b173b4b7c7a574cb61690043f8c6873f9884082d
[binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003, 2004
3 Free Software Foundation, Inc.
4 Written by Linus Nordberg, Swox AB <info@swox.com>,
5 based on elf32-ppc.c by Ian Lance Taylor.
6 Largely rewritten by Alan Modra <amodra@bigpond.net.au>
7
8 This file is part of BFD, the Binary File Descriptor library.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License along
21 with this program; if not, write to the Free Software Foundation, Inc.,
22 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
23
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
27
28 #include "bfd.h"
29 #include "sysdep.h"
30 #include "bfdlink.h"
31 #include "libbfd.h"
32 #include "elf-bfd.h"
33 #include "elf/ppc64.h"
34 #include "elf64-ppc.h"
35
36 static bfd_reloc_status_type ppc64_elf_ha_reloc
37 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
38 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_toc_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc64_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52
53
54 #define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
55 #define TARGET_LITTLE_NAME "elf64-powerpcle"
56 #define TARGET_BIG_SYM bfd_elf64_powerpc_vec
57 #define TARGET_BIG_NAME "elf64-powerpc"
58 #define ELF_ARCH bfd_arch_powerpc
59 #define ELF_MACHINE_CODE EM_PPC64
60 #define ELF_MAXPAGESIZE 0x10000
61 #define elf_info_to_howto ppc64_elf_info_to_howto
62
63 #define elf_backend_want_got_sym 0
64 #define elf_backend_want_plt_sym 0
65 #define elf_backend_plt_alignment 3
66 #define elf_backend_plt_not_loaded 1
67 #define elf_backend_got_symbol_offset 0
68 #define elf_backend_got_header_size 8
69 #define elf_backend_can_gc_sections 1
70 #define elf_backend_can_refcount 1
71 #define elf_backend_rela_normal 1
72
73 #define bfd_elf64_mkobject ppc64_elf_mkobject
74 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
75 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
76 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
77 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
78 #define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
79
80 #define elf_backend_object_p ppc64_elf_object_p
81 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
82 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
83 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
84 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
85 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
86 #define elf_backend_check_relocs ppc64_elf_check_relocs
87 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
88 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
89 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
90 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
91 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
92 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
93 #define elf_backend_relocate_section ppc64_elf_relocate_section
94 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
95 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
96 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
97 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
98 #define elf_backend_special_sections ppc64_elf_special_sections
99
100 /* The name of the dynamic interpreter. This is put in the .interp
101 section. */
102 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
103
104 /* The size in bytes of an entry in the procedure linkage table. */
105 #define PLT_ENTRY_SIZE 24
106
107 /* The initial size of the plt reserved for the dynamic linker. */
108 #define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
109
110 /* TOC base pointers offset from start of TOC. */
111 #define TOC_BASE_OFF 0x8000
112
113 /* Offset of tp and dtp pointers from start of TLS block. */
114 #define TP_OFFSET 0x7000
115 #define DTP_OFFSET 0x8000
116
117 /* .plt call stub instructions. The normal stub is like this, but
118 sometimes the .plt entry crosses a 64k boundary and we need to
119 insert an addis to adjust r12. */
120 #define PLT_CALL_STUB_SIZE (7*4)
121 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
122 #define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
123 #define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
124 #define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
125 #define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
126 /* ld %r11,xxx+16@l(%r12) */
127 #define BCTR 0x4e800420 /* bctr */
128
129
130 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
131 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
132
133 #define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
134
135 /* glink call stub instructions. We enter with the index in R0, and the
136 address of glink entry in CTR. From that, we can calculate PLT0. */
137 #define GLINK_CALL_STUB_SIZE (16*4)
138 #define MFCTR_R12 0x7d8902a6 /* mfctr %r12 */
139 #define SLDI_R11_R0_3 0x780b1f24 /* sldi %r11,%r0,3 */
140 #define ADDIC_R2_R0_32K 0x34408000 /* addic. %r2,%r0,-32768 */
141 #define SUB_R12_R12_R11 0x7d8b6050 /* sub %r12,%r12,%r11 */
142 #define SRADI_R2_R2_63 0x7c42fe76 /* sradi %r2,%r2,63 */
143 #define SLDI_R11_R0_2 0x780b1764 /* sldi %r11,%r0,2 */
144 #define AND_R2_R2_R11 0x7c425838 /* and %r2,%r2,%r11 */
145 /* sub %r12,%r12,%r11 */
146 #define ADD_R12_R12_R2 0x7d8c1214 /* add %r12,%r12,%r2 */
147 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
148 /* ld %r11,xxx@l(%r12) */
149 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,xxx@l */
150 /* ld %r2,8(%r12) */
151 /* mtctr %r11 */
152 /* ld %r11,16(%r12) */
153 /* bctr */
154
155 /* Pad with this. */
156 #define NOP 0x60000000
157
158 /* Some other nops. */
159 #define CROR_151515 0x4def7b82
160 #define CROR_313131 0x4ffffb82
161
162 /* .glink entries for the first 32k functions are two instructions. */
163 #define LI_R0_0 0x38000000 /* li %r0,0 */
164 #define B_DOT 0x48000000 /* b . */
165
166 /* After that, we need two instructions to load the index, followed by
167 a branch. */
168 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
169 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
170
171 /* Instructions to save and restore floating point regs. */
172 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
173 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
174 #define BLR 0x4e800020 /* blr */
175
176 /* Since .opd is an array of descriptors and each entry will end up
177 with identical R_PPC64_RELATIVE relocs, there is really no need to
178 propagate .opd relocs; The dynamic linker should be taught to
179 relocate .opd without reloc entries. */
180 #ifndef NO_OPD_RELOCS
181 #define NO_OPD_RELOCS 0
182 #endif
183 \f
184 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
185
186 /* Relocation HOWTO's. */
187 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
188
189 static reloc_howto_type ppc64_elf_howto_raw[] = {
190 /* This reloc does nothing. */
191 HOWTO (R_PPC64_NONE, /* type */
192 0, /* rightshift */
193 2, /* size (0 = byte, 1 = short, 2 = long) */
194 32, /* bitsize */
195 FALSE, /* pc_relative */
196 0, /* bitpos */
197 complain_overflow_dont, /* complain_on_overflow */
198 bfd_elf_generic_reloc, /* special_function */
199 "R_PPC64_NONE", /* name */
200 FALSE, /* partial_inplace */
201 0, /* src_mask */
202 0, /* dst_mask */
203 FALSE), /* pcrel_offset */
204
205 /* A standard 32 bit relocation. */
206 HOWTO (R_PPC64_ADDR32, /* type */
207 0, /* rightshift */
208 2, /* size (0 = byte, 1 = short, 2 = long) */
209 32, /* bitsize */
210 FALSE, /* pc_relative */
211 0, /* bitpos */
212 complain_overflow_bitfield, /* complain_on_overflow */
213 bfd_elf_generic_reloc, /* special_function */
214 "R_PPC64_ADDR32", /* name */
215 FALSE, /* partial_inplace */
216 0, /* src_mask */
217 0xffffffff, /* dst_mask */
218 FALSE), /* pcrel_offset */
219
220 /* An absolute 26 bit branch; the lower two bits must be zero.
221 FIXME: we don't check that, we just clear them. */
222 HOWTO (R_PPC64_ADDR24, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 26, /* bitsize */
226 FALSE, /* pc_relative */
227 0, /* bitpos */
228 complain_overflow_bitfield, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_PPC64_ADDR24", /* name */
231 FALSE, /* partial_inplace */
232 0, /* src_mask */
233 0x03fffffc, /* dst_mask */
234 FALSE), /* pcrel_offset */
235
236 /* A standard 16 bit relocation. */
237 HOWTO (R_PPC64_ADDR16, /* type */
238 0, /* rightshift */
239 1, /* size (0 = byte, 1 = short, 2 = long) */
240 16, /* bitsize */
241 FALSE, /* pc_relative */
242 0, /* bitpos */
243 complain_overflow_bitfield, /* complain_on_overflow */
244 bfd_elf_generic_reloc, /* special_function */
245 "R_PPC64_ADDR16", /* name */
246 FALSE, /* partial_inplace */
247 0, /* src_mask */
248 0xffff, /* dst_mask */
249 FALSE), /* pcrel_offset */
250
251 /* A 16 bit relocation without overflow. */
252 HOWTO (R_PPC64_ADDR16_LO, /* type */
253 0, /* rightshift */
254 1, /* size (0 = byte, 1 = short, 2 = long) */
255 16, /* bitsize */
256 FALSE, /* pc_relative */
257 0, /* bitpos */
258 complain_overflow_dont,/* complain_on_overflow */
259 bfd_elf_generic_reloc, /* special_function */
260 "R_PPC64_ADDR16_LO", /* name */
261 FALSE, /* partial_inplace */
262 0, /* src_mask */
263 0xffff, /* dst_mask */
264 FALSE), /* pcrel_offset */
265
266 /* Bits 16-31 of an address. */
267 HOWTO (R_PPC64_ADDR16_HI, /* type */
268 16, /* rightshift */
269 1, /* size (0 = byte, 1 = short, 2 = long) */
270 16, /* bitsize */
271 FALSE, /* pc_relative */
272 0, /* bitpos */
273 complain_overflow_dont, /* complain_on_overflow */
274 bfd_elf_generic_reloc, /* special_function */
275 "R_PPC64_ADDR16_HI", /* name */
276 FALSE, /* partial_inplace */
277 0, /* src_mask */
278 0xffff, /* dst_mask */
279 FALSE), /* pcrel_offset */
280
281 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
282 bits, treated as a signed number, is negative. */
283 HOWTO (R_PPC64_ADDR16_HA, /* type */
284 16, /* rightshift */
285 1, /* size (0 = byte, 1 = short, 2 = long) */
286 16, /* bitsize */
287 FALSE, /* pc_relative */
288 0, /* bitpos */
289 complain_overflow_dont, /* complain_on_overflow */
290 ppc64_elf_ha_reloc, /* special_function */
291 "R_PPC64_ADDR16_HA", /* name */
292 FALSE, /* partial_inplace */
293 0, /* src_mask */
294 0xffff, /* dst_mask */
295 FALSE), /* pcrel_offset */
296
297 /* An absolute 16 bit branch; the lower two bits must be zero.
298 FIXME: we don't check that, we just clear them. */
299 HOWTO (R_PPC64_ADDR14, /* type */
300 0, /* rightshift */
301 2, /* size (0 = byte, 1 = short, 2 = long) */
302 16, /* bitsize */
303 FALSE, /* pc_relative */
304 0, /* bitpos */
305 complain_overflow_bitfield, /* complain_on_overflow */
306 bfd_elf_generic_reloc, /* special_function */
307 "R_PPC64_ADDR14", /* name */
308 FALSE, /* partial_inplace */
309 0, /* src_mask */
310 0x0000fffc, /* dst_mask */
311 FALSE), /* pcrel_offset */
312
313 /* An absolute 16 bit branch, for which bit 10 should be set to
314 indicate that the branch is expected to be taken. The lower two
315 bits must be zero. */
316 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
317 0, /* rightshift */
318 2, /* size (0 = byte, 1 = short, 2 = long) */
319 16, /* bitsize */
320 FALSE, /* pc_relative */
321 0, /* bitpos */
322 complain_overflow_bitfield, /* complain_on_overflow */
323 ppc64_elf_brtaken_reloc, /* special_function */
324 "R_PPC64_ADDR14_BRTAKEN",/* name */
325 FALSE, /* partial_inplace */
326 0, /* src_mask */
327 0x0000fffc, /* dst_mask */
328 FALSE), /* pcrel_offset */
329
330 /* An absolute 16 bit branch, for which bit 10 should be set to
331 indicate that the branch is not expected to be taken. The lower
332 two bits must be zero. */
333 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
334 0, /* rightshift */
335 2, /* size (0 = byte, 1 = short, 2 = long) */
336 16, /* bitsize */
337 FALSE, /* pc_relative */
338 0, /* bitpos */
339 complain_overflow_bitfield, /* complain_on_overflow */
340 ppc64_elf_brtaken_reloc, /* special_function */
341 "R_PPC64_ADDR14_BRNTAKEN",/* name */
342 FALSE, /* partial_inplace */
343 0, /* src_mask */
344 0x0000fffc, /* dst_mask */
345 FALSE), /* pcrel_offset */
346
347 /* A relative 26 bit branch; the lower two bits must be zero. */
348 HOWTO (R_PPC64_REL24, /* type */
349 0, /* rightshift */
350 2, /* size (0 = byte, 1 = short, 2 = long) */
351 26, /* bitsize */
352 TRUE, /* pc_relative */
353 0, /* bitpos */
354 complain_overflow_signed, /* complain_on_overflow */
355 bfd_elf_generic_reloc, /* special_function */
356 "R_PPC64_REL24", /* name */
357 FALSE, /* partial_inplace */
358 0, /* src_mask */
359 0x03fffffc, /* dst_mask */
360 TRUE), /* pcrel_offset */
361
362 /* A relative 16 bit branch; the lower two bits must be zero. */
363 HOWTO (R_PPC64_REL14, /* type */
364 0, /* rightshift */
365 2, /* size (0 = byte, 1 = short, 2 = long) */
366 16, /* bitsize */
367 TRUE, /* pc_relative */
368 0, /* bitpos */
369 complain_overflow_signed, /* complain_on_overflow */
370 bfd_elf_generic_reloc, /* special_function */
371 "R_PPC64_REL14", /* name */
372 FALSE, /* partial_inplace */
373 0, /* src_mask */
374 0x0000fffc, /* dst_mask */
375 TRUE), /* pcrel_offset */
376
377 /* A relative 16 bit branch. Bit 10 should be set to indicate that
378 the branch is expected to be taken. The lower two bits must be
379 zero. */
380 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
381 0, /* rightshift */
382 2, /* size (0 = byte, 1 = short, 2 = long) */
383 16, /* bitsize */
384 TRUE, /* pc_relative */
385 0, /* bitpos */
386 complain_overflow_signed, /* complain_on_overflow */
387 ppc64_elf_brtaken_reloc, /* special_function */
388 "R_PPC64_REL14_BRTAKEN", /* name */
389 FALSE, /* partial_inplace */
390 0, /* src_mask */
391 0x0000fffc, /* dst_mask */
392 TRUE), /* pcrel_offset */
393
394 /* A relative 16 bit branch. Bit 10 should be set to indicate that
395 the branch is not expected to be taken. The lower two bits must
396 be zero. */
397 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
398 0, /* rightshift */
399 2, /* size (0 = byte, 1 = short, 2 = long) */
400 16, /* bitsize */
401 TRUE, /* pc_relative */
402 0, /* bitpos */
403 complain_overflow_signed, /* complain_on_overflow */
404 ppc64_elf_brtaken_reloc, /* special_function */
405 "R_PPC64_REL14_BRNTAKEN",/* name */
406 FALSE, /* partial_inplace */
407 0, /* src_mask */
408 0x0000fffc, /* dst_mask */
409 TRUE), /* pcrel_offset */
410
411 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
412 symbol. */
413 HOWTO (R_PPC64_GOT16, /* type */
414 0, /* rightshift */
415 1, /* size (0 = byte, 1 = short, 2 = long) */
416 16, /* bitsize */
417 FALSE, /* pc_relative */
418 0, /* bitpos */
419 complain_overflow_signed, /* complain_on_overflow */
420 ppc64_elf_unhandled_reloc, /* special_function */
421 "R_PPC64_GOT16", /* name */
422 FALSE, /* partial_inplace */
423 0, /* src_mask */
424 0xffff, /* dst_mask */
425 FALSE), /* pcrel_offset */
426
427 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
428 the symbol. */
429 HOWTO (R_PPC64_GOT16_LO, /* type */
430 0, /* rightshift */
431 1, /* size (0 = byte, 1 = short, 2 = long) */
432 16, /* bitsize */
433 FALSE, /* pc_relative */
434 0, /* bitpos */
435 complain_overflow_dont, /* complain_on_overflow */
436 ppc64_elf_unhandled_reloc, /* special_function */
437 "R_PPC64_GOT16_LO", /* name */
438 FALSE, /* partial_inplace */
439 0, /* src_mask */
440 0xffff, /* dst_mask */
441 FALSE), /* pcrel_offset */
442
443 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
444 the symbol. */
445 HOWTO (R_PPC64_GOT16_HI, /* type */
446 16, /* rightshift */
447 1, /* size (0 = byte, 1 = short, 2 = long) */
448 16, /* bitsize */
449 FALSE, /* pc_relative */
450 0, /* bitpos */
451 complain_overflow_dont,/* complain_on_overflow */
452 ppc64_elf_unhandled_reloc, /* special_function */
453 "R_PPC64_GOT16_HI", /* name */
454 FALSE, /* partial_inplace */
455 0, /* src_mask */
456 0xffff, /* dst_mask */
457 FALSE), /* pcrel_offset */
458
459 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
460 the symbol. */
461 HOWTO (R_PPC64_GOT16_HA, /* type */
462 16, /* rightshift */
463 1, /* size (0 = byte, 1 = short, 2 = long) */
464 16, /* bitsize */
465 FALSE, /* pc_relative */
466 0, /* bitpos */
467 complain_overflow_dont,/* complain_on_overflow */
468 ppc64_elf_unhandled_reloc, /* special_function */
469 "R_PPC64_GOT16_HA", /* name */
470 FALSE, /* partial_inplace */
471 0, /* src_mask */
472 0xffff, /* dst_mask */
473 FALSE), /* pcrel_offset */
474
475 /* This is used only by the dynamic linker. The symbol should exist
476 both in the object being run and in some shared library. The
477 dynamic linker copies the data addressed by the symbol from the
478 shared library into the object, because the object being
