stub_type == ppc_stub_save_res)
14858 relocation += (stub_sec->output_offset
14859 + stub_sec->output_section->vma
14860 + stub_sec->size - htab->sfpr->size
14861 - htab->sfpr->output_offset
14862 - htab->sfpr->output_section->vma);
14864 relocation = (stub_entry->stub_offset
14865 + stub_sec->output_offset
14866 + stub_sec->output_section->vma);
14868 reloc_dest = DEST_STUB;
14870 if ((stub_entry->stub_type == ppc_stub_plt_call
14871 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14872 && (ALWAYS_EMIT_R2SAVE
14873 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14874 && rel + 1 < relend
14875 && rel[1].r_offset == rel->r_offset + 4
14876 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14884 /* Set 'a' bit. This is 0b00010 in BO field for branch
14885 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14886 for branch on CTR insns (BO == 1a00t or 1a01t). */
14887 if ((insn & (0x14 << 21)) == (0x04 << 21))
14888 insn |= 0x02 << 21;
14889 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14890 insn |= 0x08 << 21;
14896 /* Invert 'y' bit if not the default. */
14897 if ((bfd_signed_vma) (relocation + addend - from) < 0)
14898 insn ^= 0x01 << 21;
14901 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14904 /* NOP out calls to undefined weak functions.
14905 We can thus call a weak function without first
14906 checking whether the function is defined. */
14908 && h->elf.root.type == bfd_link_hash_undefweak
14909 && h->elf.dynindx == -1
14910 && r_type == R_PPC64_REL24
14914 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14920 /* Set `addend'. */
14922 save_unresolved_reloc = unresolved_reloc;
14926 /* xgettext:c-format */
14927 _bfd_error_handler (_("%pB: %s unsupported"),
14928 input_bfd, ppc64_elf_howto_table[r_type]->name);
14930 bfd_set_error (bfd_error_bad_value);
14936 case R_PPC64_TLSGD:
14937 case R_PPC64_TLSLD:
14938 case R_PPC64_TOCSAVE:
14939 case R_PPC64_GNU_VTINHERIT:
14940 case R_PPC64_GNU_VTENTRY:
14941 case R_PPC64_ENTRY:
14944 /* GOT16 relocations. Like an ADDR16 using the symbol's
14945 address in the GOT as relocation value instead of the
14946 symbol's value itself. Also, create a GOT entry for the
14947 symbol and put the symbol value there. */
14948 case R_PPC64_GOT_TLSGD16:
14949 case R_PPC64_GOT_TLSGD16_LO:
14950 case R_PPC64_GOT_TLSGD16_HI:
14951 case R_PPC64_GOT_TLSGD16_HA:
14952 tls_type = TLS_TLS | TLS_GD;
14955 case R_PPC64_GOT_TLSLD16:
14956 case R_PPC64_GOT_TLSLD16_LO:
14957 case R_PPC64_GOT_TLSLD16_HI:
14958 case R_PPC64_GOT_TLSLD16_HA:
14959 tls_type = TLS_TLS | TLS_LD;
14962 case R_PPC64_GOT_TPREL16_DS:
14963 case R_PPC64_GOT_TPREL16_LO_DS:
14964 case R_PPC64_GOT_TPREL16_HI:
14965 case R_PPC64_GOT_TPREL16_HA:
14966 tls_type = TLS_TLS | TLS_TPREL;
14969 case R_PPC64_GOT_DTPREL16_DS:
14970 case R_PPC64_GOT_DTPREL16_LO_DS:
14971 case R_PPC64_GOT_DTPREL16_HI:
14972 case R_PPC64_GOT_DTPREL16_HA:
14973 tls_type = TLS_TLS | TLS_DTPREL;
14976 case R_PPC64_GOT16:
14977 case R_PPC64_GOT16_LO:
14978 case R_PPC64_GOT16_HI:
14979 case R_PPC64_GOT16_HA:
14980 case R_PPC64_GOT16_DS:
14981 case R_PPC64_GOT16_LO_DS:
14984 /* Relocation is to the entry for this symbol in the global
14989 unsigned long indx = 0;
14990 struct got_entry *ent;
14992 if (tls_type == (TLS_TLS | TLS_LD)
14994 || !h->elf.def_dynamic))
14995 ent = ppc64_tlsld_got (input_bfd);
15000 if (!htab->elf.dynamic_sections_created
15001 || h->elf.dynindx == -1
15002 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
15003 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15004 /* This is actually a static link, or it is a
15005 -Bsymbolic link and the symbol is defined
15006 locally, or the symbol was forced to be local
15007 because of a version file. */
15011 indx = h->elf.dynindx;
15012 unresolved_reloc = FALSE;
15014 ent = h->elf.got.glist;
15018 if (local_got_ents == NULL)
15020 ent = local_got_ents[r_symndx];
15023 for (; ent != NULL; ent = ent->next)
15024 if (ent->addend == orig_rel.r_addend
15025 && ent->owner == input_bfd
15026 && ent->tls_type == tls_type)
15032 if (ent->is_indirect)
15033 ent = ent->got.ent;
15034 offp = &ent->got.offset;
15035 got = ppc64_elf_tdata (ent->owner)->got;
15039 /* The offset must always be a multiple of 8. We use the
15040 least significant bit to record whether we have already
15041 processed this entry. */
15043 if ((off & 1) != 0)
15047 /* Generate relocs for the dynamic linker, except in
15048 the case of TLSLD where we'll use one entry per
15056 ? h->elf.type == STT_GNU_IFUNC
15057 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
15060 relgot = htab->elf.irelplt;
