* reloc.c: Add PPC and PPC64 TLS relocs.
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5
6 This file is part of BFD, the Binary File Descriptor library.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22 /* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
24
25 #include "bfd.h"
26 #include "sysdep.h"
27 #include "bfdlink.h"
28 #include "libbfd.h"
29 #include "elf-bfd.h"
30 #include "elf/ppc64.h"
31 #include "elf64-ppc.h"
32
33 static void ppc_howto_init
34 PARAMS ((void));
35 static reloc_howto_type *ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
37 static void ppc64_elf_info_to_howto
38 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
39 static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
43 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
45 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
47 static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
49 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
51 static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
53 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
54 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
55 static bfd_boolean ppc64_elf_object_p
56 PARAMS ((bfd *));
57 static bfd_boolean ppc64_elf_merge_private_bfd_data
58 PARAMS ((bfd *, bfd *));
59 static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd *, asection *));
61
62
63 /* The name of the dynamic interpreter. This is put in the .interp
64 section. */
65 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
67 /* The size in bytes of an entry in the procedure linkage table. */
68 #define PLT_ENTRY_SIZE 24
69
70 /* The initial size of the plt reserved for the dynamic linker. */
71 #define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
72
73 /* TOC base pointers offset from start of TOC. */
74 #define TOC_BASE_OFF 0x8000
75
76 /* Offset of tp and dtp pointers from start of TLS block. */
77 #define TP_OFFSET 0x7000
78 #define DTP_OFFSET 0x8000
79
80 /* .plt call stub instructions. */
81 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82 #define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83 #define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84 #define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85 #define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87 #define BCTR 0x4e800420 /* bctr */
88
89 /* The normal stub is this size. */
90 #define PLT_CALL_STUB_SIZE (7*4)
91
92 /* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94 #define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
95
96 /* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98 #define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
99
100 /* Always allow this much space. */
101 #define GLINK_CALL_STUB_SIZE (8*4)
102
103 /* Pad with this. */
104 #define NOP 0x60000000
105
106 /* Some other nops. */
107 #define CROR_151515 0x4def7b82
108 #define CROR_313131 0x4ffffb82
109
110 /* .glink entries for the first 32k functions are two instructions. */
111 #define LI_R0_0 0x38000000 /* li %r0,0 */
112 #define B_DOT 0x48000000 /* b . */
113
114 /* After that, we need two instructions to load the index, followed by
115 a branch. */
116 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
117 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
118
119 /* Instructions to save and restore floating point regs. */
120 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122 #define BLR 0x4e800020 /* blr */
123
124 /* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
127 relocate .opd without reloc entries. */
128 #ifndef NO_OPD_RELOCS
129 #define NO_OPD_RELOCS 0
130 #endif
131 \f
132 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
133
134 /* Relocation HOWTO's. */
135 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
136
137 static reloc_howto_type ppc64_elf_howto_raw[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE, /* type */
140 0, /* rightshift */
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
143 FALSE, /* pc_relative */
144 0, /* bitpos */
145 complain_overflow_dont, /* complain_on_overflow */
146 bfd_elf_generic_reloc, /* special_function */
147 "R_PPC64_NONE", /* name */
148 FALSE, /* partial_inplace */
149 0, /* src_mask */
150 0, /* dst_mask */
151 FALSE), /* pcrel_offset */
152
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
158 FALSE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_PPC64_ADDR32", /* name */
163 FALSE, /* partial_inplace */
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
166 FALSE), /* pcrel_offset */
167
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 26, /* bitsize */
174 FALSE, /* pc_relative */
175 0, /* bitpos */
176 complain_overflow_bitfield, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_PPC64_ADDR24", /* name */
179 FALSE, /* partial_inplace */
180 0, /* src_mask */
181 0x03fffffc, /* dst_mask */
182 FALSE), /* pcrel_offset */
183
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16, /* type */
186 0, /* rightshift */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
188 16, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_PPC64_ADDR16", /* name */
194 FALSE, /* partial_inplace */
195 0, /* src_mask */
196 0xffff, /* dst_mask */
197 FALSE), /* pcrel_offset */
198
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO, /* type */
201 0, /* rightshift */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
203 16, /* bitsize */
204 FALSE, /* pc_relative */
205 0, /* bitpos */
206 complain_overflow_dont,/* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
209 FALSE, /* partial_inplace */
210 0, /* src_mask */
211 0xffff, /* dst_mask */
212 FALSE), /* pcrel_offset */
213
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI, /* type */
216 16, /* rightshift */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
218 16, /* bitsize */
219 FALSE, /* pc_relative */
220 0, /* bitpos */
221 complain_overflow_dont, /* complain_on_overflow */
222 bfd_elf_generic_reloc, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
224 FALSE, /* partial_inplace */
225 0, /* src_mask */
226 0xffff, /* dst_mask */
227 FALSE), /* pcrel_offset */
228
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA, /* type */
232 16, /* rightshift */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
234 16, /* bitsize */
235 FALSE, /* pc_relative */
236 0, /* bitpos */
237 complain_overflow_dont, /* complain_on_overflow */
238 ppc64_elf_ha_reloc, /* special_function */
239 "R_PPC64_ADDR16_HA", /* name */
240 FALSE, /* partial_inplace */
241 0, /* src_mask */
242 0xffff, /* dst_mask */
243 FALSE), /* pcrel_offset */
244
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 16, /* bitsize */
251 FALSE, /* pc_relative */
252 0, /* bitpos */
253 complain_overflow_bitfield, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_PPC64_ADDR14", /* name */
256 FALSE, /* partial_inplace */
257 0, /* src_mask */
258 0x0000fffc, /* dst_mask */
259 FALSE), /* pcrel_offset */
260
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
265 0, /* rightshift */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
268 FALSE, /* pc_relative */
269 0, /* bitpos */
270 complain_overflow_bitfield, /* complain_on_overflow */
271 ppc64_elf_brtaken_reloc, /* special_function */
272 "R_PPC64_ADDR14_BRTAKEN",/* name */
273 FALSE, /* partial_inplace */
274 0, /* src_mask */
275 0x0000fffc, /* dst_mask */
276 FALSE), /* pcrel_offset */
277
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
282 0, /* rightshift */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
285 FALSE, /* pc_relative */
286 0, /* bitpos */
287 complain_overflow_bitfield, /* complain_on_overflow */
288 ppc64_elf_brtaken_reloc, /* special_function */
289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
290 FALSE, /* partial_inplace */
291 0, /* src_mask */
292 0x0000fffc, /* dst_mask */
293 FALSE), /* pcrel_offset */
294
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 26, /* bitsize */
300 TRUE, /* pc_relative */
301 0, /* bitpos */
302 complain_overflow_signed, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_REL24", /* name */
305 FALSE, /* partial_inplace */
306 0, /* src_mask */
307 0x03fffffc, /* dst_mask */
308 TRUE), /* pcrel_offset */
309
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14, /* type */
312 0, /* rightshift */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
314 16, /* bitsize */
315 TRUE, /* pc_relative */
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_REL14", /* name */
320 FALSE, /* partial_inplace */
321 0, /* src_mask */
322 0x0000fffc, /* dst_mask */
323 TRUE), /* pcrel_offset */
324
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
327 zero. */
328 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
329 0, /* rightshift */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
331 16, /* bitsize */
332 TRUE, /* pc_relative */
333 0, /* bitpos */
334 complain_overflow_signed, /* complain_on_overflow */
335 ppc64_elf_brtaken_reloc, /* special_function */
336 "R_PPC64_REL14_BRTAKEN", /* name */
337 FALSE, /* partial_inplace */
338 0, /* src_mask */
339 0x0000fffc, /* dst_mask */
340 TRUE), /* pcrel_offset */
341
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
344 be zero. */
345 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
349 TRUE, /* pc_relative */
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
352 ppc64_elf_brtaken_reloc, /* special_function */
353 "R_PPC64_REL14_BRNTAKEN",/* name */
354 FALSE, /* partial_inplace */
355 0, /* src_mask */
356 0x0000fffc, /* dst_mask */
357 TRUE), /* pcrel_offset */
358
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
360 symbol. */
361 HOWTO (R_PPC64_GOT16, /* type */
362 0, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
365 FALSE, /* pc_relative */
366 0, /* bitpos */
367 complain_overflow_signed, /* complain_on_overflow */
368 ppc64_elf_unhandled_reloc, /* special_function */
369 "R_PPC64_GOT16", /* name */
370 FALSE, /* partial_inplace */
371 0, /* src_mask */
372 0xffff, /* dst_mask */
373 FALSE), /* pcrel_offset */
374
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
376 the symbol. */
377 HOWTO (R_PPC64_GOT16_LO, /* type */
378 0, /* rightshift */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
381 FALSE, /* pc_relative */
382 0, /* bitpos */
383 complain_overflow_dont, /* complain_on_overflow */
384 ppc64_elf_unhandled_reloc, /* special_function */
385 "R_PPC64_GOT16_LO", /* name */
386 FALSE, /* partial_inplace */
387 0, /* src_mask */
388 0xffff, /* dst_mask */
389 FALSE), /* pcrel_offset */
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOWTO (R_PPC64_GOT16_HI, /* type */
394 16, /* rightshift */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
397 FALSE, /* pc_relative */
398 0, /* bitpos */
399 complain_overflow_dont,/* complain_on_overflow */
400 ppc64_elf_unhandled_reloc, /* special_function */
401 "R_PPC64_GOT16_HI", /* name */
402 FALSE, /* partial_inplace */
403 0, /* src_mask */
404 0xffff, /* dst_mask */
405 FALSE), /* pcrel_offset */
406
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
408 the symbol. */
409 HOWTO (R_PPC64_GOT16_HA, /* type */
410 16, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
413 FALSE, /* pc_relative */
414 0, /* bitpos */
415 complain_overflow_dont,/* complain_on_overflow */
416 ppc64_elf_unhandled_reloc, /* special_function */
417 "R_PPC64_GOT16_HA", /* name */
418 FALSE, /* partial_inplace */
419 0, /* src_mask */
420 0xffff, /* dst_mask */
421 FALSE), /* pcrel_offset */
422
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY, /* type */
429 0, /* rightshift */
430 0, /* this one is variable size */
431 0, /* bitsize */
432 FALSE, /* pc_relative */
433 0, /* bitpos */
434 complain_overflow_dont, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc, /* special_function */
436 "R_PPC64_COPY", /* name */
437 FALSE, /* partial_inplace */
438 0, /* src_mask */
439 0, /* dst_mask */
440 FALSE), /* pcrel_offset */
441
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
443 entries. */
444 HOWTO (R_PPC64_GLOB_DAT, /* type */
445 0, /* rightshift */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
447 64, /* bitsize */
448 FALSE, /* pc_relative */
449 0, /* bitpos */
450 complain_overflow_dont, /* complain_on_overflow */
451 ppc64_elf_unhandled_reloc, /* special_function */
452 "R_PPC64_GLOB_DAT", /* name */
453 FALSE, /* partial_inplace */
454 0, /* src_mask */
455 ONES (64), /* dst_mask */
456 FALSE), /* pcrel_offset */
457
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT, /* type */
461 0, /* rightshift */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
463 0, /* bitsize */
464 FALSE, /* pc_relative */
465 0, /* bitpos */
466 complain_overflow_dont, /* complain_on_overflow */
467 ppc64_elf_unhandled_reloc, /* special_function */
468 "R_PPC64_JMP_SLOT", /* name */
469 FALSE, /* partial_inplace */
470 0, /* src_mask */
471 0, /* dst_mask */
472 FALSE), /* pcrel_offset */
473
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
476 addend. */
477 HOWTO (R_PPC64_RELATIVE, /* type */
478 0, /* rightshift */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
480 64, /* bitsize */
481 FALSE, /* pc_relative */
482 0, /* bitpos */
483 complain_overflow_dont, /* complain_on_overflow */
484 bfd_elf_generic_reloc, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
486 FALSE, /* partial_inplace */
487 0, /* src_mask */
488 ONES (64), /* dst_mask */
489 FALSE), /* pcrel_offset */
490
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
496 FALSE, /* pc_relative */
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC64_UADDR32", /* name */
501 FALSE, /* partial_inplace */
502 0, /* src_mask */
503 0xffffffff, /* dst_mask */
504 FALSE), /* pcrel_offset */
505
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
511 FALSE, /* pc_relative */
512 0, /* bitpos */
513 complain_overflow_bitfield, /* complain_on_overflow */
514 bfd_elf_generic_reloc, /* special_function */
515 "R_PPC64_UADDR16", /* name */
516 FALSE, /* partial_inplace */
517 0, /* src_mask */
518 0xffff, /* dst_mask */
519 FALSE), /* pcrel_offset */
520
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
526 TRUE, /* pc_relative */
527 0, /* bitpos */
528 /* FIXME: Verify. Was complain_overflow_bitfield. */
529 complain_overflow_signed, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC64_REL32", /* name */
532 FALSE, /* partial_inplace */
533 0, /* src_mask */
534 0xffffffff, /* dst_mask */
535 TRUE), /* pcrel_offset */
536
537 /* 32-bit relocation to the symbol's procedure linkage table. */
538 HOWTO (R_PPC64_PLT32, /* type */
539 0, /* rightshift */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
541 32, /* bitsize */
542 FALSE, /* pc_relative */
543 0, /* bitpos */
544 complain_overflow_bitfield, /* complain_on_overflow */
545 ppc64_elf_unhandled_reloc, /* special_function */
546 "R_PPC64_PLT32", /* name */
547 FALSE, /* partial_inplace */
548 0, /* src_mask */
549 0xffffffff, /* dst_mask */
550 FALSE), /* pcrel_offset */
551
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 32, /* bitsize */
558 TRUE, /* pc_relative */
559 0, /* bitpos */
560 complain_overflow_signed, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
563 FALSE, /* partial_inplace */
564 0, /* src_mask */
565 0xffffffff, /* dst_mask */
566 TRUE), /* pcrel_offset */
567
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
569 the symbol. */
570 HOWTO (R_PPC64_PLT16_LO, /* type */
571 0, /* rightshift */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
574 FALSE, /* pc_relative */
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 ppc64_elf_unhandled_reloc, /* special_function */
578 "R_PPC64_PLT16_LO", /* name */
579 FALSE, /* partial_inplace */
580 0, /* src_mask */
581 0xffff, /* dst_mask */
582 FALSE), /* pcrel_offset */
583
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
585 the symbol. */
586 HOWTO (R_PPC64_PLT16_HI, /* type */
587 16, /* rightshift */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
589 16, /* bitsize */
590 FALSE, /* pc_relative */
591 0, /* bitpos */
592 complain_overflow_dont, /* complain_on_overflow */
593 ppc64_elf_unhandled_reloc, /* special_function */
594 "R_PPC64_PLT16_HI", /* name */
595 FALSE, /* partial_inplace */
596 0, /* src_mask */
597 0xffff, /* dst_mask */
598 FALSE), /* pcrel_offset */
599
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
601 the symbol. */
602 HOWTO (R_PPC64_PLT16_HA, /* type */
603 16, /* rightshift */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
606 FALSE, /* pc_relative */
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
609 ppc64_elf_unhandled_reloc, /* special_function */
610 "R_PPC64_PLT16_HA", /* name */
611 FALSE, /* partial_inplace */
612 0, /* src_mask */
613 0xffff, /* dst_mask */
614 FALSE), /* pcrel_offset */
615
616 /* 16-bit section relative relocation. */
617 HOWTO (R_PPC64_SECTOFF, /* type */
618 0, /* rightshift */
619 1, /* size (0 = byte, 1 = short, 2 = long) */
620 16, /* bitsize */
621 FALSE, /* pc_relative */
622 0, /* bitpos */
623 complain_overflow_bitfield, /* complain_on_overflow */
624 ppc64_elf_sectoff_reloc, /* special_function */
625 "R_PPC64_SECTOFF", /* name */
626 FALSE, /* partial_inplace */
627 0, /* src_mask */
628 0xffff, /* dst_mask */
629 FALSE), /* pcrel_offset */
630
631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
632 HOWTO (R_PPC64_SECTOFF_LO, /* type */
633 0, /* rightshift */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
635 16, /* bitsize */
636 FALSE, /* pc_relative */
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
639 ppc64_elf_sectoff_reloc, /* special_function */
640 "R_PPC64_SECTOFF_LO", /* name */
641 FALSE, /* partial_inplace */
642 0, /* src_mask */
643 0xffff, /* dst_mask */
644 FALSE), /* pcrel_offset */
645
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI, /* type */
648 16, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
651 FALSE, /* pc_relative */
652 0, /* bitpos */
653 complain_overflow_dont, /* complain_on_overflow */
654 ppc64_elf_sectoff_reloc, /* special_function */
655 "R_PPC64_SECTOFF_HI", /* name */
656 FALSE, /* partial_inplace */
657 0, /* src_mask */
658 0xffff, /* dst_mask */
659 FALSE), /* pcrel_offset */
660
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA, /* type */
663 16, /* rightshift */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
665 16, /* bitsize */
666 FALSE, /* pc_relative */
667 0, /* bitpos */
668 complain_overflow_dont, /* complain_on_overflow */
669 ppc64_elf_sectoff_ha_reloc, /* special_function */
670 "R_PPC64_SECTOFF_HA", /* name */
671 FALSE, /* partial_inplace */
672 0, /* src_mask */
673 0xffff, /* dst_mask */
674 FALSE), /* pcrel_offset */
675
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30, /* type */
678 2, /* rightshift */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
680 30, /* bitsize */
681 TRUE, /* pc_relative */
682 0, /* bitpos */
683 complain_overflow_dont, /* complain_on_overflow */
684 bfd_elf_generic_reloc, /* special_function */
685 "R_PPC64_REL30", /* name */
686 FALSE, /* partial_inplace */
687 0, /* src_mask */
688 0xfffffffc, /* dst_mask */
689 TRUE), /* pcrel_offset */
690
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
692
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64, /* type */
695 0, /* rightshift */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
697 64, /* bitsize */
698 FALSE, /* pc_relative */
699 0, /* bitpos */
700 complain_overflow_dont, /* complain_on_overflow */
701 bfd_elf_generic_reloc, /* special_function */
702 "R_PPC64_ADDR64", /* name */
703 FALSE, /* partial_inplace */
704 0, /* src_mask */
705 ONES (64), /* dst_mask */
706 FALSE), /* pcrel_offset */
707
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
710 32, /* rightshift */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
712 16, /* bitsize */
713 FALSE, /* pc_relative */
714 0, /* bitpos */
715 complain_overflow_dont, /* complain_on_overflow */
716 bfd_elf_generic_reloc, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
718 FALSE, /* partial_inplace */
719 0, /* src_mask */
720 0xffff, /* dst_mask */
721 FALSE), /* pcrel_offset */
722
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
726 32, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
729 FALSE, /* pc_relative */
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
732 ppc64_elf_ha_reloc, /* special_function */
733 "R_PPC64_ADDR16_HIGHERA", /* name */
734 FALSE, /* partial_inplace */
735 0, /* src_mask */
736 0xffff, /* dst_mask */
737 FALSE), /* pcrel_offset */
738
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
741 48, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
744 FALSE, /* pc_relative */
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 bfd_elf_generic_reloc, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
749 FALSE, /* partial_inplace */
750 0, /* src_mask */
751 0xffff, /* dst_mask */
752 FALSE), /* pcrel_offset */
753
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
757 48, /* rightshift */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
759 16, /* bitsize */
760 FALSE, /* pc_relative */
761 0, /* bitpos */
762 complain_overflow_dont, /* complain_on_overflow */
763 ppc64_elf_ha_reloc, /* special_function */
764 "R_PPC64_ADDR16_HIGHESTA", /* name */
765 FALSE, /* partial_inplace */
766 0, /* src_mask */
767 0xffff, /* dst_mask */
768 FALSE), /* pcrel_offset */
769
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64, /* type */
772 0, /* rightshift */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
774 64, /* bitsize */
775 FALSE, /* pc_relative */
776 0, /* bitpos */
777 complain_overflow_dont, /* complain_on_overflow */
778 bfd_elf_generic_reloc, /* special_function */
779 "R_PPC64_UADDR64", /* name */
780 FALSE, /* partial_inplace */
781 0, /* src_mask */
782 ONES (64), /* dst_mask */
783 FALSE), /* pcrel_offset */
784
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64, /* type */
787 0, /* rightshift */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
789 64, /* bitsize */
790 TRUE, /* pc_relative */
791 0, /* bitpos */
792 complain_overflow_dont, /* complain_on_overflow */
793 bfd_elf_generic_reloc, /* special_function */
794 "R_PPC64_REL64", /* name */
795 FALSE, /* partial_inplace */
796 0, /* src_mask */
797 ONES (64), /* dst_mask */
798 TRUE), /* pcrel_offset */
799
800 /* 64-bit relocation to the symbol's procedure linkage table. */
801 HOWTO (R_PPC64_PLT64, /* type */
802 0, /* rightshift */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
804 64, /* bitsize */
805 FALSE, /* pc_relative */
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
808 ppc64_elf_unhandled_reloc, /* special_function */
809 "R_PPC64_PLT64", /* name */
810 FALSE, /* partial_inplace */
811 0, /* src_mask */
812 ONES (64), /* dst_mask */
813 FALSE), /* pcrel_offset */
814
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
816 table. */
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64, /* type */
819 0, /* rightshift */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
821 64, /* bitsize */
822 TRUE, /* pc_relative */
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
825 ppc64_elf_unhandled_reloc, /* special_function */
826 "R_PPC64_PLTREL64", /* name */
827 FALSE, /* partial_inplace */
828 0, /* src_mask */
829 ONES (64), /* dst_mask */
830 TRUE), /* pcrel_offset */
831
832 /* 16 bit TOC-relative relocation. */
833
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16, /* type */
836 0, /* rightshift */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
838 16, /* bitsize */
839 FALSE, /* pc_relative */
840 0, /* bitpos */
841 complain_overflow_signed, /* complain_on_overflow */
842 ppc64_elf_toc_reloc, /* special_function */
843 "R_PPC64_TOC16", /* name */
844 FALSE, /* partial_inplace */
845 0, /* src_mask */
846 0xffff, /* dst_mask */
847 FALSE), /* pcrel_offset */
848
849 /* 16 bit TOC-relative relocation without overflow. */
850
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO, /* type */
853 0, /* rightshift */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
855 16, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc64_elf_toc_reloc, /* special_function */
860 "R_PPC64_TOC16_LO", /* name */
861 FALSE, /* partial_inplace */
862 0, /* src_mask */
863 0xffff, /* dst_mask */
864 FALSE), /* pcrel_offset */
865
866 /* 16 bit TOC-relative relocation, high 16 bits. */
867
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI, /* type */
870 16, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc64_elf_toc_reloc, /* special_function */
877 "R_PPC64_TOC16_HI", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
885 negative. */
886
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA, /* type */
889 16, /* rightshift */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
891 16, /* bitsize */
892 FALSE, /* pc_relative */
893 0, /* bitpos */
894 complain_overflow_dont, /* complain_on_overflow */
895 ppc64_elf_toc_ha_reloc, /* special_function */
896 "R_PPC64_TOC16_HA", /* name */
897 FALSE, /* partial_inplace */
898 0, /* src_mask */
899 0xffff, /* dst_mask */
900 FALSE), /* pcrel_offset */
901
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
903
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_bitfield, /* complain_on_overflow */
912 ppc64_elf_toc64_reloc, /* special_function */
913 "R_PPC64_TOC", /* name */
914 FALSE, /* partial_inplace */
915 0, /* src_mask */
916 ONES (64), /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16, /* type */
929 0, /* rightshift */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
931 16, /* bitsize */
932 FALSE, /* pc_relative */
933 0, /* bitpos */
934 complain_overflow_signed, /* complain_on_overflow */
935 ppc64_elf_unhandled_reloc, /* special_function */
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE, /* partial_inplace */
938 0, /* src_mask */
939 0xffff, /* dst_mask */
940 FALSE), /* pcrel_offset */
941
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
945 0, /* rightshift */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
947 16, /* bitsize */
948 FALSE, /* pc_relative */
949 0, /* bitpos */
950 complain_overflow_dont, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE, /* partial_inplace */
954 0, /* src_mask */
955 0xffff, /* dst_mask */
956 FALSE), /* pcrel_offset */
957
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
961 16, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_dont, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
976 is negative. */
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
979 16, /* rightshift */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
981 16, /* bitsize */
982 FALSE, /* pc_relative */
983 0, /* bitpos */
984 complain_overflow_dont,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE, /* partial_inplace */
988 0, /* src_mask */
989 0xffff, /* dst_mask */
990 FALSE), /* pcrel_offset */
991
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS, /* type */
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_bitfield, /* complain_on_overflow */
1000 bfd_elf_generic_reloc, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xfffc, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont,/* complain_on_overflow */
1015 bfd_elf_generic_reloc, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xfffc, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS, /* type */
1024 0, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xfffc, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1039 0, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xfffc, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1054 0, /* rightshift */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1056 16, /* bitsize */
1057 FALSE, /* pc_relative */
1058 0, /* bitpos */
1059 complain_overflow_dont, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE, /* partial_inplace */
1063 0, /* src_mask */
1064 0xfffc, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1066
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1069 0, /* rightshift */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1071 16, /* bitsize */
1072 FALSE, /* pc_relative */
1073 0, /* bitpos */
1074 complain_overflow_bitfield, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE, /* partial_inplace */
1078 0, /* src_mask */
1079 0xfffc, /* dst_mask */
1080 FALSE), /* pcrel_offset */
1081
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1084 0, /* rightshift */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 16, /* bitsize */
1087 FALSE, /* pc_relative */
1088 0, /* bitpos */
1089 complain_overflow_dont, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE, /* partial_inplace */
1093 0, /* src_mask */
1094 0xfffc, /* dst_mask */
1095 FALSE), /* pcrel_offset */
1096
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS, /* type */
1099 0, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xfffc, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1114 0, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1116 16, /* bitsize */
1117 FALSE, /* pc_relative */
1118 0, /* bitpos */
1119 complain_overflow_dont, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE, /* partial_inplace */
1123 0, /* src_mask */
1124 0xfffc, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1126
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1130 0, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_signed, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_dont, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xfffc, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Marker reloc for TLS. */
1160 HOWTO (R_PPC64_TLS,
1161 0, /* rightshift */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1163 32, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 bfd_elf_generic_reloc, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64,
1177 0, /* rightshift */
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1179 64, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 ONES (64), /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64,
1194 0, /* rightshift */
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1196 64, /* bitsize */
1197 FALSE, /* pc_relative */
1198 0, /* bitpos */
1199 complain_overflow_dont, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE, /* partial_inplace */
1203 0, /* src_mask */
1204 ONES (64), /* dst_mask */
1205 FALSE), /* pcrel_offset */
1206
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16,
1209 0, /* rightshift */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1211 16, /* bitsize */
1212 FALSE, /* pc_relative */
1213 0, /* bitpos */
1214 complain_overflow_signed, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE, /* partial_inplace */
1218 0, /* src_mask */
1219 0xffff, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1221
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO,
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xffff, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1241 16, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0xffff, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1256 16, /* bitsize */
1257 FALSE, /* pc_relative */
1258 0, /* bitpos */
1259 complain_overflow_dont, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE, /* partial_inplace */
1263 0, /* src_mask */
1264 0xffff, /* dst_mask */
1265 FALSE), /* pcrel_offset */
1266
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 16, /* bitsize */
1272 FALSE, /* pc_relative */
1273 0, /* bitpos */
1274 complain_overflow_dont, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE, /* partial_inplace */
1278 0, /* src_mask */
1279 0xffff, /* dst_mask */
1280 FALSE), /* pcrel_offset */
1281
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xffff, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1301 16, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0xffff, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS,
1329 0, /* rightshift */
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1331 16, /* bitsize */
1332 FALSE, /* pc_relative */
1333 0, /* bitpos */
1334 complain_overflow_signed, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE, /* partial_inplace */
1338 0, /* src_mask */
1339 0xfffc, /* dst_mask */
1340 FALSE), /* pcrel_offset */
1341
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS,
1344 0, /* rightshift */
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1346 16, /* bitsize */
1347 FALSE, /* pc_relative */
1348 0, /* bitpos */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE, /* partial_inplace */
1353 0, /* src_mask */
1354 0xfffc, /* dst_mask */
1355 FALSE), /* pcrel_offset */
1356
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64,
1360 0, /* rightshift */
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1362 64, /* bitsize */
1363 FALSE, /* pc_relative */
1364 0, /* bitpos */
1365 complain_overflow_dont, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE, /* partial_inplace */
1369 0, /* src_mask */
1370 ONES (64), /* dst_mask */
1371 FALSE), /* pcrel_offset */
1372
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16,
1375 0, /* rightshift */
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1377 16, /* bitsize */
1378 FALSE, /* pc_relative */
1379 0, /* bitpos */
1380 complain_overflow_signed, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE, /* partial_inplace */
1384 0, /* src_mask */
1385 0xffff, /* dst_mask */
1386 FALSE), /* pcrel_offset */
1387
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO,
1390 0, /* rightshift */
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1392 16, /* bitsize */
1393 FALSE, /* pc_relative */
1394 0, /* bitpos */
1395 complain_overflow_dont, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE, /* partial_inplace */
1399 0, /* src_mask */
1400 0xffff, /* dst_mask */
1401 FALSE), /* pcrel_offset */
1402
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1407 16, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 0xffff, /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_dont, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
1455 complain_overflow_dont, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
1470 complain_overflow_dont, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS,
1495 0, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_signed, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xfffc, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS,
1510 0, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xfffc, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16,
1527 0, /* rightshift */
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1529 16, /* bitsize */
1530 FALSE, /* pc_relative */
1531 0, /* bitpos */
1532 complain_overflow_signed, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
1535 FALSE, /* partial_inplace */
1536 0, /* src_mask */
1537 0xffff, /* dst_mask */
1538 FALSE), /* pcrel_offset */
1539
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1542 0, /* rightshift */
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1544 16, /* bitsize */
1545 FALSE, /* pc_relative */
1546 0, /* bitpos */
1547 complain_overflow_dont, /* complain_on_overflow */
1548 ppc64_elf_unhandled_reloc, /* special_function */
1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
1550 FALSE, /* partial_inplace */
1551 0, /* src_mask */
1552 0xffff, /* dst_mask */
1553 FALSE), /* pcrel_offset */
1554
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1559 16, /* bitsize */
1560 FALSE, /* pc_relative */
1561 0, /* bitpos */
1562 complain_overflow_dont, /* complain_on_overflow */
1563 ppc64_elf_unhandled_reloc, /* special_function */
1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
1565 FALSE, /* partial_inplace */
1566 0, /* src_mask */
1567 0xffff, /* dst_mask */
1568 FALSE), /* pcrel_offset */
1569
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1574 16, /* bitsize */
1575 FALSE, /* pc_relative */
1576 0, /* bitpos */
1577 complain_overflow_dont, /* complain_on_overflow */
1578 ppc64_elf_unhandled_reloc, /* special_function */
1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
1580 FALSE, /* partial_inplace */
1581 0, /* src_mask */
1582 0xffff, /* dst_mask */
1583 FALSE), /* pcrel_offset */
1584
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16,
1589 0, /* rightshift */
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1591 16, /* bitsize */
1592 FALSE, /* pc_relative */
1593 0, /* bitpos */
1594 complain_overflow_signed, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
1597 FALSE, /* partial_inplace */
1598 0, /* src_mask */
1599 0xffff, /* dst_mask */
1600 FALSE), /* pcrel_offset */
1601
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1604 0, /* rightshift */
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1606 16, /* bitsize */
1607 FALSE, /* pc_relative */
1608 0, /* bitpos */
1609 complain_overflow_dont, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
1612 FALSE, /* partial_inplace */
1613 0, /* src_mask */
1614 0xffff, /* dst_mask */
1615 FALSE), /* pcrel_offset */
1616
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1619 16, /* rightshift */
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1621 16, /* bitsize */
1622 FALSE, /* pc_relative */
1623 0, /* bitpos */
1624 complain_overflow_dont, /* complain_on_overflow */
1625 ppc64_elf_unhandled_reloc, /* special_function */
1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
1627 FALSE, /* partial_inplace */
1628 0, /* src_mask */
1629 0xffff, /* dst_mask */
1630 FALSE), /* pcrel_offset */
1631
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1634 16, /* rightshift */
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1636 16, /* bitsize */
1637 FALSE, /* pc_relative */
1638 0, /* bitpos */
1639 complain_overflow_dont, /* complain_on_overflow */
1640 ppc64_elf_unhandled_reloc, /* special_function */
1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
1642 FALSE, /* partial_inplace */
1643 0, /* src_mask */
1644 0xffff, /* dst_mask */
1645 FALSE), /* pcrel_offset */
1646
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1650 0, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
1655 complain_overflow_signed, /* complain_on_overflow */
1656 ppc64_elf_unhandled_reloc, /* special_function */
1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 0xfffc, /* dst_mask */
1661 FALSE), /* pcrel_offset */
1662
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1665 0, /* rightshift */
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
1675 0xfffc, /* dst_mask */
1676 FALSE), /* pcrel_offset */
1677
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1680 16, /* rightshift */
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc64_elf_unhandled_reloc, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0xffff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS,
1711 0, /* rightshift */
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1713 16, /* bitsize */
1714 FALSE, /* pc_relative */
1715 0, /* bitpos */
1716 complain_overflow_signed, /* complain_on_overflow */
1717 ppc64_elf_unhandled_reloc, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
