* hppaelf.em (group_size): Change default back to 1.
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
... / ...
CommitLineData
1/* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5
6This file is part of BFD, the Binary File Descriptor library.
7
8This program is free software; you can redistribute it and/or modify
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2 of the License, or
11(at your option) any later version.
12
13This program is distributed in the hope that it will be useful,
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
19along with this program; if not, write to the Free Software
20Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22/* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "bfdlink.h"
28#include "libbfd.h"
29#include "elf-bfd.h"
30#include "elf/ppc64.h"
31#include "elf64-ppc.h"
32
33static void ppc_howto_init
34 PARAMS ((void));
35static reloc_howto_type *ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
37static void ppc64_elf_info_to_howto
38 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
39static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
43static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
45static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
47static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
49static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
51static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
53static bfd_reloc_status_type ppc64_elf_unhandled_reloc
54 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
55static bfd_boolean ppc64_elf_object_p
56 PARAMS ((bfd *));
57static bfd_boolean ppc64_elf_merge_private_bfd_data
58 PARAMS ((bfd *, bfd *));
59static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd *, asection *));
61
62
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
67/* The size in bytes of an entry in the procedure linkage table. */
68#define PLT_ENTRY_SIZE 24
69
70/* The initial size of the plt reserved for the dynamic linker. */
71#define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
72
73/* TOC base pointers offset from start of TOC. */
74#define TOC_BASE_OFF 0x8000
75
76/* Offset of tp and dtp pointers from start of TLS block. */
77#define TP_OFFSET 0x7000
78#define DTP_OFFSET 0x8000
79
80/* .plt call stub instructions. */
81#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82#define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83#define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84#define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85#define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87#define BCTR 0x4e800420 /* bctr */
88
89/* The normal stub is this size. */
90#define PLT_CALL_STUB_SIZE (7*4)
91
92/* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94#define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
95
96/* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98#define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
99
100/* Always allow this much space. */
101#define GLINK_CALL_STUB_SIZE (8*4)
102
103/* Pad with this. */
104#define NOP 0x60000000
105
106/* Some other nops. */
107#define CROR_151515 0x4def7b82
108#define CROR_313131 0x4ffffb82
109
110/* .glink entries for the first 32k functions are two instructions. */
111#define LI_R0_0 0x38000000 /* li %r0,0 */
112#define B_DOT 0x48000000 /* b . */
113
114/* After that, we need two instructions to load the index, followed by
115 a branch. */
116#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
117#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
118
119/* Instructions to save and restore floating point regs. */
120#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122#define BLR 0x4e800020 /* blr */
123
124/* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
127 relocate .opd without reloc entries. */
128#ifndef NO_OPD_RELOCS
129#define NO_OPD_RELOCS 0
130#endif
131\f
132#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
133
134/* Relocation HOWTO's. */
135static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
136
137static reloc_howto_type ppc64_elf_howto_raw[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE, /* type */
140 0, /* rightshift */
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
143 FALSE, /* pc_relative */
144 0, /* bitpos */
145 complain_overflow_dont, /* complain_on_overflow */
146 bfd_elf_generic_reloc, /* special_function */
147 "R_PPC64_NONE", /* name */
148 FALSE, /* partial_inplace */
149 0, /* src_mask */
150 0, /* dst_mask */
151 FALSE), /* pcrel_offset */
152
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
158 FALSE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_PPC64_ADDR32", /* name */
163 FALSE, /* partial_inplace */
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
166 FALSE), /* pcrel_offset */
167
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 26, /* bitsize */
174 FALSE, /* pc_relative */
175 0, /* bitpos */
176 complain_overflow_bitfield, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_PPC64_ADDR24", /* name */
179 FALSE, /* partial_inplace */
180 0, /* src_mask */
181 0x03fffffc, /* dst_mask */
182 FALSE), /* pcrel_offset */
183
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16, /* type */
186 0, /* rightshift */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
188 16, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_PPC64_ADDR16", /* name */
194 FALSE, /* partial_inplace */
195 0, /* src_mask */
196 0xffff, /* dst_mask */
197 FALSE), /* pcrel_offset */
198
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO, /* type */
201 0, /* rightshift */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
203 16, /* bitsize */
204 FALSE, /* pc_relative */
205 0, /* bitpos */
206 complain_overflow_dont,/* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
209 FALSE, /* partial_inplace */
210 0, /* src_mask */
211 0xffff, /* dst_mask */
212 FALSE), /* pcrel_offset */
213
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI, /* type */
216 16, /* rightshift */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
218 16, /* bitsize */
219 FALSE, /* pc_relative */
220 0, /* bitpos */
221 complain_overflow_dont, /* complain_on_overflow */
222 bfd_elf_generic_reloc, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
224 FALSE, /* partial_inplace */
225 0, /* src_mask */
226 0xffff, /* dst_mask */
227 FALSE), /* pcrel_offset */
228
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA, /* type */
232 16, /* rightshift */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
234 16, /* bitsize */
235 FALSE, /* pc_relative */
236 0, /* bitpos */
237 complain_overflow_dont, /* complain_on_overflow */
238 ppc64_elf_ha_reloc, /* special_function */
239 "R_PPC64_ADDR16_HA", /* name */
240 FALSE, /* partial_inplace */
241 0, /* src_mask */
242 0xffff, /* dst_mask */
243 FALSE), /* pcrel_offset */
244
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 16, /* bitsize */
251 FALSE, /* pc_relative */
252 0, /* bitpos */
253 complain_overflow_bitfield, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_PPC64_ADDR14", /* name */
256 FALSE, /* partial_inplace */
257 0, /* src_mask */
258 0x0000fffc, /* dst_mask */
259 FALSE), /* pcrel_offset */
260
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
265 0, /* rightshift */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
268 FALSE, /* pc_relative */
269 0, /* bitpos */
270 complain_overflow_bitfield, /* complain_on_overflow */
271 ppc64_elf_brtaken_reloc, /* special_function */
272 "R_PPC64_ADDR14_BRTAKEN",/* name */
273 FALSE, /* partial_inplace */
274 0, /* src_mask */
275 0x0000fffc, /* dst_mask */
276 FALSE), /* pcrel_offset */
277
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
282 0, /* rightshift */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
285 FALSE, /* pc_relative */
286 0, /* bitpos */
287 complain_overflow_bitfield, /* complain_on_overflow */
288 ppc64_elf_brtaken_reloc, /* special_function */
289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
290 FALSE, /* partial_inplace */
291 0, /* src_mask */
292 0x0000fffc, /* dst_mask */
293 FALSE), /* pcrel_offset */
294
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 26, /* bitsize */
300 TRUE, /* pc_relative */
301 0, /* bitpos */
302 complain_overflow_signed, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_REL24", /* name */
305 FALSE, /* partial_inplace */
306 0, /* src_mask */
307 0x03fffffc, /* dst_mask */
308 TRUE), /* pcrel_offset */
309
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14, /* type */
312 0, /* rightshift */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
314 16, /* bitsize */
315 TRUE, /* pc_relative */
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_REL14", /* name */
320 FALSE, /* partial_inplace */
321 0, /* src_mask */
322 0x0000fffc, /* dst_mask */
323 TRUE), /* pcrel_offset */
324
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
327 zero. */
328 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
329 0, /* rightshift */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
331 16, /* bitsize */
332 TRUE, /* pc_relative */
333 0, /* bitpos */
334 complain_overflow_signed, /* complain_on_overflow */
335 ppc64_elf_brtaken_reloc, /* special_function */
336 "R_PPC64_REL14_BRTAKEN", /* name */
337 FALSE, /* partial_inplace */
338 0, /* src_mask */
339 0x0000fffc, /* dst_mask */
340 TRUE), /* pcrel_offset */
341
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
344 be zero. */
345 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
349 TRUE, /* pc_relative */
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
352 ppc64_elf_brtaken_reloc, /* special_function */
353 "R_PPC64_REL14_BRNTAKEN",/* name */
354 FALSE, /* partial_inplace */
355 0, /* src_mask */
356 0x0000fffc, /* dst_mask */
357 TRUE), /* pcrel_offset */
358
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
360 symbol. */
361 HOWTO (R_PPC64_GOT16, /* type */
362 0, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
365 FALSE, /* pc_relative */
366 0, /* bitpos */
367 complain_overflow_signed, /* complain_on_overflow */
368 ppc64_elf_unhandled_reloc, /* special_function */
369 "R_PPC64_GOT16", /* name */
370 FALSE, /* partial_inplace */
371 0, /* src_mask */
372 0xffff, /* dst_mask */
373 FALSE), /* pcrel_offset */
374
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
376 the symbol. */
377 HOWTO (R_PPC64_GOT16_LO, /* type */
378 0, /* rightshift */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
381 FALSE, /* pc_relative */
382 0, /* bitpos */
383 complain_overflow_dont, /* complain_on_overflow */
384 ppc64_elf_unhandled_reloc, /* special_function */
385 "R_PPC64_GOT16_LO", /* name */
386 FALSE, /* partial_inplace */
387 0, /* src_mask */
388 0xffff, /* dst_mask */
389 FALSE), /* pcrel_offset */
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOWTO (R_PPC64_GOT16_HI, /* type */
394 16, /* rightshift */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
397 FALSE, /* pc_relative */
398 0, /* bitpos */
399 complain_overflow_dont,/* complain_on_overflow */
400 ppc64_elf_unhandled_reloc, /* special_function */
401 "R_PPC64_GOT16_HI", /* name */
402 FALSE, /* partial_inplace */
403 0, /* src_mask */
404 0xffff, /* dst_mask */
405 FALSE), /* pcrel_offset */
406
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
408 the symbol. */
409 HOWTO (R_PPC64_GOT16_HA, /* type */
410 16, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
413 FALSE, /* pc_relative */
414 0, /* bitpos */
415 complain_overflow_dont,/* complain_on_overflow */
416 ppc64_elf_unhandled_reloc, /* special_function */
417 "R_PPC64_GOT16_HA", /* name */
418 FALSE, /* partial_inplace */
419 0, /* src_mask */
420 0xffff, /* dst_mask */
421 FALSE), /* pcrel_offset */
422
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY, /* type */
429 0, /* rightshift */
430 0, /* this one is variable size */
431 0, /* bitsize */
432 FALSE, /* pc_relative */
433 0, /* bitpos */
434 complain_overflow_dont, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc, /* special_function */
436 "R_PPC64_COPY", /* name */
437 FALSE, /* partial_inplace */
438 0, /* src_mask */
439 0, /* dst_mask */
440 FALSE), /* pcrel_offset */
441
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
443 entries. */
444 HOWTO (R_PPC64_GLOB_DAT, /* type */
445 0, /* rightshift */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
447 64, /* bitsize */
448 FALSE, /* pc_relative */
449 0, /* bitpos */
450 complain_overflow_dont, /* complain_on_overflow */
451 ppc64_elf_unhandled_reloc, /* special_function */
452 "R_PPC64_GLOB_DAT", /* name */
453 FALSE, /* partial_inplace */
454 0, /* src_mask */
455 ONES (64), /* dst_mask */
456 FALSE), /* pcrel_offset */
457
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT, /* type */
461 0, /* rightshift */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
463 0, /* bitsize */
464 FALSE, /* pc_relative */
465 0, /* bitpos */
466 complain_overflow_dont, /* complain_on_overflow */
467 ppc64_elf_unhandled_reloc, /* special_function */
468 "R_PPC64_JMP_SLOT", /* name */
469 FALSE, /* partial_inplace */
470 0, /* src_mask */
471 0, /* dst_mask */
472 FALSE), /* pcrel_offset */
473
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
476 addend. */
477 HOWTO (R_PPC64_RELATIVE, /* type */
478 0, /* rightshift */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
480 64, /* bitsize */
481 FALSE, /* pc_relative */
482 0, /* bitpos */
483 complain_overflow_dont, /* complain_on_overflow */
484 bfd_elf_generic_reloc, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
486 FALSE, /* partial_inplace */
487 0, /* src_mask */
488 ONES (64), /* dst_mask */
489 FALSE), /* pcrel_offset */
490
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
496 FALSE, /* pc_relative */
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC64_UADDR32", /* name */
501 FALSE, /* partial_inplace */
502 0, /* src_mask */
503 0xffffffff, /* dst_mask */
504 FALSE), /* pcrel_offset */
505
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
511 FALSE, /* pc_relative */
512 0, /* bitpos */
513 complain_overflow_bitfield, /* complain_on_overflow */
514 bfd_elf_generic_reloc, /* special_function */
515 "R_PPC64_UADDR16", /* name */
516 FALSE, /* partial_inplace */
517 0, /* src_mask */
518 0xffff, /* dst_mask */
519 FALSE), /* pcrel_offset */
520
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
526 TRUE, /* pc_relative */
527 0, /* bitpos */
528 /* FIXME: Verify. Was complain_overflow_bitfield. */
529 complain_overflow_signed, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC64_REL32", /* name */
532 FALSE, /* partial_inplace */
533 0, /* src_mask */
534 0xffffffff, /* dst_mask */
535 TRUE), /* pcrel_offset */
536
537 /* 32-bit relocation to the symbol's procedure linkage table. */
538 HOWTO (R_PPC64_PLT32, /* type */
539 0, /* rightshift */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
541 32, /* bitsize */
542 FALSE, /* pc_relative */
543 0, /* bitpos */
544 complain_overflow_bitfield, /* complain_on_overflow */
545 ppc64_elf_unhandled_reloc, /* special_function */
546 "R_PPC64_PLT32", /* name */
547 FALSE, /* partial_inplace */
548 0, /* src_mask */
549 0xffffffff, /* dst_mask */
550 FALSE), /* pcrel_offset */
551
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 32, /* bitsize */
558 TRUE, /* pc_relative */
559 0, /* bitpos */
560 complain_overflow_signed, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
563 FALSE, /* partial_inplace */
564 0, /* src_mask */
565 0xffffffff, /* dst_mask */
566 TRUE), /* pcrel_offset */
567
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
569 the symbol. */
570 HOWTO (R_PPC64_PLT16_LO, /* type */
571 0, /* rightshift */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
574 FALSE, /* pc_relative */
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 ppc64_elf_unhandled_reloc, /* special_function */
578 "R_PPC64_PLT16_LO", /* name */
579 FALSE, /* partial_inplace */
580 0, /* src_mask */
581 0xffff, /* dst_mask */
582 FALSE), /* pcrel_offset */
583
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
585 the symbol. */
586 HOWTO (R_PPC64_PLT16_HI, /* type */
587 16, /* rightshift */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
589 16, /* bitsize */
590 FALSE, /* pc_relative */
591 0, /* bitpos */
592 complain_overflow_dont, /* complain_on_overflow */
593 ppc64_elf_unhandled_reloc, /* special_function */
594 "R_PPC64_PLT16_HI", /* name */
595 FALSE, /* partial_inplace */
596 0, /* src_mask */
597 0xffff, /* dst_mask */
598 FALSE), /* pcrel_offset */
599
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
601 the symbol. */
602 HOWTO (R_PPC64_PLT16_HA, /* type */
603 16, /* rightshift */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
606 FALSE, /* pc_relative */
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
609 ppc64_elf_unhandled_reloc, /* special_function */
610 "R_PPC64_PLT16_HA", /* name */
611 FALSE, /* partial_inplace */
612 0, /* src_mask */
613 0xffff, /* dst_mask */
614 FALSE), /* pcrel_offset */
615
616 /* 16-bit section relative relocation. */
617 HOWTO (R_PPC64_SECTOFF, /* type */
618 0, /* rightshift */
619 1, /* size (0 = byte, 1 = short, 2 = long) */
620 16, /* bitsize */
621 FALSE, /* pc_relative */
622 0, /* bitpos */
623 complain_overflow_bitfield, /* complain_on_overflow */
624 ppc64_elf_sectoff_reloc, /* special_function */
625 "R_PPC64_SECTOFF", /* name */
626 FALSE, /* partial_inplace */
627 0, /* src_mask */
628 0xffff, /* dst_mask */
629 FALSE), /* pcrel_offset */
630
631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
632 HOWTO (R_PPC64_SECTOFF_LO, /* type */
633 0, /* rightshift */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
635 16, /* bitsize */
636 FALSE, /* pc_relative */
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
639 ppc64_elf_sectoff_reloc, /* special_function */
640 "R_PPC64_SECTOFF_LO", /* name */
641 FALSE, /* partial_inplace */
642 0, /* src_mask */
643 0xffff, /* dst_mask */
644 FALSE), /* pcrel_offset */
645
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI, /* type */
648 16, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
651 FALSE, /* pc_relative */
652 0, /* bitpos */
653 complain_overflow_dont, /* complain_on_overflow */
654 ppc64_elf_sectoff_reloc, /* special_function */
655 "R_PPC64_SECTOFF_HI", /* name */
656 FALSE, /* partial_inplace */
657 0, /* src_mask */
658 0xffff, /* dst_mask */
659 FALSE), /* pcrel_offset */
660
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA, /* type */
663 16, /* rightshift */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
665 16, /* bitsize */
666 FALSE, /* pc_relative */
667 0, /* bitpos */
668 complain_overflow_dont, /* complain_on_overflow */
669 ppc64_elf_sectoff_ha_reloc, /* special_function */
670 "R_PPC64_SECTOFF_HA", /* name */
671 FALSE, /* partial_inplace */
672 0, /* src_mask */
673 0xffff, /* dst_mask */
674 FALSE), /* pcrel_offset */
675
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30, /* type */
678 2, /* rightshift */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
680 30, /* bitsize */
681 TRUE, /* pc_relative */
682 0, /* bitpos */
683 complain_overflow_dont, /* complain_on_overflow */
684 bfd_elf_generic_reloc, /* special_function */
685 "R_PPC64_REL30", /* name */
686 FALSE, /* partial_inplace */
687 0, /* src_mask */
688 0xfffffffc, /* dst_mask */
689 TRUE), /* pcrel_offset */
690
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
692
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64, /* type */
695 0, /* rightshift */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
697 64, /* bitsize */
698 FALSE, /* pc_relative */
699 0, /* bitpos */
700 complain_overflow_dont, /* complain_on_overflow */
701 bfd_elf_generic_reloc, /* special_function */
702 "R_PPC64_ADDR64", /* name */
703 FALSE, /* partial_inplace */
704 0, /* src_mask */
705 ONES (64), /* dst_mask */
706 FALSE), /* pcrel_offset */
707
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
710 32, /* rightshift */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
712 16, /* bitsize */
713 FALSE, /* pc_relative */
714 0, /* bitpos */
715 complain_overflow_dont, /* complain_on_overflow */
716 bfd_elf_generic_reloc, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
718 FALSE, /* partial_inplace */
719 0, /* src_mask */
720 0xffff, /* dst_mask */
721 FALSE), /* pcrel_offset */
722
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
726 32, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
729 FALSE, /* pc_relative */
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
732 ppc64_elf_ha_reloc, /* special_function */
733 "R_PPC64_ADDR16_HIGHERA", /* name */
734 FALSE, /* partial_inplace */
735 0, /* src_mask */
736 0xffff, /* dst_mask */
737 FALSE), /* pcrel_offset */
738
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
741 48, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
744 FALSE, /* pc_relative */
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 bfd_elf_generic_reloc, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
749 FALSE, /* partial_inplace */
750 0, /* src_mask */
751 0xffff, /* dst_mask */
752 FALSE), /* pcrel_offset */
753
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
757 48, /* rightshift */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
759 16, /* bitsize */
760 FALSE, /* pc_relative */
761 0, /* bitpos */
762 complain_overflow_dont, /* complain_on_overflow */
763 ppc64_elf_ha_reloc, /* special_function */
764 "R_PPC64_ADDR16_HIGHESTA", /* name */
765 FALSE, /* partial_inplace */
766 0, /* src_mask */
767 0xffff, /* dst_mask */
768 FALSE), /* pcrel_offset */
769
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64, /* type */
772 0, /* rightshift */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
774 64, /* bitsize */
775 FALSE, /* pc_relative */
776 0, /* bitpos */
777 complain_overflow_dont, /* complain_on_overflow */
778 bfd_elf_generic_reloc, /* special_function */
779 "R_PPC64_UADDR64", /* name */
780 FALSE, /* partial_inplace */
781 0, /* src_mask */
782 ONES (64), /* dst_mask */
783 FALSE), /* pcrel_offset */
784
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64, /* type */
787 0, /* rightshift */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
789 64, /* bitsize */
790 TRUE, /* pc_relative */
791 0, /* bitpos */
792 complain_overflow_dont, /* complain_on_overflow */
793 bfd_elf_generic_reloc, /* special_function */
794 "R_PPC64_REL64", /* name */
795 FALSE, /* partial_inplace */
796 0, /* src_mask */
797 ONES (64), /* dst_mask */
798 TRUE), /* pcrel_offset */
799
800 /* 64-bit relocation to the symbol's procedure linkage table. */
801 HOWTO (R_PPC64_PLT64, /* type */
802 0, /* rightshift */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
804 64, /* bitsize */
805 FALSE, /* pc_relative */
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
808 ppc64_elf_unhandled_reloc, /* special_function */
809 "R_PPC64_PLT64", /* name */
810 FALSE, /* partial_inplace */
811 0, /* src_mask */
812 ONES (64), /* dst_mask */
813 FALSE), /* pcrel_offset */
814
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
816 table. */
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64, /* type */
819 0, /* rightshift */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
821 64, /* bitsize */
822 TRUE, /* pc_relative */
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
825 ppc64_elf_unhandled_reloc, /* special_function */
826 "R_PPC64_PLTREL64", /* name */
827 FALSE, /* partial_inplace */
828 0, /* src_mask */
829 ONES (64), /* dst_mask */
830 TRUE), /* pcrel_offset */
831
832 /* 16 bit TOC-relative relocation. */
833
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16, /* type */
836 0, /* rightshift */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
838 16, /* bitsize */
839 FALSE, /* pc_relative */
840 0, /* bitpos */
841 complain_overflow_signed, /* complain_on_overflow */
842 ppc64_elf_toc_reloc, /* special_function */
843 "R_PPC64_TOC16", /* name */
844 FALSE, /* partial_inplace */
845 0, /* src_mask */
846 0xffff, /* dst_mask */
847 FALSE), /* pcrel_offset */
848
849 /* 16 bit TOC-relative relocation without overflow. */
850
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO, /* type */
853 0, /* rightshift */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
855 16, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc64_elf_toc_reloc, /* special_function */
860 "R_PPC64_TOC16_LO", /* name */
861 FALSE, /* partial_inplace */
862 0, /* src_mask */
863 0xffff, /* dst_mask */
864 FALSE), /* pcrel_offset */
865
866 /* 16 bit TOC-relative relocation, high 16 bits. */
867
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI, /* type */
870 16, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc64_elf_toc_reloc, /* special_function */
877 "R_PPC64_TOC16_HI", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
885 negative. */
886
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA, /* type */
889 16, /* rightshift */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
891 16, /* bitsize */
892 FALSE, /* pc_relative */
893 0, /* bitpos */
894 complain_overflow_dont, /* complain_on_overflow */
895 ppc64_elf_toc_ha_reloc, /* special_function */
896 "R_PPC64_TOC16_HA", /* name */
897 FALSE, /* partial_inplace */
898 0, /* src_mask */
899 0xffff, /* dst_mask */
900 FALSE), /* pcrel_offset */
901
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
903
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_bitfield, /* complain_on_overflow */
912 ppc64_elf_toc64_reloc, /* special_function */
913 "R_PPC64_TOC", /* name */
914 FALSE, /* partial_inplace */
915 0, /* src_mask */
916 ONES (64), /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16, /* type */
929 0, /* rightshift */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
931 16, /* bitsize */
932 FALSE, /* pc_relative */
933 0, /* bitpos */
934 complain_overflow_signed, /* complain_on_overflow */
935 ppc64_elf_unhandled_reloc, /* special_function */
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE, /* partial_inplace */
938 0, /* src_mask */
939 0xffff, /* dst_mask */
940 FALSE), /* pcrel_offset */
941
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
945 0, /* rightshift */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
947 16, /* bitsize */
948 FALSE, /* pc_relative */
949 0, /* bitpos */
950 complain_overflow_dont, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE, /* partial_inplace */
954 0, /* src_mask */
955 0xffff, /* dst_mask */
956 FALSE), /* pcrel_offset */
957
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
961 16, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_dont, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
976 is negative. */
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
979 16, /* rightshift */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
981 16, /* bitsize */
982 FALSE, /* pc_relative */
983 0, /* bitpos */
984 complain_overflow_dont,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE, /* partial_inplace */
988 0, /* src_mask */
989 0xffff, /* dst_mask */
990 FALSE), /* pcrel_offset */
991
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS, /* type */
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_bitfield, /* complain_on_overflow */
1000 bfd_elf_generic_reloc, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xfffc, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont,/* complain_on_overflow */
1015 bfd_elf_generic_reloc, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xfffc, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS, /* type */
1024 0, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xfffc, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1039 0, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xfffc, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1054 0, /* rightshift */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1056 16, /* bitsize */
1057 FALSE, /* pc_relative */
1058 0, /* bitpos */
1059 complain_overflow_dont, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE, /* partial_inplace */
1063 0, /* src_mask */
1064 0xfffc, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1066
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1069 0, /* rightshift */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1071 16, /* bitsize */
1072 FALSE, /* pc_relative */
1073 0, /* bitpos */
1074 complain_overflow_bitfield, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE, /* partial_inplace */
1078 0, /* src_mask */
1079 0xfffc, /* dst_mask */
1080 FALSE), /* pcrel_offset */
1081
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1084 0, /* rightshift */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 16, /* bitsize */
1087 FALSE, /* pc_relative */
1088 0, /* bitpos */
1089 complain_overflow_dont, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE, /* partial_inplace */
1093 0, /* src_mask */
1094 0xfffc, /* dst_mask */
1095 FALSE), /* pcrel_offset */
1096
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS, /* type */
1099 0, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xfffc, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1114 0, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1116 16, /* bitsize */
1117 FALSE, /* pc_relative */
1118 0, /* bitpos */
1119 complain_overflow_dont, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE, /* partial_inplace */
1123 0, /* src_mask */
1124 0xfffc, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1126
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1130 0, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_signed, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_dont, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xfffc, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Marker reloc for TLS. */
1160 HOWTO (R_PPC64_TLS,
1161 0, /* rightshift */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1163 32, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 bfd_elf_generic_reloc, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64,
1177 0, /* rightshift */
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1179 64, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 ONES (64), /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64,
1194 0, /* rightshift */
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1196 64, /* bitsize */
1197 FALSE, /* pc_relative */
1198 0, /* bitpos */
1199 complain_overflow_dont, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE, /* partial_inplace */
1203 0, /* src_mask */
1204 ONES (64), /* dst_mask */
1205 FALSE), /* pcrel_offset */
1206
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16,
1209 0, /* rightshift */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1211 16, /* bitsize */
1212 FALSE, /* pc_relative */
1213 0, /* bitpos */
1214 complain_overflow_signed, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE, /* partial_inplace */
1218 0, /* src_mask */
1219 0xffff, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1221
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO,
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xffff, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1241 16, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0xffff, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1256 16, /* bitsize */
1257 FALSE, /* pc_relative */
1258 0, /* bitpos */
1259 complain_overflow_dont, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE, /* partial_inplace */
1263 0, /* src_mask */
1264 0xffff, /* dst_mask */
1265 FALSE), /* pcrel_offset */
1266
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 16, /* bitsize */
1272 FALSE, /* pc_relative */
1273 0, /* bitpos */
1274 complain_overflow_dont, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE, /* partial_inplace */
1278 0, /* src_mask */
1279 0xffff, /* dst_mask */
1280 FALSE), /* pcrel_offset */
1281
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xffff, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1301 16, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0xffff, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS,
1329 0, /* rightshift */
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1331 16, /* bitsize */
1332 FALSE, /* pc_relative */
1333 0, /* bitpos */
1334 complain_overflow_signed, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE, /* partial_inplace */
1338 0, /* src_mask */
1339 0xfffc, /* dst_mask */
1340 FALSE), /* pcrel_offset */
1341
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS,
1344 0, /* rightshift */
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1346 16, /* bitsize */
1347 FALSE, /* pc_relative */
1348 0, /* bitpos */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE, /* partial_inplace */
1353 0, /* src_mask */
1354 0xfffc, /* dst_mask */
1355 FALSE), /* pcrel_offset */
1356
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64,
1360 0, /* rightshift */
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1362 64, /* bitsize */
1363 FALSE, /* pc_relative */
1364 0, /* bitpos */
1365 complain_overflow_dont, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE, /* partial_inplace */
1369 0, /* src_mask */
1370 ONES (64), /* dst_mask */
1371 FALSE), /* pcrel_offset */
1372
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16,
1375 0, /* rightshift */
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1377 16, /* bitsize */
1378 FALSE, /* pc_relative */
1379 0, /* bitpos */
1380 complain_overflow_signed, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE, /* partial_inplace */
1384 0, /* src_mask */
1385 0xffff, /* dst_mask */
1386 FALSE), /* pcrel_offset */
1387
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO,
1390 0, /* rightshift */
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1392 16, /* bitsize */
1393 FALSE, /* pc_relative */
1394 0, /* bitpos */
1395 complain_overflow_dont, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE, /* partial_inplace */
1399 0, /* src_mask */
1400 0xffff, /* dst_mask */
1401 FALSE), /* pcrel_offset */
1402
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1407 16, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 0xffff, /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_dont, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
1455 complain_overflow_dont, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
1470 complain_overflow_dont, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS,
1495 0, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_signed, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xfffc, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS,
1510 0, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xfffc, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16,
1527 0, /* rightshift */
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1529 16, /* bitsize */
1530 FALSE, /* pc_relative */
1531 0, /* bitpos */
1532 complain_overflow_signed, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
1535 FALSE, /* partial_inplace */
1536 0, /* src_mask */
1537 0xffff, /* dst_mask */
1538 FALSE), /* pcrel_offset */
1539
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1542 0, /* rightshift */
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1544 16, /* bitsize */
1545 FALSE, /* pc_relative */
1546 0, /* bitpos */
1547 complain_overflow_dont, /* complain_on_overflow */
1548 ppc64_elf_unhandled_reloc, /* special_function */
1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
1550 FALSE, /* partial_inplace */
1551 0, /* src_mask */
1552 0xffff, /* dst_mask */
1553 FALSE), /* pcrel_offset */
1554
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1559 16, /* bitsize */
1560 FALSE, /* pc_relative */
1561 0, /* bitpos */
1562 complain_overflow_dont, /* complain_on_overflow */
1563 ppc64_elf_unhandled_reloc, /* special_function */
1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
1565 FALSE, /* partial_inplace */
1566 0, /* src_mask */
1567 0xffff, /* dst_mask */
1568 FALSE), /* pcrel_offset */
1569
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1574 16, /* bitsize */
1575 FALSE, /* pc_relative */
1576 0, /* bitpos */
1577 complain_overflow_dont, /* complain_on_overflow */
1578 ppc64_elf_unhandled_reloc, /* special_function */
1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
1580 FALSE, /* partial_inplace */
1581 0, /* src_mask */
1582 0xffff, /* dst_mask */
1583 FALSE), /* pcrel_offset */
1584
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16,
1589 0, /* rightshift */
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1591 16, /* bitsize */
1592 FALSE, /* pc_relative */
1593 0, /* bitpos */
1594 complain_overflow_signed, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
1597 FALSE, /* partial_inplace */
1598 0, /* src_mask */
1599 0xffff, /* dst_mask */
1600 FALSE), /* pcrel_offset */
1601
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1604 0, /* rightshift */
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1606 16, /* bitsize */
1607 FALSE, /* pc_relative */
1608 0, /* bitpos */
1609 complain_overflow_dont, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
1612 FALSE, /* partial_inplace */
1613 0, /* src_mask */
1614 0xffff, /* dst_mask */
1615 FALSE), /* pcrel_offset */
1616
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1619 16, /* rightshift */
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1621 16, /* bitsize */
1622 FALSE, /* pc_relative */
1623 0, /* bitpos */
1624 complain_overflow_dont, /* complain_on_overflow */
1625 ppc64_elf_unhandled_reloc, /* special_function */
1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
1627 FALSE, /* partial_inplace */
1628 0, /* src_mask */
1629 0xffff, /* dst_mask */
1630 FALSE), /* pcrel_offset */
1631
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1634 16, /* rightshift */
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1636 16, /* bitsize */
1637 FALSE, /* pc_relative */
1638 0, /* bitpos */
1639 complain_overflow_dont, /* complain_on_overflow */
1640 ppc64_elf_unhandled_reloc, /* special_function */
1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
1642 FALSE, /* partial_inplace */
1643 0, /* src_mask */
1644 0xffff, /* dst_mask */
1645 FALSE), /* pcrel_offset */
1646
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1650 0, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
1655 complain_overflow_signed, /* complain_on_overflow */
1656 ppc64_elf_unhandled_reloc, /* special_function */
1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 0xfffc, /* dst_mask */
1661 FALSE), /* pcrel_offset */
1662
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1665 0, /* rightshift */
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
1675 0xfffc, /* dst_mask */
1676 FALSE), /* pcrel_offset */
1677
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1680 16, /* rightshift */
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc64_elf_unhandled_reloc, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0xffff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS,
1711 0, /* rightshift */
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1713 16, /* bitsize */
1714 FALSE, /* pc_relative */
1715 0, /* bitpos */
1716 complain_overflow_signed, /* complain_on_overflow */
1717 ppc64_elf_unhandled_reloc, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
1719 FALSE, /* partial_inplace */
1720 0, /* src_mask */
1721 0xffff, /* dst_mask */
1722 FALSE), /* pcrel_offset */
1723
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1726 0, /* rightshift */