15062 htab->local_ifunc_resolver = 1;
15063 else if (is_static_defined (&h->elf))
15064 htab->maybe_local_ifunc_resolver = 1;
15067 || (bfd_link_pic (info)
15069 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
15070 || (tls_type == (TLS_TLS | TLS_LD)
15071 && !h->elf.def_dynamic))
15072 && !(tls_type == (TLS_TLS | TLS_TPREL)
15073 && bfd_link_executable (info)
15074 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
15075 relgot = ppc64_elf_tdata (ent->owner)->relgot;
15076 if (relgot != NULL)
15078 outrel.r_offset = (got->output_section->vma
15079 + got->output_offset
15081 outrel.r_addend = addend;
15082 if (tls_type & (TLS_LD | TLS_GD))
15084 outrel.r_addend = 0;
15085 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
15086 if (tls_type == (TLS_TLS | TLS_GD))
15088 loc = relgot->contents;
15089 loc += (relgot->reloc_count++
15090 * sizeof (Elf64_External_Rela));
15091 bfd_elf64_swap_reloca_out (output_bfd,
15093 outrel.r_offset += 8;
15094 outrel.r_addend = addend;
15096 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15099 else if (tls_type == (TLS_TLS | TLS_DTPREL))
15100 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
15101 else if (tls_type == (TLS_TLS | TLS_TPREL))
15102 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
15103 else if (indx != 0)
15104 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15108 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15110 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
15112 /* Write the .got section contents for the sake
15114 loc = got->contents + off;
15115 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15119 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
15121 outrel.r_addend += relocation;
15122 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
15124 if (htab->elf.tls_sec == NULL)
15125 outrel.r_addend = 0;
15127 outrel.r_addend -= htab->elf.tls_sec->vma;
15130 loc = relgot->contents;
15131 loc += (relgot->reloc_count++
15132 * sizeof (Elf64_External_Rela));
15133 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15136 /* Init the .got section contents here if we're not
15137 emitting a reloc. */
15140 relocation += addend;
15143 if (htab->elf.tls_sec == NULL)
15147 if (tls_type & TLS_LD)
15150 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
15151 if (tls_type & TLS_TPREL)
15152 relocation += DTP_OFFSET - TP_OFFSET;
15155 if (tls_type & (TLS_GD | TLS_LD))
15157 bfd_put_64 (output_bfd, relocation,
15158 got->contents + off + 8);
15162 bfd_put_64 (output_bfd, relocation,
15163 got->contents + off);
15167 if (off >= (bfd_vma) -2)
15170 relocation = got->output_section->vma + got->output_offset + off;
15171 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
15175 case R_PPC64_PLT16_HA:
15176 case R_PPC64_PLT16_HI:
15177 case R_PPC64_PLT16_LO:
15178 case R_PPC64_PLT16_LO_DS:
15179 case R_PPC64_PLT32:
15180 case R_PPC64_PLT64:
15181 case R_PPC64_PLTSEQ:
15182 case R_PPC64_PLTCALL:
15183 /* Relocation is to the entry for this symbol in the
15184 procedure linkage table. */
15185 unresolved_reloc = TRUE;
15187 struct plt_entry **plt_list = NULL;
15189 plt_list = &h->elf.plt.plist;
15190 else if (local_got_ents != NULL)
15192 struct plt_entry **local_plt = (struct plt_entry **)
15193 (local_got_ents + symtab_hdr->sh_info);
15194 plt_list = local_plt + r_symndx;
15198 struct plt_entry *ent;
15200 for (ent = *plt_list; ent != NULL; ent = ent->next)
15201 if (ent->plt.offset != (bfd_vma) -1
15202 && ent->addend == orig_rel.r_addend)
15207 plt = htab->elf.splt;
15208 if (!htab->elf.dynamic_sections_created
15210 || h->elf.dynindx == -1)
15213 ? h->elf.type == STT_GNU_IFUNC
15214 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15215 plt = htab->elf.iplt;
15217 plt = htab->pltlocal;
15219 relocation = (plt->output_section->vma
15220 + plt->output_offset
15221 + ent->plt.offset);
15222 if (r_type == R_PPC64_PLT16_HA
15223 || r_type ==R_PPC64_PLT16_HI
15224 || r_type ==R_PPC64_PLT16_LO
15225 || r_type ==R_PPC64_PLT16_LO_DS)
15227 got = (elf_gp (output_bfd)
15228 + htab->sec_info[input_section->id].toc_off);
15232 unresolved_reloc = FALSE;
15240 /* Relocation value is TOC base. */
15241 relocation = TOCstart;
15242 if (r_symndx == STN_UNDEF)
15243 relocation += htab->sec_info[input_section->id].toc_off;
15244 else if (unresolved_reloc)
15246 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15247 relocation += htab->sec_info[sec->id].toc_off;
15249 unresolved_reloc = TRUE;
15252 /* TOC16 relocs. We want the offset relative to the TOC base,
15253 which is the address of the start of the TOC plus 0x8000.