1719 FALSE, /* partial_inplace */
1720 0, /* src_mask */
1721 0xffff, /* dst_mask */
1722 FALSE), /* pcrel_offset */
1723
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1726 0, /* rightshift */
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1728 16, /* bitsize */
1729 FALSE, /* pc_relative */
1730 0, /* bitpos */
1731 complain_overflow_dont, /* complain_on_overflow */
1732 ppc64_elf_unhandled_reloc, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1734 FALSE, /* partial_inplace */
1735 0, /* src_mask */
1736 0xffff, /* dst_mask */
1737 FALSE), /* pcrel_offset */
1738
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI,
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
1744 FALSE, /* pc_relative */
1745 0, /* bitpos */
1746 complain_overflow_dont, /* complain_on_overflow */
1747 ppc64_elf_unhandled_reloc, /* special_function */
1748 "R_PPC64_GOT_TPREL16_HI", /* name */
1749 FALSE, /* partial_inplace */
1750 0, /* src_mask */
1751 0xffff, /* dst_mask */
1752 FALSE), /* pcrel_offset */
1753
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA,
1756 16, /* rightshift */
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
1759 FALSE, /* pc_relative */
1760 0, /* bitpos */
1761 complain_overflow_dont, /* complain_on_overflow */
1762 ppc64_elf_unhandled_reloc, /* special_function */
1763 "R_PPC64_GOT_TPREL16_HA", /* name */
1764 FALSE, /* partial_inplace */
1765 0, /* src_mask */
1766 0xffff, /* dst_mask */
1767 FALSE), /* pcrel_offset */
1768
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1771 0, /* rightshift */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1773 0, /* bitsize */
1774 FALSE, /* pc_relative */
1775 0, /* bitpos */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 NULL, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
1779 FALSE, /* partial_inplace */
1780 0, /* src_mask */
1781 0, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1783
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
1789 FALSE, /* pc_relative */
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
1794 FALSE, /* partial_inplace */
1795 0, /* src_mask */
1796 0, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1798 };
1799
1800 \f
1801 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
1802 be done. */
1803
1804 static void
1805 ppc_howto_init ()
1806 {
1807 unsigned int i, type;
1808
1809 for (i = 0;
1810 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1811 i++)
1812 {
1813 type = ppc64_elf_howto_raw[i].type;
1814 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1815 / sizeof (ppc64_elf_howto_table[0])));
1816 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1817 }
1818 }
1819
1820 static reloc_howto_type *
1821 ppc64_elf_reloc_type_lookup (abfd, code)
1822 bfd *abfd ATTRIBUTE_UNUSED;
1823 bfd_reloc_code_real_type code;
1824 {
1825 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1826
1827 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1828 /* Initialize howto table if needed. */
1829 ppc_howto_init ();
1830
1831 switch ((int) code)
1832 {
1833 default:
1834 return (reloc_howto_type *) NULL;
1835
1836 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1837 break;
1838 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1839 break;
1840 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1841 break;
1842 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1843 break;
1844 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1845 break;
1846 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1847 break;
1848 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1849 break;
1850 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1851 break;
1852 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1853 break;
1854 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1855 break;
1856 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1857 break;
1858 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1859 break;
1860 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1861 break;
1862 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1863 break;
1864 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1865 break;
1866 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1867 break;
1868 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1869 break;
1870 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1871 break;
1872 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1873 break;
1874 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1875 break;
1876 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1877 break;
1878 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1879 break;
1880 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1881 break;
1882 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1883 break;
1884 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1885 break;
1886 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1887 break;
1888 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1889 break;
1890 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1891 break;
1892 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1893 break;
1894 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1895 break;
1896 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1897 break;
1898 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1899 break;
1900 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1901 break;
1902 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1903 break;
1904 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1905 break;
1906 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1907 break;
1908 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1909 break;
1910 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1911 break;
1912 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1913 break;
1914 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1915 break;
1916 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1917 break;
1918 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1919 break;
1920 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1921 break;
1922 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1923 break;
1924 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1925 break;
1926 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1927 break;
1928 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1929 break;
1930 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1931 break;
1932 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1933 break;
1934 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1935 break;
1936 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1937 break;
1938 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1939 break;
1940 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1941 break;
1942 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1943 break;
1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1945 break;
1946 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1947 break;
1948 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
1949 break;
1950 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
1951 break;
1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
1953 break;
1954 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
1955 break;
1956 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
1957 break;
1958 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
1959 break;
1960 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
1961 break;
1962 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
1963 break;
1964 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
1965 break;
1966 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
1967 break;
1968 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1969 break;
1970 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1971 break;
1972 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1973 break;
1974 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1975 break;
1976 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1977 break;
1978 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1979 break;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1981 break;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1983 break;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1985 break;
1986 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1987 break;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1989 break;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1991 break;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1993 break;
1994 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1995 break;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1997 break;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1999 break;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2001 break;
2002 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2003 break;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2005 break;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2007 break;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2009 break;
2010 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2011 break;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2013 break;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2015 break;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2017 break;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2019 break;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2021 break;
2022 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2023 break;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2025 break;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2027 break;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2029 break;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2031 break;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2033 break;
2034 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2035 break;
2036 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2037 break;
2038 }
2039
2040 return ppc64_elf_howto_table[(int) r];
2041 };
2042
2043 /* Set the howto pointer for a PowerPC ELF reloc. */
2044
2045 static void
2046 ppc64_elf_info_to_howto (abfd, cache_ptr, dst)
2047 bfd *abfd ATTRIBUTE_UNUSED;
2048 arelent *cache_ptr;
2049 Elf_Internal_Rela *dst;
2050 {
2051 unsigned int type;
2052
2053 /* Initialize howto table if needed. */
2054 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2055 ppc_howto_init ();
2056
2057 type = ELF64_R_TYPE (dst->r_info);
2058 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2059 / sizeof (ppc64_elf_howto_table[0])));
2060 cache_ptr->howto = ppc64_elf_howto_table[type];
2061 }
2062
2063 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2064
2065 static bfd_reloc_status_type
2066 ppc64_elf_ha_reloc (abfd, reloc_entry, symbol, data,
2067 input_section, output_bfd, error_message)
2068 bfd *abfd;
2069 arelent *reloc_entry;
2070 asymbol *symbol;
2071 PTR data;
2072 asection *input_section;
2073 bfd *output_bfd;
2074 char **error_message;
2075 {
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2078 link time. */
2079 if (output_bfd != NULL)
2080 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2081 input_section, output_bfd, error_message);
2082
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2085 doesn't matter. */
2086 reloc_entry->addend += 0x8000;
2087 return bfd_reloc_continue;
2088 }
2089
2090 static bfd_reloc_status_type
2091 ppc64_elf_brtaken_reloc (abfd, reloc_entry, symbol, data,
2092 input_section, output_bfd, error_message)
2093 bfd *abfd;
2094 arelent *reloc_entry;
2095 asymbol *symbol;
2096 PTR data;
2097 asection *input_section;
2098 bfd *output_bfd;
2099 char **error_message;
2100 {
2101 long insn;
2102 enum elf_ppc64_reloc_type r_type;
2103 bfd_size_type octets;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2105 bfd_boolean is_power4 = FALSE;
2106
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
2110 if (output_bfd != NULL)
2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2112 input_section, output_bfd, error_message);
2113
2114 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2115 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2116 insn &= ~(0x01 << 21);
2117 r_type = (enum elf_ppc64_reloc_type) reloc_entry->howto->type;
2118 if (r_type == R_PPC64_ADDR14_BRTAKEN
2119 || r_type == R_PPC64_REL14_BRTAKEN)
2120 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2121
2122 if (is_power4)
2123 {
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn & (0x14 << 21)) == (0x04 << 21))
2128 insn |= 0x02 << 21;
2129 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2130 insn |= 0x08 << 21;
2131 else
2132 return bfd_reloc_continue;
2133 }
2134 else
2135 {
2136 bfd_vma target = 0;
2137 bfd_vma from;
2138
2139 if (!bfd_is_com_section (symbol->section))
2140 target = symbol->value;
2141 target += symbol->section->output_section->vma;
2142 target += symbol->section->output_offset;
2143 target += reloc_entry->addend;
2144
2145 from = (reloc_entry->address
2146 + input_section->output_offset
2147 + input_section->output_section->vma);
2148
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma) (target - from) < 0)
2151 insn ^= 0x01 << 21;
2152 }
2153 bfd_put_32 (abfd, (bfd_vma) insn, (bfd_byte *) data + octets);
2154 return bfd_reloc_continue;
2155 }
2156
2157 static bfd_reloc_status_type
2158 ppc64_elf_sectoff_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message)
2160 bfd *abfd;
2161 arelent *reloc_entry;
2162 asymbol *symbol;
2163 PTR data;
2164 asection *input_section;
2165 bfd *output_bfd;
2166 char **error_message;
2167 {
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2170 link time. */
2171 if (output_bfd != NULL)
2172 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2173 input_section, output_bfd, error_message);
2174
2175 /* Subtract the symbol section base address. */
2176 reloc_entry->addend -= symbol->section->output_section->vma;
2177 return bfd_reloc_continue;
2178 }
2179
2180 static bfd_reloc_status_type
2181 ppc64_elf_sectoff_ha_reloc (abfd, reloc_entry, symbol, data,
2182 input_section, output_bfd, error_message)
2183 bfd *abfd;
2184 arelent *reloc_entry;
2185 asymbol *symbol;
2186 PTR data;
2187 asection *input_section;
2188 bfd *output_bfd;
2189 char **error_message;
2190 {
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2193 link time. */
2194 if (output_bfd != NULL)
2195 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2196 input_section, output_bfd, error_message);
2197
2198 /* Subtract the symbol section base address. */
2199 reloc_entry->addend -= symbol->section->output_section->vma;
2200
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry->addend += 0x8000;
2203 return bfd_reloc_continue;
2204 }
2205
2206 static bfd_reloc_status_type
2207 ppc64_elf_toc_reloc (abfd, reloc_entry, symbol, data,
2208 input_section, output_bfd, error_message)
2209 bfd *abfd;
2210 arelent *reloc_entry;
2211 asymbol *symbol;
2212 PTR data;
2213 asection *input_section;
2214 bfd *output_bfd;
2215 char **error_message;
2216 {
2217 bfd_vma TOCstart;
2218
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2221 link time. */
2222 if (output_bfd != NULL)
2223 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2224 input_section, output_bfd, error_message);
2225
2226 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2227 if (TOCstart == 0)
2228 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2229
2230 /* Subtract the TOC base address. */
2231 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2232 return bfd_reloc_continue;
2233 }
2234
2235 static bfd_reloc_status_type
2236 ppc64_elf_toc_ha_reloc (abfd, reloc_entry, symbol, data,
2237 input_section, output_bfd, error_message)
2238 bfd *abfd;
2239 arelent *reloc_entry;
2240 asymbol *symbol;
2241 PTR data;
2242 asection *input_section;
2243 bfd *output_bfd;
2244 char **error_message;
2245 {
2246 bfd_vma TOCstart;
2247
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2250 link time. */
2251 if (output_bfd != NULL)
2252 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2253 input_section, output_bfd, error_message);
2254
2255 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2256 if (TOCstart == 0)
2257 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2258
2259 /* Subtract the TOC base address. */
2260 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2261
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry->addend += 0x8000;
2264 return bfd_reloc_continue;
2265 }
2266
2267 static bfd_reloc_status_type
2268 ppc64_elf_toc64_reloc (abfd, reloc_entry, symbol, data,
2269 input_section, output_bfd, error_message)
2270 bfd *abfd;
2271 arelent *reloc_entry;
2272 asymbol *symbol;
2273 PTR data;
2274 asection *input_section;
2275 bfd *output_bfd;
2276 char **error_message;
2277 {
2278 bfd_vma TOCstart;
2279 bfd_size_type octets;
2280
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2283 link time. */
2284 if (output_bfd != NULL)
2285 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2286 input_section, output_bfd, error_message);
2287
2288 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2289 if (TOCstart == 0)
2290 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2291
2292 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2293 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2294 return bfd_reloc_ok;
2295 }
2296
2297 static bfd_reloc_status_type
2298 ppc64_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2299 input_section, output_bfd, error_message)
2300 bfd *abfd;
2301 arelent *reloc_entry;
2302 asymbol *symbol;
2303 PTR data;
2304 asection *input_section;
2305 bfd *output_bfd;
2306 char **error_message;
2307 {
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2310 link time. */
2311 if (output_bfd != NULL)
2312 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2313 input_section, output_bfd, error_message);
2314
2315 if (error_message != NULL)
2316 {
2317 static char buf[60];
2318 sprintf (buf, "generic linker can't handle %s",
2319 reloc_entry->howto->name);
2320 *error_message = buf;
2321 }
2322 return bfd_reloc_dangerous;
2323 }
2324
2325 /* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2327
2328 static bfd_boolean
2329 ppc64_elf_object_p (abfd)
2330 bfd *abfd;
2331 {
2332 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2333 {
2334 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2335
2336 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2337 {
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd->arch_info = abfd->arch_info->next;
2340 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2341 }
2342 }
2343 return TRUE;
2344 }
2345
2346 /* Merge backend specific data from an object file to the output
2347 object file when linking. */
2348
2349 static bfd_boolean
2350 ppc64_elf_merge_private_bfd_data (ibfd, obfd)
2351 bfd *ibfd;
2352 bfd *obfd;
2353 {
2354 /* Check if we have the same endianess. */
2355 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
2356 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
2357 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2358 {
2359 const char *msg;
2360
2361 if (bfd_big_endian (ibfd))
2362 msg = _("%s: compiled for a big endian system and target is little endian");
2363 else
2364 msg = _("%s: compiled for a little endian system and target is big endian");
2365
2366 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
2367
2368 bfd_set_error (bfd_error_wrong_format);
2369 return FALSE;
2370 }
2371
2372 return TRUE;
2373 }
2374
2375 struct _ppc64_elf_section_data
2376 {
2377 struct bfd_elf_section_data elf;
2378
2379 /* An array with one entry for each opd function descriptor. */
2380 union
2381 {
2382 /* Points to the function code section for local opd entries. */
2383 asection **func_sec;
2384 /* After editing .opd, adjust references to opd local syms. */
2385 long *adjust;
2386 } opd;
2387
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2390 unsigned *t_symndx;
2391 };
2392
2393 #define ppc64_elf_section_data(sec) \
2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2395
2396 static bfd_boolean
2397 ppc64_elf_new_section_hook (abfd, sec)
2398 bfd *abfd;
2399 asection *sec;
2400 {
2401 struct _ppc64_elf_section_data *sdata;
2402 bfd_size_type amt = sizeof (*sdata);
2403
2404 sdata = (struct _ppc64_elf_section_data *) bfd_zalloc (abfd, amt);
2405 if (sdata == NULL)
2406 return FALSE;
2407 sec->used_by_bfd = (PTR) sdata;
2408
2409 return _bfd_elf_new_section_hook (abfd, sec);
2410 }
2411 \f
2412 /* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
2418 called.
2419
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2423
2424 . .text
2425 . x:
2426 . bl .foo
2427 . nop
2428
2429 The function definition in another object file might be:
2430
2431 . .section .opd
2432 . foo: .quad .foo
2433 . .quad .TOC.@tocbase
2434 . .quad 0
2435 .
2436 . .text
2437 . .foo: blr
2438
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2444
2445 . x:
2446 . bl .foo_stub
2447 . ld 2,40(1)
2448 .
2449 .
2450 . .foo_stub:
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
2453 . std 2,40(1) # this is the general idea
2454 . ld 11,0(12)
2455 . ld 2,8(12)
2456 . mtctr 11
2457 . ld 11,16(12)
2458 . bctr
2459 .
2460 . .section .plt
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2462
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2465 copying.
2466
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
2478 definition from some other object, eg. a static library. */
2479
2480 /* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2485
2486 struct ppc_dyn_relocs
2487 {
2488 struct ppc_dyn_relocs *next;
2489
2490 /* The input section of the reloc. */
2491 asection *sec;
2492
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count;
2495
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count;
2498 };
2499
2500 /* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2502 struct got_entry
2503 {
2504 struct got_entry *next;
2505
2506 bfd_vma addend;
2507
2508 union
2509 {
2510 bfd_signed_vma refcount;
2511 bfd_vma offset;
2512 } got;
2513
2514 char tls_type;
2515 };
2516
2517 /* The same for PLT. */
2518 struct plt_entry
2519 {
2520 struct plt_entry *next;
2521
2522 bfd_vma addend;
2523
2524 union
2525 {
2526 bfd_signed_vma refcount;
2527 bfd_vma offset;
2528 } plt;
2529 };
2530
2531 /* Of those relocs that might be copied as dynamic relocs, this macro
2532 selects those that must be copied when linking a shared library. */
2533
2534 #define MUST_BE_DYN_RELOC(RTYPE) \
2535 ((RTYPE) != R_PPC64_REL32 \
2536 && (RTYPE) != R_PPC64_REL64 \
2537 && (RTYPE) != R_PPC64_REL30)
2538
2539 /* Section name for stubs is the associated section name plus this
2540 string. */
2541 #define STUB_SUFFIX ".stub"
2542
2543 /* Linker stubs.
2544 ppc_stub_long_branch:
2545 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2546 destination, but a 24 bit branch in a stub section will reach.
2547 . b dest
2548
2549 ppc_stub_plt_branch:
2550 Similar to the above, but a 24 bit branch in the stub section won't
2551 reach its destination.
2552 . addis %r12,%r2,xxx@toc@ha
2553 . ld %r11,xxx@toc@l(%r12)
2554 . mtctr %r11
2555 . bctr
2556
2557 ppc_stub_plt_call:
2558 Used to call a function in a shared library.
2559 . addis %r12,%r2,xxx@toc@ha
2560 . std %r2,40(%r1)
2561 . ld %r11,xxx+0@toc@l(%r12)
2562 . ld %r2,xxx+8@toc@l(%r12)
2563 . mtctr %r11
2564 . ld %r11,xxx+16@toc@l(%r12)
2565 . bctr
2566 */
2567
2568 enum ppc_stub_type {
2569 ppc_stub_none,
2570 ppc_stub_long_branch,
2571 ppc_stub_plt_branch,
2572 ppc_stub_plt_call
2573 };
2574
2575 struct ppc_stub_hash_entry {
2576
2577 /* Base hash table entry structure. */
2578 struct bfd_hash_entry root;
2579
2580 /* The stub section. */
2581 asection *stub_sec;
2582
2583 /* Offset within stub_sec of the beginning of this stub. */
2584 bfd_vma stub_offset;
2585
2586 /* Given the symbol's value and its section we can determine its final
2587 value when building the stubs (so the stub knows where to jump. */
2588 bfd_vma target_value;
2589 asection *target_section;
2590
2591 enum ppc_stub_type stub_type;
2592
2593 /* The symbol table entry, if any, that this was derived from. */
2594 struct ppc_link_hash_entry *h;
2595
2596 /* And the reloc addend that this was derived from. */
2597 bfd_vma addend;
2598
2599 /* Where this stub is being called from, or, in the case of combined
2600 stub sections, the first input section in the group. */
2601 asection *id_sec;
2602 };
2603
2604 struct ppc_branch_hash_entry {
2605
2606 /* Base hash table entry structure. */
2607 struct bfd_hash_entry root;
2608
2609 /* Offset within .branch_lt. */
2610 unsigned int offset;
2611
2612 /* Generation marker. */
2613 unsigned int iter;
2614 };
2615
2616 struct ppc_link_hash_entry
2617 {
2618 struct elf_link_hash_entry elf;
2619
2620 /* A pointer to the most recently used stub hash entry against this
2621 symbol. */
2622 struct ppc_stub_hash_entry *stub_cache;
2623
2624 /* Track dynamic relocs copied for this symbol. */
2625 struct ppc_dyn_relocs *dyn_relocs;
2626
2627 /* Link between function code and descriptor symbols. */
2628 struct elf_link_hash_entry *oh;
2629
2630 /* Flag function code and descriptor symbols. */
2631 unsigned int is_func:1;
2632 unsigned int is_func_descriptor:1;
2633 unsigned int is_entry:1;
2634
2635 /* Contexts in which symbol is used in the GOT (or TOC).
2636 Linker optimization will result in various transformations. */
2637 #define TLS_TLS 1 /* Any TLS reloc. */
2638 #define TLS_GD_LD 2 /* GD or LD reloc requiring 2 got slots. */
2639 #define TLS_LD 4 /* LD reloc. */
2640 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
2641 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2642 #define TLS_EXPLICIT 32 /* Marks TOC section relocs. */
2643 char tls_type;
2644 };
2645
2646 /* ppc64 ELF linker hash table. */
2647
2648 struct ppc_link_hash_table
2649 {
2650 struct elf_link_hash_table elf;
2651
2652 /* The stub hash table. */
2653 struct bfd_hash_table stub_hash_table;
2654
2655 /* Another hash table for plt_branch stubs. */
2656 struct bfd_hash_table branch_hash_table;
2657
2658 /* Linker stub bfd. */
2659 bfd *stub_bfd;
2660
2661 /* Linker call-backs. */
2662 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2663 void (*layout_sections_again) PARAMS ((void));
2664
2665 /* Array to keep track of which stub sections have been created, and
2666 information on stub grouping. */
2667 struct map_stub {
2668 /* This is the section to which stubs in the group will be attached. */
2669 asection *link_sec;
2670 /* The stub section. */
2671 asection *stub_sec;
2672 } *stub_group;
2673
2674 /* Assorted information used by ppc64_elf_size_stubs. */
2675 int top_index;
2676 asection **input_list;
2677
2678 /* Short-cuts to get to dynamic linker sections. */
2679 asection *sgot;
2680 asection *srelgot;
2681 asection *splt;
2682 asection *srelplt;
2683 asection *sdynbss;
2684 asection *srelbss;
2685 asection *sglink;
2686 asection *sfpr;
2687 asection *sbrlt;
2688 asection *srelbrlt;
2689
2690 /* Short-cut to first output tls section. */
2691 asection *tls_sec;
2692
2693 /* Shortcut to .__tls_get_addr. */
2694 struct elf_link_hash_entry *tls_get_addr;
2695
2696 /* TLS local dynamic got entry handling. */
2697 union {
2698 bfd_signed_vma refcount;
2699 bfd_vma offset;
2700 } tlsld_got;
2701
2702 /* Set on error. */
2703 unsigned int stub_error;
2704
2705 /* Flag set when small branches are detected. Used to
2706 select suitable defaults for the stub group size. */
2707 unsigned int has_14bit_branch;
2708
2709 /* Set if we detect a reference undefined weak symbol. */
2710 unsigned int have_undefweak;
2711
2712 /* Incremented every time we size stubs. */
2713 unsigned int stub_iteration;
2714
2715 /* Small local sym to section mapping cache. */
2716 struct sym_sec_cache sym_sec;
2717 };
2718
2719 static struct bfd_hash_entry *stub_hash_newfunc
2720 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2721 static struct bfd_hash_entry *branch_hash_newfunc
2722 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2723 static struct bfd_hash_entry *link_hash_newfunc
2724 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2725 static struct bfd_link_hash_table *ppc64_elf_link_hash_table_create
2726 PARAMS ((bfd *));
2727 static void ppc64_elf_link_hash_table_free
2728 PARAMS ((struct bfd_link_hash_table *));
2729 static char *ppc_stub_name
2730 PARAMS ((const asection *, const asection *,
2731 const struct ppc_link_hash_entry *, const Elf_Internal_Rela *));
2732 static struct ppc_stub_hash_entry *ppc_get_stub_entry
2733 PARAMS ((const asection *, const asection *, struct elf_link_hash_entry *,
2734 const Elf_Internal_Rela *, struct ppc_link_hash_table *));
2735 static struct ppc_stub_hash_entry *ppc_add_stub
2736 PARAMS ((const char *, asection *, struct ppc_link_hash_table *));
2737 static bfd_boolean create_linkage_sections
2738 PARAMS ((bfd *, struct bfd_link_info *));
2739 static bfd_boolean create_got_section
2740 PARAMS ((bfd *, struct bfd_link_info *));
2741 static bfd_boolean ppc64_elf_create_dynamic_sections
2742 PARAMS ((bfd *, struct bfd_link_info *));
2743 static void ppc64_elf_copy_indirect_symbol
2744 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
2745 struct elf_link_hash_entry *));
2746 static bfd_boolean update_local_sym_info
2747 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, bfd_vma, int));
2748 static bfd_boolean update_plt_info
2749 PARAMS ((bfd *, struct ppc_link_hash_entry *, bfd_vma));
2750 static bfd_boolean ppc64_elf_check_relocs
2751 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2752 const Elf_Internal_Rela *));
2753 static asection * ppc64_elf_gc_mark_hook
2754 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
2755 struct elf_link_hash_entry *, Elf_Internal_Sym *));
2756 static bfd_boolean ppc64_elf_gc_sweep_hook
2757 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2758 const Elf_Internal_Rela *));
2759 static bfd_boolean func_desc_adjust
2760 PARAMS ((struct elf_link_hash_entry *, PTR));
2761 static bfd_boolean ppc64_elf_func_desc_adjust
2762 PARAMS ((bfd *, struct bfd_link_info *));
2763 static bfd_boolean ppc64_elf_adjust_dynamic_symbol
2764 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
2765 static void ppc64_elf_hide_symbol
2766 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
2767 static bfd_boolean get_sym_h
2768 PARAMS ((struct elf_link_hash_entry **, Elf_Internal_Sym **, asection **,
2769 char **, Elf_Internal_Sym **, unsigned long, bfd *));
2770 static bfd_boolean get_tls_type
2771 PARAMS ((char **, Elf_Internal_Sym **, const Elf_Internal_Rela *, bfd *));
2772 static bfd_boolean allocate_dynrelocs
2773 PARAMS ((struct elf_link_hash_entry *, PTR));
2774 static bfd_boolean readonly_dynrelocs
2775 PARAMS ((struct elf_link_hash_entry *, PTR));
2776 static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2777 PARAMS ((const Elf_Internal_Rela *));
2778 static bfd_boolean ppc64_elf_size_dynamic_sections
2779 PARAMS ((bfd *, struct bfd_link_info *));
2780 static enum ppc_stub_type ppc_type_of_stub
2781 PARAMS ((asection *, const Elf_Internal_Rela *,
2782 struct ppc_link_hash_entry **, bfd_vma));
2783 static bfd_byte *build_plt_stub
2784 PARAMS ((bfd *, bfd_byte *, int, int));
2785 static bfd_boolean ppc_build_one_stub
2786 PARAMS ((struct bfd_hash_entry *, PTR));
2787 static bfd_boolean ppc_size_one_stub
2788 PARAMS ((struct bfd_hash_entry *, PTR));
2789 static void group_sections
2790 PARAMS ((struct ppc_link_hash_table *, bfd_size_type, bfd_boolean));
2791 static bfd_boolean ppc64_elf_relocate_section
2792 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
2793 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
2794 asection **));
2795 static bfd_boolean ppc64_elf_finish_dynamic_symbol
2796 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
2797 Elf_Internal_Sym *));
2798 static bfd_boolean ppc64_elf_finish_dynamic_sections
2799 PARAMS ((bfd *, struct bfd_link_info *));
2800
2801 /* Get the ppc64 ELF linker hash table from a link_info structure. */
2802
2803 #define ppc_hash_table(p) \
2804 ((struct ppc_link_hash_table *) ((p)->hash))
2805
2806 #define ppc_stub_hash_lookup(table, string, create, copy) \
2807 ((struct ppc_stub_hash_entry *) \
2808 bfd_hash_lookup ((table), (string), (create), (copy)))
2809
2810 #define ppc_branch_hash_lookup(table, string, create, copy) \
2811 ((struct ppc_branch_hash_entry *) \
2812 bfd_hash_lookup ((table), (string), (create), (copy)))
2813
2814 /* Create an entry in the stub hash table. */
2815
2816 static struct bfd_hash_entry *
2817 stub_hash_newfunc (entry, table, string)
2818 struct bfd_hash_entry *entry;
2819 struct bfd_hash_table *table;
2820 const char *string;
2821 {
2822 /* Allocate the structure if it has not already been allocated by a
2823 subclass. */
2824 if (entry == NULL)
2825 {
2826 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2827 if (entry == NULL)
2828 return entry;
2829 }
2830
2831 /* Call the allocation method of the superclass. */
2832 entry = bfd_hash_newfunc (entry, table, string);
2833 if (entry != NULL)
2834 {
2835 struct ppc_stub_hash_entry *eh;
2836
2837 /* Initialize the local fields. */
2838 eh = (struct ppc_stub_hash_entry *) entry;
2839 eh->stub_sec = NULL;
2840 eh->stub_offset = 0;
2841 eh->target_value = 0;
2842 eh->target_section = NULL;
2843 eh->stub_type = ppc_stub_none;
2844 eh->h = NULL;
2845 eh->id_sec = NULL;
2846 }
2847
2848 return entry;
2849 }
2850
2851 /* Create an entry in the branch hash table. */
2852
2853 static struct bfd_hash_entry *
2854 branch_hash_newfunc (entry, table, string)
2855 struct bfd_hash_entry *entry;
2856 struct bfd_hash_table *table;
2857 const char *string;
2858 {
2859 /* Allocate the structure if it has not already been allocated by a
2860 subclass. */
2861 if (entry == NULL)
2862 {
2863 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2864 if (entry == NULL)
2865 return entry;
2866 }
2867
2868 /* Call the allocation method of the superclass. */
2869 entry = bfd_hash_newfunc (entry, table, string);
2870 if (entry != NULL)
2871 {
2872 struct ppc_branch_hash_entry *eh;
2873
2874 /* Initialize the local fields. */
2875 eh = (struct ppc_branch_hash_entry *) entry;
2876 eh->offset = 0;
2877 eh->iter = 0;
2878 }
2879
2880 return entry;
2881 }
2882
2883 /* Create an entry in a ppc64 ELF linker hash table. */
2884
2885 static struct bfd_hash_entry *
2886 link_hash_newfunc (entry, table, string)
2887 struct bfd_hash_entry *entry;
2888 struct bfd_hash_table *table;
2889 const char *string;
2890 {
2891 /* Allocate the structure if it has not already been allocated by a
2892 subclass. */
2893 if (entry == NULL)
2894 {
2895 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2896 if (entry == NULL)
2897 return entry;
2898 }
2899
2900 /* Call the allocation method of the superclass. */
2901 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2902 if (entry != NULL)
2903 {
2904 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2905
2906 eh->stub_cache = NULL;
2907 eh->dyn_relocs = NULL;
2908 eh->oh = NULL;
2909 eh->is_func = 0;
2910 eh->is_func_descriptor = 0;
2911 eh->is_entry = 0;
2912 eh->tls_type = 0;
2913 }
2914
2915 return entry;
2916 }
2917
2918 /* Create a ppc64 ELF linker hash table. */
2919
2920 static struct bfd_link_hash_table *
2921 ppc64_elf_link_hash_table_create (abfd)
2922 bfd *abfd;
2923 {
2924 struct ppc_link_hash_table *htab;
2925 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
2926
2927 htab = (struct ppc_link_hash_table *) bfd_malloc (amt);
2928 if (htab == NULL)
2929 return NULL;
2930
2931 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
2932 {
2933 free (htab);
2934 return NULL;
2935 }
2936
2937 /* Init the stub hash table too. */
2938 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
2939 return NULL;
2940
2941 /* And the branch hash table. */
2942 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
2943 return NULL;
2944
2945 htab->stub_bfd = NULL;
2946 htab->add_stub_section = NULL;
2947 htab->layout_sections_again = NULL;
2948 htab->stub_group = NULL;
2949 htab->sgot = NULL;
2950 htab->srelgot = NULL;
2951 htab->splt = NULL;
2952 htab->srelplt = NULL;
2953 htab->sdynbss = NULL;
2954 htab->srelbss = NULL;
2955 htab->sglink = NULL;
2956 htab->sfpr = NULL;
2957 htab->sbrlt = NULL;
2958 htab->srelbrlt = NULL;
2959 htab->tls_sec = NULL;
2960 htab->tlsld_got.refcount = 0;
2961 htab->stub_error = 0;
2962 htab->has_14bit_branch = 0;
2963 htab->have_undefweak = 0;
2964 htab->stub_iteration = 0;
2965 htab->sym_sec.abfd = NULL;
2966 htab->elf.init_refcount.glist = NULL;
2967 htab->elf.init_offset.glist = NULL;
2968
2969 return &htab->elf.root;
2970 }
2971
2972 /* Free the derived linker hash table. */
2973
2974 static void
2975 ppc64_elf_link_hash_table_free (hash)
2976 struct bfd_link_hash_table *hash;
2977 {
2978 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
2979
2980 bfd_hash_table_free (&ret->stub_hash_table);
2981 bfd_hash_table_free (&ret->branch_hash_table);
2982 _bfd_generic_link_hash_table_free (hash);
2983 }
2984
2985 /* Build a name for an entry in the stub hash table. */
2986
2987 static char *
2988 ppc_stub_name (input_section, sym_sec, h, rel)
2989 const asection *input_section;
2990 const asection *sym_sec;
2991 const struct ppc_link_hash_entry *h;
2992 const Elf_Internal_Rela *rel;
2993 {
2994 char *stub_name;
2995 bfd_size_type len;
2996
2997 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
2998 offsets from a sym as a branch target? In fact, we could
2999 probably assume the addend is always zero. */
3000 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3001
3002 if (h)
3003 {
3004 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3005 stub_name = bfd_malloc (len);
3006 if (stub_name != NULL)
3007 {
3008 sprintf (stub_name, "%08x_%s+%x",
3009 input_section->id & 0xffffffff,
3010 h->elf.root.root.string,
3011 (int) rel->r_addend & 0xffffffff);
3012 }
3013 }
3014 else
3015 {
3016 len = 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3017 stub_name = bfd_malloc (len);
3018 if (stub_name != NULL)
3019 {
3020 sprintf (stub_name, "%08x_%x:%x+%x",
3021 input_section->id & 0xffffffff,
3022 sym_sec->id & 0xffffffff,
3023 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3024 (int) rel->r_addend & 0xffffffff);
3025 }
3026 }
3027 return stub_name;
3028 }
3029
3030 /* Look up an entry in the stub hash. Stub entries are cached because
3031 creating the stub name takes a bit of time. */
3032
3033 static struct ppc_stub_hash_entry *
3034 ppc_get_stub_entry (input_section, sym_sec, hash, rel, htab)
3035 const asection *input_section;
3036 const asection *sym_sec;
3037 struct elf_link_hash_entry *hash;
3038 const Elf_Internal_Rela *rel;
3039 struct ppc_link_hash_table *htab;
3040 {
3041 struct ppc_stub_hash_entry *stub_entry;
3042 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3043 const asection *id_sec;
3044
3045 /* If this input section is part of a group of sections sharing one
3046 stub section, then use the id of the first section in the group.