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1728 16, /* bitsize */
1729 FALSE, /* pc_relative */
1730 0, /* bitpos */
1731 complain_overflow_dont, /* complain_on_overflow */
1732 ppc64_elf_unhandled_reloc, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1734 FALSE, /* partial_inplace */
1735 0, /* src_mask */
1736 0xffff, /* dst_mask */
1737 FALSE), /* pcrel_offset */
1738
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI,
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
1744 FALSE, /* pc_relative */
1745 0, /* bitpos */
1746 complain_overflow_dont, /* complain_on_overflow */
1747 ppc64_elf_unhandled_reloc, /* special_function */
1748 "R_PPC64_GOT_TPREL16_HI", /* name */
1749 FALSE, /* partial_inplace */
1750 0, /* src_mask */
1751 0xffff, /* dst_mask */
1752 FALSE), /* pcrel_offset */
1753
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA,
1756 16, /* rightshift */
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
1759 FALSE, /* pc_relative */
1760 0, /* bitpos */
1761 complain_overflow_dont, /* complain_on_overflow */
1762 ppc64_elf_unhandled_reloc, /* special_function */
1763 "R_PPC64_GOT_TPREL16_HA", /* name */
1764 FALSE, /* partial_inplace */
1765 0, /* src_mask */
1766 0xffff, /* dst_mask */
1767 FALSE), /* pcrel_offset */
1768
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1771 0, /* rightshift */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1773 0, /* bitsize */
1774 FALSE, /* pc_relative */
1775 0, /* bitpos */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 NULL, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
1779 FALSE, /* partial_inplace */
1780 0, /* src_mask */
1781 0, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1783
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
1789 FALSE, /* pc_relative */
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
1794 FALSE, /* partial_inplace */
1795 0, /* src_mask */
1796 0, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1798};
1799
1800\f
1801/* Initialize the ppc64_elf_howto_table, so that linear accesses can
1802 be done. */
1803
1804static void
1805ppc_howto_init ()
1806{
1807 unsigned int i, type;
1808
1809 for (i = 0;
1810 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1811 i++)
1812 {
1813 type = ppc64_elf_howto_raw[i].type;
1814 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1815 / sizeof (ppc64_elf_howto_table[0])));
1816 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1817 }
1818}
1819
1820static reloc_howto_type *
1821ppc64_elf_reloc_type_lookup (abfd, code)
1822 bfd *abfd ATTRIBUTE_UNUSED;
1823 bfd_reloc_code_real_type code;
1824{
1825 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1826
1827 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1828 /* Initialize howto table if needed. */
1829 ppc_howto_init ();
1830
1831 switch ((int) code)
1832 {
1833 default:
1834 return (reloc_howto_type *) NULL;
1835
1836 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1837 break;
1838 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1839 break;
1840 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1841 break;
1842 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1843 break;
1844 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1845 break;
1846 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1847 break;
1848 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1849 break;
1850 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1851 break;
1852 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1853 break;
1854 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1855 break;
1856 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1857 break;
1858 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1859 break;
1860 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1861 break;
1862 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1863 break;
1864 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1865 break;
1866 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1867 break;
1868 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1869 break;
1870 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1871 break;
1872 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1873 break;
1874 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1875 break;
1876 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1877 break;
1878 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1879 break;
1880 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1881 break;
1882 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1883 break;
1884 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1885 break;
1886 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1887 break;
1888 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1889 break;
1890 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1891 break;
1892 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1893 break;
1894 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1895 break;
1896 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1897 break;
1898 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1899 break;
1900 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1901 break;
1902 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1903 break;
1904 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1905 break;
1906 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1907 break;
1908 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1909 break;
1910 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1911 break;
1912 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1913 break;
1914 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1915 break;
1916 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1917 break;
1918 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1919 break;
1920 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1921 break;
1922 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1923 break;
1924 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1925 break;
1926 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1927 break;
1928 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1929 break;
1930 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1931 break;
1932 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1933 break;
1934 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1935 break;
1936 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1937 break;
1938 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1939 break;
1940 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1941 break;
1942 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1943 break;
1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1945 break;
1946 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1947 break;
1948 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1949 break;
1950 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1951 break;
1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1953 break;
1954 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1955 break;
1956 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1957 break;
1958 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1959 break;
1960 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1961 break;
1962 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1963 break;
1964 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1965 break;
1966 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1967 break;
1968 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1969 break;
1970 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1971 break;
1972 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1973 break;
1974 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1975 break;
1976 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1977 break;
1978 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1979 break;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1981 break;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1983 break;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1985 break;
1986 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1987 break;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1989 break;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1991 break;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1993 break;
1994 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1995 break;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1997 break;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1999 break;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2001 break;
2002 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2003 break;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2005 break;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2007 break;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2009 break;
2010 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2011 break;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2013 break;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2015 break;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2017 break;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2019 break;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2021 break;
2022 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2023 break;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2025 break;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2027 break;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2029 break;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2031 break;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2033 break;
2034 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2035 break;
2036 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2037 break;
2038 }
2039
2040 return ppc64_elf_howto_table[(int) r];
2041};
2042
2043/* Set the howto pointer for a PowerPC ELF reloc. */
2044
2045static void
2046ppc64_elf_info_to_howto (abfd, cache_ptr, dst)
2047 bfd *abfd ATTRIBUTE_UNUSED;
2048 arelent *cache_ptr;
2049 Elf_Internal_Rela *dst;
2050{
2051 unsigned int type;
2052
2053 /* Initialize howto table if needed. */
2054 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2055 ppc_howto_init ();
2056
2057 type = ELF64_R_TYPE (dst->r_info);
2058 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2059 / sizeof (ppc64_elf_howto_table[0])));
2060 cache_ptr->howto = ppc64_elf_howto_table[type];
2061}
2062
2063/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2064
2065static bfd_reloc_status_type
2066ppc64_elf_ha_reloc (abfd, reloc_entry, symbol, data,
2067 input_section, output_bfd, error_message)
2068 bfd *abfd;
2069 arelent *reloc_entry;
2070 asymbol *symbol;
2071 PTR data;
2072 asection *input_section;
2073 bfd *output_bfd;
2074 char **error_message;
2075{
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2078 link time. */
2079 if (output_bfd != NULL)
2080 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2081 input_section, output_bfd, error_message);
2082
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2085 doesn't matter. */
2086 reloc_entry->addend += 0x8000;
2087 return bfd_reloc_continue;
2088}
2089
2090static bfd_reloc_status_type
2091ppc64_elf_brtaken_reloc (abfd, reloc_entry, symbol, data,
2092 input_section, output_bfd, error_message)
2093 bfd *abfd;
2094 arelent *reloc_entry;
2095 asymbol *symbol;
2096 PTR data;
2097 asection *input_section;
2098 bfd *output_bfd;
2099 char **error_message;
2100{
2101 long insn;
2102 enum elf_ppc64_reloc_type r_type;
2103 bfd_size_type octets;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2105 bfd_boolean is_power4 = FALSE;
2106
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
2110 if (output_bfd != NULL)
2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2112 input_section, output_bfd, error_message);
2113
2114 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2115 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2116 insn &= ~(0x01 << 21);
2117 r_type = (enum elf_ppc64_reloc_type) reloc_entry->howto->type;
2118 if (r_type == R_PPC64_ADDR14_BRTAKEN
2119 || r_type == R_PPC64_REL14_BRTAKEN)
2120 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2121
2122 if (is_power4)
2123 {
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn & (0x14 << 21)) == (0x04 << 21))
2128 insn |= 0x02 << 21;
2129 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2130 insn |= 0x08 << 21;
2131 else
2132 return bfd_reloc_continue;
2133 }
2134 else
2135 {
2136 bfd_vma target = 0;
2137 bfd_vma from;
2138
2139 if (!bfd_is_com_section (symbol->section))
2140 target = symbol->value;
2141 target += symbol->section->output_section->vma;
2142 target += symbol->section->output_offset;
2143 target += reloc_entry->addend;
2144
2145 from = (reloc_entry->address
2146 + input_section->output_offset
2147 + input_section->output_section->vma);
2148
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma) (target - from) < 0)
2151 insn ^= 0x01 << 21;
2152 }
2153 bfd_put_32 (abfd, (bfd_vma) insn, (bfd_byte *) data + octets);
2154 return bfd_reloc_continue;
2155}
2156
2157static bfd_reloc_status_type
2158ppc64_elf_sectoff_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message)
2160 bfd *abfd;
2161 arelent *reloc_entry;
2162 asymbol *symbol;
2163 PTR data;
2164 asection *input_section;
2165 bfd *output_bfd;
2166 char **error_message;
2167{
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2170 link time. */
2171 if (output_bfd != NULL)
2172 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2173 input_section, output_bfd, error_message);
2174
2175 /* Subtract the symbol section base address. */
2176 reloc_entry->addend -= symbol->section->output_section->vma;
2177 return bfd_reloc_continue;
2178}
2179
2180static bfd_reloc_status_type
2181ppc64_elf_sectoff_ha_reloc (abfd, reloc_entry, symbol, data,
2182 input_section, output_bfd, error_message)
2183 bfd *abfd;
2184 arelent *reloc_entry;
2185 asymbol *symbol;
2186 PTR data;
2187 asection *input_section;
2188 bfd *output_bfd;
2189 char **error_message;
2190{
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2193 link time. */
2194 if (output_bfd != NULL)
2195 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2196 input_section, output_bfd, error_message);
2197
2198 /* Subtract the symbol section base address. */
2199 reloc_entry->addend -= symbol->section->output_section->vma;
2200
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry->addend += 0x8000;
2203 return bfd_reloc_continue;
2204}
2205
2206static bfd_reloc_status_type
2207ppc64_elf_toc_reloc (abfd, reloc_entry, symbol, data,
2208 input_section, output_bfd, error_message)
2209 bfd *abfd;
2210 arelent *reloc_entry;
2211 asymbol *symbol;
2212 PTR data;
2213 asection *input_section;
2214 bfd *output_bfd;
2215 char **error_message;
2216{
2217 bfd_vma TOCstart;
2218
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2221 link time. */
2222 if (output_bfd != NULL)
2223 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2224 input_section, output_bfd, error_message);
2225
2226 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2227 if (TOCstart == 0)
2228 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2229
2230 /* Subtract the TOC base address. */
2231 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2232 return bfd_reloc_continue;
2233}
2234
2235static bfd_reloc_status_type
2236ppc64_elf_toc_ha_reloc (abfd, reloc_entry, symbol, data,
2237 input_section, output_bfd, error_message)
2238 bfd *abfd;
2239 arelent *reloc_entry;
2240 asymbol *symbol;
2241 PTR data;
2242 asection *input_section;
2243 bfd *output_bfd;
2244 char **error_message;
2245{
2246 bfd_vma TOCstart;
2247
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2250 link time. */
2251 if (output_bfd != NULL)
2252 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2253 input_section, output_bfd, error_message);
2254
2255 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2256 if (TOCstart == 0)
2257 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2258
2259 /* Subtract the TOC base address. */
2260 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2261
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry->addend += 0x8000;
2264 return bfd_reloc_continue;
2265}
2266
2267static bfd_reloc_status_type
2268ppc64_elf_toc64_reloc (abfd, reloc_entry, symbol, data,
2269 input_section, output_bfd, error_message)
2270 bfd *abfd;
2271 arelent *reloc_entry;
2272 asymbol *symbol;
2273 PTR data;
2274 asection *input_section;
2275 bfd *output_bfd;
2276 char **error_message;
2277{
2278 bfd_vma TOCstart;
2279 bfd_size_type octets;
2280
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2283 link time. */
2284 if (output_bfd != NULL)
2285 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2286 input_section, output_bfd, error_message);
2287
2288 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2289 if (TOCstart == 0)
2290 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2291
2292 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2293 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2294 return bfd_reloc_ok;
2295}
2296
2297static bfd_reloc_status_type
2298ppc64_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2299 input_section, output_bfd, error_message)
2300 bfd *abfd;
2301 arelent *reloc_entry;
2302 asymbol *symbol;
2303 PTR data;
2304 asection *input_section;
2305 bfd *output_bfd;
2306 char **error_message;
2307{
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2310 link time. */
2311 if (output_bfd != NULL)
2312 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2313 input_section, output_bfd, error_message);
2314
2315 if (error_message != NULL)
2316 {
2317 static char buf[60];
2318 sprintf (buf, "generic linker can't handle %s",
2319 reloc_entry->howto->name);
2320 *error_message = buf;
2321 }
2322 return bfd_reloc_dangerous;
2323}
2324
2325/* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2327
2328static bfd_boolean
2329ppc64_elf_object_p (abfd)
2330 bfd *abfd;
2331{
2332 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2333 {
2334 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2335
2336 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2337 {
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd->arch_info = abfd->arch_info->next;
2340 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2341 }
2342 }
2343 return TRUE;
2344}
2345
2346/* Merge backend specific data from an object file to the output
2347 object file when linking. */
2348
2349static bfd_boolean
2350ppc64_elf_merge_private_bfd_data (ibfd, obfd)
2351 bfd *ibfd;
2352 bfd *obfd;
2353{
2354 /* Check if we have the same endianess. */
2355 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
2356 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
2357 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2358 {
2359 const char *msg;
2360
2361 if (bfd_big_endian (ibfd))
2362 msg = _("%s: compiled for a big endian system and target is little endian");
2363 else
2364 msg = _("%s: compiled for a little endian system and target is big endian");
2365
2366 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
2367
2368 bfd_set_error (bfd_error_wrong_format);
2369 return FALSE;
2370 }
2371
2372 return TRUE;
2373}
2374
2375struct _ppc64_elf_section_data
2376{
2377 struct bfd_elf_section_data elf;
2378
2379 /* An array with one entry for each opd function descriptor. */
2380 union
2381 {
2382 /* Points to the function code section for local opd entries. */
2383 asection **func_sec;
2384 /* After editing .opd, adjust references to opd local syms. */
2385 long *adjust;
2386 } opd;
2387
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2390 unsigned *t_symndx;
2391};
2392
2393#define ppc64_elf_section_data(sec) \
2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2395
2396static bfd_boolean
2397ppc64_elf_new_section_hook (abfd, sec)
2398 bfd *abfd;
2399 asection *sec;
2400{
2401 struct _ppc64_elf_section_data *sdata;
2402 bfd_size_type amt = sizeof (*sdata);
2403
2404 sdata = (struct _ppc64_elf_section_data *) bfd_zalloc (abfd, amt);
2405 if (sdata == NULL)
2406 return FALSE;
2407 sec->used_by_bfd = (PTR) sdata;
2408
2409 return _bfd_elf_new_section_hook (abfd, sec);
2410}
2411\f
2412/* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
2418 called.
2419
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2423
2424 . .text
2425 . x:
2426 . bl .foo
2427 . nop
2428
2429 The function definition in another object file might be:
2430
2431 . .section .opd
2432 . foo: .quad .foo
2433 . .quad .TOC.@tocbase
2434 . .quad 0
2435 .
2436 . .text
2437 . .foo: blr
2438
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2444
2445 . x:
2446 . bl .foo_stub
2447 . ld 2,40(1)
2448 .
2449 .
2450 . .foo_stub:
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
2453 . std 2,40(1) # this is the general idea
2454 . ld 11,0(12)
2455 . ld 2,8(12)
2456 . mtctr 11
2457 . ld 11,16(12)
2458 . bctr
2459 .
2460 . .section .plt
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2462
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2465 copying.
2466
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
2478 definition from some other object, eg. a static library. */
2479
2480/* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2485
2486struct ppc_dyn_relocs
2487{
2488 struct ppc_dyn_relocs *next;
2489
2490 /* The input section of the reloc. */
2491 asection *sec;
2492
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count;
2495
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count;
2498};
2499
2500/* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2502struct got_entry
2503{
2504 struct got_entry *next;
2505
2506 /* The symbol addend that we'll be placing in the GOT. */
2507 bfd_vma addend;
2508
2509 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2510 union
2511 {
2512 bfd_signed_vma refcount;
2513 bfd_vma offset;
2514 } got;
2515
2516 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2517 TLS_TPREL or TLS_DTPREL for tls entries. */
2518 char tls_type;
2519};
2520
2521/* The same for PLT. */
2522struct plt_entry
2523{
2524 struct plt_entry *next;
2525
2526 bfd_vma addend;
2527
2528 union
2529 {
2530 bfd_signed_vma refcount;
2531 bfd_vma offset;
2532 } plt;
2533};
2534
2535/* Of those relocs that might be copied as dynamic relocs, this macro
2536 selects those that must be copied when linking a shared library. */
2537
2538#define MUST_BE_DYN_RELOC(RTYPE) \
2539 ((RTYPE) != R_PPC64_REL32 \
2540 && (RTYPE) != R_PPC64_REL64 \
2541 && (RTYPE) != R_PPC64_REL30)
2542
2543/* Section name for stubs is the associated section name plus this
2544 string. */
2545#define STUB_SUFFIX ".stub"
2546
2547/* Linker stubs.
2548 ppc_stub_long_branch:
2549 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2550 destination, but a 24 bit branch in a stub section will reach.
2551 . b dest
2552
2553 ppc_stub_plt_branch:
2554 Similar to the above, but a 24 bit branch in the stub section won't
2555 reach its destination.
2556 . addis %r12,%r2,xxx@toc@ha
2557 . ld %r11,xxx@toc@l(%r12)
2558 . mtctr %r11
2559 . bctr
2560
2561 ppc_stub_plt_call:
2562 Used to call a function in a shared library.
2563 . addis %r12,%r2,xxx@toc@ha
2564 . std %r2,40(%r1)
2565 . ld %r11,xxx+0@toc@l(%r12)
2566 . ld %r2,xxx+8@toc@l(%r12)
2567 . mtctr %r11
2568 . ld %r11,xxx+16@toc@l(%r12)
2569 . bctr
2570*/
2571
2572enum ppc_stub_type {
2573 ppc_stub_none,
2574 ppc_stub_long_branch,
2575 ppc_stub_plt_branch,
2576 ppc_stub_plt_call
2577};
2578
2579struct ppc_stub_hash_entry {
2580
2581 /* Base hash table entry structure. */
2582 struct bfd_hash_entry root;
2583
2584 /* The stub section. */
2585 asection *stub_sec;
2586
2587 /* Offset within stub_sec of the beginning of this stub. */
2588 bfd_vma stub_offset;
2589
2590 /* Given the symbol's value and its section we can determine its final
2591 value when building the stubs (so the stub knows where to jump. */
2592 bfd_vma target_value;
2593 asection *target_section;
2594
2595 enum ppc_stub_type stub_type;
2596
2597 /* The symbol table entry, if any, that this was derived from. */
2598 struct ppc_link_hash_entry *h;
2599
2600 /* And the reloc addend that this was derived from. */
2601 bfd_vma addend;
2602
2603 /* Where this stub is being called from, or, in the case of combined
2604 stub sections, the first input section in the group. */
2605 asection *id_sec;
2606};
2607
2608struct ppc_branch_hash_entry {
2609
2610 /* Base hash table entry structure. */
2611 struct bfd_hash_entry root;
2612
2613 /* Offset within .branch_lt. */
2614 unsigned int offset;
2615
2616 /* Generation marker. */
2617 unsigned int iter;
2618};
2619
2620struct ppc_link_hash_entry
2621{
2622 struct elf_link_hash_entry elf;
2623
2624 /* A pointer to the most recently used stub hash entry against this
2625 symbol. */
2626 struct ppc_stub_hash_entry *stub_cache;
2627
2628 /* Track dynamic relocs copied for this symbol. */
2629 struct ppc_dyn_relocs *dyn_relocs;
2630
2631 /* Link between function code and descriptor symbols. */
2632 struct elf_link_hash_entry *oh;
2633
2634 /* Flag function code and descriptor symbols. */
2635 unsigned int is_func:1;
2636 unsigned int is_func_descriptor:1;
2637 unsigned int is_entry:1;
2638
2639 /* Contexts in which symbol is used in the GOT (or TOC).
2640 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
2641 corresponding relocs are encountered during check_relocs.
2642 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2643 indicate the corresponding GOT entry type is not needed.
2644 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
2645 a TPREL one. We use a separate flag rather than setting TPREL
2646 just for convenience in distinguishing the two cases. */
2647#define TLS_GD 1 /* GD reloc. */
2648#define TLS_LD 2 /* LD reloc. */
2649#define TLS_TPREL 4 /* TPREL reloc, => IE. */
2650#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2651#define TLS_TLS 16 /* Any TLS reloc. */
2652#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
2653#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
2654 char tls_mask;
2655};
2656
2657/* ppc64 ELF linker hash table. */
2658
2659struct ppc_link_hash_table
2660{
2661 struct elf_link_hash_table elf;
2662
2663 /* The stub hash table. */
2664 struct bfd_hash_table stub_hash_table;
2665
2666 /* Another hash table for plt_branch stubs. */
2667 struct bfd_hash_table branch_hash_table;
2668
2669 /* Linker stub bfd. */
2670 bfd *stub_bfd;
2671
2672 /* Linker call-backs. */
2673 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2674 void (*layout_sections_again) PARAMS ((void));
2675
2676 /* Array to keep track of which stub sections have been created, and
2677 information on stub grouping. */
2678 struct map_stub {
2679 /* This is the section to which stubs in the group will be attached. */
2680 asection *link_sec;
2681 /* The stub section. */
2682 asection *stub_sec;
2683 } *stub_group;
2684
2685 /* Assorted information used by ppc64_elf_size_stubs. */
2686 int top_index;
2687 asection **input_list;
2688
2689 /* Short-cuts to get to dynamic linker sections. */
2690 asection *sgot;
2691 asection *srelgot;
2692 asection *splt;
2693 asection *srelplt;
2694 asection *sdynbss;
2695 asection *srelbss;
2696 asection *sglink;
2697 asection *sfpr;
2698 asection *sbrlt;
2699 asection *srelbrlt;
2700
2701 /* Short-cut to first output tls section. */
2702 asection *tls_sec;
2703
2704 /* Shortcut to .__tls_get_addr. */
2705 struct elf_link_hash_entry *tls_get_addr;
2706
2707 /* TLS local dynamic got entry handling. */
2708 union {
2709 bfd_signed_vma refcount;
2710 bfd_vma offset;
2711 } tlsld_got;
2712
2713 /* Set on error. */
2714 unsigned int stub_error;
2715
2716 /* Flag set when small branches are detected. Used to
2717 select suitable defaults for the stub group size. */
2718 unsigned int has_14bit_branch;
2719
2720 /* Set if we detect a reference undefined weak symbol. */
2721 unsigned int have_undefweak;
2722
2723 /* Incremented every time we size stubs. */
2724 unsigned int stub_iteration;
2725
2726 /* Small local sym to section mapping cache. */
2727 struct sym_sec_cache sym_sec;
2728};
2729
2730static struct bfd_hash_entry *stub_hash_newfunc
2731 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2732static struct bfd_hash_entry *branch_hash_newfunc
2733 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2734static struct bfd_hash_entry *link_hash_newfunc
2735 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2736static struct bfd_link_hash_table *ppc64_elf_link_hash_table_create
2737 PARAMS ((bfd *));
2738static void ppc64_elf_link_hash_table_free
2739 PARAMS ((struct bfd_link_hash_table *));
2740static char *ppc_stub_name
2741 PARAMS ((const asection *, const asection *,
2742 const struct ppc_link_hash_entry *, const Elf_Internal_Rela *));
2743static struct ppc_stub_hash_entry *ppc_get_stub_entry
2744 PARAMS ((const asection *, const asection *, struct elf_link_hash_entry *,
2745 const Elf_Internal_Rela *, struct ppc_link_hash_table *));
2746static struct ppc_stub_hash_entry *ppc_add_stub
2747 PARAMS ((const char *, asection *, struct ppc_link_hash_table *));
2748static bfd_boolean create_linkage_sections
2749 PARAMS ((bfd *, struct bfd_link_info *));
2750static bfd_boolean create_got_section
2751 PARAMS ((bfd *, struct bfd_link_info *));
2752static bfd_boolean ppc64_elf_create_dynamic_sections
2753 PARAMS ((bfd *, struct bfd_link_info *));
2754static void ppc64_elf_copy_indirect_symbol
2755 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
2756 struct elf_link_hash_entry *));
2757static bfd_boolean update_local_sym_info
2758 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, bfd_vma, int));
2759static bfd_boolean update_plt_info
2760 PARAMS ((bfd *, struct ppc_link_hash_entry *, bfd_vma));
2761static bfd_boolean ppc64_elf_check_relocs
2762 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2763 const Elf_Internal_Rela *));
2764static asection * ppc64_elf_gc_mark_hook
2765 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
2766 struct elf_link_hash_entry *, Elf_Internal_Sym *));
2767static bfd_boolean ppc64_elf_gc_sweep_hook
2768 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2769 const Elf_Internal_Rela *));
2770static bfd_boolean func_desc_adjust
2771 PARAMS ((struct elf_link_hash_entry *, PTR));
2772static bfd_boolean ppc64_elf_func_desc_adjust
2773 PARAMS ((bfd *, struct bfd_link_info *));
2774static bfd_boolean ppc64_elf_adjust_dynamic_symbol
2775 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
2776static void ppc64_elf_hide_symbol
2777 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
2778static bfd_boolean get_sym_h
2779 PARAMS ((struct elf_link_hash_entry **, Elf_Internal_Sym **, asection **,
2780 char **, Elf_Internal_Sym **, unsigned long, bfd *));
2781static int get_tls_mask
2782 PARAMS ((char **, Elf_Internal_Sym **, const Elf_Internal_Rela *, bfd *));
2783static bfd_boolean allocate_dynrelocs
2784 PARAMS ((struct elf_link_hash_entry *, PTR));
2785static bfd_boolean readonly_dynrelocs
2786 PARAMS ((struct elf_link_hash_entry *, PTR));
2787static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2788 PARAMS ((const Elf_Internal_Rela *));
2789static bfd_boolean ppc64_elf_size_dynamic_sections
2790 PARAMS ((bfd *, struct bfd_link_info *));
2791static enum ppc_stub_type ppc_type_of_stub
2792 PARAMS ((asection *, const Elf_Internal_Rela *,
2793 struct ppc_link_hash_entry **, bfd_vma));
2794static bfd_byte *build_plt_stub
2795 PARAMS ((bfd *, bfd_byte *, int, int));
2796static bfd_boolean ppc_build_one_stub
2797 PARAMS ((struct bfd_hash_entry *, PTR));
2798static bfd_boolean ppc_size_one_stub
2799 PARAMS ((struct bfd_hash_entry *, PTR));
2800static void group_sections
2801 PARAMS ((struct ppc_link_hash_table *, bfd_size_type, bfd_boolean));
2802static bfd_boolean ppc64_elf_relocate_section
2803 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
2804 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
2805 asection **));
2806static bfd_boolean ppc64_elf_finish_dynamic_symbol
2807 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
2808 Elf_Internal_Sym *));
2809static bfd_boolean ppc64_elf_finish_dynamic_sections
2810 PARAMS ((bfd *, struct bfd_link_info *));
2811
2812/* Get the ppc64 ELF linker hash table from a link_info structure. */
2813
2814#define ppc_hash_table(p) \
2815 ((struct ppc_link_hash_table *) ((p)->hash))
2816
2817#define ppc_stub_hash_lookup(table, string, create, copy) \
2818 ((struct ppc_stub_hash_entry *) \
2819 bfd_hash_lookup ((table), (string), (create), (copy)))
2820
2821#define ppc_branch_hash_lookup(table, string, create, copy) \
2822 ((struct ppc_branch_hash_entry *) \
2823 bfd_hash_lookup ((table), (string), (create), (copy)))
2824
2825/* Create an entry in the stub hash table. */
2826
2827static struct bfd_hash_entry *
2828stub_hash_newfunc (entry, table, string)
2829 struct bfd_hash_entry *entry;
2830 struct bfd_hash_table *table;
2831 const char *string;
2832{
2833 /* Allocate the structure if it has not already been allocated by a
2834 subclass. */
2835 if (entry == NULL)
2836 {
2837 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2838 if (entry == NULL)
2839 return entry;
2840 }
2841
2842 /* Call the allocation method of the superclass. */
2843 entry = bfd_hash_newfunc (entry, table, string);
2844 if (entry != NULL)
2845 {
2846 struct ppc_stub_hash_entry *eh;
2847
2848 /* Initialize the local fields. */
2849 eh = (struct ppc_stub_hash_entry *) entry;
2850 eh->stub_sec = NULL;
2851 eh->stub_offset = 0;
2852 eh->target_value = 0;
2853 eh->target_section = NULL;
2854 eh->stub_type = ppc_stub_none;
2855 eh->h = NULL;
2856 eh->id_sec = NULL;
2857 }
2858
2859 return entry;
2860}
2861
2862/* Create an entry in the branch hash table. */
2863
2864static struct bfd_hash_entry *
2865branch_hash_newfunc (entry, table, string)
2866 struct bfd_hash_entry *entry;
2867 struct bfd_hash_table *table;
2868 const char *string;
2869{
2870 /* Allocate the structure if it has not already been allocated by a
2871 subclass. */
2872 if (entry == NULL)
2873 {
2874 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2875 if (entry == NULL)
2876 return entry;
2877 }
2878
2879 /* Call the allocation method of the superclass. */
2880 entry = bfd_hash_newfunc (entry, table, string);
2881 if (entry != NULL)
2882 {
2883 struct ppc_branch_hash_entry *eh;
2884
2885 /* Initialize the local fields. */
2886 eh = (struct ppc_branch_hash_entry *) entry;
2887 eh->offset = 0;
2888 eh->iter = 0;
2889 }
2890
2891 return entry;
2892}
2893
2894/* Create an entry in a ppc64 ELF linker hash table. */
2895
2896static struct bfd_hash_entry *
2897link_hash_newfunc (entry, table, string)
2898 struct bfd_hash_entry *entry;
2899 struct bfd_hash_table *table;
2900 const char *string;
2901{
2902 /* Allocate the structure if it has not already been allocated by a
2903 subclass. */
2904 if (entry == NULL)
2905 {
2906 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2907 if (entry == NULL)
2908 return entry;
2909 }
2910
2911 /* Call the allocation method of the superclass. */
2912 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2913 if (entry != NULL)
2914 {
2915 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2916
2917 eh->stub_cache = NULL;
2918 eh->dyn_relocs = NULL;
2919 eh->oh = NULL;
2920 eh->is_func = 0;
2921 eh->is_func_descriptor = 0;
2922 eh->is_entry = 0;
2923 eh->tls_mask = 0;
2924 }
2925
2926 return entry;
2927}
2928
2929/* Create a ppc64 ELF linker hash table. */
2930
2931static struct bfd_link_hash_table *
2932ppc64_elf_link_hash_table_create (abfd)
2933 bfd *abfd;
2934{
2935 struct ppc_link_hash_table *htab;
2936 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
2937
2938 htab = (struct ppc_link_hash_table *) bfd_malloc (amt);
2939 if (htab == NULL)
2940 return NULL;
2941
2942 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
2943 {
2944 free (htab);
2945 return NULL;
2946 }
2947
2948 /* Init the stub hash table too. */
2949 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
2950 return NULL;
2951
2952 /* And the branch hash table. */
2953 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
2954 return NULL;
2955
2956 htab->stub_bfd = NULL;
2957 htab->add_stub_section = NULL;
2958 htab->layout_sections_again = NULL;
2959 htab->stub_group = NULL;
2960 htab->sgot = NULL;
2961 htab->srelgot = NULL;
2962 htab->splt = NULL;
2963 htab->srelplt = NULL;
2964 htab->sdynbss = NULL;
2965 htab->srelbss = NULL;
2966 htab->sglink = NULL;
2967 htab->sfpr = NULL;
2968 htab->sbrlt = NULL;
2969 htab->srelbrlt = NULL;
2970 htab->tls_sec = NULL;
2971 htab->tlsld_got.refcount = 0;
2972 htab->stub_error = 0;
2973 htab->has_14bit_branch = 0;
2974 htab->have_undefweak = 0;
2975 htab->stub_iteration = 0;
2976 htab->sym_sec.abfd = NULL;
2977 /* Initializing two fields of the union is just cosmetic. We really
2978 only care about glist, but when compiled on a 32-bit host the
2979 bfd_vma fields are larger. Setting the bfd_vma to zero makes
2980 debugger inspection of these fields look nicer. */
2981 htab->elf.init_refcount.refcount = 0;
2982 htab->elf.init_refcount.glist = NULL;
2983 htab->elf.init_offset.offset = 0;
2984 htab->elf.init_offset.glist = NULL;
2985
2986 return &htab->elf.root;
2987}
2988
2989/* Free the derived linker hash table. */
2990
2991static void
2992ppc64_elf_link_hash_table_free (hash)
2993 struct bfd_link_hash_table *hash;
2994{
2995 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
2996
2997 bfd_hash_table_free (&ret->stub_hash_table);
2998 bfd_hash_table_free (&ret->branch_hash_table);
2999 _bfd_generic_link_hash_table_free (hash);
3000}
3001
3002/* Build a name for an entry in the stub hash table. */
3003
3004static char *
3005ppc_stub_name (input_section, sym_sec, h, rel)
3006 const asection *input_section;
3007 const asection *sym_sec;
3008 const struct ppc_link_hash_entry *h;
3009 const Elf_Internal_Rela *rel;
3010{
3011 char *stub_name;
3012 bfd_size_type len;
3013
3014 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3015 offsets from a sym as a branch target? In fact, we could
3016 probably assume the addend is always zero. */
3017 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3018
3019 if (h)
3020 {
3021 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3022 stub_name = bfd_malloc (len);
3023 if (stub_name != NULL)
3024 {
3025 sprintf (stub_name, "%08x_%s+%x",
3026 input_section->id & 0xffffffff,
3027 h->elf.root.root.string,
3028 (int) rel->r_addend & 0xffffffff);
3029 }
3030 }
3031 else
3032 {
3033 len = 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3034 stub_name = bfd_malloc (len);
3035 if (stub_name != NULL)
3036 {
3037 sprintf (stub_name, "%08x_%x:%x+%x",
3038 input_section->id & 0xffffffff,
3039 sym_sec->id & 0xffffffff,
3040 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3041 (int) rel->r_addend & 0xffffffff);
3042 }
3043 }
3044 return stub_name;
3045}
3046
3047/* Look up an entry in the stub hash. Stub entries are cached because
3048 creating the stub name takes a bit of time. */
3049
3050static struct ppc_stub_hash_entry *
3051ppc_get_stub_entry (input_section, sym_sec, hash, rel, htab)
3052 const asection *input_section;
3053 const asection *sym_sec;
3054 struct elf_link_hash_entry *hash;
3055 const Elf_Internal_Rela *rel;
3056 struct ppc_link_hash_table *htab;
3057{
3058 struct ppc_stub_hash_entry *stub_entry;
3059 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3060 const asection *id_sec;
3061
3062 /* If this input section is part of a group of sections sharing one
3063 stub section, then use the id of the first section in the group.