479 run has to have the data at some particular address. */
480 HOWTO (R_PPC64_COPY, /* type */
481 0, /* rightshift */
482 0, /* this one is variable size */
483 0, /* bitsize */
484 FALSE, /* pc_relative */
485 0, /* bitpos */
486 complain_overflow_dont, /* complain_on_overflow */
487 ppc64_elf_unhandled_reloc, /* special_function */
488 "R_PPC64_COPY", /* name */
489 FALSE, /* partial_inplace */
490 0, /* src_mask */
491 0, /* dst_mask */
492 FALSE), /* pcrel_offset */
493
494 /* Like R_PPC64_ADDR64, but used when setting global offset table
495 entries. */
496 HOWTO (R_PPC64_GLOB_DAT, /* type */
497 0, /* rightshift */
498 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
499 64, /* bitsize */
500 FALSE, /* pc_relative */
501 0, /* bitpos */
502 complain_overflow_dont, /* complain_on_overflow */
503 ppc64_elf_unhandled_reloc, /* special_function */
504 "R_PPC64_GLOB_DAT", /* name */
505 FALSE, /* partial_inplace */
506 0, /* src_mask */
507 ONES (64), /* dst_mask */
508 FALSE), /* pcrel_offset */
509
510 /* Created by the link editor. Marks a procedure linkage table
511 entry for a symbol. */
512 HOWTO (R_PPC64_JMP_SLOT, /* type */
513 0, /* rightshift */
514 0, /* size (0 = byte, 1 = short, 2 = long) */
515 0, /* bitsize */
516 FALSE, /* pc_relative */
517 0, /* bitpos */
518 complain_overflow_dont, /* complain_on_overflow */
519 ppc64_elf_unhandled_reloc, /* special_function */
520 "R_PPC64_JMP_SLOT", /* name */
521 FALSE, /* partial_inplace */
522 0, /* src_mask */
523 0, /* dst_mask */
524 FALSE), /* pcrel_offset */
525
526 /* Used only by the dynamic linker. When the object is run, this
527 doubleword64 is set to the load address of the object, plus the
528 addend. */
529 HOWTO (R_PPC64_RELATIVE, /* type */
530 0, /* rightshift */
531 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
532 64, /* bitsize */
533 FALSE, /* pc_relative */
534 0, /* bitpos */
535 complain_overflow_dont, /* complain_on_overflow */
536 bfd_elf_generic_reloc, /* special_function */
537 "R_PPC64_RELATIVE", /* name */
538 FALSE, /* partial_inplace */
539 0, /* src_mask */
540 ONES (64), /* dst_mask */
541 FALSE), /* pcrel_offset */
542
543 /* Like R_PPC64_ADDR32, but may be unaligned. */
544 HOWTO (R_PPC64_UADDR32, /* type */
545 0, /* rightshift */
546 2, /* size (0 = byte, 1 = short, 2 = long) */
547 32, /* bitsize */
548 FALSE, /* pc_relative */
549 0, /* bitpos */
550 complain_overflow_bitfield, /* complain_on_overflow */
551 bfd_elf_generic_reloc, /* special_function */
552 "R_PPC64_UADDR32", /* name */
553 FALSE, /* partial_inplace */
554 0, /* src_mask */
555 0xffffffff, /* dst_mask */
556 FALSE), /* pcrel_offset */
557
558 /* Like R_PPC64_ADDR16, but may be unaligned. */
559 HOWTO (R_PPC64_UADDR16, /* type */
560 0, /* rightshift */
561 1, /* size (0 = byte, 1 = short, 2 = long) */
562 16, /* bitsize */
563 FALSE, /* pc_relative */
564 0, /* bitpos */
565 complain_overflow_bitfield, /* complain_on_overflow */
566 bfd_elf_generic_reloc, /* special_function */
567 "R_PPC64_UADDR16", /* name */
568 FALSE, /* partial_inplace */
569 0, /* src_mask */
570 0xffff, /* dst_mask */
571 FALSE), /* pcrel_offset */
572
573 /* 32-bit PC relative. */
574 HOWTO (R_PPC64_REL32, /* type */
575 0, /* rightshift */
576 2, /* size (0 = byte, 1 = short, 2 = long) */
577 32, /* bitsize */
578 TRUE, /* pc_relative */
579 0, /* bitpos */
580 /* FIXME: Verify. Was complain_overflow_bitfield. */
581 complain_overflow_signed, /* complain_on_overflow */
582 bfd_elf_generic_reloc, /* special_function */
583 "R_PPC64_REL32", /* name */
584 FALSE, /* partial_inplace */
585 0, /* src_mask */
586 0xffffffff, /* dst_mask */
587 TRUE), /* pcrel_offset */
588
589 /* 32-bit relocation to the symbol's procedure linkage table. */
590 HOWTO (R_PPC64_PLT32, /* type */
591 0, /* rightshift */
592 2, /* size (0 = byte, 1 = short, 2 = long) */
593 32, /* bitsize */
594 FALSE, /* pc_relative */
595 0, /* bitpos */
596 complain_overflow_bitfield, /* complain_on_overflow */
597 ppc64_elf_unhandled_reloc, /* special_function */
598 "R_PPC64_PLT32", /* name */
599 FALSE, /* partial_inplace */
600 0, /* src_mask */
601 0xffffffff, /* dst_mask */
602 FALSE), /* pcrel_offset */
603
604 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
605 FIXME: R_PPC64_PLTREL32 not supported. */
606 HOWTO (R_PPC64_PLTREL32, /* type */
607 0, /* rightshift */
608 2, /* size (0 = byte, 1 = short, 2 = long) */
609 32, /* bitsize */
610 TRUE, /* pc_relative */
611 0, /* bitpos */
612 complain_overflow_signed, /* complain_on_overflow */
613 bfd_elf_generic_reloc, /* special_function */
614 "R_PPC64_PLTREL32", /* name */
615 FALSE, /* partial_inplace */
616 0, /* src_mask */
617 0xffffffff, /* dst_mask */
618 TRUE), /* pcrel_offset */
619
620 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
621 the symbol. */
622 HOWTO (R_PPC64_PLT16_LO, /* type */
623 0, /* rightshift */
624 1, /* size (0 = byte, 1 = short, 2 = long) */
625 16, /* bitsize */
626 FALSE, /* pc_relative */
627 0, /* bitpos */
628 complain_overflow_dont, /* complain_on_overflow */
629 ppc64_elf_unhandled_reloc, /* special_function */
630 "R_PPC64_PLT16_LO", /* name */
631 FALSE, /* partial_inplace */
632 0, /* src_mask */
633 0xffff, /* dst_mask */
634 FALSE), /* pcrel_offset */
635
636 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
637 the symbol. */
638 HOWTO (R_PPC64_PLT16_HI, /* type */
639 16, /* rightshift */
640 1, /* size (0 = byte, 1 = short, 2 = long) */
641 16, /* bitsize */
642 FALSE, /* pc_relative */
643 0, /* bitpos */
644 complain_overflow_dont, /* complain_on_overflow */
645 ppc64_elf_unhandled_reloc, /* special_function */
646 "R_PPC64_PLT16_HI", /* name */
647 FALSE, /* partial_inplace */
648 0, /* src_mask */
649 0xffff, /* dst_mask */
650 FALSE), /* pcrel_offset */
651
652 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
653 the symbol. */
654 HOWTO (R_PPC64_PLT16_HA, /* type */
655 16, /* rightshift */
656 1, /* size (0 = byte, 1 = short, 2 = long) */
657 16, /* bitsize */
658 FALSE, /* pc_relative */
659 0, /* bitpos */
660 complain_overflow_dont, /* complain_on_overflow */
661 ppc64_elf_unhandled_reloc, /* special_function */
662 "R_PPC64_PLT16_HA", /* name */
663 FALSE, /* partial_inplace */
664 0, /* src_mask */
665 0xffff, /* dst_mask */
666 FALSE), /* pcrel_offset */
667
668 /* 16-bit section relative relocation. */
669 HOWTO (R_PPC64_SECTOFF, /* type */
670 0, /* rightshift */
671 1, /* size (0 = byte, 1 = short, 2 = long) */
672 16, /* bitsize */
673 FALSE, /* pc_relative */
674 0, /* bitpos */
675 complain_overflow_bitfield, /* complain_on_overflow */
676 ppc64_elf_sectoff_reloc, /* special_function */
677 "R_PPC64_SECTOFF", /* name */
678 FALSE, /* partial_inplace */
679 0, /* src_mask */
680 0xffff, /* dst_mask */
681 FALSE), /* pcrel_offset */
682
683 /* Like R_PPC64_SECTOFF, but no overflow warning. */
684 HOWTO (R_PPC64_SECTOFF_LO, /* type */
685 0, /* rightshift */
686 1, /* size (0 = byte, 1 = short, 2 = long) */
687 16, /* bitsize */
688 FALSE, /* pc_relative */
689 0, /* bitpos */
690 complain_overflow_dont, /* complain_on_overflow */
691 ppc64_elf_sectoff_reloc, /* special_function */
692 "R_PPC64_SECTOFF_LO", /* name */
693 FALSE, /* partial_inplace */
694 0, /* src_mask */
695 0xffff, /* dst_mask */
696 FALSE), /* pcrel_offset */
697
698 /* 16-bit upper half section relative relocation. */
699 HOWTO (R_PPC64_SECTOFF_HI, /* type */
700 16, /* rightshift */
701 1, /* size (0 = byte, 1 = short, 2 = long) */
702 16, /* bitsize */
703 FALSE, /* pc_relative */
704 0, /* bitpos */
705 complain_overflow_dont, /* complain_on_overflow */
706 ppc64_elf_sectoff_reloc, /* special_function */
707 "R_PPC64_SECTOFF_HI", /* name */
708 FALSE, /* partial_inplace */
709 0, /* src_mask */
710 0xffff, /* dst_mask */
711 FALSE), /* pcrel_offset */
712
713 /* 16-bit upper half adjusted section relative relocation. */
714 HOWTO (R_PPC64_SECTOFF_HA, /* type */
715 16, /* rightshift */
716 1, /* size (0 = byte, 1 = short, 2 = long) */
717 16, /* bitsize */
718 FALSE, /* pc_relative */
719 0, /* bitpos */
720 complain_overflow_dont, /* complain_on_overflow */
721 ppc64_elf_sectoff_ha_reloc, /* special_function */
722 "R_PPC64_SECTOFF_HA", /* name */
723 FALSE, /* partial_inplace */
724 0, /* src_mask */
725 0xffff, /* dst_mask */
726 FALSE), /* pcrel_offset */
727
728 /* Like R_PPC64_REL24 without touching the two least significant bits. */
729 HOWTO (R_PPC64_REL30, /* type */
730 2, /* rightshift */
731 2, /* size (0 = byte, 1 = short, 2 = long) */
732 30, /* bitsize */
733 TRUE, /* pc_relative */
734 0, /* bitpos */
735 complain_overflow_dont, /* complain_on_overflow */
736 bfd_elf_generic_reloc, /* special_function */
737 "R_PPC64_REL30", /* name */
738 FALSE, /* partial_inplace */
739 0, /* src_mask */
740 0xfffffffc, /* dst_mask */
741 TRUE), /* pcrel_offset */
742
743 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
744
745 /* A standard 64-bit relocation. */
746 HOWTO (R_PPC64_ADDR64, /* type */
747 0, /* rightshift */
748 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
749 64, /* bitsize */
750 FALSE, /* pc_relative */
751 0, /* bitpos */
752 complain_overflow_dont, /* complain_on_overflow */
753 bfd_elf_generic_reloc, /* special_function */
754 "R_PPC64_ADDR64", /* name */
755 FALSE, /* partial_inplace */
756 0, /* src_mask */
757 ONES (64), /* dst_mask */
758 FALSE), /* pcrel_offset */
759
760 /* The bits 32-47 of an address. */
761 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
762 32, /* rightshift */
763 1, /* size (0 = byte, 1 = short, 2 = long) */
764 16, /* bitsize */
765 FALSE, /* pc_relative */
766 0, /* bitpos */
767 complain_overflow_dont, /* complain_on_overflow */
768 bfd_elf_generic_reloc, /* special_function */
769 "R_PPC64_ADDR16_HIGHER", /* name */
770 FALSE, /* partial_inplace */
771 0, /* src_mask */
772 0xffff, /* dst_mask */
773 FALSE), /* pcrel_offset */
774
775 /* The bits 32-47 of an address, plus 1 if the contents of the low
776 16 bits, treated as a signed number, is negative. */
777 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
778 32, /* rightshift */
779 1, /* size (0 = byte, 1 = short, 2 = long) */
780 16, /* bitsize */
781 FALSE, /* pc_relative */
782 0, /* bitpos */
783 complain_overflow_dont, /* complain_on_overflow */
784 ppc64_elf_ha_reloc, /* special_function */
785 "R_PPC64_ADDR16_HIGHERA", /* name */
786 FALSE, /* partial_inplace */
787 0, /* src_mask */
788 0xffff, /* dst_mask */
789 FALSE), /* pcrel_offset */
790
791 /* The bits 48-63 of an address. */
792 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
793 48, /* rightshift */
794 1, /* size (0 = byte, 1 = short, 2 = long) */
795 16, /* bitsize */
796 FALSE, /* pc_relative */
797 0, /* bitpos */
798 complain_overflow_dont, /* complain_on_overflow */
799 bfd_elf_generic_reloc, /* special_function */
800 "R_PPC64_ADDR16_HIGHEST", /* name */
801 FALSE, /* partial_inplace */
802 0, /* src_mask */
803 0xffff, /* dst_mask */
804 FALSE), /* pcrel_offset */
805
806 /* The bits 48-63 of an address, plus 1 if the contents of the low
807 16 bits, treated as a signed number, is negative. */
808 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
809 48, /* rightshift */
810 1, /* size (0 = byte, 1 = short, 2 = long) */
811 16, /* bitsize */
812 FALSE, /* pc_relative */
813 0, /* bitpos */
814 complain_overflow_dont, /* complain_on_overflow */
815 ppc64_elf_ha_reloc, /* special_function */
816 "R_PPC64_ADDR16_HIGHESTA", /* name */
817 FALSE, /* partial_inplace */
818 0, /* src_mask */
819 0xffff, /* dst_mask */
820 FALSE), /* pcrel_offset */
821
822 /* Like ADDR64, but may be unaligned. */
823 HOWTO (R_PPC64_UADDR64, /* type */
824 0, /* rightshift */
825 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
826 64, /* bitsize */
827 FALSE, /* pc_relative */
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 bfd_elf_generic_reloc, /* special_function */
831 "R_PPC64_UADDR64", /* name */
832 FALSE, /* partial_inplace */
833 0, /* src_mask */
834 ONES (64), /* dst_mask */
835 FALSE), /* pcrel_offset */
836
837 /* 64-bit relative relocation. */
838 HOWTO (R_PPC64_REL64, /* type */
839 0, /* rightshift */
840 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
841 64, /* bitsize */
842 TRUE, /* pc_relative */
843 0, /* bitpos */
844 complain_overflow_dont, /* complain_on_overflow */
845 bfd_elf_generic_reloc, /* special_function */
846 "R_PPC64_REL64", /* name */
847 FALSE, /* partial_inplace */
848 0, /* src_mask */
849 ONES (64), /* dst_mask */
850 TRUE), /* pcrel_offset */
851
852 /* 64-bit relocation to the symbol's procedure linkage table. */
853 HOWTO (R_PPC64_PLT64, /* type */
854 0, /* rightshift */
855 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
856 64, /* bitsize */
857 FALSE, /* pc_relative */
858 0, /* bitpos */
859 complain_overflow_dont, /* complain_on_overflow */
860 ppc64_elf_unhandled_reloc, /* special_function */
861 "R_PPC64_PLT64", /* name */
862 FALSE, /* partial_inplace */
863 0, /* src_mask */
864 ONES (64), /* dst_mask */
865 FALSE), /* pcrel_offset */
866
867 /* 64-bit PC relative relocation to the symbol's procedure linkage
868 table. */
869 /* FIXME: R_PPC64_PLTREL64 not supported. */
870 HOWTO (R_PPC64_PLTREL64, /* type */
871 0, /* rightshift */
872 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
873 64, /* bitsize */
874 TRUE, /* pc_relative */
875 0, /* bitpos */
876 complain_overflow_dont, /* complain_on_overflow */
877 ppc64_elf_unhandled_reloc, /* special_function */
878 "R_PPC64_PLTREL64", /* name */
879 FALSE, /* partial_inplace */
880 0, /* src_mask */
881 ONES (64), /* dst_mask */
882 TRUE), /* pcrel_offset */
883
884 /* 16 bit TOC-relative relocation. */
885
886 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
887 HOWTO (R_PPC64_TOC16, /* type */
888 0, /* rightshift */
889 1, /* size (0 = byte, 1 = short, 2 = long) */
890 16, /* bitsize */
891 FALSE, /* pc_relative */
892 0, /* bitpos */
893 complain_overflow_signed, /* complain_on_overflow */
894 ppc64_elf_toc_reloc, /* special_function */
895 "R_PPC64_TOC16", /* name */
896 FALSE, /* partial_inplace */
897 0, /* src_mask */
898 0xffff, /* dst_mask */
899 FALSE), /* pcrel_offset */
900
901 /* 16 bit TOC-relative relocation without overflow. */
902
903 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
904 HOWTO (R_PPC64_TOC16_LO, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
908 FALSE, /* pc_relative */
909 0, /* bitpos */
910 complain_overflow_dont, /* complain_on_overflow */
911 ppc64_elf_toc_reloc, /* special_function */
912 "R_PPC64_TOC16_LO", /* name */
913 FALSE, /* partial_inplace */
914 0, /* src_mask */
915 0xffff, /* dst_mask */
916 FALSE), /* pcrel_offset */
917
918 /* 16 bit TOC-relative relocation, high 16 bits. */
919
920 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
921 HOWTO (R_PPC64_TOC16_HI, /* type */
922 16, /* rightshift */
923 1, /* size (0 = byte, 1 = short, 2 = long) */
924 16, /* bitsize */
925 FALSE, /* pc_relative */
926 0, /* bitpos */
927 complain_overflow_dont, /* complain_on_overflow */
928 ppc64_elf_toc_reloc, /* special_function */
929 "R_PPC64_TOC16_HI", /* name */
930 FALSE, /* partial_inplace */
931 0, /* src_mask */
932 0xffff, /* dst_mask */
933 FALSE), /* pcrel_offset */
934
935 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
936 contents of the low 16 bits, treated as a signed number, is
937 negative. */
938
939 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
940 HOWTO (R_PPC64_TOC16_HA, /* type */
941 16, /* rightshift */
942 1, /* size (0 = byte, 1 = short, 2 = long) */
943 16, /* bitsize */
944 FALSE, /* pc_relative */
945 0, /* bitpos */
946 complain_overflow_dont, /* complain_on_overflow */
947 ppc64_elf_toc_ha_reloc, /* special_function */
948 "R_PPC64_TOC16_HA", /* name */
949 FALSE, /* partial_inplace */
950 0, /* src_mask */
951 0xffff, /* dst_mask */
952 FALSE), /* pcrel_offset */
953
954 /* 64-bit relocation; insert value of TOC base (.TOC.). */
955
956 /* R_PPC64_TOC 51 doubleword64 .TOC. */
957 HOWTO (R_PPC64_TOC, /* type */
958 0, /* rightshift */
959 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
960 64, /* bitsize */
961 FALSE, /* pc_relative */
962 0, /* bitpos */
963 complain_overflow_bitfield, /* complain_on_overflow */
964 ppc64_elf_toc64_reloc, /* special_function */
965 "R_PPC64_TOC", /* name */
966 FALSE, /* partial_inplace */
967 0, /* src_mask */
968 ONES (64), /* dst_mask */
969 FALSE), /* pcrel_offset */
970
971 /* Like R_PPC64_GOT16, but also informs the link editor that the
972 value to relocate may (!) refer to a PLT entry which the link
973 editor (a) may replace with the symbol value. If the link editor
974 is unable to fully resolve the symbol, it may (b) create a PLT
975 entry and store the address to the new PLT entry in the GOT.