3047 Stub names need to include a section id, as there may well be
3048 more than one stub used to reach say, printf, and we need to
3049 distinguish between them. */
3050 id_sec = htab->stub_group[input_section->id].link_sec;
3051
3052 if (h != NULL && h->stub_cache != NULL
3053 && h->stub_cache->h == h
3054 && h->stub_cache->id_sec == id_sec)
3055 {
3056 stub_entry = h->stub_cache;
3057 }
3058 else
3059 {
3060 char *stub_name;
3061
3062 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3063 if (stub_name == NULL)
3064 return NULL;
3065
3066 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3067 stub_name, FALSE, FALSE);
3068 if (h != NULL)
3069 h->stub_cache = stub_entry;
3070
3071 free (stub_name);
3072 }
3073
3074 return stub_entry;
3075 }
3076
3077 /* Add a new stub entry to the stub hash. Not all fields of the new
3078 stub entry are initialised. */
3079
3080 static struct ppc_stub_hash_entry *
3081 ppc_add_stub (stub_name, section, htab)
3082 const char *stub_name;
3083 asection *section;
3084 struct ppc_link_hash_table *htab;
3085 {
3086 asection *link_sec;
3087 asection *stub_sec;
3088 struct ppc_stub_hash_entry *stub_entry;
3089
3090 link_sec = htab->stub_group[section->id].link_sec;
3091 stub_sec = htab->stub_group[section->id].stub_sec;
3092 if (stub_sec == NULL)
3093 {
3094 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3095 if (stub_sec == NULL)
3096 {
3097 size_t namelen;
3098 bfd_size_type len;
3099 char *s_name;
3100
3101 namelen = strlen (link_sec->name);
3102 len = namelen + sizeof (STUB_SUFFIX);
3103 s_name = bfd_alloc (htab->stub_bfd, len);
3104 if (s_name == NULL)
3105 return NULL;
3106
3107 memcpy (s_name, link_sec->name, namelen);
3108 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3109 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3110 if (stub_sec == NULL)
3111 return NULL;
3112 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3113 }
3114 htab->stub_group[section->id].stub_sec = stub_sec;
3115 }
3116
3117 /* Enter this entry into the linker stub hash table. */
3118 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3119 TRUE, FALSE);
3120 if (stub_entry == NULL)
3121 {
3122 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3123 bfd_archive_filename (section->owner),
3124 stub_name);
3125 return NULL;
3126 }
3127
3128 stub_entry->stub_sec = stub_sec;
3129 stub_entry->stub_offset = 0;
3130 stub_entry->id_sec = link_sec;
3131 return stub_entry;
3132 }
3133
3134 /* Create sections for linker generated code. */
3135
3136 static bfd_boolean
3137 create_linkage_sections (dynobj, info)
3138 bfd *dynobj;
3139 struct bfd_link_info *info;
3140 {
3141 struct ppc_link_hash_table *htab;
3142 flagword flags;
3143
3144 htab = ppc_hash_table (info);
3145
3146 /* Create .sfpr for code to save and restore fp regs. */
3147 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3148 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3149 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
3150 if (htab->sfpr == NULL
3151 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3152 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
3153 return FALSE;
3154
3155 /* Create .glink for lazy dynamic linking support. */
3156 htab->sglink = bfd_make_section_anyway (dynobj, ".glink");
3157 if (htab->sglink == NULL
3158 || ! bfd_set_section_flags (dynobj, htab->sglink, flags)
3159 || ! bfd_set_section_alignment (dynobj, htab->sglink, 2))
3160 return FALSE;
3161
3162 /* Create .branch_lt for plt_branch stubs. */
3163 flags = (SEC_ALLOC | SEC_LOAD
3164 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3165 htab->sbrlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3166 if (htab->sbrlt == NULL
3167 || ! bfd_set_section_flags (dynobj, htab->sbrlt, flags)
3168 || ! bfd_set_section_alignment (dynobj, htab->sbrlt, 3))
3169 return FALSE;
3170
3171 if (info->shared)
3172 {
3173 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3174 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3175 htab->srelbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
3176 if (!htab->srelbrlt
3177 || ! bfd_set_section_flags (dynobj, htab->srelbrlt, flags)
3178 || ! bfd_set_section_alignment (dynobj, htab->srelbrlt, 3))
3179 return FALSE;
3180 }
3181 return TRUE;
3182 }
3183
3184 /* Create .got and .rela.got sections in DYNOBJ, and set up
3185 shortcuts to them in our hash table. */
3186
3187 static bfd_boolean
3188 create_got_section (dynobj, info)
3189 bfd *dynobj;
3190 struct bfd_link_info *info;
3191 {
3192 struct ppc_link_hash_table *htab;
3193
3194 if (! _bfd_elf_create_got_section (dynobj, info))
3195 return FALSE;
3196
3197 htab = ppc_hash_table (info);
3198 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3199 if (!htab->sgot)
3200 abort ();
3201
3202 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3203 if (!htab->srelgot
3204 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3205 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3206 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3207 | SEC_READONLY))
3208 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
3209 return FALSE;
3210 return TRUE;
3211 }
3212
3213 /* Create the dynamic sections, and set up shortcuts. */
3214
3215 static bfd_boolean
3216 ppc64_elf_create_dynamic_sections (dynobj, info)
3217 bfd *dynobj;
3218 struct bfd_link_info *info;
3219 {
3220 struct ppc_link_hash_table *htab;
3221
3222 htab = ppc_hash_table (info);
3223 if (!htab->sgot && !create_got_section (dynobj, info))
3224 return FALSE;
3225
3226 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
3227 return FALSE;
3228
3229 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
3230 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3231 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3232 if (!info->shared)
3233 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3234
3235 if (!htab->splt || !htab->srelplt || !htab->sdynbss
3236 || (!info->shared && !htab->srelbss))
3237 abort ();
3238
3239 return TRUE;
3240 }
3241
3242 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3243
3244 static void
3245 ppc64_elf_copy_indirect_symbol (bed, dir, ind)
3246 struct elf_backend_data *bed ATTRIBUTE_UNUSED;
3247 struct elf_link_hash_entry *dir, *ind;
3248 {
3249 struct ppc_link_hash_entry *edir, *eind;
3250
3251 edir = (struct ppc_link_hash_entry *) dir;
3252 eind = (struct ppc_link_hash_entry *) ind;
3253
3254 /* Copy over any dynamic relocs we may have on the indirect sym. */
3255 if (eind->dyn_relocs != NULL)
3256 {
3257 if (edir->dyn_relocs != NULL)
3258 {
3259 struct ppc_dyn_relocs **pp;
3260 struct ppc_dyn_relocs *p;
3261
3262 if (eind->elf.root.type == bfd_link_hash_indirect)
3263 abort ();
3264
3265 /* Add reloc counts against the weak sym to the strong sym
3266 list. Merge any entries against the same section. */
3267 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3268 {
3269 struct ppc_dyn_relocs *q;
3270
3271 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3272 if (q->sec == p->sec)
3273 {
3274 q->pc_count += p->pc_count;
3275 q->count += p->count;
3276 *pp = p->next;
3277 break;
3278 }
3279 if (q == NULL)
3280 pp = &p->next;
3281 }
3282 *pp = edir->dyn_relocs;
3283 }
3284
3285 edir->dyn_relocs = eind->dyn_relocs;
3286 eind->dyn_relocs = NULL;
3287 }
3288
3289 /* Do the same for got entries. */
3290 if (eind->elf.got.glist != NULL)
3291 {
3292 if (edir->elf.got.glist != NULL)
3293 {
3294 struct got_entry **entp;
3295 struct got_entry *ent;
3296
3297 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3298 {
3299 struct got_entry *dent;
3300
3301 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3302 if (dent->addend == ent->addend
3303 && dent->tls_type == ent->tls_type)
3304 {
3305 dent->got.refcount += ent->got.refcount;
3306 *entp = ent->next;
3307 break;
3308 }
3309 if (dent == NULL)
3310 entp = &ent->next;
3311 }
3312 *entp = edir->elf.got.glist;
3313 }
3314
3315 edir->elf.got.glist = eind->elf.got.glist;
3316 eind->elf.got.glist = NULL;
3317 }
3318
3319 /* And plt entries. */
3320 if (eind->elf.plt.plist != NULL)
3321 {
3322 if (edir->elf.plt.plist != NULL)
3323 {
3324 struct plt_entry **entp;
3325 struct plt_entry *ent;
3326
3327 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3328 {
3329 struct plt_entry *dent;
3330
3331 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3332 if (dent->addend == ent->addend)
3333 {
3334 dent->plt.refcount += ent->plt.refcount;
3335 *entp = ent->next;
3336 break;
3337 }
3338 if (dent == NULL)
3339 entp = &ent->next;
3340 }
3341 *entp = edir->elf.plt.plist;
3342 }
3343
3344 edir->elf.plt.plist = eind->elf.plt.plist;
3345 eind->elf.plt.plist = NULL;
3346 }
3347
3348 edir->is_func |= eind->is_func;
3349 edir->is_func_descriptor |= eind->is_func_descriptor;
3350 edir->is_entry |= eind->is_entry;
3351
3352 /* Copy down any references that we may have already seen to the
3353 symbol which just became indirect. */
3354 edir->elf.elf_link_hash_flags |=
3355 (eind->elf.elf_link_hash_flags
3356 & (ELF_LINK_HASH_REF_DYNAMIC
3357 | ELF_LINK_HASH_REF_REGULAR
3358 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3359 | ELF_LINK_NON_GOT_REF));
3360
3361 if (eind->elf.root.type != bfd_link_hash_indirect)
3362 return;
3363
3364 if (edir->elf.dynindx == -1)
3365 {
3366 edir->elf.dynindx = eind->elf.dynindx;
3367 edir->elf.dynstr_index = eind->elf.dynstr_index;
3368 eind->elf.dynindx = -1;
3369 eind->elf.dynstr_index = 0;
3370 }
3371 else
3372 BFD_ASSERT (eind->elf.dynindx == -1);
3373 }
3374
3375 /* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3376 symbols undefined on the command-line. */
3377
3378 bfd_boolean
3379 ppc64_elf_mark_entry_syms (info)
3380 struct bfd_link_info *info;
3381 {
3382 struct ppc_link_hash_table *htab;
3383 struct bfd_sym_chain *sym;
3384
3385 htab = ppc_hash_table (info);
3386 for (sym = info->gc_sym_list; sym; sym = sym->next)
3387 {
3388 struct elf_link_hash_entry *h;
3389
3390 h = elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
3391 if (h != NULL)
3392 ((struct ppc_link_hash_entry *) h)->is_entry = 1;
3393 }
3394 return TRUE;
3395 }
3396
3397 static bfd_boolean
3398 update_local_sym_info (abfd, symtab_hdr, r_symndx, r_addend, tls_type)
3399 bfd *abfd;
3400 Elf_Internal_Shdr *symtab_hdr;
3401 unsigned long r_symndx;
3402 bfd_vma r_addend;
3403 int tls_type;
3404 {
3405 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
3406 char *local_got_tls_types;
3407
3408 if (local_got_ents == NULL)
3409 {
3410 bfd_size_type size = symtab_hdr->sh_info;
3411
3412 size *= sizeof (*local_got_ents) + sizeof (char);
3413 local_got_ents = (struct got_entry **) bfd_zalloc (abfd, size);
3414 if (local_got_ents == NULL)
3415 return FALSE;
3416 elf_local_got_ents (abfd) = local_got_ents;
3417 }
3418
3419 if ((tls_type & TLS_EXPLICIT) == 0)
3420 {
3421 struct got_entry *ent;
3422
3423 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3424 if (ent->addend == r_addend && ent->tls_type == tls_type)
3425 break;
3426 if (ent == NULL)
3427 {
3428 bfd_size_type amt = sizeof (*ent);
3429 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3430 if (ent == NULL)
3431 return FALSE;
3432 ent->next = local_got_ents[r_symndx];
3433 ent->addend = r_addend;
3434 ent->tls_type = tls_type;
3435 ent->got.refcount = 0;
3436 local_got_ents[r_symndx] = ent;
3437 }
3438 ent->got.refcount += 1;
3439 }
3440
3441 local_got_tls_types = (char *) (local_got_ents + symtab_hdr->sh_info);
3442 local_got_tls_types[r_symndx] |= tls_type;
3443 return TRUE;
3444 }
3445
3446 static bfd_boolean
3447 update_plt_info (abfd, eh, addend)
3448 bfd *abfd;
3449 struct ppc_link_hash_entry *eh;
3450 bfd_vma addend;
3451 {
3452 struct plt_entry *ent;
3453
3454 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3455 if (ent->addend == addend)
3456 break;
3457 if (ent == NULL)
3458 {
3459 bfd_size_type amt = sizeof (*ent);
3460 ent = (struct plt_entry *) bfd_alloc (abfd, amt);
3461 if (ent == NULL)
3462 return FALSE;
3463 ent->next = eh->elf.plt.plist;
3464 ent->addend = addend;
3465 ent->plt.refcount = 0;
3466 eh->elf.plt.plist = ent;
3467 }
3468 ent->plt.refcount += 1;
3469 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3470 eh->is_func = 1;
3471 return TRUE;
3472 }
3473
3474 /* Look through the relocs for a section during the first phase, and
3475 calculate needed space in the global offset table, procedure
3476 linkage table, and dynamic reloc sections. */
3477
3478 static bfd_boolean
3479 ppc64_elf_check_relocs (abfd, info, sec, relocs)
3480 bfd *abfd;
3481 struct bfd_link_info *info;
3482 asection *sec;
3483 const Elf_Internal_Rela *relocs;
3484 {
3485 struct ppc_link_hash_table *htab;
3486 Elf_Internal_Shdr *symtab_hdr;
3487 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3488 const Elf_Internal_Rela *rel;
3489 const Elf_Internal_Rela *rel_end;
3490 asection *sreloc;
3491 asection **opd_sym_map;
3492
3493 if (info->relocateable)
3494 return TRUE;
3495
3496 htab = ppc_hash_table (info);
3497 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3498
3499 sym_hashes = elf_sym_hashes (abfd);
3500 sym_hashes_end = (sym_hashes
3501 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3502 - symtab_hdr->sh_info);
3503
3504 sreloc = NULL;
3505 opd_sym_map = NULL;
3506 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3507 {
3508 /* Garbage collection needs some extra help with .opd sections.
3509 We don't want to necessarily keep everything referenced by
3510 relocs in .opd, as that would keep all functions. Instead,
3511 if we reference an .opd symbol (a function descriptor), we
3512 want to keep the function code symbol's section. This is
3513 easy for global symbols, but for local syms we need to keep
3514 information about the associated function section. Later, if
3515 edit_opd deletes entries, we'll use this array to adjust
3516 local syms in .opd. */
3517 union opd_info {
3518 asection *func_section;
3519 long entry_adjust;
3520 };
3521 bfd_size_type amt;
3522
3523 amt = sec->_raw_size * sizeof (union opd_info) / 24;
3524 opd_sym_map = (asection **) bfd_zalloc (abfd, amt);
3525 if (opd_sym_map == NULL)
3526 return FALSE;
3527 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
3528 }
3529
3530 if (htab->elf.dynobj == NULL)
3531 htab->elf.dynobj = abfd;
3532 if (htab->sfpr == NULL
3533 && !create_linkage_sections (htab->elf.dynobj, info))
3534 return FALSE;
3535
3536 rel_end = relocs + sec->reloc_count;
3537 for (rel = relocs; rel < rel_end; rel++)
3538 {
3539 unsigned long r_symndx;
3540 struct elf_link_hash_entry *h;
3541 enum elf_ppc64_reloc_type r_type;
3542 int tls_type = 0;
3543
3544 r_symndx = ELF64_R_SYM (rel->r_info);
3545 if (r_symndx < symtab_hdr->sh_info)
3546 h = NULL;
3547 else
3548 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3549
3550 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
3551 switch (r_type)
3552 {
3553 case R_PPC64_GOT_TLSLD16:
3554 case R_PPC64_GOT_TLSLD16_LO:
3555 case R_PPC64_GOT_TLSLD16_HI:
3556 case R_PPC64_GOT_TLSLD16_HA:
3557 htab->tlsld_got.refcount += 1;
3558 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
3559 goto dogottls;
3560
3561 case R_PPC64_GOT_TLSGD16:
3562 case R_PPC64_GOT_TLSGD16_LO:
3563 case R_PPC64_GOT_TLSGD16_HI:
3564 case R_PPC64_GOT_TLSGD16_HA:
3565 tls_type = TLS_TLS | TLS_GD_LD;
3566 goto dogottls;
3567
3568 case R_PPC64_GOT_TPREL16_DS:
3569 case R_PPC64_GOT_TPREL16_LO_DS:
3570 case R_PPC64_GOT_TPREL16_HI:
3571 case R_PPC64_GOT_TPREL16_HA:
3572 if (info->shared)
3573 info->flags |= DF_STATIC_TLS;
3574 tls_type = TLS_TLS | TLS_TPREL;
3575 goto dogottls;
3576
3577 case R_PPC64_GOT_DTPREL16_DS:
3578 case R_PPC64_GOT_DTPREL16_LO_DS:
3579 case R_PPC64_GOT_DTPREL16_HI:
3580 case R_PPC64_GOT_DTPREL16_HA:
3581 tls_type = TLS_TLS | TLS_DTPREL;
3582 dogottls:
3583 sec->has_tls_reloc = 1;
3584 /* Fall thru */
3585
3586 case R_PPC64_GOT16:
3587 case R_PPC64_GOT16_DS:
3588 case R_PPC64_GOT16_HA:
3589 case R_PPC64_GOT16_HI:
3590 case R_PPC64_GOT16_LO:
3591 case R_PPC64_GOT16_LO_DS:
3592 /* This symbol requires a global offset table entry. */
3593 if (htab->sgot == NULL
3594 && !create_got_section (htab->elf.dynobj, info))
3595 return FALSE;
3596
3597 if (h != NULL)
3598 {
3599 struct ppc_link_hash_entry *eh;
3600 struct got_entry *ent;
3601
3602 eh = (struct ppc_link_hash_entry *) h;
3603 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3604 if (ent->addend == rel->r_addend
3605 && ent->tls_type == tls_type)
3606 break;
3607 if (ent == NULL)
3608 {
3609 bfd_size_type amt = sizeof (*ent);
3610 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3611 if (ent == NULL)
3612 return FALSE;
3613 ent->next = eh->elf.got.glist;
3614 ent->addend = rel->r_addend;
3615 ent->tls_type = tls_type;
3616 ent->got.refcount = 0;
3617 eh->elf.got.glist = ent;
3618 }
3619 ent->got.refcount += 1;
3620 eh->tls_type |= tls_type;
3621 }
3622 else
3623 /* This is a global offset table entry for a local symbol. */
3624 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3625 rel->r_addend, tls_type))
3626 return FALSE;
3627 break;
3628
3629 case R_PPC64_PLT16_HA:
3630 case R_PPC64_PLT16_HI:
3631 case R_PPC64_PLT16_LO:
3632 case R_PPC64_PLT32:
3633 case R_PPC64_PLT64:
3634 /* This symbol requires a procedure linkage table entry. We
3635 actually build the entry in adjust_dynamic_symbol,
3636 because this might be a case of linking PIC code without
3637 linking in any dynamic objects, in which case we don't
3638 need to generate a procedure linkage table after all. */
3639 if (h == NULL)
3640 {
3641 /* It does not make sense to have a procedure linkage
3642 table entry for a local symbol. */
3643 bfd_set_error (bfd_error_bad_value);
3644 return FALSE;
3645 }
3646 else
3647 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3648 rel->r_addend))
3649 return FALSE;
3650 break;
3651
3652 /* The following relocations don't need to propagate the
3653 relocation if linking a shared object since they are
3654 section relative. */
3655 case R_PPC64_SECTOFF:
3656 case R_PPC64_SECTOFF_LO:
3657 case R_PPC64_SECTOFF_HI:
3658 case R_PPC64_SECTOFF_HA:
3659 case R_PPC64_SECTOFF_DS:
3660 case R_PPC64_SECTOFF_LO_DS:
3661 case R_PPC64_TOC16:
3662 case R_PPC64_TOC16_LO:
3663 case R_PPC64_TOC16_HI:
3664 case R_PPC64_TOC16_HA:
3665 case R_PPC64_TOC16_DS:
3666 case R_PPC64_TOC16_LO_DS:
3667 case R_PPC64_DTPREL16:
3668 case R_PPC64_DTPREL16_LO:
3669 case R_PPC64_DTPREL16_HI:
3670 case R_PPC64_DTPREL16_HA:
3671 case R_PPC64_DTPREL16_DS:
3672 case R_PPC64_DTPREL16_LO_DS:
3673 case R_PPC64_DTPREL16_HIGHER:
3674 case R_PPC64_DTPREL16_HIGHERA:
3675 case R_PPC64_DTPREL16_HIGHEST:
3676 case R_PPC64_DTPREL16_HIGHESTA:
3677 break;
3678
3679 /* This relocation describes the C++ object vtable hierarchy.
3680 Reconstruct it for later use during GC. */
3681 case R_PPC64_GNU_VTINHERIT:
3682 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3683 return FALSE;
3684 break;
3685
3686 /* This relocation describes which C++ vtable entries are actually
3687 used. Record for later use during GC. */
3688 case R_PPC64_GNU_VTENTRY:
3689 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3690 return FALSE;
3691 break;
3692
3693 case R_PPC64_REL14:
3694 case R_PPC64_REL14_BRTAKEN:
3695 case R_PPC64_REL14_BRNTAKEN:
3696 htab->has_14bit_branch = 1;
3697 /* Fall through. */
3698
3699 case R_PPC64_REL24:
3700 if (h != NULL
3701 && h->root.root.string[0] == '.'
3702 && h->root.root.string[1] != 0)
3703 {
3704 /* We may need a .plt entry if the function this reloc
3705 refers to is in a shared lib. */
3706 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3707 rel->r_addend))
3708 return FALSE;
3709 if (h == htab->tls_get_addr)
3710 sec->has_tls_reloc = 1;
3711 else if (strcmp (h->root.root.string, ".__tls_get_addr") == 0)
3712 {
3713 htab->tls_get_addr = h;
3714 sec->has_tls_reloc = 1;
3715 }
3716 }
3717 break;
3718
3719 case R_PPC64_TPREL64:
3720 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3721 if (info->shared)
3722 info->flags |= DF_STATIC_TLS;
3723 goto dotlstoc;
3724
3725 case R_PPC64_DTPMOD64:
3726 if (rel + 1 < rel_end
3727 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3728 && rel[1].r_offset == rel->r_offset + 8)
3729 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD_LD;
3730 else
3731 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD_LD | TLS_LD;
3732 goto dotlstoc;
3733
3734 case R_PPC64_DTPREL64:
3735 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3736 if (rel != relocs
3737 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3738 && rel[-1].r_offset == rel->r_offset - 8)
3739 /* This is the second reloc of a dtpmod, dtprel pair.