15254 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15256 case R_PPC64_TOC16:
15257 case R_PPC64_TOC16_LO:
15258 case R_PPC64_TOC16_HI:
15259 case R_PPC64_TOC16_DS:
15260 case R_PPC64_TOC16_LO_DS:
15261 case R_PPC64_TOC16_HA:
15262 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
15265 /* Relocate against the beginning of the section. */
15266 case R_PPC64_SECTOFF:
15267 case R_PPC64_SECTOFF_LO:
15268 case R_PPC64_SECTOFF_HI:
15269 case R_PPC64_SECTOFF_DS:
15270 case R_PPC64_SECTOFF_LO_DS:
15271 case R_PPC64_SECTOFF_HA:
15273 addend -= sec->output_section->vma;
15276 case R_PPC64_REL16:
15277 case R_PPC64_REL16_LO:
15278 case R_PPC64_REL16_HI:
15279 case R_PPC64_REL16_HA:
15280 case R_PPC64_REL16DX_HA:
15283 case R_PPC64_REL14:
15284 case R_PPC64_REL14_BRNTAKEN:
15285 case R_PPC64_REL14_BRTAKEN:
15286 case R_PPC64_REL24:
15289 case R_PPC64_TPREL16:
15290 case R_PPC64_TPREL16_LO:
15291 case R_PPC64_TPREL16_HI:
15292 case R_PPC64_TPREL16_HA:
15293 case R_PPC64_TPREL16_DS:
15294 case R_PPC64_TPREL16_LO_DS:
15295 case R_PPC64_TPREL16_HIGH:
15296 case R_PPC64_TPREL16_HIGHA:
15297 case R_PPC64_TPREL16_HIGHER:
15298 case R_PPC64_TPREL16_HIGHERA:
15299 case R_PPC64_TPREL16_HIGHEST:
15300 case R_PPC64_TPREL16_HIGHESTA:
15302 && h->elf.root.type == bfd_link_hash_undefweak
15303 && h->elf.dynindx == -1)
15305 /* Make this relocation against an undefined weak symbol
15306 resolve to zero. This is really just a tweak, since
15307 code using weak externs ought to check that they are
15308 defined before using them. */
15309 bfd_byte *p = contents + rel->r_offset - d_offset;
15311 insn = bfd_get_32 (input_bfd, p);
15312 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15314 bfd_put_32 (input_bfd, insn, p);
15317 if (htab->elf.tls_sec != NULL)
15318 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
15319 /* The TPREL16 relocs shouldn't really be used in shared
15320 libs or with non-local symbols as that will result in
15321 DT_TEXTREL being set, but support them anyway. */
15324 case R_PPC64_DTPREL16:
15325 case R_PPC64_DTPREL16_LO:
15326 case R_PPC64_DTPREL16_HI:
15327 case R_PPC64_DTPREL16_HA:
15328 case R_PPC64_DTPREL16_DS:
15329 case R_PPC64_DTPREL16_LO_DS:
15330 case R_PPC64_DTPREL16_HIGH:
15331 case R_PPC64_DTPREL16_HIGHA:
15332 case R_PPC64_DTPREL16_HIGHER:
15333 case R_PPC64_DTPREL16_HIGHERA:
15334 case R_PPC64_DTPREL16_HIGHEST:
15335 case R_PPC64_DTPREL16_HIGHESTA:
15336 if (htab->elf.tls_sec != NULL)
15337 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
15340 case R_PPC64_ADDR64_LOCAL:
15341 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15346 case R_PPC64_DTPMOD64:
15351 case R_PPC64_TPREL64:
15352 if (htab->elf.tls_sec != NULL)
15353 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
15356 case R_PPC64_DTPREL64:
15357 if (htab->elf.tls_sec != NULL)
15358 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
15359 /* Fall through. */
15361 /* Relocations that may need to be propagated if this is a
15363 case R_PPC64_REL30:
15364 case R_PPC64_REL32:
15365 case R_PPC64_REL64:
15366 case R_PPC64_ADDR14:
15367 case R_PPC64_ADDR14_BRNTAKEN:
15368 case R_PPC64_ADDR14_BRTAKEN:
15369 case R_PPC64_ADDR16:
15370 case R_PPC64_ADDR16_DS:
15371 case R_PPC64_ADDR16_HA:
15372 case R_PPC64_ADDR16_HI:
15373 case R_PPC64_ADDR16_HIGH:
15374 case R_PPC64_ADDR16_HIGHA:
15375 case R_PPC64_ADDR16_HIGHER:
15376 case R_PPC64_ADDR16_HIGHERA:
15377 case R_PPC64_ADDR16_HIGHEST:
15378 case R_PPC64_ADDR16_HIGHESTA:
15379 case R_PPC64_ADDR16_LO:
15380 case R_PPC64_ADDR16_LO_DS:
15381 case R_PPC64_ADDR24:
15382 case R_PPC64_ADDR32:
15383 case R_PPC64_ADDR64:
15384 case R_PPC64_UADDR16:
15385 case R_PPC64_UADDR32:
15386 case R_PPC64_UADDR64:
15388 if ((input_section->flags & SEC_ALLOC) == 0)
15391 if (NO_OPD_RELOCS && is_opd)
15394 if (bfd_link_pic (info)
15396 || h->dyn_relocs != NULL)
15397 && ((h != NULL && pc_dynrelocs (h))
15398 || must_be_dyn_reloc (info, r_type)))
15400 ? h->dyn_relocs != NULL
15401 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
15403 bfd_boolean skip, relocate;
15408 /* When generating a dynamic object, these relocations
15409 are copied into the output file to be resolved at run
15415 out_off = _bfd_elf_section_offset (output_bfd, info,
15416 input_section, rel->r_offset);
15417 if (out_off == (bfd_vma) -1)
15419 else if (out_off == (bfd_vma) -2)
15420 skip = TRUE, relocate = TRUE;
15421 out_off += (input_section->output_section->vma
15422 + input_section->output_offset);
15423 outrel.r_offset = out_off;
15424 outrel.r_addend = rel->r_addend;
15426 /* Optimize unaligned reloc use. */
15427 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
15428 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
15429 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
15430 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
15431 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
15432 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
15433 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
15434 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
15435 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
15438 memset (&outrel, 0, sizeof outrel);
15439 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
15441 && r_type != R_PPC64_TOC)
15443 indx = h->elf.dynindx;
15444 BFD_ASSERT (indx != -1);
15445 outrel.r_info = ELF64_R_INFO (indx, r_type);
15449 /* This symbol is local, or marked to become local,
15450 or this is an opd section reloc which must point
15451 at a local function. */
15452 outrel.r_addend += relocation;
15453 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
15455 if (is_opd && h != NULL)
15457 /* Lie about opd entries. This case occurs
15458 when building shared libraries and we
15459 reference a function in another shared
15460 lib. The same thing happens for a weak
15461 definition in an application that's
15462 overridden by a strong definition in a
15463 shared lib. (I believe this is a generic
15464 bug in binutils handling of weak syms.)
