* elf64-ppc.c (ppc_build_one_stub): Correct rel_hdr.sh_size.
[binutils.git] / bfd / elf64-ppc.c
blob71c77b5bb270243eaef8d9454a5d50f2bab2b961
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
3 Free Software Foundation, Inc.
4 Written by Linus Nordberg, Swox AB <info@swox.com>,
5 based on elf32-ppc.c by Ian Lance Taylor.
6 Largely rewritten by Alan Modra <amodra@bigpond.net.au>
8 This file is part of BFD, the Binary File Descriptor library.
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License along
21 with this program; if not, write to the Free Software Foundation, Inc.,
22 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
25 /* The 64-bit PowerPC ELF ABI may be found at
26 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
27 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
29 #include "sysdep.h"
30 #include <stdarg.h>
31 #include "bfd.h"
32 #include "bfdlink.h"
33 #include "libbfd.h"
34 #include "elf-bfd.h"
35 #include "elf/ppc64.h"
36 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *);
59 #define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM bfd_elf64_powerpc_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_MACHINE_CODE EM_PPC64
65 #define ELF_MAXPAGESIZE 0x10000
66 #define ELF_COMMONPAGESIZE 0x1000
67 #define elf_info_to_howto ppc64_elf_info_to_howto
69 #define elf_backend_want_got_sym 0
70 #define elf_backend_want_plt_sym 0
71 #define elf_backend_plt_alignment 3
72 #define elf_backend_plt_not_loaded 1
73 #define elf_backend_got_header_size 8
74 #define elf_backend_can_gc_sections 1
75 #define elf_backend_can_refcount 1
76 #define elf_backend_rela_normal 1
77 #define elf_backend_default_execstack 0
79 #define bfd_elf64_mkobject ppc64_elf_mkobject
80 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
81 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
82 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
83 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
84 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
85 #define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
86 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
88 #define elf_backend_object_p ppc64_elf_object_p
89 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
90 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
91 #define elf_backend_write_core_note ppc64_elf_write_core_note
92 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
93 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
94 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
95 #define elf_backend_check_directives ppc64_elf_check_directives
96 #define elf_backend_as_needed_cleanup ppc64_elf_as_needed_cleanup
97 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
98 #define elf_backend_check_relocs ppc64_elf_check_relocs
99 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
100 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
101 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
102 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
103 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
104 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
105 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
106 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
107 #define elf_backend_action_discarded ppc64_elf_action_discarded
108 #define elf_backend_relocate_section ppc64_elf_relocate_section
109 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
110 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
111 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
112 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
113 #define elf_backend_special_sections ppc64_elf_special_sections
115 /* The name of the dynamic interpreter. This is put in the .interp
116 section. */
117 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
119 /* The size in bytes of an entry in the procedure linkage table. */
120 #define PLT_ENTRY_SIZE 24
122 /* The initial size of the plt reserved for the dynamic linker. */
123 #define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
125 /* TOC base pointers offset from start of TOC. */
126 #define TOC_BASE_OFF 0x8000
128 /* Offset of tp and dtp pointers from start of TLS block. */
129 #define TP_OFFSET 0x7000
130 #define DTP_OFFSET 0x8000
132 /* .plt call stub instructions. The normal stub is like this, but
133 sometimes the .plt entry crosses a 64k boundary and we need to
134 insert an addi to adjust r12. */
135 #define PLT_CALL_STUB_SIZE (7*4)
136 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
137 #define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
138 #define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
139 #define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
140 #define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
141 /* ld %r11,xxx+16@l(%r12) */
142 #define BCTR 0x4e800420 /* bctr */
145 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,off@ha */
146 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
147 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
148 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
150 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
151 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
153 #define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
155 /* glink call stub instructions. We enter with the index in R0. */
156 #define GLINK_CALL_STUB_SIZE (16*4)
157 /* 0: */
158 /* .quad plt0-1f */
159 /* __glink: */
160 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
161 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
162 /* 1: */
163 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
164 #define LD_R2_M16R11 0xe84bfff0 /* ld %2,(0b-1b)(%11) */
165 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
166 #define ADD_R12_R2_R11 0x7d825a14 /* add %12,%2,%11 */
167 /* ld %11,0(%12) */
168 /* ld %2,8(%12) */
169 /* mtctr %11 */
170 /* ld %11,16(%12) */
171 /* bctr */
173 /* Pad with this. */
174 #define NOP 0x60000000
176 /* Some other nops. */
177 #define CROR_151515 0x4def7b82
178 #define CROR_313131 0x4ffffb82
180 /* .glink entries for the first 32k functions are two instructions. */
181 #define LI_R0_0 0x38000000 /* li %r0,0 */
182 #define B_DOT 0x48000000 /* b . */
184 /* After that, we need two instructions to load the index, followed by
185 a branch. */
186 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
187 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
189 /* Instructions used by the save and restore reg functions. */
190 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
191 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
192 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
193 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
194 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
195 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
196 #define LI_R12_0 0x39800000 /* li %r12,0 */
197 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
198 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
199 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
200 #define BLR 0x4e800020 /* blr */
202 /* Since .opd is an array of descriptors and each entry will end up
203 with identical R_PPC64_RELATIVE relocs, there is really no need to
204 propagate .opd relocs; The dynamic linker should be taught to
205 relocate .opd without reloc entries. */
206 #ifndef NO_OPD_RELOCS
207 #define NO_OPD_RELOCS 0
208 #endif
210 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
212 /* Relocation HOWTO's. */
213 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
215 static reloc_howto_type ppc64_elf_howto_raw[] = {
216 /* This reloc does nothing. */
217 HOWTO (R_PPC64_NONE, /* type */
218 0, /* rightshift */
219 2, /* size (0 = byte, 1 = short, 2 = long) */
220 32, /* bitsize */
221 FALSE, /* pc_relative */
222 0, /* bitpos */
223 complain_overflow_dont, /* complain_on_overflow */
224 bfd_elf_generic_reloc, /* special_function */
225 "R_PPC64_NONE", /* name */
226 FALSE, /* partial_inplace */
227 0, /* src_mask */
228 0, /* dst_mask */
229 FALSE), /* pcrel_offset */
231 /* A standard 32 bit relocation. */
232 HOWTO (R_PPC64_ADDR32, /* type */
233 0, /* rightshift */
234 2, /* size (0 = byte, 1 = short, 2 = long) */
235 32, /* bitsize */
236 FALSE, /* pc_relative */
237 0, /* bitpos */
238 complain_overflow_bitfield, /* complain_on_overflow */
239 bfd_elf_generic_reloc, /* special_function */
240 "R_PPC64_ADDR32", /* name */
241 FALSE, /* partial_inplace */
242 0, /* src_mask */
243 0xffffffff, /* dst_mask */
244 FALSE), /* pcrel_offset */
246 /* An absolute 26 bit branch; the lower two bits must be zero.
247 FIXME: we don't check that, we just clear them. */
248 HOWTO (R_PPC64_ADDR24, /* type */
249 0, /* rightshift */
250 2, /* size (0 = byte, 1 = short, 2 = long) */
251 26, /* bitsize */
252 FALSE, /* pc_relative */
253 0, /* bitpos */
254 complain_overflow_bitfield, /* complain_on_overflow */
255 bfd_elf_generic_reloc, /* special_function */
256 "R_PPC64_ADDR24", /* name */
257 FALSE, /* partial_inplace */
258 0, /* src_mask */
259 0x03fffffc, /* dst_mask */
260 FALSE), /* pcrel_offset */
262 /* A standard 16 bit relocation. */
263 HOWTO (R_PPC64_ADDR16, /* type */
264 0, /* rightshift */
265 1, /* size (0 = byte, 1 = short, 2 = long) */
266 16, /* bitsize */
267 FALSE, /* pc_relative */
268 0, /* bitpos */
269 complain_overflow_bitfield, /* complain_on_overflow */
270 bfd_elf_generic_reloc, /* special_function */
271 "R_PPC64_ADDR16", /* name */
272 FALSE, /* partial_inplace */
273 0, /* src_mask */
274 0xffff, /* dst_mask */
275 FALSE), /* pcrel_offset */
277 /* A 16 bit relocation without overflow. */
278 HOWTO (R_PPC64_ADDR16_LO, /* type */
279 0, /* rightshift */
280 1, /* size (0 = byte, 1 = short, 2 = long) */
281 16, /* bitsize */
282 FALSE, /* pc_relative */
283 0, /* bitpos */
284 complain_overflow_dont,/* complain_on_overflow */
285 bfd_elf_generic_reloc, /* special_function */
286 "R_PPC64_ADDR16_LO", /* name */
287 FALSE, /* partial_inplace */
288 0, /* src_mask */
289 0xffff, /* dst_mask */
290 FALSE), /* pcrel_offset */
292 /* Bits 16-31 of an address. */
293 HOWTO (R_PPC64_ADDR16_HI, /* type */
294 16, /* rightshift */
295 1, /* size (0 = byte, 1 = short, 2 = long) */
296 16, /* bitsize */
297 FALSE, /* pc_relative */
298 0, /* bitpos */
299 complain_overflow_dont, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_PPC64_ADDR16_HI", /* name */
302 FALSE, /* partial_inplace */
303 0, /* src_mask */
304 0xffff, /* dst_mask */
305 FALSE), /* pcrel_offset */
307 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
308 bits, treated as a signed number, is negative. */
309 HOWTO (R_PPC64_ADDR16_HA, /* type */
310 16, /* rightshift */
311 1, /* size (0 = byte, 1 = short, 2 = long) */
312 16, /* bitsize */
313 FALSE, /* pc_relative */
314 0, /* bitpos */
315 complain_overflow_dont, /* complain_on_overflow */
316 ppc64_elf_ha_reloc, /* special_function */
317 "R_PPC64_ADDR16_HA", /* name */
318 FALSE, /* partial_inplace */
319 0, /* src_mask */
320 0xffff, /* dst_mask */
321 FALSE), /* pcrel_offset */
323 /* An absolute 16 bit branch; the lower two bits must be zero.
324 FIXME: we don't check that, we just clear them. */
325 HOWTO (R_PPC64_ADDR14, /* type */
326 0, /* rightshift */
327 2, /* size (0 = byte, 1 = short, 2 = long) */
328 16, /* bitsize */
329 FALSE, /* pc_relative */
330 0, /* bitpos */
331 complain_overflow_bitfield, /* complain_on_overflow */
332 ppc64_elf_branch_reloc, /* special_function */
333 "R_PPC64_ADDR14", /* name */
334 FALSE, /* partial_inplace */
335 0, /* src_mask */
336 0x0000fffc, /* dst_mask */
337 FALSE), /* pcrel_offset */
339 /* An absolute 16 bit branch, for which bit 10 should be set to
340 indicate that the branch is expected to be taken. The lower two
341 bits must be zero. */
342 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
343 0, /* rightshift */
344 2, /* size (0 = byte, 1 = short, 2 = long) */
345 16, /* bitsize */
346 FALSE, /* pc_relative */
347 0, /* bitpos */
348 complain_overflow_bitfield, /* complain_on_overflow */
349 ppc64_elf_brtaken_reloc, /* special_function */
350 "R_PPC64_ADDR14_BRTAKEN",/* name */
351 FALSE, /* partial_inplace */
352 0, /* src_mask */
353 0x0000fffc, /* dst_mask */
354 FALSE), /* pcrel_offset */
356 /* An absolute 16 bit branch, for which bit 10 should be set to
357 indicate that the branch is not expected to be taken. The lower
358 two bits must be zero. */
359 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 16, /* bitsize */
363 FALSE, /* pc_relative */
364 0, /* bitpos */
365 complain_overflow_bitfield, /* complain_on_overflow */
366 ppc64_elf_brtaken_reloc, /* special_function */
367 "R_PPC64_ADDR14_BRNTAKEN",/* name */
368 FALSE, /* partial_inplace */
369 0, /* src_mask */
370 0x0000fffc, /* dst_mask */
371 FALSE), /* pcrel_offset */
373 /* A relative 26 bit branch; the lower two bits must be zero. */
374 HOWTO (R_PPC64_REL24, /* type */
375 0, /* rightshift */
376 2, /* size (0 = byte, 1 = short, 2 = long) */
377 26, /* bitsize */
378 TRUE, /* pc_relative */
379 0, /* bitpos */
380 complain_overflow_signed, /* complain_on_overflow */
381 ppc64_elf_branch_reloc, /* special_function */
382 "R_PPC64_REL24", /* name */
383 FALSE, /* partial_inplace */
384 0, /* src_mask */
385 0x03fffffc, /* dst_mask */
386 TRUE), /* pcrel_offset */
388 /* A relative 16 bit branch; the lower two bits must be zero. */
389 HOWTO (R_PPC64_REL14, /* type */
390 0, /* rightshift */
391 2, /* size (0 = byte, 1 = short, 2 = long) */
392 16, /* bitsize */
393 TRUE, /* pc_relative */
394 0, /* bitpos */
395 complain_overflow_signed, /* complain_on_overflow */
396 ppc64_elf_branch_reloc, /* special_function */
397 "R_PPC64_REL14", /* name */
398 FALSE, /* partial_inplace */
399 0, /* src_mask */
400 0x0000fffc, /* dst_mask */
401 TRUE), /* pcrel_offset */
403 /* A relative 16 bit branch. Bit 10 should be set to indicate that
404 the branch is expected to be taken. The lower two bits must be
405 zero. */
406 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
407 0, /* rightshift */
408 2, /* size (0 = byte, 1 = short, 2 = long) */
409 16, /* bitsize */
410 TRUE, /* pc_relative */
411 0, /* bitpos */
412 complain_overflow_signed, /* complain_on_overflow */
413 ppc64_elf_brtaken_reloc, /* special_function */
414 "R_PPC64_REL14_BRTAKEN", /* name */
415 FALSE, /* partial_inplace */
416 0, /* src_mask */
417 0x0000fffc, /* dst_mask */
418 TRUE), /* pcrel_offset */
420 /* A relative 16 bit branch. Bit 10 should be set to indicate that
421 the branch is not expected to be taken. The lower two bits must
422 be zero. */
423 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
424 0, /* rightshift */
425 2, /* size (0 = byte, 1 = short, 2 = long) */
426 16, /* bitsize */
427 TRUE, /* pc_relative */
428 0, /* bitpos */
429 complain_overflow_signed, /* complain_on_overflow */
430 ppc64_elf_brtaken_reloc, /* special_function */
431 "R_PPC64_REL14_BRNTAKEN",/* name */
432 FALSE, /* partial_inplace */
433 0, /* src_mask */
434 0x0000fffc, /* dst_mask */
435 TRUE), /* pcrel_offset */
437 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
438 symbol. */
439 HOWTO (R_PPC64_GOT16, /* type */
440 0, /* rightshift */
441 1, /* size (0 = byte, 1 = short, 2 = long) */
442 16, /* bitsize */
443 FALSE, /* pc_relative */
444 0, /* bitpos */
445 complain_overflow_signed, /* complain_on_overflow */
446 ppc64_elf_unhandled_reloc, /* special_function */
447 "R_PPC64_GOT16", /* name */
448 FALSE, /* partial_inplace */
449 0, /* src_mask */
450 0xffff, /* dst_mask */
451 FALSE), /* pcrel_offset */
453 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
454 the symbol. */
455 HOWTO (R_PPC64_GOT16_LO, /* type */
456 0, /* rightshift */
457 1, /* size (0 = byte, 1 = short, 2 = long) */
458 16, /* bitsize */
459 FALSE, /* pc_relative */
460 0, /* bitpos */
461 complain_overflow_dont, /* complain_on_overflow */
462 ppc64_elf_unhandled_reloc, /* special_function */
463 "R_PPC64_GOT16_LO", /* name */
464 FALSE, /* partial_inplace */
465 0, /* src_mask */
466 0xffff, /* dst_mask */
467 FALSE), /* pcrel_offset */
469 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
470 the symbol. */
471 HOWTO (R_PPC64_GOT16_HI, /* type */
472 16, /* rightshift */
473 1, /* size (0 = byte, 1 = short, 2 = long) */
474 16, /* bitsize */
475 FALSE, /* pc_relative */
476 0, /* bitpos */
477 complain_overflow_dont,/* complain_on_overflow */
478 ppc64_elf_unhandled_reloc, /* special_function */
479 "R_PPC64_GOT16_HI", /* name */
480 FALSE, /* partial_inplace */
481 0, /* src_mask */
482 0xffff, /* dst_mask */
483 FALSE), /* pcrel_offset */
485 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
486 the symbol. */
487 HOWTO (R_PPC64_GOT16_HA, /* type */
488 16, /* rightshift */
489 1, /* size (0 = byte, 1 = short, 2 = long) */
490 16, /* bitsize */
491 FALSE, /* pc_relative */
492 0, /* bitpos */
493 complain_overflow_dont,/* complain_on_overflow */
494 ppc64_elf_unhandled_reloc, /* special_function */
495 "R_PPC64_GOT16_HA", /* name */
496 FALSE, /* partial_inplace */
497 0, /* src_mask */
498 0xffff, /* dst_mask */
499 FALSE), /* pcrel_offset */
501 /* This is used only by the dynamic linker. The symbol should exist
502 both in the object being run and in some shared library. The
503 dynamic linker copies the data addressed by the symbol from the
504 shared library into the object, because the object being
505 run has to have the data at some particular address. */
506 HOWTO (R_PPC64_COPY, /* type */
507 0, /* rightshift */
508 0, /* this one is variable size */
509 0, /* bitsize */
510 FALSE, /* pc_relative */
511 0, /* bitpos */
512 complain_overflow_dont, /* complain_on_overflow */
513 ppc64_elf_unhandled_reloc, /* special_function */
514 "R_PPC64_COPY", /* name */
515 FALSE, /* partial_inplace */
516 0, /* src_mask */
517 0, /* dst_mask */
518 FALSE), /* pcrel_offset */
520 /* Like R_PPC64_ADDR64, but used when setting global offset table
521 entries. */
522 HOWTO (R_PPC64_GLOB_DAT, /* type */
523 0, /* rightshift */
524 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
525 64, /* bitsize */
526 FALSE, /* pc_relative */
527 0, /* bitpos */
528 complain_overflow_dont, /* complain_on_overflow */
529 ppc64_elf_unhandled_reloc, /* special_function */
530 "R_PPC64_GLOB_DAT", /* name */
531 FALSE, /* partial_inplace */
532 0, /* src_mask */
533 ONES (64), /* dst_mask */
534 FALSE), /* pcrel_offset */
536 /* Created by the link editor. Marks a procedure linkage table
537 entry for a symbol. */
538 HOWTO (R_PPC64_JMP_SLOT, /* type */
539 0, /* rightshift */
540 0, /* size (0 = byte, 1 = short, 2 = long) */
541 0, /* bitsize */
542 FALSE, /* pc_relative */
543 0, /* bitpos */
544 complain_overflow_dont, /* complain_on_overflow */
545 ppc64_elf_unhandled_reloc, /* special_function */
546 "R_PPC64_JMP_SLOT", /* name */
547 FALSE, /* partial_inplace */
548 0, /* src_mask */
549 0, /* dst_mask */
550 FALSE), /* pcrel_offset */
552 /* Used only by the dynamic linker. When the object is run, this
553 doubleword64 is set to the load address of the object, plus the
554 addend. */
555 HOWTO (R_PPC64_RELATIVE, /* type */
556 0, /* rightshift */
557 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
558 64, /* bitsize */
559 FALSE, /* pc_relative */
560 0, /* bitpos */
561 complain_overflow_dont, /* complain_on_overflow */
562 bfd_elf_generic_reloc, /* special_function */
563 "R_PPC64_RELATIVE", /* name */
564 FALSE, /* partial_inplace */
565 0, /* src_mask */
566 ONES (64), /* dst_mask */
567 FALSE), /* pcrel_offset */
569 /* Like R_PPC64_ADDR32, but may be unaligned. */
570 HOWTO (R_PPC64_UADDR32, /* type */
571 0, /* rightshift */
572 2, /* size (0 = byte, 1 = short, 2 = long) */
573 32, /* bitsize */
574 FALSE, /* pc_relative */
575 0, /* bitpos */
576 complain_overflow_bitfield, /* complain_on_overflow */
577 bfd_elf_generic_reloc, /* special_function */
578 "R_PPC64_UADDR32", /* name */
579 FALSE, /* partial_inplace */
580 0, /* src_mask */
581 0xffffffff, /* dst_mask */
582 FALSE), /* pcrel_offset */
584 /* Like R_PPC64_ADDR16, but may be unaligned. */
585 HOWTO (R_PPC64_UADDR16, /* type */
586 0, /* rightshift */
587 1, /* size (0 = byte, 1 = short, 2 = long) */
588 16, /* bitsize */
589 FALSE, /* pc_relative */
590 0, /* bitpos */
591 complain_overflow_bitfield, /* complain_on_overflow */
592 bfd_elf_generic_reloc, /* special_function */
593 "R_PPC64_UADDR16", /* name */
594 FALSE, /* partial_inplace */
595 0, /* src_mask */
596 0xffff, /* dst_mask */
597 FALSE), /* pcrel_offset */
599 /* 32-bit PC relative. */
600 HOWTO (R_PPC64_REL32, /* type */
601 0, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 32, /* bitsize */
604 TRUE, /* pc_relative */
605 0, /* bitpos */
606 /* FIXME: Verify. Was complain_overflow_bitfield. */
607 complain_overflow_signed, /* complain_on_overflow */
608 bfd_elf_generic_reloc, /* special_function */
609 "R_PPC64_REL32", /* name */
610 FALSE, /* partial_inplace */
611 0, /* src_mask */
612 0xffffffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
615 /* 32-bit relocation to the symbol's procedure linkage table. */
616 HOWTO (R_PPC64_PLT32, /* type */
617 0, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 32, /* bitsize */
620 FALSE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_bitfield, /* complain_on_overflow */
623 ppc64_elf_unhandled_reloc, /* special_function */
624 "R_PPC64_PLT32", /* name */
625 FALSE, /* partial_inplace */
626 0, /* src_mask */
627 0xffffffff, /* dst_mask */
628 FALSE), /* pcrel_offset */
630 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
631 FIXME: R_PPC64_PLTREL32 not supported. */
632 HOWTO (R_PPC64_PLTREL32, /* type */
633 0, /* rightshift */
634 2, /* size (0 = byte, 1 = short, 2 = long) */
635 32, /* bitsize */
636 TRUE, /* pc_relative */
637 0, /* bitpos */
638 complain_overflow_signed, /* complain_on_overflow */
639 bfd_elf_generic_reloc, /* special_function */
640 "R_PPC64_PLTREL32", /* name */
641 FALSE, /* partial_inplace */
642 0, /* src_mask */
643 0xffffffff, /* dst_mask */
644 TRUE), /* pcrel_offset */
646 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
647 the symbol. */
648 HOWTO (R_PPC64_PLT16_LO, /* type */
649 0, /* rightshift */
650 1, /* size (0 = byte, 1 = short, 2 = long) */
651 16, /* bitsize */
652 FALSE, /* pc_relative */
653 0, /* bitpos */
654 complain_overflow_dont, /* complain_on_overflow */
655 ppc64_elf_unhandled_reloc, /* special_function */
656 "R_PPC64_PLT16_LO", /* name */
657 FALSE, /* partial_inplace */
658 0, /* src_mask */
659 0xffff, /* dst_mask */
660 FALSE), /* pcrel_offset */
662 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
663 the symbol. */
664 HOWTO (R_PPC64_PLT16_HI, /* type */
665 16, /* rightshift */
666 1, /* size (0 = byte, 1 = short, 2 = long) */
667 16, /* bitsize */
668 FALSE, /* pc_relative */
669 0, /* bitpos */
670 complain_overflow_dont, /* complain_on_overflow */
671 ppc64_elf_unhandled_reloc, /* special_function */
672 "R_PPC64_PLT16_HI", /* name */
673 FALSE, /* partial_inplace */
674 0, /* src_mask */
675 0xffff, /* dst_mask */
676 FALSE), /* pcrel_offset */
678 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
679 the symbol. */
680 HOWTO (R_PPC64_PLT16_HA, /* type */
681 16, /* rightshift */
682 1, /* size (0 = byte, 1 = short, 2 = long) */
683 16, /* bitsize */
684 FALSE, /* pc_relative */
685 0, /* bitpos */
686 complain_overflow_dont, /* complain_on_overflow */
687 ppc64_elf_unhandled_reloc, /* special_function */
688 "R_PPC64_PLT16_HA", /* name */
689 FALSE, /* partial_inplace */
690 0, /* src_mask */
691 0xffff, /* dst_mask */
692 FALSE), /* pcrel_offset */
694 /* 16-bit section relative relocation. */
695 HOWTO (R_PPC64_SECTOFF, /* type */
696 0, /* rightshift */
697 1, /* size (0 = byte, 1 = short, 2 = long) */
698 16, /* bitsize */
699 FALSE, /* pc_relative */
700 0, /* bitpos */
701 complain_overflow_bitfield, /* complain_on_overflow */
702 ppc64_elf_sectoff_reloc, /* special_function */
703 "R_PPC64_SECTOFF", /* name */
704 FALSE, /* partial_inplace */
705 0, /* src_mask */
706 0xffff, /* dst_mask */
707 FALSE), /* pcrel_offset */
709 /* Like R_PPC64_SECTOFF, but no overflow warning. */
710 HOWTO (R_PPC64_SECTOFF_LO, /* type */
711 0, /* rightshift */
712 1, /* size (0 = byte, 1 = short, 2 = long) */
713 16, /* bitsize */
714 FALSE, /* pc_relative */
715 0, /* bitpos */
716 complain_overflow_dont, /* complain_on_overflow */
717 ppc64_elf_sectoff_reloc, /* special_function */
718 "R_PPC64_SECTOFF_LO", /* name */
719 FALSE, /* partial_inplace */
720 0, /* src_mask */
721 0xffff, /* dst_mask */
722 FALSE), /* pcrel_offset */
724 /* 16-bit upper half section relative relocation. */
725 HOWTO (R_PPC64_SECTOFF_HI, /* type */
726 16, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
729 FALSE, /* pc_relative */
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
732 ppc64_elf_sectoff_reloc, /* special_function */
733 "R_PPC64_SECTOFF_HI", /* name */
734 FALSE, /* partial_inplace */
735 0, /* src_mask */
736 0xffff, /* dst_mask */
737 FALSE), /* pcrel_offset */
739 /* 16-bit upper half adjusted section relative relocation. */
740 HOWTO (R_PPC64_SECTOFF_HA, /* type */
741 16, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
744 FALSE, /* pc_relative */
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 ppc64_elf_sectoff_ha_reloc, /* special_function */
748 "R_PPC64_SECTOFF_HA", /* name */
749 FALSE, /* partial_inplace */
750 0, /* src_mask */
751 0xffff, /* dst_mask */
752 FALSE), /* pcrel_offset */
754 /* Like R_PPC64_REL24 without touching the two least significant bits. */
755 HOWTO (R_PPC64_REL30, /* type */
756 2, /* rightshift */
757 2, /* size (0 = byte, 1 = short, 2 = long) */
758 30, /* bitsize */
759 TRUE, /* pc_relative */
760 0, /* bitpos */
761 complain_overflow_dont, /* complain_on_overflow */
762 bfd_elf_generic_reloc, /* special_function */
763 "R_PPC64_REL30", /* name */
764 FALSE, /* partial_inplace */
765 0, /* src_mask */
766 0xfffffffc, /* dst_mask */
767 TRUE), /* pcrel_offset */
769 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
771 /* A standard 64-bit relocation. */
772 HOWTO (R_PPC64_ADDR64, /* type */
773 0, /* rightshift */
774 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
775 64, /* bitsize */
776 FALSE, /* pc_relative */
777 0, /* bitpos */
778 complain_overflow_dont, /* complain_on_overflow */
779 bfd_elf_generic_reloc, /* special_function */
780 "R_PPC64_ADDR64", /* name */
781 FALSE, /* partial_inplace */
782 0, /* src_mask */
783 ONES (64), /* dst_mask */
784 FALSE), /* pcrel_offset */
786 /* The bits 32-47 of an address. */
787 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
788 32, /* rightshift */
789 1, /* size (0 = byte, 1 = short, 2 = long) */
790 16, /* bitsize */
791 FALSE, /* pc_relative */
792 0, /* bitpos */
793 complain_overflow_dont, /* complain_on_overflow */
794 bfd_elf_generic_reloc, /* special_function */
795 "R_PPC64_ADDR16_HIGHER", /* name */
796 FALSE, /* partial_inplace */
797 0, /* src_mask */
798 0xffff, /* dst_mask */
799 FALSE), /* pcrel_offset */
801 /* The bits 32-47 of an address, plus 1 if the contents of the low
802 16 bits, treated as a signed number, is negative. */
803 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
804 32, /* rightshift */
805 1, /* size (0 = byte, 1 = short, 2 = long) */
806 16, /* bitsize */
807 FALSE, /* pc_relative */
808 0, /* bitpos */
809 complain_overflow_dont, /* complain_on_overflow */
810 ppc64_elf_ha_reloc, /* special_function */
811 "R_PPC64_ADDR16_HIGHERA", /* name */
812 FALSE, /* partial_inplace */
813 0, /* src_mask */
814 0xffff, /* dst_mask */
815 FALSE), /* pcrel_offset */
817 /* The bits 48-63 of an address. */
818 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
819 48, /* rightshift */
820 1, /* size (0 = byte, 1 = short, 2 = long) */
821 16, /* bitsize */
822 FALSE, /* pc_relative */
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
825 bfd_elf_generic_reloc, /* special_function */
826 "R_PPC64_ADDR16_HIGHEST", /* name */
827 FALSE, /* partial_inplace */
828 0, /* src_mask */
829 0xffff, /* dst_mask */
830 FALSE), /* pcrel_offset */
832 /* The bits 48-63 of an address, plus 1 if the contents of the low
833 16 bits, treated as a signed number, is negative. */
834 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
835 48, /* rightshift */
836 1, /* size (0 = byte, 1 = short, 2 = long) */
837 16, /* bitsize */
838 FALSE, /* pc_relative */
839 0, /* bitpos */
840 complain_overflow_dont, /* complain_on_overflow */
841 ppc64_elf_ha_reloc, /* special_function */
842 "R_PPC64_ADDR16_HIGHESTA", /* name */
843 FALSE, /* partial_inplace */
844 0, /* src_mask */
845 0xffff, /* dst_mask */
846 FALSE), /* pcrel_offset */
848 /* Like ADDR64, but may be unaligned. */
849 HOWTO (R_PPC64_UADDR64, /* type */
850 0, /* rightshift */
851 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
852 64, /* bitsize */
853 FALSE, /* pc_relative */
854 0, /* bitpos */
855 complain_overflow_dont, /* complain_on_overflow */
856 bfd_elf_generic_reloc, /* special_function */
857 "R_PPC64_UADDR64", /* name */
858 FALSE, /* partial_inplace */
859 0, /* src_mask */
860 ONES (64), /* dst_mask */
861 FALSE), /* pcrel_offset */
863 /* 64-bit relative relocation. */
864 HOWTO (R_PPC64_REL64, /* type */
865 0, /* rightshift */
866 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
867 64, /* bitsize */
868 TRUE, /* pc_relative */
869 0, /* bitpos */
870 complain_overflow_dont, /* complain_on_overflow */
871 bfd_elf_generic_reloc, /* special_function */
872 "R_PPC64_REL64", /* name */
873 FALSE, /* partial_inplace */
874 0, /* src_mask */
875 ONES (64), /* dst_mask */
876 TRUE), /* pcrel_offset */
878 /* 64-bit relocation to the symbol's procedure linkage table. */
879 HOWTO (R_PPC64_PLT64, /* type */
880 0, /* rightshift */
881 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
882 64, /* bitsize */
883 FALSE, /* pc_relative */
884 0, /* bitpos */
885 complain_overflow_dont, /* complain_on_overflow */
886 ppc64_elf_unhandled_reloc, /* special_function */
887 "R_PPC64_PLT64", /* name */
888 FALSE, /* partial_inplace */
889 0, /* src_mask */
890 ONES (64), /* dst_mask */
891 FALSE), /* pcrel_offset */
893 /* 64-bit PC relative relocation to the symbol's procedure linkage
894 table. */
895 /* FIXME: R_PPC64_PLTREL64 not supported. */
896 HOWTO (R_PPC64_PLTREL64, /* type */
897 0, /* rightshift */
898 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
899 64, /* bitsize */
900 TRUE, /* pc_relative */
901 0, /* bitpos */
902 complain_overflow_dont, /* complain_on_overflow */
903 ppc64_elf_unhandled_reloc, /* special_function */
904 "R_PPC64_PLTREL64", /* name */
905 FALSE, /* partial_inplace */
906 0, /* src_mask */
907 ONES (64), /* dst_mask */
908 TRUE), /* pcrel_offset */
910 /* 16 bit TOC-relative relocation. */
912 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
913 HOWTO (R_PPC64_TOC16, /* type */
914 0, /* rightshift */
915 1, /* size (0 = byte, 1 = short, 2 = long) */
916 16, /* bitsize */
917 FALSE, /* pc_relative */
918 0, /* bitpos */
919 complain_overflow_signed, /* complain_on_overflow */
920 ppc64_elf_toc_reloc, /* special_function */
921 "R_PPC64_TOC16", /* name */
922 FALSE, /* partial_inplace */
923 0, /* src_mask */
924 0xffff, /* dst_mask */
925 FALSE), /* pcrel_offset */
927 /* 16 bit TOC-relative relocation without overflow. */
929 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
930 HOWTO (R_PPC64_TOC16_LO, /* type */
931 0, /* rightshift */
932 1, /* size (0 = byte, 1 = short, 2 = long) */
933 16, /* bitsize */
934 FALSE, /* pc_relative */
935 0, /* bitpos */
936 complain_overflow_dont, /* complain_on_overflow */
937 ppc64_elf_toc_reloc, /* special_function */
938 "R_PPC64_TOC16_LO", /* name */
939 FALSE, /* partial_inplace */
940 0, /* src_mask */
941 0xffff, /* dst_mask */
942 FALSE), /* pcrel_offset */
944 /* 16 bit TOC-relative relocation, high 16 bits. */
946 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
947 HOWTO (R_PPC64_TOC16_HI, /* type */
948 16, /* rightshift */
949 1, /* size (0 = byte, 1 = short, 2 = long) */
950 16, /* bitsize */
951 FALSE, /* pc_relative */
952 0, /* bitpos */
953 complain_overflow_dont, /* complain_on_overflow */
954 ppc64_elf_toc_reloc, /* special_function */
955 "R_PPC64_TOC16_HI", /* name */
956 FALSE, /* partial_inplace */
957 0, /* src_mask */
958 0xffff, /* dst_mask */
959 FALSE), /* pcrel_offset */
961 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
962 contents of the low 16 bits, treated as a signed number, is
963 negative. */
965 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
966 HOWTO (R_PPC64_TOC16_HA, /* type */
967 16, /* rightshift */
968 1, /* size (0 = byte, 1 = short, 2 = long) */
969 16, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_dont, /* complain_on_overflow */
973 ppc64_elf_toc_ha_reloc, /* special_function */
974 "R_PPC64_TOC16_HA", /* name */
975 FALSE, /* partial_inplace */
976 0, /* src_mask */
977 0xffff, /* dst_mask */
978 FALSE), /* pcrel_offset */
980 /* 64-bit relocation; insert value of TOC base (.TOC.). */
982 /* R_PPC64_TOC 51 doubleword64 .TOC. */
983 HOWTO (R_PPC64_TOC, /* type */
984 0, /* rightshift */
985 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
986 64, /* bitsize */
987 FALSE, /* pc_relative */
988 0, /* bitpos */
989 complain_overflow_bitfield, /* complain_on_overflow */
990 ppc64_elf_toc64_reloc, /* special_function */
991 "R_PPC64_TOC", /* name */
992 FALSE, /* partial_inplace */
993 0, /* src_mask */
994 ONES (64), /* dst_mask */
995 FALSE), /* pcrel_offset */
997 /* Like R_PPC64_GOT16, but also informs the link editor that the
998 value to relocate may (!) refer to a PLT entry which the link
999 editor (a) may replace with the symbol value. If the link editor
1000 is unable to fully resolve the symbol, it may (b) create a PLT
1001 entry and store the address to the new PLT entry in the GOT.