3740 Don't mark with TLS_DTPREL. */
3741 goto dodyn;
3742
3743 dotlstoc:
3744 sec->has_tls_reloc = 1;
3745 if (h != NULL)
3746 {
3747 struct ppc_link_hash_entry *eh;
3748 eh = (struct ppc_link_hash_entry *) h;
3749 eh->tls_type |= tls_type;
3750 }
3751 else
3752 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3753 rel->r_addend, tls_type))
3754 return FALSE;
3755
3756 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3757 {
3758 bfd_size_type amt = sec->_raw_size * sizeof (unsigned) / 8;
3759 ppc64_elf_section_data (sec)->t_symndx
3760 = (unsigned *) bfd_zalloc (abfd, amt);
3761 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3762 return FALSE;
3763 }
3764 BFD_ASSERT (rel->r_offset % 8 == 0);
3765 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
3766 goto dodyn;
3767
3768 case R_PPC64_TPREL16:
3769 case R_PPC64_TPREL16_LO:
3770 case R_PPC64_TPREL16_HI:
3771 case R_PPC64_TPREL16_HA:
3772 case R_PPC64_TPREL16_DS:
3773 case R_PPC64_TPREL16_LO_DS:
3774 case R_PPC64_TPREL16_HIGHER:
3775 case R_PPC64_TPREL16_HIGHERA:
3776 case R_PPC64_TPREL16_HIGHEST:
3777 case R_PPC64_TPREL16_HIGHESTA:
3778 if (info->shared)
3779 {
3780 info->flags |= DF_STATIC_TLS;
3781 goto dodyn;
3782 }
3783 break;
3784
3785 case R_PPC64_ADDR64:
3786 if (opd_sym_map != NULL
3787 && h != NULL
3788 && h->root.root.string[0] == '.'
3789 && h->root.root.string[1] != 0)
3790 {
3791 struct elf_link_hash_entry *fdh;
3792
3793 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
3794 FALSE, FALSE, FALSE);
3795 if (fdh != NULL)
3796 {
3797 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
3798 ((struct ppc_link_hash_entry *) fdh)->oh = h;
3799 ((struct ppc_link_hash_entry *) h)->is_func = 1;
3800 ((struct ppc_link_hash_entry *) h)->oh = fdh;
3801 }
3802 }
3803 if (opd_sym_map != NULL
3804 && h == NULL
3805 && rel + 1 < rel_end
3806 && ((enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info)
3807 == R_PPC64_TOC))
3808 {
3809 asection *s;
3810
3811 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3812 r_symndx);
3813 if (s == NULL)
3814 return FALSE;
3815 else if (s != sec)
3816 opd_sym_map[rel->r_offset / 24] = s;
3817 }
3818 /* Fall through. */
3819
3820 case R_PPC64_REL30:
3821 case R_PPC64_REL32:
3822 case R_PPC64_REL64:
3823 case R_PPC64_ADDR14:
3824 case R_PPC64_ADDR14_BRNTAKEN:
3825 case R_PPC64_ADDR14_BRTAKEN:
3826 case R_PPC64_ADDR16:
3827 case R_PPC64_ADDR16_DS:
3828 case R_PPC64_ADDR16_HA:
3829 case R_PPC64_ADDR16_HI:
3830 case R_PPC64_ADDR16_HIGHER:
3831 case R_PPC64_ADDR16_HIGHERA:
3832 case R_PPC64_ADDR16_HIGHEST:
3833 case R_PPC64_ADDR16_HIGHESTA:
3834 case R_PPC64_ADDR16_LO:
3835 case R_PPC64_ADDR16_LO_DS:
3836 case R_PPC64_ADDR24:
3837 case R_PPC64_ADDR32:
3838 case R_PPC64_UADDR16:
3839 case R_PPC64_UADDR32:
3840 case R_PPC64_UADDR64:
3841 case R_PPC64_TOC:
3842 /* Don't propagate .opd relocs. */
3843 if (NO_OPD_RELOCS && opd_sym_map != NULL)
3844 break;
3845
3846 /* If we are creating a shared library, and this is a reloc
3847 against a global symbol, or a non PC relative reloc
3848 against a local symbol, then we need to copy the reloc
3849 into the shared library. However, if we are linking with
3850 -Bsymbolic, we do not need to copy a reloc against a
3851 global symbol which is defined in an object we are
3852 including in the link (i.e., DEF_REGULAR is set). At
3853 this point we have not seen all the input files, so it is
3854 possible that DEF_REGULAR is not set now but will be set
3855 later (it is never cleared). In case of a weak definition,
3856 DEF_REGULAR may be cleared later by a strong definition in
3857 a shared library. We account for that possibility below by
3858 storing information in the relocs_copied field of the hash
3859 table entry. A similar situation occurs when creating
3860 shared libraries and symbol visibility changes render the
3861 symbol local.
3862
3863 If on the other hand, we are creating an executable, we
3864 may need to keep relocations for symbols satisfied by a
3865 dynamic library if we manage to avoid copy relocs for the
3866 symbol. */
3867 dodyn:
3868 if ((info->shared
3869 && (sec->flags & SEC_ALLOC) != 0
3870 && (MUST_BE_DYN_RELOC (r_type)
3871 || (h != NULL
3872 && (! info->symbolic
3873 || h->root.type == bfd_link_hash_defweak
3874 || (h->elf_link_hash_flags
3875 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3876 || (!info->shared
3877 && (sec->flags & SEC_ALLOC) != 0
3878 && h != NULL
3879 && (h->root.type == bfd_link_hash_defweak
3880 || (h->elf_link_hash_flags
3881 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
3882 {
3883 struct ppc_dyn_relocs *p;
3884 struct ppc_dyn_relocs **head;
3885
3886 /* We must copy these reloc types into the output file.
3887 Create a reloc section in dynobj and make room for
3888 this reloc. */
3889 if (sreloc == NULL)
3890 {
3891 const char *name;
3892 bfd *dynobj;
3893
3894 name = (bfd_elf_string_from_elf_section
3895 (abfd,
3896 elf_elfheader (abfd)->e_shstrndx,
3897 elf_section_data (sec)->rel_hdr.sh_name));
3898 if (name == NULL)
3899 return FALSE;
3900
3901 if (strncmp (name, ".rela", 5) != 0
3902 || strcmp (bfd_get_section_name (abfd, sec),
3903 name + 5) != 0)
3904 {
3905 (*_bfd_error_handler)
3906 (_("%s: bad relocation section name `%s\'"),
3907 bfd_archive_filename (abfd), name);
3908 bfd_set_error (bfd_error_bad_value);
3909 }
3910
3911 dynobj = htab->elf.dynobj;
3912 sreloc = bfd_get_section_by_name (dynobj, name);
3913 if (sreloc == NULL)
3914 {
3915 flagword flags;
3916
3917 sreloc = bfd_make_section (dynobj, name);
3918 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3919 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3920 if ((sec->flags & SEC_ALLOC) != 0)
3921 flags |= SEC_ALLOC | SEC_LOAD;
3922 if (sreloc == NULL
3923 || ! bfd_set_section_flags (dynobj, sreloc, flags)
3924 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
3925 return FALSE;
3926 }
3927 elf_section_data (sec)->sreloc = sreloc;
3928 }
3929
3930 /* If this is a global symbol, we count the number of
3931 relocations we need for this symbol. */
3932 if (h != NULL)
3933 {
3934 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
3935 }
3936 else
3937 {
3938 /* Track dynamic relocs needed for local syms too.
3939 We really need local syms available to do this
3940 easily. Oh well. */
3941
3942 asection *s;
3943 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3944 sec, r_symndx);
3945 if (s == NULL)
3946 return FALSE;
3947
3948 head = ((struct ppc_dyn_relocs **)
3949 &elf_section_data (s)->local_dynrel);
3950 }
3951
3952 p = *head;
3953 if (p == NULL || p->sec != sec)
3954 {
3955 p = ((struct ppc_dyn_relocs *)
3956 bfd_alloc (htab->elf.dynobj,
3957 (bfd_size_type) sizeof *p));
3958 if (p == NULL)
3959 return FALSE;
3960 p->next = *head;
3961 *head = p;
3962 p->sec = sec;
3963 p->count = 0;
3964 p->pc_count = 0;
3965 }
3966
3967 p->count += 1;
3968 if (!MUST_BE_DYN_RELOC (r_type))
3969 p->pc_count += 1;
3970 }
3971 break;
3972
3973 default:
3974 break;
3975 }
3976 }
3977
3978 return TRUE;
3979 }
3980
3981 /* Return the section that should be marked against GC for a given
3982 relocation. */
3983
3984 static asection *
3985 ppc64_elf_gc_mark_hook (sec, info, rel, h, sym)
3986 asection *sec;
3987 struct bfd_link_info *info ATTRIBUTE_UNUSED;
3988 Elf_Internal_Rela *rel;
3989 struct elf_link_hash_entry *h;
3990 Elf_Internal_Sym *sym;
3991 {
3992 asection *rsec = NULL;
3993
3994 if (h != NULL)
3995 {
3996 enum elf_ppc64_reloc_type r_type;
3997 struct ppc_link_hash_entry *fdh;
3998
3999 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4000 switch (r_type)
4001 {
4002 case R_PPC64_GNU_VTINHERIT:
4003 case R_PPC64_GNU_VTENTRY:
4004 break;
4005
4006 default:
4007 switch (h->root.type)
4008 {
4009 case bfd_link_hash_defined:
4010 case bfd_link_hash_defweak:
4011 fdh = (struct ppc_link_hash_entry *) h;
4012
4013 /* Function descriptor syms cause the associated
4014 function code sym section to be marked. */
4015 if (fdh->is_func_descriptor)
4016 rsec = fdh->oh->root.u.def.section;
4017
4018 /* Function entry syms return NULL if they are in .opd
4019 and are not ._start (or others undefined on the ld
4020 command line). Thus we avoid marking all function
4021 sections, as all functions are referenced in .opd. */
4022 else if ((fdh->oh != NULL
4023 && ((struct ppc_link_hash_entry *) fdh->oh)->is_entry)
4024 || ppc64_elf_section_data (sec)->opd.func_sec == NULL)
4025 rsec = h->root.u.def.section;
4026 break;
4027
4028 case bfd_link_hash_common:
4029 rsec = h->root.u.c.p->section;
4030 break;
4031
4032 default:
4033 break;
4034 }
4035 }
4036 }
4037 else
4038 {
4039 asection **opd_sym_section;
4040
4041 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
4042 opd_sym_section = ppc64_elf_section_data (rsec)->opd.func_sec;
4043 if (opd_sym_section != NULL)
4044 rsec = opd_sym_section[sym->st_value / 24];
4045 else if (ppc64_elf_section_data (sec)->opd.func_sec != NULL)
4046 rsec = NULL;
4047 }
4048
4049 return rsec;
4050 }
4051
4052 /* Update the .got, .plt. and dynamic reloc reference counts for the
4053 section being removed. */
4054
4055 static bfd_boolean
4056 ppc64_elf_gc_sweep_hook (abfd, info, sec, relocs)
4057 bfd *abfd;
4058 struct bfd_link_info *info;
4059 asection *sec;
4060 const Elf_Internal_Rela *relocs;
4061 {
4062 struct ppc_link_hash_table *htab;
4063 Elf_Internal_Shdr *symtab_hdr;
4064 struct elf_link_hash_entry **sym_hashes;
4065 struct got_entry **local_got_ents;
4066 const Elf_Internal_Rela *rel, *relend;
4067
4068 elf_section_data (sec)->local_dynrel = NULL;
4069
4070 htab = ppc_hash_table (info);
4071 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4072 sym_hashes = elf_sym_hashes (abfd);
4073 local_got_ents = elf_local_got_ents (abfd);
4074
4075 relend = relocs + sec->reloc_count;
4076 for (rel = relocs; rel < relend; rel++)
4077 {
4078 unsigned long r_symndx;
4079 enum elf_ppc64_reloc_type r_type;
4080 struct elf_link_hash_entry *h;
4081 char tls_type = 0;
4082
4083 r_symndx = ELF64_R_SYM (rel->r_info);
4084 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4085 switch (r_type)
4086 {
4087 case R_PPC64_GOT_TLSLD16:
4088 case R_PPC64_GOT_TLSLD16_LO:
4089 case R_PPC64_GOT_TLSLD16_HI:
4090 case R_PPC64_GOT_TLSLD16_HA:
4091 htab->tlsld_got.refcount -= 1;
4092 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
4093 goto dogot;
4094
4095 case R_PPC64_GOT_TLSGD16:
4096 case R_PPC64_GOT_TLSGD16_LO:
4097 case R_PPC64_GOT_TLSGD16_HI:
4098 case R_PPC64_GOT_TLSGD16_HA:
4099 tls_type = TLS_TLS | TLS_GD_LD;
4100 goto dogot;
4101
4102 case R_PPC64_GOT_TPREL16_DS:
4103 case R_PPC64_GOT_TPREL16_LO_DS:
4104 case R_PPC64_GOT_TPREL16_HI:
4105 case R_PPC64_GOT_TPREL16_HA:
4106 tls_type = TLS_TLS | TLS_TPREL;
4107 goto dogot;
4108
4109 case R_PPC64_GOT_DTPREL16_DS:
4110 case R_PPC64_GOT_DTPREL16_LO_DS:
4111 case R_PPC64_GOT_DTPREL16_HI:
4112 case R_PPC64_GOT_DTPREL16_HA:
4113 tls_type = TLS_TLS | TLS_DTPREL;
4114 goto dogot;
4115
4116 case R_PPC64_GOT16:
4117 case R_PPC64_GOT16_DS:
4118 case R_PPC64_GOT16_HA:
4119 case R_PPC64_GOT16_HI:
4120 case R_PPC64_GOT16_LO:
4121 case R_PPC64_GOT16_LO_DS:
4122 dogot:
4123 {
4124 struct got_entry *ent;
4125
4126 if (r_symndx >= symtab_hdr->sh_info)
4127 {
4128 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4129 ent = h->got.glist;
4130 }
4131 else
4132 ent = local_got_ents[r_symndx];
4133
4134 for (; ent != NULL; ent = ent->next)
4135 if (ent->addend == rel->r_addend
4136 && ent->tls_type == tls_type)
4137 break;
4138 if (ent == NULL)
4139 abort ();
4140 if (ent->got.refcount > 0)
4141 ent->got.refcount -= 1;
4142 }
4143 break;
4144
4145 case R_PPC64_PLT16_HA:
4146 case R_PPC64_PLT16_HI:
4147 case R_PPC64_PLT16_LO:
4148 case R_PPC64_PLT32:
4149 case R_PPC64_PLT64:
4150 case R_PPC64_REL14:
4151 case R_PPC64_REL14_BRNTAKEN:
4152 case R_PPC64_REL14_BRTAKEN:
4153 case R_PPC64_REL24:
4154 if (r_symndx >= symtab_hdr->sh_info)
4155 {
4156 struct plt_entry *ent;
4157
4158 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4159 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4160 if (ent->addend == rel->r_addend)
4161 break;
4162 if (ent == NULL)
4163 abort ();
4164 if (ent->plt.refcount > 0)
4165 ent->plt.refcount -= 1;
4166 }
4167 break;
4168
4169 case R_PPC64_REL30:
4170 case R_PPC64_REL32:
4171 case R_PPC64_REL64:
4172 if (r_symndx >= symtab_hdr->sh_info)
4173 {
4174 struct ppc_link_hash_entry *eh;
4175 struct ppc_dyn_relocs **pp;
4176 struct ppc_dyn_relocs *p;
4177
4178 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4179 eh = (struct ppc_link_hash_entry *) h;
4180
4181 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4182 if (p->sec == sec)
4183 {
4184 p->pc_count -= 1;
4185 p->count -= 1;
4186 if (p->count == 0)
4187 *pp = p->next;
4188 break;
4189 }
4190 }
4191 break;
4192
4193 case R_PPC64_DTPMOD64:
4194 case R_PPC64_DTPREL64:
4195 case R_PPC64_TPREL64:
4196 case R_PPC64_ADDR14:
4197 case R_PPC64_ADDR14_BRNTAKEN:
4198 case R_PPC64_ADDR14_BRTAKEN:
4199 case R_PPC64_ADDR16:
4200 case R_PPC64_ADDR16_DS:
4201 case R_PPC64_ADDR16_HA:
4202 case R_PPC64_ADDR16_HI:
4203 case R_PPC64_ADDR16_HIGHER:
4204 case R_PPC64_ADDR16_HIGHERA:
4205 case R_PPC64_ADDR16_HIGHEST:
4206 case R_PPC64_ADDR16_HIGHESTA:
4207 case R_PPC64_ADDR16_LO:
4208 case R_PPC64_ADDR16_LO_DS:
4209 case R_PPC64_ADDR24:
4210 case R_PPC64_ADDR32:
4211 case R_PPC64_ADDR64:
4212 case R_PPC64_UADDR16:
4213 case R_PPC64_UADDR32:
4214 case R_PPC64_UADDR64:
4215 case R_PPC64_TOC:
4216 if (r_symndx >= symtab_hdr->sh_info)
4217 {
4218 struct ppc_link_hash_entry *eh;
4219 struct ppc_dyn_relocs **pp;
4220 struct ppc_dyn_relocs *p;
4221
4222 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4223 eh = (struct ppc_link_hash_entry *) h;
4224
4225 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4226 if (p->sec == sec)
4227 {
4228 p->count -= 1;
4229 if (p->count == 0)
4230 *pp = p->next;
4231 break;
4232 }
4233 }
4234 break;
4235
4236 default:
4237 break;
4238 }
4239 }
4240 return TRUE;
4241 }
4242
4243 /* Called via elf_link_hash_traverse to transfer dynamic linking
4244 information on function code symbol entries to their corresponding
4245 function descriptor symbol entries. */
4246 static bfd_boolean
4247 func_desc_adjust (h, inf)
4248 struct elf_link_hash_entry *h;
4249 PTR inf;
4250 {
4251 struct bfd_link_info *info;
4252 struct ppc_link_hash_table *htab;
4253 struct plt_entry *ent;
4254
4255 if (h->root.type == bfd_link_hash_indirect)
4256 return TRUE;
4257
4258 if (h->root.type == bfd_link_hash_warning)
4259 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4260
4261 info = (struct bfd_link_info *) inf;
4262 htab = ppc_hash_table (info);
4263
4264 /* If this is a function code symbol, transfer dynamic linking
4265 information to the function descriptor symbol. */
4266 if (!((struct ppc_link_hash_entry *) h)->is_func)
4267 return TRUE;
4268
4269 if (h->root.type == bfd_link_hash_undefweak
4270 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR))
4271 htab->have_undefweak = TRUE;
4272
4273 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4274 if (ent->plt.refcount > 0)
4275 break;
4276 if (ent != NULL
4277 && h->root.root.string[0] == '.'
4278 && h->root.root.string[1] != '\0')
4279 {
4280 struct elf_link_hash_entry *fdh = ((struct ppc_link_hash_entry *) h)->oh;
4281 bfd_boolean force_local;
4282
4283 /* Find the corresponding function descriptor symbol. Create it
4284 as undefined if necessary. */
4285
4286 if (fdh == NULL)
4287 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
4288 FALSE, FALSE, TRUE);
4289
4290 if (fdh == NULL
4291 && info->shared
4292 && (h->root.type == bfd_link_hash_undefined
4293 || h->root.type == bfd_link_hash_undefweak))
4294 {
4295 bfd *abfd;
4296 asymbol *newsym;
4297 struct bfd_link_hash_entry *bh;
4298
4299 abfd = h->root.u.undef.abfd;
4300 newsym = bfd_make_empty_symbol (abfd);
4301 newsym->name = h->root.root.string + 1;
4302 newsym->section = bfd_und_section_ptr;
4303 newsym->value = 0;
4304 newsym->flags = BSF_OBJECT;
4305 if (h->root.type == bfd_link_hash_undefweak)
4306 newsym->flags |= BSF_WEAK;
4307
4308 bh = &fdh->root;
4309 if ( !(_bfd_generic_link_add_one_symbol
4310 (info, abfd, newsym->name, newsym->flags,
4311 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
4312 {
4313 return FALSE;
4314 }
4315 fdh = (struct elf_link_hash_entry *) bh;
4316 fdh->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
4317 }
4318
4319 if (fdh != NULL
4320 && (fdh->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4321 && (info->shared
4322 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4323 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
4324 {
4325 if (fdh->dynindx == -1)
4326 if (! bfd_elf64_link_record_dynamic_symbol (info, fdh))
4327 return FALSE;
4328 fdh->elf_link_hash_flags |= (h->elf_link_hash_flags
4329 & (ELF_LINK_HASH_REF_REGULAR
4330 | ELF_LINK_HASH_REF_DYNAMIC
4331 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4332 | ELF_LINK_NON_GOT_REF));
4333 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4334 {
4335 fdh->plt.plist = h->plt.plist;
4336 fdh->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4337 }
4338 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
4339 ((struct ppc_link_hash_entry *) fdh)->oh = h;
4340 ((struct ppc_link_hash_entry *) h)->oh = fdh;
4341 }
4342
4343 /* Now that the info is on the function descriptor, clear the
4344 function code sym info. Any function code syms for which we
4345 don't have a definition in a regular file, we force local.
4346 This prevents a shared library from exporting syms that have
4347 been imported from another library. Function code syms that
4348 are really in the library we must leave global to prevent the
4349 linker dragging in a definition from a static library. */
4350 force_local = (info->shared
4351 && ((h->elf_link_hash_flags
4352 & ELF_LINK_HASH_DEF_REGULAR) == 0
4353 || fdh == NULL
4354 || (fdh->elf_link_hash_flags
4355 & ELF_LINK_HASH_DEF_REGULAR) == 0
4356 || (fdh->elf_link_hash_flags
4357 & ELF_LINK_FORCED_LOCAL) != 0));
4358 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4359 }
4360
4361 return TRUE;
4362 }
4363
4364 #define MIN_SAVE_FPR 14
4365 #define MAX_SAVE_FPR 31
4366
4367 /* Called near the start of bfd_elf_size_dynamic_sections. We use
4368 this hook to a) provide some gcc support functions, and b) transfer
4369 dynamic linking information gathered so far on function code symbol
4370 entries, to their corresponding function descriptor symbol entries. */
4371 static bfd_boolean
4372 ppc64_elf_func_desc_adjust (obfd, info)
4373 bfd *obfd ATTRIBUTE_UNUSED;
4374 struct bfd_link_info *info;
4375 {
4376 struct ppc_link_hash_table *htab;
4377 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4378 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4379 unsigned int i;
4380 struct elf_link_hash_entry *h;
4381 bfd_byte *p;
4382 char sym[10];
4383
4384 htab = ppc_hash_table (info);
4385
4386 if (htab->sfpr == NULL)
4387 /* We don't have any relocs. */
4388 return TRUE;
4389
4390 /* First provide any missing ._savef* and ._restf* functions. */
4391 memcpy (sym, "._savef14", 10);
4392 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4393 {
4394 sym[7] = i / 10 + '0';
4395 sym[8] = i % 10 + '0';
4396 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4397 if (h != NULL
4398 && h->root.type == bfd_link_hash_undefined)
4399 {
4400 if (lowest_savef > i)
4401 lowest_savef = i;
4402 h->root.type = bfd_link_hash_defined;
4403 h->root.u.def.section = htab->sfpr;
4404 h->root.u.def.value = (i - lowest_savef) * 4;
4405 h->type = STT_FUNC;
4406 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4407 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4408 }
4409 }
4410
4411 memcpy (sym, "._restf14", 10);
4412 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4413 {
4414 sym[7] = i / 10 + '0';
4415 sym[8] = i % 10 + '0';
4416 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4417 if (h != NULL
4418 && h->root.type == bfd_link_hash_undefined)
4419 {
4420 if (lowest_restf > i)
4421 lowest_restf = i;
4422 h->root.type = bfd_link_hash_defined;
4423 h->root.u.def.section = htab->sfpr;
4424 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4425 + (i - lowest_restf) * 4);
4426 h->type = STT_FUNC;
4427 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4428 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4429 }
4430 }
4431
4432 elf_link_hash_traverse (&htab->elf, func_desc_adjust, (PTR) info);
4433
4434 htab->sfpr->_raw_size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4435 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4436
4437 if (htab->sfpr->_raw_size == 0)
4438 {
4439 if (!htab->have_undefweak)
4440 {
4441 _bfd_strip_section_from_output (info, htab->sfpr);
4442 return TRUE;
4443 }
4444
4445 htab->sfpr->_raw_size = 4;
4446 }
4447
4448 p = (bfd_byte *) bfd_alloc (htab->elf.dynobj, htab->sfpr->_raw_size);
4449 if (p == NULL)
4450 return FALSE;
4451 htab->sfpr->contents = p;
4452
4453 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4454 {
4455 unsigned int fpr = i << 21;
4456 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4457 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4458 p += 4;
4459 }
4460 if (lowest_savef <= MAX_SAVE_FPR)
4461 {
4462 bfd_put_32 (htab->elf.dynobj, BLR, p);
4463 p += 4;
4464 }
4465
4466 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4467 {
4468 unsigned int fpr = i << 21;
4469 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4470 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
4471 p += 4;
4472 }
4473 if (lowest_restf <= MAX_SAVE_FPR
4474 || htab->sfpr->_raw_size == 4)
4475 {
4476 bfd_put_32 (htab->elf.dynobj, BLR, p);
4477 }
4478
4479 return TRUE;
4480 }
4481
4482 /* Adjust a symbol defined by a dynamic object and referenced by a
4483 regular object. The current definition is in some section of the
4484 dynamic object, but we're not including those sections. We have to
4485 change the definition to something the rest of the link can
4486 understand. */
4487
4488 static bfd_boolean
4489 ppc64_elf_adjust_dynamic_symbol (info, h)
4490 struct bfd_link_info *info;
4491 struct elf_link_hash_entry *h;
4492 {
4493 struct ppc_link_hash_table *htab;
4494 struct ppc_link_hash_entry * eh;
4495 struct ppc_dyn_relocs *p;
4496 asection *s;
4497 unsigned int power_of_two;
4498
4499 htab = ppc_hash_table (info);
4500
4501 /* Deal with function syms. */
4502 if (h->type == STT_FUNC
4503 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4504 {
4505 /* Clear procedure linkage table information for any symbol that
4506 won't need a .plt entry. */
4507 struct plt_entry *ent;
4508 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4509 if (ent->plt.refcount > 0)
4510 break;
4511 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
4512 || ent == NULL
4513 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
4514 || (! info->shared
4515 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4516 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0))
4517 {
4518 h->plt.plist = NULL;
4519 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4520 }
4521 return TRUE;
4522 }
4523 else
4524 h->plt.plist = NULL;
4525
4526 /* If this is a weak symbol, and there is a real definition, the
4527 processor independent code will have arranged for us to see the
4528 real definition first, and we can just use the same value. */
4529 if (h->weakdef != NULL)
4530 {
4531 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4532 || h->weakdef->root.type == bfd_link_hash_defweak);
4533 h->root.u.def.section = h->weakdef->root.u.def.section;
4534 h->root.u.def.value = h->weakdef->root.u.def.value;
4535 return TRUE;
4536 }
4537
4538 /* This is a reference to a symbol defined by a dynamic object which
4539 is not a function. */
4540
4541 /* If we are creating a shared library, we must presume that the
4542 only references to the symbol are via the global offset table.
4543 For such cases we need not do anything here; the relocations will
4544 be handled correctly by relocate_section. */
4545 if (info->shared)
4546 return TRUE;
4547
4548 /* If there are no references to this symbol that do not use the
4549 GOT, we don't need to generate a copy reloc. */
4550 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
4551 return TRUE;
4552
4553 eh = (struct ppc_link_hash_entry *) h;
4554 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4555 {
4556 s = p->sec->output_section;
4557 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4558 break;
4559 }
4560
4561 /* If we didn't find any dynamic relocs in read-only sections, then
4562 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4563 if (p == NULL)
4564 {
4565 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
4566 return TRUE;
4567 }
4568
4569 /* We must allocate the symbol in our .dynbss section, which will
4570 become part of the .bss section of the executable. There will be
4571 an entry for this symbol in the .dynsym section. The dynamic
4572 object will contain position independent code, so all references
4573 from the dynamic object to this symbol will go through the global
4574 offset table. The dynamic linker will use the .dynsym entry to
4575 determine the address it must put in the global offset table, so
4576 both the dynamic object and the regular object will refer to the
4577 same memory location for the variable. */
4578
4579 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4580 to copy the initial value out of the dynamic object and into the
4581 runtime process image. We need to remember the offset into the
4582 .rela.bss section we are going to use. */
4583 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4584 {
4585 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
4586 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4587 }
4588
4589 /* We need to figure out the alignment required for this symbol. I
4590 have no idea how ELF linkers handle this. */
4591 power_of_two = bfd_log2 (h->size);
4592 if (power_of_two > 4)
4593 power_of_two = 4;
4594
4595 /* Apply the required alignment. */
4596 s = htab->sdynbss;
4597 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4598 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
4599 {
4600 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
4601 return FALSE;
4602 }
4603
4604 /* Define the symbol as being at this point in the section. */
4605 h->root.u.def.section = s;
4606 h->root.u.def.value = s->_raw_size;
4607
4608 /* Increment the section size to make room for the symbol. */
4609 s->_raw_size += h->size;
4610
4611 return TRUE;
4612 }
4613
4614 /* If given a function descriptor symbol, hide both the function code
4615 sym and the descriptor. */
4616 static void
4617 ppc64_elf_hide_symbol (info, h, force_local)
4618 struct bfd_link_info *info;
4619 struct elf_link_hash_entry *h;
4620 bfd_boolean force_local;
4621 {
4622 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4623
4624 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
4625 {
4626 struct elf_link_hash_entry *fh = ((struct ppc_link_hash_entry *) h)->oh;
4627
4628 if (fh == NULL)
4629 {
4630 const char *p, *q;
4631 struct ppc_link_hash_table *htab;
4632 char save;
4633
4634 /* We aren't supposed to use alloca in BFD because on
4635 systems which do not have alloca the version in libiberty
4636 calls xmalloc, which might cause the program to crash
4637 when it runs out of memory. This function doesn't have a
4638 return status, so there's no way to gracefully return an
4639 error. So cheat. We know that string[-1] can be safely
4640 dereferenced; It's either a string in an ELF string
4641 table, or allocated in an objalloc structure. */
4642
4643 p = h->root.root.string - 1;
4644 save = *p;
4645 *(char *) p = '.';
4646 htab = ppc_hash_table (info);
4647 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4648 *(char *) p = save;
4649
4650 /* Unfortunately, if it so happens that the string we were
4651 looking for was allocated immediately before this string,
4652 then we overwrote the string terminator. That's the only
4653 reason the lookup should fail. */
4654 if (fh == NULL)
4655 {
4656 q = h->root.root.string + strlen (h->root.root.string);
4657 while (q >= h->root.root.string && *q == *p)
4658 --q, --p;
4659 if (q < h->root.root.string && *p == '.')