976 This permits lazy resolution of function symbols at run time.
977 The link editor may also skip all of this and just (c) emit a
978 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
979 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
980 HOWTO (R_PPC64_PLTGOT16, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
984 FALSE, /* pc_relative */
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
987 ppc64_elf_unhandled_reloc, /* special_function */
988 "R_PPC64_PLTGOT16", /* name */
989 FALSE, /* partial_inplace */
990 0, /* src_mask */
991 0xffff, /* dst_mask */
992 FALSE), /* pcrel_offset */
993
994 /* Like R_PPC64_PLTGOT16, but without overflow. */
995 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
996 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
1000 FALSE, /* pc_relative */
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
1003 ppc64_elf_unhandled_reloc, /* special_function */
1004 "R_PPC64_PLTGOT16_LO", /* name */
1005 FALSE, /* partial_inplace */
1006 0, /* src_mask */
1007 0xffff, /* dst_mask */
1008 FALSE), /* pcrel_offset */
1009
1010 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1011 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1012 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1013 16, /* rightshift */
1014 1, /* size (0 = byte, 1 = short, 2 = long) */
1015 16, /* bitsize */
1016 FALSE, /* pc_relative */
1017 0, /* bitpos */
1018 complain_overflow_dont, /* complain_on_overflow */
1019 ppc64_elf_unhandled_reloc, /* special_function */
1020 "R_PPC64_PLTGOT16_HI", /* name */
1021 FALSE, /* partial_inplace */
1022 0, /* src_mask */
1023 0xffff, /* dst_mask */
1024 FALSE), /* pcrel_offset */
1025
1026 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1027 1 if the contents of the low 16 bits, treated as a signed number,
1028 is negative. */
1029 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1030 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1031 16, /* rightshift */
1032 1, /* size (0 = byte, 1 = short, 2 = long) */
1033 16, /* bitsize */
1034 FALSE, /* pc_relative */
1035 0, /* bitpos */
1036 complain_overflow_dont,/* complain_on_overflow */
1037 ppc64_elf_unhandled_reloc, /* special_function */
1038 "R_PPC64_PLTGOT16_HA", /* name */
1039 FALSE, /* partial_inplace */
1040 0, /* src_mask */
1041 0xffff, /* dst_mask */
1042 FALSE), /* pcrel_offset */
1043
1044 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1045 HOWTO (R_PPC64_ADDR16_DS, /* type */
1046 0, /* rightshift */
1047 1, /* size (0 = byte, 1 = short, 2 = long) */
1048 16, /* bitsize */
1049 FALSE, /* pc_relative */
1050 0, /* bitpos */
1051 complain_overflow_bitfield, /* complain_on_overflow */
1052 bfd_elf_generic_reloc, /* special_function */
1053 "R_PPC64_ADDR16_DS", /* name */
1054 FALSE, /* partial_inplace */
1055 0, /* src_mask */
1056 0xfffc, /* dst_mask */
1057 FALSE), /* pcrel_offset */
1058
1059 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1060 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1061 0, /* rightshift */
1062 1, /* size (0 = byte, 1 = short, 2 = long) */
1063 16, /* bitsize */
1064 FALSE, /* pc_relative */
1065 0, /* bitpos */
1066 complain_overflow_dont,/* complain_on_overflow */
1067 bfd_elf_generic_reloc, /* special_function */
1068 "R_PPC64_ADDR16_LO_DS",/* name */
1069 FALSE, /* partial_inplace */
1070 0, /* src_mask */
1071 0xfffc, /* dst_mask */
1072 FALSE), /* pcrel_offset */
1073
1074 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1075 HOWTO (R_PPC64_GOT16_DS, /* type */
1076 0, /* rightshift */
1077 1, /* size (0 = byte, 1 = short, 2 = long) */
1078 16, /* bitsize */
1079 FALSE, /* pc_relative */
1080 0, /* bitpos */
1081 complain_overflow_signed, /* complain_on_overflow */
1082 ppc64_elf_unhandled_reloc, /* special_function */
1083 "R_PPC64_GOT16_DS", /* name */
1084 FALSE, /* partial_inplace */
1085 0, /* src_mask */
1086 0xfffc, /* dst_mask */
1087 FALSE), /* pcrel_offset */
1088
1089 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1090 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1091 0, /* rightshift */
1092 1, /* size (0 = byte, 1 = short, 2 = long) */
1093 16, /* bitsize */
1094 FALSE, /* pc_relative */
1095 0, /* bitpos */
1096 complain_overflow_dont, /* complain_on_overflow */
1097 ppc64_elf_unhandled_reloc, /* special_function */
1098 "R_PPC64_GOT16_LO_DS", /* name */
1099 FALSE, /* partial_inplace */
1100 0, /* src_mask */
1101 0xfffc, /* dst_mask */
1102 FALSE), /* pcrel_offset */
1103
1104 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1105 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1106 0, /* rightshift */
1107 1, /* size (0 = byte, 1 = short, 2 = long) */
1108 16, /* bitsize */
1109 FALSE, /* pc_relative */
1110 0, /* bitpos */
1111 complain_overflow_dont, /* complain_on_overflow */
1112 ppc64_elf_unhandled_reloc, /* special_function */
1113 "R_PPC64_PLT16_LO_DS", /* name */
1114 FALSE, /* partial_inplace */
1115 0, /* src_mask */
1116 0xfffc, /* dst_mask */
1117 FALSE), /* pcrel_offset */
1118
1119 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1120 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1121 0, /* rightshift */
1122 1, /* size (0 = byte, 1 = short, 2 = long) */
1123 16, /* bitsize */
1124 FALSE, /* pc_relative */
1125 0, /* bitpos */
1126 complain_overflow_bitfield, /* complain_on_overflow */
1127 ppc64_elf_sectoff_reloc, /* special_function */
1128 "R_PPC64_SECTOFF_DS", /* name */
1129 FALSE, /* partial_inplace */
1130 0, /* src_mask */
1131 0xfffc, /* dst_mask */
1132 FALSE), /* pcrel_offset */
1133
1134 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1135 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1136 0, /* rightshift */
1137 1, /* size (0 = byte, 1 = short, 2 = long) */
1138 16, /* bitsize */
1139 FALSE, /* pc_relative */
1140 0, /* bitpos */
1141 complain_overflow_dont, /* complain_on_overflow */
1142 ppc64_elf_sectoff_reloc, /* special_function */
1143 "R_PPC64_SECTOFF_LO_DS",/* name */
1144 FALSE, /* partial_inplace */
1145 0, /* src_mask */
1146 0xfffc, /* dst_mask */
1147 FALSE), /* pcrel_offset */
1148
1149 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1150 HOWTO (R_PPC64_TOC16_DS, /* type */
1151 0, /* rightshift */
1152 1, /* size (0 = byte, 1 = short, 2 = long) */
1153 16, /* bitsize */
1154 FALSE, /* pc_relative */
1155 0, /* bitpos */
1156 complain_overflow_signed, /* complain_on_overflow */
1157 ppc64_elf_toc_reloc, /* special_function */
1158 "R_PPC64_TOC16_DS", /* name */
1159 FALSE, /* partial_inplace */
1160 0, /* src_mask */
1161 0xfffc, /* dst_mask */
1162 FALSE), /* pcrel_offset */
1163
1164 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1165 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1166 0, /* rightshift */
1167 1, /* size (0 = byte, 1 = short, 2 = long) */
1168 16, /* bitsize */
1169 FALSE, /* pc_relative */
1170 0, /* bitpos */
1171 complain_overflow_dont, /* complain_on_overflow */
1172 ppc64_elf_toc_reloc, /* special_function */
1173 "R_PPC64_TOC16_LO_DS", /* name */
1174 FALSE, /* partial_inplace */
1175 0, /* src_mask */
1176 0xfffc, /* dst_mask */
1177 FALSE), /* pcrel_offset */
1178
1179 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1180 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1181 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1182 0, /* rightshift */
1183 1, /* size (0 = byte, 1 = short, 2 = long) */
1184 16, /* bitsize */
1185 FALSE, /* pc_relative */
1186 0, /* bitpos */
1187 complain_overflow_signed, /* complain_on_overflow */
1188 ppc64_elf_unhandled_reloc, /* special_function */
1189 "R_PPC64_PLTGOT16_DS", /* name */
1190 FALSE, /* partial_inplace */
1191 0, /* src_mask */
1192 0xfffc, /* dst_mask */
1193 FALSE), /* pcrel_offset */
1194
1195 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1196 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1197 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1198 0, /* rightshift */
1199 1, /* size (0 = byte, 1 = short, 2 = long) */
1200 16, /* bitsize */
1201 FALSE, /* pc_relative */
1202 0, /* bitpos */
1203 complain_overflow_dont, /* complain_on_overflow */
1204 ppc64_elf_unhandled_reloc, /* special_function */
1205 "R_PPC64_PLTGOT16_LO_DS",/* name */
1206 FALSE, /* partial_inplace */
1207 0, /* src_mask */
1208 0xfffc, /* dst_mask */
1209 FALSE), /* pcrel_offset */
1210
1211 /* Marker reloc for TLS. */
1212 HOWTO (R_PPC64_TLS,
1213 0, /* rightshift */
1214 2, /* size (0 = byte, 1 = short, 2 = long) */
1215 32, /* bitsize */
1216 FALSE, /* pc_relative */
1217 0, /* bitpos */
1218 complain_overflow_dont, /* complain_on_overflow */
1219 bfd_elf_generic_reloc, /* special_function */
1220 "R_PPC64_TLS", /* name */
1221 FALSE, /* partial_inplace */
1222 0, /* src_mask */
1223 0, /* dst_mask */
1224 FALSE), /* pcrel_offset */
1225
1226 /* Computes the load module index of the load module that contains the
1227 definition of its TLS sym. */
1228 HOWTO (R_PPC64_DTPMOD64,
1229 0, /* rightshift */
1230 4, /* size (0 = byte, 1 = short, 2 = long) */
1231 64, /* bitsize */
1232 FALSE, /* pc_relative */
1233 0, /* bitpos */
1234 complain_overflow_dont, /* complain_on_overflow */
1235 ppc64_elf_unhandled_reloc, /* special_function */
1236 "R_PPC64_DTPMOD64", /* name */
1237 FALSE, /* partial_inplace */
1238 0, /* src_mask */
1239 ONES (64), /* dst_mask */
1240 FALSE), /* pcrel_offset */
1241
1242 /* Computes a dtv-relative displacement, the difference between the value
1243 of sym+add and the base address of the thread-local storage block that
1244 contains the definition of sym, minus 0x8000. */
1245 HOWTO (R_PPC64_DTPREL64,
1246 0, /* rightshift */
1247 4, /* size (0 = byte, 1 = short, 2 = long) */
1248 64, /* bitsize */
1249 FALSE, /* pc_relative */
1250 0, /* bitpos */
1251 complain_overflow_dont, /* complain_on_overflow */
1252 ppc64_elf_unhandled_reloc, /* special_function */
1253 "R_PPC64_DTPREL64", /* name */
1254 FALSE, /* partial_inplace */
1255 0, /* src_mask */
1256 ONES (64), /* dst_mask */
1257 FALSE), /* pcrel_offset */
1258
1259 /* A 16 bit dtprel reloc. */
1260 HOWTO (R_PPC64_DTPREL16,
1261 0, /* rightshift */
1262 1, /* size (0 = byte, 1 = short, 2 = long) */
1263 16, /* bitsize */
1264 FALSE, /* pc_relative */
1265 0, /* bitpos */
1266 complain_overflow_signed, /* complain_on_overflow */
1267 ppc64_elf_unhandled_reloc, /* special_function */
1268 "R_PPC64_DTPREL16", /* name */
1269 FALSE, /* partial_inplace */
1270 0, /* src_mask */
1271 0xffff, /* dst_mask */
1272 FALSE), /* pcrel_offset */
1273
1274 /* Like DTPREL16, but no overflow. */
1275 HOWTO (R_PPC64_DTPREL16_LO,
1276 0, /* rightshift */
1277 1, /* size (0 = byte, 1 = short, 2 = long) */
1278 16, /* bitsize */
1279 FALSE, /* pc_relative */
1280 0, /* bitpos */
1281 complain_overflow_dont, /* complain_on_overflow */
1282 ppc64_elf_unhandled_reloc, /* special_function */
1283 "R_PPC64_DTPREL16_LO", /* name */
1284 FALSE, /* partial_inplace */
1285 0, /* src_mask */
1286 0xffff, /* dst_mask */
1287 FALSE), /* pcrel_offset */
1288
1289 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1290 HOWTO (R_PPC64_DTPREL16_HI,
1291 16, /* rightshift */
1292 1, /* size (0 = byte, 1 = short, 2 = long) */
1293 16, /* bitsize */
1294 FALSE, /* pc_relative */
1295 0, /* bitpos */
1296 complain_overflow_dont, /* complain_on_overflow */
1297 ppc64_elf_unhandled_reloc, /* special_function */
1298 "R_PPC64_DTPREL16_HI", /* name */
1299 FALSE, /* partial_inplace */
1300 0, /* src_mask */
1301 0xffff, /* dst_mask */
1302 FALSE), /* pcrel_offset */
1303
1304 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1305 HOWTO (R_PPC64_DTPREL16_HA,
1306 16, /* rightshift */
1307 1, /* size (0 = byte, 1 = short, 2 = long) */
1308 16, /* bitsize */
1309 FALSE, /* pc_relative */
1310 0, /* bitpos */
1311 complain_overflow_dont, /* complain_on_overflow */
1312 ppc64_elf_unhandled_reloc, /* special_function */
1313 "R_PPC64_DTPREL16_HA", /* name */
1314 FALSE, /* partial_inplace */
1315 0, /* src_mask */
1316 0xffff, /* dst_mask */
1317 FALSE), /* pcrel_offset */
1318
1319 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1320 HOWTO (R_PPC64_DTPREL16_HIGHER,
1321 32, /* rightshift */
1322 1, /* size (0 = byte, 1 = short, 2 = long) */
1323 16, /* bitsize */
1324 FALSE, /* pc_relative */
1325 0, /* bitpos */
1326 complain_overflow_dont, /* complain_on_overflow */
1327 ppc64_elf_unhandled_reloc, /* special_function */
1328 "R_PPC64_DTPREL16_HIGHER", /* name */
1329 FALSE, /* partial_inplace */
1330 0, /* src_mask */
1331 0xffff, /* dst_mask */
1332 FALSE), /* pcrel_offset */
1333
1334 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1335 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1336 32, /* rightshift */
1337 1, /* size (0 = byte, 1 = short, 2 = long) */
1338 16, /* bitsize */
1339 FALSE, /* pc_relative */
1340 0, /* bitpos */
1341 complain_overflow_dont, /* complain_on_overflow */
1342 ppc64_elf_unhandled_reloc, /* special_function */
1343 "R_PPC64_DTPREL16_HIGHERA", /* name */
1344 FALSE, /* partial_inplace */
1345 0, /* src_mask */
1346 0xffff, /* dst_mask */
1347 FALSE), /* pcrel_offset */
1348
1349 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1350 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1351 48, /* rightshift */
1352 1, /* size (0 = byte, 1 = short, 2 = long) */
1353 16, /* bitsize */
1354 FALSE, /* pc_relative */
1355 0, /* bitpos */
1356 complain_overflow_dont, /* complain_on_overflow */
1357 ppc64_elf_unhandled_reloc, /* special_function */
1358 "R_PPC64_DTPREL16_HIGHEST", /* name */
1359 FALSE, /* partial_inplace */
1360 0, /* src_mask */
1361 0xffff, /* dst_mask */
1362 FALSE), /* pcrel_offset */
1363
1364 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1365 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1366 48, /* rightshift */
1367 1, /* size (0 = byte, 1 = short, 2 = long) */
1368 16, /* bitsize */
1369 FALSE, /* pc_relative */
1370 0, /* bitpos */
1371 complain_overflow_dont, /* complain_on_overflow */
1372 ppc64_elf_unhandled_reloc, /* special_function */
1373 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1374 FALSE, /* partial_inplace */
1375 0, /* src_mask */
1376 0xffff, /* dst_mask */
1377 FALSE), /* pcrel_offset */
1378
1379 /* Like DTPREL16, but for insns with a DS field. */
1380 HOWTO (R_PPC64_DTPREL16_DS,
1381 0, /* rightshift */
1382 1, /* size (0 = byte, 1 = short, 2 = long) */
1383 16, /* bitsize */
1384 FALSE, /* pc_relative */
1385 0, /* bitpos */
1386 complain_overflow_signed, /* complain_on_overflow */
1387 ppc64_elf_unhandled_reloc, /* special_function */
1388 "R_PPC64_DTPREL16_DS", /* name */
1389 FALSE, /* partial_inplace */
1390 0, /* src_mask */
1391 0xfffc, /* dst_mask */
1392 FALSE), /* pcrel_offset */
1393
1394 /* Like DTPREL16_DS, but no overflow. */
1395 HOWTO (R_PPC64_DTPREL16_LO_DS,
1396 0, /* rightshift */
1397 1, /* size (0 = byte, 1 = short, 2 = long) */
1398 16, /* bitsize */
1399 FALSE, /* pc_relative */
1400 0, /* bitpos */
1401 complain_overflow_dont, /* complain_on_overflow */
1402 ppc64_elf_unhandled_reloc, /* special_function */
1403 "R_PPC64_DTPREL16_LO_DS", /* name */
1404 FALSE, /* partial_inplace */
1405 0, /* src_mask */
1406 0xfffc, /* dst_mask */
1407 FALSE), /* pcrel_offset */
1408
1409 /* Computes a tp-relative displacement, the difference between the value of
1410 sym+add and the value of the thread pointer (r13). */
1411 HOWTO (R_PPC64_TPREL64,
1412 0, /* rightshift */
1413 4, /* size (0 = byte, 1 = short, 2 = long) */
1414 64, /* bitsize */
1415 FALSE, /* pc_relative */
1416 0, /* bitpos */
1417 complain_overflow_dont, /* complain_on_overflow */
1418 ppc64_elf_unhandled_reloc, /* special_function */
1419 "R_PPC64_TPREL64", /* name */
1420 FALSE, /* partial_inplace */
1421 0, /* src_mask */
1422 ONES (64), /* dst_mask */
1423 FALSE), /* pcrel_offset */
1424
1425 /* A 16 bit tprel reloc. */
1426 HOWTO (R_PPC64_TPREL16,
1427 0, /* rightshift */
1428 1, /* size (0 = byte, 1 = short, 2 = long) */
1429 16, /* bitsize */
1430 FALSE, /* pc_relative */
1431 0, /* bitpos */
1432 complain_overflow_signed, /* complain_on_overflow */
1433 ppc64_elf_unhandled_reloc, /* special_function */
1434 "R_PPC64_TPREL16", /* name */
1435 FALSE, /* partial_inplace */
1436 0, /* src_mask */
1437 0xffff, /* dst_mask */
1438 FALSE), /* pcrel_offset */
1439
1440 /* Like TPREL16, but no overflow. */
1441 HOWTO (R_PPC64_TPREL16_LO,
1442 0, /* rightshift */
1443 1, /* size (0 = byte, 1 = short, 2 = long) */
1444 16, /* bitsize */
1445 FALSE, /* pc_relative */
1446 0, /* bitpos */
1447 complain_overflow_dont, /* complain_on_overflow */
1448 ppc64_elf_unhandled_reloc, /* special_function */
1449 "R_PPC64_TPREL16_LO", /* name */
1450 FALSE, /* partial_inplace */
1451 0, /* src_mask */
1452 0xffff, /* dst_mask */
1453 FALSE), /* pcrel_offset */
1454
1455 /* Like TPREL16_LO, but next higher group of 16 bits. */
1456 HOWTO (R_PPC64_TPREL16_HI,
1457 16, /* rightshift */
1458 1, /* size (0 = byte, 1 = short, 2 = long) */
1459 16, /* bitsize */
1460 FALSE, /* pc_relative */
1461 0, /* bitpos */
1462 complain_overflow_dont, /* complain_on_overflow */
1463 ppc64_elf_unhandled_reloc, /* special_function */
1464 "R_PPC64_TPREL16_HI", /* name */
1465 FALSE, /* partial_inplace */
1466 0, /* src_mask */
1467 0xffff, /* dst_mask */
1468 FALSE), /* pcrel_offset */
1469
1470 /* Like TPREL16_HI, but adjust for low 16 bits. */
1471 HOWTO (R_PPC64_TPREL16_HA,
1472 16, /* rightshift */
1473 1, /* size (0 = byte, 1 = short, 2 = long) */
1474 16, /* bitsize */
1475 FALSE, /* pc_relative */
1476 0, /* bitpos */
1477 complain_overflow_dont, /* complain_on_overflow */
1478 ppc64_elf_unhandled_reloc, /* special_function */
1479 "R_PPC64_TPREL16_HA", /* name */
1480 FALSE, /* partial_inplace */
1481 0, /* src_mask */
1482 0xffff, /* dst_mask */
1483 FALSE), /* pcrel_offset */
1484
1485 /* Like TPREL16_HI, but next higher group of 16 bits. */
1486 HOWTO (R_PPC64_TPREL16_HIGHER,
1487 32, /* rightshift */