1002 This permits lazy resolution of function symbols at run time.
1003 The link editor may also skip all of this and just (c) emit a
1004 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1005 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1006 HOWTO (R_PPC64_PLTGOT16, /* type */
1007 0, /* rightshift */
1008 1, /* size (0 = byte, 1 = short, 2 = long) */
1009 16, /* bitsize */
1010 FALSE, /* pc_relative */
1011 0, /* bitpos */
1012 complain_overflow_signed, /* complain_on_overflow */
1013 ppc64_elf_unhandled_reloc, /* special_function */
1014 "R_PPC64_PLTGOT16", /* name */
1015 FALSE, /* partial_inplace */
1016 0, /* src_mask */
1017 0xffff, /* dst_mask */
1018 FALSE), /* pcrel_offset */
1020 /* Like R_PPC64_PLTGOT16, but without overflow. */
1021 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1022 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
1026 FALSE, /* pc_relative */
1027 0, /* bitpos */
1028 complain_overflow_dont, /* complain_on_overflow */
1029 ppc64_elf_unhandled_reloc, /* special_function */
1030 "R_PPC64_PLTGOT16_LO", /* name */
1031 FALSE, /* partial_inplace */
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
1034 FALSE), /* pcrel_offset */
1036 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1037 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1038 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1039 16, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_PLTGOT16_HI", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xffff, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1052 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1053 1 if the contents of the low 16 bits, treated as a signed number,
1054 is negative. */
1055 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1056 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1057 16, /* rightshift */
1058 1, /* size (0 = byte, 1 = short, 2 = long) */
1059 16, /* bitsize */
1060 FALSE, /* pc_relative */
1061 0, /* bitpos */
1062 complain_overflow_dont,/* complain_on_overflow */
1063 ppc64_elf_unhandled_reloc, /* special_function */
1064 "R_PPC64_PLTGOT16_HA", /* name */
1065 FALSE, /* partial_inplace */
1066 0, /* src_mask */
1067 0xffff, /* dst_mask */
1068 FALSE), /* pcrel_offset */
1070 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1071 HOWTO (R_PPC64_ADDR16_DS, /* type */
1072 0, /* rightshift */
1073 1, /* size (0 = byte, 1 = short, 2 = long) */
1074 16, /* bitsize */
1075 FALSE, /* pc_relative */
1076 0, /* bitpos */
1077 complain_overflow_bitfield, /* complain_on_overflow */
1078 bfd_elf_generic_reloc, /* special_function */
1079 "R_PPC64_ADDR16_DS", /* name */
1080 FALSE, /* partial_inplace */
1081 0, /* src_mask */
1082 0xfffc, /* dst_mask */
1083 FALSE), /* pcrel_offset */
1085 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1086 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1087 0, /* rightshift */
1088 1, /* size (0 = byte, 1 = short, 2 = long) */
1089 16, /* bitsize */
1090 FALSE, /* pc_relative */
1091 0, /* bitpos */
1092 complain_overflow_dont,/* complain_on_overflow */
1093 bfd_elf_generic_reloc, /* special_function */
1094 "R_PPC64_ADDR16_LO_DS",/* name */
1095 FALSE, /* partial_inplace */
1096 0, /* src_mask */
1097 0xfffc, /* dst_mask */
1098 FALSE), /* pcrel_offset */
1100 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1101 HOWTO (R_PPC64_GOT16_DS, /* type */
1102 0, /* rightshift */
1103 1, /* size (0 = byte, 1 = short, 2 = long) */
1104 16, /* bitsize */
1105 FALSE, /* pc_relative */
1106 0, /* bitpos */
1107 complain_overflow_signed, /* complain_on_overflow */
1108 ppc64_elf_unhandled_reloc, /* special_function */
1109 "R_PPC64_GOT16_DS", /* name */
1110 FALSE, /* partial_inplace */
1111 0, /* src_mask */
1112 0xfffc, /* dst_mask */
1113 FALSE), /* pcrel_offset */
1115 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1116 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1117 0, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
1120 FALSE, /* pc_relative */
1121 0, /* bitpos */
1122 complain_overflow_dont, /* complain_on_overflow */
1123 ppc64_elf_unhandled_reloc, /* special_function */
1124 "R_PPC64_GOT16_LO_DS", /* name */
1125 FALSE, /* partial_inplace */
1126 0, /* src_mask */
1127 0xfffc, /* dst_mask */
1128 FALSE), /* pcrel_offset */
1130 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1131 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
1137 complain_overflow_dont, /* complain_on_overflow */
1138 ppc64_elf_unhandled_reloc, /* special_function */
1139 "R_PPC64_PLT16_LO_DS", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xfffc, /* dst_mask */
1143 FALSE), /* pcrel_offset */
1145 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1146 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1147 0, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_bitfield, /* complain_on_overflow */
1153 ppc64_elf_sectoff_reloc, /* special_function */
1154 "R_PPC64_SECTOFF_DS", /* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xfffc, /* dst_mask */
1158 FALSE), /* pcrel_offset */
1160 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1161 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1162 0, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_dont, /* complain_on_overflow */
1168 ppc64_elf_sectoff_reloc, /* special_function */
1169 "R_PPC64_SECTOFF_LO_DS",/* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xfffc, /* dst_mask */
1173 FALSE), /* pcrel_offset */
1175 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1176 HOWTO (R_PPC64_TOC16_DS, /* type */
1177 0, /* rightshift */
1178 1, /* size (0 = byte, 1 = short, 2 = long) */
1179 16, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_signed, /* complain_on_overflow */
1183 ppc64_elf_toc_reloc, /* special_function */
1184 "R_PPC64_TOC16_DS", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 0xfffc, /* dst_mask */
1188 FALSE), /* pcrel_offset */
1190 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1191 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1192 0, /* rightshift */
1193 1, /* size (0 = byte, 1 = short, 2 = long) */
1194 16, /* bitsize */
1195 FALSE, /* pc_relative */
1196 0, /* bitpos */
1197 complain_overflow_dont, /* complain_on_overflow */
1198 ppc64_elf_toc_reloc, /* special_function */
1199 "R_PPC64_TOC16_LO_DS", /* name */
1200 FALSE, /* partial_inplace */
1201 0, /* src_mask */
1202 0xfffc, /* dst_mask */
1203 FALSE), /* pcrel_offset */
1205 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1206 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1207 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1208 0, /* rightshift */
1209 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 16, /* bitsize */
1211 FALSE, /* pc_relative */
1212 0, /* bitpos */
1213 complain_overflow_signed, /* complain_on_overflow */
1214 ppc64_elf_unhandled_reloc, /* special_function */
1215 "R_PPC64_PLTGOT16_DS", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0xfffc, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1221 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1222 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1223 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_PLTGOT16_LO_DS",/* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xfffc, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1237 /* Marker reloc for TLS. */
1238 HOWTO (R_PPC64_TLS,
1239 0, /* rightshift */
1240 2, /* size (0 = byte, 1 = short, 2 = long) */
1241 32, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 bfd_elf_generic_reloc, /* special_function */
1246 "R_PPC64_TLS", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1252 /* Computes the load module index of the load module that contains the
1253 definition of its TLS sym. */
1254 HOWTO (R_PPC64_DTPMOD64,
1255 0, /* rightshift */
1256 4, /* size (0 = byte, 1 = short, 2 = long) */
1257 64, /* bitsize */
1258 FALSE, /* pc_relative */
1259 0, /* bitpos */
1260 complain_overflow_dont, /* complain_on_overflow */
1261 ppc64_elf_unhandled_reloc, /* special_function */
1262 "R_PPC64_DTPMOD64", /* name */
1263 FALSE, /* partial_inplace */
1264 0, /* src_mask */
1265 ONES (64), /* dst_mask */
1266 FALSE), /* pcrel_offset */
1268 /* Computes a dtv-relative displacement, the difference between the value
1269 of sym+add and the base address of the thread-local storage block that
1270 contains the definition of sym, minus 0x8000. */
1271 HOWTO (R_PPC64_DTPREL64,
1272 0, /* rightshift */
1273 4, /* size (0 = byte, 1 = short, 2 = long) */
1274 64, /* bitsize */
1275 FALSE, /* pc_relative */
1276 0, /* bitpos */
1277 complain_overflow_dont, /* complain_on_overflow */
1278 ppc64_elf_unhandled_reloc, /* special_function */
1279 "R_PPC64_DTPREL64", /* name */
1280 FALSE, /* partial_inplace */
1281 0, /* src_mask */
1282 ONES (64), /* dst_mask */
1283 FALSE), /* pcrel_offset */
1285 /* A 16 bit dtprel reloc. */
1286 HOWTO (R_PPC64_DTPREL16,
1287 0, /* rightshift */
1288 1, /* size (0 = byte, 1 = short, 2 = long) */
1289 16, /* bitsize */
1290 FALSE, /* pc_relative */
1291 0, /* bitpos */
1292 complain_overflow_signed, /* complain_on_overflow */
1293 ppc64_elf_unhandled_reloc, /* special_function */
1294 "R_PPC64_DTPREL16", /* name */
1295 FALSE, /* partial_inplace */
1296 0, /* src_mask */
1297 0xffff, /* dst_mask */
1298 FALSE), /* pcrel_offset */
1300 /* Like DTPREL16, but no overflow. */
1301 HOWTO (R_PPC64_DTPREL16_LO,
1302 0, /* rightshift */
1303 1, /* size (0 = byte, 1 = short, 2 = long) */
1304 16, /* bitsize */
1305 FALSE, /* pc_relative */
1306 0, /* bitpos */
1307 complain_overflow_dont, /* complain_on_overflow */
1308 ppc64_elf_unhandled_reloc, /* special_function */
1309 "R_PPC64_DTPREL16_LO", /* name */
1310 FALSE, /* partial_inplace */
1311 0, /* src_mask */
1312 0xffff, /* dst_mask */
1313 FALSE), /* pcrel_offset */
1315 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1316 HOWTO (R_PPC64_DTPREL16_HI,
1317 16, /* rightshift */
1318 1, /* size (0 = byte, 1 = short, 2 = long) */
1319 16, /* bitsize */
1320 FALSE, /* pc_relative */
1321 0, /* bitpos */
1322 complain_overflow_dont, /* complain_on_overflow */
1323 ppc64_elf_unhandled_reloc, /* special_function */
1324 "R_PPC64_DTPREL16_HI", /* name */
1325 FALSE, /* partial_inplace */
1326 0, /* src_mask */
1327 0xffff, /* dst_mask */
1328 FALSE), /* pcrel_offset */
1330 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1331 HOWTO (R_PPC64_DTPREL16_HA,
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
1338 ppc64_elf_unhandled_reloc, /* special_function */
1339 "R_PPC64_DTPREL16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1345 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1346 HOWTO (R_PPC64_DTPREL16_HIGHER,
1347 32, /* rightshift */
1348 1, /* size (0 = byte, 1 = short, 2 = long) */
1349 16, /* bitsize */
1350 FALSE, /* pc_relative */
1351 0, /* bitpos */
1352 complain_overflow_dont, /* complain_on_overflow */
1353 ppc64_elf_unhandled_reloc, /* special_function */
1354 "R_PPC64_DTPREL16_HIGHER", /* name */
1355 FALSE, /* partial_inplace */
1356 0, /* src_mask */
1357 0xffff, /* dst_mask */
1358 FALSE), /* pcrel_offset */
1360 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1361 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1362 32, /* rightshift */
1363 1, /* size (0 = byte, 1 = short, 2 = long) */
1364 16, /* bitsize */
1365 FALSE, /* pc_relative */
1366 0, /* bitpos */
1367 complain_overflow_dont, /* complain_on_overflow */
1368 ppc64_elf_unhandled_reloc, /* special_function */
1369 "R_PPC64_DTPREL16_HIGHERA", /* name */
1370 FALSE, /* partial_inplace */
1371 0, /* src_mask */
1372 0xffff, /* dst_mask */
1373 FALSE), /* pcrel_offset */
1375 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1376 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1377 48, /* rightshift */
1378 1, /* size (0 = byte, 1 = short, 2 = long) */
1379 16, /* bitsize */
1380 FALSE, /* pc_relative */
1381 0, /* bitpos */
1382 complain_overflow_dont, /* complain_on_overflow */
1383 ppc64_elf_unhandled_reloc, /* special_function */
1384 "R_PPC64_DTPREL16_HIGHEST", /* name */
1385 FALSE, /* partial_inplace */
1386 0, /* src_mask */
1387 0xffff, /* dst_mask */
1388 FALSE), /* pcrel_offset */
1390 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1391 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1392 48, /* rightshift */
1393 1, /* size (0 = byte, 1 = short, 2 = long) */
1394 16, /* bitsize */
1395 FALSE, /* pc_relative */
1396 0, /* bitpos */
1397 complain_overflow_dont, /* complain_on_overflow */
1398 ppc64_elf_unhandled_reloc, /* special_function */
1399 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1400 FALSE, /* partial_inplace */
1401 0, /* src_mask */
1402 0xffff, /* dst_mask */
1403 FALSE), /* pcrel_offset */
1405 /* Like DTPREL16, but for insns with a DS field. */
1406 HOWTO (R_PPC64_DTPREL16_DS,
1407 0, /* rightshift */
1408 1, /* size (0 = byte, 1 = short, 2 = long) */
1409 16, /* bitsize */
1410 FALSE, /* pc_relative */
1411 0, /* bitpos */
1412 complain_overflow_signed, /* complain_on_overflow */
1413 ppc64_elf_unhandled_reloc, /* special_function */
1414 "R_PPC64_DTPREL16_DS", /* name */
1415 FALSE, /* partial_inplace */
1416 0, /* src_mask */
1417 0xfffc, /* dst_mask */
1418 FALSE), /* pcrel_offset */
1420 /* Like DTPREL16_DS, but no overflow. */
1421 HOWTO (R_PPC64_DTPREL16_LO_DS,
1422 0, /* rightshift */
1423 1, /* size (0 = byte, 1 = short, 2 = long) */
1424 16, /* bitsize */
1425 FALSE, /* pc_relative */
1426 0, /* bitpos */
1427 complain_overflow_dont, /* complain_on_overflow */
1428 ppc64_elf_unhandled_reloc, /* special_function */
1429 "R_PPC64_DTPREL16_LO_DS", /* name */
1430 FALSE, /* partial_inplace */
1431 0, /* src_mask */
1432 0xfffc, /* dst_mask */
1433 FALSE), /* pcrel_offset */
1435 /* Computes a tp-relative displacement, the difference between the value of
1436 sym+add and the value of the thread pointer (r13). */
1437 HOWTO (R_PPC64_TPREL64,
1438 0, /* rightshift */
1439 4, /* size (0 = byte, 1 = short, 2 = long) */
1440 64, /* bitsize */
1441 FALSE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_dont, /* complain_on_overflow */
1444 ppc64_elf_unhandled_reloc, /* special_function */
1445 "R_PPC64_TPREL64", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 ONES (64), /* dst_mask */
1449 FALSE), /* pcrel_offset */
1451 /* A 16 bit tprel reloc. */
1452 HOWTO (R_PPC64_TPREL16,
1453 0, /* rightshift */
1454 1, /* size (0 = byte, 1 = short, 2 = long) */
1455 16, /* bitsize */
1456 FALSE, /* pc_relative */
1457 0, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 ppc64_elf_unhandled_reloc, /* special_function */
1460 "R_PPC64_TPREL16", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
1463 0xffff, /* dst_mask */
1464 FALSE), /* pcrel_offset */
1466 /* Like TPREL16, but no overflow. */
1467 HOWTO (R_PPC64_TPREL16_LO,
1468 0, /* rightshift */
1469 1, /* size (0 = byte, 1 = short, 2 = long) */
1470 16, /* bitsize */
1471 FALSE, /* pc_relative */
1472 0, /* bitpos */
1473 complain_overflow_dont, /* complain_on_overflow */
1474 ppc64_elf_unhandled_reloc, /* special_function */
1475 "R_PPC64_TPREL16_LO", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0xffff, /* dst_mask */
1479 FALSE), /* pcrel_offset */
1481 /* Like TPREL16_LO, but next higher group of 16 bits. */
1482 HOWTO (R_PPC64_TPREL16_HI,
1483 16, /* rightshift */
1484 1, /* size (0 = byte, 1 = short, 2 = long) */
1485 16, /* bitsize */
1486 FALSE, /* pc_relative */
1487 0, /* bitpos */
1488 complain_overflow_dont, /* complain_on_overflow */
1489 ppc64_elf_unhandled_reloc, /* special_function */
1490 "R_PPC64_TPREL16_HI", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
1493 0xffff, /* dst_mask */
1494 FALSE), /* pcrel_offset */
1496 /* Like TPREL16_HI, but adjust for low 16 bits. */
1497 HOWTO (R_PPC64_TPREL16_HA,
1498 16, /* rightshift */
1499 1, /* size (0 = byte, 1 = short, 2 = long) */
1500 16, /* bitsize */
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
1503 complain_overflow_dont, /* complain_on_overflow */
1504 ppc64_elf_unhandled_reloc, /* special_function */
1505 "R_PPC64_TPREL16_HA", /* name */
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
1508 0xffff, /* dst_mask */
1509 FALSE), /* pcrel_offset */
1511 /* Like TPREL16_HI, but next higher group of 16 bits. */
1512 HOWTO (R_PPC64_TPREL16_HIGHER,
1513 32, /* rightshift */
1514 1, /* size (0 = byte, 1 = short, 2 = long) */
1515 16, /* bitsize */
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
1518 complain_overflow_dont, /* complain_on_overflow */
1519 ppc64_elf_unhandled_reloc, /* special_function */
1520 "R_PPC64_TPREL16_HIGHER", /* name */
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
1523 0xffff, /* dst_mask */
1524 FALSE), /* pcrel_offset */
1526 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1527 HOWTO (R_PPC64_TPREL16_HIGHERA,
1528 32, /* rightshift */
1529 1, /* size (0 = byte, 1 = short, 2 = long) */
1530 16, /* bitsize */
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
1533 complain_overflow_dont, /* complain_on_overflow */
1534 ppc64_elf_unhandled_reloc, /* special_function */
1535 "R_PPC64_TPREL16_HIGHERA", /* name */
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
1538 0xffff, /* dst_mask */
1539 FALSE), /* pcrel_offset */
1541 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1542 HOWTO (R_PPC64_TPREL16_HIGHEST,
1543 48, /* rightshift */
1544 1, /* size (0 = byte, 1 = short, 2 = long) */
1545 16, /* bitsize */
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
1548 complain_overflow_dont, /* complain_on_overflow */
1549 ppc64_elf_unhandled_reloc, /* special_function */
1550 "R_PPC64_TPREL16_HIGHEST", /* name */
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
1553 0xffff, /* dst_mask */
1554 FALSE), /* pcrel_offset */
1556 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1557 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1558 48, /* rightshift */
1559 1, /* size (0 = byte, 1 = short, 2 = long) */
1560 16, /* bitsize */
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
1563 complain_overflow_dont, /* complain_on_overflow */
1564 ppc64_elf_unhandled_reloc, /* special_function */
1565 "R_PPC64_TPREL16_HIGHESTA", /* name */
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
1568 0xffff, /* dst_mask */
1569 FALSE), /* pcrel_offset */
1571 /* Like TPREL16, but for insns with a DS field. */
1572 HOWTO (R_PPC64_TPREL16_DS,
1573 0, /* rightshift */
1574 1, /* size (0 = byte, 1 = short, 2 = long) */
1575 16, /* bitsize */
1576 FALSE, /* pc_relative */
1577 0, /* bitpos */
1578 complain_overflow_signed, /* complain_on_overflow */
1579 ppc64_elf_unhandled_reloc, /* special_function */
1580 "R_PPC64_TPREL16_DS", /* name */
1581 FALSE, /* partial_inplace */
1582 0, /* src_mask */
1583 0xfffc, /* dst_mask */
1584 FALSE), /* pcrel_offset */
1586 /* Like TPREL16_DS, but no overflow. */
1587 HOWTO (R_PPC64_TPREL16_LO_DS,
1588 0, /* rightshift */
1589 1, /* size (0 = byte, 1 = short, 2 = long) */
1590 16, /* bitsize */
1591 FALSE, /* pc_relative */
1592 0, /* bitpos */
1593 complain_overflow_dont, /* complain_on_overflow */
1594 ppc64_elf_unhandled_reloc, /* special_function */
1595 "R_PPC64_TPREL16_LO_DS", /* name */
1596 FALSE, /* partial_inplace */
1597 0, /* src_mask */
1598 0xfffc, /* dst_mask */
1599 FALSE), /* pcrel_offset */
1601 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1602 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1603 to the first entry relative to the TOC base (r2). */
1604 HOWTO (R_PPC64_GOT_TLSGD16,
1605 0, /* rightshift */
1606 1, /* size (0 = byte, 1 = short, 2 = long) */
1607 16, /* bitsize */
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
1610 complain_overflow_signed, /* complain_on_overflow */
1611 ppc64_elf_unhandled_reloc, /* special_function */
1612 "R_PPC64_GOT_TLSGD16", /* name */
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
1615 0xffff, /* dst_mask */
1616 FALSE), /* pcrel_offset */
1618 /* Like GOT_TLSGD16, but no overflow. */
1619 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1620 0, /* rightshift */
1621 1, /* size (0 = byte, 1 = short, 2 = long) */
1622 16, /* bitsize */
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc64_elf_unhandled_reloc, /* special_function */
1627 "R_PPC64_GOT_TLSGD16_LO", /* name */
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
1630 0xffff, /* dst_mask */
1631 FALSE), /* pcrel_offset */
1633 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1634 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1635 16, /* rightshift */
1636 1, /* size (0 = byte, 1 = short, 2 = long) */
1637 16, /* bitsize */
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc64_elf_unhandled_reloc, /* special_function */
1642 "R_PPC64_GOT_TLSGD16_HI", /* name */
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
1645 0xffff, /* dst_mask */
1646 FALSE), /* pcrel_offset */
1648 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1649 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1650 16, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc64_elf_unhandled_reloc, /* special_function */
1657 "R_PPC64_GOT_TLSGD16_HA", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 0xffff, /* dst_mask */
1661 FALSE), /* pcrel_offset */
1663 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1664 with values (sym+add)@dtpmod and zero, and computes the offset to the
1665 first entry relative to the TOC base (r2). */
1666 HOWTO (R_PPC64_GOT_TLSLD16,
1667 0, /* rightshift */
1668 1, /* size (0 = byte, 1 = short, 2 = long) */
1669 16, /* bitsize */
1670 FALSE, /* pc_relative */
1671 0, /* bitpos */
1672 complain_overflow_signed, /* complain_on_overflow */
1673 ppc64_elf_unhandled_reloc, /* special_function */
1674 "R_PPC64_GOT_TLSLD16", /* name */
1675 FALSE, /* partial_inplace */
1676 0, /* src_mask */
1677 0xffff, /* dst_mask */
1678 FALSE), /* pcrel_offset */
1680 /* Like GOT_TLSLD16, but no overflow. */
1681 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1682 0, /* rightshift */
1683 1, /* size (0 = byte, 1 = short, 2 = long) */
1684 16, /* bitsize */
1685 FALSE, /* pc_relative */
1686 0, /* bitpos */
1687 complain_overflow_dont, /* complain_on_overflow */
1688 ppc64_elf_unhandled_reloc, /* special_function */
1689 "R_PPC64_GOT_TLSLD16_LO", /* name */
1690 FALSE, /* partial_inplace */
1691 0, /* src_mask */
1692 0xffff, /* dst_mask */
1693 FALSE), /* pcrel_offset */
1695 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1696 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1697 16, /* rightshift */
1698 1, /* size (0 = byte, 1 = short, 2 = long) */
1699 16, /* bitsize */
1700 FALSE, /* pc_relative */
1701 0, /* bitpos */
1702 complain_overflow_dont, /* complain_on_overflow */
1703 ppc64_elf_unhandled_reloc, /* special_function */
1704 "R_PPC64_GOT_TLSLD16_HI", /* name */
1705 FALSE, /* partial_inplace */
1706 0, /* src_mask */
1707 0xffff, /* dst_mask */
1708 FALSE), /* pcrel_offset */
1710 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1711 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1712 16, /* rightshift */
1713 1, /* size (0 = byte, 1 = short, 2 = long) */
1714 16, /* bitsize */
1715 FALSE, /* pc_relative */
1716 0, /* bitpos */
1717 complain_overflow_dont, /* complain_on_overflow */
1718 ppc64_elf_unhandled_reloc, /* special_function */
1719 "R_PPC64_GOT_TLSLD16_HA", /* name */
1720 FALSE, /* partial_inplace */
1721 0, /* src_mask */
1722 0xffff, /* dst_mask */
1723 FALSE), /* pcrel_offset */
1725 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1726 the offset to the entry relative to the TOC base (r2). */
1727 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1728 0, /* rightshift */
1729 1, /* size (0 = byte, 1 = short, 2 = long) */
1730 16, /* bitsize */
1731 FALSE, /* pc_relative */
1732 0, /* bitpos */
1733 complain_overflow_signed, /* complain_on_overflow */
1734 ppc64_elf_unhandled_reloc, /* special_function */
1735 "R_PPC64_GOT_DTPREL16_DS", /* name */
1736 FALSE, /* partial_inplace */
1737 0, /* src_mask */
1738 0xfffc, /* dst_mask */
1739 FALSE), /* pcrel_offset */
1741 /* Like GOT_DTPREL16_DS, but no overflow. */
1742 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1743 0, /* rightshift */
1744 1, /* size (0 = byte, 1 = short, 2 = long) */
1745 16, /* bitsize */
1746 FALSE, /* pc_relative */
1747 0, /* bitpos */
1748 complain_overflow_dont, /* complain_on_overflow */
1749 ppc64_elf_unhandled_reloc, /* special_function */
1750 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1751 FALSE, /* partial_inplace */
1752 0, /* src_mask */
1753 0xfffc, /* dst_mask */
1754 FALSE), /* pcrel_offset */
1756 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1757 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1758 16, /* rightshift */
1759 1, /* size (0 = byte, 1 = short, 2 = long) */
1760 16, /* bitsize */
1761 FALSE, /* pc_relative */
1762 0, /* bitpos */
1763 complain_overflow_dont, /* complain_on_overflow */
1764 ppc64_elf_unhandled_reloc, /* special_function */
1765 "R_PPC64_GOT_DTPREL16_HI", /* name */
1766 FALSE, /* partial_inplace */
1767 0, /* src_mask */
1768 0xffff, /* dst_mask */
1769 FALSE), /* pcrel_offset */
1771 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1772 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1773 16, /* rightshift */
1774 1, /* size (0 = byte, 1 = short, 2 = long) */
1775 16, /* bitsize */
1776 FALSE, /* pc_relative */
1777 0, /* bitpos */
1778 complain_overflow_dont, /* complain_on_overflow */
1779 ppc64_elf_unhandled_reloc, /* special_function */
1780 "R_PPC64_GOT_DTPREL16_HA", /* name */
1781 FALSE, /* partial_inplace */
1782 0, /* src_mask */
1783 0xffff, /* dst_mask */
1784 FALSE), /* pcrel_offset */
1786 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1787 offset to the entry relative to the TOC base (r2). */
1788 HOWTO (R_PPC64_GOT_TPREL16_DS,
1789 0, /* rightshift */
1790 1, /* size (0 = byte, 1 = short, 2 = long) */
1791 16, /* bitsize */
1792 FALSE, /* pc_relative */
1793 0, /* bitpos */
1794 complain_overflow_signed, /* complain_on_overflow */
1795 ppc64_elf_unhandled_reloc, /* special_function */
1796 "R_PPC64_GOT_TPREL16_DS", /* name */
1797 FALSE, /* partial_inplace */
1798 0, /* src_mask */
1799 0xfffc, /* dst_mask */
1800 FALSE), /* pcrel_offset */
1802 /* Like GOT_TPREL16_DS, but no overflow. */
1803 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1804 0, /* rightshift */
1805 1, /* size (0 = byte, 1 = short, 2 = long) */
1806 16, /* bitsize */
1807 FALSE, /* pc_relative */
1808 0, /* bitpos */
1809 complain_overflow_dont, /* complain_on_overflow */
1810 ppc64_elf_unhandled_reloc, /* special_function */
1811 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1812 FALSE, /* partial_inplace */
1813 0, /* src_mask */
1814 0xfffc, /* dst_mask */
1815 FALSE), /* pcrel_offset */
1817 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1818 HOWTO (R_PPC64_GOT_TPREL16_HI,
1819 16, /* rightshift */
1820 1, /* size (0 = byte, 1 = short, 2 = long) */
1821 16, /* bitsize */
1822 FALSE, /* pc_relative */
1823 0, /* bitpos */
1824 complain_overflow_dont, /* complain_on_overflow */
1825 ppc64_elf_unhandled_reloc, /* special_function */
1826 "R_PPC64_GOT_TPREL16_HI", /* name */
1827 FALSE, /* partial_inplace */
1828 0, /* src_mask */
1829 0xffff, /* dst_mask */
1830 FALSE), /* pcrel_offset */
1832 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1833 HOWTO (R_PPC64_GOT_TPREL16_HA,
1834 16, /* rightshift */
1835 1, /* size (0 = byte, 1 = short, 2 = long) */
1836 16, /* bitsize */
1837 FALSE, /* pc_relative */
1838 0, /* bitpos */
1839 complain_overflow_dont, /* complain_on_overflow */
1840 ppc64_elf_unhandled_reloc, /* special_function */
1841 "R_PPC64_GOT_TPREL16_HA", /* name */
1842 FALSE, /* partial_inplace */
1843 0, /* src_mask */
1844 0xffff, /* dst_mask */
1845 FALSE), /* pcrel_offset */
1847 /* GNU extension to record C++ vtable hierarchy. */
1848 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1849 0, /* rightshift */
1850 0, /* size (0 = byte, 1 = short, 2 = long) */
1851 0, /* bitsize */
1852 FALSE, /* pc_relative */
1853 0, /* bitpos */
1854 complain_overflow_dont, /* complain_on_overflow */
1855 NULL, /* special_function */
1856 "R_PPC64_GNU_VTINHERIT", /* name */
1857 FALSE, /* partial_inplace */
1858 0, /* src_mask */
1859 0, /* dst_mask */
1860 FALSE), /* pcrel_offset */
1862 /* GNU extension to record C++ vtable member usage. */
1863 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1864 0, /* rightshift */
1865 0, /* size (0 = byte, 1 = short, 2 = long) */
1866 0, /* bitsize */
1867 FALSE, /* pc_relative */
1868 0, /* bitpos */
1869 complain_overflow_dont, /* complain_on_overflow */
1870 NULL, /* special_function */
1871 "R_PPC64_GNU_VTENTRY", /* name */
1872 FALSE, /* partial_inplace */
1873 0, /* src_mask */
1874 0, /* dst_mask */
1875 FALSE), /* pcrel_offset */
1879 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
1880 be done. */
1882 static void
1883 ppc_howto_init (void)
1885 unsigned int i, type;
1887 for (i = 0;
1888 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1889 i++)
1891 type = ppc64_elf_howto_raw[i].type;
1892 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1893 / sizeof (ppc64_elf_howto_table[0])));
1894 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1898 static reloc_howto_type *
1899 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1900 bfd_reloc_code_real_type code)
1902 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1904 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1905 /* Initialize howto table if needed. */
1906 ppc_howto_init ();
1908 switch (code)
1910 default:
1911 return NULL;
1913 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1914 break;
1915 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1916 break;
1917 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1918 break;
1919 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1920 break;
1921 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1922 break;
1923 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1924 break;
1925 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1926 break;
1927 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1928 break;
1929 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1930 break;
1931 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1932 break;
1933 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1934 break;
1935 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1936 break;
1937 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1938 break;
1939 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1940 break;
1941 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1942 break;
1943 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1944 break;
1945 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1946 break;
1947 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1948 break;
1949 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1950 break;
1951 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1952 break;
1953 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1954 break;
1955 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1956 break;
1957 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1958 break;
1959 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1960 break;
1961 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1962 break;
1963 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1964 break;
1965 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1966 break;
1967 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1968 break;
1969 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1970 break;
1971 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1972 break;
1973 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1974 break;
1975 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1976 break;
1977 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1978 break;
1979 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1980 break;
1981 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1982 break;
1983 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1984 break;
1985 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1986 break;
1987 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1988 break;
1989 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1990 break;
1991 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1992 break;
1993 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1994 break;
1995 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1996 break;
1997 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1998 break;
1999 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2000 break;
2001 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2002 break;
2003 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2004 break;
2005 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2006 break;
2007 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2008 break;
2009 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2010 break;
2011 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2012 break;
2013 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2014 break;
2015 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2016 break;
2017 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2018 break;
2019 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2020 break;
2021 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2022 break;
2023 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2024 break;
2025 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2026 break;
2027 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2028 break;
2029 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2030 break;
2031 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2032 break;
2033 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2034 break;
2035 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2036 break;
2037 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2038 break;
2039 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2040 break;
2041 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2042 break;
2043 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2044 break;
2045 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2046 break;
2047 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2048 break;
2049 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2050 break;
2051 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2052 break;
2053 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2054 break;
2055 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2056 break;
2057 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2058 break;
2059 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2060 break;
2061 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2062 break;
2063 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2064 break;
2065 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2066 break;
2067 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2068 break;
2069 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2070 break;
2071 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2072 break;
2073 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2074 break;
2075 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2076 break;
2077 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2078 break;
2079 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2080 break;
2081 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2082 break;
2083 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2084 break;
2085 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2086 break;
2087 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2088 break;
2089 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2090 break;
2091 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2092 break;
2093 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2094 break;
2095 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2096 break;
2097 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2098 break;
2099 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2100 break;
2101 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2102 break;
2103 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2104 break;
2105 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2106 break;
2107 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2108 break;
2109 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2110 break;
2111 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2112 break;
2113 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2114 break;
2117 return ppc64_elf_howto_table[r];
2120 static reloc_howto_type *
2121 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2122 const char *r_name)
2124 unsigned int i;
2126 for (i = 0;
2127 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
2128 i++)
2129 if (ppc64_elf_howto_raw[i].name != NULL
2130 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2131 return &ppc64_elf_howto_raw[i];
2133 return NULL;
2136 /* Set the howto pointer for a PowerPC ELF reloc. */
2138 static void
2139 ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2140 Elf_Internal_Rela *dst)
2142 unsigned int type;
2144 /* Initialize howto table if needed. */
2145 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2146 ppc_howto_init ();
2148 type = ELF64_R_TYPE (dst->r_info);
2149 if (type >= (sizeof (ppc64_elf_howto_table)
2150 / sizeof (ppc64_elf_howto_table[0])))
2152 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
2153 abfd, (int) type);
2154 type = R_PPC64_NONE;
2156 cache_ptr->howto = ppc64_elf_howto_table[type];
2159 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2161 static bfd_reloc_status_type
2162 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2163 void *data, asection *input_section,
2164 bfd *output_bfd, char **error_message)
2166 /* If this is a relocatable link (output_bfd test tells us), just
2167 call the generic function. Any adjustment will be done at final
2168 link time. */
2169 if (output_bfd != NULL)
2170 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2171 input_section, output_bfd, error_message);
2173 /* Adjust the addend for sign extension of the low 16 bits.
2174 We won't actually be using the low 16 bits, so trashing them
2175 doesn't matter. */
2176 reloc_entry->addend += 0x8000;
2177 return bfd_reloc_continue;
2180 static bfd_reloc_status_type
2181 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2182 void *data, asection *input_section,
2183 bfd *output_bfd, char **error_message)
2185 if (output_bfd != NULL)
2186 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2187 input_section, output_bfd, error_message);
2189 if (strcmp (symbol->section->name, ".opd") == 0
2190 && (symbol->section->owner->flags & DYNAMIC) == 0)
2192 bfd_vma dest = opd_entry_value (symbol->section,
2193 symbol->value + reloc_entry->addend,
2194 NULL, NULL);
2195 if (dest != (bfd_vma) -1)
2196 reloc_entry->addend = dest - (symbol->value
2197 + symbol->section->output_section->vma
2198 + symbol->section->output_offset);
2200 return bfd_reloc_continue;
2203 static bfd_reloc_status_type
2204 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2205 void *data, asection *input_section,
2206 bfd *output_bfd, char **error_message)
2208 long insn;
2209 enum elf_ppc64_reloc_type r_type;
2210 bfd_size_type octets;
2211 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2212 bfd_boolean is_power4 = FALSE;
2214 /* If this is a relocatable link (output_bfd test tells us), just
2215 call the generic function. Any adjustment will be done at final
2216 link time. */
2217 if (output_bfd != NULL)
2218 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2219 input_section, output_bfd, error_message);
2221 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2222 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2223 insn &= ~(0x01 << 21);
2224 r_type = reloc_entry->howto->type;
2225 if (r_type == R_PPC64_ADDR14_BRTAKEN
2226 || r_type == R_PPC64_REL14_BRTAKEN)
2227 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2229 if (is_power4)
2231 /* Set 'a' bit. This is 0b00010 in BO field for branch
2232 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2233 for branch on CTR insns (BO == 1a00t or 1a01t). */
2234 if ((insn & (0x14 << 21)) == (0x04 << 21))
2235 insn |= 0x02 << 21;
2236 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2237 insn |= 0x08 << 21;
2238 else
2239 goto out;
2241 else
2243 bfd_vma target = 0;
2244 bfd_vma from;
2246 if (!bfd_is_com_section (symbol->section))
2247 target = symbol->value;
2248 target += symbol->section->output_section->vma;
2249 target += symbol->section->output_offset;
2250 target += reloc_entry->addend;
2252 from = (reloc_entry->address
2253 + input_section->output_offset
2254 + input_section->output_section->vma);
2256 /* Invert 'y' bit if not the default. */
2257 if ((bfd_signed_vma) (target - from) < 0)
2258 insn ^= 0x01 << 21;
2260 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2261 out:
2262 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2263 input_section, output_bfd, error_message);
2266 static bfd_reloc_status_type
2267 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2268 void *data, asection *input_section,
2269 bfd *output_bfd, char **error_message)
2271 /* If this is a relocatable link (output_bfd test tells us), just
2272 call the generic function. Any adjustment will be done at final
2273 link time. */
2274 if (output_bfd != NULL)
2275 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2276 input_section, output_bfd, error_message);
2278 /* Subtract the symbol section base address. */
2279 reloc_entry->addend -= symbol->section->output_section->vma;
2280 return bfd_reloc_continue;
2283 static bfd_reloc_status_type
2284 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2285 void *data, asection *input_section,
2286 bfd *output_bfd, char **error_message)
2288 /* If this is a relocatable link (output_bfd test tells us), just
2289 call the generic function. Any adjustment will be done at final
2290 link time. */
2291 if (output_bfd != NULL)
2292 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2293 input_section, output_bfd, error_message);
2295 /* Subtract the symbol section base address. */
2296 reloc_entry->addend -= symbol->section->output_section->vma;
2298 /* Adjust the addend for sign extension of the low 16 bits. */
2299 reloc_entry->addend += 0x8000;
2300 return bfd_reloc_continue;
2303 static bfd_reloc_status_type
2304 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2305 void *data, asection *input_section,
2306 bfd *output_bfd, char **error_message)
2308 bfd_vma TOCstart;
2310 /* If this is a relocatable link (output_bfd test tells us), just
2311 call the generic function. Any adjustment will be done at final
2312 link time. */
2313 if (output_bfd != NULL)
2314 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2315 input_section, output_bfd, error_message);
2317 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2318 if (TOCstart == 0)
2319 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2321 /* Subtract the TOC base address. */
2322 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2323 return bfd_reloc_continue;
2326 static bfd_reloc_status_type
2327 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2328 void *data, asection *input_section,
2329 bfd *output_bfd, char **error_message)
2331 bfd_vma TOCstart;
2333 /* If this is a relocatable link (output_bfd test tells us), just
2334 call the generic function. Any adjustment will be done at final
2335 link time. */
2336 if (output_bfd != NULL)
2337 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2338 input_section, output_bfd, error_message);
2340 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2341 if (TOCstart == 0)
2342 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2344 /* Subtract the TOC base address. */
2345 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2347 /* Adjust the addend for sign extension of the low 16 bits. */
2348 reloc_entry->addend += 0x8000;
2349 return bfd_reloc_continue;
2352 static bfd_reloc_status_type
2353 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2354 void *data, asection *input_section,
2355 bfd *output_bfd, char **error_message)
2357 bfd_vma TOCstart;
2358 bfd_size_type octets;
2360 /* If this is a relocatable link (output_bfd test tells us), just
2361 call the generic function. Any adjustment will be done at final
2362 link time. */
2363 if (output_bfd != NULL)
2364 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2365 input_section, output_bfd, error_message);
2367 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2368 if (TOCstart == 0)
2369 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2371 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2372 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2373 return bfd_reloc_ok;
2376 static bfd_reloc_status_type
2377 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2378 void *data, asection *input_section,
2379 bfd *output_bfd, char **error_message)
2381 /* If this is a relocatable link (output_bfd test tells us), just
2382 call the generic function. Any adjustment will be done at final
2383 link time. */
2384 if (output_bfd != NULL)
2385 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2386 input_section, output_bfd, error_message);
2388 if (error_message != NULL)
2390 static char buf[60];
2391 sprintf (buf, "generic linker can't handle %s",
2392 reloc_entry->howto->name);
2393 *error_message = buf;
2395 return bfd_reloc_dangerous;
2398 struct ppc64_elf_obj_tdata
2400 struct elf_obj_tdata elf;
2402 /* Shortcuts to dynamic linker sections. */
2403 asection *got;
2404 asection *relgot;
2406 /* Used during garbage collection. We attach global symbols defined
2407 on removed .opd entries to this section so that the sym is removed. */
2408 asection *deleted_section;
2410 /* TLS local dynamic got entry handling. Suppose for multiple GOT
2411 sections means we potentially need one of these for each input bfd. */
2412 union {
2413 bfd_signed_vma refcount;
2414 bfd_vma offset;
2415 } tlsld_got;
2417 /* A copy of relocs before they are modified for --emit-relocs. */
2418 Elf_Internal_Rela *opd_relocs;
2421 #define ppc64_elf_tdata(bfd) \
2422 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2424 #define ppc64_tlsld_got(bfd) \
2425 (&ppc64_elf_tdata (bfd)->tlsld_got)
2427 /* Override the generic function because we store some extras. */
2429 static bfd_boolean
2430 ppc64_elf_mkobject (bfd *abfd)
2432 if (abfd->tdata.any == NULL)
2434 bfd_size_type amt = sizeof (struct ppc64_elf_obj_tdata);
2435 abfd->tdata.any = bfd_zalloc (abfd, amt);
2436 if (abfd->tdata.any == NULL)
2437 return FALSE;
2439 return bfd_elf_mkobject (abfd);
2442 /* Return 1 if target is one of ours. */
2444 static bfd_boolean
2445 is_ppc64_elf_target (const struct bfd_target *targ)
2447 extern const bfd_target bfd_elf64_powerpc_vec;
2448 extern const bfd_target bfd_elf64_powerpcle_vec;
2450 return targ == &bfd_elf64_powerpc_vec || targ == &bfd_elf64_powerpcle_vec;
2453 /* Fix bad default arch selected for a 64 bit input bfd when the
2454 default is 32 bit. */
2456 static bfd_boolean
2457 ppc64_elf_object_p (bfd *abfd)
2459 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2461 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2463 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2465 /* Relies on arch after 32 bit default being 64 bit default. */
2466 abfd->arch_info = abfd->arch_info->next;
2467 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2470 return TRUE;
2473 /* Support for core dump NOTE sections. */
2475 static bfd_boolean
2476 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2478 size_t offset, size;
2480 if (note->descsz != 504)
2481 return FALSE;
2483 /* pr_cursig */
2484 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
2486 /* pr_pid */
2487 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 32);
2489 /* pr_reg */
2490 offset = 112;
2491 size = 384;
2493 /* Make a ".reg/999" section. */
2494 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2495 size, note->descpos + offset);
2498 static bfd_boolean
2499 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2501 if (note->descsz != 136)
2502 return FALSE;
2504 elf_tdata (abfd)->core_program
2505 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2506 elf_tdata (abfd)->core_command
2507 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2509 return TRUE;
2512 static char *
2513 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2514 ...)
2516 switch (note_type)
2518 default:
2519 return NULL;
2521 case NT_PRPSINFO:
2523 char data[136];
2524 va_list ap;
2526 va_start (ap, note_type);
2527 memset (data, 0, 40);
2528 strncpy (data + 40, va_arg (ap, const char *), 16);
2529 strncpy (data + 56, va_arg (ap, const char *), 80);
2530 va_end (ap);
2531 return elfcore_write_note (abfd, buf, bufsiz,
2532 "CORE", note_type, data, sizeof (data));
2535 case NT_PRSTATUS:
2537 char data[504];
2538 va_list ap;
2539 long pid;
2540 int cursig;
2541 const void *greg;
2543 va_start (ap, note_type);
2544 memset (data, 0, 112);
2545 pid = va_arg (ap, long);
2546 bfd_put_32 (abfd, pid, data + 32);
2547 cursig = va_arg (ap, int);
2548 bfd_put_16 (abfd, cursig, data + 12);
2549 greg = va_arg (ap, const void *);
2550 memcpy (data + 112, greg, 384);
2551 memset (data + 496, 0, 8);
2552 va_end (ap);
2553 return elfcore_write_note (abfd, buf, bufsiz,
2554 "CORE", note_type, data, sizeof (data));
2559 /* Merge backend specific data from an object file to the output
2560 object file when linking. */
2562 static bfd_boolean
2563 ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
2565 /* Check if we have the same endianess. */
2566 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
2567 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
2568 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2570 const char *msg;
2572 if (bfd_big_endian (ibfd))
2573 msg = _("%B: compiled for a big endian system "
2574 "and target is little endian");
2575 else
2576 msg = _("%B: compiled for a little endian system "
2577 "and target is big endian");
2579 (*_bfd_error_handler) (msg, ibfd);
2581 bfd_set_error (bfd_error_wrong_format);
2582 return FALSE;
2585 return TRUE;
2588 /* Add extra PPC sections. */
2590 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
2592 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
2593 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2595 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2596 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2597 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2598 { NULL, 0, 0, 0, 0 }
2601 enum _ppc64_sec_type {
2602 sec_normal = 0,
2603 sec_opd = 1,
2604 sec_toc = 2
2607 struct _ppc64_elf_section_data
2609 struct bfd_elf_section_data elf;
2611 /* An array with one entry for each opd function descriptor. */
2612 union
2614 /* Points to the function code section for local opd entries. */
2615 asection **opd_func_sec;
2616 /* After editing .opd, adjust references to opd local syms. */
2617 long *opd_adjust;
2619 /* An array for toc sections, indexed by offset/8.
