1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
6 This file is part of BFD, the Binary File Descriptor library.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
22 /* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
30 #include "elf/ppc64.h"
31 #include "elf64-ppc.h"
33 static void ppc_howto_init
35 static reloc_howto_type
*ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd
*abfd
, bfd_reloc_code_real_type code
));
37 static void ppc64_elf_info_to_howto
38 PARAMS ((bfd
*abfd
, arelent
*cache_ptr
, Elf_Internal_Rela
*dst
));
39 static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
41 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
43 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
45 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
47 static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
49 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
51 static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
53 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
54 PARAMS ((bfd
*, arelent
*, asymbol
*, PTR
, asection
*, bfd
*, char **));
55 static bfd_boolean ppc64_elf_object_p
57 static bfd_boolean ppc64_elf_merge_private_bfd_data
58 PARAMS ((bfd
*, bfd
*));
59 static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd
*, asection
*));
63 /* The name of the dynamic interpreter. This is put in the .interp
65 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
67 /* The size in bytes of an entry in the procedure linkage table. */
68 #define PLT_ENTRY_SIZE 24
70 /* The initial size of the plt reserved for the dynamic linker. */
71 #define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
73 /* TOC base pointers offset from start of TOC. */
74 #define TOC_BASE_OFF 0x8000
76 /* Offset of tp and dtp pointers from start of TLS block. */
77 #define TP_OFFSET 0x7000
78 #define DTP_OFFSET 0x8000
80 /* .plt call stub instructions. */
81 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82 #define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83 #define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84 #define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85 #define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87 #define BCTR 0x4e800420 /* bctr */
89 /* The normal stub is this size. */
90 #define PLT_CALL_STUB_SIZE (7*4)
92 /* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94 #define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
96 /* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98 #define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
100 /* Always allow this much space. */
101 #define GLINK_CALL_STUB_SIZE (8*4)
104 #define NOP 0x60000000
106 /* Some other nops. */
107 #define CROR_151515 0x4def7b82
108 #define CROR_313131 0x4ffffb82
110 /* .glink entries for the first 32k functions are two instructions. */
111 #define LI_R0_0 0x38000000 /* li %r0,0 */
112 #define B_DOT 0x48000000 /* b . */
114 /* After that, we need two instructions to load the index, followed by
116 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
117 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
119 /* Instructions to save and restore floating point regs. */
120 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122 #define BLR 0x4e800020 /* blr */
124 /* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
127 relocate .opd without reloc entries. */
128 #ifndef NO_OPD_RELOCS
129 #define NO_OPD_RELOCS 0
132 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
134 /* Relocation HOWTO's. */
135 static reloc_howto_type
*ppc64_elf_howto_table
[(int) R_PPC64_max
];
137 static reloc_howto_type ppc64_elf_howto_raw
[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE
, /* type */
141 2, /* size (0 = byte, 1 = short, 2 = long) */
143 FALSE
, /* pc_relative */
145 complain_overflow_dont
, /* complain_on_overflow */
146 bfd_elf_generic_reloc
, /* special_function */
147 "R_PPC64_NONE", /* name */
148 FALSE
, /* partial_inplace */
151 FALSE
), /* pcrel_offset */
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32
, /* type */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
158 FALSE
, /* pc_relative */
160 complain_overflow_bitfield
, /* complain_on_overflow */
161 bfd_elf_generic_reloc
, /* special_function */
162 "R_PPC64_ADDR32", /* name */
163 FALSE
, /* partial_inplace */
165 0xffffffff, /* dst_mask */
166 FALSE
), /* pcrel_offset */
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24
, /* type */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
174 FALSE
, /* pc_relative */
176 complain_overflow_bitfield
, /* complain_on_overflow */
177 bfd_elf_generic_reloc
, /* special_function */
178 "R_PPC64_ADDR24", /* name */
179 FALSE
, /* partial_inplace */
181 0x03fffffc, /* dst_mask */
182 FALSE
), /* pcrel_offset */
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16
, /* type */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
189 FALSE
, /* pc_relative */
191 complain_overflow_bitfield
, /* complain_on_overflow */
192 bfd_elf_generic_reloc
, /* special_function */
193 "R_PPC64_ADDR16", /* name */
194 FALSE
, /* partial_inplace */
196 0xffff, /* dst_mask */
197 FALSE
), /* pcrel_offset */
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO
, /* type */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
204 FALSE
, /* pc_relative */
206 complain_overflow_dont
,/* complain_on_overflow */
207 bfd_elf_generic_reloc
, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
209 FALSE
, /* partial_inplace */
211 0xffff, /* dst_mask */
212 FALSE
), /* pcrel_offset */
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI
, /* type */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
219 FALSE
, /* pc_relative */
221 complain_overflow_dont
, /* complain_on_overflow */
222 bfd_elf_generic_reloc
, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
224 FALSE
, /* partial_inplace */
226 0xffff, /* dst_mask */
227 FALSE
), /* pcrel_offset */
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA
, /* type */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
235 FALSE
, /* pc_relative */
237 complain_overflow_dont
, /* complain_on_overflow */
238 ppc64_elf_ha_reloc
, /* special_function */
239 "R_PPC64_ADDR16_HA", /* name */
240 FALSE
, /* partial_inplace */
242 0xffff, /* dst_mask */
243 FALSE
), /* pcrel_offset */
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14
, /* type */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
251 FALSE
, /* pc_relative */
253 complain_overflow_bitfield
, /* complain_on_overflow */
254 bfd_elf_generic_reloc
, /* special_function */
255 "R_PPC64_ADDR14", /* name */
256 FALSE
, /* partial_inplace */
258 0x0000fffc, /* dst_mask */
259 FALSE
), /* pcrel_offset */
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN
, /* type */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
268 FALSE
, /* pc_relative */
270 complain_overflow_bitfield
, /* complain_on_overflow */
271 ppc64_elf_brtaken_reloc
, /* special_function */
272 "R_PPC64_ADDR14_BRTAKEN",/* name */
273 FALSE
, /* partial_inplace */
275 0x0000fffc, /* dst_mask */
276 FALSE
), /* pcrel_offset */
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN
, /* type */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
285 FALSE
, /* pc_relative */
287 complain_overflow_bitfield
, /* complain_on_overflow */
288 ppc64_elf_brtaken_reloc
, /* special_function */
289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
290 FALSE
, /* partial_inplace */
292 0x0000fffc, /* dst_mask */
293 FALSE
), /* pcrel_offset */
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24
, /* type */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
300 TRUE
, /* pc_relative */
302 complain_overflow_signed
, /* complain_on_overflow */
303 bfd_elf_generic_reloc
, /* special_function */
304 "R_PPC64_REL24", /* name */
305 FALSE
, /* partial_inplace */
307 0x03fffffc, /* dst_mask */
308 TRUE
), /* pcrel_offset */
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14
, /* type */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
315 TRUE
, /* pc_relative */
317 complain_overflow_signed
, /* complain_on_overflow */
318 bfd_elf_generic_reloc
, /* special_function */
319 "R_PPC64_REL14", /* name */
320 FALSE
, /* partial_inplace */
322 0x0000fffc, /* dst_mask */
323 TRUE
), /* pcrel_offset */
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
328 HOWTO (R_PPC64_REL14_BRTAKEN
, /* type */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
332 TRUE
, /* pc_relative */
334 complain_overflow_signed
, /* complain_on_overflow */
335 ppc64_elf_brtaken_reloc
, /* special_function */
336 "R_PPC64_REL14_BRTAKEN", /* name */
337 FALSE
, /* partial_inplace */
339 0x0000fffc, /* dst_mask */
340 TRUE
), /* pcrel_offset */
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
345 HOWTO (R_PPC64_REL14_BRNTAKEN
, /* type */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
349 TRUE
, /* pc_relative */
351 complain_overflow_signed
, /* complain_on_overflow */
352 ppc64_elf_brtaken_reloc
, /* special_function */
353 "R_PPC64_REL14_BRNTAKEN",/* name */
354 FALSE
, /* partial_inplace */
356 0x0000fffc, /* dst_mask */
357 TRUE
), /* pcrel_offset */
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
361 HOWTO (R_PPC64_GOT16
, /* type */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
365 FALSE
, /* pc_relative */
367 complain_overflow_signed
, /* complain_on_overflow */
368 ppc64_elf_unhandled_reloc
, /* special_function */
369 "R_PPC64_GOT16", /* name */
370 FALSE
, /* partial_inplace */
372 0xffff, /* dst_mask */
373 FALSE
), /* pcrel_offset */
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
377 HOWTO (R_PPC64_GOT16_LO
, /* type */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
381 FALSE
, /* pc_relative */
383 complain_overflow_dont
, /* complain_on_overflow */
384 ppc64_elf_unhandled_reloc
, /* special_function */
385 "R_PPC64_GOT16_LO", /* name */
386 FALSE
, /* partial_inplace */
388 0xffff, /* dst_mask */
389 FALSE
), /* pcrel_offset */
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
393 HOWTO (R_PPC64_GOT16_HI
, /* type */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
397 FALSE
, /* pc_relative */
399 complain_overflow_dont
,/* complain_on_overflow */
400 ppc64_elf_unhandled_reloc
, /* special_function */
401 "R_PPC64_GOT16_HI", /* name */
402 FALSE
, /* partial_inplace */
404 0xffff, /* dst_mask */
405 FALSE
), /* pcrel_offset */
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
409 HOWTO (R_PPC64_GOT16_HA
, /* type */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
413 FALSE
, /* pc_relative */
415 complain_overflow_dont
,/* complain_on_overflow */
416 ppc64_elf_unhandled_reloc
, /* special_function */
417 "R_PPC64_GOT16_HA", /* name */
418 FALSE
, /* partial_inplace */
420 0xffff, /* dst_mask */
421 FALSE
), /* pcrel_offset */
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY
, /* type */
430 0, /* this one is variable size */
432 FALSE
, /* pc_relative */
434 complain_overflow_dont
, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc
, /* special_function */
436 "R_PPC64_COPY", /* name */
437 FALSE
, /* partial_inplace */
440 FALSE
), /* pcrel_offset */
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
444 HOWTO (R_PPC64_GLOB_DAT
, /* type */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
448 FALSE
, /* pc_relative */
450 complain_overflow_dont
, /* complain_on_overflow */
451 ppc64_elf_unhandled_reloc
, /* special_function */
452 "R_PPC64_GLOB_DAT", /* name */
453 FALSE
, /* partial_inplace */
455 ONES (64), /* dst_mask */
456 FALSE
), /* pcrel_offset */
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT
, /* type */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
464 FALSE
, /* pc_relative */
466 complain_overflow_dont
, /* complain_on_overflow */
467 ppc64_elf_unhandled_reloc
, /* special_function */
468 "R_PPC64_JMP_SLOT", /* name */
469 FALSE
, /* partial_inplace */
472 FALSE
), /* pcrel_offset */
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
477 HOWTO (R_PPC64_RELATIVE
, /* type */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
481 FALSE
, /* pc_relative */
483 complain_overflow_dont
, /* complain_on_overflow */
484 bfd_elf_generic_reloc
, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
486 FALSE
, /* partial_inplace */
488 ONES (64), /* dst_mask */
489 FALSE
), /* pcrel_offset */
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32
, /* type */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
496 FALSE
, /* pc_relative */
498 complain_overflow_bitfield
, /* complain_on_overflow */
499 bfd_elf_generic_reloc
, /* special_function */
500 "R_PPC64_UADDR32", /* name */
501 FALSE
, /* partial_inplace */
503 0xffffffff, /* dst_mask */
504 FALSE
), /* pcrel_offset */
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16
, /* type */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
511 FALSE
, /* pc_relative */
513 complain_overflow_bitfield
, /* complain_on_overflow */
514 bfd_elf_generic_reloc
, /* special_function */
515 "R_PPC64_UADDR16", /* name */
516 FALSE
, /* partial_inplace */
518 0xffff, /* dst_mask */
519 FALSE
), /* pcrel_offset */
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32
, /* type */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
526 TRUE
, /* pc_relative */
528 /* FIXME: Verify. Was complain_overflow_bitfield. */
529 complain_overflow_signed
, /* complain_on_overflow */
530 bfd_elf_generic_reloc
, /* special_function */
531 "R_PPC64_REL32", /* name */
532 FALSE
, /* partial_inplace */
534 0xffffffff, /* dst_mask */
535 TRUE
), /* pcrel_offset */
537 /* 32-bit relocation to the symbol's procedure linkage table. */
538 HOWTO (R_PPC64_PLT32
, /* type */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
542 FALSE
, /* pc_relative */
544 complain_overflow_bitfield
, /* complain_on_overflow */
545 ppc64_elf_unhandled_reloc
, /* special_function */
546 "R_PPC64_PLT32", /* name */
547 FALSE
, /* partial_inplace */
549 0xffffffff, /* dst_mask */
550 FALSE
), /* pcrel_offset */
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32
, /* type */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
558 TRUE
, /* pc_relative */
560 complain_overflow_signed
, /* complain_on_overflow */
561 bfd_elf_generic_reloc
, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
563 FALSE
, /* partial_inplace */
565 0xffffffff, /* dst_mask */
566 TRUE
), /* pcrel_offset */
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
570 HOWTO (R_PPC64_PLT16_LO
, /* type */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
574 FALSE
, /* pc_relative */
576 complain_overflow_dont
, /* complain_on_overflow */
577 ppc64_elf_unhandled_reloc
, /* special_function */
578 "R_PPC64_PLT16_LO", /* name */
579 FALSE
, /* partial_inplace */
581 0xffff, /* dst_mask */
582 FALSE
), /* pcrel_offset */
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
586 HOWTO (R_PPC64_PLT16_HI
, /* type */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
590 FALSE
, /* pc_relative */
592 complain_overflow_dont
, /* complain_on_overflow */
593 ppc64_elf_unhandled_reloc
, /* special_function */
594 "R_PPC64_PLT16_HI", /* name */
595 FALSE
, /* partial_inplace */
597 0xffff, /* dst_mask */
598 FALSE
), /* pcrel_offset */
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
602 HOWTO (R_PPC64_PLT16_HA
, /* type */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
606 FALSE
, /* pc_relative */
608 complain_overflow_dont
, /* complain_on_overflow */
609 ppc64_elf_unhandled_reloc
, /* special_function */
610 "R_PPC64_PLT16_HA", /* name */
611 FALSE
, /* partial_inplace */
613 0xffff, /* dst_mask */
614 FALSE
), /* pcrel_offset */
616 /* 16-bit section relative relocation. */
617 HOWTO (R_PPC64_SECTOFF
, /* type */
619 1, /* size (0 = byte, 1 = short, 2 = long) */
621 FALSE
, /* pc_relative */
623 complain_overflow_bitfield
, /* complain_on_overflow */
624 ppc64_elf_sectoff_reloc
, /* special_function */
625 "R_PPC64_SECTOFF", /* name */
626 FALSE
, /* partial_inplace */
628 0xffff, /* dst_mask */
629 FALSE
), /* pcrel_offset */
631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
632 HOWTO (R_PPC64_SECTOFF_LO
, /* type */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
636 FALSE
, /* pc_relative */
638 complain_overflow_dont
, /* complain_on_overflow */
639 ppc64_elf_sectoff_reloc
, /* special_function */
640 "R_PPC64_SECTOFF_LO", /* name */
641 FALSE
, /* partial_inplace */
643 0xffff, /* dst_mask */
644 FALSE
), /* pcrel_offset */
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI
, /* type */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
651 FALSE
, /* pc_relative */
653 complain_overflow_dont
, /* complain_on_overflow */
654 ppc64_elf_sectoff_reloc
, /* special_function */
655 "R_PPC64_SECTOFF_HI", /* name */
656 FALSE
, /* partial_inplace */
658 0xffff, /* dst_mask */
659 FALSE
), /* pcrel_offset */
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA
, /* type */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
666 FALSE
, /* pc_relative */
668 complain_overflow_dont
, /* complain_on_overflow */
669 ppc64_elf_sectoff_ha_reloc
, /* special_function */
670 "R_PPC64_SECTOFF_HA", /* name */
671 FALSE
, /* partial_inplace */
673 0xffff, /* dst_mask */
674 FALSE
), /* pcrel_offset */
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30
, /* type */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
681 TRUE
, /* pc_relative */
683 complain_overflow_dont
, /* complain_on_overflow */
684 bfd_elf_generic_reloc
, /* special_function */
685 "R_PPC64_REL30", /* name */
686 FALSE
, /* partial_inplace */
688 0xfffffffc, /* dst_mask */
689 TRUE
), /* pcrel_offset */
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64
, /* type */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
698 FALSE
, /* pc_relative */
700 complain_overflow_dont
, /* complain_on_overflow */
701 bfd_elf_generic_reloc
, /* special_function */
702 "R_PPC64_ADDR64", /* name */
703 FALSE
, /* partial_inplace */
705 ONES (64), /* dst_mask */
706 FALSE
), /* pcrel_offset */
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER
, /* type */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
713 FALSE
, /* pc_relative */
715 complain_overflow_dont
, /* complain_on_overflow */
716 bfd_elf_generic_reloc
, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
718 FALSE
, /* partial_inplace */
720 0xffff, /* dst_mask */
721 FALSE
), /* pcrel_offset */
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA
, /* type */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
729 FALSE
, /* pc_relative */
731 complain_overflow_dont
, /* complain_on_overflow */
732 ppc64_elf_ha_reloc
, /* special_function */
733 "R_PPC64_ADDR16_HIGHERA", /* name */
734 FALSE
, /* partial_inplace */
736 0xffff, /* dst_mask */
737 FALSE
), /* pcrel_offset */
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST
,/* type */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
744 FALSE
, /* pc_relative */
746 complain_overflow_dont
, /* complain_on_overflow */
747 bfd_elf_generic_reloc
, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
749 FALSE
, /* partial_inplace */
751 0xffff, /* dst_mask */
752 FALSE
), /* pcrel_offset */
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA
,/* type */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
760 FALSE
, /* pc_relative */
762 complain_overflow_dont
, /* complain_on_overflow */
763 ppc64_elf_ha_reloc
, /* special_function */
764 "R_PPC64_ADDR16_HIGHESTA", /* name */
765 FALSE
, /* partial_inplace */
767 0xffff, /* dst_mask */
768 FALSE
), /* pcrel_offset */
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64
, /* type */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
775 FALSE
, /* pc_relative */
777 complain_overflow_dont
, /* complain_on_overflow */
778 bfd_elf_generic_reloc
, /* special_function */
779 "R_PPC64_UADDR64", /* name */
780 FALSE
, /* partial_inplace */
782 ONES (64), /* dst_mask */
783 FALSE
), /* pcrel_offset */
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64
, /* type */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
790 TRUE
, /* pc_relative */
792 complain_overflow_dont
, /* complain_on_overflow */
793 bfd_elf_generic_reloc
, /* special_function */
794 "R_PPC64_REL64", /* name */
795 FALSE
, /* partial_inplace */
797 ONES (64), /* dst_mask */
798 TRUE
), /* pcrel_offset */
800 /* 64-bit relocation to the symbol's procedure linkage table. */
801 HOWTO (R_PPC64_PLT64
, /* type */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
805 FALSE
, /* pc_relative */
807 complain_overflow_dont
, /* complain_on_overflow */
808 ppc64_elf_unhandled_reloc
, /* special_function */
809 "R_PPC64_PLT64", /* name */
810 FALSE
, /* partial_inplace */
812 ONES (64), /* dst_mask */
813 FALSE
), /* pcrel_offset */
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64
, /* type */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
822 TRUE
, /* pc_relative */
824 complain_overflow_dont
, /* complain_on_overflow */
825 ppc64_elf_unhandled_reloc
, /* special_function */
826 "R_PPC64_PLTREL64", /* name */
827 FALSE
, /* partial_inplace */
829 ONES (64), /* dst_mask */
830 TRUE
), /* pcrel_offset */
832 /* 16 bit TOC-relative relocation. */
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16
, /* type */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
839 FALSE
, /* pc_relative */
841 complain_overflow_signed
, /* complain_on_overflow */
842 ppc64_elf_toc_reloc
, /* special_function */
843 "R_PPC64_TOC16", /* name */
844 FALSE
, /* partial_inplace */
846 0xffff, /* dst_mask */
847 FALSE
), /* pcrel_offset */
849 /* 16 bit TOC-relative relocation without overflow. */
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO
, /* type */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
856 FALSE
, /* pc_relative */
858 complain_overflow_dont
, /* complain_on_overflow */
859 ppc64_elf_toc_reloc
, /* special_function */
860 "R_PPC64_TOC16_LO", /* name */
861 FALSE
, /* partial_inplace */
863 0xffff, /* dst_mask */
864 FALSE
), /* pcrel_offset */
866 /* 16 bit TOC-relative relocation, high 16 bits. */
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI
, /* type */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
873 FALSE
, /* pc_relative */
875 complain_overflow_dont
, /* complain_on_overflow */
876 ppc64_elf_toc_reloc
, /* special_function */
877 "R_PPC64_TOC16_HI", /* name */
878 FALSE
, /* partial_inplace */
880 0xffff, /* dst_mask */
881 FALSE
), /* pcrel_offset */
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA
, /* type */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
892 FALSE
, /* pc_relative */
894 complain_overflow_dont
, /* complain_on_overflow */
895 ppc64_elf_toc_ha_reloc
, /* special_function */
896 "R_PPC64_TOC16_HA", /* name */
897 FALSE
, /* partial_inplace */
899 0xffff, /* dst_mask */
900 FALSE
), /* pcrel_offset */
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC
, /* type */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
909 FALSE
, /* pc_relative */
911 complain_overflow_bitfield
, /* complain_on_overflow */
912 ppc64_elf_toc64_reloc
, /* special_function */
913 "R_PPC64_TOC", /* name */
914 FALSE
, /* partial_inplace */
916 ONES (64), /* dst_mask */
917 FALSE
), /* pcrel_offset */
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16
, /* type */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
932 FALSE
, /* pc_relative */
934 complain_overflow_signed
, /* complain_on_overflow */
935 ppc64_elf_unhandled_reloc
, /* special_function */
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE
, /* partial_inplace */
939 0xffff, /* dst_mask */
940 FALSE
), /* pcrel_offset */
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO
, /* type */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
948 FALSE
, /* pc_relative */
950 complain_overflow_dont
, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc
, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE
, /* partial_inplace */
955 0xffff, /* dst_mask */
956 FALSE
), /* pcrel_offset */
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI
, /* type */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
964 FALSE
, /* pc_relative */
966 complain_overflow_dont
, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc
, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE
, /* partial_inplace */
971 0xffff, /* dst_mask */
972 FALSE
), /* pcrel_offset */
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA
, /* type */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
982 FALSE
, /* pc_relative */
984 complain_overflow_dont
,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc
, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE
, /* partial_inplace */
989 0xffff, /* dst_mask */
990 FALSE
), /* pcrel_offset */
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS
, /* type */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
997 FALSE
, /* pc_relative */
999 complain_overflow_bitfield
, /* complain_on_overflow */
1000 bfd_elf_generic_reloc
, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE
, /* partial_inplace */
1004 0xfffc, /* dst_mask */
1005 FALSE
), /* pcrel_offset */
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS
, /* type */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1012 FALSE
, /* pc_relative */
1014 complain_overflow_dont
,/* complain_on_overflow */
1015 bfd_elf_generic_reloc
, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE
, /* partial_inplace */
1019 0xfffc, /* dst_mask */
1020 FALSE
), /* pcrel_offset */
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS
, /* type */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1027 FALSE
, /* pc_relative */
1029 complain_overflow_signed
, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc
, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE
, /* partial_inplace */
1034 0xfffc, /* dst_mask */
1035 FALSE
), /* pcrel_offset */
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS
, /* type */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1042 FALSE
, /* pc_relative */
1044 complain_overflow_dont
, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc
, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE
, /* partial_inplace */
1049 0xfffc, /* dst_mask */
1050 FALSE
), /* pcrel_offset */
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS
, /* type */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1057 FALSE
, /* pc_relative */
1059 complain_overflow_dont
, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc
, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE
, /* partial_inplace */
1064 0xfffc, /* dst_mask */
1065 FALSE
), /* pcrel_offset */
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS
, /* type */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1072 FALSE
, /* pc_relative */
1074 complain_overflow_bitfield
, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc
, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE
, /* partial_inplace */
1079 0xfffc, /* dst_mask */
1080 FALSE
), /* pcrel_offset */
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS
, /* type */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1087 FALSE
, /* pc_relative */
1089 complain_overflow_dont
, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc
, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE
, /* partial_inplace */
1094 0xfffc, /* dst_mask */
1095 FALSE
), /* pcrel_offset */
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS
, /* type */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 FALSE
, /* pc_relative */
1104 complain_overflow_signed
, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc
, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE
, /* partial_inplace */
1109 0xfffc, /* dst_mask */
1110 FALSE
), /* pcrel_offset */
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS
, /* type */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 FALSE
, /* pc_relative */
1119 complain_overflow_dont
, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc
, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE
, /* partial_inplace */
1124 0xfffc, /* dst_mask */
1125 FALSE
), /* pcrel_offset */
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS
, /* type */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1133 FALSE
, /* pc_relative */
1135 complain_overflow_signed
, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc
, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE
, /* partial_inplace */
1140 0xfffc, /* dst_mask */
1141 FALSE
), /* pcrel_offset */
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS
,/* type */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 FALSE
, /* pc_relative */
1151 complain_overflow_dont
, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc
, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE
, /* partial_inplace */
1156 0xfffc, /* dst_mask */
1157 FALSE
), /* pcrel_offset */
1159 /* Marker reloc for TLS. */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1164 FALSE
, /* pc_relative */
1166 complain_overflow_dont
, /* complain_on_overflow */
1167 bfd_elf_generic_reloc
, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE
, /* partial_inplace */
1172 FALSE
), /* pcrel_offset */
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64
,
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1180 FALSE
, /* pc_relative */
1182 complain_overflow_dont
, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc
, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE
, /* partial_inplace */
1187 ONES (64), /* dst_mask */
1188 FALSE
), /* pcrel_offset */
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64
,
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1197 FALSE
, /* pc_relative */
1199 complain_overflow_dont
, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc
, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE
, /* partial_inplace */
1204 ONES (64), /* dst_mask */
1205 FALSE
), /* pcrel_offset */
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16
,
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1212 FALSE
, /* pc_relative */
1214 complain_overflow_signed
, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc
, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE
, /* partial_inplace */
1219 0xffff, /* dst_mask */
1220 FALSE
), /* pcrel_offset */
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO
,
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1227 FALSE
, /* pc_relative */
1229 complain_overflow_dont
, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc
, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE
, /* partial_inplace */
1234 0xffff, /* dst_mask */
1235 FALSE
), /* pcrel_offset */
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI
,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1242 FALSE
, /* pc_relative */
1244 complain_overflow_dont
, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc
, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE
, /* partial_inplace */
1249 0xffff, /* dst_mask */
1250 FALSE
), /* pcrel_offset */
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA
,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1257 FALSE
, /* pc_relative */
1259 complain_overflow_dont
, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc
, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE
, /* partial_inplace */
1264 0xffff, /* dst_mask */
1265 FALSE
), /* pcrel_offset */
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER
,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1272 FALSE
, /* pc_relative */
1274 complain_overflow_dont
, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc
, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE
, /* partial_inplace */
1279 0xffff, /* dst_mask */
1280 FALSE
), /* pcrel_offset */
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA
,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 FALSE
, /* pc_relative */
1289 complain_overflow_dont
, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc
, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE
, /* partial_inplace */
1294 0xffff, /* dst_mask */
1295 FALSE
), /* pcrel_offset */
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST
,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1302 FALSE
, /* pc_relative */
1304 complain_overflow_dont
, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc
, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE
, /* partial_inplace */
1309 0xffff, /* dst_mask */
1310 FALSE
), /* pcrel_offset */
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA
,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 FALSE
, /* pc_relative */
1319 complain_overflow_dont
, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc
, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE
, /* partial_inplace */
1324 0xffff, /* dst_mask */
1325 FALSE
), /* pcrel_offset */
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS
,
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1332 FALSE
, /* pc_relative */
1334 complain_overflow_signed
, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc
, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE
, /* partial_inplace */
1339 0xfffc, /* dst_mask */
1340 FALSE
), /* pcrel_offset */
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS
,
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1347 FALSE
, /* pc_relative */
1349 complain_overflow_dont
, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc
, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE
, /* partial_inplace */
1354 0xfffc, /* dst_mask */
1355 FALSE
), /* pcrel_offset */
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64
,
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1363 FALSE
, /* pc_relative */
1365 complain_overflow_dont
, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc
, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE
, /* partial_inplace */
1370 ONES (64), /* dst_mask */
1371 FALSE
), /* pcrel_offset */
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16
,
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1378 FALSE
, /* pc_relative */
1380 complain_overflow_signed
, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc
, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE
, /* partial_inplace */
1385 0xffff, /* dst_mask */
1386 FALSE
), /* pcrel_offset */
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO
,
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1393 FALSE
, /* pc_relative */
1395 complain_overflow_dont
, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc
, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE
, /* partial_inplace */
1400 0xffff, /* dst_mask */
1401 FALSE
), /* pcrel_offset */
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI
,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1408 FALSE
, /* pc_relative */
1410 complain_overflow_dont
, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc
, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE
, /* partial_inplace */
1415 0xffff, /* dst_mask */
1416 FALSE
), /* pcrel_offset */
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA
,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1423 FALSE
, /* pc_relative */
1425 complain_overflow_dont
, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc
, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE
, /* partial_inplace */
1430 0xffff, /* dst_mask */
1431 FALSE
), /* pcrel_offset */
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER
,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1438 FALSE
, /* pc_relative */
1440 complain_overflow_dont
, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc
, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE
, /* partial_inplace */
1445 0xffff, /* dst_mask */
1446 FALSE
), /* pcrel_offset */
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA
,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1453 FALSE
, /* pc_relative */
1455 complain_overflow_dont
, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc
, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE
, /* partial_inplace */
1460 0xffff, /* dst_mask */
1461 FALSE
), /* pcrel_offset */
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST
,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1468 FALSE
, /* pc_relative */
1470 complain_overflow_dont
, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc
, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE
, /* partial_inplace */
1475 0xffff, /* dst_mask */
1476 FALSE
), /* pcrel_offset */
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA
,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1483 FALSE
, /* pc_relative */
1485 complain_overflow_dont
, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc
, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE
, /* partial_inplace */
1490 0xffff, /* dst_mask */
1491 FALSE
), /* pcrel_offset */
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS
,
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1498 FALSE
, /* pc_relative */
1500 complain_overflow_signed
, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc
, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE
, /* partial_inplace */
1505 0xfffc, /* dst_mask */
1506 FALSE
), /* pcrel_offset */
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS
,
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1513 FALSE
, /* pc_relative */
1515 complain_overflow_dont
, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc
, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE
, /* partial_inplace */
1520 0xfffc, /* dst_mask */
1521 FALSE
), /* pcrel_offset */
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16
,
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1530 FALSE
, /* pc_relative */
1532 complain_overflow_signed
, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc
, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
1535 FALSE
, /* partial_inplace */
1537 0xffff, /* dst_mask */
1538 FALSE
), /* pcrel_offset */
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO
,
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1545 FALSE
, /* pc_relative */
1547 complain_overflow_dont
, /* complain_on_overflow */
1548 ppc64_elf_unhandled_reloc
, /* special_function */
1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
1550 FALSE
, /* partial_inplace */
1552 0xffff, /* dst_mask */
1553 FALSE
), /* pcrel_offset */
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI
,
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1560 FALSE
, /* pc_relative */
1562 complain_overflow_dont
, /* complain_on_overflow */
1563 ppc64_elf_unhandled_reloc
, /* special_function */
1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
1565 FALSE
, /* partial_inplace */
1567 0xffff, /* dst_mask */
1568 FALSE
), /* pcrel_offset */
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA
,
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1575 FALSE
, /* pc_relative */
1577 complain_overflow_dont
, /* complain_on_overflow */
1578 ppc64_elf_unhandled_reloc
, /* special_function */
1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
1580 FALSE
, /* partial_inplace */
1582 0xffff, /* dst_mask */
1583 FALSE
), /* pcrel_offset */
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16
,
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1592 FALSE
, /* pc_relative */
1594 complain_overflow_signed
, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc
, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
1597 FALSE
, /* partial_inplace */
1599 0xffff, /* dst_mask */
1600 FALSE
), /* pcrel_offset */
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO
,
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1607 FALSE
, /* pc_relative */
1609 complain_overflow_dont
, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc
, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
1612 FALSE
, /* partial_inplace */
1614 0xffff, /* dst_mask */
1615 FALSE
), /* pcrel_offset */
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI
,
1619 16, /* rightshift */
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1622 FALSE
, /* pc_relative */
1624 complain_overflow_dont
, /* complain_on_overflow */
1625 ppc64_elf_unhandled_reloc
, /* special_function */
1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
1627 FALSE
, /* partial_inplace */
1629 0xffff, /* dst_mask */
1630 FALSE
), /* pcrel_offset */
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA
,
1634 16, /* rightshift */
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1637 FALSE
, /* pc_relative */
1639 complain_overflow_dont
, /* complain_on_overflow */
1640 ppc64_elf_unhandled_reloc
, /* special_function */
1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
1642 FALSE
, /* partial_inplace */
1644 0xffff, /* dst_mask */
1645 FALSE
), /* pcrel_offset */
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS
,
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1653 FALSE
, /* pc_relative */
1655 complain_overflow_signed
, /* complain_on_overflow */
1656 ppc64_elf_unhandled_reloc
, /* special_function */
1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
1658 FALSE
, /* partial_inplace */
1660 0xfffc, /* dst_mask */
1661 FALSE
), /* pcrel_offset */
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS
,
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1668 FALSE
, /* pc_relative */
1670 complain_overflow_dont
, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc
, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1673 FALSE
, /* partial_inplace */
1675 0xfffc, /* dst_mask */
1676 FALSE
), /* pcrel_offset */
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI
,
1680 16, /* rightshift */
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1683 FALSE
, /* pc_relative */
1685 complain_overflow_dont
, /* complain_on_overflow */
1686 ppc64_elf_unhandled_reloc
, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
1688 FALSE
, /* partial_inplace */
1690 0xffff, /* dst_mask */
1691 FALSE
), /* pcrel_offset */
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA
,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1698 FALSE
, /* pc_relative */
1700 complain_overflow_dont
, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc
, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE
, /* partial_inplace */
1705 0xffff, /* dst_mask */
1706 FALSE
), /* pcrel_offset */
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS
,
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1714 FALSE
, /* pc_relative */
1716 complain_overflow_signed
, /* complain_on_overflow */
1717 ppc64_elf_unhandled_reloc
, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
1719 FALSE
, /* partial_inplace */
1721 0xffff, /* dst_mask */
1722 FALSE
), /* pcrel_offset */
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS
,
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1729 FALSE
, /* pc_relative */
1731 complain_overflow_dont
, /* complain_on_overflow */
1732 ppc64_elf_unhandled_reloc
, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1734 FALSE
, /* partial_inplace */
1736 0xffff, /* dst_mask */
1737 FALSE
), /* pcrel_offset */
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI
,
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1744 FALSE
, /* pc_relative */
1746 complain_overflow_dont
, /* complain_on_overflow */
1747 ppc64_elf_unhandled_reloc
, /* special_function */
1748 "R_PPC64_GOT_TPREL16_HI", /* name */
1749 FALSE
, /* partial_inplace */
1751 0xffff, /* dst_mask */
1752 FALSE
), /* pcrel_offset */
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA
,
1756 16, /* rightshift */
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1759 FALSE
, /* pc_relative */
1761 complain_overflow_dont
, /* complain_on_overflow */
1762 ppc64_elf_unhandled_reloc
, /* special_function */
1763 "R_PPC64_GOT_TPREL16_HA", /* name */
1764 FALSE
, /* partial_inplace */
1766 0xffff, /* dst_mask */
1767 FALSE
), /* pcrel_offset */
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT
, /* type */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1774 FALSE
, /* pc_relative */
1776 complain_overflow_dont
, /* complain_on_overflow */
1777 NULL
, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
1779 FALSE
, /* partial_inplace */
1782 FALSE
), /* pcrel_offset */
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY
, /* type */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1789 FALSE
, /* pc_relative */
1791 complain_overflow_dont
, /* complain_on_overflow */
1792 NULL
, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
1794 FALSE
, /* partial_inplace */
1797 FALSE
), /* pcrel_offset */
1801 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
1807 unsigned int i
, type
;
1810 i
< sizeof (ppc64_elf_howto_raw
) / sizeof (ppc64_elf_howto_raw
[0]);
1813 type
= ppc64_elf_howto_raw
[i
].type
;
1814 BFD_ASSERT (type
< (sizeof (ppc64_elf_howto_table
)
1815 / sizeof (ppc64_elf_howto_table
[0])));
1816 ppc64_elf_howto_table
[type
] = &ppc64_elf_howto_raw
[i
];
1820 static reloc_howto_type
*
1821 ppc64_elf_reloc_type_lookup (abfd
, code
)
1822 bfd
*abfd ATTRIBUTE_UNUSED
;
1823 bfd_reloc_code_real_type code
;
1825 enum elf_ppc64_reloc_type r
= R_PPC64_NONE
;
1827 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
1828 /* Initialize howto table if needed. */
1834 return (reloc_howto_type
*) NULL
;
1836 case BFD_RELOC_NONE
: r
= R_PPC64_NONE
;
1838 case BFD_RELOC_32
: r
= R_PPC64_ADDR32
;
1840 case BFD_RELOC_PPC_BA26
: r
= R_PPC64_ADDR24
;
1842 case BFD_RELOC_16
: r
= R_PPC64_ADDR16
;
1844 case BFD_RELOC_LO16
: r
= R_PPC64_ADDR16_LO
;
1846 case BFD_RELOC_HI16
: r
= R_PPC64_ADDR16_HI
;
1848 case BFD_RELOC_HI16_S
: r
= R_PPC64_ADDR16_HA
;
1850 case BFD_RELOC_PPC_BA16
: r
= R_PPC64_ADDR14
;
1852 case BFD_RELOC_PPC_BA16_BRTAKEN
: r
= R_PPC64_ADDR14_BRTAKEN
;
1854 case BFD_RELOC_PPC_BA16_BRNTAKEN
: r
= R_PPC64_ADDR14_BRNTAKEN
;
1856 case BFD_RELOC_PPC_B26
: r
= R_PPC64_REL24
;
1858 case BFD_RELOC_PPC_B16
: r
= R_PPC64_REL14
;
1860 case BFD_RELOC_PPC_B16_BRTAKEN
: r
= R_PPC64_REL14_BRTAKEN
;
1862 case BFD_RELOC_PPC_B16_BRNTAKEN
: r
= R_PPC64_REL14_BRNTAKEN
;
1864 case BFD_RELOC_16_GOTOFF
: r
= R_PPC64_GOT16
;
1866 case BFD_RELOC_LO16_GOTOFF
: r
= R_PPC64_GOT16_LO
;
1868 case BFD_RELOC_HI16_GOTOFF
: r
= R_PPC64_GOT16_HI
;
1870 case BFD_RELOC_HI16_S_GOTOFF
: r
= R_PPC64_GOT16_HA
;
1872 case BFD_RELOC_PPC_COPY
: r
= R_PPC64_COPY
;
1874 case BFD_RELOC_PPC_GLOB_DAT
: r
= R_PPC64_GLOB_DAT
;
1876 case BFD_RELOC_32_PCREL
: r
= R_PPC64_REL32
;
1878 case BFD_RELOC_32_PLTOFF
: r
= R_PPC64_PLT32
;
1880 case BFD_RELOC_32_PLT_PCREL
: r
= R_PPC64_PLTREL32
;
1882 case BFD_RELOC_LO16_PLTOFF
: r
= R_PPC64_PLT16_LO
;
1884 case BFD_RELOC_HI16_PLTOFF
: r
= R_PPC64_PLT16_HI
;
1886 case BFD_RELOC_HI16_S_PLTOFF
: r
= R_PPC64_PLT16_HA
;
1888 case BFD_RELOC_16_BASEREL
: r
= R_PPC64_SECTOFF
;
1890 case BFD_RELOC_LO16_BASEREL
: r
= R_PPC64_SECTOFF_LO
;
1892 case BFD_RELOC_HI16_BASEREL
: r
= R_PPC64_SECTOFF_HI
;
1894 case BFD_RELOC_HI16_S_BASEREL
: r
= R_PPC64_SECTOFF_HA
;
1896 case BFD_RELOC_CTOR
: r
= R_PPC64_ADDR64
;
1898 case BFD_RELOC_64
: r
= R_PPC64_ADDR64
;
1900 case BFD_RELOC_PPC64_HIGHER
: r
= R_PPC64_ADDR16_HIGHER
;
1902 case BFD_RELOC_PPC64_HIGHER_S
: r
= R_PPC64_ADDR16_HIGHERA
;
1904 case BFD_RELOC_PPC64_HIGHEST
: r
= R_PPC64_ADDR16_HIGHEST
;
1906 case BFD_RELOC_PPC64_HIGHEST_S
: r
= R_PPC64_ADDR16_HIGHESTA
;
1908 case BFD_RELOC_64_PCREL
: r
= R_PPC64_REL64
;
1910 case BFD_RELOC_64_PLTOFF
: r
= R_PPC64_PLT64
;
1912 case BFD_RELOC_64_PLT_PCREL
: r
= R_PPC64_PLTREL64
;
1914 case BFD_RELOC_PPC_TOC16
: r
= R_PPC64_TOC16
;
1916 case BFD_RELOC_PPC64_TOC16_LO
: r
= R_PPC64_TOC16_LO
;
1918 case BFD_RELOC_PPC64_TOC16_HI
: r
= R_PPC64_TOC16_HI
;
1920 case BFD_RELOC_PPC64_TOC16_HA
: r
= R_PPC64_TOC16_HA
;
1922 case BFD_RELOC_PPC64_TOC
: r
= R_PPC64_TOC
;
1924 case BFD_RELOC_PPC64_PLTGOT16
: r
= R_PPC64_PLTGOT16
;
1926 case BFD_RELOC_PPC64_PLTGOT16_LO
: r
= R_PPC64_PLTGOT16_LO
;
1928 case BFD_RELOC_PPC64_PLTGOT16_HI
: r
= R_PPC64_PLTGOT16_HI
;
1930 case BFD_RELOC_PPC64_PLTGOT16_HA
: r
= R_PPC64_PLTGOT16_HA
;
1932 case BFD_RELOC_PPC64_ADDR16_DS
: r
= R_PPC64_ADDR16_DS
;
1934 case BFD_RELOC_PPC64_ADDR16_LO_DS
: r
= R_PPC64_ADDR16_LO_DS
;
1936 case BFD_RELOC_PPC64_GOT16_DS
: r
= R_PPC64_GOT16_DS
;
1938 case BFD_RELOC_PPC64_GOT16_LO_DS
: r
= R_PPC64_GOT16_LO_DS
;
1940 case BFD_RELOC_PPC64_PLT16_LO_DS
: r
= R_PPC64_PLT16_LO_DS
;
1942 case BFD_RELOC_PPC64_SECTOFF_DS
: r
= R_PPC64_SECTOFF_DS
;
1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS
: r
= R_PPC64_SECTOFF_LO_DS
;
1946 case BFD_RELOC_PPC64_TOC16_DS
: r
= R_PPC64_TOC16_DS
;
1948 case BFD_RELOC_PPC64_TOC16_LO_DS
: r
= R_PPC64_TOC16_LO_DS
;
1950 case BFD_RELOC_PPC64_PLTGOT16_DS
: r
= R_PPC64_PLTGOT16_DS
;
1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS
: r
= R_PPC64_PLTGOT16_LO_DS
;
1954 case BFD_RELOC_PPC_TLS
: r
= R_PPC64_TLS
;
1956 case BFD_RELOC_PPC_DTPMOD
: r
= R_PPC64_DTPMOD64
;
1958 case BFD_RELOC_PPC_TPREL16
: r
= R_PPC64_TPREL16
;
1960 case BFD_RELOC_PPC_TPREL16_LO
: r
= R_PPC64_TPREL16_LO
;
1962 case BFD_RELOC_PPC_TPREL16_HI
: r
= R_PPC64_TPREL16_HI
;
1964 case BFD_RELOC_PPC_TPREL16_HA
: r
= R_PPC64_TPREL16_HA
;
1966 case BFD_RELOC_PPC_TPREL
: r
= R_PPC64_TPREL64
;
1968 case BFD_RELOC_PPC_DTPREL16
: r
= R_PPC64_DTPREL16
;
1970 case BFD_RELOC_PPC_DTPREL16_LO
: r
= R_PPC64_DTPREL16_LO
;
1972 case BFD_RELOC_PPC_DTPREL16_HI
: r
= R_PPC64_DTPREL16_HI
;
1974 case BFD_RELOC_PPC_DTPREL16_HA
: r
= R_PPC64_DTPREL16_HA
;
1976 case BFD_RELOC_PPC_DTPREL
: r
= R_PPC64_DTPREL64
;
1978 case BFD_RELOC_PPC_GOT_TLSGD16
: r
= R_PPC64_GOT_TLSGD16
;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO
: r
= R_PPC64_GOT_TLSGD16_LO
;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI
: r
= R_PPC64_GOT_TLSGD16_HI
;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA
: r
= R_PPC64_GOT_TLSGD16_HA
;
1986 case BFD_RELOC_PPC_GOT_TLSLD16
: r
= R_PPC64_GOT_TLSLD16
;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO
: r
= R_PPC64_GOT_TLSLD16_LO
;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI
: r
= R_PPC64_GOT_TLSLD16_HI
;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA
: r
= R_PPC64_GOT_TLSLD16_HA
;
1994 case BFD_RELOC_PPC_GOT_TPREL16
: r
= R_PPC64_GOT_TPREL16_DS
;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO
: r
= R_PPC64_GOT_TPREL16_LO_DS
;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI
: r
= R_PPC64_GOT_TPREL16_HI
;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA
: r
= R_PPC64_GOT_TPREL16_HA
;
2002 case BFD_RELOC_PPC_GOT_DTPREL16
: r
= R_PPC64_GOT_DTPREL16_DS
;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO
: r
= R_PPC64_GOT_DTPREL16_LO_DS
;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI
: r
= R_PPC64_GOT_DTPREL16_HI
;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA
: r
= R_PPC64_GOT_DTPREL16_HA
;
2010 case BFD_RELOC_PPC64_TPREL16_DS
: r
= R_PPC64_TPREL16_DS
;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS
: r
= R_PPC64_TPREL16_LO_DS
;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER
: r
= R_PPC64_TPREL16_HIGHER
;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA
: r
= R_PPC64_TPREL16_HIGHERA
;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST
: r
= R_PPC64_TPREL16_HIGHEST
;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA
: r
= R_PPC64_TPREL16_HIGHESTA
;
2022 case BFD_RELOC_PPC64_DTPREL16_DS
: r
= R_PPC64_DTPREL16_DS
;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS
: r
= R_PPC64_DTPREL16_LO_DS
;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER
: r
= R_PPC64_DTPREL16_HIGHER
;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA
: r
= R_PPC64_DTPREL16_HIGHERA
;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST
: r
= R_PPC64_DTPREL16_HIGHEST
;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA
: r
= R_PPC64_DTPREL16_HIGHESTA
;
2034 case BFD_RELOC_VTABLE_INHERIT
: r
= R_PPC64_GNU_VTINHERIT
;
2036 case BFD_RELOC_VTABLE_ENTRY
: r
= R_PPC64_GNU_VTENTRY
;
2040 return ppc64_elf_howto_table
[(int) r
];
2043 /* Set the howto pointer for a PowerPC ELF reloc. */
2046 ppc64_elf_info_to_howto (abfd
, cache_ptr
, dst
)
2047 bfd
*abfd ATTRIBUTE_UNUSED
;
2049 Elf_Internal_Rela
*dst
;
2053 /* Initialize howto table if needed. */
2054 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
2057 type
= ELF64_R_TYPE (dst
->r_info
);
2058 BFD_ASSERT (type
< (sizeof (ppc64_elf_howto_table
)
2059 / sizeof (ppc64_elf_howto_table
[0])));
2060 cache_ptr
->howto
= ppc64_elf_howto_table
[type
];
2063 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2065 static bfd_reloc_status_type
2066 ppc64_elf_ha_reloc (abfd
, reloc_entry
, symbol
, data
,
2067 input_section
, output_bfd
, error_message
)
2069 arelent
*reloc_entry
;
2072 asection
*input_section
;
2074 char **error_message
;
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2079 if (output_bfd
!= NULL
)
2080 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2081 input_section
, output_bfd
, error_message
);
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2086 reloc_entry
->addend
+= 0x8000;
2087 return bfd_reloc_continue
;
2090 static bfd_reloc_status_type
2091 ppc64_elf_brtaken_reloc (abfd
, reloc_entry
, symbol
, data
,
2092 input_section
, output_bfd
, error_message
)
2094 arelent
*reloc_entry
;
2097 asection
*input_section
;
2099 char **error_message
;
2102 enum elf_ppc64_reloc_type r_type
;
2103 bfd_size_type octets
;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2105 bfd_boolean is_power4
= FALSE
;
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2110 if (output_bfd
!= NULL
)
2111 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2112 input_section
, output_bfd
, error_message
);
2114 octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2115 insn
= bfd_get_32 (abfd
, (bfd_byte
*) data
+ octets
);
2116 insn
&= ~(0x01 << 21);
2117 r_type
= (enum elf_ppc64_reloc_type
) reloc_entry
->howto
->type
;
2118 if (r_type
== R_PPC64_ADDR14_BRTAKEN
2119 || r_type
== R_PPC64_REL14_BRTAKEN
)
2120 insn
|= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn
& (0x14 << 21)) == (0x04 << 21))
2129 else if ((insn
& (0x14 << 21)) == (0x10 << 21))
2132 return bfd_reloc_continue
;
2139 if (!bfd_is_com_section (symbol
->section
))
2140 target
= symbol
->value
;
2141 target
+= symbol
->section
->output_section
->vma
;
2142 target
+= symbol
->section
->output_offset
;
2143 target
+= reloc_entry
->addend
;
2145 from
= (reloc_entry
->address
2146 + input_section
->output_offset
2147 + input_section
->output_section
->vma
);
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma
) (target
- from
) < 0)
2153 bfd_put_32 (abfd
, (bfd_vma
) insn
, (bfd_byte
*) data
+ octets
);
2154 return bfd_reloc_continue
;
2157 static bfd_reloc_status_type
2158 ppc64_elf_sectoff_reloc (abfd
, reloc_entry
, symbol
, data
,
2159 input_section
, output_bfd
, error_message
)
2161 arelent
*reloc_entry
;
2164 asection
*input_section
;
2166 char **error_message
;
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2171 if (output_bfd
!= NULL
)
2172 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2173 input_section
, output_bfd
, error_message
);
2175 /* Subtract the symbol section base address. */
2176 reloc_entry
->addend
-= symbol
->section
->output_section
->vma
;
2177 return bfd_reloc_continue
;
2180 static bfd_reloc_status_type
2181 ppc64_elf_sectoff_ha_reloc (abfd
, reloc_entry
, symbol
, data
,
2182 input_section
, output_bfd
, error_message
)
2184 arelent
*reloc_entry
;
2187 asection
*input_section
;
2189 char **error_message
;
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2194 if (output_bfd
!= NULL
)
2195 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2196 input_section
, output_bfd
, error_message
);
2198 /* Subtract the symbol section base address. */
2199 reloc_entry
->addend
-= symbol
->section
->output_section
->vma
;
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry
->addend
+= 0x8000;
2203 return bfd_reloc_continue
;
2206 static bfd_reloc_status_type
2207 ppc64_elf_toc_reloc (abfd
, reloc_entry
, symbol
, data
,
2208 input_section
, output_bfd
, error_message
)
2210 arelent
*reloc_entry
;
2213 asection
*input_section
;
2215 char **error_message
;
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2222 if (output_bfd
!= NULL
)
2223 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2224 input_section
, output_bfd
, error_message
);
2226 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2228 TOCstart
= ppc64_elf_toc (input_section
->output_section
->owner
);
2230 /* Subtract the TOC base address. */
2231 reloc_entry
->addend
-= TOCstart
+ TOC_BASE_OFF
;
2232 return bfd_reloc_continue
;
2235 static bfd_reloc_status_type
2236 ppc64_elf_toc_ha_reloc (abfd
, reloc_entry
, symbol
, data
,
2237 input_section
, output_bfd
, error_message
)
2239 arelent
*reloc_entry
;
2242 asection
*input_section
;
2244 char **error_message
;
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2251 if (output_bfd
!= NULL
)
2252 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2253 input_section
, output_bfd
, error_message
);
2255 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2257 TOCstart
= ppc64_elf_toc (input_section
->output_section
->owner
);
2259 /* Subtract the TOC base address. */
2260 reloc_entry
->addend
-= TOCstart
+ TOC_BASE_OFF
;
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry
->addend
+= 0x8000;
2264 return bfd_reloc_continue
;
2267 static bfd_reloc_status_type
2268 ppc64_elf_toc64_reloc (abfd
, reloc_entry
, symbol
, data
,
2269 input_section
, output_bfd
, error_message
)
2271 arelent
*reloc_entry
;
2274 asection
*input_section
;
2276 char **error_message
;
2279 bfd_size_type octets
;
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2284 if (output_bfd
!= NULL
)
2285 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2286 input_section
, output_bfd
, error_message
);
2288 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2290 TOCstart
= ppc64_elf_toc (input_section
->output_section
->owner
);
2292 octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2293 bfd_put_64 (abfd
, TOCstart
+ TOC_BASE_OFF
, (bfd_byte
*) data
+ octets
);
2294 return bfd_reloc_ok
;
2297 static bfd_reloc_status_type
2298 ppc64_elf_unhandled_reloc (abfd
, reloc_entry
, symbol
, data
,
2299 input_section
, output_bfd
, error_message
)
2301 arelent
*reloc_entry
;
2304 asection
*input_section
;
2306 char **error_message
;
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2311 if (output_bfd
!= NULL
)
2312 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2313 input_section
, output_bfd
, error_message
);
2315 if (error_message
!= NULL
)
2317 static char buf
[60];
2318 sprintf (buf
, "generic linker can't handle %s",
2319 reloc_entry
->howto
->name
);
2320 *error_message
= buf
;
2322 return bfd_reloc_dangerous
;
2325 /* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2329 ppc64_elf_object_p (abfd
)
2332 if (abfd
->arch_info
->the_default
&& abfd
->arch_info
->bits_per_word
== 32)
2334 Elf_Internal_Ehdr
*i_ehdr
= elf_elfheader (abfd
);
2336 if (i_ehdr
->e_ident
[EI_CLASS
] == ELFCLASS64
)
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd
->arch_info
= abfd
->arch_info
->next
;
2340 BFD_ASSERT (abfd
->arch_info
->bits_per_word
== 64);
2346 /* Merge backend specific data from an object file to the output
2347 object file when linking. */
2350 ppc64_elf_merge_private_bfd_data (ibfd
, obfd
)
2354 /* Check if we have the same endianess. */
2355 if (ibfd
->xvec
->byteorder
!= obfd
->xvec
->byteorder
2356 && ibfd
->xvec
->byteorder
!= BFD_ENDIAN_UNKNOWN
2357 && obfd
->xvec
->byteorder
!= BFD_ENDIAN_UNKNOWN
)
2361 if (bfd_big_endian (ibfd
))
2362 msg
= _("%s: compiled for a big endian system and target is little endian");
2364 msg
= _("%s: compiled for a little endian system and target is big endian");
2366 (*_bfd_error_handler
) (msg
, bfd_archive_filename (ibfd
));
2368 bfd_set_error (bfd_error_wrong_format
);
2375 struct _ppc64_elf_section_data
2377 struct bfd_elf_section_data elf
;
2379 /* An array with one entry for each opd function descriptor. */
2382 /* Points to the function code section for local opd entries. */
2383 asection
**func_sec
;
2384 /* After editing .opd, adjust references to opd local syms. */
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2393 #define ppc64_elf_section_data(sec) \
2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2397 ppc64_elf_new_section_hook (abfd
, sec
)
2401 struct _ppc64_elf_section_data
*sdata
;
2402 bfd_size_type amt
= sizeof (*sdata
);
2404 sdata
= (struct _ppc64_elf_section_data
*) bfd_zalloc (abfd
, amt
);
2407 sec
->used_by_bfd
= (PTR
) sdata
;
2409 return _bfd_elf_new_section_hook (abfd
, sec
);
2412 /* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2429 The function definition in another object file might be:
2433 . .quad .TOC.@tocbase
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
2453 . std 2,40(1) # this is the general idea
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
2478 definition from some other object, eg. a static library. */
2480 /* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2486 struct ppc_dyn_relocs
2488 struct ppc_dyn_relocs
*next
;
2490 /* The input section of the reloc. */
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count
;
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count
;
2500 /* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2504 struct got_entry
*next
;
2506 /* The symbol addend that we'll be placing in the GOT. */
2509 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2512 bfd_signed_vma refcount
;
2516 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2517 TLS_TPREL or TLS_DTPREL for tls entries. */
2521 /* The same for PLT. */
2524 struct plt_entry
*next
;
2530 bfd_signed_vma refcount
;
2535 /* Of those relocs that might be copied as dynamic relocs, this macro
2536 selects those that must be copied when linking a shared library,
2537 even when the symbol is local. */
2539 #define MUST_BE_DYN_RELOC(RTYPE) \
2540 ((RTYPE) != R_PPC64_REL32 \
2541 && (RTYPE) != R_PPC64_REL64 \
2542 && (RTYPE) != R_PPC64_REL30)
2544 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2545 copying dynamic variables from a shared lib into an app's dynbss
2546 section, and instead use a dynamic relocation to point into the
2548 #define ELIMINATE_COPY_RELOCS 1
2550 /* Section name for stubs is the associated section name plus this
2552 #define STUB_SUFFIX ".stub"
2555 ppc_stub_long_branch:
2556 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2557 destination, but a 24 bit branch in a stub section will reach.
2560 ppc_stub_plt_branch:
2561 Similar to the above, but a 24 bit branch in the stub section won't
2562 reach its destination.
2563 . addis %r12,%r2,xxx@toc@ha
2564 . ld %r11,xxx@toc@l(%r12)
2569 Used to call a function in a shared library.
2570 . addis %r12,%r2,xxx@toc@ha
2572 . ld %r11,xxx+0@toc@l(%r12)
2573 . ld %r2,xxx+8@toc@l(%r12)
2575 . ld %r11,xxx+16@toc@l(%r12)
2579 enum ppc_stub_type
{
2581 ppc_stub_long_branch
,
2582 ppc_stub_plt_branch
,
2586 struct ppc_stub_hash_entry
{
2588 /* Base hash table entry structure. */
2589 struct bfd_hash_entry root
;
2591 /* The stub section. */
2594 /* Offset within stub_sec of the beginning of this stub. */
2595 bfd_vma stub_offset
;
2597 /* Given the symbol's value and its section we can determine its final
2598 value when building the stubs (so the stub knows where to jump. */
2599 bfd_vma target_value
;
2600 asection
*target_section
;
2602 enum ppc_stub_type stub_type
;
2604 /* The symbol table entry, if any, that this was derived from. */
2605 struct ppc_link_hash_entry
*h
;
2607 /* And the reloc addend that this was derived from. */
2610 /* Where this stub is being called from, or, in the case of combined
2611 stub sections, the first input section in the group. */
2615 struct ppc_branch_hash_entry
{
2617 /* Base hash table entry structure. */
2618 struct bfd_hash_entry root
;
2620 /* Offset within .branch_lt. */
2621 unsigned int offset
;
2623 /* Generation marker. */
2627 struct ppc_link_hash_entry
2629 struct elf_link_hash_entry elf
;
2631 /* A pointer to the most recently used stub hash entry against this
2633 struct ppc_stub_hash_entry
*stub_cache
;
2635 /* Track dynamic relocs copied for this symbol. */
2636 struct ppc_dyn_relocs
*dyn_relocs
;
2638 /* Link between function code and descriptor symbols. */
2639 struct elf_link_hash_entry
*oh
;
2641 /* Flag function code and descriptor symbols. */
2642 unsigned int is_func
:1;
2643 unsigned int is_func_descriptor
:1;
2644 unsigned int is_entry
:1;
2646 /* Contexts in which symbol is used in the GOT (or TOC).
2647 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
2648 corresponding relocs are encountered during check_relocs.
2649 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2650 indicate the corresponding GOT entry type is not needed.