1488 1, /* size (0 = byte, 1 = short, 2 = long) */
1489 16, /* bitsize */
1490 FALSE, /* pc_relative */
1491 0, /* bitpos */
1492 complain_overflow_dont, /* complain_on_overflow */
1493 ppc64_elf_unhandled_reloc, /* special_function */
1494 "R_PPC64_TPREL16_HIGHER", /* name */
1495 FALSE, /* partial_inplace */
1496 0, /* src_mask */
1497 0xffff, /* dst_mask */
1498 FALSE), /* pcrel_offset */
1499
1500 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1501 HOWTO (R_PPC64_TPREL16_HIGHERA,
1502 32, /* rightshift */
1503 1, /* size (0 = byte, 1 = short, 2 = long) */
1504 16, /* bitsize */
1505 FALSE, /* pc_relative */
1506 0, /* bitpos */
1507 complain_overflow_dont, /* complain_on_overflow */
1508 ppc64_elf_unhandled_reloc, /* special_function */
1509 "R_PPC64_TPREL16_HIGHERA", /* name */
1510 FALSE, /* partial_inplace */
1511 0, /* src_mask */
1512 0xffff, /* dst_mask */
1513 FALSE), /* pcrel_offset */
1514
1515 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1516 HOWTO (R_PPC64_TPREL16_HIGHEST,
1517 48, /* rightshift */
1518 1, /* size (0 = byte, 1 = short, 2 = long) */
1519 16, /* bitsize */
1520 FALSE, /* pc_relative */
1521 0, /* bitpos */
1522 complain_overflow_dont, /* complain_on_overflow */
1523 ppc64_elf_unhandled_reloc, /* special_function */
1524 "R_PPC64_TPREL16_HIGHEST", /* name */
1525 FALSE, /* partial_inplace */
1526 0, /* src_mask */
1527 0xffff, /* dst_mask */
1528 FALSE), /* pcrel_offset */
1529
1530 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1531 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1532 48, /* rightshift */
1533 1, /* size (0 = byte, 1 = short, 2 = long) */
1534 16, /* bitsize */
1535 FALSE, /* pc_relative */
1536 0, /* bitpos */
1537 complain_overflow_dont, /* complain_on_overflow */
1538 ppc64_elf_unhandled_reloc, /* special_function */
1539 "R_PPC64_TPREL16_HIGHESTA", /* name */
1540 FALSE, /* partial_inplace */
1541 0, /* src_mask */
1542 0xffff, /* dst_mask */
1543 FALSE), /* pcrel_offset */
1544
1545 /* Like TPREL16, but for insns with a DS field. */
1546 HOWTO (R_PPC64_TPREL16_DS,
1547 0, /* rightshift */
1548 1, /* size (0 = byte, 1 = short, 2 = long) */
1549 16, /* bitsize */
1550 FALSE, /* pc_relative */
1551 0, /* bitpos */
1552 complain_overflow_signed, /* complain_on_overflow */
1553 ppc64_elf_unhandled_reloc, /* special_function */
1554 "R_PPC64_TPREL16_DS", /* name */
1555 FALSE, /* partial_inplace */
1556 0, /* src_mask */
1557 0xfffc, /* dst_mask */
1558 FALSE), /* pcrel_offset */
1559
1560 /* Like TPREL16_DS, but no overflow. */
1561 HOWTO (R_PPC64_TPREL16_LO_DS,
1562 0, /* rightshift */
1563 1, /* size (0 = byte, 1 = short, 2 = long) */
1564 16, /* bitsize */
1565 FALSE, /* pc_relative */
1566 0, /* bitpos */
1567 complain_overflow_dont, /* complain_on_overflow */
1568 ppc64_elf_unhandled_reloc, /* special_function */
1569 "R_PPC64_TPREL16_LO_DS", /* name */
1570 FALSE, /* partial_inplace */
1571 0, /* src_mask */
1572 0xfffc, /* dst_mask */
1573 FALSE), /* pcrel_offset */
1574
1575 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1576 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1577 to the first entry relative to the TOC base (r2). */
1578 HOWTO (R_PPC64_GOT_TLSGD16,
1579 0, /* rightshift */
1580 1, /* size (0 = byte, 1 = short, 2 = long) */
1581 16, /* bitsize */
1582 FALSE, /* pc_relative */
1583 0, /* bitpos */
1584 complain_overflow_signed, /* complain_on_overflow */
1585 ppc64_elf_unhandled_reloc, /* special_function */
1586 "R_PPC64_GOT_TLSGD16", /* name */
1587 FALSE, /* partial_inplace */
1588 0, /* src_mask */
1589 0xffff, /* dst_mask */
1590 FALSE), /* pcrel_offset */
1591
1592 /* Like GOT_TLSGD16, but no overflow. */
1593 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1594 0, /* rightshift */
1595 1, /* size (0 = byte, 1 = short, 2 = long) */
1596 16, /* bitsize */
1597 FALSE, /* pc_relative */
1598 0, /* bitpos */
1599 complain_overflow_dont, /* complain_on_overflow */
1600 ppc64_elf_unhandled_reloc, /* special_function */
1601 "R_PPC64_GOT_TLSGD16_LO", /* name */
1602 FALSE, /* partial_inplace */
1603 0, /* src_mask */
1604 0xffff, /* dst_mask */
1605 FALSE), /* pcrel_offset */
1606
1607 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1608 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1609 16, /* rightshift */
1610 1, /* size (0 = byte, 1 = short, 2 = long) */
1611 16, /* bitsize */
1612 FALSE, /* pc_relative */
1613 0, /* bitpos */
1614 complain_overflow_dont, /* complain_on_overflow */
1615 ppc64_elf_unhandled_reloc, /* special_function */
1616 "R_PPC64_GOT_TLSGD16_HI", /* name */
1617 FALSE, /* partial_inplace */
1618 0, /* src_mask */
1619 0xffff, /* dst_mask */
1620 FALSE), /* pcrel_offset */
1621
1622 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1623 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1624 16, /* rightshift */
1625 1, /* size (0 = byte, 1 = short, 2 = long) */
1626 16, /* bitsize */
1627 FALSE, /* pc_relative */
1628 0, /* bitpos */
1629 complain_overflow_dont, /* complain_on_overflow */
1630 ppc64_elf_unhandled_reloc, /* special_function */
1631 "R_PPC64_GOT_TLSGD16_HA", /* name */
1632 FALSE, /* partial_inplace */
1633 0, /* src_mask */
1634 0xffff, /* dst_mask */
1635 FALSE), /* pcrel_offset */
1636
1637 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1638 with values (sym+add)@dtpmod and zero, and computes the offset to the
1639 first entry relative to the TOC base (r2). */
1640 HOWTO (R_PPC64_GOT_TLSLD16,
1641 0, /* rightshift */
1642 1, /* size (0 = byte, 1 = short, 2 = long) */
1643 16, /* bitsize */
1644 FALSE, /* pc_relative */
1645 0, /* bitpos */
1646 complain_overflow_signed, /* complain_on_overflow */
1647 ppc64_elf_unhandled_reloc, /* special_function */
1648 "R_PPC64_GOT_TLSLD16", /* name */
1649 FALSE, /* partial_inplace */
1650 0, /* src_mask */
1651 0xffff, /* dst_mask */
1652 FALSE), /* pcrel_offset */
1653
1654 /* Like GOT_TLSLD16, but no overflow. */
1655 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1656 0, /* rightshift */
1657 1, /* size (0 = byte, 1 = short, 2 = long) */
1658 16, /* bitsize */
1659 FALSE, /* pc_relative */
1660 0, /* bitpos */
1661 complain_overflow_dont, /* complain_on_overflow */
1662 ppc64_elf_unhandled_reloc, /* special_function */
1663 "R_PPC64_GOT_TLSLD16_LO", /* name */
1664 FALSE, /* partial_inplace */
1665 0, /* src_mask */
1666 0xffff, /* dst_mask */
1667 FALSE), /* pcrel_offset */
1668
1669 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1670 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1671 16, /* rightshift */
1672 1, /* size (0 = byte, 1 = short, 2 = long) */
1673 16, /* bitsize */
1674 FALSE, /* pc_relative */
1675 0, /* bitpos */
1676 complain_overflow_dont, /* complain_on_overflow */
1677 ppc64_elf_unhandled_reloc, /* special_function */
1678 "R_PPC64_GOT_TLSLD16_HI", /* name */
1679 FALSE, /* partial_inplace */
1680 0, /* src_mask */
1681 0xffff, /* dst_mask */
1682 FALSE), /* pcrel_offset */
1683
1684 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1685 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1686 16, /* rightshift */
1687 1, /* size (0 = byte, 1 = short, 2 = long) */
1688 16, /* bitsize */
1689 FALSE, /* pc_relative */
1690 0, /* bitpos */
1691 complain_overflow_dont, /* complain_on_overflow */
1692 ppc64_elf_unhandled_reloc, /* special_function */
1693 "R_PPC64_GOT_TLSLD16_HA", /* name */
1694 FALSE, /* partial_inplace */
1695 0, /* src_mask */
1696 0xffff, /* dst_mask */
1697 FALSE), /* pcrel_offset */
1698
1699 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1700 the offset to the entry relative to the TOC base (r2). */
1701 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1702 0, /* rightshift */
1703 1, /* size (0 = byte, 1 = short, 2 = long) */
1704 16, /* bitsize */
1705 FALSE, /* pc_relative */
1706 0, /* bitpos */
1707 complain_overflow_signed, /* complain_on_overflow */
1708 ppc64_elf_unhandled_reloc, /* special_function */
1709 "R_PPC64_GOT_DTPREL16_DS", /* name */
1710 FALSE, /* partial_inplace */
1711 0, /* src_mask */
1712 0xfffc, /* dst_mask */
1713 FALSE), /* pcrel_offset */
1714
1715 /* Like GOT_DTPREL16_DS, but no overflow. */
1716 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1717 0, /* rightshift */
1718 1, /* size (0 = byte, 1 = short, 2 = long) */
1719 16, /* bitsize */
1720 FALSE, /* pc_relative */
1721 0, /* bitpos */
1722 complain_overflow_dont, /* complain_on_overflow */
1723 ppc64_elf_unhandled_reloc, /* special_function */
1724 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1725 FALSE, /* partial_inplace */
1726 0, /* src_mask */
1727 0xfffc, /* dst_mask */
1728 FALSE), /* pcrel_offset */
1729
1730 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1731 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1732 16, /* rightshift */
1733 1, /* size (0 = byte, 1 = short, 2 = long) */
1734 16, /* bitsize */
1735 FALSE, /* pc_relative */
1736 0, /* bitpos */
1737 complain_overflow_dont, /* complain_on_overflow */
1738 ppc64_elf_unhandled_reloc, /* special_function */
1739 "R_PPC64_GOT_DTPREL16_HI", /* name */
1740 FALSE, /* partial_inplace */
1741 0, /* src_mask */
1742 0xffff, /* dst_mask */
1743 FALSE), /* pcrel_offset */
1744
1745 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1746 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1747 16, /* rightshift */
1748 1, /* size (0 = byte, 1 = short, 2 = long) */
1749 16, /* bitsize */
1750 FALSE, /* pc_relative */
1751 0, /* bitpos */
1752 complain_overflow_dont, /* complain_on_overflow */
1753 ppc64_elf_unhandled_reloc, /* special_function */
1754 "R_PPC64_GOT_DTPREL16_HA", /* name */
1755 FALSE, /* partial_inplace */
1756 0, /* src_mask */
1757 0xffff, /* dst_mask */
1758 FALSE), /* pcrel_offset */
1759
1760 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1761 offset to the entry relative to the TOC base (r2). */
1762 HOWTO (R_PPC64_GOT_TPREL16_DS,
1763 0, /* rightshift */
1764 1, /* size (0 = byte, 1 = short, 2 = long) */
1765 16, /* bitsize */
1766 FALSE, /* pc_relative */
1767 0, /* bitpos */
1768 complain_overflow_signed, /* complain_on_overflow */
1769 ppc64_elf_unhandled_reloc, /* special_function */
1770 "R_PPC64_GOT_TPREL16_DS", /* name */
1771 FALSE, /* partial_inplace */
1772 0, /* src_mask */
1773 0xfffc, /* dst_mask */
1774 FALSE), /* pcrel_offset */
1775
1776 /* Like GOT_TPREL16_DS, but no overflow. */
1777 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1778 0, /* rightshift */
1779 1, /* size (0 = byte, 1 = short, 2 = long) */
1780 16, /* bitsize */
1781 FALSE, /* pc_relative */
1782 0, /* bitpos */
1783 complain_overflow_dont, /* complain_on_overflow */
1784 ppc64_elf_unhandled_reloc, /* special_function */
1785 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1786 FALSE, /* partial_inplace */
1787 0, /* src_mask */
1788 0xfffc, /* dst_mask */
1789 FALSE), /* pcrel_offset */
1790
1791 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1792 HOWTO (R_PPC64_GOT_TPREL16_HI,
1793 16, /* rightshift */
1794 1, /* size (0 = byte, 1 = short, 2 = long) */
1795 16, /* bitsize */
1796 FALSE, /* pc_relative */
1797 0, /* bitpos */
1798 complain_overflow_dont, /* complain_on_overflow */
1799 ppc64_elf_unhandled_reloc, /* special_function */
1800 "R_PPC64_GOT_TPREL16_HI", /* name */
1801 FALSE, /* partial_inplace */
1802 0, /* src_mask */
1803 0xffff, /* dst_mask */
1804 FALSE), /* pcrel_offset */
1805
1806 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1807 HOWTO (R_PPC64_GOT_TPREL16_HA,
1808 16, /* rightshift */
1809 1, /* size (0 = byte, 1 = short, 2 = long) */
1810 16, /* bitsize */
1811 FALSE, /* pc_relative */
1812 0, /* bitpos */
1813 complain_overflow_dont, /* complain_on_overflow */
1814 ppc64_elf_unhandled_reloc, /* special_function */
1815 "R_PPC64_GOT_TPREL16_HA", /* name */
1816 FALSE, /* partial_inplace */
1817 0, /* src_mask */
1818 0xffff, /* dst_mask */
1819 FALSE), /* pcrel_offset */
1820
1821 /* GNU extension to record C++ vtable hierarchy. */
1822 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1823 0, /* rightshift */
1824 0, /* size (0 = byte, 1 = short, 2 = long) */
1825 0, /* bitsize */
1826 FALSE, /* pc_relative */
1827 0, /* bitpos */
1828 complain_overflow_dont, /* complain_on_overflow */
1829 NULL, /* special_function */
1830 "R_PPC64_GNU_VTINHERIT", /* name */
1831 FALSE, /* partial_inplace */
1832 0, /* src_mask */
1833 0, /* dst_mask */
1834 FALSE), /* pcrel_offset */
1835
1836 /* GNU extension to record C++ vtable member usage. */
1837 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1838 0, /* rightshift */
1839 0, /* size (0 = byte, 1 = short, 2 = long) */
1840 0, /* bitsize */
1841 FALSE, /* pc_relative */
1842 0, /* bitpos */
1843 complain_overflow_dont, /* complain_on_overflow */
1844 NULL, /* special_function */
1845 "R_PPC64_GNU_VTENTRY", /* name */
1846 FALSE, /* partial_inplace */
1847 0, /* src_mask */
1848 0, /* dst_mask */
1849 FALSE), /* pcrel_offset */
1850 };
1851
1852 \f
1853 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
1854 be done. */
1855
1856 static void
1857 ppc_howto_init (void)
1858 {
1859 unsigned int i, type;
1860
1861 for (i = 0;
1862 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1863 i++)
1864 {
1865 type = ppc64_elf_howto_raw[i].type;
1866 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1867 / sizeof (ppc64_elf_howto_table[0])));
1868 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1869 }
1870 }
1871
1872 static reloc_howto_type *
1873 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1874 bfd_reloc_code_real_type code)
1875 {
1876 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1877
1878 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1879 /* Initialize howto table if needed. */
1880 ppc_howto_init ();
1881
1882 switch (code)
1883 {
1884 default:
1885 return NULL;
1886
1887 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1888 break;
1889 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1890 break;
1891 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1892 break;
1893 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1894 break;
1895 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1896 break;
1897 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1898 break;
1899 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1900 break;
1901 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1902 break;
1903 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1904 break;
1905 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1906 break;
1907 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1908 break;
1909 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1910 break;
1911 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1912 break;
1913 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1914 break;
1915 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1916 break;
1917 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1918 break;
1919 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1920 break;
1921 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1922 break;
1923 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1924 break;
1925 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1926 break;
1927 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1928 break;
1929 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1930 break;
1931 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1932 break;
1933 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1934 break;
1935 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1936 break;
1937 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1938 break;
1939 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1940 break;
1941 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1942 break;
1943 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1944 break;
1945 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1946 break;
1947 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1948 break;
1949 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1950 break;
1951 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1952 break;
1953 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1954 break;
1955 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1956 break;
1957 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1958 break;
1959 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1960 break;
1961 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1962 break;
1963 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1964 break;
1965 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1966 break;
1967 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1968 break;
1969 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1970 break;
1971 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1972 break;
1973 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
1974 break;
1975 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
1976 break;
1977 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
1978 break;
1979 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
1980 break;
1981 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
1982 break;
1983 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
1984 break;
1985 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
1986 break;
1987 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
1988 break;
1989 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
1990 break;
1991 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
1992 break;
1993 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
1994 break;
1995 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
1996 break;
1997 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
1998 break;
1999 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2000 break;
2001 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2002 break;
2003 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2004 break;