2620 Specifies the relocation symbol index used at a given toc offset. */
2621 unsigned *t_symndx;
2622 } u;
2624 enum _ppc64_sec_type sec_type:2;
2626 /* Flag set when small branches are detected. Used to
2627 select suitable defaults for the stub group size. */
2628 unsigned int has_14bit_branch:1;
2631 #define ppc64_elf_section_data(sec) \
2632 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2634 static bfd_boolean
2635 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2637 if (!sec->used_by_bfd)
2639 struct _ppc64_elf_section_data *sdata;
2640 bfd_size_type amt = sizeof (*sdata);
2642 sdata = bfd_zalloc (abfd, amt);
2643 if (sdata == NULL)
2644 return FALSE;
2645 sec->used_by_bfd = sdata;
2648 return _bfd_elf_new_section_hook (abfd, sec);
2651 static void *
2652 get_opd_info (asection * sec)
2654 if (sec != NULL
2655 && ppc64_elf_section_data (sec) != NULL
2656 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2657 return ppc64_elf_section_data (sec)->u.opd_adjust;
2658 return NULL;
2661 /* Parameters for the qsort hook. */
2662 static asection *synthetic_opd;
2663 static bfd_boolean synthetic_relocatable;
2665 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2667 static int
2668 compare_symbols (const void *ap, const void *bp)
2670 const asymbol *a = * (const asymbol **) ap;
2671 const asymbol *b = * (const asymbol **) bp;
2673 /* Section symbols first. */
2674 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2675 return -1;
2676 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2677 return 1;
2679 /* then .opd symbols. */
2680 if (a->section == synthetic_opd && b->section != synthetic_opd)
2681 return -1;
2682 if (a->section != synthetic_opd && b->section == synthetic_opd)
2683 return 1;
2685 /* then other code symbols. */
2686 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2687 == (SEC_CODE | SEC_ALLOC)
2688 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2689 != (SEC_CODE | SEC_ALLOC))
2690 return -1;
2692 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2693 != (SEC_CODE | SEC_ALLOC)
2694 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2695 == (SEC_CODE | SEC_ALLOC))
2696 return 1;
2698 if (synthetic_relocatable)
2700 if (a->section->id < b->section->id)
2701 return -1;
2703 if (a->section->id > b->section->id)
2704 return 1;
2707 if (a->value + a->section->vma < b->value + b->section->vma)
2708 return -1;
2710 if (a->value + a->section->vma > b->value + b->section->vma)
2711 return 1;
2713 /* For syms with the same value, prefer strong dynamic global function
2714 syms over other syms. */
2715 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2716 return -1;
2718 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2719 return 1;
2721 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2722 return -1;
2724 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2725 return 1;
2727 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2728 return -1;
2730 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2731 return 1;
2733 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2734 return -1;
2736 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2737 return 1;
2739 return 0;
2742 /* Search SYMS for a symbol of the given VALUE. */
2744 static asymbol *
2745 sym_exists_at (asymbol **syms, long lo, long hi, int id, bfd_vma value)
2747 long mid;
2749 if (id == -1)
2751 while (lo < hi)
2753 mid = (lo + hi) >> 1;
2754 if (syms[mid]->value + syms[mid]->section->vma < value)
2755 lo = mid + 1;
2756 else if (syms[mid]->value + syms[mid]->section->vma > value)
2757 hi = mid;
2758 else
2759 return syms[mid];
2762 else
2764 while (lo < hi)
2766 mid = (lo + hi) >> 1;
2767 if (syms[mid]->section->id < id)
2768 lo = mid + 1;
2769 else if (syms[mid]->section->id > id)
2770 hi = mid;
2771 else if (syms[mid]->value < value)
2772 lo = mid + 1;
2773 else if (syms[mid]->value > value)
2774 hi = mid;
2775 else
2776 return syms[mid];
2779 return NULL;
2782 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2783 entry syms. */
2785 static long
2786 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2787 long static_count, asymbol **static_syms,
2788 long dyn_count, asymbol **dyn_syms,
2789 asymbol **ret)
2791 asymbol *s;
2792 long i;
2793 long count;
2794 char *names;
2795 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2796 asection *opd;
2797 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2798 asymbol **syms;
2800 *ret = NULL;
2802 opd = bfd_get_section_by_name (abfd, ".opd");
2803 if (opd == NULL)
2804 return 0;
2806 symcount = static_count;
2807 if (!relocatable)
2808 symcount += dyn_count;
2809 if (symcount == 0)
2810 return 0;
2812 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2813 if (syms == NULL)
2814 return -1;
2816 if (!relocatable && static_count != 0 && dyn_count != 0)
2818 /* Use both symbol tables. */
2819 memcpy (syms, static_syms, static_count * sizeof (*syms));
2820 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
2822 else if (!relocatable && static_count == 0)
2823 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2824 else
2825 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2827 synthetic_opd = opd;
2828 synthetic_relocatable = relocatable;
2829 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2831 if (!relocatable && symcount > 1)
2833 long j;
2834 /* Trim duplicate syms, since we may have merged the normal and
2835 dynamic symbols. Actually, we only care about syms that have
2836 different values, so trim any with the same value. */
2837 for (i = 1, j = 1; i < symcount; ++i)
2838 if (syms[i - 1]->value + syms[i - 1]->section->vma
2839 != syms[i]->value + syms[i]->section->vma)
2840 syms[j++] = syms[i];
2841 symcount = j;
2844 i = 0;
2845 if (syms[i]->section == opd)
2846 ++i;
2847 codesecsym = i;
2849 for (; i < symcount; ++i)
2850 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2851 != (SEC_CODE | SEC_ALLOC))
2852 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2853 break;
2854 codesecsymend = i;
2856 for (; i < symcount; ++i)
2857 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2858 break;
2859 secsymend = i;
2861 for (; i < symcount; ++i)
2862 if (syms[i]->section != opd)
2863 break;
2864 opdsymend = i;
2866 for (; i < symcount; ++i)
2867 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2868 != (SEC_CODE | SEC_ALLOC))
2869 break;
2870 symcount = i;
2872 count = 0;
2873 if (opdsymend == secsymend)
2874 goto done;
2876 if (relocatable)
2878 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2879 arelent *r;
2880 size_t size;
2881 long relcount;
2883 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2884 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2885 if (relcount == 0)
2886 goto done;
2888 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2890 count = -1;
2891 goto done;
2894 size = 0;
2895 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2897 asymbol *sym;
2899 while (r < opd->relocation + relcount
2900 && r->address < syms[i]->value + opd->vma)
2901 ++r;
2903 if (r == opd->relocation + relcount)
2904 break;
2906 if (r->address != syms[i]->value + opd->vma)
2907 continue;
2909 if (r->howto->type != R_PPC64_ADDR64)
2910 continue;
2912 sym = *r->sym_ptr_ptr;
2913 if (!sym_exists_at (syms, opdsymend, symcount,
2914 sym->section->id, sym->value + r->addend))
2916 ++count;
2917 size += sizeof (asymbol);
2918 size += strlen (syms[i]->name) + 2;
2922 s = *ret = bfd_malloc (size);
2923 if (s == NULL)
2925 count = -1;
2926 goto done;
2929 names = (char *) (s + count);
2931 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2933 asymbol *sym;
2935 while (r < opd->relocation + relcount
2936 && r->address < syms[i]->value + opd->vma)
2937 ++r;
2939 if (r == opd->relocation + relcount)
2940 break;
2942 if (r->address != syms[i]->value + opd->vma)
2943 continue;
2945 if (r->howto->type != R_PPC64_ADDR64)
2946 continue;
2948 sym = *r->sym_ptr_ptr;
2949 if (!sym_exists_at (syms, opdsymend, symcount,
2950 sym->section->id, sym->value + r->addend))
2952 size_t len;
2954 *s = *syms[i];
2955 s->section = sym->section;
2956 s->value = sym->value + r->addend;
2957 s->name = names;
2958 *names++ = '.';
2959 len = strlen (syms[i]->name);
2960 memcpy (names, syms[i]->name, len + 1);
2961 names += len + 1;
2962 s++;
2966 else
2968 bfd_byte *contents;
2969 size_t size;
2971 if (!bfd_malloc_and_get_section (abfd, opd, &contents))
2973 if (contents)
2975 free_contents_and_exit:
2976 free (contents);
2978 count = -1;
2979 goto done;
2982 size = 0;
2983 for (i = secsymend; i < opdsymend; ++i)
2985 bfd_vma ent;
2987 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2988 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2990 ++count;
2991 size += sizeof (asymbol);
2992 size += strlen (syms[i]->name) + 2;
2996 s = *ret = bfd_malloc (size);
2997 if (s == NULL)
2998 goto free_contents_and_exit;
3000 names = (char *) (s + count);
3002 for (i = secsymend; i < opdsymend; ++i)
3004 bfd_vma ent;
3006 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3007 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3009 long lo, hi;
3010 size_t len;
3011 asection *sec = abfd->sections;
3013 *s = *syms[i];
3014 lo = codesecsym;
3015 hi = codesecsymend;
3016 while (lo < hi)
3018 long mid = (lo + hi) >> 1;
3019 if (syms[mid]->section->vma < ent)
3020 lo = mid + 1;
3021 else if (syms[mid]->section->vma > ent)
3022 hi = mid;
3023 else
3025 sec = syms[mid]->section;
3026 break;
3030 if (lo >= hi && lo > codesecsym)
3031 sec = syms[lo - 1]->section;
3033 for (; sec != NULL; sec = sec->next)
3035 if (sec->vma > ent)
3036 break;
3037 if ((sec->flags & SEC_ALLOC) == 0
3038 || (sec->flags & SEC_LOAD) == 0)
3039 break;
3040 if ((sec->flags & SEC_CODE) != 0)
3041 s->section = sec;
3043 s->value = ent - s->section->vma;
3044 s->name = names;
3045 *names++ = '.';
3046 len = strlen (syms[i]->name);
3047 memcpy (names, syms[i]->name, len + 1);
3048 names += len + 1;
3049 s++;
3052 free (contents);
3055 done:
3056 free (syms);
3057 return count;
3060 /* The following functions are specific to the ELF linker, while
3061 functions above are used generally. Those named ppc64_elf_* are
3062 called by the main ELF linker code. They appear in this file more
3063 or less in the order in which they are called. eg.
3064 ppc64_elf_check_relocs is called early in the link process,
3065 ppc64_elf_finish_dynamic_sections is one of the last functions
3066 called.
3068 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3069 functions have both a function code symbol and a function descriptor
3070 symbol. A call to foo in a relocatable object file looks like:
3072 . .text
3073 . x:
3074 . bl .foo
3075 . nop
3077 The function definition in another object file might be:
3079 . .section .opd
3080 . foo: .quad .foo
3081 . .quad .TOC.@tocbase
3082 . .quad 0
3084 . .text
3085 . .foo: blr
3087 When the linker resolves the call during a static link, the branch
3088 unsurprisingly just goes to .foo and the .opd information is unused.
3089 If the function definition is in a shared library, things are a little
3090 different: The call goes via a plt call stub, the opd information gets
3091 copied to the plt, and the linker patches the nop.
3093 . x:
3094 . bl .foo_stub
3095 . ld 2,40(1)
3098 . .foo_stub:
3099 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
3100 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
3101 . std 2,40(1) # this is the general idea
3102 . ld 11,0(12)
3103 . ld 2,8(12)
3104 . mtctr 11
3105 . ld 11,16(12)
3106 . bctr
3108 . .section .plt
3109 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3111 The "reloc ()" notation is supposed to indicate that the linker emits
3112 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3113 copying.
3115 What are the difficulties here? Well, firstly, the relocations
3116 examined by the linker in check_relocs are against the function code
3117 sym .foo, while the dynamic relocation in the plt is emitted against
3118 the function descriptor symbol, foo. Somewhere along the line, we need
3119 to carefully copy dynamic link information from one symbol to the other.
3120 Secondly, the generic part of the elf linker will make .foo a dynamic
3121 symbol as is normal for most other backends. We need foo dynamic
3122 instead, at least for an application final link. However, when
3123 creating a shared library containing foo, we need to have both symbols
3124 dynamic so that references to .foo are satisfied during the early
3125 stages of linking. Otherwise the linker might decide to pull in a
3126 definition from some other object, eg. a static library.
3128 Update: As of August 2004, we support a new convention. Function
3129 calls may use the function descriptor symbol, ie. "bl foo". This
3130 behaves exactly as "bl .foo". */
3132 /* The linker needs to keep track of the number of relocs that it
3133 decides to copy as dynamic relocs in check_relocs for each symbol.
3134 This is so that it can later discard them if they are found to be
3135 unnecessary. We store the information in a field extending the
3136 regular ELF linker hash table. */
3138 struct ppc_dyn_relocs
3140 struct ppc_dyn_relocs *next;
3142 /* The input section of the reloc. */
3143 asection *sec;
3145 /* Total number of relocs copied for the input section. */
3146 bfd_size_type count;
3148 /* Number of pc-relative relocs copied for the input section. */
3149 bfd_size_type pc_count;
3152 /* Track GOT entries needed for a given symbol. We might need more
3153 than one got entry per symbol. */
3154 struct got_entry
3156 struct got_entry *next;
3158 /* The symbol addend that we'll be placing in the GOT. */
3159 bfd_vma addend;
3161 /* Unlike other ELF targets, we use separate GOT entries for the same
3162 symbol referenced from different input files. This is to support
3163 automatic multiple TOC/GOT sections, where the TOC base can vary
3164 from one input file to another.
3166 Point to the BFD owning this GOT entry. */
3167 bfd *owner;
3169 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
3170 TLS_TPREL or TLS_DTPREL for tls entries. */
3171 char tls_type;
3173 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
3174 union
3176 bfd_signed_vma refcount;
3177 bfd_vma offset;
3178 } got;
3181 /* The same for PLT. */
3182 struct plt_entry
3184 struct plt_entry *next;
3186 bfd_vma addend;
3188 union
3190 bfd_signed_vma refcount;
3191 bfd_vma offset;
3192 } plt;
3195 /* Of those relocs that might be copied as dynamic relocs, this macro
3196 selects those that must be copied when linking a shared library,
3197 even when the symbol is local. */
3199 #define MUST_BE_DYN_RELOC(RTYPE) \
3200 ((RTYPE) != R_PPC64_REL32 \
3201 && (RTYPE) != R_PPC64_REL64 \
3202 && (RTYPE) != R_PPC64_REL30)
3204 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3205 copying dynamic variables from a shared lib into an app's dynbss
3206 section, and instead use a dynamic relocation to point into the
3207 shared lib. With code that gcc generates, it's vital that this be
3208 enabled; In the PowerPC64 ABI, the address of a function is actually
3209 the address of a function descriptor, which resides in the .opd
3210 section. gcc uses the descriptor directly rather than going via the
3211 GOT as some other ABI's do, which means that initialized function
3212 pointers must reference the descriptor. Thus, a function pointer
3213 initialized to the address of a function in a shared library will
3214 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3215 redefines the function descriptor symbol to point to the copy. This
3216 presents a problem as a plt entry for that function is also
3217 initialized from the function descriptor symbol and the copy reloc
3218 may not be initialized first. */
3219 #define ELIMINATE_COPY_RELOCS 1
3221 /* Section name for stubs is the associated section name plus this
3222 string. */
3223 #define STUB_SUFFIX ".stub"
3225 /* Linker stubs.
3226 ppc_stub_long_branch:
3227 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3228 destination, but a 24 bit branch in a stub section will reach.
3229 . b dest
3231 ppc_stub_plt_branch:
3232 Similar to the above, but a 24 bit branch in the stub section won't
3233 reach its destination.
3234 . addis %r12,%r2,xxx@toc@ha
3235 . ld %r11,xxx@toc@l(%r12)
3236 . mtctr %r11
3237 . bctr
3239 ppc_stub_plt_call:
3240 Used to call a function in a shared library. If it so happens that
3241 the plt entry referenced crosses a 64k boundary, then an extra
3242 "addi %r12,%r12,xxx@toc@l" will be inserted before the "mtctr".
3243 . addis %r12,%r2,xxx@toc@ha
3244 . std %r2,40(%r1)
3245 . ld %r11,xxx+0@toc@l(%r12)
3246 . mtctr %r11
3247 . ld %r2,xxx+8@toc@l(%r12)
3248 . ld %r11,xxx+16@toc@l(%r12)
3249 . bctr
3251 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3252 code to adjust the value and save r2 to support multiple toc sections.
3253 A ppc_stub_long_branch with an r2 offset looks like:
3254 . std %r2,40(%r1)
3255 . addis %r2,%r2,off@ha
3256 . addi %r2,%r2,off@l
3257 . b dest
3259 A ppc_stub_plt_branch with an r2 offset looks like:
3260 . std %r2,40(%r1)
3261 . addis %r12,%r2,xxx@toc@ha
3262 . ld %r11,xxx@toc@l(%r12)
3263 . addis %r2,%r2,off@ha
3264 . addi %r2,%r2,off@l
3265 . mtctr %r11
3266 . bctr
3268 In cases where the "addis" instruction would add zero, the "addis" is
3269 omitted and following instructions modified slightly in some cases.
3272 enum ppc_stub_type {
3273 ppc_stub_none,
3274 ppc_stub_long_branch,
3275 ppc_stub_long_branch_r2off,
3276 ppc_stub_plt_branch,
3277 ppc_stub_plt_branch_r2off,
3278 ppc_stub_plt_call
3281 struct ppc_stub_hash_entry {
3283 /* Base hash table entry structure. */
3284 struct bfd_hash_entry root;
3286 enum ppc_stub_type stub_type;
3288 /* The stub section. */
3289 asection *stub_sec;
3291 /* Offset within stub_sec of the beginning of this stub. */
3292 bfd_vma stub_offset;
3294 /* Given the symbol's value and its section we can determine its final
3295 value when building the stubs (so the stub knows where to jump. */
3296 bfd_vma target_value;
3297 asection *target_section;
3299 /* The symbol table entry, if any, that this was derived from. */
3300 struct ppc_link_hash_entry *h;
3302 /* And the reloc addend that this was derived from. */
3303 bfd_vma addend;
3305 /* Where this stub is being called from, or, in the case of combined
3306 stub sections, the first input section in the group. */
3307 asection *id_sec;
3310 struct ppc_branch_hash_entry {
3312 /* Base hash table entry structure. */
3313 struct bfd_hash_entry root;
3315 /* Offset within branch lookup table. */
3316 unsigned int offset;
3318 /* Generation marker. */
3319 unsigned int iter;
3322 struct ppc_link_hash_entry
3324 struct elf_link_hash_entry elf;
3326 union {
3327 /* A pointer to the most recently used stub hash entry against this
3328 symbol. */
3329 struct ppc_stub_hash_entry *stub_cache;
3331 /* A pointer to the next symbol starting with a '.' */
3332 struct ppc_link_hash_entry *next_dot_sym;
3333 } u;
3335 /* Track dynamic relocs copied for this symbol. */
3336 struct ppc_dyn_relocs *dyn_relocs;
3338 /* Link between function code and descriptor symbols. */
3339 struct ppc_link_hash_entry *oh;
3341 /* Flag function code and descriptor symbols. */
3342 unsigned int is_func:1;
3343 unsigned int is_func_descriptor:1;
3344 unsigned int fake:1;
3346 /* Whether global opd/toc sym has been adjusted or not.
3347 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3348 should be set for all globals defined in any opd/toc section. */
3349 unsigned int adjust_done:1;
3351 /* Set if we twiddled this symbol to weak at some stage. */
3352 unsigned int was_undefined:1;
3354 /* Contexts in which symbol is used in the GOT (or TOC).
3355 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3356 corresponding relocs are encountered during check_relocs.
3357 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3358 indicate the corresponding GOT entry type is not needed.
3359 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3360 a TPREL one. We use a separate flag rather than setting TPREL
3361 just for convenience in distinguishing the two cases. */
3362 #define TLS_GD 1 /* GD reloc. */
3363 #define TLS_LD 2 /* LD reloc. */
3364 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3365 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3366 #define TLS_TLS 16 /* Any TLS reloc. */
3367 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3368 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3369 char tls_mask;
3372 /* ppc64 ELF linker hash table. */
3374 struct ppc_link_hash_table
3376 struct elf_link_hash_table elf;
3378 /* The stub hash table. */
3379 struct bfd_hash_table stub_hash_table;
3381 /* Another hash table for plt_branch stubs. */
3382 struct bfd_hash_table branch_hash_table;
3384 /* Linker stub bfd. */
3385 bfd *stub_bfd;
3387 /* Linker call-backs. */
3388 asection * (*add_stub_section) (const char *, asection *);
3389 void (*layout_sections_again) (void);
3391 /* Array to keep track of which stub sections have been created, and
3392 information on stub grouping. */
3393 struct map_stub {
3394 /* This is the section to which stubs in the group will be attached. */
3395 asection *link_sec;
3396 /* The stub section. */
3397 asection *stub_sec;
3398 /* Along with elf_gp, specifies the TOC pointer used in this group. */
3399 bfd_vma toc_off;
3400 } *stub_group;
3402 /* Temp used when calculating TOC pointers. */
3403 bfd_vma toc_curr;
3405 /* Highest input section id. */
3406 int top_id;
3408 /* Highest output section index. */
3409 int top_index;
3411 /* Used when adding symbols. */
3412 struct ppc_link_hash_entry *dot_syms;
3414 /* List of input sections for each output section. */
3415 asection **input_list;
3417 /* Short-cuts to get to dynamic linker sections. */
3418 asection *got;
3419 asection *plt;
3420 asection *relplt;
3421 asection *dynbss;
3422 asection *relbss;
3423 asection *glink;
3424 asection *sfpr;
3425 asection *brlt;
3426 asection *relbrlt;
3428 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3429 struct ppc_link_hash_entry *tls_get_addr;
3430 struct ppc_link_hash_entry *tls_get_addr_fd;
3432 /* Statistics. */
3433 unsigned long stub_count[ppc_stub_plt_call];
3435 /* Number of stubs against global syms. */
3436 unsigned long stub_globals;
3438 /* Set if we should emit symbols for stubs. */
3439 unsigned int emit_stub_syms:1;
3441 /* Support for multiple toc sections. */
3442 unsigned int no_multi_toc:1;
3443 unsigned int multi_toc_needed:1;
3445 /* Set on error. */
3446 unsigned int stub_error:1;
3448 /* Temp used by ppc64_elf_check_directives. */
3449 unsigned int twiddled_syms:1;
3451 /* Incremented every time we size stubs. */
3452 unsigned int stub_iteration;
3454 /* Small local sym to section mapping cache. */
3455 struct sym_sec_cache sym_sec;
3458 /* Rename some of the generic section flags to better document how they
3459 are used here. */
3460 #define has_toc_reloc has_gp_reloc
3461 #define makes_toc_func_call need_finalize_relax
3462 #define call_check_in_progress reloc_done
3464 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3466 #define ppc_hash_table(p) \
3467 ((struct ppc_link_hash_table *) ((p)->hash))
3469 #define ppc_stub_hash_lookup(table, string, create, copy) \
3470 ((struct ppc_stub_hash_entry *) \
3471 bfd_hash_lookup ((table), (string), (create), (copy)))
3473 #define ppc_branch_hash_lookup(table, string, create, copy) \
3474 ((struct ppc_branch_hash_entry *) \
3475 bfd_hash_lookup ((table), (string), (create), (copy)))
3477 /* Create an entry in the stub hash table. */
3479 static struct bfd_hash_entry *
3480 stub_hash_newfunc (struct bfd_hash_entry *entry,
3481 struct bfd_hash_table *table,
3482 const char *string)
3484 /* Allocate the structure if it has not already been allocated by a
3485 subclass. */
3486 if (entry == NULL)
3488 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3489 if (entry == NULL)
3490 return entry;
3493 /* Call the allocation method of the superclass. */
3494 entry = bfd_hash_newfunc (entry, table, string);
3495 if (entry != NULL)
3497 struct ppc_stub_hash_entry *eh;
3499 /* Initialize the local fields. */
3500 eh = (struct ppc_stub_hash_entry *) entry;
3501 eh->stub_type = ppc_stub_none;
3502 eh->stub_sec = NULL;
3503 eh->stub_offset = 0;
3504 eh->target_value = 0;
3505 eh->target_section = NULL;
3506 eh->h = NULL;
3507 eh->id_sec = NULL;
3510 return entry;
3513 /* Create an entry in the branch hash table. */
3515 static struct bfd_hash_entry *
3516 branch_hash_newfunc (struct bfd_hash_entry *entry,
3517 struct bfd_hash_table *table,
3518 const char *string)
3520 /* Allocate the structure if it has not already been allocated by a
3521 subclass. */
3522 if (entry == NULL)
3524 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3525 if (entry == NULL)
3526 return entry;
3529 /* Call the allocation method of the superclass. */
3530 entry = bfd_hash_newfunc (entry, table, string);
3531 if (entry != NULL)
3533 struct ppc_branch_hash_entry *eh;
3535 /* Initialize the local fields. */
3536 eh = (struct ppc_branch_hash_entry *) entry;
3537 eh->offset = 0;
3538 eh->iter = 0;
3541 return entry;
3544 /* Create an entry in a ppc64 ELF linker hash table. */
3546 static struct bfd_hash_entry *
3547 link_hash_newfunc (struct bfd_hash_entry *entry,
3548 struct bfd_hash_table *table,
3549 const char *string)
3551 /* Allocate the structure if it has not already been allocated by a
3552 subclass. */
3553 if (entry == NULL)
3555 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3556 if (entry == NULL)
3557 return entry;
3560 /* Call the allocation method of the superclass. */
3561 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3562 if (entry != NULL)
3564 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3566 memset (&eh->u.stub_cache, 0,
3567 (sizeof (struct ppc_link_hash_entry)
3568 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3570 /* When making function calls, old ABI code references function entry
3571 points (dot symbols), while new ABI code references the function
3572 descriptor symbol. We need to make any combination of reference and
3573 definition work together, without breaking archive linking.
3575 For a defined function "foo" and an undefined call to "bar":
3576 An old object defines "foo" and ".foo", references ".bar" (possibly
3577 "bar" too).
3578 A new object defines "foo" and references "bar".
3580 A new object thus has no problem with its undefined symbols being
3581 satisfied by definitions in an old object. On the other hand, the
3582 old object won't have ".bar" satisfied by a new object.
3584 Keep a list of newly added dot-symbols. */
3586 if (string[0] == '.')
3588 struct ppc_link_hash_table *htab;
3590 htab = (struct ppc_link_hash_table *) table;
3591 eh->u.next_dot_sym = htab->dot_syms;
3592 htab->dot_syms = eh;
3596 return entry;
3599 /* Create a ppc64 ELF linker hash table. */
3601 static struct bfd_link_hash_table *
3602 ppc64_elf_link_hash_table_create (bfd *abfd)
3604 struct ppc_link_hash_table *htab;
3605 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3607 htab = bfd_zmalloc (amt);
3608 if (htab == NULL)
3609 return NULL;
3611 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3612 sizeof (struct ppc_link_hash_entry)))
3614 free (htab);
3615 return NULL;
3618 /* Init the stub hash table too. */
3619 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3620 sizeof (struct ppc_stub_hash_entry)))
3621 return NULL;
3623 /* And the branch hash table. */
3624 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3625 sizeof (struct ppc_branch_hash_entry)))
3626 return NULL;
3628 /* Initializing two fields of the union is just cosmetic. We really
3629 only care about glist, but when compiled on a 32-bit host the
3630 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3631 debugger inspection of these fields look nicer. */
3632 htab->elf.init_got_refcount.refcount = 0;
3633 htab->elf.init_got_refcount.glist = NULL;
3634 htab->elf.init_plt_refcount.refcount = 0;
3635 htab->elf.init_plt_refcount.glist = NULL;
3636 htab->elf.init_got_offset.offset = 0;
3637 htab->elf.init_got_offset.glist = NULL;
3638 htab->elf.init_plt_offset.offset = 0;
3639 htab->elf.init_plt_offset.glist = NULL;
3641 return &htab->elf.root;
3644 /* Free the derived linker hash table. */
3646 static void
3647 ppc64_elf_link_hash_table_free (struct bfd_link_hash_table *hash)
3649 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3651 bfd_hash_table_free (&ret->stub_hash_table);
3652 bfd_hash_table_free (&ret->branch_hash_table);
3653 _bfd_generic_link_hash_table_free (hash);
3656 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3658 void
3659 ppc64_elf_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
3661 struct ppc_link_hash_table *htab;
3663 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS64;
3665 /* Always hook our dynamic sections into the first bfd, which is the
3666 linker created stub bfd. This ensures that the GOT header is at
3667 the start of the output TOC section. */
3668 htab = ppc_hash_table (info);
3669 htab->stub_bfd = abfd;
3670 htab->elf.dynobj = abfd;
3673 /* Build a name for an entry in the stub hash table. */
3675 static char *
3676 ppc_stub_name (const asection *input_section,
3677 const asection *sym_sec,
3678 const struct ppc_link_hash_entry *h,
3679 const Elf_Internal_Rela *rel)
3681 char *stub_name;
3682 bfd_size_type len;
3684 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3685 offsets from a sym as a branch target? In fact, we could
3686 probably assume the addend is always zero. */
3687 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3689 if (h)
3691 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3692 stub_name = bfd_malloc (len);
3693 if (stub_name == NULL)
3694 return stub_name;
3696 sprintf (stub_name, "%08x.%s+%x",
3697 input_section->id & 0xffffffff,
3698 h->elf.root.root.string,
3699 (int) rel->r_addend & 0xffffffff);
3701 else
3703 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3704 stub_name = bfd_malloc (len);
3705 if (stub_name == NULL)
3706 return stub_name;
3708 sprintf (stub_name, "%08x.%x:%x+%x",
3709 input_section->id & 0xffffffff,
3710 sym_sec->id & 0xffffffff,
3711 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3712 (int) rel->r_addend & 0xffffffff);
3714 if (stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3715 stub_name[len - 2] = 0;
3716 return stub_name;
3719 /* Look up an entry in the stub hash. Stub entries are cached because
3720 creating the stub name takes a bit of time. */
3722 static struct ppc_stub_hash_entry *
3723 ppc_get_stub_entry (const asection *input_section,
3724 const asection *sym_sec,
3725 struct ppc_link_hash_entry *h,
3726 const Elf_Internal_Rela *rel,
3727 struct ppc_link_hash_table *htab)
3729 struct ppc_stub_hash_entry *stub_entry;
3730 const asection *id_sec;
3732 /* If this input section is part of a group of sections sharing one
3733 stub section, then use the id of the first section in the group.
3734 Stub names need to include a section id, as there may well be
3735 more than one stub used to reach say, printf, and we need to
3736 distinguish between them. */
3737 id_sec = htab->stub_group[input_section->id].link_sec;
3739 if (h != NULL && h->u.stub_cache != NULL
3740 && h->u.stub_cache->h == h
3741 && h->u.stub_cache->id_sec == id_sec)
3743 stub_entry = h->u.stub_cache;
3745 else
3747 char *stub_name;
3749 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3750 if (stub_name == NULL)
3751 return NULL;
3753 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3754 stub_name, FALSE, FALSE);
3755 if (h != NULL)
3756 h->u.stub_cache = stub_entry;
3758 free (stub_name);
3761 return stub_entry;
3764 /* Add a new stub entry to the stub hash. Not all fields of the new
3765 stub entry are initialised. */
3767 static struct ppc_stub_hash_entry *
3768 ppc_add_stub (const char *stub_name,
3769 asection *section,
3770 struct ppc_link_hash_table *htab)
3772 asection *link_sec;
3773 asection *stub_sec;
3774 struct ppc_stub_hash_entry *stub_entry;
3776 link_sec = htab->stub_group[section->id].link_sec;
3777 stub_sec = htab->stub_group[section->id].stub_sec;
3778 if (stub_sec == NULL)
3780 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3781 if (stub_sec == NULL)
3783 size_t namelen;
3784 bfd_size_type len;
3785 char *s_name;
3787 namelen = strlen (link_sec->name);
3788 len = namelen + sizeof (STUB_SUFFIX);
3789 s_name = bfd_alloc (htab->stub_bfd, len);
3790 if (s_name == NULL)
3791 return NULL;
3793 memcpy (s_name, link_sec->name, namelen);
3794 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3795 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3796 if (stub_sec == NULL)
3797 return NULL;
3798 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3800 htab->stub_group[section->id].stub_sec = stub_sec;
3803 /* Enter this entry into the linker stub hash table. */
3804 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3805 TRUE, FALSE);
3806 if (stub_entry == NULL)
3808 (*_bfd_error_handler) (_("%B: cannot create stub entry %s"),
3809 section->owner, stub_name);
3810 return NULL;
3813 stub_entry->stub_sec = stub_sec;
3814 stub_entry->stub_offset = 0;
3815 stub_entry->id_sec = link_sec;
3816 return stub_entry;
3819 /* Create sections for linker generated code. */
3821 static bfd_boolean
3822 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3824 struct ppc_link_hash_table *htab;
3825 flagword flags;
3827 htab = ppc_hash_table (info);
3829 /* Create .sfpr for code to save and restore fp regs. */
3830 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3831 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3832 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3833 flags);
3834 if (htab->sfpr == NULL
3835 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
3836 return FALSE;
3838 /* Create .glink for lazy dynamic linking support. */
3839 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3840 flags);
3841 if (htab->glink == NULL
3842 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
3843 return FALSE;
3845 /* Create branch lookup table for plt_branch stubs. */
3846 flags = (SEC_ALLOC | SEC_LOAD
3847 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3848 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3849 flags);
3850 if (htab->brlt == NULL
3851 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
3852 return FALSE;
3854 if (!info->shared)
3855 return TRUE;
3857 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3858 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3859 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
3860 ".rela.branch_lt",
3861 flags);
3862 if (!htab->relbrlt
3863 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
3864 return FALSE;
3866 return TRUE;
3869 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3870 not already done. */
3872 static bfd_boolean
3873 create_got_section (bfd *abfd, struct bfd_link_info *info)
3875 asection *got, *relgot;
3876 flagword flags;
3877 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3879 if (!htab->got)
3881 if (! _bfd_elf_create_got_section (htab->elf.dynobj, info))
3882 return FALSE;
3884 htab->got = bfd_get_section_by_name (htab->elf.dynobj, ".got");
3885 if (!htab->got)
3886 abort ();
3889 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3890 | SEC_LINKER_CREATED);
3892 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3893 if (!got
3894 || !bfd_set_section_alignment (abfd, got, 3))
3895 return FALSE;
3897 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3898 flags | SEC_READONLY);
3899 if (!relgot
3900 || ! bfd_set_section_alignment (abfd, relgot, 3))
3901 return FALSE;
3903 ppc64_elf_tdata (abfd)->got = got;
3904 ppc64_elf_tdata (abfd)->relgot = relgot;
3905 return TRUE;
3908 /* Create the dynamic sections, and set up shortcuts. */
3910 static bfd_boolean
3911 ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
3913 struct ppc_link_hash_table *htab;
3915 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
3916 return FALSE;
3918 htab = ppc_hash_table (info);
3919 if (!htab->got)
3920 htab->got = bfd_get_section_by_name (dynobj, ".got");
3921 htab->plt = bfd_get_section_by_name (dynobj, ".plt");
3922 htab->relplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3923 htab->dynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3924 if (!info->shared)
3925 htab->relbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3927 if (!htab->got || !htab->plt || !htab->relplt || !htab->dynbss
3928 || (!info->shared && !htab->relbss))
3929 abort ();
3931 return TRUE;
3934 /* Merge PLT info on FROM with that on TO. */
3936 static void
3937 move_plt_plist (struct ppc_link_hash_entry *from,
3938 struct ppc_link_hash_entry *to)
3940 if (from->elf.plt.plist != NULL)
3942 if (to->elf.plt.plist != NULL)
3944 struct plt_entry **entp;
3945 struct plt_entry *ent;
3947 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3949 struct plt_entry *dent;
3951 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3952 if (dent->addend == ent->addend)
3954 dent->plt.refcount += ent->plt.refcount;
3955 *entp = ent->next;
3956 break;
3958 if (dent == NULL)
3959 entp = &ent->next;
3961 *entp = to->elf.plt.plist;
3964 to->elf.plt.plist = from->elf.plt.plist;
3965 from->elf.plt.plist = NULL;
3969 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3971 static void
3972 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3973 struct elf_link_hash_entry *dir,
3974 struct elf_link_hash_entry *ind)
3976 struct ppc_link_hash_entry *edir, *eind;
3978 edir = (struct ppc_link_hash_entry *) dir;
3979 eind = (struct ppc_link_hash_entry *) ind;
3981 /* Copy over any dynamic relocs we may have on the indirect sym. */
3982 if (eind->dyn_relocs != NULL)
3984 if (edir->dyn_relocs != NULL)
3986 struct ppc_dyn_relocs **pp;
3987 struct ppc_dyn_relocs *p;
3989 /* Add reloc counts against the indirect sym to the direct sym
3990 list. Merge any entries against the same section. */
3991 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3993 struct ppc_dyn_relocs *q;
3995 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3996 if (q->sec == p->sec)
3998 q->pc_count += p->pc_count;
3999 q->count += p->count;
4000 *pp = p->next;
4001 break;
4003 if (q == NULL)
4004 pp = &p->next;
4006 *pp = edir->dyn_relocs;
4009 edir->dyn_relocs = eind->dyn_relocs;
4010 eind->dyn_relocs = NULL;
4013 edir->is_func |= eind->is_func;
4014 edir->is_func_descriptor |= eind->is_func_descriptor;
4015 edir->tls_mask |= eind->tls_mask;
4017 /* If called to transfer flags for a weakdef during processing
4018 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4019 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4020 if (!(ELIMINATE_COPY_RELOCS
4021 && eind->elf.root.type != bfd_link_hash_indirect
4022 && edir->elf.dynamic_adjusted))
4023 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4025 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4026 edir->elf.ref_regular |= eind->elf.ref_regular;
4027 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4028 edir->elf.needs_plt |= eind->elf.needs_plt;
4030 /* If we were called to copy over info for a weak sym, that's all. */
4031 if (eind->elf.root.type != bfd_link_hash_indirect)
4032 return;
4034 /* Copy over got entries that we may have already seen to the
4035 symbol which just became indirect. */
4036 if (eind->elf.got.glist != NULL)
4038 if (edir->elf.got.glist != NULL)
4040 struct got_entry **entp;
4041 struct got_entry *ent;
4043 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4045 struct got_entry *dent;
4047 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4048 if (dent->addend == ent->addend
4049 && dent->owner == ent->owner
4050 && dent->tls_type == ent->tls_type)
4052 dent->got.refcount += ent->got.refcount;
4053 *entp = ent->next;
4054 break;
4056 if (dent == NULL)
4057 entp = &ent->next;
4059 *entp = edir->elf.got.glist;
4062 edir->elf.got.glist = eind->elf.got.glist;
4063 eind->elf.got.glist = NULL;
4066 /* And plt entries. */
4067 move_plt_plist (eind, edir);
4069 if (eind->elf.dynindx != -1)
4071 if (edir->elf.dynindx != -1)
4072 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4073 edir->elf.dynstr_index);
4074 edir->elf.dynindx = eind->elf.dynindx;
4075 edir->elf.dynstr_index = eind->elf.dynstr_index;
4076 eind->elf.dynindx = -1;
4077 eind->elf.dynstr_index = 0;
4081 /* Find the function descriptor hash entry from the given function code
4082 hash entry FH. Link the entries via their OH fields. */
4084 static struct ppc_link_hash_entry *
4085 get_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4087 struct ppc_link_hash_entry *fdh = fh->oh;
4089 if (fdh == NULL)
4091 const char *fd_name = fh->elf.root.root.string + 1;
4093 fdh = (struct ppc_link_hash_entry *)
4094 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4095 if (fdh != NULL)
4097 fdh->is_func_descriptor = 1;
4098 fdh->oh = fh;
4099 fh->is_func = 1;
4100 fh->oh = fdh;
4104 return fdh;
4107 /* Make a fake function descriptor sym for the code sym FH. */
4109 static struct ppc_link_hash_entry *
4110 make_fdh (struct bfd_link_info *info,
4111 struct ppc_link_hash_entry *fh)
4113 bfd *abfd;
4114 asymbol *newsym;
4115 struct bfd_link_hash_entry *bh;
4116 struct ppc_link_hash_entry *fdh;
4118 abfd = fh->elf.root.u.undef.abfd;
4119 newsym = bfd_make_empty_symbol (abfd);
4120 newsym->name = fh->elf.root.root.string + 1;
4121 newsym->section = bfd_und_section_ptr;
4122 newsym->value = 0;
4123 newsym->flags = BSF_WEAK;
4125 bh = NULL;
4126 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4127 newsym->flags, newsym->section,
4128 newsym->value, NULL, FALSE, FALSE,
4129 &bh))
4130 return NULL;
4132 fdh = (struct ppc_link_hash_entry *) bh;
4133 fdh->elf.non_elf = 0;
4134 fdh->fake = 1;
4135 fdh->is_func_descriptor = 1;
4136 fdh->oh = fh;
4137 fh->is_func = 1;
4138 fh->oh = fdh;
4139 return fdh;
4142 /* Fix function descriptor symbols defined in .opd sections to be
4143 function type. */
4145 static bfd_boolean
4146 ppc64_elf_add_symbol_hook (bfd *ibfd ATTRIBUTE_UNUSED,
4147 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4148 Elf_Internal_Sym *isym,
4149 const char **name ATTRIBUTE_UNUSED,
4150 flagword *flags ATTRIBUTE_UNUSED,
4151 asection **sec,
4152 bfd_vma *value ATTRIBUTE_UNUSED)
4154 if (*sec != NULL
4155 && strcmp (bfd_get_section_name (ibfd, *sec), ".opd") == 0)
4156 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4158 return TRUE;
4161 /* This function makes an old ABI object reference to ".bar" cause the
4162 inclusion of a new ABI object archive that defines "bar".
4163 NAME is a symbol defined in an archive. Return a symbol in the hash
4164 table that might be satisfied by the archive symbols. */
4166 static struct elf_link_hash_entry *
4167 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4168 struct bfd_link_info *info,
4169 const char *name)
4171 struct elf_link_hash_entry *h;
4172 char *dot_name;
4173 size_t len;
4175 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4176 if (h != NULL
4177 /* Don't return this sym if it is a fake function descriptor
4178 created by add_symbol_adjust. */
4179 && !(h->root.type == bfd_link_hash_undefweak
4180 && ((struct ppc_link_hash_entry *) h)->fake))
4181 return h;
4183 if (name[0] == '.')
4184 return h;
4186 len = strlen (name);
4187 dot_name = bfd_alloc (abfd, len + 2);
4188 if (dot_name == NULL)
4189 return (struct elf_link_hash_entry *) 0 - 1;
4190 dot_name[0] = '.';
4191 memcpy (dot_name + 1, name, len + 1);
4192 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4193 bfd_release (abfd, dot_name);
4194 return h;
4197 /* This function satisfies all old ABI object references to ".bar" if a
4198 new ABI object defines "bar". Well, at least, undefined dot symbols
4199 are made weak. This stops later archive searches from including an
4200 object if we already have a function descriptor definition. It also
4201 prevents the linker complaining about undefined symbols.
4202 We also check and correct mismatched symbol visibility here. The
4203 most restrictive visibility of the function descriptor and the
4204 function entry symbol is used. */
4206 static bfd_boolean
4207 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4209 struct ppc_link_hash_table *htab;
4210 struct ppc_link_hash_entry *fdh;
4212 if (eh->elf.root.type == bfd_link_hash_indirect)
4213 return TRUE;
4215 if (eh->elf.root.type == bfd_link_hash_warning)
4216 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4218 if (eh->elf.root.root.string[0] != '.')
4219 abort ();
4221 htab = ppc_hash_table (info);
4222 fdh = get_fdh (eh, htab);
4223 if (fdh == NULL
4224 && !info->relocatable
4225 && (eh->elf.root.type == bfd_link_hash_undefined
4226 || eh->elf.root.type == bfd_link_hash_undefweak)
4227 && eh->elf.ref_regular)
4229 /* Make an undefweak function descriptor sym, which is enough to
4230 pull in an --as-needed shared lib, but won't cause link
4231 errors. Archives are handled elsewhere. */
4232 fdh = make_fdh (info, eh);
4233 if (fdh == NULL)
4234 return FALSE;
4235 else
4236 fdh->elf.ref_regular = 1;
4238 else if (fdh != NULL)
4240 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4241 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4242 if (entry_vis < descr_vis)
4243 fdh->elf.other += entry_vis - descr_vis;
4244 else if (entry_vis > descr_vis)
4245 eh->elf.other += descr_vis - entry_vis;
4247 if ((fdh->elf.root.type == bfd_link_hash_defined
4248 || fdh->elf.root.type == bfd_link_hash_defweak)
4249 && eh->elf.root.type == bfd_link_hash_undefined)
4251 eh->elf.root.type = bfd_link_hash_undefweak;
4252 eh->was_undefined = 1;
4253 htab->twiddled_syms = 1;
4257 return TRUE;
4260 /* Process list of dot-symbols we made in link_hash_newfunc. */
4262 static bfd_boolean
4263 ppc64_elf_check_directives (bfd *ibfd, struct bfd_link_info *info)
4265 struct ppc_link_hash_table *htab;
4266 struct ppc_link_hash_entry **p, *eh;
4268 htab = ppc_hash_table (info);
4269 if (!is_ppc64_elf_target (htab->elf.root.creator))
4270 return TRUE;
4272 if (is_ppc64_elf_target (ibfd->xvec))
4274 p = &htab->dot_syms;
4275 while ((eh = *p) != NULL)
4277 *p = NULL;
4278 if (!add_symbol_adjust (eh, info))
4279 return FALSE;
4280 p = &eh->u.next_dot_sym;
4284 /* Clear the list for non-ppc64 input files. */
4285 p = &htab->dot_syms;
4286 while ((eh = *p) != NULL)
4288 *p = NULL;
4289 p = &eh->u.next_dot_sym;
4292 /* We need to fix the undefs list for any syms we have twiddled to
4293 undef_weak. */
4294 if (htab->twiddled_syms)
4296 bfd_link_repair_undef_list (&htab->elf.root);
4297 htab->twiddled_syms = 0;
4299 return TRUE;
4302 /* Undo hash table changes when an --as-needed input file is determined
4303 not to be needed. */
4305 static bfd_boolean
4306 ppc64_elf_as_needed_cleanup (bfd *ibfd ATTRIBUTE_UNUSED,
4307 struct bfd_link_info *info)
4309 ppc_hash_table (info)->dot_syms = NULL;
4310 return TRUE;
4313 static bfd_boolean
4314 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4315 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4317 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4318 char *local_got_tls_masks;
4320 if (local_got_ents == NULL)
4322 bfd_size_type size = symtab_hdr->sh_info;
4324 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
4325 local_got_ents = bfd_zalloc (abfd, size);
4326 if (local_got_ents == NULL)
4327 return FALSE;
4328 elf_local_got_ents (abfd) = local_got_ents;
4331 if ((tls_type & TLS_EXPLICIT) == 0)
4333 struct got_entry *ent;
4335 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4336 if (ent->addend == r_addend
4337 && ent->owner == abfd
4338 && ent->tls_type == tls_type)
4339 break;
4340 if (ent == NULL)
4342 bfd_size_type amt = sizeof (*ent);
4343 ent = bfd_alloc (abfd, amt);
4344 if (ent == NULL)
4345 return FALSE;
4346 ent->next = local_got_ents[r_symndx];
4347 ent->addend = r_addend;
4348 ent->owner = abfd;
4349 ent->tls_type = tls_type;
4350 ent->got.refcount = 0;
4351 local_got_ents[r_symndx] = ent;
4353 ent->got.refcount += 1;
4356 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
4357 local_got_tls_masks[r_symndx] |= tls_type;
4358 return TRUE;
4361 static bfd_boolean
4362 update_plt_info (bfd *abfd, struct ppc_link_hash_entry *eh, bfd_vma addend)
4364 struct plt_entry *ent;
4366 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
4367 if (ent->addend == addend)
4368 break;
4369 if (ent == NULL)
4371 bfd_size_type amt = sizeof (*ent);
4372 ent = bfd_alloc (abfd, amt);
4373 if (ent == NULL)
4374 return FALSE;
4375 ent->next = eh->elf.plt.plist;
4376 ent->addend = addend;
4377 ent->plt.refcount = 0;
4378 eh->elf.plt.plist = ent;
4380 ent->plt.refcount += 1;
4381 eh->elf.needs_plt = 1;
4382 if (eh->elf.root.root.string[0] == '.'
