1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2018 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
59 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM powerpc_elf64_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_TARGET_ID PPC64_ELF_DATA
65 #define ELF_MACHINE_CODE EM_PPC64
66 #define ELF_MAXPAGESIZE 0x10000
67 #define ELF_COMMONPAGESIZE 0x10000
68 #define elf_info_to_howto ppc64_elf_info_to_howto
70 #define elf_backend_want_got_sym 0
71 #define elf_backend_want_plt_sym 0
72 #define elf_backend_plt_alignment 3
73 #define elf_backend_plt_not_loaded 1
74 #define elf_backend_got_header_size 8
75 #define elf_backend_want_dynrelro 1
76 #define elf_backend_can_gc_sections 1
77 #define elf_backend_can_refcount 1
78 #define elf_backend_rela_normal 1
79 #define elf_backend_dtrel_excludes_plt 1
80 #define elf_backend_default_execstack 0
82 #define bfd_elf64_mkobject ppc64_elf_mkobject
83 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
84 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
85 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
86 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
87 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
88 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
89 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
90 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
91 #define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
93 #define elf_backend_object_p ppc64_elf_object_p
94 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
95 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
96 #define elf_backend_write_core_note ppc64_elf_write_core_note
97 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
98 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
99 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
100 #define elf_backend_check_directives ppc64_elf_before_check_relocs
101 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
102 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
103 #define elf_backend_check_relocs ppc64_elf_check_relocs
104 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
105 #define elf_backend_gc_keep ppc64_elf_gc_keep
106 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
107 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
108 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
109 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
110 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
111 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
112 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
113 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
114 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
115 #define elf_backend_action_discarded ppc64_elf_action_discarded
116 #define elf_backend_relocate_section ppc64_elf_relocate_section
117 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
118 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
119 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
120 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
121 #define elf_backend_special_sections ppc64_elf_special_sections
122 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
123 #define elf_backend_merge_symbol ppc64_elf_merge_symbol
124 #define elf_backend_get_reloc_section bfd_get_section_by_name
126 /* The name of the dynamic interpreter. This is put in the .interp
128 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
130 /* The size in bytes of an entry in the procedure linkage table. */
131 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
133 /* The initial size of the plt reserved for the dynamic linker. */
134 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
136 /* Offsets to some stack save slots. */
138 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
139 /* This one is dodgy. ELFv2 does not have a linker word, so use the
140 CR save slot. Used only by optimised __tls_get_addr call stub,
141 relying on __tls_get_addr_opt not saving CR.. */
142 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
144 /* TOC base pointers offset from start of TOC. */
145 #define TOC_BASE_OFF 0x8000
146 /* TOC base alignment. */
147 #define TOC_BASE_ALIGN 256
149 /* Offset of tp and dtp pointers from start of TLS block. */
150 #define TP_OFFSET 0x7000
151 #define DTP_OFFSET 0x8000
153 /* .plt call stub instructions. The normal stub is like this, but
154 sometimes the .plt entry crosses a 64k boundary and we need to
155 insert an addi to adjust r11. */
156 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
157 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
158 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
159 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
160 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
161 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
162 #define BCTR 0x4e800420 /* bctr */
164 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
165 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
166 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
168 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
169 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
170 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
171 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
172 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
173 #define BNECTR 0x4ca20420 /* bnectr+ */
174 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
176 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
177 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
178 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
180 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
181 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
182 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
184 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
185 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
186 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
187 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
188 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
190 /* __glink_PLTresolve stub instructions. We enter with the index in R0. */
191 #define GLINK_PLTRESOLVE_SIZE(htab) \
192 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
196 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
197 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
199 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
200 /* ld %2,(0b-1b)(%11) */
201 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
202 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
208 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
209 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
210 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
211 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
212 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
215 #define NOP 0x60000000
217 /* Some other nops. */
218 #define CROR_151515 0x4def7b82
219 #define CROR_313131 0x4ffffb82
221 /* .glink entries for the first 32k functions are two instructions. */
222 #define LI_R0_0 0x38000000 /* li %r0,0 */
223 #define B_DOT 0x48000000 /* b . */
225 /* After that, we need two instructions to load the index, followed by
227 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
228 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
230 /* Instructions used by the save and restore reg functions. */
231 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
232 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
233 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
234 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
235 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
236 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
237 #define LI_R12_0 0x39800000 /* li %r12,0 */
238 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
239 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
240 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
241 #define BLR 0x4e800020 /* blr */
243 /* Since .opd is an array of descriptors and each entry will end up
244 with identical R_PPC64_RELATIVE relocs, there is really no need to
245 propagate .opd relocs; The dynamic linker should be taught to
246 relocate .opd without reloc entries. */
247 #ifndef NO_OPD_RELOCS
248 #define NO_OPD_RELOCS 0
252 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
256 abiversion (bfd *abfd)
258 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
262 set_abiversion (bfd *abfd, int ver)
264 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
265 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
268 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
270 /* Relocation HOWTO's. */
271 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
273 static reloc_howto_type ppc64_elf_howto_raw[] = {
274 /* This reloc does nothing. */
275 HOWTO (R_PPC64_NONE, /* type */
277 3, /* size (0 = byte, 1 = short, 2 = long) */
279 FALSE, /* pc_relative */
281 complain_overflow_dont, /* complain_on_overflow */
282 bfd_elf_generic_reloc, /* special_function */
283 "R_PPC64_NONE", /* name */
284 FALSE, /* partial_inplace */
287 FALSE), /* pcrel_offset */
289 /* A standard 32 bit relocation. */
290 HOWTO (R_PPC64_ADDR32, /* type */
292 2, /* size (0 = byte, 1 = short, 2 = long) */
294 FALSE, /* pc_relative */
296 complain_overflow_bitfield, /* complain_on_overflow */
297 bfd_elf_generic_reloc, /* special_function */
298 "R_PPC64_ADDR32", /* name */
299 FALSE, /* partial_inplace */
301 0xffffffff, /* dst_mask */
302 FALSE), /* pcrel_offset */
304 /* An absolute 26 bit branch; the lower two bits must be zero.
305 FIXME: we don't check that, we just clear them. */
306 HOWTO (R_PPC64_ADDR24, /* type */
308 2, /* size (0 = byte, 1 = short, 2 = long) */
310 FALSE, /* pc_relative */
312 complain_overflow_bitfield, /* complain_on_overflow */
313 bfd_elf_generic_reloc, /* special_function */
314 "R_PPC64_ADDR24", /* name */
315 FALSE, /* partial_inplace */
317 0x03fffffc, /* dst_mask */
318 FALSE), /* pcrel_offset */
320 /* A standard 16 bit relocation. */
321 HOWTO (R_PPC64_ADDR16, /* type */
323 1, /* size (0 = byte, 1 = short, 2 = long) */
325 FALSE, /* pc_relative */
327 complain_overflow_bitfield, /* complain_on_overflow */
328 bfd_elf_generic_reloc, /* special_function */
329 "R_PPC64_ADDR16", /* name */
330 FALSE, /* partial_inplace */
332 0xffff, /* dst_mask */
333 FALSE), /* pcrel_offset */
335 /* A 16 bit relocation without overflow. */
336 HOWTO (R_PPC64_ADDR16_LO, /* type */
338 1, /* size (0 = byte, 1 = short, 2 = long) */
340 FALSE, /* pc_relative */
342 complain_overflow_dont,/* complain_on_overflow */
343 bfd_elf_generic_reloc, /* special_function */
344 "R_PPC64_ADDR16_LO", /* name */
345 FALSE, /* partial_inplace */
347 0xffff, /* dst_mask */
348 FALSE), /* pcrel_offset */
350 /* Bits 16-31 of an address. */
351 HOWTO (R_PPC64_ADDR16_HI, /* type */
353 1, /* size (0 = byte, 1 = short, 2 = long) */
355 FALSE, /* pc_relative */
357 complain_overflow_signed, /* complain_on_overflow */
358 bfd_elf_generic_reloc, /* special_function */
359 "R_PPC64_ADDR16_HI", /* name */
360 FALSE, /* partial_inplace */
362 0xffff, /* dst_mask */
363 FALSE), /* pcrel_offset */
365 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
366 bits, treated as a signed number, is negative. */
367 HOWTO (R_PPC64_ADDR16_HA, /* type */
369 1, /* size (0 = byte, 1 = short, 2 = long) */
371 FALSE, /* pc_relative */
373 complain_overflow_signed, /* complain_on_overflow */
374 ppc64_elf_ha_reloc, /* special_function */
375 "R_PPC64_ADDR16_HA", /* name */
376 FALSE, /* partial_inplace */
378 0xffff, /* dst_mask */
379 FALSE), /* pcrel_offset */
381 /* An absolute 16 bit branch; the lower two bits must be zero.
382 FIXME: we don't check that, we just clear them. */
383 HOWTO (R_PPC64_ADDR14, /* type */
385 2, /* size (0 = byte, 1 = short, 2 = long) */
387 FALSE, /* pc_relative */
389 complain_overflow_signed, /* complain_on_overflow */
390 ppc64_elf_branch_reloc, /* special_function */
391 "R_PPC64_ADDR14", /* name */
392 FALSE, /* partial_inplace */
394 0x0000fffc, /* dst_mask */
395 FALSE), /* pcrel_offset */
397 /* An absolute 16 bit branch, for which bit 10 should be set to
398 indicate that the branch is expected to be taken. The lower two
399 bits must be zero. */
400 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
402 2, /* size (0 = byte, 1 = short, 2 = long) */
404 FALSE, /* pc_relative */
406 complain_overflow_signed, /* complain_on_overflow */
407 ppc64_elf_brtaken_reloc, /* special_function */
408 "R_PPC64_ADDR14_BRTAKEN",/* name */
409 FALSE, /* partial_inplace */
411 0x0000fffc, /* dst_mask */
412 FALSE), /* pcrel_offset */
414 /* An absolute 16 bit branch, for which bit 10 should be set to
415 indicate that the branch is not expected to be taken. The lower
416 two bits must be zero. */
417 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
419 2, /* size (0 = byte, 1 = short, 2 = long) */
421 FALSE, /* pc_relative */
423 complain_overflow_signed, /* complain_on_overflow */
424 ppc64_elf_brtaken_reloc, /* special_function */
425 "R_PPC64_ADDR14_BRNTAKEN",/* name */
426 FALSE, /* partial_inplace */
428 0x0000fffc, /* dst_mask */
429 FALSE), /* pcrel_offset */
431 /* A relative 26 bit branch; the lower two bits must be zero. */
432 HOWTO (R_PPC64_REL24, /* type */
434 2, /* size (0 = byte, 1 = short, 2 = long) */
436 TRUE, /* pc_relative */
438 complain_overflow_signed, /* complain_on_overflow */
439 ppc64_elf_branch_reloc, /* special_function */
440 "R_PPC64_REL24", /* name */
441 FALSE, /* partial_inplace */
443 0x03fffffc, /* dst_mask */
444 TRUE), /* pcrel_offset */
446 /* A relative 16 bit branch; the lower two bits must be zero. */
447 HOWTO (R_PPC64_REL14, /* type */
449 2, /* size (0 = byte, 1 = short, 2 = long) */
451 TRUE, /* pc_relative */
453 complain_overflow_signed, /* complain_on_overflow */
454 ppc64_elf_branch_reloc, /* special_function */
455 "R_PPC64_REL14", /* name */
456 FALSE, /* partial_inplace */
458 0x0000fffc, /* dst_mask */
459 TRUE), /* pcrel_offset */
461 /* A relative 16 bit branch. Bit 10 should be set to indicate that
462 the branch is expected to be taken. The lower two bits must be
464 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
466 2, /* size (0 = byte, 1 = short, 2 = long) */
468 TRUE, /* pc_relative */
470 complain_overflow_signed, /* complain_on_overflow */
471 ppc64_elf_brtaken_reloc, /* special_function */
472 "R_PPC64_REL14_BRTAKEN", /* name */
473 FALSE, /* partial_inplace */
475 0x0000fffc, /* dst_mask */
476 TRUE), /* pcrel_offset */
478 /* A relative 16 bit branch. Bit 10 should be set to indicate that
479 the branch is not expected to be taken. The lower two bits must
481 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
483 2, /* size (0 = byte, 1 = short, 2 = long) */
485 TRUE, /* pc_relative */
487 complain_overflow_signed, /* complain_on_overflow */
488 ppc64_elf_brtaken_reloc, /* special_function */
489 "R_PPC64_REL14_BRNTAKEN",/* name */
490 FALSE, /* partial_inplace */
492 0x0000fffc, /* dst_mask */
493 TRUE), /* pcrel_offset */
495 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
497 HOWTO (R_PPC64_GOT16, /* type */
499 1, /* size (0 = byte, 1 = short, 2 = long) */
501 FALSE, /* pc_relative */
503 complain_overflow_signed, /* complain_on_overflow */
504 ppc64_elf_unhandled_reloc, /* special_function */
505 "R_PPC64_GOT16", /* name */
506 FALSE, /* partial_inplace */
508 0xffff, /* dst_mask */
509 FALSE), /* pcrel_offset */
511 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
513 HOWTO (R_PPC64_GOT16_LO, /* type */
515 1, /* size (0 = byte, 1 = short, 2 = long) */
517 FALSE, /* pc_relative */
519 complain_overflow_dont, /* complain_on_overflow */
520 ppc64_elf_unhandled_reloc, /* special_function */
521 "R_PPC64_GOT16_LO", /* name */
522 FALSE, /* partial_inplace */
524 0xffff, /* dst_mask */
525 FALSE), /* pcrel_offset */
527 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
529 HOWTO (R_PPC64_GOT16_HI, /* type */
531 1, /* size (0 = byte, 1 = short, 2 = long) */
533 FALSE, /* pc_relative */
535 complain_overflow_signed,/* complain_on_overflow */
536 ppc64_elf_unhandled_reloc, /* special_function */
537 "R_PPC64_GOT16_HI", /* name */
538 FALSE, /* partial_inplace */
540 0xffff, /* dst_mask */
541 FALSE), /* pcrel_offset */
543 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
545 HOWTO (R_PPC64_GOT16_HA, /* type */
547 1, /* size (0 = byte, 1 = short, 2 = long) */
549 FALSE, /* pc_relative */
551 complain_overflow_signed,/* complain_on_overflow */
552 ppc64_elf_unhandled_reloc, /* special_function */
553 "R_PPC64_GOT16_HA", /* name */
554 FALSE, /* partial_inplace */
556 0xffff, /* dst_mask */
557 FALSE), /* pcrel_offset */
559 /* This is used only by the dynamic linker. The symbol should exist
560 both in the object being run and in some shared library. The
561 dynamic linker copies the data addressed by the symbol from the
562 shared library into the object, because the object being
563 run has to have the data at some particular address. */
564 HOWTO (R_PPC64_COPY, /* type */
566 0, /* this one is variable size */
568 FALSE, /* pc_relative */
570 complain_overflow_dont, /* complain_on_overflow */
571 ppc64_elf_unhandled_reloc, /* special_function */
572 "R_PPC64_COPY", /* name */
573 FALSE, /* partial_inplace */
576 FALSE), /* pcrel_offset */
578 /* Like R_PPC64_ADDR64, but used when setting global offset table
580 HOWTO (R_PPC64_GLOB_DAT, /* type */
582 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
584 FALSE, /* pc_relative */
586 complain_overflow_dont, /* complain_on_overflow */
587 ppc64_elf_unhandled_reloc, /* special_function */
588 "R_PPC64_GLOB_DAT", /* name */
589 FALSE, /* partial_inplace */
591 ONES (64), /* dst_mask */
592 FALSE), /* pcrel_offset */
594 /* Created by the link editor. Marks a procedure linkage table
595 entry for a symbol. */
596 HOWTO (R_PPC64_JMP_SLOT, /* type */
598 0, /* size (0 = byte, 1 = short, 2 = long) */
600 FALSE, /* pc_relative */
602 complain_overflow_dont, /* complain_on_overflow */
603 ppc64_elf_unhandled_reloc, /* special_function */
604 "R_PPC64_JMP_SLOT", /* name */
605 FALSE, /* partial_inplace */
608 FALSE), /* pcrel_offset */
610 /* Used only by the dynamic linker. When the object is run, this
611 doubleword64 is set to the load address of the object, plus the
613 HOWTO (R_PPC64_RELATIVE, /* type */
615 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
617 FALSE, /* pc_relative */
619 complain_overflow_dont, /* complain_on_overflow */
620 bfd_elf_generic_reloc, /* special_function */
621 "R_PPC64_RELATIVE", /* name */
622 FALSE, /* partial_inplace */
624 ONES (64), /* dst_mask */
625 FALSE), /* pcrel_offset */
627 /* Like R_PPC64_ADDR32, but may be unaligned. */
628 HOWTO (R_PPC64_UADDR32, /* type */
630 2, /* size (0 = byte, 1 = short, 2 = long) */
632 FALSE, /* pc_relative */
634 complain_overflow_bitfield, /* complain_on_overflow */
635 bfd_elf_generic_reloc, /* special_function */
636 "R_PPC64_UADDR32", /* name */
637 FALSE, /* partial_inplace */
639 0xffffffff, /* dst_mask */
640 FALSE), /* pcrel_offset */
642 /* Like R_PPC64_ADDR16, but may be unaligned. */
643 HOWTO (R_PPC64_UADDR16, /* type */
645 1, /* size (0 = byte, 1 = short, 2 = long) */
647 FALSE, /* pc_relative */
649 complain_overflow_bitfield, /* complain_on_overflow */
650 bfd_elf_generic_reloc, /* special_function */
651 "R_PPC64_UADDR16", /* name */
652 FALSE, /* partial_inplace */
654 0xffff, /* dst_mask */
655 FALSE), /* pcrel_offset */
657 /* 32-bit PC relative. */
658 HOWTO (R_PPC64_REL32, /* type */
660 2, /* size (0 = byte, 1 = short, 2 = long) */
662 TRUE, /* pc_relative */
664 complain_overflow_signed, /* complain_on_overflow */
665 bfd_elf_generic_reloc, /* special_function */
666 "R_PPC64_REL32", /* name */
667 FALSE, /* partial_inplace */
669 0xffffffff, /* dst_mask */
670 TRUE), /* pcrel_offset */
672 /* 32-bit relocation to the symbol's procedure linkage table. */
673 HOWTO (R_PPC64_PLT32, /* type */
675 2, /* size (0 = byte, 1 = short, 2 = long) */
677 FALSE, /* pc_relative */
679 complain_overflow_bitfield, /* complain_on_overflow */
680 ppc64_elf_unhandled_reloc, /* special_function */
681 "R_PPC64_PLT32", /* name */
682 FALSE, /* partial_inplace */
684 0xffffffff, /* dst_mask */
685 FALSE), /* pcrel_offset */
687 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
688 FIXME: R_PPC64_PLTREL32 not supported. */
689 HOWTO (R_PPC64_PLTREL32, /* type */
691 2, /* size (0 = byte, 1 = short, 2 = long) */
693 TRUE, /* pc_relative */
695 complain_overflow_signed, /* complain_on_overflow */
696 ppc64_elf_unhandled_reloc, /* special_function */
697 "R_PPC64_PLTREL32", /* name */
698 FALSE, /* partial_inplace */
700 0xffffffff, /* dst_mask */
701 TRUE), /* pcrel_offset */
703 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
705 HOWTO (R_PPC64_PLT16_LO, /* type */
707 1, /* size (0 = byte, 1 = short, 2 = long) */
709 FALSE, /* pc_relative */
711 complain_overflow_dont, /* complain_on_overflow */
712 ppc64_elf_unhandled_reloc, /* special_function */
713 "R_PPC64_PLT16_LO", /* name */
714 FALSE, /* partial_inplace */
716 0xffff, /* dst_mask */
717 FALSE), /* pcrel_offset */
719 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
721 HOWTO (R_PPC64_PLT16_HI, /* type */
723 1, /* size (0 = byte, 1 = short, 2 = long) */
725 FALSE, /* pc_relative */
727 complain_overflow_signed, /* complain_on_overflow */
728 ppc64_elf_unhandled_reloc, /* special_function */
729 "R_PPC64_PLT16_HI", /* name */
730 FALSE, /* partial_inplace */
732 0xffff, /* dst_mask */
733 FALSE), /* pcrel_offset */
735 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
737 HOWTO (R_PPC64_PLT16_HA, /* type */
739 1, /* size (0 = byte, 1 = short, 2 = long) */
741 FALSE, /* pc_relative */
743 complain_overflow_signed, /* complain_on_overflow */
744 ppc64_elf_unhandled_reloc, /* special_function */
745 "R_PPC64_PLT16_HA", /* name */
746 FALSE, /* partial_inplace */
748 0xffff, /* dst_mask */
749 FALSE), /* pcrel_offset */
751 /* 16-bit section relative relocation. */
752 HOWTO (R_PPC64_SECTOFF, /* type */
754 1, /* size (0 = byte, 1 = short, 2 = long) */
756 FALSE, /* pc_relative */
758 complain_overflow_signed, /* complain_on_overflow */
759 ppc64_elf_sectoff_reloc, /* special_function */
760 "R_PPC64_SECTOFF", /* name */
761 FALSE, /* partial_inplace */
763 0xffff, /* dst_mask */
764 FALSE), /* pcrel_offset */
766 /* Like R_PPC64_SECTOFF, but no overflow warning. */
767 HOWTO (R_PPC64_SECTOFF_LO, /* type */
769 1, /* size (0 = byte, 1 = short, 2 = long) */
771 FALSE, /* pc_relative */
773 complain_overflow_dont, /* complain_on_overflow */
774 ppc64_elf_sectoff_reloc, /* special_function */
775 "R_PPC64_SECTOFF_LO", /* name */
776 FALSE, /* partial_inplace */
778 0xffff, /* dst_mask */
779 FALSE), /* pcrel_offset */
781 /* 16-bit upper half section relative relocation. */
782 HOWTO (R_PPC64_SECTOFF_HI, /* type */
784 1, /* size (0 = byte, 1 = short, 2 = long) */
786 FALSE, /* pc_relative */
788 complain_overflow_signed, /* complain_on_overflow */
789 ppc64_elf_sectoff_reloc, /* special_function */
790 "R_PPC64_SECTOFF_HI", /* name */
791 FALSE, /* partial_inplace */
793 0xffff, /* dst_mask */
794 FALSE), /* pcrel_offset */
796 /* 16-bit upper half adjusted section relative relocation. */
797 HOWTO (R_PPC64_SECTOFF_HA, /* type */
799 1, /* size (0 = byte, 1 = short, 2 = long) */
801 FALSE, /* pc_relative */
803 complain_overflow_signed, /* complain_on_overflow */
804 ppc64_elf_sectoff_ha_reloc, /* special_function */
805 "R_PPC64_SECTOFF_HA", /* name */
806 FALSE, /* partial_inplace */
808 0xffff, /* dst_mask */
809 FALSE), /* pcrel_offset */
811 /* Like R_PPC64_REL24 without touching the two least significant bits. */
812 HOWTO (R_PPC64_REL30, /* type */
814 2, /* size (0 = byte, 1 = short, 2 = long) */
816 TRUE, /* pc_relative */
818 complain_overflow_dont, /* complain_on_overflow */
819 bfd_elf_generic_reloc, /* special_function */
820 "R_PPC64_REL30", /* name */
821 FALSE, /* partial_inplace */
823 0xfffffffc, /* dst_mask */
824 TRUE), /* pcrel_offset */
826 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
828 /* A standard 64-bit relocation. */
829 HOWTO (R_PPC64_ADDR64, /* type */
831 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
833 FALSE, /* pc_relative */
835 complain_overflow_dont, /* complain_on_overflow */
836 bfd_elf_generic_reloc, /* special_function */
837 "R_PPC64_ADDR64", /* name */
838 FALSE, /* partial_inplace */
840 ONES (64), /* dst_mask */
841 FALSE), /* pcrel_offset */
843 /* The bits 32-47 of an address. */
844 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
848 FALSE, /* pc_relative */
850 complain_overflow_dont, /* complain_on_overflow */
851 bfd_elf_generic_reloc, /* special_function */
852 "R_PPC64_ADDR16_HIGHER", /* name */
853 FALSE, /* partial_inplace */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
858 /* The bits 32-47 of an address, plus 1 if the contents of the low
859 16 bits, treated as a signed number, is negative. */
860 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
862 1, /* size (0 = byte, 1 = short, 2 = long) */
864 FALSE, /* pc_relative */
866 complain_overflow_dont, /* complain_on_overflow */
867 ppc64_elf_ha_reloc, /* special_function */
868 "R_PPC64_ADDR16_HIGHERA", /* name */
869 FALSE, /* partial_inplace */
871 0xffff, /* dst_mask */
872 FALSE), /* pcrel_offset */
874 /* The bits 48-63 of an address. */
875 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
879 FALSE, /* pc_relative */
881 complain_overflow_dont, /* complain_on_overflow */
882 bfd_elf_generic_reloc, /* special_function */
883 "R_PPC64_ADDR16_HIGHEST", /* name */
884 FALSE, /* partial_inplace */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
889 /* The bits 48-63 of an address, plus 1 if the contents of the low
890 16 bits, treated as a signed number, is negative. */
891 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
893 1, /* size (0 = byte, 1 = short, 2 = long) */
895 FALSE, /* pc_relative */
897 complain_overflow_dont, /* complain_on_overflow */
898 ppc64_elf_ha_reloc, /* special_function */
899 "R_PPC64_ADDR16_HIGHESTA", /* name */
900 FALSE, /* partial_inplace */
902 0xffff, /* dst_mask */
903 FALSE), /* pcrel_offset */
905 /* Like ADDR64, but may be unaligned. */
906 HOWTO (R_PPC64_UADDR64, /* type */
908 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
910 FALSE, /* pc_relative */
912 complain_overflow_dont, /* complain_on_overflow */
913 bfd_elf_generic_reloc, /* special_function */
914 "R_PPC64_UADDR64", /* name */
915 FALSE, /* partial_inplace */
917 ONES (64), /* dst_mask */
918 FALSE), /* pcrel_offset */
920 /* 64-bit relative relocation. */
921 HOWTO (R_PPC64_REL64, /* type */
923 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
925 TRUE, /* pc_relative */
927 complain_overflow_dont, /* complain_on_overflow */
928 bfd_elf_generic_reloc, /* special_function */
929 "R_PPC64_REL64", /* name */
930 FALSE, /* partial_inplace */
932 ONES (64), /* dst_mask */
933 TRUE), /* pcrel_offset */
935 /* 64-bit relocation to the symbol's procedure linkage table. */
936 HOWTO (R_PPC64_PLT64, /* type */
938 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
940 FALSE, /* pc_relative */
942 complain_overflow_dont, /* complain_on_overflow */
943 ppc64_elf_unhandled_reloc, /* special_function */
944 "R_PPC64_PLT64", /* name */
945 FALSE, /* partial_inplace */
947 ONES (64), /* dst_mask */
948 FALSE), /* pcrel_offset */
950 /* 64-bit PC relative relocation to the symbol's procedure linkage
952 /* FIXME: R_PPC64_PLTREL64 not supported. */
953 HOWTO (R_PPC64_PLTREL64, /* type */
955 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
957 TRUE, /* pc_relative */
959 complain_overflow_dont, /* complain_on_overflow */
960 ppc64_elf_unhandled_reloc, /* special_function */
961 "R_PPC64_PLTREL64", /* name */
962 FALSE, /* partial_inplace */
964 ONES (64), /* dst_mask */
965 TRUE), /* pcrel_offset */
967 /* 16 bit TOC-relative relocation. */
969 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
970 HOWTO (R_PPC64_TOC16, /* type */
972 1, /* size (0 = byte, 1 = short, 2 = long) */
974 FALSE, /* pc_relative */
976 complain_overflow_signed, /* complain_on_overflow */
977 ppc64_elf_toc_reloc, /* special_function */
978 "R_PPC64_TOC16", /* name */
979 FALSE, /* partial_inplace */
981 0xffff, /* dst_mask */
982 FALSE), /* pcrel_offset */
984 /* 16 bit TOC-relative relocation without overflow. */
986 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
987 HOWTO (R_PPC64_TOC16_LO, /* type */
989 1, /* size (0 = byte, 1 = short, 2 = long) */
991 FALSE, /* pc_relative */
993 complain_overflow_dont, /* complain_on_overflow */
994 ppc64_elf_toc_reloc, /* special_function */
995 "R_PPC64_TOC16_LO", /* name */
996 FALSE, /* partial_inplace */
998 0xffff, /* dst_mask */
999 FALSE), /* pcrel_offset */
1001 /* 16 bit TOC-relative relocation, high 16 bits. */
1003 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
1004 HOWTO (R_PPC64_TOC16_HI, /* type */
1005 16, /* rightshift */
1006 1, /* size (0 = byte, 1 = short, 2 = long) */
1008 FALSE, /* pc_relative */
1010 complain_overflow_signed, /* complain_on_overflow */
1011 ppc64_elf_toc_reloc, /* special_function */
1012 "R_PPC64_TOC16_HI", /* name */
1013 FALSE, /* partial_inplace */
1015 0xffff, /* dst_mask */
1016 FALSE), /* pcrel_offset */
1018 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1019 contents of the low 16 bits, treated as a signed number, is
1022 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1023 HOWTO (R_PPC64_TOC16_HA, /* type */
1024 16, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1027 FALSE, /* pc_relative */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_toc_ha_reloc, /* special_function */
1031 "R_PPC64_TOC16_HA", /* name */
1032 FALSE, /* partial_inplace */
1034 0xffff, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1037 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1039 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1040 HOWTO (R_PPC64_TOC, /* type */
1042 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1044 FALSE, /* pc_relative */
1046 complain_overflow_dont, /* complain_on_overflow */
1047 ppc64_elf_toc64_reloc, /* special_function */
1048 "R_PPC64_TOC", /* name */
1049 FALSE, /* partial_inplace */
1051 ONES (64), /* dst_mask */
1052 FALSE), /* pcrel_offset */
1054 /* Like R_PPC64_GOT16, but also informs the link editor that the
1055 value to relocate may (!) refer to a PLT entry which the link
1056 editor (a) may replace with the symbol value. If the link editor
1057 is unable to fully resolve the symbol, it may (b) create a PLT
1058 entry and store the address to the new PLT entry in the GOT.
1059 This permits lazy resolution of function symbols at run time.
1060 The link editor may also skip all of this and just (c) emit a
1061 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1062 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1063 HOWTO (R_PPC64_PLTGOT16, /* type */
1065 1, /* size (0 = byte, 1 = short, 2 = long) */
1067 FALSE, /* pc_relative */
1069 complain_overflow_signed, /* complain_on_overflow */
1070 ppc64_elf_unhandled_reloc, /* special_function */
1071 "R_PPC64_PLTGOT16", /* name */
1072 FALSE, /* partial_inplace */
1074 0xffff, /* dst_mask */
1075 FALSE), /* pcrel_offset */
1077 /* Like R_PPC64_PLTGOT16, but without overflow. */
1078 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1079 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1081 1, /* size (0 = byte, 1 = short, 2 = long) */
1083 FALSE, /* pc_relative */
1085 complain_overflow_dont, /* complain_on_overflow */
1086 ppc64_elf_unhandled_reloc, /* special_function */
1087 "R_PPC64_PLTGOT16_LO", /* name */
1088 FALSE, /* partial_inplace */
1090 0xffff, /* dst_mask */
1091 FALSE), /* pcrel_offset */
1093 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1094 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1095 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1096 16, /* rightshift */
1097 1, /* size (0 = byte, 1 = short, 2 = long) */
1099 FALSE, /* pc_relative */
1101 complain_overflow_signed, /* complain_on_overflow */
1102 ppc64_elf_unhandled_reloc, /* special_function */
1103 "R_PPC64_PLTGOT16_HI", /* name */
1104 FALSE, /* partial_inplace */
1106 0xffff, /* dst_mask */
1107 FALSE), /* pcrel_offset */
1109 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1110 1 if the contents of the low 16 bits, treated as a signed number,
1112 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1113 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1114 16, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 FALSE, /* pc_relative */
1119 complain_overflow_signed, /* complain_on_overflow */
1120 ppc64_elf_unhandled_reloc, /* special_function */
1121 "R_PPC64_PLTGOT16_HA", /* name */
1122 FALSE, /* partial_inplace */
1124 0xffff, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1127 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1128 HOWTO (R_PPC64_ADDR16_DS, /* type */
1130 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 FALSE, /* pc_relative */
1134 complain_overflow_signed, /* complain_on_overflow */
1135 bfd_elf_generic_reloc, /* special_function */
1136 "R_PPC64_ADDR16_DS", /* name */
1137 FALSE, /* partial_inplace */
1139 0xfffc, /* dst_mask */
1140 FALSE), /* pcrel_offset */
1142 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1143 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1145 1, /* size (0 = byte, 1 = short, 2 = long) */
1147 FALSE, /* pc_relative */
1149 complain_overflow_dont,/* complain_on_overflow */
1150 bfd_elf_generic_reloc, /* special_function */
1151 "R_PPC64_ADDR16_LO_DS",/* name */
1152 FALSE, /* partial_inplace */
1154 0xfffc, /* dst_mask */
1155 FALSE), /* pcrel_offset */
1157 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1158 HOWTO (R_PPC64_GOT16_DS, /* type */
1160 1, /* size (0 = byte, 1 = short, 2 = long) */
1162 FALSE, /* pc_relative */
1164 complain_overflow_signed, /* complain_on_overflow */
1165 ppc64_elf_unhandled_reloc, /* special_function */
1166 "R_PPC64_GOT16_DS", /* name */
1167 FALSE, /* partial_inplace */
1169 0xfffc, /* dst_mask */
1170 FALSE), /* pcrel_offset */
1172 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1173 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1175 1, /* size (0 = byte, 1 = short, 2 = long) */
1177 FALSE, /* pc_relative */
1179 complain_overflow_dont, /* complain_on_overflow */
1180 ppc64_elf_unhandled_reloc, /* special_function */
1181 "R_PPC64_GOT16_LO_DS", /* name */
1182 FALSE, /* partial_inplace */
1184 0xfffc, /* dst_mask */
1185 FALSE), /* pcrel_offset */
1187 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1188 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1190 1, /* size (0 = byte, 1 = short, 2 = long) */
1192 FALSE, /* pc_relative */
1194 complain_overflow_dont, /* complain_on_overflow */
1195 ppc64_elf_unhandled_reloc, /* special_function */
1196 "R_PPC64_PLT16_LO_DS", /* name */
1197 FALSE, /* partial_inplace */
1199 0xfffc, /* dst_mask */
1200 FALSE), /* pcrel_offset */
1202 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1203 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1205 1, /* size (0 = byte, 1 = short, 2 = long) */
1207 FALSE, /* pc_relative */
1209 complain_overflow_signed, /* complain_on_overflow */
1210 ppc64_elf_sectoff_reloc, /* special_function */
1211 "R_PPC64_SECTOFF_DS", /* name */
1212 FALSE, /* partial_inplace */
1214 0xfffc, /* dst_mask */
1215 FALSE), /* pcrel_offset */
1217 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1218 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1220 1, /* size (0 = byte, 1 = short, 2 = long) */
1222 FALSE, /* pc_relative */
1224 complain_overflow_dont, /* complain_on_overflow */
1225 ppc64_elf_sectoff_reloc, /* special_function */
1226 "R_PPC64_SECTOFF_LO_DS",/* name */
1227 FALSE, /* partial_inplace */
1229 0xfffc, /* dst_mask */
1230 FALSE), /* pcrel_offset */
1232 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1233 HOWTO (R_PPC64_TOC16_DS, /* type */
1235 1, /* size (0 = byte, 1 = short, 2 = long) */
1237 FALSE, /* pc_relative */
1239 complain_overflow_signed, /* complain_on_overflow */
1240 ppc64_elf_toc_reloc, /* special_function */
1241 "R_PPC64_TOC16_DS", /* name */
1242 FALSE, /* partial_inplace */
1244 0xfffc, /* dst_mask */
1245 FALSE), /* pcrel_offset */
1247 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1248 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1250 1, /* size (0 = byte, 1 = short, 2 = long) */
1252 FALSE, /* pc_relative */
1254 complain_overflow_dont, /* complain_on_overflow */
1255 ppc64_elf_toc_reloc, /* special_function */
1256 "R_PPC64_TOC16_LO_DS", /* name */
1257 FALSE, /* partial_inplace */
1259 0xfffc, /* dst_mask */
1260 FALSE), /* pcrel_offset */
1262 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1263 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1264 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1266 1, /* size (0 = byte, 1 = short, 2 = long) */
1268 FALSE, /* pc_relative */
1270 complain_overflow_signed, /* complain_on_overflow */
1271 ppc64_elf_unhandled_reloc, /* special_function */
1272 "R_PPC64_PLTGOT16_DS", /* name */
1273 FALSE, /* partial_inplace */
1275 0xfffc, /* dst_mask */
1276 FALSE), /* pcrel_offset */
1278 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1279 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1280 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1282 1, /* size (0 = byte, 1 = short, 2 = long) */
1284 FALSE, /* pc_relative */
1286 complain_overflow_dont, /* complain_on_overflow */
1287 ppc64_elf_unhandled_reloc, /* special_function */
1288 "R_PPC64_PLTGOT16_LO_DS",/* name */
1289 FALSE, /* partial_inplace */
1291 0xfffc, /* dst_mask */
1292 FALSE), /* pcrel_offset */
1294 /* Marker relocs for TLS. */
1297 2, /* size (0 = byte, 1 = short, 2 = long) */
1299 FALSE, /* pc_relative */
1301 complain_overflow_dont, /* complain_on_overflow */
1302 bfd_elf_generic_reloc, /* special_function */
1303 "R_PPC64_TLS", /* name */
1304 FALSE, /* partial_inplace */
1307 FALSE), /* pcrel_offset */
1309 HOWTO (R_PPC64_TLSGD,
1311 2, /* size (0 = byte, 1 = short, 2 = long) */
1313 FALSE, /* pc_relative */
1315 complain_overflow_dont, /* complain_on_overflow */
1316 bfd_elf_generic_reloc, /* special_function */
1317 "R_PPC64_TLSGD", /* name */
1318 FALSE, /* partial_inplace */
1321 FALSE), /* pcrel_offset */
1323 HOWTO (R_PPC64_TLSLD,
1325 2, /* size (0 = byte, 1 = short, 2 = long) */
1327 FALSE, /* pc_relative */
1329 complain_overflow_dont, /* complain_on_overflow */
1330 bfd_elf_generic_reloc, /* special_function */
1331 "R_PPC64_TLSLD", /* name */
1332 FALSE, /* partial_inplace */
1335 FALSE), /* pcrel_offset */
1337 HOWTO (R_PPC64_TOCSAVE,
1339 2, /* size (0 = byte, 1 = short, 2 = long) */
1341 FALSE, /* pc_relative */
1343 complain_overflow_dont, /* complain_on_overflow */
1344 bfd_elf_generic_reloc, /* special_function */
1345 "R_PPC64_TOCSAVE", /* name */
1346 FALSE, /* partial_inplace */
1349 FALSE), /* pcrel_offset */
1351 /* Computes the load module index of the load module that contains the
1352 definition of its TLS sym. */
1353 HOWTO (R_PPC64_DTPMOD64,
1355 4, /* size (0 = byte, 1 = short, 2 = long) */
1357 FALSE, /* pc_relative */
1359 complain_overflow_dont, /* complain_on_overflow */
1360 ppc64_elf_unhandled_reloc, /* special_function */
1361 "R_PPC64_DTPMOD64", /* name */
1362 FALSE, /* partial_inplace */
1364 ONES (64), /* dst_mask */
1365 FALSE), /* pcrel_offset */
1367 /* Computes a dtv-relative displacement, the difference between the value
1368 of sym+add and the base address of the thread-local storage block that
1369 contains the definition of sym, minus 0x8000. */
1370 HOWTO (R_PPC64_DTPREL64,
1372 4, /* size (0 = byte, 1 = short, 2 = long) */
1374 FALSE, /* pc_relative */
1376 complain_overflow_dont, /* complain_on_overflow */
1377 ppc64_elf_unhandled_reloc, /* special_function */
1378 "R_PPC64_DTPREL64", /* name */
1379 FALSE, /* partial_inplace */
1381 ONES (64), /* dst_mask */
1382 FALSE), /* pcrel_offset */
1384 /* A 16 bit dtprel reloc. */
1385 HOWTO (R_PPC64_DTPREL16,
1387 1, /* size (0 = byte, 1 = short, 2 = long) */
1389 FALSE, /* pc_relative */
1391 complain_overflow_signed, /* complain_on_overflow */
1392 ppc64_elf_unhandled_reloc, /* special_function */
1393 "R_PPC64_DTPREL16", /* name */
1394 FALSE, /* partial_inplace */
1396 0xffff, /* dst_mask */
1397 FALSE), /* pcrel_offset */
1399 /* Like DTPREL16, but no overflow. */
1400 HOWTO (R_PPC64_DTPREL16_LO,
1402 1, /* size (0 = byte, 1 = short, 2 = long) */
1404 FALSE, /* pc_relative */
1406 complain_overflow_dont, /* complain_on_overflow */
1407 ppc64_elf_unhandled_reloc, /* special_function */
1408 "R_PPC64_DTPREL16_LO", /* name */
1409 FALSE, /* partial_inplace */
1411 0xffff, /* dst_mask */
1412 FALSE), /* pcrel_offset */
1414 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1415 HOWTO (R_PPC64_DTPREL16_HI,
1416 16, /* rightshift */
1417 1, /* size (0 = byte, 1 = short, 2 = long) */
1419 FALSE, /* pc_relative */
1421 complain_overflow_signed, /* complain_on_overflow */
1422 ppc64_elf_unhandled_reloc, /* special_function */
1423 "R_PPC64_DTPREL16_HI", /* name */
1424 FALSE, /* partial_inplace */
1426 0xffff, /* dst_mask */
1427 FALSE), /* pcrel_offset */
1429 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1430 HOWTO (R_PPC64_DTPREL16_HA,
1431 16, /* rightshift */
1432 1, /* size (0 = byte, 1 = short, 2 = long) */
1434 FALSE, /* pc_relative */
1436 complain_overflow_signed, /* complain_on_overflow */
1437 ppc64_elf_unhandled_reloc, /* special_function */
1438 "R_PPC64_DTPREL16_HA", /* name */
1439 FALSE, /* partial_inplace */
1441 0xffff, /* dst_mask */
1442 FALSE), /* pcrel_offset */
1444 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1445 HOWTO (R_PPC64_DTPREL16_HIGHER,
1446 32, /* rightshift */
1447 1, /* size (0 = byte, 1 = short, 2 = long) */
1449 FALSE, /* pc_relative */
1451 complain_overflow_dont, /* complain_on_overflow */
1452 ppc64_elf_unhandled_reloc, /* special_function */
1453 "R_PPC64_DTPREL16_HIGHER", /* name */
1454 FALSE, /* partial_inplace */
1456 0xffff, /* dst_mask */
1457 FALSE), /* pcrel_offset */
1459 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1460 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1461 32, /* rightshift */
1462 1, /* size (0 = byte, 1 = short, 2 = long) */
1464 FALSE, /* pc_relative */
1466 complain_overflow_dont, /* complain_on_overflow */
1467 ppc64_elf_unhandled_reloc, /* special_function */
1468 "R_PPC64_DTPREL16_HIGHERA", /* name */
1469 FALSE, /* partial_inplace */
1471 0xffff, /* dst_mask */
1472 FALSE), /* pcrel_offset */
1474 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1475 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1476 48, /* rightshift */
1477 1, /* size (0 = byte, 1 = short, 2 = long) */
1479 FALSE, /* pc_relative */
1481 complain_overflow_dont, /* complain_on_overflow */
1482 ppc64_elf_unhandled_reloc, /* special_function */
1483 "R_PPC64_DTPREL16_HIGHEST", /* name */
1484 FALSE, /* partial_inplace */
1486 0xffff, /* dst_mask */
1487 FALSE), /* pcrel_offset */
1489 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1490 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1491 48, /* rightshift */
1492 1, /* size (0 = byte, 1 = short, 2 = long) */
1494 FALSE, /* pc_relative */
1496 complain_overflow_dont, /* complain_on_overflow */
1497 ppc64_elf_unhandled_reloc, /* special_function */
1498 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1499 FALSE, /* partial_inplace */
1501 0xffff, /* dst_mask */
1502 FALSE), /* pcrel_offset */
1504 /* Like DTPREL16, but for insns with a DS field. */
1505 HOWTO (R_PPC64_DTPREL16_DS,
1507 1, /* size (0 = byte, 1 = short, 2 = long) */
1509 FALSE, /* pc_relative */
1511 complain_overflow_signed, /* complain_on_overflow */
1512 ppc64_elf_unhandled_reloc, /* special_function */
1513 "R_PPC64_DTPREL16_DS", /* name */
1514 FALSE, /* partial_inplace */
1516 0xfffc, /* dst_mask */
1517 FALSE), /* pcrel_offset */
1519 /* Like DTPREL16_DS, but no overflow. */
1520 HOWTO (R_PPC64_DTPREL16_LO_DS,
1522 1, /* size (0 = byte, 1 = short, 2 = long) */
1524 FALSE, /* pc_relative */
1526 complain_overflow_dont, /* complain_on_overflow */
1527 ppc64_elf_unhandled_reloc, /* special_function */
1528 "R_PPC64_DTPREL16_LO_DS", /* name */
1529 FALSE, /* partial_inplace */
1531 0xfffc, /* dst_mask */
1532 FALSE), /* pcrel_offset */
1534 /* Computes a tp-relative displacement, the difference between the value of
1535 sym+add and the value of the thread pointer (r13). */
1536 HOWTO (R_PPC64_TPREL64,
1538 4, /* size (0 = byte, 1 = short, 2 = long) */
1540 FALSE, /* pc_relative */
1542 complain_overflow_dont, /* complain_on_overflow */
1543 ppc64_elf_unhandled_reloc, /* special_function */
1544 "R_PPC64_TPREL64", /* name */
1545 FALSE, /* partial_inplace */
1547 ONES (64), /* dst_mask */
1548 FALSE), /* pcrel_offset */
1550 /* A 16 bit tprel reloc. */
1551 HOWTO (R_PPC64_TPREL16,
1553 1, /* size (0 = byte, 1 = short, 2 = long) */
1555 FALSE, /* pc_relative */
1557 complain_overflow_signed, /* complain_on_overflow */
1558 ppc64_elf_unhandled_reloc, /* special_function */
1559 "R_PPC64_TPREL16", /* name */
1560 FALSE, /* partial_inplace */
1562 0xffff, /* dst_mask */
1563 FALSE), /* pcrel_offset */
1565 /* Like TPREL16, but no overflow. */
1566 HOWTO (R_PPC64_TPREL16_LO,
1568 1, /* size (0 = byte, 1 = short, 2 = long) */
1570 FALSE, /* pc_relative */
1572 complain_overflow_dont, /* complain_on_overflow */
1573 ppc64_elf_unhandled_reloc, /* special_function */
1574 "R_PPC64_TPREL16_LO", /* name */
1575 FALSE, /* partial_inplace */
1577 0xffff, /* dst_mask */
1578 FALSE), /* pcrel_offset */
1580 /* Like TPREL16_LO, but next higher group of 16 bits. */
1581 HOWTO (R_PPC64_TPREL16_HI,
1582 16, /* rightshift */
1583 1, /* size (0 = byte, 1 = short, 2 = long) */
1585 FALSE, /* pc_relative */
1587 complain_overflow_signed, /* complain_on_overflow */
1588 ppc64_elf_unhandled_reloc, /* special_function */
1589 "R_PPC64_TPREL16_HI", /* name */
1590 FALSE, /* partial_inplace */
1592 0xffff, /* dst_mask */
1593 FALSE), /* pcrel_offset */
1595 /* Like TPREL16_HI, but adjust for low 16 bits. */
1596 HOWTO (R_PPC64_TPREL16_HA,
1597 16, /* rightshift */
1598 1, /* size (0 = byte, 1 = short, 2 = long) */
1600 FALSE, /* pc_relative */
1602 complain_overflow_signed, /* complain_on_overflow */
1603 ppc64_elf_unhandled_reloc, /* special_function */
1604 "R_PPC64_TPREL16_HA", /* name */
1605 FALSE, /* partial_inplace */
1607 0xffff, /* dst_mask */
1608 FALSE), /* pcrel_offset */
1610 /* Like TPREL16_HI, but next higher group of 16 bits. */
1611 HOWTO (R_PPC64_TPREL16_HIGHER,
1612 32, /* rightshift */
1613 1, /* size (0 = byte, 1 = short, 2 = long) */
1615 FALSE, /* pc_relative */
1617 complain_overflow_dont, /* complain_on_overflow */
1618 ppc64_elf_unhandled_reloc, /* special_function */
1619 "R_PPC64_TPREL16_HIGHER", /* name */
1620 FALSE, /* partial_inplace */
1622 0xffff, /* dst_mask */
1623 FALSE), /* pcrel_offset */
1625 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1626 HOWTO (R_PPC64_TPREL16_HIGHERA,
1627 32, /* rightshift */
1628 1, /* size (0 = byte, 1 = short, 2 = long) */
1630 FALSE, /* pc_relative */
1632 complain_overflow_dont, /* complain_on_overflow */
1633 ppc64_elf_unhandled_reloc, /* special_function */
1634 "R_PPC64_TPREL16_HIGHERA", /* name */
1635 FALSE, /* partial_inplace */
1637 0xffff, /* dst_mask */
1638 FALSE), /* pcrel_offset */
1640 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1641 HOWTO (R_PPC64_TPREL16_HIGHEST,
1642 48, /* rightshift */
1643 1, /* size (0 = byte, 1 = short, 2 = long) */
1645 FALSE, /* pc_relative */
1647 complain_overflow_dont, /* complain_on_overflow */
1648 ppc64_elf_unhandled_reloc, /* special_function */
1649 "R_PPC64_TPREL16_HIGHEST", /* name */
1650 FALSE, /* partial_inplace */
1652 0xffff, /* dst_mask */
1653 FALSE), /* pcrel_offset */
1655 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1656 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1657 48, /* rightshift */
1658 1, /* size (0 = byte, 1 = short, 2 = long) */
1660 FALSE, /* pc_relative */
1662 complain_overflow_dont, /* complain_on_overflow */
1663 ppc64_elf_unhandled_reloc, /* special_function */
1664 "R_PPC64_TPREL16_HIGHESTA", /* name */
1665 FALSE, /* partial_inplace */
1667 0xffff, /* dst_mask */
1668 FALSE), /* pcrel_offset */
1670 /* Like TPREL16, but for insns with a DS field. */
1671 HOWTO (R_PPC64_TPREL16_DS,
1673 1, /* size (0 = byte, 1 = short, 2 = long) */
1675 FALSE, /* pc_relative */
1677 complain_overflow_signed, /* complain_on_overflow */
1678 ppc64_elf_unhandled_reloc, /* special_function */
1679 "R_PPC64_TPREL16_DS", /* name */
1680 FALSE, /* partial_inplace */
1682 0xfffc, /* dst_mask */
1683 FALSE), /* pcrel_offset */
1685 /* Like TPREL16_DS, but no overflow. */
1686 HOWTO (R_PPC64_TPREL16_LO_DS,
1688 1, /* size (0 = byte, 1 = short, 2 = long) */
1690 FALSE, /* pc_relative */
1692 complain_overflow_dont, /* complain_on_overflow */
1693 ppc64_elf_unhandled_reloc, /* special_function */
1694 "R_PPC64_TPREL16_LO_DS", /* name */
1695 FALSE, /* partial_inplace */
1697 0xfffc, /* dst_mask */
1698 FALSE), /* pcrel_offset */
1700 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1701 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1702 to the first entry relative to the TOC base (r2). */
1703 HOWTO (R_PPC64_GOT_TLSGD16,
1705 1, /* size (0 = byte, 1 = short, 2 = long) */
1707 FALSE, /* pc_relative */
1709 complain_overflow_signed, /* complain_on_overflow */
1710 ppc64_elf_unhandled_reloc, /* special_function */
1711 "R_PPC64_GOT_TLSGD16", /* name */
1712 FALSE, /* partial_inplace */
1714 0xffff, /* dst_mask */
1715 FALSE), /* pcrel_offset */
1717 /* Like GOT_TLSGD16, but no overflow. */
1718 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1720 1, /* size (0 = byte, 1 = short, 2 = long) */
1722 FALSE, /* pc_relative */
1724 complain_overflow_dont, /* complain_on_overflow */
1725 ppc64_elf_unhandled_reloc, /* special_function */
1726 "R_PPC64_GOT_TLSGD16_LO", /* name */
1727 FALSE, /* partial_inplace */
1729 0xffff, /* dst_mask */
1730 FALSE), /* pcrel_offset */
1732 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1733 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1734 16, /* rightshift */
1735 1, /* size (0 = byte, 1 = short, 2 = long) */
1737 FALSE, /* pc_relative */
1739 complain_overflow_signed, /* complain_on_overflow */
1740 ppc64_elf_unhandled_reloc, /* special_function */
1741 "R_PPC64_GOT_TLSGD16_HI", /* name */
1742 FALSE, /* partial_inplace */
1744 0xffff, /* dst_mask */
1745 FALSE), /* pcrel_offset */
1747 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1748 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1749 16, /* rightshift */
1750 1, /* size (0 = byte, 1 = short, 2 = long) */