2651 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
2652 a TPREL one. We use a separate flag rather than setting TPREL
2653 just for convenience in distinguishing the two cases. */
2654 #define TLS_GD 1 /* GD reloc. */
2655 #define TLS_LD 2 /* LD reloc. */
2656 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
2657 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2658 #define TLS_TLS 16 /* Any TLS reloc. */
2659 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
2660 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
2664 /* ppc64 ELF linker hash table. */
2666 struct ppc_link_hash_table
2668 struct elf_link_hash_table elf
;
2670 /* The stub hash table. */
2671 struct bfd_hash_table stub_hash_table
;
2673 /* Another hash table for plt_branch stubs. */
2674 struct bfd_hash_table branch_hash_table
;
2676 /* Linker stub bfd. */
2679 /* Linker call-backs. */
2680 asection
* (*add_stub_section
) PARAMS ((const char *, asection
*));
2681 void (*layout_sections_again
) PARAMS ((void));
2683 /* Array to keep track of which stub sections have been created, and
2684 information on stub grouping. */
2686 /* This is the section to which stubs in the group will be attached. */
2688 /* The stub section. */
2692 /* Assorted information used by ppc64_elf_size_stubs. */
2694 asection
**input_list
;
2696 /* Short-cuts to get to dynamic linker sections. */
2708 /* Short-cut to first output tls section. */
2711 /* Shortcut to .__tls_get_addr. */
2712 struct elf_link_hash_entry
*tls_get_addr
;
2714 /* TLS local dynamic got entry handling. */
2716 bfd_signed_vma refcount
;
2721 unsigned int stub_error
;
2723 /* Flag set when small branches are detected. Used to
2724 select suitable defaults for the stub group size. */
2725 unsigned int has_14bit_branch
;
2727 /* Set if we detect a reference undefined weak symbol. */
2728 unsigned int have_undefweak
;
2730 /* Incremented every time we size stubs. */
2731 unsigned int stub_iteration
;
2733 /* Small local sym to section mapping cache. */
2734 struct sym_sec_cache sym_sec
;
2737 static struct bfd_hash_entry
*stub_hash_newfunc
2738 PARAMS ((struct bfd_hash_entry
*, struct bfd_hash_table
*, const char *));
2739 static struct bfd_hash_entry
*branch_hash_newfunc
2740 PARAMS ((struct bfd_hash_entry
*, struct bfd_hash_table
*, const char *));
2741 static struct bfd_hash_entry
*link_hash_newfunc
2742 PARAMS ((struct bfd_hash_entry
*, struct bfd_hash_table
*, const char *));
2743 static struct bfd_link_hash_table
*ppc64_elf_link_hash_table_create
2745 static void ppc64_elf_link_hash_table_free
2746 PARAMS ((struct bfd_link_hash_table
*));
2747 static char *ppc_stub_name
2748 PARAMS ((const asection
*, const asection
*,
2749 const struct ppc_link_hash_entry
*, const Elf_Internal_Rela
*));
2750 static struct ppc_stub_hash_entry
*ppc_get_stub_entry
2751 PARAMS ((const asection
*, const asection
*, struct elf_link_hash_entry
*,
2752 const Elf_Internal_Rela
*, struct ppc_link_hash_table
*));
2753 static struct ppc_stub_hash_entry
*ppc_add_stub
2754 PARAMS ((const char *, asection
*, struct ppc_link_hash_table
*));
2755 static bfd_boolean create_linkage_sections
2756 PARAMS ((bfd
*, struct bfd_link_info
*));
2757 static bfd_boolean create_got_section
2758 PARAMS ((bfd
*, struct bfd_link_info
*));
2759 static bfd_boolean ppc64_elf_create_dynamic_sections
2760 PARAMS ((bfd
*, struct bfd_link_info
*));
2761 static void ppc64_elf_copy_indirect_symbol
2762 PARAMS ((struct elf_backend_data
*, struct elf_link_hash_entry
*,
2763 struct elf_link_hash_entry
*));
2764 static bfd_boolean update_local_sym_info
2765 PARAMS ((bfd
*, Elf_Internal_Shdr
*, unsigned long, bfd_vma
, int));
2766 static bfd_boolean update_plt_info
2767 PARAMS ((bfd
*, struct ppc_link_hash_entry
*, bfd_vma
));
2768 static bfd_boolean ppc64_elf_check_relocs
2769 PARAMS ((bfd
*, struct bfd_link_info
*, asection
*,
2770 const Elf_Internal_Rela
*));
2771 static asection
* ppc64_elf_gc_mark_hook
2772 PARAMS ((asection
*, struct bfd_link_info
*, Elf_Internal_Rela
*,
2773 struct elf_link_hash_entry
*, Elf_Internal_Sym
*));
2774 static bfd_boolean ppc64_elf_gc_sweep_hook
2775 PARAMS ((bfd
*, struct bfd_link_info
*, asection
*,
2776 const Elf_Internal_Rela
*));
2777 static bfd_boolean func_desc_adjust
2778 PARAMS ((struct elf_link_hash_entry
*, PTR
));
2779 static bfd_boolean ppc64_elf_func_desc_adjust
2780 PARAMS ((bfd
*, struct bfd_link_info
*));
2781 static bfd_boolean ppc64_elf_adjust_dynamic_symbol
2782 PARAMS ((struct bfd_link_info
*, struct elf_link_hash_entry
*));
2783 static void ppc64_elf_hide_symbol
2784 PARAMS ((struct bfd_link_info
*, struct elf_link_hash_entry
*, bfd_boolean
));
2785 static bfd_boolean get_sym_h
2786 PARAMS ((struct elf_link_hash_entry
**, Elf_Internal_Sym
**, asection
**,
2787 char **, Elf_Internal_Sym
**, unsigned long, bfd
*));
2788 static int get_tls_mask
2789 PARAMS ((char **, Elf_Internal_Sym
**, const Elf_Internal_Rela
*, bfd
*));
2790 static bfd_boolean allocate_dynrelocs
2791 PARAMS ((struct elf_link_hash_entry
*, PTR
));
2792 static bfd_boolean readonly_dynrelocs
2793 PARAMS ((struct elf_link_hash_entry
*, PTR
));
2794 static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2795 PARAMS ((const Elf_Internal_Rela
*));
2796 static bfd_boolean ppc64_elf_size_dynamic_sections
2797 PARAMS ((bfd
*, struct bfd_link_info
*));
2798 static enum ppc_stub_type ppc_type_of_stub
2799 PARAMS ((asection
*, const Elf_Internal_Rela
*,
2800 struct ppc_link_hash_entry
**, bfd_vma
));
2801 static bfd_byte
*build_plt_stub
2802 PARAMS ((bfd
*, bfd_byte
*, int, int));
2803 static bfd_boolean ppc_build_one_stub
2804 PARAMS ((struct bfd_hash_entry
*, PTR
));
2805 static bfd_boolean ppc_size_one_stub
2806 PARAMS ((struct bfd_hash_entry
*, PTR
));
2807 static void group_sections
2808 PARAMS ((struct ppc_link_hash_table
*, bfd_size_type
, bfd_boolean
));
2809 static bfd_boolean ppc64_elf_relocate_section
2810 PARAMS ((bfd
*, struct bfd_link_info
*info
, bfd
*, asection
*, bfd_byte
*,
2811 Elf_Internal_Rela
*relocs
, Elf_Internal_Sym
*local_syms
,
2813 static bfd_boolean ppc64_elf_finish_dynamic_symbol
2814 PARAMS ((bfd
*, struct bfd_link_info
*, struct elf_link_hash_entry
*,
2815 Elf_Internal_Sym
*));
2816 static bfd_boolean ppc64_elf_finish_dynamic_sections
2817 PARAMS ((bfd
*, struct bfd_link_info
*));
2819 /* Get the ppc64 ELF linker hash table from a link_info structure. */
2821 #define ppc_hash_table(p) \
2822 ((struct ppc_link_hash_table *) ((p)->hash))
2824 #define ppc_stub_hash_lookup(table, string, create, copy) \
2825 ((struct ppc_stub_hash_entry *) \
2826 bfd_hash_lookup ((table), (string), (create), (copy)))
2828 #define ppc_branch_hash_lookup(table, string, create, copy) \
2829 ((struct ppc_branch_hash_entry *) \
2830 bfd_hash_lookup ((table), (string), (create), (copy)))
2832 /* Create an entry in the stub hash table. */
2834 static struct bfd_hash_entry
*
2835 stub_hash_newfunc (entry
, table
, string
)
2836 struct bfd_hash_entry
*entry
;
2837 struct bfd_hash_table
*table
;
2840 /* Allocate the structure if it has not already been allocated by a
2844 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_stub_hash_entry
));
2849 /* Call the allocation method of the superclass. */
2850 entry
= bfd_hash_newfunc (entry
, table
, string
);
2853 struct ppc_stub_hash_entry
*eh
;
2855 /* Initialize the local fields. */
2856 eh
= (struct ppc_stub_hash_entry
*) entry
;
2857 eh
->stub_sec
= NULL
;
2858 eh
->stub_offset
= 0;
2859 eh
->target_value
= 0;
2860 eh
->target_section
= NULL
;
2861 eh
->stub_type
= ppc_stub_none
;
2869 /* Create an entry in the branch hash table. */
2871 static struct bfd_hash_entry
*
2872 branch_hash_newfunc (entry
, table
, string
)
2873 struct bfd_hash_entry
*entry
;
2874 struct bfd_hash_table
*table
;
2877 /* Allocate the structure if it has not already been allocated by a
2881 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_branch_hash_entry
));
2886 /* Call the allocation method of the superclass. */
2887 entry
= bfd_hash_newfunc (entry
, table
, string
);
2890 struct ppc_branch_hash_entry
*eh
;
2892 /* Initialize the local fields. */
2893 eh
= (struct ppc_branch_hash_entry
*) entry
;
2901 /* Create an entry in a ppc64 ELF linker hash table. */
2903 static struct bfd_hash_entry
*
2904 link_hash_newfunc (entry
, table
, string
)
2905 struct bfd_hash_entry
*entry
;
2906 struct bfd_hash_table
*table
;
2909 /* Allocate the structure if it has not already been allocated by a
2913 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_link_hash_entry
));
2918 /* Call the allocation method of the superclass. */
2919 entry
= _bfd_elf_link_hash_newfunc (entry
, table
, string
);
2922 struct ppc_link_hash_entry
*eh
= (struct ppc_link_hash_entry
*) entry
;
2924 eh
->stub_cache
= NULL
;
2925 eh
->dyn_relocs
= NULL
;
2928 eh
->is_func_descriptor
= 0;
2936 /* Create a ppc64 ELF linker hash table. */
2938 static struct bfd_link_hash_table
*
2939 ppc64_elf_link_hash_table_create (abfd
)
2942 struct ppc_link_hash_table
*htab
;
2943 bfd_size_type amt
= sizeof (struct ppc_link_hash_table
);
2945 htab
= (struct ppc_link_hash_table
*) bfd_malloc (amt
);
2949 if (! _bfd_elf_link_hash_table_init (&htab
->elf
, abfd
, link_hash_newfunc
))
2955 /* Init the stub hash table too. */
2956 if (!bfd_hash_table_init (&htab
->stub_hash_table
, stub_hash_newfunc
))
2959 /* And the branch hash table. */
2960 if (!bfd_hash_table_init (&htab
->branch_hash_table
, branch_hash_newfunc
))
2963 htab
->stub_bfd
= NULL
;
2964 htab
->add_stub_section
= NULL
;
2965 htab
->layout_sections_again
= NULL
;
2966 htab
->stub_group
= NULL
;
2968 htab
->srelgot
= NULL
;
2970 htab
->srelplt
= NULL
;
2971 htab
->sdynbss
= NULL
;
2972 htab
->srelbss
= NULL
;
2973 htab
->sglink
= NULL
;
2976 htab
->srelbrlt
= NULL
;
2977 htab
->tls_sec
= NULL
;
2978 htab
->tls_get_addr
= NULL
;
2979 htab
->tlsld_got
.refcount
= 0;
2980 htab
->stub_error
= 0;
2981 htab
->has_14bit_branch
= 0;
2982 htab
->have_undefweak
= 0;
2983 htab
->stub_iteration
= 0;
2984 htab
->sym_sec
.abfd
= NULL
;
2985 /* Initializing two fields of the union is just cosmetic. We really
2986 only care about glist, but when compiled on a 32-bit host the
2987 bfd_vma fields are larger. Setting the bfd_vma to zero makes
2988 debugger inspection of these fields look nicer. */
2989 htab
->elf
.init_refcount
.refcount
= 0;
2990 htab
->elf
.init_refcount
.glist
= NULL
;
2991 htab
->elf
.init_offset
.offset
= 0;
2992 htab
->elf
.init_offset
.glist
= NULL
;
2994 return &htab
->elf
.root
;
2997 /* Free the derived linker hash table. */
3000 ppc64_elf_link_hash_table_free (hash
)
3001 struct bfd_link_hash_table
*hash
;
3003 struct ppc_link_hash_table
*ret
= (struct ppc_link_hash_table
*) hash
;
3005 bfd_hash_table_free (&ret
->stub_hash_table
);
3006 bfd_hash_table_free (&ret
->branch_hash_table
);
3007 _bfd_generic_link_hash_table_free (hash
);
3010 /* Build a name for an entry in the stub hash table. */
3013 ppc_stub_name (input_section
, sym_sec
, h
, rel
)
3014 const asection
*input_section
;
3015 const asection
*sym_sec
;
3016 const struct ppc_link_hash_entry
*h
;
3017 const Elf_Internal_Rela
*rel
;
3022 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3023 offsets from a sym as a branch target? In fact, we could
3024 probably assume the addend is always zero. */
3025 BFD_ASSERT (((int) rel
->r_addend
& 0xffffffff) == rel
->r_addend
);
3029 len
= 8 + 1 + strlen (h
->elf
.root
.root
.string
) + 1 + 8 + 1;
3030 stub_name
= bfd_malloc (len
);
3031 if (stub_name
!= NULL
)
3033 sprintf (stub_name
, "%08x_%s+%x",
3034 input_section
->id
& 0xffffffff,
3035 h
->elf
.root
.root
.string
,
3036 (int) rel
->r_addend
& 0xffffffff);
3041 len
= 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3042 stub_name
= bfd_malloc (len
);
3043 if (stub_name
!= NULL
)
3045 sprintf (stub_name
, "%08x_%x:%x+%x",
3046 input_section
->id
& 0xffffffff,
3047 sym_sec
->id
& 0xffffffff,
3048 (int) ELF64_R_SYM (rel
->r_info
) & 0xffffffff,
3049 (int) rel
->r_addend
& 0xffffffff);
3055 /* Look up an entry in the stub hash. Stub entries are cached because
3056 creating the stub name takes a bit of time. */
3058 static struct ppc_stub_hash_entry
*
3059 ppc_get_stub_entry (input_section
, sym_sec
, hash
, rel
, htab
)
3060 const asection
*input_section
;
3061 const asection
*sym_sec
;
3062 struct elf_link_hash_entry
*hash
;
3063 const Elf_Internal_Rela
*rel
;
3064 struct ppc_link_hash_table
*htab
;
3066 struct ppc_stub_hash_entry
*stub_entry
;
3067 struct ppc_link_hash_entry
*h
= (struct ppc_link_hash_entry
*) hash
;
3068 const asection
*id_sec
;
3070 /* If this input section is part of a group of sections sharing one
3071 stub section, then use the id of the first section in the group.
3072 Stub names need to include a section id, as there may well be
3073 more than one stub used to reach say, printf, and we need to
3074 distinguish between them. */
3075 id_sec
= htab
->stub_group
[input_section
->id
].link_sec
;
3077 if (h
!= NULL
&& h
->stub_cache
!= NULL
3078 && h
->stub_cache
->h
== h
3079 && h
->stub_cache
->id_sec
== id_sec
)
3081 stub_entry
= h
->stub_cache
;
3087 stub_name
= ppc_stub_name (id_sec
, sym_sec
, h
, rel
);
3088 if (stub_name
== NULL
)
3091 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
,
3092 stub_name
, FALSE
, FALSE
);
3094 h
->stub_cache
= stub_entry
;
3102 /* Add a new stub entry to the stub hash. Not all fields of the new
3103 stub entry are initialised. */
3105 static struct ppc_stub_hash_entry
*
3106 ppc_add_stub (stub_name
, section
, htab
)
3107 const char *stub_name
;
3109 struct ppc_link_hash_table
*htab
;
3113 struct ppc_stub_hash_entry
*stub_entry
;
3115 link_sec
= htab
->stub_group
[section
->id
].link_sec
;
3116 stub_sec
= htab
->stub_group
[section
->id
].stub_sec
;
3117 if (stub_sec
== NULL
)
3119 stub_sec
= htab
->stub_group
[link_sec
->id
].stub_sec
;
3120 if (stub_sec
== NULL
)
3126 namelen
= strlen (link_sec
->name
);
3127 len
= namelen
+ sizeof (STUB_SUFFIX
);
3128 s_name
= bfd_alloc (htab
->stub_bfd
, len
);
3132 memcpy (s_name
, link_sec
->name
, namelen
);
3133 memcpy (s_name
+ namelen
, STUB_SUFFIX
, sizeof (STUB_SUFFIX
));
3134 stub_sec
= (*htab
->add_stub_section
) (s_name
, link_sec
);
3135 if (stub_sec
== NULL
)
3137 htab
->stub_group
[link_sec
->id
].stub_sec
= stub_sec
;
3139 htab
->stub_group
[section
->id
].stub_sec
= stub_sec
;
3142 /* Enter this entry into the linker stub hash table. */
3143 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
, stub_name
,
3145 if (stub_entry
== NULL
)
3147 (*_bfd_error_handler
) (_("%s: cannot create stub entry %s"),
3148 bfd_archive_filename (section
->owner
),
3153 stub_entry
->stub_sec
= stub_sec
;
3154 stub_entry
->stub_offset
= 0;
3155 stub_entry
->id_sec
= link_sec
;
3159 /* Create sections for linker generated code. */
3162 create_linkage_sections (dynobj
, info
)
3164 struct bfd_link_info
*info
;
3166 struct ppc_link_hash_table
*htab
;
3169 htab
= ppc_hash_table (info
);
3171 /* Create .sfpr for code to save and restore fp regs. */
3172 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_CODE
| SEC_READONLY
3173 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
3174 htab
->sfpr
= bfd_make_section_anyway (dynobj
, ".sfpr");
3175 if (htab
->sfpr
== NULL
3176 || ! bfd_set_section_flags (dynobj
, htab
->sfpr
, flags
)
3177 || ! bfd_set_section_alignment (dynobj
, htab
->sfpr
, 2))
3180 /* Create .glink for lazy dynamic linking support. */
3181 htab
->sglink
= bfd_make_section_anyway (dynobj
, ".glink");
3182 if (htab
->sglink
== NULL
3183 || ! bfd_set_section_flags (dynobj
, htab
->sglink
, flags
)
3184 || ! bfd_set_section_alignment (dynobj
, htab
->sglink
, 2))
3187 /* Create .branch_lt for plt_branch stubs. */
3188 flags
= (SEC_ALLOC
| SEC_LOAD
3189 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
3190 htab
->sbrlt
= bfd_make_section_anyway (dynobj
, ".branch_lt");
3191 if (htab
->sbrlt
== NULL
3192 || ! bfd_set_section_flags (dynobj
, htab
->sbrlt
, flags
)
3193 || ! bfd_set_section_alignment (dynobj
, htab
->sbrlt
, 3))
3198 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_READONLY
3199 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
3200 htab
->srelbrlt
= bfd_make_section_anyway (dynobj
, ".rela.branch_lt");
3202 || ! bfd_set_section_flags (dynobj
, htab
->srelbrlt
, flags
)
3203 || ! bfd_set_section_alignment (dynobj
, htab
->srelbrlt
, 3))
3209 /* Create .got and .rela.got sections in DYNOBJ, and set up
3210 shortcuts to them in our hash table. */
3213 create_got_section (dynobj
, info
)
3215 struct bfd_link_info
*info
;
3217 struct ppc_link_hash_table
*htab
;
3219 if (! _bfd_elf_create_got_section (dynobj
, info
))
3222 htab
= ppc_hash_table (info
);
3223 htab
->sgot
= bfd_get_section_by_name (dynobj
, ".got");
3227 htab
->srelgot
= bfd_make_section (dynobj
, ".rela.got");
3229 || ! bfd_set_section_flags (dynobj
, htab
->srelgot
,
3230 (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
3231 | SEC_IN_MEMORY
| SEC_LINKER_CREATED
3233 || ! bfd_set_section_alignment (dynobj
, htab
->srelgot
, 3))
3238 /* Create the dynamic sections, and set up shortcuts. */
3241 ppc64_elf_create_dynamic_sections (dynobj
, info
)
3243 struct bfd_link_info
*info
;
3245 struct ppc_link_hash_table
*htab
;
3247 htab
= ppc_hash_table (info
);
3248 if (!htab
->sgot
&& !create_got_section (dynobj
, info
))
3251 if (!_bfd_elf_create_dynamic_sections (dynobj
, info
))
3254 htab
->splt
= bfd_get_section_by_name (dynobj
, ".plt");
3255 htab
->srelplt
= bfd_get_section_by_name (dynobj
, ".rela.plt");
3256 htab
->sdynbss
= bfd_get_section_by_name (dynobj
, ".dynbss");
3258 htab
->srelbss
= bfd_get_section_by_name (dynobj
, ".rela.bss");
3260 if (!htab
->splt
|| !htab
->srelplt
|| !htab
->sdynbss
3261 || (!info
->shared
&& !htab
->srelbss
))
3267 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3270 ppc64_elf_copy_indirect_symbol (bed
, dir
, ind
)
3271 struct elf_backend_data
*bed ATTRIBUTE_UNUSED
;
3272 struct elf_link_hash_entry
*dir
, *ind
;
3274 struct ppc_link_hash_entry
*edir
, *eind
;
3276 edir
= (struct ppc_link_hash_entry
*) dir
;
3277 eind
= (struct ppc_link_hash_entry
*) ind
;
3279 /* Copy over any dynamic relocs we may have on the indirect sym. */
3280 if (eind
->dyn_relocs
!= NULL
)
3282 if (edir
->dyn_relocs
!= NULL
)
3284 struct ppc_dyn_relocs
**pp
;
3285 struct ppc_dyn_relocs
*p
;
3287 if (eind
->elf
.root
.type
== bfd_link_hash_indirect
)
3290 /* Add reloc counts against the weak sym to the strong sym
3291 list. Merge any entries against the same section. */
3292 for (pp
= &eind
->dyn_relocs
; (p
= *pp
) != NULL
; )
3294 struct ppc_dyn_relocs
*q
;
3296 for (q
= edir
->dyn_relocs
; q
!= NULL
; q
= q
->next
)
3297 if (q
->sec
== p
->sec
)
3299 q
->pc_count
+= p
->pc_count
;
3300 q
->count
+= p
->count
;
3307 *pp
= edir
->dyn_relocs
;
3310 edir
->dyn_relocs
= eind
->dyn_relocs
;
3311 eind
->dyn_relocs
= NULL
;
3314 edir
->is_func
|= eind
->is_func
;
3315 edir
->is_func_descriptor
|= eind
->is_func_descriptor
;
3316 edir
->is_entry
|= eind
->is_entry
;
3317 edir
->tls_mask
|= eind
->tls_mask
;
3319 /* Copy down any references that we may have already seen to the
3320 symbol which just became indirect. */
3321 edir
->elf
.elf_link_hash_flags
|=
3322 (eind
->elf
.elf_link_hash_flags
3323 & (ELF_LINK_HASH_REF_DYNAMIC
3324 | ELF_LINK_HASH_REF_REGULAR
3325 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3326 | ELF_LINK_NON_GOT_REF
));
3328 /* If we were called to copy over info for a weak sym, that's all. */
3329 if (eind
->elf
.root
.type
!= bfd_link_hash_indirect
)
3332 /* Copy over got entries. */
3333 if (eind
->elf
.got
.glist
!= NULL
)
3335 if (edir
->elf
.got
.glist
!= NULL
)
3337 struct got_entry
**entp
;
3338 struct got_entry
*ent
;
3340 for (entp
= &eind
->elf
.got
.glist
; (ent
= *entp
) != NULL
; )
3342 struct got_entry
*dent
;
3344 for (dent
= edir
->elf
.got
.glist
; dent
!= NULL
; dent
= dent
->next
)
3345 if (dent
->addend
== ent
->addend
3346 && dent
->tls_type
== ent
->tls_type
)
3348 dent
->got
.refcount
+= ent
->got
.refcount
;
3355 *entp
= edir
->elf
.got
.glist
;
3358 edir
->elf
.got
.glist
= eind
->elf
.got
.glist
;
3359 eind
->elf
.got
.glist
= NULL
;
3362 /* And plt entries. */
3363 if (eind
->elf
.plt
.plist
!= NULL
)
3365 if (edir
->elf
.plt
.plist
!= NULL
)
3367 struct plt_entry
**entp
;
3368 struct plt_entry
*ent
;
3370 for (entp
= &eind
->elf
.plt
.plist
; (ent
= *entp
) != NULL
; )
3372 struct plt_entry
*dent
;
3374 for (dent
= edir
->elf
.plt
.plist
; dent
!= NULL
; dent
= dent
->next
)
3375 if (dent
->addend
== ent
->addend
)
3377 dent
->plt
.refcount
+= ent
->plt
.refcount
;
3384 *entp
= edir
->elf
.plt
.plist
;
3387 edir
->elf
.plt
.plist
= eind
->elf
.plt
.plist
;
3388 eind
->elf
.plt
.plist
= NULL
;
3391 if (edir
->elf
.dynindx
== -1)
3393 edir
->elf
.dynindx
= eind
->elf
.dynindx
;
3394 edir
->elf
.dynstr_index
= eind
->elf
.dynstr_index
;
3395 eind
->elf
.dynindx
= -1;
3396 eind
->elf
.dynstr_index
= 0;
3399 BFD_ASSERT (eind
->elf
.dynindx
== -1);
3402 /* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3403 symbols undefined on the command-line. */
3406 ppc64_elf_mark_entry_syms (info
)
3407 struct bfd_link_info
*info
;
3409 struct ppc_link_hash_table
*htab
;
3410 struct bfd_sym_chain
*sym
;
3412 htab
= ppc_hash_table (info
);
3413 for (sym
= info
->gc_sym_list
; sym
; sym
= sym
->next
)
3415 struct elf_link_hash_entry
*h
;
3417 h
= elf_link_hash_lookup (&htab
->elf
, sym
->name
, FALSE
, FALSE
, FALSE
);
3419 ((struct ppc_link_hash_entry
*) h
)->is_entry
= 1;
3425 update_local_sym_info (abfd
, symtab_hdr
, r_symndx
, r_addend
, tls_type
)
3427 Elf_Internal_Shdr
*symtab_hdr
;
3428 unsigned long r_symndx
;
3432 struct got_entry
**local_got_ents
= elf_local_got_ents (abfd
);
3433 char *local_got_tls_masks
;
3435 if (local_got_ents
== NULL
)
3437 bfd_size_type size
= symtab_hdr
->sh_info
;
3439 size
*= sizeof (*local_got_ents
) + sizeof (*local_got_tls_masks
);
3440 local_got_ents
= (struct got_entry
**) bfd_zalloc (abfd
, size
);
3441 if (local_got_ents
== NULL
)
3443 elf_local_got_ents (abfd
) = local_got_ents
;
3446 if ((tls_type
& TLS_EXPLICIT
) == 0)
3448 struct got_entry
*ent
;
3450 for (ent
= local_got_ents
[r_symndx
]; ent
!= NULL
; ent
= ent
->next
)
3451 if (ent
->addend
== r_addend
&& ent
->tls_type
== tls_type
)
3455 bfd_size_type amt
= sizeof (*ent
);
3456 ent
= (struct got_entry
*) bfd_alloc (abfd
, amt
);
3459 ent
->next
= local_got_ents
[r_symndx
];
3460 ent
->addend
= r_addend
;
3461 ent
->tls_type
= tls_type
;
3462 ent
->got
.refcount
= 0;
3463 local_got_ents
[r_symndx
] = ent
;
3465 ent
->got
.refcount
+= 1;
3468 local_got_tls_masks
= (char *) (local_got_ents
+ symtab_hdr
->sh_info
);
3469 local_got_tls_masks
[r_symndx
] |= tls_type
;
3474 update_plt_info (abfd
, eh
, addend
)
3476 struct ppc_link_hash_entry
*eh
;
3479 struct plt_entry
*ent
;
3481 for (ent
= eh
->elf
.plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
3482 if (ent
->addend
== addend
)
3486 bfd_size_type amt
= sizeof (*ent
);
3487 ent
= (struct plt_entry
*) bfd_alloc (abfd
, amt
);
3490 ent
->next
= eh
->elf
.plt
.plist
;
3491 ent
->addend
= addend
;
3492 ent
->plt
.refcount
= 0;
3493 eh
->elf
.plt
.plist
= ent
;
3495 ent
->plt
.refcount
+= 1;
3496 eh
->elf
.elf_link_hash_flags
|= ELF_LINK_HASH_NEEDS_PLT
;
3501 /* Look through the relocs for a section during the first phase, and
3502 calculate needed space in the global offset table, procedure
3503 linkage table, and dynamic reloc sections. */
3506 ppc64_elf_check_relocs (abfd
, info
, sec
, relocs
)
3508 struct bfd_link_info
*info
;
3510 const Elf_Internal_Rela
*relocs
;
3512 struct ppc_link_hash_table
*htab
;
3513 Elf_Internal_Shdr
*symtab_hdr
;
3514 struct elf_link_hash_entry
**sym_hashes
, **sym_hashes_end
;
3515 const Elf_Internal_Rela
*rel
;
3516 const Elf_Internal_Rela
*rel_end
;
3518 asection
**opd_sym_map
;
3520 if (info
->relocateable
)
3523 htab
= ppc_hash_table (info
);
3524 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
3526 sym_hashes
= elf_sym_hashes (abfd
);
3527 sym_hashes_end
= (sym_hashes
3528 + symtab_hdr
->sh_size
/ sizeof (Elf64_External_Sym
)
3529 - symtab_hdr
->sh_info
);
3533 if (strcmp (bfd_get_section_name (abfd
, sec
), ".opd") == 0)
3535 /* Garbage collection needs some extra help with .opd sections.