4660 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4661 }
4662 if (fh != NULL)
4663 {
4664 ((struct ppc_link_hash_entry *) h)->oh = fh;
4665 ((struct ppc_link_hash_entry *) fh)->oh = h;
4666 }
4667 }
4668 if (fh != NULL)
4669 _bfd_elf_link_hash_hide_symbol (info, fh, force_local);
4670 }
4671 }
4672
4673 static bfd_boolean
4674 get_sym_h (hp, symp, symsecp, tlstypep, locsymsp, r_symndx, ibfd)
4675 struct elf_link_hash_entry **hp;
4676 Elf_Internal_Sym **symp;
4677 asection **symsecp;
4678 char **tlstypep;
4679 Elf_Internal_Sym **locsymsp;
4680 unsigned long r_symndx;
4681 bfd *ibfd;
4682 {
4683 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4684
4685 if (r_symndx >= symtab_hdr->sh_info)
4686 {
4687 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4688 struct elf_link_hash_entry *h;
4689
4690 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4691 while (h->root.type == bfd_link_hash_indirect
4692 || h->root.type == bfd_link_hash_warning)
4693 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4694
4695 if (hp != NULL)
4696 *hp = h;
4697
4698 if (symp != NULL)
4699 *symp = NULL;
4700
4701 if (symsecp != NULL)
4702 {
4703 asection *symsec = NULL;
4704 if (h->root.type == bfd_link_hash_defined
4705 || h->root.type == bfd_link_hash_defweak)
4706 symsec = h->root.u.def.section;
4707 *symsecp = symsec;
4708 }
4709
4710 if (tlstypep != NULL)
4711 {
4712 struct ppc_link_hash_entry *eh;
4713
4714 eh = (struct ppc_link_hash_entry *) h;
4715 *tlstypep = &eh->tls_type;
4716 }
4717 }
4718 else
4719 {
4720 Elf_Internal_Sym *sym;
4721 Elf_Internal_Sym *locsyms = *locsymsp;
4722
4723 if (locsyms == NULL)
4724 {
4725 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4726 if (locsyms == NULL)
4727 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4728 symtab_hdr->sh_info,
4729 0, NULL, NULL, NULL);
4730 if (locsyms == NULL)
4731 return FALSE;
4732 *locsymsp = locsyms;
4733 }
4734 sym = locsyms + r_symndx;
4735
4736 if (hp != NULL)
4737 *hp = NULL;
4738
4739 if (symp != NULL)
4740 *symp = sym;
4741
4742 if (symsecp != NULL)
4743 {
4744 asection *symsec = NULL;
4745 if ((sym->st_shndx != SHN_UNDEF
4746 && sym->st_shndx < SHN_LORESERVE)
4747 || sym->st_shndx > SHN_HIRESERVE)
4748 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4749 *symsecp = symsec;
4750 }
4751
4752 if (tlstypep != NULL)
4753 {
4754 struct got_entry **lgot_ents;
4755 char *tlstype;
4756
4757 tlstype = NULL;
4758 lgot_ents = elf_local_got_ents (ibfd);
4759 if (lgot_ents != NULL)
4760 {
4761 char *lgot_types = (char *) (lgot_ents + symtab_hdr->sh_info);
4762 tlstype = &lgot_types[r_symndx];
4763 }
4764 *tlstypep = tlstype;
4765 }
4766 }
4767 return TRUE;
4768 }
4769
4770 static bfd_boolean
4771 get_tls_type (tls_type, locsymsp, rel, ibfd)
4772 char **tls_type;
4773 Elf_Internal_Sym **locsymsp;
4774 const Elf_Internal_Rela *rel;
4775 bfd *ibfd;
4776 {
4777 unsigned long r_symndx;
4778 struct elf_link_hash_entry *h;
4779 Elf_Internal_Sym *sym;
4780 asection *sec;
4781 bfd_vma off;
4782
4783 r_symndx = ELF64_R_SYM (rel->r_info);
4784 if (!get_sym_h (&h, &sym, &sec, tls_type, locsymsp, r_symndx, ibfd))
4785 return FALSE;
4786
4787 if ((*tls_type != NULL && **tls_type != 0)
4788 || sec == NULL
4789 || ppc64_elf_section_data (sec)->t_symndx == NULL)
4790 return TRUE;
4791
4792 /* Look inside a TOC section too. */
4793 if (h != NULL)
4794 {
4795 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4796 off = h->root.u.def.value;
4797 }
4798 else
4799 off = sym->st_value;
4800 off += rel->r_addend;
4801 BFD_ASSERT (off % 8 == 0);
4802 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
4803 return get_sym_h (&h, &sym, NULL, tls_type, locsymsp, r_symndx, ibfd);
4804 }
4805
4806 bfd_boolean
4807 ppc64_elf_edit_opd (obfd, info)
4808 bfd *obfd;
4809 struct bfd_link_info *info;
4810 {
4811 bfd *ibfd;
4812
4813 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4814 {
4815 asection *sec;
4816 Elf_Internal_Rela *relstart, *rel, *relend;
4817 Elf_Internal_Shdr *symtab_hdr;
4818 Elf_Internal_Sym *local_syms;
4819 struct elf_link_hash_entry **sym_hashes;
4820 bfd_vma offset;
4821 bfd_size_type amt;
4822 long *adjust;
4823 bfd_boolean need_edit;
4824
4825 sec = bfd_get_section_by_name (ibfd, ".opd");
4826 if (sec == NULL)
4827 continue;
4828
4829 amt = sec->_raw_size * sizeof (long) / 24;
4830 adjust = ppc64_elf_section_data (sec)->opd.adjust;
4831 if (adjust == NULL)
4832 {
4833 /* Must be a ld -r link. ie. check_relocs hasn't been
4834 called. */
4835 adjust = (long *) bfd_zalloc (obfd, amt);
4836 ppc64_elf_section_data (sec)->opd.adjust = adjust;
4837 }
4838 memset (adjust, 0, (size_t) amt);
4839
4840 if (sec->output_section == bfd_abs_section_ptr)
4841 continue;
4842
4843 /* Look through the section relocs. */
4844 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
4845 continue;
4846
4847 local_syms = NULL;
4848 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4849 sym_hashes = elf_sym_hashes (ibfd);
4850
4851 /* Read the relocations. */
4852 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
4853 (Elf_Internal_Rela *) NULL,
4854 info->keep_memory);
4855 if (relstart == NULL)
4856 return FALSE;
4857
4858 /* First run through the relocs to check they are sane, and to
4859 determine whether we need to edit this opd section. */
4860 need_edit = FALSE;
4861 offset = 0;
4862 relend = relstart + sec->reloc_count;
4863 for (rel = relstart; rel < relend; rel++)
4864 {
4865 enum elf_ppc64_reloc_type r_type;
4866 unsigned long r_symndx;
4867 asection *sym_sec;
4868 struct elf_link_hash_entry *h;
4869 Elf_Internal_Sym *sym;
4870
4871 /* .opd contains a regular array of 24 byte entries. We're
4872 only interested in the reloc pointing to a function entry
4873 point. */
4874 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
4875 if (r_type == R_PPC64_TOC)
4876 continue;
4877
4878 if (r_type != R_PPC64_ADDR64)
4879 {
4880 (*_bfd_error_handler)
4881 (_("%s: unexpected reloc type %u in .opd section"),
4882 bfd_archive_filename (ibfd), r_type);
4883 need_edit = FALSE;
4884 break;
4885 }
4886
4887 if (rel + 1 >= relend)
4888 continue;
4889 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info);
4890 if (r_type != R_PPC64_TOC)
4891 continue;
4892
4893 if (rel->r_offset != offset)
4894 {
4895 /* If someone messes with .opd alignment then after a
4896 "ld -r" we might have padding in the middle of .opd.
4897 Also, there's nothing to prevent someone putting
4898 something silly in .opd with the assembler. No .opd
4899 optimization for them! */
4900 (*_bfd_error_handler)
4901 (_("%s: .opd is not a regular array of opd entries"),
4902 bfd_archive_filename (ibfd));
4903 need_edit = FALSE;
4904 break;
4905 }
4906
4907 r_symndx = ELF64_R_SYM (rel->r_info);
4908 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4909 r_symndx, ibfd))
4910 goto error_free_rel;
4911
4912 if (sym_sec == NULL || sym_sec->owner == NULL)
4913 {
4914 const char *sym_name;
4915 if (h != NULL)
4916 sym_name = h->root.root.string;
4917 else
4918 sym_name = bfd_elf_local_sym_name (ibfd, sym);
4919
4920 (*_bfd_error_handler)
4921 (_("%s: undefined sym `%s' in .opd section"),
4922 bfd_archive_filename (ibfd),
4923 sym_name);
4924 need_edit = FALSE;
4925 break;
4926 }
4927
4928 /* opd entries are always for functions defined in the
4929 current input bfd. If the symbol isn't defined in the
4930 input bfd, then we won't be using the function in this
4931 bfd; It must be defined in a linkonce section in another
4932 bfd, or is weak. It's also possible that we are
4933 discarding the function due to a linker script /DISCARD/,
4934 which we test for via the output_section. */
4935 if (sym_sec->owner != ibfd
4936 || sym_sec->output_section == bfd_abs_section_ptr)
4937 need_edit = TRUE;
4938
4939 offset += 24;
4940 }
4941
4942 if (need_edit)
4943 {
4944 Elf_Internal_Rela *write_rel;
4945 bfd_byte *rptr, *wptr;
4946 bfd_boolean skip;
4947
4948 /* This seems a waste of time as input .opd sections are all
4949 zeros as generated by gcc, but I suppose there's no reason
4950 this will always be so. We might start putting something in
4951 the third word of .opd entries. */
4952 if ((sec->flags & SEC_IN_MEMORY) == 0)
4953 {
4954 bfd_byte *loc = bfd_alloc (ibfd, sec->_raw_size);
4955 if (loc == NULL
4956 || !bfd_get_section_contents (ibfd, sec, loc, (bfd_vma) 0,
4957 sec->_raw_size))
4958 {
4959 if (local_syms != NULL
4960 && symtab_hdr->contents != (unsigned char *) local_syms)
4961 free (local_syms);
4962 error_free_rel:
4963 if (elf_section_data (sec)->relocs != relstart)
4964 free (relstart);
4965 return FALSE;
4966 }
4967 sec->contents = loc;
4968 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
4969 }
4970
4971 elf_section_data (sec)->relocs = relstart;
4972
4973 wptr = sec->contents;
4974 rptr = sec->contents;
4975 write_rel = relstart;
4976 skip = FALSE;
4977 offset = 0;
4978 for (rel = relstart; rel < relend; rel++)
4979 {
4980 if (rel->r_offset == offset)
4981 {
4982 unsigned long r_symndx;
4983 asection *sym_sec;
4984 struct elf_link_hash_entry *h;
4985 Elf_Internal_Sym *sym;
4986
4987 r_symndx = ELF64_R_SYM (rel->r_info);
4988 get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4989 r_symndx, ibfd);
4990
4991 skip = (sym_sec->owner != ibfd
4992 || sym_sec->output_section == bfd_abs_section_ptr);
4993 if (skip)
4994 {
4995 if (h != NULL && sym_sec->owner == ibfd)
4996 {
4997 /* Arrange for the function descriptor sym
4998 to be dropped. */
4999 struct ppc_link_hash_entry *fdh;
5000 struct ppc_link_hash_entry *fh;
5001
5002 fh = (struct ppc_link_hash_entry *) h;
5003 fdh = (struct ppc_link_hash_entry *) fh->oh;
5004 if (fdh == NULL)
5005 {
5006 const char *fd_name;
5007 struct ppc_link_hash_table *htab;
5008
5009 fd_name = h->root.root.string + 1;
5010 htab = ppc_hash_table (info);
5011 fdh = (struct ppc_link_hash_entry *)
5012 elf_link_hash_lookup (&htab->elf, fd_name,
5013 FALSE, FALSE, FALSE);
5014 fdh->is_func_descriptor = 1;
5015 fdh->oh = &fh->elf;
5016 fh->is_func = 1;
5017 fh->oh = &fdh->elf;
5018 }
5019
5020 fdh->elf.root.u.def.value = 0;
5021 fdh->elf.root.u.def.section = sym_sec;
5022 }
5023 }
5024 else
5025 {
5026 /* We'll be keeping this opd entry. */
5027
5028 if (h != NULL)
5029 {
5030 /* Redefine the function descriptor symbol
5031 to this location in the opd section.
5032 We've checked above that opd relocs are
5033 ordered. */
5034 struct ppc_link_hash_entry *fdh;
5035 struct ppc_link_hash_entry *fh;
5036
5037 fh = (struct ppc_link_hash_entry *) h;
5038 fdh = (struct ppc_link_hash_entry *) fh->oh;
5039 if (fdh == NULL)
5040 {
5041 const char *fd_name;
5042 struct ppc_link_hash_table *htab;
5043
5044 fd_name = h->root.root.string + 1;
5045 htab = ppc_hash_table (info);
5046 fdh = (struct ppc_link_hash_entry *)
5047 elf_link_hash_lookup (&htab->elf, fd_name,
5048 FALSE, FALSE, FALSE);
5049 fdh->is_func_descriptor = 1;
5050 fdh->oh = &fh->elf;
5051 fh->is_func = 1;
5052 fh->oh = &fdh->elf;
5053 }
5054
5055 fdh->elf.root.u.def.value = wptr - sec->contents;
5056 }
5057 else
5058 {
5059 /* Local syms are a bit tricky. We could
5060 tweak them as they can be cached, but
5061 we'd need to look through the local syms
5062 for the function descriptor sym which we
5063 don't have at the moment. So keep an
5064 array of adjustments. */
5065 adjust[rel->r_offset / 24] = wptr - rptr;
5066 }
5067
5068 if (wptr != rptr)
5069 memcpy (wptr, rptr, 24);
5070 wptr += 24;
5071 }
5072 rptr += 24;
5073 offset += 24;
5074 }
5075
5076 /* We need to adjust any reloc offsets to point to the
5077 new opd entries. While we're at it, we may as well
5078 remove redundant relocs. */
5079 if (!skip)
5080 {
5081 rel->r_offset += wptr - rptr;
5082 if (write_rel != rel)
5083 memcpy (write_rel, rel, sizeof (*rel));
5084 ++write_rel;
5085 }
5086 }
5087
5088 sec->_cooked_size = wptr - sec->contents;
5089 sec->reloc_count = write_rel - relstart;
5090 /* Fudge the size too, as this is used later in
5091 elf_bfd_final_link if we are emitting relocs. */
5092 elf_section_data (sec)->rel_hdr.sh_size
5093 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5094 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
5095 }
5096 else if (elf_section_data (sec)->relocs != relstart)
5097 free (relstart);
5098
5099 if (local_syms != NULL
5100 && symtab_hdr->contents != (unsigned char *) local_syms)
5101 {
5102 if (!info->keep_memory)
5103 free (local_syms);
5104 else
5105 symtab_hdr->contents = (unsigned char *) local_syms;
5106 }
5107 }
5108
5109 return TRUE;
5110 }
5111
5112 /* Run through all the TLS relocs looking for optimization
5113 opportunities. The linker has been hacked (see ppc64elf.em) to do
5114 a preliminary section layout so that we know the TLS segment
5115 offsets. We can't optimize earlier because some optimizations need
5116 to know the tp offset, and we need to optimize before allocating
5117 dynamic relocations. */
5118
5119 bfd_boolean
5120 ppc64_elf_tls_optimize (obfd, info)
5121 bfd *obfd;
5122 struct bfd_link_info *info;
5123 {
5124 asection *tls;
5125 bfd *ibfd;
5126 asection *sec;
5127 struct ppc_link_hash_table *htab;
5128
5129 if (info->relocateable)
5130 return TRUE;
5131
5132 for (tls = obfd->sections; tls != NULL; tls = tls->next)
5133 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
5134 == (SEC_THREAD_LOCAL | SEC_LOAD))
5135 break;
5136 if (tls == NULL)
5137 return TRUE;
5138
5139 htab = ppc_hash_table (info);
5140 htab->tls_sec = tls;
5141
5142 if (info->shared)
5143 return TRUE;
5144
5145 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5146 {
5147 Elf_Internal_Sym *locsyms = NULL;
5148
5149 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5150 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5151 {
5152 Elf_Internal_Rela *relstart, *rel, *relend;
5153 int expecting_tls_get_addr;
5154
5155 /* Read the relocations. */
5156 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
5157 (Elf_Internal_Rela *) NULL,
5158 info->keep_memory);
5159 if (relstart == NULL)
5160 return FALSE;
5161
5162 expecting_tls_get_addr = 0;
5163 relend = relstart + sec->reloc_count;
5164 for (rel = relstart; rel < relend; rel++)
5165 {
5166 enum elf_ppc64_reloc_type r_type;
5167 unsigned long r_symndx;
5168 struct elf_link_hash_entry *h;
5169 Elf_Internal_Sym *sym;
5170 asection *sym_sec;
5171 char *tls_type;
5172 char tls_set, tls_clear, got_tls_type = 0;
5173 bfd_vma value;
5174 bfd_boolean ok_tprel;
5175
5176 r_symndx = ELF64_R_SYM (rel->r_info);
5177 if (!get_sym_h (&h, &sym, &sym_sec, &tls_type, &locsyms,
5178 r_symndx, ibfd))
5179 {
5180 err_free_rel:
5181 if (elf_section_data (sec)->relocs != relstart)
5182 free (relstart);
5183 if (locsyms != NULL
5184 && (elf_tdata (ibfd)->symtab_hdr.contents
5185 != (unsigned char *) locsyms))
5186 free (locsyms);
5187 return FALSE;
5188 }
5189
5190 if (h != NULL)
5191 {
5192 if (h->root.type != bfd_link_hash_defined
5193 && h->root.type != bfd_link_hash_defweak)
5194 continue;
5195 value = h->root.u.def.value;
5196 }
5197 else
5198 value = sym->st_value;
5199 ok_tprel = FALSE;
5200 if (sym_sec != NULL && sym_sec->output_section != NULL)
5201 {
5202 value += sym_sec->output_offset;
5203 value += sym_sec->output_section->vma;
5204 value -= htab->tls_sec->vma;
5205 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5206 < (bfd_vma) 1 << 32);
5207 }
5208
5209 r_type
5210 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5211 switch (r_type)
5212 {
5213 case R_PPC64_GOT_TLSLD16:
5214 case R_PPC64_GOT_TLSLD16_LO:
5215 case R_PPC64_GOT_TLSLD16_HI:
5216 case R_PPC64_GOT_TLSLD16_HA:
5217 htab->tlsld_got.refcount -= 1;
5218 if (ok_tprel)
5219 /* LD -> LE */
5220 tls_set = 0;
5221 else
5222 /* We still need a GOT entry as the offset is
5223 too big. ie. LD -> IE. */
5224 tls_set = TLS_TLS | TLS_TPREL;
5225 tls_clear = TLS_GD_LD;
5226 got_tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
5227 expecting_tls_get_addr = 1;
5228 break;
5229
5230 case R_PPC64_GOT_TLSGD16:
5231 case R_PPC64_GOT_TLSGD16_LO:
5232 case R_PPC64_GOT_TLSGD16_HI:
5233 case R_PPC64_GOT_TLSGD16_HA:
5234 if (ok_tprel
5235 && (h == NULL
5236 || ((h->elf_link_hash_flags
5237 & ELF_LINK_HASH_DEF_REGULAR) != 0
5238 && ((h->elf_link_hash_flags
5239 & ELF_LINK_FORCED_LOCAL) != 0
5240 || !info->shared
5241 || info->symbolic))))
5242 /* GD -> LE */
5243 tls_set = 0;
5244 else
5245 /* GD -> IE */
5246 tls_set = TLS_TLS | TLS_TPREL;
5247 tls_clear = TLS_GD_LD;
5248 got_tls_type = TLS_TLS | TLS_GD_LD;
5249 expecting_tls_get_addr = 1;
5250 break;
5251
5252 case R_PPC64_GOT_TPREL16_DS:
5253 case R_PPC64_GOT_TPREL16_LO_DS:
5254 case R_PPC64_GOT_TPREL16_HI:
5255 case R_PPC64_GOT_TPREL16_HA:
5256 expecting_tls_get_addr = 0;
5257 if (ok_tprel)
5258 {
5259 /* IE -> LE */
5260 tls_set = 0;
5261 tls_clear = TLS_TPREL;
5262 got_tls_type = TLS_TLS | TLS_TPREL;
5263 break;
5264 }
5265 else
5266 continue;
5267
5268 case R_PPC64_REL14:
5269 case R_PPC64_REL14_BRTAKEN:
5270 case R_PPC64_REL14_BRNTAKEN:
5271 case R_PPC64_REL24:
5272 if (h != NULL
5273 && h == htab->tls_get_addr)
5274 {
5275 if (!expecting_tls_get_addr
5276 && rel != relstart
5277 && ((ELF64_R_TYPE (rel[-1].r_info)
5278 == R_PPC64_TOC16)
5279 || (ELF64_R_TYPE (rel[-1].r_info)
5280 == R_PPC64_TOC16_LO)))
5281 {
5282 /* Check for toc tls entries. */
5283 char *toc_tls;
5284
5285 if (!get_tls_type (&toc_tls, &locsyms,
5286 rel - 1, ibfd))
5287 goto err_free_rel;
5288 if (toc_tls != NULL)
5289 expecting_tls_get_addr = *toc_tls != 0;
5290 }
5291
5292 if (expecting_tls_get_addr)
5293 {
5294 struct plt_entry *ent;
5295 for (ent = h->plt.plist; ent; ent = ent->next)
5296 if (ent->addend == 0)
5297 {
5298 if (ent->plt.refcount > 0)
5299 ent->plt.refcount -= 1;
5300 break;
5301 }
5302 }
5303 }
5304 expecting_tls_get_addr = 0;
5305 continue;
5306
5307 case R_PPC64_TPREL64:
5308 expecting_tls_get_addr = 0;
5309 if (ok_tprel)
5310 {
5311 /* IE -> LE */
5312 tls_set = TLS_EXPLICIT;
5313 tls_clear = TLS_TPREL;
5314 break;
5315 }
5316 else
5317 continue;
5318
5319 case R_PPC64_DTPMOD64:
5320 expecting_tls_get_addr = 0;
5321 if ((*tls_type & TLS_LD) == 0)
5322 {
5323 if ((h == NULL
5324 || ((h->elf_link_hash_flags
5325 & ELF_LINK_HASH_DEF_REGULAR) != 0
5326 && ((h->elf_link_hash_flags
5327 & ELF_LINK_FORCED_LOCAL) != 0
5328 || !info->shared
5329 || info->symbolic)))
5330 && ok_tprel)
5331 /* GD -> LE */
5332 tls_set = TLS_EXPLICIT;
5333 else
5334 /* GD -> IE */
5335 tls_set = TLS_EXPLICIT | TLS_TPREL;
5336 tls_clear = TLS_GD_LD;
5337 }
5338 else
5339 {
5340 if (ok_tprel)
5341 /* LD -> LE */
5342 tls_set = TLS_EXPLICIT;
5343 else
5344 /* LD -> IE */
5345 tls_set = TLS_EXPLICIT | TLS_TPREL;
5346 tls_clear = TLS_GD_LD;
5347 }
5348 break;
5349
5350 default:
5351 expecting_tls_get_addr = 0;
5352 continue;
5353 }
5354
5355 if ((tls_set & TLS_EXPLICIT) == 0)
5356 {
5357 struct got_entry *ent;
5358
5359 /* Adjust got entry for this reloc. */
5360 if (h != NULL)
5361 ent = h->got.glist;
5362 else
5363 ent = elf_local_got_ents (ibfd)[r_symndx];
5364
5365 for (; ent != NULL; ent = ent->next)
5366 if (ent->addend == rel->r_addend
5367 && ent->tls_type == got_tls_type)
5368 break;
5369 if (ent == NULL)
5370 abort ();
5371
5372 if (tls_set == 0)
5373 {
5374 /* We managed to get rid of a got entry. */
5375 if (ent->got.refcount > 0)
5376 ent->got.refcount -= 1;
5377 }
5378 else
5379 ent->tls_type = tls_set;
5380 }
5381 else if (h != NULL)
5382 {
5383 struct ppc_link_hash_entry * eh;
5384 struct ppc_dyn_relocs **pp;
5385 struct ppc_dyn_relocs *p;
5386
5387 /* Adjust dynamic relocs. */
5388 eh = (struct ppc_link_hash_entry *) h;
5389 for (pp = &eh->dyn_relocs;
5390 (p = *pp) != NULL;
5391 pp = &p->next)
5392 if (p->sec == sec)
5393 {
5394 /* If we got rid of a DTPMOD/DTPREL reloc
5395 pair then we'll lose one or two dyn
5396 relocs. */
5397 if (tls_clear == TLS_GD_LD
5398 && rel + 1 < relend
5399 && (rel[1].r_info
5400 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5401 && rel[1].r_offset == rel->r_offset + 8)
5402 p->count -= 1;
5403 if (tls_set == TLS_EXPLICIT)
5404 p->count -= 1;
5405 if (p->count == 0)
5406 *pp = p->next;
5407 break;
5408 }
5409 }
5410
5411 *tls_type |= tls_set;
5412 *tls_type &= ~tls_clear;
5413 }
5414
5415 if (elf_section_data (sec)->relocs != relstart)
5416 free (relstart);
5417 }
5418
5419 if (locsyms != NULL
5420 && (elf_tdata (ibfd)->symtab_hdr.contents
5421 != (unsigned char *) locsyms))
5422 {
5423 if (!info->keep_memory)
5424 free (locsyms);
5425 else
5426 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
5427 }
5428 }
5429 return TRUE;
5430 }
5431
5432 /* This is the condition under which ppc64_elf_finish_dynamic_symbol
5433 will be called from elflink.h. If elflink.h doesn't call our
5434 finish_dynamic_symbol routine, we'll need to do something about
5435 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
5436 #define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
5437 ((DYN) \
5438 && ((INFO)->shared \
5439 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5440 && ((H)->dynindx != -1 \
5441 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5442
5443 /* Allocate space in .plt, .got and associated reloc sections for
5444 dynamic relocs. */
5445
5446 static bfd_boolean
5447 allocate_dynrelocs (h, inf)
5448 struct elf_link_hash_entry *h;
5449 PTR inf;
5450 {
5451 struct bfd_link_info *info;
5452 struct ppc_link_hash_table *htab;
5453 asection *s;
5454 struct ppc_link_hash_entry *eh;
5455 struct ppc_dyn_relocs *p;
5456 struct got_entry *gent;
5457
5458 if (h->root.type == bfd_link_hash_indirect)
5459 return TRUE;
5460
5461 if (h->root.type == bfd_link_hash_warning)
5462 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5463
5464 info = (struct bfd_link_info *) inf;
5465 htab = ppc_hash_table (info);
5466
5467 if (htab->elf.dynamic_sections_created
5468 && h->dynindx != -1
5469 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
5470 {
5471 struct plt_entry *pent;
5472 bfd_boolean doneone = FALSE;
5473 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5474 if (pent->plt.refcount > 0)
5475 {
5476 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5477
5478 /* If this is the first .plt entry, make room for the special
5479 first entry. */
5480 s = htab->splt;
5481 if (s->_raw_size == 0)
5482 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
5483
5484 pent->plt.offset = s->_raw_size;
5485
5486 /* Make room for this entry. */
5487 s->_raw_size += PLT_ENTRY_SIZE;
5488
5489 /* Make room for the .glink code. */
5490 s = htab->sglink;
5491 if (s->_raw_size == 0)
5492 s->_raw_size += GLINK_CALL_STUB_SIZE;
5493 /* We need bigger stubs past index 32767. */
5494 if (s->_raw_size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5495 s->_raw_size += 4;
5496 s->_raw_size += 2*4;
5497
5498 /* We also need to make an entry in the .rela.plt section. */
5499 s = htab->srelplt;
5500 s->_raw_size += sizeof (Elf64_External_Rela);
5501 doneone = TRUE;
5502 }
5503 else
5504 pent->plt.offset = (bfd_vma) -1;
5505 if (!doneone)
5506 {
5507 h->plt.plist = NULL;
5508 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5509 }
5510 }
5511 else
5512 {
5513 h->plt.plist = NULL;
5514 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5515 }
5516
5517 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5518 if (gent->got.refcount > 0)
5519 {
5520 /* Make sure this symbol is output as a dynamic symbol.
5521 Undefined weak syms won't yet be marked as dynamic. */
5522 if (h->dynindx == -1
5523 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5524 {
5525 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5526 return FALSE;
5527 }
5528
5529 if ((gent->tls_type & TLS_LD) != 0)
5530 gent->got.offset = htab->tlsld_got.offset;
5531 else
5532 {
5533 bfd_boolean dyn;
5534
5535 s = htab->sgot;
5536 gent->got.offset = s->_raw_size;
5537 s->_raw_size += (gent->tls_type & TLS_GD_LD) != 0 ? 16 : 8;
5538 dyn = htab->elf.dynamic_sections_created;
5539 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
5540 htab->srelgot->_raw_size
5541 += ((gent->tls_type & TLS_GD_LD) != 0
5542 ? 2 * sizeof (Elf64_External_Rela)
5543 : sizeof (Elf64_External_Rela));
5544 }
5545 }
5546 else
5547 gent->got.offset = (bfd_vma) -1;
5548
5549 eh = (struct ppc_link_hash_entry *) h;
5550 if (eh->dyn_relocs == NULL)
5551 return TRUE;
5552
5553 /* In the shared -Bsymbolic case, discard space allocated for
5554 dynamic pc-relative relocs against symbols which turn out to be
5555 defined in regular objects. For the normal shared case, discard
5556 space for relocs that have become local due to symbol visibility
5557 changes. */
5558
5559 if (info->shared)
5560 {
5561 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
5562 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
5563 || info->symbolic))
5564 {
5565 struct ppc_dyn_relocs **pp;
5566
5567 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5568 {
5569 p->count -= p->pc_count;
5570 p->pc_count = 0;
5571 if (p->count == 0)
5572 *pp = p->next;
5573 else
5574 pp = &p->next;
5575 }
5576 }
5577 }
5578 else
5579 {
5580 /* For the non-shared case, discard space for relocs against
5581 symbols which turn out to need copy relocs or are not
5582 dynamic. */
5583
5584 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
5585 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5586 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5587 || (htab->elf.dynamic_sections_created
5588 && (h->root.type == bfd_link_hash_undefweak
5589 || h->root.type == bfd_link_hash_undefined))))
5590 {
5591 /* Make sure this symbol is output as a dynamic symbol.