1752 FALSE, /* pc_relative */
1754 complain_overflow_signed, /* complain_on_overflow */
1755 ppc64_elf_unhandled_reloc, /* special_function */
1756 "R_PPC64_GOT_TLSGD16_HA", /* name */
1757 FALSE, /* partial_inplace */
1759 0xffff, /* dst_mask */
1760 FALSE), /* pcrel_offset */
1762 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1763 with values (sym+add)@dtpmod and zero, and computes the offset to the
1764 first entry relative to the TOC base (r2). */
1765 HOWTO (R_PPC64_GOT_TLSLD16,
1767 1, /* size (0 = byte, 1 = short, 2 = long) */
1769 FALSE, /* pc_relative */
1771 complain_overflow_signed, /* complain_on_overflow */
1772 ppc64_elf_unhandled_reloc, /* special_function */
1773 "R_PPC64_GOT_TLSLD16", /* name */
1774 FALSE, /* partial_inplace */
1776 0xffff, /* dst_mask */
1777 FALSE), /* pcrel_offset */
1779 /* Like GOT_TLSLD16, but no overflow. */
1780 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1782 1, /* size (0 = byte, 1 = short, 2 = long) */
1784 FALSE, /* pc_relative */
1786 complain_overflow_dont, /* complain_on_overflow */
1787 ppc64_elf_unhandled_reloc, /* special_function */
1788 "R_PPC64_GOT_TLSLD16_LO", /* name */
1789 FALSE, /* partial_inplace */
1791 0xffff, /* dst_mask */
1792 FALSE), /* pcrel_offset */
1794 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1795 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1796 16, /* rightshift */
1797 1, /* size (0 = byte, 1 = short, 2 = long) */
1799 FALSE, /* pc_relative */
1801 complain_overflow_signed, /* complain_on_overflow */
1802 ppc64_elf_unhandled_reloc, /* special_function */
1803 "R_PPC64_GOT_TLSLD16_HI", /* name */
1804 FALSE, /* partial_inplace */
1806 0xffff, /* dst_mask */
1807 FALSE), /* pcrel_offset */
1809 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1810 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1811 16, /* rightshift */
1812 1, /* size (0 = byte, 1 = short, 2 = long) */
1814 FALSE, /* pc_relative */
1816 complain_overflow_signed, /* complain_on_overflow */
1817 ppc64_elf_unhandled_reloc, /* special_function */
1818 "R_PPC64_GOT_TLSLD16_HA", /* name */
1819 FALSE, /* partial_inplace */
1821 0xffff, /* dst_mask */
1822 FALSE), /* pcrel_offset */
1824 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1825 the offset to the entry relative to the TOC base (r2). */
1826 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1828 1, /* size (0 = byte, 1 = short, 2 = long) */
1830 FALSE, /* pc_relative */
1832 complain_overflow_signed, /* complain_on_overflow */
1833 ppc64_elf_unhandled_reloc, /* special_function */
1834 "R_PPC64_GOT_DTPREL16_DS", /* name */
1835 FALSE, /* partial_inplace */
1837 0xfffc, /* dst_mask */
1838 FALSE), /* pcrel_offset */
1840 /* Like GOT_DTPREL16_DS, but no overflow. */
1841 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1843 1, /* size (0 = byte, 1 = short, 2 = long) */
1845 FALSE, /* pc_relative */
1847 complain_overflow_dont, /* complain_on_overflow */
1848 ppc64_elf_unhandled_reloc, /* special_function */
1849 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1850 FALSE, /* partial_inplace */
1852 0xfffc, /* dst_mask */
1853 FALSE), /* pcrel_offset */
1855 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1856 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1857 16, /* rightshift */
1858 1, /* size (0 = byte, 1 = short, 2 = long) */
1860 FALSE, /* pc_relative */
1862 complain_overflow_signed, /* complain_on_overflow */
1863 ppc64_elf_unhandled_reloc, /* special_function */
1864 "R_PPC64_GOT_DTPREL16_HI", /* name */
1865 FALSE, /* partial_inplace */
1867 0xffff, /* dst_mask */
1868 FALSE), /* pcrel_offset */
1870 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1871 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1872 16, /* rightshift */
1873 1, /* size (0 = byte, 1 = short, 2 = long) */
1875 FALSE, /* pc_relative */
1877 complain_overflow_signed, /* complain_on_overflow */
1878 ppc64_elf_unhandled_reloc, /* special_function */
1879 "R_PPC64_GOT_DTPREL16_HA", /* name */
1880 FALSE, /* partial_inplace */
1882 0xffff, /* dst_mask */
1883 FALSE), /* pcrel_offset */
1885 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1886 offset to the entry relative to the TOC base (r2). */
1887 HOWTO (R_PPC64_GOT_TPREL16_DS,
1889 1, /* size (0 = byte, 1 = short, 2 = long) */
1891 FALSE, /* pc_relative */
1893 complain_overflow_signed, /* complain_on_overflow */
1894 ppc64_elf_unhandled_reloc, /* special_function */
1895 "R_PPC64_GOT_TPREL16_DS", /* name */
1896 FALSE, /* partial_inplace */
1898 0xfffc, /* dst_mask */
1899 FALSE), /* pcrel_offset */
1901 /* Like GOT_TPREL16_DS, but no overflow. */
1902 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1904 1, /* size (0 = byte, 1 = short, 2 = long) */
1906 FALSE, /* pc_relative */
1908 complain_overflow_dont, /* complain_on_overflow */
1909 ppc64_elf_unhandled_reloc, /* special_function */
1910 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1911 FALSE, /* partial_inplace */
1913 0xfffc, /* dst_mask */
1914 FALSE), /* pcrel_offset */
1916 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1917 HOWTO (R_PPC64_GOT_TPREL16_HI,
1918 16, /* rightshift */
1919 1, /* size (0 = byte, 1 = short, 2 = long) */
1921 FALSE, /* pc_relative */
1923 complain_overflow_signed, /* complain_on_overflow */
1924 ppc64_elf_unhandled_reloc, /* special_function */
1925 "R_PPC64_GOT_TPREL16_HI", /* name */
1926 FALSE, /* partial_inplace */
1928 0xffff, /* dst_mask */
1929 FALSE), /* pcrel_offset */
1931 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1932 HOWTO (R_PPC64_GOT_TPREL16_HA,
1933 16, /* rightshift */
1934 1, /* size (0 = byte, 1 = short, 2 = long) */
1936 FALSE, /* pc_relative */
1938 complain_overflow_signed, /* complain_on_overflow */
1939 ppc64_elf_unhandled_reloc, /* special_function */
1940 "R_PPC64_GOT_TPREL16_HA", /* name */
1941 FALSE, /* partial_inplace */
1943 0xffff, /* dst_mask */
1944 FALSE), /* pcrel_offset */
1946 HOWTO (R_PPC64_JMP_IREL, /* type */
1948 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1950 FALSE, /* pc_relative */
1952 complain_overflow_dont, /* complain_on_overflow */
1953 ppc64_elf_unhandled_reloc, /* special_function */
1954 "R_PPC64_JMP_IREL", /* name */
1955 FALSE, /* partial_inplace */
1958 FALSE), /* pcrel_offset */
1960 HOWTO (R_PPC64_IRELATIVE, /* type */
1962 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1964 FALSE, /* pc_relative */
1966 complain_overflow_dont, /* complain_on_overflow */
1967 bfd_elf_generic_reloc, /* special_function */
1968 "R_PPC64_IRELATIVE", /* name */
1969 FALSE, /* partial_inplace */
1971 ONES (64), /* dst_mask */
1972 FALSE), /* pcrel_offset */
1974 /* A 16 bit relative relocation. */
1975 HOWTO (R_PPC64_REL16, /* type */
1977 1, /* size (0 = byte, 1 = short, 2 = long) */
1979 TRUE, /* pc_relative */
1981 complain_overflow_signed, /* complain_on_overflow */
1982 bfd_elf_generic_reloc, /* special_function */
1983 "R_PPC64_REL16", /* name */
1984 FALSE, /* partial_inplace */
1986 0xffff, /* dst_mask */
1987 TRUE), /* pcrel_offset */
1989 /* A 16 bit relative relocation without overflow. */
1990 HOWTO (R_PPC64_REL16_LO, /* type */
1992 1, /* size (0 = byte, 1 = short, 2 = long) */
1994 TRUE, /* pc_relative */
1996 complain_overflow_dont,/* complain_on_overflow */
1997 bfd_elf_generic_reloc, /* special_function */
1998 "R_PPC64_REL16_LO", /* name */
1999 FALSE, /* partial_inplace */
2001 0xffff, /* dst_mask */
2002 TRUE), /* pcrel_offset */
2004 /* The high order 16 bits of a relative address. */
2005 HOWTO (R_PPC64_REL16_HI, /* type */
2006 16, /* rightshift */
2007 1, /* size (0 = byte, 1 = short, 2 = long) */
2009 TRUE, /* pc_relative */
2011 complain_overflow_signed, /* complain_on_overflow */
2012 bfd_elf_generic_reloc, /* special_function */
2013 "R_PPC64_REL16_HI", /* name */
2014 FALSE, /* partial_inplace */
2016 0xffff, /* dst_mask */
2017 TRUE), /* pcrel_offset */
2019 /* The high order 16 bits of a relative address, plus 1 if the contents of
2020 the low 16 bits, treated as a signed number, is negative. */
2021 HOWTO (R_PPC64_REL16_HA, /* type */
2022 16, /* rightshift */
2023 1, /* size (0 = byte, 1 = short, 2 = long) */
2025 TRUE, /* pc_relative */
2027 complain_overflow_signed, /* complain_on_overflow */
2028 ppc64_elf_ha_reloc, /* special_function */
2029 "R_PPC64_REL16_HA", /* name */
2030 FALSE, /* partial_inplace */
2032 0xffff, /* dst_mask */
2033 TRUE), /* pcrel_offset */
2035 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2036 HOWTO (R_PPC64_REL16DX_HA, /* type */
2037 16, /* rightshift */
2038 2, /* size (0 = byte, 1 = short, 2 = long) */
2040 TRUE, /* pc_relative */
2042 complain_overflow_signed, /* complain_on_overflow */
2043 ppc64_elf_ha_reloc, /* special_function */
2044 "R_PPC64_REL16DX_HA", /* name */
2045 FALSE, /* partial_inplace */
2047 0x1fffc1, /* dst_mask */
2048 TRUE), /* pcrel_offset */
2050 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
2051 HOWTO (R_PPC64_16DX_HA, /* type */
2052 16, /* rightshift */
2053 2, /* size (0 = byte, 1 = short, 2 = long) */
2055 FALSE, /* pc_relative */
2057 complain_overflow_signed, /* complain_on_overflow */
2058 ppc64_elf_ha_reloc, /* special_function */
2059 "R_PPC64_16DX_HA", /* name */
2060 FALSE, /* partial_inplace */
2062 0x1fffc1, /* dst_mask */
2063 FALSE), /* pcrel_offset */
2065 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2066 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2067 16, /* rightshift */
2068 1, /* size (0 = byte, 1 = short, 2 = long) */
2070 FALSE, /* pc_relative */
2072 complain_overflow_dont, /* complain_on_overflow */
2073 bfd_elf_generic_reloc, /* special_function */
2074 "R_PPC64_ADDR16_HIGH", /* name */
2075 FALSE, /* partial_inplace */
2077 0xffff, /* dst_mask */
2078 FALSE), /* pcrel_offset */
2080 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2081 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2082 16, /* rightshift */
2083 1, /* size (0 = byte, 1 = short, 2 = long) */
2085 FALSE, /* pc_relative */
2087 complain_overflow_dont, /* complain_on_overflow */
2088 ppc64_elf_ha_reloc, /* special_function */
2089 "R_PPC64_ADDR16_HIGHA", /* name */
2090 FALSE, /* partial_inplace */
2092 0xffff, /* dst_mask */
2093 FALSE), /* pcrel_offset */
2095 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2096 HOWTO (R_PPC64_DTPREL16_HIGH,
2097 16, /* rightshift */
2098 1, /* size (0 = byte, 1 = short, 2 = long) */
2100 FALSE, /* pc_relative */
2102 complain_overflow_dont, /* complain_on_overflow */
2103 ppc64_elf_unhandled_reloc, /* special_function */
2104 "R_PPC64_DTPREL16_HIGH", /* name */
2105 FALSE, /* partial_inplace */
2107 0xffff, /* dst_mask */
2108 FALSE), /* pcrel_offset */
2110 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2111 HOWTO (R_PPC64_DTPREL16_HIGHA,
2112 16, /* rightshift */
2113 1, /* size (0 = byte, 1 = short, 2 = long) */
2115 FALSE, /* pc_relative */
2117 complain_overflow_dont, /* complain_on_overflow */
2118 ppc64_elf_unhandled_reloc, /* special_function */
2119 "R_PPC64_DTPREL16_HIGHA", /* name */
2120 FALSE, /* partial_inplace */
2122 0xffff, /* dst_mask */
2123 FALSE), /* pcrel_offset */
2125 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2126 HOWTO (R_PPC64_TPREL16_HIGH,
2127 16, /* rightshift */
2128 1, /* size (0 = byte, 1 = short, 2 = long) */
2130 FALSE, /* pc_relative */
2132 complain_overflow_dont, /* complain_on_overflow */
2133 ppc64_elf_unhandled_reloc, /* special_function */
2134 "R_PPC64_TPREL16_HIGH", /* name */
2135 FALSE, /* partial_inplace */
2137 0xffff, /* dst_mask */
2138 FALSE), /* pcrel_offset */
2140 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2141 HOWTO (R_PPC64_TPREL16_HIGHA,
2142 16, /* rightshift */
2143 1, /* size (0 = byte, 1 = short, 2 = long) */
2145 FALSE, /* pc_relative */
2147 complain_overflow_dont, /* complain_on_overflow */
2148 ppc64_elf_unhandled_reloc, /* special_function */
2149 "R_PPC64_TPREL16_HIGHA", /* name */
2150 FALSE, /* partial_inplace */
2152 0xffff, /* dst_mask */
2153 FALSE), /* pcrel_offset */
2155 /* Marker reloc on ELFv2 large-model function entry. */
2156 HOWTO (R_PPC64_ENTRY,
2158 2, /* size (0 = byte, 1 = short, 2 = long) */
2160 FALSE, /* pc_relative */
2162 complain_overflow_dont, /* complain_on_overflow */
2163 bfd_elf_generic_reloc, /* special_function */
2164 "R_PPC64_ENTRY", /* name */
2165 FALSE, /* partial_inplace */
2168 FALSE), /* pcrel_offset */
2170 /* Like ADDR64, but use local entry point of function. */
2171 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2173 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2175 FALSE, /* pc_relative */
2177 complain_overflow_dont, /* complain_on_overflow */
2178 bfd_elf_generic_reloc, /* special_function */
2179 "R_PPC64_ADDR64_LOCAL", /* name */
2180 FALSE, /* partial_inplace */
2182 ONES (64), /* dst_mask */
2183 FALSE), /* pcrel_offset */
2185 /* GNU extension to record C++ vtable hierarchy. */
2186 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2188 0, /* size (0 = byte, 1 = short, 2 = long) */
2190 FALSE, /* pc_relative */
2192 complain_overflow_dont, /* complain_on_overflow */
2193 NULL, /* special_function */
2194 "R_PPC64_GNU_VTINHERIT", /* name */
2195 FALSE, /* partial_inplace */
2198 FALSE), /* pcrel_offset */
2200 /* GNU extension to record C++ vtable member usage. */
2201 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2203 0, /* size (0 = byte, 1 = short, 2 = long) */
2205 FALSE, /* pc_relative */
2207 complain_overflow_dont, /* complain_on_overflow */
2208 NULL, /* special_function */
2209 "R_PPC64_GNU_VTENTRY", /* name */
2210 FALSE, /* partial_inplace */
2213 FALSE), /* pcrel_offset */
2217 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
2221 ppc_howto_init (void)
2223 unsigned int i, type;
2225 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2227 type = ppc64_elf_howto_raw[i].type;
2228 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
2229 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2233 static reloc_howto_type *
2234 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2235 bfd_reloc_code_real_type code)
2237 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
2239 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2240 /* Initialize howto table if needed. */
2248 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2250 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2252 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2254 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2256 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2258 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2260 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2262 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
2264 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2266 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
2268 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
2270 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
2272 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
2274 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
2276 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
2278 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
2280 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
2282 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
2284 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
2286 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
2288 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
2290 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
2292 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
2294 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
2296 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
2298 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
2300 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
2302 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
2304 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
2306 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
2308 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
2310 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
2312 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
2314 case BFD_RELOC_64: r = R_PPC64_ADDR64;
2316 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
2318 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
2320 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
2322 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
2324 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
2326 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
2328 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
2330 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
2332 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
2334 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
2336 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
2338 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2340 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2342 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2344 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2346 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2348 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2350 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2352 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2354 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2356 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2358 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2360 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2362 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2364 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2366 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2368 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2370 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2372 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2374 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2376 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2378 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2380 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2382 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2384 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2386 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2388 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2390 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2392 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2394 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2396 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2398 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2400 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2402 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2404 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2406 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2408 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2410 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2412 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2414 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2416 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2418 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2420 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2422 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2424 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2426 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2428 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2430 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2432 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2434 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2436 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2438 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2440 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2442 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2444 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2446 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2448 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2450 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2452 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2454 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2456 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2458 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2460 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2462 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2464 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2466 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2468 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2470 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
2472 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2474 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2476 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2478 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2480 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2484 return ppc64_elf_howto_table[r];
2487 static reloc_howto_type *
2488 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2493 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
2494 if (ppc64_elf_howto_raw[i].name != NULL
2495 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2496 return &ppc64_elf_howto_raw[i];
2501 /* Set the howto pointer for a PowerPC ELF reloc. */
2504 ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
2505 Elf_Internal_Rela *dst)
2509 /* Initialize howto table if needed. */
2510 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2513 type = ELF64_R_TYPE (dst->r_info);
2514 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
2516 /* xgettext:c-format */
2517 _bfd_error_handler (_("%pB: unsupported reloc type %#x"),
2519 type = R_PPC64_NONE;
2521 cache_ptr->howto = ppc64_elf_howto_table[type];
2524 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2526 static bfd_reloc_status_type
2527 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2528 void *data, asection *input_section,
2529 bfd *output_bfd, char **error_message)
2531 enum elf_ppc64_reloc_type r_type;
2533 bfd_size_type octets;
2536 /* If this is a relocatable link (output_bfd test tells us), just
2537 call the generic function. Any adjustment will be done at final
2539 if (output_bfd != NULL)
2540 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2541 input_section, output_bfd, error_message);
2543 /* Adjust the addend for sign extension of the low 16 bits.
2544 We won't actually be using the low 16 bits, so trashing them
2546 reloc_entry->addend += 0x8000;
2547 r_type = reloc_entry->howto->type;
2548 if (r_type != R_PPC64_REL16DX_HA)
2549 return bfd_reloc_continue;
2552 if (!bfd_is_com_section (symbol->section))
2553 value = symbol->value;
2554 value += (reloc_entry->addend
2555 + symbol->section->output_offset
2556 + symbol->section->output_section->vma);
2557 value -= (reloc_entry->address
2558 + input_section->output_offset
2559 + input_section->output_section->vma);
2560 value = (bfd_signed_vma) value >> 16;
2562 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2563 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2565 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2566 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2567 if (value + 0x8000 > 0xffff)
2568 return bfd_reloc_overflow;
2569 return bfd_reloc_ok;
2572 static bfd_reloc_status_type
2573 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2574 void *data, asection *input_section,
2575 bfd *output_bfd, char **error_message)
2577 if (output_bfd != NULL)
2578 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2579 input_section, output_bfd, error_message);
2581 if (strcmp (symbol->section->name, ".opd") == 0
2582 && (symbol->section->owner->flags & DYNAMIC) == 0)
2584 bfd_vma dest = opd_entry_value (symbol->section,
2585 symbol->value + reloc_entry->addend,
2587 if (dest != (bfd_vma) -1)
2588 reloc_entry->addend = dest - (symbol->value
2589 + symbol->section->output_section->vma
2590 + symbol->section->output_offset);
2594 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2596 if (symbol->section->owner != abfd
2597 && symbol->section->owner != NULL
2598 && abiversion (symbol->section->owner) >= 2)
2602 for (i = 0; i < symbol->section->owner->symcount; ++i)
2604 asymbol *symdef = symbol->section->owner->outsymbols[i];
2606 if (strcmp (symdef->name, symbol->name) == 0)
2608 elfsym = (elf_symbol_type *) symdef;
2614 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2616 return bfd_reloc_continue;
2619 static bfd_reloc_status_type
2620 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2621 void *data, asection *input_section,
2622 bfd *output_bfd, char **error_message)
2625 enum elf_ppc64_reloc_type r_type;
2626 bfd_size_type octets;
2627 /* Assume 'at' branch hints. */
2628 bfd_boolean is_isa_v2 = TRUE;
2630 /* If this is a relocatable link (output_bfd test tells us), just
2631 call the generic function. Any adjustment will be done at final
2633 if (output_bfd != NULL)
2634 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2635 input_section, output_bfd, error_message);
2637 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2638 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2639 insn &= ~(0x01 << 21);
2640 r_type = reloc_entry->howto->type;
2641 if (r_type == R_PPC64_ADDR14_BRTAKEN
2642 || r_type == R_PPC64_REL14_BRTAKEN)
2643 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2647 /* Set 'a' bit. This is 0b00010 in BO field for branch
2648 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2649 for branch on CTR insns (BO == 1a00t or 1a01t). */
2650 if ((insn & (0x14 << 21)) == (0x04 << 21))
2652 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2662 if (!bfd_is_com_section (symbol->section))
2663 target = symbol->value;
2664 target += symbol->section->output_section->vma;
2665 target += symbol->section->output_offset;
2666 target += reloc_entry->addend;
2668 from = (reloc_entry->address
2669 + input_section->output_offset
2670 + input_section->output_section->vma);
2672 /* Invert 'y' bit if not the default. */
2673 if ((bfd_signed_vma) (target - from) < 0)
2676 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2678 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2679 input_section, output_bfd, error_message);
2682 static bfd_reloc_status_type
2683 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2684 void *data, asection *input_section,
2685 bfd *output_bfd, char **error_message)
2687 /* If this is a relocatable link (output_bfd test tells us), just
2688 call the generic function. Any adjustment will be done at final
2690 if (output_bfd != NULL)
2691 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2692 input_section, output_bfd, error_message);
2694 /* Subtract the symbol section base address. */
2695 reloc_entry->addend -= symbol->section->output_section->vma;
2696 return bfd_reloc_continue;
2699 static bfd_reloc_status_type
2700 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2701 void *data, asection *input_section,
2702 bfd *output_bfd, char **error_message)
2704 /* If this is a relocatable link (output_bfd test tells us), just
2705 call the generic function. Any adjustment will be done at final
2707 if (output_bfd != NULL)
2708 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2709 input_section, output_bfd, error_message);
2711 /* Subtract the symbol section base address. */
2712 reloc_entry->addend -= symbol->section->output_section->vma;
2714 /* Adjust the addend for sign extension of the low 16 bits. */
2715 reloc_entry->addend += 0x8000;
2716 return bfd_reloc_continue;
2719 static bfd_reloc_status_type
2720 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2721 void *data, asection *input_section,
2722 bfd *output_bfd, char **error_message)
2726 /* If this is a relocatable link (output_bfd test tells us), just
2727 call the generic function. Any adjustment will be done at final
2729 if (output_bfd != NULL)
2730 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2731 input_section, output_bfd, error_message);
2733 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2735 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2737 /* Subtract the TOC base address. */
2738 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2739 return bfd_reloc_continue;
2742 static bfd_reloc_status_type
2743 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2744 void *data, asection *input_section,
2745 bfd *output_bfd, char **error_message)
2749 /* If this is a relocatable link (output_bfd test tells us), just
2750 call the generic function. Any adjustment will be done at final
2752 if (output_bfd != NULL)
2753 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2754 input_section, output_bfd, error_message);
2756 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2758 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2760 /* Subtract the TOC base address. */
2761 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2763 /* Adjust the addend for sign extension of the low 16 bits. */
2764 reloc_entry->addend += 0x8000;
2765 return bfd_reloc_continue;
2768 static bfd_reloc_status_type
2769 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2770 void *data, asection *input_section,
2771 bfd *output_bfd, char **error_message)
2774 bfd_size_type octets;
2776 /* If this is a relocatable link (output_bfd test tells us), just
2777 call the generic function. Any adjustment will be done at final
2779 if (output_bfd != NULL)
2780 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2781 input_section, output_bfd, error_message);
2783 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2785 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
2787 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2788 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2789 return bfd_reloc_ok;
2792 static bfd_reloc_status_type
2793 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2794 void *data, asection *input_section,
2795 bfd *output_bfd, char **error_message)
2797 /* If this is a relocatable link (output_bfd test tells us), just
2798 call the generic function. Any adjustment will be done at final
2800 if (output_bfd != NULL)
2801 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2802 input_section, output_bfd, error_message);
2804 if (error_message != NULL)
2806 static char buf[60];
2807 sprintf (buf, "generic linker can't handle %s",
2808 reloc_entry->howto->name);
2809 *error_message = buf;
2811 return bfd_reloc_dangerous;
2814 /* Track GOT entries needed for a given symbol. We might need more
2815 than one got entry per symbol. */
2818 struct got_entry *next;
2820 /* The symbol addend that we'll be placing in the GOT. */
2823 /* Unlike other ELF targets, we use separate GOT entries for the same
2824 symbol referenced from different input files. This is to support
2825 automatic multiple TOC/GOT sections, where the TOC base can vary
2826 from one input file to another. After partitioning into TOC groups
2827 we merge entries within the group.
2829 Point to the BFD owning this GOT entry. */
2832 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2833 TLS_TPREL or TLS_DTPREL for tls entries. */
2834 unsigned char tls_type;
2836 /* Non-zero if got.ent points to real entry. */
2837 unsigned char is_indirect;
2839 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2842 bfd_signed_vma refcount;
2844 struct got_entry *ent;
2848 /* The same for PLT. */
2851 struct plt_entry *next;
2857 bfd_signed_vma refcount;
2862 struct ppc64_elf_obj_tdata
2864 struct elf_obj_tdata elf;
2866 /* Shortcuts to dynamic linker sections. */
2870 /* Used during garbage collection. We attach global symbols defined
2871 on removed .opd entries to this section so that the sym is removed. */
2872 asection *deleted_section;
2874 /* TLS local dynamic got entry handling. Support for multiple GOT
2875 sections means we potentially need one of these for each input bfd. */
2876 struct got_entry tlsld_got;
2879 /* A copy of relocs before they are modified for --emit-relocs. */
2880 Elf_Internal_Rela *relocs;
2882 /* Section contents. */
2886 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2887 the reloc to be in the range -32768 to 32767. */
2888 unsigned int has_small_toc_reloc : 1;
2890 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2891 instruction not one we handle. */
2892 unsigned int unexpected_toc_insn : 1;
2895 #define ppc64_elf_tdata(bfd) \
2896 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2898 #define ppc64_tlsld_got(bfd) \
2899 (&ppc64_elf_tdata (bfd)->tlsld_got)
2901 #define is_ppc64_elf(bfd) \
2902 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2903 && elf_object_id (bfd) == PPC64_ELF_DATA)
2905 /* Override the generic function because we store some extras. */
2908 ppc64_elf_mkobject (bfd *abfd)
2910 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
2914 /* Fix bad default arch selected for a 64 bit input bfd when the
2915 default is 32 bit. Also select arch based on apuinfo. */
2918 ppc64_elf_object_p (bfd *abfd)
2920 if (!abfd->arch_info->the_default)
2923 if (abfd->arch_info->bits_per_word == 32)
2925 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2927 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2929 /* Relies on arch after 32 bit default being 64 bit default. */
2930 abfd->arch_info = abfd->arch_info->next;
2931 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2934 return _bfd_elf_ppc_set_arch (abfd);
2937 /* Support for core dump NOTE sections. */
2940 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2942 size_t offset, size;
2944 if (note->descsz != 504)
2948 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2951 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
2957 /* Make a ".reg/999" section. */
2958 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2959 size, note->descpos + offset);
2963 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2965 if (note->descsz != 136)
2968 elf_tdata (abfd)->core->pid
2969 = bfd_get_32 (abfd, note->descdata + 24);
2970 elf_tdata (abfd)->core->program
2971 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2972 elf_tdata (abfd)->core->command
2973 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2979 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2992 va_start (ap, note_type);
2993 memset (data, 0, sizeof (data));
2994 strncpy (data + 40, va_arg (ap, const char *), 16);
2995 strncpy (data + 56, va_arg (ap, const char *), 80);
2997 return elfcore_write_note (abfd, buf, bufsiz,
2998 "CORE", note_type, data, sizeof (data));
3009 va_start (ap, note_type);
3010 memset (data, 0, 112);
3011 pid = va_arg (ap, long);
3012 bfd_put_32 (abfd, pid, data + 32);
3013 cursig = va_arg (ap, int);
3014 bfd_put_16 (abfd, cursig, data + 12);
3015 greg = va_arg (ap, const void *);
3016 memcpy (data + 112, greg, 384);
3017 memset (data + 496, 0, 8);
3019 return elfcore_write_note (abfd, buf, bufsiz,
3020 "CORE", note_type, data, sizeof (data));
3025 /* Add extra PPC sections. */
3027 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
3029 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3030 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3031 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3032 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3033 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3034 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3035 { NULL, 0, 0, 0, 0 }
3038 enum _ppc64_sec_type {
3044 struct _ppc64_elf_section_data
3046 struct bfd_elf_section_data elf;
3050 /* An array with one entry for each opd function descriptor,
3051 and some spares since opd entries may be either 16 or 24 bytes. */
3052 #define OPD_NDX(OFF) ((OFF) >> 4)
3053 struct _opd_sec_data
3055 /* Points to the function code section for local opd entries. */
3056 asection **func_sec;
3058 /* After editing .opd, adjust references to opd local syms. */
3062 /* An array for toc sections, indexed by offset/8. */
3063 struct _toc_sec_data
3065 /* Specifies the relocation symbol index used at a given toc offset. */
3068 /* And the relocation addend. */
3073 enum _ppc64_sec_type sec_type:2;
3075 /* Flag set when small branches are detected. Used to
3076 select suitable defaults for the stub group size. */
3077 unsigned int has_14bit_branch:1;
3080 #define ppc64_elf_section_data(sec) \
3081 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
3084 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
3086 if (!sec->used_by_bfd)
3088 struct _ppc64_elf_section_data *sdata;
3089 bfd_size_type amt = sizeof (*sdata);
3091 sdata = bfd_zalloc (abfd, amt);
3094 sec->used_by_bfd = sdata;
3097 return _bfd_elf_new_section_hook (abfd, sec);
3100 static struct _opd_sec_data *
3101 get_opd_info (asection * sec)
3104 && ppc64_elf_section_data (sec) != NULL
3105 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
3106 return &ppc64_elf_section_data (sec)->u.opd;
3110 /* Parameters for the qsort hook. */
3111 static bfd_boolean synthetic_relocatable;
3112 static asection *synthetic_opd;
3114 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3117 compare_symbols (const void *ap, const void *bp)
3119 const asymbol *a = * (const asymbol **) ap;
3120 const asymbol *b = * (const asymbol **) bp;
3122 /* Section symbols first. */
3123 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
3125 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
3128 /* then .opd symbols. */
3129 if (synthetic_opd != NULL)
3131 if (strcmp (a->section->name, ".opd") == 0
3132 && strcmp (b->section->name, ".opd") != 0)
3134 if (strcmp (a->section->name, ".opd") != 0
3135 && strcmp (b->section->name, ".opd") == 0)
3139 /* then other code symbols. */
3140 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3141 == (SEC_CODE | SEC_ALLOC)
3142 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3143 != (SEC_CODE | SEC_ALLOC))
3146 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3147 != (SEC_CODE | SEC_ALLOC)
3148 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3149 == (SEC_CODE | SEC_ALLOC))
3152 if (synthetic_relocatable)
3154 if (a->section->id < b->section->id)
3157 if (a->section->id > b->section->id)
3161 if (a->value + a->section->vma < b->value + b->section->vma)
3164 if (a->value + a->section->vma > b->value + b->section->vma)
3167 /* For syms with the same value, prefer strong dynamic global function
3168 syms over other syms. */
3169 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3172 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3175 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3178 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3181 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3184 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3187 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3190 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3196 /* Search SYMS for a symbol of the given VALUE. */
3199 sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
3203 if (id == (unsigned) -1)
3207 mid = (lo + hi) >> 1;
3208 if (syms[mid]->value + syms[mid]->section->vma < value)
3210 else if (syms[mid]->value + syms[mid]->section->vma > value)
3220 mid = (lo + hi) >> 1;
3221 if (syms[mid]->section->id < id)
3223 else if (syms[mid]->section->id > id)
3225 else if (syms[mid]->value < value)
3227 else if (syms[mid]->value > value)
3237 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3239 bfd_vma vma = *(bfd_vma *) ptr;
3240 return ((section->flags & SEC_ALLOC) != 0
3241 && section->vma <= vma
3242 && vma < section->vma + section->size);
3245 /* Create synthetic symbols, effectively restoring "dot-symbol" function
3246 entry syms. Also generate @plt symbols for the glink branch table.
3247 Returns count of synthetic symbols in RET or -1 on error. */
3250 ppc64_elf_get_synthetic_symtab (bfd *abfd,
3251 long static_count, asymbol **static_syms,
3252 long dyn_count, asymbol **dyn_syms,
3259 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
3260 asection *opd = NULL;
3261 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
3263 int abi = abiversion (abfd);
3269 opd = bfd_get_section_by_name (abfd, ".opd");
3270 if (opd == NULL && abi == 1)
3282 symcount = static_count;
3284 symcount += dyn_count;
3288 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3292 if (!relocatable && static_count != 0 && dyn_count != 0)
3294 /* Use both symbol tables. */
3295 memcpy (syms, static_syms, static_count * sizeof (*syms));
3296 memcpy (syms + static_count, dyn_syms,
3297 (dyn_count + 1) * sizeof (*syms));
3299 else if (!relocatable && static_count == 0)
3300 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3302 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3304 synthetic_relocatable = relocatable;
3305 synthetic_opd = opd;
3306 qsort (syms, symcount, sizeof (*syms), compare_symbols);
3308 if (!relocatable && symcount > 1)
3311 /* Trim duplicate syms, since we may have merged the normal and
3312 dynamic symbols. Actually, we only care about syms that have
3313 different values, so trim any with the same value. */
3314 for (i = 1, j = 1; i < symcount; ++i)
3315 if (syms[i - 1]->value + syms[i - 1]->section->vma
3316 != syms[i]->value + syms[i]->section->vma)
3317 syms[j++] = syms[i];
3322 /* Note that here and in compare_symbols we can't compare opd and
3323 sym->section directly. With separate debug info files, the
3324 symbols will be extracted from the debug file while abfd passed
3325 to this function is the real binary. */
3326 if (opd != NULL && strcmp (syms[i]->section->name, ".opd") == 0)
3330 for (; i < symcount; ++i)
3331 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
3332 | SEC_THREAD_LOCAL))
3333 != (SEC_CODE | SEC_ALLOC))
3334 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3338 for (; i < symcount; ++i)
3339 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3343 for (; i < symcount; ++i)
3344 if (strcmp (syms[i]->section->name, ".opd") != 0)
3348 for (; i < symcount; ++i)
3349 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3350 != (SEC_CODE | SEC_ALLOC))
3358 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3363 if (opdsymend == secsymend)
3366 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3367 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
3371 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3378 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3382 while (r < opd->relocation + relcount
3383 && r->address < syms[i]->value + opd->vma)
3386 if (r == opd->relocation + relcount)
3389 if (r->address != syms[i]->value + opd->vma)
3392 if (r->howto->type != R_PPC64_ADDR64)
3395 sym = *r->sym_ptr_ptr;
3396 if (!sym_exists_at (syms, opdsymend, symcount,
3397 sym->section->id, sym->value + r->addend))
3400 size += sizeof (asymbol);
3401 size += strlen (syms[i]->name) + 2;
3407 s = *ret = bfd_malloc (size);
3414 names = (char *) (s + count);
3416 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
3420 while (r < opd->relocation + relcount
3421 && r->address < syms[i]->value + opd->vma)
3424 if (r == opd->relocation + relcount)
3427 if (r->address != syms[i]->value + opd->vma)
3430 if (r->howto->type != R_PPC64_ADDR64)
3433 sym = *r->sym_ptr_ptr;
3434 if (!sym_exists_at (syms, opdsymend, symcount,
3435 sym->section->id, sym->value + r->addend))
3440 s->flags |= BSF_SYNTHETIC;
3441 s->section = sym->section;
3442 s->value = sym->value + r->addend;
3445 len = strlen (syms[i]->name);
3446 memcpy (names, syms[i]->name, len + 1);
3448 /* Have udata.p point back to the original symbol this
3449 synthetic symbol was derived from. */
3450 s->udata.p = syms[i];
3457 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3458 bfd_byte *contents = NULL;
3461 bfd_vma glink_vma = 0, resolv_vma = 0;
3462 asection *dynamic, *glink = NULL, *relplt = NULL;
3465 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
3467 free_contents_and_exit_err:
3469 free_contents_and_exit:
3476 for (i = secsymend; i < opdsymend; ++i)
3480 /* Ignore bogus symbols. */
3481 if (syms[i]->value > opd->size - 8)
3484 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3485 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3488 size += sizeof (asymbol);
3489 size += strlen (syms[i]->name) + 2;
3493 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3495 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
3497 bfd_byte *dynbuf, *extdyn, *extdynend;
3499 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3501 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
3502 goto free_contents_and_exit_err;
3504 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3505 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3508 extdynend = extdyn + dynamic->size;
3509 for (; extdyn < extdynend; extdyn += extdynsize)
3511 Elf_Internal_Dyn dyn;
3512 (*swap_dyn_in) (abfd, extdyn, &dyn);
3514 if (dyn.d_tag == DT_NULL)
3517 if (dyn.d_tag == DT_PPC64_GLINK)
3519 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
3520 See comment in ppc64_elf_finish_dynamic_sections. */
3521 glink_vma = dyn.d_un.d_val + 8 * 4;
3522 /* The .glink section usually does not survive the final
3523 link; search for the section (usually .text) where the
3524 glink stubs now reside. */
3525 glink = bfd_sections_find_if (abfd, section_covers_vma,
3536 /* Determine __glink trampoline by reading the relative branch
3537 from the first glink stub. */
3539 unsigned int off = 0;
3541 while (bfd_get_section_contents (abfd, glink, buf,
3542 glink_vma + off - glink->vma, 4))
3544 unsigned int insn = bfd_get_32 (abfd, buf);
3546 if ((insn & ~0x3fffffc) == 0)
3548 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3557 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3559 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3562 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3563 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
3564 goto free_contents_and_exit_err;
3566 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3567 size += plt_count * sizeof (asymbol);
3569 p = relplt->relocation;
3570 for (i = 0; i < plt_count; i++, p++)
3572 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3574 size += sizeof ("+0x") - 1 + 16;
3580 goto free_contents_and_exit;
3581 s = *ret = bfd_malloc (size);
3583 goto free_contents_and_exit_err;
3585 names = (char *) (s + count + plt_count + (resolv_vma != 0));
3587 for (i = secsymend; i < opdsymend; ++i)
3591 if (syms[i]->value > opd->size - 8)
3594 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3595 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3599 asection *sec = abfd->sections;
3606 long mid = (lo + hi) >> 1;
3607 if (syms[mid]->section->vma < ent)
3609 else if (syms[mid]->section->vma > ent)
3613 sec = syms[mid]->section;
3618 if (lo >= hi && lo > codesecsym)
3619 sec = syms[lo - 1]->section;
3621 for (; sec != NULL; sec = sec->next)
3625 /* SEC_LOAD may not be set if SEC is from a separate debug
3627 if ((sec->flags & SEC_ALLOC) == 0)
3629 if ((sec->flags & SEC_CODE) != 0)
3632 s->flags |= BSF_SYNTHETIC;
3633 s->value = ent - s->section->vma;
3636 len = strlen (syms[i]->name);
3637 memcpy (names, syms[i]->name, len + 1);
3639 /* Have udata.p point back to the original symbol this
3640 synthetic symbol was derived from. */
3641 s->udata.p = syms[i];
3647 if (glink != NULL && relplt != NULL)
3651 /* Add a symbol for the main glink trampoline. */
3652 memset (s, 0, sizeof *s);
3654 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3656 s->value = resolv_vma - glink->vma;
3658 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3659 names += sizeof ("__glink_PLTresolve");
3664 /* FIXME: It would be very much nicer to put sym@plt on the
3665 stub rather than on the glink branch table entry. The
3666 objdump disassembler would then use a sensible symbol
3667 name on plt calls. The difficulty in doing so is
3668 a) finding the stubs, and,
3669 b) matching stubs against plt entries, and,
3670 c) there can be multiple stubs for a given plt entry.
3672 Solving (a) could be done by code scanning, but older
3673 ppc64 binaries used different stubs to current code.
3674 (b) is the tricky one since you need to known the toc
3675 pointer for at least one function that uses a pic stub to
3676 be able to calculate the plt address referenced.
3677 (c) means gdb would need to set multiple breakpoints (or
3678 find the glink branch itself) when setting breakpoints
3679 for pending shared library loads. */
3680 p = relplt->relocation;
3681 for (i = 0; i < plt_count; i++, p++)
3685 *s = **p->sym_ptr_ptr;
3686 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3687 we are defining a symbol, ensure one of them is set. */
3688 if ((s->flags & BSF_LOCAL) == 0)
3689 s->flags |= BSF_GLOBAL;
3690 s->flags |= BSF_SYNTHETIC;
3692 s->value = glink_vma - glink->vma;
3695 len = strlen ((*p->sym_ptr_ptr)->name);
3696 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3700 memcpy (names, "+0x", sizeof ("+0x") - 1);
3701 names += sizeof ("+0x") - 1;
3702 bfd_sprintf_vma (abfd, names, p->addend);
3703 names += strlen (names);
3705 memcpy (names, "@plt", sizeof ("@plt"));
3706 names += sizeof ("@plt");
3726 /* The following functions are specific to the ELF linker, while
3727 functions above are used generally. Those named ppc64_elf_* are
3728 called by the main ELF linker code. They appear in this file more
3729 or less in the order in which they are called. eg.
3730 ppc64_elf_check_relocs is called early in the link process,
3731 ppc64_elf_finish_dynamic_sections is one of the last functions
3734 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3735 functions have both a function code symbol and a function descriptor
3736 symbol. A call to foo in a relocatable object file looks like:
3743 The function definition in another object file might be:
3747 . .quad .TOC.@tocbase
3753 When the linker resolves the call during a static link, the branch
3754 unsurprisingly just goes to .foo and the .opd information is unused.
3755 If the function definition is in a shared library, things are a little
3756 different: The call goes via a plt call stub, the opd information gets
3757 copied to the plt, and the linker patches the nop.
3765 . std 2,40(1) # in practice, the call stub
3766 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3767 . addi 11,11,Lfoo@toc@l # this is the general idea
3775 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3777 The "reloc ()" notation is supposed to indicate that the linker emits
3778 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3781 What are the difficulties here? Well, firstly, the relocations
3782 examined by the linker in check_relocs are against the function code
3783 sym .foo, while the dynamic relocation in the plt is emitted against
3784 the function descriptor symbol, foo. Somewhere along the line, we need
3785 to carefully copy dynamic link information from one symbol to the other.