4383 && eh->elf.root.root.string[1] != '\0')
4384 eh->is_func = 1;
4385 return TRUE;
4388 /* Look through the relocs for a section during the first phase, and
4389 calculate needed space in the global offset table, procedure
4390 linkage table, and dynamic reloc sections. */
4392 static bfd_boolean
4393 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4394 asection *sec, const Elf_Internal_Rela *relocs)
4396 struct ppc_link_hash_table *htab;
4397 Elf_Internal_Shdr *symtab_hdr;
4398 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
4399 const Elf_Internal_Rela *rel;
4400 const Elf_Internal_Rela *rel_end;
4401 asection *sreloc;
4402 asection **opd_sym_map;
4404 if (info->relocatable)
4405 return TRUE;
4407 /* Don't do anything special with non-loaded, non-alloced sections.
4408 In particular, any relocs in such sections should not affect GOT
4409 and PLT reference counting (ie. we don't allow them to create GOT
4410 or PLT entries), there's no possibility or desire to optimize TLS
4411 relocs, and there's not much point in propagating relocs to shared
4412 libs that the dynamic linker won't relocate. */
4413 if ((sec->flags & SEC_ALLOC) == 0)
4414 return TRUE;
4416 htab = ppc_hash_table (info);
4417 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4419 sym_hashes = elf_sym_hashes (abfd);
4420 sym_hashes_end = (sym_hashes
4421 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
4422 - symtab_hdr->sh_info);
4424 sreloc = NULL;
4425 opd_sym_map = NULL;
4426 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
4428 /* Garbage collection needs some extra help with .opd sections.
4429 We don't want to necessarily keep everything referenced by
4430 relocs in .opd, as that would keep all functions. Instead,
4431 if we reference an .opd symbol (a function descriptor), we
4432 want to keep the function code symbol's section. This is
4433 easy for global symbols, but for local syms we need to keep
4434 information about the associated function section. Later, if
4435 edit_opd deletes entries, we'll use this array to adjust
4436 local syms in .opd. */
4437 union opd_info {
4438 asection *func_section;
4439 long entry_adjust;
4441 bfd_size_type amt;
4443 amt = sec->size * sizeof (union opd_info) / 8;
4444 opd_sym_map = bfd_zalloc (abfd, amt);
4445 if (opd_sym_map == NULL)
4446 return FALSE;
4447 ppc64_elf_section_data (sec)->u.opd_func_sec = opd_sym_map;
4448 BFD_ASSERT (ppc64_elf_section_data (sec)->sec_type == sec_normal);
4449 ppc64_elf_section_data (sec)->sec_type = sec_opd;
4452 if (htab->sfpr == NULL
4453 && !create_linkage_sections (htab->elf.dynobj, info))
4454 return FALSE;
4456 rel_end = relocs + sec->reloc_count;
4457 for (rel = relocs; rel < rel_end; rel++)
4459 unsigned long r_symndx;
4460 struct elf_link_hash_entry *h;
4461 enum elf_ppc64_reloc_type r_type;
4462 int tls_type = 0;
4463 struct _ppc64_elf_section_data *ppc64_sec;
4465 r_symndx = ELF64_R_SYM (rel->r_info);
4466 if (r_symndx < symtab_hdr->sh_info)
4467 h = NULL;
4468 else
4470 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4471 while (h->root.type == bfd_link_hash_indirect
4472 || h->root.type == bfd_link_hash_warning)
4473 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4476 r_type = ELF64_R_TYPE (rel->r_info);
4477 switch (r_type)
4479 case R_PPC64_GOT_TLSLD16:
4480 case R_PPC64_GOT_TLSLD16_LO:
4481 case R_PPC64_GOT_TLSLD16_HI:
4482 case R_PPC64_GOT_TLSLD16_HA:
4483 ppc64_tlsld_got (abfd)->refcount += 1;
4484 tls_type = TLS_TLS | TLS_LD;
4485 goto dogottls;
4487 case R_PPC64_GOT_TLSGD16:
4488 case R_PPC64_GOT_TLSGD16_LO:
4489 case R_PPC64_GOT_TLSGD16_HI:
4490 case R_PPC64_GOT_TLSGD16_HA:
4491 tls_type = TLS_TLS | TLS_GD;
4492 goto dogottls;
4494 case R_PPC64_GOT_TPREL16_DS:
4495 case R_PPC64_GOT_TPREL16_LO_DS:
4496 case R_PPC64_GOT_TPREL16_HI:
4497 case R_PPC64_GOT_TPREL16_HA:
4498 if (info->shared)
4499 info->flags |= DF_STATIC_TLS;
4500 tls_type = TLS_TLS | TLS_TPREL;
4501 goto dogottls;
4503 case R_PPC64_GOT_DTPREL16_DS:
4504 case R_PPC64_GOT_DTPREL16_LO_DS:
4505 case R_PPC64_GOT_DTPREL16_HI:
4506 case R_PPC64_GOT_DTPREL16_HA:
4507 tls_type = TLS_TLS | TLS_DTPREL;
4508 dogottls:
4509 sec->has_tls_reloc = 1;
4510 /* Fall thru */
4512 case R_PPC64_GOT16:
4513 case R_PPC64_GOT16_DS:
4514 case R_PPC64_GOT16_HA:
4515 case R_PPC64_GOT16_HI:
4516 case R_PPC64_GOT16_LO:
4517 case R_PPC64_GOT16_LO_DS:
4518 /* This symbol requires a global offset table entry. */
4519 sec->has_toc_reloc = 1;
4520 if (ppc64_elf_tdata (abfd)->got == NULL
4521 && !create_got_section (abfd, info))
4522 return FALSE;
4524 if (h != NULL)
4526 struct ppc_link_hash_entry *eh;
4527 struct got_entry *ent;
4529 eh = (struct ppc_link_hash_entry *) h;
4530 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4531 if (ent->addend == rel->r_addend
4532 && ent->owner == abfd
4533 && ent->tls_type == tls_type)
4534 break;
4535 if (ent == NULL)
4537 bfd_size_type amt = sizeof (*ent);
4538 ent = bfd_alloc (abfd, amt);
4539 if (ent == NULL)
4540 return FALSE;
4541 ent->next = eh->elf.got.glist;
4542 ent->addend = rel->r_addend;
4543 ent->owner = abfd;
4544 ent->tls_type = tls_type;
4545 ent->got.refcount = 0;
4546 eh->elf.got.glist = ent;
4548 ent->got.refcount += 1;
4549 eh->tls_mask |= tls_type;
4551 else
4552 /* This is a global offset table entry for a local symbol. */
4553 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4554 rel->r_addend, tls_type))
4555 return FALSE;
4556 break;
4558 case R_PPC64_PLT16_HA:
4559 case R_PPC64_PLT16_HI:
4560 case R_PPC64_PLT16_LO:
4561 case R_PPC64_PLT32:
4562 case R_PPC64_PLT64:
4563 /* This symbol requires a procedure linkage table entry. We
4564 actually build the entry in adjust_dynamic_symbol,
4565 because this might be a case of linking PIC code without
4566 linking in any dynamic objects, in which case we don't
4567 need to generate a procedure linkage table after all. */
4568 if (h == NULL)
4570 /* It does not make sense to have a procedure linkage
4571 table entry for a local symbol. */
4572 bfd_set_error (bfd_error_bad_value);
4573 return FALSE;
4575 else
4576 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4577 rel->r_addend))
4578 return FALSE;
4579 break;
4581 /* The following relocations don't need to propagate the
4582 relocation if linking a shared object since they are
4583 section relative. */
4584 case R_PPC64_SECTOFF:
4585 case R_PPC64_SECTOFF_LO:
4586 case R_PPC64_SECTOFF_HI:
4587 case R_PPC64_SECTOFF_HA:
4588 case R_PPC64_SECTOFF_DS:
4589 case R_PPC64_SECTOFF_LO_DS:
4590 case R_PPC64_DTPREL16:
4591 case R_PPC64_DTPREL16_LO:
4592 case R_PPC64_DTPREL16_HI:
4593 case R_PPC64_DTPREL16_HA:
4594 case R_PPC64_DTPREL16_DS:
4595 case R_PPC64_DTPREL16_LO_DS:
4596 case R_PPC64_DTPREL16_HIGHER:
4597 case R_PPC64_DTPREL16_HIGHERA:
4598 case R_PPC64_DTPREL16_HIGHEST:
4599 case R_PPC64_DTPREL16_HIGHESTA:
4600 break;
4602 /* Nor do these. */
4603 case R_PPC64_TOC16:
4604 case R_PPC64_TOC16_LO:
4605 case R_PPC64_TOC16_HI:
4606 case R_PPC64_TOC16_HA:
4607 case R_PPC64_TOC16_DS:
4608 case R_PPC64_TOC16_LO_DS:
4609 sec->has_toc_reloc = 1;
4610 break;
4612 /* This relocation describes the C++ object vtable hierarchy.
4613 Reconstruct it for later use during GC. */
4614 case R_PPC64_GNU_VTINHERIT:
4615 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4616 return FALSE;
4617 break;
4619 /* This relocation describes which C++ vtable entries are actually
4620 used. Record for later use during GC. */
4621 case R_PPC64_GNU_VTENTRY:
4622 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4623 return FALSE;
4624 break;
4626 case R_PPC64_REL14:
4627 case R_PPC64_REL14_BRTAKEN:
4628 case R_PPC64_REL14_BRNTAKEN:
4630 asection *dest = NULL;
4632 /* Heuristic: If jumping outside our section, chances are
4633 we are going to need a stub. */
4634 if (h != NULL)
4636 /* If the sym is weak it may be overridden later, so
4637 don't assume we know where a weak sym lives. */
4638 if (h->root.type == bfd_link_hash_defined)
4639 dest = h->root.u.def.section;
4641 else
4642 dest = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4643 sec, r_symndx);
4644 if (dest != sec)
4645 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4647 /* Fall through. */
4649 case R_PPC64_REL24:
4650 if (h != NULL)
4652 /* We may need a .plt entry if the function this reloc
4653 refers to is in a shared lib. */
4654 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4655 rel->r_addend))
4656 return FALSE;
4657 if (h == &htab->tls_get_addr->elf
4658 || h == &htab->tls_get_addr_fd->elf)
4659 sec->has_tls_reloc = 1;
4660 else if (htab->tls_get_addr == NULL
4661 && CONST_STRNEQ (h->root.root.string, ".__tls_get_addr")
4662 && (h->root.root.string[15] == 0
4663 || h->root.root.string[15] == '@'))
4665 htab->tls_get_addr = (struct ppc_link_hash_entry *) h;
4666 sec->has_tls_reloc = 1;
4668 else if (htab->tls_get_addr_fd == NULL
4669 && CONST_STRNEQ (h->root.root.string, "__tls_get_addr")
4670 && (h->root.root.string[14] == 0
4671 || h->root.root.string[14] == '@'))
4673 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) h;
4674 sec->has_tls_reloc = 1;
4677 break;
4679 case R_PPC64_TPREL64:
4680 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4681 if (info->shared)
4682 info->flags |= DF_STATIC_TLS;
4683 goto dotlstoc;
4685 case R_PPC64_DTPMOD64:
4686 if (rel + 1 < rel_end
4687 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4688 && rel[1].r_offset == rel->r_offset + 8)
4689 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4690 else
4691 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4692 goto dotlstoc;
4694 case R_PPC64_DTPREL64:
4695 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4696 if (rel != relocs
4697 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4698 && rel[-1].r_offset == rel->r_offset - 8)
4699 /* This is the second reloc of a dtpmod, dtprel pair.
4700 Don't mark with TLS_DTPREL. */
4701 goto dodyn;
4703 dotlstoc:
4704 sec->has_tls_reloc = 1;
4705 if (h != NULL)
4707 struct ppc_link_hash_entry *eh;
4708 eh = (struct ppc_link_hash_entry *) h;
4709 eh->tls_mask |= tls_type;
4711 else
4712 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4713 rel->r_addend, tls_type))
4714 return FALSE;
4716 ppc64_sec = ppc64_elf_section_data (sec);
4717 if (ppc64_sec->sec_type != sec_toc)
4719 /* One extra to simplify get_tls_mask. */
4720 bfd_size_type amt = sec->size * sizeof (unsigned) / 8 + 1;
4721 ppc64_sec->u.t_symndx = bfd_zalloc (abfd, amt);
4722 if (ppc64_sec->u.t_symndx == NULL)
4723 return FALSE;
4724 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4725 ppc64_sec->sec_type = sec_toc;
4727 BFD_ASSERT (rel->r_offset % 8 == 0);
4728 ppc64_sec->u.t_symndx[rel->r_offset / 8] = r_symndx;
4730 /* Mark the second slot of a GD or LD entry.
4731 -1 to indicate GD and -2 to indicate LD. */
4732 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
4733 ppc64_sec->u.t_symndx[rel->r_offset / 8 + 1] = -1;
4734 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
4735 ppc64_sec->u.t_symndx[rel->r_offset / 8 + 1] = -2;
4736 goto dodyn;
4738 case R_PPC64_TPREL16:
4739 case R_PPC64_TPREL16_LO:
4740 case R_PPC64_TPREL16_HI:
4741 case R_PPC64_TPREL16_HA:
4742 case R_PPC64_TPREL16_DS:
4743 case R_PPC64_TPREL16_LO_DS:
4744 case R_PPC64_TPREL16_HIGHER:
4745 case R_PPC64_TPREL16_HIGHERA:
4746 case R_PPC64_TPREL16_HIGHEST:
4747 case R_PPC64_TPREL16_HIGHESTA:
4748 if (info->shared)
4750 info->flags |= DF_STATIC_TLS;
4751 goto dodyn;
4753 break;
4755 case R_PPC64_ADDR64:
4756 if (opd_sym_map != NULL
4757 && rel + 1 < rel_end
4758 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
4760 if (h != NULL)
4762 if (h->root.root.string[0] == '.'
4763 && h->root.root.string[1] != 0
4764 && get_fdh ((struct ppc_link_hash_entry *) h, htab))
4766 else
4767 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4769 else
4771 asection *s;
4773 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
4774 r_symndx);
4775 if (s == NULL)
4776 return FALSE;
4777 else if (s != sec)
4778 opd_sym_map[rel->r_offset / 8] = s;
4781 /* Fall through. */
4783 case R_PPC64_REL30:
4784 case R_PPC64_REL32:
4785 case R_PPC64_REL64:
4786 case R_PPC64_ADDR14:
4787 case R_PPC64_ADDR14_BRNTAKEN:
4788 case R_PPC64_ADDR14_BRTAKEN:
4789 case R_PPC64_ADDR16:
4790 case R_PPC64_ADDR16_DS:
4791 case R_PPC64_ADDR16_HA:
4792 case R_PPC64_ADDR16_HI:
4793 case R_PPC64_ADDR16_HIGHER:
4794 case R_PPC64_ADDR16_HIGHERA:
4795 case R_PPC64_ADDR16_HIGHEST:
4796 case R_PPC64_ADDR16_HIGHESTA:
4797 case R_PPC64_ADDR16_LO:
4798 case R_PPC64_ADDR16_LO_DS:
4799 case R_PPC64_ADDR24:
4800 case R_PPC64_ADDR32:
4801 case R_PPC64_UADDR16:
4802 case R_PPC64_UADDR32:
4803 case R_PPC64_UADDR64:
4804 case R_PPC64_TOC:
4805 if (h != NULL && !info->shared)
4806 /* We may need a copy reloc. */
4807 h->non_got_ref = 1;
4809 /* Don't propagate .opd relocs. */
4810 if (NO_OPD_RELOCS && opd_sym_map != NULL)
4811 break;
4813 /* If we are creating a shared library, and this is a reloc
4814 against a global symbol, or a non PC relative reloc
4815 against a local symbol, then we need to copy the reloc
4816 into the shared library. However, if we are linking with
4817 -Bsymbolic, we do not need to copy a reloc against a
4818 global symbol which is defined in an object we are
4819 including in the link (i.e., DEF_REGULAR is set). At
4820 this point we have not seen all the input files, so it is
4821 possible that DEF_REGULAR is not set now but will be set
4822 later (it is never cleared). In case of a weak definition,
4823 DEF_REGULAR may be cleared later by a strong definition in
4824 a shared library. We account for that possibility below by
4825 storing information in the dyn_relocs field of the hash
4826 table entry. A similar situation occurs when creating
4827 shared libraries and symbol visibility changes render the
4828 symbol local.
4830 If on the other hand, we are creating an executable, we
4831 may need to keep relocations for symbols satisfied by a
4832 dynamic library if we manage to avoid copy relocs for the
4833 symbol. */
4834 dodyn:
4835 if ((info->shared
4836 && (MUST_BE_DYN_RELOC (r_type)
4837 || (h != NULL
4838 && (! info->symbolic
4839 || h->root.type == bfd_link_hash_defweak
4840 || !h->def_regular))))
4841 || (ELIMINATE_COPY_RELOCS
4842 && !info->shared
4843 && h != NULL
4844 && (h->root.type == bfd_link_hash_defweak
4845 || !h->def_regular)))
4847 struct ppc_dyn_relocs *p;
4848 struct ppc_dyn_relocs **head;
4850 /* We must copy these reloc types into the output file.
4851 Create a reloc section in dynobj and make room for
4852 this reloc. */
4853 if (sreloc == NULL)
4855 const char *name;
4856 bfd *dynobj;
4858 name = (bfd_elf_string_from_elf_section
4859 (abfd,
4860 elf_elfheader (abfd)->e_shstrndx,
4861 elf_section_data (sec)->rel_hdr.sh_name));
4862 if (name == NULL)
4863 return FALSE;
4865 if (! CONST_STRNEQ (name, ".rela")
4866 || strcmp (bfd_get_section_name (abfd, sec),
4867 name + 5) != 0)
4869 (*_bfd_error_handler)
4870 (_("%B: bad relocation section name `%s\'"),
4871 abfd, name);
4872 bfd_set_error (bfd_error_bad_value);
4875 dynobj = htab->elf.dynobj;
4876 sreloc = bfd_get_section_by_name (dynobj, name);
4877 if (sreloc == NULL)
4879 flagword flags;
4881 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4882 | SEC_IN_MEMORY | SEC_LINKER_CREATED
4883 | SEC_ALLOC | SEC_LOAD);
4884 sreloc = bfd_make_section_with_flags (dynobj,
4885 name,
4886 flags);
4887 if (sreloc == NULL
4888 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
4889 return FALSE;
4891 elf_section_data (sec)->sreloc = sreloc;
4894 /* If this is a global symbol, we count the number of
4895 relocations we need for this symbol. */
4896 if (h != NULL)
4898 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
4900 else
4902 /* Track dynamic relocs needed for local syms too.
4903 We really need local syms available to do this
4904 easily. Oh well. */
4906 asection *s;
4907 void *vpp;
4909 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4910 sec, r_symndx);
4911 if (s == NULL)
4912 return FALSE;
4914 vpp = &elf_section_data (s)->local_dynrel;
4915 head = (struct ppc_dyn_relocs **) vpp;
4918 p = *head;
4919 if (p == NULL || p->sec != sec)
4921 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4922 if (p == NULL)
4923 return FALSE;
4924 p->next = *head;
4925 *head = p;
4926 p->sec = sec;
4927 p->count = 0;
4928 p->pc_count = 0;
4931 p->count += 1;
4932 if (!MUST_BE_DYN_RELOC (r_type))
4933 p->pc_count += 1;
4935 break;
4937 default:
4938 break;
4942 return TRUE;
4945 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
4946 of the code entry point, and its section. */
4948 static bfd_vma
4949 opd_entry_value (asection *opd_sec,
4950 bfd_vma offset,
4951 asection **code_sec,
4952 bfd_vma *code_off)
4954 bfd *opd_bfd = opd_sec->owner;
4955 Elf_Internal_Rela *relocs;
4956 Elf_Internal_Rela *lo, *hi, *look;
4957 bfd_vma val;
4959 /* No relocs implies we are linking a --just-symbols object. */
4960 if (opd_sec->reloc_count == 0)
4962 bfd_vma val;
4964 if (!bfd_get_section_contents (opd_bfd, opd_sec, &val, offset, 8))
4965 return (bfd_vma) -1;
4967 if (code_sec != NULL)
4969 asection *sec, *likely = NULL;
4970 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
4971 if (sec->vma <= val
4972 && (sec->flags & SEC_LOAD) != 0
4973 && (sec->flags & SEC_ALLOC) != 0)
4974 likely = sec;
4975 if (likely != NULL)
4977 *code_sec = likely;
4978 if (code_off != NULL)
4979 *code_off = val - likely->vma;
4982 return val;
4985 relocs = ppc64_elf_tdata (opd_bfd)->opd_relocs;
4986 if (relocs == NULL)
4987 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
4989 /* Go find the opd reloc at the sym address. */
4990 lo = relocs;
4991 BFD_ASSERT (lo != NULL);
4992 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
4993 val = (bfd_vma) -1;
4994 while (lo < hi)
4996 look = lo + (hi - lo) / 2;
4997 if (look->r_offset < offset)
4998 lo = look + 1;
4999 else if (look->r_offset > offset)
5000 hi = look;
5001 else
5003 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (opd_bfd)->symtab_hdr;
5004 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5005 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5007 unsigned long symndx = ELF64_R_SYM (look->r_info);
5008 asection *sec;
5010 if (symndx < symtab_hdr->sh_info)
5012 Elf_Internal_Sym *sym;
5014 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5015 if (sym == NULL)
5017 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5018 symtab_hdr->sh_info,
5019 0, NULL, NULL, NULL);
5020 if (sym == NULL)
5021 break;
5022 symtab_hdr->contents = (bfd_byte *) sym;
5025 sym += symndx;
5026 val = sym->st_value;
5027 sec = NULL;
5028 if ((sym->st_shndx != SHN_UNDEF
5029 && sym->st_shndx < SHN_LORESERVE)
5030 || sym->st_shndx > SHN_HIRESERVE)
5031 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5032 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5034 else
5036 struct elf_link_hash_entry **sym_hashes;
5037 struct elf_link_hash_entry *rh;
5039 sym_hashes = elf_sym_hashes (opd_bfd);
5040 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5041 while (rh->root.type == bfd_link_hash_indirect
5042 || rh->root.type == bfd_link_hash_warning)
5043 rh = ((struct elf_link_hash_entry *) rh->root.u.i.link);
5044 BFD_ASSERT (rh->root.type == bfd_link_hash_defined
5045 || rh->root.type == bfd_link_hash_defweak);
5046 val = rh->root.u.def.value;
5047 sec = rh->root.u.def.section;
5049 val += look->r_addend;
5050 if (code_off != NULL)
5051 *code_off = val;
5052 if (code_sec != NULL)
5053 *code_sec = sec;
5054 if (sec != NULL && sec->output_section != NULL)
5055 val += sec->output_section->vma + sec->output_offset;
5057 break;
5061 return val;
5064 /* Mark sections containing dynamically referenced symbols. When
5065 building shared libraries, we must assume that any visible symbol is
5066 referenced. */
5068 static bfd_boolean
5069 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5071 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5072 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
5074 if (eh->elf.root.type == bfd_link_hash_warning)
5075 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
5077 /* Dynamic linking info is on the func descriptor sym. */
5078 if (eh->oh != NULL
5079 && eh->oh->is_func_descriptor
5080 && (eh->oh->elf.root.type == bfd_link_hash_defined
5081 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5082 eh = eh->oh;
5084 if ((eh->elf.root.type == bfd_link_hash_defined
5085 || eh->elf.root.type == bfd_link_hash_defweak)
5086 && (eh->elf.ref_dynamic
5087 || (!info->executable
5088 && eh->elf.def_regular
5089 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5090 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN)))
5092 asection *code_sec;
5094 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5096 /* Function descriptor syms cause the associated
5097 function code sym section to be marked. */
5098 if (eh->is_func_descriptor
5099 && (eh->oh->elf.root.type == bfd_link_hash_defined
5100 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5101 eh->oh->elf.root.u.def.section->flags |= SEC_KEEP;
5102 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5103 && opd_entry_value (eh->elf.root.u.def.section,
5104 eh->elf.root.u.def.value,
5105 &code_sec, NULL) != (bfd_vma) -1)
5106 code_sec->flags |= SEC_KEEP;
5109 return TRUE;
5112 /* Return the section that should be marked against GC for a given
5113 relocation. */
5115 static asection *
5116 ppc64_elf_gc_mark_hook (asection *sec,
5117 struct bfd_link_info *info,
5118 Elf_Internal_Rela *rel,
5119 struct elf_link_hash_entry *h,
5120 Elf_Internal_Sym *sym)
5122 asection *rsec;
5124 /* First mark all our entry sym sections. */
5125 if (info->gc_sym_list != NULL)
5127 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5128 struct bfd_sym_chain *sym = info->gc_sym_list;
5130 info->gc_sym_list = NULL;
5131 for (; sym != NULL; sym = sym->next)
5133 struct ppc_link_hash_entry *eh;
5135 eh = (struct ppc_link_hash_entry *)
5136 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
5137 if (eh == NULL)
5138 continue;
5139 if (eh->elf.root.type != bfd_link_hash_defined
5140 && eh->elf.root.type != bfd_link_hash_defweak)
5141 continue;
5143 if (eh->is_func_descriptor
5144 && (eh->oh->elf.root.type == bfd_link_hash_defined
5145 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5146 rsec = eh->oh->elf.root.u.def.section;
5147 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5148 && opd_entry_value (eh->elf.root.u.def.section,
5149 eh->elf.root.u.def.value,
5150 &rsec, NULL) != (bfd_vma) -1)
5152 else
5153 continue;
5155 if (!rsec->gc_mark)
5156 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5158 rsec = eh->elf.root.u.def.section;
5159 if (!rsec->gc_mark)
5160 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5164 /* Syms return NULL if we're marking .opd, so we avoid marking all
5165 function sections, as all functions are referenced in .opd. */
5166 rsec = NULL;
5167 if (get_opd_info (sec) != NULL)
5168 return rsec;
5170 if (h != NULL)
5172 enum elf_ppc64_reloc_type r_type;
5173 struct ppc_link_hash_entry *eh;
5175 r_type = ELF64_R_TYPE (rel->r_info);
5176 switch (r_type)
5178 case R_PPC64_GNU_VTINHERIT:
5179 case R_PPC64_GNU_VTENTRY:
5180 break;
5182 default:
5183 switch (h->root.type)
5185 case bfd_link_hash_defined:
5186 case bfd_link_hash_defweak:
5187 eh = (struct ppc_link_hash_entry *) h;
5188 if (eh->oh != NULL
5189 && eh->oh->is_func_descriptor
5190 && (eh->oh->elf.root.type == bfd_link_hash_defined
5191 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5192 eh = eh->oh;
5194 /* Function descriptor syms cause the associated
5195 function code sym section to be marked. */
5196 if (eh->is_func_descriptor
5197 && (eh->oh->elf.root.type == bfd_link_hash_defined
5198 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5200 /* They also mark their opd section. */
5201 if (!eh->elf.root.u.def.section->gc_mark)
5202 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5203 ppc64_elf_gc_mark_hook);
5205 rsec = eh->oh->elf.root.u.def.section;
5207 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5208 && opd_entry_value (eh->elf.root.u.def.section,
5209 eh->elf.root.u.def.value,
5210 &rsec, NULL) != (bfd_vma) -1)
5212 if (!eh->elf.root.u.def.section->gc_mark)
5213 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5214 ppc64_elf_gc_mark_hook);
5216 else
5217 rsec = h->root.u.def.section;
5218 break;
5220 case bfd_link_hash_common:
5221 rsec = h->root.u.c.p->section;
5222 break;
5224 default:
5225 break;
5229 else
5231 asection **opd_sym_section;
5233 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5234 opd_sym_section = get_opd_info (rsec);
5235 if (opd_sym_section != NULL)
5237 if (!rsec->gc_mark)
5238 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5240 rsec = opd_sym_section[(sym->st_value + rel->r_addend) / 8];
5244 return rsec;
5247 /* Update the .got, .plt. and dynamic reloc reference counts for the
5248 section being removed. */
5250 static bfd_boolean
5251 ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5252 asection *sec, const Elf_Internal_Rela *relocs)
5254 struct ppc_link_hash_table *htab;
5255 Elf_Internal_Shdr *symtab_hdr;
5256 struct elf_link_hash_entry **sym_hashes;
5257 struct got_entry **local_got_ents;
5258 const Elf_Internal_Rela *rel, *relend;
5260 if ((sec->flags & SEC_ALLOC) == 0)
5261 return TRUE;
5263 elf_section_data (sec)->local_dynrel = NULL;
5265 htab = ppc_hash_table (info);
5266 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5267 sym_hashes = elf_sym_hashes (abfd);
5268 local_got_ents = elf_local_got_ents (abfd);
5270 relend = relocs + sec->reloc_count;
5271 for (rel = relocs; rel < relend; rel++)
5273 unsigned long r_symndx;
5274 enum elf_ppc64_reloc_type r_type;
5275 struct elf_link_hash_entry *h = NULL;
5276 char tls_type = 0;
5278 r_symndx = ELF64_R_SYM (rel->r_info);
5279 r_type = ELF64_R_TYPE (rel->r_info);
5280 if (r_symndx >= symtab_hdr->sh_info)
5282 struct ppc_link_hash_entry *eh;
5283 struct ppc_dyn_relocs **pp;
5284 struct ppc_dyn_relocs *p;
5286 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5287 while (h->root.type == bfd_link_hash_indirect
5288 || h->root.type == bfd_link_hash_warning)
5289 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5290 eh = (struct ppc_link_hash_entry *) h;
5292 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5293 if (p->sec == sec)
5295 /* Everything must go for SEC. */
5296 *pp = p->next;
5297 break;
5301 switch (r_type)
5303 case R_PPC64_GOT_TLSLD16:
5304 case R_PPC64_GOT_TLSLD16_LO:
5305 case R_PPC64_GOT_TLSLD16_HI:
5306 case R_PPC64_GOT_TLSLD16_HA:
5307 ppc64_tlsld_got (abfd)->refcount -= 1;
5308 tls_type = TLS_TLS | TLS_LD;
5309 goto dogot;
5311 case R_PPC64_GOT_TLSGD16:
5312 case R_PPC64_GOT_TLSGD16_LO:
5313 case R_PPC64_GOT_TLSGD16_HI:
5314 case R_PPC64_GOT_TLSGD16_HA:
5315 tls_type = TLS_TLS | TLS_GD;
5316 goto dogot;
5318 case R_PPC64_GOT_TPREL16_DS:
5319 case R_PPC64_GOT_TPREL16_LO_DS:
5320 case R_PPC64_GOT_TPREL16_HI:
5321 case R_PPC64_GOT_TPREL16_HA:
5322 tls_type = TLS_TLS | TLS_TPREL;
5323 goto dogot;
5325 case R_PPC64_GOT_DTPREL16_DS:
5326 case R_PPC64_GOT_DTPREL16_LO_DS:
5327 case R_PPC64_GOT_DTPREL16_HI:
5328 case R_PPC64_GOT_DTPREL16_HA:
5329 tls_type = TLS_TLS | TLS_DTPREL;
5330 goto dogot;
5332 case R_PPC64_GOT16:
5333 case R_PPC64_GOT16_DS:
5334 case R_PPC64_GOT16_HA:
5335 case R_PPC64_GOT16_HI:
5336 case R_PPC64_GOT16_LO:
5337 case R_PPC64_GOT16_LO_DS:
5338 dogot:
5340 struct got_entry *ent;
5342 if (h != NULL)
5343 ent = h->got.glist;
5344 else
5345 ent = local_got_ents[r_symndx];
5347 for (; ent != NULL; ent = ent->next)
5348 if (ent->addend == rel->r_addend
5349 && ent->owner == abfd
5350 && ent->tls_type == tls_type)
5351 break;
5352 if (ent == NULL)
5353 abort ();
5354 if (ent->got.refcount > 0)
5355 ent->got.refcount -= 1;
5357 break;
5359 case R_PPC64_PLT16_HA:
5360 case R_PPC64_PLT16_HI:
5361 case R_PPC64_PLT16_LO:
5362 case R_PPC64_PLT32:
5363 case R_PPC64_PLT64:
5364 case R_PPC64_REL14:
5365 case R_PPC64_REL14_BRNTAKEN:
5366 case R_PPC64_REL14_BRTAKEN:
5367 case R_PPC64_REL24:
5368 if (h != NULL)
5370 struct plt_entry *ent;
5372 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5373 if (ent->addend == rel->r_addend)
5374 break;
5375 if (ent == NULL)
5376 abort ();
5377 if (ent->plt.refcount > 0)
5378 ent->plt.refcount -= 1;
5380 break;
5382 default:
5383 break;
5386 return TRUE;
5389 /* The maximum size of .sfpr. */
5390 #define SFPR_MAX (218*4)
5392 struct sfpr_def_parms
5394 const char name[12];
5395 unsigned char lo, hi;
5396 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
5397 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
5400 /* Auto-generate _save*, _rest* functions in .sfpr. */
5402 static unsigned int
5403 sfpr_define (struct bfd_link_info *info, const struct sfpr_def_parms *parm)
5405 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5406 unsigned int i;
5407 size_t len = strlen (parm->name);
5408 bfd_boolean writing = FALSE;
5409 char sym[16];
5411 memcpy (sym, parm->name, len);
5412 sym[len + 2] = 0;
5414 for (i = parm->lo; i <= parm->hi; i++)
5416 struct elf_link_hash_entry *h;
5418 sym[len + 0] = i / 10 + '0';
5419 sym[len + 1] = i % 10 + '0';
5420 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
5421 if (h != NULL
5422 && !h->def_regular)
5424 h->root.type = bfd_link_hash_defined;
5425 h->root.u.def.section = htab->sfpr;
5426 h->root.u.def.value = htab->sfpr->size;
5427 h->type = STT_FUNC;
5428 h->def_regular = 1;
5429 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
5430 writing = TRUE;
5431 if (htab->sfpr->contents == NULL)
5433 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5434 if (htab->sfpr->contents == NULL)
5435 return FALSE;
5438 if (writing)
5440 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5441 if (i != parm->hi)
5442 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5443 else
5444 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5445 htab->sfpr->size = p - htab->sfpr->contents;
5449 return TRUE;
5452 static bfd_byte *
5453 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5455 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5456 return p + 4;
5459 static bfd_byte *
5460 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5462 p = savegpr0 (abfd, p, r);
5463 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5464 p = p + 4;
5465 bfd_put_32 (abfd, BLR, p);
5466 return p + 4;
5469 static bfd_byte *
5470 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5472 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5473 return p + 4;
5476 static bfd_byte *
5477 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5479 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5480 p = p + 4;
5481 p = restgpr0 (abfd, p, r);
5482 bfd_put_32 (abfd, MTLR_R0, p);
5483 p = p + 4;
5484 if (r == 29)
5486 p = restgpr0 (abfd, p, 30);
5487 p = restgpr0 (abfd, p, 31);
5489 bfd_put_32 (abfd, BLR, p);
5490 return p + 4;
5493 static bfd_byte *
5494 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5496 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5497 return p + 4;
5500 static bfd_byte *
5501 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5503 p = savegpr1 (abfd, p, r);
5504 bfd_put_32 (abfd, BLR, p);
5505 return p + 4;
5508 static bfd_byte *
5509 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5511 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5512 return p + 4;
5515 static bfd_byte *
5516 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5518 p = restgpr1 (abfd, p, r);
5519 bfd_put_32 (abfd, BLR, p);
5520 return p + 4;
5523 static bfd_byte *
5524 savefpr (bfd *abfd, bfd_byte *p, int r)
5526 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5527 return p + 4;
5530 static bfd_byte *
5531 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5533 p = savefpr (abfd, p, r);
5534 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5535 p = p + 4;
5536 bfd_put_32 (abfd, BLR, p);
5537 return p + 4;
5540 static bfd_byte *
5541 restfpr (bfd *abfd, bfd_byte *p, int r)
5543 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5544 return p + 4;
5547 static bfd_byte *
5548 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5550 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5551 p = p + 4;
5552 p = restfpr (abfd, p, r);
5553 bfd_put_32 (abfd, MTLR_R0, p);
5554 p = p + 4;
5555 if (r == 29)
5557 p = restfpr (abfd, p, 30);
5558 p = restfpr (abfd, p, 31);
5560 bfd_put_32 (abfd, BLR, p);
5561 return p + 4;
5564 static bfd_byte *
5565 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5567 p = savefpr (abfd, p, r);
5568 bfd_put_32 (abfd, BLR, p);
5569 return p + 4;
5572 static bfd_byte *
5573 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5575 p = restfpr (abfd, p, r);
5576 bfd_put_32 (abfd, BLR, p);
5577 return p + 4;
5580 static bfd_byte *
5581 savevr (bfd *abfd, bfd_byte *p, int r)
5583 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5584 p = p + 4;
5585 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5586 return p + 4;
5589 static bfd_byte *
5590 savevr_tail (bfd *abfd, bfd_byte *p, int r)
5592 p = savevr (abfd, p, r);
5593 bfd_put_32 (abfd, BLR, p);
5594 return p + 4;
5597 static bfd_byte *
5598 restvr (bfd *abfd, bfd_byte *p, int r)
5600 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5601 p = p + 4;
5602 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5603 return p + 4;
5606 static bfd_byte *
5607 restvr_tail (bfd *abfd, bfd_byte *p, int r)
5609 p = restvr (abfd, p, r);
5610 bfd_put_32 (abfd, BLR, p);
5611 return p + 4;
5614 /* Called via elf_link_hash_traverse to transfer dynamic linking
5615 information on function code symbol entries to their corresponding
5616 function descriptor symbol entries. */
5618 static bfd_boolean
5619 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5621 struct bfd_link_info *info;
5622 struct ppc_link_hash_table *htab;
5623 struct plt_entry *ent;
5624 struct ppc_link_hash_entry *fh;
5625 struct ppc_link_hash_entry *fdh;
5626 bfd_boolean force_local;
5628 fh = (struct ppc_link_hash_entry *) h;
5629 if (fh->elf.root.type == bfd_link_hash_indirect)
5630 return TRUE;
5632 if (fh->elf.root.type == bfd_link_hash_warning)
5633 fh = (struct ppc_link_hash_entry *) fh->elf.root.u.i.link;
5635 info = inf;
5636 htab = ppc_hash_table (info);
5638 /* Resolve undefined references to dot-symbols as the value
5639 in the function descriptor, if we have one in a regular object.
5640 This is to satisfy cases like ".quad .foo". Calls to functions
5641 in dynamic objects are handled elsewhere. */
5642 if (fh->elf.root.type == bfd_link_hash_undefweak
5643 && fh->was_undefined
5644 && (fh->oh->elf.root.type == bfd_link_hash_defined
5645 || fh->oh->elf.root.type == bfd_link_hash_defweak)
5646 && get_opd_info (fh->oh->elf.root.u.def.section) != NULL
5647 && opd_entry_value (fh->oh->elf.root.u.def.section,
5648 fh->oh->elf.root.u.def.value,
5649 &fh->elf.root.u.def.section,
5650 &fh->elf.root.u.def.value) != (bfd_vma) -1)
5652 fh->elf.root.type = fh->oh->elf.root.type;
5653 fh->elf.forced_local = 1;
5654 fh->elf.def_regular = fh->oh->elf.def_regular;
5655 fh->elf.def_dynamic = fh->oh->elf.def_dynamic;
5658 /* If this is a function code symbol, transfer dynamic linking
5659 information to the function descriptor symbol. */
5660 if (!fh->is_func)
5661 return TRUE;
5663 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
5664 if (ent->plt.refcount > 0)
5665 break;
5666 if (ent == NULL
5667 || fh->elf.root.root.string[0] != '.'
5668 || fh->elf.root.root.string[1] == '\0')
5669 return TRUE;
5671 /* Find the corresponding function descriptor symbol. Create it
5672 as undefined if necessary. */
5674 fdh = get_fdh (fh, htab);
5675 if (fdh != NULL)
5676 while (fdh->elf.root.type == bfd_link_hash_indirect
5677 || fdh->elf.root.type == bfd_link_hash_warning)
5678 fdh = (struct ppc_link_hash_entry *) fdh->elf.root.u.i.link;
5680 if (fdh == NULL
5681 && info->shared
5682 && (fh->elf.root.type == bfd_link_hash_undefined
5683 || fh->elf.root.type == bfd_link_hash_undefweak))
5685 fdh = make_fdh (info, fh);
5686 if (fdh == NULL)
5687 return FALSE;
5690 /* Fake function descriptors are made undefweak. If the function
5691 code symbol is strong undefined, make the fake sym the same.
5692 If the function code symbol is defined, then force the fake
5693 descriptor local; We can't support overriding of symbols in a
5694 shared library on a fake descriptor. */
5696 if (fdh != NULL
5697 && fdh->fake
5698 && fdh->elf.root.type == bfd_link_hash_undefweak)
5700 if (fh->elf.root.type == bfd_link_hash_undefined)
5702 fdh->elf.root.type = bfd_link_hash_undefined;
5703 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
5705 else if (fh->elf.root.type == bfd_link_hash_defined
5706 || fh->elf.root.type == bfd_link_hash_defweak)
5708 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
5712 if (fdh != NULL
5713 && !fdh->elf.forced_local
5714 && (info->shared
5715 || fdh->elf.def_dynamic
5716 || fdh->elf.ref_dynamic
5717 || (fdh->elf.root.type == bfd_link_hash_undefweak
5718 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
5720 if (fdh->elf.dynindx == -1)
5721 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5722 return FALSE;
5723 fdh->elf.ref_regular |= fh->elf.ref_regular;
5724 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
5725 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
5726 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
5727 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
5729 move_plt_plist (fh, fdh);
5730 fdh->elf.needs_plt = 1;
5732 fdh->is_func_descriptor = 1;
5733 fdh->oh = fh;
5734 fh->oh = fdh;
5737 /* Now that the info is on the function descriptor, clear the
5738 function code sym info. Any function code syms for which we
5739 don't have a definition in a regular file, we force local.