15465 In these cases we won't use the opd
15466 entry in this lib. */
15467 unresolved_reloc = FALSE;
15470 && r_type == R_PPC64_ADDR64
15472 ? h->elf.type == STT_GNU_IFUNC
15473 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
15474 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15477 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
15479 /* We need to relocate .opd contents for ld.so.
15480 Prelink also wants simple and consistent rules
15481 for relocs. This make all RELATIVE relocs have
15482 *r_offset equal to r_addend. */
15489 ? h->elf.type == STT_GNU_IFUNC
15490 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15492 info->callbacks->einfo
15493 /* xgettext:c-format */
15494 (_("%H: %s for indirect "
15495 "function `%pT' unsupported\n"),
15496 input_bfd, input_section, rel->r_offset,
15497 ppc64_elf_howto_table[r_type]->name,
15501 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
15503 else if (sec == NULL || sec->owner == NULL)
15505 bfd_set_error (bfd_error_bad_value);
15512 osec = sec->output_section;
15513 indx = elf_section_data (osec)->dynindx;
15517 if ((osec->flags & SEC_READONLY) == 0
15518 && htab->elf.data_index_section != NULL)
15519 osec = htab->elf.data_index_section;
15521 osec = htab->elf.text_index_section;
15522 indx = elf_section_data (osec)->dynindx;
15524 BFD_ASSERT (indx != 0);
15526 /* We are turning this relocation into one
15527 against a section symbol, so subtract out
15528 the output section's address but not the
15529 offset of the input section in the output
15531 outrel.r_addend -= osec->vma;
15534 outrel.r_info = ELF64_R_INFO (indx, r_type);
15538 sreloc = elf_section_data (input_section)->sreloc;
15540 ? h->elf.type == STT_GNU_IFUNC
15541 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15543 sreloc = htab->elf.irelplt;
15545 htab->local_ifunc_resolver = 1;
15546 else if (is_static_defined (&h->elf))
15547 htab->maybe_local_ifunc_resolver = 1;
15549 if (sreloc == NULL)
15552 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
15555 loc = sreloc->contents;
15556 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
15557 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15559 /* If this reloc is against an external symbol, it will
15560 be computed at runtime, so there's no need to do
15561 anything now. However, for the sake of prelink ensure
15562 that the section contents are a known value. */
15565 unresolved_reloc = FALSE;
15566 /* The value chosen here is quite arbitrary as ld.so
15567 ignores section contents except for the special
15568 case of .opd where the contents might be accessed
15569 before relocation. Choose zero, as that won't
15570 cause reloc overflow. */
15573 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
15574 to improve backward compatibility with older
15576 if (r_type == R_PPC64_ADDR64)
15577 addend = outrel.r_addend;
15578 /* Adjust pc_relative relocs to have zero in *r_offset. */
15579 else if (ppc64_elf_howto_table[r_type]->pc_relative)
15580 addend = outrel.r_offset;
15586 case R_PPC64_GLOB_DAT:
15587 case R_PPC64_JMP_SLOT:
15588 case R_PPC64_JMP_IREL:
15589 case R_PPC64_RELATIVE:
15590 /* We shouldn't ever see these dynamic relocs in relocatable
15592 /* Fall through. */
15594 case R_PPC64_PLTGOT16:
15595 case R_PPC64_PLTGOT16_DS:
15596 case R_PPC64_PLTGOT16_HA:
15597 case R_PPC64_PLTGOT16_HI:
15598 case R_PPC64_PLTGOT16_LO:
15599 case R_PPC64_PLTGOT16_LO_DS:
15600 case R_PPC64_PLTREL32:
15601 case R_PPC64_PLTREL64:
15602 /* These ones haven't been implemented yet. */
15604 info->callbacks->einfo
15605 /* xgettext:c-format */
15606 (_("%P: %pB: %s is not supported for `%pT'\n"),
15608 ppc64_elf_howto_table[r_type]->name, sym_name);
15610 bfd_set_error (bfd_error_invalid_operation);
15615 /* Multi-instruction sequences that access the TOC can be
15616 optimized, eg. addis ra,r2,0; addi rb,ra,x;
15617 to nop; addi rb,r2,x; */
15623 case R_PPC64_GOT_TLSLD16_HI:
15624 case R_PPC64_GOT_TLSGD16_HI:
15625 case R_PPC64_GOT_TPREL16_HI:
15626 case R_PPC64_GOT_DTPREL16_HI:
15627 case R_PPC64_GOT16_HI:
15628 case R_PPC64_TOC16_HI:
15629 /* These relocs would only be useful if building up an
15630 offset to later add to r2, perhaps in an indexed
15631 addressing mode instruction. Don't try to optimize.