3786 Secondly, the generic part of the elf linker will make .foo a dynamic
3787 symbol as is normal for most other backends. We need foo dynamic
3788 instead, at least for an application final link. However, when
3789 creating a shared library containing foo, we need to have both symbols
3790 dynamic so that references to .foo are satisfied during the early
3791 stages of linking. Otherwise the linker might decide to pull in a
3792 definition from some other object, eg. a static library.
3794 Update: As of August 2004, we support a new convention. Function
3795 calls may use the function descriptor symbol, ie. "bl foo". This
3796 behaves exactly as "bl .foo". */
3798 /* Of those relocs that might be copied as dynamic relocs, this
3799 function selects those that must be copied when linking a shared
3800 library or PIE, even when the symbol is local. */
3803 must_be_dyn_reloc (struct bfd_link_info *info,
3804 enum elf_ppc64_reloc_type r_type)
3809 /* Only relative relocs can be resolved when the object load
3810 address isn't fixed. DTPREL64 is excluded because the
3811 dynamic linker needs to differentiate global dynamic from
3812 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
3820 case R_PPC64_TPREL16:
3821 case R_PPC64_TPREL16_LO:
3822 case R_PPC64_TPREL16_HI:
3823 case R_PPC64_TPREL16_HA:
3824 case R_PPC64_TPREL16_DS:
3825 case R_PPC64_TPREL16_LO_DS:
3826 case R_PPC64_TPREL16_HIGH:
3827 case R_PPC64_TPREL16_HIGHA:
3828 case R_PPC64_TPREL16_HIGHER:
3829 case R_PPC64_TPREL16_HIGHERA:
3830 case R_PPC64_TPREL16_HIGHEST:
3831 case R_PPC64_TPREL16_HIGHESTA:
3832 case R_PPC64_TPREL64:
3833 /* These relocations are relative but in a shared library the
3834 linker doesn't know the thread pointer base. */
3835 return bfd_link_dll (info);
3839 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3840 copying dynamic variables from a shared lib into an app's dynbss
3841 section, and instead use a dynamic relocation to point into the
3842 shared lib. With code that gcc generates, it's vital that this be
3843 enabled; In the PowerPC64 ABI, the address of a function is actually
3844 the address of a function descriptor, which resides in the .opd
3845 section. gcc uses the descriptor directly rather than going via the
3846 GOT as some other ABI's do, which means that initialized function
3847 pointers must reference the descriptor. Thus, a function pointer
3848 initialized to the address of a function in a shared library will
3849 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3850 redefines the function descriptor symbol to point to the copy. This
3851 presents a problem as a plt entry for that function is also
3852 initialized from the function descriptor symbol and the copy reloc
3853 may not be initialized first. */
3854 #define ELIMINATE_COPY_RELOCS 1
3856 /* Section name for stubs is the associated section name plus this
3858 #define STUB_SUFFIX ".stub"
3861 ppc_stub_long_branch:
3862 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3863 destination, but a 24 bit branch in a stub section will reach.
3866 ppc_stub_plt_branch:
3867 Similar to the above, but a 24 bit branch in the stub section won't
3868 reach its destination.
3869 . addis %r11,%r2,xxx@toc@ha
3870 . ld %r12,xxx@toc@l(%r11)
3875 Used to call a function in a shared library. If it so happens that
3876 the plt entry referenced crosses a 64k boundary, then an extra
3877 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3879 . addis %r11,%r2,xxx@toc@ha
3880 . ld %r12,xxx+0@toc@l(%r11)
3882 . ld %r2,xxx+8@toc@l(%r11)
3883 . ld %r11,xxx+16@toc@l(%r11)
3886 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3887 code to adjust the value and save r2 to support multiple toc sections.
3888 A ppc_stub_long_branch with an r2 offset looks like:
3890 . addis %r2,%r2,off@ha
3891 . addi %r2,%r2,off@l
3894 A ppc_stub_plt_branch with an r2 offset looks like:
3896 . addis %r11,%r2,xxx@toc@ha
3897 . ld %r12,xxx@toc@l(%r11)
3898 . addis %r2,%r2,off@ha
3899 . addi %r2,%r2,off@l
3903 In cases where the "addis" instruction would add zero, the "addis" is
3904 omitted and following instructions modified slightly in some cases.
3907 enum ppc_stub_type {
3909 ppc_stub_long_branch,
3910 ppc_stub_long_branch_r2off,
3911 ppc_stub_plt_branch,
3912 ppc_stub_plt_branch_r2off,
3914 ppc_stub_plt_call_r2save,
3915 ppc_stub_global_entry,
3919 /* Information on stub grouping. */
3922 /* The stub section. */
3924 /* This is the section to which stubs in the group will be attached. */
3927 struct map_stub *next;
3928 /* Whether to emit a copy of register save/restore functions in this
3931 /* The offset of the __tls_get_addr_opt plt stub bctrl in this group,
3932 or -1u if no such stub with bctrl exists. */
3933 unsigned int tls_get_addr_opt_bctrl;
3936 struct ppc_stub_hash_entry {
3938 /* Base hash table entry structure. */
3939 struct bfd_hash_entry root;
3941 enum ppc_stub_type stub_type;
3943 /* Group information. */
3944 struct map_stub *group;
3946 /* Offset within stub_sec of the beginning of this stub. */
3947 bfd_vma stub_offset;
3949 /* Given the symbol's value and its section we can determine its final
3950 value when building the stubs (so the stub knows where to jump. */
3951 bfd_vma target_value;
3952 asection *target_section;
3954 /* The symbol table entry, if any, that this was derived from. */
3955 struct ppc_link_hash_entry *h;
3956 struct plt_entry *plt_ent;
3958 /* Symbol st_other. */
3959 unsigned char other;
3962 struct ppc_branch_hash_entry {
3964 /* Base hash table entry structure. */
3965 struct bfd_hash_entry root;
3967 /* Offset within branch lookup table. */
3968 unsigned int offset;
3970 /* Generation marker. */
3974 /* Used to track dynamic relocations for local symbols. */
3975 struct ppc_dyn_relocs
3977 struct ppc_dyn_relocs *next;
3979 /* The input section of the reloc. */
3982 /* Total number of relocs copied for the input section. */
3983 unsigned int count : 31;
3985 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3986 unsigned int ifunc : 1;
3989 struct ppc_link_hash_entry
3991 struct elf_link_hash_entry elf;
3994 /* A pointer to the most recently used stub hash entry against this
3996 struct ppc_stub_hash_entry *stub_cache;
3998 /* A pointer to the next symbol starting with a '.' */
3999 struct ppc_link_hash_entry *next_dot_sym;
4002 /* Track dynamic relocs copied for this symbol. */
4003 struct elf_dyn_relocs *dyn_relocs;
4005 /* Link between function code and descriptor symbols. */
4006 struct ppc_link_hash_entry *oh;
4008 /* Flag function code and descriptor symbols. */
4009 unsigned int is_func:1;
4010 unsigned int is_func_descriptor:1;
4011 unsigned int fake:1;
4013 /* Whether global opd/toc sym has been adjusted or not.
4014 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
4015 should be set for all globals defined in any opd/toc section. */
4016 unsigned int adjust_done:1;
4018 /* Set if this is an out-of-line register save/restore function,
4019 with non-standard calling convention. */
4020 unsigned int save_res:1;
4022 /* Set if a duplicate symbol with non-zero localentry is detected,
4023 even when the duplicate symbol does not provide a definition. */
4024 unsigned int non_zero_localentry:1;
4026 /* Contexts in which symbol is used in the GOT (or TOC).
4027 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
4028 corresponding relocs are encountered during check_relocs.
4029 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
4030 indicate the corresponding GOT entry type is not needed.
4031 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
4032 a TPREL one. We use a separate flag rather than setting TPREL
4033 just for convenience in distinguishing the two cases. */
4034 #define TLS_GD 1 /* GD reloc. */
4035 #define TLS_LD 2 /* LD reloc. */
4036 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
4037 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
4038 #define TLS_TLS 16 /* Any TLS reloc. */
4039 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
4040 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
4041 #define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
4042 unsigned char tls_mask;
4045 /* ppc64 ELF linker hash table. */
4047 struct ppc_link_hash_table
4049 struct elf_link_hash_table elf;
4051 /* The stub hash table. */
4052 struct bfd_hash_table stub_hash_table;
4054 /* Another hash table for plt_branch stubs. */
4055 struct bfd_hash_table branch_hash_table;
4057 /* Hash table for function prologue tocsave. */
4058 htab_t tocsave_htab;
4060 /* Various options and other info passed from the linker. */
4061 struct ppc64_elf_params *params;
4063 /* The size of sec_info below. */
4064 unsigned int sec_info_arr_size;
4066 /* Per-section array of extra section info. Done this way rather
4067 than as part of ppc64_elf_section_data so we have the info for
4068 non-ppc64 sections. */
4071 /* Along with elf_gp, specifies the TOC pointer used by this section. */
4076 /* The section group that this section belongs to. */
4077 struct map_stub *group;
4078 /* A temp section list pointer. */
4083 /* Linked list of groups. */
4084 struct map_stub *group;
4086 /* Temp used when calculating TOC pointers. */
4089 asection *toc_first_sec;
4091 /* Used when adding symbols. */
4092 struct ppc_link_hash_entry *dot_syms;
4094 /* Shortcuts to get to dynamic linker sections. */
4096 asection *global_entry;
4100 asection *glink_eh_frame;
4102 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4103 struct ppc_link_hash_entry *tls_get_addr;
4104 struct ppc_link_hash_entry *tls_get_addr_fd;
4106 /* The size of reliplt used by got entry relocs. */
4107 bfd_size_type got_reli_size;
4110 unsigned long stub_count[ppc_stub_global_entry];
4112 /* Number of stubs against global syms. */
4113 unsigned long stub_globals;
4115 /* Set if we're linking code with function descriptors. */
4116 unsigned int opd_abi:1;
4118 /* Support for multiple toc sections. */
4119 unsigned int do_multi_toc:1;
4120 unsigned int multi_toc_needed:1;
4121 unsigned int second_toc_pass:1;
4122 unsigned int do_toc_opt:1;
4124 /* Set if tls optimization is enabled. */
4125 unsigned int do_tls_opt:1;
4128 unsigned int stub_error:1;
4130 /* Whether func_desc_adjust needs to be run over symbols. */
4131 unsigned int need_func_desc_adj:1;
4133 /* Whether there exist local gnu indirect function resolvers,
4134 referenced by dynamic relocations. */
4135 unsigned int local_ifunc_resolver:1;
4136 unsigned int maybe_local_ifunc_resolver:1;
4138 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
4139 unsigned int has_plt_localentry0:1;
4141 /* Incremented every time we size stubs. */
4142 unsigned int stub_iteration;
4144 /* Small local sym cache. */
4145 struct sym_cache sym_cache;
4148 /* Rename some of the generic section flags to better document how they
4151 /* Nonzero if this section has TLS related relocations. */
4152 #define has_tls_reloc sec_flg0
4154 /* Nonzero if this section has a call to __tls_get_addr. */
4155 #define has_tls_get_addr_call sec_flg1
4157 /* Nonzero if this section has any toc or got relocs. */
4158 #define has_toc_reloc sec_flg2
4160 /* Nonzero if this section has a call to another section that uses
4162 #define makes_toc_func_call sec_flg3
4164 /* Recursion protection when determining above flag. */
4165 #define call_check_in_progress sec_flg4
4166 #define call_check_done sec_flg5
4168 /* Get the ppc64 ELF linker hash table from a link_info structure. */
4170 #define ppc_hash_table(p) \
4171 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4172 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4174 #define ppc_stub_hash_lookup(table, string, create, copy) \
4175 ((struct ppc_stub_hash_entry *) \
4176 bfd_hash_lookup ((table), (string), (create), (copy)))
4178 #define ppc_branch_hash_lookup(table, string, create, copy) \
4179 ((struct ppc_branch_hash_entry *) \
4180 bfd_hash_lookup ((table), (string), (create), (copy)))
4182 /* Create an entry in the stub hash table. */
4184 static struct bfd_hash_entry *
4185 stub_hash_newfunc (struct bfd_hash_entry *entry,
4186 struct bfd_hash_table *table,
4189 /* Allocate the structure if it has not already been allocated by a
4193 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4198 /* Call the allocation method of the superclass. */
4199 entry = bfd_hash_newfunc (entry, table, string);
4202 struct ppc_stub_hash_entry *eh;
4204 /* Initialize the local fields. */
4205 eh = (struct ppc_stub_hash_entry *) entry;
4206 eh->stub_type = ppc_stub_none;
4208 eh->stub_offset = 0;
4209 eh->target_value = 0;
4210 eh->target_section = NULL;
4219 /* Create an entry in the branch hash table. */
4221 static struct bfd_hash_entry *
4222 branch_hash_newfunc (struct bfd_hash_entry *entry,
4223 struct bfd_hash_table *table,
4226 /* Allocate the structure if it has not already been allocated by a
4230 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4235 /* Call the allocation method of the superclass. */
4236 entry = bfd_hash_newfunc (entry, table, string);
4239 struct ppc_branch_hash_entry *eh;
4241 /* Initialize the local fields. */
4242 eh = (struct ppc_branch_hash_entry *) entry;
4250 /* Create an entry in a ppc64 ELF linker hash table. */
4252 static struct bfd_hash_entry *
4253 link_hash_newfunc (struct bfd_hash_entry *entry,
4254 struct bfd_hash_table *table,
4257 /* Allocate the structure if it has not already been allocated by a
4261 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4266 /* Call the allocation method of the superclass. */
4267 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4270 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4272 memset (&eh->u.stub_cache, 0,
4273 (sizeof (struct ppc_link_hash_entry)
4274 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4276 /* When making function calls, old ABI code references function entry
4277 points (dot symbols), while new ABI code references the function
4278 descriptor symbol. We need to make any combination of reference and
4279 definition work together, without breaking archive linking.
4281 For a defined function "foo" and an undefined call to "bar":
4282 An old object defines "foo" and ".foo", references ".bar" (possibly
4284 A new object defines "foo" and references "bar".
4286 A new object thus has no problem with its undefined symbols being
4287 satisfied by definitions in an old object. On the other hand, the
4288 old object won't have ".bar" satisfied by a new object.
4290 Keep a list of newly added dot-symbols. */
4292 if (string[0] == '.')
4294 struct ppc_link_hash_table *htab;
4296 htab = (struct ppc_link_hash_table *) table;
4297 eh->u.next_dot_sym = htab->dot_syms;
4298 htab->dot_syms = eh;
4305 struct tocsave_entry {
4311 tocsave_htab_hash (const void *p)
4313 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4314 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
4318 tocsave_htab_eq (const void *p1, const void *p2)
4320 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4321 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4322 return e1->sec == e2->sec && e1->offset == e2->offset;
4325 /* Destroy a ppc64 ELF linker hash table. */
4328 ppc64_elf_link_hash_table_free (bfd *obfd)
4330 struct ppc_link_hash_table *htab;
4332 htab = (struct ppc_link_hash_table *) obfd->link.hash;
4333 if (htab->tocsave_htab)
4334 htab_delete (htab->tocsave_htab);
4335 bfd_hash_table_free (&htab->branch_hash_table);
4336 bfd_hash_table_free (&htab->stub_hash_table);
4337 _bfd_elf_link_hash_table_free (obfd);
4340 /* Create a ppc64 ELF linker hash table. */
4342 static struct bfd_link_hash_table *
4343 ppc64_elf_link_hash_table_create (bfd *abfd)
4345 struct ppc_link_hash_table *htab;
4346 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4348 htab = bfd_zmalloc (amt);
4352 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4353 sizeof (struct ppc_link_hash_entry),
4360 /* Init the stub hash table too. */
4361 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4362 sizeof (struct ppc_stub_hash_entry)))
4364 _bfd_elf_link_hash_table_free (abfd);
4368 /* And the branch hash table. */
4369 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4370 sizeof (struct ppc_branch_hash_entry)))
4372 bfd_hash_table_free (&htab->stub_hash_table);
4373 _bfd_elf_link_hash_table_free (abfd);
4377 htab->tocsave_htab = htab_try_create (1024,
4381 if (htab->tocsave_htab == NULL)
4383 ppc64_elf_link_hash_table_free (abfd);
4386 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
4388 /* Initializing two fields of the union is just cosmetic. We really
4389 only care about glist, but when compiled on a 32-bit host the
4390 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4391 debugger inspection of these fields look nicer. */
4392 htab->elf.init_got_refcount.refcount = 0;
4393 htab->elf.init_got_refcount.glist = NULL;
4394 htab->elf.init_plt_refcount.refcount = 0;
4395 htab->elf.init_plt_refcount.glist = NULL;
4396 htab->elf.init_got_offset.offset = 0;
4397 htab->elf.init_got_offset.glist = NULL;
4398 htab->elf.init_plt_offset.offset = 0;
4399 htab->elf.init_plt_offset.glist = NULL;
4401 return &htab->elf.root;
4404 /* Create sections for linker generated code. */
4407 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4409 struct ppc_link_hash_table *htab;
4412 htab = ppc_hash_table (info);
4414 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4415 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4416 if (htab->params->save_restore_funcs)
4418 /* Create .sfpr for code to save and restore fp regs. */
4419 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4421 if (htab->sfpr == NULL
4422 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4426 if (bfd_link_relocatable (info))
4429 /* Create .glink for lazy dynamic linking support. */
4430 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4432 if (htab->glink == NULL
4433 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4436 /* The part of .glink used by global entry stubs, separate so that
4437 it can be aligned appropriately without affecting htab->glink. */
4438 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4440 if (htab->global_entry == NULL
4441 || ! bfd_set_section_alignment (dynobj, htab->global_entry, 2))
4444 if (!info->no_ld_generated_unwind_info)
4446 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4447 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4448 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4451 if (htab->glink_eh_frame == NULL
4452 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4456 flags = SEC_ALLOC | SEC_LINKER_CREATED;
4457 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4458 if (htab->elf.iplt == NULL
4459 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
4462 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4463 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4465 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4466 if (htab->elf.irelplt == NULL
4467 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
4470 /* Create branch lookup table for plt_branch stubs. */
4471 flags = (SEC_ALLOC | SEC_LOAD
4472 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4473 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4475 if (htab->brlt == NULL
4476 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4479 if (!bfd_link_pic (info))
4482 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4483 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4484 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4487 if (htab->relbrlt == NULL
4488 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4494 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4497 ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4498 struct ppc64_elf_params *params)
4500 struct ppc_link_hash_table *htab;
4502 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
4504 /* Always hook our dynamic sections into the first bfd, which is the
4505 linker created stub bfd. This ensures that the GOT header is at
4506 the start of the output TOC section. */
4507 htab = ppc_hash_table (info);
4508 htab->elf.dynobj = params->stub_bfd;
4509 htab->params = params;
4511 return create_linkage_sections (htab->elf.dynobj, info);
4514 /* Build a name for an entry in the stub hash table. */
4517 ppc_stub_name (const asection *input_section,
4518 const asection *sym_sec,
4519 const struct ppc_link_hash_entry *h,
4520 const Elf_Internal_Rela *rel)
4525 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4526 offsets from a sym as a branch target? In fact, we could
4527 probably assume the addend is always zero. */
4528 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4532 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4533 stub_name = bfd_malloc (len);
4534 if (stub_name == NULL)
4537 len = sprintf (stub_name, "%08x.%s+%x",
4538 input_section->id & 0xffffffff,
4539 h->elf.root.root.string,
4540 (int) rel->r_addend & 0xffffffff);
4544 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4545 stub_name = bfd_malloc (len);
4546 if (stub_name == NULL)
4549 len = sprintf (stub_name, "%08x.%x:%x+%x",
4550 input_section->id & 0xffffffff,
4551 sym_sec->id & 0xffffffff,
4552 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4553 (int) rel->r_addend & 0xffffffff);
4555 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
4556 stub_name[len - 2] = 0;
4560 /* Look up an entry in the stub hash. Stub entries are cached because
4561 creating the stub name takes a bit of time. */
4563 static struct ppc_stub_hash_entry *
4564 ppc_get_stub_entry (const asection *input_section,
4565 const asection *sym_sec,
4566 struct ppc_link_hash_entry *h,
4567 const Elf_Internal_Rela *rel,
4568 struct ppc_link_hash_table *htab)
4570 struct ppc_stub_hash_entry *stub_entry;
4571 struct map_stub *group;
4573 /* If this input section is part of a group of sections sharing one
4574 stub section, then use the id of the first section in the group.
4575 Stub names need to include a section id, as there may well be
4576 more than one stub used to reach say, printf, and we need to
4577 distinguish between them. */
4578 group = htab->sec_info[input_section->id].u.group;
4582 if (h != NULL && h->u.stub_cache != NULL
4583 && h->u.stub_cache->h == h
4584 && h->u.stub_cache->group == group)
4586 stub_entry = h->u.stub_cache;
4592 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
4593 if (stub_name == NULL)
4596 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
4597 stub_name, FALSE, FALSE);
4599 h->u.stub_cache = stub_entry;
4607 /* Add a new stub entry to the stub hash. Not all fields of the new
4608 stub entry are initialised. */
4610 static struct ppc_stub_hash_entry *
4611 ppc_add_stub (const char *stub_name,
4613 struct bfd_link_info *info)
4615 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4616 struct map_stub *group;
4619 struct ppc_stub_hash_entry *stub_entry;
4621 group = htab->sec_info[section->id].u.group;
4622 link_sec = group->link_sec;
4623 stub_sec = group->stub_sec;
4624 if (stub_sec == NULL)
4630 namelen = strlen (link_sec->name);
4631 len = namelen + sizeof (STUB_SUFFIX);
4632 s_name = bfd_alloc (htab->params->stub_bfd, len);
4636 memcpy (s_name, link_sec->name, namelen);
4637 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4638 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4639 if (stub_sec == NULL)
4641 group->stub_sec = stub_sec;
4644 /* Enter this entry into the linker stub hash table. */
4645 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
4647 if (stub_entry == NULL)
4649 /* xgettext:c-format */
4650 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
4651 section->owner, stub_name);
4655 stub_entry->group = group;
4656 stub_entry->stub_offset = 0;
4660 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4661 not already done. */
4664 create_got_section (bfd *abfd, struct bfd_link_info *info)
4666 asection *got, *relgot;
4668 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4670 if (!is_ppc64_elf (abfd))
4676 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4679 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4680 | SEC_LINKER_CREATED);
4682 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
4684 || !bfd_set_section_alignment (abfd, got, 3))
4687 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4688 flags | SEC_READONLY);
4690 || ! bfd_set_section_alignment (abfd, relgot, 3))
4693 ppc64_elf_tdata (abfd)->got = got;
4694 ppc64_elf_tdata (abfd)->relgot = relgot;
4698 /* Follow indirect and warning symbol links. */
4700 static inline struct bfd_link_hash_entry *
4701 follow_link (struct bfd_link_hash_entry *h)
4703 while (h->type == bfd_link_hash_indirect
4704 || h->type == bfd_link_hash_warning)
4709 static inline struct elf_link_hash_entry *
4710 elf_follow_link (struct elf_link_hash_entry *h)
4712 return (struct elf_link_hash_entry *) follow_link (&h->root);
4715 static inline struct ppc_link_hash_entry *
4716 ppc_follow_link (struct ppc_link_hash_entry *h)
4718 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4721 /* Merge PLT info on FROM with that on TO. */
4724 move_plt_plist (struct ppc_link_hash_entry *from,
4725 struct ppc_link_hash_entry *to)
4727 if (from->elf.plt.plist != NULL)
4729 if (to->elf.plt.plist != NULL)
4731 struct plt_entry **entp;
4732 struct plt_entry *ent;
4734 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4736 struct plt_entry *dent;
4738 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4739 if (dent->addend == ent->addend)
4741 dent->plt.refcount += ent->plt.refcount;
4748 *entp = to->elf.plt.plist;
4751 to->elf.plt.plist = from->elf.plt.plist;
4752 from->elf.plt.plist = NULL;
4756 /* Copy the extra info we tack onto an elf_link_hash_entry. */
4759 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4760 struct elf_link_hash_entry *dir,
4761 struct elf_link_hash_entry *ind)
4763 struct ppc_link_hash_entry *edir, *eind;
4765 edir = (struct ppc_link_hash_entry *) dir;
4766 eind = (struct ppc_link_hash_entry *) ind;
4768 edir->is_func |= eind->is_func;
4769 edir->is_func_descriptor |= eind->is_func_descriptor;
4770 edir->tls_mask |= eind->tls_mask;
4771 if (eind->oh != NULL)
4772 edir->oh = ppc_follow_link (eind->oh);
4774 if (edir->elf.versioned != versioned_hidden)
4775 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4776 edir->elf.ref_regular |= eind->elf.ref_regular;
4777 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4778 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4779 edir->elf.needs_plt |= eind->elf.needs_plt;
4780 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
4782 /* If we were called to copy over info for a weak sym, don't copy
4783 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4784 in order to simplify readonly_dynrelocs and save a field in the
4785 symbol hash entry, but that means dyn_relocs can't be used in any
4786 tests about a specific symbol, or affect other symbol flags which
4788 if (eind->elf.root.type != bfd_link_hash_indirect)
4791 /* Copy over any dynamic relocs we may have on the indirect sym. */
4792 if (eind->dyn_relocs != NULL)
4794 if (edir->dyn_relocs != NULL)
4796 struct elf_dyn_relocs **pp;
4797 struct elf_dyn_relocs *p;
4799 /* Add reloc counts against the indirect sym to the direct sym
4800 list. Merge any entries against the same section. */
4801 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4803 struct elf_dyn_relocs *q;
4805 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4806 if (q->sec == p->sec)
4808 q->pc_count += p->pc_count;
4809 q->count += p->count;
4816 *pp = edir->dyn_relocs;
4819 edir->dyn_relocs = eind->dyn_relocs;
4820 eind->dyn_relocs = NULL;
4823 /* Copy over got entries that we may have already seen to the
4824 symbol which just became indirect. */
4825 if (eind->elf.got.glist != NULL)
4827 if (edir->elf.got.glist != NULL)
4829 struct got_entry **entp;
4830 struct got_entry *ent;
4832 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4834 struct got_entry *dent;
4836 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4837 if (dent->addend == ent->addend
4838 && dent->owner == ent->owner
4839 && dent->tls_type == ent->tls_type)
4841 dent->got.refcount += ent->got.refcount;
4848 *entp = edir->elf.got.glist;
4851 edir->elf.got.glist = eind->elf.got.glist;
4852 eind->elf.got.glist = NULL;
4855 /* And plt entries. */
4856 move_plt_plist (eind, edir);
4858 if (eind->elf.dynindx != -1)
4860 if (edir->elf.dynindx != -1)
4861 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4862 edir->elf.dynstr_index);
4863 edir->elf.dynindx = eind->elf.dynindx;
4864 edir->elf.dynstr_index = eind->elf.dynstr_index;
4865 eind->elf.dynindx = -1;
4866 eind->elf.dynstr_index = 0;
4870 /* Find the function descriptor hash entry from the given function code
4871 hash entry FH. Link the entries via their OH fields. */
4873 static struct ppc_link_hash_entry *
4874 lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4876 struct ppc_link_hash_entry *fdh = fh->oh;
4880 const char *fd_name = fh->elf.root.root.string + 1;
4882 fdh = (struct ppc_link_hash_entry *)
4883 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4887 fdh->is_func_descriptor = 1;
4893 fdh = ppc_follow_link (fdh);
4894 fdh->is_func_descriptor = 1;
4899 /* Make a fake function descriptor sym for the undefined code sym FH. */
4901 static struct ppc_link_hash_entry *
4902 make_fdh (struct bfd_link_info *info,
4903 struct ppc_link_hash_entry *fh)
4905 bfd *abfd = fh->elf.root.u.undef.abfd;
4906 struct bfd_link_hash_entry *bh = NULL;
4907 struct ppc_link_hash_entry *fdh;
4908 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4912 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4913 fh->elf.root.root.string + 1,
4914 flags, bfd_und_section_ptr, 0,
4915 NULL, FALSE, FALSE, &bh))
4918 fdh = (struct ppc_link_hash_entry *) bh;
4919 fdh->elf.non_elf = 0;
4921 fdh->is_func_descriptor = 1;
4928 /* Fix function descriptor symbols defined in .opd sections to be
4932 ppc64_elf_add_symbol_hook (bfd *ibfd,
4933 struct bfd_link_info *info,
4934 Elf_Internal_Sym *isym,
4936 flagword *flags ATTRIBUTE_UNUSED,
4940 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4941 && (ibfd->flags & DYNAMIC) == 0
4942 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
4943 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
4946 && strcmp ((*sec)->name, ".opd") == 0)
4950 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4951 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4952 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4954 /* If the symbol is a function defined in .opd, and the function
4955 code is in a discarded group, let it appear to be undefined. */
4956 if (!bfd_link_relocatable (info)
4957 && (*sec)->reloc_count != 0
4958 && opd_entry_value (*sec, *value, &code_sec, NULL,
4959 FALSE) != (bfd_vma) -1
4960 && discarded_section (code_sec))
4962 *sec = bfd_und_section_ptr;
4963 isym->st_shndx = SHN_UNDEF;
4966 else if (*sec != NULL
4967 && strcmp ((*sec)->name, ".toc") == 0
4968 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4970 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4972 htab->params->object_in_toc = 1;
4975 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4977 if (abiversion (ibfd) == 0)
4978 set_abiversion (ibfd, 2);
4979 else if (abiversion (ibfd) == 1)
4981 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4982 " for ABI version 1"), *name);
4983 bfd_set_error (bfd_error_bad_value);
4991 /* Merge non-visibility st_other attributes: local entry point. */
4994 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4995 const Elf_Internal_Sym *isym,
4996 bfd_boolean definition,
4997 bfd_boolean dynamic)
4999 if (definition && (!dynamic || !h->def_regular))
5000 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
5001 | ELF_ST_VISIBILITY (h->other));
5004 /* Hook called on merging a symbol. We use this to clear "fake" since
5005 we now have a real symbol. */
5008 ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
5009 const Elf_Internal_Sym *isym,
5010 asection **psec ATTRIBUTE_UNUSED,
5011 bfd_boolean newdef ATTRIBUTE_UNUSED,
5012 bfd_boolean olddef ATTRIBUTE_UNUSED,
5013 bfd *oldbfd ATTRIBUTE_UNUSED,
5014 const asection *oldsec ATTRIBUTE_UNUSED)
5016 ((struct ppc_link_hash_entry *) h)->fake = 0;
5017 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
5018 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
5022 /* This function makes an old ABI object reference to ".bar" cause the
5023 inclusion of a new ABI object archive that defines "bar".
5024 NAME is a symbol defined in an archive. Return a symbol in the hash
5025 table that might be satisfied by the archive symbols. */
5027 static struct elf_link_hash_entry *
5028 ppc64_elf_archive_symbol_lookup (bfd *abfd,
5029 struct bfd_link_info *info,
5032 struct elf_link_hash_entry *h;
5036 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
5038 /* Don't return this sym if it is a fake function descriptor
5039 created by add_symbol_adjust. */
5040 && !((struct ppc_link_hash_entry *) h)->fake)
5046 len = strlen (name);
5047 dot_name = bfd_alloc (abfd, len + 2);
5048 if (dot_name == NULL)
5049 return (struct elf_link_hash_entry *) -1;
5051 memcpy (dot_name + 1, name, len + 1);
5052 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5053 bfd_release (abfd, dot_name);
5057 /* This function satisfies all old ABI object references to ".bar" if a
5058 new ABI object defines "bar". Well, at least, undefined dot symbols
5059 are made weak. This stops later archive searches from including an
5060 object if we already have a function descriptor definition. It also
5061 prevents the linker complaining about undefined symbols.
5062 We also check and correct mismatched symbol visibility here. The
5063 most restrictive visibility of the function descriptor and the
5064 function entry symbol is used. */
5067 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
5069 struct ppc_link_hash_table *htab;
5070 struct ppc_link_hash_entry *fdh;
5072 if (eh->elf.root.type == bfd_link_hash_warning)
5073 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
5075 if (eh->elf.root.type == bfd_link_hash_indirect)
5078 if (eh->elf.root.root.string[0] != '.')
5081 htab = ppc_hash_table (info);
5085 fdh = lookup_fdh (eh, htab);
5087 && !bfd_link_relocatable (info)
5088 && (eh->elf.root.type == bfd_link_hash_undefined
5089 || eh->elf.root.type == bfd_link_hash_undefweak)
5090 && eh->elf.ref_regular)
5092 /* Make an undefined function descriptor sym, in order to
5093 pull in an --as-needed shared lib. Archives are handled
5095 fdh = make_fdh (info, eh);
5102 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5103 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5105 /* Make both descriptor and entry symbol have the most
5106 constraining visibility of either symbol. */
5107 if (entry_vis < descr_vis)
5108 fdh->elf.other += entry_vis - descr_vis;
5109 else if (entry_vis > descr_vis)
5110 eh->elf.other += descr_vis - entry_vis;
5112 /* Propagate reference flags from entry symbol to function
5113 descriptor symbol. */
5114 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
5115 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
5116 fdh->elf.ref_regular |= eh->elf.ref_regular;
5117 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
5119 if (!fdh->elf.forced_local
5120 && fdh->elf.dynindx == -1
5121 && fdh->elf.versioned != versioned_hidden
5122 && (bfd_link_dll (info)
5123 || fdh->elf.def_dynamic
5124 || fdh->elf.ref_dynamic)
5125 && (eh->elf.ref_regular
5126 || eh->elf.def_regular))
5128 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5136 /* Set up opd section info and abiversion for IBFD, and process list
5137 of dot-symbols we made in link_hash_newfunc. */
5140 ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
5142 struct ppc_link_hash_table *htab;
5143 struct ppc_link_hash_entry **p, *eh;
5144 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
5146 if (opd != NULL && opd->size != 0)
5148 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5149 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5151 if (abiversion (ibfd) == 0)
5152 set_abiversion (ibfd, 1);
5153 else if (abiversion (ibfd) >= 2)
5155 /* xgettext:c-format */
5156 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
5157 ibfd, abiversion (ibfd));
5158 bfd_set_error (bfd_error_bad_value);
5163 if (is_ppc64_elf (info->output_bfd))
5165 /* For input files without an explicit abiversion in e_flags
5166 we should have flagged any with symbol st_other bits set
5167 as ELFv1 and above flagged those with .opd as ELFv2.
5168 Set the output abiversion if not yet set, and for any input
5169 still ambiguous, take its abiversion from the output.
5170 Differences in ABI are reported later. */
5171 if (abiversion (info->output_bfd) == 0)
5172 set_abiversion (info->output_bfd, abiversion (ibfd));
5173 else if (abiversion (ibfd) == 0)
5174 set_abiversion (ibfd, abiversion (info->output_bfd));
5177 htab = ppc_hash_table (info);
5181 if (opd != NULL && opd->size != 0
5182 && (ibfd->flags & DYNAMIC) == 0
5183 && (opd->flags & SEC_RELOC) != 0
5184 && opd->reloc_count != 0
5185 && !bfd_is_abs_section (opd->output_section)
5186 && info->gc_sections)
5188 /* Garbage collection needs some extra help with .opd sections.
5189 We don't want to necessarily keep everything referenced by
5190 relocs in .opd, as that would keep all functions. Instead,
5191 if we reference an .opd symbol (a function descriptor), we
5192 want to keep the function code symbol's section. This is
5193 easy for global symbols, but for local syms we need to keep
5194 information about the associated function section. */
5196 asection **opd_sym_map;
5197 Elf_Internal_Shdr *symtab_hdr;
5198 Elf_Internal_Rela *relocs, *rel_end, *rel;
5200 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5201 opd_sym_map = bfd_zalloc (ibfd, amt);
5202 if (opd_sym_map == NULL)
5204 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5205 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
5209 symtab_hdr = &elf_symtab_hdr (ibfd);
5210 rel_end = relocs + opd->reloc_count - 1;
5211 for (rel = relocs; rel < rel_end; rel++)
5213 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
5214 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
5216 if (r_type == R_PPC64_ADDR64
5217 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
5218 && r_symndx < symtab_hdr->sh_info)
5220 Elf_Internal_Sym *isym;
5223 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
5226 if (elf_section_data (opd)->relocs != relocs)
5231 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
5232 if (s != NULL && s != opd)
5233 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5236 if (elf_section_data (opd)->relocs != relocs)
5240 p = &htab->dot_syms;
5241 while ((eh = *p) != NULL)
5244 if (&eh->elf == htab->elf.hgot)
5246 else if (htab->elf.hgot == NULL
5247 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5248 htab->elf.hgot = &eh->elf;
5249 else if (abiversion (ibfd) <= 1)
5251 htab->need_func_desc_adj = 1;
5252 if (!add_symbol_adjust (eh, info))
5255 p = &eh->u.next_dot_sym;
5260 /* Undo hash table changes when an --as-needed input file is determined
5261 not to be needed. */
5264 ppc64_elf_notice_as_needed (bfd *ibfd,
5265 struct bfd_link_info *info,
5266 enum notice_asneeded_action act)
5268 if (act == notice_not_needed)
5270 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5275 htab->dot_syms = NULL;
5277 return _bfd_elf_notice_as_needed (ibfd, info, act);
5280 /* If --just-symbols against a final linked binary, then assume we need
5281 toc adjusting stubs when calling functions defined there. */
5284 ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5286 if ((sec->flags & SEC_CODE) != 0
5287 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5288 && is_ppc64_elf (sec->owner))
5290 if (abiversion (sec->owner) >= 2
5291 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
5292 sec->has_toc_reloc = 1;
5294 _bfd_elf_link_just_syms (sec, info);
5297 static struct plt_entry **
5298 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5299 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
5301 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
5302 struct plt_entry **local_plt;
5303 unsigned char *local_got_tls_masks;
5305 if (local_got_ents == NULL)
5307 bfd_size_type size = symtab_hdr->sh_info;
5309 size *= (sizeof (*local_got_ents)
5310 + sizeof (*local_plt)
5311 + sizeof (*local_got_tls_masks));
5312 local_got_ents = bfd_zalloc (abfd, size);
5313 if (local_got_ents == NULL)
5315 elf_local_got_ents (abfd) = local_got_ents;
5318 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
5320 struct got_entry *ent;
5322 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
5323 if (ent->addend == r_addend
5324 && ent->owner == abfd
5325 && ent->tls_type == tls_type)
5329 bfd_size_type amt = sizeof (*ent);
5330 ent = bfd_alloc (abfd, amt);
5333 ent->next = local_got_ents[r_symndx];
5334 ent->addend = r_addend;
5336 ent->tls_type = tls_type;
5337 ent->is_indirect = FALSE;
5338 ent->got.refcount = 0;
5339 local_got_ents[r_symndx] = ent;
5341 ent->got.refcount += 1;
5344 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
5345 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
5346 local_got_tls_masks[r_symndx] |= tls_type;
5348 return local_plt + r_symndx;
5352 update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
5354 struct plt_entry *ent;
5356 for (ent = *plist; ent != NULL; ent = ent->next)
5357 if (ent->addend == addend)
5361 bfd_size_type amt = sizeof (*ent);
5362 ent = bfd_alloc (abfd, amt);
5366 ent->addend = addend;
5367 ent->plt.refcount = 0;
5370 ent->plt.refcount += 1;
5375 is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5377 return (r_type == R_PPC64_REL24
5378 || r_type == R_PPC64_REL14
5379 || r_type == R_PPC64_REL14_BRTAKEN
5380 || r_type == R_PPC64_REL14_BRNTAKEN
5381 || r_type == R_PPC64_ADDR24
5382 || r_type == R_PPC64_ADDR14
5383 || r_type == R_PPC64_ADDR14_BRTAKEN
5384 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5387 /* Look through the relocs for a section during the first phase, and
5388 calculate needed space in the global offset table, procedure
5389 linkage table, and dynamic reloc sections. */
5392 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5393 asection *sec, const Elf_Internal_Rela *relocs)
5395 struct ppc_link_hash_table *htab;
5396 Elf_Internal_Shdr *symtab_hdr;
5397 struct elf_link_hash_entry **sym_hashes;
5398 const Elf_Internal_Rela *rel;
5399 const Elf_Internal_Rela *rel_end;
5401 struct elf_link_hash_entry *tga, *dottga;
5404 if (bfd_link_relocatable (info))
5407 /* Don't do anything special with non-loaded, non-alloced sections.
5408 In particular, any relocs in such sections should not affect GOT
5409 and PLT reference counting (ie. we don't allow them to create GOT
5410 or PLT entries), there's no possibility or desire to optimize TLS
5411 relocs, and there's not much point in propagating relocs to shared
5412 libs that the dynamic linker won't relocate. */
5413 if ((sec->flags & SEC_ALLOC) == 0)
5416 BFD_ASSERT (is_ppc64_elf (abfd));
5418 htab = ppc_hash_table (info);
5422 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5423 FALSE, FALSE, TRUE);
5424 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5425 FALSE, FALSE, TRUE);
5426 symtab_hdr = &elf_symtab_hdr (abfd);
5427 sym_hashes = elf_sym_hashes (abfd);
5429 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5430 rel_end = relocs + sec->reloc_count;
5431 for (rel = relocs; rel < rel_end; rel++)
5433 unsigned long r_symndx;
5434 struct elf_link_hash_entry *h;
5435 enum elf_ppc64_reloc_type r_type;
5437 struct _ppc64_elf_section_data *ppc64_sec;
5438 struct plt_entry **ifunc, **plt_list;
5440 r_symndx = ELF64_R_SYM (rel->r_info);
5441 if (r_symndx < symtab_hdr->sh_info)
5445 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5446 h = elf_follow_link (h);
5448 if (h == htab->elf.hgot)
5449 sec->has_toc_reloc = 1;
5456 if (h->type == STT_GNU_IFUNC)
5459 ifunc = &h->plt.plist;
5464 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5469 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5471 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5472 rel->r_addend, PLT_IFUNC);
5478 r_type = ELF64_R_TYPE (rel->r_info);
5483 /* These special tls relocs tie a call to __tls_get_addr with
5484 its parameter symbol. */
5487 case R_PPC64_GOT_TLSLD16:
5488 case R_PPC64_GOT_TLSLD16_LO:
5489 case R_PPC64_GOT_TLSLD16_HI:
5490 case R_PPC64_GOT_TLSLD16_HA:
5491 tls_type = TLS_TLS | TLS_LD;
5494 case R_PPC64_GOT_TLSGD16:
5495 case R_PPC64_GOT_TLSGD16_LO:
5496 case R_PPC64_GOT_TLSGD16_HI:
5497 case R_PPC64_GOT_TLSGD16_HA:
5498 tls_type = TLS_TLS | TLS_GD;
5501 case R_PPC64_GOT_TPREL16_DS:
5502 case R_PPC64_GOT_TPREL16_LO_DS:
5503 case R_PPC64_GOT_TPREL16_HI:
5504 case R_PPC64_GOT_TPREL16_HA:
5505 if (bfd_link_dll (info))
5506 info->flags |= DF_STATIC_TLS;
5507 tls_type = TLS_TLS | TLS_TPREL;
5510 case R_PPC64_GOT_DTPREL16_DS:
5511 case R_PPC64_GOT_DTPREL16_LO_DS:
5512 case R_PPC64_GOT_DTPREL16_HI:
5513 case R_PPC64_GOT_DTPREL16_HA:
5514 tls_type = TLS_TLS | TLS_DTPREL;
5516 sec->has_tls_reloc = 1;
5520 case R_PPC64_GOT16_DS:
5521 case R_PPC64_GOT16_HA:
5522 case R_PPC64_GOT16_HI:
5523 case R_PPC64_GOT16_LO:
5524 case R_PPC64_GOT16_LO_DS:
5525 /* This symbol requires a global offset table entry. */
5526 sec->has_toc_reloc = 1;
5527 if (r_type == R_PPC64_GOT_TLSLD16
5528 || r_type == R_PPC64_GOT_TLSGD16
5529 || r_type == R_PPC64_GOT_TPREL16_DS
5530 || r_type == R_PPC64_GOT_DTPREL16_DS
5531 || r_type == R_PPC64_GOT16
5532 || r_type == R_PPC64_GOT16_DS)
5534 htab->do_multi_toc = 1;
5535 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5538 if (ppc64_elf_tdata (abfd)->got == NULL
5539 && !create_got_section (abfd, info))
5544 struct ppc_link_hash_entry *eh;
5545 struct got_entry *ent;
5547 eh = (struct ppc_link_hash_entry *) h;
5548 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5549 if (ent->addend == rel->r_addend
5550 && ent->owner == abfd
5551 && ent->tls_type == tls_type)
5555 bfd_size_type amt = sizeof (*ent);
5556 ent = bfd_alloc (abfd, amt);
5559 ent->next = eh->elf.got.glist;
5560 ent->addend = rel->r_addend;
5562 ent->tls_type = tls_type;
5563 ent->is_indirect = FALSE;
5564 ent->got.refcount = 0;
5565 eh->elf.got.glist = ent;
5567 ent->got.refcount += 1;
5568 eh->tls_mask |= tls_type;
5571 /* This is a global offset table entry for a local symbol. */
5572 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5573 rel->r_addend, tls_type))
5576 /* We may also need a plt entry if the symbol turns out to be
5578 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
5580 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5585 case R_PPC64_PLT16_HA:
5586 case R_PPC64_PLT16_HI:
5587 case R_PPC64_PLT16_LO:
5590 /* This symbol requires a procedure linkage table entry. */
5595 if (h->root.root.string[0] == '.'
5596 && h->root.root.string[1] != '\0')
5597 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5598 plt_list = &h->plt.plist;
5600 if (plt_list == NULL)
5602 /* It does not make sense to have a procedure linkage
5603 table entry for a non-ifunc local symbol. */
5604 info->callbacks->einfo
5605 /* xgettext:c-format */
5606 (_("%H: %s reloc against local symbol\n"),
5607 abfd, sec, rel->r_offset,
5608 ppc64_elf_howto_table[r_type]->name);
5609 bfd_set_error (bfd_error_bad_value);
5612 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5616 /* The following relocations don't need to propagate the
5617 relocation if linking a shared object since they are
5618 section relative. */
5619 case R_PPC64_SECTOFF:
5620 case R_PPC64_SECTOFF_LO:
5621 case R_PPC64_SECTOFF_HI:
5622 case R_PPC64_SECTOFF_HA:
5623 case R_PPC64_SECTOFF_DS:
5624 case R_PPC64_SECTOFF_LO_DS:
5625 case R_PPC64_DTPREL16:
5626 case R_PPC64_DTPREL16_LO:
5627 case R_PPC64_DTPREL16_HI:
5628 case R_PPC64_DTPREL16_HA:
5629 case R_PPC64_DTPREL16_DS:
5630 case R_PPC64_DTPREL16_LO_DS:
5631 case R_PPC64_DTPREL16_HIGH:
5632 case R_PPC64_DTPREL16_HIGHA:
5633 case R_PPC64_DTPREL16_HIGHER:
5634 case R_PPC64_DTPREL16_HIGHERA:
5635 case R_PPC64_DTPREL16_HIGHEST:
5636 case R_PPC64_DTPREL16_HIGHESTA:
5641 case R_PPC64_REL16_LO:
5642 case R_PPC64_REL16_HI:
5643 case R_PPC64_REL16_HA:
5644 case R_PPC64_REL16DX_HA:
5647 /* Not supported as a dynamic relocation. */
5648 case R_PPC64_ADDR64_LOCAL:
5649 if (bfd_link_pic (info))
5651 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5653 /* xgettext:c-format */
5654 info->callbacks->einfo (_("%H: %s reloc unsupported "
5655 "in shared libraries and PIEs\n"),
5656 abfd, sec, rel->r_offset,
5657 ppc64_elf_howto_table[r_type]->name);
5658 bfd_set_error (bfd_error_bad_value);
5664 case R_PPC64_TOC16_DS:
5665 htab->do_multi_toc = 1;
5666 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
5668 case R_PPC64_TOC16_LO:
5669 case R_PPC64_TOC16_HI:
5670 case R_PPC64_TOC16_HA:
5671 case R_PPC64_TOC16_LO_DS:
5672 sec->has_toc_reloc = 1;
5679 /* This relocation describes the C++ object vtable hierarchy.