3536 We don't want to necessarily keep everything referenced by
3537 relocs in .opd, as that would keep all functions. Instead,
3538 if we reference an .opd symbol (a function descriptor), we
3539 want to keep the function code symbol's section. This is
3540 easy for global symbols, but for local syms we need to keep
3541 information about the associated function section. Later, if
3542 edit_opd deletes entries, we'll use this array to adjust
3543 local syms in .opd. */
3545 asection
*func_section
;
3550 amt
= sec
->_raw_size
* sizeof (union opd_info
) / 24;
3551 opd_sym_map
= (asection
**) bfd_zalloc (abfd
, amt
);
3552 if (opd_sym_map
== NULL
)
3554 ppc64_elf_section_data (sec
)->opd
.func_sec
= opd_sym_map
;
3557 if (htab
->elf
.dynobj
== NULL
)
3558 htab
->elf
.dynobj
= abfd
;
3559 if (htab
->sfpr
== NULL
3560 && !create_linkage_sections (htab
->elf
.dynobj
, info
))
3563 rel_end
= relocs
+ sec
->reloc_count
;
3564 for (rel
= relocs
; rel
< rel_end
; rel
++)
3566 unsigned long r_symndx
;
3567 struct elf_link_hash_entry
*h
;
3568 enum elf_ppc64_reloc_type r_type
;
3571 r_symndx
= ELF64_R_SYM (rel
->r_info
);
3572 if (r_symndx
< symtab_hdr
->sh_info
)
3575 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
3577 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
3580 case R_PPC64_GOT_TLSLD16
:
3581 case R_PPC64_GOT_TLSLD16_LO
:
3582 case R_PPC64_GOT_TLSLD16_HI
:
3583 case R_PPC64_GOT_TLSLD16_HA
:
3584 htab
->tlsld_got
.refcount
+= 1;
3585 tls_type
= TLS_TLS
| TLS_LD
;
3588 case R_PPC64_GOT_TLSGD16
:
3589 case R_PPC64_GOT_TLSGD16_LO
:
3590 case R_PPC64_GOT_TLSGD16_HI
:
3591 case R_PPC64_GOT_TLSGD16_HA
:
3592 tls_type
= TLS_TLS
| TLS_GD
;
3595 case R_PPC64_GOT_TPREL16_DS
:
3596 case R_PPC64_GOT_TPREL16_LO_DS
:
3597 case R_PPC64_GOT_TPREL16_HI
:
3598 case R_PPC64_GOT_TPREL16_HA
:
3600 info
->flags
|= DF_STATIC_TLS
;
3601 tls_type
= TLS_TLS
| TLS_TPREL
;
3604 case R_PPC64_GOT_DTPREL16_DS
:
3605 case R_PPC64_GOT_DTPREL16_LO_DS
:
3606 case R_PPC64_GOT_DTPREL16_HI
:
3607 case R_PPC64_GOT_DTPREL16_HA
:
3608 tls_type
= TLS_TLS
| TLS_DTPREL
;
3610 sec
->has_tls_reloc
= 1;
3614 case R_PPC64_GOT16_DS
:
3615 case R_PPC64_GOT16_HA
:
3616 case R_PPC64_GOT16_HI
:
3617 case R_PPC64_GOT16_LO
:
3618 case R_PPC64_GOT16_LO_DS
:
3619 /* This symbol requires a global offset table entry. */
3620 if (htab
->sgot
== NULL
3621 && !create_got_section (htab
->elf
.dynobj
, info
))
3626 struct ppc_link_hash_entry
*eh
;
3627 struct got_entry
*ent
;
3629 eh
= (struct ppc_link_hash_entry
*) h
;
3630 for (ent
= eh
->elf
.got
.glist
; ent
!= NULL
; ent
= ent
->next
)
3631 if (ent
->addend
== rel
->r_addend
3632 && ent
->tls_type
== tls_type
)
3636 bfd_size_type amt
= sizeof (*ent
);
3637 ent
= (struct got_entry
*) bfd_alloc (abfd
, amt
);
3640 ent
->next
= eh
->elf
.got
.glist
;
3641 ent
->addend
= rel
->r_addend
;
3642 ent
->tls_type
= tls_type
;
3643 ent
->got
.refcount
= 0;
3644 eh
->elf
.got
.glist
= ent
;
3646 ent
->got
.refcount
+= 1;
3647 eh
->tls_mask
|= tls_type
;
3650 /* This is a global offset table entry for a local symbol. */
3651 if (!update_local_sym_info (abfd
, symtab_hdr
, r_symndx
,
3652 rel
->r_addend
, tls_type
))
3656 case R_PPC64_PLT16_HA
:
3657 case R_PPC64_PLT16_HI
:
3658 case R_PPC64_PLT16_LO
:
3661 /* This symbol requires a procedure linkage table entry. We
3662 actually build the entry in adjust_dynamic_symbol,
3663 because this might be a case of linking PIC code without
3664 linking in any dynamic objects, in which case we don't
3665 need to generate a procedure linkage table after all. */
3668 /* It does not make sense to have a procedure linkage
3669 table entry for a local symbol. */
3670 bfd_set_error (bfd_error_bad_value
);
3674 if (!update_plt_info (abfd
, (struct ppc_link_hash_entry
*) h
,
3679 /* The following relocations don't need to propagate the
3680 relocation if linking a shared object since they are
3681 section relative. */
3682 case R_PPC64_SECTOFF
:
3683 case R_PPC64_SECTOFF_LO
:
3684 case R_PPC64_SECTOFF_HI
:
3685 case R_PPC64_SECTOFF_HA
:
3686 case R_PPC64_SECTOFF_DS
:
3687 case R_PPC64_SECTOFF_LO_DS
:
3689 case R_PPC64_TOC16_LO
:
3690 case R_PPC64_TOC16_HI
:
3691 case R_PPC64_TOC16_HA
:
3692 case R_PPC64_TOC16_DS
:
3693 case R_PPC64_TOC16_LO_DS
:
3694 case R_PPC64_DTPREL16
:
3695 case R_PPC64_DTPREL16_LO
:
3696 case R_PPC64_DTPREL16_HI
:
3697 case R_PPC64_DTPREL16_HA
:
3698 case R_PPC64_DTPREL16_DS
:
3699 case R_PPC64_DTPREL16_LO_DS
:
3700 case R_PPC64_DTPREL16_HIGHER
:
3701 case R_PPC64_DTPREL16_HIGHERA
:
3702 case R_PPC64_DTPREL16_HIGHEST
:
3703 case R_PPC64_DTPREL16_HIGHESTA
:
3706 /* This relocation describes the C++ object vtable hierarchy.
3707 Reconstruct it for later use during GC. */
3708 case R_PPC64_GNU_VTINHERIT
:
3709 if (!_bfd_elf64_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
3713 /* This relocation describes which C++ vtable entries are actually
3714 used. Record for later use during GC. */
3715 case R_PPC64_GNU_VTENTRY
:
3716 if (!_bfd_elf64_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
3721 case R_PPC64_REL14_BRTAKEN
:
3722 case R_PPC64_REL14_BRNTAKEN
:
3723 htab
->has_14bit_branch
= 1;
3728 && h
->root
.root
.string
[0] == '.'
3729 && h
->root
.root
.string
[1] != 0)
3731 /* We may need a .plt entry if the function this reloc
3732 refers to is in a shared lib. */
3733 if (!update_plt_info (abfd
, (struct ppc_link_hash_entry
*) h
,
3736 if (h
== htab
->tls_get_addr
)
3737 sec
->has_tls_reloc
= 1;
3738 else if ((strncmp (h
->root
.root
.string
, ".__tls_get_addr", 15)
3740 && (h
->root
.root
.string
[15] == 0
3741 || h
->root
.root
.string
[15] == '@'))
3743 htab
->tls_get_addr
= h
;
3744 sec
->has_tls_reloc
= 1;
3749 case R_PPC64_TPREL64
:
3750 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_TPREL
;
3752 info
->flags
|= DF_STATIC_TLS
;
3755 case R_PPC64_DTPMOD64
:
3756 if (rel
+ 1 < rel_end
3757 && rel
[1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
)
3758 && rel
[1].r_offset
== rel
->r_offset
+ 8)
3759 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_GD
;
3761 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_LD
;
3764 case R_PPC64_DTPREL64
:
3765 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_DTPREL
;
3767 && rel
[-1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPMOD64
)
3768 && rel
[-1].r_offset
== rel
->r_offset
- 8)
3769 /* This is the second reloc of a dtpmod, dtprel pair.
3770 Don't mark with TLS_DTPREL. */
3774 sec
->has_tls_reloc
= 1;
3777 struct ppc_link_hash_entry
*eh
;
3778 eh
= (struct ppc_link_hash_entry
*) h
;
3779 eh
->tls_mask
|= tls_type
;
3782 if (!update_local_sym_info (abfd
, symtab_hdr
, r_symndx
,
3783 rel
->r_addend
, tls_type
))
3786 if (ppc64_elf_section_data (sec
)->t_symndx
== NULL
)
3788 /* One extra to simplify get_tls_mask. */
3789 bfd_size_type amt
= sec
->_raw_size
* sizeof (unsigned) / 8 + 1;
3790 ppc64_elf_section_data (sec
)->t_symndx
3791 = (unsigned *) bfd_zalloc (abfd
, amt
);
3792 if (ppc64_elf_section_data (sec
)->t_symndx
== NULL
)
3795 BFD_ASSERT (rel
->r_offset
% 8 == 0);
3796 ppc64_elf_section_data (sec
)->t_symndx
[rel
->r_offset
/ 8] = r_symndx
;
3798 /* Mark the second slot of a GD or LD entry.
3799 -1 to indicate GD and -2 to indicate LD. */
3800 if (tls_type
== (TLS_EXPLICIT
| TLS_TLS
| TLS_GD
))
3801 ppc64_elf_section_data (sec
)->t_symndx
[rel
->r_offset
/ 8 + 1] = -1;
3802 else if (tls_type
== (TLS_EXPLICIT
| TLS_TLS
| TLS_LD
))
3803 ppc64_elf_section_data (sec
)->t_symndx
[rel
->r_offset
/ 8 + 1] = -2;
3806 case R_PPC64_TPREL16
:
3807 case R_PPC64_TPREL16_LO
:
3808 case R_PPC64_TPREL16_HI
:
3809 case R_PPC64_TPREL16_HA
:
3810 case R_PPC64_TPREL16_DS
:
3811 case R_PPC64_TPREL16_LO_DS
:
3812 case R_PPC64_TPREL16_HIGHER
:
3813 case R_PPC64_TPREL16_HIGHERA
:
3814 case R_PPC64_TPREL16_HIGHEST
:
3815 case R_PPC64_TPREL16_HIGHESTA
:
3818 info
->flags
|= DF_STATIC_TLS
;
3823 case R_PPC64_ADDR64
:
3824 if (opd_sym_map
!= NULL
3826 && h
->root
.root
.string
[0] == '.'
3827 && h
->root
.root
.string
[1] != 0)
3829 struct elf_link_hash_entry
*fdh
;
3831 fdh
= elf_link_hash_lookup (&htab
->elf
, h
->root
.root
.string
+ 1,
3832 FALSE
, FALSE
, FALSE
);
3835 ((struct ppc_link_hash_entry
*) fdh
)->is_func_descriptor
= 1;
3836 ((struct ppc_link_hash_entry
*) fdh
)->oh
= h
;
3837 ((struct ppc_link_hash_entry
*) h
)->is_func
= 1;
3838 ((struct ppc_link_hash_entry
*) h
)->oh
= fdh
;
3841 if (opd_sym_map
!= NULL
3843 && rel
+ 1 < rel_end
3844 && ((enum elf_ppc64_reloc_type
) ELF64_R_TYPE ((rel
+ 1)->r_info
)
3849 s
= bfd_section_from_r_symndx (abfd
, &htab
->sym_sec
, sec
,
3854 opd_sym_map
[rel
->r_offset
/ 24] = s
;
3861 case R_PPC64_ADDR14
:
3862 case R_PPC64_ADDR14_BRNTAKEN
:
3863 case R_PPC64_ADDR14_BRTAKEN
:
3864 case R_PPC64_ADDR16
:
3865 case R_PPC64_ADDR16_DS
:
3866 case R_PPC64_ADDR16_HA
:
3867 case R_PPC64_ADDR16_HI
:
3868 case R_PPC64_ADDR16_HIGHER
:
3869 case R_PPC64_ADDR16_HIGHERA
:
3870 case R_PPC64_ADDR16_HIGHEST
:
3871 case R_PPC64_ADDR16_HIGHESTA
:
3872 case R_PPC64_ADDR16_LO
:
3873 case R_PPC64_ADDR16_LO_DS
:
3874 case R_PPC64_ADDR24
:
3875 case R_PPC64_ADDR32
:
3876 case R_PPC64_UADDR16
:
3877 case R_PPC64_UADDR32
:
3878 case R_PPC64_UADDR64
:
3880 /* Don't propagate .opd relocs. */
3881 if (NO_OPD_RELOCS
&& opd_sym_map
!= NULL
)
3884 /* Don't propagate relocs that the dynamic linker won't relocate. */
3885 if ((sec
->flags
& SEC_ALLOC
) == 0)
3888 /* If we are creating a shared library, and this is a reloc
3889 against a global symbol, or a non PC relative reloc
3890 against a local symbol, then we need to copy the reloc
3891 into the shared library. However, if we are linking with
3892 -Bsymbolic, we do not need to copy a reloc against a
3893 global symbol which is defined in an object we are
3894 including in the link (i.e., DEF_REGULAR is set). At
3895 this point we have not seen all the input files, so it is
3896 possible that DEF_REGULAR is not set now but will be set
3897 later (it is never cleared). In case of a weak definition,
3898 DEF_REGULAR may be cleared later by a strong definition in
3899 a shared library. We account for that possibility below by
3900 storing information in the dyn_relocs field of the hash
3901 table entry. A similar situation occurs when creating
3902 shared libraries and symbol visibility changes render the
3905 If on the other hand, we are creating an executable, we
3906 may need to keep relocations for symbols satisfied by a
3907 dynamic library if we manage to avoid copy relocs for the
3911 && (MUST_BE_DYN_RELOC (r_type
)
3913 && (! info
->symbolic
3914 || h
->root
.type
== bfd_link_hash_defweak
3915 || (h
->elf_link_hash_flags
3916 & ELF_LINK_HASH_DEF_REGULAR
) == 0))))
3917 || (ELIMINATE_COPY_RELOCS
3920 && (h
->root
.type
== bfd_link_hash_defweak
3921 || (h
->elf_link_hash_flags
3922 & ELF_LINK_HASH_DEF_REGULAR
) == 0)))
3924 struct ppc_dyn_relocs
*p
;
3925 struct ppc_dyn_relocs
**head
;
3927 /* We must copy these reloc types into the output file.
3928 Create a reloc section in dynobj and make room for
3935 name
= (bfd_elf_string_from_elf_section
3937 elf_elfheader (abfd
)->e_shstrndx
,
3938 elf_section_data (sec
)->rel_hdr
.sh_name
));
3942 if (strncmp (name
, ".rela", 5) != 0
3943 || strcmp (bfd_get_section_name (abfd
, sec
),
3946 (*_bfd_error_handler
)
3947 (_("%s: bad relocation section name `%s\'"),
3948 bfd_archive_filename (abfd
), name
);
3949 bfd_set_error (bfd_error_bad_value
);
3952 dynobj
= htab
->elf
.dynobj
;
3953 sreloc
= bfd_get_section_by_name (dynobj
, name
);
3958 sreloc
= bfd_make_section (dynobj
, name
);
3959 flags
= (SEC_HAS_CONTENTS
| SEC_READONLY
3960 | SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
3961 if ((sec
->flags
& SEC_ALLOC
) != 0)
3962 flags
|= SEC_ALLOC
| SEC_LOAD
;
3964 || ! bfd_set_section_flags (dynobj
, sreloc
, flags
)
3965 || ! bfd_set_section_alignment (dynobj
, sreloc
, 3))
3968 elf_section_data (sec
)->sreloc
= sreloc
;
3971 /* If this is a global symbol, we count the number of
3972 relocations we need for this symbol. */
3975 head
= &((struct ppc_link_hash_entry
*) h
)->dyn_relocs
;
3979 /* Track dynamic relocs needed for local syms too.
3980 We really need local syms available to do this
3984 s
= bfd_section_from_r_symndx (abfd
, &htab
->sym_sec
,
3989 head
= ((struct ppc_dyn_relocs
**)
3990 &elf_section_data (s
)->local_dynrel
);
3994 if (p
== NULL
|| p
->sec
!= sec
)
3996 p
= ((struct ppc_dyn_relocs
*)
3997 bfd_alloc (htab
->elf
.dynobj
,
3998 (bfd_size_type
) sizeof *p
));
4009 if (!MUST_BE_DYN_RELOC (r_type
))
4022 /* Return the section that should be marked against GC for a given
4026 ppc64_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
)
4028 struct bfd_link_info
*info ATTRIBUTE_UNUSED
;
4029 Elf_Internal_Rela
*rel
;
4030 struct elf_link_hash_entry
*h
;
4031 Elf_Internal_Sym
*sym
;
4033 asection
*rsec
= NULL
;
4037 enum elf_ppc64_reloc_type r_type
;
4038 struct ppc_link_hash_entry
*fdh
;
4040 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
4043 case R_PPC64_GNU_VTINHERIT
:
4044 case R_PPC64_GNU_VTENTRY
:
4048 switch (h
->root
.type
)
4050 case bfd_link_hash_defined
:
4051 case bfd_link_hash_defweak
:
4052 fdh
= (struct ppc_link_hash_entry
*) h
;
4054 /* Function descriptor syms cause the associated
4055 function code sym section to be marked. */
4056 if (fdh
->is_func_descriptor
)
4057 rsec
= fdh
->oh
->root
.u
.def
.section
;
4059 /* Function entry syms return NULL if they are in .opd
4060 and are not ._start (or others undefined on the ld
4061 command line). Thus we avoid marking all function
4062 sections, as all functions are referenced in .opd. */
4063 else if ((fdh
->oh
!= NULL
4064 && ((struct ppc_link_hash_entry
*) fdh
->oh
)->is_entry
)
4065 || ppc64_elf_section_data (sec
)->opd
.func_sec
== NULL
)
4066 rsec
= h
->root
.u
.def
.section
;
4069 case bfd_link_hash_common
:
4070 rsec
= h
->root
.u
.c
.p
->section
;
4080 asection
**opd_sym_section
;
4082 rsec
= bfd_section_from_elf_index (sec
->owner
, sym
->st_shndx
);
4083 opd_sym_section
= ppc64_elf_section_data (rsec
)->opd
.func_sec
;
4084 if (opd_sym_section
!= NULL
)
4085 rsec
= opd_sym_section
[sym
->st_value
/ 24];
4086 else if (ppc64_elf_section_data (sec
)->opd
.func_sec
!= NULL
)
4093 /* Update the .got, .plt. and dynamic reloc reference counts for the
4094 section being removed. */
4097 ppc64_elf_gc_sweep_hook (abfd
, info
, sec
, relocs
)
4099 struct bfd_link_info
*info
;
4101 const Elf_Internal_Rela
*relocs
;
4103 struct ppc_link_hash_table
*htab
;
4104 Elf_Internal_Shdr
*symtab_hdr
;
4105 struct elf_link_hash_entry
**sym_hashes
;
4106 struct got_entry
**local_got_ents
;
4107 const Elf_Internal_Rela
*rel
, *relend
;
4109 elf_section_data (sec
)->local_dynrel
= NULL
;
4111 htab
= ppc_hash_table (info
);
4112 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
4113 sym_hashes
= elf_sym_hashes (abfd
);
4114 local_got_ents
= elf_local_got_ents (abfd
);
4116 relend
= relocs
+ sec
->reloc_count
;
4117 for (rel
= relocs
; rel
< relend
; rel
++)
4119 unsigned long r_symndx
;
4120 enum elf_ppc64_reloc_type r_type
;
4121 struct elf_link_hash_entry
*h
= NULL
;
4124 r_symndx
= ELF64_R_SYM (rel
->r_info
);
4125 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
4126 if (r_symndx
>= symtab_hdr
->sh_info
)
4128 struct ppc_link_hash_entry
*eh
;
4129 struct ppc_dyn_relocs
**pp
;
4130 struct ppc_dyn_relocs
*p
;
4132 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
4133 eh
= (struct ppc_link_hash_entry
*) h
;
4135 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; pp
= &p
->next
)
4138 /* Everything must go for SEC. */
4146 case R_PPC64_GOT_TLSLD16
:
4147 case R_PPC64_GOT_TLSLD16_LO
:
4148 case R_PPC64_GOT_TLSLD16_HI
:
4149 case R_PPC64_GOT_TLSLD16_HA
:
4150 htab
->tlsld_got
.refcount
-= 1;
4151 tls_type
= TLS_TLS
| TLS_LD
;
4154 case R_PPC64_GOT_TLSGD16
:
4155 case R_PPC64_GOT_TLSGD16_LO
:
4156 case R_PPC64_GOT_TLSGD16_HI
:
4157 case R_PPC64_GOT_TLSGD16_HA
:
4158 tls_type
= TLS_TLS
| TLS_GD
;
4161 case R_PPC64_GOT_TPREL16_DS
:
4162 case R_PPC64_GOT_TPREL16_LO_DS
:
4163 case R_PPC64_GOT_TPREL16_HI
:
4164 case R_PPC64_GOT_TPREL16_HA
:
4165 tls_type
= TLS_TLS
| TLS_TPREL
;
4168 case R_PPC64_GOT_DTPREL16_DS
:
4169 case R_PPC64_GOT_DTPREL16_LO_DS
:
4170 case R_PPC64_GOT_DTPREL16_HI
:
4171 case R_PPC64_GOT_DTPREL16_HA
:
4172 tls_type
= TLS_TLS
| TLS_DTPREL
;
4176 case R_PPC64_GOT16_DS
:
4177 case R_PPC64_GOT16_HA
:
4178 case R_PPC64_GOT16_HI
:
4179 case R_PPC64_GOT16_LO
:
4180 case R_PPC64_GOT16_LO_DS
:
4183 struct got_entry
*ent
;
4188 ent
= local_got_ents
[r_symndx
];
4190 for (; ent
!= NULL
; ent
= ent
->next
)
4191 if (ent
->addend
== rel
->r_addend
4192 && ent
->tls_type
== tls_type
)
4196 if (ent
->got
.refcount
> 0)
4197 ent
->got
.refcount
-= 1;
4201 case R_PPC64_PLT16_HA
:
4202 case R_PPC64_PLT16_HI
:
4203 case R_PPC64_PLT16_LO
:
4207 case R_PPC64_REL14_BRNTAKEN
:
4208 case R_PPC64_REL14_BRTAKEN
:
4212 struct plt_entry
*ent
;
4214 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
4215 if (ent
->addend
== rel
->r_addend
)
4219 if (ent
->plt
.refcount
> 0)
4220 ent
->plt
.refcount
-= 1;
4231 /* Called via elf_link_hash_traverse to transfer dynamic linking
4232 information on function code symbol entries to their corresponding
4233 function descriptor symbol entries. */
4235 func_desc_adjust (h
, inf
)
4236 struct elf_link_hash_entry
*h
;
4239 struct bfd_link_info
*info
;
4240 struct ppc_link_hash_table
*htab
;
4241 struct plt_entry
*ent
;
4243 if (h
->root
.type
== bfd_link_hash_indirect
)
4246 if (h
->root
.type
== bfd_link_hash_warning
)
4247 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
4249 info
= (struct bfd_link_info
*) inf
;
4250 htab
= ppc_hash_table (info
);
4252 /* If this is a function code symbol, transfer dynamic linking
4253 information to the function descriptor symbol. */
4254 if (!((struct ppc_link_hash_entry
*) h
)->is_func
)
4257 if (h
->root
.type
== bfd_link_hash_undefweak
4258 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_REF_REGULAR
))
4259 htab
->have_undefweak
= TRUE
;
4261 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
4262 if (ent
->plt
.refcount
> 0)
4265 && h
->root
.root
.string
[0] == '.'
4266 && h
->root
.root
.string
[1] != '\0')
4268 struct elf_link_hash_entry
*fdh
= ((struct ppc_link_hash_entry
*) h
)->oh
;
4269 bfd_boolean force_local
;
4271 /* Find the corresponding function descriptor symbol. Create it
4272 as undefined if necessary. */
4275 fdh
= elf_link_hash_lookup (&htab
->elf
, h
->root
.root
.string
+ 1,
4276 FALSE
, FALSE
, TRUE
);
4280 && (h
->root
.type
== bfd_link_hash_undefined
4281 || h
->root
.type
== bfd_link_hash_undefweak
))
4285 struct bfd_link_hash_entry
*bh
;
4287 abfd
= h
->root
.u
.undef
.abfd
;
4288 newsym
= bfd_make_empty_symbol (abfd
);
4289 newsym
->name
= h
->root
.root
.string
+ 1;
4290 newsym
->section
= bfd_und_section_ptr
;
4292 newsym
->flags
= BSF_OBJECT
;
4293 if (h
->root
.type
== bfd_link_hash_undefweak
)
4294 newsym
->flags
|= BSF_WEAK
;
4297 if ( !(_bfd_generic_link_add_one_symbol
4298 (info
, abfd
, newsym
->name
, newsym
->flags
,
4299 newsym
->section
, newsym
->value
, NULL
, FALSE
, FALSE
, &bh
)))
4303 fdh
= (struct elf_link_hash_entry
*) bh
;
4304 fdh
->elf_link_hash_flags
&= ~ELF_LINK_NON_ELF
;
4308 && (fdh
->elf_link_hash_flags
& ELF_LINK_FORCED_LOCAL
) == 0
4310 || (fdh
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
) != 0
4311 || (fdh
->elf_link_hash_flags
& ELF_LINK_HASH_REF_DYNAMIC
) != 0))
4313 if (fdh
->dynindx
== -1)
4314 if (! bfd_elf64_link_record_dynamic_symbol (info
, fdh
))
4316 fdh
->elf_link_hash_flags
|= (h
->elf_link_hash_flags
4317 & (ELF_LINK_HASH_REF_REGULAR
4318 | ELF_LINK_HASH_REF_DYNAMIC
4319 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4320 | ELF_LINK_NON_GOT_REF
));
4321 if (ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
)
4323 fdh
->plt
.plist
= h
->plt
.plist
;
4324 fdh
->elf_link_hash_flags
|= ELF_LINK_HASH_NEEDS_PLT
;
4326 ((struct ppc_link_hash_entry
*) fdh
)->is_func_descriptor
= 1;
4327 ((struct ppc_link_hash_entry
*) fdh
)->oh
= h
;
4328 ((struct ppc_link_hash_entry
*) h
)->oh
= fdh
;
4331 /* Now that the info is on the function descriptor, clear the
4332 function code sym info. Any function code syms for which we
4333 don't have a definition in a regular file, we force local.
4334 This prevents a shared library from exporting syms that have
4335 been imported from another library. Function code syms that
4336 are really in the library we must leave global to prevent the
4337 linker dragging in a definition from a static library. */
4338 force_local
= (info
->shared
4339 && ((h
->elf_link_hash_flags
4340 & ELF_LINK_HASH_DEF_REGULAR
) == 0
4342 || (fdh
->elf_link_hash_flags
4343 & ELF_LINK_HASH_DEF_REGULAR
) == 0
4344 || (fdh
->elf_link_hash_flags
4345 & ELF_LINK_FORCED_LOCAL
) != 0));
4346 _bfd_elf_link_hash_hide_symbol (info
, h
, force_local
);
4352 #define MIN_SAVE_FPR 14
4353 #define MAX_SAVE_FPR 31
4355 /* Called near the start of bfd_elf_size_dynamic_sections. We use
4356 this hook to a) provide some gcc support functions, and b) transfer
4357 dynamic linking information gathered so far on function code symbol
4358 entries, to their corresponding function descriptor symbol entries. */
4360 ppc64_elf_func_desc_adjust (obfd
, info
)
4361 bfd
*obfd ATTRIBUTE_UNUSED
;
4362 struct bfd_link_info
*info
;
4364 struct ppc_link_hash_table
*htab
;
4365 unsigned int lowest_savef
= MAX_SAVE_FPR
+ 2;
4366 unsigned int lowest_restf
= MAX_SAVE_FPR
+ 2;
4368 struct elf_link_hash_entry
*h
;
4372 htab
= ppc_hash_table (info
);
4374 if (htab
->sfpr
== NULL
)
4375 /* We don't have any relocs. */
4378 /* First provide any missing ._savef* and ._restf* functions. */
4379 memcpy (sym
, "._savef14", 10);
4380 for (i
= MIN_SAVE_FPR
; i
<= MAX_SAVE_FPR
; i
++)
4382 sym
[7] = i
/ 10 + '0';
4383 sym
[8] = i
% 10 + '0';
4384 h
= elf_link_hash_lookup (&htab
->elf
, sym
, FALSE
, FALSE
, TRUE
);
4386 && h
->root
.type
== bfd_link_hash_undefined
)
4388 if (lowest_savef
> i
)
4390 h
->root
.type
= bfd_link_hash_defined
;
4391 h
->root
.u
.def
.section
= htab
->sfpr
;
4392 h
->root
.u
.def
.value
= (i
- lowest_savef
) * 4;
4394 h
->elf_link_hash_flags
|= ELF_LINK_HASH_DEF_REGULAR
;
4395 _bfd_elf_link_hash_hide_symbol (info
, h
, info
->shared
);
4399 memcpy (sym
, "._restf14", 10);
4400 for (i
= MIN_SAVE_FPR
; i
<= MAX_SAVE_FPR
; i
++)
4402 sym
[7] = i
/ 10 + '0';
4403 sym
[8] = i
% 10 + '0';
4404 h
= elf_link_hash_lookup (&htab
->elf
, sym
, FALSE
, FALSE
, TRUE
);
4406 && h
->root
.type
== bfd_link_hash_undefined
)
4408 if (lowest_restf
> i
)
4410 h
->root
.type
= bfd_link_hash_defined
;
4411 h
->root
.u
.def
.section
= htab
->sfpr
;
4412 h
->root
.u
.def
.value
= ((MAX_SAVE_FPR
+ 2 - lowest_savef
) * 4
4413 + (i
- lowest_restf
) * 4);
4415 h
->elf_link_hash_flags
|= ELF_LINK_HASH_DEF_REGULAR
;
4416 _bfd_elf_link_hash_hide_symbol (info
, h
, info
->shared
);
4420 elf_link_hash_traverse (&htab
->elf
, func_desc_adjust
, (PTR
) info
);
4422 htab
->sfpr
->_raw_size
= ((MAX_SAVE_FPR
+ 2 - lowest_savef
) * 4
4423 + (MAX_SAVE_FPR
+ 2 - lowest_restf
) * 4);
4425 if (htab
->sfpr
->_raw_size
== 0)
4427 if (!htab
->have_undefweak
)
4429 _bfd_strip_section_from_output (info
, htab
->sfpr
);
4433 htab
->sfpr
->_raw_size
= 4;
4436 p
= (bfd_byte
*) bfd_alloc (htab
->elf
.dynobj
, htab
->sfpr
->_raw_size
);
4439 htab
->sfpr
->contents
= p
;
4441 for (i
= lowest_savef
; i
<= MAX_SAVE_FPR
; i
++)
4443 unsigned int fpr
= i
<< 21;
4444 unsigned int stackoff
= (1 << 16) - (MAX_SAVE_FPR
+ 1 - i
) * 8;
4445 bfd_put_32 (htab
->elf
.dynobj
, STFD_FR0_0R1
+ fpr
+ stackoff
, p
);
4448 if (lowest_savef
<= MAX_SAVE_FPR
)
4450 bfd_put_32 (htab
->elf
.dynobj
, BLR
, p
);
4454 for (i
= lowest_restf
; i
<= MAX_SAVE_FPR
; i
++)
4456 unsigned int fpr
= i
<< 21;
4457 unsigned int stackoff
= (1 << 16) - (MAX_SAVE_FPR
+ 1 - i
) * 8;
4458 bfd_put_32 (htab
->elf
.dynobj
, LFD_FR0_0R1
+ fpr
+ stackoff
, p
);
4461 if (lowest_restf
<= MAX_SAVE_FPR
4462 || htab
->sfpr
->_raw_size
== 4)
4464 bfd_put_32 (htab
->elf
.dynobj
, BLR
, p
);
4470 /* Adjust a symbol defined by a dynamic object and referenced by a
4471 regular object. The current definition is in some section of the
4472 dynamic object, but we're not including those sections. We have to
4473 change the definition to something the rest of the link can
4477 ppc64_elf_adjust_dynamic_symbol (info
, h
)
4478 struct bfd_link_info
*info
;
4479 struct elf_link_hash_entry
*h
;
4481 struct ppc_link_hash_table
*htab
;
4483 unsigned int power_of_two
;
4485 htab
= ppc_hash_table (info
);
4487 /* Deal with function syms. */
4488 if (h
->type
== STT_FUNC
4489 || (h
->elf_link_hash_flags
& ELF_LINK_HASH_NEEDS_PLT
) != 0)
4491 /* Clear procedure linkage table information for any symbol that
4492 won't need a .plt entry. */
4493 struct plt_entry
*ent
;
4494 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
4495 if (ent
->plt
.refcount
> 0)
4497 if (!((struct ppc_link_hash_entry
*) h
)->is_func_descriptor
4499 || (h
->elf_link_hash_flags
& ELF_LINK_FORCED_LOCAL
) != 0
4501 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
) == 0
4502 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_REF_DYNAMIC
) == 0))
4504 h
->plt
.plist
= NULL
;
4505 h
->elf_link_hash_flags
&= ~ELF_LINK_HASH_NEEDS_PLT
;
4510 h
->plt
.plist
= NULL
;
4512 /* If this is a weak symbol, and there is a real definition, the
4513 processor independent code will have arranged for us to see the
4514 real definition first, and we can just use the same value. */
4515 if (h
->weakdef
!= NULL
)
4517 BFD_ASSERT (h
->weakdef
->root
.type
== bfd_link_hash_defined
4518 || h
->weakdef
->root
.type
== bfd_link_hash_defweak
);
4519 h
->root
.u
.def
.section
= h
->weakdef
->root
.u
.def
.section
;
4520 h
->root
.u
.def
.value
= h
->weakdef
->root
.u
.def
.value
;
4521 if (ELIMINATE_COPY_RELOCS
)
4522 h
->elf_link_hash_flags
4523 = ((h
->elf_link_hash_flags
& ~ELF_LINK_NON_GOT_REF
)
4524 | (h
->weakdef
->elf_link_hash_flags
& ELF_LINK_NON_GOT_REF
));
4528 /* This is a reference to a symbol defined by a dynamic object which
4529 is not a function. */
4531 /* If we are creating a shared library, we must presume that the
4532 only references to the symbol are via the global offset table.