15632 Unfortunately, the possibility of someone building up an
15633 offset like this or even with the HA relocs, means that
15634 we need to check the high insn when optimizing the low
15638 case R_PPC64_PLTCALL:
15639 if (unresolved_reloc)
15641 /* No plt entry. Make this into a direct call. */
15642 bfd_byte *p = contents + rel->r_offset;
15643 insn = bfd_get_32 (input_bfd, p);
15645 bfd_put_32 (input_bfd, B_DOT | insn, p);
15646 bfd_put_32 (input_bfd, NOP, p + 4);
15647 unresolved_reloc = save_unresolved_reloc;
15648 r_type = R_PPC64_REL24;
15652 case R_PPC64_PLTSEQ:
15653 if (unresolved_reloc)
15655 unresolved_reloc = FALSE;
15660 case R_PPC64_PLT16_HA:
15661 if (unresolved_reloc)
15663 unresolved_reloc = FALSE;
15666 /* Fall through. */
15667 case R_PPC64_GOT_TLSLD16_HA:
15668 case R_PPC64_GOT_TLSGD16_HA:
15669 case R_PPC64_GOT_TPREL16_HA:
15670 case R_PPC64_GOT_DTPREL16_HA:
15671 case R_PPC64_GOT16_HA:
15672 case R_PPC64_TOC16_HA:
15673 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15674 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15678 p = contents + (rel->r_offset & ~3);
15679 bfd_put_32 (input_bfd, NOP, p);
15684 case R_PPC64_PLT16_LO:
15685 case R_PPC64_PLT16_LO_DS:
15686 if (unresolved_reloc)
15688 unresolved_reloc = FALSE;
15691 /* Fall through. */
15692 case R_PPC64_GOT_TLSLD16_LO:
15693 case R_PPC64_GOT_TLSGD16_LO:
15694 case R_PPC64_GOT_TPREL16_LO_DS:
15695 case R_PPC64_GOT_DTPREL16_LO_DS:
15696 case R_PPC64_GOT16_LO:
15697 case R_PPC64_GOT16_LO_DS:
15698 case R_PPC64_TOC16_LO:
15699 case R_PPC64_TOC16_LO_DS:
15700 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15701 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15703 bfd_byte *p = contents + (rel->r_offset & ~3);
15704 insn = bfd_get_32 (input_bfd, p);
15705 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15707 /* Transform addic to addi when we change reg. */
15708 insn &= ~((0x3f << 26) | (0x1f << 16));
15709 insn |= (14u << 26) | (2 << 16);
15713 insn &= ~(0x1f << 16);
15716 bfd_put_32 (input_bfd, insn, p);
15720 case R_PPC64_TPREL16_HA:
15721 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15723 bfd_byte *p = contents + (rel->r_offset & ~3);
15724 insn = bfd_get_32 (input_bfd, p);
15725 if ((insn & ((0x3f << 26) | 0x1f << 16))
15726 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
15727 /* xgettext:c-format */
15728 info->callbacks->minfo
15729 (_("%H: warning: %s unexpected insn %#x.\n"),
15730 input_bfd, input_section, rel->r_offset,
15731 ppc64_elf_howto_table[r_type]->name, insn);
15734 bfd_put_32 (input_bfd, NOP, p);
15740 case R_PPC64_TPREL16_LO:
15741 case R_PPC64_TPREL16_LO_DS:
15742 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15744 bfd_byte *p = contents + (rel->r_offset & ~3);
15745 insn = bfd_get_32 (input_bfd, p);
15746 insn &= ~(0x1f << 16);
15748 bfd_put_32 (input_bfd, insn, p);
15753 /* Do any further special processing. */
15759 case R_PPC64_REL16_HA:
15760 case R_PPC64_REL16DX_HA:
15761 case R_PPC64_ADDR16_HA:
15762 case R_PPC64_ADDR16_HIGHA:
15763 case R_PPC64_ADDR16_HIGHERA:
15764 case R_PPC64_ADDR16_HIGHESTA:
15765 case R_PPC64_TOC16_HA:
15766 case R_PPC64_SECTOFF_HA:
15767 case R_PPC64_TPREL16_HA:
15768 case R_PPC64_TPREL16_HIGHA:
15769 case R_PPC64_TPREL16_HIGHERA:
15770 case R_PPC64_TPREL16_HIGHESTA:
15771 case R_PPC64_DTPREL16_HA:
15772 case R_PPC64_DTPREL16_HIGHA:
15773 case R_PPC64_DTPREL16_HIGHERA:
15774 case R_PPC64_DTPREL16_HIGHESTA:
15775 /* It's just possible that this symbol is a weak symbol
15776 that's not actually defined anywhere. In that case,
15777 'sec' would be NULL, and we should leave the symbol
15778 alone (it will be set to zero elsewhere in the link). */
15781 /* Fall through. */
15783 case R_PPC64_GOT16_HA:
15784 case R_PPC64_PLTGOT16_HA:
15785 case R_PPC64_PLT16_HA:
15786 case R_PPC64_GOT_TLSGD16_HA:
15787 case R_PPC64_GOT_TLSLD16_HA:
15788 case R_PPC64_GOT_TPREL16_HA:
15789 case R_PPC64_GOT_DTPREL16_HA:
15790 /* Add 0x10000 if sign bit in 0:15 is set.