5680 Reconstruct it for later use during GC. */
5681 case R_PPC64_GNU_VTINHERIT:
5682 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
5686 /* This relocation describes which C++ vtable entries are actually
5687 used. Record for later use during GC. */
5688 case R_PPC64_GNU_VTENTRY:
5689 BFD_ASSERT (h != NULL);
5691 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
5696 case R_PPC64_REL14_BRTAKEN:
5697 case R_PPC64_REL14_BRNTAKEN:
5699 asection *dest = NULL;
5701 /* Heuristic: If jumping outside our section, chances are
5702 we are going to need a stub. */
5705 /* If the sym is weak it may be overridden later, so
5706 don't assume we know where a weak sym lives. */
5707 if (h->root.type == bfd_link_hash_defined)
5708 dest = h->root.u.def.section;
5712 Elf_Internal_Sym *isym;
5714 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5719 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5723 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
5732 if (h->root.root.string[0] == '.'
5733 && h->root.root.string[1] != '\0')
5734 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5736 if (h == tga || h == dottga)
5738 sec->has_tls_reloc = 1;
5740 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5741 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5742 /* We have a new-style __tls_get_addr call with
5746 /* Mark this section as having an old-style call. */
5747 sec->has_tls_get_addr_call = 1;
5749 plt_list = &h->plt.plist;
5752 /* We may need a .plt entry if the function this reloc
5753 refers to is in a shared lib. */
5755 && !update_plt_info (abfd, plt_list, rel->r_addend))
5759 case R_PPC64_ADDR14:
5760 case R_PPC64_ADDR14_BRNTAKEN:
5761 case R_PPC64_ADDR14_BRTAKEN:
5762 case R_PPC64_ADDR24:
5765 case R_PPC64_TPREL64:
5766 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
5767 if (bfd_link_dll (info))
5768 info->flags |= DF_STATIC_TLS;
5771 case R_PPC64_DTPMOD64:
5772 if (rel + 1 < rel_end
5773 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5774 && rel[1].r_offset == rel->r_offset + 8)
5775 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
5777 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
5780 case R_PPC64_DTPREL64:
5781 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5783 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5784 && rel[-1].r_offset == rel->r_offset - 8)
5785 /* This is the second reloc of a dtpmod, dtprel pair.
5786 Don't mark with TLS_DTPREL. */
5790 sec->has_tls_reloc = 1;
5793 struct ppc_link_hash_entry *eh;
5794 eh = (struct ppc_link_hash_entry *) h;
5795 eh->tls_mask |= tls_type;
5798 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5799 rel->r_addend, tls_type))
5802 ppc64_sec = ppc64_elf_section_data (sec);
5803 if (ppc64_sec->sec_type != sec_toc)
5807 /* One extra to simplify get_tls_mask. */
5808 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5809 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5810 if (ppc64_sec->u.toc.symndx == NULL)
5812 amt = sec->size * sizeof (bfd_vma) / 8;
5813 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5814 if (ppc64_sec->u.toc.add == NULL)
5816 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5817 ppc64_sec->sec_type = sec_toc;
5819 BFD_ASSERT (rel->r_offset % 8 == 0);
5820 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5821 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
5823 /* Mark the second slot of a GD or LD entry.
5824 -1 to indicate GD and -2 to indicate LD. */
5825 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
5826 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
5827 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
5828 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
5831 case R_PPC64_TPREL16:
5832 case R_PPC64_TPREL16_LO:
5833 case R_PPC64_TPREL16_HI:
5834 case R_PPC64_TPREL16_HA:
5835 case R_PPC64_TPREL16_DS:
5836 case R_PPC64_TPREL16_LO_DS:
5837 case R_PPC64_TPREL16_HIGH:
5838 case R_PPC64_TPREL16_HIGHA:
5839 case R_PPC64_TPREL16_HIGHER:
5840 case R_PPC64_TPREL16_HIGHERA:
5841 case R_PPC64_TPREL16_HIGHEST:
5842 case R_PPC64_TPREL16_HIGHESTA:
5843 if (bfd_link_dll (info))
5844 info->flags |= DF_STATIC_TLS;
5847 case R_PPC64_ADDR64:
5849 && rel + 1 < rel_end
5850 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
5853 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5857 case R_PPC64_ADDR16:
5858 case R_PPC64_ADDR16_DS:
5859 case R_PPC64_ADDR16_HA:
5860 case R_PPC64_ADDR16_HI:
5861 case R_PPC64_ADDR16_HIGH:
5862 case R_PPC64_ADDR16_HIGHA:
5863 case R_PPC64_ADDR16_HIGHER:
5864 case R_PPC64_ADDR16_HIGHERA:
5865 case R_PPC64_ADDR16_HIGHEST:
5866 case R_PPC64_ADDR16_HIGHESTA:
5867 case R_PPC64_ADDR16_LO:
5868 case R_PPC64_ADDR16_LO_DS:
5869 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
5870 && rel->r_addend == 0)
5872 /* We may need a .plt entry if this reloc refers to a
5873 function in a shared lib. */
5874 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5876 h->pointer_equality_needed = 1;
5883 case R_PPC64_ADDR32:
5884 case R_PPC64_UADDR16:
5885 case R_PPC64_UADDR32:
5886 case R_PPC64_UADDR64:
5888 if (h != NULL && !bfd_link_pic (info))
5889 /* We may need a copy reloc. */
5892 /* Don't propagate .opd relocs. */
5893 if (NO_OPD_RELOCS && is_opd)
5896 /* If we are creating a shared library, and this is a reloc
5897 against a global symbol, or a non PC relative reloc
5898 against a local symbol, then we need to copy the reloc
5899 into the shared library. However, if we are linking with
5900 -Bsymbolic, we do not need to copy a reloc against a
5901 global symbol which is defined in an object we are
5902 including in the link (i.e., DEF_REGULAR is set). At
5903 this point we have not seen all the input files, so it is
5904 possible that DEF_REGULAR is not set now but will be set
5905 later (it is never cleared). In case of a weak definition,
5906 DEF_REGULAR may be cleared later by a strong definition in
5907 a shared library. We account for that possibility below by
5908 storing information in the dyn_relocs field of the hash
5909 table entry. A similar situation occurs when creating
5910 shared libraries and symbol visibility changes render the
5913 If on the other hand, we are creating an executable, we
5914 may need to keep relocations for symbols satisfied by a
5915 dynamic library if we manage to avoid copy relocs for the
5918 if ((bfd_link_pic (info)
5919 && (must_be_dyn_reloc (info, r_type)
5921 && (!SYMBOLIC_BIND (info, h)
5922 || h->root.type == bfd_link_hash_defweak
5923 || !h->def_regular))))
5924 || (ELIMINATE_COPY_RELOCS
5925 && !bfd_link_pic (info)
5927 && (h->root.type == bfd_link_hash_defweak
5928 || !h->def_regular))
5929 || (!bfd_link_pic (info)
5932 /* We must copy these reloc types into the output file.
5933 Create a reloc section in dynobj and make room for
5937 sreloc = _bfd_elf_make_dynamic_reloc_section
5938 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
5944 /* If this is a global symbol, we count the number of
5945 relocations we need for this symbol. */
5948 struct elf_dyn_relocs *p;
5949 struct elf_dyn_relocs **head;
5951 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5953 if (p == NULL || p->sec != sec)
5955 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5965 if (!must_be_dyn_reloc (info, r_type))
5970 /* Track dynamic relocs needed for local syms too.
5971 We really need local syms available to do this
5973 struct ppc_dyn_relocs *p;
5974 struct ppc_dyn_relocs **head;
5975 bfd_boolean is_ifunc;
5978 Elf_Internal_Sym *isym;
5980 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5985 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5989 vpp = &elf_section_data (s)->local_dynrel;
5990 head = (struct ppc_dyn_relocs **) vpp;
5991 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5993 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5995 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5997 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
6003 p->ifunc = is_ifunc;
6019 /* Merge backend specific data from an object file to the output
6020 object file when linking. */
6023 ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
6025 bfd *obfd = info->output_bfd;
6026 unsigned long iflags, oflags;
6028 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
6031 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
6034 if (!_bfd_generic_verify_endian_match (ibfd, info))
6037 iflags = elf_elfheader (ibfd)->e_flags;
6038 oflags = elf_elfheader (obfd)->e_flags;
6040 if (iflags & ~EF_PPC64_ABI)
6043 /* xgettext:c-format */
6044 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
6045 bfd_set_error (bfd_error_bad_value);
6048 else if (iflags != oflags && iflags != 0)
6051 /* xgettext:c-format */
6052 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
6053 ibfd, iflags, oflags);
6054 bfd_set_error (bfd_error_bad_value);
6058 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
6060 /* Merge Tag_compatibility attributes and any common GNU ones. */
6061 _bfd_elf_merge_object_attributes (ibfd, info);
6067 ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6069 /* Print normal ELF private data. */
6070 _bfd_elf_print_private_bfd_data (abfd, ptr);
6072 if (elf_elfheader (abfd)->e_flags != 0)
6076 fprintf (file, _("private flags = 0x%lx:"),
6077 elf_elfheader (abfd)->e_flags);
6079 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6080 fprintf (file, _(" [abiv%ld]"),
6081 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6088 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
6089 of the code entry point, and its section, which must be in the same
6090 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
6093 opd_entry_value (asection *opd_sec,
6095 asection **code_sec,
6097 bfd_boolean in_code_sec)
6099 bfd *opd_bfd = opd_sec->owner;
6100 Elf_Internal_Rela *relocs;
6101 Elf_Internal_Rela *lo, *hi, *look;
6104 /* No relocs implies we are linking a --just-symbols object, or looking
6105 at a final linked executable with addr2line or somesuch. */
6106 if (opd_sec->reloc_count == 0)
6108 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
6110 if (contents == NULL)
6112 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6113 return (bfd_vma) -1;
6114 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6117 /* PR 17512: file: 64b9dfbb. */
6118 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
6119 return (bfd_vma) -1;
6121 val = bfd_get_64 (opd_bfd, contents + offset);
6122 if (code_sec != NULL)
6124 asection *sec, *likely = NULL;
6130 && val < sec->vma + sec->size)
6136 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6138 && (sec->flags & SEC_LOAD) != 0
6139 && (sec->flags & SEC_ALLOC) != 0)
6144 if (code_off != NULL)
6145 *code_off = val - likely->vma;
6151 BFD_ASSERT (is_ppc64_elf (opd_bfd));
6153 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
6155 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
6156 /* PR 17512: file: df8e1fd6. */
6158 return (bfd_vma) -1;
6160 /* Go find the opd reloc at the sym address. */
6162 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
6166 look = lo + (hi - lo) / 2;
6167 if (look->r_offset < offset)
6169 else if (look->r_offset > offset)
6173 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6175 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6176 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6178 unsigned long symndx = ELF64_R_SYM (look->r_info);
6179 asection *sec = NULL;
6181 if (symndx >= symtab_hdr->sh_info
6182 && elf_sym_hashes (opd_bfd) != NULL)
6184 struct elf_link_hash_entry **sym_hashes;
6185 struct elf_link_hash_entry *rh;
6187 sym_hashes = elf_sym_hashes (opd_bfd);
6188 rh = sym_hashes[symndx - symtab_hdr->sh_info];
6191 rh = elf_follow_link (rh);
6192 if (rh->root.type != bfd_link_hash_defined
6193 && rh->root.type != bfd_link_hash_defweak)
6195 if (rh->root.u.def.section->owner == opd_bfd)
6197 val = rh->root.u.def.value;
6198 sec = rh->root.u.def.section;
6205 Elf_Internal_Sym *sym;
6207 if (symndx < symtab_hdr->sh_info)
6209 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6212 size_t symcnt = symtab_hdr->sh_info;
6213 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6218 symtab_hdr->contents = (bfd_byte *) sym;
6224 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6230 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6233 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6234 val = sym->st_value;
6237 val += look->r_addend;
6238 if (code_off != NULL)
6240 if (code_sec != NULL)
6242 if (in_code_sec && *code_sec != sec)
6247 if (sec->output_section != NULL)
6248 val += sec->output_section->vma + sec->output_offset;
6257 /* If the ELF symbol SYM might be a function in SEC, return the
6258 function size and set *CODE_OFF to the function's entry point,
6259 otherwise return zero. */
6261 static bfd_size_type
6262 ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6267 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6268 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6272 if (!(sym->flags & BSF_SYNTHETIC))
6273 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6275 if (strcmp (sym->section->name, ".opd") == 0)
6277 struct _opd_sec_data *opd = get_opd_info (sym->section);
6278 bfd_vma symval = sym->value;
6281 && opd->adjust != NULL
6282 && elf_section_data (sym->section)->relocs != NULL)
6284 /* opd_entry_value will use cached relocs that have been
6285 adjusted, but with raw symbols. That means both local
6286 and global symbols need adjusting. */
6287 long adjust = opd->adjust[OPD_NDX (symval)];
6293 if (opd_entry_value (sym->section, symval,
6294 &sec, code_off, TRUE) == (bfd_vma) -1)
6296 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6297 symbol. This size has nothing to do with the code size of the
6298 function, which is what we're supposed to return, but the
6299 code size isn't available without looking up the dot-sym.
6300 However, doing that would be a waste of time particularly
6301 since elf_find_function will look at the dot-sym anyway.
6302 Now, elf_find_function will keep the largest size of any
6303 function sym found at the code address of interest, so return
6304 1 here to avoid it incorrectly caching a larger function size
6305 for a small function. This does mean we return the wrong
6306 size for a new-ABI function of size 24, but all that does is
6307 disable caching for such functions. */
6313 if (sym->section != sec)
6315 *code_off = sym->value;
6322 /* Return true if symbol is a strong function defined in an ELFv2
6323 object with st_other localentry bits of zero, ie. its local entry
6324 point coincides with its global entry point. */
6327 is_elfv2_localentry0 (struct elf_link_hash_entry *h)
6330 && h->type == STT_FUNC
6331 && h->root.type == bfd_link_hash_defined
6332 && (STO_PPC64_LOCAL_MASK & h->other) == 0
6333 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
6334 && is_ppc64_elf (h->root.u.def.section->owner)
6335 && abiversion (h->root.u.def.section->owner) >= 2);
6338 /* Return true if symbol is defined in a regular object file. */
6341 is_static_defined (struct elf_link_hash_entry *h)
6343 return ((h->root.type == bfd_link_hash_defined
6344 || h->root.type == bfd_link_hash_defweak)
6345 && h->root.u.def.section != NULL
6346 && h->root.u.def.section->output_section != NULL);
6349 /* If FDH is a function descriptor symbol, return the associated code
6350 entry symbol if it is defined. Return NULL otherwise. */
6352 static struct ppc_link_hash_entry *
6353 defined_code_entry (struct ppc_link_hash_entry *fdh)
6355 if (fdh->is_func_descriptor)
6357 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6358 if (fh->elf.root.type == bfd_link_hash_defined
6359 || fh->elf.root.type == bfd_link_hash_defweak)
6365 /* If FH is a function code entry symbol, return the associated
6366 function descriptor symbol if it is defined. Return NULL otherwise. */
6368 static struct ppc_link_hash_entry *
6369 defined_func_desc (struct ppc_link_hash_entry *fh)
6372 && fh->oh->is_func_descriptor)
6374 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6375 if (fdh->elf.root.type == bfd_link_hash_defined
6376 || fdh->elf.root.type == bfd_link_hash_defweak)
6382 static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
6384 /* Garbage collect sections, after first dealing with dot-symbols. */
6387 ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
6389 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6391 if (htab != NULL && htab->need_func_desc_adj)
6393 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6394 htab->need_func_desc_adj = 0;
6396 return bfd_elf_gc_sections (abfd, info);
6399 /* Mark all our entry sym sections, both opd and code section. */
6402 ppc64_elf_gc_keep (struct bfd_link_info *info)
6404 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6405 struct bfd_sym_chain *sym;
6410 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6412 struct ppc_link_hash_entry *eh, *fh;
6415 eh = (struct ppc_link_hash_entry *)
6416 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
6419 if (eh->elf.root.type != bfd_link_hash_defined
6420 && eh->elf.root.type != bfd_link_hash_defweak)
6423 fh = defined_code_entry (eh);
6426 sec = fh->elf.root.u.def.section;
6427 sec->flags |= SEC_KEEP;
6429 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6430 && opd_entry_value (eh->elf.root.u.def.section,
6431 eh->elf.root.u.def.value,
6432 &sec, NULL, FALSE) != (bfd_vma) -1)
6433 sec->flags |= SEC_KEEP;
6435 sec = eh->elf.root.u.def.section;
6436 sec->flags |= SEC_KEEP;
6440 /* Mark sections containing dynamically referenced symbols. When
6441 building shared libraries, we must assume that any visible symbol is
6445 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6447 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6448 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
6449 struct ppc_link_hash_entry *fdh;
6450 struct bfd_elf_dynamic_list *d = info->dynamic_list;
6452 /* Dynamic linking info is on the func descriptor sym. */
6453 fdh = defined_func_desc (eh);
6457 if ((eh->elf.root.type == bfd_link_hash_defined
6458 || eh->elf.root.type == bfd_link_hash_defweak)
6459 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
6460 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
6461 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
6462 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
6463 && (!bfd_link_executable (info)
6464 || info->gc_keep_exported
6465 || info->export_dynamic
6468 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
6469 && (eh->elf.versioned >= versioned
6470 || !bfd_hide_sym_by_version (info->version_info,
6471 eh->elf.root.root.string)))))
6474 struct ppc_link_hash_entry *fh;
6476 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6478 /* Function descriptor syms cause the associated
6479 function code sym section to be marked. */
6480 fh = defined_code_entry (eh);
6483 code_sec = fh->elf.root.u.def.section;
6484 code_sec->flags |= SEC_KEEP;
6486 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6487 && opd_entry_value (eh->elf.root.u.def.section,
6488 eh->elf.root.u.def.value,
6489 &code_sec, NULL, FALSE) != (bfd_vma) -1)
6490 code_sec->flags |= SEC_KEEP;
6496 /* Return the section that should be marked against GC for a given
6500 ppc64_elf_gc_mark_hook (asection *sec,
6501 struct bfd_link_info *info,
6502 Elf_Internal_Rela *rel,
6503 struct elf_link_hash_entry *h,
6504 Elf_Internal_Sym *sym)
6508 /* Syms return NULL if we're marking .opd, so we avoid marking all
6509 function sections, as all functions are referenced in .opd. */
6511 if (get_opd_info (sec) != NULL)
6516 enum elf_ppc64_reloc_type r_type;
6517 struct ppc_link_hash_entry *eh, *fh, *fdh;
6519 r_type = ELF64_R_TYPE (rel->r_info);
6522 case R_PPC64_GNU_VTINHERIT:
6523 case R_PPC64_GNU_VTENTRY:
6527 switch (h->root.type)
6529 case bfd_link_hash_defined:
6530 case bfd_link_hash_defweak:
6531 eh = (struct ppc_link_hash_entry *) h;
6532 fdh = defined_func_desc (eh);
6535 /* -mcall-aixdesc code references the dot-symbol on
6536 a call reloc. Mark the function descriptor too
6537 against garbage collection. */
6539 if (fdh->elf.is_weakalias)
6540 weakdef (&fdh->elf)->mark = 1;
6544 /* Function descriptor syms cause the associated
6545 function code sym section to be marked. */
6546 fh = defined_code_entry (eh);
6549 /* They also mark their opd section. */
6550 eh->elf.root.u.def.section->gc_mark = 1;
6552 rsec = fh->elf.root.u.def.section;
6554 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6555 && opd_entry_value (eh->elf.root.u.def.section,
6556 eh->elf.root.u.def.value,
6557 &rsec, NULL, FALSE) != (bfd_vma) -1)
6558 eh->elf.root.u.def.section->gc_mark = 1;
6560 rsec = h->root.u.def.section;
6563 case bfd_link_hash_common:
6564 rsec = h->root.u.c.p->section;
6568 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
6574 struct _opd_sec_data *opd;
6576 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6577 opd = get_opd_info (rsec);
6578 if (opd != NULL && opd->func_sec != NULL)
6582 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
6589 /* The maximum size of .sfpr. */
6590 #define SFPR_MAX (218*4)
6592 struct sfpr_def_parms
6594 const char name[12];
6595 unsigned char lo, hi;
6596 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6597 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6600 /* Auto-generate _save*, _rest* functions in .sfpr.
6601 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6605 sfpr_define (struct bfd_link_info *info,
6606 const struct sfpr_def_parms *parm,
6609 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6611 size_t len = strlen (parm->name);
6612 bfd_boolean writing = FALSE;
6618 memcpy (sym, parm->name, len);
6621 for (i = parm->lo; i <= parm->hi; i++)
6623 struct ppc_link_hash_entry *h;
6625 sym[len + 0] = i / 10 + '0';
6626 sym[len + 1] = i % 10 + '0';
6627 h = (struct ppc_link_hash_entry *)
6628 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
6629 if (stub_sec != NULL)
6632 && h->elf.root.type == bfd_link_hash_defined
6633 && h->elf.root.u.def.section == htab->sfpr)
6635 struct elf_link_hash_entry *s;
6637 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6638 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6641 if (s->root.type == bfd_link_hash_new
6642 || (s->root.type = bfd_link_hash_defined
6643 && s->root.u.def.section == stub_sec))
6645 s->root.type = bfd_link_hash_defined;
6646 s->root.u.def.section = stub_sec;
6647 s->root.u.def.value = (stub_sec->size
6648 + h->elf.root.u.def.value);
6651 s->ref_regular_nonweak = 1;
6652 s->forced_local = 1;
6654 s->root.linker_def = 1;
6662 if (!h->elf.def_regular)
6664 h->elf.root.type = bfd_link_hash_defined;
6665 h->elf.root.u.def.section = htab->sfpr;
6666 h->elf.root.u.def.value = htab->sfpr->size;
6667 h->elf.type = STT_FUNC;
6668 h->elf.def_regular = 1;
6670 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6672 if (htab->sfpr->contents == NULL)
6674 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6675 if (htab->sfpr->contents == NULL)
6682 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6684 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6686 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6687 htab->sfpr->size = p - htab->sfpr->contents;
6695 savegpr0 (bfd *abfd, bfd_byte *p, int r)
6697 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6702 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6704 p = savegpr0 (abfd, p, r);
6705 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6707 bfd_put_32 (abfd, BLR, p);
6712 restgpr0 (bfd *abfd, bfd_byte *p, int r)
6714 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6719 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6721 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6723 p = restgpr0 (abfd, p, r);
6724 bfd_put_32 (abfd, MTLR_R0, p);
6728 p = restgpr0 (abfd, p, 30);
6729 p = restgpr0 (abfd, p, 31);
6731 bfd_put_32 (abfd, BLR, p);
6736 savegpr1 (bfd *abfd, bfd_byte *p, int r)
6738 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6743 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6745 p = savegpr1 (abfd, p, r);
6746 bfd_put_32 (abfd, BLR, p);
6751 restgpr1 (bfd *abfd, bfd_byte *p, int r)
6753 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6758 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6760 p = restgpr1 (abfd, p, r);
6761 bfd_put_32 (abfd, BLR, p);
6766 savefpr (bfd *abfd, bfd_byte *p, int r)
6768 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6773 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6775 p = savefpr (abfd, p, r);
6776 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
6778 bfd_put_32 (abfd, BLR, p);
6783 restfpr (bfd *abfd, bfd_byte *p, int r)
6785 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6790 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6792 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
6794 p = restfpr (abfd, p, r);
6795 bfd_put_32 (abfd, MTLR_R0, p);
6799 p = restfpr (abfd, p, 30);
6800 p = restfpr (abfd, p, 31);
6802 bfd_put_32 (abfd, BLR, p);
6807 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6809 p = savefpr (abfd, p, r);
6810 bfd_put_32 (abfd, BLR, p);
6815 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6817 p = restfpr (abfd, p, r);
6818 bfd_put_32 (abfd, BLR, p);
6823 savevr (bfd *abfd, bfd_byte *p, int r)
6825 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6827 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6832 savevr_tail (bfd *abfd, bfd_byte *p, int r)
6834 p = savevr (abfd, p, r);
6835 bfd_put_32 (abfd, BLR, p);
6840 restvr (bfd *abfd, bfd_byte *p, int r)
6842 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6844 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6849 restvr_tail (bfd *abfd, bfd_byte *p, int r)
6851 p = restvr (abfd, p, r);
6852 bfd_put_32 (abfd, BLR, p);
6856 /* Called via elf_link_hash_traverse to transfer dynamic linking
6857 information on function code symbol entries to their corresponding
6858 function descriptor symbol entries. */
6861 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
6863 struct bfd_link_info *info;
6864 struct ppc_link_hash_table *htab;
6865 struct ppc_link_hash_entry *fh;
6866 struct ppc_link_hash_entry *fdh;
6867 bfd_boolean force_local;
6869 fh = (struct ppc_link_hash_entry *) h;
6870 if (fh->elf.root.type == bfd_link_hash_indirect)
6876 if (fh->elf.root.root.string[0] != '.'
6877 || fh->elf.root.root.string[1] == '\0')
6881 htab = ppc_hash_table (info);
6885 /* Find the corresponding function descriptor symbol. */
6886 fdh = lookup_fdh (fh, htab);
6888 /* Resolve undefined references to dot-symbols as the value
6889 in the function descriptor, if we have one in a regular object.
6890 This is to satisfy cases like ".quad .foo". Calls to functions
6891 in dynamic objects are handled elsewhere. */
6892 if ((fh->elf.root.type == bfd_link_hash_undefined
6893 || fh->elf.root.type == bfd_link_hash_undefweak)
6894 && (fdh->elf.root.type == bfd_link_hash_defined
6895 || fdh->elf.root.type == bfd_link_hash_defweak)
6896 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6897 && opd_entry_value (fdh->elf.root.u.def.section,
6898 fdh->elf.root.u.def.value,
6899 &fh->elf.root.u.def.section,
6900 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
6902 fh->elf.root.type = fdh->elf.root.type;
6903 fh->elf.forced_local = 1;
6904 fh->elf.def_regular = fdh->elf.def_regular;
6905 fh->elf.def_dynamic = fdh->elf.def_dynamic;
6908 if (!fh->elf.dynamic)
6910 struct plt_entry *ent;
6912 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6913 if (ent->plt.refcount > 0)
6919 /* Create a descriptor as undefined if necessary. */
6921 && !bfd_link_executable (info)
6922 && (fh->elf.root.type == bfd_link_hash_undefined
6923 || fh->elf.root.type == bfd_link_hash_undefweak))
6925 fdh = make_fdh (info, fh);
6930 /* We can't support overriding of symbols on a fake descriptor. */
6933 && (fh->elf.root.type == bfd_link_hash_defined
6934 || fh->elf.root.type == bfd_link_hash_defweak))
6935 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
6937 /* Transfer dynamic linking information to the function descriptor. */
6940 fdh->elf.ref_regular |= fh->elf.ref_regular;
6941 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6942 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6943 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
6944 fdh->elf.dynamic |= fh->elf.dynamic;
6945 fdh->elf.needs_plt |= (fh->elf.needs_plt
6946 || fh->elf.type == STT_FUNC
6947 || fh->elf.type == STT_GNU_IFUNC);
6948 move_plt_plist (fh, fdh);
6950 if (!fdh->elf.forced_local
6951 && fh->elf.dynindx != -1)
6952 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6956 /* Now that the info is on the function descriptor, clear the
6957 function code sym info. Any function code syms for which we
6958 don't have a definition in a regular file, we force local.
6959 This prevents a shared library from exporting syms that have
6960 been imported from another library. Function code syms that
6961 are really in the library we must leave global to prevent the
6962 linker dragging in a definition from a static library. */
6963 force_local = (!fh->elf.def_regular
6965 || !fdh->elf.def_regular
6966 || fdh->elf.forced_local);
6967 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6972 static const struct sfpr_def_parms save_res_funcs[] =
6974 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6975 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6976 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6977 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6978 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6979 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6980 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6981 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6982 { "._savef", 14, 31, savefpr, savefpr1_tail },
6983 { "._restf", 14, 31, restfpr, restfpr1_tail },
6984 { "_savevr_", 20, 31, savevr, savevr_tail },
6985 { "_restvr_", 20, 31, restvr, restvr_tail }
6988 /* Called near the start of bfd_elf_size_dynamic_sections. We use
6989 this hook to a) provide some gcc support functions, and b) transfer
6990 dynamic linking information gathered so far on function code symbol
6991 entries, to their corresponding function descriptor symbol entries. */
6994 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6995 struct bfd_link_info *info)
6997 struct ppc_link_hash_table *htab;
6999 htab = ppc_hash_table (info);
7003 /* Provide any missing _save* and _rest* functions. */
7004 if (htab->sfpr != NULL)
7008 htab->sfpr->size = 0;
7009 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7010 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7012 if (htab->sfpr->size == 0)
7013 htab->sfpr->flags |= SEC_EXCLUDE;
7016 if (bfd_link_relocatable (info))
7019 if (htab->elf.hgot != NULL)
7021 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7022 /* Make .TOC. defined so as to prevent it being made dynamic.
7023 The wrong value here is fixed later in ppc64_elf_set_toc. */
7024 if (!htab->elf.hgot->def_regular
7025 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7027 htab->elf.hgot->root.type = bfd_link_hash_defined;
7028 htab->elf.hgot->root.u.def.value = 0;
7029 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7030 htab->elf.hgot->def_regular = 1;
7031 htab->elf.hgot->root.linker_def = 1;
7033 htab->elf.hgot->type = STT_OBJECT;
7034 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7038 if (htab->need_func_desc_adj)
7040 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7041 htab->need_func_desc_adj = 0;
7047 /* Find dynamic relocs for H that apply to read-only sections. */
7050 readonly_dynrelocs (struct elf_link_hash_entry *h)
7052 struct ppc_link_hash_entry *eh;
7053 struct elf_dyn_relocs *p;
7055 eh = (struct ppc_link_hash_entry *) h;
7056 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7058 asection *s = p->sec->output_section;
7060 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7066 /* Return true if we have dynamic relocs against H or any of its weak
7067 aliases, that apply to read-only sections. Cannot be used after
7068 size_dynamic_sections. */
7071 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7073 struct ppc_link_hash_entry *eh;
7075 eh = (struct ppc_link_hash_entry *) h;
7078 if (readonly_dynrelocs (&eh->elf))
7080 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
7081 } while (eh != NULL && &eh->elf != h);
7086 /* Return whether EH has pc-relative dynamic relocs. */
7089 pc_dynrelocs (struct ppc_link_hash_entry *eh)
7091 struct elf_dyn_relocs *p;
7093 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7094 if (p->pc_count != 0)
7099 /* Return true if a global entry stub will be created for H. Valid
7100 for ELFv2 before plt entries have been allocated. */
7103 global_entry_stub (struct elf_link_hash_entry *h)
7105 struct plt_entry *pent;
7107 if (!h->pointer_equality_needed
7111 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7112 if (pent->plt.refcount > 0
7113 && pent->addend == 0)
7119 /* Adjust a symbol defined by a dynamic object and referenced by a
7120 regular object. The current definition is in some section of the
7121 dynamic object, but we're not including those sections. We have to
7122 change the definition to something the rest of the link can
7126 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7127 struct elf_link_hash_entry *h)
7129 struct ppc_link_hash_table *htab;
7132 htab = ppc_hash_table (info);
7136 /* Deal with function syms. */
7137 if (h->type == STT_FUNC
7138 || h->type == STT_GNU_IFUNC
7141 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
7142 || SYMBOL_CALLS_LOCAL (info, h)
7143 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
7144 /* Discard dyn_relocs when non-pic if we've decided that a
7145 function symbol is local and not an ifunc. We keep dynamic
7146 relocs for ifuncs when local rather than always emitting a
7147 plt call stub for them and defining the symbol on the call
7148 stub. We can't do that for ELFv1 anyway (a function symbol
7149 is defined on a descriptor, not code) and it can be faster at
7150 run-time due to not needing to bounce through a stub. The
7151 dyn_relocs for ifuncs will be applied even in a static
7153 if (!bfd_link_pic (info)
7154 && h->type != STT_GNU_IFUNC
7156 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7158 /* Clear procedure linkage table information for any symbol that
7159 won't need a .plt entry. */
7160 struct plt_entry *ent;
7161 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7162 if (ent->plt.refcount > 0)
7165 || (h->type != STT_GNU_IFUNC && local))
7167 h->plt.plist = NULL;
7169 h->pointer_equality_needed = 0;
7171 else if (abiversion (info->output_bfd) >= 2)
7173 /* Taking a function's address in a read/write section
7174 doesn't require us to define the function symbol in the
7175 executable on a global entry stub. A dynamic reloc can
7176 be used instead. The reason we prefer a few more dynamic
7177 relocs is that calling via a global entry stub costs a
7178 few more instructions, and pointer_equality_needed causes
7179 extra work in ld.so when resolving these symbols. */
7180 if (global_entry_stub (h))
7182 if (!readonly_dynrelocs (h))
7184 h->pointer_equality_needed = 0;
7185 /* If we haven't seen a branch reloc then we don't need
7188 h->plt.plist = NULL;
7190 else if (!bfd_link_pic (info))
7191 /* We are going to be defining the function symbol on the
7192 plt stub, so no dyn_relocs needed when non-pic. */
7193 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7196 /* ELFv2 function symbols can't have copy relocs. */
7199 else if (!h->needs_plt
7200 && !readonly_dynrelocs (h))
7202 /* If we haven't seen a branch reloc then we don't need a
7204 h->plt.plist = NULL;
7205 h->pointer_equality_needed = 0;
7210 h->plt.plist = NULL;
7212 /* If this is a weak symbol, and there is a real definition, the
7213 processor independent code will have arranged for us to see the
7214 real definition first, and we can just use the same value. */
7215 if (h->is_weakalias)
7217 struct elf_link_hash_entry *def = weakdef (h);
7218 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
7219 h->root.u.def.section = def->root.u.def.section;
7220 h->root.u.def.value = def->root.u.def.value;
7221 if (def->root.u.def.section == htab->elf.sdynbss
7222 || def->root.u.def.section == htab->elf.sdynrelro)
7223 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7227 /* If we are creating a shared library, we must presume that the
7228 only references to the symbol are via the global offset table.
7229 For such cases we need not do anything here; the relocations will
7230 be handled correctly by relocate_section. */
7231 if (bfd_link_pic (info))
7234 /* If there are no references to this symbol that do not use the
7235 GOT, we don't need to generate a copy reloc. */
7236 if (!h->non_got_ref)
7239 /* Don't generate a copy reloc for symbols defined in the executable. */
7240 if (!h->def_dynamic || !h->ref_regular || h->def_regular
7242 /* If -z nocopyreloc was given, don't generate them either. */
7243 || info->nocopyreloc
7245 /* If we don't find any dynamic relocs in read-only sections, then
7246 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7247 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
7249 /* Protected variables do not work with .dynbss. The copy in
7250 .dynbss won't be used by the shared library with the protected
7251 definition for the variable. Text relocations are preferable
7252 to an incorrect program. */
7253 || h->protected_def)
7256 if (h->plt.plist != NULL)
7258 /* We should never get here, but unfortunately there are versions
7259 of gcc out there that improperly (for this ABI) put initialized
7260 function pointers, vtable refs and suchlike in read-only
7261 sections. Allow them to proceed, but warn that this might
7262 break at runtime. */
7263 info->callbacks->einfo
7264 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
7265 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7266 h->root.root.string);
7269 /* This is a reference to a symbol defined by a dynamic object which
7270 is not a function. */
7272 /* We must allocate the symbol in our .dynbss section, which will
7273 become part of the .bss section of the executable. There will be
7274 an entry for this symbol in the .dynsym section. The dynamic
7275 object will contain position independent code, so all references
7276 from the dynamic object to this symbol will go through the global
7277 offset table. The dynamic linker will use the .dynsym entry to
7278 determine the address it must put in the global offset table, so
7279 both the dynamic object and the regular object will refer to the
7280 same memory location for the variable. */
7281 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
7283 s = htab->elf.sdynrelro;
7284 srel = htab->elf.sreldynrelro;
7288 s = htab->elf.sdynbss;
7289 srel = htab->elf.srelbss;
7291 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
7293 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
7294 linker to copy the initial value out of the dynamic object
7295 and into the runtime process image. */
7296 srel->size += sizeof (Elf64_External_Rela);
7300 /* We no longer want dyn_relocs. */
7301 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7302 return _bfd_elf_adjust_dynamic_copy (info, h, s);
7305 /* If given a function descriptor symbol, hide both the function code
7306 sym and the descriptor. */
7308 ppc64_elf_hide_symbol (struct bfd_link_info *info,
7309 struct elf_link_hash_entry *h,
7310 bfd_boolean force_local)
7312 struct ppc_link_hash_entry *eh;
7313 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7315 eh = (struct ppc_link_hash_entry *) h;
7316 if (eh->is_func_descriptor)
7318 struct ppc_link_hash_entry *fh = eh->oh;
7323 struct elf_link_hash_table *htab = elf_hash_table (info);
7326 /* We aren't supposed to use alloca in BFD because on
7327 systems which do not have alloca the version in libiberty
7328 calls xmalloc, which might cause the program to crash
7329 when it runs out of memory. This function doesn't have a
7330 return status, so there's no way to gracefully return an
7331 error. So cheat. We know that string[-1] can be safely
7332 accessed; It's either a string in an ELF string table,
7333 or allocated in an objalloc structure. */
7335 p = eh->elf.root.root.string - 1;
7338 fh = (struct ppc_link_hash_entry *)
7339 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7342 /* Unfortunately, if it so happens that the string we were
7343 looking for was allocated immediately before this string,
7344 then we overwrote the string terminator. That's the only
7345 reason the lookup should fail. */
7348 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7349 while (q >= eh->elf.root.root.string && *q == *p)
7351 if (q < eh->elf.root.root.string && *p == '.')
7352 fh = (struct ppc_link_hash_entry *)
7353 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
7362 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7367 get_sym_h (struct elf_link_hash_entry **hp,
7368 Elf_Internal_Sym **symp,
7370 unsigned char **tls_maskp,
7371 Elf_Internal_Sym **locsymsp,
7372 unsigned long r_symndx,
7375 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7377 if (r_symndx >= symtab_hdr->sh_info)
7379 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7380 struct elf_link_hash_entry *h;
7382 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7383 h = elf_follow_link (h);
7391 if (symsecp != NULL)
7393 asection *symsec = NULL;
7394 if (h->root.type == bfd_link_hash_defined
7395 || h->root.type == bfd_link_hash_defweak)
7396 symsec = h->root.u.def.section;
7400 if (tls_maskp != NULL)
7402 struct ppc_link_hash_entry *eh;
7404 eh = (struct ppc_link_hash_entry *) h;
7405 *tls_maskp = &eh->tls_mask;
7410 Elf_Internal_Sym *sym;
7411 Elf_Internal_Sym *locsyms = *locsymsp;
7413 if (locsyms == NULL)
7415 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7416 if (locsyms == NULL)
7417 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7418 symtab_hdr->sh_info,
7419 0, NULL, NULL, NULL);
7420 if (locsyms == NULL)
7422 *locsymsp = locsyms;
7424 sym = locsyms + r_symndx;
7432 if (symsecp != NULL)
7433 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
7435 if (tls_maskp != NULL)
7437 struct got_entry **lgot_ents;
7438 unsigned char *tls_mask;
7441 lgot_ents = elf_local_got_ents (ibfd);
7442 if (lgot_ents != NULL)
7444 struct plt_entry **local_plt = (struct plt_entry **)
7445 (lgot_ents + symtab_hdr->sh_info);
7446 unsigned char *lgot_masks = (unsigned char *)
7447 (local_plt + symtab_hdr->sh_info);
7448 tls_mask = &lgot_masks[r_symndx];
7450 *tls_maskp = tls_mask;
7456 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7457 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7458 type suitable for optimization, and 1 otherwise. */
7461 get_tls_mask (unsigned char **tls_maskp,
7462 unsigned long *toc_symndx,
7463 bfd_vma *toc_addend,
7464 Elf_Internal_Sym **locsymsp,
7465 const Elf_Internal_Rela *rel,
7468 unsigned long r_symndx;
7470 struct elf_link_hash_entry *h;
7471 Elf_Internal_Sym *sym;
7475 r_symndx = ELF64_R_SYM (rel->r_info);
7476 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7479 if ((*tls_maskp != NULL && **tls_maskp != 0)
7481 || ppc64_elf_section_data (sec) == NULL
7482 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
7485 /* Look inside a TOC section too. */
7488 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7489 off = h->root.u.def.value;
7492 off = sym->st_value;
7493 off += rel->r_addend;
7494 BFD_ASSERT (off % 8 == 0);
7495 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7496 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
7497 if (toc_symndx != NULL)
7498 *toc_symndx = r_symndx;
7499 if (toc_addend != NULL)
7500 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7501 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7503 if ((h == NULL || is_static_defined (h))
7504 && (next_r == -1 || next_r == -2))
7509 /* Find (or create) an entry in the tocsave hash table. */
7511 static struct tocsave_entry *
7512 tocsave_find (struct ppc_link_hash_table *htab,
7513 enum insert_option insert,
7514 Elf_Internal_Sym **local_syms,
7515 const Elf_Internal_Rela *irela,
7518 unsigned long r_indx;
7519 struct elf_link_hash_entry *h;
7520 Elf_Internal_Sym *sym;
7521 struct tocsave_entry ent, *p;
7523 struct tocsave_entry **slot;
7525 r_indx = ELF64_R_SYM (irela->r_info);
7526 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7528 if (ent.sec == NULL || ent.sec->output_section == NULL)
7531 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
7536 ent.offset = h->root.u.def.value;
7538 ent.offset = sym->st_value;
7539 ent.offset += irela->r_addend;
7541 hash = tocsave_htab_hash (&ent);
7542 slot = ((struct tocsave_entry **)
7543 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7549 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7558 /* Adjust all global syms defined in opd sections. In gcc generated
7559 code for the old ABI, these will already have been done. */
7562 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7564 struct ppc_link_hash_entry *eh;
7566 struct _opd_sec_data *opd;
7568 if (h->root.type == bfd_link_hash_indirect)
7571 if (h->root.type != bfd_link_hash_defined
7572 && h->root.type != bfd_link_hash_defweak)
7575 eh = (struct ppc_link_hash_entry *) h;
7576 if (eh->adjust_done)
7579 sym_sec = eh->elf.root.u.def.section;
7580 opd = get_opd_info (sym_sec);
7581 if (opd != NULL && opd->adjust != NULL)
7583 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
7586 /* This entry has been deleted. */
7587 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
7590 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
7591 if (discarded_section (dsec))
7593 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
7597 eh->elf.root.u.def.value = 0;
7598 eh->elf.root.u.def.section = dsec;
7601 eh->elf.root.u.def.value += adjust;
7602 eh->adjust_done = 1;
7607 /* Handles decrementing dynamic reloc counts for the reloc specified by
7608 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7609 have already been determined. */
7612 dec_dynrel_count (bfd_vma r_info,
7614 struct bfd_link_info *info,
7615 Elf_Internal_Sym **local_syms,
7616 struct elf_link_hash_entry *h,
7617 Elf_Internal_Sym *sym)
7619 enum elf_ppc64_reloc_type r_type;
7620 asection *sym_sec = NULL;
7622 /* Can this reloc be dynamic? This switch, and later tests here
7623 should be kept in sync with the code in check_relocs. */
7624 r_type = ELF64_R_TYPE (r_info);
7630 case R_PPC64_TPREL16:
7631 case R_PPC64_TPREL16_LO:
7632 case R_PPC64_TPREL16_HI:
7633 case R_PPC64_TPREL16_HA:
7634 case R_PPC64_TPREL16_DS:
7635 case R_PPC64_TPREL16_LO_DS:
7636 case R_PPC64_TPREL16_HIGH:
7637 case R_PPC64_TPREL16_HIGHA:
7638 case R_PPC64_TPREL16_HIGHER:
7639 case R_PPC64_TPREL16_HIGHERA:
7640 case R_PPC64_TPREL16_HIGHEST:
7641 case R_PPC64_TPREL16_HIGHESTA:
7642 case R_PPC64_TPREL64:
7643 case R_PPC64_DTPMOD64:
7644 case R_PPC64_DTPREL64:
7645 case R_PPC64_ADDR64:
7649 case R_PPC64_ADDR14:
7650 case R_PPC64_ADDR14_BRNTAKEN:
7651 case R_PPC64_ADDR14_BRTAKEN:
7652 case R_PPC64_ADDR16:
7653 case R_PPC64_ADDR16_DS:
7654 case R_PPC64_ADDR16_HA:
7655 case R_PPC64_ADDR16_HI:
7656 case R_PPC64_ADDR16_HIGH:
7657 case R_PPC64_ADDR16_HIGHA:
7658 case R_PPC64_ADDR16_HIGHER:
7659 case R_PPC64_ADDR16_HIGHERA:
7660 case R_PPC64_ADDR16_HIGHEST:
7661 case R_PPC64_ADDR16_HIGHESTA:
7662 case R_PPC64_ADDR16_LO:
7663 case R_PPC64_ADDR16_LO_DS:
7664 case R_PPC64_ADDR24:
7665 case R_PPC64_ADDR32:
7666 case R_PPC64_UADDR16:
7667 case R_PPC64_UADDR32:
7668 case R_PPC64_UADDR64:
7673 if (local_syms != NULL)
7675 unsigned long r_symndx;
7676 bfd *ibfd = sec->owner;
7678 r_symndx = ELF64_R_SYM (r_info);
7679 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7683 if ((bfd_link_pic (info)
7684 && (must_be_dyn_reloc (info, r_type)
7686 && (!SYMBOLIC_BIND (info, h)
7687 || h->root.type == bfd_link_hash_defweak
7688 || !h->def_regular))))
7689 || (ELIMINATE_COPY_RELOCS
7690 && !bfd_link_pic (info)
7692 && (h->root.type == bfd_link_hash_defweak
7693 || !h->def_regular)))
7700 struct elf_dyn_relocs *p;
7701 struct elf_dyn_relocs **pp;
7702 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7704 /* elf_gc_sweep may have already removed all dyn relocs associated
7705 with local syms for a given section. Also, symbol flags are
7706 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7707 report a dynreloc miscount. */
7708 if (*pp == NULL && info->gc_sections)
7711 while ((p = *pp) != NULL)
7715 if (!must_be_dyn_reloc (info, r_type))
7727 struct ppc_dyn_relocs *p;
7728 struct ppc_dyn_relocs **pp;
7730 bfd_boolean is_ifunc;
7732 if (local_syms == NULL)
7733 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7734 if (sym_sec == NULL)
7737 vpp = &elf_section_data (sym_sec)->local_dynrel;
7738 pp = (struct ppc_dyn_relocs **) vpp;
7740 if (*pp == NULL && info->gc_sections)
7743 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7744 while ((p = *pp) != NULL)
7746 if (p->sec == sec && p->ifunc == is_ifunc)
7757 /* xgettext:c-format */
7758 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7760 bfd_set_error (bfd_error_bad_value);
7764 /* Remove unused Official Procedure Descriptor entries. Currently we
7765 only remove those associated with functions in discarded link-once
7766 sections, or weakly defined functions that have been overridden. It
7767 would be possible to remove many more entries for statically linked
7771 ppc64_elf_edit_opd (struct bfd_link_info *info)
7774 bfd_boolean some_edited = FALSE;
7775 asection *need_pad = NULL;
7776 struct ppc_link_hash_table *htab;
7778 htab = ppc_hash_table (info);
7782 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7785 Elf_Internal_Rela *relstart, *rel, *relend;
7786 Elf_Internal_Shdr *symtab_hdr;
7787 Elf_Internal_Sym *local_syms;
7788 struct _opd_sec_data *opd;
7789 bfd_boolean need_edit, add_aux_fields, broken;
7790 bfd_size_type cnt_16b = 0;
7792 if (!is_ppc64_elf (ibfd))
7795 sec = bfd_get_section_by_name (ibfd, ".opd");
7796 if (sec == NULL || sec->size == 0)
7799 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
7802 if (sec->output_section == bfd_abs_section_ptr)
7805 /* Look through the section relocs. */
7806 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7810 symtab_hdr = &elf_symtab_hdr (ibfd);
7812 /* Read the relocations. */
7813 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7815 if (relstart == NULL)
7818 /* First run through the relocs to check they are sane, and to
7819 determine whether we need to edit this opd section. */
7823 relend = relstart + sec->reloc_count;
7824 for (rel = relstart; rel < relend; )
7826 enum elf_ppc64_reloc_type r_type;
7827 unsigned long r_symndx;
7829 struct elf_link_hash_entry *h;
7830 Elf_Internal_Sym *sym;
7833 /* .opd contains an array of 16 or 24 byte entries. We're
7834 only interested in the reloc pointing to a function entry
7836 offset = rel->r_offset;
7837 if (rel + 1 == relend
7838 || rel[1].r_offset != offset + 8)
7840 /* If someone messes with .opd alignment then after a
7841 "ld -r" we might have padding in the middle of .opd.