4533 For such cases we need not do anything here; the relocations will
4534 be handled correctly by relocate_section. */
4538 /* If there are no references to this symbol that do not use the
4539 GOT, we don't need to generate a copy reloc. */
4540 if ((h
->elf_link_hash_flags
& ELF_LINK_NON_GOT_REF
) == 0)
4543 if (ELIMINATE_COPY_RELOCS
)
4545 struct ppc_link_hash_entry
* eh
;
4546 struct ppc_dyn_relocs
*p
;
4548 eh
= (struct ppc_link_hash_entry
*) h
;
4549 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
4551 s
= p
->sec
->output_section
;
4552 if (s
!= NULL
&& (s
->flags
& SEC_READONLY
) != 0)
4556 /* If we didn't find any dynamic relocs in read-only sections, then
4557 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4560 h
->elf_link_hash_flags
&= ~ELF_LINK_NON_GOT_REF
;
4565 /* We must allocate the symbol in our .dynbss section, which will
4566 become part of the .bss section of the executable. There will be
4567 an entry for this symbol in the .dynsym section. The dynamic
4568 object will contain position independent code, so all references
4569 from the dynamic object to this symbol will go through the global
4570 offset table. The dynamic linker will use the .dynsym entry to
4571 determine the address it must put in the global offset table, so
4572 both the dynamic object and the regular object will refer to the
4573 same memory location for the variable. */
4575 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4576 to copy the initial value out of the dynamic object and into the
4577 runtime process image. We need to remember the offset into the
4578 .rela.bss section we are going to use. */
4579 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
4581 htab
->srelbss
->_raw_size
+= sizeof (Elf64_External_Rela
);
4582 h
->elf_link_hash_flags
|= ELF_LINK_HASH_NEEDS_COPY
;
4585 /* We need to figure out the alignment required for this symbol. I
4586 have no idea how ELF linkers handle this. */
4587 power_of_two
= bfd_log2 (h
->size
);
4588 if (power_of_two
> 4)
4591 /* Apply the required alignment. */
4593 s
->_raw_size
= BFD_ALIGN (s
->_raw_size
, (bfd_size_type
) (1 << power_of_two
));
4594 if (power_of_two
> bfd_get_section_alignment (htab
->elf
.dynobj
, s
))
4596 if (! bfd_set_section_alignment (htab
->elf
.dynobj
, s
, power_of_two
))
4600 /* Define the symbol as being at this point in the section. */
4601 h
->root
.u
.def
.section
= s
;
4602 h
->root
.u
.def
.value
= s
->_raw_size
;
4604 /* Increment the section size to make room for the symbol. */
4605 s
->_raw_size
+= h
->size
;
4610 /* If given a function descriptor symbol, hide both the function code
4611 sym and the descriptor. */
4613 ppc64_elf_hide_symbol (info
, h
, force_local
)
4614 struct bfd_link_info
*info
;
4615 struct elf_link_hash_entry
*h
;
4616 bfd_boolean force_local
;
4618 _bfd_elf_link_hash_hide_symbol (info
, h
, force_local
);
4620 if (((struct ppc_link_hash_entry
*) h
)->is_func_descriptor
)
4622 struct elf_link_hash_entry
*fh
= ((struct ppc_link_hash_entry
*) h
)->oh
;
4627 struct ppc_link_hash_table
*htab
;
4630 /* We aren't supposed to use alloca in BFD because on
4631 systems which do not have alloca the version in libiberty
4632 calls xmalloc, which might cause the program to crash
4633 when it runs out of memory. This function doesn't have a
4634 return status, so there's no way to gracefully return an
4635 error. So cheat. We know that string[-1] can be safely
4636 dereferenced; It's either a string in an ELF string
4637 table, or allocated in an objalloc structure. */
4639 p
= h
->root
.root
.string
- 1;
4642 htab
= ppc_hash_table (info
);
4643 fh
= elf_link_hash_lookup (&htab
->elf
, p
, FALSE
, FALSE
, FALSE
);
4646 /* Unfortunately, if it so happens that the string we were
4647 looking for was allocated immediately before this string,
4648 then we overwrote the string terminator. That's the only
4649 reason the lookup should fail. */
4652 q
= h
->root
.root
.string
+ strlen (h
->root
.root
.string
);
4653 while (q
>= h
->root
.root
.string
&& *q
== *p
)
4655 if (q
< h
->root
.root
.string
&& *p
== '.')
4656 fh
= elf_link_hash_lookup (&htab
->elf
, p
, FALSE
, FALSE
, FALSE
);
4660 ((struct ppc_link_hash_entry
*) h
)->oh
= fh
;
4661 ((struct ppc_link_hash_entry
*) fh
)->oh
= h
;
4665 _bfd_elf_link_hash_hide_symbol (info
, fh
, force_local
);
4670 get_sym_h (hp
, symp
, symsecp
, tls_maskp
, locsymsp
, r_symndx
, ibfd
)
4671 struct elf_link_hash_entry
**hp
;
4672 Elf_Internal_Sym
**symp
;
4675 Elf_Internal_Sym
**locsymsp
;
4676 unsigned long r_symndx
;
4679 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
4681 if (r_symndx
>= symtab_hdr
->sh_info
)
4683 struct elf_link_hash_entry
**sym_hashes
= elf_sym_hashes (ibfd
);
4684 struct elf_link_hash_entry
*h
;
4686 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
4687 while (h
->root
.type
== bfd_link_hash_indirect
4688 || h
->root
.type
== bfd_link_hash_warning
)
4689 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
4697 if (symsecp
!= NULL
)
4699 asection
*symsec
= NULL
;
4700 if (h
->root
.type
== bfd_link_hash_defined
4701 || h
->root
.type
== bfd_link_hash_defweak
)
4702 symsec
= h
->root
.u
.def
.section
;
4706 if (tls_maskp
!= NULL
)
4708 struct ppc_link_hash_entry
*eh
;
4710 eh
= (struct ppc_link_hash_entry
*) h
;
4711 *tls_maskp
= &eh
->tls_mask
;
4716 Elf_Internal_Sym
*sym
;
4717 Elf_Internal_Sym
*locsyms
= *locsymsp
;
4719 if (locsyms
== NULL
)
4721 locsyms
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
4722 if (locsyms
== NULL
)
4723 locsyms
= bfd_elf_get_elf_syms (ibfd
, symtab_hdr
,
4724 symtab_hdr
->sh_info
,
4725 0, NULL
, NULL
, NULL
);
4726 if (locsyms
== NULL
)
4728 *locsymsp
= locsyms
;
4730 sym
= locsyms
+ r_symndx
;
4738 if (symsecp
!= NULL
)
4740 asection
*symsec
= NULL
;
4741 if ((sym
->st_shndx
!= SHN_UNDEF
4742 && sym
->st_shndx
< SHN_LORESERVE
)
4743 || sym
->st_shndx
> SHN_HIRESERVE
)
4744 symsec
= bfd_section_from_elf_index (ibfd
, sym
->st_shndx
);
4748 if (tls_maskp
!= NULL
)
4750 struct got_entry
**lgot_ents
;
4754 lgot_ents
= elf_local_got_ents (ibfd
);
4755 if (lgot_ents
!= NULL
)
4757 char *lgot_masks
= (char *) (lgot_ents
+ symtab_hdr
->sh_info
);
4758 tls_mask
= &lgot_masks
[r_symndx
];
4760 *tls_maskp
= tls_mask
;
4766 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
4767 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
4768 type suitable for optimization, and 1 otherwise. */
4771 get_tls_mask (tls_maskp
, locsymsp
, rel
, ibfd
)
4773 Elf_Internal_Sym
**locsymsp
;
4774 const Elf_Internal_Rela
*rel
;
4777 unsigned long r_symndx
;
4778 unsigned int next_r
;
4779 struct elf_link_hash_entry
*h
;
4780 Elf_Internal_Sym
*sym
;
4784 r_symndx
= ELF64_R_SYM (rel
->r_info
);
4785 if (!get_sym_h (&h
, &sym
, &sec
, tls_maskp
, locsymsp
, r_symndx
, ibfd
))
4788 if ((*tls_maskp
!= NULL
&& **tls_maskp
!= 0)
4790 || ppc64_elf_section_data (sec
)->t_symndx
== NULL
)
4793 /* Look inside a TOC section too. */
4796 BFD_ASSERT (h
->root
.type
== bfd_link_hash_defined
);
4797 off
= h
->root
.u
.def
.value
;
4800 off
= sym
->st_value
;
4801 off
+= rel
->r_addend
;
4802 BFD_ASSERT (off
% 8 == 0);
4803 r_symndx
= ppc64_elf_section_data (sec
)->t_symndx
[off
/ 8];
4804 next_r
= ppc64_elf_section_data (sec
)->t_symndx
[off
/ 8 + 1];
4805 if (!get_sym_h (&h
, &sym
, &sec
, tls_maskp
, locsymsp
, r_symndx
, ibfd
))
4808 || h
->root
.type
== bfd_link_hash_defined
4809 || h
->root
.type
== bfd_link_hash_defweak
)
4811 if (next_r
== (unsigned) -1)
4813 if (next_r
== (unsigned) -2
4815 || !(h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
)))
4822 ppc64_elf_edit_opd (obfd
, info
)
4824 struct bfd_link_info
*info
;
4828 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link_next
)
4831 Elf_Internal_Rela
*relstart
, *rel
, *relend
;
4832 Elf_Internal_Shdr
*symtab_hdr
;
4833 Elf_Internal_Sym
*local_syms
;
4834 struct elf_link_hash_entry
**sym_hashes
;
4838 bfd_boolean need_edit
;
4840 sec
= bfd_get_section_by_name (ibfd
, ".opd");
4844 amt
= sec
->_raw_size
* sizeof (long) / 24;
4845 adjust
= ppc64_elf_section_data (sec
)->opd
.adjust
;
4848 /* Must be a ld -r link. ie. check_relocs hasn't been
4850 adjust
= (long *) bfd_zalloc (obfd
, amt
);
4851 ppc64_elf_section_data (sec
)->opd
.adjust
= adjust
;
4853 memset (adjust
, 0, (size_t) amt
);
4855 if (sec
->output_section
== bfd_abs_section_ptr
)
4858 /* Look through the section relocs. */
4859 if ((sec
->flags
& SEC_RELOC
) == 0 || sec
->reloc_count
== 0)
4863 symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
4864 sym_hashes
= elf_sym_hashes (ibfd
);
4866 /* Read the relocations. */
4867 relstart
= _bfd_elf64_link_read_relocs (ibfd
, sec
, (PTR
) NULL
,
4868 (Elf_Internal_Rela
*) NULL
,
4870 if (relstart
== NULL
)
4873 /* First run through the relocs to check they are sane, and to
4874 determine whether we need to edit this opd section. */
4877 relend
= relstart
+ sec
->reloc_count
;
4878 for (rel
= relstart
; rel
< relend
; rel
++)
4880 enum elf_ppc64_reloc_type r_type
;
4881 unsigned long r_symndx
;
4883 struct elf_link_hash_entry
*h
;
4884 Elf_Internal_Sym
*sym
;
4886 /* .opd contains a regular array of 24 byte entries. We're
4887 only interested in the reloc pointing to a function entry
4889 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
4890 if (r_type
== R_PPC64_TOC
)
4893 if (r_type
!= R_PPC64_ADDR64
)
4895 (*_bfd_error_handler
)
4896 (_("%s: unexpected reloc type %u in .opd section"),
4897 bfd_archive_filename (ibfd
), r_type
);
4902 if (rel
+ 1 >= relend
)
4904 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE ((rel
+ 1)->r_info
);
4905 if (r_type
!= R_PPC64_TOC
)
4908 if (rel
->r_offset
!= offset
)
4910 /* If someone messes with .opd alignment then after a
4911 "ld -r" we might have padding in the middle of .opd.
4912 Also, there's nothing to prevent someone putting
4913 something silly in .opd with the assembler. No .opd
4914 optimization for them! */
4915 (*_bfd_error_handler
)
4916 (_("%s: .opd is not a regular array of opd entries"),
4917 bfd_archive_filename (ibfd
));
4922 r_symndx
= ELF64_R_SYM (rel
->r_info
);
4923 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
4925 goto error_free_rel
;
4927 if (sym_sec
== NULL
|| sym_sec
->owner
== NULL
)
4929 const char *sym_name
;
4931 sym_name
= h
->root
.root
.string
;
4933 sym_name
= bfd_elf_local_sym_name (ibfd
, sym
);
4935 (*_bfd_error_handler
)
4936 (_("%s: undefined sym `%s' in .opd section"),
4937 bfd_archive_filename (ibfd
),
4943 /* opd entries are always for functions defined in the
4944 current input bfd. If the symbol isn't defined in the
4945 input bfd, then we won't be using the function in this
4946 bfd; It must be defined in a linkonce section in another
4947 bfd, or is weak. It's also possible that we are
4948 discarding the function due to a linker script /DISCARD/,
4949 which we test for via the output_section. */
4950 if (sym_sec
->owner
!= ibfd
4951 || sym_sec
->output_section
== bfd_abs_section_ptr
)
4959 Elf_Internal_Rela
*write_rel
;
4960 bfd_byte
*rptr
, *wptr
;
4963 /* This seems a waste of time as input .opd sections are all
4964 zeros as generated by gcc, but I suppose there's no reason
4965 this will always be so. We might start putting something in
4966 the third word of .opd entries. */
4967 if ((sec
->flags
& SEC_IN_MEMORY
) == 0)
4969 bfd_byte
*loc
= bfd_alloc (ibfd
, sec
->_raw_size
);
4971 || !bfd_get_section_contents (ibfd
, sec
, loc
, (bfd_vma
) 0,
4974 if (local_syms
!= NULL
4975 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
4978 if (elf_section_data (sec
)->relocs
!= relstart
)
4982 sec
->contents
= loc
;
4983 sec
->flags
|= (SEC_IN_MEMORY
| SEC_HAS_CONTENTS
);
4986 elf_section_data (sec
)->relocs
= relstart
;
4988 wptr
= sec
->contents
;
4989 rptr
= sec
->contents
;
4990 write_rel
= relstart
;
4993 for (rel
= relstart
; rel
< relend
; rel
++)
4995 if (rel
->r_offset
== offset
)
4997 unsigned long r_symndx
;
4999 struct elf_link_hash_entry
*h
;
5000 Elf_Internal_Sym
*sym
;
5002 r_symndx
= ELF64_R_SYM (rel
->r_info
);
5003 get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
5006 skip
= (sym_sec
->owner
!= ibfd
5007 || sym_sec
->output_section
== bfd_abs_section_ptr
);
5010 if (h
!= NULL
&& sym_sec
->owner
== ibfd
)
5012 /* Arrange for the function descriptor sym
5014 struct ppc_link_hash_entry
*fdh
;
5015 struct ppc_link_hash_entry
*fh
;
5017 fh
= (struct ppc_link_hash_entry
*) h
;
5018 fdh
= (struct ppc_link_hash_entry
*) fh
->oh
;
5021 const char *fd_name
;
5022 struct ppc_link_hash_table
*htab
;
5024 fd_name
= h
->root
.root
.string
+ 1;
5025 htab
= ppc_hash_table (info
);
5026 fdh
= (struct ppc_link_hash_entry
*)
5027 elf_link_hash_lookup (&htab
->elf
, fd_name
,
5028 FALSE
, FALSE
, FALSE
);
5029 fdh
->is_func_descriptor
= 1;
5035 fdh
->elf
.root
.u
.def
.value
= 0;
5036 fdh
->elf
.root
.u
.def
.section
= sym_sec
;
5041 /* We'll be keeping this opd entry. */
5045 /* Redefine the function descriptor symbol
5046 to this location in the opd section.
5047 We've checked above that opd relocs are
5049 struct ppc_link_hash_entry
*fdh
;
5050 struct ppc_link_hash_entry
*fh
;
5052 fh
= (struct ppc_link_hash_entry
*) h
;
5053 fdh
= (struct ppc_link_hash_entry
*) fh
->oh
;
5056 const char *fd_name
;
5057 struct ppc_link_hash_table
*htab
;
5059 fd_name
= h
->root
.root
.string
+ 1;
5060 htab
= ppc_hash_table (info
);
5061 fdh
= (struct ppc_link_hash_entry
*)
5062 elf_link_hash_lookup (&htab
->elf
, fd_name
,
5063 FALSE
, FALSE
, FALSE
);
5064 fdh
->is_func_descriptor
= 1;
5070 fdh
->elf
.root
.u
.def
.value
= wptr
- sec
->contents
;
5074 /* Local syms are a bit tricky. We could
5075 tweak them as they can be cached, but
5076 we'd need to look through the local syms
5077 for the function descriptor sym which we
5078 don't have at the moment. So keep an
5079 array of adjustments. */
5080 adjust
[rel
->r_offset
/ 24] = wptr
- rptr
;
5084 memcpy (wptr
, rptr
, 24);
5091 /* We need to adjust any reloc offsets to point to the
5092 new opd entries. While we're at it, we may as well
5093 remove redundant relocs. */
5096 rel
->r_offset
+= wptr
- rptr
;
5097 if (write_rel
!= rel
)
5098 memcpy (write_rel
, rel
, sizeof (*rel
));
5103 sec
->_cooked_size
= wptr
- sec
->contents
;
5104 sec
->reloc_count
= write_rel
- relstart
;
5105 /* Fudge the size too, as this is used later in
5106 elf_bfd_final_link if we are emitting relocs. */
5107 elf_section_data (sec
)->rel_hdr
.sh_size
5108 = sec
->reloc_count
* elf_section_data (sec
)->rel_hdr
.sh_entsize
;
5109 BFD_ASSERT (elf_section_data (sec
)->rel_hdr2
== NULL
);
5111 else if (elf_section_data (sec
)->relocs
!= relstart
)
5114 if (local_syms
!= NULL
5115 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
5117 if (!info
->keep_memory
)
5120 symtab_hdr
->contents
= (unsigned char *) local_syms
;
5127 /* Set htab->tls_sec. */
5130 ppc64_elf_tls_setup (obfd
, info
)
5132 struct bfd_link_info
*info
;
5135 struct ppc_link_hash_table
*htab
;
5137 for (tls
= obfd
->sections
; tls
!= NULL
; tls
= tls
->next
)
5138 if ((tls
->flags
& (SEC_THREAD_LOCAL
| SEC_LOAD
))
5139 == (SEC_THREAD_LOCAL
| SEC_LOAD
))
5142 htab
= ppc_hash_table (info
);
5143 htab
->tls_sec
= tls
;
5145 if (htab
->tls_get_addr
!= NULL
)
5147 struct elf_link_hash_entry
*h
= htab
->tls_get_addr
;
5149 while (h
->root
.type
== bfd_link_hash_indirect
5150 || h
->root
.type
== bfd_link_hash_warning
)
5151 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
5153 htab
->tls_get_addr
= h
;
5159 /* Run through all the TLS relocs looking for optimization
5160 opportunities. The linker has been hacked (see ppc64elf.em) to do
5161 a preliminary section layout so that we know the TLS segment
5162 offsets. We can't optimize earlier because some optimizations need
5163 to know the tp offset, and we need to optimize before allocating
5164 dynamic relocations. */
5167 ppc64_elf_tls_optimize (obfd
, info
)
5168 bfd
*obfd ATTRIBUTE_UNUSED
;
5169 struct bfd_link_info
*info
;
5173 struct ppc_link_hash_table
*htab
;
5175 if (info
->relocateable
|| info
->shared
)
5178 htab
= ppc_hash_table (info
);
5179 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link_next
)
5181 Elf_Internal_Sym
*locsyms
= NULL
;
5183 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
5184 if (sec
->has_tls_reloc
&& !bfd_is_abs_section (sec
->output_section
))
5186 Elf_Internal_Rela
*relstart
, *rel
, *relend
;
5187 int expecting_tls_get_addr
;
5189 /* Read the relocations. */
5190 relstart
= _bfd_elf64_link_read_relocs (ibfd
, sec
, (PTR
) NULL
,
5191 (Elf_Internal_Rela
*) NULL
,
5193 if (relstart
== NULL
)
5196 expecting_tls_get_addr
= 0;
5197 relend
= relstart
+ sec
->reloc_count
;
5198 for (rel
= relstart
; rel
< relend
; rel
++)
5200 enum elf_ppc64_reloc_type r_type
;
5201 unsigned long r_symndx
;
5202 struct elf_link_hash_entry
*h
;
5203 Elf_Internal_Sym
*sym
;
5206 char tls_set
, tls_clear
, tls_type
= 0;
5208 bfd_boolean ok_tprel
, is_local
;
5210 r_symndx
= ELF64_R_SYM (rel
->r_info
);
5211 if (!get_sym_h (&h
, &sym
, &sym_sec
, &tls_mask
, &locsyms
,
5215 if (elf_section_data (sec
)->relocs
!= relstart
)
5218 && (elf_tdata (ibfd
)->symtab_hdr
.contents
5219 != (unsigned char *) locsyms
))
5226 if (h
->root
.type
!= bfd_link_hash_defined
5227 && h
->root
.type
!= bfd_link_hash_defweak
)
5229 value
= h
->root
.u
.def
.value
;
5232 value
= sym
->st_value
;
5237 || !(h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
))
5240 value
+= sym_sec
->output_offset
;
5241 value
+= sym_sec
->output_section
->vma
;
5242 value
-= htab
->tls_sec
->vma
;
5243 ok_tprel
= (value
+ TP_OFFSET
+ ((bfd_vma
) 1 << 31)
5244 < (bfd_vma
) 1 << 32);
5248 = (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
5251 case R_PPC64_GOT_TLSLD16
:
5252 case R_PPC64_GOT_TLSLD16_LO
:
5253 case R_PPC64_GOT_TLSLD16_HI
:
5254 case R_PPC64_GOT_TLSLD16_HA
:
5255 /* These relocs should never be against a symbol
5256 defined in a shared lib. Leave them alone if
5257 that turns out to be the case. */
5258 htab
->tlsld_got
.refcount
-= 1;
5265 tls_type
= TLS_TLS
| TLS_LD
;
5266 expecting_tls_get_addr
= 1;
5269 case R_PPC64_GOT_TLSGD16
:
5270 case R_PPC64_GOT_TLSGD16_LO
:
5271 case R_PPC64_GOT_TLSGD16_HI
:
5272 case R_PPC64_GOT_TLSGD16_HA
:
5278 tls_set
= TLS_TLS
| TLS_TPRELGD
;
5280 tls_type
= TLS_TLS
| TLS_GD
;
5281 expecting_tls_get_addr
= 1;
5284 case R_PPC64_GOT_TPREL16_DS
:
5285 case R_PPC64_GOT_TPREL16_LO_DS
:
5286 case R_PPC64_GOT_TPREL16_HI
:
5287 case R_PPC64_GOT_TPREL16_HA
:
5288 expecting_tls_get_addr
= 0;
5293 tls_clear
= TLS_TPREL
;
5294 tls_type
= TLS_TLS
| TLS_TPREL
;
5301 case R_PPC64_REL14_BRTAKEN
:
5302 case R_PPC64_REL14_BRNTAKEN
:
5305 && h
== htab
->tls_get_addr
)
5307 if (!expecting_tls_get_addr
5309 && ((ELF64_R_TYPE (rel
[-1].r_info
)
5311 || (ELF64_R_TYPE (rel
[-1].r_info
)
5312 == R_PPC64_TOC16_LO
)))
5314 /* Check for toc tls entries. */
5318 retval
= get_tls_mask (&toc_tls
, &locsyms
,
5322 if (toc_tls
!= NULL
)
5323 expecting_tls_get_addr
= retval
> 1;
5326 if (expecting_tls_get_addr
)
5328 struct plt_entry
*ent
;
5329 for (ent
= h
->plt
.plist
; ent
; ent
= ent
->next
)
5330 if (ent
->addend
== 0)
5332 if (ent
->plt
.refcount
> 0)
5333 ent
->plt
.refcount
-= 1;
5338 expecting_tls_get_addr
= 0;
5341 case R_PPC64_TPREL64
:
5342 expecting_tls_get_addr
= 0;
5346 tls_set
= TLS_EXPLICIT
;
5347 tls_clear
= TLS_TPREL
;
5353 case R_PPC64_DTPMOD64
:
5354 expecting_tls_get_addr
= 0;
5355 if (rel
+ 1 < relend
5357 == ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
))
5358 && rel
[1].r_offset
== rel
->r_offset
+ 8)
5362 tls_set
= TLS_EXPLICIT
| TLS_GD
;
5365 tls_set
= TLS_EXPLICIT
| TLS_GD
| TLS_TPRELGD
;
5374 tls_set
= TLS_EXPLICIT
;
5380 expecting_tls_get_addr
= 0;
5384 if ((tls_set
& TLS_EXPLICIT
) == 0)
5386 struct got_entry
*ent
;
5388 /* Adjust got entry for this reloc. */
5392 ent
= elf_local_got_ents (ibfd
)[r_symndx
];
5394 for (; ent
!= NULL
; ent
= ent
->next
)
5395 if (ent
->addend
== rel
->r_addend
5396 && ent
->tls_type
== tls_type
)
5403 /* We managed to get rid of a got entry. */
5404 if (ent
->got
.refcount
> 0)
5405 ent
->got
.refcount
-= 1;
5410 struct ppc_link_hash_entry
* eh
;
5411 struct ppc_dyn_relocs
**pp
;
5412 struct ppc_dyn_relocs
*p
;
5414 /* Adjust dynamic relocs. */
5415 eh
= (struct ppc_link_hash_entry
*) h
;
5416 for (pp
= &eh
->dyn_relocs
;
5421 /* If we got rid of a DTPMOD/DTPREL reloc
5422 pair then we'll lose one or two dyn
5424 if (tls_set
== (TLS_EXPLICIT
| TLS_GD
))
5433 *tls_mask
|= tls_set
;
5434 *tls_mask
&= ~tls_clear
;
5437 if (elf_section_data (sec
)->relocs
!= relstart
)
5442 && (elf_tdata (ibfd
)->symtab_hdr
.contents
5443 != (unsigned char *) locsyms
))
5445 if (!info
->keep_memory
)
5448 elf_tdata (ibfd
)->symtab_hdr
.contents
= (unsigned char *) locsyms
;
5454 /* This is the condition under which ppc64_elf_finish_dynamic_symbol
5455 will be called from elflink.h. If elflink.h doesn't call our
5456 finish_dynamic_symbol routine, we'll need to do something about
5457 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
5458 #define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, SHARED, H) \
5461 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5462 && ((H)->dynindx != -1 \
5463 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5465 /* Allocate space in .plt, .got and associated reloc sections for
5469 allocate_dynrelocs (h
, inf
)
5470 struct elf_link_hash_entry
*h
;
5473 struct bfd_link_info
*info
;
5474 struct ppc_link_hash_table
*htab
;
5476 struct ppc_link_hash_entry
*eh
;
5477 struct ppc_dyn_relocs
*p
;
5478 struct got_entry
*gent
;
5480 if (h
->root
.type
== bfd_link_hash_indirect
)
5483 if (h
->root
.type
== bfd_link_hash_warning
)
5484 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
5486 info
= (struct bfd_link_info
*) inf
;
5487 htab
= ppc_hash_table (info
);
5489 if (htab
->elf
.dynamic_sections_created
5491 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info
->shared
, h
))
5493 struct plt_entry
*pent
;
5494 bfd_boolean doneone
= FALSE
;
5495 for (pent
= h
->plt
.plist
; pent
!= NULL
; pent
= pent
->next
)
5496 if (pent
->plt
.refcount
> 0)
5498 BFD_ASSERT (((struct ppc_link_hash_entry
*) h
)->is_func_descriptor
);
5500 /* If this is the first .plt entry, make room for the special
5503 if (s
->_raw_size
== 0)
5504 s
->_raw_size
+= PLT_INITIAL_ENTRY_SIZE
;
5506 pent
->plt
.offset
= s
->_raw_size
;
5508 /* Make room for this entry. */
5509 s
->_raw_size
+= PLT_ENTRY_SIZE
;
5511 /* Make room for the .glink code. */
5513 if (s
->_raw_size
== 0)
5514 s
->_raw_size
+= GLINK_CALL_STUB_SIZE
;
5515 /* We need bigger stubs past index 32767. */
5516 if (s
->_raw_size
>= GLINK_CALL_STUB_SIZE
+ 32768*2*4)
5518 s
->_raw_size
+= 2*4;
5520 /* We also need to make an entry in the .rela.plt section. */
5522 s
->_raw_size
+= sizeof (Elf64_External_Rela
);
5526 pent
->plt
.offset
= (bfd_vma
) -1;
5529 h
->plt
.plist
= NULL
;
5530 h
->elf_link_hash_flags
&= ~ELF_LINK_HASH_NEEDS_PLT
;
5535 h
->plt
.plist
= NULL
;
5536 h
->elf_link_hash_flags
&= ~ELF_LINK_HASH_NEEDS_PLT
;
5539 eh
= (struct ppc_link_hash_entry
*) h
;
5540 /* Run through the TLS GD got entries first if we're changing them
5542 if ((eh
->tls_mask
& TLS_TPRELGD
) != 0)
5543 for (gent
= h
->got
.glist
; gent
!= NULL
; gent
= gent
->next
)
5544 if (gent
->got
.refcount
> 0
5545 && (gent
->tls_type
& TLS_GD
) != 0)
5547 /* This was a GD entry that has been converted to TPREL. If
5548 there happens to be a TPREL entry we can use that one. */
5549 struct got_entry
*ent
;
5550 for (ent
= h
->got
.glist
; ent
!= NULL
; ent
= ent
->next
)
5551 if (ent
->got
.refcount
> 0
5552 && (ent
->tls_type
& TLS_TPREL
) != 0
5553 && ent
->addend
== gent
->addend
)
5555 gent
->got
.refcount
= 0;
5559 /* If not, then we'll be using our own TPREL entry. */
5560 if (gent
->got
.refcount
!= 0)
5561 gent
->tls_type
= TLS_TLS
| TLS_TPREL
;
5564 for (gent
= h
->got
.glist
; gent
!= NULL
; gent
= gent
->next
)
5565 if (gent
->got
.refcount
> 0)
5569 /* Make sure this symbol is output as a dynamic symbol.