5740 This prevents a shared library from exporting syms that have
5741 been imported from another library. Function code syms that
5742 are really in the library we must leave global to prevent the
5743 linker dragging in a definition from a static library. */
5744 force_local = (!fh->elf.def_regular
5745 || fdh == NULL
5746 || !fdh->elf.def_regular
5747 || fdh->elf.forced_local);
5748 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5750 return TRUE;
5753 /* Called near the start of bfd_elf_size_dynamic_sections. We use
5754 this hook to a) provide some gcc support functions, and b) transfer
5755 dynamic linking information gathered so far on function code symbol
5756 entries, to their corresponding function descriptor symbol entries. */
5758 static bfd_boolean
5759 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
5760 struct bfd_link_info *info)
5762 struct ppc_link_hash_table *htab;
5763 unsigned int i;
5764 const struct sfpr_def_parms funcs[] =
5766 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
5767 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
5768 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
5769 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
5770 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
5771 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
5772 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
5773 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
5774 { "._savef", 14, 31, savefpr, savefpr1_tail },
5775 { "._restf", 14, 31, restfpr, restfpr1_tail },
5776 { "_savevr_", 20, 31, savevr, savevr_tail },
5777 { "_restvr_", 20, 31, restvr, restvr_tail }
5780 htab = ppc_hash_table (info);
5781 if (htab->sfpr == NULL)
5782 /* We don't have any relocs. */
5783 return TRUE;
5785 /* Provide any missing _save* and _rest* functions. */
5786 htab->sfpr->size = 0;
5787 for (i = 0; i < sizeof (funcs) / sizeof (funcs[0]); i++)
5788 if (!sfpr_define (info, &funcs[i]))
5789 return FALSE;
5791 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5793 if (htab->sfpr->size == 0)
5794 htab->sfpr->flags |= SEC_EXCLUDE;
5796 return TRUE;
5799 /* Adjust a symbol defined by a dynamic object and referenced by a
5800 regular object. The current definition is in some section of the
5801 dynamic object, but we're not including those sections. We have to
5802 change the definition to something the rest of the link can
5803 understand. */
5805 static bfd_boolean
5806 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5807 struct elf_link_hash_entry *h)
5809 struct ppc_link_hash_table *htab;
5810 asection *s;
5812 htab = ppc_hash_table (info);
5814 /* Deal with function syms. */
5815 if (h->type == STT_FUNC
5816 || h->needs_plt)
5818 /* Clear procedure linkage table information for any symbol that
5819 won't need a .plt entry. */
5820 struct plt_entry *ent;
5821 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5822 if (ent->plt.refcount > 0)
5823 break;
5824 if (ent == NULL
5825 || SYMBOL_CALLS_LOCAL (info, h)
5826 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5827 && h->root.type == bfd_link_hash_undefweak))
5829 h->plt.plist = NULL;
5830 h->needs_plt = 0;
5833 else
5834 h->plt.plist = NULL;
5836 /* If this is a weak symbol, and there is a real definition, the
5837 processor independent code will have arranged for us to see the
5838 real definition first, and we can just use the same value. */
5839 if (h->u.weakdef != NULL)
5841 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5842 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5843 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5844 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5845 if (ELIMINATE_COPY_RELOCS)
5846 h->non_got_ref = h->u.weakdef->non_got_ref;
5847 return TRUE;
5850 /* If we are creating a shared library, we must presume that the
5851 only references to the symbol are via the global offset table.
5852 For such cases we need not do anything here; the relocations will
5853 be handled correctly by relocate_section. */
5854 if (info->shared)
5855 return TRUE;
5857 /* If there are no references to this symbol that do not use the
5858 GOT, we don't need to generate a copy reloc. */
5859 if (!h->non_got_ref)
5860 return TRUE;
5862 /* Don't generate a copy reloc for symbols defined in the executable. */
5863 if (!h->def_dynamic || !h->ref_regular || h->def_regular)
5864 return TRUE;
5866 if (ELIMINATE_COPY_RELOCS)
5868 struct ppc_link_hash_entry * eh;
5869 struct ppc_dyn_relocs *p;
5871 eh = (struct ppc_link_hash_entry *) h;
5872 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5874 s = p->sec->output_section;
5875 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5876 break;
5879 /* If we didn't find any dynamic relocs in read-only sections, then
5880 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5881 if (p == NULL)
5883 h->non_got_ref = 0;
5884 return TRUE;
5888 if (h->plt.plist != NULL)
5890 /* We should never get here, but unfortunately there are versions
5891 of gcc out there that improperly (for this ABI) put initialized
5892 function pointers, vtable refs and suchlike in read-only
5893 sections. Allow them to proceed, but warn that this might
5894 break at runtime. */
5895 (*_bfd_error_handler)
5896 (_("copy reloc against `%s' requires lazy plt linking; "
5897 "avoid setting LD_BIND_NOW=1 or upgrade gcc"),
5898 h->root.root.string);
5901 /* This is a reference to a symbol defined by a dynamic object which
5902 is not a function. */
5904 if (h->size == 0)
5906 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
5907 h->root.root.string);
5908 return TRUE;
5911 /* We must allocate the symbol in our .dynbss section, which will
5912 become part of the .bss section of the executable. There will be
5913 an entry for this symbol in the .dynsym section. The dynamic
5914 object will contain position independent code, so all references
5915 from the dynamic object to this symbol will go through the global
5916 offset table. The dynamic linker will use the .dynsym entry to
5917 determine the address it must put in the global offset table, so
5918 both the dynamic object and the regular object will refer to the
5919 same memory location for the variable. */
5921 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
5922 to copy the initial value out of the dynamic object and into the
5923 runtime process image. We need to remember the offset into the
5924 .rela.bss section we are going to use. */
5925 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5927 htab->relbss->size += sizeof (Elf64_External_Rela);
5928 h->needs_copy = 1;
5931 s = htab->dynbss;
5933 return _bfd_elf_adjust_dynamic_copy (h, s);
5936 /* If given a function descriptor symbol, hide both the function code
5937 sym and the descriptor. */
5938 static void
5939 ppc64_elf_hide_symbol (struct bfd_link_info *info,
5940 struct elf_link_hash_entry *h,
5941 bfd_boolean force_local)
5943 struct ppc_link_hash_entry *eh;
5944 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
5946 eh = (struct ppc_link_hash_entry *) h;
5947 if (eh->is_func_descriptor)
5949 struct ppc_link_hash_entry *fh = eh->oh;
5951 if (fh == NULL)
5953 const char *p, *q;
5954 struct ppc_link_hash_table *htab;
5955 char save;
5957 /* We aren't supposed to use alloca in BFD because on
5958 systems which do not have alloca the version in libiberty
5959 calls xmalloc, which might cause the program to crash
5960 when it runs out of memory. This function doesn't have a
5961 return status, so there's no way to gracefully return an
5962 error. So cheat. We know that string[-1] can be safely
5963 accessed; It's either a string in an ELF string table,
5964 or allocated in an objalloc structure. */
5966 p = eh->elf.root.root.string - 1;
5967 save = *p;
5968 *(char *) p = '.';
5969 htab = ppc_hash_table (info);
5970 fh = (struct ppc_link_hash_entry *)
5971 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
5972 *(char *) p = save;
5974 /* Unfortunately, if it so happens that the string we were
5975 looking for was allocated immediately before this string,
5976 then we overwrote the string terminator. That's the only
5977 reason the lookup should fail. */
5978 if (fh == NULL)
5980 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
5981 while (q >= eh->elf.root.root.string && *q == *p)
5982 --q, --p;
5983 if (q < eh->elf.root.root.string && *p == '.')
5984 fh = (struct ppc_link_hash_entry *)
5985 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
5987 if (fh != NULL)
5989 eh->oh = fh;
5990 fh->oh = eh;
5993 if (fh != NULL)
5994 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5998 static bfd_boolean
5999 get_sym_h (struct elf_link_hash_entry **hp,
6000 Elf_Internal_Sym **symp,
6001 asection **symsecp,
6002 char **tls_maskp,
6003 Elf_Internal_Sym **locsymsp,
6004 unsigned long r_symndx,
6005 bfd *ibfd)
6007 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6009 if (r_symndx >= symtab_hdr->sh_info)
6011 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6012 struct elf_link_hash_entry *h;
6014 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6015 while (h->root.type == bfd_link_hash_indirect
6016 || h->root.type == bfd_link_hash_warning)
6017 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6019 if (hp != NULL)
6020 *hp = h;
6022 if (symp != NULL)
6023 *symp = NULL;
6025 if (symsecp != NULL)
6027 asection *symsec = NULL;
6028 if (h->root.type == bfd_link_hash_defined
6029 || h->root.type == bfd_link_hash_defweak)
6030 symsec = h->root.u.def.section;
6031 *symsecp = symsec;
6034 if (tls_maskp != NULL)
6036 struct ppc_link_hash_entry *eh;
6038 eh = (struct ppc_link_hash_entry *) h;
6039 *tls_maskp = &eh->tls_mask;
6042 else
6044 Elf_Internal_Sym *sym;
6045 Elf_Internal_Sym *locsyms = *locsymsp;
6047 if (locsyms == NULL)
6049 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6050 if (locsyms == NULL)
6051 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6052 symtab_hdr->sh_info,
6053 0, NULL, NULL, NULL);
6054 if (locsyms == NULL)
6055 return FALSE;
6056 *locsymsp = locsyms;
6058 sym = locsyms + r_symndx;
6060 if (hp != NULL)
6061 *hp = NULL;
6063 if (symp != NULL)
6064 *symp = sym;
6066 if (symsecp != NULL)
6068 asection *symsec = NULL;
6069 if ((sym->st_shndx != SHN_UNDEF
6070 && sym->st_shndx < SHN_LORESERVE)
6071 || sym->st_shndx > SHN_HIRESERVE)
6072 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6073 *symsecp = symsec;
6076 if (tls_maskp != NULL)
6078 struct got_entry **lgot_ents;
6079 char *tls_mask;
6081 tls_mask = NULL;
6082 lgot_ents = elf_local_got_ents (ibfd);
6083 if (lgot_ents != NULL)
6085 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
6086 tls_mask = &lgot_masks[r_symndx];
6088 *tls_maskp = tls_mask;
6091 return TRUE;
6094 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6095 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6096 type suitable for optimization, and 1 otherwise. */
6098 static int
6099 get_tls_mask (char **tls_maskp, unsigned long *toc_symndx,
6100 Elf_Internal_Sym **locsymsp,
6101 const Elf_Internal_Rela *rel, bfd *ibfd)
6103 unsigned long r_symndx;
6104 int next_r;
6105 struct elf_link_hash_entry *h;
6106 Elf_Internal_Sym *sym;
6107 asection *sec;
6108 bfd_vma off;
6110 r_symndx = ELF64_R_SYM (rel->r_info);
6111 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6112 return 0;
6114 if ((*tls_maskp != NULL && **tls_maskp != 0)
6115 || sec == NULL
6116 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6117 return 1;
6119 /* Look inside a TOC section too. */
6120 if (h != NULL)
6122 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6123 off = h->root.u.def.value;
6125 else
6126 off = sym->st_value;
6127 off += rel->r_addend;
6128 BFD_ASSERT (off % 8 == 0);
6129 r_symndx = ppc64_elf_section_data (sec)->u.t_symndx[off / 8];
6130 next_r = ppc64_elf_section_data (sec)->u.t_symndx[off / 8 + 1];
6131 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6132 return 0;
6133 if (toc_symndx != NULL)
6134 *toc_symndx = r_symndx;
6135 if ((h == NULL
6136 || ((h->root.type == bfd_link_hash_defined
6137 || h->root.type == bfd_link_hash_defweak)
6138 && !h->def_dynamic))
6139 && (next_r == -1 || next_r == -2))
6140 return 1 - next_r;
6141 return 1;
6144 /* Adjust all global syms defined in opd sections. In gcc generated
6145 code for the old ABI, these will already have been done. */
6147 static bfd_boolean
6148 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6150 struct ppc_link_hash_entry *eh;
6151 asection *sym_sec;
6152 long *opd_adjust;
6154 if (h->root.type == bfd_link_hash_indirect)
6155 return TRUE;
6157 if (h->root.type == bfd_link_hash_warning)
6158 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6160 if (h->root.type != bfd_link_hash_defined
6161 && h->root.type != bfd_link_hash_defweak)
6162 return TRUE;
6164 eh = (struct ppc_link_hash_entry *) h;
6165 if (eh->adjust_done)
6166 return TRUE;
6168 sym_sec = eh->elf.root.u.def.section;
6169 opd_adjust = get_opd_info (sym_sec);
6170 if (opd_adjust != NULL)
6172 long adjust = opd_adjust[eh->elf.root.u.def.value / 8];
6173 if (adjust == -1)
6175 /* This entry has been deleted. */
6176 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6177 if (dsec == NULL)
6179 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6180 if (elf_discarded_section (dsec))
6182 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6183 break;
6186 eh->elf.root.u.def.value = 0;
6187 eh->elf.root.u.def.section = dsec;
6189 else
6190 eh->elf.root.u.def.value += adjust;
6191 eh->adjust_done = 1;
6193 return TRUE;
6196 /* Handles decrementing dynamic reloc counts for the reloc specified by
6197 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM_SEC
6198 have already been determined. */
6200 static bfd_boolean
6201 dec_dynrel_count (bfd_vma r_info,
6202 asection *sec,
6203 struct bfd_link_info *info,
6204 Elf_Internal_Sym **local_syms,
6205 struct elf_link_hash_entry *h,
6206 asection *sym_sec)
6208 enum elf_ppc64_reloc_type r_type;
6209 struct ppc_dyn_relocs *p;
6210 struct ppc_dyn_relocs **pp;
6212 /* Can this reloc be dynamic? This switch, and later tests here
6213 should be kept in sync with the code in check_relocs. */
6214 r_type = ELF64_R_TYPE (r_info);
6215 switch (r_type)
6217 default:
6218 return TRUE;
6220 case R_PPC64_TPREL16:
6221 case R_PPC64_TPREL16_LO:
6222 case R_PPC64_TPREL16_HI:
6223 case R_PPC64_TPREL16_HA:
6224 case R_PPC64_TPREL16_DS:
6225 case R_PPC64_TPREL16_LO_DS:
6226 case R_PPC64_TPREL16_HIGHER:
6227 case R_PPC64_TPREL16_HIGHERA:
6228 case R_PPC64_TPREL16_HIGHEST:
6229 case R_PPC64_TPREL16_HIGHESTA:
6230 if (!info->shared)
6231 return TRUE;
6233 case R_PPC64_TPREL64:
6234 case R_PPC64_DTPMOD64:
6235 case R_PPC64_DTPREL64:
6236 case R_PPC64_ADDR64:
6237 case R_PPC64_REL30:
6238 case R_PPC64_REL32:
6239 case R_PPC64_REL64:
6240 case R_PPC64_ADDR14:
6241 case R_PPC64_ADDR14_BRNTAKEN:
6242 case R_PPC64_ADDR14_BRTAKEN:
6243 case R_PPC64_ADDR16:
6244 case R_PPC64_ADDR16_DS:
6245 case R_PPC64_ADDR16_HA:
6246 case R_PPC64_ADDR16_HI:
6247 case R_PPC64_ADDR16_HIGHER:
6248 case R_PPC64_ADDR16_HIGHERA:
6249 case R_PPC64_ADDR16_HIGHEST:
6250 case R_PPC64_ADDR16_HIGHESTA:
6251 case R_PPC64_ADDR16_LO:
6252 case R_PPC64_ADDR16_LO_DS:
6253 case R_PPC64_ADDR24:
6254 case R_PPC64_ADDR32:
6255 case R_PPC64_UADDR16:
6256 case R_PPC64_UADDR32:
6257 case R_PPC64_UADDR64:
6258 case R_PPC64_TOC:
6259 break;
6262 if (local_syms != NULL)
6264 unsigned long r_symndx;
6265 Elf_Internal_Sym *sym;
6266 bfd *ibfd = sec->owner;
6268 r_symndx = ELF64_R_SYM (r_info);
6269 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6270 return FALSE;
6273 if ((info->shared
6274 && (MUST_BE_DYN_RELOC (r_type)
6275 || (h != NULL
6276 && (!info->symbolic
6277 || h->root.type == bfd_link_hash_defweak
6278 || !h->def_regular))))
6279 || (ELIMINATE_COPY_RELOCS
6280 && !info->shared
6281 && h != NULL
6282 && (h->root.type == bfd_link_hash_defweak
6283 || !h->def_regular)))
6285 else
6286 return TRUE;
6288 if (h != NULL)
6289 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6290 else
6292 if (sym_sec != NULL)
6294 void *vpp = &elf_section_data (sym_sec)->local_dynrel;
6295 pp = (struct ppc_dyn_relocs **) vpp;
6297 else
6299 void *vpp = &elf_section_data (sec)->local_dynrel;
6300 pp = (struct ppc_dyn_relocs **) vpp;
6303 /* elf_gc_sweep may have already removed all dyn relocs associated
6304 with local syms for a given section. Don't report a dynreloc
6305 miscount. */
6306 if (*pp == NULL)
6307 return TRUE;
6310 while ((p = *pp) != NULL)
6312 if (p->sec == sec)
6314 if (!MUST_BE_DYN_RELOC (r_type))
6315 p->pc_count -= 1;
6316 p->count -= 1;
6317 if (p->count == 0)
6318 *pp = p->next;
6319 return TRUE;
6321 pp = &p->next;
6324 (*_bfd_error_handler) (_("dynreloc miscount for %B, section %A"),
6325 sec->owner, sec);
6326 bfd_set_error (bfd_error_bad_value);
6327 return FALSE;
6330 /* Remove unused Official Procedure Descriptor entries. Currently we
6331 only remove those associated with functions in discarded link-once
6332 sections, or weakly defined functions that have been overridden. It
6333 would be possible to remove many more entries for statically linked
6334 applications. */
6336 bfd_boolean
6337 ppc64_elf_edit_opd (bfd *obfd, struct bfd_link_info *info,
6338 bfd_boolean no_opd_opt,
6339 bfd_boolean non_overlapping)
6341 bfd *ibfd;
6342 bfd_boolean some_edited = FALSE;
6343 asection *need_pad = NULL;
6345 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6347 asection *sec;
6348 Elf_Internal_Rela *relstart, *rel, *relend;
6349 Elf_Internal_Shdr *symtab_hdr;
6350 Elf_Internal_Sym *local_syms;
6351 struct elf_link_hash_entry **sym_hashes;
6352 bfd_vma offset;
6353 bfd_size_type amt;
6354 long *opd_adjust;
6355 bfd_boolean need_edit, add_aux_fields;
6356 bfd_size_type cnt_16b = 0;
6358 sec = bfd_get_section_by_name (ibfd, ".opd");
6359 if (sec == NULL || sec->size == 0)
6360 continue;
6362 amt = sec->size * sizeof (long) / 8;
6363 opd_adjust = get_opd_info (sec);
6364 if (opd_adjust == NULL)
6366 /* check_relocs hasn't been called. Must be a ld -r link
6367 or --just-symbols object. */
6368 opd_adjust = bfd_alloc (obfd, amt);
6369 if (opd_adjust == NULL)
6370 return FALSE;
6371 ppc64_elf_section_data (sec)->u.opd_adjust = opd_adjust;
6372 BFD_ASSERT (ppc64_elf_section_data (sec)->sec_type == sec_normal);
6373 ppc64_elf_section_data (sec)->sec_type = sec_opd;
6375 memset (opd_adjust, 0, amt);
6377 if (no_opd_opt)
6378 continue;
6380 if (sec->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
6381 continue;
6383 if (sec->output_section == bfd_abs_section_ptr)
6384 continue;
6386 /* Look through the section relocs. */
6387 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6388 continue;
6390 local_syms = NULL;
6391 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6392 sym_hashes = elf_sym_hashes (ibfd);
6394 /* Read the relocations. */
6395 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
6396 info->keep_memory);
6397 if (relstart == NULL)
6398 return FALSE;
6400 /* First run through the relocs to check they are sane, and to
6401 determine whether we need to edit this opd section. */
6402 need_edit = FALSE;
6403 need_pad = sec;
6404 offset = 0;
6405 relend = relstart + sec->reloc_count;
6406 for (rel = relstart; rel < relend; )
6408 enum elf_ppc64_reloc_type r_type;
6409 unsigned long r_symndx;
6410 asection *sym_sec;
6411 struct elf_link_hash_entry *h;
6412 Elf_Internal_Sym *sym;
6414 /* .opd contains a regular array of 16 or 24 byte entries. We're
6415 only interested in the reloc pointing to a function entry
6416 point. */
6417 if (rel->r_offset != offset
6418 || rel + 1 >= relend
6419 || (rel + 1)->r_offset != offset + 8)
6421 /* If someone messes with .opd alignment then after a
6422 "ld -r" we might have padding in the middle of .opd.
6423 Also, there's nothing to prevent someone putting
6424 something silly in .opd with the assembler. No .opd
6425 optimization for them! */
6426 broken_opd:
6427 (*_bfd_error_handler)
6428 (_("%B: .opd is not a regular array of opd entries"), ibfd);
6429 need_edit = FALSE;
6430 break;
6433 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6434 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6436 (*_bfd_error_handler)
6437 (_("%B: unexpected reloc type %u in .opd section"),
6438 ibfd, r_type);
6439 need_edit = FALSE;
6440 break;
6443 r_symndx = ELF64_R_SYM (rel->r_info);
6444 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6445 r_symndx, ibfd))
6446 goto error_ret;
6448 if (sym_sec == NULL || sym_sec->owner == NULL)
6450 const char *sym_name;
6451 if (h != NULL)
6452 sym_name = h->root.root.string;
6453 else
6454 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
6455 sym_sec);
6457 (*_bfd_error_handler)
6458 (_("%B: undefined sym `%s' in .opd section"),
6459 ibfd, sym_name);
6460 need_edit = FALSE;
6461 break;
6464 /* opd entries are always for functions defined in the
6465 current input bfd. If the symbol isn't defined in the
6466 input bfd, then we won't be using the function in this
6467 bfd; It must be defined in a linkonce section in another
6468 bfd, or is weak. It's also possible that we are
6469 discarding the function due to a linker script /DISCARD/,
6470 which we test for via the output_section. */
6471 if (sym_sec->owner != ibfd
6472 || sym_sec->output_section == bfd_abs_section_ptr)
6473 need_edit = TRUE;
6475 rel += 2;
6476 if (rel == relend
6477 || (rel + 1 == relend && rel->r_offset == offset + 16))
6479 if (sec->size == offset + 24)
6481 need_pad = NULL;
6482 break;
6484 if (rel == relend && sec->size == offset + 16)
6486 cnt_16b++;
6487 break;
6489 goto broken_opd;
6492 if (rel->r_offset == offset + 24)
6493 offset += 24;
6494 else if (rel->r_offset != offset + 16)
6495 goto broken_opd;
6496 else if (rel + 1 < relend
6497 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
6498 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
6500 offset += 16;
6501 cnt_16b++;
6503 else if (rel + 2 < relend
6504 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_ADDR64
6505 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC)
6507 offset += 24;
6508 rel += 1;
6510 else
6511 goto broken_opd;
6514 add_aux_fields = non_overlapping && cnt_16b > 0;
6516 if (need_edit || add_aux_fields)
6518 Elf_Internal_Rela *write_rel;
6519 bfd_byte *rptr, *wptr;
6520 bfd_byte *new_contents = NULL;
6521 bfd_boolean skip;
6522 long opd_ent_size;
6524 /* This seems a waste of time as input .opd sections are all
6525 zeros as generated by gcc, but I suppose there's no reason
6526 this will always be so. We might start putting something in
6527 the third word of .opd entries. */
6528 if ((sec->flags & SEC_IN_MEMORY) == 0)
6530 bfd_byte *loc;
6531 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6533 if (loc != NULL)
6534 free (loc);
6535 error_ret:
6536 if (local_syms != NULL
6537 && symtab_hdr->contents != (unsigned char *) local_syms)
6538 free (local_syms);
6539 if (elf_section_data (sec)->relocs != relstart)
6540 free (relstart);
6541 return FALSE;
6543 sec->contents = loc;
6544 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6547 elf_section_data (sec)->relocs = relstart;
6549 new_contents = sec->contents;
6550 if (add_aux_fields)
6552 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
6553 if (new_contents == NULL)
6554 return FALSE;
6555 need_pad = FALSE;
6557 wptr = new_contents;
6558 rptr = sec->contents;
6560 write_rel = relstart;
6561 skip = FALSE;
6562 offset = 0;
6563 opd_ent_size = 0;
6564 for (rel = relstart; rel < relend; rel++)
6566 unsigned long r_symndx;
6567 asection *sym_sec;
6568 struct elf_link_hash_entry *h;
6569 Elf_Internal_Sym *sym;
6571 r_symndx = ELF64_R_SYM (rel->r_info);
6572 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6573 r_symndx, ibfd))
6574 goto error_ret;
6576 if (rel->r_offset == offset)
6578 struct ppc_link_hash_entry *fdh = NULL;
6580 /* See if the .opd entry is full 24 byte or
6581 16 byte (with fd_aux entry overlapped with next
6582 fd_func). */
6583 opd_ent_size = 24;
6584 if ((rel + 2 == relend && sec->size == offset + 16)
6585 || (rel + 3 < relend
6586 && rel[2].r_offset == offset + 16
6587 && rel[3].r_offset == offset + 24
6588 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_ADDR64
6589 && ELF64_R_TYPE (rel[3].r_info) == R_PPC64_TOC))
6590 opd_ent_size = 16;
6592 if (h != NULL
6593 && h->root.root.string[0] == '.')
6595 fdh = get_fdh ((struct ppc_link_hash_entry *) h,
6596 ppc_hash_table (info));
6597 if (fdh != NULL
6598 && fdh->elf.root.type != bfd_link_hash_defined
6599 && fdh->elf.root.type != bfd_link_hash_defweak)
6600 fdh = NULL;
6603 skip = (sym_sec->owner != ibfd
6604 || sym_sec->output_section == bfd_abs_section_ptr);
6605 if (skip)
6607 if (fdh != NULL && sym_sec->owner == ibfd)
6609 /* Arrange for the function descriptor sym
6610 to be dropped. */
6611 fdh->elf.root.u.def.value = 0;
6612 fdh->elf.root.u.def.section = sym_sec;
6614 opd_adjust[rel->r_offset / 8] = -1;
6616 else
6618 /* We'll be keeping this opd entry. */
6620 if (fdh != NULL)
6622 /* Redefine the function descriptor symbol to
6623 this location in the opd section. It is
6624 necessary to update the value here rather
6625 than using an array of adjustments as we do
6626 for local symbols, because various places
6627 in the generic ELF code use the value
6628 stored in u.def.value. */
6629 fdh->elf.root.u.def.value = wptr - new_contents;
6630 fdh->adjust_done = 1;
6633 /* Local syms are a bit tricky. We could
6634 tweak them as they can be cached, but
6635 we'd need to look through the local syms
6636 for the function descriptor sym which we
6637 don't have at the moment. So keep an
6638 array of adjustments. */
6639 opd_adjust[rel->r_offset / 8]
6640 = (wptr - new_contents) - (rptr - sec->contents);
6642 if (wptr != rptr)
6643 memcpy (wptr, rptr, opd_ent_size);
6644 wptr += opd_ent_size;
6645 if (add_aux_fields && opd_ent_size == 16)
6647 memset (wptr, '\0', 8);
6648 wptr += 8;
6651 rptr += opd_ent_size;
6652 offset += opd_ent_size;
6655 if (skip)
6657 if (!NO_OPD_RELOCS
6658 && !info->relocatable
6659 && !dec_dynrel_count (rel->r_info, sec, info,
6660 NULL, h, sym_sec))
6661 goto error_ret;
6663 else
6665 /* We need to adjust any reloc offsets to point to the
6666 new opd entries. While we're at it, we may as well
6667 remove redundant relocs. */
6668 rel->r_offset += opd_adjust[(offset - opd_ent_size) / 8];
6669 if (write_rel != rel)
6670 memcpy (write_rel, rel, sizeof (*rel));
6671 ++write_rel;
6675 sec->size = wptr - new_contents;
6676 sec->reloc_count = write_rel - relstart;
6677 if (add_aux_fields)
6679 free (sec->contents);
6680 sec->contents = new_contents;
6683 /* Fudge the header size too, as this is used later in
6684 elf_bfd_final_link if we are emitting relocs. */
6685 elf_section_data (sec)->rel_hdr.sh_size
6686 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
6687 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
6688 some_edited = TRUE;
6690 else if (elf_section_data (sec)->relocs != relstart)
6691 free (relstart);
6693 if (local_syms != NULL
6694 && symtab_hdr->contents != (unsigned char *) local_syms)
6696 if (!info->keep_memory)
6697 free (local_syms);
6698 else
6699 symtab_hdr->contents = (unsigned char *) local_syms;
6703 if (some_edited)
6704 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
6706 /* If we are doing a final link and the last .opd entry is just 16 byte
6707 long, add a 8 byte padding after it. */
6708 if (need_pad != NULL && !info->relocatable)
6710 bfd_byte *p;
6712 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
6714 BFD_ASSERT (need_pad->size > 0);
6716 p = bfd_malloc (need_pad->size + 8);
6717 if (p == NULL)
6718 return FALSE;
6720 if (! bfd_get_section_contents (need_pad->owner, need_pad,
6721 p, 0, need_pad->size))
6722 return FALSE;
6724 need_pad->contents = p;
6725 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6727 else
6729 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
6730 if (p == NULL)
6731 return FALSE;
6733 need_pad->contents = p;
6736 memset (need_pad->contents + need_pad->size, 0, 8);
6737 need_pad->size += 8;
6740 return TRUE;
6743 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
6745 asection *
6746 ppc64_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
6748 struct ppc_link_hash_table *htab;
6750 htab = ppc_hash_table (info);
6751 if (htab->tls_get_addr != NULL)
6753 struct ppc_link_hash_entry *h = htab->tls_get_addr;
6755 while (h->elf.root.type == bfd_link_hash_indirect
6756 || h->elf.root.type == bfd_link_hash_warning)
6757 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
6759 htab->tls_get_addr = h;
6761 if (htab->tls_get_addr_fd == NULL
6762 && h->oh != NULL
6763 && h->oh->is_func_descriptor
6764 && (h->oh->elf.root.type == bfd_link_hash_defined
6765 || h->oh->elf.root.type == bfd_link_hash_defweak))
6766 htab->tls_get_addr_fd = h->oh;
6769 if (htab->tls_get_addr_fd != NULL)
6771 struct ppc_link_hash_entry *h = htab->tls_get_addr_fd;
6773 while (h->elf.root.type == bfd_link_hash_indirect
6774 || h->elf.root.type == bfd_link_hash_warning)
6775 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
6777 htab->tls_get_addr_fd = h;
6780 return _bfd_elf_tls_setup (obfd, info);
6783 /* Run through all the TLS relocs looking for optimization
6784 opportunities. The linker has been hacked (see ppc64elf.em) to do
6785 a preliminary section layout so that we know the TLS segment
6786 offsets. We can't optimize earlier because some optimizations need
6787 to know the tp offset, and we need to optimize before allocating
6788 dynamic relocations. */
6790 bfd_boolean
6791 ppc64_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
6793 bfd *ibfd;
6794 asection *sec;
6795 struct ppc_link_hash_table *htab;
6797 if (info->relocatable || info->shared)
6798 return TRUE;
6800 htab = ppc_hash_table (info);
6801 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6803 Elf_Internal_Sym *locsyms = NULL;
6804 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
6805 unsigned char *toc_ref = NULL;
6807 /* Look at all the sections for this file, with TOC last. */
6808 for (sec = (ibfd->sections == toc && toc && toc->next ? toc->next
6809 : ibfd->sections);
6810 sec != NULL;
6811 sec = (sec == toc ? NULL
6812 : sec->next == NULL ? toc
6813 : sec->next == toc && toc->next ? toc->next
6814 : sec->next))
6815 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
6817 Elf_Internal_Rela *relstart, *rel, *relend;
6818 int expecting_tls_get_addr;
6819 long toc_ref_index = 0;
6821 /* Read the relocations. */
6822 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
6823 info->keep_memory);
6824 if (relstart == NULL)
6825 return FALSE;
6827 expecting_tls_get_addr = 0;
6828 relend = relstart + sec->reloc_count;
6829 for (rel = relstart; rel < relend; rel++)
6831 enum elf_ppc64_reloc_type r_type;
6832 unsigned long r_symndx;
6833 struct elf_link_hash_entry *h;
6834 Elf_Internal_Sym *sym;
6835 asection *sym_sec;
6836 char *tls_mask;
6837 char tls_set, tls_clear, tls_type = 0;
6838 bfd_vma value;
6839 bfd_boolean ok_tprel, is_local;
6841 r_symndx = ELF64_R_SYM (rel->r_info);
6842 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
6843 r_symndx, ibfd))
6845 err_free_rel:
6846 if (elf_section_data (sec)->relocs != relstart)
6847 free (relstart);
6848 if (toc_ref != NULL)
6849 free (toc_ref);
6850 if (locsyms != NULL
6851 && (elf_tdata (ibfd)->symtab_hdr.contents
6852 != (unsigned char *) locsyms))
6853 free (locsyms);
6854 return FALSE;
6857 if (h != NULL)
6859 if (h->root.type != bfd_link_hash_defined
6860 && h->root.type != bfd_link_hash_defweak)
6861 continue;
6862 value = h->root.u.def.value;
6864 else
6865 /* Symbols referenced by TLS relocs must be of type
6866 STT_TLS. So no need for .opd local sym adjust. */
6867 value = sym->st_value;
6869 ok_tprel = FALSE;
6870 is_local = FALSE;
6871 if (h == NULL
6872 || !h->def_dynamic)
6874 is_local = TRUE;
6875 value += sym_sec->output_offset;
6876 value += sym_sec->output_section->vma;
6877 value -= htab->elf.tls_sec->vma;
6878 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
6879 < (bfd_vma) 1 << 32);
6882 r_type = ELF64_R_TYPE (rel->r_info);
6883 switch (r_type)
6885 case R_PPC64_GOT_TLSLD16:
6886 case R_PPC64_GOT_TLSLD16_LO:
6887 case R_PPC64_GOT_TLSLD16_HI:
6888 case R_PPC64_GOT_TLSLD16_HA:
6889 /* These relocs should never be against a symbol
6890 defined in a shared lib. Leave them alone if
6891 that turns out to be the case. */
6892 ppc64_tlsld_got (ibfd)->refcount -= 1;
6893 if (!is_local)
6894 continue;
6896 /* LD -> LE */
6897 tls_set = 0;
6898 tls_clear = TLS_LD;
6899 tls_type = TLS_TLS | TLS_LD;
6900 expecting_tls_get_addr = 1;
6901 break;
6903 case R_PPC64_GOT_TLSGD16:
6904 case R_PPC64_GOT_TLSGD16_LO:
6905 case R_PPC64_GOT_TLSGD16_HI:
6906 case R_PPC64_GOT_TLSGD16_HA:
6907 if (ok_tprel)
6908 /* GD -> LE */
6909 tls_set = 0;
6910 else
6911 /* GD -> IE */
6912 tls_set = TLS_TLS | TLS_TPRELGD;
6913 tls_clear = TLS_GD;
6914 tls_type = TLS_TLS | TLS_GD;
6915 expecting_tls_get_addr = 1;
6916 break;
6918 case R_PPC64_GOT_TPREL16_DS:
6919 case R_PPC64_GOT_TPREL16_LO_DS:
6920 case R_PPC64_GOT_TPREL16_HI:
6921 case R_PPC64_GOT_TPREL16_HA:
6922 expecting_tls_get_addr = 0;
6923 if (ok_tprel)
6925 /* IE -> LE */
6926 tls_set = 0;
6927 tls_clear = TLS_TPREL;
6928 tls_type = TLS_TLS | TLS_TPREL;
6929 break;
6931 else
6932 continue;
6934 case R_PPC64_REL14:
6935 case R_PPC64_REL14_BRTAKEN:
6936 case R_PPC64_REL14_BRNTAKEN:
6937 case R_PPC64_REL24:
6938 if (h != NULL
6939 && (h == &htab->tls_get_addr->elf
6940 || h == &htab->tls_get_addr_fd->elf))
6942 if (!expecting_tls_get_addr
6943 && rel != relstart
6944 && ((ELF64_R_TYPE (rel[-1].r_info)
6945 == R_PPC64_TOC16)
6946 || (ELF64_R_TYPE (rel[-1].r_info)
6947 == R_PPC64_TOC16_LO)))
6949 /* Check for toc tls entries. */
6950 char *toc_tls;
6951 int retval;
6953 retval = get_tls_mask (&toc_tls, NULL, &locsyms,
6954 rel - 1, ibfd);
6955 if (retval == 0)
6956 goto err_free_rel;
6957 if (retval > 1 && toc_tls != NULL)
6959 expecting_tls_get_addr = 1;
6960 if (toc_ref != NULL)
6961 toc_ref[toc_ref_index] = 1;
6965 if (expecting_tls_get_addr)
6967 struct plt_entry *ent;
6968 for (ent = h->plt.plist; ent; ent = ent->next)
6969 if (ent->addend == 0)
6971 if (ent->plt.refcount > 0)
6972 ent->plt.refcount -= 1;
6973 break;
6977 expecting_tls_get_addr = 0;
6978 continue;
6980 case R_PPC64_TOC16:
6981 case R_PPC64_TOC16_LO:
6982 case R_PPC64_TLS:
6983 expecting_tls_get_addr = 0;
6984 if (sym_sec == toc && toc != NULL)
6986 /* Mark this toc entry as referenced by a TLS
6987 code sequence. We can do that now in the
6988 case of R_PPC64_TLS, and after checking for
6989 tls_get_addr for the TOC16 relocs. */
6990 if (toc_ref == NULL)
6992 toc_ref = bfd_zmalloc (toc->size / 8);
6993 if (toc_ref == NULL)
6994 goto err_free_rel;
6996 if (h != NULL)
6997 value = h->root.u.def.value;
6998 else
6999 value = sym->st_value;
7000 value += rel->r_addend;
7001 BFD_ASSERT (value < toc->size && value % 8 == 0);
7002 toc_ref_index = value / 8;
7003 if (r_type == R_PPC64_TLS)
7004 toc_ref[toc_ref_index] = 1;
7006 continue;
7008 case R_PPC64_TPREL64:
7009 expecting_tls_get_addr = 0;
7010 if (sec != toc
7011 || toc_ref == NULL
7012 || !toc_ref[rel->r_offset / 8])
7013 continue;
7014 if (ok_tprel)
7016 /* IE -> LE */
7017 tls_set = TLS_EXPLICIT;
7018 tls_clear = TLS_TPREL;
7019 break;
7021 else
7022 continue;
7024 case R_PPC64_DTPMOD64:
7025 expecting_tls_get_addr = 0;
7026 if (sec != toc
7027 || toc_ref == NULL
7028 || !toc_ref[rel->r_offset / 8])
7029 continue;
7030 if (rel + 1 < relend
7031 && (rel[1].r_info
7032 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
7033 && rel[1].r_offset == rel->r_offset + 8)
7035 if (ok_tprel)
7036 /* GD -> LE */
7037 tls_set = TLS_EXPLICIT | TLS_GD;
7038 else
7039 /* GD -> IE */
7040 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
7041 tls_clear = TLS_GD;
7043 else
7045 if (!is_local)
7046 continue;
7048 /* LD -> LE */
7049 tls_set = TLS_EXPLICIT;
7050 tls_clear = TLS_LD;
7052 break;
7054 default:
7055 expecting_tls_get_addr = 0;
7056 continue;
7059 if ((tls_set & TLS_EXPLICIT) == 0)
7061 struct got_entry *ent;
7063 /* Adjust got entry for this reloc. */
7064 if (h != NULL)
7065 ent = h->got.glist;
7066 else
7067 ent = elf_local_got_ents (ibfd)[r_symndx];
7069 for (; ent != NULL; ent = ent->next)
7070 if (ent->addend == rel->r_addend
7071 && ent->owner == ibfd
7072 && ent->tls_type == tls_type)
7073 break;
7074 if (ent == NULL)
7075 abort ();
7077 if (tls_set == 0)
7079 /* We managed to get rid of a got entry. */
7080 if (ent->got.refcount > 0)
7081 ent->got.refcount -= 1;
7084 else
7086 /* If we got rid of a DTPMOD/DTPREL reloc pair then
7087 we'll lose one or two dyn relocs. */
7088 if (!dec_dynrel_count (rel->r_info, sec, info,
7089 NULL, h, sym_sec))
7090 return FALSE;
7092 if (tls_set == (TLS_EXPLICIT | TLS_GD))
7094 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
7095 NULL, h, sym_sec))
7096 return FALSE;
7100 *tls_mask |= tls_set;
7101 *tls_mask &= ~tls_clear;
7104 if (elf_section_data (sec)->relocs != relstart)
7105 free (relstart);
7108 if (toc_ref != NULL)
7109 free (toc_ref);
7111 if (locsyms != NULL
7112 && (elf_tdata (ibfd)->symtab_hdr.contents
7113 != (unsigned char *) locsyms))
7115 if (!info->keep_memory)
7116 free (locsyms);
7117 else
7118 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
7121 return TRUE;
7124 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
7125 the values of any global symbols in a toc section that has been
7126 edited. Globals in toc sections should be a rarity, so this function
7127 sets a flag if any are found in toc sections other than the one just
7128 edited, so that futher hash table traversals can be avoided. */
7130 struct adjust_toc_info
7132 asection *toc;
7133 unsigned long *skip;
7134 bfd_boolean global_toc_syms;
7137 static bfd_boolean
7138 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
7140 struct ppc_link_hash_entry *eh;
7141 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
7143 if (h->root.type == bfd_link_hash_indirect)
7144 return TRUE;
7146 if (h->root.type == bfd_link_hash_warning)
7147 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7149 if (h->root.type != bfd_link_hash_defined
7150 && h->root.type != bfd_link_hash_defweak)
7151 return TRUE;
7153 eh = (struct ppc_link_hash_entry *) h;
7154 if (eh->adjust_done)
7155 return TRUE;
7157 if (eh->elf.root.u.def.section == toc_inf->toc)
7159 unsigned long skip = toc_inf->skip[eh->elf.root.u.def.value >> 3];
7160 if (skip != (unsigned long) -1)
7161 eh->elf.root.u.def.value -= skip;
7162 else
7164 (*_bfd_error_handler)
7165 (_("%s defined in removed toc entry"), eh->elf.root.root.string);
7166 eh->elf.root.u.def.section = &bfd_abs_section;
7167 eh->elf.root.u.def.value = 0;
7169 eh->adjust_done = 1;
7171 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
7172 toc_inf->global_toc_syms = TRUE;
7174 return TRUE;
7177 /* Examine all relocs referencing .toc sections in order to remove
7178 unused .toc entries. */
7180 bfd_boolean
7181 ppc64_elf_edit_toc (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
7183 bfd *ibfd;
7184 struct adjust_toc_info toc_inf;
7186 toc_inf.global_toc_syms = TRUE;
7187 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7189 asection *toc, *sec;
7190 Elf_Internal_Shdr *symtab_hdr;
7191 Elf_Internal_Sym *local_syms;
7192 struct elf_link_hash_entry **sym_hashes;
7193 Elf_Internal_Rela *relstart, *rel;
7194 unsigned long *skip, *drop;
7195 unsigned char *used;
7196 unsigned char *keep, last, some_unused;
7198 toc = bfd_get_section_by_name (ibfd, ".toc");
7199 if (toc == NULL
7200 || toc->size == 0
7201 || toc->sec_info_type == ELF_INFO_TYPE_JUST_SYMS
7202 || elf_discarded_section (toc))
7203 continue;
7205 local_syms = NULL;
7206 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
7207 sym_hashes = elf_sym_hashes (ibfd);
7209 /* Look at sections dropped from the final link. */
7210 skip = NULL;
7211 relstart = NULL;
7212 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7214 if (sec->reloc_count == 0
7215 || !elf_discarded_section (sec)
7216 || get_opd_info (sec)
7217 || (sec->flags & SEC_ALLOC) == 0
7218 || (sec->flags & SEC_DEBUGGING) != 0)
7219 continue;
7221 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
7222 if (relstart == NULL)
7223 goto error_ret;
7225 /* Run through the relocs to see which toc entries might be
7226 unused. */
7227 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7229 enum elf_ppc64_reloc_type r_type;
7230 unsigned long r_symndx;
7231 asection *sym_sec;
7232 struct elf_link_hash_entry *h;
7233 Elf_Internal_Sym *sym;
7234 bfd_vma val;
7236 r_type = ELF64_R_TYPE (rel->r_info);
7237 switch (r_type)
7239 default:
7240 continue;
7242 case R_PPC64_TOC16:
7243 case R_PPC64_TOC16_LO:
7244 case R_PPC64_TOC16_HI:
7245 case R_PPC64_TOC16_HA:
7246 case R_PPC64_TOC16_DS:
7247 case R_PPC64_TOC16_LO_DS:
7248 break;
7251 r_symndx = ELF64_R_SYM (rel->r_info);
7252 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7253 r_symndx, ibfd))
7254 goto error_ret;
7256 if (sym_sec != toc)
7257 continue;
7259 if (h != NULL)
7260 val = h->root.u.def.value;
7261 else
7262 val = sym->st_value;
7263 val += rel->r_addend;
7265 if (val >= toc->size)
7266 continue;
7268 /* Anything in the toc ought to be aligned to 8 bytes.