7842 Also, there's nothing to prevent someone putting
7843 something silly in .opd with the assembler. No .opd
7844 optimization for them! */
7847 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
7852 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7853 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7856 /* xgettext:c-format */
7857 (_("%pB: unexpected reloc type %u in .opd section"),
7863 r_symndx = ELF64_R_SYM (rel->r_info);
7864 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7868 if (sym_sec == NULL || sym_sec->owner == NULL)
7870 const char *sym_name;
7872 sym_name = h->root.root.string;
7874 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7878 /* xgettext:c-format */
7879 (_("%pB: undefined sym `%s' in .opd section"),
7885 /* opd entries are always for functions defined in the
7886 current input bfd. If the symbol isn't defined in the
7887 input bfd, then we won't be using the function in this
7888 bfd; It must be defined in a linkonce section in another
7889 bfd, or is weak. It's also possible that we are
7890 discarding the function due to a linker script /DISCARD/,
7891 which we test for via the output_section. */
7892 if (sym_sec->owner != ibfd
7893 || sym_sec->output_section == bfd_abs_section_ptr)
7897 if (rel + 1 == relend
7898 || (rel + 2 < relend
7899 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7904 if (sec->size == offset + 24)
7909 if (sec->size == offset + 16)
7916 else if (rel + 1 < relend
7917 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7918 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7920 if (rel[0].r_offset == offset + 16)
7922 else if (rel[0].r_offset != offset + 24)
7929 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
7931 if (!broken && (need_edit || add_aux_fields))
7933 Elf_Internal_Rela *write_rel;
7934 Elf_Internal_Shdr *rel_hdr;
7935 bfd_byte *rptr, *wptr;
7936 bfd_byte *new_contents;
7939 new_contents = NULL;
7940 amt = OPD_NDX (sec->size) * sizeof (long);
7941 opd = &ppc64_elf_section_data (sec)->u.opd;
7942 opd->adjust = bfd_zalloc (sec->owner, amt);
7943 if (opd->adjust == NULL)
7946 /* This seems a waste of time as input .opd sections are all
7947 zeros as generated by gcc, but I suppose there's no reason
7948 this will always be so. We might start putting something in
7949 the third word of .opd entries. */
7950 if ((sec->flags & SEC_IN_MEMORY) == 0)
7953 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
7958 if (local_syms != NULL
7959 && symtab_hdr->contents != (unsigned char *) local_syms)
7961 if (elf_section_data (sec)->relocs != relstart)
7965 sec->contents = loc;
7966 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7969 elf_section_data (sec)->relocs = relstart;
7971 new_contents = sec->contents;
7974 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7975 if (new_contents == NULL)
7979 wptr = new_contents;
7980 rptr = sec->contents;
7981 write_rel = relstart;
7982 for (rel = relstart; rel < relend; )
7984 unsigned long r_symndx;
7986 struct elf_link_hash_entry *h;
7987 struct ppc_link_hash_entry *fdh = NULL;
7988 Elf_Internal_Sym *sym;
7990 Elf_Internal_Rela *next_rel;
7993 r_symndx = ELF64_R_SYM (rel->r_info);
7994 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7999 if (next_rel + 1 == relend
8000 || (next_rel + 2 < relend
8001 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8004 /* See if the .opd entry is full 24 byte or
8005 16 byte (with fd_aux entry overlapped with next
8008 if (next_rel == relend)
8010 if (sec->size == rel->r_offset + 16)
8013 else if (next_rel->r_offset == rel->r_offset + 16)
8017 && h->root.root.string[0] == '.')
8019 fdh = ((struct ppc_link_hash_entry *) h)->oh;
8022 fdh = ppc_follow_link (fdh);
8023 if (fdh->elf.root.type != bfd_link_hash_defined
8024 && fdh->elf.root.type != bfd_link_hash_defweak)
8029 skip = (sym_sec->owner != ibfd
8030 || sym_sec->output_section == bfd_abs_section_ptr);
8033 if (fdh != NULL && sym_sec->owner == ibfd)
8035 /* Arrange for the function descriptor sym
8037 fdh->elf.root.u.def.value = 0;
8038 fdh->elf.root.u.def.section = sym_sec;
8040 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
8042 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
8047 if (!dec_dynrel_count (rel->r_info, sec, info,
8051 if (++rel == next_rel)
8054 r_symndx = ELF64_R_SYM (rel->r_info);
8055 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8062 /* We'll be keeping this opd entry. */
8067 /* Redefine the function descriptor symbol to
8068 this location in the opd section. It is
8069 necessary to update the value here rather
8070 than using an array of adjustments as we do
8071 for local symbols, because various places
8072 in the generic ELF code use the value
8073 stored in u.def.value. */
8074 fdh->elf.root.u.def.value = wptr - new_contents;
8075 fdh->adjust_done = 1;
8078 /* Local syms are a bit tricky. We could
8079 tweak them as they can be cached, but
8080 we'd need to look through the local syms
8081 for the function descriptor sym which we
8082 don't have at the moment. So keep an
8083 array of adjustments. */
8084 adjust = (wptr - new_contents) - (rptr - sec->contents);
8085 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8088 memcpy (wptr, rptr, opd_ent_size);
8089 wptr += opd_ent_size;
8090 if (add_aux_fields && opd_ent_size == 16)
8092 memset (wptr, '\0', 8);
8096 /* We need to adjust any reloc offsets to point to the
8098 for ( ; rel != next_rel; ++rel)
8100 rel->r_offset += adjust;
8101 if (write_rel != rel)
8102 memcpy (write_rel, rel, sizeof (*rel));
8107 rptr += opd_ent_size;
8110 sec->size = wptr - new_contents;
8111 sec->reloc_count = write_rel - relstart;
8114 free (sec->contents);
8115 sec->contents = new_contents;
8118 /* Fudge the header size too, as this is used later in
8119 elf_bfd_final_link if we are emitting relocs. */
8120 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8121 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
8124 else if (elf_section_data (sec)->relocs != relstart)
8127 if (local_syms != NULL
8128 && symtab_hdr->contents != (unsigned char *) local_syms)
8130 if (!info->keep_memory)
8133 symtab_hdr->contents = (unsigned char *) local_syms;
8138 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8140 /* If we are doing a final link and the last .opd entry is just 16 byte
8141 long, add a 8 byte padding after it. */
8142 if (need_pad != NULL && !bfd_link_relocatable (info))
8146 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8148 BFD_ASSERT (need_pad->size > 0);
8150 p = bfd_malloc (need_pad->size + 8);
8154 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8155 p, 0, need_pad->size))
8158 need_pad->contents = p;
8159 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8163 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8167 need_pad->contents = p;
8170 memset (need_pad->contents + need_pad->size, 0, 8);
8171 need_pad->size += 8;
8177 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8180 ppc64_elf_tls_setup (struct bfd_link_info *info)
8182 struct ppc_link_hash_table *htab;
8184 htab = ppc_hash_table (info);
8188 if (abiversion (info->output_bfd) == 1)
8191 if (htab->params->no_multi_toc)
8192 htab->do_multi_toc = 0;
8193 else if (!htab->do_multi_toc)
8194 htab->params->no_multi_toc = 1;
8196 /* Default to --no-plt-localentry, as this option can cause problems
8197 with symbol interposition. For example, glibc libpthread.so and
8198 libc.so duplicate many pthread symbols, with a fallback
8199 implementation in libc.so. In some cases the fallback does more
8200 work than the pthread implementation. __pthread_condattr_destroy
8201 is one such symbol: the libpthread.so implementation is
8202 localentry:0 while the libc.so implementation is localentry:8.
8203 An app that "cleverly" uses dlopen to only load necessary
8204 libraries at runtime may omit loading libpthread.so when not
8205 running multi-threaded, which then results in the libc.so
8206 fallback symbols being used and ld.so complaining. Now there
8207 are workarounds in ld (see non_zero_localentry) to detect the
8208 pthread situation, but that may not be the only case where
8209 --plt-localentry can cause trouble. */
8210 if (htab->params->plt_localentry0 < 0)
8211 htab->params->plt_localentry0 = 0;
8212 if (htab->params->plt_localentry0
8213 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
8214 FALSE, FALSE, FALSE) == NULL)
8216 (_("warning: --plt-localentry is especially dangerous without "
8217 "ld.so support to detect ABI violations"));
8219 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8220 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8221 FALSE, FALSE, TRUE));
8222 /* Move dynamic linking info to the function descriptor sym. */
8223 if (htab->tls_get_addr != NULL)
8224 func_desc_adjust (&htab->tls_get_addr->elf, info);
8225 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8226 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8227 FALSE, FALSE, TRUE));
8228 if (htab->params->tls_get_addr_opt)
8230 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8232 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8233 FALSE, FALSE, TRUE);
8235 func_desc_adjust (opt, info);
8236 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8237 FALSE, FALSE, TRUE);
8239 && (opt_fd->root.type == bfd_link_hash_defined
8240 || opt_fd->root.type == bfd_link_hash_defweak))
8242 /* If glibc supports an optimized __tls_get_addr call stub,
8243 signalled by the presence of __tls_get_addr_opt, and we'll
8244 be calling __tls_get_addr via a plt call stub, then
8245 make __tls_get_addr point to __tls_get_addr_opt. */
8246 tga_fd = &htab->tls_get_addr_fd->elf;
8247 if (htab->elf.dynamic_sections_created
8249 && (tga_fd->type == STT_FUNC
8250 || tga_fd->needs_plt)
8251 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8252 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
8254 struct plt_entry *ent;
8256 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8257 if (ent->plt.refcount > 0)
8261 tga_fd->root.type = bfd_link_hash_indirect;
8262 tga_fd->root.u.i.link = &opt_fd->root;
8263 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
8265 if (opt_fd->dynindx != -1)
8267 /* Use __tls_get_addr_opt in dynamic relocations. */
8268 opt_fd->dynindx = -1;
8269 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8270 opt_fd->dynstr_index);
8271 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
8274 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8275 tga = &htab->tls_get_addr->elf;
8276 if (opt != NULL && tga != NULL)
8278 tga->root.type = bfd_link_hash_indirect;
8279 tga->root.u.i.link = &opt->root;
8280 ppc64_elf_copy_indirect_symbol (info, opt, tga);
8282 _bfd_elf_link_hash_hide_symbol (info, opt,
8284 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8286 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8287 htab->tls_get_addr_fd->is_func_descriptor = 1;
8288 if (htab->tls_get_addr != NULL)
8290 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8291 htab->tls_get_addr->is_func = 1;
8296 else if (htab->params->tls_get_addr_opt < 0)
8297 htab->params->tls_get_addr_opt = 0;
8299 return _bfd_elf_tls_setup (info->output_bfd, info);
8302 /* Return TRUE iff REL is a branch reloc with a global symbol matching
8306 branch_reloc_hash_match (const bfd *ibfd,
8307 const Elf_Internal_Rela *rel,
8308 const struct ppc_link_hash_entry *hash1,
8309 const struct ppc_link_hash_entry *hash2)
8311 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8312 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8313 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8315 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8317 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8318 struct elf_link_hash_entry *h;
8320 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8321 h = elf_follow_link (h);
8322 if (h == &hash1->elf || h == &hash2->elf)
8328 /* Run through all the TLS relocs looking for optimization
8329 opportunities. The linker has been hacked (see ppc64elf.em) to do
8330 a preliminary section layout so that we know the TLS segment
8331 offsets. We can't optimize earlier because some optimizations need
8332 to know the tp offset, and we need to optimize before allocating
8333 dynamic relocations. */
8336 ppc64_elf_tls_optimize (struct bfd_link_info *info)
8340 struct ppc_link_hash_table *htab;
8341 unsigned char *toc_ref;
8344 if (!bfd_link_executable (info))
8347 htab = ppc_hash_table (info);
8351 /* Make two passes over the relocs. On the first pass, mark toc
8352 entries involved with tls relocs, and check that tls relocs
8353 involved in setting up a tls_get_addr call are indeed followed by
8354 such a call. If they are not, we can't do any tls optimization.
8355 On the second pass twiddle tls_mask flags to notify
8356 relocate_section that optimization can be done, and adjust got
8357 and plt refcounts. */
8359 for (pass = 0; pass < 2; ++pass)
8360 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8362 Elf_Internal_Sym *locsyms = NULL;
8363 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8365 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8366 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8368 Elf_Internal_Rela *relstart, *rel, *relend;
8369 bfd_boolean found_tls_get_addr_arg = 0;
8371 /* Read the relocations. */
8372 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8374 if (relstart == NULL)
8380 relend = relstart + sec->reloc_count;
8381 for (rel = relstart; rel < relend; rel++)
8383 enum elf_ppc64_reloc_type r_type;
8384 unsigned long r_symndx;
8385 struct elf_link_hash_entry *h;
8386 Elf_Internal_Sym *sym;
8388 unsigned char *tls_mask;
8389 unsigned char tls_set, tls_clear, tls_type = 0;
8391 bfd_boolean ok_tprel, is_local;
8392 long toc_ref_index = 0;
8393 int expecting_tls_get_addr = 0;
8394 bfd_boolean ret = FALSE;
8396 r_symndx = ELF64_R_SYM (rel->r_info);
8397 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8401 if (elf_section_data (sec)->relocs != relstart)
8403 if (toc_ref != NULL)
8406 && (elf_symtab_hdr (ibfd).contents
8407 != (unsigned char *) locsyms))
8414 if (h->root.type == bfd_link_hash_defined
8415 || h->root.type == bfd_link_hash_defweak)
8416 value = h->root.u.def.value;
8417 else if (h->root.type == bfd_link_hash_undefweak)
8421 found_tls_get_addr_arg = 0;
8426 /* Symbols referenced by TLS relocs must be of type
8427 STT_TLS. So no need for .opd local sym adjust. */
8428 value = sym->st_value;
8437 && h->root.type == bfd_link_hash_undefweak)
8439 else if (sym_sec != NULL
8440 && sym_sec->output_section != NULL)
8442 value += sym_sec->output_offset;
8443 value += sym_sec->output_section->vma;
8444 value -= htab->elf.tls_sec->vma;
8445 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8446 < (bfd_vma) 1 << 32);
8450 r_type = ELF64_R_TYPE (rel->r_info);
8451 /* If this section has old-style __tls_get_addr calls
8452 without marker relocs, then check that each
8453 __tls_get_addr call reloc is preceded by a reloc
8454 that conceivably belongs to the __tls_get_addr arg
8455 setup insn. If we don't find matching arg setup
8456 relocs, don't do any tls optimization. */
8458 && sec->has_tls_get_addr_call
8460 && (h == &htab->tls_get_addr->elf
8461 || h == &htab->tls_get_addr_fd->elf)
8462 && !found_tls_get_addr_arg
8463 && is_branch_reloc (r_type))
8465 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
8466 "TLS optimization disabled\n"),
8467 ibfd, sec, rel->r_offset);
8472 found_tls_get_addr_arg = 0;
8475 case R_PPC64_GOT_TLSLD16:
8476 case R_PPC64_GOT_TLSLD16_LO:
8477 expecting_tls_get_addr = 1;
8478 found_tls_get_addr_arg = 1;
8481 case R_PPC64_GOT_TLSLD16_HI:
8482 case R_PPC64_GOT_TLSLD16_HA:
8483 /* These relocs should never be against a symbol
8484 defined in a shared lib. Leave them alone if
8485 that turns out to be the case. */
8492 tls_type = TLS_TLS | TLS_LD;
8495 case R_PPC64_GOT_TLSGD16:
8496 case R_PPC64_GOT_TLSGD16_LO:
8497 expecting_tls_get_addr = 1;
8498 found_tls_get_addr_arg = 1;
8501 case R_PPC64_GOT_TLSGD16_HI:
8502 case R_PPC64_GOT_TLSGD16_HA:
8508 tls_set = TLS_TLS | TLS_TPRELGD;
8510 tls_type = TLS_TLS | TLS_GD;
8513 case R_PPC64_GOT_TPREL16_DS:
8514 case R_PPC64_GOT_TPREL16_LO_DS:
8515 case R_PPC64_GOT_TPREL16_HI:
8516 case R_PPC64_GOT_TPREL16_HA:
8521 tls_clear = TLS_TPREL;
8522 tls_type = TLS_TLS | TLS_TPREL;
8529 found_tls_get_addr_arg = 1;
8534 case R_PPC64_TOC16_LO:
8535 if (sym_sec == NULL || sym_sec != toc)
8538 /* Mark this toc entry as referenced by a TLS
8539 code sequence. We can do that now in the
8540 case of R_PPC64_TLS, and after checking for
8541 tls_get_addr for the TOC16 relocs. */
8542 if (toc_ref == NULL)
8543 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8544 if (toc_ref == NULL)
8548 value = h->root.u.def.value;
8550 value = sym->st_value;
8551 value += rel->r_addend;
8554 BFD_ASSERT (value < toc->size
8555 && toc->output_offset % 8 == 0);
8556 toc_ref_index = (value + toc->output_offset) / 8;
8557 if (r_type == R_PPC64_TLS
8558 || r_type == R_PPC64_TLSGD
8559 || r_type == R_PPC64_TLSLD)
8561 toc_ref[toc_ref_index] = 1;
8565 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8570 expecting_tls_get_addr = 2;
8573 case R_PPC64_TPREL64:
8577 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8582 tls_set = TLS_EXPLICIT;
8583 tls_clear = TLS_TPREL;
8588 case R_PPC64_DTPMOD64:
8592 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
8594 if (rel + 1 < relend
8596 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8597 && rel[1].r_offset == rel->r_offset + 8)
8601 tls_set = TLS_EXPLICIT | TLS_GD;
8604 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8613 tls_set = TLS_EXPLICIT;
8624 if (!expecting_tls_get_addr
8625 || !sec->has_tls_get_addr_call)
8628 if (rel + 1 < relend
8629 && branch_reloc_hash_match (ibfd, rel + 1,
8631 htab->tls_get_addr_fd))
8633 if (expecting_tls_get_addr == 2)
8635 /* Check for toc tls entries. */
8636 unsigned char *toc_tls;
8639 retval = get_tls_mask (&toc_tls, NULL, NULL,
8644 if (toc_tls != NULL)
8646 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8647 found_tls_get_addr_arg = 1;
8649 toc_ref[toc_ref_index] = 1;
8655 if (expecting_tls_get_addr != 1)
8658 /* Uh oh, we didn't find the expected call. We
8659 could just mark this symbol to exclude it
8660 from tls optimization but it's safer to skip
8661 the entire optimization. */
8662 /* xgettext:c-format */
8663 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
8664 "TLS optimization disabled\n"),
8665 ibfd, sec, rel->r_offset);
8670 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
8672 struct plt_entry *ent;
8673 for (ent = htab->tls_get_addr->elf.plt.plist;
8676 if (ent->addend == 0)
8678 if (ent->plt.refcount > 0)
8680 ent->plt.refcount -= 1;
8681 expecting_tls_get_addr = 0;
8687 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
8689 struct plt_entry *ent;
8690 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8693 if (ent->addend == 0)
8695 if (ent->plt.refcount > 0)
8696 ent->plt.refcount -= 1;
8704 if ((tls_set & TLS_EXPLICIT) == 0)
8706 struct got_entry *ent;
8708 /* Adjust got entry for this reloc. */
8712 ent = elf_local_got_ents (ibfd)[r_symndx];
8714 for (; ent != NULL; ent = ent->next)
8715 if (ent->addend == rel->r_addend
8716 && ent->owner == ibfd
8717 && ent->tls_type == tls_type)
8724 /* We managed to get rid of a got entry. */
8725 if (ent->got.refcount > 0)
8726 ent->got.refcount -= 1;
8731 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8732 we'll lose one or two dyn relocs. */
8733 if (!dec_dynrel_count (rel->r_info, sec, info,
8737 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8739 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
8745 *tls_mask |= tls_set;
8746 *tls_mask &= ~tls_clear;
8749 if (elf_section_data (sec)->relocs != relstart)
8754 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8756 if (!info->keep_memory)
8759 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8763 if (toc_ref != NULL)
8765 htab->do_tls_opt = 1;
8769 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8770 the values of any global symbols in a toc section that has been
8771 edited. Globals in toc sections should be a rarity, so this function
8772 sets a flag if any are found in toc sections other than the one just
8773 edited, so that further hash table traversals can be avoided. */
8775 struct adjust_toc_info
8778 unsigned long *skip;
8779 bfd_boolean global_toc_syms;
8782 enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8785 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8787 struct ppc_link_hash_entry *eh;
8788 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
8791 if (h->root.type != bfd_link_hash_defined
8792 && h->root.type != bfd_link_hash_defweak)
8795 eh = (struct ppc_link_hash_entry *) h;
8796 if (eh->adjust_done)
8799 if (eh->elf.root.u.def.section == toc_inf->toc)
8801 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8802 i = toc_inf->toc->rawsize >> 3;
8804 i = eh->elf.root.u.def.value >> 3;
8806 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
8809 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8812 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
8813 eh->elf.root.u.def.value = (bfd_vma) i << 3;
8816 eh->elf.root.u.def.value -= toc_inf->skip[i];
8817 eh->adjust_done = 1;
8819 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8820 toc_inf->global_toc_syms = TRUE;
8825 /* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8826 on a _LO variety toc/got reloc. */
8829 ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
8831 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8832 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
8833 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8834 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8835 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8836 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8837 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8838 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8839 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8840 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8841 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8842 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8843 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8844 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8845 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8846 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8847 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8848 /* Exclude lfqu by testing reloc. If relocs are ever
8849 defined for the reduced D field in psq_lu then those
8850 will need testing too. */
8851 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8852 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8854 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8855 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8856 /* Exclude stfqu. psq_stu as above for psq_lu. */
8857 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8858 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8859 && (insn & 1) == 0));
8862 /* Examine all relocs referencing .toc sections in order to remove
8863 unused .toc entries. */
8866 ppc64_elf_edit_toc (struct bfd_link_info *info)
8869 struct adjust_toc_info toc_inf;
8870 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8872 htab->do_toc_opt = 1;
8873 toc_inf.global_toc_syms = TRUE;
8874 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8876 asection *toc, *sec;
8877 Elf_Internal_Shdr *symtab_hdr;
8878 Elf_Internal_Sym *local_syms;
8879 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
8880 unsigned long *skip, *drop;
8881 unsigned char *used;
8882 unsigned char *keep, last, some_unused;
8884 if (!is_ppc64_elf (ibfd))
8887 toc = bfd_get_section_by_name (ibfd, ".toc");
8890 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8891 || discarded_section (toc))
8896 symtab_hdr = &elf_symtab_hdr (ibfd);
8898 /* Look at sections dropped from the final link. */
8901 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8903 if (sec->reloc_count == 0
8904 || !discarded_section (sec)
8905 || get_opd_info (sec)
8906 || (sec->flags & SEC_ALLOC) == 0
8907 || (sec->flags & SEC_DEBUGGING) != 0)
8910 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8911 if (relstart == NULL)
8914 /* Run through the relocs to see which toc entries might be
8916 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8918 enum elf_ppc64_reloc_type r_type;
8919 unsigned long r_symndx;
8921 struct elf_link_hash_entry *h;
8922 Elf_Internal_Sym *sym;
8925 r_type = ELF64_R_TYPE (rel->r_info);
8932 case R_PPC64_TOC16_LO:
8933 case R_PPC64_TOC16_HI:
8934 case R_PPC64_TOC16_HA:
8935 case R_PPC64_TOC16_DS:
8936 case R_PPC64_TOC16_LO_DS:
8940 r_symndx = ELF64_R_SYM (rel->r_info);
8941 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8949 val = h->root.u.def.value;
8951 val = sym->st_value;
8952 val += rel->r_addend;
8954 if (val >= toc->size)
8957 /* Anything in the toc ought to be aligned to 8 bytes.
8958 If not, don't mark as unused. */
8964 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8969 skip[val >> 3] = ref_from_discarded;
8972 if (elf_section_data (sec)->relocs != relstart)
8976 /* For largetoc loads of address constants, we can convert
8977 . addis rx,2,addr@got@ha
8978 . ld ry,addr@got@l(rx)
8980 . addis rx,2,addr@toc@ha
8981 . addi ry,rx,addr@toc@l
8982 when addr is within 2G of the toc pointer. This then means
8983 that the word storing "addr" in the toc is no longer needed. */
8985 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8986 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8987 && toc->reloc_count != 0)
8989 /* Read toc relocs. */
8990 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8992 if (toc_relocs == NULL)
8995 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
8997 enum elf_ppc64_reloc_type r_type;
8998 unsigned long r_symndx;
9000 struct elf_link_hash_entry *h;
9001 Elf_Internal_Sym *sym;
9004 r_type = ELF64_R_TYPE (rel->r_info);
9005 if (r_type != R_PPC64_ADDR64)
9008 r_symndx = ELF64_R_SYM (rel->r_info);
9009 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9014 || sym_sec->output_section == NULL
9015 || discarded_section (sym_sec))
9018 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9023 if (h->type == STT_GNU_IFUNC)
9025 val = h->root.u.def.value;
9029 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9031 val = sym->st_value;
9033 val += rel->r_addend;
9034 val += sym_sec->output_section->vma + sym_sec->output_offset;
9036 /* We don't yet know the exact toc pointer value, but we
9037 know it will be somewhere in the toc section. Don't
9038 optimize if the difference from any possible toc
9039 pointer is outside [ff..f80008000, 7fff7fff]. */
9040 addr = toc->output_section->vma + TOC_BASE_OFF;
9041 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9044 addr = toc->output_section->vma + toc->output_section->rawsize;
9045 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9050 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9055 skip[rel->r_offset >> 3]
9056 |= can_optimize | ((rel - toc_relocs) << 2);
9063 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9067 if (local_syms != NULL
9068 && symtab_hdr->contents != (unsigned char *) local_syms)
9072 && elf_section_data (sec)->relocs != relstart)
9074 if (toc_relocs != NULL
9075 && elf_section_data (toc)->relocs != toc_relocs)
9082 /* Now check all kept sections that might reference the toc.
9083 Check the toc itself last. */
9084 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9087 sec = (sec == toc ? NULL
9088 : sec->next == NULL ? toc
9089 : sec->next == toc && toc->next ? toc->next
9094 if (sec->reloc_count == 0
9095 || discarded_section (sec)
9096 || get_opd_info (sec)
9097 || (sec->flags & SEC_ALLOC) == 0
9098 || (sec->flags & SEC_DEBUGGING) != 0)
9101 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9103 if (relstart == NULL)
9109 /* Mark toc entries referenced as used. */
9113 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9115 enum elf_ppc64_reloc_type r_type;
9116 unsigned long r_symndx;
9118 struct elf_link_hash_entry *h;
9119 Elf_Internal_Sym *sym;
9121 enum {no_check, check_lo, check_ha} insn_check;
9123 r_type = ELF64_R_TYPE (rel->r_info);
9127 insn_check = no_check;
9130 case R_PPC64_GOT_TLSLD16_HA:
9131 case R_PPC64_GOT_TLSGD16_HA:
9132 case R_PPC64_GOT_TPREL16_HA:
9133 case R_PPC64_GOT_DTPREL16_HA:
9134 case R_PPC64_GOT16_HA:
9135 case R_PPC64_TOC16_HA:
9136 insn_check = check_ha;
9139 case R_PPC64_GOT_TLSLD16_LO:
9140 case R_PPC64_GOT_TLSGD16_LO:
9141 case R_PPC64_GOT_TPREL16_LO_DS:
9142 case R_PPC64_GOT_DTPREL16_LO_DS:
9143 case R_PPC64_GOT16_LO:
9144 case R_PPC64_GOT16_LO_DS:
9145 case R_PPC64_TOC16_LO:
9146 case R_PPC64_TOC16_LO_DS:
9147 insn_check = check_lo;
9151 if (insn_check != no_check)
9153 bfd_vma off = rel->r_offset & ~3;
9154 unsigned char buf[4];
9157 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9162 insn = bfd_get_32 (ibfd, buf);
9163 if (insn_check == check_lo
9164 ? !ok_lo_toc_insn (insn, r_type)
9165 : ((insn & ((0x3f << 26) | 0x1f << 16))
9166 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9170 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9171 sprintf (str, "%#08x", insn);
9172 info->callbacks->einfo
9173 /* xgettext:c-format */
9174 (_("%H: toc optimization is not supported for"
9175 " %s instruction\n"),
9176 ibfd, sec, rel->r_offset & ~3, str);
9183 case R_PPC64_TOC16_LO:
9184 case R_PPC64_TOC16_HI:
9185 case R_PPC64_TOC16_HA:
9186 case R_PPC64_TOC16_DS:
9187 case R_PPC64_TOC16_LO_DS:
9188 /* In case we're taking addresses of toc entries. */
9189 case R_PPC64_ADDR64:
9196 r_symndx = ELF64_R_SYM (rel->r_info);
9197 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9208 val = h->root.u.def.value;
9210 val = sym->st_value;
9211 val += rel->r_addend;
9213 if (val >= toc->size)
9216 if ((skip[val >> 3] & can_optimize) != 0)
9223 case R_PPC64_TOC16_HA:
9226 case R_PPC64_TOC16_LO_DS:
9227 off = rel->r_offset;
9228 off += (bfd_big_endian (ibfd) ? -2 : 3);
9229 if (!bfd_get_section_contents (ibfd, sec, &opc,
9235 if ((opc & (0x3f << 2)) == (58u << 2))
9240 /* Wrong sort of reloc, or not a ld. We may
9241 as well clear ref_from_discarded too. */
9248 /* For the toc section, we only mark as used if this
9249 entry itself isn't unused. */
9250 else if ((used[rel->r_offset >> 3]
9251 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9254 /* Do all the relocs again, to catch reference
9263 if (elf_section_data (sec)->relocs != relstart)
9267 /* Merge the used and skip arrays. Assume that TOC
9268 doublewords not appearing as either used or unused belong
9269 to an entry more than one doubleword in size. */
9270 for (drop = skip, keep = used, last = 0, some_unused = 0;
9271 drop < skip + (toc->size + 7) / 8;
9276 *drop &= ~ref_from_discarded;
9277 if ((*drop & can_optimize) != 0)
9281 else if ((*drop & ref_from_discarded) != 0)
9284 last = ref_from_discarded;
9294 bfd_byte *contents, *src;
9296 Elf_Internal_Sym *sym;
9297 bfd_boolean local_toc_syms = FALSE;
9299 /* Shuffle the toc contents, and at the same time convert the
9300 skip array from booleans into offsets. */
9301 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9304 elf_section_data (toc)->this_hdr.contents = contents;
9306 for (src = contents, off = 0, drop = skip;
9307 src < contents + toc->size;
9310 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9315 memcpy (src - off, src, 8);
9319 toc->rawsize = toc->size;
9320 toc->size = src - contents - off;
9322 /* Adjust addends for relocs against the toc section sym,
9323 and optimize any accesses we can. */
9324 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9326 if (sec->reloc_count == 0
9327 || discarded_section (sec))
9330 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9332 if (relstart == NULL)
9335 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9337 enum elf_ppc64_reloc_type r_type;
9338 unsigned long r_symndx;
9340 struct elf_link_hash_entry *h;
9343 r_type = ELF64_R_TYPE (rel->r_info);
9350 case R_PPC64_TOC16_LO:
9351 case R_PPC64_TOC16_HI:
9352 case R_PPC64_TOC16_HA:
9353 case R_PPC64_TOC16_DS:
9354 case R_PPC64_TOC16_LO_DS:
9355 case R_PPC64_ADDR64:
9359 r_symndx = ELF64_R_SYM (rel->r_info);
9360 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9368 val = h->root.u.def.value;
9371 val = sym->st_value;
9373 local_toc_syms = TRUE;
9376 val += rel->r_addend;
9378 if (val > toc->rawsize)
9380 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9382 else if ((skip[val >> 3] & can_optimize) != 0)
9384 Elf_Internal_Rela *tocrel
9385 = toc_relocs + (skip[val >> 3] >> 2);
9386 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9390 case R_PPC64_TOC16_HA:
9391 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9394 case R_PPC64_TOC16_LO_DS:
9395 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9399 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9401 info->callbacks->einfo
9402 /* xgettext:c-format */
9403 (_("%H: %s references "
9404 "optimized away TOC entry\n"),
9405 ibfd, sec, rel->r_offset,
9406 ppc64_elf_howto_table[r_type]->name);
9407 bfd_set_error (bfd_error_bad_value);
9410 rel->r_addend = tocrel->r_addend;
9411 elf_section_data (sec)->relocs = relstart;
9415 if (h != NULL || sym->st_value != 0)
9418 rel->r_addend -= skip[val >> 3];
9419 elf_section_data (sec)->relocs = relstart;
9422 if (elf_section_data (sec)->relocs != relstart)
9426 /* We shouldn't have local or global symbols defined in the TOC,
9427 but handle them anyway. */
9428 if (local_syms != NULL)
9429 for (sym = local_syms;
9430 sym < local_syms + symtab_hdr->sh_info;
9432 if (sym->st_value != 0
9433 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9437 if (sym->st_value > toc->rawsize)
9438 i = toc->rawsize >> 3;
9440 i = sym->st_value >> 3;
9442 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9446 (_("%s defined on removed toc entry"),
9447 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9450 while ((skip[i] & (ref_from_discarded | can_optimize)));
9451 sym->st_value = (bfd_vma) i << 3;
9454 sym->st_value -= skip[i];
9455 symtab_hdr->contents = (unsigned char *) local_syms;
9458 /* Adjust any global syms defined in this toc input section. */
9459 if (toc_inf.global_toc_syms)
9462 toc_inf.skip = skip;
9463 toc_inf.global_toc_syms = FALSE;
9464 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9468 if (toc->reloc_count != 0)
9470 Elf_Internal_Shdr *rel_hdr;
9471 Elf_Internal_Rela *wrel;
9474 /* Remove unused toc relocs, and adjust those we keep. */
9475 if (toc_relocs == NULL)
9476 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9478 if (toc_relocs == NULL)
9482 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
9483 if ((skip[rel->r_offset >> 3]
9484 & (ref_from_discarded | can_optimize)) == 0)
9486 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9487 wrel->r_info = rel->r_info;
9488 wrel->r_addend = rel->r_addend;
9491 else if (!dec_dynrel_count (rel->r_info, toc, info,
9492 &local_syms, NULL, NULL))
9495 elf_section_data (toc)->relocs = toc_relocs;
9496 toc->reloc_count = wrel - toc_relocs;
9497 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9498 sz = rel_hdr->sh_entsize;
9499 rel_hdr->sh_size = toc->reloc_count * sz;
9502 else if (toc_relocs != NULL
9503 && elf_section_data (toc)->relocs != toc_relocs)
9506 if (local_syms != NULL
9507 && symtab_hdr->contents != (unsigned char *) local_syms)
9509 if (!info->keep_memory)
9512 symtab_hdr->contents = (unsigned char *) local_syms;
9520 /* Return true iff input section I references the TOC using
9521 instructions limited to +/-32k offsets. */
9524 ppc64_elf_has_small_toc_reloc (asection *i)
9526 return (is_ppc64_elf (i->owner)
9527 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9530 /* Allocate space for one GOT entry. */
9533 allocate_got (struct elf_link_hash_entry *h,
9534 struct bfd_link_info *info,
9535 struct got_entry *gent)
9537 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9538 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9539 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9541 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9542 ? 2 : 1) * sizeof (Elf64_External_Rela);
9543 asection *got = ppc64_elf_tdata (gent->owner)->got;
9545 gent->got.offset = got->size;
9546 got->size += entsize;
9548 if (h->type == STT_GNU_IFUNC)
9550 htab->elf.irelplt->size += rentsize;
9551 htab->got_reli_size += rentsize;
9553 else if (((bfd_link_pic (info)
9554 && !((gent->tls_type & TLS_TPREL) != 0
9555 && bfd_link_executable (info)
9556 && SYMBOL_REFERENCES_LOCAL (info, h)))
9557 || (htab->elf.dynamic_sections_created
9559 && !SYMBOL_REFERENCES_LOCAL (info, h)))
9560 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9562 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
9563 relgot->size += rentsize;
9567 /* This function merges got entries in the same toc group. */
9570 merge_got_entries (struct got_entry **pent)
9572 struct got_entry *ent, *ent2;
9574 for (ent = *pent; ent != NULL; ent = ent->next)
9575 if (!ent->is_indirect)
9576 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9577 if (!ent2->is_indirect
9578 && ent2->addend == ent->addend
9579 && ent2->tls_type == ent->tls_type
9580 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9582 ent2->is_indirect = TRUE;
9583 ent2->got.ent = ent;
9587 /* If H is undefined, make it dynamic if that makes sense. */
9590 ensure_undef_dynamic (struct bfd_link_info *info,
9591 struct elf_link_hash_entry *h)
9593 struct elf_link_hash_table *htab = elf_hash_table (info);
9595 if (htab->dynamic_sections_created
9596 && ((info->dynamic_undefined_weak != 0
9597 && h->root.type == bfd_link_hash_undefweak)
9598 || h->root.type == bfd_link_hash_undefined)
9601 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9602 return bfd_elf_link_record_dynamic_symbol (info, h);
9606 /* Allocate space in .plt, .got and associated reloc sections for
9610 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
9612 struct bfd_link_info *info;
9613 struct ppc_link_hash_table *htab;
9615 struct ppc_link_hash_entry *eh;
9616 struct got_entry **pgent, *gent;
9618 if (h->root.type == bfd_link_hash_indirect)
9621 info = (struct bfd_link_info *) inf;
9622 htab = ppc_hash_table (info);
9626 eh = (struct ppc_link_hash_entry *) h;
9627 /* Run through the TLS GD got entries first if we're changing them
9629 if ((eh->tls_mask & TLS_TPRELGD) != 0)
9630 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9631 if (gent->got.refcount > 0
9632 && (gent->tls_type & TLS_GD) != 0)
9634 /* This was a GD entry that has been converted to TPREL. If
9635 there happens to be a TPREL entry we can use that one. */
9636 struct got_entry *ent;
9637 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9638 if (ent->got.refcount > 0
9639 && (ent->tls_type & TLS_TPREL) != 0
9640 && ent->addend == gent->addend
9641 && ent->owner == gent->owner)
9643 gent->got.refcount = 0;
9647 /* If not, then we'll be using our own TPREL entry. */
9648 if (gent->got.refcount != 0)
9649 gent->tls_type = TLS_TLS | TLS_TPREL;
9652 /* Remove any list entry that won't generate a word in the GOT before
9653 we call merge_got_entries. Otherwise we risk merging to empty
9655 pgent = &h->got.glist;
9656 while ((gent = *pgent) != NULL)
9657 if (gent->got.refcount > 0)
9659 if ((gent->tls_type & TLS_LD) != 0
9662 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9663 *pgent = gent->next;
9666 pgent = &gent->next;
9669 *pgent = gent->next;
9671 if (!htab->do_multi_toc)
9672 merge_got_entries (&h->got.glist);
9674 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9675 if (!gent->is_indirect)
9677 /* Make sure this symbol is output as a dynamic symbol. */
9678 if (!ensure_undef_dynamic (info, h))
9681 if (!is_ppc64_elf (gent->owner))
9684 allocate_got (h, info, gent);
9687 /* If no dynamic sections we can't have dynamic relocs, except for
9688 IFUNCs which are handled even in static executables. */
9689 if (!htab->elf.dynamic_sections_created
9690 && h->type != STT_GNU_IFUNC)
9691 eh->dyn_relocs = NULL;
9693 /* Discard relocs on undefined symbols that must be local. */
9694 else if (h->root.type == bfd_link_hash_undefined
9695 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9696 eh->dyn_relocs = NULL;
9698 /* Also discard relocs on undefined weak syms with non-default
9699 visibility, or when dynamic_undefined_weak says so. */
9700 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
9701 eh->dyn_relocs = NULL;
9703 if (eh->dyn_relocs != NULL)
9705 struct elf_dyn_relocs *p, **pp;
9707 /* In the shared -Bsymbolic case, discard space allocated for
9708 dynamic pc-relative relocs against symbols which turn out to
9709 be defined in regular objects. For the normal shared case,
9710 discard space for relocs that have become local due to symbol
9711 visibility changes. */
9713 if (bfd_link_pic (info))
9715 /* Relocs that use pc_count are those that appear on a call
9716 insn, or certain REL relocs (see must_be_dyn_reloc) that
9717 can be generated via assembly. We want calls to
9718 protected symbols to resolve directly to the function
9719 rather than going via the plt. If people want function
9720 pointer comparisons to work as expected then they should
9721 avoid writing weird assembly. */
9722 if (SYMBOL_CALLS_LOCAL (info, h))
9724 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9726 p->count -= p->pc_count;
9735 if (eh->dyn_relocs != NULL)
9737 /* Make sure this symbol is output as a dynamic symbol. */
9738 if (!ensure_undef_dynamic (info, h))
9742 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
9744 /* For the non-pic case, discard space for relocs against
9745 symbols which turn out to need copy relocs or are not
9747 if (h->dynamic_adjusted
9749 && !ELF_COMMON_DEF_P (h))
9751 /* Make sure this symbol is output as a dynamic symbol. */
9752 if (!ensure_undef_dynamic (info, h))
9755 if (h->dynindx == -1)
9756 eh->dyn_relocs = NULL;
9759 eh->dyn_relocs = NULL;
9762 /* Finally, allocate space. */
9763 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9765 asection *sreloc = elf_section_data (p->sec)->sreloc;
9766 if (eh->elf.type == STT_GNU_IFUNC)
9767 sreloc = htab->elf.irelplt;
9768 sreloc->size += p->count * sizeof (Elf64_External_Rela);
9772 if ((htab->elf.dynamic_sections_created
9773 && h->dynindx != -1)
9774 || h->type == STT_GNU_IFUNC)
9776 struct plt_entry *pent;
9777 bfd_boolean doneone = FALSE;
9778 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9779 if (pent->plt.refcount > 0)
9781 if (!htab->elf.dynamic_sections_created
9782 || h->dynindx == -1)
9785 pent->plt.offset = s->size;
9786 s->size += PLT_ENTRY_SIZE (htab);
9787 s = htab->elf.irelplt;
9791 /* If this is the first .plt entry, make room for the special
9795 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
9797 pent->plt.offset = s->size;
9799 /* Make room for this entry. */
9800 s->size += PLT_ENTRY_SIZE (htab);
9802 /* Make room for the .glink code. */
9805 s->size += GLINK_PLTRESOLVE_SIZE (htab);
9808 /* We need bigger stubs past index 32767. */
9809 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
9816 /* We also need to make an entry in the .rela.plt section. */
9817 s = htab->elf.srelplt;
9819 s->size += sizeof (Elf64_External_Rela);
9823 pent->plt.offset = (bfd_vma) -1;
9826 h->plt.plist = NULL;
9832 h->plt.plist = NULL;
9839 #define PPC_LO(v) ((v) & 0xffff)
9840 #define PPC_HI(v) (((v) >> 16) & 0xffff)
9841 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
9843 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9844 to set up space for global entry stubs. These are put in glink,
9845 after the branch table. */
9848 size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
9850 struct bfd_link_info *info;
9851 struct ppc_link_hash_table *htab;
9852 struct plt_entry *pent;
9855 if (h->root.type == bfd_link_hash_indirect)
9858 if (!h->pointer_equality_needed)
9865 htab = ppc_hash_table (info);
9869 s = htab->global_entry;
9870 plt = htab->elf.splt;
9871 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9872 if (pent->plt.offset != (bfd_vma) -1
9873 && pent->addend == 0)
9875 /* For ELFv2, if this symbol is not defined in a regular file
9876 and we are not generating a shared library or pie, then we
9877 need to define the symbol in the executable on a call stub.
9878 This is to avoid text relocations. */
9879 bfd_vma off, stub_align, stub_off, stub_size;
9880 unsigned int align_power;
9884 if (htab->params->plt_stub_align >= 0)
9885 align_power = htab->params->plt_stub_align;
9887 align_power = -htab->params->plt_stub_align;
9888 /* Setting section alignment is delayed until we know it is
9889 non-empty. Otherwise the .text output section will be
9890 aligned at least to plt_stub_align even when no global
9891 entry stubs are needed. */
9892 if (s->alignment_power < align_power)
9893 s->alignment_power = align_power;
9894 stub_align = (bfd_vma) 1 << align_power;
9895 if (htab->params->plt_stub_align >= 0
9896 || ((((stub_off + stub_size - 1) & -stub_align)
9897 - (stub_off & -stub_align))
9898 > ((stub_size - 1) & -stub_align)))
9899 stub_off = (stub_off + stub_align - 1) & -stub_align;
9900 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9901 off -= stub_off + s->output_offset + s->output_section->vma;
9902 /* Note that for --plt-stub-align negative we have a possible
9903 dependency between stub offset and size. Break that
9904 dependency by assuming the max stub size when calculating
9906 if (PPC_HA (off) == 0)
9908 h->root.type = bfd_link_hash_defined;
9909 h->root.u.def.section = s;
9910 h->root.u.def.value = stub_off;
9911 s->size = stub_off + stub_size;
9917 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9918 read-only sections. */
9921 maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
9925 if (h->root.type == bfd_link_hash_indirect)
9928 sec = readonly_dynrelocs (h);
9931 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9933 info->flags |= DF_TEXTREL;
9934 info->callbacks->minfo
9935 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
9936 sec->owner, h->root.root.string, sec);
9938 /* Not an error, just cut short the traversal. */
9944 /* Set the sizes of the dynamic sections. */
9947 ppc64_elf_size_dynamic_sections (bfd *output_bfd,
9948 struct bfd_link_info *info)
9950 struct ppc_link_hash_table *htab;
9955 struct got_entry *first_tlsld;
9957 htab = ppc_hash_table (info);
9961 dynobj = htab->elf.dynobj;
9965 if (htab->elf.dynamic_sections_created)
9967 /* Set the contents of the .interp section to the interpreter. */
9968 if (bfd_link_executable (info) && !info->nointerp)
9970 s = bfd_get_linker_section (dynobj, ".interp");
9973 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
9974 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9978 /* Set up .got offsets for local syms, and space for local dynamic
9980 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9982 struct got_entry **lgot_ents;
9983 struct got_entry **end_lgot_ents;
9984 struct plt_entry **local_plt;
9985 struct plt_entry **end_local_plt;
9986 unsigned char *lgot_masks;
9987 bfd_size_type locsymcount;
9988 Elf_Internal_Shdr *symtab_hdr;
9990 if (!is_ppc64_elf (ibfd))
9993 for (s = ibfd->sections; s != NULL; s = s->next)
9995 struct ppc_dyn_relocs *p;
9997 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
9999 if (!bfd_is_abs_section (p->sec)
10000 && bfd_is_abs_section (p->sec->output_section))
10002 /* Input section has been discarded, either because
10003 it is a copy of a linkonce section or due to
10004 linker script /DISCARD/, so we'll be discarding
10007 else if (p->count != 0)
10009 asection *srel = elf_section_data (p->sec)->sreloc;
10011 srel = htab->elf.irelplt;
10012 srel->size += p->count * sizeof (Elf64_External_Rela);
10013 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10014 info->flags |= DF_TEXTREL;
10019 lgot_ents = elf_local_got_ents (ibfd);
10023 symtab_hdr = &elf_symtab_hdr (ibfd);
10024 locsymcount = symtab_hdr->sh_info;
10025 end_lgot_ents = lgot_ents + locsymcount;
10026 local_plt = (struct plt_entry **) end_lgot_ents;
10027 end_local_plt = local_plt + locsymcount;
10028 lgot_masks = (unsigned char *) end_local_plt;
10029 s = ppc64_elf_tdata (ibfd)->got;
10030 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
10032 struct got_entry **pent, *ent;
10035 while ((ent = *pent) != NULL)
10036 if (ent->got.refcount > 0)
10038 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
10040 ppc64_tlsld_got (ibfd)->got.refcount += 1;
10045 unsigned int ent_size = 8;
10046 unsigned int rel_size = sizeof (Elf64_External_Rela);
10048 ent->got.offset = s->size;
10049 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
10054 s->size += ent_size;
10055 if ((*lgot_masks & PLT_IFUNC) != 0)
10057 htab->elf.irelplt->size += rel_size;
10058 htab->got_reli_size += rel_size;
10060 else if (bfd_link_pic (info)
10061 && !((ent->tls_type & TLS_TPREL) != 0
10062 && bfd_link_executable (info)))
10064 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10065 srel->size += rel_size;
10074 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10075 for (; local_plt < end_local_plt; ++local_plt)
10077 struct plt_entry *ent;
10079 for (ent = *local_plt; ent != NULL; ent = ent->next)
10080 if (ent->plt.refcount > 0)
10082 s = htab->elf.iplt;
10083 ent->plt.offset = s->size;
10084 s->size += PLT_ENTRY_SIZE (htab);
10086 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10089 ent->plt.offset = (bfd_vma) -1;
10093 /* Allocate global sym .plt and .got entries, and space for global
10094 sym dynamic relocs. */
10095 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
10097 if (!htab->opd_abi && !bfd_link_pic (info))
10098 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
10100 first_tlsld = NULL;
10101 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10103 struct got_entry *ent;
10105 if (!is_ppc64_elf (ibfd))
10108 ent = ppc64_tlsld_got (ibfd);
10109 if (ent->got.refcount > 0)
10111 if (!htab->do_multi_toc && first_tlsld != NULL)
10113 ent->is_indirect = TRUE;
10114 ent->got.ent = first_tlsld;
10118 if (first_tlsld == NULL)
10120 s = ppc64_elf_tdata (ibfd)->got;
10121 ent->got.offset = s->size;
10124 if (bfd_link_pic (info))
10126 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10127 srel->size += sizeof (Elf64_External_Rela);
10132 ent->got.offset = (bfd_vma) -1;
10135 /* We now have determined the sizes of the various dynamic sections.