5570 Undefined weak syms won't yet be marked as dynamic,
5571 nor will all TLS symbols. */
5572 if (h
->dynindx
== -1
5573 && (h
->elf_link_hash_flags
& ELF_LINK_FORCED_LOCAL
) == 0)
5575 if (! bfd_elf64_link_record_dynamic_symbol (info
, h
))
5579 if ((gent
->tls_type
& TLS_LD
) != 0
5580 && !(h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
))
5582 gent
->got
.offset
= htab
->tlsld_got
.offset
;
5587 gent
->got
.offset
= s
->_raw_size
;
5589 += (gent
->tls_type
& eh
->tls_mask
& (TLS_GD
| TLS_LD
)) ? 16 : 8;
5590 dyn
= htab
->elf
.dynamic_sections_created
;
5592 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, 0, h
))
5593 htab
->srelgot
->_raw_size
5594 += (gent
->tls_type
& eh
->tls_mask
& TLS_GD
5595 ? 2 * sizeof (Elf64_External_Rela
)
5596 : sizeof (Elf64_External_Rela
));
5599 gent
->got
.offset
= (bfd_vma
) -1;
5601 if (eh
->dyn_relocs
== NULL
)
5604 /* In the shared -Bsymbolic case, discard space allocated for
5605 dynamic pc-relative relocs against symbols which turn out to be
5606 defined in regular objects. For the normal shared case, discard
5607 space for relocs that have become local due to symbol visibility
5612 if ((h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_REGULAR
) != 0
5613 && ((h
->elf_link_hash_flags
& ELF_LINK_FORCED_LOCAL
) != 0
5616 struct ppc_dyn_relocs
**pp
;
5618 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; )
5620 p
->count
-= p
->pc_count
;
5629 else if (ELIMINATE_COPY_RELOCS
)
5631 /* For the non-shared case, discard space for relocs against
5632 symbols which turn out to need copy relocs or are not
5635 if ((h
->elf_link_hash_flags
& ELF_LINK_NON_GOT_REF
) == 0
5636 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
) != 0
5637 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_REGULAR
) == 0)
5639 /* Make sure this symbol is output as a dynamic symbol.
5640 Undefined weak syms won't yet be marked as dynamic. */
5641 if (h
->dynindx
== -1
5642 && (h
->elf_link_hash_flags
& ELF_LINK_FORCED_LOCAL
) == 0)
5644 if (! bfd_elf64_link_record_dynamic_symbol (info
, h
))
5648 /* If that succeeded, we know we'll be keeping all the
5650 if (h
->dynindx
!= -1)
5654 eh
->dyn_relocs
= NULL
;
5659 /* Finally, allocate space. */
5660 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
5662 asection
*sreloc
= elf_section_data (p
->sec
)->sreloc
;
5663 sreloc
->_raw_size
+= p
->count
* sizeof (Elf64_External_Rela
);
5669 /* Find any dynamic relocs that apply to read-only sections. */
5672 readonly_dynrelocs (h
, inf
)
5673 struct elf_link_hash_entry
*h
;
5676 struct ppc_link_hash_entry
*eh
;
5677 struct ppc_dyn_relocs
*p
;
5679 if (h
->root
.type
== bfd_link_hash_warning
)
5680 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
5682 eh
= (struct ppc_link_hash_entry
*) h
;
5683 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
5685 asection
*s
= p
->sec
->output_section
;
5687 if (s
!= NULL
&& (s
->flags
& SEC_READONLY
) != 0)
5689 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
5691 info
->flags
|= DF_TEXTREL
;
5693 /* Not an error, just cut short the traversal. */
5700 /* Set the sizes of the dynamic sections. */
5703 ppc64_elf_size_dynamic_sections (output_bfd
, info
)
5704 bfd
*output_bfd ATTRIBUTE_UNUSED
;
5705 struct bfd_link_info
*info
;
5707 struct ppc_link_hash_table
*htab
;
5713 htab
= ppc_hash_table (info
);
5714 dynobj
= htab
->elf
.dynobj
;
5718 if (htab
->elf
.dynamic_sections_created
)
5720 /* Set the contents of the .interp section to the interpreter. */
5723 s
= bfd_get_section_by_name (dynobj
, ".interp");
5726 s
->_raw_size
= sizeof ELF_DYNAMIC_INTERPRETER
;
5727 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
5731 if (htab
->tlsld_got
.refcount
> 0)
5733 htab
->tlsld_got
.offset
= htab
->sgot
->_raw_size
;
5734 htab
->sgot
->_raw_size
+= 16;
5736 htab
->srelgot
->_raw_size
+= sizeof (Elf64_External_Rela
);
5739 htab
->tlsld_got
.offset
= (bfd_vma
) -1;
5741 /* Set up .got offsets for local syms, and space for local dynamic
5743 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link_next
)
5745 struct got_entry
**lgot_ents
;
5746 struct got_entry
**end_lgot_ents
;
5748 bfd_size_type locsymcount
;
5749 Elf_Internal_Shdr
*symtab_hdr
;
5752 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
)
5755 for (s
= ibfd
->sections
; s
!= NULL
; s
= s
->next
)
5757 struct ppc_dyn_relocs
*p
;
5759 for (p
= *((struct ppc_dyn_relocs
**)
5760 &elf_section_data (s
)->local_dynrel
);
5764 if (!bfd_is_abs_section (p
->sec
)
5765 && bfd_is_abs_section (p
->sec
->output_section
))
5767 /* Input section has been discarded, either because
5768 it is a copy of a linkonce section or due to
5769 linker script /DISCARD/, so we'll be discarding
5772 else if (p
->count
!= 0)
5774 srel
= elf_section_data (p
->sec
)->sreloc
;
5775 srel
->_raw_size
+= p
->count
* sizeof (Elf64_External_Rela
);
5776 if ((p
->sec
->output_section
->flags
& SEC_READONLY
) != 0)
5777 info
->flags
|= DF_TEXTREL
;
5782 lgot_ents
= elf_local_got_ents (ibfd
);
5786 symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
5787 locsymcount
= symtab_hdr
->sh_info
;
5788 end_lgot_ents
= lgot_ents
+ locsymcount
;
5789 lgot_masks
= (char *) end_lgot_ents
;
5791 srel
= htab
->srelgot
;
5792 for (; lgot_ents
< end_lgot_ents
; ++lgot_ents
, ++lgot_masks
)
5794 struct got_entry
*ent
;
5796 for (ent
= *lgot_ents
; ent
!= NULL
; ent
= ent
->next
)
5797 if (ent
->got
.refcount
> 0)
5799 if ((ent
->tls_type
& *lgot_masks
& TLS_LD
) != 0)
5801 if (htab
->tlsld_got
.offset
== (bfd_vma
) -1)
5803 htab
->tlsld_got
.offset
= s
->_raw_size
;
5806 srel
->_raw_size
+= sizeof (Elf64_External_Rela
);
5808 ent
->got
.offset
= htab
->tlsld_got
.offset
;
5812 ent
->got
.offset
= s
->_raw_size
;
5813 if ((ent
->tls_type
& *lgot_masks
& TLS_GD
) != 0)
5817 srel
->_raw_size
+= 2 * sizeof (Elf64_External_Rela
);
5823 srel
->_raw_size
+= sizeof (Elf64_External_Rela
);
5828 ent
->got
.offset
= (bfd_vma
) -1;
5832 /* Allocate global sym .plt and .got entries, and space for global
5833 sym dynamic relocs. */
5834 elf_link_hash_traverse (&htab
->elf
, allocate_dynrelocs
, (PTR
) info
);
5836 /* We now have determined the sizes of the various dynamic sections.
5837 Allocate memory for them. */
5839 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
5841 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
5844 /* Reset _cooked_size since prelim layout will set it wrongly,
5845 and a non-zero _cooked_size sticks. */
5846 s
->_cooked_size
= 0;
5848 if (s
== htab
->sbrlt
|| s
== htab
->srelbrlt
)
5849 /* These haven't been allocated yet; don't strip. */
5851 else if (s
== htab
->splt
5853 || s
== htab
->sglink
)
5855 /* Strip this section if we don't need it; see the
5858 else if (strncmp (bfd_get_section_name (dynobj
, s
), ".rela", 5) == 0)
5860 if (s
->_raw_size
== 0)
5862 /* If we don't need this section, strip it from the
5863 output file. This is mostly to handle .rela.bss and
5864 .rela.plt. We must create both sections in
5865 create_dynamic_sections, because they must be created
5866 before the linker maps input sections to output
5867 sections. The linker does that before
5868 adjust_dynamic_symbol is called, and it is that
5869 function which decides whether anything needs to go
5870 into these sections. */
5874 if (s
!= htab
->srelplt
)
5877 /* We use the reloc_count field as a counter if we need
5878 to copy relocs into the output file. */
5884 /* It's not one of our sections, so don't allocate space. */
5888 if (s
->_raw_size
== 0)
5890 _bfd_strip_section_from_output (info
, s
);
5894 /* .plt is in the bss section. We don't initialise it. */
5895 if ((s
->flags
& SEC_LOAD
) == 0)
5898 /* Allocate memory for the section contents. We use bfd_zalloc
5899 here in case unused entries are not reclaimed before the
5900 section's contents are written out. This should not happen,
5901 but this way if it does we get a R_PPC64_NONE reloc in .rela
5902 sections instead of garbage.
5903 We also rely on the section contents being zero when writing
5905 s
->contents
= (bfd_byte
*) bfd_zalloc (dynobj
, s
->_raw_size
);
5906 if (s
->contents
== NULL
)
5910 if (htab
->elf
.dynamic_sections_created
)
5912 /* Add some entries to the .dynamic section. We fill in the
5913 values later, in ppc64_elf_finish_dynamic_sections, but we
5914 must add the entries now so that we get the correct size for
5915 the .dynamic section. The DT_DEBUG entry is filled in by the
5916 dynamic linker and used by the debugger. */
5917 #define add_dynamic_entry(TAG, VAL) \
5918 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5922 if (!add_dynamic_entry (DT_DEBUG
, 0))
5926 if (htab
->splt
!= NULL
&& htab
->splt
->_raw_size
!= 0)
5928 if (!add_dynamic_entry (DT_PLTGOT
, 0)
5929 || !add_dynamic_entry (DT_PLTRELSZ
, 0)
5930 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
5931 || !add_dynamic_entry (DT_JMPREL
, 0)
5932 || !add_dynamic_entry (DT_PPC64_GLINK
, 0))
5938 if (!add_dynamic_entry (DT_PPC64_OPD
, 0)
5939 || !add_dynamic_entry (DT_PPC64_OPDSZ
, 0))
5945 if (!add_dynamic_entry (DT_RELA
, 0)
5946 || !add_dynamic_entry (DT_RELASZ
, 0)
5947 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf64_External_Rela
)))
5950 /* If any dynamic relocs apply to a read-only section,
5951 then we need a DT_TEXTREL entry. */
5952 if ((info
->flags
& DF_TEXTREL
) == 0)
5953 elf_link_hash_traverse (&htab
->elf
, readonly_dynrelocs
,
5956 if ((info
->flags
& DF_TEXTREL
) != 0)
5958 if (!add_dynamic_entry (DT_TEXTREL
, 0))
5963 #undef add_dynamic_entry
5968 /* Determine the type of stub needed, if any, for a call. */
5970 static INLINE
enum ppc_stub_type
5971 ppc_type_of_stub (input_sec
, rel
, hash
, destination
)
5972 asection
*input_sec
;
5973 const Elf_Internal_Rela
*rel
;
5974 struct ppc_link_hash_entry
**hash
;
5975 bfd_vma destination
;
5977 struct ppc_link_hash_entry
*h
= *hash
;
5979 bfd_vma branch_offset
;
5980 bfd_vma max_branch_offset
;
5981 unsigned int r_type
;
5986 && h
->oh
->dynindx
!= -1)
5988 struct plt_entry
*ent
;
5989 for (ent
= h
->oh
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
5990 if (ent
->addend
== rel
->r_addend
5991 && ent
->plt
.offset
!= (bfd_vma
) -1)
5993 *hash
= (struct ppc_link_hash_entry
*) h
->oh
;
5994 return ppc_stub_plt_call
;
5998 if (h
->elf
.root
.type
== bfd_link_hash_undefweak
5999 || h
->elf
.root
.type
== bfd_link_hash_undefined
)
6000 return ppc_stub_none
;
6003 /* Determine where the call point is. */
6004 location
= (input_sec
->output_offset
6005 + input_sec
->output_section
->vma
6008 branch_offset
= destination
- location
;
6009 r_type
= ELF64_R_TYPE (rel
->r_info
);
6011 /* Determine if a long branch stub is needed. */
6012 max_branch_offset
= 1 << 25;
6013 if (r_type
!= (unsigned int) R_PPC64_REL24
)
6014 max_branch_offset
= 1 << 15;
6016 if (branch_offset
+ max_branch_offset
>= 2 * max_branch_offset
)
6017 /* We need a stub. Figure out whether a long_branch or plt_branch
6019 return ppc_stub_long_branch
;
6021 return ppc_stub_none
;
6024 /* Build a .plt call stub. */
6027 build_plt_stub (obfd
, p
, offset
, glink
)
6033 #define PPC_LO(v) ((v) & 0xffff)
6034 #define PPC_HI(v) (((v) >> 16) & 0xffff)
6035 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
6038 bfd_put_32 (obfd
, LD_R2_40R1
, p
), p
+= 4;
6039 bfd_put_32 (obfd
, ADDIS_R12_R2
| PPC_HA (offset
), p
), p
+= 4;
6041 bfd_put_32 (obfd
, STD_R2_40R1
, p
), p
+= 4;
6042 bfd_put_32 (obfd
, LD_R11_0R12
| PPC_LO (offset
), p
), p
+= 4;
6043 if (PPC_HA (offset
+ 8) != PPC_HA (offset
))
6044 bfd_put_32 (obfd
, ADDIS_R12_R12_1
, p
), p
+= 4;
6046 bfd_put_32 (obfd
, LD_R2_0R12
| PPC_LO (offset
), p
), p
+= 4;
6047 if (PPC_HA (offset
+ 8) != PPC_HA (offset
))
6048 bfd_put_32 (obfd
, ADDIS_R12_R12_1
, p
), p
+= 4;
6050 bfd_put_32 (obfd
, MTCTR_R11
, p
), p
+= 4;
6051 bfd_put_32 (obfd
, LD_R11_0R12
| PPC_LO (offset
), p
), p
+= 4;
6052 bfd_put_32 (obfd
, BCTR
, p
), p
+= 4;
6057 ppc_build_one_stub (gen_entry
, in_arg
)
6058 struct bfd_hash_entry
*gen_entry
;
6061 struct ppc_stub_hash_entry
*stub_entry
;
6062 struct ppc_branch_hash_entry
*br_entry
;
6063 struct bfd_link_info
*info
;
6064 struct ppc_link_hash_table
*htab
;
6070 struct plt_entry
*ent
;
6074 /* Massage our args to the form they really have. */
6075 stub_entry
= (struct ppc_stub_hash_entry
*) gen_entry
;
6076 info
= (struct bfd_link_info
*) in_arg
;
6078 htab
= ppc_hash_table (info
);
6079 stub_sec
= stub_entry
->stub_sec
;
6081 /* Make a note of the offset within the stubs for this entry. */
6082 stub_entry
->stub_offset
= stub_sec
->_cooked_size
;
6083 loc
= stub_sec
->contents
+ stub_entry
->stub_offset
;
6085 stub_bfd
= stub_sec
->owner
;
6087 switch (stub_entry
->stub_type
)
6089 case ppc_stub_long_branch
:
6090 /* Branches are relative. This is where we are going to. */
6091 off
= (stub_entry
->target_value
6092 + stub_entry
->target_section
->output_offset
6093 + stub_entry
->target_section
->output_section
->vma
);
6095 /* And this is where we are coming from. */
6096 off
-= (stub_entry
->stub_offset
6097 + stub_sec
->output_offset
6098 + stub_sec
->output_section
->vma
);
6100 BFD_ASSERT (off
+ (1 << 25) < (bfd_vma
) (1 << 26));
6102 bfd_put_32 (stub_bfd
, (bfd_vma
) B_DOT
| (off
& 0x3fffffc), loc
);
6106 case ppc_stub_plt_branch
:
6107 br_entry
= ppc_branch_hash_lookup (&htab
->branch_hash_table
,
6108 stub_entry
->root
.string
+ 9,
6110 if (br_entry
== NULL
)
6112 (*_bfd_error_handler
) (_("can't find branch stub `%s'"),
6113 stub_entry
->root
.string
+ 9);
6114 htab
->stub_error
= TRUE
;
6118 off
= (stub_entry
->target_value
6119 + stub_entry
->target_section
->output_offset
6120 + stub_entry
->target_section
->output_section
->vma
);
6122 bfd_put_64 (htab
->sbrlt
->owner
, off
,
6123 htab
->sbrlt
->contents
+ br_entry
->offset
);
6127 /* Create a reloc for the branch lookup table entry. */
6128 Elf_Internal_Rela rela
;
6131 rela
.r_offset
= (br_entry
->offset
6132 + htab
->sbrlt
->output_offset
6133 + htab
->sbrlt
->output_section
->vma
);
6134 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
6135 rela
.r_addend
= off
;
6137 loc
= htab
->srelbrlt
->contents
;
6138 loc
+= htab
->srelbrlt
->reloc_count
++ * sizeof (Elf64_External_Rela
);
6139 bfd_elf64_swap_reloca_out (htab
->srelbrlt
->owner
, &rela
, loc
);
6142 off
= (br_entry
->offset
6143 + htab
->sbrlt
->output_offset
6144 + htab
->sbrlt
->output_section
->vma
6145 - elf_gp (htab
->sbrlt
->output_section
->owner
)
6148 if (off
+ 0x80000000 > 0xffffffff || (off
& 7) != 0)
6150 (*_bfd_error_handler
)
6151 (_("linkage table error against `%s'"),
6152 stub_entry
->root
.string
);
6153 bfd_set_error (bfd_error_bad_value
);
6154 htab
->stub_error
= TRUE
;
6159 bfd_put_32 (stub_bfd
, (bfd_vma
) ADDIS_R12_R2
| PPC_HA (indx
), loc
);
6160 bfd_put_32 (stub_bfd
, (bfd_vma
) LD_R11_0R12
| PPC_LO (indx
), loc
+ 4);
6161 bfd_put_32 (stub_bfd
, (bfd_vma
) MTCTR_R11
, loc
+ 8);
6162 bfd_put_32 (stub_bfd
, (bfd_vma
) BCTR
, loc
+ 12);
6166 case ppc_stub_plt_call
:
6167 /* Do the best we can for shared libraries built without
6168 exporting ".foo" for each "foo". This can happen when symbol
6169 versioning scripts strip all bar a subset of symbols. */
6170 if (stub_entry
->h
->oh
->root
.type
!= bfd_link_hash_defined
6171 && stub_entry
->h
->oh
->root
.type
!= bfd_link_hash_defweak
)
6173 /* Point the symbol at the stub. There may be multiple stubs,
6174 we don't really care; The main thing is to make this sym
6175 defined somewhere. */
6176 stub_entry
->h
->oh
->root
.type
= bfd_link_hash_defined
;
6177 stub_entry
->h
->oh
->root
.u
.def
.section
= stub_entry
->stub_sec
;
6178 stub_entry
->h
->oh
->root
.u
.def
.value
= stub_entry
->stub_offset
;
6181 /* Now build the stub. */
6183 for (ent
= stub_entry
->h
->elf
.plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
6184 if (ent
->addend
== stub_entry
->addend
)
6186 off
= ent
->plt
.offset
;
6189 if (off
>= (bfd_vma
) -2)
6192 off
&= ~ (bfd_vma
) 1;
6193 off
+= (htab
->splt
->output_offset
6194 + htab
->splt
->output_section
->vma
6195 - elf_gp (htab
->splt
->output_section
->owner
)
6198 if (off
+ 0x80000000 > 0xffffffff || (off
& 7) != 0)
6200 (*_bfd_error_handler
)
6201 (_("linkage table error against `%s'"),
6202 stub_entry
->h
->elf
.root
.root
.string
);
6203 bfd_set_error (bfd_error_bad_value
);
6204 htab
->stub_error
= TRUE
;
6208 p
= build_plt_stub (stub_bfd
, loc
, (int) off
, 0);
6217 stub_sec
->_cooked_size
+= size
;
6221 /* As above, but don't actually build the stub. Just bump offset so
6222 we know stub section sizes, and select plt_branch stubs where
6223 long_branch stubs won't do. */
6226 ppc_size_one_stub (gen_entry
, in_arg
)
6227 struct bfd_hash_entry
*gen_entry
;
6230 struct ppc_stub_hash_entry
*stub_entry
;
6231 struct ppc_link_hash_table
*htab
;
6235 /* Massage our args to the form they really have. */
6236 stub_entry
= (struct ppc_stub_hash_entry
*) gen_entry
;
6237 htab
= (struct ppc_link_hash_table
*) in_arg
;
6239 if (stub_entry
->stub_type
== ppc_stub_plt_call
)
6241 struct plt_entry
*ent
;
6243 for (ent
= stub_entry
->h
->elf
.plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
6244 if (ent
->addend
== stub_entry
->addend
)
6246 off
= ent
->plt
.offset
& ~(bfd_vma
) 1;
6249 if (off
>= (bfd_vma
) -2)
6251 off
+= (htab
->splt
->output_offset
6252 + htab
->splt
->output_section
->vma
6253 - elf_gp (htab
->splt
->output_section
->owner
)
6257 if (PPC_HA ((int) off
+ 16) != PPC_HA ((int) off
))
6262 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6263 stub_entry
->stub_type
= ppc_stub_long_branch
;
6266 off
= (stub_entry
->target_value
6267 + stub_entry
->target_section
->output_offset
6268 + stub_entry
->target_section
->output_section
->vma
);
6269 off
-= (stub_entry
->stub_sec
->_raw_size
6270 + stub_entry
->stub_sec
->output_offset
6271 + stub_entry
->stub_sec
->output_section
->vma
);
6273 if (off
+ (1 << 25) >= (bfd_vma
) (1 << 26))
6275 struct ppc_branch_hash_entry
*br_entry
;
6277 br_entry
= ppc_branch_hash_lookup (&htab
->branch_hash_table
,
6278 stub_entry
->root
.string
+ 9,
6280 if (br_entry
== NULL
)
6282 (*_bfd_error_handler
) (_("can't build branch stub `%s'"),
6283 stub_entry
->root
.string
+ 9);
6284 htab
->stub_error
= TRUE
;
6288 if (br_entry
->iter
!= htab
->stub_iteration
)
6290 br_entry
->iter
= htab
->stub_iteration
;
6291 br_entry
->offset
= htab
->sbrlt
->_raw_size
;
6292 htab
->sbrlt
->_raw_size
+= 8;
6294 stub_entry
->stub_type
= ppc_stub_plt_branch
;
6299 stub_entry
->stub_sec
->_raw_size
+= size
;
6303 /* Set up various things so that we can make a list of input sections
6304 for each output section included in the link. Returns -1 on error,
6305 0 when no stubs will be needed, and 1 on success. */
6308 ppc64_elf_setup_section_lists (output_bfd
, info
)
6310 struct bfd_link_info
*info
;
6313 int top_id
, top_index
;
6315 asection
**input_list
, **list
;
6317 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6319 if (htab
->elf
.root
.creator
->flavour
!= bfd_target_elf_flavour
6320 || htab
->sbrlt
== NULL
)
6323 /* Find the top input section id. */
6324 for (input_bfd
= info
->input_bfds
, top_id
= 0;
6326 input_bfd
= input_bfd
->link_next
)
6328 for (section
= input_bfd
->sections
;
6330 section
= section
->next
)
6332 if (top_id
< section
->id
)
6333 top_id
= section
->id
;
6337 amt
= sizeof (struct map_stub
) * (top_id
+ 1);
6338 htab
->stub_group
= (struct map_stub
*) bfd_zmalloc (amt
);
6339 if (htab
->stub_group
== NULL
)
6342 /* We can't use output_bfd->section_count here to find the top output
6343 section index as some sections may have been removed, and
6344 _bfd_strip_section_from_output doesn't renumber the indices. */
6345 for (section
= output_bfd
->sections
, top_index
= 0;
6347 section
= section
->next
)
6349 if (top_index
< section
->index
)
6350 top_index
= section
->index
;
6353 htab
->top_index
= top_index
;
6354 amt
= sizeof (asection
*) * (top_index
+ 1);
6355 input_list
= (asection
**) bfd_malloc (amt
);
6356 htab
->input_list
= input_list
;
6357 if (input_list
== NULL
)
6360 /* For sections we aren't interested in, mark their entries with a
6361 value we can check later. */
6362 list
= input_list
+ top_index
;
6364 *list
= bfd_abs_section_ptr
;
6365 while (list
-- != input_list
);
6367 for (section
= output_bfd
->sections
;
6369 section
= section
->next
)
6371 if ((section
->flags
& SEC_CODE
) != 0)
6372 input_list
[section
->index
] = NULL
;
6378 /* The linker repeatedly calls this function for each input section,
6379 in the order that input sections are linked into output sections.
6380 Build lists of input sections to determine groupings between which
6381 we may insert linker stubs. */
6384 ppc64_elf_next_input_section (info
, isec
)
6385 struct bfd_link_info
*info
;
6388 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6390 if (isec
->output_section
->index
<= htab
->top_index
)
6392 asection
**list
= htab
->input_list
+ isec
->output_section
->index
;
6393 if (*list
!= bfd_abs_section_ptr
)
6395 /* Steal the link_sec pointer for our list. */
6396 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6397 /* This happens to make the list in reverse order,
6398 which is what we want. */
6399 PREV_SEC (isec
) = *list
;
6405 /* See whether we can group stub sections together. Grouping stub
6406 sections may result in fewer stubs. More importantly, we need to
6407 put all .init* and .fini* stubs at the beginning of the .init or
6408 .fini output sections respectively, because glibc splits the
6409 _init and _fini functions into multiple parts. Putting a stub in
6410 the middle of a function is not a good idea. */
6413 group_sections (htab
, stub_group_size
, stubs_always_before_branch
)
6414 struct ppc_link_hash_table
*htab
;
6415 bfd_size_type stub_group_size
;
6416 bfd_boolean stubs_always_before_branch
;
6418 asection
**list
= htab
->input_list
+ htab
->top_index
;
6421 asection
*tail
= *list
;
6422 if (tail
== bfd_abs_section_ptr
)
6424 while (tail
!= NULL
)
6428 bfd_size_type total
;
6429 bfd_boolean big_sec
;
6432 if (tail
->_cooked_size
)
6433 total
= tail
->_cooked_size
;
6435 total
= tail
->_raw_size
;
6436 big_sec
= total
>= stub_group_size
;
6438 while ((prev
= PREV_SEC (curr
)) != NULL
6439 && ((total
+= curr
->output_offset
- prev
->output_offset
)
6443 /* OK, the size from the start of CURR to the end is less
6444 than stub_group_size and thus can be handled by one stub
6445 section. (or the tail section is itself larger than
6446 stub_group_size, in which case we may be toast.) We
6447 should really be keeping track of the total size of stubs
6448 added here, as stubs contribute to the final output
6449 section size. That's a little tricky, and this way will
6450 only break if stubs added make the total size more than
6451 2^25, ie. for the default stub_group_size, if stubs total
6452 more than 2097152 bytes, or nearly 75000 plt call stubs. */
6455 prev
= PREV_SEC (tail
);
6456 /* Set up this stub group. */
6457 htab
->stub_group
[tail
->id
].link_sec
= curr
;
6459 while (tail
!= curr
&& (tail
= prev
) != NULL
);
6461 /* But wait, there's more! Input sections up to stub_group_size
6462 bytes before the stub section can be handled by it too.
6463 Don't do this if we have a really large section after the
6464 stubs, as adding more stubs increases the chance that
6465 branches may not reach into the stub section. */
6466 if (!stubs_always_before_branch
&& !big_sec
)
6470 && ((total
+= tail
->output_offset
- prev
->output_offset
)
6474 prev
= PREV_SEC (tail
);
6475 htab
->stub_group
[tail
->id
].link_sec
= curr
;
6481 while (list
-- != htab
->input_list
);
6482 free (htab
->input_list
);
6486 /* Determine and set the size of the stub section for a final link.