2005 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2006 break;
2007 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2008 break;
2009 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2010 break;
2011 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2012 break;
2013 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2014 break;
2015 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2016 break;
2017 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2018 break;
2019 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2020 break;
2021 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2022 break;
2023 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2024 break;
2025 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2026 break;
2027 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2028 break;
2029 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2030 break;
2031 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2032 break;
2033 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2034 break;
2035 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2036 break;
2037 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2038 break;
2039 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2040 break;
2041 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2042 break;
2043 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2044 break;
2045 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2046 break;
2047 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2048 break;
2049 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2050 break;
2051 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2052 break;
2053 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2054 break;
2055 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2056 break;
2057 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2058 break;
2059 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2060 break;
2061 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2062 break;
2063 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2064 break;
2065 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2066 break;
2067 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2068 break;
2069 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2070 break;
2071 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2072 break;
2073 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2074 break;
2075 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2076 break;
2077 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2078 break;
2079 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2080 break;
2081 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2082 break;
2083 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2084 break;
2085 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2086 break;
2087 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2088 break;
2089 }
2090
2091 return ppc64_elf_howto_table[r];
2092 };
2093
2094 /* Set the howto pointer for a PowerPC ELF reloc. */
2095
2096 static void
2097 ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2098 Elf_Internal_Rela *dst)
2099 {
2100 unsigned int type;
2101
2102 /* Initialize howto table if needed. */
2103 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2104 ppc_howto_init ();
2105
2106 type = ELF64_R_TYPE (dst->r_info);
2107 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2108 / sizeof (ppc64_elf_howto_table[0])));
2109 cache_ptr->howto = ppc64_elf_howto_table[type];
2110 }
2111
2112 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2113
2114 static bfd_reloc_status_type
2115 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2116 void *data, asection *input_section,
2117 bfd *output_bfd, char **error_message)
2118 {
2119 /* If this is a relocatable link (output_bfd test tells us), just
2120 call the generic function. Any adjustment will be done at final
2121 link time. */
2122 if (output_bfd != NULL)
2123 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2124 input_section, output_bfd, error_message);
2125
2126 /* Adjust the addend for sign extension of the low 16 bits.
2127 We won't actually be using the low 16 bits, so trashing them
2128 doesn't matter. */
2129 reloc_entry->addend += 0x8000;
2130 return bfd_reloc_continue;
2131 }
2132
2133 static bfd_reloc_status_type
2134 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2135 void *data, asection *input_section,
2136 bfd *output_bfd, char **error_message)
2137 {
2138 long insn;
2139 enum elf_ppc64_reloc_type r_type;
2140 bfd_size_type octets;
2141 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2142 bfd_boolean is_power4 = FALSE;
2143
2144 /* If this is a relocatable link (output_bfd test tells us), just
2145 call the generic function. Any adjustment will be done at final
2146 link time. */
2147 if (output_bfd != NULL)
2148 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2149 input_section, output_bfd, error_message);
2150
2151 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2152 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2153 insn &= ~(0x01 << 21);
2154 r_type = reloc_entry->howto->type;
2155 if (r_type == R_PPC64_ADDR14_BRTAKEN
2156 || r_type == R_PPC64_REL14_BRTAKEN)
2157 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2158
2159 if (is_power4)
2160 {
2161 /* Set 'a' bit. This is 0b00010 in BO field for branch
2162 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2163 for branch on CTR insns (BO == 1a00t or 1a01t). */
2164 if ((insn & (0x14 << 21)) == (0x04 << 21))
2165 insn |= 0x02 << 21;
2166 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2167 insn |= 0x08 << 21;
2168 else
2169 return bfd_reloc_continue;
2170 }
2171 else
2172 {
2173 bfd_vma target = 0;
2174 bfd_vma from;
2175
2176 if (!bfd_is_com_section (symbol->section))
2177 target = symbol->value;
2178 target += symbol->section->output_section->vma;
2179 target += symbol->section->output_offset;
2180 target += reloc_entry->addend;
2181
2182 from = (reloc_entry->address
2183 + input_section->output_offset
2184 + input_section->output_section->vma);
2185
2186 /* Invert 'y' bit if not the default. */
2187 if ((bfd_signed_vma) (target - from) < 0)
2188 insn ^= 0x01 << 21;
2189 }
2190 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2191 return bfd_reloc_continue;
2192 }
2193
2194 static bfd_reloc_status_type
2195 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2196 void *data, asection *input_section,
2197 bfd *output_bfd, char **error_message)
2198 {
2199 /* If this is a relocatable link (output_bfd test tells us), just
2200 call the generic function. Any adjustment will be done at final
2201 link time. */
2202 if (output_bfd != NULL)
2203 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2204 input_section, output_bfd, error_message);
2205
2206 /* Subtract the symbol section base address. */
2207 reloc_entry->addend -= symbol->section->output_section->vma;
2208 return bfd_reloc_continue;
2209 }
2210
2211 static bfd_reloc_status_type
2212 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2213 void *data, asection *input_section,
2214 bfd *output_bfd, char **error_message)
2215 {
2216 /* If this is a relocatable link (output_bfd test tells us), just
2217 call the generic function. Any adjustment will be done at final
2218 link time. */
2219 if (output_bfd != NULL)
2220 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2221 input_section, output_bfd, error_message);
2222
2223 /* Subtract the symbol section base address. */
2224 reloc_entry->addend -= symbol->section->output_section->vma;
2225
2226 /* Adjust the addend for sign extension of the low 16 bits. */
2227 reloc_entry->addend += 0x8000;
2228 return bfd_reloc_continue;
2229 }
2230
2231 static bfd_reloc_status_type
2232 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2233 void *data, asection *input_section,
2234 bfd *output_bfd, char **error_message)
2235 {
2236 bfd_vma TOCstart;
2237
2238 /* If this is a relocatable link (output_bfd test tells us), just
2239 call the generic function. Any adjustment will be done at final
2240 link time. */
2241 if (output_bfd != NULL)
2242 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2243 input_section, output_bfd, error_message);
2244
2245 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2246 if (TOCstart == 0)
2247 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2248
2249 /* Subtract the TOC base address. */
2250 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2251 return bfd_reloc_continue;
2252 }
2253
2254 static bfd_reloc_status_type
2255 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2256 void *data, asection *input_section,
2257 bfd *output_bfd, char **error_message)
2258 {
2259 bfd_vma TOCstart;
2260
2261 /* If this is a relocatable link (output_bfd test tells us), just
2262 call the generic function. Any adjustment will be done at final
2263 link time. */
2264 if (output_bfd != NULL)
2265 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2266 input_section, output_bfd, error_message);
2267
2268 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2269 if (TOCstart == 0)
2270 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2271
2272 /* Subtract the TOC base address. */
2273 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2274
2275 /* Adjust the addend for sign extension of the low 16 bits. */
2276 reloc_entry->addend += 0x8000;
2277 return bfd_reloc_continue;
2278 }
2279
2280 static bfd_reloc_status_type
2281 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2282 void *data, asection *input_section,
2283 bfd *output_bfd, char **error_message)
2284 {
2285 bfd_vma TOCstart;
2286 bfd_size_type octets;
2287
2288 /* If this is a relocatable link (output_bfd test tells us), just
2289 call the generic function. Any adjustment will be done at final
2290 link time. */
2291 if (output_bfd != NULL)
2292 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2293 input_section, output_bfd, error_message);
2294
2295 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2296 if (TOCstart == 0)
2297 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2298
2299 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2300 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2301 return bfd_reloc_ok;
2302 }
2303
2304 static bfd_reloc_status_type
2305 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2306 void *data, asection *input_section,
2307 bfd *output_bfd, char **error_message)
2308 {
2309 /* If this is a relocatable link (output_bfd test tells us), just
2310 call the generic function. Any adjustment will be done at final
2311 link time. */
2312 if (output_bfd != NULL)
2313 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2314 input_section, output_bfd, error_message);
2315
2316 if (error_message != NULL)
2317 {
2318 static char buf[60];
2319 sprintf (buf, "generic linker can't handle %s",
2320 reloc_entry->howto->name);
2321 *error_message = buf;
2322 }
2323 return bfd_reloc_dangerous;
2324 }
2325
2326 struct ppc64_elf_obj_tdata
2327 {
2328 struct elf_obj_tdata elf;
2329
2330 /* Shortcuts to dynamic linker sections. */
2331 asection *got;
2332 asection *relgot;
2333
2334 /* TLS local dynamic got entry handling. Suppose for multiple GOT
2335 sections means we potentially need one of these for each input bfd. */
2336 union {
2337 bfd_signed_vma refcount;
2338 bfd_vma offset;
2339 } tlsld_got;
2340 };
2341
2342 #define ppc64_elf_tdata(bfd) \
2343 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2344
2345 #define ppc64_tlsld_got(bfd) \
2346 (&ppc64_elf_tdata (bfd)->tlsld_got)
2347
2348 /* Override the generic function because we store some extras. */
2349
2350 static bfd_boolean
2351 ppc64_elf_mkobject (bfd *abfd)
2352 {
2353 bfd_size_type amt = sizeof (struct ppc64_elf_obj_tdata);
2354 abfd->tdata.any = bfd_zalloc (abfd, amt);
2355 if (abfd->tdata.any == NULL)
2356 return FALSE;
2357 return TRUE;
2358 }
2359
2360 /* Fix bad default arch selected for a 64 bit input bfd when the
2361 default is 32 bit. */
2362
2363 static bfd_boolean
2364 ppc64_elf_object_p (bfd *abfd)
2365 {
2366 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2367 {
2368 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2369
2370 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2371 {
2372 /* Relies on arch after 32 bit default being 64 bit default. */
2373 abfd->arch_info = abfd->arch_info->next;
2374 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2375 }
2376 }
2377 return TRUE;
2378 }
2379
2380 /* Support for core dump NOTE sections. */
2381
2382 static bfd_boolean
2383 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2384 {
2385 size_t offset, size;
2386
2387 if (note->descsz != 504)
2388 return FALSE;
2389
2390 /* pr_cursig */
2391 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
2392
2393 /* pr_pid */
2394 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 32);
2395
2396 /* pr_reg */
2397 offset = 112;
2398 size = 384;
2399
2400 /* Make a ".reg/999" section. */
2401 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2402 size, note->descpos + offset);
2403 }
2404
2405 static bfd_boolean
2406 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2407 {
2408 if (note->descsz != 136)
2409 return FALSE;
2410
2411 elf_tdata (abfd)->core_program
2412 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2413 elf_tdata (abfd)->core_command
2414 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2415
2416 return TRUE;
2417 }
2418
2419 /* Merge backend specific data from an object file to the output
2420 object file when linking. */
2421
2422 static bfd_boolean
2423 ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
2424 {
2425 /* Check if we have the same endianess. */
2426 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
2427 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
2428 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2429 {
2430 const char *msg;
2431
2432 if (bfd_big_endian (ibfd))
2433 msg = _("%s: compiled for a big endian system "
2434 "and target is little endian");
2435 else
2436 msg = _("%s: compiled for a little endian system "
2437 "and target is big endian");
2438
2439 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
2440
2441 bfd_set_error (bfd_error_wrong_format);
2442 return FALSE;
2443 }
2444
2445 return TRUE;
2446 }
2447
2448 /* Add extra PPC sections. */
2449
2450 static struct bfd_elf_special_section const ppc64_elf_special_sections[]=
2451 {
2452 { ".sdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2453 { ".sbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2454 { ".plt", 4, 0, SHT_NOBITS, 0 },
2455 { ".toc", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2456 { ".toc1", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2457 { ".tocbss", 7, 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2458 { NULL, 0, 0, 0, 0 }
2459 };
2460
2461 struct _ppc64_elf_section_data
2462 {
2463 struct bfd_elf_section_data elf;
2464
2465 /* An array with one entry for each opd function descriptor. */
2466 union
2467 {
2468 /* Points to the function code section for local opd entries. */
2469 asection **func_sec;
2470 /* After editing .opd, adjust references to opd local syms. */
2471 long *adjust;
2472 } opd;
2473
2474 /* An array for toc sections, indexed by offset/8.
2475 Specifies the relocation symbol index used at a given toc offset. */
2476 unsigned *t_symndx;
2477 };
2478
2479 #define ppc64_elf_section_data(sec) \
2480 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2481
2482 static bfd_boolean
2483 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2484 {
2485 struct _ppc64_elf_section_data *sdata;
2486 bfd_size_type amt = sizeof (*sdata);
2487
2488 sdata = bfd_zalloc (abfd, amt);
2489 if (sdata == NULL)
2490 return FALSE;
2491 sec->used_by_bfd = sdata;
2492
2493 return _bfd_elf_new_section_hook (abfd, sec);
2494 }
2495
2496 static void *
2497 get_opd_info (asection * sec)
2498 {
2499 if (sec != NULL
2500 && ppc64_elf_section_data (sec) != NULL
2501 && ppc64_elf_section_data (sec)->opd.adjust != NULL)
2502 return ppc64_elf_section_data (sec)->opd.adjust;
2503 return NULL;
2504 }
2505 \f
2506 /* The following functions are specific to the ELF linker, while
2507 functions above are used generally. Those named ppc64_elf_* are
2508 called by the main ELF linker code. They appear in this file more
2509 or less in the order in which they are called. eg.
2510 ppc64_elf_check_relocs is called early in the link process,
2511 ppc64_elf_finish_dynamic_sections is one of the last functions
2512 called.
2513
2514 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2515 functions have both a function code symbol and a function descriptor
2516 symbol. A call to foo in a relocatable object file looks like:
2517
2518 . .text
2519 . x:
2520 . bl .foo
2521 . nop
2522
2523 The function definition in another object file might be:
2524
2525 . .section .opd
2526 . foo: .quad .foo
2527 . .quad .TOC.@tocbase
2528 . .quad 0
2529 .
2530 . .text
2531 . .foo: blr
2532
2533 When the linker resolves the call during a static link, the branch
2534 unsurprisingly just goes to .foo and the .opd information is unused.
2535 If the function definition is in a shared library, things are a little
2536 different: The call goes via a plt call stub, the opd information gets
2537 copied to the plt, and the linker patches the nop.
2538
2539 . x:
2540 . bl .foo_stub
2541 . ld 2,40(1)
2542 .
2543 .
2544 . .foo_stub:
2545 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
2546 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
2547 . std 2,40(1) # this is the general idea
2548 . ld 11,0(12)
2549 . ld 2,8(12)
2550 . mtctr 11
2551 . ld 11,16(12)
2552 . bctr
2553 .
2554 . .section .plt
2555 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2556
2557 The "reloc ()" notation is supposed to indicate that the linker emits
2558 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2559 copying.