3064 Stub names need to include a section id, as there may well be
3065 more than one stub used to reach say, printf, and we need to
3066 distinguish between them. */
3067 id_sec = htab->stub_group[input_section->id].link_sec;
3068
3069 if (h != NULL && h->stub_cache != NULL
3070 && h->stub_cache->h == h
3071 && h->stub_cache->id_sec == id_sec)
3072 {
3073 stub_entry = h->stub_cache;
3074 }
3075 else
3076 {
3077 char *stub_name;
3078
3079 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3080 if (stub_name == NULL)
3081 return NULL;
3082
3083 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3084 stub_name, FALSE, FALSE);
3085 if (h != NULL)
3086 h->stub_cache = stub_entry;
3087
3088 free (stub_name);
3089 }
3090
3091 return stub_entry;
3092}
3093
3094/* Add a new stub entry to the stub hash. Not all fields of the new
3095 stub entry are initialised. */
3096
3097static struct ppc_stub_hash_entry *
3098ppc_add_stub (stub_name, section, htab)
3099 const char *stub_name;
3100 asection *section;
3101 struct ppc_link_hash_table *htab;
3102{
3103 asection *link_sec;
3104 asection *stub_sec;
3105 struct ppc_stub_hash_entry *stub_entry;
3106
3107 link_sec = htab->stub_group[section->id].link_sec;
3108 stub_sec = htab->stub_group[section->id].stub_sec;
3109 if (stub_sec == NULL)
3110 {
3111 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3112 if (stub_sec == NULL)
3113 {
3114 size_t namelen;
3115 bfd_size_type len;
3116 char *s_name;
3117
3118 namelen = strlen (link_sec->name);
3119 len = namelen + sizeof (STUB_SUFFIX);
3120 s_name = bfd_alloc (htab->stub_bfd, len);
3121 if (s_name == NULL)
3122 return NULL;
3123
3124 memcpy (s_name, link_sec->name, namelen);
3125 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3126 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3127 if (stub_sec == NULL)
3128 return NULL;
3129 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3130 }
3131 htab->stub_group[section->id].stub_sec = stub_sec;
3132 }
3133
3134 /* Enter this entry into the linker stub hash table. */
3135 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3136 TRUE, FALSE);
3137 if (stub_entry == NULL)
3138 {
3139 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3140 bfd_archive_filename (section->owner),
3141 stub_name);
3142 return NULL;
3143 }
3144
3145 stub_entry->stub_sec = stub_sec;
3146 stub_entry->stub_offset = 0;
3147 stub_entry->id_sec = link_sec;
3148 return stub_entry;
3149}
3150
3151/* Create sections for linker generated code. */
3152
3153static bfd_boolean
3154create_linkage_sections (dynobj, info)
3155 bfd *dynobj;
3156 struct bfd_link_info *info;
3157{
3158 struct ppc_link_hash_table *htab;
3159 flagword flags;
3160
3161 htab = ppc_hash_table (info);
3162
3163 /* Create .sfpr for code to save and restore fp regs. */
3164 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3165 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3166 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
3167 if (htab->sfpr == NULL
3168 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3169 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
3170 return FALSE;
3171
3172 /* Create .glink for lazy dynamic linking support. */
3173 htab->sglink = bfd_make_section_anyway (dynobj, ".glink");
3174 if (htab->sglink == NULL
3175 || ! bfd_set_section_flags (dynobj, htab->sglink, flags)
3176 || ! bfd_set_section_alignment (dynobj, htab->sglink, 2))
3177 return FALSE;
3178
3179 /* Create .branch_lt for plt_branch stubs. */
3180 flags = (SEC_ALLOC | SEC_LOAD
3181 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3182 htab->sbrlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3183 if (htab->sbrlt == NULL
3184 || ! bfd_set_section_flags (dynobj, htab->sbrlt, flags)
3185 || ! bfd_set_section_alignment (dynobj, htab->sbrlt, 3))
3186 return FALSE;
3187
3188 if (info->shared)
3189 {
3190 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3191 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3192 htab->srelbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
3193 if (!htab->srelbrlt
3194 || ! bfd_set_section_flags (dynobj, htab->srelbrlt, flags)
3195 || ! bfd_set_section_alignment (dynobj, htab->srelbrlt, 3))
3196 return FALSE;
3197 }
3198 return TRUE;
3199}
3200
3201/* Create .got and .rela.got sections in DYNOBJ, and set up
3202 shortcuts to them in our hash table. */
3203
3204static bfd_boolean
3205create_got_section (dynobj, info)
3206 bfd *dynobj;
3207 struct bfd_link_info *info;
3208{
3209 struct ppc_link_hash_table *htab;
3210
3211 if (! _bfd_elf_create_got_section (dynobj, info))
3212 return FALSE;
3213
3214 htab = ppc_hash_table (info);
3215 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3216 if (!htab->sgot)
3217 abort ();
3218
3219 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3220 if (!htab->srelgot
3221 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3222 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3223 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3224 | SEC_READONLY))
3225 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
3226 return FALSE;
3227 return TRUE;
3228}
3229
3230/* Create the dynamic sections, and set up shortcuts. */
3231
3232static bfd_boolean
3233ppc64_elf_create_dynamic_sections (dynobj, info)
3234 bfd *dynobj;
3235 struct bfd_link_info *info;
3236{
3237 struct ppc_link_hash_table *htab;
3238
3239 htab = ppc_hash_table (info);
3240 if (!htab->sgot && !create_got_section (dynobj, info))
3241 return FALSE;
3242
3243 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
3244 return FALSE;
3245
3246 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
3247 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3248 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3249 if (!info->shared)
3250 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3251
3252 if (!htab->splt || !htab->srelplt || !htab->sdynbss
3253 || (!info->shared && !htab->srelbss))
3254 abort ();
3255
3256 return TRUE;
3257}
3258
3259/* Copy the extra info we tack onto an elf_link_hash_entry. */
3260
3261static void
3262ppc64_elf_copy_indirect_symbol (bed, dir, ind)
3263 struct elf_backend_data *bed ATTRIBUTE_UNUSED;
3264 struct elf_link_hash_entry *dir, *ind;
3265{
3266 struct ppc_link_hash_entry *edir, *eind;
3267
3268 edir = (struct ppc_link_hash_entry *) dir;
3269 eind = (struct ppc_link_hash_entry *) ind;
3270
3271 /* Copy over any dynamic relocs we may have on the indirect sym. */
3272 if (eind->dyn_relocs != NULL)
3273 {
3274 if (edir->dyn_relocs != NULL)
3275 {
3276 struct ppc_dyn_relocs **pp;
3277 struct ppc_dyn_relocs *p;
3278
3279 if (eind->elf.root.type == bfd_link_hash_indirect)
3280 abort ();
3281
3282 /* Add reloc counts against the weak sym to the strong sym
3283 list. Merge any entries against the same section. */
3284 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3285 {
3286 struct ppc_dyn_relocs *q;
3287
3288 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3289 if (q->sec == p->sec)
3290 {
3291 q->pc_count += p->pc_count;
3292 q->count += p->count;
3293 *pp = p->next;
3294 break;
3295 }
3296 if (q == NULL)
3297 pp = &p->next;
3298 }
3299 *pp = edir->dyn_relocs;
3300 }
3301
3302 edir->dyn_relocs = eind->dyn_relocs;
3303 eind->dyn_relocs = NULL;
3304 }
3305
3306 edir->is_func |= eind->is_func;
3307 edir->is_func_descriptor |= eind->is_func_descriptor;
3308 edir->is_entry |= eind->is_entry;
3309
3310 /* Copy down any references that we may have already seen to the
3311 symbol which just became indirect. */
3312 edir->elf.elf_link_hash_flags |=
3313 (eind->elf.elf_link_hash_flags
3314 & (ELF_LINK_HASH_REF_DYNAMIC
3315 | ELF_LINK_HASH_REF_REGULAR
3316 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3317 | ELF_LINK_NON_GOT_REF));
3318
3319 /* If we were called to copy over info for a weak sym, that's all. */
3320 if (eind->elf.root.type != bfd_link_hash_indirect)
3321 return;
3322
3323 /* Copy over got entries. */
3324 if (eind->elf.got.glist != NULL)
3325 {
3326 if (edir->elf.got.glist != NULL)
3327 {
3328 struct got_entry **entp;
3329 struct got_entry *ent;
3330
3331 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3332 {
3333 struct got_entry *dent;
3334
3335 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3336 if (dent->addend == ent->addend
3337 && dent->tls_type == ent->tls_type)
3338 {
3339 dent->got.refcount += ent->got.refcount;
3340 *entp = ent->next;
3341 break;
3342 }
3343 if (dent == NULL)
3344 entp = &ent->next;
3345 }
3346 *entp = edir->elf.got.glist;
3347 }
3348
3349 edir->elf.got.glist = eind->elf.got.glist;
3350 eind->elf.got.glist = NULL;
3351 }
3352
3353 /* And plt entries. */
3354 if (eind->elf.plt.plist != NULL)
3355 {
3356 if (edir->elf.plt.plist != NULL)
3357 {
3358 struct plt_entry **entp;
3359 struct plt_entry *ent;
3360
3361 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3362 {
3363 struct plt_entry *dent;
3364
3365 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3366 if (dent->addend == ent->addend)
3367 {
3368 dent->plt.refcount += ent->plt.refcount;
3369 *entp = ent->next;
3370 break;
3371 }
3372 if (dent == NULL)
3373 entp = &ent->next;
3374 }
3375 *entp = edir->elf.plt.plist;
3376 }
3377
3378 edir->elf.plt.plist = eind->elf.plt.plist;
3379 eind->elf.plt.plist = NULL;
3380 }
3381
3382 if (edir->elf.dynindx == -1)
3383 {
3384 edir->elf.dynindx = eind->elf.dynindx;
3385 edir->elf.dynstr_index = eind->elf.dynstr_index;
3386 eind->elf.dynindx = -1;
3387 eind->elf.dynstr_index = 0;
3388 }
3389 else
3390 BFD_ASSERT (eind->elf.dynindx == -1);
3391}
3392
3393/* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3394 symbols undefined on the command-line. */
3395
3396bfd_boolean
3397ppc64_elf_mark_entry_syms (info)
3398 struct bfd_link_info *info;
3399{
3400 struct ppc_link_hash_table *htab;
3401 struct bfd_sym_chain *sym;
3402
3403 htab = ppc_hash_table (info);
3404 for (sym = info->gc_sym_list; sym; sym = sym->next)
3405 {
3406 struct elf_link_hash_entry *h;
3407
3408 h = elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
3409 if (h != NULL)
3410 ((struct ppc_link_hash_entry *) h)->is_entry = 1;
3411 }
3412 return TRUE;
3413}
3414
3415static bfd_boolean
3416update_local_sym_info (abfd, symtab_hdr, r_symndx, r_addend, tls_type)
3417 bfd *abfd;
3418 Elf_Internal_Shdr *symtab_hdr;
3419 unsigned long r_symndx;
3420 bfd_vma r_addend;
3421 int tls_type;
3422{
3423 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
3424 char *local_got_tls_masks;
3425
3426 if (local_got_ents == NULL)
3427 {
3428 bfd_size_type size = symtab_hdr->sh_info;
3429
3430 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
3431 local_got_ents = (struct got_entry **) bfd_zalloc (abfd, size);
3432 if (local_got_ents == NULL)
3433 return FALSE;
3434 elf_local_got_ents (abfd) = local_got_ents;
3435 }
3436
3437 if ((tls_type & TLS_EXPLICIT) == 0)
3438 {
3439 struct got_entry *ent;
3440
3441 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3442 if (ent->addend == r_addend && ent->tls_type == tls_type)
3443 break;
3444 if (ent == NULL)
3445 {
3446 bfd_size_type amt = sizeof (*ent);
3447 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3448 if (ent == NULL)
3449 return FALSE;
3450 ent->next = local_got_ents[r_symndx];
3451 ent->addend = r_addend;
3452 ent->tls_type = tls_type;
3453 ent->got.refcount = 0;
3454 local_got_ents[r_symndx] = ent;
3455 }
3456 ent->got.refcount += 1;
3457 }
3458
3459 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
3460 local_got_tls_masks[r_symndx] |= tls_type;
3461 return TRUE;
3462}
3463
3464static bfd_boolean
3465update_plt_info (abfd, eh, addend)
3466 bfd *abfd;
3467 struct ppc_link_hash_entry *eh;
3468 bfd_vma addend;
3469{
3470 struct plt_entry *ent;
3471
3472 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3473 if (ent->addend == addend)
3474 break;
3475 if (ent == NULL)
3476 {
3477 bfd_size_type amt = sizeof (*ent);
3478 ent = (struct plt_entry *) bfd_alloc (abfd, amt);
3479 if (ent == NULL)
3480 return FALSE;
3481 ent->next = eh->elf.plt.plist;
3482 ent->addend = addend;
3483 ent->plt.refcount = 0;
3484 eh->elf.plt.plist = ent;
3485 }
3486 ent->plt.refcount += 1;
3487 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3488 eh->is_func = 1;
3489 return TRUE;
3490}
3491
3492/* Look through the relocs for a section during the first phase, and
3493 calculate needed space in the global offset table, procedure
3494 linkage table, and dynamic reloc sections. */
3495
3496static bfd_boolean
3497ppc64_elf_check_relocs (abfd, info, sec, relocs)
3498 bfd *abfd;
3499 struct bfd_link_info *info;
3500 asection *sec;
3501 const Elf_Internal_Rela *relocs;
3502{
3503 struct ppc_link_hash_table *htab;
3504 Elf_Internal_Shdr *symtab_hdr;
3505 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3506 const Elf_Internal_Rela *rel;
3507 const Elf_Internal_Rela *rel_end;
3508 asection *sreloc;
3509 asection **opd_sym_map;
3510
3511 if (info->relocateable)
3512 return TRUE;
3513
3514 htab = ppc_hash_table (info);
3515 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3516
3517 sym_hashes = elf_sym_hashes (abfd);
3518 sym_hashes_end = (sym_hashes
3519 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3520 - symtab_hdr->sh_info);
3521
3522 sreloc = NULL;
3523 opd_sym_map = NULL;
3524 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3525 {
3526 /* Garbage collection needs some extra help with .opd sections.
3527 We don't want to necessarily keep everything referenced by
3528 relocs in .opd, as that would keep all functions. Instead,
3529 if we reference an .opd symbol (a function descriptor), we
3530 want to keep the function code symbol's section. This is
3531 easy for global symbols, but for local syms we need to keep
3532 information about the associated function section. Later, if
3533 edit_opd deletes entries, we'll use this array to adjust
3534 local syms in .opd. */
3535 union opd_info {
3536 asection *func_section;
3537 long entry_adjust;
3538 };
3539 bfd_size_type amt;
3540
3541 amt = sec->_raw_size * sizeof (union opd_info) / 24;
3542 opd_sym_map = (asection **) bfd_zalloc (abfd, amt);
3543 if (opd_sym_map == NULL)
3544 return FALSE;
3545 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
3546 }
3547
3548 if (htab->elf.dynobj == NULL)
3549 htab->elf.dynobj = abfd;
3550 if (htab->sfpr == NULL
3551 && !create_linkage_sections (htab->elf.dynobj, info))
3552 return FALSE;
3553
3554 rel_end = relocs + sec->reloc_count;
3555 for (rel = relocs; rel < rel_end; rel++)
3556 {
3557 unsigned long r_symndx;
3558 struct elf_link_hash_entry *h;
3559 enum elf_ppc64_reloc_type r_type;
3560 int tls_type = 0;
3561
3562 r_symndx = ELF64_R_SYM (rel->r_info);
3563 if (r_symndx < symtab_hdr->sh_info)
3564 h = NULL;
3565 else
3566 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3567
3568 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
3569 switch (r_type)
3570 {
3571 case R_PPC64_GOT_TLSLD16:
3572 case R_PPC64_GOT_TLSLD16_LO:
3573 case R_PPC64_GOT_TLSLD16_HI:
3574 case R_PPC64_GOT_TLSLD16_HA:
3575 htab->tlsld_got.refcount += 1;
3576 tls_type = TLS_TLS | TLS_LD;
3577 goto dogottls;
3578
3579 case R_PPC64_GOT_TLSGD16:
3580 case R_PPC64_GOT_TLSGD16_LO:
3581 case R_PPC64_GOT_TLSGD16_HI:
3582 case R_PPC64_GOT_TLSGD16_HA:
3583 tls_type = TLS_TLS | TLS_GD;
3584 goto dogottls;
3585
3586 case R_PPC64_GOT_TPREL16_DS:
3587 case R_PPC64_GOT_TPREL16_LO_DS:
3588 case R_PPC64_GOT_TPREL16_HI:
3589 case R_PPC64_GOT_TPREL16_HA:
3590 if (info->shared)
3591 info->flags |= DF_STATIC_TLS;
3592 tls_type = TLS_TLS | TLS_TPREL;
3593 goto dogottls;
3594
3595 case R_PPC64_GOT_DTPREL16_DS:
3596 case R_PPC64_GOT_DTPREL16_LO_DS:
3597 case R_PPC64_GOT_DTPREL16_HI:
3598 case R_PPC64_GOT_DTPREL16_HA:
3599 tls_type = TLS_TLS | TLS_DTPREL;
3600 dogottls:
3601 sec->has_tls_reloc = 1;
3602 /* Fall thru */
3603
3604 case R_PPC64_GOT16:
3605 case R_PPC64_GOT16_DS:
3606 case R_PPC64_GOT16_HA:
3607 case R_PPC64_GOT16_HI:
3608 case R_PPC64_GOT16_LO:
3609 case R_PPC64_GOT16_LO_DS:
3610 /* This symbol requires a global offset table entry. */
3611 if (htab->sgot == NULL
3612 && !create_got_section (htab->elf.dynobj, info))
3613 return FALSE;
3614
3615 if (h != NULL)
3616 {
3617 struct ppc_link_hash_entry *eh;
3618 struct got_entry *ent;
3619
3620 eh = (struct ppc_link_hash_entry *) h;
3621 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3622 if (ent->addend == rel->r_addend
3623 && ent->tls_type == tls_type)
3624 break;
3625 if (ent == NULL)
3626 {
3627 bfd_size_type amt = sizeof (*ent);
3628 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3629 if (ent == NULL)
3630 return FALSE;
3631 ent->next = eh->elf.got.glist;
3632 ent->addend = rel->r_addend;
3633 ent->tls_type = tls_type;
3634 ent->got.refcount = 0;
3635 eh->elf.got.glist = ent;
3636 }
3637 ent->got.refcount += 1;
3638 eh->tls_mask |= tls_type;
3639 }
3640 else
3641 /* This is a global offset table entry for a local symbol. */
3642 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3643 rel->r_addend, tls_type))
3644 return FALSE;
3645 break;
3646
3647 case R_PPC64_PLT16_HA:
3648 case R_PPC64_PLT16_HI:
3649 case R_PPC64_PLT16_LO:
3650 case R_PPC64_PLT32:
3651 case R_PPC64_PLT64:
3652 /* This symbol requires a procedure linkage table entry. We
3653 actually build the entry in adjust_dynamic_symbol,
3654 because this might be a case of linking PIC code without
3655 linking in any dynamic objects, in which case we don't
3656 need to generate a procedure linkage table after all. */
3657 if (h == NULL)
3658 {
3659 /* It does not make sense to have a procedure linkage
3660 table entry for a local symbol. */
3661 bfd_set_error (bfd_error_bad_value);
3662 return FALSE;
3663 }
3664 else
3665 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3666 rel->r_addend))
3667 return FALSE;
3668 break;
3669
3670 /* The following relocations don't need to propagate the
3671 relocation if linking a shared object since they are
3672 section relative. */
3673 case R_PPC64_SECTOFF:
3674 case R_PPC64_SECTOFF_LO:
3675 case R_PPC64_SECTOFF_HI:
3676 case R_PPC64_SECTOFF_HA:
3677 case R_PPC64_SECTOFF_DS:
3678 case R_PPC64_SECTOFF_LO_DS:
3679 case R_PPC64_TOC16:
3680 case R_PPC64_TOC16_LO:
3681 case R_PPC64_TOC16_HI:
3682 case R_PPC64_TOC16_HA:
3683 case R_PPC64_TOC16_DS:
3684 case R_PPC64_TOC16_LO_DS:
3685 case R_PPC64_DTPREL16:
3686 case R_PPC64_DTPREL16_LO:
3687 case R_PPC64_DTPREL16_HI:
3688 case R_PPC64_DTPREL16_HA:
3689 case R_PPC64_DTPREL16_DS:
3690 case R_PPC64_DTPREL16_LO_DS:
3691 case R_PPC64_DTPREL16_HIGHER:
3692 case R_PPC64_DTPREL16_HIGHERA:
3693 case R_PPC64_DTPREL16_HIGHEST:
3694 case R_PPC64_DTPREL16_HIGHESTA:
3695 break;
3696
3697 /* This relocation describes the C++ object vtable hierarchy.
3698 Reconstruct it for later use during GC. */
3699 case R_PPC64_GNU_VTINHERIT:
3700 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3701 return FALSE;
3702 break;
3703
3704 /* This relocation describes which C++ vtable entries are actually
3705 used. Record for later use during GC. */
3706 case R_PPC64_GNU_VTENTRY:
3707 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3708 return FALSE;
3709 break;
3710
3711 case R_PPC64_REL14:
3712 case R_PPC64_REL14_BRTAKEN:
3713 case R_PPC64_REL14_BRNTAKEN:
3714 htab->has_14bit_branch = 1;
3715 /* Fall through. */
3716
3717 case R_PPC64_REL24:
3718 if (h != NULL
3719 && h->root.root.string[0] == '.'
3720 && h->root.root.string[1] != 0)
3721 {
3722 /* We may need a .plt entry if the function this reloc
3723 refers to is in a shared lib. */
3724 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3725 rel->r_addend))
3726 return FALSE;
3727 if (h == htab->tls_get_addr)
3728 sec->has_tls_reloc = 1;
3729 else if (strcmp (h->root.root.string, ".__tls_get_addr") == 0)
3730 {
3731 htab->tls_get_addr = h;
3732 sec->has_tls_reloc = 1;
3733 }
3734 }
3735 break;
3736
3737 case R_PPC64_TPREL64:
3738 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3739 if (info->shared)
3740 info->flags |= DF_STATIC_TLS;
3741 goto dotlstoc;
3742
3743 case R_PPC64_DTPMOD64:
3744 if (rel + 1 < rel_end
3745 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3746 && rel[1].r_offset == rel->r_offset + 8)
3747 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
3748 else
3749 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
3750 goto dotlstoc;
3751
3752 case R_PPC64_DTPREL64:
3753 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3754 if (rel != relocs
3755 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3756 && rel[-1].r_offset == rel->r_offset - 8)
3757 /* This is the second reloc of a dtpmod, dtprel pair.
3758 Don't mark with TLS_DTPREL. */
3759 goto dodyn;
3760
3761 dotlstoc:
3762 sec->has_tls_reloc = 1;
3763 if (h != NULL)
3764 {
3765 struct ppc_link_hash_entry *eh;
3766 eh = (struct ppc_link_hash_entry *) h;
3767 eh->tls_mask |= tls_type;
3768 }
3769 else
3770 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3771 rel->r_addend, tls_type))
3772 return FALSE;
3773
3774 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3775 {
3776 /* One extra to simplify get_tls_mask. */
3777 bfd_size_type amt = sec->_raw_size * sizeof (unsigned) / 8 + 1;
3778 ppc64_elf_section_data (sec)->t_symndx
3779 = (unsigned *) bfd_zalloc (abfd, amt);
3780 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3781 return FALSE;
3782 }
3783 BFD_ASSERT (rel->r_offset % 8 == 0);
3784 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
3785
3786 /* Mark the second slot of a GD or LD entry.