6488 The basic idea here is to examine all the relocations looking for
6489 PC-relative calls to a target that is unreachable with a "bl"
6493 ppc64_elf_size_stubs (output_bfd
, stub_bfd
, info
, group_size
,
6494 add_stub_section
, layout_sections_again
)
6497 struct bfd_link_info
*info
;
6498 bfd_signed_vma group_size
;
6499 asection
* (*add_stub_section
) PARAMS ((const char *, asection
*));
6500 void (*layout_sections_again
) PARAMS ((void));
6502 bfd_size_type stub_group_size
;
6503 bfd_boolean stubs_always_before_branch
;
6504 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6506 /* Stash our params away. */
6507 htab
->stub_bfd
= stub_bfd
;
6508 htab
->add_stub_section
= add_stub_section
;
6509 htab
->layout_sections_again
= layout_sections_again
;
6510 stubs_always_before_branch
= group_size
< 0;
6512 stub_group_size
= -group_size
;
6514 stub_group_size
= group_size
;
6515 if (stub_group_size
== 1)
6517 /* Default values. */
6518 if (stubs_always_before_branch
)
6520 stub_group_size
= 0x1e00000;
6521 if (htab
->has_14bit_branch
)
6522 stub_group_size
= 0x7800;
6526 stub_group_size
= 0x1c00000;
6527 if (htab
->has_14bit_branch
)
6528 stub_group_size
= 0x7000;
6532 group_sections (htab
, stub_group_size
, stubs_always_before_branch
);
6537 unsigned int bfd_indx
;
6539 bfd_boolean stub_changed
;
6541 htab
->stub_iteration
+= 1;
6542 stub_changed
= FALSE
;
6544 for (input_bfd
= info
->input_bfds
, bfd_indx
= 0;
6546 input_bfd
= input_bfd
->link_next
, bfd_indx
++)
6548 Elf_Internal_Shdr
*symtab_hdr
;
6550 Elf_Internal_Sym
*local_syms
= NULL
;
6552 /* We'll need the symbol table in a second. */
6553 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
6554 if (symtab_hdr
->sh_info
== 0)
6557 /* Walk over each section attached to the input bfd. */
6558 for (section
= input_bfd
->sections
;
6560 section
= section
->next
)
6562 Elf_Internal_Rela
*internal_relocs
, *irelaend
, *irela
;
6564 /* If there aren't any relocs, then there's nothing more
6566 if ((section
->flags
& SEC_RELOC
) == 0
6567 || section
->reloc_count
== 0)
6570 /* If this section is a link-once section that will be
6571 discarded, then don't create any stubs. */
6572 if (section
->output_section
== NULL
6573 || section
->output_section
->owner
!= output_bfd
)
6576 /* Get the relocs. */
6578 = _bfd_elf64_link_read_relocs (input_bfd
, section
, NULL
,
6579 (Elf_Internal_Rela
*) NULL
,
6581 if (internal_relocs
== NULL
)
6582 goto error_ret_free_local
;
6584 /* Now examine each relocation. */
6585 irela
= internal_relocs
;
6586 irelaend
= irela
+ section
->reloc_count
;
6587 for (; irela
< irelaend
; irela
++)
6589 unsigned int r_type
, r_indx
;
6590 enum ppc_stub_type stub_type
;
6591 struct ppc_stub_hash_entry
*stub_entry
;
6594 bfd_vma destination
;
6595 struct ppc_link_hash_entry
*hash
;
6596 struct elf_link_hash_entry
*h
;
6597 Elf_Internal_Sym
*sym
;
6599 const asection
*id_sec
;
6601 r_type
= ELF64_R_TYPE (irela
->r_info
);
6602 r_indx
= ELF64_R_SYM (irela
->r_info
);
6604 if (r_type
>= (unsigned int) R_PPC64_max
)
6606 bfd_set_error (bfd_error_bad_value
);
6607 goto error_ret_free_internal
;
6610 /* Only look for stubs on branch instructions. */
6611 if (r_type
!= (unsigned int) R_PPC64_REL24
6612 && r_type
!= (unsigned int) R_PPC64_REL14
6613 && r_type
!= (unsigned int) R_PPC64_REL14_BRTAKEN
6614 && r_type
!= (unsigned int) R_PPC64_REL14_BRNTAKEN
)
6617 /* Now determine the call target, its name, value,
6620 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
6622 goto error_ret_free_internal
;
6623 hash
= (struct ppc_link_hash_entry
*) h
;
6627 /* It's a local symbol. */
6628 sym_value
= sym
->st_value
;
6629 destination
= (sym_value
+ irela
->r_addend
6630 + sym_sec
->output_offset
6631 + sym_sec
->output_section
->vma
);
6635 /* It's an external symbol. */
6637 if (hash
->elf
.root
.type
== bfd_link_hash_defined
6638 || hash
->elf
.root
.type
== bfd_link_hash_defweak
)
6640 sym_value
= hash
->elf
.root
.u
.def
.value
;
6641 if (sym_sec
->output_section
!= NULL
)
6642 destination
= (sym_value
+ irela
->r_addend
6643 + sym_sec
->output_offset
6644 + sym_sec
->output_section
->vma
);
6646 else if (hash
->elf
.root
.type
== bfd_link_hash_undefweak
)
6648 else if (hash
->elf
.root
.type
== bfd_link_hash_undefined
)
6652 bfd_set_error (bfd_error_bad_value
);
6653 goto error_ret_free_internal
;
6657 /* Determine what (if any) linker stub is needed. */
6658 stub_type
= ppc_type_of_stub (section
, irela
, &hash
,
6660 if (stub_type
== ppc_stub_none
)
6663 /* __tls_get_addr calls might be eliminated. */
6664 if (stub_type
!= ppc_stub_plt_call
6666 && &hash
->elf
== htab
->tls_get_addr
6667 && section
->has_tls_reloc
6668 && irela
!= internal_relocs
)
6673 if (!get_tls_mask (&tls_mask
, &local_syms
,
6674 irela
- 1, input_bfd
))
6675 goto error_ret_free_internal
;
6680 /* Support for grouping stub sections. */
6681 id_sec
= htab
->stub_group
[section
->id
].link_sec
;
6683 /* Get the name of this stub. */
6684 stub_name
= ppc_stub_name (id_sec
, sym_sec
, hash
, irela
);
6686 goto error_ret_free_internal
;
6688 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
,
6689 stub_name
, FALSE
, FALSE
);
6690 if (stub_entry
!= NULL
)
6692 /* The proper stub has already been created. */
6697 stub_entry
= ppc_add_stub (stub_name
, section
, htab
);
6698 if (stub_entry
== NULL
)
6701 error_ret_free_internal
:
6702 if (elf_section_data (section
)->relocs
== NULL
)
6703 free (internal_relocs
);
6704 error_ret_free_local
:
6705 if (local_syms
!= NULL
6706 && (symtab_hdr
->contents
6707 != (unsigned char *) local_syms
))
6712 stub_entry
->target_value
= sym_value
;
6713 stub_entry
->target_section
= sym_sec
;
6714 stub_entry
->stub_type
= stub_type
;
6715 stub_entry
->h
= hash
;
6716 stub_entry
->addend
= irela
->r_addend
;
6717 stub_changed
= TRUE
;
6720 /* We're done with the internal relocs, free them. */
6721 if (elf_section_data (section
)->relocs
!= internal_relocs
)
6722 free (internal_relocs
);
6725 if (local_syms
!= NULL
6726 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
6728 if (!info
->keep_memory
)
6731 symtab_hdr
->contents
= (unsigned char *) local_syms
;
6738 /* OK, we've added some stubs. Find out the new size of the
6740 for (stub_sec
= htab
->stub_bfd
->sections
;
6742 stub_sec
= stub_sec
->next
)
6744 stub_sec
->_raw_size
= 0;
6745 stub_sec
->_cooked_size
= 0;
6747 htab
->sbrlt
->_raw_size
= 0;
6748 htab
->sbrlt
->_cooked_size
= 0;
6750 bfd_hash_traverse (&htab
->stub_hash_table
, ppc_size_one_stub
, htab
);
6752 /* Ask the linker to do its stuff. */
6753 (*htab
->layout_sections_again
) ();
6756 /* It would be nice to strip .branch_lt from the output if the
6757 section is empty, but it's too late. If we strip sections here,
6758 the dynamic symbol table is corrupted since the section symbol
6759 for the stripped section isn't written. */
6764 /* Called after we have determined section placement. If sections
6765 move, we'll be called again. Provide a value for TOCstart. */
6768 ppc64_elf_toc (obfd
)
6774 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6775 order. The TOC starts where the first of these sections starts. */
6776 s
= bfd_get_section_by_name (obfd
, ".got");
6778 s
= bfd_get_section_by_name (obfd
, ".toc");
6780 s
= bfd_get_section_by_name (obfd
, ".tocbss");
6782 s
= bfd_get_section_by_name (obfd
, ".plt");
6785 /* This may happen for
6786 o references to TOC base (SYM@toc / TOC[tc0]) without a
6789 o --gc-sections and empty TOC sections
6791 FIXME: Warn user? */
6793 /* Look for a likely section. We probably won't even be
6795 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
6796 if ((s
->flags
& (SEC_ALLOC
| SEC_SMALL_DATA
| SEC_READONLY
))
6797 == (SEC_ALLOC
| SEC_SMALL_DATA
))
6800 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
6801 if ((s
->flags
& (SEC_ALLOC
| SEC_SMALL_DATA
))
6802 == (SEC_ALLOC
| SEC_SMALL_DATA
))
6805 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
6806 if ((s
->flags
& (SEC_ALLOC
| SEC_READONLY
)) == SEC_ALLOC
)
6809 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
6810 if ((s
->flags
& SEC_ALLOC
) == SEC_ALLOC
)
6816 TOCstart
= s
->output_section
->vma
+ s
->output_offset
;
6821 /* Build all the stubs associated with the current output file.
6822 The stubs are kept in a hash table attached to the main linker
6823 hash table. This function is called via gldelf64ppc_finish. */
6826 ppc64_elf_build_stubs (info
)
6827 struct bfd_link_info
*info
;
6829 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6834 for (stub_sec
= htab
->stub_bfd
->sections
;
6836 stub_sec
= stub_sec
->next
)
6840 /* Allocate memory to hold the linker stubs. */
6841 size
= stub_sec
->_raw_size
;
6844 stub_sec
->contents
= (bfd_byte
*) bfd_zalloc (htab
->stub_bfd
, size
);
6845 if (stub_sec
->contents
== NULL
)
6848 stub_sec
->_cooked_size
= 0;
6851 if (htab
->splt
!= NULL
)
6855 /* Build the .glink plt call stub. */
6856 plt_r2
= (htab
->splt
->output_offset
6857 + htab
->splt
->output_section
->vma
6858 - elf_gp (htab
->splt
->output_section
->owner
)
6860 p
= htab
->sglink
->contents
;
6861 p
= build_plt_stub (htab
->sglink
->owner
, p
, (int) plt_r2
, 1);
6862 while (p
< htab
->sglink
->contents
+ GLINK_CALL_STUB_SIZE
)
6864 bfd_put_32 (htab
->sglink
->owner
, NOP
, p
);
6868 /* Build the .glink lazy link call stubs. */
6870 while (p
< htab
->sglink
->contents
+ htab
->sglink
->_raw_size
)
6874 bfd_put_32 (htab
->sglink
->owner
, LI_R0_0
| indx
, p
);
6879 bfd_put_32 (htab
->sglink
->owner
, LIS_R0_0
| PPC_HI (indx
), p
);
6881 bfd_put_32 (htab
->sglink
->owner
, ORI_R0_R0_0
| PPC_LO (indx
), p
);
6884 bfd_put_32 (htab
->sglink
->owner
,
6885 B_DOT
| ((htab
->sglink
->contents
- p
) & 0x3fffffc), p
);
6889 htab
->sglink
->_cooked_size
= p
- htab
->sglink
->contents
;
6892 if (htab
->sbrlt
->_raw_size
!= 0)
6894 htab
->sbrlt
->contents
= (bfd_byte
*) bfd_zalloc (htab
->sbrlt
->owner
,
6895 htab
->sbrlt
->_raw_size
);
6896 if (htab
->sbrlt
->contents
== NULL
)
6900 /* Build the stubs as directed by the stub hash table. */
6901 bfd_hash_traverse (&htab
->stub_hash_table
, ppc_build_one_stub
, info
);
6903 for (stub_sec
= htab
->stub_bfd
->sections
;
6905 stub_sec
= stub_sec
->next
)
6907 if (stub_sec
->_raw_size
!= stub_sec
->_cooked_size
)
6911 if (stub_sec
!= NULL
6912 || htab
->sglink
->_raw_size
!= htab
->sglink
->_cooked_size
)
6914 htab
->stub_error
= TRUE
;
6915 (*_bfd_error_handler
) (_("stubs don't match calculated size"));
6918 return !htab
->stub_error
;
6921 /* The RELOCATE_SECTION function is called by the ELF backend linker
6922 to handle the relocations for a section.
6924 The relocs are always passed as Rela structures; if the section
6925 actually uses Rel structures, the r_addend field will always be
6928 This function is responsible for adjust the section contents as
6929 necessary, and (if using Rela relocs and generating a
6930 relocateable output file) adjusting the reloc addend as
6933 This function does not have to worry about setting the reloc
6934 address or the reloc symbol index.
6936 LOCAL_SYMS is a pointer to the swapped in local symbols.
6938 LOCAL_SECTIONS is an array giving the section in the input file
6939 corresponding to the st_shndx field of each local symbol.
6941 The global hash table entry for the global symbols can be found
6942 via elf_sym_hashes (input_bfd).
6944 When generating relocateable output, this function must handle
6945 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6946 going to be the section symbol corresponding to the output
6947 section, which means that the addend must be adjusted
6951 ppc64_elf_relocate_section (output_bfd
, info
, input_bfd
, input_section
,
6952 contents
, relocs
, local_syms
, local_sections
)
6954 struct bfd_link_info
*info
;
6956 asection
*input_section
;
6958 Elf_Internal_Rela
*relocs
;
6959 Elf_Internal_Sym
*local_syms
;
6960 asection
**local_sections
;
6962 struct ppc_link_hash_table
*htab
;
6963 Elf_Internal_Shdr
*symtab_hdr
;
6964 struct elf_link_hash_entry
**sym_hashes
;
6965 Elf_Internal_Rela
*rel
;
6966 Elf_Internal_Rela
*relend
;
6967 Elf_Internal_Rela outrel
;
6969 struct got_entry
**local_got_ents
;
6971 bfd_boolean ret
= TRUE
;
6973 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
6974 bfd_boolean is_power4
= FALSE
;
6976 if (info
->relocateable
)
6979 /* Initialize howto table if needed. */
6980 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
6983 htab
= ppc_hash_table (info
);
6984 local_got_ents
= elf_local_got_ents (input_bfd
);
6985 TOCstart
= elf_gp (output_bfd
);
6986 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
6987 sym_hashes
= elf_sym_hashes (input_bfd
);
6988 is_opd
= ppc64_elf_section_data (input_section
)->opd
.adjust
!= NULL
;
6991 relend
= relocs
+ input_section
->reloc_count
;
6992 for (; rel
< relend
; rel
++)
6994 enum elf_ppc64_reloc_type r_type
;
6996 bfd_reloc_status_type r
;
6997 Elf_Internal_Sym
*sym
;
6999 struct elf_link_hash_entry
*h
;
7000 struct elf_link_hash_entry
*fdh
;
7001 const char *sym_name
;
7002 unsigned long r_symndx
;
7003 char tls_mask
, tls_gd
, tls_type
;
7005 bfd_boolean unresolved_reloc
;
7008 struct ppc_stub_hash_entry
*stub_entry
;
7009 bfd_vma max_br_offset
;
7012 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
->r_info
);
7013 r_symndx
= ELF64_R_SYM (rel
->r_info
);
7014 sym
= (Elf_Internal_Sym
*) 0;
7015 sec
= (asection
*) 0;
7016 h
= (struct elf_link_hash_entry
*) 0;
7017 sym_name
= (const char *) 0;
7018 unresolved_reloc
= FALSE
;
7021 if (r_type
== R_PPC64_TOC
)
7023 /* Relocation value is TOC base. Symbol is ignored. */
7024 relocation
= TOCstart
+ TOC_BASE_OFF
;
7026 else if (r_symndx
< symtab_hdr
->sh_info
)
7028 /* It's a local symbol. */
7029 sym
= local_syms
+ r_symndx
;
7030 sec
= local_sections
[r_symndx
];
7031 sym_name
= bfd_elf_local_sym_name (input_bfd
, sym
);
7032 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, sec
, rel
);
7033 if (elf_section_data (sec
) != NULL
)
7035 long *opd_sym_adjust
;
7037 opd_sym_adjust
= ppc64_elf_section_data (sec
)->opd
.adjust
;
7038 if (opd_sym_adjust
!= NULL
&& sym
->st_value
% 24 == 0)
7039 relocation
+= opd_sym_adjust
[sym
->st_value
/ 24];
7044 /* It's a global symbol. */
7045 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
7046 while (h
->root
.type
== bfd_link_hash_indirect
7047 || h
->root
.type
== bfd_link_hash_warning
)
7048 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
7049 sym_name
= h
->root
.root
.string
;
7051 if (h
->root
.type
== bfd_link_hash_defined
7052 || h
->root
.type
== bfd_link_hash_defweak
)
7054 sec
= h
->root
.u
.def
.section
;
7055 if (sec
->output_section
== NULL
)
7056 /* Set a flag that will be cleared later if we find a
7057 relocation value for this symbol. output_section
7058 is typically NULL for symbols satisfied by a shared
7060 unresolved_reloc
= TRUE
;
7062 relocation
= (h
->root
.u
.def
.value
7063 + sec
->output_section
->vma
7064 + sec
->output_offset
);
7066 else if (h
->root
.type
== bfd_link_hash_undefweak
)
7068 else if (info
->shared
7069 && !info
->no_undefined
7070 && ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
)
7074 if (! ((*info
->callbacks
->undefined_symbol
)
7075 (info
, h
->root
.root
.string
, input_bfd
, input_section
,
7076 rel
->r_offset
, (!info
->shared
7077 || info
->no_undefined
7078 || ELF_ST_VISIBILITY (h
->other
)))))
7084 /* TLS optimizations. Replace instruction sequences and relocs
7085 based on information we collected in tls_optimize. We edit
7086 RELOCS so that --emit-relocs will output something sensible
7087 for the final instruction stream. */
7090 if (IS_PPC64_TLS_RELOC (r_type
))
7093 tls_mask
= ((struct ppc_link_hash_entry
*) h
)->tls_mask
;
7094 else if (local_got_ents
!= NULL
)
7097 lgot_masks
= (char *) (local_got_ents
+ symtab_hdr
->sh_info
);
7098 tls_mask
= lgot_masks
[r_symndx
];
7102 /* Ensure reloc mapping code below stays sane. */
7103 if (R_PPC64_TOC16_LO_DS
!= R_PPC64_TOC16_DS
+ 1
7104 || R_PPC64_TOC16_LO
!= R_PPC64_TOC16
+ 1
7105 || (R_PPC64_GOT_TLSLD16
& 3) != (R_PPC64_GOT_TLSGD16
& 3)
7106 || (R_PPC64_GOT_TLSLD16_LO
& 3) != (R_PPC64_GOT_TLSGD16_LO
& 3)
7107 || (R_PPC64_GOT_TLSLD16_HI
& 3) != (R_PPC64_GOT_TLSGD16_HI
& 3)
7108 || (R_PPC64_GOT_TLSLD16_HA
& 3) != (R_PPC64_GOT_TLSGD16_HA
& 3)
7109 || (R_PPC64_GOT_TLSLD16
& 3) != (R_PPC64_GOT_TPREL16_DS
& 3)
7110 || (R_PPC64_GOT_TLSLD16_LO
& 3) != (R_PPC64_GOT_TPREL16_LO_DS
& 3)
7111 || (R_PPC64_GOT_TLSLD16_HI
& 3) != (R_PPC64_GOT_TPREL16_HI
& 3)
7112 || (R_PPC64_GOT_TLSLD16_HA
& 3) != (R_PPC64_GOT_TPREL16_HA
& 3))
7120 case R_PPC64_TOC16_LO
:
7121 case R_PPC64_TOC16_DS
:
7122 case R_PPC64_TOC16_LO_DS
:
7124 /* Check for toc tls entries. */
7128 retval
= get_tls_mask (&toc_tls
, &local_syms
, rel
, input_bfd
);
7134 tls_mask
= *toc_tls
;
7135 if (r_type
== R_PPC64_TOC16_DS
7136 || r_type
== R_PPC64_TOC16_LO_DS
)
7140 /* If we found a GD reloc pair, then we might be
7141 doing a GD->IE transition. */
7144 tls_gd
= TLS_TPRELGD
;
7145 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
7146 goto tls_get_addr_check
;
7148 else if (retval
== 3)
7150 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
7151 goto tls_get_addr_check
;
7158 case R_PPC64_GOT_TPREL16_DS
:
7159 case R_PPC64_GOT_TPREL16_LO_DS
:
7162 && (tls_mask
& TLS_TPREL
) == 0)
7165 insn
= bfd_get_32 (output_bfd
, contents
+ rel
->r_offset
- 2);
7167 insn
|= 0x3c0d0000; /* addis 0,13,0 */
7168 bfd_put_32 (output_bfd
, insn
, contents
+ rel
->r_offset
- 2);
7169 r_type
= R_PPC64_TPREL16_HA
;
7170 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7177 /* Check for toc tls entries. */
7180 if (!get_tls_mask (&toc_tls
, &local_syms
, rel
, input_bfd
))
7184 tls_mask
= *toc_tls
;
7187 && (tls_mask
& TLS_TPREL
) == 0)
7190 insn
= bfd_get_32 (output_bfd
, contents
+ rel
->r_offset
);
7191 if ((insn
& ((31 << 26) | (31 << 11)))
7192 == ((31 << 26) | (13 << 11)))
7193 rtra
= insn
& ((1 << 26) - (1 << 16));
7194 else if ((insn
& ((31 << 26) | (31 << 16)))
7195 == ((31 << 26) | (13 << 16)))
7196 rtra
= (insn
& (31 << 21)) | ((insn
& (31 << 11)) << 5);
7199 if ((insn
& ((1 << 11) - (1 << 1))) == 266 << 1)
7202 else if ((insn
& (31 << 1)) == 23 << 1
7203 && ((insn
& (31 << 6)) < 14 << 6
7204 || ((insn
& (31 << 6)) >= 16 << 6
7205 && (insn
& (31 << 6)) < 24 << 6)))
7206 /* load and store indexed -> dform. */
7207 insn
= (32 | ((insn
>> 6) & 31)) << 26;
7208 else if ((insn
& (31 << 1)) == 21 << 1
7209 && (insn
& (0x1a << 6)) == 0)
7210 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7211 insn
= (((58 | ((insn
>> 6) & 4)) << 26)
7212 | ((insn
>> 6) & 1));
7213 else if ((insn
& (31 << 1)) == 21 << 1
7214 && (insn
& ((1 << 11) - (1 << 1))) == 341 << 1)
7216 insn
= (58 << 26) | 2;
7220 bfd_put_32 (output_bfd
, insn
, contents
+ rel
->r_offset
);
7221 r_type
= R_PPC64_TPREL16_LO
;
7222 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7223 /* Was PPC64_TLS which sits on insn boundary, now
7224 PPC64_TPREL16_LO which is at insn+2. */
7229 case R_PPC64_GOT_TLSGD16_HI
:
7230 case R_PPC64_GOT_TLSGD16_HA
:
7231 tls_gd
= TLS_TPRELGD
;
7232 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
7236 case R_PPC64_GOT_TLSLD16_HI
:
7237 case R_PPC64_GOT_TLSLD16_HA
:
7238 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
7241 if ((tls_mask
& tls_gd
) != 0)
7242 r_type
= (((r_type
- (R_PPC64_GOT_TLSGD16
& 3)) & 3)
7243 + R_PPC64_GOT_TPREL16_DS
);
7246 bfd_put_32 (output_bfd
, NOP
, contents
+ rel
->r_offset
);
7248 r_type
= R_PPC64_NONE
;
7250 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7254 case R_PPC64_GOT_TLSGD16
:
7255 case R_PPC64_GOT_TLSGD16_LO
:
7256 tls_gd
= TLS_TPRELGD
;
7257 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
7258 goto tls_get_addr_check
;
7261 case R_PPC64_GOT_TLSLD16
:
7262 case R_PPC64_GOT_TLSLD16_LO
:
7263 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
7266 if (rel
+ 1 < relend
)
7268 enum elf_ppc64_reloc_type r_type2
;
7269 unsigned long r_symndx2
;
7270 struct elf_link_hash_entry
*h2
;
7271 bfd_vma insn1
, insn2
, insn3
;
7274 /* The next instruction should be a call to
7275 __tls_get_addr. Peek at the reloc to be sure. */
7277 = (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rel
[1].r_info
);
7278 r_symndx2
= ELF64_R_SYM (rel
[1].r_info
);
7279 if (r_symndx2
< symtab_hdr
->sh_info
7280 || (r_type2
!= R_PPC64_REL14
7281 && r_type2
!= R_PPC64_REL14_BRTAKEN
7282 && r_type2
!= R_PPC64_REL14_BRNTAKEN
7283 && r_type2
!= R_PPC64_REL24
))
7286 h2
= sym_hashes
[r_symndx2
- symtab_hdr
->sh_info
];
7287 while (h2
->root
.type
== bfd_link_hash_indirect
7288 || h2
->root
.type
== bfd_link_hash_warning
)
7289 h2
= (struct elf_link_hash_entry
*) h2
->root
.u
.i
.link
;
7290 if (h2
== NULL
|| h2
!= htab
->tls_get_addr
)
7293 /* OK, it checks out. Replace the call. */
7294 offset
= rel
[1].r_offset
;
7295 insn1
= bfd_get_32 (output_bfd
,
7296 contents
+ rel
->r_offset
- 2);
7297 insn3
= bfd_get_32 (output_bfd
,
7298 contents
+ offset
+ 4);
7299 if ((tls_mask
& tls_gd
) != 0)
7302 insn1
&= (1 << 26) - (1 << 2);
7303 insn1
|= 58 << 26; /* ld */
7304 insn2
= 0x7c636a14; /* add 3,3,13 */
7305 rel
[1].r_info
= ELF64_R_INFO (r_symndx2
, R_PPC64_NONE
);
7306 if ((tls_mask
& TLS_EXPLICIT
) == 0)
7307 r_type
= (((r_type
- (R_PPC64_GOT_TLSGD16
& 3)) & 3)
7308 + R_PPC64_GOT_TPREL16_DS
);
7310 r_type
+= R_PPC64_TOC16_DS
- R_PPC64_TOC16
;
7311 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7316 insn1
= 0x3c6d0000; /* addis 3,13,0 */
7317 insn2
= 0x38630000; /* addi 3,3,0 */
7320 /* Was an LD reloc. */
7322 rel
->r_addend
= htab
->tls_sec
->vma
+ DTP_OFFSET
;
7323 rel
[1].r_addend
= htab
->tls_sec
->vma
+ DTP_OFFSET
;
7325 r_type
= R_PPC64_TPREL16_HA
;
7326 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7327 rel
[1].r_info
= ELF64_R_INFO (r_symndx
,
7328 R_PPC64_TPREL16_LO
);
7329 rel
[1].r_offset
+= 2;
7332 || insn3
== CROR_151515
|| insn3
== CROR_313131
)
7336 rel
[1].r_offset
+= 4;
7338 bfd_put_32 (output_bfd
, insn1
, contents
+ rel
->r_offset
- 2);
7339 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
);
7340 bfd_put_32 (output_bfd
, insn3
, contents
+ offset
+ 4);
7343 /* We changed the symbol on an LD reloc. Start over
7344 in order to get h, sym, sec etc. right. */
7352 case R_PPC64_DTPMOD64
:
7353 if (rel
+ 1 < relend
7354 && rel
[1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
)
7355 && rel
[1].r_offset
== rel
->r_offset
+ 8)
7357 if ((tls_mask
& TLS_GD
) == 0)
7359 rel
[1].r_info
= ELF64_R_INFO (r_symndx
, R_PPC64_NONE
);
7360 if ((tls_mask
& TLS_TPRELGD
) != 0)
7361 r_type
= R_PPC64_TPREL64
;
7364 bfd_put_64 (output_bfd
, (bfd_vma
) 1,
7365 contents
+ rel
->r_offset
);
7366 r_type
= R_PPC64_NONE
;
7368 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7373 if ((tls_mask
& TLS_LD
) == 0)
7375 bfd_put_64 (output_bfd
, (bfd_vma
) 1,
7376 contents
+ rel
->r_offset
);
7377 r_type
= R_PPC64_NONE
;
7378 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7383 case R_PPC64_TPREL64
:
7384 if ((tls_mask
& TLS_TPREL
) == 0)
7386 r_type
= R_PPC64_NONE
;
7387 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
7392 /* Handle other relocations that tweak non-addend part of insn. */
7399 /* Branch taken prediction relocations. */
7400 case R_PPC64_ADDR14_BRTAKEN
:
7401 case R_PPC64_REL14_BRTAKEN
:
7402 insn
= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7405 /* Branch not taken prediction relocations. */
7406 case R_PPC64_ADDR14_BRNTAKEN
:
7407 case R_PPC64_REL14_BRNTAKEN
:
7408 insn
|= bfd_get_32 (output_bfd
,
7409 contents
+ rel
->r_offset
) & ~(0x01 << 21);
7412 /* Set 'a' bit. This is 0b00010 in BO field for branch
7413 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7414 for branch on CTR insns (BO == 1a00t or 1a01t). */
7415 if ((insn
& (0x14 << 21)) == (0x04 << 21))
7417 else if ((insn
& (0x14 << 21)) == (0x10 << 21))
7424 from
= (rel
->r_offset
7425 + input_section
->output_offset
7426 + input_section
->output_section
->vma
);
7428 /* Invert 'y' bit if not the default. */
7429 if ((bfd_signed_vma
) (relocation
+ rel
->r_addend
- from
) < 0)
7433 bfd_put_32 (output_bfd
, (bfd_vma
) insn
, contents
+ rel
->r_offset
);
7437 /* A REL24 branching to a linkage function is followed by a
7438 nop. We replace the nop with a ld in order to restore
7439 the TOC base pointer. Only calls to shared objects need
7440 to alter the TOC base. These are recognized by their
7441 need for a PLT entry. */
7443 && (fdh
= ((struct ppc_link_hash_entry
*) h
)->oh
) != NULL
7444 && fdh
->plt
.plist
!= NULL
7445 && (stub_entry
= ppc_get_stub_entry (input_section
, sec
, fdh
,
7446 rel
, htab
)) != NULL
)
7448 bfd_boolean can_plt_call
= 0;
7450 if (rel
->r_offset
+ 8 <= input_section
->_cooked_size
)
7452 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
+ 4);
7454 || insn
== CROR_151515
|| insn
== CROR_313131
)
7456 bfd_put_32 (input_bfd
, (bfd_vma
) LD_R2_40R1
,
7457 contents
+ rel
->r_offset
+ 4);
7464 /* If this is a plain branch rather than a branch
7465 and link, don't require a nop. */
7466 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
7467 if ((insn
& 1) == 0)
7473 relocation
= (stub_entry
->stub_offset
7474 + stub_entry
->stub_sec
->output_offset
7475 + stub_entry
->stub_sec
->output_section
->vma
);
7476 unresolved_reloc
= FALSE
;
7481 && h
->root
.type
== bfd_link_hash_undefweak
7483 && rel
->r_addend
== 0)
7485 /* Tweak calls to undefined weak functions to point at a
7486 blr. We can thus call a weak function without first
7487 checking whether the function is defined. We have a
7488 blr at the end of .sfpr. */
7489 BFD_ASSERT (htab
->sfpr
->_raw_size
!= 0);
7490 relocation
= (htab
->sfpr
->_raw_size
- 4
7491 + htab
->sfpr
->output_offset
7492 + htab
->sfpr
->output_section
->vma
);
7493 from
= (rel
->r_offset
7494 + input_section
->output_offset
7495 + input_section
->output_section
->vma
);
7497 /* But let's not be silly about it. If the blr isn't in
7498 reach, just go to the next instruction. */
7499 if (relocation
- from
+ (1 << 25) >= (1 << 26)
7500 || htab
->sfpr
->_raw_size
== 0)
7501 relocation
= from
+ 4;
7508 addend
= rel
->r_addend
;
7512 (*_bfd_error_handler
)
7513 (_("%s: unknown relocation type %d for symbol %s"),
7514 bfd_archive_filename (input_bfd
), (int) r_type
, sym_name
);
7516 bfd_set_error (bfd_error_bad_value
);
7522 case R_PPC64_GNU_VTINHERIT
:
7523 case R_PPC64_GNU_VTENTRY
:
7526 /* GOT16 relocations. Like an ADDR16 using the symbol's
7527 address in the GOT as relocation value instead of the
7528 symbol's value itself. Also, create a GOT entry for the
7529 symbol and put the symbol value there. */
7530 case R_PPC64_GOT_TLSGD16
:
7531 case R_PPC64_GOT_TLSGD16_LO
:
7532 case R_PPC64_GOT_TLSGD16_HI
:
7533 case R_PPC64_GOT_TLSGD16_HA
:
7534 tls_type
= TLS_TLS
| TLS_GD
;
7537 case R_PPC64_GOT_TLSLD16
:
7538 case R_PPC64_GOT_TLSLD16_LO
:
7539 case R_PPC64_GOT_TLSLD16_HI
:
7540 case R_PPC64_GOT_TLSLD16_HA
:
7541 tls_type
= TLS_TLS
| TLS_LD
;
7544 case R_PPC64_GOT_TPREL16_DS
:
7545 case R_PPC64_GOT_TPREL16_LO_DS
:
7546 case R_PPC64_GOT_TPREL16_HI
:
7547 case R_PPC64_GOT_TPREL16_HA
:
7548 tls_type
= TLS_TLS
| TLS_TPREL
;
7551 case R_PPC64_GOT_DTPREL16_DS
:
7552 case R_PPC64_GOT_DTPREL16_LO_DS
:
7553 case R_PPC64_GOT_DTPREL16_HI
:
7554 case R_PPC64_GOT_DTPREL16_HA
:
7555 tls_type
= TLS_TLS
| TLS_DTPREL
;
7559 case R_PPC64_GOT16_LO
:
7560 case R_PPC64_GOT16_HI
:
7561 case R_PPC64_GOT16_HA
:
7562 case R_PPC64_GOT16_DS
:
7563 case R_PPC64_GOT16_LO_DS
:
7566 /* Relocation is to the entry for this symbol in the global
7570 unsigned long indx
= 0;
7572 if (htab
->sgot
== NULL
)
7575 if (tls_type
== (TLS_TLS
| TLS_LD
)
7577 || !(h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
)))
7578 offp
= &htab
->tlsld_got
.offset
;
7581 struct got_entry
*ent
;
7585 bfd_boolean dyn
= htab
->elf
.dynamic_sections_created
;
7586 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, info
->shared
, h
)
7590 || (h
->elf_link_hash_flags
7591 & ELF_LINK_FORCED_LOCAL
))
7592 && (h
->elf_link_hash_flags
7593 & ELF_LINK_HASH_DEF_REGULAR
)))
7594 /* This is actually a static link, or it is a
7595 -Bsymbolic link and the symbol is defined
7596 locally, or the symbol was forced to be local
7597 because of a version file. */
7602 unresolved_reloc
= FALSE
;
7608 if (local_got_ents
== NULL
)
7610 ent
= local_got_ents
[r_symndx
];
7613 for (; ent
!= NULL
; ent
= ent
->next
)
7614 if (ent
->addend
== rel
->r_addend
7615 && ent
->tls_type
== tls_type
)
7619 offp
= &ent
->got
.offset
;
7622 /* The offset must always be a multiple of 8. We use the
7623 least significant bit to record whether we have already
7624 processed this entry. */
7630 /* Generate relocs for the dynamic linker, except in
7631 the case of TLSLD where we'll use one entry per
7634 if (info
->shared
|| indx
!= 0)
7636 outrel
.r_offset
= (htab
->sgot
->output_section
->vma
7637 + htab
->sgot
->output_offset
7639 if (tls_type
& (TLS_LD
| TLS_GD
))
7641 outrel
.r_addend
= 0;
7642 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_DTPMOD64
);
7643 if (tls_type
== (TLS_TLS
| TLS_GD
))
7645 loc
= htab
->srelgot
->contents
;
7646 loc
+= (htab
->srelgot
->reloc_count
++
7647 * sizeof (Elf64_External_Rela
));
7648 bfd_elf64_swap_reloca_out (output_bfd
,
7650 outrel
.r_offset
+= 8;
7652 = ELF64_R_INFO (indx
, R_PPC64_DTPREL64
);
7655 else if (tls_type
== (TLS_TLS
| TLS_DTPREL
))
7656 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_DTPREL64
);
7657 else if (tls_type
== (TLS_TLS
| TLS_TPREL
))
7658 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_TPREL64
);
7660 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_RELATIVE
);
7662 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_GLOB_DAT
);
7663 outrel
.r_addend
= rel
->r_addend
;
7666 outrel
.r_addend
+= relocation
;
7667 if (tls_type
& (TLS_GD
| TLS_DTPREL
| TLS_TPREL
))
7668 outrel
.r_addend
-= htab
->tls_sec
->vma
;
7670 loc
= htab
->srelgot
->contents
;
7671 loc
+= (htab
->srelgot
->reloc_count
++
7672 * sizeof (Elf64_External_Rela
));
7673 bfd_elf64_swap_reloca_out (output_bfd
, &outrel
, loc
);
7676 /* Init the .got section contents if we're not
7677 emitting a reloc. */
7680 relocation
+= rel
->r_addend
;
7681 if (tls_type
== (TLS_TLS
| TLS_LD
))
7683 else if (tls_type
!= 0)
7685 relocation
-= htab
->tls_sec
->vma
+ DTP_OFFSET
;
7686 if (tls_type
== (TLS_TLS
| TLS_TPREL
))
7687 relocation
+= DTP_OFFSET
- TP_OFFSET
;
7689 if (tls_type
== (TLS_TLS
| TLS_GD
))
7691 bfd_put_64 (output_bfd
, relocation
,
7692 htab
->sgot
->contents
+ off
+ 8);
7697 bfd_put_64 (output_bfd
, relocation
,
7698 htab
->sgot
->contents
+ off
);
7702 if (off
>= (bfd_vma
) -2)
7705 relocation
= htab
->sgot
->output_offset
+ off
;
7707 /* TOC base (r2) is TOC start plus 0x8000. */
7708 addend
= - TOC_BASE_OFF
;
7712 case R_PPC64_PLT16_HA
:
7713 case R_PPC64_PLT16_HI
:
7714 case R_PPC64_PLT16_LO
:
7717 /* Relocation is to the entry for this symbol in the
7718 procedure linkage table. */
7720 /* Resolve a PLT reloc against a local symbol directly,
7721 without using the procedure linkage table. */
7725 /* It's possible that we didn't make a PLT entry for this
7726 symbol. This happens when statically linking PIC code,
7727 or when using -Bsymbolic. Go find a match if there is a
7729 if (htab
->splt
!= NULL
)
7731 struct plt_entry
*ent
;
7732 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
7733 if (ent
->addend
== rel
->r_addend
7734 && ent
->plt
.offset
!= (bfd_vma
) -1)
7736 relocation
= (htab
->splt
->output_section
->vma
7737 + htab
->splt
->output_offset
7739 unresolved_reloc
= FALSE
;
7744 /* TOC16 relocs. We want the offset relative to the TOC base,
7745 which is the address of the start of the TOC plus 0x8000.