15791 Bits 0:15 are not used. */
15795 case R_PPC64_ADDR16_DS:
15796 case R_PPC64_ADDR16_LO_DS:
15797 case R_PPC64_GOT16_DS:
15798 case R_PPC64_GOT16_LO_DS:
15799 case R_PPC64_PLT16_LO_DS:
15800 case R_PPC64_SECTOFF_DS:
15801 case R_PPC64_SECTOFF_LO_DS:
15802 case R_PPC64_TOC16_DS:
15803 case R_PPC64_TOC16_LO_DS:
15804 case R_PPC64_PLTGOT16_DS:
15805 case R_PPC64_PLTGOT16_LO_DS:
15806 case R_PPC64_GOT_TPREL16_DS:
15807 case R_PPC64_GOT_TPREL16_LO_DS:
15808 case R_PPC64_GOT_DTPREL16_DS:
15809 case R_PPC64_GOT_DTPREL16_LO_DS:
15810 case R_PPC64_TPREL16_DS:
15811 case R_PPC64_TPREL16_LO_DS:
15812 case R_PPC64_DTPREL16_DS:
15813 case R_PPC64_DTPREL16_LO_DS:
15814 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15816 /* If this reloc is against an lq, lxv, or stxv insn, then
15817 the value must be a multiple of 16. This is somewhat of
15818 a hack, but the "correct" way to do this by defining _DQ
15819 forms of all the _DS relocs bloats all reloc switches in
15820 this file. It doesn't make much sense to use these
15821 relocs in data, so testing the insn should be safe. */
15822 if ((insn & (0x3f << 26)) == (56u << 26)
15823 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
15825 relocation += addend;
15826 addend = insn & (mask ^ 3);
15827 if ((relocation & mask) != 0)
15829 relocation ^= relocation & mask;
15830 info->callbacks->einfo
15831 /* xgettext:c-format */
15832 (_("%H: error: %s not a multiple of %u\n"),
15833 input_bfd, input_section, rel->r_offset,
15834 ppc64_elf_howto_table[r_type]->name,
15836 bfd_set_error (bfd_error_bad_value);
15843 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15844 because such sections are not SEC_ALLOC and thus ld.so will
15845 not process them. */
15846 howto = ppc64_elf_howto_table[(int) r_type];
15847 if (unresolved_reloc
15848 && !((input_section->flags & SEC_DEBUGGING) != 0
15849 && h->elf.def_dynamic)
15850 && _bfd_elf_section_offset (output_bfd, info, input_section,
15851 rel->r_offset) != (bfd_vma) -1)
15853 info->callbacks->einfo
15854 /* xgettext:c-format */
15855 (_("%H: unresolvable %s against `%pT'\n"),
15856 input_bfd, input_section, rel->r_offset,
15858 h->elf.root.root.string);
15862 /* 16-bit fields in insns mostly have signed values, but a
15863 few insns have 16-bit unsigned values. Really, we should
15864 have different reloc types. */
15865 if (howto->complain_on_overflow != complain_overflow_dont
15866 && howto->dst_mask == 0xffff
15867 && (input_section->flags & SEC_CODE) != 0)
15869 enum complain_overflow complain = complain_overflow_signed;
15871 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15872 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15873 complain = complain_overflow_bitfield;
15874 else if (howto->rightshift == 0
15875 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15876 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15877 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15878 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15879 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15880 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
15881 complain = complain_overflow_unsigned;
15882 if (howto->complain_on_overflow != complain)
15884 alt_howto = *howto;
15885 alt_howto.complain_on_overflow = complain;
15886 howto = &alt_howto;
15890 if (r_type == R_PPC64_REL16DX_HA)
15892 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15893 if (rel->r_offset + 4 > input_section->size)
15894 r = bfd_reloc_outofrange;
15897 relocation += addend;
15898 relocation -= (rel->r_offset
15899 + input_section->output_offset
15900 + input_section->output_section->vma);
15901 relocation = (bfd_signed_vma) relocation >> 16;
15902 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15904 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15905 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15907 if (relocation + 0x8000 > 0xffff)
15908 r = bfd_reloc_overflow;
15912 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15913 rel->r_offset, relocation, addend);
15915 if (r != bfd_reloc_ok)
15917 char *more_info = NULL;
15918 const char *reloc_name = howto->name;
15920 if (reloc_dest != DEST_NORMAL)
15922 more_info = bfd_malloc (strlen (reloc_name) + 8);
15923 if (more_info != NULL)
15925 strcpy (more_info, reloc_name);
15926 strcat (more_info, (reloc_dest == DEST_OPD
15927 ? " (OPD)" : " (stub)"));
15928 reloc_name = more_info;
15932 if (r == bfd_reloc_overflow)
15934 /* On code like "if (foo) foo();" don't report overflow
15935 on a branch to zero when foo is undefined. */
15937 && (reloc_dest == DEST_STUB
15939 && (h->elf.root.type == bfd_link_hash_undefweak
15940 || h->elf.root.type == bfd_link_hash_undefined)
15941 && is_branch_reloc (r_type))))
15942 info->callbacks->reloc_overflow (info, &h->elf.root,
15943 sym_name, reloc_name,
15945 input_bfd, input_section,
15950 info->callbacks->einfo
15951 /* xgettext:c-format */
15952 (_("%H: %s against `%pT': error %d\n"),
15953 input_bfd, input_section, rel->r_offset,
15954 reloc_name, sym_name, (int) r);
15957 if (more_info != NULL)
15967 Elf_Internal_Shdr *rel_hdr;
15968 size_t deleted = rel - wrel;
15970 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15971 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15972 if (rel_hdr->sh_size == 0)
15974 /* It is too late to remove an empty reloc section. Leave
15976 ??? What is wrong with an empty section??? */
15977 rel_hdr->sh_size = rel_hdr->sh_entsize;
15980 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15981 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15982 input_section->reloc_count -= deleted;
15985 /* If we're emitting relocations, then shortly after this function
15986 returns, reloc offsets and addends for this section will be
15987 adjusted. Worse, reloc symbol indices will be for the output