3787 -1 to indicate GD and -2 to indicate LD. */
3788 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3789 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -1;
3790 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3791 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -2;
3792 goto dodyn;
3793
3794 case R_PPC64_TPREL16:
3795 case R_PPC64_TPREL16_LO:
3796 case R_PPC64_TPREL16_HI:
3797 case R_PPC64_TPREL16_HA:
3798 case R_PPC64_TPREL16_DS:
3799 case R_PPC64_TPREL16_LO_DS:
3800 case R_PPC64_TPREL16_HIGHER:
3801 case R_PPC64_TPREL16_HIGHERA:
3802 case R_PPC64_TPREL16_HIGHEST:
3803 case R_PPC64_TPREL16_HIGHESTA:
3804 if (info->shared)
3805 {
3806 info->flags |= DF_STATIC_TLS;
3807 goto dodyn;
3808 }
3809 break;
3810
3811 case R_PPC64_ADDR64:
3812 if (opd_sym_map != NULL
3813 && h != NULL
3814 && h->root.root.string[0] == '.'
3815 && h->root.root.string[1] != 0)
3816 {
3817 struct elf_link_hash_entry *fdh;
3818
3819 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
3820 FALSE, FALSE, FALSE);
3821 if (fdh != NULL)
3822 {
3823 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
3824 ((struct ppc_link_hash_entry *) fdh)->oh = h;
3825 ((struct ppc_link_hash_entry *) h)->is_func = 1;
3826 ((struct ppc_link_hash_entry *) h)->oh = fdh;
3827 }
3828 }
3829 if (opd_sym_map != NULL
3830 && h == NULL
3831 && rel + 1 < rel_end
3832 && ((enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info)
3833 == R_PPC64_TOC))
3834 {
3835 asection *s;
3836
3837 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3838 r_symndx);
3839 if (s == NULL)
3840 return FALSE;
3841 else if (s != sec)
3842 opd_sym_map[rel->r_offset / 24] = s;
3843 }
3844 /* Fall through. */
3845
3846 case R_PPC64_REL30:
3847 case R_PPC64_REL32:
3848 case R_PPC64_REL64:
3849 case R_PPC64_ADDR14:
3850 case R_PPC64_ADDR14_BRNTAKEN:
3851 case R_PPC64_ADDR14_BRTAKEN:
3852 case R_PPC64_ADDR16:
3853 case R_PPC64_ADDR16_DS:
3854 case R_PPC64_ADDR16_HA:
3855 case R_PPC64_ADDR16_HI:
3856 case R_PPC64_ADDR16_HIGHER:
3857 case R_PPC64_ADDR16_HIGHERA:
3858 case R_PPC64_ADDR16_HIGHEST:
3859 case R_PPC64_ADDR16_HIGHESTA:
3860 case R_PPC64_ADDR16_LO:
3861 case R_PPC64_ADDR16_LO_DS:
3862 case R_PPC64_ADDR24:
3863 case R_PPC64_ADDR32:
3864 case R_PPC64_UADDR16:
3865 case R_PPC64_UADDR32:
3866 case R_PPC64_UADDR64:
3867 case R_PPC64_TOC:
3868 /* Don't propagate .opd relocs. */
3869 if (NO_OPD_RELOCS && opd_sym_map != NULL)
3870 break;
3871
3872 /* If we are creating a shared library, and this is a reloc
3873 against a global symbol, or a non PC relative reloc
3874 against a local symbol, then we need to copy the reloc
3875 into the shared library. However, if we are linking with
3876 -Bsymbolic, we do not need to copy a reloc against a
3877 global symbol which is defined in an object we are
3878 including in the link (i.e., DEF_REGULAR is set). At
3879 this point we have not seen all the input files, so it is
3880 possible that DEF_REGULAR is not set now but will be set
3881 later (it is never cleared). In case of a weak definition,
3882 DEF_REGULAR may be cleared later by a strong definition in
3883 a shared library. We account for that possibility below by
3884 storing information in the relocs_copied field of the hash
3885 table entry. A similar situation occurs when creating
3886 shared libraries and symbol visibility changes render the
3887 symbol local.
3888
3889 If on the other hand, we are creating an executable, we
3890 may need to keep relocations for symbols satisfied by a
3891 dynamic library if we manage to avoid copy relocs for the
3892 symbol. */
3893 dodyn:
3894 if ((info->shared
3895 && (sec->flags & SEC_ALLOC) != 0
3896 && (MUST_BE_DYN_RELOC (r_type)
3897 || (h != NULL
3898 && (! info->symbolic
3899 || h->root.type == bfd_link_hash_defweak
3900 || (h->elf_link_hash_flags
3901 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3902 || (!info->shared
3903 && (sec->flags & SEC_ALLOC) != 0
3904 && h != NULL
3905 && (h->root.type == bfd_link_hash_defweak
3906 || (h->elf_link_hash_flags
3907 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
3908 {
3909 struct ppc_dyn_relocs *p;
3910 struct ppc_dyn_relocs **head;
3911
3912 /* We must copy these reloc types into the output file.
3913 Create a reloc section in dynobj and make room for
3914 this reloc. */
3915 if (sreloc == NULL)
3916 {
3917 const char *name;
3918 bfd *dynobj;
3919
3920 name = (bfd_elf_string_from_elf_section
3921 (abfd,
3922 elf_elfheader (abfd)->e_shstrndx,
3923 elf_section_data (sec)->rel_hdr.sh_name));
3924 if (name == NULL)
3925 return FALSE;
3926
3927 if (strncmp (name, ".rela", 5) != 0
3928 || strcmp (bfd_get_section_name (abfd, sec),
3929 name + 5) != 0)
3930 {
3931 (*_bfd_error_handler)
3932 (_("%s: bad relocation section name `%s\'"),
3933 bfd_archive_filename (abfd), name);
3934 bfd_set_error (bfd_error_bad_value);
3935 }
3936
3937 dynobj = htab->elf.dynobj;
3938 sreloc = bfd_get_section_by_name (dynobj, name);
3939 if (sreloc == NULL)
3940 {
3941 flagword flags;
3942
3943 sreloc = bfd_make_section (dynobj, name);
3944 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3945 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3946 if ((sec->flags & SEC_ALLOC) != 0)
3947 flags |= SEC_ALLOC | SEC_LOAD;
3948 if (sreloc == NULL
3949 || ! bfd_set_section_flags (dynobj, sreloc, flags)
3950 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
3951 return FALSE;
3952 }
3953 elf_section_data (sec)->sreloc = sreloc;
3954 }
3955
3956 /* If this is a global symbol, we count the number of
3957 relocations we need for this symbol. */
3958 if (h != NULL)
3959 {
3960 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
3961 }
3962 else
3963 {
3964 /* Track dynamic relocs needed for local syms too.
3965 We really need local syms available to do this
3966 easily. Oh well. */
3967
3968 asection *s;
3969 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3970 sec, r_symndx);
3971 if (s == NULL)
3972 return FALSE;
3973
3974 head = ((struct ppc_dyn_relocs **)
3975 &elf_section_data (s)->local_dynrel);
3976 }
3977
3978 p = *head;
3979 if (p == NULL || p->sec != sec)
3980 {
3981 p = ((struct ppc_dyn_relocs *)
3982 bfd_alloc (htab->elf.dynobj,
3983 (bfd_size_type) sizeof *p));
3984 if (p == NULL)
3985 return FALSE;
3986 p->next = *head;
3987 *head = p;
3988 p->sec = sec;
3989 p->count = 0;
3990 p->pc_count = 0;
3991 }
3992
3993 p->count += 1;
3994 if (!MUST_BE_DYN_RELOC (r_type))
3995 p->pc_count += 1;
3996 }
3997 break;
3998
3999 default:
4000 break;
4001 }
4002 }
4003
4004 return TRUE;
4005}
4006
4007/* Return the section that should be marked against GC for a given
4008 relocation. */
4009
4010static asection *
4011ppc64_elf_gc_mark_hook (sec, info, rel, h, sym)
4012 asection *sec;
4013 struct bfd_link_info *info ATTRIBUTE_UNUSED;
4014 Elf_Internal_Rela *rel;
4015 struct elf_link_hash_entry *h;
4016 Elf_Internal_Sym *sym;
4017{
4018 asection *rsec = NULL;
4019
4020 if (h != NULL)
4021 {
4022 enum elf_ppc64_reloc_type r_type;
4023 struct ppc_link_hash_entry *fdh;
4024
4025 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4026 switch (r_type)
4027 {
4028 case R_PPC64_GNU_VTINHERIT:
4029 case R_PPC64_GNU_VTENTRY:
4030 break;
4031
4032 default:
4033 switch (h->root.type)
4034 {
4035 case bfd_link_hash_defined:
4036 case bfd_link_hash_defweak:
4037 fdh = (struct ppc_link_hash_entry *) h;
4038
4039 /* Function descriptor syms cause the associated
4040 function code sym section to be marked. */
4041 if (fdh->is_func_descriptor)
4042 rsec = fdh->oh->root.u.def.section;
4043
4044 /* Function entry syms return NULL if they are in .opd
4045 and are not ._start (or others undefined on the ld
4046 command line). Thus we avoid marking all function
4047 sections, as all functions are referenced in .opd. */
4048 else if ((fdh->oh != NULL
4049 && ((struct ppc_link_hash_entry *) fdh->oh)->is_entry)
4050 || ppc64_elf_section_data (sec)->opd.func_sec == NULL)
4051 rsec = h->root.u.def.section;
4052 break;
4053
4054 case bfd_link_hash_common:
4055 rsec = h->root.u.c.p->section;
4056 break;
4057
4058 default:
4059 break;
4060 }
4061 }
4062 }
4063 else
4064 {
4065 asection **opd_sym_section;
4066
4067 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
4068 opd_sym_section = ppc64_elf_section_data (rsec)->opd.func_sec;
4069 if (opd_sym_section != NULL)
4070 rsec = opd_sym_section[sym->st_value / 24];
4071 else if (ppc64_elf_section_data (sec)->opd.func_sec != NULL)
4072 rsec = NULL;
4073 }
4074
4075 return rsec;
4076}
4077
4078/* Update the .got, .plt. and dynamic reloc reference counts for the
4079 section being removed. */
4080
4081static bfd_boolean
4082ppc64_elf_gc_sweep_hook (abfd, info, sec, relocs)
4083 bfd *abfd;
4084 struct bfd_link_info *info;
4085 asection *sec;
4086 const Elf_Internal_Rela *relocs;
4087{
4088 struct ppc_link_hash_table *htab;
4089 Elf_Internal_Shdr *symtab_hdr;
4090 struct elf_link_hash_entry **sym_hashes;
4091 struct got_entry **local_got_ents;
4092 const Elf_Internal_Rela *rel, *relend;
4093
4094 elf_section_data (sec)->local_dynrel = NULL;
4095
4096 htab = ppc_hash_table (info);
4097 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4098 sym_hashes = elf_sym_hashes (abfd);
4099 local_got_ents = elf_local_got_ents (abfd);
4100
4101 relend = relocs + sec->reloc_count;
4102 for (rel = relocs; rel < relend; rel++)
4103 {
4104 unsigned long r_symndx;
4105 enum elf_ppc64_reloc_type r_type;
4106 struct elf_link_hash_entry *h;
4107 char tls_type = 0;
4108
4109 r_symndx = ELF64_R_SYM (rel->r_info);
4110 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4111 switch (r_type)
4112 {
4113 case R_PPC64_GOT_TLSLD16:
4114 case R_PPC64_GOT_TLSLD16_LO:
4115 case R_PPC64_GOT_TLSLD16_HI:
4116 case R_PPC64_GOT_TLSLD16_HA:
4117 htab->tlsld_got.refcount -= 1;
4118 tls_type = TLS_TLS | TLS_LD;
4119 goto dogot;
4120
4121 case R_PPC64_GOT_TLSGD16:
4122 case R_PPC64_GOT_TLSGD16_LO:
4123 case R_PPC64_GOT_TLSGD16_HI:
4124 case R_PPC64_GOT_TLSGD16_HA:
4125 tls_type = TLS_TLS | TLS_GD;
4126 goto dogot;
4127
4128 case R_PPC64_GOT_TPREL16_DS:
4129 case R_PPC64_GOT_TPREL16_LO_DS:
4130 case R_PPC64_GOT_TPREL16_HI:
4131 case R_PPC64_GOT_TPREL16_HA:
4132 tls_type = TLS_TLS | TLS_TPREL;
4133 goto dogot;
4134
4135 case R_PPC64_GOT_DTPREL16_DS:
4136 case R_PPC64_GOT_DTPREL16_LO_DS:
4137 case R_PPC64_GOT_DTPREL16_HI:
4138 case R_PPC64_GOT_DTPREL16_HA:
4139 tls_type = TLS_TLS | TLS_DTPREL;
4140 goto dogot;
4141
4142 case R_PPC64_GOT16:
4143 case R_PPC64_GOT16_DS:
4144 case R_PPC64_GOT16_HA:
4145 case R_PPC64_GOT16_HI:
4146 case R_PPC64_GOT16_LO:
4147 case R_PPC64_GOT16_LO_DS:
4148 dogot:
4149 {
4150 struct got_entry *ent;
4151
4152 if (r_symndx >= symtab_hdr->sh_info)
4153 {
4154 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4155 ent = h->got.glist;
4156 }
4157 else
4158 ent = local_got_ents[r_symndx];
4159
4160 for (; ent != NULL; ent = ent->next)
4161 if (ent->addend == rel->r_addend
4162 && ent->tls_type == tls_type)
4163 break;
4164 if (ent == NULL)
4165 abort ();
4166 if (ent->got.refcount > 0)
4167 ent->got.refcount -= 1;
4168 }
4169 break;
4170
4171 case R_PPC64_PLT16_HA:
4172 case R_PPC64_PLT16_HI:
4173 case R_PPC64_PLT16_LO:
4174 case R_PPC64_PLT32:
4175 case R_PPC64_PLT64:
4176 case R_PPC64_REL14:
4177 case R_PPC64_REL14_BRNTAKEN:
4178 case R_PPC64_REL14_BRTAKEN:
4179 case R_PPC64_REL24:
4180 if (r_symndx >= symtab_hdr->sh_info)
4181 {
4182 struct plt_entry *ent;
4183
4184 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4185 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4186 if (ent->addend == rel->r_addend)
4187 break;
4188 if (ent == NULL)
4189 abort ();
4190 if (ent->plt.refcount > 0)
4191 ent->plt.refcount -= 1;
4192 }
4193 break;
4194
4195 case R_PPC64_REL30:
4196 case R_PPC64_REL32:
4197 case R_PPC64_REL64:
4198 if (r_symndx >= symtab_hdr->sh_info)
4199 {
4200 struct ppc_link_hash_entry *eh;
4201 struct ppc_dyn_relocs **pp;
4202 struct ppc_dyn_relocs *p;
4203
4204 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4205 eh = (struct ppc_link_hash_entry *) h;
4206
4207 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4208 if (p->sec == sec)
4209 {
4210 p->pc_count -= 1;
4211 p->count -= 1;
4212 if (p->count == 0)
4213 *pp = p->next;
4214 break;
4215 }
4216 }
4217 break;
4218
4219 case R_PPC64_DTPMOD64:
4220 case R_PPC64_DTPREL64:
4221 case R_PPC64_TPREL64:
4222 case R_PPC64_ADDR14:
4223 case R_PPC64_ADDR14_BRNTAKEN:
4224 case R_PPC64_ADDR14_BRTAKEN:
4225 case R_PPC64_ADDR16:
4226 case R_PPC64_ADDR16_DS:
4227 case R_PPC64_ADDR16_HA:
4228 case R_PPC64_ADDR16_HI:
4229 case R_PPC64_ADDR16_HIGHER:
4230 case R_PPC64_ADDR16_HIGHERA:
4231 case R_PPC64_ADDR16_HIGHEST:
4232 case R_PPC64_ADDR16_HIGHESTA:
4233 case R_PPC64_ADDR16_LO:
4234 case R_PPC64_ADDR16_LO_DS:
4235 case R_PPC64_ADDR24:
4236 case R_PPC64_ADDR32:
4237 case R_PPC64_ADDR64:
4238 case R_PPC64_UADDR16:
4239 case R_PPC64_UADDR32:
4240 case R_PPC64_UADDR64:
4241 case R_PPC64_TOC:
4242 if (r_symndx >= symtab_hdr->sh_info)
4243 {
4244 struct ppc_link_hash_entry *eh;
4245 struct ppc_dyn_relocs **pp;
4246 struct ppc_dyn_relocs *p;
4247
4248 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4249 eh = (struct ppc_link_hash_entry *) h;
4250
4251 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4252 if (p->sec == sec)
4253 {
4254 p->count -= 1;
4255 if (p->count == 0)
4256 *pp = p->next;
4257 break;
4258 }
4259 }
4260 break;
4261
4262 default:
4263 break;
4264 }
4265 }
4266 return TRUE;
4267}
4268
4269/* Called via elf_link_hash_traverse to transfer dynamic linking
4270 information on function code symbol entries to their corresponding
4271 function descriptor symbol entries. */
4272static bfd_boolean
4273func_desc_adjust (h, inf)
4274 struct elf_link_hash_entry *h;
4275 PTR inf;
4276{
4277 struct bfd_link_info *info;
4278 struct ppc_link_hash_table *htab;
4279 struct plt_entry *ent;
4280
4281 if (h->root.type == bfd_link_hash_indirect)
4282 return TRUE;
4283
4284 if (h->root.type == bfd_link_hash_warning)
4285 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4286
4287 info = (struct bfd_link_info *) inf;
4288 htab = ppc_hash_table (info);
4289
4290 /* If this is a function code symbol, transfer dynamic linking
4291 information to the function descriptor symbol. */
4292 if (!((struct ppc_link_hash_entry *) h)->is_func)
4293 return TRUE;
4294
4295 if (h->root.type == bfd_link_hash_undefweak
4296 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR))
4297 htab->have_undefweak = TRUE;
4298
4299 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4300 if (ent->plt.refcount > 0)
4301 break;
4302 if (ent != NULL
4303 && h->root.root.string[0] == '.'
4304 && h->root.root.string[1] != '\0')
4305 {
4306 struct elf_link_hash_entry *fdh = ((struct ppc_link_hash_entry *) h)->oh;
4307 bfd_boolean force_local;
4308
4309 /* Find the corresponding function descriptor symbol. Create it
4310 as undefined if necessary. */
4311
4312 if (fdh == NULL)
4313 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
4314 FALSE, FALSE, TRUE);
4315
4316 if (fdh == NULL
4317 && info->shared
4318 && (h->root.type == bfd_link_hash_undefined
4319 || h->root.type == bfd_link_hash_undefweak))
4320 {
4321 bfd *abfd;
4322 asymbol *newsym;
4323 struct bfd_link_hash_entry *bh;
4324
4325 abfd = h->root.u.undef.abfd;
4326 newsym = bfd_make_empty_symbol (abfd);
4327 newsym->name = h->root.root.string + 1;
4328 newsym->section = bfd_und_section_ptr;
4329 newsym->value = 0;
4330 newsym->flags = BSF_OBJECT;
4331 if (h->root.type == bfd_link_hash_undefweak)
4332 newsym->flags |= BSF_WEAK;
4333
4334 bh = &fdh->root;
4335 if ( !(_bfd_generic_link_add_one_symbol
4336 (info, abfd, newsym->name, newsym->flags,
4337 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
4338 {
4339 return FALSE;
4340 }
4341 fdh = (struct elf_link_hash_entry *) bh;
4342 fdh->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
4343 }
4344
4345 if (fdh != NULL
4346 && (fdh->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4347 && (info->shared
4348 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4349 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
4350 {
4351 if (fdh->dynindx == -1)
4352 if (! bfd_elf64_link_record_dynamic_symbol (info, fdh))
4353 return FALSE;
4354 fdh->elf_link_hash_flags |= (h->elf_link_hash_flags
4355 & (ELF_LINK_HASH_REF_REGULAR
4356 | ELF_LINK_HASH_REF_DYNAMIC
4357 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4358 | ELF_LINK_NON_GOT_REF));
4359 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4360 {
4361 fdh->plt.plist = h->plt.plist;
4362 fdh->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4363 }
4364 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
4365 ((struct ppc_link_hash_entry *) fdh)->oh = h;
4366 ((struct ppc_link_hash_entry *) h)->oh = fdh;
4367 }
4368
4369 /* Now that the info is on the function descriptor, clear the
4370 function code sym info. Any function code syms for which we
4371 don't have a definition in a regular file, we force local.
4372 This prevents a shared library from exporting syms that have
4373 been imported from another library. Function code syms that
4374 are really in the library we must leave global to prevent the
4375 linker dragging in a definition from a static library. */
4376 force_local = (info->shared
4377 && ((h->elf_link_hash_flags
4378 & ELF_LINK_HASH_DEF_REGULAR) == 0
4379 || fdh == NULL
4380 || (fdh->elf_link_hash_flags
4381 & ELF_LINK_HASH_DEF_REGULAR) == 0
4382 || (fdh->elf_link_hash_flags
4383 & ELF_LINK_FORCED_LOCAL) != 0));
4384 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4385 }
4386
4387 return TRUE;
4388}
4389
4390#define MIN_SAVE_FPR 14
4391#define MAX_SAVE_FPR 31
4392
4393/* Called near the start of bfd_elf_size_dynamic_sections. We use
4394 this hook to a) provide some gcc support functions, and b) transfer
4395 dynamic linking information gathered so far on function code symbol
4396 entries, to their corresponding function descriptor symbol entries. */
4397static bfd_boolean
4398ppc64_elf_func_desc_adjust (obfd, info)
4399 bfd *obfd ATTRIBUTE_UNUSED;
4400 struct bfd_link_info *info;
4401{
4402 struct ppc_link_hash_table *htab;
4403 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4404 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4405 unsigned int i;
4406 struct elf_link_hash_entry *h;
4407 bfd_byte *p;
4408 char sym[10];
4409
4410 htab = ppc_hash_table (info);
4411
4412 if (htab->sfpr == NULL)
4413 /* We don't have any relocs. */
4414 return TRUE;
4415
4416 /* First provide any missing ._savef* and ._restf* functions. */
4417 memcpy (sym, "._savef14", 10);
4418 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4419 {
4420 sym[7] = i / 10 + '0';
4421 sym[8] = i % 10 + '0';
4422 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4423 if (h != NULL
4424 && h->root.type == bfd_link_hash_undefined)
4425 {
4426 if (lowest_savef > i)
4427 lowest_savef = i;
4428 h->root.type = bfd_link_hash_defined;
4429 h->root.u.def.section = htab->sfpr;
4430 h->root.u.def.value = (i - lowest_savef) * 4;
4431 h->type = STT_FUNC;
4432 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4433 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4434 }
4435 }
4436
4437 memcpy (sym, "._restf14", 10);
4438 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4439 {
4440 sym[7] = i / 10 + '0';
4441 sym[8] = i % 10 + '0';
4442 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4443 if (h != NULL
4444 && h->root.type == bfd_link_hash_undefined)
4445 {
4446 if (lowest_restf > i)
4447 lowest_restf = i;
4448 h->root.type = bfd_link_hash_defined;
4449 h->root.u.def.section = htab->sfpr;
4450 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4451 + (i - lowest_restf) * 4);
4452 h->type = STT_FUNC;
4453 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4454 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4455 }
4456 }
4457
4458 elf_link_hash_traverse (&htab->elf, func_desc_adjust, (PTR) info);
4459
4460 htab->sfpr->_raw_size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4461 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4462
4463 if (htab->sfpr->_raw_size == 0)
4464 {
4465 if (!htab->have_undefweak)
4466 {
4467 _bfd_strip_section_from_output (info, htab->sfpr);
4468 return TRUE;
4469 }
4470
4471 htab->sfpr->_raw_size = 4;
4472 }
4473
4474 p = (bfd_byte *) bfd_alloc (htab->elf.dynobj, htab->sfpr->_raw_size);
4475 if (p == NULL)
4476 return FALSE;
4477 htab->sfpr->contents = p;
4478
4479 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4480 {
4481 unsigned int fpr = i << 21;
4482 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4483 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4484 p += 4;
4485 }
4486 if (lowest_savef <= MAX_SAVE_FPR)
4487 {
4488 bfd_put_32 (htab->elf.dynobj, BLR, p);
4489 p += 4;
4490 }
4491
4492 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4493 {
4494 unsigned int fpr = i << 21;
4495 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4496 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
4497 p += 4;
4498 }
4499 if (lowest_restf <= MAX_SAVE_FPR
4500 || htab->sfpr->_raw_size == 4)
4501 {
4502 bfd_put_32 (htab->elf.dynobj, BLR, p);
4503 }
4504
4505 return TRUE;
4506}
4507
4508/* Adjust a symbol defined by a dynamic object and referenced by a
4509 regular object. The current definition is in some section of the
4510 dynamic object, but we're not including those sections. We have to
4511 change the definition to something the rest of the link can
4512 understand. */
4513
4514static bfd_boolean
4515ppc64_elf_adjust_dynamic_symbol (info, h)
4516 struct bfd_link_info *info;
4517 struct elf_link_hash_entry *h;
4518{
4519 struct ppc_link_hash_table *htab;
4520 struct ppc_link_hash_entry * eh;
4521 struct ppc_dyn_relocs *p;
4522 asection *s;
4523 unsigned int power_of_two;
4524
4525 htab = ppc_hash_table (info);
4526
4527 /* Deal with function syms. */
4528 if (h->type == STT_FUNC
4529 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4530 {
4531 /* Clear procedure linkage table information for any symbol that
4532 won't need a .plt entry. */
4533 struct plt_entry *ent;
4534 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4535 if (ent->plt.refcount > 0)
4536 break;
4537 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
4538 || ent == NULL
4539 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
4540 || (! info->shared
4541 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4542 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0))
4543 {
4544 h->plt.plist = NULL;
4545 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4546 }
4547 return TRUE;
4548 }
4549 else
4550 h->plt.plist = NULL;
4551
4552 /* If this is a weak symbol, and there is a real definition, the
4553 processor independent code will have arranged for us to see the
4554 real definition first, and we can just use the same value. */
4555 if (h->weakdef != NULL)
4556 {
4557 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4558 || h->weakdef->root.type == bfd_link_hash_defweak);
4559 h->root.u.def.section = h->weakdef->root.u.def.section;
4560 h->root.u.def.value = h->weakdef->root.u.def.value;
4561 return TRUE;
4562 }
4563
4564 /* This is a reference to a symbol defined by a dynamic object which
4565 is not a function. */
4566
4567 /* If we are creating a shared library, we must presume that the
4568 only references to the symbol are via the global offset table.
4569 For such cases we need not do anything here; the relocations will
4570 be handled correctly by relocate_section. */
4571 if (info->shared)
4572 return TRUE;
4573
4574 /* If there are no references to this symbol that do not use the
4575 GOT, we don't need to generate a copy reloc. */
4576 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
4577 return TRUE;
4578
4579 eh = (struct ppc_link_hash_entry *) h;
4580 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4581 {
4582 s = p->sec->output_section;
4583 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4584 break;
4585 }
4586
4587 /* If we didn't find any dynamic relocs in read-only sections, then
4588 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4589 if (p == NULL)
4590 {
4591 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
4592 return TRUE;
4593 }
4594
4595 /* We must allocate the symbol in our .dynbss section, which will
4596 become part of the .bss section of the executable. There will be
4597 an entry for this symbol in the .dynsym section. The dynamic
4598 object will contain position independent code, so all references
4599 from the dynamic object to this symbol will go through the global
4600 offset table. The dynamic linker will use the .dynsym entry to
4601 determine the address it must put in the global offset table, so
4602 both the dynamic object and the regular object will refer to the
4603 same memory location for the variable. */
4604
4605 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4606 to copy the initial value out of the dynamic object and into the
4607 runtime process image. We need to remember the offset into the
4608 .rela.bss section we are going to use. */
4609 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4610 {
4611 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
4612 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4613 }
4614
4615 /* We need to figure out the alignment required for this symbol. I
4616 have no idea how ELF linkers handle this. */
4617 power_of_two = bfd_log2 (h->size);
4618 if (power_of_two > 4)
4619 power_of_two = 4;
4620
4621 /* Apply the required alignment. */
4622 s = htab->sdynbss;
4623 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4624 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
4625 {
4626 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
4627 return FALSE;
4628 }
4629
4630 /* Define the symbol as being at this point in the section. */
4631 h->root.u.def.section = s;
4632 h->root.u.def.value = s->_raw_size;
4633
4634 /* Increment the section size to make room for the symbol. */
4635 s->_raw_size += h->size;
4636
4637 return TRUE;
4638}
4639
4640/* If given a function descriptor symbol, hide both the function code
4641 sym and the descriptor. */
4642static void
4643ppc64_elf_hide_symbol (info, h, force_local)
4644 struct bfd_link_info *info;
4645 struct elf_link_hash_entry *h;
4646 bfd_boolean force_local;
4647{
4648 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4649
4650 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
4651 {
4652 struct elf_link_hash_entry *fh = ((struct ppc_link_hash_entry *) h)->oh;
4653
4654 if (fh == NULL)
4655 {
4656 const char *p, *q;
4657 struct ppc_link_hash_table *htab;
4658 char save;
4659
4660 /* We aren't supposed to use alloca in BFD because on
4661 systems which do not have alloca the version in libiberty
4662 calls xmalloc, which might cause the program to crash
4663 when it runs out of memory. This function doesn't have a
4664 return status, so there's no way to gracefully return an
4665 error. So cheat. We know that string[-1] can be safely
4666 dereferenced; It's either a string in an ELF string
4667 table, or allocated in an objalloc structure. */
4668
4669 p = h->root.root.string - 1;
4670 save = *p;
4671 *(char *) p = '.';
4672 htab = ppc_hash_table (info);
4673 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4674 *(char *) p = save;
4675
4676 /* Unfortunately, if it so happens that the string we were
4677 looking for was allocated immediately before this string,
4678 then we overwrote the string terminator. That's the only
4679 reason the lookup should fail. */
4680 if (fh == NULL)
4681 {
4682 q = h->root.root.string + strlen (h->root.root.string);
4683 while (q >= h->root.root.string && *q == *p)
4684 --q, --p;
4685 if (q < h->root.root.string && *p == '.')