5592 Undefined weak syms won't yet be marked as dynamic. */
5593 if (h->dynindx == -1
5594 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5595 {
5596 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5597 return FALSE;
5598 }
5599
5600 /* If that succeeded, we know we'll be keeping all the
5601 relocs. */
5602 if (h->dynindx != -1)
5603 goto keep;
5604 }
5605
5606 eh->dyn_relocs = NULL;
5607
5608 keep: ;
5609 }
5610
5611 /* Finally, allocate space. */
5612 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5613 {
5614 asection *sreloc = elf_section_data (p->sec)->sreloc;
5615 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
5616 }
5617
5618 return TRUE;
5619 }
5620
5621 /* Find any dynamic relocs that apply to read-only sections. */
5622
5623 static bfd_boolean
5624 readonly_dynrelocs (h, inf)
5625 struct elf_link_hash_entry *h;
5626 PTR inf;
5627 {
5628 struct ppc_link_hash_entry *eh;
5629 struct ppc_dyn_relocs *p;
5630
5631 if (h->root.type == bfd_link_hash_warning)
5632 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5633
5634 eh = (struct ppc_link_hash_entry *) h;
5635 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5636 {
5637 asection *s = p->sec->output_section;
5638
5639 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5640 {
5641 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5642
5643 info->flags |= DF_TEXTREL;
5644
5645 /* Not an error, just cut short the traversal. */
5646 return FALSE;
5647 }
5648 }
5649 return TRUE;
5650 }
5651
5652 /* Set the sizes of the dynamic sections. */
5653
5654 static bfd_boolean
5655 ppc64_elf_size_dynamic_sections (output_bfd, info)
5656 bfd *output_bfd ATTRIBUTE_UNUSED;
5657 struct bfd_link_info *info;
5658 {
5659 struct ppc_link_hash_table *htab;
5660 bfd *dynobj;
5661 asection *s;
5662 bfd_boolean relocs;
5663 bfd *ibfd;
5664
5665 htab = ppc_hash_table (info);
5666 dynobj = htab->elf.dynobj;
5667 if (dynobj == NULL)
5668 abort ();
5669
5670 if (htab->elf.dynamic_sections_created)
5671 {
5672 /* Set the contents of the .interp section to the interpreter. */
5673 if (! info->shared)
5674 {
5675 s = bfd_get_section_by_name (dynobj, ".interp");
5676 if (s == NULL)
5677 abort ();
5678 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
5679 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5680 }
5681 }
5682
5683 if (htab->tlsld_got.refcount > 0)
5684 {
5685 htab->tlsld_got.offset = htab->sgot->_raw_size;
5686 htab->sgot->_raw_size += 16;
5687 if (info->shared)
5688 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
5689 }
5690 else
5691 htab->tlsld_got.offset = (bfd_vma) -1;
5692
5693 /* Set up .got offsets for local syms, and space for local dynamic
5694 relocs. */
5695 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5696 {
5697 struct got_entry **lgot_ents;
5698 struct got_entry **end_lgot_ents;
5699 bfd_size_type locsymcount;
5700 Elf_Internal_Shdr *symtab_hdr;
5701 asection *srel;
5702
5703 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5704 continue;
5705
5706 for (s = ibfd->sections; s != NULL; s = s->next)
5707 {
5708 struct ppc_dyn_relocs *p;
5709
5710 for (p = *((struct ppc_dyn_relocs **)
5711 &elf_section_data (s)->local_dynrel);
5712 p != NULL;
5713 p = p->next)
5714 {
5715 if (!bfd_is_abs_section (p->sec)
5716 && bfd_is_abs_section (p->sec->output_section))
5717 {
5718 /* Input section has been discarded, either because
5719 it is a copy of a linkonce section or due to
5720 linker script /DISCARD/, so we'll be discarding
5721 the relocs too. */
5722 }
5723 else if (p->count != 0)
5724 {
5725 srel = elf_section_data (p->sec)->sreloc;
5726 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
5727 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5728 info->flags |= DF_TEXTREL;
5729 }
5730 }
5731 }
5732
5733 lgot_ents = elf_local_got_ents (ibfd);
5734 if (!lgot_ents)
5735 continue;
5736
5737 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5738 locsymcount = symtab_hdr->sh_info;
5739 end_lgot_ents = lgot_ents + locsymcount;
5740 s = htab->sgot;
5741 srel = htab->srelgot;
5742 for (; lgot_ents < end_lgot_ents; ++lgot_ents)
5743 {
5744 struct got_entry *ent;
5745
5746 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5747 if (ent->got.refcount > 0)
5748 {
5749 if ((ent->tls_type & TLS_LD) != 0)
5750 {
5751 if (htab->tlsld_got.offset == (bfd_vma) -1)
5752 {
5753 htab->tlsld_got.offset = s->_raw_size;
5754 s->_raw_size += 16;
5755 if (info->shared)
5756 srel->_raw_size += sizeof (Elf64_External_Rela);
5757 }
5758 ent->got.offset = htab->tlsld_got.offset;
5759 }
5760 else
5761 {
5762 ent->got.offset = s->_raw_size;
5763 if ((ent->tls_type & TLS_GD_LD) != 0)
5764 {
5765 s->_raw_size += 16;
5766 if (info->shared)
5767 srel->_raw_size += 2 * sizeof (Elf64_External_Rela);
5768 }
5769 else
5770 {
5771 s->_raw_size += 8;
5772 if (info->shared)
5773 srel->_raw_size += sizeof (Elf64_External_Rela);
5774 }
5775 }
5776 }
5777 else
5778 ent->got.offset = (bfd_vma) -1;
5779 }
5780 }
5781
5782 /* Allocate global sym .plt and .got entries, and space for global
5783 sym dynamic relocs. */
5784 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
5785
5786 /* We now have determined the sizes of the various dynamic sections.
5787 Allocate memory for them. */
5788 relocs = FALSE;
5789 for (s = dynobj->sections; s != NULL; s = s->next)
5790 {
5791 if ((s->flags & SEC_LINKER_CREATED) == 0)
5792 continue;
5793
5794 /* Reset _cooked_size since prelim layout will set it wrongly,
5795 and a non-zero _cooked_size sticks. */
5796 s->_cooked_size = 0;
5797
5798 if (s == htab->sbrlt || s == htab->srelbrlt)
5799 /* These haven't been allocated yet; don't strip. */
5800 continue;
5801 else if (s == htab->splt
5802 || s == htab->sgot
5803 || s == htab->sglink)
5804 {
5805 /* Strip this section if we don't need it; see the
5806 comment below. */
5807 }
5808 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5809 {
5810 if (s->_raw_size == 0)
5811 {
5812 /* If we don't need this section, strip it from the
5813 output file. This is mostly to handle .rela.bss and
5814 .rela.plt. We must create both sections in
5815 create_dynamic_sections, because they must be created
5816 before the linker maps input sections to output
5817 sections. The linker does that before
5818 adjust_dynamic_symbol is called, and it is that
5819 function which decides whether anything needs to go
5820 into these sections. */
5821 }
5822 else
5823 {
5824 if (s != htab->srelplt)
5825 relocs = TRUE;
5826
5827 /* We use the reloc_count field as a counter if we need
5828 to copy relocs into the output file. */
5829 s->reloc_count = 0;
5830 }
5831 }
5832 else
5833 {
5834 /* It's not one of our sections, so don't allocate space. */
5835 continue;
5836 }
5837
5838 if (s->_raw_size == 0)
5839 {
5840 _bfd_strip_section_from_output (info, s);
5841 continue;
5842 }
5843
5844 /* .plt is in the bss section. We don't initialise it. */
5845 if ((s->flags & SEC_LOAD) == 0)
5846 continue;
5847
5848 /* Allocate memory for the section contents. We use bfd_zalloc
5849 here in case unused entries are not reclaimed before the
5850 section's contents are written out. This should not happen,
5851 but this way if it does we get a R_PPC64_NONE reloc in .rela
5852 sections instead of garbage.
5853 We also rely on the section contents being zero when writing
5854 the GOT. */
5855 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
5856 if (s->contents == NULL)
5857 return FALSE;
5858 }
5859
5860 if (htab->elf.dynamic_sections_created)
5861 {
5862 /* Add some entries to the .dynamic section. We fill in the
5863 values later, in ppc64_elf_finish_dynamic_sections, but we
5864 must add the entries now so that we get the correct size for
5865 the .dynamic section. The DT_DEBUG entry is filled in by the
5866 dynamic linker and used by the debugger. */
5867 #define add_dynamic_entry(TAG, VAL) \
5868 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5869
5870 if (!info->shared)
5871 {
5872 if (!add_dynamic_entry (DT_DEBUG, 0))
5873 return FALSE;
5874 }
5875
5876 if (htab->splt != NULL && htab->splt->_raw_size != 0)
5877 {
5878 if (!add_dynamic_entry (DT_PLTGOT, 0)
5879 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5880 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5881 || !add_dynamic_entry (DT_JMPREL, 0)
5882 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
5883 return FALSE;
5884 }
5885
5886 if (NO_OPD_RELOCS)
5887 {
5888 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
5889 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
5890 return FALSE;
5891 }
5892
5893 if (relocs)
5894 {
5895 if (!add_dynamic_entry (DT_RELA, 0)
5896 || !add_dynamic_entry (DT_RELASZ, 0)
5897 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
5898 return FALSE;
5899
5900 /* If any dynamic relocs apply to a read-only section,
5901 then we need a DT_TEXTREL entry. */
5902 if ((info->flags & DF_TEXTREL) == 0)
5903 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
5904 (PTR) info);
5905
5906 if ((info->flags & DF_TEXTREL) != 0)
5907 {
5908 if (!add_dynamic_entry (DT_TEXTREL, 0))
5909 return FALSE;
5910 }
5911 }
5912 }
5913 #undef add_dynamic_entry
5914
5915 return TRUE;
5916 }
5917
5918 /* Determine the type of stub needed, if any, for a call. */
5919
5920 static INLINE enum ppc_stub_type
5921 ppc_type_of_stub (input_sec, rel, hash, destination)
5922 asection *input_sec;
5923 const Elf_Internal_Rela *rel;
5924 struct ppc_link_hash_entry **hash;
5925 bfd_vma destination;
5926 {
5927 struct ppc_link_hash_entry *h = *hash;
5928 bfd_vma location;
5929 bfd_vma branch_offset;
5930 bfd_vma max_branch_offset;
5931 unsigned int r_type;
5932
5933 if (h != NULL)
5934 {
5935 if (h->oh != NULL
5936 && h->oh->dynindx != -1)
5937 {
5938 struct plt_entry *ent;
5939 for (ent = h->oh->plt.plist; ent != NULL; ent = ent->next)
5940 if (ent->addend == rel->r_addend
5941 && ent->plt.offset != (bfd_vma) -1)
5942 {
5943 *hash = (struct ppc_link_hash_entry *) h->oh;
5944 return ppc_stub_plt_call;
5945 }
5946 }
5947
5948 if (h->elf.root.type == bfd_link_hash_undefweak
5949 || h->elf.root.type == bfd_link_hash_undefined)
5950 return ppc_stub_none;
5951 }
5952
5953 /* Determine where the call point is. */
5954 location = (input_sec->output_offset
5955 + input_sec->output_section->vma
5956 + rel->r_offset);
5957
5958 branch_offset = destination - location;
5959 r_type = ELF64_R_TYPE (rel->r_info);
5960
5961 /* Determine if a long branch stub is needed. */
5962 max_branch_offset = 1 << 25;
5963 if (r_type != (unsigned int) R_PPC64_REL24)
5964 max_branch_offset = 1 << 15;
5965
5966 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
5967 /* We need a stub. Figure out whether a long_branch or plt_branch
5968 is needed later. */
5969 return ppc_stub_long_branch;
5970
5971 return ppc_stub_none;
5972 }
5973
5974 /* Build a .plt call stub. */
5975
5976 static bfd_byte *
5977 build_plt_stub (obfd, p, offset, glink)
5978 bfd *obfd;
5979 bfd_byte *p;
5980 int offset;
5981 int glink;
5982 {
5983 #define PPC_LO(v) ((v) & 0xffff)
5984 #define PPC_HI(v) (((v) >> 16) & 0xffff)
5985 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
5986
5987 if (glink)
5988 bfd_put_32 (obfd, LD_R2_40R1, p), p += 4;
5989 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
5990 if (!glink)
5991 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
5992 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
5993 if (PPC_HA (offset + 8) != PPC_HA (offset))
5994 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
5995 offset += 8;
5996 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
5997 if (PPC_HA (offset + 8) != PPC_HA (offset))
5998 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
5999 offset += 8;
6000 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6001 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6002 bfd_put_32 (obfd, BCTR, p), p += 4;
6003 return p;
6004 }
6005
6006 static bfd_boolean
6007 ppc_build_one_stub (gen_entry, in_arg)
6008 struct bfd_hash_entry *gen_entry;
6009 PTR in_arg;
6010 {
6011 struct ppc_stub_hash_entry *stub_entry;
6012 struct ppc_branch_hash_entry *br_entry;
6013 struct bfd_link_info *info;
6014 struct ppc_link_hash_table *htab;
6015 asection *stub_sec;
6016 bfd *stub_bfd;
6017 bfd_byte *loc;
6018 bfd_byte *p;
6019 unsigned int indx;
6020 struct plt_entry *ent;
6021 bfd_vma off;
6022 int size;
6023
6024 /* Massage our args to the form they really have. */
6025 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6026 info = (struct bfd_link_info *) in_arg;
6027
6028 htab = ppc_hash_table (info);
6029 stub_sec = stub_entry->stub_sec;
6030
6031 /* Make a note of the offset within the stubs for this entry. */
6032 stub_entry->stub_offset = stub_sec->_cooked_size;
6033 loc = stub_sec->contents + stub_entry->stub_offset;
6034
6035 stub_bfd = stub_sec->owner;
6036
6037 switch (stub_entry->stub_type)
6038 {
6039 case ppc_stub_long_branch:
6040 /* Branches are relative. This is where we are going to. */
6041 off = (stub_entry->target_value
6042 + stub_entry->target_section->output_offset
6043 + stub_entry->target_section->output_section->vma);
6044
6045 /* And this is where we are coming from. */
6046 off -= (stub_entry->stub_offset
6047 + stub_sec->output_offset
6048 + stub_sec->output_section->vma);
6049
6050 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
6051
6052 bfd_put_32 (stub_bfd, (bfd_vma) B_DOT | (off & 0x3fffffc), loc);
6053 size = 4;
6054 break;
6055
6056 case ppc_stub_plt_branch:
6057 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6058 stub_entry->root.string + 9,
6059 FALSE, FALSE);
6060 if (br_entry == NULL)
6061 {
6062 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6063 stub_entry->root.string + 9);
6064 htab->stub_error = TRUE;
6065 return FALSE;
6066 }
6067
6068 off = (stub_entry->target_value
6069 + stub_entry->target_section->output_offset
6070 + stub_entry->target_section->output_section->vma);
6071
6072 bfd_put_64 (htab->sbrlt->owner, off,
6073 htab->sbrlt->contents + br_entry->offset);
6074
6075 if (info->shared)
6076 {
6077 /* Create a reloc for the branch lookup table entry. */
6078 Elf_Internal_Rela rela;
6079 bfd_byte *loc;
6080
6081 rela.r_offset = (br_entry->offset
6082 + htab->sbrlt->output_offset
6083 + htab->sbrlt->output_section->vma);
6084 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6085 rela.r_addend = off;
6086
6087 loc = htab->srelbrlt->contents;
6088 loc += htab->srelbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6089 bfd_elf64_swap_reloca_out (htab->srelbrlt->owner, &rela, loc);
6090 }
6091
6092 off = (br_entry->offset
6093 + htab->sbrlt->output_offset
6094 + htab->sbrlt->output_section->vma
6095 - elf_gp (htab->sbrlt->output_section->owner)
6096 - TOC_BASE_OFF);
6097
6098 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6099 {
6100 (*_bfd_error_handler)
6101 (_("linkage table error against `%s'"),
6102 stub_entry->root.string);
6103 bfd_set_error (bfd_error_bad_value);
6104 htab->stub_error = TRUE;
6105 return FALSE;
6106 }
6107
6108 indx = off;
6109 bfd_put_32 (stub_bfd, (bfd_vma) ADDIS_R12_R2 | PPC_HA (indx), loc);
6110 bfd_put_32 (stub_bfd, (bfd_vma) LD_R11_0R12 | PPC_LO (indx), loc + 4);
6111 bfd_put_32 (stub_bfd, (bfd_vma) MTCTR_R11, loc + 8);
6112 bfd_put_32 (stub_bfd, (bfd_vma) BCTR, loc + 12);
6113 size = 16;
6114 break;
6115
6116 case ppc_stub_plt_call:
6117 /* Do the best we can for shared libraries built without
6118 exporting ".foo" for each "foo". This can happen when symbol
6119 versioning scripts strip all bar a subset of symbols. */
6120 if (stub_entry->h->oh->root.type != bfd_link_hash_defined
6121 && stub_entry->h->oh->root.type != bfd_link_hash_defweak)
6122 {
6123 /* Point the symbol at the stub. There may be multiple stubs,
6124 we don't really care; The main thing is to make this sym
6125 defined somewhere. */
6126 stub_entry->h->oh->root.type = bfd_link_hash_defined;
6127 stub_entry->h->oh->root.u.def.section = stub_entry->stub_sec;
6128 stub_entry->h->oh->root.u.def.value = stub_entry->stub_offset;
6129 }
6130
6131 /* Now build the stub. */
6132 off = (bfd_vma) -1;
6133 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6134 if (ent->addend == stub_entry->addend)
6135 {
6136 off = ent->plt.offset;
6137 break;
6138 }
6139 if (off >= (bfd_vma) -2)
6140 abort ();
6141
6142 off &= ~ (bfd_vma) 1;
6143 off += (htab->splt->output_offset
6144 + htab->splt->output_section->vma
6145 - elf_gp (htab->splt->output_section->owner)
6146 - TOC_BASE_OFF);
6147
6148 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6149 {
6150 (*_bfd_error_handler)
6151 (_("linkage table error against `%s'"),
6152 stub_entry->h->elf.root.root.string);
6153 bfd_set_error (bfd_error_bad_value);
6154 htab->stub_error = TRUE;
6155 return FALSE;
6156 }
6157
6158 p = build_plt_stub (stub_bfd, loc, (int) off, 0);
6159 size = p - loc;
6160 break;
6161
6162 default:
6163 BFD_FAIL ();
6164 return FALSE;
6165 }
6166
6167 stub_sec->_cooked_size += size;
6168 return TRUE;
6169 }
6170
6171 /* As above, but don't actually build the stub. Just bump offset so
6172 we know stub section sizes, and select plt_branch stubs where
6173 long_branch stubs won't do. */
6174
6175 static bfd_boolean
6176 ppc_size_one_stub (gen_entry, in_arg)
6177 struct bfd_hash_entry *gen_entry;
6178 PTR in_arg;
6179 {
6180 struct ppc_stub_hash_entry *stub_entry;
6181 struct ppc_link_hash_table *htab;
6182 bfd_vma off;
6183 int size;
6184
6185 /* Massage our args to the form they really have. */
6186 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6187 htab = (struct ppc_link_hash_table *) in_arg;
6188
6189 if (stub_entry->stub_type == ppc_stub_plt_call)
6190 {
6191 struct plt_entry *ent;
6192 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6193 if (ent->addend == stub_entry->addend)
6194 {
6195 off = ent->plt.offset & ~(bfd_vma) 1;
6196 break;
6197 }
6198 if (ent == NULL)
6199 abort ();
6200 off += (htab->splt->output_offset
6201 + htab->splt->output_section->vma
6202 - elf_gp (htab->splt->output_section->owner)
6203 - TOC_BASE_OFF);
6204
6205 size = 28;
6206 if (PPC_HA ((int) off + 16) != PPC_HA ((int) off))
6207 size += 4;
6208 }
6209 else
6210 {
6211 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6212 stub_entry->stub_type = ppc_stub_long_branch;
6213 size = 4;
6214
6215 off = (stub_entry->target_value
6216 + stub_entry->target_section->output_offset
6217 + stub_entry->target_section->output_section->vma);
6218 off -= (stub_entry->stub_sec->_raw_size
6219 + stub_entry->stub_sec->output_offset
6220 + stub_entry->stub_sec->output_section->vma);
6221
6222 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6223 {
6224 struct ppc_branch_hash_entry *br_entry;
6225
6226 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6227 stub_entry->root.string + 9,
6228 TRUE, FALSE);
6229 if (br_entry == NULL)
6230 {
6231 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6232 stub_entry->root.string + 9);
6233 htab->stub_error = TRUE;
6234 return FALSE;
6235 }
6236
6237 if (br_entry->iter != htab->stub_iteration)
6238 {
6239 br_entry->iter = htab->stub_iteration;
6240 br_entry->offset = htab->sbrlt->_raw_size;
6241 htab->sbrlt->_raw_size += 8;
6242 }
6243 stub_entry->stub_type = ppc_stub_plt_branch;
6244 size = 16;
6245 }
6246 }
6247
6248 stub_entry->stub_sec->_raw_size += size;
6249 return TRUE;
6250 }
6251
6252 /* Set up various things so that we can make a list of input sections
6253 for each output section included in the link. Returns -1 on error,
6254 0 when no stubs will be needed, and 1 on success. */
6255
6256 int
6257 ppc64_elf_setup_section_lists (output_bfd, info)
6258 bfd *output_bfd;
6259 struct bfd_link_info *info;
6260 {
6261 bfd *input_bfd;
6262 int top_id, top_index;
6263 asection *section;
6264 asection **input_list, **list;
6265 bfd_size_type amt;
6266 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6267
6268 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour
6269 || htab->sbrlt == NULL)
6270 return 0;
6271
6272 /* Find the top input section id. */
6273 for (input_bfd = info->input_bfds, top_id = 0;
6274 input_bfd != NULL;
6275 input_bfd = input_bfd->link_next)
6276 {
6277 for (section = input_bfd->sections;
6278 section != NULL;
6279 section = section->next)
6280 {
6281 if (top_id < section->id)
6282 top_id = section->id;
6283 }
6284 }
6285
6286 amt = sizeof (struct map_stub) * (top_id + 1);
6287 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
6288 if (htab->stub_group == NULL)
6289 return -1;
6290
6291 /* We can't use output_bfd->section_count here to find the top output
6292 section index as some sections may have been removed, and
6293 _bfd_strip_section_from_output doesn't renumber the indices. */
6294 for (section = output_bfd->sections, top_index = 0;
6295 section != NULL;
6296 section = section->next)
6297 {
6298 if (top_index < section->index)
6299 top_index = section->index;
6300 }
6301
6302 htab->top_index = top_index;
6303 amt = sizeof (asection *) * (top_index + 1);
6304 input_list = (asection **) bfd_malloc (amt);
6305 htab->input_list = input_list;
6306 if (input_list == NULL)
6307 return -1;
6308
6309 /* For sections we aren't interested in, mark their entries with a
6310 value we can check later. */
6311 list = input_list + top_index;
6312 do
6313 *list = bfd_abs_section_ptr;
6314 while (list-- != input_list);
6315
6316 for (section = output_bfd->sections;
6317 section != NULL;
6318 section = section->next)
6319 {
6320 if ((section->flags & SEC_CODE) != 0)
6321 input_list[section->index] = NULL;
6322 }
6323
6324 return 1;
6325 }
6326
6327 /* The linker repeatedly calls this function for each input section,
6328 in the order that input sections are linked into output sections.
6329 Build lists of input sections to determine groupings between which
6330 we may insert linker stubs. */
6331
6332 void
6333 ppc64_elf_next_input_section (info, isec)
6334 struct bfd_link_info *info;
6335 asection *isec;
6336 {
6337 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6338
6339 if (isec->output_section->index <= htab->top_index)
6340 {
6341 asection **list = htab->input_list + isec->output_section->index;
6342 if (*list != bfd_abs_section_ptr)
6343 {
6344 /* Steal the link_sec pointer for our list. */
6345 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6346 /* This happens to make the list in reverse order,
6347 which is what we want. */
6348 PREV_SEC (isec) = *list;
6349 *list = isec;
6350 }
6351 }
6352 }
6353
6354 /* See whether we can group stub sections together. Grouping stub
6355 sections may result in fewer stubs. More importantly, we need to
6356 put all .init* and .fini* stubs at the beginning of the .init or
6357 .fini output sections respectively, because glibc splits the
6358 _init and _fini functions into multiple parts. Putting a stub in
6359 the middle of a function is not a good idea. */
6360
6361 static void
6362 group_sections (htab, stub_group_size, stubs_always_before_branch)
6363 struct ppc_link_hash_table *htab;
6364 bfd_size_type stub_group_size;
6365 bfd_boolean stubs_always_before_branch;
6366 {
6367 asection **list = htab->input_list + htab->top_index;
6368 do
6369 {
6370 asection *tail = *list;
6371 if (tail == bfd_abs_section_ptr)
6372 continue;
6373 while (tail != NULL)
6374 {
6375 asection *curr;
6376 asection *prev;
6377 bfd_size_type total;
6378
6379 curr = tail;
6380 if (tail->_cooked_size)
6381 total = tail->_cooked_size;
6382 else
6383 total = tail->_raw_size;
6384 while ((prev = PREV_SEC (curr)) != NULL
6385 && ((total += curr->output_offset - prev->output_offset)
6386 < stub_group_size))
6387 curr = prev;
6388
6389 /* OK, the size from the start of CURR to the end is less
6390 than stub_group_size and thus can be handled by one stub
6391 section. (or the tail section is itself larger than
6392 stub_group_size, in which case we may be toast.) We
6393 should really be keeping track of the total size of stubs
6394 added here, as stubs contribute to the final output
6395 section size. That's a little tricky, and this way will
6396 only break if stubs added make the total size more than
6397 2^25, ie. for the default stub_group_size, if stubs total
6398 more than 2834432 bytes, or over 100000 plt call stubs. */
6399 do
6400 {
6401 prev = PREV_SEC (tail);
6402 /* Set up this stub group. */
6403 htab->stub_group[tail->id].link_sec = curr;
6404 }
6405 while (tail != curr && (tail = prev) != NULL);
6406
6407 /* But wait, there's more! Input sections up to stub_group_size
6408 bytes before the stub section can be handled by it too. */
6409 if (!stubs_always_before_branch)
6410 {
6411 total = 0;
6412 while (prev != NULL
6413 && ((total += tail->output_offset - prev->output_offset)
6414 < stub_group_size))
6415 {
6416 tail = prev;
6417 prev = PREV_SEC (tail);
6418 htab->stub_group[tail->id].link_sec = curr;
6419 }
6420 }
6421 tail = prev;
6422 }
6423 }
6424 while (list-- != htab->input_list);
6425 free (htab->input_list);
6426 #undef PREV_SEC
6427 }
6428
6429 /* Determine and set the size of the stub section for a final link.