2560
2561 What are the difficulties here? Well, firstly, the relocations
2562 examined by the linker in check_relocs are against the function code
2563 sym .foo, while the dynamic relocation in the plt is emitted against
2564 the function descriptor symbol, foo. Somewhere along the line, we need
2565 to carefully copy dynamic link information from one symbol to the other.
2566 Secondly, the generic part of the elf linker will make .foo a dynamic
2567 symbol as is normal for most other backends. We need foo dynamic
2568 instead, at least for an application final link. However, when
2569 creating a shared library containing foo, we need to have both symbols
2570 dynamic so that references to .foo are satisfied during the early
2571 stages of linking. Otherwise the linker might decide to pull in a
2572 definition from some other object, eg. a static library. */
2573
2574 /* The linker needs to keep track of the number of relocs that it
2575 decides to copy as dynamic relocs in check_relocs for each symbol.
2576 This is so that it can later discard them if they are found to be
2577 unnecessary. We store the information in a field extending the
2578 regular ELF linker hash table. */
2579
2580 struct ppc_dyn_relocs
2581 {
2582 struct ppc_dyn_relocs *next;
2583
2584 /* The input section of the reloc. */
2585 asection *sec;
2586
2587 /* Total number of relocs copied for the input section. */
2588 bfd_size_type count;
2589
2590 /* Number of pc-relative relocs copied for the input section. */
2591 bfd_size_type pc_count;
2592 };
2593
2594 /* Track GOT entries needed for a given symbol. We might need more
2595 than one got entry per symbol. */
2596 struct got_entry
2597 {
2598 struct got_entry *next;
2599
2600 /* The symbol addend that we'll be placing in the GOT. */
2601 bfd_vma addend;
2602
2603 /* Unlike other ELF targets, we use separate GOT entries for the same
2604 symbol referenced from different input files. This is to support
2605 automatic multiple TOC/GOT sections, where the TOC base can vary
2606 from one input file to another.
2607
2608 Point to the BFD owning this GOT entry. */
2609 bfd *owner;
2610
2611 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2612 TLS_TPREL or TLS_DTPREL for tls entries. */
2613 char tls_type;
2614
2615 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2616 union
2617 {
2618 bfd_signed_vma refcount;
2619 bfd_vma offset;
2620 } got;
2621 };
2622
2623 /* The same for PLT. */
2624 struct plt_entry
2625 {
2626 struct plt_entry *next;
2627
2628 bfd_vma addend;
2629
2630 union
2631 {
2632 bfd_signed_vma refcount;
2633 bfd_vma offset;
2634 } plt;
2635 };
2636
2637 /* Of those relocs that might be copied as dynamic relocs, this macro
2638 selects those that must be copied when linking a shared library,
2639 even when the symbol is local. */
2640
2641 #define MUST_BE_DYN_RELOC(RTYPE) \
2642 ((RTYPE) != R_PPC64_REL32 \
2643 && (RTYPE) != R_PPC64_REL64 \
2644 && (RTYPE) != R_PPC64_REL30)
2645
2646 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2647 copying dynamic variables from a shared lib into an app's dynbss
2648 section, and instead use a dynamic relocation to point into the
2649 shared lib. With code that gcc generates, it's vital that this be
2650 enabled; In the PowerPC64 ABI, the address of a function is actually
2651 the address of a function descriptor, which resides in the .opd
2652 section. gcc uses the descriptor directly rather than going via the
2653 GOT as some other ABI's do, which means that initialized function
2654 pointers must reference the descriptor. Thus, a function pointer
2655 initialized to the address of a function in a shared library will
2656 either require a copy reloc, or a dynamic reloc. Using a copy reloc
2657 redefines the function descriptor symbol to point to the copy. This
2658 presents a problem as a plt entry for that function is also
2659 initialized from the function descriptor symbol and the copy reloc
2660 may not be initialized first. */
2661 #define ELIMINATE_COPY_RELOCS 1
2662
2663 /* Section name for stubs is the associated section name plus this
2664 string. */
2665 #define STUB_SUFFIX ".stub"
2666
2667 /* Linker stubs.
2668 ppc_stub_long_branch:
2669 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2670 destination, but a 24 bit branch in a stub section will reach.
2671 . b dest
2672
2673 ppc_stub_plt_branch:
2674 Similar to the above, but a 24 bit branch in the stub section won't
2675 reach its destination.
2676 . addis %r12,%r2,xxx@toc@ha
2677 . ld %r11,xxx@toc@l(%r12)
2678 . mtctr %r11
2679 . bctr
2680
2681 ppc_stub_plt_call:
2682 Used to call a function in a shared library. If it so happens that
2683 the plt entry referenced crosses a 64k boundary, then an extra
2684 "addis %r12,%r12,1" will be inserted before the load at xxx+8 or
2685 xxx+16 as appropriate.
2686 . addis %r12,%r2,xxx@toc@ha
2687 . std %r2,40(%r1)
2688 . ld %r11,xxx+0@toc@l(%r12)
2689 . ld %r2,xxx+8@toc@l(%r12)
2690 . mtctr %r11
2691 . ld %r11,xxx+16@toc@l(%r12)
2692 . bctr
2693
2694 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2695 code to adjust the value and save r2 to support multiple toc sections.
2696 A ppc_stub_long_branch with an r2 offset looks like:
2697 . std %r2,40(%r1)
2698 . addis %r2,%r2,off@ha
2699 . addi %r2,%r2,off@l
2700 . b dest
2701
2702 A ppc_stub_plt_branch with an r2 offset looks like:
2703 . std %r2,40(%r1)
2704 . addis %r12,%r2,xxx@toc@ha
2705 . ld %r11,xxx@toc@l(%r12)
2706 . addis %r2,%r2,off@ha
2707 . addi %r2,%r2,off@l
2708 . mtctr %r11
2709 . bctr
2710 */
2711
2712 enum ppc_stub_type {
2713 ppc_stub_none,
2714 ppc_stub_long_branch,
2715 ppc_stub_long_branch_r2off,
2716 ppc_stub_plt_branch,
2717 ppc_stub_plt_branch_r2off,
2718 ppc_stub_plt_call
2719 };
2720
2721 struct ppc_stub_hash_entry {
2722
2723 /* Base hash table entry structure. */
2724 struct bfd_hash_entry root;
2725
2726 enum ppc_stub_type stub_type;
2727
2728 /* The stub section. */
2729 asection *stub_sec;
2730
2731 /* Offset within stub_sec of the beginning of this stub. */
2732 bfd_vma stub_offset;
2733
2734 /* Given the symbol's value and its section we can determine its final
2735 value when building the stubs (so the stub knows where to jump. */
2736 bfd_vma target_value;
2737 asection *target_section;
2738
2739 /* The symbol table entry, if any, that this was derived from. */
2740 struct ppc_link_hash_entry *h;
2741
2742 /* And the reloc addend that this was derived from. */
2743 bfd_vma addend;
2744
2745 /* Where this stub is being called from, or, in the case of combined
2746 stub sections, the first input section in the group. */
2747 asection *id_sec;
2748 };
2749
2750 struct ppc_branch_hash_entry {
2751
2752 /* Base hash table entry structure. */
2753 struct bfd_hash_entry root;
2754
2755 /* Offset within .branch_lt. */
2756 unsigned int offset;
2757
2758 /* Generation marker. */
2759 unsigned int iter;
2760 };
2761
2762 struct ppc_link_hash_entry
2763 {
2764 struct elf_link_hash_entry elf;
2765
2766 /* A pointer to the most recently used stub hash entry against this
2767 symbol. */
2768 struct ppc_stub_hash_entry *stub_cache;
2769
2770 /* Track dynamic relocs copied for this symbol. */
2771 struct ppc_dyn_relocs *dyn_relocs;
2772
2773 /* Link between function code and descriptor symbols. */
2774 struct ppc_link_hash_entry *oh;
2775
2776 /* Flag function code and descriptor symbols. */
2777 unsigned int is_func:1;
2778 unsigned int is_func_descriptor:1;
2779
2780 /* Whether global opd sym has been adjusted or not.
2781 After ppc64_elf_edit_opd has run, this flag should be set for all
2782 globals defined in any opd section. */
2783 unsigned int adjust_done:1;
2784
2785 /* Contexts in which symbol is used in the GOT (or TOC).
2786 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
2787 corresponding relocs are encountered during check_relocs.
2788 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2789 indicate the corresponding GOT entry type is not needed.
2790 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
2791 a TPREL one. We use a separate flag rather than setting TPREL
2792 just for convenience in distinguishing the two cases. */
2793 #define TLS_GD 1 /* GD reloc. */
2794 #define TLS_LD 2 /* LD reloc. */
2795 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
2796 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2797 #define TLS_TLS 16 /* Any TLS reloc. */
2798 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
2799 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
2800 char tls_mask;
2801 };
2802
2803 /* ppc64 ELF linker hash table. */
2804
2805 struct ppc_link_hash_table
2806 {
2807 struct elf_link_hash_table elf;
2808
2809 /* The stub hash table. */
2810 struct bfd_hash_table stub_hash_table;
2811
2812 /* Another hash table for plt_branch stubs. */
2813 struct bfd_hash_table branch_hash_table;
2814
2815 /* Linker stub bfd. */
2816 bfd *stub_bfd;
2817
2818 /* Linker call-backs. */
2819 asection * (*add_stub_section) (const char *, asection *);
2820 void (*layout_sections_again) (void);
2821
2822 /* Array to keep track of which stub sections have been created, and
2823 information on stub grouping. */
2824 struct map_stub {
2825 /* This is the section to which stubs in the group will be attached. */
2826 asection *link_sec;
2827 /* The stub section. */
2828 asection *stub_sec;
2829 /* Along with elf_gp, specifies the TOC pointer used in this group. */
2830 bfd_vma toc_off;
2831 } *stub_group;
2832
2833 /* Support for multiple toc sections. */
2834 unsigned int no_multi_toc;
2835 unsigned int multi_toc_needed;
2836
2837 /* Temp used when calculating TOC pointers. */
2838 bfd_vma toc_curr;
2839
2840 /* Highest input section id. */
2841 int top_id;
2842
2843 /* Highest output section index. */
2844 int top_index;
2845
2846 /* List of input sections for each output section. */
2847 asection **input_list;
2848
2849 /* Short-cuts to get to dynamic linker sections. */
2850 asection *got;
2851 asection *plt;
2852 asection *relplt;
2853 asection *dynbss;
2854 asection *relbss;
2855 asection *glink;
2856 asection *sfpr;
2857 asection *brlt;
2858 asection *relbrlt;
2859
2860 /* Shortcut to .__tls_get_addr. */
2861 struct elf_link_hash_entry *tls_get_addr;
2862
2863 /* Statistics. */
2864 unsigned long stub_count[ppc_stub_plt_call];
2865
2866 /* Set if we should emit symbols for stubs. */
2867 unsigned int emit_stub_syms;
2868
2869 /* Set on error. */
2870 unsigned int stub_error;
2871
2872 /* Flag set when small branches are detected. Used to
2873 select suitable defaults for the stub group size. */
2874 unsigned int has_14bit_branch;
2875
2876 /* Incremented every time we size stubs. */
2877 unsigned int stub_iteration;
2878
2879 /* Small local sym to section mapping cache. */
2880 struct sym_sec_cache sym_sec;
2881 };
2882
2883 /* Get the ppc64 ELF linker hash table from a link_info structure. */
2884
2885 #define ppc_hash_table(p) \
2886 ((struct ppc_link_hash_table *) ((p)->hash))
2887
2888 #define ppc_stub_hash_lookup(table, string, create, copy) \
2889 ((struct ppc_stub_hash_entry *) \
2890 bfd_hash_lookup ((table), (string), (create), (copy)))
2891
2892 #define ppc_branch_hash_lookup(table, string, create, copy) \
2893 ((struct ppc_branch_hash_entry *) \
2894 bfd_hash_lookup ((table), (string), (create), (copy)))
2895
2896 /* Create an entry in the stub hash table. */
2897
2898 static struct bfd_hash_entry *
2899 stub_hash_newfunc (struct bfd_hash_entry *entry,
2900 struct bfd_hash_table *table,
2901 const char *string)
2902 {
2903 /* Allocate the structure if it has not already been allocated by a
2904 subclass. */
2905 if (entry == NULL)
2906 {
2907 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2908 if (entry == NULL)
2909 return entry;
2910 }
2911
2912 /* Call the allocation method of the superclass. */
2913 entry = bfd_hash_newfunc (entry, table, string);
2914 if (entry != NULL)
2915 {
2916 struct ppc_stub_hash_entry *eh;
2917
2918 /* Initialize the local fields. */
2919 eh = (struct ppc_stub_hash_entry *) entry;
2920 eh->stub_type = ppc_stub_none;
2921 eh->stub_sec = NULL;
2922 eh->stub_offset = 0;
2923 eh->target_value = 0;
2924 eh->target_section = NULL;
2925 eh->h = NULL;
2926 eh->id_sec = NULL;
2927 }
2928
2929 return entry;
2930 }
2931
2932 /* Create an entry in the branch hash table. */
2933
2934 static struct bfd_hash_entry *
2935 branch_hash_newfunc (struct bfd_hash_entry *entry,
2936 struct bfd_hash_table *table,
2937 const char *string)
2938 {
2939 /* Allocate the structure if it has not already been allocated by a
2940 subclass. */
2941 if (entry == NULL)
2942 {
2943 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2944 if (entry == NULL)
2945 return entry;
2946 }
2947
2948 /* Call the allocation method of the superclass. */
2949 entry = bfd_hash_newfunc (entry, table, string);
2950 if (entry != NULL)
2951 {
2952 struct ppc_branch_hash_entry *eh;
2953
2954 /* Initialize the local fields. */
2955 eh = (struct ppc_branch_hash_entry *) entry;
2956 eh->offset = 0;
2957 eh->iter = 0;
2958 }
2959
2960 return entry;
2961 }
2962
2963 /* Create an entry in a ppc64 ELF linker hash table. */
2964
2965 static struct bfd_hash_entry *
2966 link_hash_newfunc (struct bfd_hash_entry *entry,
2967 struct bfd_hash_table *table,
2968 const char *string)
2969 {
2970 /* Allocate the structure if it has not already been allocated by a
2971 subclass. */
2972 if (entry == NULL)
2973 {
2974 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2975 if (entry == NULL)
2976 return entry;
2977 }
2978
2979 /* Call the allocation method of the superclass. */
2980 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2981 if (entry != NULL)
2982 {
2983 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2984
2985 eh->stub_cache = NULL;
2986 eh->dyn_relocs = NULL;
2987 eh->oh = NULL;
2988 eh->is_func = 0;
2989 eh->is_func_descriptor = 0;
2990 eh->adjust_done = 0;
2991 eh->tls_mask = 0;
2992 }
2993
2994 return entry;
2995 }
2996
2997 /* Create a ppc64 ELF linker hash table. */
2998
2999 static struct bfd_link_hash_table *
3000 ppc64_elf_link_hash_table_create (bfd *abfd)
3001 {
3002 struct ppc_link_hash_table *htab;
3003 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3004
3005 htab = bfd_zmalloc (amt);
3006 if (htab == NULL)
3007 return NULL;
3008
3009 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
3010 {
3011 free (htab);
3012 return NULL;
3013 }
3014
3015 /* Init the stub hash table too. */
3016 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
3017 return NULL;
3018
3019 /* And the branch hash table. */
3020 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
3021 return NULL;
3022
3023 /* Initializing two fields of the union is just cosmetic. We really
3024 only care about glist, but when compiled on a 32-bit host the
3025 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3026 debugger inspection of these fields look nicer. */
3027 htab->elf.init_refcount.refcount = 0;
3028 htab->elf.init_refcount.glist = NULL;
3029 htab->elf.init_offset.offset = 0;
3030 htab->elf.init_offset.glist = NULL;
3031
3032 return &htab->elf.root;
3033 }
3034
3035 /* Free the derived linker hash table. */
3036
3037 static void
3038 ppc64_elf_link_hash_table_free (struct bfd_link_hash_table *hash)
3039 {
3040 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3041
3042 bfd_hash_table_free (&ret->stub_hash_table);
3043 bfd_hash_table_free (&ret->branch_hash_table);
3044 _bfd_generic_link_hash_table_free (hash);
3045 }
3046
3047 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3048
3049 void
3050 ppc64_elf_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
3051 {
3052 struct ppc_link_hash_table *htab;
3053
3054 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS64;
3055
3056 /* Always hook our dynamic sections into the first bfd, which is the
3057 linker created stub bfd. This ensures that the GOT header is at
3058 the start of the output TOC section. */
3059 htab = ppc_hash_table (info);
3060 htab->stub_bfd = abfd;
3061 htab->elf.dynobj = abfd;
3062 }
3063
3064 /* Build a name for an entry in the stub hash table. */
3065
3066 static char *
3067 ppc_stub_name (const asection *input_section,
3068 const asection *sym_sec,
3069 const struct ppc_link_hash_entry *h,
3070 const Elf_Internal_Rela *rel)
3071 {
3072 char *stub_name;
3073 bfd_size_type len;
3074
3075 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3076 offsets from a sym as a branch target? In fact, we could
3077 probably assume the addend is always zero. */
3078 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3079
3080 if (h)
3081 {
3082 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3083 stub_name = bfd_malloc (len);
3084 if (stub_name != NULL)
3085 {
3086 sprintf (stub_name, "%08x.%s+%x",
3087 input_section->id & 0xffffffff,
3088 h->elf.root.root.string,
3089 (int) rel->r_addend & 0xffffffff);
3090 }
3091 }
3092 else
3093 {
3094 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3095 stub_name = bfd_malloc (len);
3096 if (stub_name != NULL)
3097 {
3098 sprintf (stub_name, "%08x.%x:%x+%x",
3099 input_section->id & 0xffffffff,
3100 sym_sec->id & 0xffffffff,
3101 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3102 (int) rel->r_addend & 0xffffffff);
3103 }
3104 }
3105 return stub_name;
3106 }
3107
3108 /* Look up an entry in the stub hash. Stub entries are cached because
3109 creating the stub name takes a bit of time. */
3110
3111 static struct ppc_stub_hash_entry *
3112 ppc_get_stub_entry (const asection *input_section,
3113 const asection *sym_sec,
3114 struct elf_link_hash_entry *hash,
3115 const Elf_Internal_Rela *rel,
3116 struct ppc_link_hash_table *htab)
3117 {
3118 struct ppc_stub_hash_entry *stub_entry;
3119 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3120 const asection *id_sec;
3121
3122 /* If this input section is part of a group of sections sharing one
3123 stub section, then use the id of the first section in the group.