4686 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4687 }
4688 if (fh != NULL)
4689 {
4690 ((struct ppc_link_hash_entry *) h)->oh = fh;
4691 ((struct ppc_link_hash_entry *) fh)->oh = h;
4692 }
4693 }
4694 if (fh != NULL)
4695 _bfd_elf_link_hash_hide_symbol (info, fh, force_local);
4696 }
4697}
4698
4699static bfd_boolean
4700get_sym_h (hp, symp, symsecp, tls_maskp, locsymsp, r_symndx, ibfd)
4701 struct elf_link_hash_entry **hp;
4702 Elf_Internal_Sym **symp;
4703 asection **symsecp;
4704 char **tls_maskp;
4705 Elf_Internal_Sym **locsymsp;
4706 unsigned long r_symndx;
4707 bfd *ibfd;
4708{
4709 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4710
4711 if (r_symndx >= symtab_hdr->sh_info)
4712 {
4713 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4714 struct elf_link_hash_entry *h;
4715
4716 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4717 while (h->root.type == bfd_link_hash_indirect
4718 || h->root.type == bfd_link_hash_warning)
4719 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4720
4721 if (hp != NULL)
4722 *hp = h;
4723
4724 if (symp != NULL)
4725 *symp = NULL;
4726
4727 if (symsecp != NULL)
4728 {
4729 asection *symsec = NULL;
4730 if (h->root.type == bfd_link_hash_defined
4731 || h->root.type == bfd_link_hash_defweak)
4732 symsec = h->root.u.def.section;
4733 *symsecp = symsec;
4734 }
4735
4736 if (tls_maskp != NULL)
4737 {
4738 struct ppc_link_hash_entry *eh;
4739
4740 eh = (struct ppc_link_hash_entry *) h;
4741 *tls_maskp = &eh->tls_mask;
4742 }
4743 }
4744 else
4745 {
4746 Elf_Internal_Sym *sym;
4747 Elf_Internal_Sym *locsyms = *locsymsp;
4748
4749 if (locsyms == NULL)
4750 {
4751 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4752 if (locsyms == NULL)
4753 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4754 symtab_hdr->sh_info,
4755 0, NULL, NULL, NULL);
4756 if (locsyms == NULL)
4757 return FALSE;
4758 *locsymsp = locsyms;
4759 }
4760 sym = locsyms + r_symndx;
4761
4762 if (hp != NULL)
4763 *hp = NULL;
4764
4765 if (symp != NULL)
4766 *symp = sym;
4767
4768 if (symsecp != NULL)
4769 {
4770 asection *symsec = NULL;
4771 if ((sym->st_shndx != SHN_UNDEF
4772 && sym->st_shndx < SHN_LORESERVE)
4773 || sym->st_shndx > SHN_HIRESERVE)
4774 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4775 *symsecp = symsec;
4776 }
4777
4778 if (tls_maskp != NULL)
4779 {
4780 struct got_entry **lgot_ents;
4781 char *tls_mask;
4782
4783 tls_mask = NULL;
4784 lgot_ents = elf_local_got_ents (ibfd);
4785 if (lgot_ents != NULL)
4786 {
4787 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
4788 tls_mask = &lgot_masks[r_symndx];
4789 }
4790 *tls_maskp = tls_mask;
4791 }
4792 }
4793 return TRUE;
4794}
4795
4796/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
4797 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
4798 type suitable for optimization, and 1 otherwise. */
4799
4800static int
4801get_tls_mask (tls_maskp, locsymsp, rel, ibfd)
4802 char **tls_maskp;
4803 Elf_Internal_Sym **locsymsp;
4804 const Elf_Internal_Rela *rel;
4805 bfd *ibfd;
4806{
4807 unsigned long r_symndx;
4808 unsigned int next_r;
4809 struct elf_link_hash_entry *h;
4810 Elf_Internal_Sym *sym;
4811 asection *sec;
4812 bfd_vma off;
4813
4814 r_symndx = ELF64_R_SYM (rel->r_info);
4815 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
4816 return 0;
4817
4818 if ((*tls_maskp != NULL && **tls_maskp != 0)
4819 || sec == NULL
4820 || ppc64_elf_section_data (sec)->t_symndx == NULL)
4821 return 1;
4822
4823 /* Look inside a TOC section too. */
4824 if (h != NULL)
4825 {
4826 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4827 off = h->root.u.def.value;
4828 }
4829 else
4830 off = sym->st_value;
4831 off += rel->r_addend;
4832 BFD_ASSERT (off % 8 == 0);
4833 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
4834 next_r = ppc64_elf_section_data (sec)->t_symndx[off / 8 + 1];
4835 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
4836 return 0;
4837 if (h == NULL
4838 || h->root.type == bfd_link_hash_defined
4839 || h->root.type == bfd_link_hash_defweak)
4840 {
4841 if (next_r == (unsigned) -1)
4842 return 2;
4843 if (next_r == (unsigned) -2
4844 && (h == NULL
4845 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
4846 return 3;
4847 }
4848 return 1;
4849}
4850
4851bfd_boolean
4852ppc64_elf_edit_opd (obfd, info)
4853 bfd *obfd;
4854 struct bfd_link_info *info;
4855{
4856 bfd *ibfd;
4857
4858 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4859 {
4860 asection *sec;
4861 Elf_Internal_Rela *relstart, *rel, *relend;
4862 Elf_Internal_Shdr *symtab_hdr;
4863 Elf_Internal_Sym *local_syms;
4864 struct elf_link_hash_entry **sym_hashes;
4865 bfd_vma offset;
4866 bfd_size_type amt;
4867 long *adjust;
4868 bfd_boolean need_edit;
4869
4870 sec = bfd_get_section_by_name (ibfd, ".opd");
4871 if (sec == NULL)
4872 continue;
4873
4874 amt = sec->_raw_size * sizeof (long) / 24;
4875 adjust = ppc64_elf_section_data (sec)->opd.adjust;
4876 if (adjust == NULL)
4877 {
4878 /* Must be a ld -r link. ie. check_relocs hasn't been
4879 called. */
4880 adjust = (long *) bfd_zalloc (obfd, amt);
4881 ppc64_elf_section_data (sec)->opd.adjust = adjust;
4882 }
4883 memset (adjust, 0, (size_t) amt);
4884
4885 if (sec->output_section == bfd_abs_section_ptr)
4886 continue;
4887
4888 /* Look through the section relocs. */
4889 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
4890 continue;
4891
4892 local_syms = NULL;
4893 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4894 sym_hashes = elf_sym_hashes (ibfd);
4895
4896 /* Read the relocations. */
4897 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
4898 (Elf_Internal_Rela *) NULL,
4899 info->keep_memory);
4900 if (relstart == NULL)
4901 return FALSE;
4902
4903 /* First run through the relocs to check they are sane, and to
4904 determine whether we need to edit this opd section. */
4905 need_edit = FALSE;
4906 offset = 0;
4907 relend = relstart + sec->reloc_count;
4908 for (rel = relstart; rel < relend; rel++)
4909 {
4910 enum elf_ppc64_reloc_type r_type;
4911 unsigned long r_symndx;
4912 asection *sym_sec;
4913 struct elf_link_hash_entry *h;
4914 Elf_Internal_Sym *sym;
4915
4916 /* .opd contains a regular array of 24 byte entries. We're
4917 only interested in the reloc pointing to a function entry
4918 point. */
4919 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4920 if (r_type == R_PPC64_TOC)
4921 continue;
4922
4923 if (r_type != R_PPC64_ADDR64)
4924 {
4925 (*_bfd_error_handler)
4926 (_("%s: unexpected reloc type %u in .opd section"),
4927 bfd_archive_filename (ibfd), r_type);
4928 need_edit = FALSE;
4929 break;
4930 }
4931
4932 if (rel + 1 >= relend)
4933 continue;
4934 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info);
4935 if (r_type != R_PPC64_TOC)
4936 continue;
4937
4938 if (rel->r_offset != offset)
4939 {
4940 /* If someone messes with .opd alignment then after a
4941 "ld -r" we might have padding in the middle of .opd.
4942 Also, there's nothing to prevent someone putting
4943 something silly in .opd with the assembler. No .opd
4944 optimization for them! */
4945 (*_bfd_error_handler)
4946 (_("%s: .opd is not a regular array of opd entries"),
4947 bfd_archive_filename (ibfd));
4948 need_edit = FALSE;
4949 break;
4950 }
4951
4952 r_symndx = ELF64_R_SYM (rel->r_info);
4953 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4954 r_symndx, ibfd))
4955 goto error_free_rel;
4956
4957 if (sym_sec == NULL || sym_sec->owner == NULL)
4958 {
4959 const char *sym_name;
4960 if (h != NULL)
4961 sym_name = h->root.root.string;
4962 else
4963 sym_name = bfd_elf_local_sym_name (ibfd, sym);
4964
4965 (*_bfd_error_handler)
4966 (_("%s: undefined sym `%s' in .opd section"),
4967 bfd_archive_filename (ibfd),
4968 sym_name);
4969 need_edit = FALSE;
4970 break;
4971 }
4972
4973 /* opd entries are always for functions defined in the
4974 current input bfd. If the symbol isn't defined in the
4975 input bfd, then we won't be using the function in this
4976 bfd; It must be defined in a linkonce section in another
4977 bfd, or is weak. It's also possible that we are
4978 discarding the function due to a linker script /DISCARD/,
4979 which we test for via the output_section. */
4980 if (sym_sec->owner != ibfd
4981 || sym_sec->output_section == bfd_abs_section_ptr)
4982 need_edit = TRUE;
4983
4984 offset += 24;
4985 }
4986
4987 if (need_edit)
4988 {
4989 Elf_Internal_Rela *write_rel;
4990 bfd_byte *rptr, *wptr;
4991 bfd_boolean skip;
4992
4993 /* This seems a waste of time as input .opd sections are all
4994 zeros as generated by gcc, but I suppose there's no reason
4995 this will always be so. We might start putting something in
4996 the third word of .opd entries. */
4997 if ((sec->flags & SEC_IN_MEMORY) == 0)
4998 {
4999 bfd_byte *loc = bfd_alloc (ibfd, sec->_raw_size);
5000 if (loc == NULL
5001 || !bfd_get_section_contents (ibfd, sec, loc, (bfd_vma) 0,
5002 sec->_raw_size))
5003 {
5004 if (local_syms != NULL
5005 && symtab_hdr->contents != (unsigned char *) local_syms)
5006 free (local_syms);
5007 error_free_rel:
5008 if (elf_section_data (sec)->relocs != relstart)
5009 free (relstart);
5010 return FALSE;
5011 }
5012 sec->contents = loc;
5013 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
5014 }
5015
5016 elf_section_data (sec)->relocs = relstart;
5017
5018 wptr = sec->contents;
5019 rptr = sec->contents;
5020 write_rel = relstart;
5021 skip = FALSE;
5022 offset = 0;
5023 for (rel = relstart; rel < relend; rel++)
5024 {
5025 if (rel->r_offset == offset)
5026 {
5027 unsigned long r_symndx;
5028 asection *sym_sec;
5029 struct elf_link_hash_entry *h;
5030 Elf_Internal_Sym *sym;
5031
5032 r_symndx = ELF64_R_SYM (rel->r_info);
5033 get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
5034 r_symndx, ibfd);
5035
5036 skip = (sym_sec->owner != ibfd
5037 || sym_sec->output_section == bfd_abs_section_ptr);
5038 if (skip)
5039 {
5040 if (h != NULL && sym_sec->owner == ibfd)
5041 {
5042 /* Arrange for the function descriptor sym
5043 to be dropped. */
5044 struct ppc_link_hash_entry *fdh;
5045 struct ppc_link_hash_entry *fh;
5046
5047 fh = (struct ppc_link_hash_entry *) h;
5048 fdh = (struct ppc_link_hash_entry *) fh->oh;
5049 if (fdh == NULL)
5050 {
5051 const char *fd_name;
5052 struct ppc_link_hash_table *htab;
5053
5054 fd_name = h->root.root.string + 1;
5055 htab = ppc_hash_table (info);
5056 fdh = (struct ppc_link_hash_entry *)
5057 elf_link_hash_lookup (&htab->elf, fd_name,
5058 FALSE, FALSE, FALSE);
5059 fdh->is_func_descriptor = 1;
5060 fdh->oh = &fh->elf;
5061 fh->is_func = 1;
5062 fh->oh = &fdh->elf;
5063 }
5064
5065 fdh->elf.root.u.def.value = 0;
5066 fdh->elf.root.u.def.section = sym_sec;
5067 }
5068 }
5069 else
5070 {
5071 /* We'll be keeping this opd entry. */
5072
5073 if (h != NULL)
5074 {
5075 /* Redefine the function descriptor symbol
5076 to this location in the opd section.
5077 We've checked above that opd relocs are
5078 ordered. */
5079 struct ppc_link_hash_entry *fdh;
5080 struct ppc_link_hash_entry *fh;
5081
5082 fh = (struct ppc_link_hash_entry *) h;
5083 fdh = (struct ppc_link_hash_entry *) fh->oh;
5084 if (fdh == NULL)
5085 {
5086 const char *fd_name;
5087 struct ppc_link_hash_table *htab;
5088
5089 fd_name = h->root.root.string + 1;
5090 htab = ppc_hash_table (info);
5091 fdh = (struct ppc_link_hash_entry *)
5092 elf_link_hash_lookup (&htab->elf, fd_name,
5093 FALSE, FALSE, FALSE);
5094 fdh->is_func_descriptor = 1;
5095 fdh->oh = &fh->elf;
5096 fh->is_func = 1;
5097 fh->oh = &fdh->elf;
5098 }
5099
5100 fdh->elf.root.u.def.value = wptr - sec->contents;
5101 }
5102 else
5103 {
5104 /* Local syms are a bit tricky. We could
5105 tweak them as they can be cached, but
5106 we'd need to look through the local syms
5107 for the function descriptor sym which we
5108 don't have at the moment. So keep an
5109 array of adjustments. */
5110 adjust[rel->r_offset / 24] = wptr - rptr;
5111 }
5112
5113 if (wptr != rptr)
5114 memcpy (wptr, rptr, 24);
5115 wptr += 24;
5116 }
5117 rptr += 24;
5118 offset += 24;
5119 }
5120
5121 /* We need to adjust any reloc offsets to point to the
5122 new opd entries. While we're at it, we may as well
5123 remove redundant relocs. */
5124 if (!skip)
5125 {
5126 rel->r_offset += wptr - rptr;
5127 if (write_rel != rel)
5128 memcpy (write_rel, rel, sizeof (*rel));
5129 ++write_rel;
5130 }
5131 }
5132
5133 sec->_cooked_size = wptr - sec->contents;
5134 sec->reloc_count = write_rel - relstart;
5135 /* Fudge the size too, as this is used later in
5136 elf_bfd_final_link if we are emitting relocs. */
5137 elf_section_data (sec)->rel_hdr.sh_size
5138 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5139 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
5140 }
5141 else if (elf_section_data (sec)->relocs != relstart)
5142 free (relstart);
5143
5144 if (local_syms != NULL
5145 && symtab_hdr->contents != (unsigned char *) local_syms)
5146 {
5147 if (!info->keep_memory)
5148 free (local_syms);
5149 else
5150 symtab_hdr->contents = (unsigned char *) local_syms;
5151 }
5152 }
5153
5154 return TRUE;
5155}
5156
5157/* Set htab->tls_sec. */
5158
5159bfd_boolean
5160ppc64_elf_tls_setup (obfd, info)
5161 bfd *obfd;
5162 struct bfd_link_info *info;
5163{
5164 asection *tls;
5165 struct ppc_link_hash_table *htab;
5166
5167 for (tls = obfd->sections; tls != NULL; tls = tls->next)
5168 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
5169 == (SEC_THREAD_LOCAL | SEC_LOAD))
5170 break;
5171
5172 htab = ppc_hash_table (info);
5173 htab->tls_sec = tls;
5174 return tls != NULL;
5175}
5176
5177/* Run through all the TLS relocs looking for optimization
5178 opportunities. The linker has been hacked (see ppc64elf.em) to do
5179 a preliminary section layout so that we know the TLS segment
5180 offsets. We can't optimize earlier because some optimizations need
5181 to know the tp offset, and we need to optimize before allocating
5182 dynamic relocations. */
5183
5184bfd_boolean
5185ppc64_elf_tls_optimize (obfd, info)
5186 bfd *obfd ATTRIBUTE_UNUSED;
5187 struct bfd_link_info *info;
5188{
5189 bfd *ibfd;
5190 asection *sec;
5191 struct ppc_link_hash_table *htab;
5192
5193 if (info->relocateable || info->shared)
5194 return TRUE;
5195
5196 htab = ppc_hash_table (info);
5197 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5198 {
5199 Elf_Internal_Sym *locsyms = NULL;
5200
5201 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5202 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5203 {
5204 Elf_Internal_Rela *relstart, *rel, *relend;
5205 int expecting_tls_get_addr;
5206
5207 /* Read the relocations. */
5208 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
5209 (Elf_Internal_Rela *) NULL,
5210 info->keep_memory);
5211 if (relstart == NULL)
5212 return FALSE;
5213
5214 expecting_tls_get_addr = 0;
5215 relend = relstart + sec->reloc_count;
5216 for (rel = relstart; rel < relend; rel++)
5217 {
5218 enum elf_ppc64_reloc_type r_type;
5219 unsigned long r_symndx;
5220 struct elf_link_hash_entry *h;
5221 Elf_Internal_Sym *sym;
5222 asection *sym_sec;
5223 char *tls_mask;
5224 char tls_set, tls_clear, tls_type = 0;
5225 bfd_vma value;
5226 bfd_boolean ok_tprel, is_local;
5227
5228 r_symndx = ELF64_R_SYM (rel->r_info);
5229 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
5230 r_symndx, ibfd))
5231 {
5232 err_free_rel:
5233 if (elf_section_data (sec)->relocs != relstart)
5234 free (relstart);
5235 if (locsyms != NULL
5236 && (elf_tdata (ibfd)->symtab_hdr.contents
5237 != (unsigned char *) locsyms))
5238 free (locsyms);
5239 return FALSE;
5240 }
5241
5242 if (h != NULL)
5243 {
5244 if (h->root.type != bfd_link_hash_defined
5245 && h->root.type != bfd_link_hash_defweak)
5246 continue;
5247 value = h->root.u.def.value;
5248 }
5249 else
5250 value = sym->st_value;
5251
5252 ok_tprel = FALSE;
5253 is_local = FALSE;
5254 if (h == NULL
5255 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
5256 {
5257 is_local = TRUE;
5258 value += sym_sec->output_offset;
5259 value += sym_sec->output_section->vma;
5260 value -= htab->tls_sec->vma;
5261 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5262 < (bfd_vma) 1 << 32);
5263 }
5264
5265 r_type
5266 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5267 switch (r_type)
5268 {
5269 case R_PPC64_GOT_TLSLD16:
5270 case R_PPC64_GOT_TLSLD16_LO:
5271 case R_PPC64_GOT_TLSLD16_HI:
5272 case R_PPC64_GOT_TLSLD16_HA:
5273 /* These relocs should never be against a symbol
5274 defined in a shared lib. Leave them alone if
5275 that turns out to be the case. */
5276 if (!is_local)
5277 continue;
5278
5279 htab->tlsld_got.refcount -= 1;
5280 /* LD -> LE */
5281 tls_set = 0;
5282 tls_clear = TLS_LD;
5283 tls_type = TLS_TLS | TLS_LD;
5284 expecting_tls_get_addr = 1;
5285 break;
5286
5287 case R_PPC64_GOT_TLSGD16:
5288 case R_PPC64_GOT_TLSGD16_LO:
5289 case R_PPC64_GOT_TLSGD16_HI:
5290 case R_PPC64_GOT_TLSGD16_HA:
5291 if (ok_tprel)
5292 /* GD -> LE */
5293 tls_set = 0;
5294 else
5295 /* GD -> IE */
5296 tls_set = TLS_TLS | TLS_TPRELGD;
5297 tls_clear = TLS_GD;
5298 tls_type = TLS_TLS | TLS_GD;
5299 expecting_tls_get_addr = 1;
5300 break;
5301
5302 case R_PPC64_GOT_TPREL16_DS:
5303 case R_PPC64_GOT_TPREL16_LO_DS:
5304 case R_PPC64_GOT_TPREL16_HI:
5305 case R_PPC64_GOT_TPREL16_HA:
5306 expecting_tls_get_addr = 0;
5307 if (ok_tprel)
5308 {
5309 /* IE -> LE */
5310 tls_set = 0;
5311 tls_clear = TLS_TPREL;
5312 tls_type = TLS_TLS | TLS_TPREL;
5313 break;
5314 }
5315 else
5316 continue;
5317
5318 case R_PPC64_REL14:
5319 case R_PPC64_REL14_BRTAKEN:
5320 case R_PPC64_REL14_BRNTAKEN:
5321 case R_PPC64_REL24:
5322 if (h != NULL
5323 && h == htab->tls_get_addr)
5324 {
5325 if (!expecting_tls_get_addr
5326 && rel != relstart
5327 && ((ELF64_R_TYPE (rel[-1].r_info)
5328 == R_PPC64_TOC16)
5329 || (ELF64_R_TYPE (rel[-1].r_info)
5330 == R_PPC64_TOC16_LO)))
5331 {
5332 /* Check for toc tls entries. */
5333 char *toc_tls;
5334 int retval;
5335
5336 retval = get_tls_mask (&toc_tls, &locsyms,
5337 rel - 1, ibfd);
5338 if (retval == 0)
5339 goto err_free_rel;
5340 if (toc_tls != NULL)
5341 expecting_tls_get_addr = retval > 1;
5342 }
5343
5344 if (expecting_tls_get_addr)
5345 {
5346 struct plt_entry *ent;
5347 for (ent = h->plt.plist; ent; ent = ent->next)
5348 if (ent->addend == 0)
5349 {
5350 if (ent->plt.refcount > 0)
5351 ent->plt.refcount -= 1;
5352 break;
5353 }
5354 }
5355 }
5356 expecting_tls_get_addr = 0;
5357 continue;
5358
5359 case R_PPC64_TPREL64:
5360 expecting_tls_get_addr = 0;
5361 if (ok_tprel)
5362 {
5363 /* IE -> LE */
5364 tls_set = TLS_EXPLICIT;
5365 tls_clear = TLS_TPREL;
5366 break;
5367 }
5368 else
5369 continue;
5370
5371 case R_PPC64_DTPMOD64:
5372 expecting_tls_get_addr = 0;
5373 if (rel + 1 < relend
5374 && (rel[1].r_info
5375 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5376 && rel[1].r_offset == rel->r_offset + 8)
5377 {
5378 if (ok_tprel)
5379 /* GD -> LE */
5380 tls_set = TLS_EXPLICIT | TLS_GD;
5381 else
5382 /* GD -> IE */
5383 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
5384 tls_clear = TLS_GD;
5385 }
5386 else
5387 {
5388 if (!is_local)
5389 continue;
5390
5391 /* LD -> LE */
5392 tls_set = TLS_EXPLICIT;
5393 tls_clear = TLS_LD;
5394 }
5395 break;
5396
5397 default:
5398 expecting_tls_get_addr = 0;
5399 continue;
5400 }
5401
5402 if ((tls_set & TLS_EXPLICIT) == 0)
5403 {
5404 struct got_entry *ent;
5405
5406 /* Adjust got entry for this reloc. */
5407 if (h != NULL)
5408 ent = h->got.glist;
5409 else
5410 ent = elf_local_got_ents (ibfd)[r_symndx];
5411
5412 for (; ent != NULL; ent = ent->next)
5413 if (ent->addend == rel->r_addend
5414 && ent->tls_type == tls_type)
5415 break;
5416 if (ent == NULL)
5417 abort ();
5418
5419 if (tls_set == 0)
5420 {
5421 /* We managed to get rid of a got entry. */
5422 if (ent->got.refcount > 0)
5423 ent->got.refcount -= 1;
5424 }
5425 }
5426 else if (h != NULL)
5427 {
5428 struct ppc_link_hash_entry * eh;
5429 struct ppc_dyn_relocs **pp;
5430 struct ppc_dyn_relocs *p;
5431
5432 /* Adjust dynamic relocs. */
5433 eh = (struct ppc_link_hash_entry *) h;
5434 for (pp = &eh->dyn_relocs;
5435 (p = *pp) != NULL;
5436 pp = &p->next)
5437 if (p->sec == sec)
5438 {
5439 /* If we got rid of a DTPMOD/DTPREL reloc
5440 pair then we'll lose one or two dyn
5441 relocs. */
5442 if (tls_set == (TLS_EXPLICIT | TLS_GD))
5443 p->count -= 1;
5444 p->count -= 1;
5445 if (p->count == 0)
5446 *pp = p->next;
5447 break;
5448 }
5449 }
5450
5451 *tls_mask |= tls_set;
5452 *tls_mask &= ~tls_clear;
5453 }
5454
5455 if (elf_section_data (sec)->relocs != relstart)
5456 free (relstart);
5457 }
5458
5459 if (locsyms != NULL
5460 && (elf_tdata (ibfd)->symtab_hdr.contents
5461 != (unsigned char *) locsyms))
5462 {
5463 if (!info->keep_memory)
5464 free (locsyms);
5465 else
5466 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
5467 }
5468 }
5469 return TRUE;
5470}
5471
5472/* This is the condition under which ppc64_elf_finish_dynamic_symbol
5473 will be called from elflink.h. If elflink.h doesn't call our
5474 finish_dynamic_symbol routine, we'll need to do something about
5475 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
5476#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
5477 ((DYN) \
5478 && ((INFO)->shared \
5479 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5480 && ((H)->dynindx != -1 \
5481 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5482
5483/* Allocate space in .plt, .got and associated reloc sections for
5484 dynamic relocs. */
5485
5486static bfd_boolean
5487allocate_dynrelocs (h, inf)
5488 struct elf_link_hash_entry *h;
5489 PTR inf;
5490{
5491 struct bfd_link_info *info;
5492 struct ppc_link_hash_table *htab;
5493 asection *s;
5494 struct ppc_link_hash_entry *eh;
5495 struct ppc_dyn_relocs *p;
5496 struct got_entry *gent;
5497
5498 if (h->root.type == bfd_link_hash_indirect)
5499 return TRUE;
5500
5501 if (h->root.type == bfd_link_hash_warning)
5502 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5503
5504 info = (struct bfd_link_info *) inf;
5505 htab = ppc_hash_table (info);
5506
5507 if (htab->elf.dynamic_sections_created
5508 && h->dynindx != -1
5509 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
5510 {
5511 struct plt_entry *pent;
5512 bfd_boolean doneone = FALSE;
5513 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5514 if (pent->plt.refcount > 0)
5515 {
5516 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5517
5518 /* If this is the first .plt entry, make room for the special
5519 first entry. */
5520 s = htab->splt;
5521 if (s->_raw_size == 0)
5522 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
5523
5524 pent->plt.offset = s->_raw_size;
5525
5526 /* Make room for this entry. */
5527 s->_raw_size += PLT_ENTRY_SIZE;
5528
5529 /* Make room for the .glink code. */
5530 s = htab->sglink;
5531 if (s->_raw_size == 0)
5532 s->_raw_size += GLINK_CALL_STUB_SIZE;
5533 /* We need bigger stubs past index 32767. */
5534 if (s->_raw_size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5535 s->_raw_size += 4;
5536 s->_raw_size += 2*4;
5537
5538 /* We also need to make an entry in the .rela.plt section. */
5539 s = htab->srelplt;
5540 s->_raw_size += sizeof (Elf64_External_Rela);
5541 doneone = TRUE;
5542 }
5543 else
5544 pent->plt.offset = (bfd_vma) -1;
5545 if (!doneone)
5546 {
5547 h->plt.plist = NULL;
5548 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5549 }
5550 }
5551 else
5552 {
5553 h->plt.plist = NULL;
5554 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5555 }
5556
5557 eh = (struct ppc_link_hash_entry *) h;
5558 /* Run through the TLS GD got entries first if we're changing them
5559 to TPREL. */
5560 if ((eh->tls_mask & TLS_TPRELGD) != 0)
5561 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5562 if (gent->got.refcount > 0
5563 && (gent->tls_type & TLS_GD) != 0)
5564 {
5565 /* This was a GD entry that has been converted to TPREL. If
5566 there happens to be a TPREL entry we can use that one. */
5567 struct got_entry *ent;
5568 for (ent = h->got.glist; ent != NULL; ent = ent->next)
5569 if (ent->got.refcount > 0
5570 && (ent->tls_type & TLS_TPREL) != 0
5571 && ent->addend == gent->addend)
5572 {
5573 gent->got.refcount = 0;
5574 break;
5575 }
5576
5577 /* If not, then we'll be using our own TPREL entry. */
5578 if (gent->got.refcount != 0)
5579 gent->tls_type = TLS_TLS | TLS_TPREL;
5580 }
5581
5582 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5583 if (gent->got.refcount > 0)
5584 {
5585 bfd_boolean dyn;
5586
5587 /* Make sure this symbol is output as a dynamic symbol.
5588 Undefined weak syms won't yet be marked as dynamic,
5589 nor will all TLS symbols. */
5590 if (h->dynindx == -1
5591 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5592 {
5593 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5594 return FALSE;
5595 }
5596
5597 if ((gent->tls_type & TLS_LD) != 0)
5598 {
5599 gent->got.offset = htab->tlsld_got.offset;
5600 continue;
5601 }
5602
5603 s = htab->sgot;
5604 gent->got.offset = s->_raw_size;
5605 s->_raw_size += (gent->tls_type & eh->tls_mask & TLS_GD) ? 16 : 8;
5606 dyn = htab->elf.dynamic_sections_created;
5607 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
5608 htab->srelgot->_raw_size
5609 += (gent->tls_type & eh->tls_mask & TLS_GD
5610 ? 2 * sizeof (Elf64_External_Rela)
5611 : sizeof (Elf64_External_Rela));
5612 }
5613 else
5614 gent->got.offset = (bfd_vma) -1;
5615
5616 if (eh->dyn_relocs == NULL)
5617 return TRUE;
5618
5619 /* In the shared -Bsymbolic case, discard space allocated for
5620 dynamic pc-relative relocs against symbols which turn out to be
5621 defined in regular objects. For the normal shared case, discard
5622 space for relocs that have become local due to symbol visibility
5623 changes. */
5624
5625 if (info->shared)
5626 {
5627 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
5628 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
5629 || info->symbolic))
5630 {
5631 struct ppc_dyn_relocs **pp;
5632
5633 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5634 {
5635 p->count -= p->pc_count;
5636 p->pc_count = 0;
5637 if (p->count == 0)
5638 *pp = p->next;
5639 else
5640 pp = &p->next;
5641 }
5642 }
5643 }
5644 else
5645 {
5646 /* For the non-shared case, discard space for relocs against
5647 symbols which turn out to need copy relocs or are not
5648 dynamic. */
5649
5650 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
5651 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5652 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5653 || (htab->elf.dynamic_sections_created
5654 && (h->root.type == bfd_link_hash_undefweak
5655 || h->root.type == bfd_link_hash_undefined))))
5656 {
5657 /* Make sure this symbol is output as a dynamic symbol.