6430
6431 The basic idea here is to examine all the relocations looking for
6432 PC-relative calls to a target that is unreachable with a "bl"
6433 instruction. */
6434
6435 bfd_boolean
6436 ppc64_elf_size_stubs (output_bfd, stub_bfd, info, group_size,
6437 add_stub_section, layout_sections_again)
6438 bfd *output_bfd;
6439 bfd *stub_bfd;
6440 struct bfd_link_info *info;
6441 bfd_signed_vma group_size;
6442 asection * (*add_stub_section) PARAMS ((const char *, asection *));
6443 void (*layout_sections_again) PARAMS ((void));
6444 {
6445 bfd_size_type stub_group_size;
6446 bfd_boolean stubs_always_before_branch;
6447 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6448
6449 /* Stash our params away. */
6450 htab->stub_bfd = stub_bfd;
6451 htab->add_stub_section = add_stub_section;
6452 htab->layout_sections_again = layout_sections_again;
6453 stubs_always_before_branch = group_size < 0;
6454 if (group_size < 0)
6455 stub_group_size = -group_size;
6456 else
6457 stub_group_size = group_size;
6458 if (stub_group_size == 1)
6459 {
6460 /* Default values. */
6461 stub_group_size = 30720000;
6462 if (htab->has_14bit_branch)
6463 stub_group_size = 30000;
6464 }
6465
6466 group_sections (htab, stub_group_size, stubs_always_before_branch);
6467
6468 while (1)
6469 {
6470 bfd *input_bfd;
6471 unsigned int bfd_indx;
6472 asection *stub_sec;
6473 bfd_boolean stub_changed;
6474
6475 htab->stub_iteration += 1;
6476 stub_changed = FALSE;
6477
6478 for (input_bfd = info->input_bfds, bfd_indx = 0;
6479 input_bfd != NULL;
6480 input_bfd = input_bfd->link_next, bfd_indx++)
6481 {
6482 Elf_Internal_Shdr *symtab_hdr;
6483 asection *section;
6484 Elf_Internal_Sym *local_syms = NULL;
6485
6486 /* We'll need the symbol table in a second. */
6487 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6488 if (symtab_hdr->sh_info == 0)
6489 continue;
6490
6491 /* Walk over each section attached to the input bfd. */
6492 for (section = input_bfd->sections;
6493 section != NULL;
6494 section = section->next)
6495 {
6496 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
6497
6498 /* If there aren't any relocs, then there's nothing more
6499 to do. */
6500 if ((section->flags & SEC_RELOC) == 0
6501 || section->reloc_count == 0)
6502 continue;
6503
6504 /* If this section is a link-once section that will be
6505 discarded, then don't create any stubs. */
6506 if (section->output_section == NULL
6507 || section->output_section->owner != output_bfd)
6508 continue;
6509
6510 /* Get the relocs. */
6511 internal_relocs
6512 = _bfd_elf64_link_read_relocs (input_bfd, section, NULL,
6513 (Elf_Internal_Rela *) NULL,
6514 info->keep_memory);
6515 if (internal_relocs == NULL)
6516 goto error_ret_free_local;
6517
6518 /* Now examine each relocation. */
6519 irela = internal_relocs;
6520 irelaend = irela + section->reloc_count;
6521 for (; irela < irelaend; irela++)
6522 {
6523 unsigned int r_type, r_indx;
6524 enum ppc_stub_type stub_type;
6525 struct ppc_stub_hash_entry *stub_entry;
6526 asection *sym_sec;
6527 bfd_vma sym_value;
6528 bfd_vma destination;
6529 struct ppc_link_hash_entry *hash;
6530 struct elf_link_hash_entry *h;
6531 Elf_Internal_Sym *sym;
6532 char *stub_name;
6533 const asection *id_sec;
6534
6535 r_type = ELF64_R_TYPE (irela->r_info);
6536 r_indx = ELF64_R_SYM (irela->r_info);
6537
6538 if (r_type >= (unsigned int) R_PPC64_max)
6539 {
6540 bfd_set_error (bfd_error_bad_value);
6541 goto error_ret_free_internal;
6542 }
6543
6544 /* Only look for stubs on branch instructions. */
6545 if (r_type != (unsigned int) R_PPC64_REL24
6546 && r_type != (unsigned int) R_PPC64_REL14
6547 && r_type != (unsigned int) R_PPC64_REL14_BRTAKEN
6548 && r_type != (unsigned int) R_PPC64_REL14_BRNTAKEN)
6549 continue;
6550
6551 /* Now determine the call target, its name, value,
6552 section. */
6553 destination = 0;
6554 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6555 r_indx, input_bfd))
6556 goto error_ret_free_internal;
6557 hash = (struct ppc_link_hash_entry *) h;
6558
6559 if (hash == NULL)
6560 {
6561 /* It's a local symbol. */
6562 sym_value = sym->st_value;
6563 destination = (sym_value + irela->r_addend
6564 + sym_sec->output_offset
6565 + sym_sec->output_section->vma);
6566 }
6567 else
6568 {
6569 /* It's an external symbol. */
6570 sym_value = 0;
6571 if (hash->elf.root.type == bfd_link_hash_defined
6572 || hash->elf.root.type == bfd_link_hash_defweak)
6573 {
6574 sym_value = hash->elf.root.u.def.value;
6575 if (sym_sec->output_section != NULL)
6576 destination = (sym_value + irela->r_addend
6577 + sym_sec->output_offset
6578 + sym_sec->output_section->vma);
6579 }
6580 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6581 ;
6582 else if (hash->elf.root.type == bfd_link_hash_undefined)
6583 ;
6584 else
6585 {
6586 bfd_set_error (bfd_error_bad_value);
6587 goto error_ret_free_internal;
6588 }
6589 }
6590
6591 /* Determine what (if any) linker stub is needed. */
6592 stub_type = ppc_type_of_stub (section, irela, &hash,
6593 destination);
6594 if (stub_type == ppc_stub_none)
6595 continue;
6596
6597 /* __tls_get_addr calls might be eliminated. */
6598 if (stub_type != ppc_stub_plt_call
6599 && hash != NULL
6600 && &hash->elf == htab->tls_get_addr
6601 && section->has_tls_reloc
6602 && irela != internal_relocs)
6603 {
6604 /* Get tls info. */
6605 char *tls_type;
6606
6607 if (!get_tls_type (&tls_type, &local_syms,
6608 irela - 1, input_bfd))
6609 goto error_ret_free_internal;
6610 if (tls_type != NULL
6611 && (*tls_type & (TLS_TLS | TLS_GD_LD)) == TLS_TLS)
6612 continue;
6613 }
6614
6615 /* Support for grouping stub sections. */
6616 id_sec = htab->stub_group[section->id].link_sec;
6617
6618 /* Get the name of this stub. */
6619 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
6620 if (!stub_name)
6621 goto error_ret_free_internal;
6622
6623 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
6624 stub_name, FALSE, FALSE);
6625 if (stub_entry != NULL)
6626 {
6627 /* The proper stub has already been created. */
6628 free (stub_name);
6629 continue;
6630 }
6631
6632 stub_entry = ppc_add_stub (stub_name, section, htab);
6633 if (stub_entry == NULL)
6634 {
6635 free (stub_name);
6636 error_ret_free_internal:
6637 if (elf_section_data (section)->relocs == NULL)
6638 free (internal_relocs);
6639 error_ret_free_local:
6640 if (local_syms != NULL
6641 && (symtab_hdr->contents
6642 != (unsigned char *) local_syms))
6643 free (local_syms);
6644 return FALSE;
6645 }
6646
6647 stub_entry->target_value = sym_value;
6648 stub_entry->target_section = sym_sec;
6649 stub_entry->stub_type = stub_type;
6650 stub_entry->h = hash;
6651 stub_entry->addend = irela->r_addend;
6652 stub_changed = TRUE;
6653 }
6654
6655 /* We're done with the internal relocs, free them. */
6656 if (elf_section_data (section)->relocs != internal_relocs)
6657 free (internal_relocs);
6658 }
6659
6660 if (local_syms != NULL
6661 && symtab_hdr->contents != (unsigned char *) local_syms)
6662 {
6663 if (!info->keep_memory)
6664 free (local_syms);
6665 else
6666 symtab_hdr->contents = (unsigned char *) local_syms;
6667 }
6668 }
6669
6670 if (!stub_changed)
6671 break;
6672
6673 /* OK, we've added some stubs. Find out the new size of the
6674 stub sections. */
6675 for (stub_sec = htab->stub_bfd->sections;
6676 stub_sec != NULL;
6677 stub_sec = stub_sec->next)
6678 {
6679 stub_sec->_raw_size = 0;
6680 stub_sec->_cooked_size = 0;
6681 }
6682 htab->sbrlt->_raw_size = 0;
6683 htab->sbrlt->_cooked_size = 0;
6684
6685 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, htab);
6686
6687 /* Ask the linker to do its stuff. */
6688 (*htab->layout_sections_again) ();
6689 }
6690
6691 /* It would be nice to strip .branch_lt from the output if the
6692 section is empty, but it's too late. If we strip sections here,
6693 the dynamic symbol table is corrupted since the section symbol
6694 for the stripped section isn't written. */
6695
6696 return TRUE;
6697 }
6698
6699 /* Called after we have determined section placement. If sections
6700 move, we'll be called again. Provide a value for TOCstart. */
6701
6702 bfd_vma
6703 ppc64_elf_toc (obfd)
6704 bfd *obfd;
6705 {
6706 asection *s;
6707 bfd_vma TOCstart;
6708
6709 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6710 order. The TOC starts where the first of these sections starts. */
6711 s = bfd_get_section_by_name (obfd, ".got");
6712 if (s == NULL)
6713 s = bfd_get_section_by_name (obfd, ".toc");
6714 if (s == NULL)
6715 s = bfd_get_section_by_name (obfd, ".tocbss");
6716 if (s == NULL)
6717 s = bfd_get_section_by_name (obfd, ".plt");
6718 if (s == NULL)
6719 {
6720 /* This may happen for
6721 o references to TOC base (SYM@toc / TOC[tc0]) without a
6722 .toc directive
6723 o bad linker script
6724 o --gc-sections and empty TOC sections
6725
6726 FIXME: Warn user? */
6727
6728 /* Look for a likely section. We probably won't even be
6729 using TOCstart. */
6730 for (s = obfd->sections; s != NULL; s = s->next)
6731 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
6732 == (SEC_ALLOC | SEC_SMALL_DATA))
6733 break;
6734 if (s == NULL)
6735 for (s = obfd->sections; s != NULL; s = s->next)
6736 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
6737 == (SEC_ALLOC | SEC_SMALL_DATA))
6738 break;
6739 if (s == NULL)
6740 for (s = obfd->sections; s != NULL; s = s->next)
6741 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
6742 break;
6743 if (s == NULL)
6744 for (s = obfd->sections; s != NULL; s = s->next)
6745 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
6746 break;
6747 }
6748
6749 TOCstart = 0;
6750 if (s != NULL)
6751 TOCstart = s->output_section->vma + s->output_offset;
6752
6753 return TOCstart;
6754 }
6755
6756 /* Build all the stubs associated with the current output file.
6757 The stubs are kept in a hash table attached to the main linker
6758 hash table. This function is called via gldelf64ppc_finish. */
6759
6760 bfd_boolean
6761 ppc64_elf_build_stubs (info)
6762 struct bfd_link_info *info;
6763 {
6764 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6765 asection *stub_sec;
6766 bfd_vma plt_r2;
6767 bfd_byte *p;
6768
6769 for (stub_sec = htab->stub_bfd->sections;
6770 stub_sec != NULL;
6771 stub_sec = stub_sec->next)
6772 {
6773 bfd_size_type size;
6774
6775 /* Allocate memory to hold the linker stubs. */
6776 size = stub_sec->_raw_size;
6777 if (size != 0)
6778 {
6779 stub_sec->contents = (bfd_byte *) bfd_zalloc (htab->stub_bfd, size);
6780 if (stub_sec->contents == NULL)
6781 return FALSE;
6782 }
6783 stub_sec->_cooked_size = 0;
6784 }
6785
6786 if (htab->splt != NULL)
6787 {
6788 unsigned int indx;
6789
6790 /* Build the .glink plt call stub. */
6791 plt_r2 = (htab->splt->output_offset
6792 + htab->splt->output_section->vma
6793 - elf_gp (htab->splt->output_section->owner)
6794 - TOC_BASE_OFF);
6795 p = htab->sglink->contents;
6796 p = build_plt_stub (htab->sglink->owner, p, (int) plt_r2, 1);
6797 while (p < htab->sglink->contents + GLINK_CALL_STUB_SIZE)
6798 {
6799 bfd_put_32 (htab->sglink->owner, NOP, p);
6800 p += 4;
6801 }
6802
6803 /* Build the .glink lazy link call stubs. */
6804 indx = 0;
6805 while (p < htab->sglink->contents + htab->sglink->_raw_size)
6806 {
6807 if (indx < 0x8000)
6808 {
6809 bfd_put_32 (htab->sglink->owner, LI_R0_0 | indx, p);
6810 p += 4;
6811 }
6812 else
6813 {
6814 bfd_put_32 (htab->sglink->owner, LIS_R0_0 | PPC_HI (indx), p);
6815 p += 4;
6816 bfd_put_32 (htab->sglink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
6817 p += 4;
6818 }
6819 bfd_put_32 (htab->sglink->owner,
6820 B_DOT | ((htab->sglink->contents - p) & 0x3fffffc), p);
6821 indx++;
6822 p += 4;
6823 }
6824 htab->sglink->_cooked_size = p - htab->sglink->contents;
6825 }
6826
6827 if (htab->sbrlt->_raw_size != 0)
6828 {
6829 htab->sbrlt->contents = (bfd_byte *) bfd_zalloc (htab->sbrlt->owner,
6830 htab->sbrlt->_raw_size);
6831 if (htab->sbrlt->contents == NULL)
6832 return FALSE;
6833 }
6834
6835 /* Build the stubs as directed by the stub hash table. */
6836 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
6837
6838 for (stub_sec = htab->stub_bfd->sections;
6839 stub_sec != NULL;
6840 stub_sec = stub_sec->next)
6841 {
6842 if (stub_sec->_raw_size != stub_sec->_cooked_size)
6843 break;
6844 }
6845
6846 if (stub_sec != NULL
6847 || htab->sglink->_raw_size != htab->sglink->_cooked_size)
6848 {
6849 htab->stub_error = TRUE;
6850 (*_bfd_error_handler) (_("stubs don't match calculated size"));
6851 }
6852
6853 return !htab->stub_error;
6854 }
6855
6856 /* The RELOCATE_SECTION function is called by the ELF backend linker
6857 to handle the relocations for a section.
6858
6859 The relocs are always passed as Rela structures; if the section
6860 actually uses Rel structures, the r_addend field will always be
6861 zero.
6862
6863 This function is responsible for adjust the section contents as
6864 necessary, and (if using Rela relocs and generating a
6865 relocateable output file) adjusting the reloc addend as
6866 necessary.
6867
6868 This function does not have to worry about setting the reloc
6869 address or the reloc symbol index.
6870
6871 LOCAL_SYMS is a pointer to the swapped in local symbols.
6872
6873 LOCAL_SECTIONS is an array giving the section in the input file
6874 corresponding to the st_shndx field of each local symbol.
6875
6876 The global hash table entry for the global symbols can be found
6877 via elf_sym_hashes (input_bfd).
6878
6879 When generating relocateable output, this function must handle
6880 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6881 going to be the section symbol corresponding to the output
6882 section, which means that the addend must be adjusted
6883 accordingly. */
6884
6885 static bfd_boolean
6886 ppc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
6887 contents, relocs, local_syms, local_sections)
6888 bfd *output_bfd;
6889 struct bfd_link_info *info;
6890 bfd *input_bfd;
6891 asection *input_section;
6892 bfd_byte *contents;
6893 Elf_Internal_Rela *relocs;
6894 Elf_Internal_Sym *local_syms;
6895 asection **local_sections;
6896 {
6897 struct ppc_link_hash_table *htab;
6898 Elf_Internal_Shdr *symtab_hdr;
6899 struct elf_link_hash_entry **sym_hashes;
6900 Elf_Internal_Rela *rel;
6901 Elf_Internal_Rela *relend;
6902 Elf_Internal_Rela outrel;
6903 bfd_byte *loc;
6904 unsigned int tls_get_addr_type;
6905 struct got_entry **local_got_ents;
6906 bfd_vma TOCstart;
6907 bfd_boolean ret = TRUE;
6908 bfd_boolean is_opd;
6909 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
6910 bfd_boolean is_power4 = FALSE;
6911
6912 if (info->relocateable)
6913 return TRUE;
6914
6915 /* Initialize howto table if needed. */
6916 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
6917 ppc_howto_init ();
6918
6919 htab = ppc_hash_table (info);
6920 if (info->shared && (htab->tlsld_got.offset & 1) == 0)
6921 {
6922 outrel.r_offset = (htab->sgot->output_section->vma
6923 + htab->sgot->output_offset
6924 + htab->tlsld_got.offset);
6925 outrel.r_info = ELF64_R_INFO (0, R_PPC64_DTPMOD64);
6926 outrel.r_addend = 0;
6927
6928 loc = htab->srelgot->contents;
6929 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
6930 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
6931 htab->tlsld_got.offset |= 1;
6932 }
6933
6934 local_got_ents = elf_local_got_ents (input_bfd);
6935 TOCstart = elf_gp (output_bfd);
6936 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6937 sym_hashes = elf_sym_hashes (input_bfd);
6938 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
6939
6940 tls_get_addr_type = 0;
6941 rel = relocs;
6942 relend = relocs + input_section->reloc_count;
6943 for (; rel < relend; rel++)
6944 {
6945 enum elf_ppc64_reloc_type r_type;
6946 bfd_vma addend;
6947 bfd_reloc_status_type r;
6948 Elf_Internal_Sym *sym;
6949 asection *sec;
6950 struct elf_link_hash_entry *h;
6951 struct elf_link_hash_entry *fdh;
6952 const char *sym_name;
6953 unsigned long r_symndx;
6954 char tls_type;
6955 bfd_vma relocation;
6956 bfd_boolean unresolved_reloc;
6957 bfd_boolean warned;
6958 long insn;
6959 struct ppc_stub_hash_entry *stub_entry;
6960 bfd_vma max_br_offset;
6961 bfd_vma from;
6962
6963 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
6964 r_symndx = ELF64_R_SYM (rel->r_info);
6965 r = bfd_reloc_other;
6966 sym = (Elf_Internal_Sym *) 0;
6967 sec = (asection *) 0;
6968 h = (struct elf_link_hash_entry *) 0;
6969 sym_name = (const char *) 0;
6970 unresolved_reloc = FALSE;
6971 warned = FALSE;
6972
6973 if (r_type == R_PPC64_TOC)
6974 {
6975 /* Relocation value is TOC base. Symbol is ignored. */
6976 relocation = TOCstart + TOC_BASE_OFF;
6977 }
6978 else if (r_symndx < symtab_hdr->sh_info)
6979 {
6980 /* It's a local symbol. */
6981 sym = local_syms + r_symndx;
6982 sec = local_sections[r_symndx];
6983 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
6984 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
6985 if (elf_section_data (sec) != NULL)
6986 {
6987 long *opd_sym_adjust;
6988
6989 opd_sym_adjust = ppc64_elf_section_data (sec)->opd.adjust;
6990 if (opd_sym_adjust != NULL && sym->st_value % 24 == 0)
6991 relocation += opd_sym_adjust[sym->st_value / 24];
6992 }
6993 }
6994 else
6995 {
6996 /* It's a global symbol. */
6997 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6998 while (h->root.type == bfd_link_hash_indirect
6999 || h->root.type == bfd_link_hash_warning)
7000 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7001 sym_name = h->root.root.string;
7002 relocation = 0;
7003 if (h->root.type == bfd_link_hash_defined
7004 || h->root.type == bfd_link_hash_defweak)
7005 {
7006 sec = h->root.u.def.section;
7007 if (sec->output_section == NULL)
7008 /* Set a flag that will be cleared later if we find a
7009 relocation value for this symbol. output_section
7010 is typically NULL for symbols satisfied by a shared
7011 library. */
7012 unresolved_reloc = TRUE;
7013 else
7014 relocation = (h->root.u.def.value
7015 + sec->output_section->vma
7016 + sec->output_offset);
7017 }
7018 else if (h->root.type == bfd_link_hash_undefweak)
7019 ;
7020 else if (info->shared
7021 && (!info->symbolic || info->allow_shlib_undefined)
7022 && !info->no_undefined
7023 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7024 ;
7025 else
7026 {
7027 if (! ((*info->callbacks->undefined_symbol)
7028 (info, h->root.root.string, input_bfd, input_section,
7029 rel->r_offset, (!info->shared
7030 || info->no_undefined
7031 || ELF_ST_VISIBILITY (h->other)))))
7032 return FALSE;
7033 warned = TRUE;
7034 }
7035 }
7036
7037 /* TLS optimizations. */
7038 tls_type = 0;
7039 if (IS_TLS_RELOC (r_type))
7040 {
7041 if (h != NULL)
7042 tls_type = ((struct ppc_link_hash_entry *) h)->tls_type;
7043 else if (local_got_ents != NULL)
7044 {
7045 char *lgot_types;
7046 lgot_types = (char *) (local_got_ents + symtab_hdr->sh_info);
7047 tls_type = lgot_types[r_symndx];
7048 }
7049 }
7050
7051 /* Ensure reloc mapping code below stays sane. */
7052 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7053 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7054 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7055 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7056 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7057 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7058 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7059 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7060 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7061 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7062 abort ();
7063 switch (r_type)
7064 {
7065 default:
7066 tls_get_addr_type = 0;
7067 break;
7068
7069 case R_PPC64_TOC16:
7070 case R_PPC64_TOC16_LO:
7071 case R_PPC64_TOC16_DS:
7072 case R_PPC64_TOC16_LO_DS:
7073 tls_get_addr_type = 0;
7074 {
7075 /* Check for toc tls entries. */
7076 char *toc_tls;
7077
7078 if (!get_tls_type (&toc_tls, &local_syms, rel, input_bfd))
7079 return FALSE;
7080
7081 if (toc_tls)
7082 {
7083 tls_type = *toc_tls;
7084 if (r_type == R_PPC64_TOC16_DS
7085 || r_type == R_PPC64_TOC16_LO_DS)
7086 goto toctprel;
7087 else
7088 tls_get_addr_type = tls_type;
7089 }
7090 }
7091 break;
7092
7093 case R_PPC64_GOT_TPREL16_DS:
7094 case R_PPC64_GOT_TPREL16_LO_DS:
7095 tls_get_addr_type = 0;
7096 toctprel:
7097 if (tls_type != 0
7098 && (tls_type & TLS_TPREL) == 0)
7099 {
7100 bfd_vma insn;
7101 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7102 insn &= 31 << 21;
7103 insn |= 0x3c0d0000; /* addis 0,13,0 */
7104 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7105 r_type = R_PPC64_TPREL16_HA;
7106 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7107 }
7108 break;
7109
7110 case R_PPC64_TLS:
7111 tls_get_addr_type = 0;
7112 if (tls_type == 0)
7113 {
7114 /* Check for toc tls entries. */
7115 char *toc_tls;
7116
7117 if (!get_tls_type (&toc_tls, &local_syms, rel, input_bfd))
7118 return FALSE;
7119
7120 if (toc_tls)
7121 tls_type = *toc_tls;
7122 }
7123 if (tls_type != 0
7124 && (tls_type & TLS_TPREL) == 0)
7125 {
7126 bfd_vma insn, rtra;
7127 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7128 if ((insn & ((31 << 26) | (31 << 11)))
7129 == ((31 << 26) | (13 << 11)))
7130 rtra = insn & ((1 << 26) - (1 << 16));
7131 else if ((insn & ((31 << 26) | (31 << 16)))
7132 == ((31 << 26) | (13 << 16)))
7133 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7134 else
7135 abort ();
7136 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7137 /* add -> addi. */
7138 insn = 14 << 26;
7139 else if ((insn & (31 << 1)) == 23 << 1
7140 && ((insn & (31 << 6)) < 14 << 6
7141 || ((insn & (31 << 6)) >= 16 << 6
7142 && (insn & (31 << 6)) < 24 << 6)))
7143 /* load and store indexed -> dform. */
7144 insn = (32 | ((insn >> 6) & 31)) << 26;
7145 else if ((insn & (31 << 1)) == 21 << 1
7146 && (insn & (0x1a << 6)) == 0)
7147 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7148 insn = (((58 | ((insn >> 6) & 4)) << 26)
7149 | ((insn >> 6) & 1));
7150 else if ((insn & (31 << 1)) == 21 << 1
7151 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7152 /* lwax -> lwa. */
7153 insn = (58 << 26) | 2;
7154 else
7155 abort ();
7156 insn |= rtra;
7157 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7158 r_type = R_PPC64_TPREL16_LO;
7159 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7160 /* Was PPC64_TLS which sits on insn boundary, now
7161 PPC64_TPREL16_LO which is at insn+2. */
7162 rel->r_offset += 2;
7163 }
7164 break;
7165
7166 case R_PPC64_GOT_TLSGD16:
7167 case R_PPC64_GOT_TLSGD16_LO:
7168 case R_PPC64_GOT_TLSGD16_HI:
7169 case R_PPC64_GOT_TLSGD16_HA:
7170 case R_PPC64_GOT_TLSLD16:
7171 case R_PPC64_GOT_TLSLD16_LO:
7172 case R_PPC64_GOT_TLSLD16_HI:
7173 case R_PPC64_GOT_TLSLD16_HA:
7174 tls_get_addr_type = 0;
7175 if (tls_type != 0 && (tls_type & TLS_GD_LD) == 0)
7176 {
7177 if (r_type == R_PPC64_GOT_TLSGD16_HI
7178 || r_type == R_PPC64_GOT_TLSGD16_HA
7179 || r_type == R_PPC64_GOT_TLSLD16_HI
7180 || r_type == R_PPC64_GOT_TLSLD16_HA)
7181 {
7182 if ((tls_type & TLS_LD) != 0)
7183 {
7184 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7185 r_type = R_PPC64_NONE;
7186 rel->r_offset -= 2;
7187 }
7188 else
7189 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7190 + R_PPC64_GOT_TPREL16_DS);
7191 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7192 break;
7193 }
7194
7195 /* This reloc and its instruction will be replaced so there's
7196 not much point in doing anything more here. We know the
7197 next reloc will be a REL24 to __tls_get_addr, and will
7198 be handled below. */
7199 tls_get_addr_type = tls_type;
7200 continue;
7201 }
7202 break;
7203
7204 case R_PPC64_REL14:
7205 case R_PPC64_REL14_BRTAKEN:
7206 case R_PPC64_REL14_BRNTAKEN:
7207 case R_PPC64_REL24:
7208 if (h != NULL
7209 && h == htab->tls_get_addr
7210 && tls_get_addr_type != 0
7211 && (tls_get_addr_type & TLS_GD_LD) == 0)
7212 {
7213 /* Replace the call. */
7214 bfd_vma insn1, insn2, insn3;
7215 bfd_vma offset = rel->r_offset;
7216
7217 insn1 = bfd_get_32 (output_bfd, contents + rel[-1].r_offset - 2);
7218 insn3 = bfd_get_32 (output_bfd, contents + offset + 4);
7219 if (tls_get_addr_type & TLS_TPREL)
7220 {
7221 /* IE */
7222 insn1 &= (1 << 26) - (1 << 2);
7223 insn1 |= 58 << 26; /* ld */
7224 insn2 = 0x7c636a14; /* add 3,3,13 */
7225 /* Fix the relocs for --emit-relocs. */
7226 r_type = ELF64_R_TYPE (rel[-1].r_info);
7227 if (tls_get_addr_type & TLS_EXPLICIT)
7228 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7229 else
7230 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7231 + R_PPC64_GOT_TPREL16_DS);
7232 rel[-1].r_info
7233 = ELF64_R_INFO (ELF64_R_SYM (rel[-1].r_info), r_type);
7234 rel->r_info = 0;
7235 }
7236 else
7237 {
7238 /* LE */
7239 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7240 insn2 = 0x38630000; /* addi 3,3,0 */
7241 if (tls_get_addr_type & TLS_LD)
7242 {
7243 r_symndx = 0;
7244 rel[-1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
7245 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
7246 }
7247 else
7248 r_symndx = ELF64_R_SYM (rel[-1].r_info);
7249 rel[-1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_TPREL16_HA);
7250 rel->r_info = ELF64_R_INFO (r_symndx, R_PPC64_TPREL16_LO);
7251 rel->r_offset += 2;
7252 }
7253 if (insn3 == NOP
7254 || insn3 == CROR_151515 || insn3 == CROR_313131)
7255 {
7256 insn3 = insn2;
7257 insn2 = NOP;
7258 rel->r_offset += 4;
7259 }
7260 bfd_put_32 (output_bfd, insn1, contents + rel[-1].r_offset - 2);
7261 bfd_put_32 (output_bfd, insn2, contents + offset);
7262 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7263 /* Do the relocs again. */
7264 rel -= 2;
7265 tls_get_addr_type = 0;
7266 continue;
7267 }
7268 tls_get_addr_type = 0;
7269 break;
7270
7271 case R_PPC64_DTPMOD64:
7272 if ((tls_type & TLS_GD_LD) == 0)
7273 {
7274 if ((tls_type & TLS_TPREL) != 0)
7275 r_type = R_PPC64_TPREL64;
7276 else
7277 {
7278 bfd_put_64 (output_bfd, (bfd_vma) 1,
7279 contents + rel->r_offset);
7280 r_type = R_PPC64_NONE;
7281 }
7282 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7283 if ((tls_type & TLS_LD) == 0)
7284 rel[1].r_info = 0;
7285 }
7286 break;
7287
7288 case R_PPC64_TPREL64:
7289 if ((tls_type & TLS_TPREL) == 0)
7290 {
7291 r_type = R_PPC64_NONE;
7292 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7293 }
7294 break;
7295 }
7296
7297 /* Handle other relocations that tweak non-addend part of insn. */
7298 insn = 0;
7299 switch (r_type)
7300 {
7301 default:
7302 break;
7303
7304 /* Branch taken prediction relocations. */
7305 case R_PPC64_ADDR14_BRTAKEN:
7306 case R_PPC64_REL14_BRTAKEN:
7307 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7308 /* Fall thru. */
7309
7310 /* Branch not taken prediction relocations. */
7311 case R_PPC64_ADDR14_BRNTAKEN:
7312 case R_PPC64_REL14_BRNTAKEN:
7313 insn |= bfd_get_32 (output_bfd,
7314 contents + rel->r_offset) & ~(0x01 << 21);
7315 if (is_power4)
7316 {
7317 /* Set 'a' bit. This is 0b00010 in BO field for branch
7318 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7319 for branch on CTR insns (BO == 1a00t or 1a01t). */
7320 if ((insn & (0x14 << 21)) == (0x04 << 21))
7321 insn |= 0x02 << 21;
7322 else if ((insn & (0x14 << 21)) == (0x10 << 21))
7323 insn |= 0x08 << 21;
7324 else
7325 break;
7326 }
7327 else
7328 {
7329 from = (rel->r_offset
7330 + input_section->output_offset
7331 + input_section->output_section->vma);
7332
7333 /* Invert 'y' bit if not the default. */
7334 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7335 insn ^= 0x01 << 21;
7336 }
7337
7338 bfd_put_32 (output_bfd, (bfd_vma) insn, contents + rel->r_offset);
7339 break;
7340
7341 case R_PPC64_REL24:
7342 /* A REL24 branching to a linkage function is followed by a
7343 nop. We replace the nop with a ld in order to restore
7344 the TOC base pointer. Only calls to shared objects need
7345 to alter the TOC base. These are recognized by their
7346 need for a PLT entry. */
7347 if (h != NULL
7348 && (fdh = ((struct ppc_link_hash_entry *) h)->oh) != NULL
7349 && fdh->plt.plist != NULL
7350 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7351 rel, htab)) != NULL)
7352 {
7353 bfd_boolean can_plt_call = 0;
7354
7355 if (rel->r_offset + 8 <= input_section->_cooked_size)
7356 {
7357 insn = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
7358 if (insn == NOP
7359 || insn == CROR_151515 || insn == CROR_313131)
7360 {
7361 bfd_put_32 (input_bfd, (bfd_vma) LD_R2_40R1,
7362 contents + rel->r_offset + 4);
7363 can_plt_call = 1;
7364 }
7365 }
7366
7367 if (!can_plt_call)
7368 {
7369 /* If this is a plain branch rather than a branch
7370 and link, don't require a nop. */
7371 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7372 if ((insn & 1) == 0)
7373 can_plt_call = 1;
7374 }
7375
7376 if (can_plt_call)
7377 {
7378 relocation = (stub_entry->stub_offset
7379 + stub_entry->stub_sec->output_offset
7380 + stub_entry->stub_sec->output_section->vma);
7381 unresolved_reloc = FALSE;
7382 }
7383 }
7384
7385 if (h != NULL
7386 && h->root.type == bfd_link_hash_undefweak
7387 && relocation == 0
7388 && rel->r_addend == 0)
7389 {
7390 /* Tweak calls to undefined weak functions to point at a
7391 blr. We can thus call a weak function without first
7392 checking whether the function is defined. We have a
7393 blr at the end of .sfpr. */
7394 BFD_ASSERT (htab->sfpr->_raw_size != 0);
7395 relocation = (htab->sfpr->_raw_size - 4
7396 + htab->sfpr->output_offset
7397 + htab->sfpr->output_section->vma);
7398 from = (rel->r_offset
7399 + input_section->output_offset
7400 + input_section->output_section->vma);
7401
7402 /* But let's not be silly about it. If the blr isn't in
7403 reach, just go to the next instruction. */
7404 if (relocation - from + (1 << 25) >= (1 << 26)
7405 || htab->sfpr->_raw_size == 0)
7406 relocation = from + 4;
7407 }
7408 break;
7409 }
7410
7411 /* Set `addend'. */
7412 tls_type = 0;
7413 addend = rel->r_addend;
7414 switch (r_type)
7415 {
7416 default:
7417 (*_bfd_error_handler)
7418 (_("%s: unknown relocation type %d for symbol %s"),
7419 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
7420
7421 bfd_set_error (bfd_error_bad_value);
7422 ret = FALSE;
7423 continue;
7424
7425 case R_PPC64_NONE:
7426 case R_PPC64_TLS:
7427 case R_PPC64_GNU_VTINHERIT:
7428 case R_PPC64_GNU_VTENTRY:
7429 continue;
7430
7431 /* GOT16 relocations. Like an ADDR16 using the symbol's
7432 address in the GOT as relocation value instead of the
7433 symbol's value itself. Also, create a GOT entry for the
7434 symbol and put the symbol value there. */
7435 case R_PPC64_GOT_TLSGD16:
7436 case R_PPC64_GOT_TLSGD16_LO:
7437 case R_PPC64_GOT_TLSGD16_HI:
7438 case R_PPC64_GOT_TLSGD16_HA:
7439 tls_type = TLS_TLS | TLS_GD_LD;
7440 goto dogot;
7441
7442 case R_PPC64_GOT_TLSLD16:
7443 case R_PPC64_GOT_TLSLD16_LO:
7444 case R_PPC64_GOT_TLSLD16_HI:
7445 case R_PPC64_GOT_TLSLD16_HA:
7446 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
7447 goto dogot;
7448
7449 case R_PPC64_GOT_TPREL16_DS:
7450 case R_PPC64_GOT_TPREL16_LO_DS:
7451 case R_PPC64_GOT_TPREL16_HI:
7452 case R_PPC64_GOT_TPREL16_HA:
7453 tls_type = TLS_TLS | TLS_TPREL;
7454 goto dogot;
7455
7456 case R_PPC64_GOT_DTPREL16_DS:
7457 case R_PPC64_GOT_DTPREL16_LO_DS:
7458 case R_PPC64_GOT_DTPREL16_HI:
7459 case R_PPC64_GOT_DTPREL16_HA:
7460 tls_type = TLS_TLS | TLS_DTPREL;
7461 goto dogot;
7462
7463 case R_PPC64_GOT16:
7464 case R_PPC64_GOT16_LO:
7465 case R_PPC64_GOT16_HI:
7466 case R_PPC64_GOT16_HA:
7467 case R_PPC64_GOT16_DS:
7468 case R_PPC64_GOT16_LO_DS:
7469 dogot:
7470 {
7471 /* Relocation is to the entry for this symbol in the global
7472 offset table. */
7473 struct got_entry *ent;
7474 bfd_vma off;
7475 unsigned long indx;
7476
7477 if (htab->sgot == NULL)
7478 abort ();
7479
7480 if (h != NULL)
7481 ent = h->got.glist;
7482 else
7483 {
7484 if (local_got_ents == NULL)
7485 abort ();
7486 ent = local_got_ents[r_symndx];
7487 }
7488
7489 for (; ent != NULL; ent = ent->next)
7490 if (ent->addend == rel->r_addend
7491 && ent->tls_type == tls_type)
7492 break;
7493 if (ent == NULL)
7494 abort ();
7495
7496 off = ent->got.offset;
7497 indx = 0;
7498 if (h != NULL)
7499 {
7500 bfd_boolean dyn = htab->elf.dynamic_sections_created;
7501 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
7502 || (info->shared
7503 && (info->symbolic
7504 || h->dynindx == -1
7505 || (h->elf_link_hash_flags
7506 & ELF_LINK_FORCED_LOCAL))
7507 && (h->elf_link_hash_flags
7508 & ELF_LINK_HASH_DEF_REGULAR)))
7509 /* This is actually a static link, or it is a
7510 -Bsymbolic link and the symbol is defined
7511 locally, or the symbol was forced to be local
7512 because of a version file. */
7513 ;
7514 else
7515 {
7516 indx = h->dynindx;
7517 unresolved_reloc = FALSE;
7518 }
7519 }
7520
7521 /* The offset must always be a multiple of 8. We use the
7522 least significant bit to record whether we have already
7523 processed this entry. */
7524 if ((off & 1) != 0)
7525 off &= ~1;
7526 else
7527 {
7528 /* Generate relocs for the dynamic linker, except in
7529 the case of TLSLD where we'll use one entry per
7530 module. */
7531 if ((info->shared || indx != 0)
7532 && ent->tls_type != (TLS_TLS | TLS_GD_LD | TLS_LD))
7533 {
7534 outrel.r_offset = (htab->sgot->output_section->vma
7535 + htab->sgot->output_offset
7536 + off);
7537 if (ent->tls_type == (TLS_TLS | TLS_GD_LD))
7538 {
7539 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
7540 outrel.r_addend = 0;
7541 loc = htab->srelgot->contents;
7542 loc += (htab->srelgot->reloc_count++
7543 * sizeof (Elf64_External_Rela));
7544 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7545 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7546 outrel.r_offset += 8;
7547 }
7548 else if (ent->tls_type == (TLS_TLS | TLS_DTPREL))
7549 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7550 else if (ent->tls_type == (TLS_TLS | TLS_TPREL))
7551 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
7552 else if (indx == 0)
7553 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
7554 else
7555 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
7556 outrel.r_addend = ent->addend;
7557 if (indx == 0)
7558 outrel.r_addend += relocation;
7559 loc = htab->srelgot->contents;
7560 loc += (htab->srelgot->reloc_count++
7561 * sizeof (Elf64_External_Rela));
7562 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7563 }
7564
7565 /* Init the .got section contents if we're not
7566 emitting a reloc. */
7567 if (!(info->shared || indx != 0))
7568 {
7569
7570 relocation += ent->addend;
7571 if ((tls_type & TLS_TLS) != 0)
7572 {
7573 relocation -= htab->tls_sec->vma + DTP_OFFSET;
7574 if ((tls_type & TLS_TPREL) != 0)
7575 relocation += DTP_OFFSET - TP_OFFSET;
7576 }
7577
7578 if ((tls_type & TLS_GD_LD) != 0)
7579 {
7580 if ((tls_type & TLS_LD) != 0)
7581 relocation = - DTP_OFFSET;
7582 bfd_put_64 (output_bfd, relocation,
7583 htab->sgot->contents + off + 8);
7584 relocation = 1;
7585 }
7586 bfd_put_64 (output_bfd, relocation,
7587 htab->sgot->contents + off);
7588 }
7589 ent->got.offset |= 1;
7590 }
7591
7592 if (off >= (bfd_vma) -2)
7593 abort ();
7594
7595 relocation = htab->sgot->output_offset + off;
7596
7597 /* TOC base (r2) is TOC start plus 0x8000. */
7598 addend = - TOC_BASE_OFF;
7599 }
7600 break;
7601
7602 case R_PPC64_PLT16_HA:
7603 case R_PPC64_PLT16_HI:
7604 case R_PPC64_PLT16_LO:
7605 case R_PPC64_PLT32:
7606 case R_PPC64_PLT64:
7607 /* Relocation is to the entry for this symbol in the
7608 procedure linkage table. */
7609
7610 /* Resolve a PLT reloc against a local symbol directly,
7611 without using the procedure linkage table. */
7612 if (h == NULL)
7613 break;
7614
7615 /* It's possible that we didn't make a PLT entry for this
7616 symbol. This happens when statically linking PIC code,
7617 or when using -Bsymbolic. Go find a match if there is a
7618 PLT entry. */
7619 if (htab->splt != NULL)
7620 {
7621 struct plt_entry *ent;
7622 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7623 if (ent->addend == rel->r_addend
7624 && ent->plt.offset != (bfd_vma) -1)
7625 {
7626 relocation = (htab->splt->output_section->vma
7627 + htab->splt->output_offset
7628 + ent->plt.offset);
7629 unresolved_reloc = FALSE;
7630 }
7631 }
7632 break;
7633
7634 /* TOC16 relocs. We want the offset relative to the TOC base,
7635 which is the address of the start of the TOC plus 0x8000.