15988 file rather than the input. Save a copy of the relocs for
15989 opd_entry_value. */
15990 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
15993 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15994 rel = bfd_alloc (input_bfd, amt);
15995 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15996 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
15999 memcpy (rel, relocs, amt);
16004 /* Adjust the value of any local symbols in opd sections. */
16007 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16008 const char *name ATTRIBUTE_UNUSED,
16009 Elf_Internal_Sym *elfsym,
16010 asection *input_sec,
16011 struct elf_link_hash_entry *h)
16013 struct _opd_sec_data *opd;
16020 opd = get_opd_info (input_sec);
16021 if (opd == NULL || opd->adjust == NULL)
16024 value = elfsym->st_value - input_sec->output_offset;
16025 if (!bfd_link_relocatable (info))
16026 value -= input_sec->output_section->vma;
16028 adjust = opd->adjust[OPD_NDX (value)];
16032 elfsym->st_value += adjust;
16036 /* Finish up dynamic symbol handling. We set the contents of various
16037 dynamic sections here. */
16040 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16041 struct bfd_link_info *info,
16042 struct elf_link_hash_entry *h,
16043 Elf_Internal_Sym *sym)
16045 struct ppc_link_hash_table *htab;
16046 struct plt_entry *ent;
16048 htab = ppc_hash_table (info);
16052 if (!htab->opd_abi && !h->def_regular)
16053 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16054 if (ent->plt.offset != (bfd_vma) -1)
16056 /* Mark the symbol as undefined, rather than as
16057 defined in glink. Leave the value if there were
16058 any relocations where pointer equality matters
16059 (this is a clue for the dynamic linker, to make
16060 function pointer comparisons work between an
16061 application and shared library), otherwise set it
16063 sym->st_shndx = SHN_UNDEF;
16064 if (!h->pointer_equality_needed)
16066 else if (!h->ref_regular_nonweak)
16068 /* This breaks function pointer comparisons, but
16069 that is better than breaking tests for a NULL
16070 function pointer. */
16078 /* This symbol needs a copy reloc. Set it up. */
16079 Elf_Internal_Rela rela;
16083 if (h->dynindx == -1
16084 || (h->root.type != bfd_link_hash_defined
16085 && h->root.type != bfd_link_hash_defweak)
16086 || htab->elf.srelbss == NULL
16087 || htab->elf.sreldynrelro == NULL)
16090 rela.r_offset = (h->root.u.def.value
16091 + h->root.u.def.section->output_section->vma
16092 + h->root.u.def.section->output_offset);
16093 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16095 if (h->root.u.def.section == htab->elf.sdynrelro)
16096 srel = htab->elf.sreldynrelro;
16098 srel = htab->elf.srelbss;
16099 loc = srel->contents;
16100 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
16101 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
16107 /* Used to decide how to sort relocs in an optimal manner for the
16108 dynamic linker, before writing them out. */
16110 static enum elf_reloc_type_class
16111 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16112 const asection *rel_sec,
16113 const Elf_Internal_Rela *rela)
16115 enum elf_ppc64_reloc_type r_type;
16116 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16118 if (rel_sec == htab->elf.irelplt)
16119 return reloc_class_ifunc;
16121 r_type = ELF64_R_TYPE (rela->r_info);
16124 case R_PPC64_RELATIVE:
16125 return reloc_class_relative;
16126 case R_PPC64_JMP_SLOT:
16127 return reloc_class_plt;
16129 return reloc_class_copy;
16131 return reloc_class_normal;
16135 /* Finish up the dynamic sections. */
16138 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16139 struct bfd_link_info *info)
16141 struct ppc_link_hash_table *htab;
16145 htab = ppc_hash_table (info);
16149 dynobj = htab->elf.dynobj;
16150 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
16152 if (htab->elf.dynamic_sections_created)
16154 Elf64_External_Dyn *dyncon, *dynconend;
16156 if (sdyn == NULL || htab->elf.sgot == NULL)
16159 dyncon = (Elf64_External_Dyn *) sdyn->contents;
16160 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
16161 for (; dyncon < dynconend; dyncon++)
16163 Elf_Internal_Dyn dyn;
16166 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16173 case DT_PPC64_GLINK:
16175 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16176 /* We stupidly defined DT_PPC64_GLINK to be the start
16177 of glink rather than the first entry point, which is
16178 what ld.so needs, and now have a bigger stub to
16179 support automatic multiple TOCs. */
16180 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
16184 s = bfd_get_section_by_name (output_bfd, ".opd");
16187 dyn.d_un.d_ptr = s->vma;
16191 if (htab->do_multi_toc && htab->multi_toc_needed)
16192 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
16193 if (htab->has_plt_localentry0)
16194 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
16197 case DT_PPC64_OPDSZ:
16198 s = bfd_get_section_by_name (output_bfd, ".opd");
16201 dyn.d_un.d_val = s->size;
16205 s = htab->elf.splt;
16206 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16210 s = htab->elf.srelplt;
16211 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
16215 dyn.d_un.d_val = htab->elf.srelplt->size;
16219 if (htab->local_ifunc_resolver)
16220 info->callbacks->einfo
16221 (_("%X%P: text relocations and GNU indirect "
16222 "functions will result in a segfault at runtime\n"));
16223 else if (htab->maybe_local_ifunc_resolver)
16224 info->callbacks->einfo
16225 (_("%P: warning: text relocations and GNU indirect "
16226 "functions may result in a segfault at runtime\n"));
16230 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
16234 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
16235 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
16237 /* Fill in the first entry in the global offset table.