7269 If not, don't mark as unused. */
7270 if (val & 7)
7271 continue;
7273 if (skip == NULL)
7275 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 7) / 8);
7276 if (skip == NULL)
7277 goto error_ret;
7280 skip[val >> 3] = 1;
7283 if (elf_section_data (sec)->relocs != relstart)
7284 free (relstart);
7287 if (skip == NULL)
7288 continue;
7290 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
7291 if (used == NULL)
7293 error_ret:
7294 if (local_syms != NULL
7295 && symtab_hdr->contents != (unsigned char *) local_syms)
7296 free (local_syms);
7297 if (sec != NULL
7298 && relstart != NULL
7299 && elf_section_data (sec)->relocs != relstart)
7300 free (relstart);
7301 if (skip != NULL)
7302 free (skip);
7303 return FALSE;
7306 /* Now check all kept sections that might reference the toc.
7307 Check the toc itself last. */
7308 for (sec = (ibfd->sections == toc && toc->next ? toc->next
7309 : ibfd->sections);
7310 sec != NULL;
7311 sec = (sec == toc ? NULL
7312 : sec->next == NULL ? toc
7313 : sec->next == toc && toc->next ? toc->next
7314 : sec->next))
7316 int repeat;
7318 if (sec->reloc_count == 0
7319 || elf_discarded_section (sec)
7320 || get_opd_info (sec)
7321 || (sec->flags & SEC_ALLOC) == 0
7322 || (sec->flags & SEC_DEBUGGING) != 0)
7323 continue;
7325 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, TRUE);
7326 if (relstart == NULL)
7327 goto error_ret;
7329 /* Mark toc entries referenced as used. */
7330 repeat = 0;
7332 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7334 enum elf_ppc64_reloc_type r_type;
7335 unsigned long r_symndx;
7336 asection *sym_sec;
7337 struct elf_link_hash_entry *h;
7338 Elf_Internal_Sym *sym;
7339 bfd_vma val;
7341 r_type = ELF64_R_TYPE (rel->r_info);
7342 switch (r_type)
7344 case R_PPC64_TOC16:
7345 case R_PPC64_TOC16_LO:
7346 case R_PPC64_TOC16_HI:
7347 case R_PPC64_TOC16_HA:
7348 case R_PPC64_TOC16_DS:
7349 case R_PPC64_TOC16_LO_DS:
7350 /* In case we're taking addresses of toc entries. */
7351 case R_PPC64_ADDR64:
7352 break;
7354 default:
7355 continue;
7358 r_symndx = ELF64_R_SYM (rel->r_info);
7359 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7360 r_symndx, ibfd))
7362 free (used);
7363 goto error_ret;
7366 if (sym_sec != toc)
7367 continue;
7369 if (h != NULL)
7370 val = h->root.u.def.value;
7371 else
7372 val = sym->st_value;
7373 val += rel->r_addend;
7375 if (val >= toc->size)
7376 continue;
7378 /* For the toc section, we only mark as used if
7379 this entry itself isn't unused. */
7380 if (sec == toc
7381 && !used[val >> 3]
7382 && (used[rel->r_offset >> 3]
7383 || !skip[rel->r_offset >> 3]))
7384 /* Do all the relocs again, to catch reference
7385 chains. */
7386 repeat = 1;
7388 used[val >> 3] = 1;
7390 while (repeat);
7393 /* Merge the used and skip arrays. Assume that TOC
7394 doublewords not appearing as either used or unused belong
7395 to to an entry more than one doubleword in size. */
7396 for (drop = skip, keep = used, last = 0, some_unused = 0;
7397 drop < skip + (toc->size + 7) / 8;
7398 ++drop, ++keep)
7400 if (*keep)
7402 *drop = 0;
7403 last = 0;
7405 else if (*drop)
7407 some_unused = 1;
7408 last = 1;
7410 else
7411 *drop = last;
7414 free (used);
7416 if (some_unused)
7418 bfd_byte *contents, *src;
7419 unsigned long off;
7421 /* Shuffle the toc contents, and at the same time convert the
7422 skip array from booleans into offsets. */
7423 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
7424 goto error_ret;
7426 elf_section_data (toc)->this_hdr.contents = contents;
7428 for (src = contents, off = 0, drop = skip;
7429 src < contents + toc->size;
7430 src += 8, ++drop)
7432 if (*drop)
7434 *drop = (unsigned long) -1;
7435 off += 8;
7437 else if (off != 0)
7439 *drop = off;
7440 memcpy (src - off, src, 8);
7443 toc->rawsize = toc->size;
7444 toc->size = src - contents - off;
7446 if (toc->reloc_count != 0)
7448 Elf_Internal_Rela *wrel;
7449 bfd_size_type sz;
7451 /* Read toc relocs. */
7452 relstart = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
7453 TRUE);
7454 if (relstart == NULL)
7455 goto error_ret;
7457 /* Remove unused toc relocs, and adjust those we keep. */
7458 wrel = relstart;
7459 for (rel = relstart; rel < relstart + toc->reloc_count; ++rel)
7460 if (skip[rel->r_offset >> 3] != (unsigned long) -1)
7462 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
7463 wrel->r_info = rel->r_info;
7464 wrel->r_addend = rel->r_addend;
7465 ++wrel;
7467 else if (!dec_dynrel_count (rel->r_info, toc, info,
7468 &local_syms, NULL, NULL))
7469 goto error_ret;
7471 toc->reloc_count = wrel - relstart;
7472 sz = elf_section_data (toc)->rel_hdr.sh_entsize;
7473 elf_section_data (toc)->rel_hdr.sh_size = toc->reloc_count * sz;
7474 BFD_ASSERT (elf_section_data (toc)->rel_hdr2 == NULL);
7477 /* Adjust addends for relocs against the toc section sym. */
7478 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7480 if (sec->reloc_count == 0
7481 || elf_discarded_section (sec))
7482 continue;
7484 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7485 TRUE);
7486 if (relstart == NULL)
7487 goto error_ret;
7489 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7491 enum elf_ppc64_reloc_type r_type;
7492 unsigned long r_symndx;
7493 asection *sym_sec;
7494 struct elf_link_hash_entry *h;
7495 Elf_Internal_Sym *sym;
7497 r_type = ELF64_R_TYPE (rel->r_info);
7498 switch (r_type)
7500 default:
7501 continue;
7503 case R_PPC64_TOC16:
7504 case R_PPC64_TOC16_LO:
7505 case R_PPC64_TOC16_HI:
7506 case R_PPC64_TOC16_HA:
7507 case R_PPC64_TOC16_DS:
7508 case R_PPC64_TOC16_LO_DS:
7509 case R_PPC64_ADDR64:
7510 break;
7513 r_symndx = ELF64_R_SYM (rel->r_info);
7514 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7515 r_symndx, ibfd))
7516 goto error_ret;
7518 if (sym_sec != toc || h != NULL || sym->st_value != 0)
7519 continue;
7521 rel->r_addend -= skip[rel->r_addend >> 3];
7525 /* We shouldn't have local or global symbols defined in the TOC,
7526 but handle them anyway. */
7527 if (local_syms != NULL)
7529 Elf_Internal_Sym *sym;
7531 for (sym = local_syms;
7532 sym < local_syms + symtab_hdr->sh_info;
7533 ++sym)
7534 if (sym->st_shndx != SHN_UNDEF
7535 && (sym->st_shndx < SHN_LORESERVE
7536 || sym->st_shndx > SHN_HIRESERVE)
7537 && sym->st_value != 0
7538 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
7540 if (skip[sym->st_value >> 3] != (unsigned long) -1)
7541 sym->st_value -= skip[sym->st_value >> 3];
7542 else
7544 (*_bfd_error_handler)
7545 (_("%s defined in removed toc entry"),
7546 bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7547 NULL));
7548 sym->st_value = 0;
7549 sym->st_shndx = SHN_ABS;
7551 symtab_hdr->contents = (unsigned char *) local_syms;
7555 /* Finally, adjust any global syms defined in the toc. */
7556 if (toc_inf.global_toc_syms)
7558 toc_inf.toc = toc;
7559 toc_inf.skip = skip;
7560 toc_inf.global_toc_syms = FALSE;
7561 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
7562 &toc_inf);
7566 if (local_syms != NULL
7567 && symtab_hdr->contents != (unsigned char *) local_syms)
7569 if (!info->keep_memory)
7570 free (local_syms);
7571 else
7572 symtab_hdr->contents = (unsigned char *) local_syms;
7574 free (skip);
7577 return TRUE;
7580 /* Allocate space in .plt, .got and associated reloc sections for
7581 dynamic relocs. */
7583 static bfd_boolean
7584 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
7586 struct bfd_link_info *info;
7587 struct ppc_link_hash_table *htab;
7588 asection *s;
7589 struct ppc_link_hash_entry *eh;
7590 struct ppc_dyn_relocs *p;
7591 struct got_entry *gent;
7593 if (h->root.type == bfd_link_hash_indirect)
7594 return TRUE;
7596 if (h->root.type == bfd_link_hash_warning)
7597 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7599 info = (struct bfd_link_info *) inf;
7600 htab = ppc_hash_table (info);
7602 if (htab->elf.dynamic_sections_created
7603 && h->dynindx != -1
7604 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
7606 struct plt_entry *pent;
7607 bfd_boolean doneone = FALSE;
7608 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7609 if (pent->plt.refcount > 0)
7611 /* If this is the first .plt entry, make room for the special
7612 first entry. */
7613 s = htab->plt;
7614 if (s->size == 0)
7615 s->size += PLT_INITIAL_ENTRY_SIZE;
7617 pent->plt.offset = s->size;
7619 /* Make room for this entry. */
7620 s->size += PLT_ENTRY_SIZE;
7622 /* Make room for the .glink code. */
7623 s = htab->glink;
7624 if (s->size == 0)
7625 s->size += GLINK_CALL_STUB_SIZE;
7626 /* We need bigger stubs past index 32767. */
7627 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
7628 s->size += 4;
7629 s->size += 2*4;
7631 /* We also need to make an entry in the .rela.plt section. */
7632 s = htab->relplt;
7633 s->size += sizeof (Elf64_External_Rela);
7634 doneone = TRUE;
7636 else
7637 pent->plt.offset = (bfd_vma) -1;
7638 if (!doneone)
7640 h->plt.plist = NULL;
7641 h->needs_plt = 0;
7644 else
7646 h->plt.plist = NULL;
7647 h->needs_plt = 0;
7650 eh = (struct ppc_link_hash_entry *) h;
7651 /* Run through the TLS GD got entries first if we're changing them
7652 to TPREL. */
7653 if ((eh->tls_mask & TLS_TPRELGD) != 0)
7654 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7655 if (gent->got.refcount > 0
7656 && (gent->tls_type & TLS_GD) != 0)
7658 /* This was a GD entry that has been converted to TPREL. If
7659 there happens to be a TPREL entry we can use that one. */
7660 struct got_entry *ent;
7661 for (ent = h->got.glist; ent != NULL; ent = ent->next)
7662 if (ent->got.refcount > 0
7663 && (ent->tls_type & TLS_TPREL) != 0
7664 && ent->addend == gent->addend
7665 && ent->owner == gent->owner)
7667 gent->got.refcount = 0;
7668 break;
7671 /* If not, then we'll be using our own TPREL entry. */
7672 if (gent->got.refcount != 0)
7673 gent->tls_type = TLS_TLS | TLS_TPREL;
7676 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7677 if (gent->got.refcount > 0)
7679 bfd_boolean dyn;
7681 /* Make sure this symbol is output as a dynamic symbol.
7682 Undefined weak syms won't yet be marked as dynamic,
7683 nor will all TLS symbols. */
7684 if (h->dynindx == -1
7685 && !h->forced_local)
7687 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7688 return FALSE;
7691 if ((gent->tls_type & TLS_LD) != 0
7692 && !h->def_dynamic)
7694 gent->got.offset = ppc64_tlsld_got (gent->owner)->offset;
7695 continue;
7698 s = ppc64_elf_tdata (gent->owner)->got;
7699 gent->got.offset = s->size;
7700 s->size
7701 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
7702 dyn = htab->elf.dynamic_sections_created;
7703 if ((info->shared
7704 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
7705 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7706 || h->root.type != bfd_link_hash_undefweak))
7707 ppc64_elf_tdata (gent->owner)->relgot->size
7708 += (gent->tls_type & eh->tls_mask & TLS_GD
7709 ? 2 * sizeof (Elf64_External_Rela)
7710 : sizeof (Elf64_External_Rela));
7712 else
7713 gent->got.offset = (bfd_vma) -1;
7715 if (eh->dyn_relocs == NULL)
7716 return TRUE;
7718 /* In the shared -Bsymbolic case, discard space allocated for
7719 dynamic pc-relative relocs against symbols which turn out to be
7720 defined in regular objects. For the normal shared case, discard
7721 space for relocs that have become local due to symbol visibility
7722 changes. */
7724 if (info->shared)
7726 /* Relocs that use pc_count are those that appear on a call insn,
7727 or certain REL relocs (see MUST_BE_DYN_RELOC) that can be
7728 generated via assembly. We want calls to protected symbols to
7729 resolve directly to the function rather than going via the plt.
7730 If people want function pointer comparisons to work as expected
7731 then they should avoid writing weird assembly. */
7732 if (SYMBOL_CALLS_LOCAL (info, h))
7734 struct ppc_dyn_relocs **pp;
7736 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
7738 p->count -= p->pc_count;
7739 p->pc_count = 0;
7740 if (p->count == 0)
7741 *pp = p->next;
7742 else
7743 pp = &p->next;
7747 /* Also discard relocs on undefined weak syms with non-default
7748 visibility. */
7749 if (eh->dyn_relocs != NULL
7750 && h->root.type == bfd_link_hash_undefweak)
7752 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
7753 eh->dyn_relocs = NULL;
7755 /* Make sure this symbol is output as a dynamic symbol.
7756 Undefined weak syms won't yet be marked as dynamic. */
7757 else if (h->dynindx == -1
7758 && !h->forced_local)
7760 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7761 return FALSE;
7765 else if (ELIMINATE_COPY_RELOCS)
7767 /* For the non-shared case, discard space for relocs against
7768 symbols which turn out to need copy relocs or are not
7769 dynamic. */
7771 if (!h->non_got_ref
7772 && h->def_dynamic
7773 && !h->def_regular)
7775 /* Make sure this symbol is output as a dynamic symbol.
7776 Undefined weak syms won't yet be marked as dynamic. */
7777 if (h->dynindx == -1
7778 && !h->forced_local)
7780 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7781 return FALSE;
7784 /* If that succeeded, we know we'll be keeping all the
7785 relocs. */
7786 if (h->dynindx != -1)
7787 goto keep;
7790 eh->dyn_relocs = NULL;
7792 keep: ;
7795 /* Finally, allocate space. */
7796 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7798 asection *sreloc = elf_section_data (p->sec)->sreloc;
7799 sreloc->size += p->count * sizeof (Elf64_External_Rela);
7802 return TRUE;
7805 /* Find any dynamic relocs that apply to read-only sections. */
7807 static bfd_boolean
7808 readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
7810 struct ppc_link_hash_entry *eh;
7811 struct ppc_dyn_relocs *p;
7813 if (h->root.type == bfd_link_hash_warning)
7814 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7816 eh = (struct ppc_link_hash_entry *) h;
7817 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7819 asection *s = p->sec->output_section;
7821 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7823 struct bfd_link_info *info = inf;
7825 info->flags |= DF_TEXTREL;
7827 /* Not an error, just cut short the traversal. */
7828 return FALSE;
7831 return TRUE;
7834 /* Set the sizes of the dynamic sections. */
7836 static bfd_boolean
7837 ppc64_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
7838 struct bfd_link_info *info)
7840 struct ppc_link_hash_table *htab;
7841 bfd *dynobj;
7842 asection *s;
7843 bfd_boolean relocs;
7844 bfd *ibfd;
7846 htab = ppc_hash_table (info);
7847 dynobj = htab->elf.dynobj;
7848 if (dynobj == NULL)
7849 abort ();
7851 if (htab->elf.dynamic_sections_created)
7853 /* Set the contents of the .interp section to the interpreter. */
7854 if (info->executable)
7856 s = bfd_get_section_by_name (dynobj, ".interp");
7857 if (s == NULL)
7858 abort ();
7859 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
7860 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
7864 /* Set up .got offsets for local syms, and space for local dynamic
7865 relocs. */
7866 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7868 struct got_entry **lgot_ents;
7869 struct got_entry **end_lgot_ents;
7870 char *lgot_masks;
7871 bfd_size_type locsymcount;
7872 Elf_Internal_Shdr *symtab_hdr;
7873 asection *srel;
7875 if (!is_ppc64_elf_target (ibfd->xvec))
7876 continue;
7878 if (ppc64_tlsld_got (ibfd)->refcount > 0)
7880 s = ppc64_elf_tdata (ibfd)->got;
7881 ppc64_tlsld_got (ibfd)->offset = s->size;
7882 s->size += 16;
7883 if (info->shared)
7885 srel = ppc64_elf_tdata (ibfd)->relgot;
7886 srel->size += sizeof (Elf64_External_Rela);
7889 else
7890 ppc64_tlsld_got (ibfd)->offset = (bfd_vma) -1;
7892 for (s = ibfd->sections; s != NULL; s = s->next)
7894 struct ppc_dyn_relocs *p;
7896 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
7898 if (!bfd_is_abs_section (p->sec)
7899 && bfd_is_abs_section (p->sec->output_section))
7901 /* Input section has been discarded, either because
7902 it is a copy of a linkonce section or due to
7903 linker script /DISCARD/, so we'll be discarding
7904 the relocs too. */
7906 else if (p->count != 0)
7908 srel = elf_section_data (p->sec)->sreloc;
7909 srel->size += p->count * sizeof (Elf64_External_Rela);
7910 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
7911 info->flags |= DF_TEXTREL;
7916 lgot_ents = elf_local_got_ents (ibfd);
7917 if (!lgot_ents)
7918 continue;
7920 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
7921 locsymcount = symtab_hdr->sh_info;
7922 end_lgot_ents = lgot_ents + locsymcount;
7923 lgot_masks = (char *) end_lgot_ents;
7924 s = ppc64_elf_tdata (ibfd)->got;
7925 srel = ppc64_elf_tdata (ibfd)->relgot;
7926 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
7928 struct got_entry *ent;
7930 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
7931 if (ent->got.refcount > 0)
7933 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
7935 if (ppc64_tlsld_got (ibfd)->offset == (bfd_vma) -1)
7937 ppc64_tlsld_got (ibfd)->offset = s->size;
7938 s->size += 16;
7939 if (info->shared)
7940 srel->size += sizeof (Elf64_External_Rela);
7942 ent->got.offset = ppc64_tlsld_got (ibfd)->offset;
7944 else
7946 ent->got.offset = s->size;
7947 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
7949 s->size += 16;
7950 if (info->shared)
7951 srel->size += 2 * sizeof (Elf64_External_Rela);
7953 else
7955 s->size += 8;
7956 if (info->shared)
7957 srel->size += sizeof (Elf64_External_Rela);
7961 else
7962 ent->got.offset = (bfd_vma) -1;
7966 /* Allocate global sym .plt and .got entries, and space for global
7967 sym dynamic relocs. */
7968 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
7970 /* We now have determined the sizes of the various dynamic sections.
7971 Allocate memory for them. */
7972 relocs = FALSE;
7973 for (s = dynobj->sections; s != NULL; s = s->next)
7975 if ((s->flags & SEC_LINKER_CREATED) == 0)
7976 continue;
7978 if (s == htab->brlt || s == htab->relbrlt)
7979 /* These haven't been allocated yet; don't strip. */
7980 continue;
7981 else if (s == htab->got
7982 || s == htab->plt
7983 || s == htab->glink
7984 || s == htab->dynbss)
7986 /* Strip this section if we don't need it; see the
7987 comment below. */
7989 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
7991 if (s->size != 0)
7993 if (s != htab->relplt)
7994 relocs = TRUE;
7996 /* We use the reloc_count field as a counter if we need
7997 to copy relocs into the output file. */
7998 s->reloc_count = 0;
8001 else
8003 /* It's not one of our sections, so don't allocate space. */
8004 continue;
8007 if (s->size == 0)
8009 /* If we don't need this section, strip it from the
8010 output file. This is mostly to handle .rela.bss and
8011 .rela.plt. We must create both sections in
8012 create_dynamic_sections, because they must be created
8013 before the linker maps input sections to output
8014 sections. The linker does that before
8015 adjust_dynamic_symbol is called, and it is that
8016 function which decides whether anything needs to go
8017 into these sections. */
8018 s->flags |= SEC_EXCLUDE;
8019 continue;
8022 if ((s->flags & SEC_HAS_CONTENTS) == 0)
8023 continue;
8025 /* Allocate memory for the section contents. We use bfd_zalloc
8026 here in case unused entries are not reclaimed before the
8027 section's contents are written out. This should not happen,
8028 but this way if it does we get a R_PPC64_NONE reloc in .rela
8029 sections instead of garbage.
8030 We also rely on the section contents being zero when writing
8031 the GOT. */
8032 s->contents = bfd_zalloc (dynobj, s->size);
8033 if (s->contents == NULL)
8034 return FALSE;
8037 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
8039 if (!is_ppc64_elf_target (ibfd->xvec))
8040 continue;
8042 s = ppc64_elf_tdata (ibfd)->got;
8043 if (s != NULL && s != htab->got)
8045 if (s->size == 0)
8046 s->flags |= SEC_EXCLUDE;
8047 else
8049 s->contents = bfd_zalloc (ibfd, s->size);
8050 if (s->contents == NULL)
8051 return FALSE;
8054 s = ppc64_elf_tdata (ibfd)->relgot;
8055 if (s != NULL)
8057 if (s->size == 0)
8058 s->flags |= SEC_EXCLUDE;
8059 else
8061 s->contents = bfd_zalloc (ibfd, s->size);
8062 if (s->contents == NULL)
8063 return FALSE;
8064 relocs = TRUE;
8065 s->reloc_count = 0;
8070 if (htab->elf.dynamic_sections_created)
8072 /* Add some entries to the .dynamic section. We fill in the
8073 values later, in ppc64_elf_finish_dynamic_sections, but we
8074 must add the entries now so that we get the correct size for
8075 the .dynamic section. The DT_DEBUG entry is filled in by the
8076 dynamic linker and used by the debugger. */
8077 #define add_dynamic_entry(TAG, VAL) \
8078 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
8080 if (info->executable)
8082 if (!add_dynamic_entry (DT_DEBUG, 0))
8083 return FALSE;
8086 if (htab->plt != NULL && htab->plt->size != 0)
8088 if (!add_dynamic_entry (DT_PLTGOT, 0)
8089 || !add_dynamic_entry (DT_PLTRELSZ, 0)
8090 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
8091 || !add_dynamic_entry (DT_JMPREL, 0)
8092 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
8093 return FALSE;
8096 if (NO_OPD_RELOCS)
8098 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
8099 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
8100 return FALSE;
8103 if (relocs)
8105 if (!add_dynamic_entry (DT_RELA, 0)
8106 || !add_dynamic_entry (DT_RELASZ, 0)
8107 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
8108 return FALSE;
8110 /* If any dynamic relocs apply to a read-only section,
8111 then we need a DT_TEXTREL entry. */
8112 if ((info->flags & DF_TEXTREL) == 0)
8113 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
8115 if ((info->flags & DF_TEXTREL) != 0)
8117 if (!add_dynamic_entry (DT_TEXTREL, 0))
8118 return FALSE;
8122 #undef add_dynamic_entry
8124 return TRUE;
8127 /* Determine the type of stub needed, if any, for a call. */
8129 static inline enum ppc_stub_type
8130 ppc_type_of_stub (asection *input_sec,
8131 const Elf_Internal_Rela *rel,
8132 struct ppc_link_hash_entry **hash,
8133 bfd_vma destination)
8135 struct ppc_link_hash_entry *h = *hash;
8136 bfd_vma location;
8137 bfd_vma branch_offset;
8138 bfd_vma max_branch_offset;
8139 enum elf_ppc64_reloc_type r_type;
8141 if (h != NULL)
8143 struct ppc_link_hash_entry *fdh = h;
8144 if (fdh->oh != NULL
8145 && fdh->oh->is_func_descriptor)
8146 fdh = fdh->oh;
8148 if (fdh->elf.dynindx != -1)
8150 struct plt_entry *ent;
8152 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
8153 if (ent->addend == rel->r_addend
8154 && ent->plt.offset != (bfd_vma) -1)
8156 *hash = fdh;
8157 return ppc_stub_plt_call;
8161 /* Here, we know we don't have a plt entry. If we don't have a
8162 either a defined function descriptor or a defined entry symbol
8163 in a regular object file, then it is pointless trying to make
8164 any other type of stub. */
8165 if (!((fdh->elf.root.type == bfd_link_hash_defined
8166 || fdh->elf.root.type == bfd_link_hash_defweak)
8167 && fdh->elf.root.u.def.section->output_section != NULL)
8168 && !((h->elf.root.type == bfd_link_hash_defined
8169 || h->elf.root.type == bfd_link_hash_defweak)
8170 && h->elf.root.u.def.section->output_section != NULL))
8171 return ppc_stub_none;
8174 /* Determine where the call point is. */
8175 location = (input_sec->output_offset
8176 + input_sec->output_section->vma
8177 + rel->r_offset);
8179 branch_offset = destination - location;
8180 r_type = ELF64_R_TYPE (rel->r_info);
8182 /* Determine if a long branch stub is needed. */
8183 max_branch_offset = 1 << 25;
8184 if (r_type != R_PPC64_REL24)
8185 max_branch_offset = 1 << 15;
8187 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
8188 /* We need a stub. Figure out whether a long_branch or plt_branch
8189 is needed later. */
8190 return ppc_stub_long_branch;
8192 return ppc_stub_none;
8195 /* Build a .plt call stub. */
8197 static inline bfd_byte *
8198 build_plt_stub (bfd *obfd, bfd_byte *p, int offset)
8200 #define PPC_LO(v) ((v) & 0xffff)
8201 #define PPC_HI(v) (((v) >> 16) & 0xffff)
8202 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
8204 if (PPC_HA (offset) != 0)
8206 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
8207 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
8208 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
8209 if (PPC_HA (offset + 16) != PPC_HA (offset))
8211 bfd_put_32 (obfd, ADDI_R12_R12 | PPC_LO (offset), p), p += 4;
8212 offset = 0;
8214 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
8215 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset + 8), p), p += 4;
8216 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset + 16), p), p += 4;
8217 bfd_put_32 (obfd, BCTR, p), p += 4;
8219 else
8221 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
8222 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset), p), p += 4;
8223 if (PPC_HA (offset + 16) != PPC_HA (offset))
8225 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
8226 offset = 0;
8228 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
8229 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
8230 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
8231 bfd_put_32 (obfd, BCTR, p), p += 4;
8233 return p;
8236 static bfd_boolean
8237 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
8239 struct ppc_stub_hash_entry *stub_entry;
8240 struct ppc_branch_hash_entry *br_entry;
8241 struct bfd_link_info *info;
8242 struct ppc_link_hash_table *htab;
8243 bfd_byte *loc;
8244 bfd_byte *p;
8245 unsigned int indx;
8246 struct plt_entry *ent;
8247 bfd_vma dest, off;
8248 int size;
8250 /* Massage our args to the form they really have. */
8251 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
8252 info = in_arg;
8254 htab = ppc_hash_table (info);
8256 /* Make a note of the offset within the stubs for this entry. */
8257 stub_entry->stub_offset = stub_entry->stub_sec->size;
8258 loc = stub_entry->stub_sec->contents + stub_entry->stub_offset;
8260 htab->stub_count[stub_entry->stub_type - 1] += 1;
8261 switch (stub_entry->stub_type)
8263 case ppc_stub_long_branch:
8264 case ppc_stub_long_branch_r2off:
8265 /* Branches are relative. This is where we are going to. */
8266 off = dest = (stub_entry->target_value
8267 + stub_entry->target_section->output_offset
8268 + stub_entry->target_section->output_section->vma);
8270 /* And this is where we are coming from. */
8271 off -= (stub_entry->stub_offset
8272 + stub_entry->stub_sec->output_offset
8273 + stub_entry->stub_sec->output_section->vma);
8275 size = 4;
8276 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
8278 bfd_vma r2off;
8280 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8281 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8282 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
8283 loc += 4;
8284 size = 12;
8285 if (PPC_HA (r2off) != 0)
8287 size = 16;
8288 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
8289 loc += 4;
8291 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
8292 loc += 4;
8293 off -= size - 4;
8295 bfd_put_32 (htab->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
8297 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8299 (*_bfd_error_handler) (_("long branch stub `%s' offset overflow"),
8300 stub_entry->root.string);
8301 htab->stub_error = TRUE;
8302 return FALSE;
8305 if (info->emitrelocations)
8307 Elf_Internal_Rela *relocs, *r;
8308 struct bfd_elf_section_data *elfsec_data;
8310 elfsec_data = elf_section_data (stub_entry->stub_sec);
8311 relocs = elfsec_data->relocs;
8312 if (relocs == NULL)
8314 bfd_size_type relsize;
8315 relsize = stub_entry->stub_sec->reloc_count * sizeof (*relocs);
8316 relocs = bfd_alloc (htab->stub_bfd, relsize);
8317 if (relocs == NULL)
8318 return FALSE;
8319 elfsec_data->relocs = relocs;
8320 elfsec_data->rel_hdr.sh_size = (stub_entry->stub_sec->reloc_count
8321 * sizeof (Elf64_External_Rela));
8322 elfsec_data->rel_hdr.sh_entsize = sizeof (Elf64_External_Rela);
8323 stub_entry->stub_sec->reloc_count = 0;
8325 r = relocs + stub_entry->stub_sec->reloc_count;
8326 stub_entry->stub_sec->reloc_count += 1;
8327 r->r_offset = loc - stub_entry->stub_sec->contents;
8328 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
8329 r->r_addend = dest;
8330 if (stub_entry->h != NULL)
8332 struct elf_link_hash_entry **hashes;
8333 unsigned long symndx;
8334 struct ppc_link_hash_entry *h;
8336 hashes = elf_sym_hashes (htab->stub_bfd);
8337 if (hashes == NULL)
8339 bfd_size_type hsize;
8341 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
8342 hashes = bfd_zalloc (htab->stub_bfd, hsize);
8343 if (hashes == NULL)
8344 return FALSE;
8345 elf_sym_hashes (htab->stub_bfd) = hashes;
8346 htab->stub_globals = 1;
8348 symndx = htab->stub_globals++;
8349 h = stub_entry->h;
8350 hashes[symndx] = &h->elf;
8351 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
8352 if (h->oh != NULL && h->oh->is_func)
8353 h = h->oh;
8354 if (h->elf.root.u.def.section != stub_entry->target_section)
8355 /* H is an opd symbol. The addend must be zero. */
8356 r->r_addend = 0;
8357 else
8359 off = (h->elf.root.u.def.value
8360 + h->elf.root.u.def.section->output_offset
8361 + h->elf.root.u.def.section->output_section->vma);
8362 r->r_addend -= off;
8366 break;
8368 case ppc_stub_plt_branch:
8369 case ppc_stub_plt_branch_r2off:
8370 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8371 stub_entry->root.string + 9,
8372 FALSE, FALSE);
8373 if (br_entry == NULL)
8375 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
8376 stub_entry->root.string);
8377 htab->stub_error = TRUE;
8378 return FALSE;
8381 off = (stub_entry->target_value
8382 + stub_entry->target_section->output_offset
8383 + stub_entry->target_section->output_section->vma);
8385 bfd_put_64 (htab->brlt->owner, off,
8386 htab->brlt->contents + br_entry->offset);
8388 if (htab->relbrlt != NULL)
8390 /* Create a reloc for the branch lookup table entry. */
8391 Elf_Internal_Rela rela;
8392 bfd_byte *rl;
8394 rela.r_offset = (br_entry->offset
8395 + htab->brlt->output_offset
8396 + htab->brlt->output_section->vma);
8397 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8398 rela.r_addend = off;
8400 rl = htab->relbrlt->contents;
8401 rl += htab->relbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
8402 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
8404 else if (info->emitrelocations)
8406 Elf_Internal_Rela *relocs, *r;
8407 struct bfd_elf_section_data *elfsec_data;
8409 elfsec_data = elf_section_data (htab->brlt);
8410 relocs = elfsec_data->relocs;
8411 if (relocs == NULL)
8413 bfd_size_type relsize;
8414 relsize = htab->brlt->reloc_count * sizeof (*relocs);
8415 relocs = bfd_alloc (htab->brlt->owner, relsize);
8416 if (relocs == NULL)
8417 return FALSE;
8418 elfsec_data->relocs = relocs;
8419 elfsec_data->rel_hdr.sh_size = (stub_entry->stub_sec->reloc_count
8420 * sizeof (Elf64_External_Rela));
8421 elfsec_data->rel_hdr.sh_entsize = sizeof (Elf64_External_Rela);
8422 htab->brlt->reloc_count = 0;
8424 r = relocs + htab->brlt->reloc_count;
8425 htab->brlt->reloc_count += 1;
8426 r->r_offset = (br_entry->offset
8427 + htab->brlt->output_offset
8428 + htab->brlt->output_section->vma);
8429 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8430 r->r_addend = off;
8433 off = (br_entry->offset
8434 + htab->brlt->output_offset
8435 + htab->brlt->output_section->vma
8436 - elf_gp (htab->brlt->output_section->owner)
8437 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8439 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
8441 (*_bfd_error_handler)
8442 (_("linkage table error against `%s'"),
8443 stub_entry->root.string);
8444 bfd_set_error (bfd_error_bad_value);
8445 htab->stub_error = TRUE;
8446 return FALSE;
8449 indx = off;
8450 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
8452 if (PPC_HA (indx) != 0)
8454 size = 16;
8455 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
8456 loc += 4;
8457 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
8459 else
8461 size = 12;
8462 bfd_put_32 (htab->stub_bfd, LD_R11_0R2 | PPC_LO (indx), loc);
8465 else
8467 bfd_vma r2off;
8469 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8470 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8471 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
8472 loc += 4;
8473 size = 20;
8474 if (PPC_HA (indx) != 0)
8476 size += 4;
8477 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
8478 loc += 4;
8479 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
8480 loc += 4;
8482 else
8484 bfd_put_32 (htab->stub_bfd, LD_R11_0R2 | PPC_LO (indx), loc);
8485 loc += 4;
8488 if (PPC_HA (r2off) != 0)
8490 size += 4;
8491 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
8492 loc += 4;
8494 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
8496 loc += 4;
8497 bfd_put_32 (htab->stub_bfd, MTCTR_R11, loc);
8498 loc += 4;
8499 bfd_put_32 (htab->stub_bfd, BCTR, loc);
8500 break;
8502 case ppc_stub_plt_call:
8503 /* Do the best we can for shared libraries built without
8504 exporting ".foo" for each "foo". This can happen when symbol
8505 versioning scripts strip all bar a subset of symbols. */
8506 if (stub_entry->h->oh != NULL
8507 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defined
8508 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defweak)
8510 /* Point the symbol at the stub. There may be multiple stubs,
8511 we don't really care; The main thing is to make this sym
8512 defined somewhere. Maybe defining the symbol in the stub
8513 section is a silly idea. If we didn't do this, htab->top_id
8514 could disappear. */
8515 stub_entry->h->oh->elf.root.type = bfd_link_hash_defined;
8516 stub_entry->h->oh->elf.root.u.def.section = stub_entry->stub_sec;
8517 stub_entry->h->oh->elf.root.u.def.value = stub_entry->stub_offset;
8520 /* Now build the stub. */
8521 off = (bfd_vma) -1;
8522 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8523 if (ent->addend == stub_entry->addend)
8525 off = ent->plt.offset;
8526 break;
8528 if (off >= (bfd_vma) -2)
8529 abort ();
8531 off &= ~ (bfd_vma) 1;
8532 off += (htab->plt->output_offset
8533 + htab->plt->output_section->vma
8534 - elf_gp (htab->plt->output_section->owner)
8535 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8537 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
8539 (*_bfd_error_handler)
8540 (_("linkage table error against `%s'"),
8541 stub_entry->h->elf.root.root.string);
8542 bfd_set_error (bfd_error_bad_value);
8543 htab->stub_error = TRUE;
8544 return FALSE;
8547 p = build_plt_stub (htab->stub_bfd, loc, off);
8548 size = p - loc;
8549 break;
8551 default:
8552 BFD_FAIL ();
8553 return FALSE;
8556 stub_entry->stub_sec->size += size;
8558 if (htab->emit_stub_syms)
8560 struct elf_link_hash_entry *h;
8561 size_t len1, len2;
8562 char *name;
8563 const char *const stub_str[] = { "long_branch",
8564 "long_branch_r2off",
8565 "plt_branch",
8566 "plt_branch_r2off",
8567 "plt_call" };
8569 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
8570 len2 = strlen (stub_entry->root.string);
8571 name = bfd_malloc (len1 + len2 + 2);
8572 if (name == NULL)
8573 return FALSE;
8574 memcpy (name, stub_entry->root.string, 9);
8575 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
8576 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
8577 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
8578 if (h == NULL)
8579 return FALSE;
8580 if (h->root.type == bfd_link_hash_new)
8582 h->root.type = bfd_link_hash_defined;
8583 h->root.u.def.section = stub_entry->stub_sec;
8584 h->root.u.def.value = stub_entry->stub_offset;
8585 h->ref_regular = 1;
8586 h->def_regular = 1;
8587 h->ref_regular_nonweak = 1;
8588 h->forced_local = 1;
8589 h->non_elf = 0;
8593 return TRUE;
8596 /* As above, but don't actually build the stub. Just bump offset so
8597 we know stub section sizes, and select plt_branch stubs where
8598 long_branch stubs won't do. */
8600 static bfd_boolean
8601 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
8603 struct ppc_stub_hash_entry *stub_entry;
8604 struct bfd_link_info *info;
8605 struct ppc_link_hash_table *htab;
8606 bfd_vma off;
8607 int size;
8609 /* Massage our args to the form they really have. */
8610 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
8611 info = in_arg;
8613 htab = ppc_hash_table (info);
8615 if (stub_entry->stub_type == ppc_stub_plt_call)
8617 struct plt_entry *ent;
8618 off = (bfd_vma) -1;
8619 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8620 if (ent->addend == stub_entry->addend)
8622 off = ent->plt.offset & ~(bfd_vma) 1;
8623 break;
8625 if (off >= (bfd_vma) -2)
8626 abort ();
8627 off += (htab->plt->output_offset
8628 + htab->plt->output_section->vma
8629 - elf_gp (htab->plt->output_section->owner)
8630 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8632 size = PLT_CALL_STUB_SIZE;
8633 if (PPC_HA (off) == 0)
8634 size -= 4;
8635 if (PPC_HA (off + 16) != PPC_HA (off))
8636 size += 4;
8638 else
8640 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
8641 variants. */
8642 bfd_vma r2off = 0;
8644 off = (stub_entry->target_value
8645 + stub_entry->target_section->output_offset
8646 + stub_entry->target_section->output_section->vma);
8647 off -= (stub_entry->stub_sec->size
8648 + stub_entry->stub_sec->output_offset
8649 + stub_entry->stub_sec->output_section->vma);
8651 /* Reset the stub type from the plt variant in case we now
8652 can reach with a shorter stub. */
8653 if (stub_entry->stub_type >= ppc_stub_plt_branch)
8654 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
8656 size = 4;
8657 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
8659 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8660 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8661 size = 12;
8662 if (PPC_HA (r2off) != 0)
8663 size = 16;
8664 off -= size - 4;
8667 /* If the branch offset if too big, use a ppc_stub_plt_branch. */
8668 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8670 struct ppc_branch_hash_entry *br_entry;
8671 unsigned int indx;
8673 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8674 stub_entry->root.string + 9,
8675 TRUE, FALSE);
8676 if (br_entry == NULL)
8678 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
8679 stub_entry->root.string);
8680 htab->stub_error = TRUE;
8681 return FALSE;
8684 if (br_entry->iter != htab->stub_iteration)
8686 br_entry->iter = htab->stub_iteration;
8687 br_entry->offset = htab->brlt->size;
8688 htab->brlt->size += 8;
8690 if (htab->relbrlt != NULL)
8691 htab->relbrlt->size += sizeof (Elf64_External_Rela);
8692 else if (info->emitrelocations)
8694 htab->brlt->reloc_count += 1;
8695 htab->brlt->flags |= SEC_RELOC;
8699 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
8700 off = (br_entry->offset
8701 + htab->brlt->output_offset
8702 + htab->brlt->output_section->vma
8703 - elf_gp (htab->brlt->output_section->owner)
8704 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8706 indx = off;
8707 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
8709 size = 12;
8710 if (PPC_HA (indx) != 0)
8711 size = 16;
8713 else
8715 size = 20;
8716 if (PPC_HA (indx) != 0)
8717 size += 4;
8719 if (PPC_HA (r2off) != 0)
8720 size += 4;
8723 else if (info->emitrelocations)
8725 stub_entry->stub_sec->reloc_count += 1;
8726 stub_entry->stub_sec->flags |= SEC_RELOC;
8730 stub_entry->stub_sec->size += size;
8731 return TRUE;
8734 /* Set up various things so that we can make a list of input sections
8735 for each output section included in the link. Returns -1 on error,
8736 0 when no stubs will be needed, and 1 on success. */
8739 ppc64_elf_setup_section_lists (bfd *output_bfd,
8740 struct bfd_link_info *info,
8741 int no_multi_toc)
8743 bfd *input_bfd;
8744 int top_id, top_index, id;
8745 asection *section;
8746 asection **input_list;
8747 bfd_size_type amt;
8748 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8750 htab->no_multi_toc = no_multi_toc;
8752 if (htab->brlt == NULL)
8753 return 0;
8755 /* Find the top input section id. */
8756 for (input_bfd = info->input_bfds, top_id = 3;
8757 input_bfd != NULL;
8758 input_bfd = input_bfd->link_next)
8760 for (section = input_bfd->sections;
8761 section != NULL;
8762 section = section->next)
8764 if (top_id < section->id)
8765 top_id = section->id;
8769 htab->top_id = top_id;
8770 amt = sizeof (struct map_stub) * (top_id + 1);
8771 htab->stub_group = bfd_zmalloc (amt);
8772 if (htab->stub_group == NULL)
8773 return -1;
8775 /* Set toc_off for com, und, abs and ind sections. */
8776 for (id = 0; id < 3; id++)
8777 htab->stub_group[id].toc_off = TOC_BASE_OFF;
8779 elf_gp (output_bfd) = htab->toc_curr = ppc64_elf_toc (output_bfd);
8781 /* We can't use output_bfd->section_count here to find the top output
8782 section index as some sections may have been removed, and
8783 strip_excluded_output_sections doesn't renumber the indices. */
8784 for (section = output_bfd->sections, top_index = 0;
8785 section != NULL;
8786 section = section->next)
8788 if (top_index < section->index)
8789 top_index = section->index;
8792 htab->top_index = top_index;
8793 amt = sizeof (asection *) * (top_index + 1);
8794 input_list = bfd_zmalloc (amt);
8795 htab->input_list = input_list;
8796 if (input_list == NULL)
8797 return -1;
8799 return 1;
8802 /* The linker repeatedly calls this function for each TOC input section
8803 and linker generated GOT section. Group input bfds such that the toc
8804 within a group is less than 64k in size. Will break with cute linker
8805 scripts that play games with dot in the output toc section. */
8807 void
8808 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
8810 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8812 if (!htab->no_multi_toc)
8814 bfd_vma addr = isec->output_offset + isec->output_section->vma;
8815 bfd_vma off = addr - htab->toc_curr;
8817 if (off + isec->size > 0x10000)
8818 htab->toc_curr = addr;
8820 elf_gp (isec->owner) = (htab->toc_curr
8821 - elf_gp (isec->output_section->owner)
8822 + TOC_BASE_OFF);
8826 /* Called after the last call to the above function. */
8828 void
8829 ppc64_elf_reinit_toc (bfd *output_bfd, struct bfd_link_info *info)
8831 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8833 htab->multi_toc_needed = htab->toc_curr != elf_gp (output_bfd);
8835 /* toc_curr tracks the TOC offset used for code sections below in
8836 ppc64_elf_next_input_section. Start off at 0x8000. */
8837 htab->toc_curr = TOC_BASE_OFF;
8840 /* No toc references were found in ISEC. If the code in ISEC makes no
8841 calls, then there's no need to use toc adjusting stubs when branching
8842 into ISEC. Actually, indirect calls from ISEC are OK as they will
8843 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
8844 needed, and 2 if a cyclical call-graph was found but no other reason
8845 for a stub was detected. If called from the top level, a return of
8846 2 means the same as a return of 0. */
8848 static int
8849 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
8851 Elf_Internal_Rela *relstart, *rel;
8852 Elf_Internal_Sym *local_syms;
8853 int ret;
8854 struct ppc_link_hash_table *htab;
8856 /* We know none of our code bearing sections will need toc stubs. */
8857 if ((isec->flags & SEC_LINKER_CREATED) != 0)
8858 return 0;
8860 if (isec->size == 0)
8861 return 0;
8863 if (isec->output_section == NULL)
8864 return 0;
8866 /* Hack for linux kernel. .fixup contains branches, but only back to
8867 the function that hit an exception. */
8868 if (strcmp (isec->name, ".fixup") == 0)
8869 return 0;
8871 if (isec->reloc_count == 0)
8872 return 0;
8874 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
8875 info->keep_memory);
8876 if (relstart == NULL)
8877 return -1;
8879 /* Look for branches to outside of this section. */
8880 local_syms = NULL;
8881 ret = 0;
8882 htab = ppc_hash_table (info);
8883 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
8885 enum elf_ppc64_reloc_type r_type;
8886 unsigned long r_symndx;
8887 struct elf_link_hash_entry *h;
8888 Elf_Internal_Sym *sym;
8889 asection *sym_sec;
8890 long *opd_adjust;
8891 bfd_vma sym_value;
8892 bfd_vma dest;
8894 r_type = ELF64_R_TYPE (rel->r_info);
8895 if (r_type != R_PPC64_REL24
8896 && r_type != R_PPC64_REL14
8897 && r_type != R_PPC64_REL14_BRTAKEN
8898 && r_type != R_PPC64_REL14_BRNTAKEN)
8899 continue;
8901 r_symndx = ELF64_R_SYM (rel->r_info);
8902 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
8903 isec->owner))
8905 ret = -1;
8906 break;
8909 /* Calls to dynamic lib functions go through a plt call stub
8910 that uses r2. Branches to undefined symbols might be a call
8911 using old-style dot symbols that can be satisfied by a plt
8912 call into a new-style dynamic library. */
8913 if (sym_sec == NULL)
8915 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
8916 if (eh != NULL
8917 && eh->oh != NULL
8918 && eh->oh->elf.plt.plist != NULL)
8920 ret = 1;
8921 break;
8924 /* Ignore other undefined symbols. */
8925 continue;
8928 /* Assume branches to other sections not included in the link need
8929 stubs too, to cover -R and absolute syms. */
8930 if (sym_sec->output_section == NULL)
8932 ret = 1;
8933 break;
8936 if (h == NULL)
8937 sym_value = sym->st_value;
8938 else
8940 if (h->root.type != bfd_link_hash_defined
8941 && h->root.type != bfd_link_hash_defweak)
8942 abort ();
8943 sym_value = h->root.u.def.value;
8945 sym_value += rel->r_addend;
8947 /* If this branch reloc uses an opd sym, find the code section. */
8948 opd_adjust = get_opd_info (sym_sec);
8949 if (opd_adjust != NULL)
8951 if (h == NULL)
8953 long adjust;
8955 adjust = opd_adjust[sym->st_value / 8];
8956 if (adjust == -1)
8957 /* Assume deleted functions won't ever be called. */
8958 continue;
8959 sym_value += adjust;
8962 dest = opd_entry_value (sym_sec, sym_value, &sym_sec, NULL);
8963 if (dest == (bfd_vma) -1)
8964 continue;
8966 else
8967 dest = (sym_value
8968 + sym_sec->output_offset
8969 + sym_sec->output_section->vma);
8971 /* Ignore branch to self. */
8972 if (sym_sec == isec)
8973 continue;
8975 /* If the called function uses the toc, we need a stub. */
8976 if (sym_sec->has_toc_reloc
8977 || sym_sec->makes_toc_func_call)
8979 ret = 1;
8980 break;
8983 /* Assume any branch that needs a long branch stub might in fact
8984 need a plt_branch stub. A plt_branch stub uses r2. */
8985 else if (dest - (isec->output_offset
8986 + isec->output_section->vma
8987 + rel->r_offset) + (1 << 25) >= (2 << 25))
8989 ret = 1;
8990 break;
8993 /* If calling back to a section in the process of being tested, we
8994 can't say for sure that no toc adjusting stubs are needed, so
8995 don't return zero. */
8996 else if (sym_sec->call_check_in_progress)
8997 ret = 2;
8999 /* Branches to another section that itself doesn't have any TOC
9000 references are OK. Recursively call ourselves to check. */
9001 else if (sym_sec->id <= htab->top_id
9002 && htab->stub_group[sym_sec->id].toc_off == 0)
9004 int recur;
9006 /* Mark current section as indeterminate, so that other
9007 sections that call back to current won't be marked as
9008 known. */
9009 isec->call_check_in_progress = 1;
9010 recur = toc_adjusting_stub_needed (info, sym_sec);
9011 isec->call_check_in_progress = 0;
9013 if (recur < 0)
9015 /* An error. Exit. */
9016 ret = -1;
9017 break;
9019 else if (recur <= 1)
9021 /* Known result. Mark as checked and set section flag. */
9022 htab->stub_group[sym_sec->id].toc_off = 1;
9023 if (recur != 0)
9025 sym_sec->makes_toc_func_call = 1;
9026 ret = 1;
9027 break;
9030 else
9032 /* Unknown result. Continue checking. */
9033 ret = 2;
9038 if (local_syms != NULL
9039 && (elf_tdata (isec->owner)->symtab_hdr.contents
9040 != (unsigned char *) local_syms))
9041 free (local_syms);
9042 if (elf_section_data (isec)->relocs != relstart)
9043 free (relstart);
9045 return ret;
9048 /* The linker repeatedly calls this function for each input section,
9049 in the order that input sections are linked into output sections.