7636 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7637 in this order. */
7638 case R_PPC64_TOC16:
7639 case R_PPC64_TOC16_LO:
7640 case R_PPC64_TOC16_HI:
7641 case R_PPC64_TOC16_DS:
7642 case R_PPC64_TOC16_LO_DS:
7643 case R_PPC64_TOC16_HA:
7644 addend -= TOCstart + TOC_BASE_OFF;
7645 break;
7646
7647 /* Relocate against the beginning of the section. */
7648 case R_PPC64_SECTOFF:
7649 case R_PPC64_SECTOFF_LO:
7650 case R_PPC64_SECTOFF_HI:
7651 case R_PPC64_SECTOFF_DS:
7652 case R_PPC64_SECTOFF_LO_DS:
7653 case R_PPC64_SECTOFF_HA:
7654 if (sec != (asection *) 0)
7655 addend -= sec->output_section->vma;
7656 break;
7657
7658 case R_PPC64_REL14:
7659 case R_PPC64_REL14_BRNTAKEN:
7660 case R_PPC64_REL14_BRTAKEN:
7661 case R_PPC64_REL24:
7662 break;
7663
7664 case R_PPC64_TPREL16:
7665 case R_PPC64_TPREL16_LO:
7666 case R_PPC64_TPREL16_HI:
7667 case R_PPC64_TPREL16_HA:
7668 case R_PPC64_TPREL16_DS:
7669 case R_PPC64_TPREL16_LO_DS:
7670 case R_PPC64_TPREL16_HIGHER:
7671 case R_PPC64_TPREL16_HIGHERA:
7672 case R_PPC64_TPREL16_HIGHEST:
7673 case R_PPC64_TPREL16_HIGHESTA:
7674 addend -= htab->tls_sec->vma + TP_OFFSET;
7675 if (info->shared)
7676 /* The TPREL16 relocs shouldn't really be used in shared
7677 libs as they will result in DT_TEXTREL being set, but
7678 support them anyway. */
7679 goto dodyn;
7680 break;
7681
7682 case R_PPC64_DTPREL16:
7683 case R_PPC64_DTPREL16_LO:
7684 case R_PPC64_DTPREL16_HI:
7685 case R_PPC64_DTPREL16_HA:
7686 case R_PPC64_DTPREL16_DS:
7687 case R_PPC64_DTPREL16_LO_DS:
7688 case R_PPC64_DTPREL16_HIGHER:
7689 case R_PPC64_DTPREL16_HIGHERA:
7690 case R_PPC64_DTPREL16_HIGHEST:
7691 case R_PPC64_DTPREL16_HIGHESTA:
7692 addend -= htab->tls_sec->vma + DTP_OFFSET;
7693 break;
7694
7695 case R_PPC64_TPREL64:
7696 addend -= htab->tls_sec->vma + TP_OFFSET;
7697 goto dodyn;
7698
7699 case R_PPC64_DTPREL64:
7700 addend -= htab->tls_sec->vma + DTP_OFFSET;
7701 /* Fall thru */
7702
7703 /* Relocations that may need to be propagated if this is a
7704 dynamic object. */
7705 case R_PPC64_DTPMOD64:
7706 case R_PPC64_REL30:
7707 case R_PPC64_REL32:
7708 case R_PPC64_REL64:
7709 case R_PPC64_ADDR14:
7710 case R_PPC64_ADDR14_BRNTAKEN:
7711 case R_PPC64_ADDR14_BRTAKEN:
7712 case R_PPC64_ADDR16:
7713 case R_PPC64_ADDR16_DS:
7714 case R_PPC64_ADDR16_HA:
7715 case R_PPC64_ADDR16_HI:
7716 case R_PPC64_ADDR16_HIGHER:
7717 case R_PPC64_ADDR16_HIGHERA:
7718 case R_PPC64_ADDR16_HIGHEST:
7719 case R_PPC64_ADDR16_HIGHESTA:
7720 case R_PPC64_ADDR16_LO:
7721 case R_PPC64_ADDR16_LO_DS:
7722 case R_PPC64_ADDR24:
7723 case R_PPC64_ADDR32:
7724 case R_PPC64_ADDR64:
7725 case R_PPC64_UADDR16:
7726 case R_PPC64_UADDR32:
7727 case R_PPC64_UADDR64:
7728 /* r_symndx will be zero only for relocs against symbols
7729 from removed linkonce sections, or sections discarded by
7730 a linker script. */
7731 dodyn:
7732 if (r_symndx == 0)
7733 break;
7734 /* Fall thru. */
7735
7736 case R_PPC64_TOC:
7737 if ((input_section->flags & SEC_ALLOC) == 0)
7738 break;
7739
7740 if (NO_OPD_RELOCS && is_opd)
7741 break;
7742
7743 if ((info->shared
7744 && (MUST_BE_DYN_RELOC (r_type)
7745 || (h != NULL
7746 && h->dynindx != -1
7747 && (! info->symbolic
7748 || (h->elf_link_hash_flags
7749 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
7750 || (!info->shared
7751 && h != NULL
7752 && h->dynindx != -1
7753 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
7754 && (((h->elf_link_hash_flags
7755 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
7756 && (h->elf_link_hash_flags
7757 & ELF_LINK_HASH_DEF_REGULAR) == 0)
7758 || h->root.type == bfd_link_hash_undefweak
7759 || h->root.type == bfd_link_hash_undefined)))
7760 {
7761 Elf_Internal_Rela outrel;
7762 bfd_boolean skip, relocate;
7763 asection *sreloc;
7764 bfd_byte *loc;
7765
7766 /* When generating a dynamic object, these relocations
7767 are copied into the output file to be resolved at run
7768 time. */
7769
7770 skip = FALSE;
7771 relocate = FALSE;
7772
7773 outrel.r_offset =
7774 _bfd_elf_section_offset (output_bfd, info, input_section,
7775 rel->r_offset);
7776 if (outrel.r_offset == (bfd_vma) -1)
7777 skip = TRUE;
7778 else if (outrel.r_offset == (bfd_vma) -2)
7779 skip = TRUE, relocate = TRUE;
7780 outrel.r_offset += (input_section->output_section->vma
7781 + input_section->output_offset);
7782 outrel.r_addend = rel->r_addend;
7783
7784 if (skip)
7785 memset (&outrel, 0, sizeof outrel);
7786 else if (h != NULL
7787 && h->dynindx != -1
7788 && !is_opd
7789 && (!MUST_BE_DYN_RELOC (r_type)
7790 || !info->shared
7791 || !info->symbolic
7792 || (h->elf_link_hash_flags
7793 & ELF_LINK_HASH_DEF_REGULAR) == 0))
7794 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
7795 else
7796 {
7797 /* This symbol is local, or marked to become local,
7798 or this is an opd section reloc which must point
7799 at a local function. */
7800 outrel.r_addend += relocation;
7801 /* ??? why? */
7802 relocate = TRUE;
7803 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
7804 {
7805 if (is_opd && h != NULL)
7806 {
7807 /* Lie about opd entries. This case occurs
7808 when building shared libraries and we
7809 reference a function in another shared
7810 lib. The same thing happens for a weak
7811 definition in an application that's
7812 overridden by a strong definition in a
7813 shared lib. (I believe this is a generic
7814 bug in binutils handling of weak syms.)
7815 In these cases we won't use the opd
7816 entry in this lib. */
7817 unresolved_reloc = FALSE;
7818 }
7819 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
7820 }
7821 else
7822 {
7823 long indx = 0;
7824
7825 if (bfd_is_abs_section (sec))
7826 ;
7827 else if (sec == NULL || sec->owner == NULL)
7828 {
7829 bfd_set_error (bfd_error_bad_value);
7830 return FALSE;
7831 }
7832 else
7833 {
7834 asection *osec;
7835
7836 osec = sec->output_section;
7837 indx = elf_section_data (osec)->dynindx;
7838
7839 /* We are turning this relocation into one
7840 against a section symbol, so subtract out
7841 the output section's address but not the
7842 offset of the input section in the output
7843 section. */
7844 outrel.r_addend -= osec->vma;
7845 }
7846
7847 outrel.r_info = ELF64_R_INFO (indx, r_type);
7848 }
7849 }
7850
7851 sreloc = elf_section_data (input_section)->sreloc;
7852 if (sreloc == NULL)
7853 abort ();
7854
7855 loc = sreloc->contents;
7856 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
7857 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7858
7859 /* If this reloc is against an external symbol, it will
7860 be computed at runtime, so there's no need to do
7861 anything now. */
7862 if (! relocate)
7863 continue;
7864 }
7865 break;
7866
7867 case R_PPC64_COPY:
7868 case R_PPC64_GLOB_DAT:
7869 case R_PPC64_JMP_SLOT:
7870 case R_PPC64_RELATIVE:
7871 /* We shouldn't ever see these dynamic relocs in relocatable
7872 files. */
7873 /* Fall thru */
7874
7875 case R_PPC64_PLTGOT16:
7876 case R_PPC64_PLTGOT16_DS:
7877 case R_PPC64_PLTGOT16_HA:
7878 case R_PPC64_PLTGOT16_HI:
7879 case R_PPC64_PLTGOT16_LO:
7880 case R_PPC64_PLTGOT16_LO_DS:
7881 case R_PPC64_PLTREL32:
7882 case R_PPC64_PLTREL64:
7883 /* These ones haven't been implemented yet. */
7884
7885 (*_bfd_error_handler)
7886 (_("%s: Relocation %s is not supported for symbol %s."),
7887 bfd_archive_filename (input_bfd),
7888 ppc64_elf_howto_table[(int) r_type]->name, sym_name);
7889
7890 bfd_set_error (bfd_error_invalid_operation);
7891 ret = FALSE;
7892 continue;
7893 }
7894
7895 /* Do any further special processing. */
7896 switch (r_type)
7897 {
7898 default:
7899 break;
7900
7901 case R_PPC64_ADDR16_HA:
7902 case R_PPC64_ADDR16_HIGHERA:
7903 case R_PPC64_ADDR16_HIGHESTA:
7904 case R_PPC64_GOT16_HA:
7905 case R_PPC64_PLTGOT16_HA:
7906 case R_PPC64_PLT16_HA:
7907 case R_PPC64_TOC16_HA:
7908 case R_PPC64_SECTOFF_HA:
7909 case R_PPC64_TPREL16_HA:
7910 case R_PPC64_DTPREL16_HA:
7911 case R_PPC64_GOT_TLSGD16_HA:
7912 case R_PPC64_GOT_TLSLD16_HA:
7913 case R_PPC64_GOT_TPREL16_HA:
7914 case R_PPC64_GOT_DTPREL16_HA:
7915 case R_PPC64_TPREL16_HIGHER:
7916 case R_PPC64_TPREL16_HIGHERA:
7917 case R_PPC64_TPREL16_HIGHEST:
7918 case R_PPC64_TPREL16_HIGHESTA:
7919 case R_PPC64_DTPREL16_HIGHER:
7920 case R_PPC64_DTPREL16_HIGHERA:
7921 case R_PPC64_DTPREL16_HIGHEST:
7922 case R_PPC64_DTPREL16_HIGHESTA:
7923 /* It's just possible that this symbol is a weak symbol
7924 that's not actually defined anywhere. In that case,
7925 'sec' would be NULL, and we should leave the symbol
7926 alone (it will be set to zero elsewhere in the link). */
7927 if (sec != NULL)
7928 /* Add 0x10000 if sign bit in 0:15 is set. */
7929 addend += ((relocation + addend) & 0x8000) << 1;
7930 break;
7931
7932 case R_PPC64_ADDR16_DS:
7933 case R_PPC64_ADDR16_LO_DS:
7934 case R_PPC64_GOT16_DS:
7935 case R_PPC64_GOT16_LO_DS:
7936 case R_PPC64_PLT16_LO_DS:
7937 case R_PPC64_SECTOFF_DS:
7938 case R_PPC64_SECTOFF_LO_DS:
7939 case R_PPC64_TOC16_DS:
7940 case R_PPC64_TOC16_LO_DS:
7941 case R_PPC64_PLTGOT16_DS:
7942 case R_PPC64_PLTGOT16_LO_DS:
7943 case R_PPC64_GOT_TPREL16_DS:
7944 case R_PPC64_GOT_TPREL16_LO_DS:
7945 case R_PPC64_GOT_DTPREL16_DS:
7946 case R_PPC64_GOT_DTPREL16_LO_DS:
7947 case R_PPC64_TPREL16_DS:
7948 case R_PPC64_TPREL16_LO_DS:
7949 case R_PPC64_DTPREL16_DS:
7950 case R_PPC64_DTPREL16_LO_DS:
7951 if (((relocation + addend) & 3) != 0)
7952 {
7953 (*_bfd_error_handler)
7954 (_("%s: error: relocation %s not a multiple of 4"),
7955 bfd_archive_filename (input_bfd),
7956 ppc64_elf_howto_table[(int) r_type]->name);
7957 bfd_set_error (bfd_error_bad_value);
7958 ret = FALSE;
7959 continue;
7960 }
7961 break;
7962
7963 case R_PPC64_REL14:
7964 case R_PPC64_REL14_BRNTAKEN:
7965 case R_PPC64_REL14_BRTAKEN:
7966 max_br_offset = 1 << 15;
7967 goto branch_check;
7968
7969 case R_PPC64_REL24:
7970 max_br_offset = 1 << 25;
7971
7972 branch_check:
7973 /* If the branch is out of reach, then redirect the
7974 call to the local stub for this function. */
7975 from = (rel->r_offset
7976 + input_section->output_offset
7977 + input_section->output_section->vma);
7978 if (relocation + addend - from + max_br_offset >= 2 * max_br_offset
7979 && (stub_entry = ppc_get_stub_entry (input_section, sec, h,
7980 rel, htab)) != NULL)
7981 {
7982 /* Munge up the value and addend so that we call the stub
7983 rather than the procedure directly. */
7984 relocation = (stub_entry->stub_offset
7985 + stub_entry->stub_sec->output_offset
7986 + stub_entry->stub_sec->output_section->vma);
7987 addend = 0;
7988 }
7989 break;
7990 }
7991
7992 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
7993 because such sections are not SEC_ALLOC and thus ld.so will
7994 not process them. */
7995 if (unresolved_reloc
7996 && !((input_section->flags & SEC_DEBUGGING) != 0
7997 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
7998 {
7999 (*_bfd_error_handler)
8000 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
8001 bfd_archive_filename (input_bfd),
8002 bfd_get_section_name (input_bfd, input_section),
8003 (long) rel->r_offset,
8004 h->root.root.string);
8005 ret = FALSE;
8006 }
8007
8008 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
8009 input_bfd,
8010 input_section,
8011 contents,
8012 rel->r_offset,
8013 relocation,
8014 addend);
8015
8016 if (r != bfd_reloc_ok)
8017 {
8018 const char *name;
8019
8020 if (h != NULL)
8021 {
8022 if (h->root.type == bfd_link_hash_undefweak
8023 && ppc64_elf_howto_table[(int) r_type]->pc_relative)
8024 {
8025 /* Assume this is a call protected by other code that
8026 detects the symbol is undefined. If this is the case,
8027 we can safely ignore the overflow. If not, the
8028 program is hosed anyway, and a little warning isn't
8029 going to help. */
8030
8031 continue;
8032 }
8033
8034 name = h->root.root.string;
8035 }
8036 else
8037 {
8038 name = bfd_elf_local_sym_name (input_bfd, sym);
8039 if (name == NULL)
8040 continue;
8041 }
8042
8043 if (r == bfd_reloc_overflow)
8044 {
8045 if (warned)
8046 continue;
8047 if (!((*info->callbacks->reloc_overflow)
8048 (info, name, ppc64_elf_howto_table[(int) r_type]->name,
8049 rel->r_addend, input_bfd, input_section, rel->r_offset)))
8050 return FALSE;
8051 }
8052 else
8053 {
8054 (*_bfd_error_handler)
8055 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
8056 bfd_archive_filename (input_bfd),
8057 bfd_get_section_name (input_bfd, input_section),
8058 (long) rel->r_offset, name, (int) r);
8059 ret = FALSE;
8060 }
8061 }
8062 }
8063
8064 return ret;
8065 }
8066
8067 /* Finish up dynamic symbol handling. We set the contents of various
8068 dynamic sections here. */
8069
8070 static bfd_boolean
8071 ppc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
8072 bfd *output_bfd;
8073 struct bfd_link_info *info;
8074 struct elf_link_hash_entry *h;
8075 Elf_Internal_Sym *sym;
8076 {
8077 struct ppc_link_hash_table *htab;
8078 bfd *dynobj;
8079
8080 htab = ppc_hash_table (info);
8081 dynobj = htab->elf.dynobj;
8082
8083 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
8084 {
8085 struct plt_entry *ent;
8086 Elf_Internal_Rela rela;
8087 bfd_byte *loc;
8088
8089 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8090 if (ent->plt.offset != (bfd_vma) -1)
8091 {
8092 /* This symbol has an entry in the procedure linkage
8093 table. Set it up. */
8094
8095 if (htab->splt == NULL
8096 || htab->srelplt == NULL
8097 || htab->sglink == NULL)
8098 abort ();
8099
8100 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8101 fill in the PLT entry. */
8102
8103 rela.r_offset = (htab->splt->output_section->vma
8104 + htab->splt->output_offset
8105 + ent->plt.offset);
8106 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8107 rela.r_addend = ent->addend;
8108
8109 loc = htab->srelplt->contents;
8110 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8111 * sizeof (Elf64_External_Rela));
8112 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8113 }
8114 }
8115
8116 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8117 {
8118 Elf_Internal_Rela rela;
8119 bfd_byte *loc;
8120
8121 /* This symbol needs a copy reloc. Set it up. */
8122
8123 if (h->dynindx == -1
8124 || (h->root.type != bfd_link_hash_defined
8125 && h->root.type != bfd_link_hash_defweak)
8126 || htab->srelbss == NULL)
8127 abort ();
8128
8129 rela.r_offset = (h->root.u.def.value
8130 + h->root.u.def.section->output_section->vma
8131 + h->root.u.def.section->output_offset);
8132 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8133 rela.r_addend = 0;
8134 loc = htab->srelbss->contents;
8135 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
8136 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8137 }
8138
8139 /* Mark some specially defined symbols as absolute. */
8140 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8141 sym->st_shndx = SHN_ABS;
8142
8143 return TRUE;
8144 }
8145
8146 /* Used to decide how to sort relocs in an optimal manner for the
8147 dynamic linker, before writing them out. */
8148
8149 static enum elf_reloc_type_class
8150 ppc64_elf_reloc_type_class (rela)
8151 const Elf_Internal_Rela *rela;
8152 {
8153 enum elf_ppc64_reloc_type r_type;
8154
8155 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rela->r_info);
8156 switch (r_type)
8157 {
8158 case R_PPC64_RELATIVE:
8159 return reloc_class_relative;
8160 case R_PPC64_JMP_SLOT:
8161 return reloc_class_plt;
8162 case R_PPC64_COPY:
8163 return reloc_class_copy;
8164 default:
8165 return reloc_class_normal;
8166 }
8167 }
8168
8169 /* Finish up the dynamic sections. */
8170
8171 static bfd_boolean
8172 ppc64_elf_finish_dynamic_sections (output_bfd, info)
8173 bfd *output_bfd;
8174 struct bfd_link_info *info;
8175 {
8176 struct ppc_link_hash_table *htab;
8177 bfd *dynobj;
8178 asection *sdyn;
8179
8180 htab = ppc_hash_table (info);
8181 dynobj = htab->elf.dynobj;
8182 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8183
8184 if (htab->elf.dynamic_sections_created)
8185 {
8186 Elf64_External_Dyn *dyncon, *dynconend;
8187
8188 if (sdyn == NULL || htab->sgot == NULL)
8189 abort ();
8190
8191 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8192 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
8193 for (; dyncon < dynconend; dyncon++)
8194 {
8195 Elf_Internal_Dyn dyn;
8196 asection *s;
8197
8198 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8199
8200 switch (dyn.d_tag)
8201 {
8202 default:
8203 continue;
8204
8205 case DT_PPC64_GLINK:
8206 s = htab->sglink;
8207 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8208 break;
8209
8210 case DT_PPC64_OPD:
8211 s = bfd_get_section_by_name (output_bfd, ".opd");
8212 if (s == NULL)
8213 continue;
8214 dyn.d_un.d_ptr = s->vma;
8215 break;
8216
8217 case DT_PPC64_OPDSZ:
8218 s = bfd_get_section_by_name (output_bfd, ".opd");
8219 if (s == NULL)
8220 continue;
8221 dyn.d_un.d_val = s->_raw_size;
8222 break;
8223
8224 case DT_PLTGOT:
8225 s = htab->splt;
8226 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8227 break;
8228
8229 case DT_JMPREL:
8230 s = htab->srelplt;
8231 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8232 break;
8233
8234 case DT_PLTRELSZ:
8235 dyn.d_un.d_val = htab->srelplt->_raw_size;
8236 break;
8237
8238 case DT_RELASZ:
8239 /* Don't count procedure linkage table relocs in the
8240 overall reloc count. */
8241 s = htab->srelplt;
8242 if (s == NULL)
8243 continue;
8244 dyn.d_un.d_val -= s->_raw_size;
8245 break;
8246
8247 case DT_RELA:
8248 /* We may not be using the standard ELF linker script.
8249 If .rela.plt is the first .rela section, we adjust
8250 DT_RELA to not include it. */
8251 s = htab->srelplt;
8252 if (s == NULL)
8253 continue;
8254 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8255 continue;
8256 dyn.d_un.d_ptr += s->_raw_size;
8257 break;
8258 }
8259
8260 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
8261 }
8262 }
8263
8264 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
8265 {
8266 /* Fill in the first entry in the global offset table.
8267 We use it to hold the link-time TOCbase. */
8268 bfd_put_64 (output_bfd,
8269 elf_gp (output_bfd) + TOC_BASE_OFF,
8270 htab->sgot->contents);
8271
8272 /* Set .got entry size. */
8273 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize = 8;
8274 }
8275
8276 if (htab->splt != NULL && htab->splt->_raw_size != 0)
8277 {
8278 /* Set .plt entry size. */
8279 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize
8280 = PLT_ENTRY_SIZE;
8281 }
8282
8283 return TRUE;
8284 }
8285
8286 #define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8287 #define TARGET_LITTLE_NAME "elf64-powerpcle"
8288 #define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8289 #define TARGET_BIG_NAME "elf64-powerpc"
8290 #define ELF_ARCH bfd_arch_powerpc
8291 #define ELF_MACHINE_CODE EM_PPC64
8292 #define ELF_MAXPAGESIZE 0x10000
8293 #define elf_info_to_howto ppc64_elf_info_to_howto
8294
8295 #ifdef EM_CYGNUS_POWERPC
8296 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8297 #endif
8298
8299 #ifdef EM_PPC_OLD
8300 #define ELF_MACHINE_ALT2 EM_PPC_OLD
8301 #endif
8302
8303 #define elf_backend_want_got_sym 0
8304 #define elf_backend_want_plt_sym 0
8305 #define elf_backend_plt_alignment 3
8306 #define elf_backend_plt_not_loaded 1
8307 #define elf_backend_got_symbol_offset 0
8308 #define elf_backend_got_header_size 8
8309 #define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
8310 #define elf_backend_can_gc_sections 1
8311 #define elf_backend_can_refcount 1
8312 #define elf_backend_rela_normal 1
8313
8314 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
8315 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
8316 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
8317 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
8318 #define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
8319
8320 #define elf_backend_object_p ppc64_elf_object_p
8321 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8322 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8323 #define elf_backend_check_relocs ppc64_elf_check_relocs
8324 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8325 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8326 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
8327 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
8328 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
8329 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
8330 #define elf_backend_relocate_section ppc64_elf_relocate_section
8331 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8332 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8333 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
8334
8335 #include "elf64-target.h"
This page took 0.243289 seconds and 4 git commands to generate.