3124 Stub names need to include a section id, as there may well be
3125 more than one stub used to reach say, printf, and we need to
3126 distinguish between them. */
3127 id_sec = htab->stub_group[input_section->id].link_sec;
3128
3129 if (h != NULL && h->stub_cache != NULL
3130 && h->stub_cache->h == h
3131 && h->stub_cache->id_sec == id_sec)
3132 {
3133 stub_entry = h->stub_cache;
3134 }
3135 else
3136 {
3137 char *stub_name;
3138
3139 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3140 if (stub_name == NULL)
3141 return NULL;
3142
3143 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3144 stub_name, FALSE, FALSE);
3145 if (h != NULL)
3146 h->stub_cache = stub_entry;
3147
3148 free (stub_name);
3149 }
3150
3151 return stub_entry;
3152 }
3153
3154 /* Add a new stub entry to the stub hash. Not all fields of the new
3155 stub entry are initialised. */
3156
3157 static struct ppc_stub_hash_entry *
3158 ppc_add_stub (const char *stub_name,
3159 asection *section,
3160 struct ppc_link_hash_table *htab)
3161 {
3162 asection *link_sec;
3163 asection *stub_sec;
3164 struct ppc_stub_hash_entry *stub_entry;
3165
3166 link_sec = htab->stub_group[section->id].link_sec;
3167 stub_sec = htab->stub_group[section->id].stub_sec;
3168 if (stub_sec == NULL)
3169 {
3170 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3171 if (stub_sec == NULL)
3172 {
3173 size_t namelen;
3174 bfd_size_type len;
3175 char *s_name;
3176
3177 namelen = strlen (link_sec->name);
3178 len = namelen + sizeof (STUB_SUFFIX);
3179 s_name = bfd_alloc (htab->stub_bfd, len);
3180 if (s_name == NULL)
3181 return NULL;
3182
3183 memcpy (s_name, link_sec->name, namelen);
3184 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3185 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3186 if (stub_sec == NULL)
3187 return NULL;
3188 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3189 }
3190 htab->stub_group[section->id].stub_sec = stub_sec;
3191 }
3192
3193 /* Enter this entry into the linker stub hash table. */
3194 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3195 TRUE, FALSE);
3196 if (stub_entry == NULL)
3197 {
3198 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3199 bfd_archive_filename (section->owner),
3200 stub_name);
3201 return NULL;
3202 }
3203
3204 stub_entry->stub_sec = stub_sec;
3205 stub_entry->stub_offset = 0;
3206 stub_entry->id_sec = link_sec;
3207 return stub_entry;
3208 }
3209
3210 /* Create sections for linker generated code. */
3211
3212 static bfd_boolean
3213 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3214 {
3215 struct ppc_link_hash_table *htab;
3216 flagword flags;
3217
3218 htab = ppc_hash_table (info);
3219
3220 /* Create .sfpr for code to save and restore fp regs. */
3221 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3222 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3223 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
3224 if (htab->sfpr == NULL
3225 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3226 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
3227 return FALSE;
3228
3229 /* Create .glink for lazy dynamic linking support. */
3230 htab->glink = bfd_make_section_anyway (dynobj, ".glink");
3231 if (htab->glink == NULL
3232 || ! bfd_set_section_flags (dynobj, htab->glink, flags)
3233 || ! bfd_set_section_alignment (dynobj, htab->glink, 2))
3234 return FALSE;
3235
3236 /* Create .branch_lt for plt_branch stubs. */
3237 flags = (SEC_ALLOC | SEC_LOAD
3238 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3239 htab->brlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3240 if (htab->brlt == NULL
3241 || ! bfd_set_section_flags (dynobj, htab->brlt, flags)
3242 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
3243 return FALSE;
3244
3245 if (info->shared)
3246 {
3247 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3248 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3249 htab->relbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
3250 if (!htab->relbrlt
3251 || ! bfd_set_section_flags (dynobj, htab->relbrlt, flags)
3252 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
3253 return FALSE;
3254 }
3255 return TRUE;
3256 }
3257
3258 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3259 not already done. */
3260
3261 static bfd_boolean
3262 create_got_section (bfd *abfd, struct bfd_link_info *info)
3263 {
3264 asection *got, *relgot;
3265 flagword flags;
3266 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3267
3268 if (!htab->got)
3269 {
3270 if (! _bfd_elf_create_got_section (htab->elf.dynobj, info))
3271 return FALSE;
3272
3273 htab->got = bfd_get_section_by_name (htab->elf.dynobj, ".got");
3274 if (!htab->got)
3275 abort ();
3276 }
3277
3278 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3279 | SEC_LINKER_CREATED);
3280
3281 got = bfd_make_section (abfd, ".got");
3282 if (!got
3283 || !bfd_set_section_flags (abfd, got, flags)
3284 || !bfd_set_section_alignment (abfd, got, 3))
3285 return FALSE;
3286
3287 relgot = bfd_make_section (abfd, ".rela.got");
3288 if (!relgot
3289 || ! bfd_set_section_flags (abfd, relgot, flags | SEC_READONLY)
3290 || ! bfd_set_section_alignment (abfd, relgot, 3))
3291 return FALSE;
3292
3293 ppc64_elf_tdata (abfd)->got = got;
3294 ppc64_elf_tdata (abfd)->relgot = relgot;
3295 return TRUE;
3296 }
3297
3298 /* Create the dynamic sections, and set up shortcuts. */
3299
3300 static bfd_boolean
3301 ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
3302 {
3303 struct ppc_link_hash_table *htab;
3304
3305 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
3306 return FALSE;
3307
3308 htab = ppc_hash_table (info);
3309 if (!htab->got)
3310 htab->got = bfd_get_section_by_name (dynobj, ".got");
3311 htab->plt = bfd_get_section_by_name (dynobj, ".plt");
3312 htab->relplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3313 htab->dynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3314 if (!info->shared)
3315 htab->relbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3316
3317 if (!htab->got || !htab->plt || !htab->relplt || !htab->dynbss
3318 || (!info->shared && !htab->relbss))
3319 abort ();
3320
3321 return TRUE;
3322 }
3323
3324 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3325
3326 static void
3327 ppc64_elf_copy_indirect_symbol
3328 (const struct elf_backend_data *bed ATTRIBUTE_UNUSED,
3329 struct elf_link_hash_entry *dir,
3330 struct elf_link_hash_entry *ind)
3331 {
3332 struct ppc_link_hash_entry *edir, *eind;
3333 flagword mask;
3334
3335 edir = (struct ppc_link_hash_entry *) dir;
3336 eind = (struct ppc_link_hash_entry *) ind;
3337
3338 /* Copy over any dynamic relocs we may have on the indirect sym. */
3339 if (eind->dyn_relocs != NULL)
3340 {
3341 if (edir->dyn_relocs != NULL)
3342 {
3343 struct ppc_dyn_relocs **pp;
3344 struct ppc_dyn_relocs *p;
3345
3346 if (eind->elf.root.type == bfd_link_hash_indirect)
3347 abort ();
3348
3349 /* Add reloc counts against the weak sym to the strong sym
3350 list. Merge any entries against the same section. */
3351 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3352 {
3353 struct ppc_dyn_relocs *q;
3354
3355 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3356 if (q->sec == p->sec)
3357 {
3358 q->pc_count += p->pc_count;
3359 q->count += p->count;
3360 *pp = p->next;
3361 break;
3362 }
3363 if (q == NULL)
3364 pp = &p->next;
3365 }
3366 *pp = edir->dyn_relocs;
3367 }
3368
3369 edir->dyn_relocs = eind->dyn_relocs;
3370 eind->dyn_relocs = NULL;
3371 }
3372
3373 edir->is_func |= eind->is_func;
3374 edir->is_func_descriptor |= eind->is_func_descriptor;
3375 edir->tls_mask |= eind->tls_mask;
3376
3377 mask = (ELF_LINK_HASH_REF_DYNAMIC | ELF_LINK_HASH_REF_REGULAR
3378 | ELF_LINK_HASH_REF_REGULAR_NONWEAK | ELF_LINK_NON_GOT_REF
3379 | ELF_LINK_HASH_NEEDS_PLT);
3380 /* If called to transfer flags for a weakdef during processing
3381 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
3382 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
3383 if (ELIMINATE_COPY_RELOCS
3384 && eind->elf.root.type != bfd_link_hash_indirect
3385 && (edir->elf.elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
3386 mask &= ~ELF_LINK_NON_GOT_REF;
3387
3388 edir->elf.elf_link_hash_flags |= eind->elf.elf_link_hash_flags & mask;
3389
3390 /* If we were called to copy over info for a weak sym, that's all. */
3391 if (eind->elf.root.type != bfd_link_hash_indirect)
3392 return;
3393
3394 /* Copy over got entries that we may have already seen to the
3395 symbol which just became indirect. */
3396 if (eind->elf.got.glist != NULL)
3397 {
3398 if (edir->elf.got.glist != NULL)
3399 {
3400 struct got_entry **entp;
3401 struct got_entry *ent;
3402
3403 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3404 {
3405 struct got_entry *dent;
3406
3407 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3408 if (dent->addend == ent->addend
3409 && dent->owner == ent->owner
3410 && dent->tls_type == ent->tls_type)
3411 {
3412 dent->got.refcount += ent->got.refcount;
3413 *entp = ent->next;
3414 break;
3415 }
3416 if (dent == NULL)
3417 entp = &ent->next;
3418 }
3419 *entp = edir->elf.got.glist;
3420 }
3421
3422 edir->elf.got.glist = eind->elf.got.glist;
3423 eind->elf.got.glist = NULL;
3424 }
3425
3426 /* And plt entries. */
3427 if (eind->elf.plt.plist != NULL)
3428 {
3429 if (edir->elf.plt.plist != NULL)
3430 {
3431 struct plt_entry **entp;
3432 struct plt_entry *ent;
3433
3434 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3435 {
3436 struct plt_entry *dent;
3437
3438 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3439 if (dent->addend == ent->addend)
3440 {
3441 dent->plt.refcount += ent->plt.refcount;
3442 *entp = ent->next;
3443 break;
3444 }
3445 if (dent == NULL)
3446 entp = &ent->next;
3447 }
3448 *entp = edir->elf.plt.plist;
3449 }
3450
3451 edir->elf.plt.plist = eind->elf.plt.plist;
3452 eind->elf.plt.plist = NULL;
3453 }
3454
3455 if (edir->elf.dynindx == -1)
3456 {
3457 edir->elf.dynindx = eind->elf.dynindx;
3458 edir->elf.dynstr_index = eind->elf.dynstr_index;
3459 eind->elf.dynindx = -1;
3460 eind->elf.dynstr_index = 0;
3461 }
3462 else
3463 BFD_ASSERT (eind->elf.dynindx == -1);
3464 }
3465
3466 /* Hack symbols defined in .opd sections to be function type. */
3467
3468 static bfd_boolean
3469 ppc64_elf_add_symbol_hook (bfd *ibfd ATTRIBUTE_UNUSED,
3470 struct bfd_link_info *info ATTRIBUTE_UNUSED,
3471 Elf_Internal_Sym *isym,
3472 const char **name ATTRIBUTE_UNUSED,
3473 flagword *flags ATTRIBUTE_UNUSED,
3474 asection **sec,
3475 bfd_vma *value ATTRIBUTE_UNUSED)
3476 {
3477 if (*sec != NULL
3478 && strcmp (bfd_get_section_name (ibfd, *sec), ".opd") == 0)
3479 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
3480 return TRUE;
3481 }
3482
3483 static bfd_boolean
3484 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
3485 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
3486 {
3487 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
3488 char *local_got_tls_masks;
3489
3490 if (local_got_ents == NULL)
3491 {
3492 bfd_size_type size = symtab_hdr->sh_info;
3493
3494 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
3495 local_got_ents = bfd_zalloc (abfd, size);
3496 if (local_got_ents == NULL)
3497 return FALSE;
3498 elf_local_got_ents (abfd) = local_got_ents;
3499 }
3500
3501 if ((tls_type & TLS_EXPLICIT) == 0)
3502 {
3503 struct got_entry *ent;
3504
3505 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3506 if (ent->addend == r_addend
3507 && ent->owner == abfd
3508 && ent->tls_type == tls_type)
3509 break;
3510 if (ent == NULL)
3511 {
3512 bfd_size_type amt = sizeof (*ent);
3513 ent = bfd_alloc (abfd, amt);
3514 if (ent == NULL)
3515 return FALSE;
3516 ent->next = local_got_ents[r_symndx];
3517 ent->addend = r_addend;
3518 ent->owner = abfd;
3519 ent->tls_type = tls_type;
3520 ent->got.refcount = 0;
3521 local_got_ents[r_symndx] = ent;
3522 }
3523 ent->got.refcount += 1;
3524 }
3525
3526 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
3527 local_got_tls_masks[r_symndx] |= tls_type;
3528 return TRUE;
3529 }
3530
3531 static bfd_boolean
3532 update_plt_info (bfd *abfd, struct ppc_link_hash_entry *eh, bfd_vma addend)
3533 {
3534 struct plt_entry *ent;
3535
3536 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3537 if (ent->addend == addend)
3538 break;
3539 if (ent == NULL)
3540 {
3541 bfd_size_type amt = sizeof (*ent);
3542 ent = bfd_alloc (abfd, amt);
3543 if (ent == NULL)
3544 return FALSE;
3545 ent->next = eh->elf.plt.plist;
3546 ent->addend = addend;
3547 ent->plt.refcount = 0;
3548 eh->elf.plt.plist = ent;
3549 }
3550 ent->plt.refcount += 1;
3551 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3552 eh->is_func = 1;
3553 return TRUE;
3554 }
3555
3556 /* Find the function descriptor hash entry from the given function code
3557 hash entry FH. Link the entries via their OH fields. */
3558 static struct ppc_link_hash_entry *
3559 get_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3560 {
3561 struct ppc_link_hash_entry *fdh = fh->oh;
3562
3563 if (fdh == NULL)
3564 {
3565 const char *fd_name = fh->elf.root.root.string + 1;
3566
3567 fdh = (struct ppc_link_hash_entry *)
3568 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
3569 if (fdh != NULL)
3570 {
3571 fdh->is_func_descriptor = 1;
3572 fdh->oh = fh;
3573 fh->is_func = 1;
3574 fh->oh = fdh;
3575 }
3576 }
3577
3578 return fdh;
3579 }
3580
3581 /* Look through the relocs for a section during the first phase, and
3582 calculate needed space in the global offset table, procedure
3583 linkage table, and dynamic reloc sections. */
3584
3585 static bfd_boolean
3586 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
3587 asection *sec, const Elf_Internal_Rela *relocs)
3588 {
3589 struct ppc_link_hash_table *htab;
3590 Elf_Internal_Shdr *symtab_hdr;
3591 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3592 const Elf_Internal_Rela *rel;
3593 const Elf_Internal_Rela *rel_end;
3594 asection *sreloc;
3595 asection **opd_sym_map;
3596
3597 if (info->relocatable)
3598 return TRUE;
3599
3600 /* Don't do anything special with non-loaded, non-alloced sections.
3601 In particular, any relocs in such sections should not affect GOT
3602 and PLT reference counting (ie. we don't allow them to create GOT
3603 or PLT entries), there's no possibility or desire to optimize TLS
3604 relocs, and there's not much point in propagating relocs to shared
3605 libs that the dynamic linker won't relocate. */
3606 if ((sec->flags & SEC_ALLOC) == 0)
3607 return TRUE;
3608
3609 htab = ppc_hash_table (info);
3610 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3611
3612 sym_hashes = elf_sym_hashes (abfd);
3613 sym_hashes_end = (sym_hashes
3614 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3615 - symtab_hdr->sh_info);
3616
3617 sreloc = NULL;
3618 opd_sym_map = NULL;
3619 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3620 {
3621 /* Garbage collection needs some extra help with .opd sections.