10136 Allocate memory for them. */
10138 for (s = dynobj->sections; s != NULL; s = s->next)
10140 if ((s->flags & SEC_LINKER_CREATED) == 0)
10143 if (s == htab->brlt || s == htab->relbrlt)
10144 /* These haven't been allocated yet; don't strip. */
10146 else if (s == htab->elf.sgot
10147 || s == htab->elf.splt
10148 || s == htab->elf.iplt
10149 || s == htab->glink
10150 || s == htab->global_entry
10151 || s == htab->elf.sdynbss
10152 || s == htab->elf.sdynrelro)
10154 /* Strip this section if we don't need it; see the
10157 else if (s == htab->glink_eh_frame)
10159 if (!bfd_is_abs_section (s->output_section))
10160 /* Not sized yet. */
10163 else if (CONST_STRNEQ (s->name, ".rela"))
10167 if (s != htab->elf.srelplt)
10170 /* We use the reloc_count field as a counter if we need
10171 to copy relocs into the output file. */
10172 s->reloc_count = 0;
10177 /* It's not one of our sections, so don't allocate space. */
10183 /* If we don't need this section, strip it from the
10184 output file. This is mostly to handle .rela.bss and
10185 .rela.plt. We must create both sections in
10186 create_dynamic_sections, because they must be created
10187 before the linker maps input sections to output
10188 sections. The linker does that before
10189 adjust_dynamic_symbol is called, and it is that
10190 function which decides whether anything needs to go
10191 into these sections. */
10192 s->flags |= SEC_EXCLUDE;
10196 if (bfd_is_abs_section (s->output_section))
10197 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10200 if ((s->flags & SEC_HAS_CONTENTS) == 0)
10203 /* Allocate memory for the section contents. We use bfd_zalloc
10204 here in case unused entries are not reclaimed before the
10205 section's contents are written out. This should not happen,
10206 but this way if it does we get a R_PPC64_NONE reloc in .rela
10207 sections instead of garbage.
10208 We also rely on the section contents being zero when writing
10209 the GOT and .dynrelro. */
10210 s->contents = bfd_zalloc (dynobj, s->size);
10211 if (s->contents == NULL)
10215 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10217 if (!is_ppc64_elf (ibfd))
10220 s = ppc64_elf_tdata (ibfd)->got;
10221 if (s != NULL && s != htab->elf.sgot)
10224 s->flags |= SEC_EXCLUDE;
10227 s->contents = bfd_zalloc (ibfd, s->size);
10228 if (s->contents == NULL)
10232 s = ppc64_elf_tdata (ibfd)->relgot;
10236 s->flags |= SEC_EXCLUDE;
10239 s->contents = bfd_zalloc (ibfd, s->size);
10240 if (s->contents == NULL)
10243 s->reloc_count = 0;
10248 if (htab->elf.dynamic_sections_created)
10250 bfd_boolean tls_opt;
10252 /* Add some entries to the .dynamic section. We fill in the
10253 values later, in ppc64_elf_finish_dynamic_sections, but we
10254 must add the entries now so that we get the correct size for
10255 the .dynamic section. The DT_DEBUG entry is filled in by the
10256 dynamic linker and used by the debugger. */
10257 #define add_dynamic_entry(TAG, VAL) \
10258 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10260 if (bfd_link_executable (info))
10262 if (!add_dynamic_entry (DT_DEBUG, 0))
10266 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
10268 if (!add_dynamic_entry (DT_PLTGOT, 0)
10269 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10270 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
10271 || !add_dynamic_entry (DT_JMPREL, 0)
10272 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
10276 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
10278 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10279 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
10283 tls_opt = (htab->params->tls_get_addr_opt
10284 && htab->tls_get_addr_fd != NULL
10285 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10286 if (tls_opt || !htab->opd_abi)
10288 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10294 if (!add_dynamic_entry (DT_RELA, 0)
10295 || !add_dynamic_entry (DT_RELASZ, 0)
10296 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
10299 /* If any dynamic relocs apply to a read-only section,
10300 then we need a DT_TEXTREL entry. */
10301 if ((info->flags & DF_TEXTREL) == 0)
10302 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
10304 if ((info->flags & DF_TEXTREL) != 0)
10306 if (!add_dynamic_entry (DT_TEXTREL, 0))
10311 #undef add_dynamic_entry
10316 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10319 ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10321 if (h->plt.plist != NULL
10323 && !h->pointer_equality_needed)
10326 return _bfd_elf_hash_symbol (h);
10329 /* Determine the type of stub needed, if any, for a call. */
10331 static inline enum ppc_stub_type
10332 ppc_type_of_stub (asection *input_sec,
10333 const Elf_Internal_Rela *rel,
10334 struct ppc_link_hash_entry **hash,
10335 struct plt_entry **plt_ent,
10336 bfd_vma destination,
10337 unsigned long local_off)
10339 struct ppc_link_hash_entry *h = *hash;
10341 bfd_vma branch_offset;
10342 bfd_vma max_branch_offset;
10343 enum elf_ppc64_reloc_type r_type;
10347 struct plt_entry *ent;
10348 struct ppc_link_hash_entry *fdh = h;
10350 && h->oh->is_func_descriptor)
10352 fdh = ppc_follow_link (h->oh);
10356 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10357 if (ent->addend == rel->r_addend
10358 && ent->plt.offset != (bfd_vma) -1)
10361 return ppc_stub_plt_call;
10364 /* Here, we know we don't have a plt entry. If we don't have a
10365 either a defined function descriptor or a defined entry symbol
10366 in a regular object file, then it is pointless trying to make
10367 any other type of stub. */
10368 if (!is_static_defined (&fdh->elf)
10369 && !is_static_defined (&h->elf))
10370 return ppc_stub_none;
10372 else if (elf_local_got_ents (input_sec->owner) != NULL)
10374 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10375 struct plt_entry **local_plt = (struct plt_entry **)
10376 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10377 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10379 if (local_plt[r_symndx] != NULL)
10381 struct plt_entry *ent;
10383 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10384 if (ent->addend == rel->r_addend
10385 && ent->plt.offset != (bfd_vma) -1)
10388 return ppc_stub_plt_call;
10393 /* Determine where the call point is. */
10394 location = (input_sec->output_offset
10395 + input_sec->output_section->vma
10398 branch_offset = destination - location;
10399 r_type = ELF64_R_TYPE (rel->r_info);
10401 /* Determine if a long branch stub is needed. */
10402 max_branch_offset = 1 << 25;
10403 if (r_type != R_PPC64_REL24)
10404 max_branch_offset = 1 << 15;
10406 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
10407 /* We need a stub. Figure out whether a long_branch or plt_branch
10408 is needed later. */
10409 return ppc_stub_long_branch;
10411 return ppc_stub_none;
10414 /* With power7 weakly ordered memory model, it is possible for ld.so
10415 to update a plt entry in one thread and have another thread see a
10416 stale zero toc entry. To avoid this we need some sort of acquire
10417 barrier in the call stub. One solution is to make the load of the
10418 toc word seem to appear to depend on the load of the function entry
10419 word. Another solution is to test for r2 being zero, and branch to
10420 the appropriate glink entry if so.
10422 . fake dep barrier compare
10423 . ld 12,xxx(2) ld 12,xxx(2)
10424 . mtctr 12 mtctr 12
10425 . xor 11,12,12 ld 2,xxx+8(2)
10426 . add 2,2,11 cmpldi 2,0
10427 . ld 2,xxx+8(2) bnectr+
10428 . bctr b <glink_entry>
10430 The solution involving the compare turns out to be faster, so
10431 that's what we use unless the branch won't reach. */
10433 #define ALWAYS_USE_FAKE_DEP 0
10434 #define ALWAYS_EMIT_R2SAVE 0
10436 static inline unsigned int
10437 plt_stub_size (struct ppc_link_hash_table *htab,
10438 struct ppc_stub_hash_entry *stub_entry,
10441 unsigned size = 12;
10443 if (ALWAYS_EMIT_R2SAVE
10444 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10446 if (PPC_HA (off) != 0)
10451 if (htab->params->plt_static_chain)
10453 if (htab->params->plt_thread_safe
10454 && htab->elf.dynamic_sections_created
10455 && stub_entry->h != NULL
10456 && stub_entry->h->elf.dynindx != -1)
10458 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
10461 if (stub_entry->h != NULL
10462 && (stub_entry->h == htab->tls_get_addr_fd
10463 || stub_entry->h == htab->tls_get_addr)
10464 && htab->params->tls_get_addr_opt)
10467 if (ALWAYS_EMIT_R2SAVE
10468 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10474 /* Depending on the sign of plt_stub_align:
10475 If positive, return the padding to align to a 2**plt_stub_align
10477 If negative, if this stub would cross fewer 2**plt_stub_align
10478 boundaries if we align, then return the padding needed to do so. */
10480 static inline unsigned int
10481 plt_stub_pad (struct ppc_link_hash_table *htab,
10482 struct ppc_stub_hash_entry *stub_entry,
10486 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
10487 bfd_vma stub_off = stub_entry->group->stub_sec->size;
10489 if (htab->params->plt_stub_align >= 0)
10491 stub_align = 1 << htab->params->plt_stub_align;
10492 if ((stub_off & (stub_align - 1)) != 0)
10493 return stub_align - (stub_off & (stub_align - 1));
10497 stub_align = 1 << -htab->params->plt_stub_align;
10498 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
10499 > ((stub_size - 1) & -stub_align))
10500 return stub_align - (stub_off & (stub_align - 1));
10504 /* Build a .plt call stub. */
10506 static inline bfd_byte *
10507 build_plt_stub (struct ppc_link_hash_table *htab,
10508 struct ppc_stub_hash_entry *stub_entry,
10509 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10511 bfd *obfd = htab->params->stub_bfd;
10512 bfd_boolean plt_load_toc = htab->opd_abi;
10513 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
10514 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10515 && htab->elf.dynamic_sections_created
10516 && stub_entry->h != NULL
10517 && stub_entry->h->elf.dynindx != -1);
10518 bfd_boolean use_fake_dep = plt_thread_safe;
10519 bfd_vma cmp_branch_off = 0;
10521 if (!ALWAYS_USE_FAKE_DEP
10524 && !((stub_entry->h == htab->tls_get_addr_fd
10525 || stub_entry->h == htab->tls_get_addr)
10526 && htab->params->tls_get_addr_opt))
10528 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
10529 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10530 / PLT_ENTRY_SIZE (htab));
10531 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
10534 if (pltindex > 32768)
10535 glinkoff += (pltindex - 32768) * 4;
10537 + htab->glink->output_offset
10538 + htab->glink->output_section->vma);
10539 from = (p - stub_entry->group->stub_sec->contents
10540 + 4 * (ALWAYS_EMIT_R2SAVE
10541 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10542 + 4 * (PPC_HA (offset) != 0)
10543 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10544 != PPC_HA (offset))
10545 + 4 * (plt_static_chain != 0)
10547 + stub_entry->group->stub_sec->output_offset
10548 + stub_entry->group->stub_sec->output_section->vma);
10549 cmp_branch_off = to - from;
10550 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10553 if (PPC_HA (offset) != 0)
10557 if (ALWAYS_EMIT_R2SAVE
10558 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10559 r[0].r_offset += 4;
10560 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10561 r[1].r_offset = r[0].r_offset + 4;
10562 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10563 r[1].r_addend = r[0].r_addend;
10566 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10568 r[2].r_offset = r[1].r_offset + 4;
10569 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10570 r[2].r_addend = r[0].r_addend;
10574 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10575 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10576 r[2].r_addend = r[0].r_addend + 8;
10577 if (plt_static_chain)
10579 r[3].r_offset = r[2].r_offset + 4;
10580 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10581 r[3].r_addend = r[0].r_addend + 16;
10586 if (ALWAYS_EMIT_R2SAVE
10587 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10588 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10591 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10592 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10596 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10597 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10600 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10602 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
10605 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10610 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10611 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10613 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10614 if (plt_static_chain)
10615 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
10622 if (ALWAYS_EMIT_R2SAVE
10623 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10624 r[0].r_offset += 4;
10625 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10628 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10630 r[1].r_offset = r[0].r_offset + 4;
10631 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10632 r[1].r_addend = r[0].r_addend;
10636 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10637 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10638 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10639 if (plt_static_chain)
10641 r[2].r_offset = r[1].r_offset + 4;
10642 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10643 r[2].r_addend = r[0].r_addend + 8;
10648 if (ALWAYS_EMIT_R2SAVE
10649 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10650 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
10651 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
10653 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
10655 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10658 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
10663 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10664 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10666 if (plt_static_chain)
10667 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10668 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
10671 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
10673 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10674 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
10675 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
10678 bfd_put_32 (obfd, BCTR, p), p += 4;
10682 /* Build a special .plt call stub for __tls_get_addr. */
10684 #define LD_R11_0R3 0xe9630000
10685 #define LD_R12_0R3 0xe9830000
10686 #define MR_R0_R3 0x7c601b78
10687 #define CMPDI_R11_0 0x2c2b0000
10688 #define ADD_R3_R12_R13 0x7c6c6a14
10689 #define BEQLR 0x4d820020
10690 #define MR_R3_R0 0x7c030378
10691 #define STD_R11_0R1 0xf9610000
10692 #define BCTRL 0x4e800421
10693 #define LD_R11_0R1 0xe9610000
10694 #define MTLR_R11 0x7d6803a6
10696 static inline bfd_byte *
10697 build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10698 struct ppc_stub_hash_entry *stub_entry,
10699 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10701 bfd *obfd = htab->params->stub_bfd;
10703 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10704 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10705 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10706 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10707 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10708 bfd_put_32 (obfd, BEQLR, p), p += 4;
10709 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10711 r[0].r_offset += 7 * 4;
10712 if (!ALWAYS_EMIT_R2SAVE
10713 && stub_entry->stub_type != ppc_stub_plt_call_r2save)
10714 return build_plt_stub (htab, stub_entry, p, offset, r);
10716 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
10717 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10720 r[0].r_offset += 2 * 4;
10721 p = build_plt_stub (htab, stub_entry, p, offset, r);
10722 bfd_put_32 (obfd, BCTRL, p - 4);
10724 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
10725 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
10726 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10727 bfd_put_32 (obfd, BLR, p), p += 4;
10732 static Elf_Internal_Rela *
10733 get_relocs (asection *sec, int count)
10735 Elf_Internal_Rela *relocs;
10736 struct bfd_elf_section_data *elfsec_data;
10738 elfsec_data = elf_section_data (sec);
10739 relocs = elfsec_data->relocs;
10740 if (relocs == NULL)
10742 bfd_size_type relsize;
10743 relsize = sec->reloc_count * sizeof (*relocs);
10744 relocs = bfd_alloc (sec->owner, relsize);
10745 if (relocs == NULL)
10747 elfsec_data->relocs = relocs;
10748 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10749 sizeof (Elf_Internal_Shdr));
10750 if (elfsec_data->rela.hdr == NULL)
10752 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10753 * sizeof (Elf64_External_Rela));
10754 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
10755 sec->reloc_count = 0;
10757 relocs += sec->reloc_count;
10758 sec->reloc_count += count;
10763 get_r2off (struct bfd_link_info *info,
10764 struct ppc_stub_hash_entry *stub_entry)
10766 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10767 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
10771 /* Support linking -R objects. Get the toc pointer from the
10774 if (!htab->opd_abi)
10776 asection *opd = stub_entry->h->elf.root.u.def.section;
10777 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10779 if (strcmp (opd->name, ".opd") != 0
10780 || opd->reloc_count != 0)
10782 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%pT'\n"),
10783 stub_entry->h->elf.root.root.string);
10784 bfd_set_error (bfd_error_bad_value);
10785 return (bfd_vma) -1;
10787 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
10788 return (bfd_vma) -1;
10789 r2off = bfd_get_64 (opd->owner, buf);
10790 r2off -= elf_gp (info->output_bfd);
10792 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
10797 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
10799 struct ppc_stub_hash_entry *stub_entry;
10800 struct ppc_branch_hash_entry *br_entry;
10801 struct bfd_link_info *info;
10802 struct ppc_link_hash_table *htab;
10806 Elf_Internal_Rela *r;
10809 /* Massage our args to the form they really have. */
10810 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
10813 htab = ppc_hash_table (info);
10817 /* Make a note of the offset within the stubs for this entry. */
10818 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10819 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
10821 htab->stub_count[stub_entry->stub_type - 1] += 1;
10822 switch (stub_entry->stub_type)
10824 case ppc_stub_long_branch:
10825 case ppc_stub_long_branch_r2off:
10826 /* Branches are relative. This is where we are going to. */
10827 dest = (stub_entry->target_value
10828 + stub_entry->target_section->output_offset
10829 + stub_entry->target_section->output_section->vma);
10830 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10833 /* And this is where we are coming from. */
10834 off -= (stub_entry->stub_offset
10835 + stub_entry->group->stub_sec->output_offset
10836 + stub_entry->group->stub_sec->output_section->vma);
10839 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10841 bfd_vma r2off = get_r2off (info, stub_entry);
10843 if (r2off == (bfd_vma) -1)
10845 htab->stub_error = TRUE;
10848 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10850 if (PPC_HA (r2off) != 0)
10852 bfd_put_32 (htab->params->stub_bfd,
10853 ADDIS_R2_R2 | PPC_HA (r2off), p);
10856 if (PPC_LO (r2off) != 0)
10858 bfd_put_32 (htab->params->stub_bfd,
10859 ADDI_R2_R2 | PPC_LO (r2off), p);
10864 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
10867 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10870 (_("long branch stub `%s' offset overflow"),
10871 stub_entry->root.string);
10872 htab->stub_error = TRUE;
10876 if (info->emitrelocations)
10878 r = get_relocs (stub_entry->group->stub_sec, 1);
10881 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
10882 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10883 r->r_addend = dest;
10884 if (stub_entry->h != NULL)
10886 struct elf_link_hash_entry **hashes;
10887 unsigned long symndx;
10888 struct ppc_link_hash_entry *h;
10890 hashes = elf_sym_hashes (htab->params->stub_bfd);
10891 if (hashes == NULL)
10893 bfd_size_type hsize;
10895 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10896 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10897 if (hashes == NULL)
10899 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10900 htab->stub_globals = 1;
10902 symndx = htab->stub_globals++;
10904 hashes[symndx] = &h->elf;
10905 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10906 if (h->oh != NULL && h->oh->is_func)
10907 h = ppc_follow_link (h->oh);
10908 if (h->elf.root.u.def.section != stub_entry->target_section)
10909 /* H is an opd symbol. The addend must be zero. */
10913 off = (h->elf.root.u.def.value
10914 + h->elf.root.u.def.section->output_offset
10915 + h->elf.root.u.def.section->output_section->vma);
10916 r->r_addend -= off;
10922 case ppc_stub_plt_branch:
10923 case ppc_stub_plt_branch_r2off:
10924 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10925 stub_entry->root.string + 9,
10927 if (br_entry == NULL)
10929 _bfd_error_handler (_("can't find branch stub `%s'"),
10930 stub_entry->root.string);
10931 htab->stub_error = TRUE;
10935 dest = (stub_entry->target_value
10936 + stub_entry->target_section->output_offset
10937 + stub_entry->target_section->output_section->vma);
10938 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10939 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10941 bfd_put_64 (htab->brlt->owner, dest,
10942 htab->brlt->contents + br_entry->offset);
10944 if (br_entry->iter == htab->stub_iteration)
10946 br_entry->iter = 0;
10948 if (htab->relbrlt != NULL)
10950 /* Create a reloc for the branch lookup table entry. */
10951 Elf_Internal_Rela rela;
10954 rela.r_offset = (br_entry->offset
10955 + htab->brlt->output_offset
10956 + htab->brlt->output_section->vma);
10957 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10958 rela.r_addend = dest;
10960 rl = htab->relbrlt->contents;
10961 rl += (htab->relbrlt->reloc_count++
10962 * sizeof (Elf64_External_Rela));
10963 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10965 else if (info->emitrelocations)
10967 r = get_relocs (htab->brlt, 1);
10970 /* brlt, being SEC_LINKER_CREATED does not go through the
10971 normal reloc processing. Symbols and offsets are not
10972 translated from input file to output file form, so
10973 set up the offset per the output file. */
10974 r->r_offset = (br_entry->offset
10975 + htab->brlt->output_offset
10976 + htab->brlt->output_section->vma);
10977 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
10978 r->r_addend = dest;
10982 dest = (br_entry->offset
10983 + htab->brlt->output_offset
10984 + htab->brlt->output_section->vma);
10987 - elf_gp (info->output_bfd)
10988 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10990 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
10992 info->callbacks->einfo
10993 (_("%P: linkage table error against `%pT'\n"),
10994 stub_entry->root.string);
10995 bfd_set_error (bfd_error_bad_value);
10996 htab->stub_error = TRUE;
11000 if (info->emitrelocations)
11002 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
11005 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11006 if (bfd_big_endian (info->output_bfd))
11007 r[0].r_offset += 2;
11008 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
11009 r[0].r_offset += 4;
11010 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11011 r[0].r_addend = dest;
11012 if (PPC_HA (off) != 0)
11014 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11015 r[1].r_offset = r[0].r_offset + 4;
11016 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11017 r[1].r_addend = r[0].r_addend;
11022 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11024 if (PPC_HA (off) != 0)
11026 bfd_put_32 (htab->params->stub_bfd,
11027 ADDIS_R12_R2 | PPC_HA (off), p);
11029 bfd_put_32 (htab->params->stub_bfd,
11030 LD_R12_0R12 | PPC_LO (off), p);
11033 bfd_put_32 (htab->params->stub_bfd,
11034 LD_R12_0R2 | PPC_LO (off), p);
11038 bfd_vma r2off = get_r2off (info, stub_entry);
11040 if (r2off == (bfd_vma) -1)
11042 htab->stub_error = TRUE;
11046 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11048 if (PPC_HA (off) != 0)
11050 bfd_put_32 (htab->params->stub_bfd,
11051 ADDIS_R12_R2 | PPC_HA (off), p);
11053 bfd_put_32 (htab->params->stub_bfd,
11054 LD_R12_0R12 | PPC_LO (off), p);
11057 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
11059 if (PPC_HA (r2off) != 0)
11062 bfd_put_32 (htab->params->stub_bfd,
11063 ADDIS_R2_R2 | PPC_HA (r2off), p);
11065 if (PPC_LO (r2off) != 0)
11068 bfd_put_32 (htab->params->stub_bfd,
11069 ADDI_R2_R2 | PPC_LO (r2off), p);
11073 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11075 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11079 case ppc_stub_plt_call:
11080 case ppc_stub_plt_call_r2save:
11081 if (stub_entry->h != NULL
11082 && stub_entry->h->is_func_descriptor
11083 && stub_entry->h->oh != NULL)
11085 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11087 /* If the old-ABI "dot-symbol" is undefined make it weak so
11088 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11089 if (fh->elf.root.type == bfd_link_hash_undefined
11090 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11091 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
11092 fh->elf.root.type = bfd_link_hash_undefweak;
11095 /* Now build the stub. */
11096 dest = stub_entry->plt_ent->plt.offset & ~1;
11097 if (dest >= (bfd_vma) -2)
11100 plt = htab->elf.splt;
11101 if (!htab->elf.dynamic_sections_created
11102 || stub_entry->h == NULL
11103 || stub_entry->h->elf.dynindx == -1)
11104 plt = htab->elf.iplt;
11106 dest += plt->output_offset + plt->output_section->vma;
11108 if (stub_entry->h == NULL
11109 && (stub_entry->plt_ent->plt.offset & 1) == 0)
11111 Elf_Internal_Rela rela;
11114 rela.r_offset = dest;
11116 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
11118 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
11119 rela.r_addend = (stub_entry->target_value
11120 + stub_entry->target_section->output_offset
11121 + stub_entry->target_section->output_section->vma);
11123 rl = (htab->elf.irelplt->contents
11124 + (htab->elf.irelplt->reloc_count++
11125 * sizeof (Elf64_External_Rela)));
11126 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
11127 stub_entry->plt_ent->plt.offset |= 1;
11128 htab->local_ifunc_resolver = 1;
11132 - elf_gp (info->output_bfd)
11133 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11135 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
11137 info->callbacks->einfo
11138 /* xgettext:c-format */
11139 (_("%P: linkage table error against `%pT'\n"),
11140 stub_entry->h != NULL
11141 ? stub_entry->h->elf.root.root.string
11143 bfd_set_error (bfd_error_bad_value);
11144 htab->stub_error = TRUE;
11148 if (htab->params->plt_stub_align != 0)
11150 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11152 stub_entry->group->stub_sec->size += pad;
11153 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11158 if (info->emitrelocations)
11160 r = get_relocs (stub_entry->group->stub_sec,
11161 ((PPC_HA (off) != 0)
11163 ? 2 + (htab->params->plt_static_chain
11164 && PPC_HA (off + 16) == PPC_HA (off))
11168 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
11169 if (bfd_big_endian (info->output_bfd))
11170 r[0].r_offset += 2;
11171 r[0].r_addend = dest;
11173 if (stub_entry->h != NULL
11174 && (stub_entry->h == htab->tls_get_addr_fd
11175 || stub_entry->h == htab->tls_get_addr)
11176 && htab->params->tls_get_addr_opt)
11177 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
11179 p = build_plt_stub (htab, stub_entry, loc, off, r);
11182 case ppc_stub_save_res:
11190 stub_entry->group->stub_sec->size += p - loc;
11192 if (htab->params->emit_stub_syms)
11194 struct elf_link_hash_entry *h;
11197 const char *const stub_str[] = { "long_branch",
11198 "long_branch_r2off",
11200 "plt_branch_r2off",
11204 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11205 len2 = strlen (stub_entry->root.string);
11206 name = bfd_malloc (len1 + len2 + 2);
11209 memcpy (name, stub_entry->root.string, 9);
11210 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11211 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11212 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
11215 if (h->root.type == bfd_link_hash_new)
11217 h->root.type = bfd_link_hash_defined;
11218 h->root.u.def.section = stub_entry->group->stub_sec;
11219 h->root.u.def.value = stub_entry->stub_offset;
11220 h->ref_regular = 1;
11221 h->def_regular = 1;
11222 h->ref_regular_nonweak = 1;
11223 h->forced_local = 1;
11225 h->root.linker_def = 1;
11232 /* As above, but don't actually build the stub. Just bump offset so
11233 we know stub section sizes, and select plt_branch stubs where
11234 long_branch stubs won't do. */
11237 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
11239 struct ppc_stub_hash_entry *stub_entry;
11240 struct bfd_link_info *info;
11241 struct ppc_link_hash_table *htab;
11245 /* Massage our args to the form they really have. */
11246 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
11249 htab = ppc_hash_table (info);
11253 if (stub_entry->h != NULL
11254 && stub_entry->h->save_res
11255 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11256 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11258 /* Don't make stubs to out-of-line register save/restore
11259 functions. Instead, emit copies of the functions. */
11260 stub_entry->group->needs_save_res = 1;
11261 stub_entry->stub_type = ppc_stub_save_res;
11265 if (stub_entry->stub_type == ppc_stub_plt_call
11266 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11269 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11270 if (off >= (bfd_vma) -2)
11272 plt = htab->elf.splt;
11273 if (!htab->elf.dynamic_sections_created
11274 || stub_entry->h == NULL
11275 || stub_entry->h->elf.dynindx == -1)
11276 plt = htab->elf.iplt;
11277 off += (plt->output_offset
11278 + plt->output_section->vma
11279 - elf_gp (info->output_bfd)
11280 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11282 size = plt_stub_size (htab, stub_entry, off);
11283 if (stub_entry->h != NULL
11284 && (stub_entry->h == htab->tls_get_addr_fd
11285 || stub_entry->h == htab->tls_get_addr)
11286 && htab->params->tls_get_addr_opt
11287 && (ALWAYS_EMIT_R2SAVE
11288 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
11289 stub_entry->group->tls_get_addr_opt_bctrl
11290 = stub_entry->group->stub_sec->size + size - 5 * 4;
11292 if (htab->params->plt_stub_align)
11293 size += plt_stub_pad (htab, stub_entry, off);
11294 if (info->emitrelocations)
11296 stub_entry->group->stub_sec->reloc_count
11297 += ((PPC_HA (off) != 0)
11299 ? 2 + (htab->params->plt_static_chain
11300 && PPC_HA (off + 16) == PPC_HA (off))
11302 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11307 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11310 bfd_vma local_off = 0;
11312 off = (stub_entry->target_value
11313 + stub_entry->target_section->output_offset
11314 + stub_entry->target_section->output_section->vma);
11315 off -= (stub_entry->group->stub_sec->size
11316 + stub_entry->group->stub_sec->output_offset
11317 + stub_entry->group->stub_sec->output_section->vma);
11319 /* Reset the stub type from the plt variant in case we now
11320 can reach with a shorter stub. */
11321 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11322 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11325 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11327 r2off = get_r2off (info, stub_entry);
11328 if (r2off == (bfd_vma) -1)
11330 htab->stub_error = TRUE;
11334 if (PPC_HA (r2off) != 0)
11336 if (PPC_LO (r2off) != 0)
11341 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11343 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11344 Do the same for -R objects without function descriptors. */
11345 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11346 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
11348 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
11350 struct ppc_branch_hash_entry *br_entry;
11352 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11353 stub_entry->root.string + 9,
11355 if (br_entry == NULL)
11357 _bfd_error_handler (_("can't build branch stub `%s'"),
11358 stub_entry->root.string);
11359 htab->stub_error = TRUE;
11363 if (br_entry->iter != htab->stub_iteration)
11365 br_entry->iter = htab->stub_iteration;
11366 br_entry->offset = htab->brlt->size;
11367 htab->brlt->size += 8;
11369 if (htab->relbrlt != NULL)
11370 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11371 else if (info->emitrelocations)
11373 htab->brlt->reloc_count += 1;
11374 htab->brlt->flags |= SEC_RELOC;
11378 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11379 off = (br_entry->offset
11380 + htab->brlt->output_offset
11381 + htab->brlt->output_section->vma
11382 - elf_gp (info->output_bfd)
11383 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11385 if (info->emitrelocations)
11387 stub_entry->group->stub_sec->reloc_count
11388 += 1 + (PPC_HA (off) != 0);
11389 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11392 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11395 if (PPC_HA (off) != 0)
11401 if (PPC_HA (off) != 0)
11404 if (PPC_HA (r2off) != 0)
11406 if (PPC_LO (r2off) != 0)
11410 else if (info->emitrelocations)
11412 stub_entry->group->stub_sec->reloc_count += 1;
11413 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11417 stub_entry->group->stub_sec->size += size;
11421 /* Set up various things so that we can make a list of input sections
11422 for each output section included in the link. Returns -1 on error,
11423 0 when no stubs will be needed, and 1 on success. */
11426 ppc64_elf_setup_section_lists (struct bfd_link_info *info)
11430 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11435 htab->sec_info_arr_size = bfd_get_next_section_id ();
11436 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11437 htab->sec_info = bfd_zmalloc (amt);
11438 if (htab->sec_info == NULL)
11441 /* Set toc_off for com, und, abs and ind sections. */
11442 for (id = 0; id < 3; id++)
11443 htab->sec_info[id].toc_off = TOC_BASE_OFF;
11448 /* Set up for first pass at multitoc partitioning. */
11451 ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11453 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11455 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
11456 htab->toc_bfd = NULL;
11457 htab->toc_first_sec = NULL;
11460 /* The linker repeatedly calls this function for each TOC input section
11461 and linker generated GOT section. Group input bfds such that the toc
11462 within a group is less than 64k in size. */
11465 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
11467 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11468 bfd_vma addr, off, limit;
11473 if (!htab->second_toc_pass)
11475 /* Keep track of the first .toc or .got section for this input bfd. */
11476 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11480 htab->toc_bfd = isec->owner;
11481 htab->toc_first_sec = isec;
11484 addr = isec->output_offset + isec->output_section->vma;
11485 off = addr - htab->toc_curr;
11486 limit = 0x80008000;
11487 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11489 if (off + isec->size > limit)
11491 addr = (htab->toc_first_sec->output_offset
11492 + htab->toc_first_sec->output_section->vma);
11493 htab->toc_curr = addr;
11494 htab->toc_curr &= -TOC_BASE_ALIGN;
11497 /* toc_curr is the base address of this toc group. Set elf_gp
11498 for the input section to be the offset relative to the
11499 output toc base plus 0x8000. Making the input elf_gp an
11500 offset allows us to move the toc as a whole without
11501 recalculating input elf_gp. */
11502 off = htab->toc_curr - elf_gp (info->output_bfd);
11503 off += TOC_BASE_OFF;
11505 /* Die if someone uses a linker script that doesn't keep input
11506 file .toc and .got together. */
11508 && elf_gp (isec->owner) != 0
11509 && elf_gp (isec->owner) != off)
11512 elf_gp (isec->owner) = off;
11516 /* During the second pass toc_first_sec points to the start of
11517 a toc group, and toc_curr is used to track the old elf_gp.
11518 We use toc_bfd to ensure we only look at each bfd once. */
11519 if (htab->toc_bfd == isec->owner)
11521 htab->toc_bfd = isec->owner;
11523 if (htab->toc_first_sec == NULL
11524 || htab->toc_curr != elf_gp (isec->owner))
11526 htab->toc_curr = elf_gp (isec->owner);
11527 htab->toc_first_sec = isec;
11529 addr = (htab->toc_first_sec->output_offset
11530 + htab->toc_first_sec->output_section->vma);
11531 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
11532 elf_gp (isec->owner) = off;
11537 /* Called via elf_link_hash_traverse to merge GOT entries for global
11541 merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11543 if (h->root.type == bfd_link_hash_indirect)
11546 merge_got_entries (&h->got.glist);
11551 /* Called via elf_link_hash_traverse to allocate GOT entries for global
11555 reallocate_got (struct elf_link_hash_entry *h, void *inf)
11557 struct got_entry *gent;
11559 if (h->root.type == bfd_link_hash_indirect)
11562 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11563 if (!gent->is_indirect)
11564 allocate_got (h, (struct bfd_link_info *) inf, gent);
11568 /* Called on the first multitoc pass after the last call to
11569 ppc64_elf_next_toc_section. This function removes duplicate GOT
11573 ppc64_elf_layout_multitoc (struct bfd_link_info *info)
11575 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11576 struct bfd *ibfd, *ibfd2;
11577 bfd_boolean done_something;
11579 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
11581 if (!htab->do_multi_toc)
11584 /* Merge global sym got entries within a toc group. */
11585 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11587 /* And tlsld_got. */
11588 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11590 struct got_entry *ent, *ent2;
11592 if (!is_ppc64_elf (ibfd))
11595 ent = ppc64_tlsld_got (ibfd);
11596 if (!ent->is_indirect
11597 && ent->got.offset != (bfd_vma) -1)
11599 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
11601 if (!is_ppc64_elf (ibfd2))
11604 ent2 = ppc64_tlsld_got (ibfd2);
11605 if (!ent2->is_indirect
11606 && ent2->got.offset != (bfd_vma) -1
11607 && elf_gp (ibfd2) == elf_gp (ibfd))
11609 ent2->is_indirect = TRUE;
11610 ent2->got.ent = ent;
11616 /* Zap sizes of got sections. */
11617 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11618 htab->elf.irelplt->size -= htab->got_reli_size;
11619 htab->got_reli_size = 0;
11621 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11623 asection *got, *relgot;
11625 if (!is_ppc64_elf (ibfd))
11628 got = ppc64_elf_tdata (ibfd)->got;
11631 got->rawsize = got->size;
11633 relgot = ppc64_elf_tdata (ibfd)->relgot;
11634 relgot->rawsize = relgot->size;
11639 /* Now reallocate the got, local syms first. We don't need to
11640 allocate section contents again since we never increase size. */
11641 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11643 struct got_entry **lgot_ents;
11644 struct got_entry **end_lgot_ents;
11645 struct plt_entry **local_plt;
11646 struct plt_entry **end_local_plt;
11647 unsigned char *lgot_masks;
11648 bfd_size_type locsymcount;
11649 Elf_Internal_Shdr *symtab_hdr;
11652 if (!is_ppc64_elf (ibfd))
11655 lgot_ents = elf_local_got_ents (ibfd);
11659 symtab_hdr = &elf_symtab_hdr (ibfd);
11660 locsymcount = symtab_hdr->sh_info;
11661 end_lgot_ents = lgot_ents + locsymcount;
11662 local_plt = (struct plt_entry **) end_lgot_ents;
11663 end_local_plt = local_plt + locsymcount;
11664 lgot_masks = (unsigned char *) end_local_plt;
11665 s = ppc64_elf_tdata (ibfd)->got;
11666 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11668 struct got_entry *ent;
11670 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
11672 unsigned int ent_size = 8;
11673 unsigned int rel_size = sizeof (Elf64_External_Rela);
11675 ent->got.offset = s->size;
11676 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
11681 s->size += ent_size;
11682 if ((*lgot_masks & PLT_IFUNC) != 0)
11684 htab->elf.irelplt->size += rel_size;
11685 htab->got_reli_size += rel_size;
11687 else if (bfd_link_pic (info))
11689 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11690 srel->size += rel_size;
11696 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11698 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11700 struct got_entry *ent;
11702 if (!is_ppc64_elf (ibfd))
11705 ent = ppc64_tlsld_got (ibfd);
11706 if (!ent->is_indirect
11707 && ent->got.offset != (bfd_vma) -1)
11709 asection *s = ppc64_elf_tdata (ibfd)->got;
11710 ent->got.offset = s->size;
11712 if (bfd_link_pic (info))
11714 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11715 srel->size += sizeof (Elf64_External_Rela);
11720 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
11721 if (!done_something)
11722 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
11726 if (!is_ppc64_elf (ibfd))
11729 got = ppc64_elf_tdata (ibfd)->got;
11732 done_something = got->rawsize != got->size;
11733 if (done_something)
11738 if (done_something)
11739 (*htab->params->layout_sections_again) ();
11741 /* Set up for second pass over toc sections to recalculate elf_gp
11742 on input sections. */
11743 htab->toc_bfd = NULL;
11744 htab->toc_first_sec = NULL;
11745 htab->second_toc_pass = TRUE;
11746 return done_something;
11749 /* Called after second pass of multitoc partitioning. */
11752 ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11754 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11756 /* After the second pass, toc_curr tracks the TOC offset used
11757 for code sections below in ppc64_elf_next_input_section. */
11758 htab->toc_curr = TOC_BASE_OFF;
11761 /* No toc references were found in ISEC. If the code in ISEC makes no
11762 calls, then there's no need to use toc adjusting stubs when branching
11763 into ISEC. Actually, indirect calls from ISEC are OK as they will
11764 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11765 needed, and 2 if a cyclical call-graph was found but no other reason
11766 for a stub was detected. If called from the top level, a return of
11767 2 means the same as a return of 0. */
11770 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
11774 /* Mark this section as checked. */
11775 isec->call_check_done = 1;
11777 /* We know none of our code bearing sections will need toc stubs. */
11778 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11781 if (isec->size == 0)
11784 if (isec->output_section == NULL)
11788 if (isec->reloc_count != 0)
11790 Elf_Internal_Rela *relstart, *rel;
11791 Elf_Internal_Sym *local_syms;
11792 struct ppc_link_hash_table *htab;
11794 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11795 info->keep_memory);
11796 if (relstart == NULL)
11799 /* Look for branches to outside of this section. */
11801 htab = ppc_hash_table (info);
11805 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
11807 enum elf_ppc64_reloc_type r_type;
11808 unsigned long r_symndx;
11809 struct elf_link_hash_entry *h;
11810 struct ppc_link_hash_entry *eh;
11811 Elf_Internal_Sym *sym;
11813 struct _opd_sec_data *opd;
11817 r_type = ELF64_R_TYPE (rel->r_info);
11818 if (r_type != R_PPC64_REL24
11819 && r_type != R_PPC64_REL14
11820 && r_type != R_PPC64_REL14_BRTAKEN
11821 && r_type != R_PPC64_REL14_BRNTAKEN)
11824 r_symndx = ELF64_R_SYM (rel->r_info);
11825 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11832 /* Calls to dynamic lib functions go through a plt call stub
11834 eh = (struct ppc_link_hash_entry *) h;
11836 && (eh->elf.plt.plist != NULL
11838 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11844 if (sym_sec == NULL)
11845 /* Ignore other undefined symbols. */
11848 /* Assume branches to other sections not included in the
11849 link need stubs too, to cover -R and absolute syms. */
11850 if (sym_sec->output_section == NULL)
11857 sym_value = sym->st_value;
11860 if (h->root.type != bfd_link_hash_defined
11861 && h->root.type != bfd_link_hash_defweak)
11863 sym_value = h->root.u.def.value;
11865 sym_value += rel->r_addend;
11867 /* If this branch reloc uses an opd sym, find the code section. */
11868 opd = get_opd_info (sym_sec);
11871 if (h == NULL && opd->adjust != NULL)
11875 adjust = opd->adjust[OPD_NDX (sym_value)];
11877 /* Assume deleted functions won't ever be called. */
11879 sym_value += adjust;
11882 dest = opd_entry_value (sym_sec, sym_value,
11883 &sym_sec, NULL, FALSE);
11884 if (dest == (bfd_vma) -1)
11889 + sym_sec->output_offset
11890 + sym_sec->output_section->vma);
11892 /* Ignore branch to self. */
11893 if (sym_sec == isec)
11896 /* If the called function uses the toc, we need a stub. */
11897 if (sym_sec->has_toc_reloc
11898 || sym_sec->makes_toc_func_call)
11904 /* Assume any branch that needs a long branch stub might in fact
11905 need a plt_branch stub. A plt_branch stub uses r2. */
11906 else if (dest - (isec->output_offset
11907 + isec->output_section->vma
11908 + rel->r_offset) + (1 << 25)
11909 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11917 /* If calling back to a section in the process of being
11918 tested, we can't say for sure that no toc adjusting stubs
11919 are needed, so don't return zero. */
11920 else if (sym_sec->call_check_in_progress)
11923 /* Branches to another section that itself doesn't have any TOC
11924 references are OK. Recursively call ourselves to check. */
11925 else if (!sym_sec->call_check_done)
11929 /* Mark current section as indeterminate, so that other
11930 sections that call back to current won't be marked as
11932 isec->call_check_in_progress = 1;
11933 recur = toc_adjusting_stub_needed (info, sym_sec);
11934 isec->call_check_in_progress = 0;
11945 if (local_syms != NULL
11946 && (elf_symtab_hdr (isec->owner).contents
11947 != (unsigned char *) local_syms))
11949 if (elf_section_data (isec)->relocs != relstart)
11954 && isec->map_head.s != NULL
11955 && (strcmp (isec->output_section->name, ".init") == 0
11956 || strcmp (isec->output_section->name, ".fini") == 0))
11958 if (isec->map_head.s->has_toc_reloc
11959 || isec->map_head.s->makes_toc_func_call)
11961 else if (!isec->map_head.s->call_check_done)
11964 isec->call_check_in_progress = 1;
11965 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11966 isec->call_check_in_progress = 0;
11973 isec->makes_toc_func_call = 1;
11978 /* The linker repeatedly calls this function for each input section,
11979 in the order that input sections are linked into output sections.
11980 Build lists of input sections to determine groupings between which
11981 we may insert linker stubs. */
11984 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
11986 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11991 if ((isec->output_section->flags & SEC_CODE) != 0
11992 && isec->output_section->id < htab->sec_info_arr_size)
11994 /* This happens to make the list in reverse order,
11995 which is what we want. */
11996 htab->sec_info[isec->id].u.list
11997 = htab->sec_info[isec->output_section->id].u.list;
11998 htab->sec_info[isec->output_section->id].u.list = isec;
12001 if (htab->multi_toc_needed)
12003 /* Analyse sections that aren't already flagged as needing a
12004 valid toc pointer. Exclude .fixup for the linux kernel.
12005 .fixup contains branches, but only back to the function that
12006 hit an exception. */
12007 if (!(isec->has_toc_reloc
12008 || (isec->flags & SEC_CODE) == 0
12009 || strcmp (isec->name, ".fixup") == 0
12010 || isec->call_check_done))
12012 if (toc_adjusting_stub_needed (info, isec) < 0)
12015 /* Make all sections use the TOC assigned for this object file.
12016 This will be wrong for pasted sections; We fix that in
12017 check_pasted_section(). */
12018 if (elf_gp (isec->owner) != 0)
12019 htab->toc_curr = elf_gp (isec->owner);
12022 htab->sec_info[isec->id].toc_off = htab->toc_curr;
12026 /* Check that all .init and .fini sections use the same toc, if they
12027 have toc relocs. */
12030 check_pasted_section (struct bfd_link_info *info, const char *name)
12032 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12036 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12037 bfd_vma toc_off = 0;
12040 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12041 if (i->has_toc_reloc)
12044 toc_off = htab->sec_info[i->id].toc_off;
12045 else if (toc_off != htab->sec_info[i->id].toc_off)
12050 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12051 if (i->makes_toc_func_call)
12053 toc_off = htab->sec_info[i->id].toc_off;
12057 /* Make sure the whole pasted function uses the same toc offset. */
12059 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12060 htab->sec_info[i->id].toc_off = toc_off;
12066 ppc64_elf_check_init_fini (struct bfd_link_info *info)
12068 return (check_pasted_section (info, ".init")
12069 & check_pasted_section (info, ".fini"));
12072 /* See whether we can group stub sections together. Grouping stub
12073 sections may result in fewer stubs. More importantly, we need to
12074 put all .init* and .fini* stubs at the beginning of the .init or
12075 .fini output sections respectively, because glibc splits the
12076 _init and _fini functions into multiple parts. Putting a stub in
12077 the middle of a function is not a good idea. */
12080 group_sections (struct bfd_link_info *info,
12081 bfd_size_type stub_group_size,
12082 bfd_boolean stubs_always_before_branch)
12084 struct ppc_link_hash_table *htab;
12086 bfd_boolean suppress_size_errors;
12088 htab = ppc_hash_table (info);
12092 suppress_size_errors = FALSE;
12093 if (stub_group_size == 1)
12095 /* Default values. */
12096 if (stubs_always_before_branch)
12097 stub_group_size = 0x1e00000;
12099 stub_group_size = 0x1c00000;
12100 suppress_size_errors = TRUE;
12103 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
12107 if (osec->id >= htab->sec_info_arr_size)
12110 tail = htab->sec_info[osec->id].u.list;
12111 while (tail != NULL)
12115 bfd_size_type total;
12116 bfd_boolean big_sec;
12118 struct map_stub *group;
12119 bfd_size_type group_size;
12122 total = tail->size;
12123 group_size = (ppc64_elf_section_data (tail) != NULL
12124 && ppc64_elf_section_data (tail)->has_14bit_branch
12125 ? stub_group_size >> 10 : stub_group_size);
12127 big_sec = total > group_size;
12128 if (big_sec && !suppress_size_errors)
12129 /* xgettext:c-format */
12130 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
12131 tail->owner, tail);
12132 curr_toc = htab->sec_info[tail->id].toc_off;
12134 while ((prev = htab->sec_info[curr->id].u.list) != NULL
12135 && ((total += curr->output_offset - prev->output_offset)
12136 < (ppc64_elf_section_data (prev) != NULL
12137 && ppc64_elf_section_data (prev)->has_14bit_branch
12138 ? (group_size = stub_group_size >> 10) : group_size))
12139 && htab->sec_info[prev->id].toc_off == curr_toc)
12142 /* OK, the size from the start of CURR to the end is less
12143 than group_size and thus can be handled by one stub
12144 section. (or the tail section is itself larger than
12145 group_size, in which case we may be toast.) We should
12146 really be keeping track of the total size of stubs added
12147 here, as stubs contribute to the final output section
12148 size. That's a little tricky, and this way will only
12149 break if stubs added make the total size more than 2^25,
12150 ie. for the default stub_group_size, if stubs total more
12151 than 2097152 bytes, or nearly 75000 plt call stubs. */
12152 group = bfd_alloc (curr->owner, sizeof (*group));
12155 group->link_sec = curr;
12156 group->stub_sec = NULL;
12157 group->needs_save_res = 0;
12158 group->tls_get_addr_opt_bctrl = -1u;
12159 group->next = htab->group;
12160 htab->group = group;
12163 prev = htab->sec_info[tail->id].u.list;
12164 /* Set up this stub group. */
12165 htab->sec_info[tail->id].u.group = group;
12167 while (tail != curr && (tail = prev) != NULL);
12169 /* But wait, there's more! Input sections up to group_size
12170 bytes before the stub section can be handled by it too.