5658 Undefined weak syms won't yet be marked as dynamic. */
5659 if (h->dynindx == -1
5660 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5661 {
5662 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5663 return FALSE;
5664 }
5665
5666 /* If that succeeded, we know we'll be keeping all the
5667 relocs. */
5668 if (h->dynindx != -1)
5669 goto keep;
5670 }
5671
5672 eh->dyn_relocs = NULL;
5673
5674 keep: ;
5675 }
5676
5677 /* Finally, allocate space. */
5678 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5679 {
5680 asection *sreloc = elf_section_data (p->sec)->sreloc;
5681 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
5682 }
5683
5684 return TRUE;
5685}
5686
5687/* Find any dynamic relocs that apply to read-only sections. */
5688
5689static bfd_boolean
5690readonly_dynrelocs (h, inf)
5691 struct elf_link_hash_entry *h;
5692 PTR inf;
5693{
5694 struct ppc_link_hash_entry *eh;
5695 struct ppc_dyn_relocs *p;
5696
5697 if (h->root.type == bfd_link_hash_warning)
5698 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5699
5700 eh = (struct ppc_link_hash_entry *) h;
5701 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5702 {
5703 asection *s = p->sec->output_section;
5704
5705 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5706 {
5707 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5708
5709 info->flags |= DF_TEXTREL;
5710
5711 /* Not an error, just cut short the traversal. */
5712 return FALSE;
5713 }
5714 }
5715 return TRUE;
5716}
5717
5718/* Set the sizes of the dynamic sections. */
5719
5720static bfd_boolean
5721ppc64_elf_size_dynamic_sections (output_bfd, info)
5722 bfd *output_bfd ATTRIBUTE_UNUSED;
5723 struct bfd_link_info *info;
5724{
5725 struct ppc_link_hash_table *htab;
5726 bfd *dynobj;
5727 asection *s;
5728 bfd_boolean relocs;
5729 bfd *ibfd;
5730
5731 htab = ppc_hash_table (info);
5732 dynobj = htab->elf.dynobj;
5733 if (dynobj == NULL)
5734 abort ();
5735
5736 if (htab->elf.dynamic_sections_created)
5737 {
5738 /* Set the contents of the .interp section to the interpreter. */
5739 if (! info->shared)
5740 {
5741 s = bfd_get_section_by_name (dynobj, ".interp");
5742 if (s == NULL)
5743 abort ();
5744 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
5745 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5746 }
5747 }
5748
5749 if (htab->tlsld_got.refcount > 0)
5750 {
5751 htab->tlsld_got.offset = htab->sgot->_raw_size;
5752 htab->sgot->_raw_size += 16;
5753 if (info->shared)
5754 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
5755 }
5756 else
5757 htab->tlsld_got.offset = (bfd_vma) -1;
5758
5759 /* Set up .got offsets for local syms, and space for local dynamic
5760 relocs. */
5761 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5762 {
5763 struct got_entry **lgot_ents;
5764 struct got_entry **end_lgot_ents;
5765 char *lgot_masks;
5766 bfd_size_type locsymcount;
5767 Elf_Internal_Shdr *symtab_hdr;
5768 asection *srel;
5769
5770 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5771 continue;
5772
5773 for (s = ibfd->sections; s != NULL; s = s->next)
5774 {
5775 struct ppc_dyn_relocs *p;
5776
5777 for (p = *((struct ppc_dyn_relocs **)
5778 &elf_section_data (s)->local_dynrel);
5779 p != NULL;
5780 p = p->next)
5781 {
5782 if (!bfd_is_abs_section (p->sec)
5783 && bfd_is_abs_section (p->sec->output_section))
5784 {
5785 /* Input section has been discarded, either because
5786 it is a copy of a linkonce section or due to
5787 linker script /DISCARD/, so we'll be discarding
5788 the relocs too. */
5789 }
5790 else if (p->count != 0)
5791 {
5792 srel = elf_section_data (p->sec)->sreloc;
5793 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
5794 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5795 info->flags |= DF_TEXTREL;
5796 }
5797 }
5798 }
5799
5800 lgot_ents = elf_local_got_ents (ibfd);
5801 if (!lgot_ents)
5802 continue;
5803
5804 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5805 locsymcount = symtab_hdr->sh_info;
5806 end_lgot_ents = lgot_ents + locsymcount;
5807 lgot_masks = (char *) end_lgot_ents;
5808 s = htab->sgot;
5809 srel = htab->srelgot;
5810 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
5811 {
5812 struct got_entry *ent;
5813
5814 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5815 if (ent->got.refcount > 0)
5816 {
5817 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
5818 {
5819 if (htab->tlsld_got.offset == (bfd_vma) -1)
5820 {
5821 htab->tlsld_got.offset = s->_raw_size;
5822 s->_raw_size += 16;
5823 if (info->shared)
5824 srel->_raw_size += sizeof (Elf64_External_Rela);
5825 }
5826 ent->got.offset = htab->tlsld_got.offset;
5827 }
5828 else
5829 {
5830 ent->got.offset = s->_raw_size;
5831 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
5832 {
5833 s->_raw_size += 16;
5834 if (info->shared)
5835 srel->_raw_size += 2 * sizeof (Elf64_External_Rela);
5836 }
5837 else
5838 {
5839 s->_raw_size += 8;
5840 if (info->shared)
5841 srel->_raw_size += sizeof (Elf64_External_Rela);
5842 }
5843 }
5844 }
5845 else
5846 ent->got.offset = (bfd_vma) -1;
5847 }
5848 }
5849
5850 /* Allocate global sym .plt and .got entries, and space for global
5851 sym dynamic relocs. */
5852 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
5853
5854 /* We now have determined the sizes of the various dynamic sections.
5855 Allocate memory for them. */
5856 relocs = FALSE;
5857 for (s = dynobj->sections; s != NULL; s = s->next)
5858 {
5859 if ((s->flags & SEC_LINKER_CREATED) == 0)
5860 continue;
5861
5862 /* Reset _cooked_size since prelim layout will set it wrongly,
5863 and a non-zero _cooked_size sticks. */
5864 s->_cooked_size = 0;
5865
5866 if (s == htab->sbrlt || s == htab->srelbrlt)
5867 /* These haven't been allocated yet; don't strip. */
5868 continue;
5869 else if (s == htab->splt
5870 || s == htab->sgot
5871 || s == htab->sglink)
5872 {
5873 /* Strip this section if we don't need it; see the
5874 comment below. */
5875 }
5876 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5877 {
5878 if (s->_raw_size == 0)
5879 {
5880 /* If we don't need this section, strip it from the
5881 output file. This is mostly to handle .rela.bss and
5882 .rela.plt. We must create both sections in
5883 create_dynamic_sections, because they must be created
5884 before the linker maps input sections to output
5885 sections. The linker does that before
5886 adjust_dynamic_symbol is called, and it is that
5887 function which decides whether anything needs to go
5888 into these sections. */
5889 }
5890 else
5891 {
5892 if (s != htab->srelplt)
5893 relocs = TRUE;
5894
5895 /* We use the reloc_count field as a counter if we need
5896 to copy relocs into the output file. */
5897 s->reloc_count = 0;
5898 }
5899 }
5900 else
5901 {
5902 /* It's not one of our sections, so don't allocate space. */
5903 continue;
5904 }
5905
5906 if (s->_raw_size == 0)
5907 {
5908 _bfd_strip_section_from_output (info, s);
5909 continue;
5910 }
5911
5912 /* .plt is in the bss section. We don't initialise it. */
5913 if ((s->flags & SEC_LOAD) == 0)
5914 continue;
5915
5916 /* Allocate memory for the section contents. We use bfd_zalloc
5917 here in case unused entries are not reclaimed before the
5918 section's contents are written out. This should not happen,
5919 but this way if it does we get a R_PPC64_NONE reloc in .rela
5920 sections instead of garbage.
5921 We also rely on the section contents being zero when writing
5922 the GOT. */
5923 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
5924 if (s->contents == NULL)
5925 return FALSE;
5926 }
5927
5928 if (htab->elf.dynamic_sections_created)
5929 {
5930 /* Add some entries to the .dynamic section. We fill in the
5931 values later, in ppc64_elf_finish_dynamic_sections, but we
5932 must add the entries now so that we get the correct size for
5933 the .dynamic section. The DT_DEBUG entry is filled in by the
5934 dynamic linker and used by the debugger. */
5935#define add_dynamic_entry(TAG, VAL) \
5936 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5937
5938 if (!info->shared)
5939 {
5940 if (!add_dynamic_entry (DT_DEBUG, 0))
5941 return FALSE;
5942 }
5943
5944 if (htab->splt != NULL && htab->splt->_raw_size != 0)
5945 {
5946 if (!add_dynamic_entry (DT_PLTGOT, 0)
5947 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5948 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5949 || !add_dynamic_entry (DT_JMPREL, 0)
5950 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
5951 return FALSE;
5952 }
5953
5954 if (NO_OPD_RELOCS)
5955 {
5956 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
5957 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
5958 return FALSE;
5959 }
5960
5961 if (relocs)
5962 {
5963 if (!add_dynamic_entry (DT_RELA, 0)
5964 || !add_dynamic_entry (DT_RELASZ, 0)
5965 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
5966 return FALSE;
5967
5968 /* If any dynamic relocs apply to a read-only section,
5969 then we need a DT_TEXTREL entry. */
5970 if ((info->flags & DF_TEXTREL) == 0)
5971 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
5972 (PTR) info);
5973
5974 if ((info->flags & DF_TEXTREL) != 0)
5975 {
5976 if (!add_dynamic_entry (DT_TEXTREL, 0))
5977 return FALSE;
5978 }
5979 }
5980 }
5981#undef add_dynamic_entry
5982
5983 return TRUE;
5984}
5985
5986/* Determine the type of stub needed, if any, for a call. */
5987
5988static INLINE enum ppc_stub_type
5989ppc_type_of_stub (input_sec, rel, hash, destination)
5990 asection *input_sec;
5991 const Elf_Internal_Rela *rel;
5992 struct ppc_link_hash_entry **hash;
5993 bfd_vma destination;
5994{
5995 struct ppc_link_hash_entry *h = *hash;
5996 bfd_vma location;
5997 bfd_vma branch_offset;
5998 bfd_vma max_branch_offset;
5999 unsigned int r_type;
6000
6001 if (h != NULL)
6002 {
6003 if (h->oh != NULL
6004 && h->oh->dynindx != -1)
6005 {
6006 struct plt_entry *ent;
6007 for (ent = h->oh->plt.plist; ent != NULL; ent = ent->next)
6008 if (ent->addend == rel->r_addend
6009 && ent->plt.offset != (bfd_vma) -1)
6010 {
6011 *hash = (struct ppc_link_hash_entry *) h->oh;
6012 return ppc_stub_plt_call;
6013 }
6014 }
6015
6016 if (h->elf.root.type == bfd_link_hash_undefweak
6017 || h->elf.root.type == bfd_link_hash_undefined)
6018 return ppc_stub_none;
6019 }
6020
6021 /* Determine where the call point is. */
6022 location = (input_sec->output_offset
6023 + input_sec->output_section->vma
6024 + rel->r_offset);
6025
6026 branch_offset = destination - location;
6027 r_type = ELF64_R_TYPE (rel->r_info);
6028
6029 /* Determine if a long branch stub is needed. */
6030 max_branch_offset = 1 << 25;
6031 if (r_type != (unsigned int) R_PPC64_REL24)
6032 max_branch_offset = 1 << 15;
6033
6034 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
6035 /* We need a stub. Figure out whether a long_branch or plt_branch
6036 is needed later. */
6037 return ppc_stub_long_branch;
6038
6039 return ppc_stub_none;
6040}
6041
6042/* Build a .plt call stub. */
6043
6044static bfd_byte *
6045build_plt_stub (obfd, p, offset, glink)
6046 bfd *obfd;
6047 bfd_byte *p;
6048 int offset;
6049 int glink;
6050{
6051#define PPC_LO(v) ((v) & 0xffff)
6052#define PPC_HI(v) (((v) >> 16) & 0xffff)
6053#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6054
6055 if (glink)
6056 bfd_put_32 (obfd, LD_R2_40R1, p), p += 4;
6057 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
6058 if (!glink)
6059 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
6060 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6061 if (PPC_HA (offset + 8) != PPC_HA (offset))
6062 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6063 offset += 8;
6064 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
6065 if (PPC_HA (offset + 8) != PPC_HA (offset))
6066 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6067 offset += 8;
6068 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6069 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6070 bfd_put_32 (obfd, BCTR, p), p += 4;
6071 return p;
6072}
6073
6074static bfd_boolean
6075ppc_build_one_stub (gen_entry, in_arg)
6076 struct bfd_hash_entry *gen_entry;
6077 PTR in_arg;
6078{
6079 struct ppc_stub_hash_entry *stub_entry;
6080 struct ppc_branch_hash_entry *br_entry;
6081 struct bfd_link_info *info;
6082 struct ppc_link_hash_table *htab;
6083 asection *stub_sec;
6084 bfd *stub_bfd;
6085 bfd_byte *loc;
6086 bfd_byte *p;
6087 unsigned int indx;
6088 struct plt_entry *ent;
6089 bfd_vma off;
6090 int size;
6091
6092 /* Massage our args to the form they really have. */
6093 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6094 info = (struct bfd_link_info *) in_arg;
6095
6096 htab = ppc_hash_table (info);
6097 stub_sec = stub_entry->stub_sec;
6098
6099 /* Make a note of the offset within the stubs for this entry. */
6100 stub_entry->stub_offset = stub_sec->_cooked_size;
6101 loc = stub_sec->contents + stub_entry->stub_offset;
6102
6103 stub_bfd = stub_sec->owner;
6104
6105 switch (stub_entry->stub_type)
6106 {
6107 case ppc_stub_long_branch:
6108 /* Branches are relative. This is where we are going to. */
6109 off = (stub_entry->target_value
6110 + stub_entry->target_section->output_offset
6111 + stub_entry->target_section->output_section->vma);
6112
6113 /* And this is where we are coming from. */
6114 off -= (stub_entry->stub_offset
6115 + stub_sec->output_offset
6116 + stub_sec->output_section->vma);
6117
6118 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
6119
6120 bfd_put_32 (stub_bfd, (bfd_vma) B_DOT | (off & 0x3fffffc), loc);
6121 size = 4;
6122 break;
6123
6124 case ppc_stub_plt_branch:
6125 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6126 stub_entry->root.string + 9,
6127 FALSE, FALSE);
6128 if (br_entry == NULL)
6129 {
6130 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6131 stub_entry->root.string + 9);
6132 htab->stub_error = TRUE;
6133 return FALSE;
6134 }
6135
6136 off = (stub_entry->target_value
6137 + stub_entry->target_section->output_offset
6138 + stub_entry->target_section->output_section->vma);
6139
6140 bfd_put_64 (htab->sbrlt->owner, off,
6141 htab->sbrlt->contents + br_entry->offset);
6142
6143 if (info->shared)
6144 {
6145 /* Create a reloc for the branch lookup table entry. */
6146 Elf_Internal_Rela rela;
6147 bfd_byte *loc;
6148
6149 rela.r_offset = (br_entry->offset
6150 + htab->sbrlt->output_offset
6151 + htab->sbrlt->output_section->vma);
6152 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6153 rela.r_addend = off;
6154
6155 loc = htab->srelbrlt->contents;
6156 loc += htab->srelbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6157 bfd_elf64_swap_reloca_out (htab->srelbrlt->owner, &rela, loc);
6158 }
6159
6160 off = (br_entry->offset
6161 + htab->sbrlt->output_offset
6162 + htab->sbrlt->output_section->vma
6163 - elf_gp (htab->sbrlt->output_section->owner)
6164 - TOC_BASE_OFF);
6165
6166 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6167 {
6168 (*_bfd_error_handler)
6169 (_("linkage table error against `%s'"),
6170 stub_entry->root.string);
6171 bfd_set_error (bfd_error_bad_value);
6172 htab->stub_error = TRUE;
6173 return FALSE;
6174 }
6175
6176 indx = off;
6177 bfd_put_32 (stub_bfd, (bfd_vma) ADDIS_R12_R2 | PPC_HA (indx), loc);
6178 bfd_put_32 (stub_bfd, (bfd_vma) LD_R11_0R12 | PPC_LO (indx), loc + 4);
6179 bfd_put_32 (stub_bfd, (bfd_vma) MTCTR_R11, loc + 8);
6180 bfd_put_32 (stub_bfd, (bfd_vma) BCTR, loc + 12);
6181 size = 16;
6182 break;
6183
6184 case ppc_stub_plt_call:
6185 /* Do the best we can for shared libraries built without
6186 exporting ".foo" for each "foo". This can happen when symbol
6187 versioning scripts strip all bar a subset of symbols. */
6188 if (stub_entry->h->oh->root.type != bfd_link_hash_defined
6189 && stub_entry->h->oh->root.type != bfd_link_hash_defweak)
6190 {
6191 /* Point the symbol at the stub. There may be multiple stubs,
6192 we don't really care; The main thing is to make this sym
6193 defined somewhere. */
6194 stub_entry->h->oh->root.type = bfd_link_hash_defined;
6195 stub_entry->h->oh->root.u.def.section = stub_entry->stub_sec;
6196 stub_entry->h->oh->root.u.def.value = stub_entry->stub_offset;
6197 }
6198
6199 /* Now build the stub. */
6200 off = (bfd_vma) -1;
6201 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6202 if (ent->addend == stub_entry->addend)
6203 {
6204 off = ent->plt.offset;
6205 break;
6206 }
6207 if (off >= (bfd_vma) -2)
6208 abort ();
6209
6210 off &= ~ (bfd_vma) 1;
6211 off += (htab->splt->output_offset
6212 + htab->splt->output_section->vma
6213 - elf_gp (htab->splt->output_section->owner)
6214 - TOC_BASE_OFF);
6215
6216 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6217 {
6218 (*_bfd_error_handler)
6219 (_("linkage table error against `%s'"),
6220 stub_entry->h->elf.root.root.string);
6221 bfd_set_error (bfd_error_bad_value);
6222 htab->stub_error = TRUE;
6223 return FALSE;
6224 }
6225
6226 p = build_plt_stub (stub_bfd, loc, (int) off, 0);
6227 size = p - loc;
6228 break;
6229
6230 default:
6231 BFD_FAIL ();
6232 return FALSE;
6233 }
6234
6235 stub_sec->_cooked_size += size;
6236 return TRUE;
6237}
6238
6239/* As above, but don't actually build the stub. Just bump offset so
6240 we know stub section sizes, and select plt_branch stubs where
6241 long_branch stubs won't do. */
6242
6243static bfd_boolean
6244ppc_size_one_stub (gen_entry, in_arg)
6245 struct bfd_hash_entry *gen_entry;
6246 PTR in_arg;
6247{
6248 struct ppc_stub_hash_entry *stub_entry;
6249 struct ppc_link_hash_table *htab;
6250 bfd_vma off;
6251 int size;
6252
6253 /* Massage our args to the form they really have. */
6254 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6255 htab = (struct ppc_link_hash_table *) in_arg;
6256
6257 if (stub_entry->stub_type == ppc_stub_plt_call)
6258 {
6259 struct plt_entry *ent;
6260 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6261 if (ent->addend == stub_entry->addend)
6262 {
6263 off = ent->plt.offset & ~(bfd_vma) 1;
6264 break;
6265 }
6266 if (ent == NULL)
6267 abort ();
6268 off += (htab->splt->output_offset
6269 + htab->splt->output_section->vma
6270 - elf_gp (htab->splt->output_section->owner)
6271 - TOC_BASE_OFF);
6272
6273 size = 28;
6274 if (PPC_HA ((int) off + 16) != PPC_HA ((int) off))
6275 size += 4;
6276 }
6277 else
6278 {
6279 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6280 stub_entry->stub_type = ppc_stub_long_branch;
6281 size = 4;
6282
6283 off = (stub_entry->target_value
6284 + stub_entry->target_section->output_offset
6285 + stub_entry->target_section->output_section->vma);
6286 off -= (stub_entry->stub_sec->_raw_size
6287 + stub_entry->stub_sec->output_offset
6288 + stub_entry->stub_sec->output_section->vma);
6289
6290 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6291 {
6292 struct ppc_branch_hash_entry *br_entry;
6293
6294 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6295 stub_entry->root.string + 9,
6296 TRUE, FALSE);
6297 if (br_entry == NULL)
6298 {
6299 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6300 stub_entry->root.string + 9);
6301 htab->stub_error = TRUE;
6302 return FALSE;
6303 }
6304
6305 if (br_entry->iter != htab->stub_iteration)
6306 {
6307 br_entry->iter = htab->stub_iteration;
6308 br_entry->offset = htab->sbrlt->_raw_size;
6309 htab->sbrlt->_raw_size += 8;
6310 }
6311 stub_entry->stub_type = ppc_stub_plt_branch;
6312 size = 16;
6313 }
6314 }
6315
6316 stub_entry->stub_sec->_raw_size += size;
6317 return TRUE;
6318}
6319
6320/* Set up various things so that we can make a list of input sections
6321 for each output section included in the link. Returns -1 on error,
6322 0 when no stubs will be needed, and 1 on success. */
6323
6324int
6325ppc64_elf_setup_section_lists (output_bfd, info)
6326 bfd *output_bfd;
6327 struct bfd_link_info *info;
6328{
6329 bfd *input_bfd;
6330 int top_id, top_index;
6331 asection *section;
6332 asection **input_list, **list;
6333 bfd_size_type amt;
6334 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6335
6336 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour
6337 || htab->sbrlt == NULL)
6338 return 0;
6339
6340 /* Find the top input section id. */
6341 for (input_bfd = info->input_bfds, top_id = 0;
6342 input_bfd != NULL;
6343 input_bfd = input_bfd->link_next)
6344 {
6345 for (section = input_bfd->sections;
6346 section != NULL;
6347 section = section->next)
6348 {
6349 if (top_id < section->id)
6350 top_id = section->id;
6351 }
6352 }
6353
6354 amt = sizeof (struct map_stub) * (top_id + 1);
6355 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
6356 if (htab->stub_group == NULL)
6357 return -1;
6358
6359 /* We can't use output_bfd->section_count here to find the top output
6360 section index as some sections may have been removed, and
6361 _bfd_strip_section_from_output doesn't renumber the indices. */
6362 for (section = output_bfd->sections, top_index = 0;
6363 section != NULL;
6364 section = section->next)
6365 {
6366 if (top_index < section->index)
6367 top_index = section->index;
6368 }
6369
6370 htab->top_index = top_index;
6371 amt = sizeof (asection *) * (top_index + 1);
6372 input_list = (asection **) bfd_malloc (amt);
6373 htab->input_list = input_list;
6374 if (input_list == NULL)
6375 return -1;
6376
6377 /* For sections we aren't interested in, mark their entries with a
6378 value we can check later. */
6379 list = input_list + top_index;
6380 do
6381 *list = bfd_abs_section_ptr;
6382 while (list-- != input_list);
6383
6384 for (section = output_bfd->sections;
6385 section != NULL;
6386 section = section->next)
6387 {
6388 if ((section->flags & SEC_CODE) != 0)
6389 input_list[section->index] = NULL;
6390 }
6391
6392 return 1;
6393}
6394
6395/* The linker repeatedly calls this function for each input section,
6396 in the order that input sections are linked into output sections.
6397 Build lists of input sections to determine groupings between which
6398 we may insert linker stubs. */
6399
6400void
6401ppc64_elf_next_input_section (info, isec)
6402 struct bfd_link_info *info;
6403 asection *isec;
6404{
6405 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6406
6407 if (isec->output_section->index <= htab->top_index)
6408 {
6409 asection **list = htab->input_list + isec->output_section->index;
6410 if (*list != bfd_abs_section_ptr)
6411 {
6412 /* Steal the link_sec pointer for our list. */
6413#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6414 /* This happens to make the list in reverse order,
6415 which is what we want. */
6416 PREV_SEC (isec) = *list;
6417 *list = isec;
6418 }
6419 }
6420}
6421
6422/* See whether we can group stub sections together. Grouping stub
6423 sections may result in fewer stubs. More importantly, we need to
6424 put all .init* and .fini* stubs at the beginning of the .init or
6425 .fini output sections respectively, because glibc splits the
6426 _init and _fini functions into multiple parts. Putting a stub in
6427 the middle of a function is not a good idea. */
6428
6429static void
6430group_sections (htab, stub_group_size, stubs_always_before_branch)
6431 struct ppc_link_hash_table *htab;
6432 bfd_size_type stub_group_size;
6433 bfd_boolean stubs_always_before_branch;
6434{
6435 asection **list = htab->input_list + htab->top_index;
6436 do
6437 {
6438 asection *tail = *list;
6439 if (tail == bfd_abs_section_ptr)
6440 continue;
6441 while (tail != NULL)
6442 {
6443 asection *curr;
6444 asection *prev;
6445 bfd_size_type total;
6446
6447 curr = tail;
6448 if (tail->_cooked_size)
6449 total = tail->_cooked_size;
6450 else
6451 total = tail->_raw_size;
6452 while ((prev = PREV_SEC (curr)) != NULL
6453 && ((total += curr->output_offset - prev->output_offset)
6454 < stub_group_size))
6455 curr = prev;
6456
6457 /* OK, the size from the start of CURR to the end is less
6458 than stub_group_size and thus can be handled by one stub
6459 section. (or the tail section is itself larger than
6460 stub_group_size, in which case we may be toast.) We
6461 should really be keeping track of the total size of stubs
6462 added here, as stubs contribute to the final output
6463 section size. That's a little tricky, and this way will
6464 only break if stubs added make the total size more than
6465 2^25, ie. for the default stub_group_size, if stubs total
6466 more than 2834432 bytes, or over 100000 plt call stubs. */
6467 do
6468 {
6469 prev = PREV_SEC (tail);
6470 /* Set up this stub group. */
6471 htab->stub_group[tail->id].link_sec = curr;
6472 }
6473 while (tail != curr && (tail = prev) != NULL);
6474
6475 /* But wait, there's more! Input sections up to stub_group_size
6476 bytes before the stub section can be handled by it too. */
6477 if (!stubs_always_before_branch)
6478 {
6479 total = 0;
6480 while (prev != NULL
6481 && ((total += tail->output_offset - prev->output_offset)
6482 < stub_group_size))
6483 {
6484 tail = prev;
6485 prev = PREV_SEC (tail);
6486 htab->stub_group[tail->id].link_sec = curr;
6487 }
6488 }
6489 tail = prev;
6490 }
6491 }
6492 while (list-- != htab->input_list);
6493 free (htab->input_list);
6494#undef PREV_SEC
6495}
6496
6497/* Determine and set the size of the stub section for a final link.