7746 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7749 case R_PPC64_TOC16_LO
:
7750 case R_PPC64_TOC16_HI
:
7751 case R_PPC64_TOC16_DS
:
7752 case R_PPC64_TOC16_LO_DS
:
7753 case R_PPC64_TOC16_HA
:
7754 addend
-= TOCstart
+ TOC_BASE_OFF
;
7757 /* Relocate against the beginning of the section. */
7758 case R_PPC64_SECTOFF
:
7759 case R_PPC64_SECTOFF_LO
:
7760 case R_PPC64_SECTOFF_HI
:
7761 case R_PPC64_SECTOFF_DS
:
7762 case R_PPC64_SECTOFF_LO_DS
:
7763 case R_PPC64_SECTOFF_HA
:
7764 if (sec
!= (asection
*) 0)
7765 addend
-= sec
->output_section
->vma
;
7769 case R_PPC64_REL14_BRNTAKEN
:
7770 case R_PPC64_REL14_BRTAKEN
:
7774 case R_PPC64_TPREL16
:
7775 case R_PPC64_TPREL16_LO
:
7776 case R_PPC64_TPREL16_HI
:
7777 case R_PPC64_TPREL16_HA
:
7778 case R_PPC64_TPREL16_DS
:
7779 case R_PPC64_TPREL16_LO_DS
:
7780 case R_PPC64_TPREL16_HIGHER
:
7781 case R_PPC64_TPREL16_HIGHERA
:
7782 case R_PPC64_TPREL16_HIGHEST
:
7783 case R_PPC64_TPREL16_HIGHESTA
:
7784 addend
-= htab
->tls_sec
->vma
+ TP_OFFSET
;
7786 /* The TPREL16 relocs shouldn't really be used in shared
7787 libs as they will result in DT_TEXTREL being set, but
7788 support them anyway. */
7792 case R_PPC64_DTPREL16
:
7793 case R_PPC64_DTPREL16_LO
:
7794 case R_PPC64_DTPREL16_HI
:
7795 case R_PPC64_DTPREL16_HA
:
7796 case R_PPC64_DTPREL16_DS
:
7797 case R_PPC64_DTPREL16_LO_DS
:
7798 case R_PPC64_DTPREL16_HIGHER
:
7799 case R_PPC64_DTPREL16_HIGHERA
:
7800 case R_PPC64_DTPREL16_HIGHEST
:
7801 case R_PPC64_DTPREL16_HIGHESTA
:
7802 addend
-= htab
->tls_sec
->vma
+ DTP_OFFSET
;
7805 case R_PPC64_DTPMOD64
:
7810 case R_PPC64_TPREL64
:
7811 addend
-= htab
->tls_sec
->vma
+ TP_OFFSET
;
7814 case R_PPC64_DTPREL64
:
7815 addend
-= htab
->tls_sec
->vma
+ DTP_OFFSET
;
7818 /* Relocations that may need to be propagated if this is a
7823 case R_PPC64_ADDR14
:
7824 case R_PPC64_ADDR14_BRNTAKEN
:
7825 case R_PPC64_ADDR14_BRTAKEN
:
7826 case R_PPC64_ADDR16
:
7827 case R_PPC64_ADDR16_DS
:
7828 case R_PPC64_ADDR16_HA
:
7829 case R_PPC64_ADDR16_HI
:
7830 case R_PPC64_ADDR16_HIGHER
:
7831 case R_PPC64_ADDR16_HIGHERA
:
7832 case R_PPC64_ADDR16_HIGHEST
:
7833 case R_PPC64_ADDR16_HIGHESTA
:
7834 case R_PPC64_ADDR16_LO
:
7835 case R_PPC64_ADDR16_LO_DS
:
7836 case R_PPC64_ADDR24
:
7837 case R_PPC64_ADDR32
:
7838 case R_PPC64_ADDR64
:
7839 case R_PPC64_UADDR16
:
7840 case R_PPC64_UADDR32
:
7841 case R_PPC64_UADDR64
:
7842 /* r_symndx will be zero only for relocs against symbols
7843 from removed linkonce sections, or sections discarded by
7851 if ((input_section
->flags
& SEC_ALLOC
) == 0)
7854 if (NO_OPD_RELOCS
&& is_opd
)
7858 && (MUST_BE_DYN_RELOC (r_type
)
7861 && (! info
->symbolic
7862 || (h
->elf_link_hash_flags
7863 & ELF_LINK_HASH_DEF_REGULAR
) == 0))))
7864 || (ELIMINATE_COPY_RELOCS
7868 && (h
->elf_link_hash_flags
& ELF_LINK_NON_GOT_REF
) == 0
7869 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
) != 0
7870 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_REGULAR
) == 0))
7872 Elf_Internal_Rela outrel
;
7873 bfd_boolean skip
, relocate
;
7877 /* When generating a dynamic object, these relocations
7878 are copied into the output file to be resolved at run
7885 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
7887 if (outrel
.r_offset
== (bfd_vma
) -1)
7889 else if (outrel
.r_offset
== (bfd_vma
) -2)
7890 skip
= TRUE
, relocate
= TRUE
;
7891 outrel
.r_offset
+= (input_section
->output_section
->vma
7892 + input_section
->output_offset
);
7893 outrel
.r_addend
= rel
->r_addend
;
7896 memset (&outrel
, 0, sizeof outrel
);
7900 && (!MUST_BE_DYN_RELOC (r_type
)
7903 || (h
->elf_link_hash_flags
7904 & ELF_LINK_HASH_DEF_REGULAR
) == 0))
7905 outrel
.r_info
= ELF64_R_INFO (h
->dynindx
, r_type
);
7908 /* This symbol is local, or marked to become local,
7909 or this is an opd section reloc which must point
7910 at a local function. */
7911 outrel
.r_addend
+= relocation
;
7914 if (r_type
== R_PPC64_ADDR64
|| r_type
== R_PPC64_TOC
)
7916 if (is_opd
&& h
!= NULL
)
7918 /* Lie about opd entries. This case occurs
7919 when building shared libraries and we
7920 reference a function in another shared
7921 lib. The same thing happens for a weak
7922 definition in an application that's
7923 overridden by a strong definition in a
7924 shared lib. (I believe this is a generic
7925 bug in binutils handling of weak syms.)
7926 In these cases we won't use the opd
7927 entry in this lib. */
7928 unresolved_reloc
= FALSE
;
7930 outrel
.r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
7936 if (bfd_is_abs_section (sec
))
7938 else if (sec
== NULL
|| sec
->owner
== NULL
)
7940 bfd_set_error (bfd_error_bad_value
);
7947 osec
= sec
->output_section
;
7948 indx
= elf_section_data (osec
)->dynindx
;
7950 /* We are turning this relocation into one
7951 against a section symbol, so subtract out
7952 the output section's address but not the
7953 offset of the input section in the output
7955 outrel
.r_addend
-= osec
->vma
;
7958 outrel
.r_info
= ELF64_R_INFO (indx
, r_type
);
7962 sreloc
= elf_section_data (input_section
)->sreloc
;
7966 loc
= sreloc
->contents
;
7967 loc
+= sreloc
->reloc_count
++ * sizeof (Elf64_External_Rela
);
7968 bfd_elf64_swap_reloca_out (output_bfd
, &outrel
, loc
);
7970 /* If this reloc is against an external symbol, it will
7971 be computed at runtime, so there's no need to do
7979 case R_PPC64_GLOB_DAT
:
7980 case R_PPC64_JMP_SLOT
:
7981 case R_PPC64_RELATIVE
:
7982 /* We shouldn't ever see these dynamic relocs in relocatable
7986 case R_PPC64_PLTGOT16
:
7987 case R_PPC64_PLTGOT16_DS
:
7988 case R_PPC64_PLTGOT16_HA
:
7989 case R_PPC64_PLTGOT16_HI
:
7990 case R_PPC64_PLTGOT16_LO
:
7991 case R_PPC64_PLTGOT16_LO_DS
:
7992 case R_PPC64_PLTREL32
:
7993 case R_PPC64_PLTREL64
:
7994 /* These ones haven't been implemented yet. */
7996 (*_bfd_error_handler
)
7997 (_("%s: relocation %s is not supported for symbol %s."),
7998 bfd_archive_filename (input_bfd
),
7999 ppc64_elf_howto_table
[(int) r_type
]->name
, sym_name
);
8001 bfd_set_error (bfd_error_invalid_operation
);
8006 /* Do any further special processing. */
8012 case R_PPC64_ADDR16_HA
:
8013 case R_PPC64_ADDR16_HIGHERA
:
8014 case R_PPC64_ADDR16_HIGHESTA
:
8015 case R_PPC64_GOT16_HA
:
8016 case R_PPC64_PLTGOT16_HA
:
8017 case R_PPC64_PLT16_HA
:
8018 case R_PPC64_TOC16_HA
:
8019 case R_PPC64_SECTOFF_HA
:
8020 case R_PPC64_TPREL16_HA
:
8021 case R_PPC64_DTPREL16_HA
:
8022 case R_PPC64_GOT_TLSGD16_HA
:
8023 case R_PPC64_GOT_TLSLD16_HA
:
8024 case R_PPC64_GOT_TPREL16_HA
:
8025 case R_PPC64_GOT_DTPREL16_HA
:
8026 case R_PPC64_TPREL16_HIGHER
:
8027 case R_PPC64_TPREL16_HIGHERA
:
8028 case R_PPC64_TPREL16_HIGHEST
:
8029 case R_PPC64_TPREL16_HIGHESTA
:
8030 case R_PPC64_DTPREL16_HIGHER
:
8031 case R_PPC64_DTPREL16_HIGHERA
:
8032 case R_PPC64_DTPREL16_HIGHEST
:
8033 case R_PPC64_DTPREL16_HIGHESTA
:
8034 /* It's just possible that this symbol is a weak symbol
8035 that's not actually defined anywhere. In that case,
8036 'sec' would be NULL, and we should leave the symbol
8037 alone (it will be set to zero elsewhere in the link). */
8039 /* Add 0x10000 if sign bit in 0:15 is set.
8040 Bits 0:15 are not used. */
8044 case R_PPC64_ADDR16_DS
:
8045 case R_PPC64_ADDR16_LO_DS
:
8046 case R_PPC64_GOT16_DS
:
8047 case R_PPC64_GOT16_LO_DS
:
8048 case R_PPC64_PLT16_LO_DS
:
8049 case R_PPC64_SECTOFF_DS
:
8050 case R_PPC64_SECTOFF_LO_DS
:
8051 case R_PPC64_TOC16_DS
:
8052 case R_PPC64_TOC16_LO_DS
:
8053 case R_PPC64_PLTGOT16_DS
:
8054 case R_PPC64_PLTGOT16_LO_DS
:
8055 case R_PPC64_GOT_TPREL16_DS
:
8056 case R_PPC64_GOT_TPREL16_LO_DS
:
8057 case R_PPC64_GOT_DTPREL16_DS
:
8058 case R_PPC64_GOT_DTPREL16_LO_DS
:
8059 case R_PPC64_TPREL16_DS
:
8060 case R_PPC64_TPREL16_LO_DS
:
8061 case R_PPC64_DTPREL16_DS
:
8062 case R_PPC64_DTPREL16_LO_DS
:
8063 if (((relocation
+ addend
) & 3) != 0)
8065 (*_bfd_error_handler
)
8066 (_("%s: error: relocation %s not a multiple of 4"),
8067 bfd_archive_filename (input_bfd
),
8068 ppc64_elf_howto_table
[(int) r_type
]->name
);
8069 bfd_set_error (bfd_error_bad_value
);
8076 case R_PPC64_REL14_BRNTAKEN
:
8077 case R_PPC64_REL14_BRTAKEN
:
8078 max_br_offset
= 1 << 15;
8082 max_br_offset
= 1 << 25;
8085 /* If the branch is out of reach, then redirect the
8086 call to the local stub for this function. */
8087 from
= (rel
->r_offset
8088 + input_section
->output_offset
8089 + input_section
->output_section
->vma
);
8090 if (relocation
+ addend
- from
+ max_br_offset
>= 2 * max_br_offset
8091 && (stub_entry
= ppc_get_stub_entry (input_section
, sec
, h
,
8092 rel
, htab
)) != NULL
)
8094 /* Munge up the value and addend so that we call the stub
8095 rather than the procedure directly. */
8096 relocation
= (stub_entry
->stub_offset
8097 + stub_entry
->stub_sec
->output_offset
8098 + stub_entry
->stub_sec
->output_section
->vma
);
8104 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
8105 because such sections are not SEC_ALLOC and thus ld.so will
8106 not process them. */
8107 if (unresolved_reloc
8108 && !((input_section
->flags
& SEC_DEBUGGING
) != 0
8109 && (h
->elf_link_hash_flags
& ELF_LINK_HASH_DEF_DYNAMIC
) != 0))
8111 (*_bfd_error_handler
)
8112 (_("%s(%s+0x%lx): unresolvable %s relocation against symbol `%s'"),
8113 bfd_archive_filename (input_bfd
),
8114 bfd_get_section_name (input_bfd
, input_section
),
8115 (long) rel
->r_offset
,
8116 ppc64_elf_howto_table
[(int) r_type
]->name
,
8117 h
->root
.root
.string
);
8121 r
= _bfd_final_link_relocate (ppc64_elf_howto_table
[(int) r_type
],
8129 if (r
!= bfd_reloc_ok
)
8131 if (sym_name
== NULL
)
8132 sym_name
= "(null)";
8133 if (r
== bfd_reloc_overflow
)
8138 && h
->root
.type
== bfd_link_hash_undefweak
8139 && ppc64_elf_howto_table
[(int) r_type
]->pc_relative
)
8141 /* Assume this is a call protected by other code that
8142 detects the symbol is undefined. If this is the case,
8143 we can safely ignore the overflow. If not, the
8144 program is hosed anyway, and a little warning isn't
8150 if (!((*info
->callbacks
->reloc_overflow
)
8151 (info
, sym_name
, ppc64_elf_howto_table
[(int) r_type
]->name
,
8152 rel
->r_addend
, input_bfd
, input_section
, rel
->r_offset
)))
8157 (*_bfd_error_handler
)
8158 (_("%s(%s+0x%lx): %s reloc against `%s': error %d"),
8159 bfd_archive_filename (input_bfd
),
8160 bfd_get_section_name (input_bfd
, input_section
),
8161 (long) rel
->r_offset
,
8162 ppc64_elf_howto_table
[(int) r_type
]->name
,
8173 /* Finish up dynamic symbol handling. We set the contents of various
8174 dynamic sections here. */
8177 ppc64_elf_finish_dynamic_symbol (output_bfd
, info
, h
, sym
)
8179 struct bfd_link_info
*info
;
8180 struct elf_link_hash_entry
*h
;
8181 Elf_Internal_Sym
*sym
;
8183 struct ppc_link_hash_table
*htab
;
8186 htab
= ppc_hash_table (info
);
8187 dynobj
= htab
->elf
.dynobj
;
8189 if (((struct ppc_link_hash_entry
*) h
)->is_func_descriptor
)
8191 struct plt_entry
*ent
;
8192 Elf_Internal_Rela rela
;
8195 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
8196 if (ent
->plt
.offset
!= (bfd_vma
) -1)
8198 /* This symbol has an entry in the procedure linkage
8199 table. Set it up. */
8201 if (htab
->splt
== NULL
8202 || htab
->srelplt
== NULL
8203 || htab
->sglink
== NULL
)
8206 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8207 fill in the PLT entry. */
8208 rela
.r_offset
= (htab
->splt
->output_section
->vma
8209 + htab
->splt
->output_offset
8211 rela
.r_info
= ELF64_R_INFO (h
->dynindx
, R_PPC64_JMP_SLOT
);
8212 rela
.r_addend
= ent
->addend
;
8214 loc
= htab
->srelplt
->contents
;
8215 loc
+= ((ent
->plt
.offset
- PLT_INITIAL_ENTRY_SIZE
) / PLT_ENTRY_SIZE
8216 * sizeof (Elf64_External_Rela
));
8217 bfd_elf64_swap_reloca_out (output_bfd
, &rela
, loc
);
8221 if ((h
->elf_link_hash_flags
& ELF_LINK_HASH_NEEDS_COPY
) != 0)
8223 Elf_Internal_Rela rela
;
8226 /* This symbol needs a copy reloc. Set it up. */
8228 if (h
->dynindx
== -1
8229 || (h
->root
.type
!= bfd_link_hash_defined
8230 && h
->root
.type
!= bfd_link_hash_defweak
)
8231 || htab
->srelbss
== NULL
)
8234 rela
.r_offset
= (h
->root
.u
.def
.value
8235 + h
->root
.u
.def
.section
->output_section
->vma
8236 + h
->root
.u
.def
.section
->output_offset
);
8237 rela
.r_info
= ELF64_R_INFO (h
->dynindx
, R_PPC64_COPY
);
8239 loc
= htab
->srelbss
->contents
;
8240 loc
+= htab
->srelbss
->reloc_count
++ * sizeof (Elf64_External_Rela
);
8241 bfd_elf64_swap_reloca_out (output_bfd
, &rela
, loc
);
8244 /* Mark some specially defined symbols as absolute. */
8245 if (strcmp (h
->root
.root
.string
, "_DYNAMIC") == 0)
8246 sym
->st_shndx
= SHN_ABS
;
8251 /* Used to decide how to sort relocs in an optimal manner for the
8252 dynamic linker, before writing them out. */
8254 static enum elf_reloc_type_class
8255 ppc64_elf_reloc_type_class (rela
)
8256 const Elf_Internal_Rela
*rela
;
8258 enum elf_ppc64_reloc_type r_type
;
8260 r_type
= (enum elf_ppc64_reloc_type
) ELF64_R_TYPE (rela
->r_info
);
8263 case R_PPC64_RELATIVE
:
8264 return reloc_class_relative
;
8265 case R_PPC64_JMP_SLOT
:
8266 return reloc_class_plt
;
8268 return reloc_class_copy
;
8270 return reloc_class_normal
;
8274 /* Finish up the dynamic sections. */
8277 ppc64_elf_finish_dynamic_sections (output_bfd
, info
)
8279 struct bfd_link_info
*info
;
8281 struct ppc_link_hash_table
*htab
;
8285 htab
= ppc_hash_table (info
);
8286 dynobj
= htab
->elf
.dynobj
;
8287 sdyn
= bfd_get_section_by_name (dynobj
, ".dynamic");
8289 if (htab
->elf
.dynamic_sections_created
)
8291 Elf64_External_Dyn
*dyncon
, *dynconend
;
8293 if (sdyn
== NULL
|| htab
->sgot
== NULL
)
8296 dyncon
= (Elf64_External_Dyn
*) sdyn
->contents
;
8297 dynconend
= (Elf64_External_Dyn
*) (sdyn
->contents
+ sdyn
->_raw_size
);
8298 for (; dyncon
< dynconend
; dyncon
++)
8300 Elf_Internal_Dyn dyn
;
8303 bfd_elf64_swap_dyn_in (dynobj
, dyncon
, &dyn
);
8310 case DT_PPC64_GLINK
:
8312 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
8316 s
= bfd_get_section_by_name (output_bfd
, ".opd");
8319 dyn
.d_un
.d_ptr
= s
->vma
;
8322 case DT_PPC64_OPDSZ
:
8323 s
= bfd_get_section_by_name (output_bfd
, ".opd");
8326 dyn
.d_un
.d_val
= s
->_raw_size
;
8331 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
8336 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
8340 dyn
.d_un
.d_val
= htab
->srelplt
->_raw_size
;
8344 /* Don't count procedure linkage table relocs in the
8345 overall reloc count. */
8349 dyn
.d_un
.d_val
-= s
->_raw_size
;
8353 /* We may not be using the standard ELF linker script.
8354 If .rela.plt is the first .rela section, we adjust
8355 DT_RELA to not include it. */
8359 if (dyn
.d_un
.d_ptr
!= s
->output_section
->vma
+ s
->output_offset
)
8361 dyn
.d_un
.d_ptr
+= s
->_raw_size
;
8365 bfd_elf64_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
8369 if (htab
->sgot
!= NULL
&& htab
->sgot
->_raw_size
!= 0)
8371 /* Fill in the first entry in the global offset table.
8372 We use it to hold the link-time TOCbase. */
8373 bfd_put_64 (output_bfd
,
8374 elf_gp (output_bfd
) + TOC_BASE_OFF
,
8375 htab
->sgot
->contents
);
8377 /* Set .got entry size. */
8378 elf_section_data (htab
->sgot
->output_section
)->this_hdr
.sh_entsize
= 8;
8381 if (htab
->splt
!= NULL
&& htab
->splt
->_raw_size
!= 0)
8383 /* Set .plt entry size. */
8384 elf_section_data (htab
->splt
->output_section
)->this_hdr
.sh_entsize
8391 #define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8392 #define TARGET_LITTLE_NAME "elf64-powerpcle"
8393 #define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8394 #define TARGET_BIG_NAME "elf64-powerpc"
8395 #define ELF_ARCH bfd_arch_powerpc
8396 #define ELF_MACHINE_CODE EM_PPC64
8397 #define ELF_MAXPAGESIZE 0x10000
8398 #define elf_info_to_howto ppc64_elf_info_to_howto
8400 #ifdef EM_CYGNUS_POWERPC
8401 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8405 #define ELF_MACHINE_ALT2 EM_PPC_OLD
8408 #define elf_backend_want_got_sym 0
8409 #define elf_backend_want_plt_sym 0
8410 #define elf_backend_plt_alignment 3
8411 #define elf_backend_plt_not_loaded 1
8412 #define elf_backend_got_symbol_offset 0
8413 #define elf_backend_got_header_size 8
8414 #define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
8415 #define elf_backend_can_gc_sections 1
8416 #define elf_backend_can_refcount 1
8417 #define elf_backend_rela_normal 1
8419 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
8420 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
8421 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
8422 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
8423 #define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
8425 #define elf_backend_object_p ppc64_elf_object_p
8426 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8427 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8428 #define elf_backend_check_relocs ppc64_elf_check_relocs
8429 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8430 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8431 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
8432 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
8433 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
8434 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
8435 #define elf_backend_relocate_section ppc64_elf_relocate_section
8436 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8437 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8438 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
8440 #include "elf64-target.h"