12171 Don't do this if we have a really large section after the
12172 stubs, as adding more stubs increases the chance that
12173 branches may not reach into the stub section. */
12174 if (!stubs_always_before_branch && !big_sec)
12177 while (prev != NULL
12178 && ((total += tail->output_offset - prev->output_offset)
12179 < (ppc64_elf_section_data (prev) != NULL
12180 && ppc64_elf_section_data (prev)->has_14bit_branch
12181 ? (group_size = stub_group_size >> 10) : group_size))
12182 && htab->sec_info[prev->id].toc_off == curr_toc)
12185 prev = htab->sec_info[tail->id].u.list;
12186 htab->sec_info[tail->id].u.group = group;
12195 static const unsigned char glink_eh_frame_cie[] =
12197 0, 0, 0, 16, /* length. */
12198 0, 0, 0, 0, /* id. */
12199 1, /* CIE version. */
12200 'z', 'R', 0, /* Augmentation string. */
12201 4, /* Code alignment. */
12202 0x78, /* Data alignment. */
12204 1, /* Augmentation size. */
12205 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
12206 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
12210 stub_eh_frame_size (struct map_stub *group, size_t align)
12212 size_t this_size = 17;
12213 if (group->tls_get_addr_opt_bctrl != -1u)
12215 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
12218 else if (to_bctrl < 256)
12220 else if (to_bctrl < 65536)
12226 this_size = (this_size + align - 1) & -align;
12230 /* Stripping output sections is normally done before dynamic section
12231 symbols have been allocated. This function is called later, and
12232 handles cases like htab->brlt which is mapped to its own output
12236 maybe_strip_output (struct bfd_link_info *info, asection *isec)
12238 if (isec->size == 0
12239 && isec->output_section->size == 0
12240 && !(isec->output_section->flags & SEC_KEEP)
12241 && !bfd_section_removed_from_list (info->output_bfd,
12242 isec->output_section)
12243 && elf_section_data (isec->output_section)->dynindx == 0)
12245 isec->output_section->flags |= SEC_EXCLUDE;
12246 bfd_section_list_remove (info->output_bfd, isec->output_section);
12247 info->output_bfd->section_count--;
12251 /* Determine and set the size of the stub section for a final link.
12253 The basic idea here is to examine all the relocations looking for
12254 PC-relative calls to a target that is unreachable with a "bl"
12258 ppc64_elf_size_stubs (struct bfd_link_info *info)
12260 bfd_size_type stub_group_size;
12261 bfd_boolean stubs_always_before_branch;
12262 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12267 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
12268 htab->params->plt_thread_safe = 1;
12269 if (!htab->opd_abi)
12270 htab->params->plt_thread_safe = 0;
12271 else if (htab->params->plt_thread_safe == -1)
12273 static const char *const thread_starter[] =
12277 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12279 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12280 "mq_notify", "create_timer",
12285 "GOMP_parallel_start",
12286 "GOMP_parallel_loop_static",
12287 "GOMP_parallel_loop_static_start",
12288 "GOMP_parallel_loop_dynamic",
12289 "GOMP_parallel_loop_dynamic_start",
12290 "GOMP_parallel_loop_guided",
12291 "GOMP_parallel_loop_guided_start",
12292 "GOMP_parallel_loop_runtime",
12293 "GOMP_parallel_loop_runtime_start",
12294 "GOMP_parallel_sections",
12295 "GOMP_parallel_sections_start",
12301 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
12303 struct elf_link_hash_entry *h;
12304 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12305 FALSE, FALSE, TRUE);
12306 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12307 if (htab->params->plt_thread_safe)
12311 stubs_always_before_branch = htab->params->group_size < 0;
12312 if (htab->params->group_size < 0)
12313 stub_group_size = -htab->params->group_size;
12315 stub_group_size = htab->params->group_size;
12317 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12320 #define STUB_SHRINK_ITER 20
12321 /* Loop until no stubs added. After iteration 20 of this loop we may
12322 exit on a stub section shrinking. This is to break out of a
12323 pathological case where adding stubs on one iteration decreases
12324 section gaps (perhaps due to alignment), which then requires
12325 fewer or smaller stubs on the next iteration. */
12330 unsigned int bfd_indx;
12331 struct map_stub *group;
12333 htab->stub_iteration += 1;
12335 for (input_bfd = info->input_bfds, bfd_indx = 0;
12337 input_bfd = input_bfd->link.next, bfd_indx++)
12339 Elf_Internal_Shdr *symtab_hdr;
12341 Elf_Internal_Sym *local_syms = NULL;
12343 if (!is_ppc64_elf (input_bfd))
12346 /* We'll need the symbol table in a second. */
12347 symtab_hdr = &elf_symtab_hdr (input_bfd);
12348 if (symtab_hdr->sh_info == 0)
12351 /* Walk over each section attached to the input bfd. */
12352 for (section = input_bfd->sections;
12354 section = section->next)
12356 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
12358 /* If there aren't any relocs, then there's nothing more
12360 if ((section->flags & SEC_RELOC) == 0
12361 || (section->flags & SEC_ALLOC) == 0
12362 || (section->flags & SEC_LOAD) == 0
12363 || (section->flags & SEC_CODE) == 0
12364 || section->reloc_count == 0)
12367 /* If this section is a link-once section that will be
12368 discarded, then don't create any stubs. */
12369 if (section->output_section == NULL
12370 || section->output_section->owner != info->output_bfd)
12373 /* Get the relocs. */
12375 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
12376 info->keep_memory);
12377 if (internal_relocs == NULL)
12378 goto error_ret_free_local;
12380 /* Now examine each relocation. */
12381 irela = internal_relocs;
12382 irelaend = irela + section->reloc_count;
12383 for (; irela < irelaend; irela++)
12385 enum elf_ppc64_reloc_type r_type;
12386 unsigned int r_indx;
12387 enum ppc_stub_type stub_type;
12388 struct ppc_stub_hash_entry *stub_entry;
12389 asection *sym_sec, *code_sec;
12390 bfd_vma sym_value, code_value;
12391 bfd_vma destination;
12392 unsigned long local_off;
12393 bfd_boolean ok_dest;
12394 struct ppc_link_hash_entry *hash;
12395 struct ppc_link_hash_entry *fdh;
12396 struct elf_link_hash_entry *h;
12397 Elf_Internal_Sym *sym;
12399 const asection *id_sec;
12400 struct _opd_sec_data *opd;
12401 struct plt_entry *plt_ent;
12403 r_type = ELF64_R_TYPE (irela->r_info);
12404 r_indx = ELF64_R_SYM (irela->r_info);
12406 if (r_type >= R_PPC64_max)
12408 bfd_set_error (bfd_error_bad_value);
12409 goto error_ret_free_internal;
12412 /* Only look for stubs on branch instructions. */
12413 if (r_type != R_PPC64_REL24
12414 && r_type != R_PPC64_REL14
12415 && r_type != R_PPC64_REL14_BRTAKEN
12416 && r_type != R_PPC64_REL14_BRNTAKEN)
12419 /* Now determine the call target, its name, value,
12421 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12422 r_indx, input_bfd))
12423 goto error_ret_free_internal;
12424 hash = (struct ppc_link_hash_entry *) h;
12431 sym_value = sym->st_value;
12432 if (sym_sec != NULL
12433 && sym_sec->output_section != NULL)
12436 else if (hash->elf.root.type == bfd_link_hash_defined
12437 || hash->elf.root.type == bfd_link_hash_defweak)
12439 sym_value = hash->elf.root.u.def.value;
12440 if (sym_sec->output_section != NULL)
12443 else if (hash->elf.root.type == bfd_link_hash_undefweak
12444 || hash->elf.root.type == bfd_link_hash_undefined)
12446 /* Recognise an old ABI func code entry sym, and
12447 use the func descriptor sym instead if it is
12449 if (hash->elf.root.root.string[0] == '.'
12450 && hash->oh != NULL)
12452 fdh = ppc_follow_link (hash->oh);
12453 if (fdh->elf.root.type == bfd_link_hash_defined
12454 || fdh->elf.root.type == bfd_link_hash_defweak)
12456 sym_sec = fdh->elf.root.u.def.section;
12457 sym_value = fdh->elf.root.u.def.value;
12458 if (sym_sec->output_section != NULL)
12467 bfd_set_error (bfd_error_bad_value);
12468 goto error_ret_free_internal;
12475 sym_value += irela->r_addend;
12476 destination = (sym_value
12477 + sym_sec->output_offset
12478 + sym_sec->output_section->vma);
12479 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12484 code_sec = sym_sec;
12485 code_value = sym_value;
12486 opd = get_opd_info (sym_sec);
12491 if (hash == NULL && opd->adjust != NULL)
12493 long adjust = opd->adjust[OPD_NDX (sym_value)];
12496 code_value += adjust;
12497 sym_value += adjust;
12499 dest = opd_entry_value (sym_sec, sym_value,
12500 &code_sec, &code_value, FALSE);
12501 if (dest != (bfd_vma) -1)
12503 destination = dest;
12506 /* Fixup old ABI sym to point at code
12508 hash->elf.root.type = bfd_link_hash_defweak;
12509 hash->elf.root.u.def.section = code_sec;
12510 hash->elf.root.u.def.value = code_value;
12515 /* Determine what (if any) linker stub is needed. */
12517 stub_type = ppc_type_of_stub (section, irela, &hash,
12518 &plt_ent, destination,
12521 if (stub_type != ppc_stub_plt_call)
12523 /* Check whether we need a TOC adjusting stub.
12524 Since the linker pastes together pieces from
12525 different object files when creating the
12526 _init and _fini functions, it may be that a
12527 call to what looks like a local sym is in
12528 fact a call needing a TOC adjustment. */
12529 if (code_sec != NULL
12530 && code_sec->output_section != NULL
12531 && (htab->sec_info[code_sec->id].toc_off
12532 != htab->sec_info[section->id].toc_off)
12533 && (code_sec->has_toc_reloc
12534 || code_sec->makes_toc_func_call))
12535 stub_type = ppc_stub_long_branch_r2off;
12538 if (stub_type == ppc_stub_none)
12541 /* __tls_get_addr calls might be eliminated. */
12542 if (stub_type != ppc_stub_plt_call
12544 && (hash == htab->tls_get_addr
12545 || hash == htab->tls_get_addr_fd)
12546 && section->has_tls_reloc
12547 && irela != internal_relocs)
12549 /* Get tls info. */
12550 unsigned char *tls_mask;
12552 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
12553 irela - 1, input_bfd))
12554 goto error_ret_free_internal;
12555 if (*tls_mask != 0)
12559 if (stub_type == ppc_stub_plt_call)
12562 && htab->params->plt_localentry0 != 0
12563 && is_elfv2_localentry0 (&hash->elf))
12564 htab->has_plt_localentry0 = 1;
12565 else if (irela + 1 < irelaend
12566 && irela[1].r_offset == irela->r_offset + 4
12567 && (ELF64_R_TYPE (irela[1].r_info)
12568 == R_PPC64_TOCSAVE))
12570 if (!tocsave_find (htab, INSERT,
12571 &local_syms, irela + 1, input_bfd))
12572 goto error_ret_free_internal;
12575 stub_type = ppc_stub_plt_call_r2save;
12578 /* Support for grouping stub sections. */
12579 id_sec = htab->sec_info[section->id].u.group->link_sec;
12581 /* Get the name of this stub. */
12582 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12584 goto error_ret_free_internal;
12586 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
12587 stub_name, FALSE, FALSE);
12588 if (stub_entry != NULL)
12590 /* The proper stub has already been created. */
12592 if (stub_type == ppc_stub_plt_call_r2save)
12593 stub_entry->stub_type = stub_type;
12597 stub_entry = ppc_add_stub (stub_name, section, info);
12598 if (stub_entry == NULL)
12601 error_ret_free_internal:
12602 if (elf_section_data (section)->relocs == NULL)
12603 free (internal_relocs);
12604 error_ret_free_local:
12605 if (local_syms != NULL
12606 && (symtab_hdr->contents
12607 != (unsigned char *) local_syms))
12612 stub_entry->stub_type = stub_type;
12613 if (stub_type != ppc_stub_plt_call
12614 && stub_type != ppc_stub_plt_call_r2save)
12616 stub_entry->target_value = code_value;
12617 stub_entry->target_section = code_sec;
12621 stub_entry->target_value = sym_value;
12622 stub_entry->target_section = sym_sec;
12624 stub_entry->h = hash;
12625 stub_entry->plt_ent = plt_ent;
12626 stub_entry->other = hash ? hash->elf.other : sym->st_other;
12628 if (stub_entry->h != NULL)
12629 htab->stub_globals += 1;
12632 /* We're done with the internal relocs, free them. */
12633 if (elf_section_data (section)->relocs != internal_relocs)
12634 free (internal_relocs);
12637 if (local_syms != NULL
12638 && symtab_hdr->contents != (unsigned char *) local_syms)
12640 if (!info->keep_memory)
12643 symtab_hdr->contents = (unsigned char *) local_syms;
12647 /* We may have added some stubs. Find out the new size of the
12649 for (group = htab->group; group != NULL; group = group->next)
12650 if (group->stub_sec != NULL)
12652 asection *stub_sec = group->stub_sec;
12654 if (htab->stub_iteration <= STUB_SHRINK_ITER
12655 || stub_sec->rawsize < stub_sec->size)
12656 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12657 stub_sec->rawsize = stub_sec->size;
12658 stub_sec->size = 0;
12659 stub_sec->reloc_count = 0;
12660 stub_sec->flags &= ~SEC_RELOC;
12663 if (htab->stub_iteration <= STUB_SHRINK_ITER
12664 || htab->brlt->rawsize < htab->brlt->size)
12665 htab->brlt->rawsize = htab->brlt->size;
12666 htab->brlt->size = 0;
12667 htab->brlt->reloc_count = 0;
12668 htab->brlt->flags &= ~SEC_RELOC;
12669 if (htab->relbrlt != NULL)
12670 htab->relbrlt->size = 0;
12672 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
12674 for (group = htab->group; group != NULL; group = group->next)
12675 if (group->needs_save_res)
12676 group->stub_sec->size += htab->sfpr->size;
12678 if (info->emitrelocations
12679 && htab->glink != NULL && htab->glink->size != 0)
12681 htab->glink->reloc_count = 1;
12682 htab->glink->flags |= SEC_RELOC;
12685 if (htab->glink_eh_frame != NULL
12686 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
12687 && htab->glink_eh_frame->output_section->size > 8)
12689 size_t size = 0, align = 4;
12691 for (group = htab->group; group != NULL; group = group->next)
12692 if (group->stub_sec != NULL)
12693 size += stub_eh_frame_size (group, align);
12694 if (htab->glink != NULL && htab->glink->size != 0)
12695 size += (24 + align - 1) & -align;
12697 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
12698 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
12699 size = (size + align - 1) & -align;
12700 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12701 htab->glink_eh_frame->size = size;
12704 if (htab->params->plt_stub_align != 0)
12705 for (group = htab->group; group != NULL; group = group->next)
12706 if (group->stub_sec != NULL)
12708 int align = abs (htab->params->plt_stub_align);
12709 group->stub_sec->size
12710 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
12713 for (group = htab->group; group != NULL; group = group->next)
12714 if (group->stub_sec != NULL
12715 && group->stub_sec->rawsize != group->stub_sec->size
12716 && (htab->stub_iteration <= STUB_SHRINK_ITER
12717 || group->stub_sec->rawsize < group->stub_sec->size))
12721 && (htab->brlt->rawsize == htab->brlt->size
12722 || (htab->stub_iteration > STUB_SHRINK_ITER
12723 && htab->brlt->rawsize > htab->brlt->size))
12724 && (htab->glink_eh_frame == NULL
12725 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
12728 /* Ask the linker to do its stuff. */
12729 (*htab->params->layout_sections_again) ();
12732 if (htab->glink_eh_frame != NULL
12733 && htab->glink_eh_frame->size != 0)
12736 bfd_byte *p, *last_fde;
12737 size_t last_fde_len, size, align, pad;
12738 struct map_stub *group;
12740 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12743 htab->glink_eh_frame->contents = p;
12747 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12748 /* CIE length (rewrite in case little-endian). */
12749 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
12750 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12751 p += last_fde_len + 4;
12753 for (group = htab->group; group != NULL; group = group->next)
12754 if (group->stub_sec != NULL)
12757 last_fde_len = stub_eh_frame_size (group, align) - 4;
12759 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12762 val = p - htab->glink_eh_frame->contents;
12763 bfd_put_32 (htab->elf.dynobj, val, p);
12765 /* Offset to stub section, written later. */
12767 /* stub section size. */
12768 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
12770 /* Augmentation. */
12772 if (group->tls_get_addr_opt_bctrl != -1u)
12774 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
12776 /* This FDE needs more than just the default.
12777 Describe __tls_get_addr_opt stub LR. */
12779 *p++ = DW_CFA_advance_loc + to_bctrl;
12780 else if (to_bctrl < 256)
12782 *p++ = DW_CFA_advance_loc1;
12785 else if (to_bctrl < 65536)
12787 *p++ = DW_CFA_advance_loc2;
12788 bfd_put_16 (htab->elf.dynobj, to_bctrl, p);
12793 *p++ = DW_CFA_advance_loc4;
12794 bfd_put_32 (htab->elf.dynobj, to_bctrl, p);
12797 *p++ = DW_CFA_offset_extended_sf;
12799 *p++ = -(STK_LINKER (htab) / 8) & 0x7f;
12800 *p++ = DW_CFA_advance_loc + 4;
12801 *p++ = DW_CFA_restore_extended;
12805 p = last_fde + last_fde_len + 4;
12807 if (htab->glink != NULL && htab->glink->size != 0)
12810 last_fde_len = ((24 + align - 1) & -align) - 4;
12812 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12815 val = p - htab->glink_eh_frame->contents;
12816 bfd_put_32 (htab->elf.dynobj, val, p);
12818 /* Offset to .glink, written later. */
12821 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12823 /* Augmentation. */
12826 *p++ = DW_CFA_advance_loc + 1;
12827 *p++ = DW_CFA_register;
12829 *p++ = htab->opd_abi ? 12 : 0;
12830 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
12831 *p++ = DW_CFA_restore_extended;
12833 p += ((24 + align - 1) & -align) - 24;
12835 /* Subsume any padding into the last FDE if user .eh_frame
12836 sections are aligned more than glink_eh_frame. Otherwise any
12837 zero padding will be seen as a terminator. */
12838 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
12839 size = p - htab->glink_eh_frame->contents;
12840 pad = ((size + align - 1) & -align) - size;
12841 htab->glink_eh_frame->size = size + pad;
12842 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12845 maybe_strip_output (info, htab->brlt);
12846 if (htab->glink_eh_frame != NULL)
12847 maybe_strip_output (info, htab->glink_eh_frame);
12852 /* Called after we have determined section placement. If sections
12853 move, we'll be called again. Provide a value for TOCstart. */
12856 ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
12859 bfd_vma TOCstart, adjust;
12863 struct elf_link_hash_entry *h;
12864 struct elf_link_hash_table *htab = elf_hash_table (info);
12866 if (is_elf_hash_table (htab)
12867 && htab->hgot != NULL)
12871 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12872 if (is_elf_hash_table (htab))
12876 && h->root.type == bfd_link_hash_defined
12877 && !h->root.linker_def
12878 && (!is_elf_hash_table (htab)
12879 || h->def_regular))
12881 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12882 + h->root.u.def.section->output_offset
12883 + h->root.u.def.section->output_section->vma);
12884 _bfd_set_gp_value (obfd, TOCstart);
12889 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12890 order. The TOC starts where the first of these sections starts. */
12891 s = bfd_get_section_by_name (obfd, ".got");
12892 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12893 s = bfd_get_section_by_name (obfd, ".toc");
12894 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12895 s = bfd_get_section_by_name (obfd, ".tocbss");
12896 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12897 s = bfd_get_section_by_name (obfd, ".plt");
12898 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
12900 /* This may happen for
12901 o references to TOC base (SYM@toc / TOC[tc0]) without a
12903 o bad linker script
12904 o --gc-sections and empty TOC sections
12906 FIXME: Warn user? */
12908 /* Look for a likely section. We probably won't even be
12910 for (s = obfd->sections; s != NULL; s = s->next)
12911 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12913 == (SEC_ALLOC | SEC_SMALL_DATA))
12916 for (s = obfd->sections; s != NULL; s = s->next)
12917 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
12918 == (SEC_ALLOC | SEC_SMALL_DATA))
12921 for (s = obfd->sections; s != NULL; s = s->next)
12922 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12926 for (s = obfd->sections; s != NULL; s = s->next)
12927 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
12933 TOCstart = s->output_section->vma + s->output_offset;
12935 /* Force alignment. */
12936 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12937 TOCstart -= adjust;
12938 _bfd_set_gp_value (obfd, TOCstart);
12940 if (info != NULL && s != NULL)
12942 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12946 if (htab->elf.hgot != NULL)
12948 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
12949 htab->elf.hgot->root.u.def.section = s;
12954 struct bfd_link_hash_entry *bh = NULL;
12955 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
12956 s, TOC_BASE_OFF - adjust,
12957 NULL, FALSE, FALSE, &bh);
12963 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12964 write out any global entry stubs. */
12967 build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12969 struct bfd_link_info *info;
12970 struct ppc_link_hash_table *htab;
12971 struct plt_entry *pent;
12974 if (h->root.type == bfd_link_hash_indirect)
12977 if (!h->pointer_equality_needed)
12980 if (h->def_regular)
12984 htab = ppc_hash_table (info);
12988 s = htab->global_entry;
12989 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12990 if (pent->plt.offset != (bfd_vma) -1
12991 && pent->addend == 0)
12997 p = s->contents + h->root.u.def.value;
12998 plt = htab->elf.splt;
12999 if (!htab->elf.dynamic_sections_created
13000 || h->dynindx == -1)
13001 plt = htab->elf.iplt;
13002 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
13003 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13005 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13007 info->callbacks->einfo
13008 (_("%P: linkage table error against `%pT'\n"),
13009 h->root.root.string);
13010 bfd_set_error (bfd_error_bad_value);
13011 htab->stub_error = TRUE;
13014 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13015 if (htab->params->emit_stub_syms)
13017 size_t len = strlen (h->root.root.string);
13018 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13023 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13024 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13027 if (h->root.type == bfd_link_hash_new)
13029 h->root.type = bfd_link_hash_defined;
13030 h->root.u.def.section = s;
13031 h->root.u.def.value = p - s->contents;
13032 h->ref_regular = 1;
13033 h->def_regular = 1;
13034 h->ref_regular_nonweak = 1;
13035 h->forced_local = 1;
13037 h->root.linker_def = 1;
13041 if (PPC_HA (off) != 0)
13043 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13046 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13048 bfd_put_32 (s->owner, MTCTR_R12, p);
13050 bfd_put_32 (s->owner, BCTR, p);
13056 /* Build all the stubs associated with the current output file.
13057 The stubs are kept in a hash table attached to the main linker
13058 hash table. This function is called via gldelf64ppc_finish. */
13061 ppc64_elf_build_stubs (struct bfd_link_info *info,
13064 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13065 struct map_stub *group;
13066 asection *stub_sec;
13068 int stub_sec_count = 0;
13073 /* Allocate memory to hold the linker stubs. */
13074 for (group = htab->group; group != NULL; group = group->next)
13075 if ((stub_sec = group->stub_sec) != NULL
13076 && stub_sec->size != 0)
13078 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
13079 if (stub_sec->contents == NULL)
13081 stub_sec->size = 0;
13084 if (htab->glink != NULL && htab->glink->size != 0)
13089 /* Build the .glink plt call stub. */
13090 if (htab->params->emit_stub_syms)
13092 struct elf_link_hash_entry *h;
13093 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13094 TRUE, FALSE, FALSE);
13097 if (h->root.type == bfd_link_hash_new)
13099 h->root.type = bfd_link_hash_defined;
13100 h->root.u.def.section = htab->glink;
13101 h->root.u.def.value = 8;
13102 h->ref_regular = 1;
13103 h->def_regular = 1;
13104 h->ref_regular_nonweak = 1;
13105 h->forced_local = 1;
13107 h->root.linker_def = 1;
13110 plt0 = (htab->elf.splt->output_section->vma
13111 + htab->elf.splt->output_offset
13113 if (info->emitrelocations)
13115 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13118 r->r_offset = (htab->glink->output_offset
13119 + htab->glink->output_section->vma);
13120 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13121 r->r_addend = plt0;
13123 p = htab->glink->contents;
13124 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
13125 bfd_put_64 (htab->glink->owner, plt0, p);
13129 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13131 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13133 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13135 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13137 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13139 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13141 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13143 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13145 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13147 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13152 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13154 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13156 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13158 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13160 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13162 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13164 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13166 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13168 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13170 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13172 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13174 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13176 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13179 bfd_put_32 (htab->glink->owner, BCTR, p);
13181 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
13183 /* Build the .glink lazy link call stubs. */
13185 while (p < htab->glink->contents + htab->glink->size)
13191 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13196 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13198 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13203 bfd_put_32 (htab->glink->owner,
13204 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
13210 /* Build .glink global entry stubs. */
13211 if (htab->global_entry != NULL && htab->global_entry->size != 0)
13212 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
13214 if (htab->brlt != NULL && htab->brlt->size != 0)
13216 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
13218 if (htab->brlt->contents == NULL)
13221 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
13223 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
13224 htab->relbrlt->size);
13225 if (htab->relbrlt->contents == NULL)
13229 /* Build the stubs as directed by the stub hash table. */
13230 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
13232 for (group = htab->group; group != NULL; group = group->next)
13233 if (group->needs_save_res)
13235 stub_sec = group->stub_sec;
13236 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13238 if (htab->params->emit_stub_syms)
13242 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13243 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13246 stub_sec->size += htab->sfpr->size;
13249 if (htab->relbrlt != NULL)
13250 htab->relbrlt->reloc_count = 0;
13252 if (htab->params->plt_stub_align != 0)
13253 for (group = htab->group; group != NULL; group = group->next)
13254 if ((stub_sec = group->stub_sec) != NULL)
13256 int align = abs (htab->params->plt_stub_align);
13257 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
13260 for (group = htab->group; group != NULL; group = group->next)
13261 if ((stub_sec = group->stub_sec) != NULL)
13263 stub_sec_count += 1;
13264 if (stub_sec->rawsize != stub_sec->size
13265 && (htab->stub_iteration <= STUB_SHRINK_ITER
13266 || stub_sec->rawsize < stub_sec->size))
13272 htab->stub_error = TRUE;
13273 _bfd_error_handler (_("stubs don't match calculated size"));
13276 if (htab->stub_error)
13282 *stats = bfd_malloc (500);
13283 if (*stats == NULL)
13286 len = sprintf (*stats,
13287 ngettext ("linker stubs in %u group\n",
13288 "linker stubs in %u groups\n",
13291 sprintf (*stats + len, _(" branch %lu\n"
13292 " toc adjust %lu\n"
13293 " long branch %lu\n"
13294 " long toc adj %lu\n"
13296 " plt call toc %lu\n"
13297 " global entry %lu"),
13298 htab->stub_count[ppc_stub_long_branch - 1],
13299 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13300 htab->stub_count[ppc_stub_plt_branch - 1],
13301 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
13302 htab->stub_count[ppc_stub_plt_call - 1],
13303 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13304 htab->stub_count[ppc_stub_global_entry - 1]);
13309 /* What to do when ld finds relocations against symbols defined in
13310 discarded sections. */
13312 static unsigned int
13313 ppc64_elf_action_discarded (asection *sec)
13315 if (strcmp (".opd", sec->name) == 0)
13318 if (strcmp (".toc", sec->name) == 0)
13321 if (strcmp (".toc1", sec->name) == 0)
13324 return _bfd_elf_default_action_discarded (sec);
13327 /* The RELOCATE_SECTION function is called by the ELF backend linker
13328 to handle the relocations for a section.
13330 The relocs are always passed as Rela structures; if the section
13331 actually uses Rel structures, the r_addend field will always be
13334 This function is responsible for adjust the section contents as
13335 necessary, and (if using Rela relocs and generating a
13336 relocatable output file) adjusting the reloc addend as
13339 This function does not have to worry about setting the reloc
13340 address or the reloc symbol index.
13342 LOCAL_SYMS is a pointer to the swapped in local symbols.
13344 LOCAL_SECTIONS is an array giving the section in the input file
13345 corresponding to the st_shndx field of each local symbol.
13347 The global hash table entry for the global symbols can be found
13348 via elf_sym_hashes (input_bfd).
13350 When generating relocatable output, this function must handle
13351 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13352 going to be the section symbol corresponding to the output
13353 section, which means that the addend must be adjusted
13357 ppc64_elf_relocate_section (bfd *output_bfd,
13358 struct bfd_link_info *info,
13360 asection *input_section,
13361 bfd_byte *contents,
13362 Elf_Internal_Rela *relocs,
13363 Elf_Internal_Sym *local_syms,
13364 asection **local_sections)
13366 struct ppc_link_hash_table *htab;
13367 Elf_Internal_Shdr *symtab_hdr;
13368 struct elf_link_hash_entry **sym_hashes;
13369 Elf_Internal_Rela *rel;
13370 Elf_Internal_Rela *wrel;
13371 Elf_Internal_Rela *relend;
13372 Elf_Internal_Rela outrel;
13374 struct got_entry **local_got_ents;
13376 bfd_boolean ret = TRUE;
13377 bfd_boolean is_opd;
13378 /* Assume 'at' branch hints. */
13379 bfd_boolean is_isa_v2 = TRUE;
13380 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
13382 /* Initialize howto table if needed. */
13383 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
13386 htab = ppc_hash_table (info);
13390 /* Don't relocate stub sections. */
13391 if (input_section->owner == htab->params->stub_bfd)
13394 BFD_ASSERT (is_ppc64_elf (input_bfd));
13396 local_got_ents = elf_local_got_ents (input_bfd);
13397 TOCstart = elf_gp (output_bfd);
13398 symtab_hdr = &elf_symtab_hdr (input_bfd);
13399 sym_hashes = elf_sym_hashes (input_bfd);
13400 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
13402 rel = wrel = relocs;
13403 relend = relocs + input_section->reloc_count;
13404 for (; rel < relend; wrel++, rel++)
13406 enum elf_ppc64_reloc_type r_type;
13408 bfd_reloc_status_type r;
13409 Elf_Internal_Sym *sym;
13411 struct elf_link_hash_entry *h_elf;
13412 struct ppc_link_hash_entry *h;
13413 struct ppc_link_hash_entry *fdh;
13414 const char *sym_name;
13415 unsigned long r_symndx, toc_symndx;
13416 bfd_vma toc_addend;
13417 unsigned char tls_mask, tls_gd, tls_type;
13418 unsigned char sym_type;
13419 bfd_vma relocation;
13420 bfd_boolean unresolved_reloc;
13421 bfd_boolean warned;
13422 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
13425 struct ppc_stub_hash_entry *stub_entry;
13426 bfd_vma max_br_offset;
13428 Elf_Internal_Rela orig_rel;
13429 reloc_howto_type *howto;
13430 struct reloc_howto_struct alt_howto;
13435 r_type = ELF64_R_TYPE (rel->r_info);
13436 r_symndx = ELF64_R_SYM (rel->r_info);
13438 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13439 symbol of the previous ADDR64 reloc. The symbol gives us the
13440 proper TOC base to use. */
13441 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
13443 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
13445 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
13451 unresolved_reloc = FALSE;
13454 if (r_symndx < symtab_hdr->sh_info)
13456 /* It's a local symbol. */
13457 struct _opd_sec_data *opd;
13459 sym = local_syms + r_symndx;
13460 sec = local_sections[r_symndx];
13461 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
13462 sym_type = ELF64_ST_TYPE (sym->st_info);
13463 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
13464 opd = get_opd_info (sec);
13465 if (opd != NULL && opd->adjust != NULL)
13467 long adjust = opd->adjust[OPD_NDX (sym->st_value
13473 /* If this is a relocation against the opd section sym
13474 and we have edited .opd, adjust the reloc addend so
13475 that ld -r and ld --emit-relocs output is correct.
13476 If it is a reloc against some other .opd symbol,
13477 then the symbol value will be adjusted later. */
13478 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13479 rel->r_addend += adjust;
13481 relocation += adjust;
13487 bfd_boolean ignored;
13489 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13490 r_symndx, symtab_hdr, sym_hashes,
13491 h_elf, sec, relocation,
13492 unresolved_reloc, warned, ignored);
13493 sym_name = h_elf->root.root.string;
13494 sym_type = h_elf->type;
13496 && sec->owner == output_bfd
13497 && strcmp (sec->name, ".opd") == 0)
13499 /* This is a symbol defined in a linker script. All
13500 such are defined in output sections, even those
13501 defined by simple assignment from a symbol defined in
13502 an input section. Transfer the symbol to an
13503 appropriate input .opd section, so that a branch to
13504 this symbol will be mapped to the location specified
13505 by the opd entry. */
13506 struct bfd_link_order *lo;
13507 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13508 if (lo->type == bfd_indirect_link_order)
13510 asection *isec = lo->u.indirect.section;
13511 if (h_elf->root.u.def.value >= isec->output_offset
13512 && h_elf->root.u.def.value < (isec->output_offset
13515 h_elf->root.u.def.value -= isec->output_offset;
13516 h_elf->root.u.def.section = isec;
13523 h = (struct ppc_link_hash_entry *) h_elf;
13525 if (sec != NULL && discarded_section (sec))
13527 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13528 input_bfd, input_section,
13529 contents + rel->r_offset);
13530 wrel->r_offset = rel->r_offset;
13532 wrel->r_addend = 0;
13534 /* For ld -r, remove relocations in debug sections against
13535 symbols defined in discarded sections. Not done for
13536 non-debug to preserve relocs in .eh_frame which the
13537 eh_frame editing code expects to be present. */
13538 if (bfd_link_relocatable (info)
13539 && (input_section->flags & SEC_DEBUGGING))
13545 if (bfd_link_relocatable (info))
13548 if (h != NULL && &h->elf == htab->elf.hgot)
13550 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13551 sec = bfd_abs_section_ptr;
13552 unresolved_reloc = FALSE;
13555 /* TLS optimizations. Replace instruction sequences and relocs
13556 based on information we collected in tls_optimize. We edit
13557 RELOCS so that --emit-relocs will output something sensible
13558 for the final instruction stream. */
13563 tls_mask = h->tls_mask;
13564 else if (local_got_ents != NULL)
13566 struct plt_entry **local_plt = (struct plt_entry **)
13567 (local_got_ents + symtab_hdr->sh_info);
13568 unsigned char *lgot_masks = (unsigned char *)
13569 (local_plt + symtab_hdr->sh_info);
13570 tls_mask = lgot_masks[r_symndx];
13573 && (r_type == R_PPC64_TLS
13574 || r_type == R_PPC64_TLSGD
13575 || r_type == R_PPC64_TLSLD))
13577 /* Check for toc tls entries. */
13578 unsigned char *toc_tls;
13580 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13581 &local_syms, rel, input_bfd))
13585 tls_mask = *toc_tls;
13588 /* Check that tls relocs are used with tls syms, and non-tls
13589 relocs are used with non-tls syms. */
13590 if (r_symndx != STN_UNDEF
13591 && r_type != R_PPC64_NONE
13593 || h->elf.root.type == bfd_link_hash_defined
13594 || h->elf.root.type == bfd_link_hash_defweak)
13595 && (IS_PPC64_TLS_RELOC (r_type)
13596 != (sym_type == STT_TLS
13597 || (sym_type == STT_SECTION
13598 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
13601 && (r_type == R_PPC64_TLS
13602 || r_type == R_PPC64_TLSGD
13603 || r_type == R_PPC64_TLSLD))
13604 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13607 info->callbacks->einfo
13608 (!IS_PPC64_TLS_RELOC (r_type)
13609 /* xgettext:c-format */
13610 ? _("%H: %s used with TLS symbol `%pT'\n")
13611 /* xgettext:c-format */
13612 : _("%H: %s used with non-TLS symbol `%pT'\n"),
13613 input_bfd, input_section, rel->r_offset,
13614 ppc64_elf_howto_table[r_type]->name,
13618 /* Ensure reloc mapping code below stays sane. */
13619 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13620 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13621 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13622 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13623 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13624 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13625 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13626 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13627 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13628 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13636 case R_PPC64_LO_DS_OPT:
13637 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
13638 if ((insn & (0x3f << 26)) != 58u << 26)
13640 insn += (14u << 26) - (58u << 26);
13641 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
13642 r_type = R_PPC64_TOC16_LO;
13643 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13646 case R_PPC64_TOC16:
13647 case R_PPC64_TOC16_LO:
13648 case R_PPC64_TOC16_DS:
13649 case R_PPC64_TOC16_LO_DS:
13651 /* Check for toc tls entries. */
13652 unsigned char *toc_tls;
13655 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13656 &local_syms, rel, input_bfd);
13662 tls_mask = *toc_tls;
13663 if (r_type == R_PPC64_TOC16_DS
13664 || r_type == R_PPC64_TOC16_LO_DS)
13667 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13672 /* If we found a GD reloc pair, then we might be
13673 doing a GD->IE transition. */
13676 tls_gd = TLS_TPRELGD;
13677 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13680 else if (retval == 3)
13682 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13690 case R_PPC64_GOT_TPREL16_HI:
13691 case R_PPC64_GOT_TPREL16_HA:
13693 && (tls_mask & TLS_TPREL) == 0)
13695 rel->r_offset -= d_offset;
13696 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
13697 r_type = R_PPC64_NONE;
13698 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13702 case R_PPC64_GOT_TPREL16_DS:
13703 case R_PPC64_GOT_TPREL16_LO_DS:
13705 && (tls_mask & TLS_TPREL) == 0)
13708 insn = bfd_get_32 (input_bfd,
13709 contents + rel->r_offset - d_offset);
13711 insn |= 0x3c0d0000; /* addis 0,13,0 */
13712 bfd_put_32 (input_bfd, insn,
13713 contents + rel->r_offset - d_offset);
13714 r_type = R_PPC64_TPREL16_HA;
13715 if (toc_symndx != 0)
13717 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13718 rel->r_addend = toc_addend;
13719 /* We changed the symbol. Start over in order to
13720 get h, sym, sec etc. right. */
13724 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13730 && (tls_mask & TLS_TPREL) == 0)
13732 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
13733 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13736 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
13737 /* Was PPC64_TLS which sits on insn boundary, now
13738 PPC64_TPREL16_LO which is at low-order half-word. */
13739 rel->r_offset += d_offset;
13740 r_type = R_PPC64_TPREL16_LO;
13741 if (toc_symndx != 0)
13743 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
13744 rel->r_addend = toc_addend;
13745 /* We changed the symbol. Start over in order to
13746 get h, sym, sec etc. right. */
13750 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13754 case R_PPC64_GOT_TLSGD16_HI:
13755 case R_PPC64_GOT_TLSGD16_HA:
13756 tls_gd = TLS_TPRELGD;
13757 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13761 case R_PPC64_GOT_TLSLD16_HI:
13762 case R_PPC64_GOT_TLSLD16_HA:
13763 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13766 if ((tls_mask & tls_gd) != 0)
13767 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13768 + R_PPC64_GOT_TPREL16_DS);
13771 rel->r_offset -= d_offset;
13772 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
13773 r_type = R_PPC64_NONE;
13775 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13779 case R_PPC64_GOT_TLSGD16:
13780 case R_PPC64_GOT_TLSGD16_LO:
13781 tls_gd = TLS_TPRELGD;
13782 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13786 case R_PPC64_GOT_TLSLD16:
13787 case R_PPC64_GOT_TLSLD16_LO:
13788 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13790 unsigned int insn1, insn2;
13794 offset = (bfd_vma) -1;
13795 /* If not using the newer R_PPC64_TLSGD/LD to mark
13796 __tls_get_addr calls, we must trust that the call
13797 stays with its arg setup insns, ie. that the next
13798 reloc is the __tls_get_addr call associated with
13799 the current reloc. Edit both insns. */
13800 if (input_section->has_tls_get_addr_call
13801 && rel + 1 < relend
13802 && branch_reloc_hash_match (input_bfd, rel + 1,
13803 htab->tls_get_addr,
13804 htab->tls_get_addr_fd))
13805 offset = rel[1].r_offset;
13806 /* We read the low GOT_TLS (or TOC16) insn because we
13807 need to keep the destination reg. It may be
13808 something other than the usual r3, and moved to r3
13809 before the call by intervening code. */
13810 insn1 = bfd_get_32 (input_bfd,
13811 contents + rel->r_offset - d_offset);
13812 if ((tls_mask & tls_gd) != 0)
13815 insn1 &= (0x1f << 21) | (0x1f << 16);
13816 insn1 |= 58 << 26; /* ld */
13817 insn2 = 0x7c636a14; /* add 3,3,13 */
13818 if (offset != (bfd_vma) -1)
13819 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13820 if ((tls_mask & TLS_EXPLICIT) == 0)
13821 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13822 + R_PPC64_GOT_TPREL16_DS);
13824 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13825 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13830 insn1 &= 0x1f << 21;
13831 insn1 |= 0x3c0d0000; /* addis r,13,0 */
13832 insn2 = 0x38630000; /* addi 3,3,0 */
13835 /* Was an LD reloc. */
13837 sec = local_sections[toc_symndx];
13839 r_symndx < symtab_hdr->sh_info;
13841 if (local_sections[r_symndx] == sec)
13843 if (r_symndx >= symtab_hdr->sh_info)
13844 r_symndx = STN_UNDEF;
13845 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13846 if (r_symndx != STN_UNDEF)
13847 rel->r_addend -= (local_syms[r_symndx].st_value
13848 + sec->output_offset
13849 + sec->output_section->vma);
13851 else if (toc_symndx != 0)
13853 r_symndx = toc_symndx;
13854 rel->r_addend = toc_addend;
13856 r_type = R_PPC64_TPREL16_HA;
13857 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13858 if (offset != (bfd_vma) -1)
13860 rel[1].r_info = ELF64_R_INFO (r_symndx,
13861 R_PPC64_TPREL16_LO);
13862 rel[1].r_offset = offset + d_offset;
13863 rel[1].r_addend = rel->r_addend;
13866 bfd_put_32 (input_bfd, insn1,
13867 contents + rel->r_offset - d_offset);
13868 if (offset != (bfd_vma) -1)
13869 bfd_put_32 (input_bfd, insn2, contents + offset);
13870 if ((tls_mask & tls_gd) == 0
13871 && (tls_gd == 0 || toc_symndx != 0))
13873 /* We changed the symbol. Start over in order
13874 to get h, sym, sec etc. right. */
13880 case R_PPC64_TLSGD:
13881 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13883 unsigned int insn2;
13884 bfd_vma offset = rel->r_offset;
13886 if ((tls_mask & TLS_TPRELGD) != 0)
13889 r_type = R_PPC64_NONE;
13890 insn2 = 0x7c636a14; /* add 3,3,13 */
13895 if (toc_symndx != 0)
13897 r_symndx = toc_symndx;
13898 rel->r_addend = toc_addend;
13900 r_type = R_PPC64_TPREL16_LO;
13901 rel->r_offset = offset + d_offset;
13902 insn2 = 0x38630000; /* addi 3,3,0 */
13904 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13905 /* Zap the reloc on the _tls_get_addr call too. */
13906 BFD_ASSERT (offset == rel[1].r_offset);
13907 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13908 bfd_put_32 (input_bfd, insn2, contents + offset);
13909 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
13914 case R_PPC64_TLSLD:
13915 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13917 unsigned int insn2;
13918 bfd_vma offset = rel->r_offset;
13921 sec = local_sections[toc_symndx];
13923 r_symndx < symtab_hdr->sh_info;
13925 if (local_sections[r_symndx] == sec)
13927 if (r_symndx >= symtab_hdr->sh_info)
13928 r_symndx = STN_UNDEF;
13929 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
13930 if (r_symndx != STN_UNDEF)
13931 rel->r_addend -= (local_syms[r_symndx].st_value
13932 + sec->output_offset
13933 + sec->output_section->vma);
13935 r_type = R_PPC64_TPREL16_LO;
13936 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13937 rel->r_offset = offset + d_offset;
13938 /* Zap the reloc on the _tls_get_addr call too. */
13939 BFD_ASSERT (offset == rel[1].r_offset);
13940 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13941 insn2 = 0x38630000; /* addi 3,3,0 */
13942 bfd_put_32 (input_bfd, insn2, contents + offset);
13947 case R_PPC64_DTPMOD64:
13948 if (rel + 1 < relend
13949 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13950 && rel[1].r_offset == rel->r_offset + 8)
13952 if ((tls_mask & TLS_GD) == 0)
13954 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13955 if ((tls_mask & TLS_TPRELGD) != 0)
13956 r_type = R_PPC64_TPREL64;
13959 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13960 r_type = R_PPC64_NONE;
13962 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13967 if ((tls_mask & TLS_LD) == 0)
13969 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
13970 r_type = R_PPC64_NONE;
13971 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13976 case R_PPC64_TPREL64:
13977 if ((tls_mask & TLS_TPREL) == 0)
13979 r_type = R_PPC64_NONE;
13980 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13984 case R_PPC64_ENTRY:
13985 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13986 if (!bfd_link_pic (info)
13987 && !info->traditional_format
13988 && relocation + 0x80008000 <= 0xffffffff)
13990 unsigned int insn1, insn2;
13992 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13993 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13994 if ((insn1 & ~0xfffc) == LD_R2_0R12
13995 && insn2 == ADD_R2_R2_R12)
13997 bfd_put_32 (input_bfd,
13998 LIS_R2 + PPC_HA (relocation),
13999 contents + rel->r_offset);
14000 bfd_put_32 (input_bfd,
14001 ADDI_R2_R2 + PPC_LO (relocation),
14002 contents + rel->r_offset + 4);
14007 relocation -= (rel->r_offset
14008 + input_section->output_offset
14009 + input_section->output_section->vma);
14010 if (relocation + 0x80008000 <= 0xffffffff)
14012 unsigned int insn1, insn2;
14014 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14015 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14016 if ((insn1 & ~0xfffc) == LD_R2_0R12
14017 && insn2 == ADD_R2_R2_R12)
14019 bfd_put_32 (input_bfd,
14020 ADDIS_R2_R12 + PPC_HA (relocation),
14021 contents + rel->r_offset);
14022 bfd_put_32 (input_bfd,
14023 ADDI_R2_R2 + PPC_LO (relocation),
14024 contents + rel->r_offset + 4);
14030 case R_PPC64_REL16_HA:
14031 /* If we are generating a non-PIC executable, edit
14032 . 0: addis 2,12,.TOC.-0b@ha
14033 . addi 2,2,.TOC.-0b@l
14034 used by ELFv2 global entry points to set up r2, to
14037 if .TOC. is in range. */
14038 if (!bfd_link_pic (info)
14039 && !info->traditional_format
14041 && rel->r_addend == d_offset
14042 && h != NULL && &h->elf == htab->elf.hgot
14043 && rel + 1 < relend
14044 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14045 && rel[1].r_offset == rel->r_offset + 4
14046 && rel[1].r_addend == rel->r_addend + 4
14047 && relocation + 0x80008000 <= 0xffffffff)
14049 unsigned int insn1, insn2;
14050 bfd_vma offset = rel->r_offset - d_offset;
14051 insn1 = bfd_get_32 (input_bfd, contents + offset);
14052 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14053 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14054 && (insn2 & 0xffff0000) == ADDI_R2_R2)
14056 r_type = R_PPC64_ADDR16_HA;
14057 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14058 rel->r_addend -= d_offset;
14059 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14060 rel[1].r_addend -= d_offset + 4;
14061 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
14067 /* Handle other relocations that tweak non-addend part of insn. */
14069 max_br_offset = 1 << 25;
14070 addend = rel->r_addend;
14071 reloc_dest = DEST_NORMAL;
14077 case R_PPC64_TOCSAVE:
14078 if (relocation + addend == (rel->r_offset
14079 + input_section->output_offset
14080 + input_section->output_section->vma)
14081 && tocsave_find (htab, NO_INSERT,
14082 &local_syms, rel, input_bfd))
14084 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14086 || insn == CROR_151515 || insn == CROR_313131)
14087 bfd_put_32 (input_bfd,
14088 STD_R2_0R1 + STK_TOC (htab),
14089 contents + rel->r_offset);
14093 /* Branch taken prediction relocations. */
14094 case R_PPC64_ADDR14_BRTAKEN:
14095 case R_PPC64_REL14_BRTAKEN:
14096 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14097 /* Fall through. */
14099 /* Branch not taken prediction relocations. */
14100 case R_PPC64_ADDR14_BRNTAKEN:
14101 case R_PPC64_REL14_BRNTAKEN:
14102 insn |= bfd_get_32 (input_bfd,
14103 contents + rel->r_offset) & ~(0x01 << 21);
14104 /* Fall through. */
14106 case R_PPC64_REL14:
14107 max_br_offset = 1 << 15;
14108 /* Fall through. */
14110 case R_PPC64_REL24:
14111 /* Calls to functions with a different TOC, such as calls to
14112 shared objects, need to alter the TOC pointer. This is
14113 done using a linkage stub. A REL24 branching to these
14114 linkage stubs needs to be followed by a nop, as the nop
14115 will be replaced with an instruction to restore the TOC
14120 && h->oh->is_func_descriptor)
14121 fdh = ppc_follow_link (h->oh);
14122 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14124 if (stub_entry != NULL
14125 && (stub_entry->stub_type == ppc_stub_plt_call
14126 || stub_entry->stub_type == ppc_stub_plt_call_r2save
14127 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14128 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
14130 bfd_boolean can_plt_call = FALSE;
14132 if (stub_entry->stub_type == ppc_stub_plt_call
14134 && htab->params->plt_localentry0 != 0
14135 && is_elfv2_localentry0 (&h->elf))
14137 /* The function doesn't use or change r2. */
14138 can_plt_call = TRUE;
14141 /* All of these stubs may modify r2, so there must be a
14142 branch and link followed by a nop. The nop is
14143 replaced by an insn to restore r2. */
14144 else if (rel->r_offset + 8 <= input_section->size)
14148 br = bfd_get_32 (input_bfd,
14149 contents + rel->r_offset);
14154 nop = bfd_get_32 (input_bfd,
14155 contents + rel->r_offset + 4);
14157 || nop == CROR_151515 || nop == CROR_313131)
14160 && (h == htab->tls_get_addr_fd
14161 || h == htab->tls_get_addr)
14162 && htab->params->tls_get_addr_opt)
14164 /* Special stub used, leave nop alone. */
14167 bfd_put_32 (input_bfd,
14168 LD_R2_0R1 + STK_TOC (htab),
14169 contents + rel->r_offset + 4);
14170 can_plt_call = TRUE;
14175 if (!can_plt_call && h != NULL)
14177 const char *name = h->elf.root.root.string;
14182 if (strncmp (name, "__libc_start_main", 17) == 0
14183 && (name[17] == 0 || name[17] == '@'))
14185 /* Allow crt1 branch to go via a toc adjusting
14186 stub. Other calls that never return could do
14187 the same, if we could detect such. */
14188 can_plt_call = TRUE;
14194 /* g++ as of 20130507 emits self-calls without a
14195 following nop. This is arguably wrong since we
14196 have conflicting information. On the one hand a
14197 global symbol and on the other a local call
14198 sequence, but don't error for this special case.