6498
6499 The basic idea here is to examine all the relocations looking for
6500 PC-relative calls to a target that is unreachable with a "bl"
6501 instruction. */
6502
6503bfd_boolean
6504ppc64_elf_size_stubs (output_bfd, stub_bfd, info, group_size,
6505 add_stub_section, layout_sections_again)
6506 bfd *output_bfd;
6507 bfd *stub_bfd;
6508 struct bfd_link_info *info;
6509 bfd_signed_vma group_size;
6510 asection * (*add_stub_section) PARAMS ((const char *, asection *));
6511 void (*layout_sections_again) PARAMS ((void));
6512{
6513 bfd_size_type stub_group_size;
6514 bfd_boolean stubs_always_before_branch;
6515 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6516
6517 /* Stash our params away. */
6518 htab->stub_bfd = stub_bfd;
6519 htab->add_stub_section = add_stub_section;
6520 htab->layout_sections_again = layout_sections_again;
6521 stubs_always_before_branch = group_size < 0;
6522 if (group_size < 0)
6523 stub_group_size = -group_size;
6524 else
6525 stub_group_size = group_size;
6526 if (stub_group_size == 1)
6527 {
6528 /* Default values. */
6529 stub_group_size = 30720000;
6530 if (htab->has_14bit_branch)
6531 stub_group_size = 30000;
6532 }
6533
6534 group_sections (htab, stub_group_size, stubs_always_before_branch);
6535
6536 while (1)
6537 {
6538 bfd *input_bfd;
6539 unsigned int bfd_indx;
6540 asection *stub_sec;
6541 bfd_boolean stub_changed;
6542
6543 htab->stub_iteration += 1;
6544 stub_changed = FALSE;
6545
6546 for (input_bfd = info->input_bfds, bfd_indx = 0;
6547 input_bfd != NULL;
6548 input_bfd = input_bfd->link_next, bfd_indx++)
6549 {
6550 Elf_Internal_Shdr *symtab_hdr;
6551 asection *section;
6552 Elf_Internal_Sym *local_syms = NULL;
6553
6554 /* We'll need the symbol table in a second. */
6555 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6556 if (symtab_hdr->sh_info == 0)
6557 continue;
6558
6559 /* Walk over each section attached to the input bfd. */
6560 for (section = input_bfd->sections;
6561 section != NULL;
6562 section = section->next)
6563 {
6564 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
6565
6566 /* If there aren't any relocs, then there's nothing more
6567 to do. */
6568 if ((section->flags & SEC_RELOC) == 0
6569 || section->reloc_count == 0)
6570 continue;
6571
6572 /* If this section is a link-once section that will be
6573 discarded, then don't create any stubs. */
6574 if (section->output_section == NULL
6575 || section->output_section->owner != output_bfd)
6576 continue;
6577
6578 /* Get the relocs. */
6579 internal_relocs
6580 = _bfd_elf64_link_read_relocs (input_bfd, section, NULL,
6581 (Elf_Internal_Rela *) NULL,
6582 info->keep_memory);
6583 if (internal_relocs == NULL)
6584 goto error_ret_free_local;
6585
6586 /* Now examine each relocation. */
6587 irela = internal_relocs;
6588 irelaend = irela + section->reloc_count;
6589 for (; irela < irelaend; irela++)
6590 {
6591 unsigned int r_type, r_indx;
6592 enum ppc_stub_type stub_type;
6593 struct ppc_stub_hash_entry *stub_entry;
6594 asection *sym_sec;
6595 bfd_vma sym_value;
6596 bfd_vma destination;
6597 struct ppc_link_hash_entry *hash;
6598 struct elf_link_hash_entry *h;
6599 Elf_Internal_Sym *sym;
6600 char *stub_name;
6601 const asection *id_sec;
6602
6603 r_type = ELF64_R_TYPE (irela->r_info);
6604 r_indx = ELF64_R_SYM (irela->r_info);
6605
6606 if (r_type >= (unsigned int) R_PPC64_max)
6607 {
6608 bfd_set_error (bfd_error_bad_value);
6609 goto error_ret_free_internal;
6610 }
6611
6612 /* Only look for stubs on branch instructions. */
6613 if (r_type != (unsigned int) R_PPC64_REL24
6614 && r_type != (unsigned int) R_PPC64_REL14
6615 && r_type != (unsigned int) R_PPC64_REL14_BRTAKEN
6616 && r_type != (unsigned int) R_PPC64_REL14_BRNTAKEN)
6617 continue;
6618
6619 /* Now determine the call target, its name, value,
6620 section. */
6621 destination = 0;
6622 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6623 r_indx, input_bfd))
6624 goto error_ret_free_internal;
6625 hash = (struct ppc_link_hash_entry *) h;
6626
6627 if (hash == NULL)
6628 {
6629 /* It's a local symbol. */
6630 sym_value = sym->st_value;
6631 destination = (sym_value + irela->r_addend
6632 + sym_sec->output_offset
6633 + sym_sec->output_section->vma);
6634 }
6635 else
6636 {
6637 /* It's an external symbol. */
6638 sym_value = 0;
6639 if (hash->elf.root.type == bfd_link_hash_defined
6640 || hash->elf.root.type == bfd_link_hash_defweak)
6641 {
6642 sym_value = hash->elf.root.u.def.value;
6643 if (sym_sec->output_section != NULL)
6644 destination = (sym_value + irela->r_addend
6645 + sym_sec->output_offset
6646 + sym_sec->output_section->vma);
6647 }
6648 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6649 ;
6650 else if (hash->elf.root.type == bfd_link_hash_undefined)
6651 ;
6652 else
6653 {
6654 bfd_set_error (bfd_error_bad_value);
6655 goto error_ret_free_internal;
6656 }
6657 }
6658
6659 /* Determine what (if any) linker stub is needed. */
6660 stub_type = ppc_type_of_stub (section, irela, &hash,
6661 destination);
6662 if (stub_type == ppc_stub_none)
6663 continue;
6664
6665 /* __tls_get_addr calls might be eliminated. */
6666 if (stub_type != ppc_stub_plt_call
6667 && hash != NULL
6668 && &hash->elf == htab->tls_get_addr
6669 && section->has_tls_reloc
6670 && irela != internal_relocs)
6671 {
6672 /* Get tls info. */
6673 char *tls_mask;
6674
6675 if (!get_tls_mask (&tls_mask, &local_syms,
6676 irela - 1, input_bfd))
6677 goto error_ret_free_internal;
6678 if (*tls_mask != 0)
6679 continue;
6680 }
6681
6682 /* Support for grouping stub sections. */
6683 id_sec = htab->stub_group[section->id].link_sec;
6684
6685 /* Get the name of this stub. */
6686 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
6687 if (!stub_name)
6688 goto error_ret_free_internal;
6689
6690 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
6691 stub_name, FALSE, FALSE);
6692 if (stub_entry != NULL)
6693 {
6694 /* The proper stub has already been created. */
6695 free (stub_name);
6696 continue;
6697 }
6698
6699 stub_entry = ppc_add_stub (stub_name, section, htab);
6700 if (stub_entry == NULL)
6701 {
6702 free (stub_name);
6703 error_ret_free_internal:
6704 if (elf_section_data (section)->relocs == NULL)
6705 free (internal_relocs);
6706 error_ret_free_local:
6707 if (local_syms != NULL
6708 && (symtab_hdr->contents
6709 != (unsigned char *) local_syms))
6710 free (local_syms);
6711 return FALSE;
6712 }
6713
6714 stub_entry->target_value = sym_value;
6715 stub_entry->target_section = sym_sec;
6716 stub_entry->stub_type = stub_type;
6717 stub_entry->h = hash;
6718 stub_entry->addend = irela->r_addend;
6719 stub_changed = TRUE;
6720 }
6721
6722 /* We're done with the internal relocs, free them. */
6723 if (elf_section_data (section)->relocs != internal_relocs)
6724 free (internal_relocs);
6725 }
6726
6727 if (local_syms != NULL
6728 && symtab_hdr->contents != (unsigned char *) local_syms)
6729 {
6730 if (!info->keep_memory)
6731 free (local_syms);
6732 else
6733 symtab_hdr->contents = (unsigned char *) local_syms;
6734 }
6735 }
6736
6737 if (!stub_changed)
6738 break;
6739
6740 /* OK, we've added some stubs. Find out the new size of the
6741 stub sections. */
6742 for (stub_sec = htab->stub_bfd->sections;
6743 stub_sec != NULL;
6744 stub_sec = stub_sec->next)
6745 {
6746 stub_sec->_raw_size = 0;
6747 stub_sec->_cooked_size = 0;
6748 }
6749 htab->sbrlt->_raw_size = 0;
6750 htab->sbrlt->_cooked_size = 0;
6751
6752 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, htab);
6753
6754 /* Ask the linker to do its stuff. */
6755 (*htab->layout_sections_again) ();
6756 }
6757
6758 /* It would be nice to strip .branch_lt from the output if the
6759 section is empty, but it's too late. If we strip sections here,
6760 the dynamic symbol table is corrupted since the section symbol
6761 for the stripped section isn't written. */
6762
6763 return TRUE;
6764}
6765
6766/* Called after we have determined section placement. If sections
6767 move, we'll be called again. Provide a value for TOCstart. */
6768
6769bfd_vma
6770ppc64_elf_toc (obfd)
6771 bfd *obfd;
6772{
6773 asection *s;
6774 bfd_vma TOCstart;
6775
6776 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6777 order. The TOC starts where the first of these sections starts. */
6778 s = bfd_get_section_by_name (obfd, ".got");
6779 if (s == NULL)
6780 s = bfd_get_section_by_name (obfd, ".toc");
6781 if (s == NULL)
6782 s = bfd_get_section_by_name (obfd, ".tocbss");
6783 if (s == NULL)
6784 s = bfd_get_section_by_name (obfd, ".plt");
6785 if (s == NULL)
6786 {
6787 /* This may happen for
6788 o references to TOC base (SYM@toc / TOC[tc0]) without a
6789 .toc directive
6790 o bad linker script
6791 o --gc-sections and empty TOC sections
6792
6793 FIXME: Warn user? */
6794
6795 /* Look for a likely section. We probably won't even be
6796 using TOCstart. */
6797 for (s = obfd->sections; s != NULL; s = s->next)
6798 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
6799 == (SEC_ALLOC | SEC_SMALL_DATA))
6800 break;
6801 if (s == NULL)
6802 for (s = obfd->sections; s != NULL; s = s->next)
6803 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
6804 == (SEC_ALLOC | SEC_SMALL_DATA))
6805 break;
6806 if (s == NULL)
6807 for (s = obfd->sections; s != NULL; s = s->next)
6808 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
6809 break;
6810 if (s == NULL)
6811 for (s = obfd->sections; s != NULL; s = s->next)
6812 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
6813 break;
6814 }
6815
6816 TOCstart = 0;
6817 if (s != NULL)
6818 TOCstart = s->output_section->vma + s->output_offset;
6819
6820 return TOCstart;
6821}
6822
6823/* Build all the stubs associated with the current output file.
6824 The stubs are kept in a hash table attached to the main linker
6825 hash table. This function is called via gldelf64ppc_finish. */
6826
6827bfd_boolean
6828ppc64_elf_build_stubs (info)
6829 struct bfd_link_info *info;
6830{
6831 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6832 asection *stub_sec;
6833 bfd_vma plt_r2;
6834 bfd_byte *p;
6835
6836 for (stub_sec = htab->stub_bfd->sections;
6837 stub_sec != NULL;
6838 stub_sec = stub_sec->next)
6839 {
6840 bfd_size_type size;
6841
6842 /* Allocate memory to hold the linker stubs. */
6843 size = stub_sec->_raw_size;
6844 if (size != 0)
6845 {
6846 stub_sec->contents = (bfd_byte *) bfd_zalloc (htab->stub_bfd, size);
6847 if (stub_sec->contents == NULL)
6848 return FALSE;
6849 }
6850 stub_sec->_cooked_size = 0;
6851 }
6852
6853 if (htab->splt != NULL)
6854 {
6855 unsigned int indx;
6856
6857 /* Build the .glink plt call stub. */
6858 plt_r2 = (htab->splt->output_offset
6859 + htab->splt->output_section->vma
6860 - elf_gp (htab->splt->output_section->owner)
6861 - TOC_BASE_OFF);
6862 p = htab->sglink->contents;
6863 p = build_plt_stub (htab->sglink->owner, p, (int) plt_r2, 1);
6864 while (p < htab->sglink->contents + GLINK_CALL_STUB_SIZE)
6865 {
6866 bfd_put_32 (htab->sglink->owner, NOP, p);
6867 p += 4;
6868 }
6869
6870 /* Build the .glink lazy link call stubs. */
6871 indx = 0;
6872 while (p < htab->sglink->contents + htab->sglink->_raw_size)
6873 {
6874 if (indx < 0x8000)
6875 {
6876 bfd_put_32 (htab->sglink->owner, LI_R0_0 | indx, p);
6877 p += 4;
6878 }
6879 else
6880 {
6881 bfd_put_32 (htab->sglink->owner, LIS_R0_0 | PPC_HI (indx), p);
6882 p += 4;
6883 bfd_put_32 (htab->sglink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
6884 p += 4;
6885 }
6886 bfd_put_32 (htab->sglink->owner,
6887 B_DOT | ((htab->sglink->contents - p) & 0x3fffffc), p);
6888 indx++;
6889 p += 4;
6890 }
6891 htab->sglink->_cooked_size = p - htab->sglink->contents;
6892 }
6893
6894 if (htab->sbrlt->_raw_size != 0)
6895 {
6896 htab->sbrlt->contents = (bfd_byte *) bfd_zalloc (htab->sbrlt->owner,
6897 htab->sbrlt->_raw_size);
6898 if (htab->sbrlt->contents == NULL)
6899 return FALSE;
6900 }
6901
6902 /* Build the stubs as directed by the stub hash table. */
6903 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
6904
6905 for (stub_sec = htab->stub_bfd->sections;
6906 stub_sec != NULL;
6907 stub_sec = stub_sec->next)
6908 {
6909 if (stub_sec->_raw_size != stub_sec->_cooked_size)
6910 break;
6911 }
6912
6913 if (stub_sec != NULL
6914 || htab->sglink->_raw_size != htab->sglink->_cooked_size)
6915 {
6916 htab->stub_error = TRUE;
6917 (*_bfd_error_handler) (_("stubs don't match calculated size"));
6918 }
6919
6920 return !htab->stub_error;
6921}
6922
6923/* The RELOCATE_SECTION function is called by the ELF backend linker
6924 to handle the relocations for a section.
6925
6926 The relocs are always passed as Rela structures; if the section
6927 actually uses Rel structures, the r_addend field will always be
6928 zero.
6929
6930 This function is responsible for adjust the section contents as
6931 necessary, and (if using Rela relocs and generating a
6932 relocateable output file) adjusting the reloc addend as
6933 necessary.
6934
6935 This function does not have to worry about setting the reloc
6936 address or the reloc symbol index.
6937
6938 LOCAL_SYMS is a pointer to the swapped in local symbols.
6939
6940 LOCAL_SECTIONS is an array giving the section in the input file
6941 corresponding to the st_shndx field of each local symbol.
6942
6943 The global hash table entry for the global symbols can be found
6944 via elf_sym_hashes (input_bfd).
6945
6946 When generating relocateable output, this function must handle
6947 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6948 going to be the section symbol corresponding to the output
6949 section, which means that the addend must be adjusted
6950 accordingly. */
6951
6952static bfd_boolean
6953ppc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
6954 contents, relocs, local_syms, local_sections)
6955 bfd *output_bfd;
6956 struct bfd_link_info *info;
6957 bfd *input_bfd;
6958 asection *input_section;
6959 bfd_byte *contents;
6960 Elf_Internal_Rela *relocs;
6961 Elf_Internal_Sym *local_syms;
6962 asection **local_sections;
6963{
6964 struct ppc_link_hash_table *htab;
6965 Elf_Internal_Shdr *symtab_hdr;
6966 struct elf_link_hash_entry **sym_hashes;
6967 Elf_Internal_Rela *rel;
6968 Elf_Internal_Rela *relend;
6969 Elf_Internal_Rela outrel;
6970 bfd_byte *loc;
6971 struct got_entry **local_got_ents;
6972 bfd_vma TOCstart;
6973 bfd_boolean ret = TRUE;
6974 bfd_boolean is_opd;
6975 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
6976 bfd_boolean is_power4 = FALSE;
6977
6978 if (info->relocateable)
6979 return TRUE;
6980
6981 /* Initialize howto table if needed. */
6982 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
6983 ppc_howto_init ();
6984
6985 htab = ppc_hash_table (info);
6986 if (info->shared && (htab->tlsld_got.offset & 1) == 0)
6987 {
6988 outrel.r_offset = (htab->sgot->output_section->vma
6989 + htab->sgot->output_offset
6990 + htab->tlsld_got.offset);
6991 outrel.r_info = ELF64_R_INFO (0, R_PPC64_DTPMOD64);
6992 outrel.r_addend = 0;
6993
6994 loc = htab->srelgot->contents;
6995 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
6996 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
6997 htab->tlsld_got.offset |= 1;
6998 }
6999
7000 local_got_ents = elf_local_got_ents (input_bfd);
7001 TOCstart = elf_gp (output_bfd);
7002 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7003 sym_hashes = elf_sym_hashes (input_bfd);
7004 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
7005
7006 rel = relocs;
7007 relend = relocs + input_section->reloc_count;
7008 for (; rel < relend; rel++)
7009 {
7010 enum elf_ppc64_reloc_type r_type;
7011 bfd_vma addend;
7012 bfd_reloc_status_type r;
7013 Elf_Internal_Sym *sym;
7014 asection *sec;
7015 struct elf_link_hash_entry *h;
7016 struct elf_link_hash_entry *fdh;
7017 const char *sym_name;
7018 unsigned long r_symndx;
7019 char tls_mask, tls_gd, tls_type;
7020 bfd_vma relocation;
7021 bfd_boolean unresolved_reloc;
7022 bfd_boolean warned;
7023 long insn;
7024 struct ppc_stub_hash_entry *stub_entry;
7025 bfd_vma max_br_offset;
7026 bfd_vma from;
7027
7028 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
7029 r_symndx = ELF64_R_SYM (rel->r_info);
7030 r = bfd_reloc_other;
7031 sym = (Elf_Internal_Sym *) 0;
7032 sec = (asection *) 0;
7033 h = (struct elf_link_hash_entry *) 0;
7034 sym_name = (const char *) 0;
7035 unresolved_reloc = FALSE;
7036 warned = FALSE;
7037
7038 if (r_type == R_PPC64_TOC)
7039 {
7040 /* Relocation value is TOC base. Symbol is ignored. */
7041 relocation = TOCstart + TOC_BASE_OFF;
7042 }
7043 else if (r_symndx < symtab_hdr->sh_info)
7044 {
7045 /* It's a local symbol. */
7046 sym = local_syms + r_symndx;
7047 sec = local_sections[r_symndx];
7048 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
7049 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
7050 if (elf_section_data (sec) != NULL)
7051 {
7052 long *opd_sym_adjust;
7053
7054 opd_sym_adjust = ppc64_elf_section_data (sec)->opd.adjust;
7055 if (opd_sym_adjust != NULL && sym->st_value % 24 == 0)
7056 relocation += opd_sym_adjust[sym->st_value / 24];
7057 }
7058 }
7059 else
7060 {
7061 /* It's a global symbol. */
7062 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7063 while (h->root.type == bfd_link_hash_indirect
7064 || h->root.type == bfd_link_hash_warning)
7065 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7066 sym_name = h->root.root.string;
7067 relocation = 0;
7068 if (h->root.type == bfd_link_hash_defined
7069 || h->root.type == bfd_link_hash_defweak)
7070 {
7071 sec = h->root.u.def.section;
7072 if (sec->output_section == NULL)
7073 /* Set a flag that will be cleared later if we find a
7074 relocation value for this symbol. output_section
7075 is typically NULL for symbols satisfied by a shared
7076 library. */
7077 unresolved_reloc = TRUE;
7078 else
7079 relocation = (h->root.u.def.value
7080 + sec->output_section->vma
7081 + sec->output_offset);
7082 }
7083 else if (h->root.type == bfd_link_hash_undefweak)
7084 ;
7085 else if (info->shared
7086 && (!info->symbolic || info->allow_shlib_undefined)
7087 && !info->no_undefined
7088 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7089 ;
7090 else
7091 {
7092 if (! ((*info->callbacks->undefined_symbol)
7093 (info, h->root.root.string, input_bfd, input_section,
7094 rel->r_offset, (!info->shared
7095 || info->no_undefined
7096 || ELF_ST_VISIBILITY (h->other)))))
7097 return FALSE;
7098 warned = TRUE;
7099 }
7100 }
7101
7102 /* TLS optimizations. Replace instruction sequences and relocs
7103 based on information we collected in tls_optimize. We edit
7104 RELOCS so that --emit-relocs will output something sensible
7105 for the final instruction stream. */
7106 tls_mask = 0;
7107 tls_gd = 0;
7108 if (IS_TLS_RELOC (r_type))
7109 {
7110 if (h != NULL)
7111 tls_mask = ((struct ppc_link_hash_entry *) h)->tls_mask;
7112 else if (local_got_ents != NULL)
7113 {
7114 char *lgot_masks;
7115 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
7116 tls_mask = lgot_masks[r_symndx];
7117 }
7118 }
7119
7120 /* Ensure reloc mapping code below stays sane. */
7121 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7122 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7123 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7124 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7125 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7126 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7127 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7128 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7129 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7130 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7131 abort ();
7132 switch (r_type)
7133 {
7134 default:
7135 break;
7136
7137 case R_PPC64_TOC16:
7138 case R_PPC64_TOC16_LO:
7139 case R_PPC64_TOC16_DS:
7140 case R_PPC64_TOC16_LO_DS:
7141 {
7142 /* Check for toc tls entries. */
7143 char *toc_tls;
7144 int retval;
7145
7146 retval = get_tls_mask (&toc_tls, &local_syms, rel, input_bfd);
7147 if (retval == 0)
7148 return FALSE;
7149
7150 if (toc_tls)
7151 {
7152 tls_mask = *toc_tls;
7153 if (r_type == R_PPC64_TOC16_DS
7154 || r_type == R_PPC64_TOC16_LO_DS)
7155 goto toctprel;
7156 else
7157 {
7158 /* If we found a GD reloc pair, then we might be
7159 doing a GD->IE transition. */
7160 if (retval == 2)
7161 {
7162 tls_gd = TLS_TPRELGD;
7163 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7164 goto tls_get_addr_check;
7165 }
7166 else if (retval == 3)
7167 {
7168 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7169 goto tls_get_addr_check;
7170 }
7171 }
7172 }
7173 }
7174 break;
7175
7176 case R_PPC64_GOT_TPREL16_DS:
7177 case R_PPC64_GOT_TPREL16_LO_DS:
7178 toctprel:
7179 if (tls_mask != 0
7180 && (tls_mask & TLS_TPREL) == 0)
7181 {
7182 bfd_vma insn;
7183 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7184 insn &= 31 << 21;
7185 insn |= 0x3c0d0000; /* addis 0,13,0 */
7186 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7187 r_type = R_PPC64_TPREL16_HA;
7188 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7189 }
7190 break;
7191
7192 case R_PPC64_TLS:
7193 if (tls_mask == 0)
7194 {
7195 /* Check for toc tls entries. */
7196 char *toc_tls;
7197
7198 if (!get_tls_mask (&toc_tls, &local_syms, rel, input_bfd))
7199 return FALSE;
7200
7201 if (toc_tls)
7202 tls_mask = *toc_tls;
7203 }
7204 if (tls_mask != 0
7205 && (tls_mask & TLS_TPREL) == 0)
7206 {
7207 bfd_vma insn, rtra;
7208 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7209 if ((insn & ((31 << 26) | (31 << 11)))
7210 == ((31 << 26) | (13 << 11)))
7211 rtra = insn & ((1 << 26) - (1 << 16));
7212 else if ((insn & ((31 << 26) | (31 << 16)))
7213 == ((31 << 26) | (13 << 16)))
7214 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7215 else
7216 abort ();
7217 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7218 /* add -> addi. */
7219 insn = 14 << 26;
7220 else if ((insn & (31 << 1)) == 23 << 1
7221 && ((insn & (31 << 6)) < 14 << 6
7222 || ((insn & (31 << 6)) >= 16 << 6
7223 && (insn & (31 << 6)) < 24 << 6)))
7224 /* load and store indexed -> dform. */
7225 insn = (32 | ((insn >> 6) & 31)) << 26;
7226 else if ((insn & (31 << 1)) == 21 << 1
7227 && (insn & (0x1a << 6)) == 0)
7228 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7229 insn = (((58 | ((insn >> 6) & 4)) << 26)
7230 | ((insn >> 6) & 1));
7231 else if ((insn & (31 << 1)) == 21 << 1
7232 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7233 /* lwax -> lwa. */
7234 insn = (58 << 26) | 2;
7235 else
7236 abort ();
7237 insn |= rtra;
7238 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7239 r_type = R_PPC64_TPREL16_LO;
7240 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7241 /* Was PPC64_TLS which sits on insn boundary, now
7242 PPC64_TPREL16_LO which is at insn+2. */
7243 rel->r_offset += 2;
7244 }
7245 break;
7246
7247 case R_PPC64_GOT_TLSGD16_HI:
7248 case R_PPC64_GOT_TLSGD16_HA:
7249 tls_gd = TLS_TPRELGD;
7250 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7251 goto tls_gdld_hi;
7252 break;
7253
7254 case R_PPC64_GOT_TLSLD16_HI:
7255 case R_PPC64_GOT_TLSLD16_HA:
7256 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7257 {
7258 tls_gdld_hi:
7259 if ((tls_mask & tls_gd) != 0)
7260 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7261 + R_PPC64_GOT_TPREL16_DS);
7262 else
7263 {
7264 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7265 rel->r_offset -= 2;
7266 r_type = R_PPC64_NONE;
7267 }
7268 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7269 }
7270 break;
7271
7272 case R_PPC64_GOT_TLSGD16:
7273 case R_PPC64_GOT_TLSGD16_LO:
7274 tls_gd = TLS_TPRELGD;
7275 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7276 goto tls_get_addr_check;
7277 break;
7278
7279 case R_PPC64_GOT_TLSLD16:
7280 case R_PPC64_GOT_TLSLD16_LO:
7281 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7282 {
7283 tls_get_addr_check:
7284 if (rel + 1 < relend)
7285 {
7286 enum elf_ppc64_reloc_type r_type2;
7287 unsigned long r_symndx2;
7288 struct elf_link_hash_entry *h2;
7289 bfd_vma insn1, insn2, insn3;
7290 bfd_vma offset;
7291
7292 /* The next instruction should be a call to
7293 __tls_get_addr. Peek at the reloc to be sure. */
7294 r_type2
7295 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel[1].r_info);
7296 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
7297 if (r_symndx2 < symtab_hdr->sh_info
7298 || (r_type2 != R_PPC64_REL14
7299 && r_type2 != R_PPC64_REL14_BRTAKEN
7300 && r_type2 != R_PPC64_REL14_BRNTAKEN
7301 && r_type2 != R_PPC64_REL24))
7302 break;
7303
7304 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
7305 while (h2->root.type == bfd_link_hash_indirect
7306 || h2->root.type == bfd_link_hash_warning)
7307 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
7308 if (h2 == NULL || h2 != htab->tls_get_addr)
7309 break;
7310
7311 /* OK, it checks out. Replace the call. */
7312 offset = rel[1].r_offset;
7313 insn1 = bfd_get_32 (output_bfd,
7314 contents + rel->r_offset - 2);
7315 insn3 = bfd_get_32 (output_bfd,
7316 contents + offset + 4);
7317 if ((tls_mask & tls_gd) != 0)
7318 {
7319 /* IE */
7320 insn1 &= (1 << 26) - (1 << 2);
7321 insn1 |= 58 << 26; /* ld */
7322 insn2 = 0x7c636a14; /* add 3,3,13 */
7323 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
7324 if ((tls_mask & TLS_EXPLICIT) == 0)
7325 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7326 + R_PPC64_GOT_TPREL16_DS);
7327 else
7328 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7329 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7330 }
7331 else
7332 {
7333 /* LE */
7334 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7335 insn2 = 0x38630000; /* addi 3,3,0 */
7336 if (tls_gd == 0)
7337 {
7338 /* Was an LD reloc. */
7339 r_symndx = 0;
7340 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
7341 rel[1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
7342 }
7343 r_type = R_PPC64_TPREL16_HA;
7344 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7345 rel[1].r_info = ELF64_R_INFO (r_symndx,
7346 R_PPC64_TPREL16_LO);
7347 rel[1].r_offset += 2;
7348 }
7349 if (insn3 == NOP
7350 || insn3 == CROR_151515 || insn3 == CROR_313131)
7351 {
7352 insn3 = insn2;
7353 insn2 = NOP;
7354 rel[1].r_offset += 4;
7355 }
7356 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
7357 bfd_put_32 (output_bfd, insn2, contents + offset);
7358 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7359 if (tls_gd == 0)
7360 {
7361 /* We changed the symbol on an LD reloc. Start over
7362 in order to get h, sym, sec etc. right. */
7363 rel--;
7364 continue;
7365 }
7366 }
7367 }
7368 break;
7369
7370 case R_PPC64_DTPMOD64:
7371 if (rel + 1 < relend
7372 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
7373 && rel[1].r_offset == rel->r_offset + 8)
7374 {
7375 if ((tls_mask & TLS_GD) == 0)
7376 {
7377 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
7378 if ((tls_mask & TLS_TPRELGD) != 0)
7379 r_type = R_PPC64_TPREL64;
7380 else
7381 {
7382 bfd_put_64 (output_bfd, (bfd_vma) 1,
7383 contents + rel->r_offset);
7384 r_type = R_PPC64_NONE;
7385 }
7386 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7387 }
7388 }
7389 else
7390 {
7391 if ((tls_mask & TLS_LD) == 0)
7392 {
7393 bfd_put_64 (output_bfd, (bfd_vma) 1,
7394 contents + rel->r_offset);
7395 r_type = R_PPC64_NONE;
7396 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7397 }
7398 }
7399 break;
7400
7401 case R_PPC64_TPREL64:
7402 if ((tls_mask & TLS_TPREL) == 0)
7403 {
7404 r_type = R_PPC64_NONE;
7405 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7406 }
7407 break;
7408 }
7409
7410 /* Handle other relocations that tweak non-addend part of insn. */
7411 insn = 0;
7412 switch (r_type)
7413 {
7414 default:
7415 break;
7416
7417 /* Branch taken prediction relocations. */
7418 case R_PPC64_ADDR14_BRTAKEN:
7419 case R_PPC64_REL14_BRTAKEN:
7420 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7421 /* Fall thru. */
7422
7423 /* Branch not taken prediction relocations. */
7424 case R_PPC64_ADDR14_BRNTAKEN:
7425 case R_PPC64_REL14_BRNTAKEN:
7426 insn |= bfd_get_32 (output_bfd,
7427 contents + rel->r_offset) & ~(0x01 << 21);
7428 if (is_power4)
7429 {
7430 /* Set 'a' bit. This is 0b00010 in BO field for branch
7431 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7432 for branch on CTR insns (BO == 1a00t or 1a01t). */
7433 if ((insn & (0x14 << 21)) == (0x04 << 21))
7434 insn |= 0x02 << 21;
7435 else if ((insn & (0x14 << 21)) == (0x10 << 21))
7436 insn |= 0x08 << 21;
7437 else
7438 break;
7439 }
7440 else
7441 {
7442 from = (rel->r_offset
7443 + input_section->output_offset
7444 + input_section->output_section->vma);
7445
7446 /* Invert 'y' bit if not the default. */
7447 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7448 insn ^= 0x01 << 21;
7449 }
7450
7451 bfd_put_32 (output_bfd, (bfd_vma) insn, contents + rel->r_offset);
7452 break;
7453
7454 case R_PPC64_REL24:
7455 /* A REL24 branching to a linkage function is followed by a
7456 nop. We replace the nop with a ld in order to restore
7457 the TOC base pointer. Only calls to shared objects need
7458 to alter the TOC base. These are recognized by their
7459 need for a PLT entry. */
7460 if (h != NULL
7461 && (fdh = ((struct ppc_link_hash_entry *) h)->oh) != NULL
7462 && fdh->plt.plist != NULL
7463 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7464 rel, htab)) != NULL)
7465 {
7466 bfd_boolean can_plt_call = 0;
7467
7468 if (rel->r_offset + 8 <= input_section->_cooked_size)
7469 {
7470 insn = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
7471 if (insn == NOP
7472 || insn == CROR_151515 || insn == CROR_313131)
7473 {
7474 bfd_put_32 (input_bfd, (bfd_vma) LD_R2_40R1,
7475 contents + rel->r_offset + 4);
7476 can_plt_call = 1;
7477 }
7478 }
7479
7480 if (!can_plt_call)
7481 {
7482 /* If this is a plain branch rather than a branch
7483 and link, don't require a nop. */
7484 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7485 if ((insn & 1) == 0)
7486 can_plt_call = 1;
7487 }
7488
7489 if (can_plt_call)
7490 {
7491 relocation = (stub_entry->stub_offset
7492 + stub_entry->stub_sec->output_offset
7493 + stub_entry->stub_sec->output_section->vma);
7494 unresolved_reloc = FALSE;
7495 }
7496 }
7497
7498 if (h != NULL
7499 && h->root.type == bfd_link_hash_undefweak
7500 && relocation == 0
7501 && rel->r_addend == 0)
7502 {
7503 /* Tweak calls to undefined weak functions to point at a
7504 blr. We can thus call a weak function without first
7505 checking whether the function is defined. We have a
7506 blr at the end of .sfpr. */
7507 BFD_ASSERT (htab->sfpr->_raw_size != 0);
7508 relocation = (htab->sfpr->_raw_size - 4
7509 + htab->sfpr->output_offset
7510 + htab->sfpr->output_section->vma);
7511 from = (rel->r_offset
7512 + input_section->output_offset
7513 + input_section->output_section->vma);
7514
7515 /* But let's not be silly about it. If the blr isn't in
7516 reach, just go to the next instruction. */
7517 if (relocation - from + (1 << 25) >= (1 << 26)
7518 || htab->sfpr->_raw_size == 0)
7519 relocation = from + 4;
7520 }
7521 break;
7522 }
7523
7524 /* Set `addend'. */
7525 tls_type = 0;
7526 addend = rel->r_addend;
7527 switch (r_type)
7528 {
7529 default:
7530 (*_bfd_error_handler)
7531 (_("%s: unknown relocation type %d for symbol %s"),
7532 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
7533
7534 bfd_set_error (bfd_error_bad_value);
7535 ret = FALSE;
7536 continue;
7537
7538 case R_PPC64_NONE:
7539 case R_PPC64_TLS:
7540 case R_PPC64_GNU_VTINHERIT:
7541 case R_PPC64_GNU_VTENTRY:
7542 continue;
7543
7544 /* GOT16 relocations. Like an ADDR16 using the symbol's
7545 address in the GOT as relocation value instead of the
7546 symbol's value itself. Also, create a GOT entry for the
7547 symbol and put the symbol value there. */
7548 case R_PPC64_GOT_TLSGD16:
7549 case R_PPC64_GOT_TLSGD16_LO:
7550 case R_PPC64_GOT_TLSGD16_HI:
7551 case R_PPC64_GOT_TLSGD16_HA:
7552 tls_type = TLS_TLS | TLS_GD;
7553 goto dogot;
7554
7555 case R_PPC64_GOT_TLSLD16:
7556 case R_PPC64_GOT_TLSLD16_LO:
7557 case R_PPC64_GOT_TLSLD16_HI:
7558 case R_PPC64_GOT_TLSLD16_HA:
7559 tls_type = TLS_TLS | TLS_LD;
7560 goto dogot;
7561
7562 case R_PPC64_GOT_TPREL16_DS:
7563 case R_PPC64_GOT_TPREL16_LO_DS:
7564 case R_PPC64_GOT_TPREL16_HI:
7565 case R_PPC64_GOT_TPREL16_HA:
7566 tls_type = TLS_TLS | TLS_TPREL;
7567 goto dogot;
7568
7569 case R_PPC64_GOT_DTPREL16_DS:
7570 case R_PPC64_GOT_DTPREL16_LO_DS:
7571 case R_PPC64_GOT_DTPREL16_HI:
7572 case R_PPC64_GOT_DTPREL16_HA:
7573 tls_type = TLS_TLS | TLS_DTPREL;
7574 goto dogot;
7575
7576 case R_PPC64_GOT16:
7577 case R_PPC64_GOT16_LO:
7578 case R_PPC64_GOT16_HI:
7579 case R_PPC64_GOT16_HA:
7580 case R_PPC64_GOT16_DS:
7581 case R_PPC64_GOT16_LO_DS:
7582 dogot:
7583 {
7584 /* Relocation is to the entry for this symbol in the global
7585 offset table. */
7586 struct got_entry *ent;
7587 bfd_vma off;
7588 unsigned long indx;
7589
7590 if (htab->sgot == NULL)
7591 abort ();
7592
7593 if (h != NULL)
7594 ent = h->got.glist;
7595 else
7596 {
7597 if (local_got_ents == NULL)
7598 abort ();
7599 ent = local_got_ents[r_symndx];
7600 }
7601
7602 for (; ent != NULL; ent = ent->next)
7603 if (ent->addend == rel->r_addend
7604 && ent->tls_type == tls_type)
7605 break;
7606 if (ent == NULL)
7607 abort ();
7608
7609 off = ent->got.offset;
7610 indx = 0;
7611 if (h != NULL)
7612 {
7613 bfd_boolean dyn = htab->elf.dynamic_sections_created;
7614 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
7615 || (info->shared
7616 && (info->symbolic
7617 || h->dynindx == -1
7618 || (h->elf_link_hash_flags
7619 & ELF_LINK_FORCED_LOCAL))
7620 && (h->elf_link_hash_flags
7621 & ELF_LINK_HASH_DEF_REGULAR)))
7622 /* This is actually a static link, or it is a
7623 -Bsymbolic link and the symbol is defined
7624 locally, or the symbol was forced to be local
7625 because of a version file. */
7626 ;
7627 else
7628 {
7629 indx = h->dynindx;
7630 unresolved_reloc = FALSE;
7631 }
7632 }
7633
7634 /* The offset must always be a multiple of 8. We use the
7635 least significant bit to record whether we have already
7636 processed this entry. */
7637 if ((off & 1) != 0)
7638 off &= ~1;
7639 else
7640 {
7641 /* Generate relocs for the dynamic linker, except in
7642 the case of TLSLD where we'll use one entry per
7643 module. */
7644 if ((info->shared || indx != 0)
7645 && tls_type != (TLS_TLS | TLS_LD))
7646 {
7647 outrel.r_offset = (htab->sgot->output_section->vma
7648 + htab->sgot->output_offset
7649 + off);
7650 if (tls_type == (TLS_TLS | TLS_GD))
7651 {
7652 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
7653 outrel.r_addend = 0;
7654 loc = htab->srelgot->contents;
7655 loc += (htab->srelgot->reloc_count++
7656 * sizeof (Elf64_External_Rela));
7657 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7658 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7659 outrel.r_offset += 8;
7660 }
7661 else if (tls_type == (TLS_TLS | TLS_DTPREL))
7662 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7663 else if (tls_type == (TLS_TLS | TLS_TPREL))
7664 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
7665 else if (indx == 0)
7666 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
7667 else
7668 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
7669 outrel.r_addend = rel->r_addend;
7670 if (indx == 0)
7671 outrel.r_addend += relocation;
7672 loc = htab->srelgot->contents;
7673 loc += (htab->srelgot->reloc_count++
7674 * sizeof (Elf64_External_Rela));
7675 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7676 }
7677
7678 /* Init the .got section contents if we're not
7679 emitting a reloc. */
7680 if (!(info->shared || indx != 0))
7681 {
7682
7683 relocation += ent->addend;
7684 if (tls_type != 0)
7685 {
7686 relocation -= htab->tls_sec->vma + DTP_OFFSET;
7687 if ((tls_type & TLS_TPREL) != 0)
7688 relocation += DTP_OFFSET - TP_OFFSET;
7689 }
7690
7691 if ((tls_type & (TLS_GD | TLS_LD)) != 0)
7692 {
7693 if ((tls_type & TLS_LD) != 0)
7694 relocation = - DTP_OFFSET;
7695 bfd_put_64 (output_bfd, relocation,
7696 htab->sgot->contents + off + 8);
7697 relocation = 1;
7698 }
7699 bfd_put_64 (output_bfd, relocation,
7700 htab->sgot->contents + off);
7701 }
7702 ent->got.offset |= 1;
7703 }
7704
7705 if (off >= (bfd_vma) -2)
7706 abort ();
7707
7708 relocation = htab->sgot->output_offset + off;
7709
7710 /* TOC base (r2) is TOC start plus 0x8000. */
7711 addend = - TOC_BASE_OFF;
7712 }
7713 break;
7714
7715 case R_PPC64_PLT16_HA:
7716 case R_PPC64_PLT16_HI:
7717 case R_PPC64_PLT16_LO:
7718 case R_PPC64_PLT32:
7719 case R_PPC64_PLT64:
7720 /* Relocation is to the entry for this symbol in the
7721 procedure linkage table. */
7722
7723 /* Resolve a PLT reloc against a local symbol directly,
7724 without using the procedure linkage table. */
7725 if (h == NULL)
7726 break;
7727
7728 /* It's possible that we didn't make a PLT entry for this
7729 symbol. This happens when statically linking PIC code,
7730 or when using -Bsymbolic. Go find a match if there is a
7731 PLT entry. */
7732 if (htab->splt != NULL)
7733 {
7734 struct plt_entry *ent;
7735 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7736 if (ent->addend == rel->r_addend
7737 && ent->plt.offset != (bfd_vma) -1)
7738 {
7739 relocation = (htab->splt->output_section->vma
7740 + htab->splt->output_offset
7741 + ent->plt.offset);
7742 unresolved_reloc = FALSE;
7743 }
7744 }
7745 break;
7746
7747 /* TOC16 relocs. We want the offset relative to the TOC base,
7748 which is the address of the start of the TOC plus 0x8000.