16238 We use it to hold the link-time TOCbase. */
16239 bfd_put_64 (output_bfd,
16240 elf_gp (output_bfd) + TOC_BASE_OFF,
16241 htab->elf.sgot->contents);
16243 /* Set .got entry size. */
16244 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
16247 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
16248 && htab->elf.splt->output_section != bfd_abs_section_ptr)
16250 /* Set .plt entry size. */
16251 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
16252 = PLT_ENTRY_SIZE (htab);
16255 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
16256 brlt ourselves if emitrelocations. */
16257 if (htab->brlt != NULL
16258 && htab->brlt->reloc_count != 0
16259 && !_bfd_elf_link_output_relocs (output_bfd,
16261 elf_section_data (htab->brlt)->rela.hdr,
16262 elf_section_data (htab->brlt)->relocs,
16266 if (htab->glink != NULL
16267 && htab->glink->reloc_count != 0
16268 && !_bfd_elf_link_output_relocs (output_bfd,
16270 elf_section_data (htab->glink)->rela.hdr,
16271 elf_section_data (htab->glink)->relocs,
16275 if (htab->glink_eh_frame != NULL
16276 && htab->glink_eh_frame->size != 0)
16280 struct map_stub *group;
16283 p = htab->glink_eh_frame->contents;
16284 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
16286 for (group = htab->group; group != NULL; group = group->next)
16287 if (group->stub_sec != NULL)
16289 /* Offset to stub section. */
16290 val = (group->stub_sec->output_section->vma
16291 + group->stub_sec->output_offset);
16292 val -= (htab->glink_eh_frame->output_section->vma
16293 + htab->glink_eh_frame->output_offset
16294 + (p + 8 - htab->glink_eh_frame->contents));
16295 if (val + 0x80000000 > 0xffffffff)
16298 (_("%s offset too large for .eh_frame sdata4 encoding"),
16299 group->stub_sec->name);
16302 bfd_put_32 (dynobj, val, p + 8);
16303 p += stub_eh_frame_size (group, align);
16305 if (htab->glink != NULL && htab->glink->size != 0)
16307 /* Offset to .glink. */
16308 val = (htab->glink->output_section->vma
16309 + htab->glink->output_offset
16311 val -= (htab->glink_eh_frame->output_section->vma
16312 + htab->glink_eh_frame->output_offset
16313 + (p + 8 - htab->glink_eh_frame->contents));
16314 if (val + 0x80000000 > 0xffffffff)
16317 (_("%s offset too large for .eh_frame sdata4 encoding"),
16318 htab->glink->name);
16321 bfd_put_32 (dynobj, val, p + 8);
16322 p += (24 + align - 1) & -align;
16325 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
16326 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
16327 htab->glink_eh_frame,
16328 htab->glink_eh_frame->contents))
16332 /* We need to handle writing out multiple GOT sections ourselves,
16333 since we didn't add them to DYNOBJ. We know dynobj is the first
16335 while ((dynobj = dynobj->link.next) != NULL)
16339 if (!is_ppc64_elf (dynobj))
16342 s = ppc64_elf_tdata (dynobj)->got;
16345 && s->output_section != bfd_abs_section_ptr
16346 && !bfd_set_section_contents (output_bfd, s->output_section,
16347 s->contents, s->output_offset,
16350 s = ppc64_elf_tdata (dynobj)->relgot;
16353 && s->output_section != bfd_abs_section_ptr
16354 && !bfd_set_section_contents (output_bfd, s->output_section,
16355 s->contents, s->output_offset,
16363 #include "elf64-target.h"
16365 /* FreeBSD support */
16367 #undef TARGET_LITTLE_SYM
16368 #undef TARGET_LITTLE_NAME
16370 #undef TARGET_BIG_SYM
16371 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
16372 #undef TARGET_BIG_NAME
16373 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
16376 #define ELF_OSABI ELFOSABI_FREEBSD
16379 #define elf64_bed elf64_powerpc_fbsd_bed
16381 #include "elf64-target.h"