14199 It isn't possible to cheaply verify we have
14200 exactly such a call. Allow all calls to the same
14202 asection *code_sec = sec;
14204 if (get_opd_info (sec) != NULL)
14206 bfd_vma off = (relocation + addend
14207 - sec->output_section->vma
14208 - sec->output_offset);
14210 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
14212 if (code_sec == input_section)
14213 can_plt_call = TRUE;
14218 if (stub_entry->stub_type == ppc_stub_plt_call
14219 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14220 info->callbacks->einfo
14221 /* xgettext:c-format */
14222 (_("%H: call to `%pT' lacks nop, can't restore toc; "
14223 "recompile with -fPIC\n"),
14224 input_bfd, input_section, rel->r_offset, sym_name);
14226 info->callbacks->einfo
14227 /* xgettext:c-format */
14228 (_("%H: call to `%pT' lacks nop, can't restore toc; "
14229 "(-mcmodel=small toc adjust stub)\n"),
14230 input_bfd, input_section, rel->r_offset, sym_name);
14232 bfd_set_error (bfd_error_bad_value);
14237 && (stub_entry->stub_type == ppc_stub_plt_call
14238 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14239 unresolved_reloc = FALSE;
14242 if ((stub_entry == NULL
14243 || stub_entry->stub_type == ppc_stub_long_branch
14244 || stub_entry->stub_type == ppc_stub_plt_branch)
14245 && get_opd_info (sec) != NULL)
14247 /* The branch destination is the value of the opd entry. */
14248 bfd_vma off = (relocation + addend
14249 - sec->output_section->vma
14250 - sec->output_offset);
14251 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
14252 if (dest != (bfd_vma) -1)
14256 reloc_dest = DEST_OPD;
14260 /* If the branch is out of reach we ought to have a long
14262 from = (rel->r_offset
14263 + input_section->output_offset
14264 + input_section->output_section->vma);
14266 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14270 if (stub_entry != NULL
14271 && (stub_entry->stub_type == ppc_stub_long_branch
14272 || stub_entry->stub_type == ppc_stub_plt_branch)
14273 && (r_type == R_PPC64_ADDR14_BRTAKEN
14274 || r_type == R_PPC64_ADDR14_BRNTAKEN
14275 || (relocation + addend - from + max_br_offset
14276 < 2 * max_br_offset)))
14277 /* Don't use the stub if this branch is in range. */
14280 if (stub_entry != NULL)
14282 /* Munge up the value and addend so that we call the stub
14283 rather than the procedure directly. */
14284 asection *stub_sec = stub_entry->group->stub_sec;
14286 if (stub_entry->stub_type == ppc_stub_save_res)
14287 relocation += (stub_sec->output_offset
14288 + stub_sec->output_section->vma
14289 + stub_sec->size - htab->sfpr->size
14290 - htab->sfpr->output_offset
14291 - htab->sfpr->output_section->vma);
14293 relocation = (stub_entry->stub_offset
14294 + stub_sec->output_offset
14295 + stub_sec->output_section->vma);
14297 reloc_dest = DEST_STUB;
14299 if ((stub_entry->stub_type == ppc_stub_plt_call
14300 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14301 && (ALWAYS_EMIT_R2SAVE
14302 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14303 && rel + 1 < relend
14304 && rel[1].r_offset == rel->r_offset + 4
14305 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14313 /* Set 'a' bit. This is 0b00010 in BO field for branch
14314 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14315 for branch on CTR insns (BO == 1a00t or 1a01t). */
14316 if ((insn & (0x14 << 21)) == (0x04 << 21))
14317 insn |= 0x02 << 21;
14318 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14319 insn |= 0x08 << 21;
14325 /* Invert 'y' bit if not the default. */
14326 if ((bfd_signed_vma) (relocation + addend - from) < 0)
14327 insn ^= 0x01 << 21;
14330 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14333 /* NOP out calls to undefined weak functions.
14334 We can thus call a weak function without first
14335 checking whether the function is defined. */
14337 && h->elf.root.type == bfd_link_hash_undefweak
14338 && h->elf.dynindx == -1
14339 && r_type == R_PPC64_REL24
14343 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
14349 /* Set `addend'. */
14354 /* xgettext:c-format */
14355 _bfd_error_handler (_("%pB: %s unsupported"),
14356 input_bfd, ppc64_elf_howto_table[r_type]->name);
14358 bfd_set_error (bfd_error_bad_value);
14364 case R_PPC64_TLSGD:
14365 case R_PPC64_TLSLD:
14366 case R_PPC64_TOCSAVE:
14367 case R_PPC64_GNU_VTINHERIT:
14368 case R_PPC64_GNU_VTENTRY:
14369 case R_PPC64_ENTRY:
14372 /* GOT16 relocations. Like an ADDR16 using the symbol's
14373 address in the GOT as relocation value instead of the
14374 symbol's value itself. Also, create a GOT entry for the
14375 symbol and put the symbol value there. */
14376 case R_PPC64_GOT_TLSGD16:
14377 case R_PPC64_GOT_TLSGD16_LO:
14378 case R_PPC64_GOT_TLSGD16_HI:
14379 case R_PPC64_GOT_TLSGD16_HA:
14380 tls_type = TLS_TLS | TLS_GD;
14383 case R_PPC64_GOT_TLSLD16:
14384 case R_PPC64_GOT_TLSLD16_LO:
14385 case R_PPC64_GOT_TLSLD16_HI:
14386 case R_PPC64_GOT_TLSLD16_HA:
14387 tls_type = TLS_TLS | TLS_LD;
14390 case R_PPC64_GOT_TPREL16_DS:
14391 case R_PPC64_GOT_TPREL16_LO_DS:
14392 case R_PPC64_GOT_TPREL16_HI:
14393 case R_PPC64_GOT_TPREL16_HA:
14394 tls_type = TLS_TLS | TLS_TPREL;
14397 case R_PPC64_GOT_DTPREL16_DS:
14398 case R_PPC64_GOT_DTPREL16_LO_DS:
14399 case R_PPC64_GOT_DTPREL16_HI:
14400 case R_PPC64_GOT_DTPREL16_HA:
14401 tls_type = TLS_TLS | TLS_DTPREL;
14404 case R_PPC64_GOT16:
14405 case R_PPC64_GOT16_LO:
14406 case R_PPC64_GOT16_HI:
14407 case R_PPC64_GOT16_HA:
14408 case R_PPC64_GOT16_DS:
14409 case R_PPC64_GOT16_LO_DS:
14412 /* Relocation is to the entry for this symbol in the global
14417 unsigned long indx = 0;
14418 struct got_entry *ent;
14420 if (tls_type == (TLS_TLS | TLS_LD)
14422 || !h->elf.def_dynamic))
14423 ent = ppc64_tlsld_got (input_bfd);
14428 if (!htab->elf.dynamic_sections_created
14429 || h->elf.dynindx == -1
14430 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14431 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
14432 /* This is actually a static link, or it is a
14433 -Bsymbolic link and the symbol is defined
14434 locally, or the symbol was forced to be local
14435 because of a version file. */
14439 indx = h->elf.dynindx;
14440 unresolved_reloc = FALSE;
14442 ent = h->elf.got.glist;
14446 if (local_got_ents == NULL)
14448 ent = local_got_ents[r_symndx];
14451 for (; ent != NULL; ent = ent->next)
14452 if (ent->addend == orig_rel.r_addend
14453 && ent->owner == input_bfd
14454 && ent->tls_type == tls_type)
14460 if (ent->is_indirect)
14461 ent = ent->got.ent;
14462 offp = &ent->got.offset;
14463 got = ppc64_elf_tdata (ent->owner)->got;
14467 /* The offset must always be a multiple of 8. We use the
14468 least significant bit to record whether we have already
14469 processed this entry. */
14471 if ((off & 1) != 0)
14475 /* Generate relocs for the dynamic linker, except in
14476 the case of TLSLD where we'll use one entry per
14484 ? h->elf.type == STT_GNU_IFUNC
14485 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
14488 relgot = htab->elf.irelplt;
14490 htab->local_ifunc_resolver = 1;
14491 else if (is_static_defined (&h->elf))
14492 htab->maybe_local_ifunc_resolver = 1;
14495 || (bfd_link_pic (info)
14497 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
14498 || (tls_type == (TLS_TLS | TLS_LD)
14499 && !h->elf.def_dynamic))
14500 && !(tls_type == (TLS_TLS | TLS_TPREL)
14501 && bfd_link_executable (info)
14502 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
14503 relgot = ppc64_elf_tdata (ent->owner)->relgot;
14504 if (relgot != NULL)
14506 outrel.r_offset = (got->output_section->vma
14507 + got->output_offset
14509 outrel.r_addend = addend;
14510 if (tls_type & (TLS_LD | TLS_GD))
14512 outrel.r_addend = 0;
14513 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
14514 if (tls_type == (TLS_TLS | TLS_GD))
14516 loc = relgot->contents;
14517 loc += (relgot->reloc_count++
14518 * sizeof (Elf64_External_Rela));
14519 bfd_elf64_swap_reloca_out (output_bfd,
14521 outrel.r_offset += 8;
14522 outrel.r_addend = addend;
14524 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14527 else if (tls_type == (TLS_TLS | TLS_DTPREL))
14528 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
14529 else if (tls_type == (TLS_TLS | TLS_TPREL))
14530 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
14531 else if (indx != 0)
14532 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14536 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14538 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14540 /* Write the .got section contents for the sake
14542 loc = got->contents + off;
14543 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14547 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
14549 outrel.r_addend += relocation;
14550 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
14552 if (htab->elf.tls_sec == NULL)
14553 outrel.r_addend = 0;
14555 outrel.r_addend -= htab->elf.tls_sec->vma;
14558 loc = relgot->contents;
14559 loc += (relgot->reloc_count++
14560 * sizeof (Elf64_External_Rela));
14561 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14564 /* Init the .got section contents here if we're not
14565 emitting a reloc. */
14568 relocation += addend;
14571 if (htab->elf.tls_sec == NULL)
14575 if (tls_type & TLS_LD)
14578 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14579 if (tls_type & TLS_TPREL)
14580 relocation += DTP_OFFSET - TP_OFFSET;
14583 if (tls_type & (TLS_GD | TLS_LD))
14585 bfd_put_64 (output_bfd, relocation,
14586 got->contents + off + 8);
14590 bfd_put_64 (output_bfd, relocation,
14591 got->contents + off);
14595 if (off >= (bfd_vma) -2)
14598 relocation = got->output_section->vma + got->output_offset + off;
14599 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
14603 case R_PPC64_PLT16_HA:
14604 case R_PPC64_PLT16_HI:
14605 case R_PPC64_PLT16_LO:
14606 case R_PPC64_PLT32:
14607 case R_PPC64_PLT64:
14608 /* Relocation is to the entry for this symbol in the
14609 procedure linkage table. */
14611 struct plt_entry **plt_list = NULL;
14613 plt_list = &h->elf.plt.plist;
14614 else if (local_got_ents != NULL)
14616 struct plt_entry **local_plt = (struct plt_entry **)
14617 (local_got_ents + symtab_hdr->sh_info);
14618 unsigned char *local_got_tls_masks = (unsigned char *)
14619 (local_plt + symtab_hdr->sh_info);
14620 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
14621 plt_list = local_plt + r_symndx;
14625 struct plt_entry *ent;
14627 for (ent = *plt_list; ent != NULL; ent = ent->next)
14628 if (ent->plt.offset != (bfd_vma) -1
14629 && ent->addend == orig_rel.r_addend)
14633 plt = htab->elf.splt;
14634 if (!htab->elf.dynamic_sections_created
14636 || h->elf.dynindx == -1)
14637 plt = htab->elf.iplt;
14638 relocation = (plt->output_section->vma
14639 + plt->output_offset
14640 + ent->plt.offset);
14642 unresolved_reloc = FALSE;
14650 /* Relocation value is TOC base. */
14651 relocation = TOCstart;
14652 if (r_symndx == STN_UNDEF)
14653 relocation += htab->sec_info[input_section->id].toc_off;
14654 else if (unresolved_reloc)
14656 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14657 relocation += htab->sec_info[sec->id].toc_off;
14659 unresolved_reloc = TRUE;
14662 /* TOC16 relocs. We want the offset relative to the TOC base,
14663 which is the address of the start of the TOC plus 0x8000.
14664 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14666 case R_PPC64_TOC16:
14667 case R_PPC64_TOC16_LO:
14668 case R_PPC64_TOC16_HI:
14669 case R_PPC64_TOC16_DS:
14670 case R_PPC64_TOC16_LO_DS:
14671 case R_PPC64_TOC16_HA:
14672 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
14675 /* Relocate against the beginning of the section. */
14676 case R_PPC64_SECTOFF:
14677 case R_PPC64_SECTOFF_LO:
14678 case R_PPC64_SECTOFF_HI:
14679 case R_PPC64_SECTOFF_DS:
14680 case R_PPC64_SECTOFF_LO_DS:
14681 case R_PPC64_SECTOFF_HA:
14683 addend -= sec->output_section->vma;
14686 case R_PPC64_REL16:
14687 case R_PPC64_REL16_LO:
14688 case R_PPC64_REL16_HI:
14689 case R_PPC64_REL16_HA:
14690 case R_PPC64_REL16DX_HA:
14693 case R_PPC64_REL14:
14694 case R_PPC64_REL14_BRNTAKEN:
14695 case R_PPC64_REL14_BRTAKEN:
14696 case R_PPC64_REL24:
14699 case R_PPC64_TPREL16:
14700 case R_PPC64_TPREL16_LO:
14701 case R_PPC64_TPREL16_HI:
14702 case R_PPC64_TPREL16_HA:
14703 case R_PPC64_TPREL16_DS:
14704 case R_PPC64_TPREL16_LO_DS:
14705 case R_PPC64_TPREL16_HIGH:
14706 case R_PPC64_TPREL16_HIGHA:
14707 case R_PPC64_TPREL16_HIGHER:
14708 case R_PPC64_TPREL16_HIGHERA:
14709 case R_PPC64_TPREL16_HIGHEST:
14710 case R_PPC64_TPREL16_HIGHESTA:
14712 && h->elf.root.type == bfd_link_hash_undefweak
14713 && h->elf.dynindx == -1)
14715 /* Make this relocation against an undefined weak symbol
14716 resolve to zero. This is really just a tweak, since
14717 code using weak externs ought to check that they are
14718 defined before using them. */
14719 bfd_byte *p = contents + rel->r_offset - d_offset;
14721 insn = bfd_get_32 (input_bfd, p);
14722 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14724 bfd_put_32 (input_bfd, insn, p);
14727 if (htab->elf.tls_sec != NULL)
14728 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14729 /* The TPREL16 relocs shouldn't really be used in shared
14730 libs or with non-local symbols as that will result in
14731 DT_TEXTREL being set, but support them anyway. */
14734 case R_PPC64_DTPREL16:
14735 case R_PPC64_DTPREL16_LO:
14736 case R_PPC64_DTPREL16_HI:
14737 case R_PPC64_DTPREL16_HA:
14738 case R_PPC64_DTPREL16_DS:
14739 case R_PPC64_DTPREL16_LO_DS:
14740 case R_PPC64_DTPREL16_HIGH:
14741 case R_PPC64_DTPREL16_HIGHA:
14742 case R_PPC64_DTPREL16_HIGHER:
14743 case R_PPC64_DTPREL16_HIGHERA:
14744 case R_PPC64_DTPREL16_HIGHEST:
14745 case R_PPC64_DTPREL16_HIGHESTA:
14746 if (htab->elf.tls_sec != NULL)
14747 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14750 case R_PPC64_ADDR64_LOCAL:
14751 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14756 case R_PPC64_DTPMOD64:
14761 case R_PPC64_TPREL64:
14762 if (htab->elf.tls_sec != NULL)
14763 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
14766 case R_PPC64_DTPREL64:
14767 if (htab->elf.tls_sec != NULL)
14768 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
14769 /* Fall through. */
14771 /* Relocations that may need to be propagated if this is a
14773 case R_PPC64_REL30:
14774 case R_PPC64_REL32:
14775 case R_PPC64_REL64:
14776 case R_PPC64_ADDR14:
14777 case R_PPC64_ADDR14_BRNTAKEN:
14778 case R_PPC64_ADDR14_BRTAKEN:
14779 case R_PPC64_ADDR16:
14780 case R_PPC64_ADDR16_DS:
14781 case R_PPC64_ADDR16_HA:
14782 case R_PPC64_ADDR16_HI:
14783 case R_PPC64_ADDR16_HIGH:
14784 case R_PPC64_ADDR16_HIGHA:
14785 case R_PPC64_ADDR16_HIGHER:
14786 case R_PPC64_ADDR16_HIGHERA:
14787 case R_PPC64_ADDR16_HIGHEST:
14788 case R_PPC64_ADDR16_HIGHESTA:
14789 case R_PPC64_ADDR16_LO:
14790 case R_PPC64_ADDR16_LO_DS:
14791 case R_PPC64_ADDR24:
14792 case R_PPC64_ADDR32:
14793 case R_PPC64_ADDR64:
14794 case R_PPC64_UADDR16:
14795 case R_PPC64_UADDR32:
14796 case R_PPC64_UADDR64:
14798 if ((input_section->flags & SEC_ALLOC) == 0)
14801 if (NO_OPD_RELOCS && is_opd)
14804 if (bfd_link_pic (info)
14806 || h->dyn_relocs != NULL)
14807 && ((h != NULL && pc_dynrelocs (h))
14808 || must_be_dyn_reloc (info, r_type)))
14810 ? h->dyn_relocs != NULL
14811 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14813 bfd_boolean skip, relocate;
14818 /* When generating a dynamic object, these relocations
14819 are copied into the output file to be resolved at run
14825 out_off = _bfd_elf_section_offset (output_bfd, info,
14826 input_section, rel->r_offset);
14827 if (out_off == (bfd_vma) -1)
14829 else if (out_off == (bfd_vma) -2)
14830 skip = TRUE, relocate = TRUE;
14831 out_off += (input_section->output_section->vma
14832 + input_section->output_offset);
14833 outrel.r_offset = out_off;
14834 outrel.r_addend = rel->r_addend;
14836 /* Optimize unaligned reloc use. */
14837 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14838 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14839 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14840 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14841 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14842 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14843 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14844 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14845 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14848 memset (&outrel, 0, sizeof outrel);
14849 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
14851 && r_type != R_PPC64_TOC)
14853 indx = h->elf.dynindx;
14854 BFD_ASSERT (indx != -1);
14855 outrel.r_info = ELF64_R_INFO (indx, r_type);
14859 /* This symbol is local, or marked to become local,
14860 or this is an opd section reloc which must point
14861 at a local function. */
14862 outrel.r_addend += relocation;
14863 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
14865 if (is_opd && h != NULL)
14867 /* Lie about opd entries. This case occurs
14868 when building shared libraries and we
14869 reference a function in another shared
14870 lib. The same thing happens for a weak
14871 definition in an application that's
14872 overridden by a strong definition in a
14873 shared lib. (I believe this is a generic
14874 bug in binutils handling of weak syms.)
14875 In these cases we won't use the opd
14876 entry in this lib. */
14877 unresolved_reloc = FALSE;
14880 && r_type == R_PPC64_ADDR64
14882 ? h->elf.type == STT_GNU_IFUNC
14883 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14884 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14887 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14889 /* We need to relocate .opd contents for ld.so.
14890 Prelink also wants simple and consistent rules
14891 for relocs. This make all RELATIVE relocs have
14892 *r_offset equal to r_addend. */
14899 ? h->elf.type == STT_GNU_IFUNC
14900 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14902 info->callbacks->einfo
14903 /* xgettext:c-format */
14904 (_("%H: %s for indirect "
14905 "function `%pT' unsupported\n"),
14906 input_bfd, input_section, rel->r_offset,
14907 ppc64_elf_howto_table[r_type]->name,
14911 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
14913 else if (sec == NULL || sec->owner == NULL)
14915 bfd_set_error (bfd_error_bad_value);
14922 osec = sec->output_section;
14923 indx = elf_section_data (osec)->dynindx;
14927 if ((osec->flags & SEC_READONLY) == 0
14928 && htab->elf.data_index_section != NULL)
14929 osec = htab->elf.data_index_section;
14931 osec = htab->elf.text_index_section;
14932 indx = elf_section_data (osec)->dynindx;
14934 BFD_ASSERT (indx != 0);
14936 /* We are turning this relocation into one
14937 against a section symbol, so subtract out
14938 the output section's address but not the
14939 offset of the input section in the output
14941 outrel.r_addend -= osec->vma;
14944 outrel.r_info = ELF64_R_INFO (indx, r_type);
14948 sreloc = elf_section_data (input_section)->sreloc;
14950 ? h->elf.type == STT_GNU_IFUNC
14951 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14953 sreloc = htab->elf.irelplt;
14955 htab->local_ifunc_resolver = 1;
14956 else if (is_static_defined (&h->elf))
14957 htab->maybe_local_ifunc_resolver = 1;
14959 if (sreloc == NULL)
14962 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14965 loc = sreloc->contents;
14966 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
14967 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14969 /* If this reloc is against an external symbol, it will
14970 be computed at runtime, so there's no need to do
14971 anything now. However, for the sake of prelink ensure
14972 that the section contents are a known value. */
14975 unresolved_reloc = FALSE;
14976 /* The value chosen here is quite arbitrary as ld.so
14977 ignores section contents except for the special
14978 case of .opd where the contents might be accessed
14979 before relocation. Choose zero, as that won't
14980 cause reloc overflow. */
14983 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14984 to improve backward compatibility with older
14986 if (r_type == R_PPC64_ADDR64)
14987 addend = outrel.r_addend;
14988 /* Adjust pc_relative relocs to have zero in *r_offset. */
14989 else if (ppc64_elf_howto_table[r_type]->pc_relative)
14990 addend = outrel.r_offset;
14996 case R_PPC64_GLOB_DAT:
14997 case R_PPC64_JMP_SLOT:
14998 case R_PPC64_JMP_IREL:
14999 case R_PPC64_RELATIVE:
15000 /* We shouldn't ever see these dynamic relocs in relocatable
15002 /* Fall through. */
15004 case R_PPC64_PLTGOT16:
15005 case R_PPC64_PLTGOT16_DS:
15006 case R_PPC64_PLTGOT16_HA:
15007 case R_PPC64_PLTGOT16_HI:
15008 case R_PPC64_PLTGOT16_LO:
15009 case R_PPC64_PLTGOT16_LO_DS:
15010 case R_PPC64_PLTREL32:
15011 case R_PPC64_PLTREL64:
15012 /* These ones haven't been implemented yet. */
15014 info->callbacks->einfo
15015 /* xgettext:c-format */
15016 (_("%P: %pB: %s is not supported for `%pT'\n"),
15018 ppc64_elf_howto_table[r_type]->name, sym_name);
15020 bfd_set_error (bfd_error_invalid_operation);
15025 /* Multi-instruction sequences that access the TOC can be
15026 optimized, eg. addis ra,r2,0; addi rb,ra,x;
15027 to nop; addi rb,r2,x; */
15033 case R_PPC64_GOT_TLSLD16_HI:
15034 case R_PPC64_GOT_TLSGD16_HI:
15035 case R_PPC64_GOT_TPREL16_HI:
15036 case R_PPC64_GOT_DTPREL16_HI:
15037 case R_PPC64_GOT16_HI:
15038 case R_PPC64_TOC16_HI:
15039 /* These relocs would only be useful if building up an
15040 offset to later add to r2, perhaps in an indexed
15041 addressing mode instruction. Don't try to optimize.
15042 Unfortunately, the possibility of someone building up an
15043 offset like this or even with the HA relocs, means that
15044 we need to check the high insn when optimizing the low
15048 case R_PPC64_GOT_TLSLD16_HA:
15049 case R_PPC64_GOT_TLSGD16_HA:
15050 case R_PPC64_GOT_TPREL16_HA:
15051 case R_PPC64_GOT_DTPREL16_HA:
15052 case R_PPC64_GOT16_HA:
15053 case R_PPC64_TOC16_HA:
15054 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15055 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15057 bfd_byte *p = contents + (rel->r_offset & ~3);
15058 bfd_put_32 (input_bfd, NOP, p);
15063 case R_PPC64_GOT_TLSLD16_LO:
15064 case R_PPC64_GOT_TLSGD16_LO:
15065 case R_PPC64_GOT_TPREL16_LO_DS:
15066 case R_PPC64_GOT_DTPREL16_LO_DS:
15067 case R_PPC64_GOT16_LO:
15068 case R_PPC64_GOT16_LO_DS:
15069 case R_PPC64_TOC16_LO:
15070 case R_PPC64_TOC16_LO_DS:
15071 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
15072 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
15074 bfd_byte *p = contents + (rel->r_offset & ~3);
15075 insn = bfd_get_32 (input_bfd, p);
15076 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15078 /* Transform addic to addi when we change reg. */
15079 insn &= ~((0x3f << 26) | (0x1f << 16));
15080 insn |= (14u << 26) | (2 << 16);
15084 insn &= ~(0x1f << 16);
15087 bfd_put_32 (input_bfd, insn, p);
15091 case R_PPC64_TPREL16_HA:
15092 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15094 bfd_byte *p = contents + (rel->r_offset & ~3);
15095 insn = bfd_get_32 (input_bfd, p);
15096 if ((insn & ((0x3f << 26) | 0x1f << 16))
15097 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
15098 /* xgettext:c-format */
15099 info->callbacks->minfo
15100 (_("%H: warning: %s unexpected insn %#x.\n"),
15101 input_bfd, input_section, rel->r_offset,
15102 ppc64_elf_howto_table[r_type]->name, insn);
15105 bfd_put_32 (input_bfd, NOP, p);
15111 case R_PPC64_TPREL16_LO:
15112 case R_PPC64_TPREL16_LO_DS:
15113 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15115 bfd_byte *p = contents + (rel->r_offset & ~3);
15116 insn = bfd_get_32 (input_bfd, p);
15117 insn &= ~(0x1f << 16);
15119 bfd_put_32 (input_bfd, insn, p);
15124 /* Do any further special processing. */
15130 case R_PPC64_REL16_HA:
15131 case R_PPC64_REL16DX_HA:
15132 case R_PPC64_ADDR16_HA:
15133 case R_PPC64_ADDR16_HIGHA:
15134 case R_PPC64_ADDR16_HIGHERA:
15135 case R_PPC64_ADDR16_HIGHESTA:
15136 case R_PPC64_TOC16_HA:
15137 case R_PPC64_SECTOFF_HA:
15138 case R_PPC64_TPREL16_HA:
15139 case R_PPC64_TPREL16_HIGHA:
15140 case R_PPC64_TPREL16_HIGHERA:
15141 case R_PPC64_TPREL16_HIGHESTA:
15142 case R_PPC64_DTPREL16_HA:
15143 case R_PPC64_DTPREL16_HIGHA:
15144 case R_PPC64_DTPREL16_HIGHERA:
15145 case R_PPC64_DTPREL16_HIGHESTA:
15146 /* It's just possible that this symbol is a weak symbol
15147 that's not actually defined anywhere. In that case,
15148 'sec' would be NULL, and we should leave the symbol
15149 alone (it will be set to zero elsewhere in the link). */
15152 /* Fall through. */
15154 case R_PPC64_GOT16_HA:
15155 case R_PPC64_PLTGOT16_HA:
15156 case R_PPC64_PLT16_HA:
15157 case R_PPC64_GOT_TLSGD16_HA:
15158 case R_PPC64_GOT_TLSLD16_HA:
15159 case R_PPC64_GOT_TPREL16_HA:
15160 case R_PPC64_GOT_DTPREL16_HA:
15161 /* Add 0x10000 if sign bit in 0:15 is set.
15162 Bits 0:15 are not used. */
15166 case R_PPC64_ADDR16_DS:
15167 case R_PPC64_ADDR16_LO_DS:
15168 case R_PPC64_GOT16_DS:
15169 case R_PPC64_GOT16_LO_DS:
15170 case R_PPC64_PLT16_LO_DS:
15171 case R_PPC64_SECTOFF_DS:
15172 case R_PPC64_SECTOFF_LO_DS:
15173 case R_PPC64_TOC16_DS:
15174 case R_PPC64_TOC16_LO_DS:
15175 case R_PPC64_PLTGOT16_DS:
15176 case R_PPC64_PLTGOT16_LO_DS:
15177 case R_PPC64_GOT_TPREL16_DS:
15178 case R_PPC64_GOT_TPREL16_LO_DS:
15179 case R_PPC64_GOT_DTPREL16_DS:
15180 case R_PPC64_GOT_DTPREL16_LO_DS:
15181 case R_PPC64_TPREL16_DS:
15182 case R_PPC64_TPREL16_LO_DS:
15183 case R_PPC64_DTPREL16_DS:
15184 case R_PPC64_DTPREL16_LO_DS:
15185 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15187 /* If this reloc is against an lq, lxv, or stxv insn, then
15188 the value must be a multiple of 16. This is somewhat of
15189 a hack, but the "correct" way to do this by defining _DQ
15190 forms of all the _DS relocs bloats all reloc switches in
15191 this file. It doesn't make much sense to use these
15192 relocs in data, so testing the insn should be safe. */
15193 if ((insn & (0x3f << 26)) == (56u << 26)
15194 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
15196 relocation += addend;
15197 addend = insn & (mask ^ 3);
15198 if ((relocation & mask) != 0)
15200 relocation ^= relocation & mask;
15201 info->callbacks->einfo
15202 /* xgettext:c-format */
15203 (_("%H: error: %s not a multiple of %u\n"),
15204 input_bfd, input_section, rel->r_offset,
15205 ppc64_elf_howto_table[r_type]->name,
15207 bfd_set_error (bfd_error_bad_value);
15214 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15215 because such sections are not SEC_ALLOC and thus ld.so will
15216 not process them. */
15217 howto = ppc64_elf_howto_table[(int) r_type];
15218 if (unresolved_reloc
15219 && !((input_section->flags & SEC_DEBUGGING) != 0
15220 && h->elf.def_dynamic)
15221 && _bfd_elf_section_offset (output_bfd, info, input_section,
15222 rel->r_offset) != (bfd_vma) -1)
15224 info->callbacks->einfo
15225 /* xgettext:c-format */
15226 (_("%H: unresolvable %s against `%pT'\n"),
15227 input_bfd, input_section, rel->r_offset,
15229 h->elf.root.root.string);
15233 /* 16-bit fields in insns mostly have signed values, but a
15234 few insns have 16-bit unsigned values. Really, we should
15235 have different reloc types. */
15236 if (howto->complain_on_overflow != complain_overflow_dont
15237 && howto->dst_mask == 0xffff
15238 && (input_section->flags & SEC_CODE) != 0)
15240 enum complain_overflow complain = complain_overflow_signed;
15242 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15243 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15244 complain = complain_overflow_bitfield;
15245 else if (howto->rightshift == 0
15246 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15247 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15248 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15249 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15250 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15251 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
15252 complain = complain_overflow_unsigned;
15253 if (howto->complain_on_overflow != complain)
15255 alt_howto = *howto;
15256 alt_howto.complain_on_overflow = complain;
15257 howto = &alt_howto;
15261 if (r_type == R_PPC64_REL16DX_HA)
15263 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15264 if (rel->r_offset + 4 > input_section->size)
15265 r = bfd_reloc_outofrange;
15268 relocation += addend;
15269 relocation -= (rel->r_offset
15270 + input_section->output_offset
15271 + input_section->output_section->vma);
15272 relocation = (bfd_signed_vma) relocation >> 16;
15273 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15275 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15276 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15278 if (relocation + 0x8000 > 0xffff)
15279 r = bfd_reloc_overflow;
15283 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15284 rel->r_offset, relocation, addend);
15286 if (r != bfd_reloc_ok)
15288 char *more_info = NULL;
15289 const char *reloc_name = howto->name;
15291 if (reloc_dest != DEST_NORMAL)
15293 more_info = bfd_malloc (strlen (reloc_name) + 8);
15294 if (more_info != NULL)
15296 strcpy (more_info, reloc_name);
15297 strcat (more_info, (reloc_dest == DEST_OPD
15298 ? " (OPD)" : " (stub)"));
15299 reloc_name = more_info;
15303 if (r == bfd_reloc_overflow)
15305 /* On code like "if (foo) foo();" don't report overflow
15306 on a branch to zero when foo is undefined. */
15308 && (reloc_dest == DEST_STUB
15310 && (h->elf.root.type == bfd_link_hash_undefweak
15311 || h->elf.root.type == bfd_link_hash_undefined)
15312 && is_branch_reloc (r_type))))
15313 info->callbacks->reloc_overflow (info, &h->elf.root,
15314 sym_name, reloc_name,
15316 input_bfd, input_section,
15321 info->callbacks->einfo
15322 /* xgettext:c-format */
15323 (_("%H: %s against `%pT': error %d\n"),
15324 input_bfd, input_section, rel->r_offset,
15325 reloc_name, sym_name, (int) r);
15328 if (more_info != NULL)
15338 Elf_Internal_Shdr *rel_hdr;
15339 size_t deleted = rel - wrel;
15341 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15342 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15343 if (rel_hdr->sh_size == 0)
15345 /* It is too late to remove an empty reloc section. Leave
15347 ??? What is wrong with an empty section??? */
15348 rel_hdr->sh_size = rel_hdr->sh_entsize;
15351 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15352 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15353 input_section->reloc_count -= deleted;
15356 /* If we're emitting relocations, then shortly after this function
15357 returns, reloc offsets and addends for this section will be
15358 adjusted. Worse, reloc symbol indices will be for the output
15359 file rather than the input. Save a copy of the relocs for
15360 opd_entry_value. */
15361 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
15364 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15365 rel = bfd_alloc (input_bfd, amt);
15366 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15367 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
15370 memcpy (rel, relocs, amt);
15375 /* Adjust the value of any local symbols in opd sections. */
15378 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15379 const char *name ATTRIBUTE_UNUSED,
15380 Elf_Internal_Sym *elfsym,
15381 asection *input_sec,
15382 struct elf_link_hash_entry *h)
15384 struct _opd_sec_data *opd;
15391 opd = get_opd_info (input_sec);
15392 if (opd == NULL || opd->adjust == NULL)
15395 value = elfsym->st_value - input_sec->output_offset;
15396 if (!bfd_link_relocatable (info))
15397 value -= input_sec->output_section->vma;
15399 adjust = opd->adjust[OPD_NDX (value)];
15403 elfsym->st_value += adjust;
15407 /* Finish up dynamic symbol handling. We set the contents of various
15408 dynamic sections here. */
15411 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15412 struct bfd_link_info *info,
15413 struct elf_link_hash_entry *h,
15414 Elf_Internal_Sym *sym)
15416 struct ppc_link_hash_table *htab;
15417 struct plt_entry *ent;
15418 Elf_Internal_Rela rela;
15421 htab = ppc_hash_table (info);
15425 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15426 if (ent->plt.offset != (bfd_vma) -1)
15428 /* This symbol has an entry in the procedure linkage
15429 table. Set it up. */
15430 if (!htab->elf.dynamic_sections_created
15431 || h->dynindx == -1)
15433 BFD_ASSERT (h->type == STT_GNU_IFUNC
15435 && (h->root.type == bfd_link_hash_defined
15436 || h->root.type == bfd_link_hash_defweak));
15437 rela.r_offset = (htab->elf.iplt->output_section->vma
15438 + htab->elf.iplt->output_offset
15439 + ent->plt.offset);
15441 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15443 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15444 rela.r_addend = (h->root.u.def.value
15445 + h->root.u.def.section->output_offset
15446 + h->root.u.def.section->output_section->vma
15448 loc = (htab->elf.irelplt->contents
15449 + (htab->elf.irelplt->reloc_count++
15450 * sizeof (Elf64_External_Rela)));
15451 htab->local_ifunc_resolver = 1;
15455 rela.r_offset = (htab->elf.splt->output_section->vma
15456 + htab->elf.splt->output_offset
15457 + ent->plt.offset);
15458 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15459 rela.r_addend = ent->addend;
15460 loc = (htab->elf.srelplt->contents
15461 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15462 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
15463 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
15464 htab->maybe_local_ifunc_resolver = 1;
15466 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15468 if (!htab->opd_abi)
15470 if (!h->def_regular)
15472 /* Mark the symbol as undefined, rather than as
15473 defined in glink. Leave the value if there were
15474 any relocations where pointer equality matters
15475 (this is a clue for the dynamic linker, to make
15476 function pointer comparisons work between an
15477 application and shared library), otherwise set it
15479 sym->st_shndx = SHN_UNDEF;
15480 if (!h->pointer_equality_needed)
15482 else if (!h->ref_regular_nonweak)
15484 /* This breaks function pointer comparisons, but
15485 that is better than breaking tests for a NULL
15486 function pointer. */
15495 /* This symbol needs a copy reloc. Set it up. */
15498 if (h->dynindx == -1
15499 || (h->root.type != bfd_link_hash_defined
15500 && h->root.type != bfd_link_hash_defweak)
15501 || htab->elf.srelbss == NULL
15502 || htab->elf.sreldynrelro == NULL)
15505 rela.r_offset = (h->root.u.def.value
15506 + h->root.u.def.section->output_section->vma
15507 + h->root.u.def.section->output_offset);
15508 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15510 if (h->root.u.def.section == htab->elf.sdynrelro)
15511 srel = htab->elf.sreldynrelro;
15513 srel = htab->elf.srelbss;
15514 loc = srel->contents;
15515 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
15516 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
15522 /* Used to decide how to sort relocs in an optimal manner for the
15523 dynamic linker, before writing them out. */
15525 static enum elf_reloc_type_class
15526 ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15527 const asection *rel_sec,
15528 const Elf_Internal_Rela *rela)
15530 enum elf_ppc64_reloc_type r_type;
15531 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15533 if (rel_sec == htab->elf.irelplt)
15534 return reloc_class_ifunc;
15536 r_type = ELF64_R_TYPE (rela->r_info);
15539 case R_PPC64_RELATIVE:
15540 return reloc_class_relative;
15541 case R_PPC64_JMP_SLOT:
15542 return reloc_class_plt;
15544 return reloc_class_copy;
15546 return reloc_class_normal;
15550 /* Finish up the dynamic sections. */
15553 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15554 struct bfd_link_info *info)
15556 struct ppc_link_hash_table *htab;
15560 htab = ppc_hash_table (info);
15564 dynobj = htab->elf.dynobj;
15565 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
15567 if (htab->elf.dynamic_sections_created)
15569 Elf64_External_Dyn *dyncon, *dynconend;
15571 if (sdyn == NULL || htab->elf.sgot == NULL)
15574 dyncon = (Elf64_External_Dyn *) sdyn->contents;
15575 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
15576 for (; dyncon < dynconend; dyncon++)
15578 Elf_Internal_Dyn dyn;
15581 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15588 case DT_PPC64_GLINK:
15590 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15591 /* We stupidly defined DT_PPC64_GLINK to be the start
15592 of glink rather than the first entry point, which is
15593 what ld.so needs, and now have a bigger stub to
15594 support automatic multiple TOCs. */
15595 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
15599 s = bfd_get_section_by_name (output_bfd, ".opd");
15602 dyn.d_un.d_ptr = s->vma;
15606 if (htab->do_multi_toc && htab->multi_toc_needed)
15607 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15608 if (htab->has_plt_localentry0)
15609 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
15612 case DT_PPC64_OPDSZ:
15613 s = bfd_get_section_by_name (output_bfd, ".opd");
15616 dyn.d_un.d_val = s->size;
15620 s = htab->elf.splt;
15621 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15625 s = htab->elf.srelplt;
15626 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
15630 dyn.d_un.d_val = htab->elf.srelplt->size;
15634 if (htab->local_ifunc_resolver)
15635 info->callbacks->einfo
15636 (_("%X%P: text relocations and GNU indirect "
15637 "functions will result in a segfault at runtime\n"));
15638 else if (htab->maybe_local_ifunc_resolver)
15639 info->callbacks->einfo
15640 (_("%P: warning: text relocations and GNU indirect "
15641 "functions may result in a segfault at runtime\n"));
15645 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
15649 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
15650 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
15652 /* Fill in the first entry in the global offset table.
15653 We use it to hold the link-time TOCbase. */
15654 bfd_put_64 (output_bfd,
15655 elf_gp (output_bfd) + TOC_BASE_OFF,
15656 htab->elf.sgot->contents);
15658 /* Set .got entry size. */
15659 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
15662 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
15663 && htab->elf.splt->output_section != bfd_abs_section_ptr)
15665 /* Set .plt entry size. */
15666 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
15667 = PLT_ENTRY_SIZE (htab);
15670 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15671 brlt ourselves if emitrelocations. */
15672 if (htab->brlt != NULL
15673 && htab->brlt->reloc_count != 0
15674 && !_bfd_elf_link_output_relocs (output_bfd,
15676 elf_section_data (htab->brlt)->rela.hdr,
15677 elf_section_data (htab->brlt)->relocs,
15681 if (htab->glink != NULL
15682 && htab->glink->reloc_count != 0
15683 && !_bfd_elf_link_output_relocs (output_bfd,
15685 elf_section_data (htab->glink)->rela.hdr,
15686 elf_section_data (htab->glink)->relocs,
15690 if (htab->glink_eh_frame != NULL
15691 && htab->glink_eh_frame->size != 0)
15695 struct map_stub *group;
15698 p = htab->glink_eh_frame->contents;
15699 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
15701 for (group = htab->group; group != NULL; group = group->next)
15702 if (group->stub_sec != NULL)
15704 /* Offset to stub section. */
15705 val = (group->stub_sec->output_section->vma
15706 + group->stub_sec->output_offset);
15707 val -= (htab->glink_eh_frame->output_section->vma
15708 + htab->glink_eh_frame->output_offset
15709 + (p + 8 - htab->glink_eh_frame->contents));
15710 if (val + 0x80000000 > 0xffffffff)
15713 (_("%s offset too large for .eh_frame sdata4 encoding"),
15714 group->stub_sec->name);
15717 bfd_put_32 (dynobj, val, p + 8);
15718 p += stub_eh_frame_size (group, align);
15720 if (htab->glink != NULL && htab->glink->size != 0)
15722 /* Offset to .glink. */
15723 val = (htab->glink->output_section->vma
15724 + htab->glink->output_offset
15726 val -= (htab->glink_eh_frame->output_section->vma
15727 + htab->glink_eh_frame->output_offset
15728 + (p + 8 - htab->glink_eh_frame->contents));
15729 if (val + 0x80000000 > 0xffffffff)
15732 (_("%s offset too large for .eh_frame sdata4 encoding"),
15733 htab->glink->name);
15736 bfd_put_32 (dynobj, val, p + 8);
15737 p += (24 + align - 1) & -align;
15740 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15741 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15742 htab->glink_eh_frame,
15743 htab->glink_eh_frame->contents))
15747 /* We need to handle writing out multiple GOT sections ourselves,
15748 since we didn't add them to DYNOBJ. We know dynobj is the first
15750 while ((dynobj = dynobj->link.next) != NULL)
15754 if (!is_ppc64_elf (dynobj))
15757 s = ppc64_elf_tdata (dynobj)->got;
15760 && s->output_section != bfd_abs_section_ptr
15761 && !bfd_set_section_contents (output_bfd, s->output_section,
15762 s->contents, s->output_offset,
15765 s = ppc64_elf_tdata (dynobj)->relgot;
15768 && s->output_section != bfd_abs_section_ptr
15769 && !bfd_set_section_contents (output_bfd, s->output_section,
15770 s->contents, s->output_offset,
15778 #include "elf64-target.h"
15780 /* FreeBSD support */
15782 #undef TARGET_LITTLE_SYM
15783 #undef TARGET_LITTLE_NAME
15785 #undef TARGET_BIG_SYM
15786 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
15787 #undef TARGET_BIG_NAME
15788 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15791 #define ELF_OSABI ELFOSABI_FREEBSD
15794 #define elf64_bed elf64_powerpc_fbsd_bed
15796 #include "elf64-target.h"