9050 Build lists of input sections to determine groupings between which
9051 we may insert linker stubs. */
9053 bfd_boolean
9054 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
9056 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9058 if ((isec->output_section->flags & SEC_CODE) != 0
9059 && isec->output_section->index <= htab->top_index)
9061 asection **list = htab->input_list + isec->output_section->index;
9062 /* Steal the link_sec pointer for our list. */
9063 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
9064 /* This happens to make the list in reverse order,
9065 which is what we want. */
9066 PREV_SEC (isec) = *list;
9067 *list = isec;
9070 if (htab->multi_toc_needed)
9072 /* If a code section has a function that uses the TOC then we need
9073 to use the right TOC (obviously). Also, make sure that .opd gets
9074 the correct TOC value for R_PPC64_TOC relocs that don't have or
9075 can't find their function symbol (shouldn't ever happen now). */
9076 if (isec->has_toc_reloc || (isec->flags & SEC_CODE) == 0)
9078 if (elf_gp (isec->owner) != 0)
9079 htab->toc_curr = elf_gp (isec->owner);
9081 else if (htab->stub_group[isec->id].toc_off == 0)
9083 int ret = toc_adjusting_stub_needed (info, isec);
9084 if (ret < 0)
9085 return FALSE;
9086 else
9087 isec->makes_toc_func_call = ret & 1;
9091 /* Functions that don't use the TOC can belong in any TOC group.
9092 Use the last TOC base. This happens to make _init and _fini
9093 pasting work. */
9094 htab->stub_group[isec->id].toc_off = htab->toc_curr;
9095 return TRUE;
9098 /* See whether we can group stub sections together. Grouping stub
9099 sections may result in fewer stubs. More importantly, we need to
9100 put all .init* and .fini* stubs at the beginning of the .init or
9101 .fini output sections respectively, because glibc splits the
9102 _init and _fini functions into multiple parts. Putting a stub in
9103 the middle of a function is not a good idea. */
9105 static void
9106 group_sections (struct ppc_link_hash_table *htab,
9107 bfd_size_type stub_group_size,
9108 bfd_boolean stubs_always_before_branch)
9110 asection **list;
9111 bfd_size_type stub14_group_size;
9112 bfd_boolean suppress_size_errors;
9114 suppress_size_errors = FALSE;
9115 stub14_group_size = stub_group_size;
9116 if (stub_group_size == 1)
9118 /* Default values. */
9119 if (stubs_always_before_branch)
9121 stub_group_size = 0x1e00000;
9122 stub14_group_size = 0x7800;
9124 else
9126 stub_group_size = 0x1c00000;
9127 stub14_group_size = 0x7000;
9129 suppress_size_errors = TRUE;
9132 list = htab->input_list + htab->top_index;
9135 asection *tail = *list;
9136 while (tail != NULL)
9138 asection *curr;
9139 asection *prev;
9140 bfd_size_type total;
9141 bfd_boolean big_sec;
9142 bfd_vma curr_toc;
9144 curr = tail;
9145 total = tail->size;
9146 big_sec = total > (ppc64_elf_section_data (tail)->has_14bit_branch
9147 ? stub14_group_size : stub_group_size);
9148 if (big_sec && !suppress_size_errors)
9149 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
9150 tail->owner, tail);
9151 curr_toc = htab->stub_group[tail->id].toc_off;
9153 while ((prev = PREV_SEC (curr)) != NULL
9154 && ((total += curr->output_offset - prev->output_offset)
9155 < (ppc64_elf_section_data (prev)->has_14bit_branch
9156 ? stub14_group_size : stub_group_size))
9157 && htab->stub_group[prev->id].toc_off == curr_toc)
9158 curr = prev;
9160 /* OK, the size from the start of CURR to the end is less
9161 than stub_group_size and thus can be handled by one stub
9162 section. (or the tail section is itself larger than
9163 stub_group_size, in which case we may be toast.) We
9164 should really be keeping track of the total size of stubs
9165 added here, as stubs contribute to the final output
9166 section size. That's a little tricky, and this way will
9167 only break if stubs added make the total size more than
9168 2^25, ie. for the default stub_group_size, if stubs total
9169 more than 2097152 bytes, or nearly 75000 plt call stubs. */
9172 prev = PREV_SEC (tail);
9173 /* Set up this stub group. */
9174 htab->stub_group[tail->id].link_sec = curr;
9176 while (tail != curr && (tail = prev) != NULL);
9178 /* But wait, there's more! Input sections up to stub_group_size
9179 bytes before the stub section can be handled by it too.
9180 Don't do this if we have a really large section after the
9181 stubs, as adding more stubs increases the chance that
9182 branches may not reach into the stub section. */
9183 if (!stubs_always_before_branch && !big_sec)
9185 total = 0;
9186 while (prev != NULL
9187 && ((total += tail->output_offset - prev->output_offset)
9188 < (ppc64_elf_section_data (prev)->has_14bit_branch
9189 ? stub14_group_size : stub_group_size))
9190 && htab->stub_group[prev->id].toc_off == curr_toc)
9192 tail = prev;
9193 prev = PREV_SEC (tail);
9194 htab->stub_group[tail->id].link_sec = curr;
9197 tail = prev;
9200 while (list-- != htab->input_list);
9201 free (htab->input_list);
9202 #undef PREV_SEC
9205 /* Determine and set the size of the stub section for a final link.
9207 The basic idea here is to examine all the relocations looking for
9208 PC-relative calls to a target that is unreachable with a "bl"
9209 instruction. */
9211 bfd_boolean
9212 ppc64_elf_size_stubs (bfd *output_bfd,
9213 struct bfd_link_info *info,
9214 bfd_signed_vma group_size,
9215 asection *(*add_stub_section) (const char *, asection *),
9216 void (*layout_sections_again) (void))
9218 bfd_size_type stub_group_size;
9219 bfd_boolean stubs_always_before_branch;
9220 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9222 /* Stash our params away. */
9223 htab->add_stub_section = add_stub_section;
9224 htab->layout_sections_again = layout_sections_again;
9225 stubs_always_before_branch = group_size < 0;
9226 if (group_size < 0)
9227 stub_group_size = -group_size;
9228 else
9229 stub_group_size = group_size;
9231 group_sections (htab, stub_group_size, stubs_always_before_branch);
9233 while (1)
9235 bfd *input_bfd;
9236 unsigned int bfd_indx;
9237 asection *stub_sec;
9239 htab->stub_iteration += 1;
9241 for (input_bfd = info->input_bfds, bfd_indx = 0;
9242 input_bfd != NULL;
9243 input_bfd = input_bfd->link_next, bfd_indx++)
9245 Elf_Internal_Shdr *symtab_hdr;
9246 asection *section;
9247 Elf_Internal_Sym *local_syms = NULL;
9249 if (!is_ppc64_elf_target (input_bfd->xvec))
9250 continue;
9252 /* We'll need the symbol table in a second. */
9253 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9254 if (symtab_hdr->sh_info == 0)
9255 continue;
9257 /* Walk over each section attached to the input bfd. */
9258 for (section = input_bfd->sections;
9259 section != NULL;
9260 section = section->next)
9262 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
9264 /* If there aren't any relocs, then there's nothing more
9265 to do. */
9266 if ((section->flags & SEC_RELOC) == 0
9267 || (section->flags & SEC_ALLOC) == 0
9268 || (section->flags & SEC_LOAD) == 0
9269 || (section->flags & SEC_CODE) == 0
9270 || section->reloc_count == 0)
9271 continue;
9273 /* If this section is a link-once section that will be
9274 discarded, then don't create any stubs. */
9275 if (section->output_section == NULL
9276 || section->output_section->owner != output_bfd)
9277 continue;
9279 /* Get the relocs. */
9280 internal_relocs
9281 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
9282 info->keep_memory);
9283 if (internal_relocs == NULL)
9284 goto error_ret_free_local;
9286 /* Now examine each relocation. */
9287 irela = internal_relocs;
9288 irelaend = irela + section->reloc_count;
9289 for (; irela < irelaend; irela++)
9291 enum elf_ppc64_reloc_type r_type;
9292 unsigned int r_indx;
9293 enum ppc_stub_type stub_type;
9294 struct ppc_stub_hash_entry *stub_entry;
9295 asection *sym_sec, *code_sec;
9296 bfd_vma sym_value;
9297 bfd_vma destination;
9298 bfd_boolean ok_dest;
9299 struct ppc_link_hash_entry *hash;
9300 struct ppc_link_hash_entry *fdh;
9301 struct elf_link_hash_entry *h;
9302 Elf_Internal_Sym *sym;
9303 char *stub_name;
9304 const asection *id_sec;
9305 long *opd_adjust;
9307 r_type = ELF64_R_TYPE (irela->r_info);
9308 r_indx = ELF64_R_SYM (irela->r_info);
9310 if (r_type >= R_PPC64_max)
9312 bfd_set_error (bfd_error_bad_value);
9313 goto error_ret_free_internal;
9316 /* Only look for stubs on branch instructions. */
9317 if (r_type != R_PPC64_REL24
9318 && r_type != R_PPC64_REL14
9319 && r_type != R_PPC64_REL14_BRTAKEN
9320 && r_type != R_PPC64_REL14_BRNTAKEN)
9321 continue;
9323 /* Now determine the call target, its name, value,
9324 section. */
9325 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9326 r_indx, input_bfd))
9327 goto error_ret_free_internal;
9328 hash = (struct ppc_link_hash_entry *) h;
9330 ok_dest = FALSE;
9331 fdh = NULL;
9332 sym_value = 0;
9333 if (hash == NULL)
9335 sym_value = sym->st_value;
9336 ok_dest = TRUE;
9338 else if (hash->elf.root.type == bfd_link_hash_defined
9339 || hash->elf.root.type == bfd_link_hash_defweak)
9341 sym_value = hash->elf.root.u.def.value;
9342 if (sym_sec->output_section != NULL)
9343 ok_dest = TRUE;
9345 else if (hash->elf.root.type == bfd_link_hash_undefweak
9346 || hash->elf.root.type == bfd_link_hash_undefined)
9348 /* Recognise an old ABI func code entry sym, and
9349 use the func descriptor sym instead if it is
9350 defined. */
9351 if (hash->elf.root.root.string[0] == '.'
9352 && (fdh = get_fdh (hash, htab)) != NULL)
9354 if (fdh->elf.root.type == bfd_link_hash_defined
9355 || fdh->elf.root.type == bfd_link_hash_defweak)
9357 sym_sec = fdh->elf.root.u.def.section;
9358 sym_value = fdh->elf.root.u.def.value;
9359 if (sym_sec->output_section != NULL)
9360 ok_dest = TRUE;
9362 else
9363 fdh = NULL;
9366 else
9368 bfd_set_error (bfd_error_bad_value);
9369 goto error_ret_free_internal;
9372 destination = 0;
9373 if (ok_dest)
9375 sym_value += irela->r_addend;
9376 destination = (sym_value
9377 + sym_sec->output_offset
9378 + sym_sec->output_section->vma);
9381 code_sec = sym_sec;
9382 opd_adjust = get_opd_info (sym_sec);
9383 if (opd_adjust != NULL)
9385 bfd_vma dest;
9387 if (hash == NULL)
9389 long adjust = opd_adjust[sym_value / 8];
9390 if (adjust == -1)
9391 continue;
9392 sym_value += adjust;
9394 dest = opd_entry_value (sym_sec, sym_value,
9395 &code_sec, &sym_value);
9396 if (dest != (bfd_vma) -1)
9398 destination = dest;
9399 if (fdh != NULL)
9401 /* Fixup old ABI sym to point at code
9402 entry. */
9403 hash->elf.root.type = bfd_link_hash_defweak;
9404 hash->elf.root.u.def.section = code_sec;
9405 hash->elf.root.u.def.value = sym_value;
9410 /* Determine what (if any) linker stub is needed. */
9411 stub_type = ppc_type_of_stub (section, irela, &hash,
9412 destination);
9414 if (stub_type != ppc_stub_plt_call)
9416 /* Check whether we need a TOC adjusting stub.
9417 Since the linker pastes together pieces from
9418 different object files when creating the
9419 _init and _fini functions, it may be that a
9420 call to what looks like a local sym is in
9421 fact a call needing a TOC adjustment. */
9422 if (code_sec != NULL
9423 && code_sec->output_section != NULL
9424 && (htab->stub_group[code_sec->id].toc_off
9425 != htab->stub_group[section->id].toc_off)
9426 && (code_sec->has_toc_reloc
9427 || code_sec->makes_toc_func_call))
9428 stub_type = ppc_stub_long_branch_r2off;
9431 if (stub_type == ppc_stub_none)
9432 continue;
9434 /* __tls_get_addr calls might be eliminated. */
9435 if (stub_type != ppc_stub_plt_call
9436 && hash != NULL
9437 && (hash == htab->tls_get_addr
9438 || hash == htab->tls_get_addr_fd)
9439 && section->has_tls_reloc
9440 && irela != internal_relocs)
9442 /* Get tls info. */
9443 char *tls_mask;
9445 if (!get_tls_mask (&tls_mask, NULL, &local_syms,
9446 irela - 1, input_bfd))
9447 goto error_ret_free_internal;
9448 if (*tls_mask != 0)
9449 continue;
9452 /* Support for grouping stub sections. */
9453 id_sec = htab->stub_group[section->id].link_sec;
9455 /* Get the name of this stub. */
9456 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
9457 if (!stub_name)
9458 goto error_ret_free_internal;
9460 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
9461 stub_name, FALSE, FALSE);
9462 if (stub_entry != NULL)
9464 /* The proper stub has already been created. */
9465 free (stub_name);
9466 continue;
9469 stub_entry = ppc_add_stub (stub_name, section, htab);
9470 if (stub_entry == NULL)
9472 free (stub_name);
9473 error_ret_free_internal:
9474 if (elf_section_data (section)->relocs == NULL)
9475 free (internal_relocs);
9476 error_ret_free_local:
9477 if (local_syms != NULL
9478 && (symtab_hdr->contents
9479 != (unsigned char *) local_syms))
9480 free (local_syms);
9481 return FALSE;
9484 stub_entry->stub_type = stub_type;
9485 stub_entry->target_value = sym_value;
9486 stub_entry->target_section = code_sec;
9487 stub_entry->h = hash;
9488 stub_entry->addend = irela->r_addend;
9490 if (stub_entry->h != NULL)
9491 htab->stub_globals += 1;
9494 /* We're done with the internal relocs, free them. */
9495 if (elf_section_data (section)->relocs != internal_relocs)
9496 free (internal_relocs);
9499 if (local_syms != NULL
9500 && symtab_hdr->contents != (unsigned char *) local_syms)
9502 if (!info->keep_memory)
9503 free (local_syms);
9504 else
9505 symtab_hdr->contents = (unsigned char *) local_syms;
9509 /* We may have added some stubs. Find out the new size of the
9510 stub sections. */
9511 for (stub_sec = htab->stub_bfd->sections;
9512 stub_sec != NULL;
9513 stub_sec = stub_sec->next)
9514 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
9516 stub_sec->rawsize = stub_sec->size;
9517 stub_sec->size = 0;
9518 stub_sec->reloc_count = 0;
9519 stub_sec->flags &= ~SEC_RELOC;
9522 htab->brlt->size = 0;
9523 htab->brlt->reloc_count = 0;
9524 htab->brlt->flags &= ~SEC_RELOC;
9525 if (htab->relbrlt != NULL)
9526 htab->relbrlt->size = 0;
9528 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
9530 for (stub_sec = htab->stub_bfd->sections;
9531 stub_sec != NULL;
9532 stub_sec = stub_sec->next)
9533 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9534 && stub_sec->rawsize != stub_sec->size)
9535 break;
9537 /* Exit from this loop when no stubs have been added, and no stubs
9538 have changed size. */
9539 if (stub_sec == NULL)
9540 break;
9542 /* Ask the linker to do its stuff. */
9543 (*htab->layout_sections_again) ();
9546 /* It would be nice to strip htab->brlt from the output if the
9547 section is empty, but it's too late. If we strip sections here,
9548 the dynamic symbol table is corrupted since the section symbol
9549 for the stripped section isn't written. */
9551 return TRUE;
9554 /* Called after we have determined section placement. If sections
9555 move, we'll be called again. Provide a value for TOCstart. */
9557 bfd_vma
9558 ppc64_elf_toc (bfd *obfd)
9560 asection *s;
9561 bfd_vma TOCstart;
9563 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
9564 order. The TOC starts where the first of these sections starts. */
9565 s = bfd_get_section_by_name (obfd, ".got");
9566 if (s == NULL)
9567 s = bfd_get_section_by_name (obfd, ".toc");
9568 if (s == NULL)
9569 s = bfd_get_section_by_name (obfd, ".tocbss");
9570 if (s == NULL)
9571 s = bfd_get_section_by_name (obfd, ".plt");
9572 if (s == NULL)
9574 /* This may happen for
9575 o references to TOC base (SYM@toc / TOC[tc0]) without a
9576 .toc directive
9577 o bad linker script
9578 o --gc-sections and empty TOC sections
9580 FIXME: Warn user? */
9582 /* Look for a likely section. We probably won't even be
9583 using TOCstart. */
9584 for (s = obfd->sections; s != NULL; s = s->next)
9585 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
9586 == (SEC_ALLOC | SEC_SMALL_DATA))
9587 break;
9588 if (s == NULL)
9589 for (s = obfd->sections; s != NULL; s = s->next)
9590 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
9591 == (SEC_ALLOC | SEC_SMALL_DATA))
9592 break;
9593 if (s == NULL)
9594 for (s = obfd->sections; s != NULL; s = s->next)
9595 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
9596 break;
9597 if (s == NULL)
9598 for (s = obfd->sections; s != NULL; s = s->next)
9599 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
9600 break;
9603 TOCstart = 0;
9604 if (s != NULL)
9605 TOCstart = s->output_section->vma + s->output_offset;
9607 return TOCstart;
9610 /* Build all the stubs associated with the current output file.
9611 The stubs are kept in a hash table attached to the main linker
9612 hash table. This function is called via gldelf64ppc_finish. */
9614 bfd_boolean
9615 ppc64_elf_build_stubs (bfd_boolean emit_stub_syms,
9616 struct bfd_link_info *info,
9617 char **stats)
9619 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9620 asection *stub_sec;
9621 bfd_byte *p;
9622 int stub_sec_count = 0;
9624 htab->emit_stub_syms = emit_stub_syms;
9626 /* Allocate memory to hold the linker stubs. */
9627 for (stub_sec = htab->stub_bfd->sections;
9628 stub_sec != NULL;
9629 stub_sec = stub_sec->next)
9630 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9631 && stub_sec->size != 0)
9633 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
9634 if (stub_sec->contents == NULL)
9635 return FALSE;
9636 /* We want to check that built size is the same as calculated
9637 size. rawsize is a convenient location to use. */
9638 stub_sec->rawsize = stub_sec->size;
9639 stub_sec->size = 0;
9642 if (htab->glink != NULL && htab->glink->size != 0)
9644 unsigned int indx;
9645 bfd_vma plt0;
9647 /* Build the .glink plt call stub. */
9648 if (htab->emit_stub_syms)
9650 struct elf_link_hash_entry *h;
9651 h = elf_link_hash_lookup (&htab->elf, "__glink", TRUE, FALSE, FALSE);
9652 if (h == NULL)
9653 return FALSE;
9654 if (h->root.type == bfd_link_hash_new)
9656 h->root.type = bfd_link_hash_defined;
9657 h->root.u.def.section = htab->glink;
9658 h->root.u.def.value = 8;
9659 h->ref_regular = 1;
9660 h->def_regular = 1;
9661 h->ref_regular_nonweak = 1;
9662 h->forced_local = 1;
9663 h->non_elf = 0;
9666 p = htab->glink->contents;
9667 plt0 = (htab->plt->output_section->vma
9668 + htab->plt->output_offset
9669 - (htab->glink->output_section->vma
9670 + htab->glink->output_offset
9671 + 16));
9672 bfd_put_64 (htab->glink->owner, plt0, p);
9673 p += 8;
9674 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
9675 p += 4;
9676 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
9677 p += 4;
9678 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
9679 p += 4;
9680 bfd_put_32 (htab->glink->owner, LD_R2_M16R11, p);
9681 p += 4;
9682 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
9683 p += 4;
9684 bfd_put_32 (htab->glink->owner, ADD_R12_R2_R11, p);
9685 p += 4;
9686 bfd_put_32 (htab->glink->owner, LD_R11_0R12, p);
9687 p += 4;
9688 bfd_put_32 (htab->glink->owner, LD_R2_0R12 | 8, p);
9689 p += 4;
9690 bfd_put_32 (htab->glink->owner, MTCTR_R11, p);
9691 p += 4;
9692 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | 16, p);
9693 p += 4;
9694 bfd_put_32 (htab->glink->owner, BCTR, p);
9695 p += 4;
9696 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
9698 bfd_put_32 (htab->glink->owner, NOP, p);
9699 p += 4;
9702 /* Build the .glink lazy link call stubs. */
9703 indx = 0;
9704 while (p < htab->glink->contents + htab->glink->size)
9706 if (indx < 0x8000)
9708 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
9709 p += 4;
9711 else
9713 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
9714 p += 4;
9715 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
9716 p += 4;
9718 bfd_put_32 (htab->glink->owner,
9719 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
9720 indx++;
9721 p += 4;
9723 htab->glink->rawsize = p - htab->glink->contents;
9726 if (htab->brlt->size != 0)
9728 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
9729 htab->brlt->size);
9730 if (htab->brlt->contents == NULL)
9731 return FALSE;
9733 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
9735 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
9736 htab->relbrlt->size);
9737 if (htab->relbrlt->contents == NULL)
9738 return FALSE;
9741 /* Build the stubs as directed by the stub hash table. */
9742 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
9744 if (htab->relbrlt != NULL)
9745 htab->relbrlt->reloc_count = 0;
9747 for (stub_sec = htab->stub_bfd->sections;
9748 stub_sec != NULL;
9749 stub_sec = stub_sec->next)
9750 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
9752 stub_sec_count += 1;
9753 if (stub_sec->rawsize != stub_sec->size)
9754 break;
9757 if (stub_sec != NULL
9758 || htab->glink->rawsize != htab->glink->size)
9760 htab->stub_error = TRUE;
9761 (*_bfd_error_handler) (_("stubs don't match calculated size"));
9764 if (htab->stub_error)
9765 return FALSE;
9767 if (stats != NULL)
9769 *stats = bfd_malloc (500);
9770 if (*stats == NULL)
9771 return FALSE;
9773 sprintf (*stats, _("linker stubs in %u group%s\n"
9774 " branch %lu\n"
9775 " toc adjust %lu\n"
9776 " long branch %lu\n"
9777 " long toc adj %lu\n"
9778 " plt call %lu"),
9779 stub_sec_count,
9780 stub_sec_count == 1 ? "" : "s",
9781 htab->stub_count[ppc_stub_long_branch - 1],
9782 htab->stub_count[ppc_stub_long_branch_r2off - 1],
9783 htab->stub_count[ppc_stub_plt_branch - 1],
9784 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
9785 htab->stub_count[ppc_stub_plt_call - 1]);
9787 return TRUE;
9790 /* This function undoes the changes made by add_symbol_adjust. */
9792 static bfd_boolean
9793 undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
9795 struct ppc_link_hash_entry *eh;
9797 if (h->root.type == bfd_link_hash_indirect)
9798 return TRUE;
9800 if (h->root.type == bfd_link_hash_warning)
9801 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9803 eh = (struct ppc_link_hash_entry *) h;
9804 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
9805 return TRUE;
9807 eh->elf.root.type = bfd_link_hash_undefined;
9808 return TRUE;
9811 void
9812 ppc64_elf_restore_symbols (struct bfd_link_info *info)
9814 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9815 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
9818 /* What to do when ld finds relocations against symbols defined in
9819 discarded sections. */
9821 static unsigned int
9822 ppc64_elf_action_discarded (asection *sec)
9824 if (strcmp (".opd", sec->name) == 0)
9825 return 0;
9827 if (strcmp (".toc", sec->name) == 0)
9828 return 0;
9830 if (strcmp (".toc1", sec->name) == 0)
9831 return 0;
9833 return _bfd_elf_default_action_discarded (sec);
9836 /* The RELOCATE_SECTION function is called by the ELF backend linker
9837 to handle the relocations for a section.
9839 The relocs are always passed as Rela structures; if the section
9840 actually uses Rel structures, the r_addend field will always be
9841 zero.
9843 This function is responsible for adjust the section contents as
9844 necessary, and (if using Rela relocs and generating a
9845 relocatable output file) adjusting the reloc addend as
9846 necessary.
9848 This function does not have to worry about setting the reloc
9849 address or the reloc symbol index.
9851 LOCAL_SYMS is a pointer to the swapped in local symbols.
9853 LOCAL_SECTIONS is an array giving the section in the input file
9854 corresponding to the st_shndx field of each local symbol.
9856 The global hash table entry for the global symbols can be found
9857 via elf_sym_hashes (input_bfd).
9859 When generating relocatable output, this function must handle
9860 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
9861 going to be the section symbol corresponding to the output
9862 section, which means that the addend must be adjusted
9863 accordingly. */
9865 static bfd_boolean
9866 ppc64_elf_relocate_section (bfd *output_bfd,
9867 struct bfd_link_info *info,
9868 bfd *input_bfd,
9869 asection *input_section,
9870 bfd_byte *contents,
9871 Elf_Internal_Rela *relocs,
9872 Elf_Internal_Sym *local_syms,
9873 asection **local_sections)
9875 struct ppc_link_hash_table *htab;
9876 Elf_Internal_Shdr *symtab_hdr;
9877 struct elf_link_hash_entry **sym_hashes;
9878 Elf_Internal_Rela *rel;
9879 Elf_Internal_Rela *relend;
9880 Elf_Internal_Rela outrel;
9881 bfd_byte *loc;
9882 struct got_entry **local_got_ents;
9883 bfd_vma TOCstart;
9884 bfd_boolean ret = TRUE;
9885 bfd_boolean is_opd;
9886 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
9887 bfd_boolean is_power4 = FALSE;
9888 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
9890 /* Initialize howto table if needed. */
9891 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9892 ppc_howto_init ();
9894 htab = ppc_hash_table (info);
9896 /* Don't relocate stub sections. */
9897 if (input_section->owner == htab->stub_bfd)
9898 return TRUE;
9900 local_got_ents = elf_local_got_ents (input_bfd);
9901 TOCstart = elf_gp (output_bfd);
9902 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9903 sym_hashes = elf_sym_hashes (input_bfd);
9904 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
9906 rel = relocs;
9907 relend = relocs + input_section->reloc_count;
9908 for (; rel < relend; rel++)
9910 enum elf_ppc64_reloc_type r_type;
9911 bfd_vma addend, orig_addend;
9912 bfd_reloc_status_type r;
9913 Elf_Internal_Sym *sym;
9914 asection *sec;
9915 struct elf_link_hash_entry *h_elf;
9916 struct ppc_link_hash_entry *h;
9917 struct ppc_link_hash_entry *fdh;
9918 const char *sym_name;
9919 unsigned long r_symndx, toc_symndx;
9920 char tls_mask, tls_gd, tls_type;
9921 char sym_type;
9922 bfd_vma relocation;
9923 bfd_boolean unresolved_reloc;
9924 bfd_boolean warned;
9925 unsigned long insn, mask;
9926 struct ppc_stub_hash_entry *stub_entry;
9927 bfd_vma max_br_offset;
9928 bfd_vma from;
9930 r_type = ELF64_R_TYPE (rel->r_info);
9931 r_symndx = ELF64_R_SYM (rel->r_info);
9933 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
9934 symbol of the previous ADDR64 reloc. The symbol gives us the
9935 proper TOC base to use. */
9936 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
9937 && rel != relocs
9938 && ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_ADDR64
9939 && is_opd)
9940 r_symndx = ELF64_R_SYM (rel[-1].r_info);
9942 sym = NULL;
9943 sec = NULL;
9944 h_elf = NULL;
9945 sym_name = NULL;
9946 unresolved_reloc = FALSE;
9947 warned = FALSE;
9948 orig_addend = rel->r_addend;
9950 if (r_symndx < symtab_hdr->sh_info)
9952 /* It's a local symbol. */
9953 long *opd_adjust;
9955 sym = local_syms + r_symndx;
9956 sec = local_sections[r_symndx];
9957 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
9958 sym_type = ELF64_ST_TYPE (sym->st_info);
9959 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
9960 opd_adjust = get_opd_info (sec);
9961 if (opd_adjust != NULL)
9963 long adjust = opd_adjust[(sym->st_value + rel->r_addend) / 8];
9964 if (adjust == -1)
9965 relocation = 0;
9966 else
9968 /* If this is a relocation against the opd section sym
9969 and we have edited .opd, adjust the reloc addend so
9970 that ld -r and ld --emit-relocs output is correct.