7749 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7750 in this order. */
7751 case R_PPC64_TOC16:
7752 case R_PPC64_TOC16_LO:
7753 case R_PPC64_TOC16_HI:
7754 case R_PPC64_TOC16_DS:
7755 case R_PPC64_TOC16_LO_DS:
7756 case R_PPC64_TOC16_HA:
7757 addend -= TOCstart + TOC_BASE_OFF;
7758 break;
7759
7760 /* Relocate against the beginning of the section. */
7761 case R_PPC64_SECTOFF:
7762 case R_PPC64_SECTOFF_LO:
7763 case R_PPC64_SECTOFF_HI:
7764 case R_PPC64_SECTOFF_DS:
7765 case R_PPC64_SECTOFF_LO_DS:
7766 case R_PPC64_SECTOFF_HA:
7767 if (sec != (asection *) 0)
7768 addend -= sec->output_section->vma;
7769 break;
7770
7771 case R_PPC64_REL14:
7772 case R_PPC64_REL14_BRNTAKEN:
7773 case R_PPC64_REL14_BRTAKEN:
7774 case R_PPC64_REL24:
7775 break;
7776
7777 case R_PPC64_TPREL16:
7778 case R_PPC64_TPREL16_LO:
7779 case R_PPC64_TPREL16_HI:
7780 case R_PPC64_TPREL16_HA:
7781 case R_PPC64_TPREL16_DS:
7782 case R_PPC64_TPREL16_LO_DS:
7783 case R_PPC64_TPREL16_HIGHER:
7784 case R_PPC64_TPREL16_HIGHERA:
7785 case R_PPC64_TPREL16_HIGHEST:
7786 case R_PPC64_TPREL16_HIGHESTA:
7787 addend -= htab->tls_sec->vma + TP_OFFSET;
7788 if (info->shared)
7789 /* The TPREL16 relocs shouldn't really be used in shared
7790 libs as they will result in DT_TEXTREL being set, but
7791 support them anyway. */
7792 goto dodyn;
7793 break;
7794
7795 case R_PPC64_DTPREL16:
7796 case R_PPC64_DTPREL16_LO:
7797 case R_PPC64_DTPREL16_HI:
7798 case R_PPC64_DTPREL16_HA:
7799 case R_PPC64_DTPREL16_DS:
7800 case R_PPC64_DTPREL16_LO_DS:
7801 case R_PPC64_DTPREL16_HIGHER:
7802 case R_PPC64_DTPREL16_HIGHERA:
7803 case R_PPC64_DTPREL16_HIGHEST:
7804 case R_PPC64_DTPREL16_HIGHESTA:
7805 addend -= htab->tls_sec->vma + DTP_OFFSET;
7806 break;
7807
7808 case R_PPC64_TPREL64:
7809 addend -= htab->tls_sec->vma + TP_OFFSET;
7810 goto dodyn;
7811
7812 case R_PPC64_DTPREL64:
7813 addend -= htab->tls_sec->vma + DTP_OFFSET;
7814 /* Fall thru */
7815
7816 /* Relocations that may need to be propagated if this is a
7817 dynamic object. */
7818 case R_PPC64_DTPMOD64:
7819 case R_PPC64_REL30:
7820 case R_PPC64_REL32:
7821 case R_PPC64_REL64:
7822 case R_PPC64_ADDR14:
7823 case R_PPC64_ADDR14_BRNTAKEN:
7824 case R_PPC64_ADDR14_BRTAKEN:
7825 case R_PPC64_ADDR16:
7826 case R_PPC64_ADDR16_DS:
7827 case R_PPC64_ADDR16_HA:
7828 case R_PPC64_ADDR16_HI:
7829 case R_PPC64_ADDR16_HIGHER:
7830 case R_PPC64_ADDR16_HIGHERA:
7831 case R_PPC64_ADDR16_HIGHEST:
7832 case R_PPC64_ADDR16_HIGHESTA:
7833 case R_PPC64_ADDR16_LO:
7834 case R_PPC64_ADDR16_LO_DS:
7835 case R_PPC64_ADDR24:
7836 case R_PPC64_ADDR32:
7837 case R_PPC64_ADDR64:
7838 case R_PPC64_UADDR16:
7839 case R_PPC64_UADDR32:
7840 case R_PPC64_UADDR64:
7841 /* r_symndx will be zero only for relocs against symbols
7842 from removed linkonce sections, or sections discarded by
7843 a linker script. */
7844 dodyn:
7845 if (r_symndx == 0)
7846 break;
7847 /* Fall thru. */
7848
7849 case R_PPC64_TOC:
7850 if ((input_section->flags & SEC_ALLOC) == 0)
7851 break;
7852
7853 if (NO_OPD_RELOCS && is_opd)
7854 break;
7855
7856 if ((info->shared
7857 && (MUST_BE_DYN_RELOC (r_type)
7858 || (h != NULL
7859 && h->dynindx != -1
7860 && (! info->symbolic
7861 || (h->elf_link_hash_flags
7862 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
7863 || (!info->shared
7864 && h != NULL
7865 && h->dynindx != -1
7866 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
7867 && (((h->elf_link_hash_flags
7868 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
7869 && (h->elf_link_hash_flags
7870 & ELF_LINK_HASH_DEF_REGULAR) == 0)
7871 || h->root.type == bfd_link_hash_undefweak
7872 || h->root.type == bfd_link_hash_undefined)))
7873 {
7874 Elf_Internal_Rela outrel;
7875 bfd_boolean skip, relocate;
7876 asection *sreloc;
7877 bfd_byte *loc;
7878
7879 /* When generating a dynamic object, these relocations
7880 are copied into the output file to be resolved at run
7881 time. */
7882
7883 skip = FALSE;
7884 relocate = FALSE;
7885
7886 outrel.r_offset =
7887 _bfd_elf_section_offset (output_bfd, info, input_section,
7888 rel->r_offset);
7889 if (outrel.r_offset == (bfd_vma) -1)
7890 skip = TRUE;
7891 else if (outrel.r_offset == (bfd_vma) -2)
7892 skip = TRUE, relocate = TRUE;
7893 outrel.r_offset += (input_section->output_section->vma
7894 + input_section->output_offset);
7895 outrel.r_addend = rel->r_addend;
7896
7897 if (skip)
7898 memset (&outrel, 0, sizeof outrel);
7899 else if (h != NULL
7900 && h->dynindx != -1
7901 && !is_opd
7902 && (!MUST_BE_DYN_RELOC (r_type)
7903 || !info->shared
7904 || !info->symbolic
7905 || (h->elf_link_hash_flags
7906 & ELF_LINK_HASH_DEF_REGULAR) == 0))
7907 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
7908 else
7909 {
7910 /* This symbol is local, or marked to become local,
7911 or this is an opd section reloc which must point
7912 at a local function. */
7913 outrel.r_addend += relocation;
7914 /* ??? why? */
7915 relocate = TRUE;
7916 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
7917 {
7918 if (is_opd && h != NULL)
7919 {
7920 /* Lie about opd entries. This case occurs
7921 when building shared libraries and we
7922 reference a function in another shared
7923 lib. The same thing happens for a weak
7924 definition in an application that's
7925 overridden by a strong definition in a
7926 shared lib. (I believe this is a generic
7927 bug in binutils handling of weak syms.)
7928 In these cases we won't use the opd
7929 entry in this lib. */
7930 unresolved_reloc = FALSE;
7931 }
7932 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
7933 }
7934 else
7935 {
7936 long indx = 0;
7937
7938 if (bfd_is_abs_section (sec))
7939 ;
7940 else if (sec == NULL || sec->owner == NULL)
7941 {
7942 bfd_set_error (bfd_error_bad_value);
7943 return FALSE;
7944 }
7945 else
7946 {
7947 asection *osec;
7948
7949 osec = sec->output_section;
7950 indx = elf_section_data (osec)->dynindx;
7951
7952 /* We are turning this relocation into one
7953 against a section symbol, so subtract out
7954 the output section's address but not the
7955 offset of the input section in the output
7956 section. */
7957 outrel.r_addend -= osec->vma;
7958 }
7959
7960 outrel.r_info = ELF64_R_INFO (indx, r_type);
7961 }
7962 }
7963
7964 sreloc = elf_section_data (input_section)->sreloc;
7965 if (sreloc == NULL)
7966 abort ();
7967
7968 loc = sreloc->contents;
7969 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
7970 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7971
7972 /* If this reloc is against an external symbol, it will
7973 be computed at runtime, so there's no need to do
7974 anything now. */
7975 if (! relocate)
7976 continue;
7977 }
7978 break;
7979
7980 case R_PPC64_COPY:
7981 case R_PPC64_GLOB_DAT:
7982 case R_PPC64_JMP_SLOT:
7983 case R_PPC64_RELATIVE:
7984 /* We shouldn't ever see these dynamic relocs in relocatable
7985 files. */
7986 /* Fall thru */
7987
7988 case R_PPC64_PLTGOT16:
7989 case R_PPC64_PLTGOT16_DS:
7990 case R_PPC64_PLTGOT16_HA:
7991 case R_PPC64_PLTGOT16_HI:
7992 case R_PPC64_PLTGOT16_LO:
7993 case R_PPC64_PLTGOT16_LO_DS:
7994 case R_PPC64_PLTREL32:
7995 case R_PPC64_PLTREL64:
7996 /* These ones haven't been implemented yet. */
7997
7998 (*_bfd_error_handler)
7999 (_("%s: Relocation %s is not supported for symbol %s."),
8000 bfd_archive_filename (input_bfd),
8001 ppc64_elf_howto_table[(int) r_type]->name, sym_name);
8002
8003 bfd_set_error (bfd_error_invalid_operation);
8004 ret = FALSE;
8005 continue;
8006 }
8007
8008 /* Do any further special processing. */
8009 switch (r_type)
8010 {
8011 default:
8012 break;
8013
8014 case R_PPC64_ADDR16_HA:
8015 case R_PPC64_ADDR16_HIGHERA:
8016 case R_PPC64_ADDR16_HIGHESTA:
8017 case R_PPC64_GOT16_HA:
8018 case R_PPC64_PLTGOT16_HA:
8019 case R_PPC64_PLT16_HA:
8020 case R_PPC64_TOC16_HA:
8021 case R_PPC64_SECTOFF_HA:
8022 case R_PPC64_TPREL16_HA:
8023 case R_PPC64_DTPREL16_HA:
8024 case R_PPC64_GOT_TLSGD16_HA:
8025 case R_PPC64_GOT_TLSLD16_HA:
8026 case R_PPC64_GOT_TPREL16_HA:
8027 case R_PPC64_GOT_DTPREL16_HA:
8028 case R_PPC64_TPREL16_HIGHER:
8029 case R_PPC64_TPREL16_HIGHERA:
8030 case R_PPC64_TPREL16_HIGHEST:
8031 case R_PPC64_TPREL16_HIGHESTA:
8032 case R_PPC64_DTPREL16_HIGHER:
8033 case R_PPC64_DTPREL16_HIGHERA:
8034 case R_PPC64_DTPREL16_HIGHEST:
8035 case R_PPC64_DTPREL16_HIGHESTA:
8036 /* It's just possible that this symbol is a weak symbol
8037 that's not actually defined anywhere. In that case,
8038 'sec' would be NULL, and we should leave the symbol
8039 alone (it will be set to zero elsewhere in the link). */
8040 if (sec != NULL)
8041 /* Add 0x10000 if sign bit in 0:15 is set. */
8042 addend += ((relocation + addend) & 0x8000) << 1;
8043 break;
8044
8045 case R_PPC64_ADDR16_DS:
8046 case R_PPC64_ADDR16_LO_DS:
8047 case R_PPC64_GOT16_DS:
8048 case R_PPC64_GOT16_LO_DS:
8049 case R_PPC64_PLT16_LO_DS:
8050 case R_PPC64_SECTOFF_DS:
8051 case R_PPC64_SECTOFF_LO_DS:
8052 case R_PPC64_TOC16_DS:
8053 case R_PPC64_TOC16_LO_DS:
8054 case R_PPC64_PLTGOT16_DS:
8055 case R_PPC64_PLTGOT16_LO_DS:
8056 case R_PPC64_GOT_TPREL16_DS:
8057 case R_PPC64_GOT_TPREL16_LO_DS:
8058 case R_PPC64_GOT_DTPREL16_DS:
8059 case R_PPC64_GOT_DTPREL16_LO_DS:
8060 case R_PPC64_TPREL16_DS:
8061 case R_PPC64_TPREL16_LO_DS:
8062 case R_PPC64_DTPREL16_DS:
8063 case R_PPC64_DTPREL16_LO_DS:
8064 if (((relocation + addend) & 3) != 0)
8065 {
8066 (*_bfd_error_handler)
8067 (_("%s: error: relocation %s not a multiple of 4"),
8068 bfd_archive_filename (input_bfd),
8069 ppc64_elf_howto_table[(int) r_type]->name);
8070 bfd_set_error (bfd_error_bad_value);
8071 ret = FALSE;
8072 continue;
8073 }
8074 break;
8075
8076 case R_PPC64_REL14:
8077 case R_PPC64_REL14_BRNTAKEN:
8078 case R_PPC64_REL14_BRTAKEN:
8079 max_br_offset = 1 << 15;
8080 goto branch_check;
8081
8082 case R_PPC64_REL24:
8083 max_br_offset = 1 << 25;
8084
8085 branch_check:
8086 /* If the branch is out of reach, then redirect the
8087 call to the local stub for this function. */
8088 from = (rel->r_offset
8089 + input_section->output_offset
8090 + input_section->output_section->vma);
8091 if (relocation + addend - from + max_br_offset >= 2 * max_br_offset
8092 && (stub_entry = ppc_get_stub_entry (input_section, sec, h,
8093 rel, htab)) != NULL)
8094 {
8095 /* Munge up the value and addend so that we call the stub
8096 rather than the procedure directly. */
8097 relocation = (stub_entry->stub_offset
8098 + stub_entry->stub_sec->output_offset
8099 + stub_entry->stub_sec->output_section->vma);
8100 addend = 0;
8101 }
8102 break;
8103 }
8104
8105 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
8106 because such sections are not SEC_ALLOC and thus ld.so will
8107 not process them. */
8108 if (unresolved_reloc
8109 && !((input_section->flags & SEC_DEBUGGING) != 0
8110 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
8111 {
8112 (*_bfd_error_handler)
8113 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
8114 bfd_archive_filename (input_bfd),
8115 bfd_get_section_name (input_bfd, input_section),
8116 (long) rel->r_offset,
8117 h->root.root.string);
8118 ret = FALSE;
8119 }
8120
8121 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
8122 input_bfd,
8123 input_section,
8124 contents,
8125 rel->r_offset,
8126 relocation,
8127 addend);
8128
8129 if (r != bfd_reloc_ok)
8130 {
8131 const char *name;
8132
8133 if (h != NULL)
8134 {
8135 if (h->root.type == bfd_link_hash_undefweak
8136 && ppc64_elf_howto_table[(int) r_type]->pc_relative)
8137 {
8138 /* Assume this is a call protected by other code that
8139 detects the symbol is undefined. If this is the case,
8140 we can safely ignore the overflow. If not, the
8141 program is hosed anyway, and a little warning isn't
8142 going to help. */
8143
8144 continue;
8145 }
8146
8147 name = h->root.root.string;
8148 }
8149 else
8150 {
8151 name = bfd_elf_local_sym_name (input_bfd, sym);
8152 if (name == NULL)
8153 continue;
8154 }
8155
8156 if (r == bfd_reloc_overflow)
8157 {
8158 if (warned)
8159 continue;
8160 if (!((*info->callbacks->reloc_overflow)
8161 (info, name, ppc64_elf_howto_table[(int) r_type]->name,
8162 rel->r_addend, input_bfd, input_section, rel->r_offset)))
8163 return FALSE;
8164 }
8165 else
8166 {
8167 (*_bfd_error_handler)
8168 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
8169 bfd_archive_filename (input_bfd),
8170 bfd_get_section_name (input_bfd, input_section),
8171 (long) rel->r_offset, name, (int) r);
8172 ret = FALSE;
8173 }
8174 }
8175 }
8176
8177 return ret;
8178}
8179
8180/* Finish up dynamic symbol handling. We set the contents of various
8181 dynamic sections here. */
8182
8183static bfd_boolean
8184ppc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
8185 bfd *output_bfd;
8186 struct bfd_link_info *info;
8187 struct elf_link_hash_entry *h;
8188 Elf_Internal_Sym *sym;
8189{
8190 struct ppc_link_hash_table *htab;
8191 bfd *dynobj;
8192
8193 htab = ppc_hash_table (info);
8194 dynobj = htab->elf.dynobj;
8195
8196 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
8197 {
8198 struct plt_entry *ent;
8199 Elf_Internal_Rela rela;
8200 bfd_byte *loc;
8201
8202 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8203 if (ent->plt.offset != (bfd_vma) -1)
8204 {
8205 /* This symbol has an entry in the procedure linkage
8206 table. Set it up. */
8207
8208 if (htab->splt == NULL
8209 || htab->srelplt == NULL
8210 || htab->sglink == NULL)
8211 abort ();
8212
8213 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8214 fill in the PLT entry. */
8215
8216 rela.r_offset = (htab->splt->output_section->vma
8217 + htab->splt->output_offset
8218 + ent->plt.offset);
8219 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8220 rela.r_addend = ent->addend;
8221
8222 loc = htab->srelplt->contents;
8223 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8224 * sizeof (Elf64_External_Rela));
8225 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8226 }
8227 }
8228
8229 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8230 {
8231 Elf_Internal_Rela rela;
8232 bfd_byte *loc;
8233
8234 /* This symbol needs a copy reloc. Set it up. */
8235
8236 if (h->dynindx == -1
8237 || (h->root.type != bfd_link_hash_defined
8238 && h->root.type != bfd_link_hash_defweak)
8239 || htab->srelbss == NULL)
8240 abort ();
8241
8242 rela.r_offset = (h->root.u.def.value
8243 + h->root.u.def.section->output_section->vma
8244 + h->root.u.def.section->output_offset);
8245 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8246 rela.r_addend = 0;
8247 loc = htab->srelbss->contents;
8248 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
8249 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8250 }
8251
8252 /* Mark some specially defined symbols as absolute. */
8253 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8254 sym->st_shndx = SHN_ABS;
8255
8256 return TRUE;
8257}
8258
8259/* Used to decide how to sort relocs in an optimal manner for the
8260 dynamic linker, before writing them out. */
8261
8262static enum elf_reloc_type_class
8263ppc64_elf_reloc_type_class (rela)
8264 const Elf_Internal_Rela *rela;
8265{
8266 enum elf_ppc64_reloc_type r_type;
8267
8268 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rela->r_info);
8269 switch (r_type)
8270 {
8271 case R_PPC64_RELATIVE:
8272 return reloc_class_relative;
8273 case R_PPC64_JMP_SLOT:
8274 return reloc_class_plt;
8275 case R_PPC64_COPY:
8276 return reloc_class_copy;
8277 default:
8278 return reloc_class_normal;
8279 }
8280}
8281
8282/* Finish up the dynamic sections. */
8283
8284static bfd_boolean
8285ppc64_elf_finish_dynamic_sections (output_bfd, info)
8286 bfd *output_bfd;
8287 struct bfd_link_info *info;
8288{
8289 struct ppc_link_hash_table *htab;
8290 bfd *dynobj;
8291 asection *sdyn;
8292
8293 htab = ppc_hash_table (info);
8294 dynobj = htab->elf.dynobj;
8295 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8296
8297 if (htab->elf.dynamic_sections_created)
8298 {
8299 Elf64_External_Dyn *dyncon, *dynconend;
8300
8301 if (sdyn == NULL || htab->sgot == NULL)
8302 abort ();
8303
8304 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8305 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
8306 for (; dyncon < dynconend; dyncon++)
8307 {
8308 Elf_Internal_Dyn dyn;
8309 asection *s;
8310
8311 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8312
8313 switch (dyn.d_tag)
8314 {
8315 default:
8316 continue;
8317
8318 case DT_PPC64_GLINK:
8319 s = htab->sglink;
8320 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8321 break;
8322
8323 case DT_PPC64_OPD:
8324 s = bfd_get_section_by_name (output_bfd, ".opd");
8325 if (s == NULL)
8326 continue;
8327 dyn.d_un.d_ptr = s->vma;
8328 break;
8329
8330 case DT_PPC64_OPDSZ:
8331 s = bfd_get_section_by_name (output_bfd, ".opd");
8332 if (s == NULL)
8333 continue;
8334 dyn.d_un.d_val = s->_raw_size;
8335 break;
8336
8337 case DT_PLTGOT:
8338 s = htab->splt;
8339 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8340 break;
8341
8342 case DT_JMPREL:
8343 s = htab->srelplt;
8344 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8345 break;
8346
8347 case DT_PLTRELSZ:
8348 dyn.d_un.d_val = htab->srelplt->_raw_size;
8349 break;
8350
8351 case DT_RELASZ:
8352 /* Don't count procedure linkage table relocs in the
8353 overall reloc count. */
8354 s = htab->srelplt;
8355 if (s == NULL)
8356 continue;
8357 dyn.d_un.d_val -= s->_raw_size;
8358 break;
8359
8360 case DT_RELA:
8361 /* We may not be using the standard ELF linker script.
8362 If .rela.plt is the first .rela section, we adjust
8363 DT_RELA to not include it. */
8364 s = htab->srelplt;
8365 if (s == NULL)
8366 continue;
8367 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8368 continue;
8369 dyn.d_un.d_ptr += s->_raw_size;
8370 break;
8371 }
8372
8373 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
8374 }
8375 }
8376
8377 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
8378 {
8379 /* Fill in the first entry in the global offset table.
8380 We use it to hold the link-time TOCbase. */
8381 bfd_put_64 (output_bfd,
8382 elf_gp (output_bfd) + TOC_BASE_OFF,
8383 htab->sgot->contents);
8384
8385 /* Set .got entry size. */
8386 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize = 8;
8387 }
8388
8389 if (htab->splt != NULL && htab->splt->_raw_size != 0)
8390 {
8391 /* Set .plt entry size. */
8392 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize
8393 = PLT_ENTRY_SIZE;
8394 }
8395
8396 return TRUE;
8397}
8398
8399#define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8400#define TARGET_LITTLE_NAME "elf64-powerpcle"
8401#define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8402#define TARGET_BIG_NAME "elf64-powerpc"
8403#define ELF_ARCH bfd_arch_powerpc
8404#define ELF_MACHINE_CODE EM_PPC64
8405#define ELF_MAXPAGESIZE 0x10000
8406#define elf_info_to_howto ppc64_elf_info_to_howto
8407
8408#ifdef EM_CYGNUS_POWERPC
8409#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8410#endif
8411
8412#ifdef EM_PPC_OLD
8413#define ELF_MACHINE_ALT2 EM_PPC_OLD
8414#endif
8415
8416#define elf_backend_want_got_sym 0
8417#define elf_backend_want_plt_sym 0
8418#define elf_backend_plt_alignment 3
8419#define elf_backend_plt_not_loaded 1
8420#define elf_backend_got_symbol_offset 0
8421#define elf_backend_got_header_size 8
8422#define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
8423#define elf_backend_can_gc_sections 1
8424#define elf_backend_can_refcount 1
8425#define elf_backend_rela_normal 1
8426
8427#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
8428#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
8429#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
8430#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
8431#define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
8432
8433#define elf_backend_object_p ppc64_elf_object_p
8434#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8435#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8436#define elf_backend_check_relocs ppc64_elf_check_relocs
8437#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8438#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8439#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
8440#define elf_backend_hide_symbol ppc64_elf_hide_symbol
8441#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
8442#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
8443#define elf_backend_relocate_section ppc64_elf_relocate_section
8444#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8445#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8446#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
8447
8448#include "elf64-target.h"
This page took 0.055015 seconds and 4 git commands to generate.