9971 If it is a reloc against some other .opd symbol,
9972 then the symbol value will be adjusted later. */
9973 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
9974 rel->r_addend += adjust;
9975 else
9976 relocation += adjust;
9980 else
9982 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
9983 r_symndx, symtab_hdr, sym_hashes,
9984 h_elf, sec, relocation,
9985 unresolved_reloc, warned);
9986 sym_name = h_elf->root.root.string;
9987 sym_type = h_elf->type;
9989 h = (struct ppc_link_hash_entry *) h_elf;
9991 if (sec != NULL && elf_discarded_section (sec))
9993 /* For relocs against symbols from removed linkonce sections,
9994 or sections discarded by a linker script, we just want the
9995 section contents zeroed. Avoid any special processing. */
9996 _bfd_clear_contents (ppc64_elf_howto_table[r_type], input_bfd,
9997 contents + rel->r_offset);
9998 rel->r_info = 0;
9999 rel->r_addend = 0;
10000 continue;
10003 if (info->relocatable)
10004 continue;
10006 /* TLS optimizations. Replace instruction sequences and relocs
10007 based on information we collected in tls_optimize. We edit
10008 RELOCS so that --emit-relocs will output something sensible
10009 for the final instruction stream. */
10010 tls_mask = 0;
10011 tls_gd = 0;
10012 toc_symndx = 0;
10013 if (IS_PPC64_TLS_RELOC (r_type))
10015 if (h != NULL)
10016 tls_mask = h->tls_mask;
10017 else if (local_got_ents != NULL)
10019 char *lgot_masks;
10020 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
10021 tls_mask = lgot_masks[r_symndx];
10023 if (tls_mask == 0 && r_type == R_PPC64_TLS)
10025 /* Check for toc tls entries. */
10026 char *toc_tls;
10028 if (!get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
10029 rel, input_bfd))
10030 return FALSE;
10032 if (toc_tls)
10033 tls_mask = *toc_tls;
10037 /* Check that tls relocs are used with tls syms, and non-tls
10038 relocs are used with non-tls syms. */
10039 if (r_symndx != 0
10040 && r_type != R_PPC64_NONE
10041 && (h == NULL
10042 || h->elf.root.type == bfd_link_hash_defined
10043 || h->elf.root.type == bfd_link_hash_defweak)
10044 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
10046 if (r_type == R_PPC64_TLS && tls_mask != 0)
10047 /* R_PPC64_TLS is OK against a symbol in the TOC. */
10049 else
10050 (*_bfd_error_handler)
10051 (sym_type == STT_TLS
10052 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
10053 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s"),
10054 input_bfd,
10055 input_section,
10056 (long) rel->r_offset,
10057 ppc64_elf_howto_table[r_type]->name,
10058 sym_name);
10061 /* Ensure reloc mapping code below stays sane. */
10062 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
10063 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
10064 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
10065 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
10066 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
10067 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
10068 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
10069 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
10070 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
10071 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
10072 abort ();
10074 switch (r_type)
10076 default:
10077 break;
10079 case R_PPC64_TOC16:
10080 case R_PPC64_TOC16_LO:
10081 case R_PPC64_TOC16_DS:
10082 case R_PPC64_TOC16_LO_DS:
10084 /* Check for toc tls entries. */
10085 char *toc_tls;
10086 int retval;
10088 retval = get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
10089 rel, input_bfd);
10090 if (retval == 0)
10091 return FALSE;
10093 if (toc_tls)
10095 tls_mask = *toc_tls;
10096 if (r_type == R_PPC64_TOC16_DS
10097 || r_type == R_PPC64_TOC16_LO_DS)
10099 if (tls_mask != 0
10100 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
10101 goto toctprel;
10103 else
10105 /* If we found a GD reloc pair, then we might be
10106 doing a GD->IE transition. */
10107 if (retval == 2)
10109 tls_gd = TLS_TPRELGD;
10110 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10111 goto tls_get_addr_check;
10113 else if (retval == 3)
10115 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10116 goto tls_get_addr_check;
10121 break;
10123 case R_PPC64_GOT_TPREL16_DS:
10124 case R_PPC64_GOT_TPREL16_LO_DS:
10125 if (tls_mask != 0
10126 && (tls_mask & TLS_TPREL) == 0)
10128 toctprel:
10129 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
10130 insn &= 31 << 21;
10131 insn |= 0x3c0d0000; /* addis 0,13,0 */
10132 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
10133 r_type = R_PPC64_TPREL16_HA;
10134 if (toc_symndx != 0)
10136 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
10137 /* We changed the symbol. Start over in order to
10138 get h, sym, sec etc. right. */
10139 rel--;
10140 continue;
10142 else
10143 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10145 break;
10147 case R_PPC64_TLS:
10148 if (tls_mask != 0
10149 && (tls_mask & TLS_TPREL) == 0)
10151 bfd_vma rtra;
10152 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
10153 if ((insn & ((0x3f << 26) | (31 << 11)))
10154 == ((31 << 26) | (13 << 11)))
10155 rtra = insn & ((1 << 26) - (1 << 16));
10156 else if ((insn & ((0x3f << 26) | (31 << 16)))
10157 == ((31 << 26) | (13 << 16)))
10158 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
10159 else
10160 abort ();
10161 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
10162 /* add -> addi. */
10163 insn = 14 << 26;
10164 else if ((insn & (31 << 1)) == 23 << 1
10165 && ((insn & (31 << 6)) < 14 << 6
10166 || ((insn & (31 << 6)) >= 16 << 6
10167 && (insn & (31 << 6)) < 24 << 6)))
10168 /* load and store indexed -> dform. */
10169 insn = (32 | ((insn >> 6) & 31)) << 26;
10170 else if ((insn & (31 << 1)) == 21 << 1
10171 && (insn & (0x1a << 6)) == 0)
10172 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
10173 insn = (((58 | ((insn >> 6) & 4)) << 26)
10174 | ((insn >> 6) & 1));
10175 else if ((insn & (31 << 1)) == 21 << 1
10176 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
10177 /* lwax -> lwa. */
10178 insn = (58 << 26) | 2;
10179 else
10180 abort ();
10181 insn |= rtra;
10182 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
10183 /* Was PPC64_TLS which sits on insn boundary, now
10184 PPC64_TPREL16_LO which is at low-order half-word. */
10185 rel->r_offset += d_offset;
10186 r_type = R_PPC64_TPREL16_LO;
10187 if (toc_symndx != 0)
10189 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
10190 /* We changed the symbol. Start over in order to
10191 get h, sym, sec etc. right. */
10192 rel--;
10193 continue;
10195 else
10196 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10198 break;
10200 case R_PPC64_GOT_TLSGD16_HI:
10201 case R_PPC64_GOT_TLSGD16_HA:
10202 tls_gd = TLS_TPRELGD;
10203 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10204 goto tls_gdld_hi;
10205 break;
10207 case R_PPC64_GOT_TLSLD16_HI:
10208 case R_PPC64_GOT_TLSLD16_HA:
10209 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10211 tls_gdld_hi:
10212 if ((tls_mask & tls_gd) != 0)
10213 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
10214 + R_PPC64_GOT_TPREL16_DS);
10215 else
10217 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
10218 rel->r_offset -= d_offset;
10219 r_type = R_PPC64_NONE;
10221 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10223 break;
10225 case R_PPC64_GOT_TLSGD16:
10226 case R_PPC64_GOT_TLSGD16_LO:
10227 tls_gd = TLS_TPRELGD;
10228 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10229 goto tls_get_addr_check;
10230 break;
10232 case R_PPC64_GOT_TLSLD16:
10233 case R_PPC64_GOT_TLSLD16_LO:
10234 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10236 tls_get_addr_check:
10237 if (rel + 1 < relend)
10239 enum elf_ppc64_reloc_type r_type2;
10240 unsigned long r_symndx2;
10241 struct elf_link_hash_entry *h2;
10242 bfd_vma insn1, insn2, insn3;
10243 bfd_vma offset;
10245 /* The next instruction should be a call to
10246 __tls_get_addr. Peek at the reloc to be sure. */
10247 r_type2 = ELF64_R_TYPE (rel[1].r_info);
10248 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
10249 if (r_symndx2 < symtab_hdr->sh_info
10250 || (r_type2 != R_PPC64_REL14
10251 && r_type2 != R_PPC64_REL14_BRTAKEN
10252 && r_type2 != R_PPC64_REL14_BRNTAKEN
10253 && r_type2 != R_PPC64_REL24))
10254 break;
10256 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
10257 while (h2->root.type == bfd_link_hash_indirect
10258 || h2->root.type == bfd_link_hash_warning)
10259 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
10260 if (h2 == NULL || (h2 != &htab->tls_get_addr->elf
10261 && h2 != &htab->tls_get_addr_fd->elf))
10262 break;
10264 /* OK, it checks out. Replace the call. */
10265 offset = rel[1].r_offset;
10266 insn1 = bfd_get_32 (output_bfd,
10267 contents + rel->r_offset - d_offset);
10268 insn3 = bfd_get_32 (output_bfd,
10269 contents + offset + 4);
10270 if ((tls_mask & tls_gd) != 0)
10272 /* IE */
10273 insn1 &= (1 << 26) - (1 << 2);
10274 insn1 |= 58 << 26; /* ld */
10275 insn2 = 0x7c636a14; /* add 3,3,13 */
10276 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
10277 if ((tls_mask & TLS_EXPLICIT) == 0)
10278 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
10279 + R_PPC64_GOT_TPREL16_DS);
10280 else
10281 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
10282 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10284 else
10286 /* LE */
10287 insn1 = 0x3c6d0000; /* addis 3,13,0 */
10288 insn2 = 0x38630000; /* addi 3,3,0 */
10289 if (tls_gd == 0)
10291 /* Was an LD reloc. */
10292 r_symndx = 0;
10293 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
10294 rel[1].r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
10296 else if (toc_symndx != 0)
10297 r_symndx = toc_symndx;
10298 r_type = R_PPC64_TPREL16_HA;
10299 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10300 rel[1].r_info = ELF64_R_INFO (r_symndx,
10301 R_PPC64_TPREL16_LO);
10302 rel[1].r_offset += d_offset;
10304 if (insn3 == NOP
10305 || insn3 == CROR_151515 || insn3 == CROR_313131)
10307 insn3 = insn2;
10308 insn2 = NOP;
10309 rel[1].r_offset += 4;
10311 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - d_offset);
10312 bfd_put_32 (output_bfd, insn2, contents + offset);
10313 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
10314 if (tls_gd == 0 || toc_symndx != 0)
10316 /* We changed the symbol. Start over in order
10317 to get h, sym, sec etc. right. */
10318 rel--;
10319 continue;
10323 break;
10325 case R_PPC64_DTPMOD64:
10326 if (rel + 1 < relend
10327 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
10328 && rel[1].r_offset == rel->r_offset + 8)
10330 if ((tls_mask & TLS_GD) == 0)
10332 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
10333 if ((tls_mask & TLS_TPRELGD) != 0)
10334 r_type = R_PPC64_TPREL64;
10335 else
10337 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
10338 r_type = R_PPC64_NONE;
10340 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10343 else
10345 if ((tls_mask & TLS_LD) == 0)
10347 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
10348 r_type = R_PPC64_NONE;
10349 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10352 break;
10354 case R_PPC64_TPREL64:
10355 if ((tls_mask & TLS_TPREL) == 0)
10357 r_type = R_PPC64_NONE;
10358 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10360 break;
10363 /* Handle other relocations that tweak non-addend part of insn. */
10364 insn = 0;
10365 max_br_offset = 1 << 25;
10366 addend = rel->r_addend;
10367 switch (r_type)
10369 default:
10370 break;
10372 /* Branch taken prediction relocations. */
10373 case R_PPC64_ADDR14_BRTAKEN:
10374 case R_PPC64_REL14_BRTAKEN:
10375 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
10376 /* Fall thru. */
10378 /* Branch not taken prediction relocations. */
10379 case R_PPC64_ADDR14_BRNTAKEN:
10380 case R_PPC64_REL14_BRNTAKEN:
10381 insn |= bfd_get_32 (output_bfd,
10382 contents + rel->r_offset) & ~(0x01 << 21);
10383 /* Fall thru. */
10385 case R_PPC64_REL14:
10386 max_br_offset = 1 << 15;
10387 /* Fall thru. */
10389 case R_PPC64_REL24:
10390 /* Calls to functions with a different TOC, such as calls to
10391 shared objects, need to alter the TOC pointer. This is
10392 done using a linkage stub. A REL24 branching to these
10393 linkage stubs needs to be followed by a nop, as the nop
10394 will be replaced with an instruction to restore the TOC
10395 base pointer. */
10396 stub_entry = NULL;
10397 fdh = h;
10398 if (((h != NULL
10399 && (((fdh = h->oh) != NULL
10400 && fdh->elf.plt.plist != NULL)
10401 || (fdh = h)->elf.plt.plist != NULL))
10402 || (sec != NULL
10403 && sec->output_section != NULL
10404 && sec->id <= htab->top_id
10405 && (htab->stub_group[sec->id].toc_off
10406 != htab->stub_group[input_section->id].toc_off)))
10407 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
10408 rel, htab)) != NULL
10409 && (stub_entry->stub_type == ppc_stub_plt_call
10410 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
10411 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
10413 bfd_boolean can_plt_call = FALSE;
10415 if (rel->r_offset + 8 <= input_section->size)
10417 unsigned long nop;
10418 nop = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
10419 if (nop == NOP
10420 || nop == CROR_151515 || nop == CROR_313131)
10422 bfd_put_32 (input_bfd, LD_R2_40R1,
10423 contents + rel->r_offset + 4);
10424 can_plt_call = TRUE;
10428 if (!can_plt_call)
10430 if (stub_entry->stub_type == ppc_stub_plt_call)
10432 /* If this is a plain branch rather than a branch
10433 and link, don't require a nop. However, don't
10434 allow tail calls in a shared library as they
10435 will result in r2 being corrupted. */
10436 unsigned long br;
10437 br = bfd_get_32 (input_bfd, contents + rel->r_offset);
10438 if (info->executable && (br & 1) == 0)
10439 can_plt_call = TRUE;
10440 else
10441 stub_entry = NULL;
10443 else if (h != NULL
10444 && strcmp (h->elf.root.root.string,
10445 ".__libc_start_main") == 0)
10447 /* Allow crt1 branch to go via a toc adjusting stub. */
10448 can_plt_call = TRUE;
10450 else
10452 if (strcmp (input_section->output_section->name,
10453 ".init") == 0
10454 || strcmp (input_section->output_section->name,
10455 ".fini") == 0)
10456 (*_bfd_error_handler)
10457 (_("%B(%A+0x%lx): automatic multiple TOCs "
10458 "not supported using your crt files; "
10459 "recompile with -mminimal-toc or upgrade gcc"),
10460 input_bfd,
10461 input_section,
10462 (long) rel->r_offset);
10463 else
10464 (*_bfd_error_handler)
10465 (_("%B(%A+0x%lx): sibling call optimization to `%s' "
10466 "does not allow automatic multiple TOCs; "
10467 "recompile with -mminimal-toc or "
10468 "-fno-optimize-sibling-calls, "
10469 "or make `%s' extern"),
10470 input_bfd,
10471 input_section,
10472 (long) rel->r_offset,
10473 sym_name,
10474 sym_name);
10475 bfd_set_error (bfd_error_bad_value);
10476 ret = FALSE;
10480 if (can_plt_call
10481 && stub_entry->stub_type == ppc_stub_plt_call)
10482 unresolved_reloc = FALSE;
10485 if (stub_entry == NULL
10486 && get_opd_info (sec) != NULL)
10488 /* The branch destination is the value of the opd entry. */
10489 bfd_vma off = (relocation + addend
10490 - sec->output_section->vma
10491 - sec->output_offset);
10492 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL);
10493 if (dest != (bfd_vma) -1)
10495 relocation = dest;
10496 addend = 0;
10500 /* If the branch is out of reach we ought to have a long
10501 branch stub. */
10502 from = (rel->r_offset
10503 + input_section->output_offset
10504 + input_section->output_section->vma);
10506 if (stub_entry == NULL
10507 && (relocation + addend - from + max_br_offset
10508 >= 2 * max_br_offset)
10509 && r_type != R_PPC64_ADDR14_BRTAKEN
10510 && r_type != R_PPC64_ADDR14_BRNTAKEN)
10511 stub_entry = ppc_get_stub_entry (input_section, sec, h, rel,
10512 htab);
10514 if (stub_entry != NULL)
10516 /* Munge up the value and addend so that we call the stub
10517 rather than the procedure directly. */
10518 relocation = (stub_entry->stub_offset
10519 + stub_entry->stub_sec->output_offset
10520 + stub_entry->stub_sec->output_section->vma);
10521 addend = 0;
10524 if (insn != 0)
10526 if (is_power4)
10528 /* Set 'a' bit. This is 0b00010 in BO field for branch
10529 on CR(BI) insns (BO == 001at or 011at), and 0b01000
10530 for branch on CTR insns (BO == 1a00t or 1a01t). */
10531 if ((insn & (0x14 << 21)) == (0x04 << 21))
10532 insn |= 0x02 << 21;
10533 else if ((insn & (0x14 << 21)) == (0x10 << 21))
10534 insn |= 0x08 << 21;
10535 else
10536 break;
10538 else
10540 /* Invert 'y' bit if not the default. */
10541 if ((bfd_signed_vma) (relocation + addend - from) < 0)
10542 insn ^= 0x01 << 21;
10545 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
10548 /* NOP out calls to undefined weak functions.
10549 We can thus call a weak function without first
10550 checking whether the function is defined. */
10551 else if (h != NULL
10552 && h->elf.root.type == bfd_link_hash_undefweak
10553 && r_type == R_PPC64_REL24
10554 && relocation == 0
10555 && addend == 0)
10557 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
10558 continue;
10560 break;
10563 /* Set `addend'. */
10564 tls_type = 0;
10565 switch (r_type)
10567 default:
10568 (*_bfd_error_handler)
10569 (_("%B: unknown relocation type %d for symbol %s"),
10570 input_bfd, (int) r_type, sym_name);
10572 bfd_set_error (bfd_error_bad_value);
10573 ret = FALSE;
10574 continue;
10576 case R_PPC64_NONE:
10577 case R_PPC64_TLS:
10578 case R_PPC64_GNU_VTINHERIT:
10579 case R_PPC64_GNU_VTENTRY:
10580 continue;
10582 /* GOT16 relocations. Like an ADDR16 using the symbol's
10583 address in the GOT as relocation value instead of the
10584 symbol's value itself. Also, create a GOT entry for the
10585 symbol and put the symbol value there. */
10586 case R_PPC64_GOT_TLSGD16:
10587 case R_PPC64_GOT_TLSGD16_LO:
10588 case R_PPC64_GOT_TLSGD16_HI:
10589 case R_PPC64_GOT_TLSGD16_HA:
10590 tls_type = TLS_TLS | TLS_GD;
10591 goto dogot;
10593 case R_PPC64_GOT_TLSLD16:
10594 case R_PPC64_GOT_TLSLD16_LO:
10595 case R_PPC64_GOT_TLSLD16_HI:
10596 case R_PPC64_GOT_TLSLD16_HA:
10597 tls_type = TLS_TLS | TLS_LD;
10598 goto dogot;
10600 case R_PPC64_GOT_TPREL16_DS:
10601 case R_PPC64_GOT_TPREL16_LO_DS:
10602 case R_PPC64_GOT_TPREL16_HI:
10603 case R_PPC64_GOT_TPREL16_HA:
10604 tls_type = TLS_TLS | TLS_TPREL;
10605 goto dogot;
10607 case R_PPC64_GOT_DTPREL16_DS:
10608 case R_PPC64_GOT_DTPREL16_LO_DS:
10609 case R_PPC64_GOT_DTPREL16_HI:
10610 case R_PPC64_GOT_DTPREL16_HA:
10611 tls_type = TLS_TLS | TLS_DTPREL;
10612 goto dogot;
10614 case R_PPC64_GOT16:
10615 case R_PPC64_GOT16_LO:
10616 case R_PPC64_GOT16_HI:
10617 case R_PPC64_GOT16_HA:
10618 case R_PPC64_GOT16_DS:
10619 case R_PPC64_GOT16_LO_DS:
10620 dogot:
10622 /* Relocation is to the entry for this symbol in the global
10623 offset table. */
10624 asection *got;
10625 bfd_vma *offp;
10626 bfd_vma off;
10627 unsigned long indx = 0;
10629 if (tls_type == (TLS_TLS | TLS_LD)
10630 && (h == NULL
10631 || !h->elf.def_dynamic))
10632 offp = &ppc64_tlsld_got (input_bfd)->offset;
10633 else
10635 struct got_entry *ent;
10637 if (h != NULL)
10639 bfd_boolean dyn = htab->elf.dynamic_sections_created;
10640 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared,
10641 &h->elf)
10642 || (info->shared
10643 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
10644 /* This is actually a static link, or it is a
10645 -Bsymbolic link and the symbol is defined
10646 locally, or the symbol was forced to be local
10647 because of a version file. */
10649 else
10651 indx = h->elf.dynindx;
10652 unresolved_reloc = FALSE;
10654 ent = h->elf.got.glist;
10656 else
10658 if (local_got_ents == NULL)
10659 abort ();
10660 ent = local_got_ents[r_symndx];
10663 for (; ent != NULL; ent = ent->next)
10664 if (ent->addend == orig_addend
10665 && ent->owner == input_bfd
10666 && ent->tls_type == tls_type)
10667 break;
10668 if (ent == NULL)
10669 abort ();
10670 offp = &ent->got.offset;
10673 got = ppc64_elf_tdata (input_bfd)->got;
10674 if (got == NULL)
10675 abort ();
10677 /* The offset must always be a multiple of 8. We use the
10678 least significant bit to record whether we have already
10679 processed this entry. */
10680 off = *offp;
10681 if ((off & 1) != 0)
10682 off &= ~1;
10683 else
10685 /* Generate relocs for the dynamic linker, except in
10686 the case of TLSLD where we'll use one entry per
10687 module. */
10688 asection *relgot = ppc64_elf_tdata (input_bfd)->relgot;
10690 *offp = off | 1;
10691 if ((info->shared || indx != 0)
10692 && (h == NULL
10693 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10694 || h->elf.root.type != bfd_link_hash_undefweak))
10696 outrel.r_offset = (got->output_section->vma
10697 + got->output_offset
10698 + off);
10699 outrel.r_addend = addend;
10700 if (tls_type & (TLS_LD | TLS_GD))
10702 outrel.r_addend = 0;
10703 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
10704 if (tls_type == (TLS_TLS | TLS_GD))
10706 loc = relgot->contents;
10707 loc += (relgot->reloc_count++
10708 * sizeof (Elf64_External_Rela));
10709 bfd_elf64_swap_reloca_out (output_bfd,
10710 &outrel, loc);
10711 outrel.r_offset += 8;
10712 outrel.r_addend = addend;
10713 outrel.r_info
10714 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
10717 else if (tls_type == (TLS_TLS | TLS_DTPREL))
10718 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
10719 else if (tls_type == (TLS_TLS | TLS_TPREL))
10720 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
10721 else if (indx == 0)
10723 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
10725 /* Write the .got section contents for the sake
10726 of prelink. */
10727 loc = got->contents + off;
10728 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
10729 loc);
10731 else
10732 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
10734 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
10736 outrel.r_addend += relocation;
10737 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
10738 outrel.r_addend -= htab->elf.tls_sec->vma;
10740 loc = relgot->contents;
10741 loc += (relgot->reloc_count++
10742 * sizeof (Elf64_External_Rela));
10743 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
10746 /* Init the .got section contents here if we're not
10747 emitting a reloc. */
10748 else
10750 relocation += addend;
10751 if (tls_type == (TLS_TLS | TLS_LD))
10752 relocation = 1;
10753 else if (tls_type != 0)
10755 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
10756 if (tls_type == (TLS_TLS | TLS_TPREL))
10757 relocation += DTP_OFFSET - TP_OFFSET;
10759 if (tls_type == (TLS_TLS | TLS_GD))
10761 bfd_put_64 (output_bfd, relocation,
10762 got->contents + off + 8);
10763 relocation = 1;
10767 bfd_put_64 (output_bfd, relocation,
10768 got->contents + off);
10772 if (off >= (bfd_vma) -2)
10773 abort ();
10775 relocation = got->output_offset + off;
10777 /* TOC base (r2) is TOC start plus 0x8000. */
10778 addend = -TOC_BASE_OFF;
10780 break;
10782 case R_PPC64_PLT16_HA:
10783 case R_PPC64_PLT16_HI:
10784 case R_PPC64_PLT16_LO:
10785 case R_PPC64_PLT32:
10786 case R_PPC64_PLT64:
10787 /* Relocation is to the entry for this symbol in the
10788 procedure linkage table. */
10790 /* Resolve a PLT reloc against a local symbol directly,
10791 without using the procedure linkage table. */
10792 if (h == NULL)
10793 break;
10795 /* It's possible that we didn't make a PLT entry for this
10796 symbol. This happens when statically linking PIC code,
10797 or when using -Bsymbolic. Go find a match if there is a
10798 PLT entry. */
10799 if (htab->plt != NULL)
10801 struct plt_entry *ent;
10802 for (ent = h->elf.plt.plist; ent != NULL; ent = ent->next)
10803 if (ent->addend == orig_addend
10804 && ent->plt.offset != (bfd_vma) -1)
10806 relocation = (htab->plt->output_section->vma
10807 + htab->plt->output_offset
10808 + ent->plt.offset);
10809 unresolved_reloc = FALSE;
10812 break;
10814 case R_PPC64_TOC:
10815 /* Relocation value is TOC base. */
10816 relocation = TOCstart;
10817 if (r_symndx == 0)
10818 relocation += htab->stub_group[input_section->id].toc_off;
10819 else if (unresolved_reloc)
10821 else if (sec != NULL && sec->id <= htab->top_id)
10822 relocation += htab->stub_group[sec->id].toc_off;
10823 else
10824 unresolved_reloc = TRUE;
10825 goto dodyn;
10827 /* TOC16 relocs. We want the offset relative to the TOC base,
10828 which is the address of the start of the TOC plus 0x8000.
10829 The TOC consists of sections .got, .toc, .tocbss, and .plt,
10830 in this order. */
10831 case R_PPC64_TOC16:
10832 case R_PPC64_TOC16_LO:
10833 case R_PPC64_TOC16_HI:
10834 case R_PPC64_TOC16_DS:
10835 case R_PPC64_TOC16_LO_DS:
10836 case R_PPC64_TOC16_HA:
10837 addend -= TOCstart + htab->stub_group[input_section->id].toc_off;
10838 break;
10840 /* Relocate against the beginning of the section. */
10841 case R_PPC64_SECTOFF:
10842 case R_PPC64_SECTOFF_LO:
10843 case R_PPC64_SECTOFF_HI:
10844 case R_PPC64_SECTOFF_DS:
10845 case R_PPC64_SECTOFF_LO_DS:
10846 case R_PPC64_SECTOFF_HA:
10847 if (sec != NULL)
10848 addend -= sec->output_section->vma;
10849 break;
10851 case R_PPC64_REL14:
10852 case R_PPC64_REL14_BRNTAKEN:
10853 case R_PPC64_REL14_BRTAKEN:
10854 case R_PPC64_REL24:
10855 break;
10857 case R_PPC64_TPREL16:
10858 case R_PPC64_TPREL16_LO:
10859 case R_PPC64_TPREL16_HI:
10860 case R_PPC64_TPREL16_HA:
10861 case R_PPC64_TPREL16_DS:
10862 case R_PPC64_TPREL16_LO_DS:
10863 case R_PPC64_TPREL16_HIGHER:
10864 case R_PPC64_TPREL16_HIGHERA:
10865 case R_PPC64_TPREL16_HIGHEST:
10866 case R_PPC64_TPREL16_HIGHESTA:
10867 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
10868 if (info->shared)
10869 /* The TPREL16 relocs shouldn't really be used in shared
10870 libs as they will result in DT_TEXTREL being set, but
10871 support them anyway. */
10872 goto dodyn;
10873 break;
10875 case R_PPC64_DTPREL16:
10876 case R_PPC64_DTPREL16_LO:
10877 case R_PPC64_DTPREL16_HI:
10878 case R_PPC64_DTPREL16_HA:
10879 case R_PPC64_DTPREL16_DS:
10880 case R_PPC64_DTPREL16_LO_DS:
10881 case R_PPC64_DTPREL16_HIGHER:
10882 case R_PPC64_DTPREL16_HIGHERA:
10883 case R_PPC64_DTPREL16_HIGHEST:
10884 case R_PPC64_DTPREL16_HIGHESTA:
10885 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
10886 break;
10888 case R_PPC64_DTPMOD64:
10889 relocation = 1;
10890 addend = 0;
10891 goto dodyn;
10893 case R_PPC64_TPREL64:
10894 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
10895 goto dodyn;
10897 case R_PPC64_DTPREL64:
10898 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
10899 /* Fall thru */
10901 /* Relocations that may need to be propagated if this is a
10902 dynamic object. */
10903 case R_PPC64_REL30:
10904 case R_PPC64_REL32:
10905 case R_PPC64_REL64:
10906 case R_PPC64_ADDR14:
10907 case R_PPC64_ADDR14_BRNTAKEN:
10908 case R_PPC64_ADDR14_BRTAKEN:
10909 case R_PPC64_ADDR16:
10910 case R_PPC64_ADDR16_DS:
10911 case R_PPC64_ADDR16_HA:
10912 case R_PPC64_ADDR16_HI:
10913 case R_PPC64_ADDR16_HIGHER:
10914 case R_PPC64_ADDR16_HIGHERA:
10915 case R_PPC64_ADDR16_HIGHEST:
10916 case R_PPC64_ADDR16_HIGHESTA:
10917 case R_PPC64_ADDR16_LO:
10918 case R_PPC64_ADDR16_LO_DS:
10919 case R_PPC64_ADDR24:
10920 case R_PPC64_ADDR32:
10921 case R_PPC64_ADDR64:
10922 case R_PPC64_UADDR16:
10923 case R_PPC64_UADDR32:
10924 case R_PPC64_UADDR64:
10925 dodyn:
10926 if ((input_section->flags & SEC_ALLOC) == 0)
10927 break;
10929 if (NO_OPD_RELOCS && is_opd)
10930 break;
10932 if ((info->shared
10933 && (h == NULL
10934 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10935 || h->elf.root.type != bfd_link_hash_undefweak)
10936 && (MUST_BE_DYN_RELOC (r_type)
10937 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
10938 || (ELIMINATE_COPY_RELOCS
10939 && !info->shared
10940 && h != NULL
10941 && h->elf.dynindx != -1
10942 && !h->elf.non_got_ref
10943 && h->elf.def_dynamic
10944 && !h->elf.def_regular))
10946 Elf_Internal_Rela outrel;
10947 bfd_boolean skip, relocate;
10948 asection *sreloc;
10949 bfd_byte *loc;
10950 bfd_vma out_off;
10952 /* When generating a dynamic object, these relocations
10953 are copied into the output file to be resolved at run
10954 time. */
10956 skip = FALSE;
10957 relocate = FALSE;
10959 out_off = _bfd_elf_section_offset (output_bfd, info,
10960 input_section, rel->r_offset);
10961 if (out_off == (bfd_vma) -1)
10962 skip = TRUE;
10963 else if (out_off == (bfd_vma) -2)
10964 skip = TRUE, relocate = TRUE;
10965 out_off += (input_section->output_section->vma
10966 + input_section->output_offset);
10967 outrel.r_offset = out_off;
10968 outrel.r_addend = rel->r_addend;
10970 /* Optimize unaligned reloc use. */
10971 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
10972 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
10973 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
10974 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
10975 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
10976 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
10977 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
10978 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
10979 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
10981 if (skip)
10982 memset (&outrel, 0, sizeof outrel);
10983 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
10984 && !is_opd
10985 && r_type != R_PPC64_TOC)
10986 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
10987 else
10989 /* This symbol is local, or marked to become local,
10990 or this is an opd section reloc which must point
10991 at a local function. */
10992 outrel.r_addend += relocation;
10993 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
10995 if (is_opd && h != NULL)
10997 /* Lie about opd entries. This case occurs
10998 when building shared libraries and we
10999 reference a function in another shared
11000 lib. The same thing happens for a weak
11001 definition in an application that's
11002 overridden by a strong definition in a
11003 shared lib. (I believe this is a generic
11004 bug in binutils handling of weak syms.)
11005 In these cases we won't use the opd
11006 entry in this lib. */
11007 unresolved_reloc = FALSE;
11009 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11011 /* We need to relocate .opd contents for ld.so.
11012 Prelink also wants simple and consistent rules
11013 for relocs. This make all RELATIVE relocs have
11014 *r_offset equal to r_addend. */
11015 relocate = TRUE;
11017 else
11019 long indx = 0;
11021 if (bfd_is_abs_section (sec))
11023 else if (sec == NULL || sec->owner == NULL)
11025 bfd_set_error (bfd_error_bad_value);
11026 return FALSE;
11028 else
11030 asection *osec;
11032 osec = sec->output_section;
11033 indx = elf_section_data (osec)->dynindx;
11035 if (indx == 0)
11037 if ((osec->flags & SEC_READONLY) == 0
11038 && htab->elf.data_index_section != NULL)
11039 osec = htab->elf.data_index_section;
11040 else
11041 osec = htab->elf.text_index_section;
11042 indx = elf_section_data (osec)->dynindx;
11044 BFD_ASSERT (indx != 0);
11046 /* We are turning this relocation into one
11047 against a section symbol, so subtract out
11048 the output section's address but not the
11049 offset of the input section in the output
11050 section. */
11051 outrel.r_addend -= osec->vma;
11054 outrel.r_info = ELF64_R_INFO (indx, r_type);
11058 sreloc = elf_section_data (input_section)->sreloc;
11059 if (sreloc == NULL)
11060 abort ();
11062 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
11063 >= sreloc->size)
11064 abort ();
11065 loc = sreloc->contents;
11066 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
11067 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
11069 /* If this reloc is against an external symbol, it will
11070 be computed at runtime, so there's no need to do
11071 anything now. However, for the sake of prelink ensure
11072 that the section contents are a known value. */
11073 if (! relocate)
11075 unresolved_reloc = FALSE;
11076 /* The value chosen here is quite arbitrary as ld.so
11077 ignores section contents except for the special
11078 case of .opd where the contents might be accessed
11079 before relocation. Choose zero, as that won't
11080 cause reloc overflow. */
11081 relocation = 0;
11082 addend = 0;
11083 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
11084 to improve backward compatibility with older
11085 versions of ld. */
11086 if (r_type == R_PPC64_ADDR64)
11087 addend = outrel.r_addend;
11088 /* Adjust pc_relative relocs to have zero in *r_offset. */
11089 else if (ppc64_elf_howto_table[r_type]->pc_relative)
11090 addend = (input_section->output_section->vma
11091 + input_section->output_offset
11092 + rel->r_offset);
11095 break;
11097 case R_PPC64_COPY:
11098 case R_PPC64_GLOB_DAT:
11099 case R_PPC64_JMP_SLOT:
11100 case R_PPC64_RELATIVE:
11101 /* We shouldn't ever see these dynamic relocs in relocatable
11102 files. */
11103 /* Fall through. */
11105 case R_PPC64_PLTGOT16:
11106 case R_PPC64_PLTGOT16_DS:
11107 case R_PPC64_PLTGOT16_HA:
11108 case R_PPC64_PLTGOT16_HI:
11109 case R_PPC64_PLTGOT16_LO:
11110 case R_PPC64_PLTGOT16_LO_DS:
11111 case R_PPC64_PLTREL32:
11112 case R_PPC64_PLTREL64:
11113 /* These ones haven't been implemented yet. */
11115 (*_bfd_error_handler)
11116 (_("%B: relocation %s is not supported for symbol %s."),
11117 input_bfd,
11118 ppc64_elf_howto_table[r_type]->name, sym_name);
11120 bfd_set_error (bfd_error_invalid_operation);
11121 ret = FALSE;
11122 continue;
11125 /* Do any further special processing. */
11126 switch (r_type)
11128 default:
11129 break;
11131 case R_PPC64_ADDR16_HA:
11132 case R_PPC64_ADDR16_HIGHERA:
11133 case R_PPC64_ADDR16_HIGHESTA:
11134 case R_PPC64_TOC16_HA:
11135 case R_PPC64_SECTOFF_HA:
11136 case R_PPC64_TPREL16_HA:
11137 case R_PPC64_DTPREL16_HA:
11138 case R_PPC64_TPREL16_HIGHER:
11139 case R_PPC64_TPREL16_HIGHERA:
11140 case R_PPC64_TPREL16_HIGHEST:
11141 case R_PPC64_TPREL16_HIGHESTA:
11142 case R_PPC64_DTPREL16_HIGHER:
11143 case R_PPC64_DTPREL16_HIGHERA:
11144 case R_PPC64_DTPREL16_HIGHEST:
11145 case R_PPC64_DTPREL16_HIGHESTA:
11146 /* It's just possible that this symbol is a weak symbol
11147 that's not actually defined anywhere. In that case,
11148 'sec' would be NULL, and we should leave the symbol
11149 alone (it will be set to zero elsewhere in the link). */
11150 if (sec == NULL)
11151 break;
11152 /* Fall thru */
11154 case R_PPC64_GOT16_HA:
11155 case R_PPC64_PLTGOT16_HA:
11156 case R_PPC64_PLT16_HA:
11157 case R_PPC64_GOT_TLSGD16_HA:
11158 case R_PPC64_GOT_TLSLD16_HA:
11159 case R_PPC64_GOT_TPREL16_HA:
11160 case R_PPC64_GOT_DTPREL16_HA:
11161 /* Add 0x10000 if sign bit in 0:15 is set.
11162 Bits 0:15 are not used. */
11163 addend += 0x8000;
11164 break;
11166 case R_PPC64_ADDR16_DS:
11167 case R_PPC64_ADDR16_LO_DS:
11168 case R_PPC64_GOT16_DS:
11169 case R_PPC64_GOT16_LO_DS:
11170 case R_PPC64_PLT16_LO_DS:
11171 case R_PPC64_SECTOFF_DS:
11172 case R_PPC64_SECTOFF_LO_DS:
11173 case R_PPC64_TOC16_DS:
11174 case R_PPC64_TOC16_LO_DS:
11175 case R_PPC64_PLTGOT16_DS:
11176 case R_PPC64_PLTGOT16_LO_DS:
11177 case R_PPC64_GOT_TPREL16_DS:
11178 case R_PPC64_GOT_TPREL16_LO_DS:
11179 case R_PPC64_GOT_DTPREL16_DS:
11180 case R_PPC64_GOT_DTPREL16_LO_DS:
11181 case R_PPC64_TPREL16_DS:
11182 case R_PPC64_TPREL16_LO_DS:
11183 case R_PPC64_DTPREL16_DS:
11184 case R_PPC64_DTPREL16_LO_DS:
11185 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
11186 mask = 3;
11187 /* If this reloc is against an lq insn, then the value must be
11188 a multiple of 16. This is somewhat of a hack, but the
11189 "correct" way to do this by defining _DQ forms of all the
11190 _DS relocs bloats all reloc switches in this file. It
11191 doesn't seem to make much sense to use any of these relocs
11192 in data, so testing the insn should be safe. */
11193 if ((insn & (0x3f << 26)) == (56u << 26))
11194 mask = 15;
11195 if (((relocation + addend) & mask) != 0)
11197 (*_bfd_error_handler)
11198 (_("%B: error: relocation %s not a multiple of %d"),
11199 input_bfd,
11200 ppc64_elf_howto_table[r_type]->name,
11201 mask + 1);
11202 bfd_set_error (bfd_error_bad_value);
11203 ret = FALSE;
11204 continue;
11206 break;
11209 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
11210 because such sections are not SEC_ALLOC and thus ld.so will
11211 not process them. */
11212 if (unresolved_reloc
11213 && !((input_section->flags & SEC_DEBUGGING) != 0
11214 && h->elf.def_dynamic))
11216 (*_bfd_error_handler)
11217 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
11218 input_bfd,
11219 input_section,
11220 (long) rel->r_offset,
11221 ppc64_elf_howto_table[(int) r_type]->name,
11222 h->elf.root.root.string);
11223 ret = FALSE;
11226 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
11227 input_bfd,
11228 input_section,
11229 contents,
11230 rel->r_offset,
11231 relocation,
11232 addend);
11234 if (r != bfd_reloc_ok)
11236 if (sym_name == NULL)
11237 sym_name = "(null)";
11238 if (r == bfd_reloc_overflow)
11240 if (warned)
11241 continue;
11242 if (h != NULL
11243 && h->elf.root.type == bfd_link_hash_undefweak
11244 && ppc64_elf_howto_table[r_type]->pc_relative)
11246 /* Assume this is a call protected by other code that
11247 detects the symbol is undefined. If this is the case,
11248 we can safely ignore the overflow. If not, the
11249 program is hosed anyway, and a little warning isn't
11250 going to help. */
11252 continue;
11255 if (!((*info->callbacks->reloc_overflow)
11256 (info, (h ? &h->elf.root : NULL), sym_name,
11257 ppc64_elf_howto_table[r_type]->name,
11258 orig_addend, input_bfd, input_section, rel->r_offset)))
11259 return FALSE;
11261 else
11263 (*_bfd_error_handler)
11264 (_("%B(%A+0x%lx): %s reloc against `%s': error %d"),
11265 input_bfd,
11266 input_section,
11267 (long) rel->r_offset,
11268 ppc64_elf_howto_table[r_type]->name,
11269 sym_name,
11270 (int) r);
11271 ret = FALSE;
11276 /* If we're emitting relocations, then shortly after this function
11277 returns, reloc offsets and addends for this section will be
11278 adjusted. Worse, reloc symbol indices will be for the output
11279 file rather than the input. Save a copy of the relocs for
11280 opd_entry_value. */
11281 if (is_opd && (info->emitrelocations || info->relocatable))
11283 bfd_size_type amt;
11284 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
11285 rel = bfd_alloc (input_bfd, amt);
11286 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd_relocs == NULL);
11287 ppc64_elf_tdata (input_bfd)->opd_relocs = rel;
11288 if (rel == NULL)
11289 return FALSE;
11290 memcpy (rel, relocs, amt);
11292 return ret;
11295 /* Adjust the value of any local symbols in opd sections. */
11297 static bfd_boolean
11298 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
11299 const char *name ATTRIBUTE_UNUSED,
11300 Elf_Internal_Sym *elfsym,
11301 asection *input_sec,
11302 struct elf_link_hash_entry *h)
11304 long *opd_adjust, adjust;
11305 bfd_vma value;
11307 if (h != NULL)
11308 return TRUE;
11310 opd_adjust = get_opd_info (input_sec);
11311 if (opd_adjust == NULL)
11312 return TRUE;
11314 value = elfsym->st_value - input_sec->output_offset;
11315 if (!info->relocatable)
11316 value -= input_sec->output_section->vma;
11318 adjust = opd_adjust[value / 8];
11319 if (adjust == -1)
11320 elfsym->st_value = 0;
11321 else
11322 elfsym->st_value += adjust;
11323 return TRUE;
11326 /* Finish up dynamic symbol handling. We set the contents of various
11327 dynamic sections here. */
11329 static bfd_boolean
11330 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
11331 struct bfd_link_info *info,
11332 struct elf_link_hash_entry *h,
11333 Elf_Internal_Sym *sym)
11335 struct ppc_link_hash_table *htab;
11336 struct plt_entry *ent;
11337 Elf_Internal_Rela rela;
11338 bfd_byte *loc;
11340 htab = ppc_hash_table (info);
11342 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
11343 if (ent->plt.offset != (bfd_vma) -1)
11345 /* This symbol has an entry in the procedure linkage
11346 table. Set it up. */
11348 if (htab->plt == NULL
11349 || htab->relplt == NULL
11350 || htab->glink == NULL)
11351 abort ();
11353 /* Create a JMP_SLOT reloc to inform the dynamic linker to
11354 fill in the PLT entry. */
11355 rela.r_offset = (htab->plt->output_section->vma
11356 + htab->plt->output_offset
11357 + ent->plt.offset);
11358 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
11359 rela.r_addend = ent->addend;
11361 loc = htab->relplt->contents;
11362 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
11363 * sizeof (Elf64_External_Rela));
11364 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
11367 if (h->needs_copy)
11369 Elf_Internal_Rela rela;
11370 bfd_byte *loc;
11372 /* This symbol needs a copy reloc. Set it up. */
11374 if (h->dynindx == -1
11375 || (h->root.type != bfd_link_hash_defined
11376 && h->root.type != bfd_link_hash_defweak)
11377 || htab->relbss == NULL)
11378 abort ();
11380 rela.r_offset = (h->root.u.def.value
11381 + h->root.u.def.section->output_section->vma
11382 + h->root.u.def.section->output_offset);
11383 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
11384 rela.r_addend = 0;
11385 loc = htab->relbss->contents;
11386 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
11387 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
11390 /* Mark some specially defined symbols as absolute. */
11391 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
11392 sym->st_shndx = SHN_ABS;
11394 return TRUE;
11397 /* Used to decide how to sort relocs in an optimal manner for the
11398 dynamic linker, before writing them out. */
11400 static enum elf_reloc_type_class
11401 ppc64_elf_reloc_type_class (const Elf_Internal_Rela *rela)
11403 enum elf_ppc64_reloc_type r_type;
11405 r_type = ELF64_R_TYPE (rela->r_info);
11406 switch (r_type)
11408 case R_PPC64_RELATIVE:
11409 return reloc_class_relative;
11410 case R_PPC64_JMP_SLOT:
11411 return reloc_class_plt;
11412 case R_PPC64_COPY:
11413 return reloc_class_copy;
11414 default:
11415 return reloc_class_normal;
11419 /* Finish up the dynamic sections. */
11421 static bfd_boolean
11422 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
11423 struct bfd_link_info *info)
11425 struct ppc_link_hash_table *htab;
11426 bfd *dynobj;
11427 asection *sdyn;
11429 htab = ppc_hash_table (info);
11430 dynobj = htab->elf.dynobj;
11431 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
11433 if (htab->elf.dynamic_sections_created)
11435 Elf64_External_Dyn *dyncon, *dynconend;
11437 if (sdyn == NULL || htab->got == NULL)
11438 abort ();
11440 dyncon = (Elf64_External_Dyn *) sdyn->contents;
11441 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
11442 for (; dyncon < dynconend; dyncon++)
11444 Elf_Internal_Dyn dyn;
11445 asection *s;
11447 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
11449 switch (dyn.d_tag)
11451 default:
11452 continue;
11454 case DT_PPC64_GLINK:
11455 s = htab->glink;
11456 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11457 /* We stupidly defined DT_PPC64_GLINK to be the start
11458 of glink rather than the first entry point, which is
11459 what ld.so needs, and now have a bigger stub to
11460 support automatic multiple TOCs. */
11461 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 32;
11462 break;
11464 case DT_PPC64_OPD:
11465 s = bfd_get_section_by_name (output_bfd, ".opd");
11466 if (s == NULL)
11467 continue;
11468 dyn.d_un.d_ptr = s->vma;
11469 break;
11471 case DT_PPC64_OPDSZ:
11472 s = bfd_get_section_by_name (output_bfd, ".opd");
11473 if (s == NULL)
11474 continue;
11475 dyn.d_un.d_val = s->size;
11476 break;
11478 case DT_PLTGOT:
11479 s = htab->plt;
11480 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11481 break;
11483 case DT_JMPREL:
11484 s = htab->relplt;
11485 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11486 break;
11488 case DT_PLTRELSZ:
11489 dyn.d_un.d_val = htab->relplt->size;
11490 break;
11492 case DT_RELASZ:
11493 /* Don't count procedure linkage table relocs in the
11494 overall reloc count. */
11495 s = htab->relplt;
11496 if (s == NULL)
11497 continue;
11498 dyn.d_un.d_val -= s->size;
11499 break;
11501 case DT_RELA:
11502 /* We may not be using the standard ELF linker script.
11503 If .rela.plt is the first .rela section, we adjust
11504 DT_RELA to not include it. */
11505 s = htab->relplt;
11506 if (s == NULL)
11507 continue;
11508 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
11509 continue;
11510 dyn.d_un.d_ptr += s->size;
11511 break;
11514 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
11518 if (htab->got != NULL && htab->got->size != 0)
11520 /* Fill in the first entry in the global offset table.
11521 We use it to hold the link-time TOCbase. */
11522 bfd_put_64 (output_bfd,
11523 elf_gp (output_bfd) + TOC_BASE_OFF,
11524 htab->got->contents);
11526 /* Set .got entry size. */
11527 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 8;
11530 if (htab->plt != NULL && htab->plt->size != 0)
11532 /* Set .plt entry size. */
11533 elf_section_data (htab->plt->output_section)->this_hdr.sh_entsize
11534 = PLT_ENTRY_SIZE;
11537 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
11538 brlt ourselves if emitrelocations. */
11539 if (htab->brlt != NULL
11540 && htab->brlt->reloc_count != 0
11541 && !_bfd_elf_link_output_relocs (output_bfd,
11542 htab->brlt,
11543 &elf_section_data (htab->brlt)->rel_hdr,
11544 elf_section_data (htab->brlt)->relocs,
11545 NULL))
11546 return FALSE;
11548 /* We need to handle writing out multiple GOT sections ourselves,
11549 since we didn't add them to DYNOBJ. We know dynobj is the first
11550 bfd. */
11551 while ((dynobj = dynobj->link_next) != NULL)
11553 asection *s;
11555 if (!is_ppc64_elf_target (dynobj->xvec))
11556 continue;
11558 s = ppc64_elf_tdata (dynobj)->got;
11559 if (s != NULL
11560 && s->size != 0
11561 && s->output_section != bfd_abs_section_ptr
11562 && !bfd_set_section_contents (output_bfd, s->output_section,
11563 s->contents, s->output_offset,
11564 s->size))
11565 return FALSE;
11566 s = ppc64_elf_tdata (dynobj)->relgot;
11567 if (s != NULL
11568 && s->size != 0
11569 && s->output_section != bfd_abs_section_ptr
11570 && !bfd_set_section_contents (output_bfd, s->output_section,
11571 s->contents, s->output_offset,
11572 s->size))
11573 return FALSE;
11576 return TRUE;
11579 #include "elf64-target.h"