3622 We don't want to necessarily keep everything referenced by
3623 relocs in .opd, as that would keep all functions. Instead,
3624 if we reference an .opd symbol (a function descriptor), we
3625 want to keep the function code symbol's section. This is
3626 easy for global symbols, but for local syms we need to keep
3627 information about the associated function section. Later, if
3628 edit_opd deletes entries, we'll use this array to adjust
3629 local syms in .opd. */
3630 union opd_info {
3631 asection *func_section;
3632 long entry_adjust;
3633 };
3634 bfd_size_type amt;
3635
3636 amt = sec->size * sizeof (union opd_info) / 24;
3637 opd_sym_map = bfd_zalloc (abfd, amt);
3638 if (opd_sym_map == NULL)
3639 return FALSE;
3640 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
3641 }
3642
3643 if (htab->sfpr == NULL
3644 && !create_linkage_sections (htab->elf.dynobj, info))
3645 return FALSE;
3646
3647 rel_end = relocs + sec->reloc_count;
3648 for (rel = relocs; rel < rel_end; rel++)
3649 {
3650 unsigned long r_symndx;
3651 struct elf_link_hash_entry *h;
3652 enum elf_ppc64_reloc_type r_type;
3653 int tls_type = 0;
3654
3655 r_symndx = ELF64_R_SYM (rel->r_info);
3656 if (r_symndx < symtab_hdr->sh_info)
3657 h = NULL;
3658 else
3659 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3660
3661 r_type = ELF64_R_TYPE (rel->r_info);
3662 switch (r_type)
3663 {
3664 case R_PPC64_GOT_TLSLD16:
3665 case R_PPC64_GOT_TLSLD16_LO:
3666 case R_PPC64_GOT_TLSLD16_HI:
3667 case R_PPC64_GOT_TLSLD16_HA:
3668 ppc64_tlsld_got (abfd)->refcount += 1;
3669 tls_type = TLS_TLS | TLS_LD;
3670 goto dogottls;
3671
3672 case R_PPC64_GOT_TLSGD16:
3673 case R_PPC64_GOT_TLSGD16_LO:
3674 case R_PPC64_GOT_TLSGD16_HI:
3675 case R_PPC64_GOT_TLSGD16_HA:
3676 tls_type = TLS_TLS | TLS_GD;
3677 goto dogottls;
3678
3679 case R_PPC64_GOT_TPREL16_DS:
3680 case R_PPC64_GOT_TPREL16_LO_DS:
3681 case R_PPC64_GOT_TPREL16_HI:
3682 case R_PPC64_GOT_TPREL16_HA:
3683 if (info->shared)
3684 info->flags |= DF_STATIC_TLS;
3685 tls_type = TLS_TLS | TLS_TPREL;
3686 goto dogottls;
3687
3688 case R_PPC64_GOT_DTPREL16_DS:
3689 case R_PPC64_GOT_DTPREL16_LO_DS:
3690 case R_PPC64_GOT_DTPREL16_HI:
3691 case R_PPC64_GOT_DTPREL16_HA:
3692 tls_type = TLS_TLS | TLS_DTPREL;
3693 dogottls:
3694 sec->has_tls_reloc = 1;
3695 /* Fall thru */
3696
3697 case R_PPC64_GOT16:
3698 case R_PPC64_GOT16_DS:
3699 case R_PPC64_GOT16_HA:
3700 case R_PPC64_GOT16_HI:
3701 case R_PPC64_GOT16_LO:
3702 case R_PPC64_GOT16_LO_DS:
3703 /* This symbol requires a global offset table entry. */
3704 sec->has_gp_reloc = 1;
3705 if (ppc64_elf_tdata (abfd)->got == NULL
3706 && !create_got_section (abfd, info))
3707 return FALSE;
3708
3709 if (h != NULL)
3710 {
3711 struct ppc_link_hash_entry *eh;
3712 struct got_entry *ent;
3713
3714 eh = (struct ppc_link_hash_entry *) h;
3715 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3716 if (ent->addend == rel->r_addend
3717 && ent->owner == abfd
3718 && ent->tls_type == tls_type)
3719 break;
3720 if (ent == NULL)
3721 {
3722 bfd_size_type amt = sizeof (*ent);
3723 ent = bfd_alloc (abfd, amt);
3724 if (ent == NULL)
3725 return FALSE;
3726 ent->next = eh->elf.got.glist;
3727 ent->addend = rel->r_addend;
3728 ent->owner = abfd;
3729 ent->tls_type = tls_type;
3730 ent->got.refcount = 0;
3731 eh->elf.got.glist = ent;
3732 }
3733 ent->got.refcount += 1;
3734 eh->tls_mask |= tls_type;
3735 }
3736 else
3737 /* This is a global offset table entry for a local symbol. */
3738 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3739 rel->r_addend, tls_type))
3740 return FALSE;
3741 break;
3742
3743 case R_PPC64_PLT16_HA:
3744 case R_PPC64_PLT16_HI:
3745 case R_PPC64_PLT16_LO:
3746 case R_PPC64_PLT32:
3747 case R_PPC64_PLT64:
3748 /* This symbol requires a procedure linkage table entry. We
3749 actually build the entry in adjust_dynamic_symbol,
3750 because this might be a case of linking PIC code without
3751 linking in any dynamic objects, in which case we don't
3752 need to generate a procedure linkage table after all. */
3753 if (h == NULL)
3754 {
3755 /* It does not make sense to have a procedure linkage
3756 table entry for a local symbol. */
3757 bfd_set_error (bfd_error_bad_value);
3758 return FALSE;
3759 }
3760 else
3761 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3762 rel->r_addend))
3763 return FALSE;
3764 break;
3765
3766 /* The following relocations don't need to propagate the
3767 relocation if linking a shared object since they are
3768 section relative. */
3769 case R_PPC64_SECTOFF:
3770 case R_PPC64_SECTOFF_LO:
3771 case R_PPC64_SECTOFF_HI:
3772 case R_PPC64_SECTOFF_HA:
3773 case R_PPC64_SECTOFF_DS:
3774 case R_PPC64_SECTOFF_LO_DS:
3775 case R_PPC64_DTPREL16:
3776 case R_PPC64_DTPREL16_LO:
3777 case R_PPC64_DTPREL16_HI:
3778 case R_PPC64_DTPREL16_HA:
3779 case R_PPC64_DTPREL16_DS:
3780 case R_PPC64_DTPREL16_LO_DS:
3781 case R_PPC64_DTPREL16_HIGHER:
3782 case R_PPC64_DTPREL16_HIGHERA:
3783 case R_PPC64_DTPREL16_HIGHEST:
3784 case R_PPC64_DTPREL16_HIGHESTA:
3785 break;
3786
3787 /* Nor do these. */
3788 case R_PPC64_TOC16:
3789 case R_PPC64_TOC16_LO:
3790 case R_PPC64_TOC16_HI:
3791 case R_PPC64_TOC16_HA:
3792 case R_PPC64_TOC16_DS:
3793 case R_PPC64_TOC16_LO_DS:
3794 sec->has_gp_reloc = 1;
3795 break;
3796
3797 /* This relocation describes the C++ object vtable hierarchy.
3798 Reconstruct it for later use during GC. */
3799 case R_PPC64_GNU_VTINHERIT:
3800 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3801 return FALSE;
3802 break;
3803
3804 /* This relocation describes which C++ vtable entries are actually
3805 used. Record for later use during GC. */
3806 case R_PPC64_GNU_VTENTRY:
3807 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3808 return FALSE;
3809 break;
3810
3811 case R_PPC64_REL14:
3812 case R_PPC64_REL14_BRTAKEN:
3813 case R_PPC64_REL14_BRNTAKEN:
3814 htab->has_14bit_branch = 1;
3815 /* Fall through. */
3816
3817 case R_PPC64_REL24:
3818 if (h != NULL
3819 && h->root.root.string[0] == '.'
3820 && h->root.root.string[1] != 0)
3821 {
3822 /* We may need a .plt entry if the function this reloc
3823 refers to is in a shared lib. */
3824 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3825 rel->r_addend))
3826 return FALSE;
3827 if (h == htab->tls_get_addr)
3828 sec->has_tls_reloc = 1;
3829 else if ((strncmp (h->root.root.string, ".__tls_get_addr", 15)
3830 == 0)
3831 && (h->root.root.string[15] == 0
3832 || h->root.root.string[15] == '@'))
3833 {
3834 htab->tls_get_addr = h;
3835 sec->has_tls_reloc = 1;
3836 }
3837 }
3838 break;
3839
3840 case R_PPC64_TPREL64:
3841 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3842 if (info->shared)
3843 info->flags |= DF_STATIC_TLS;
3844 goto dotlstoc;
3845
3846 case R_PPC64_DTPMOD64:
3847 if (rel + 1 < rel_end
3848 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3849 && rel[1].r_offset == rel->r_offset + 8)
3850 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
3851 else
3852 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
3853 goto dotlstoc;
3854
3855 case R_PPC64_DTPREL64:
3856 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3857 if (rel != relocs
3858 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3859 && rel[-1].r_offset == rel->r_offset - 8)
3860 /* This is the second reloc of a dtpmod, dtprel pair.
3861 Don't mark with TLS_DTPREL. */
3862 goto dodyn;
3863
3864 dotlstoc:
3865 sec->has_tls_reloc = 1;
3866 if (h != NULL)
3867 {
3868 struct ppc_link_hash_entry *eh;
3869 eh = (struct ppc_link_hash_entry *) h;
3870 eh->tls_mask |= tls_type;
3871 }
3872 else
3873 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3874 rel->r_addend, tls_type))
3875 return FALSE;
3876
3877 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3878 {
3879 /* One extra to simplify get_tls_mask. */
3880 bfd_size_type amt = sec->size * sizeof (unsigned) / 8 + 1;
3881 ppc64_elf_section_data (sec)->t_symndx = bfd_zalloc (abfd, amt);
3882 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3883 return FALSE;
3884 }
3885 BFD_ASSERT (rel->r_offset % 8 == 0);
3886 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
3887
3888 /* Mark the second slot of a GD or LD entry.
3889 -1 to indicate GD and -2 to indicate LD. */
3890 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3891 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -1;
3892 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3893 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -2;
3894 goto dodyn;
3895
3896 case R_PPC64_TPREL16:
3897 case R_PPC64_TPREL16_LO:
3898 case R_PPC64_TPREL16_HI:
3899 case R_PPC64_TPREL16_HA:
3900 case R_PPC64_TPREL16_DS:
3901 case R_PPC64_TPREL16_LO_DS:
3902 case R_PPC64_TPREL16_HIGHER:
3903 case R_PPC64_TPREL16_HIGHERA:
3904 case R_PPC64_TPREL16_HIGHEST:
3905 case R_PPC64_TPREL16_HIGHESTA:
3906 if (info->shared)
3907 {
3908 info->flags |= DF_STATIC_TLS;
3909 goto dodyn;
3910 }
3911 break;
3912
3913 case R_PPC64_ADDR64:
3914 if (opd_sym_map != NULL
3915 && h != NULL
3916 && h->root.root.string[0] == '.'
3917 && h->root.root.string[1] != 0)
3918 get_fdh ((struct ppc_link_hash_entry *) h, htab);
3919
3920 if (opd_sym_map != NULL
3921 && h == NULL
3922 && rel + 1 < rel_end
3923 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
3924 {
3925 asection *s;
3926
3927 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3928 r_symndx);
3929 if (s == NULL)
3930 return FALSE;
3931 else if (s != sec)
3932 opd_sym_map[rel->r_offset / 24] = s;
3933 }
3934 /* Fall through. */
3935
3936 case R_PPC64_REL30:
3937 case R_PPC64_REL32:
3938 case R_PPC64_REL64:
3939 case R_PPC64_ADDR14:
3940 case R_PPC64_ADDR14_BRNTAKEN:
3941 case R_PPC64_ADDR14_BRTAKEN:
3942 case R_PPC64_ADDR16:
3943 case R_PPC64_ADDR16_DS:
3944 case R_PPC64_ADDR16_HA:
3945 case R_PPC64_ADDR16_HI:
3946 case R_PPC64_ADDR16_HIGHER:
3947 case R_PPC64_ADDR16_HIGHERA:
3948 case R_PPC64_ADDR16_HIGHEST:
3949 case R_PPC64_ADDR16_HIGHESTA:
3950 case R_PPC64_ADDR16_LO:
3951 case R_PPC64_ADDR16_LO_DS:
3952 case R_PPC64_ADDR24:
3953 case R_PPC64_ADDR32:
3954 case R_PPC64_UADDR16:
3955 case R_PPC64_UADDR32:
3956 case R_PPC64_UADDR64:
3957 case R_PPC64_TOC:
3958 if (h != NULL && !info->shared)
3959 /* We may need a copy reloc. */
3960 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
3961
3962 /* Don't propagate .opd relocs. */
3963 if (NO_OPD_RELOCS && opd_sym_map != NULL)
3964 break;
3965
3966 /* If we are creating a shared library, and this is a reloc
3967 against a global symbol, or a non PC relative reloc
3968 against a local symbol, then we need to copy the reloc
3969 into the shared library. However, if we are linking with
3970 -Bsymbolic, we do not need to copy a reloc against a
3971 global symbol which is defined in an object we are
3972 including in the link (i.e., DEF_REGULAR is set). At
3973 this point we have not seen all the input files, so it is
3974 possible that DEF_REGULAR is not set now but will be set
3975 later (it is never cleared). In case of a weak definition,
3976 DEF_REGULAR may be cleared later by a strong definition in
3977 a shared library. We account for that possibility below by
3978 storing information in the dyn_relocs field of the hash
3979 table entry. A similar situation occurs when creating
3980 shared libraries and symbol visibility changes render the
3981 symbol local.
3982
3983 If on the other hand, we are creating an executable, we
3984 may need to keep relocations for symbols satisfied by a
3985 dynamic library if we manage to avoid copy relocs for the
3986 symbol. */
3987 dodyn:
3988 if ((info->shared
3989 && (MUST_BE_DYN_RELOC (r_type)
3990 || (h != NULL
3991 && (! info->symbolic
3992 || h->root.type == bfd_link_hash_defweak
3993 || (h->elf_link_hash_flags
3994 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3995 || (ELIMINATE_COPY_RELOCS
3996 && !info->shared
3997 && h != NULL
3998 && (h->root.type == bfd_link_hash_defweak
3999 || (h->elf_link_hash_flags
4000 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
4001 {
4002 struct ppc_dyn_relocs *p;
4003 struct ppc_dyn_relocs **head;
4004
4005 /* We must copy these reloc types into the output file.
4006 Create a reloc section in dynobj and make room for
4007 this reloc. */
4008 if (sreloc == NULL)
4009 {
4010 const char *name;
4011 bfd *dynobj;
4012
4013 name = (bfd_elf_string_from_elf_section
4014 (abfd,
4015 elf_elfheader (abfd)->e_shstrndx,
4016 elf_section_data (sec)->rel_hdr.sh_name));
4017 if (name == NULL)
4018 return FALSE;
4019
4020 if (strncmp (name, ".rela", 5) != 0
4021 || strcmp (bfd_get_section_name (abfd, sec),
4022 name + 5) != 0)
4023 {
4024 (*_bfd_error_handler)
4025 (_("%s: bad relocation section name `%s\'"),
4026 bfd_archive_filename (abfd), name);
4027 bfd_set_error (bfd_error_bad_value);
4028 }
4029
4030 dynobj = htab->elf.dynobj;
4031 sreloc = bfd_get_section_by_name (dynobj, name);
4032 if (sreloc == NULL)
4033 {
4034 flagword flags;
4035
4036 sreloc = bfd_make_section (dynobj, name);
4037 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4038 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4039 if ((sec->flags & SEC_ALLOC) != 0)
4040 flags |= SEC_ALLOC | SEC_LOAD;
4041 if (sreloc == NULL
4042 || ! bfd_set_section_flags (dynobj, sreloc, flags)
4043 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
4044 return FALSE;
4045 }
4046 elf_section_data (sec)->sreloc = sreloc;
4047 }
4048
4049 /* If this is a global symbol, we count the number of
4050 relocations we need for this symbol. */
4051 if (h != NULL)
4052 {
4053 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
4054 }
4055 else
4056 {
4057 /* Track dynamic relocs needed for local syms too.
4058 We really need local syms available to do this
4059 easily. Oh well. */
4060
4061 asection *s;
4062 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4063 sec, r_symndx);
4064 if (s == NULL)
4065 return FALSE;
4066
4067 head = ((struct ppc_dyn_relocs **)
4068 &elf_section_data (s)->local_dynrel);
4069 }
4070
4071 p = *head;
4072 if (p == NULL || p->sec != sec)
4073 {
4074 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4075 if (p == NULL)
4076 return FALSE;
4077 p->next = *head;
4078 *head = p;
4079 p->sec = sec;
4080 p->count = 0;
4081 p->pc_count = 0;
4082 }
4083
4084 p->count += 1;
4085 if (!MUST_BE_DYN_RELOC (r_type))
4086 p->pc_count += 1;
4087 }
4088 break;
4089
4090 default:
4091 break;
4092 }
4093 }
4094
4095 return TRUE;
4096 }
4097
4098 /* Return the section that should be marked against GC for a given
4099 relocation. */
4100
4101 static asection *
4102 ppc64_elf_gc_mark_hook (asection *sec,
4103 struct bfd_link_info *info,
4104 Elf_Internal_Rela *rel,
4105 struct elf_link_hash_entry *h,
4106 Elf_Internal_Sym *sym)
4107 {
4108 asection *rsec;
4109
4110 /* First mark all our entry sym sections. */
4111 if (info->gc_sym_list != NULL)
4112 {
4113 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4114 struct bfd_sym_chain *sym = info->gc_sym_list;
4115
4116 info->gc_sym_list = NULL;
4117 do
4118 {
4119 struct ppc_link_hash_entry *eh;
4120
4121 eh = (struct ppc_link_hash_entry *)
4122 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
4123 if (eh == NULL)
4124 continue;
4125 if (eh->elf.root.type != bfd_link_hash_defined
4126 && eh->elf.root.type != bfd_link_hash_defweak)
4127 continue;
4128
4129 if (eh->is_func_descriptor)
4130 rsec = eh->oh->elf.root.u.def.section;
4131 else
4132 continue;
4133
4134 if (!rsec->gc_mark)
4135 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
4136
4137 rsec = eh->elf.root.u.def.section;
4138 if (!rsec->gc_mark)
4139 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
4140
4141 sym = sym->next;
4142 }
4143 while (sym != NULL);
4144 }
4145
4146 /* Syms return NULL if we're marking .opd, so we avoid marking all
4147 function sections, as all functions are referenced in .opd. */
4148 rsec = NULL;
4149 if (get_opd_info (sec) != NULL)
4150 return rsec;
4151
4152 if (h != NULL)
4153 {
4154 enum elf_ppc64_reloc_type r_type;
4155 struct ppc_link_hash_entry *eh;
4156
4157 r_type = ELF64_R_TYPE (rel->r_info);
4158 switch (r_type)
4159 {
4160 case R_PPC64_GNU_VTINHERIT:
4161 case R_PPC64_GNU_VTENTRY:
4162 break;
4163
4164 default:
4165 switch (h->root.type)
4166 {
4167 case bfd_link_hash_defined:
4168 case bfd_link_hash_defweak:
4169 eh = (struct ppc_link_hash_entry *) h;
4170 if (eh->oh != NULL && eh->oh->is_func_descriptor)
4171 eh = eh->oh;
4172
4173 /* Function descriptor syms cause the associated
4174 function code sym section to be marked. */
4175 if (eh->is_func_descriptor)
4176 {
4177 /* They also mark their opd section. */
4178 if (!eh->elf.root.u.def.section->gc_mark)
4179 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
4180 ppc64_elf_gc_mark_hook);
4181
4182 rsec = eh->oh->elf.root.u.def.section;
4183 }
4184 else
4185 rsec = h->root.u.def.section;
4186 break;
4187
4188 case bfd_link_hash_common:
4189 rsec = h->root.u.c.p->section;
4190 break;
4191
4192 default:
4193 break;
4194 }
4195 }
4196 }
4197 else
4198 {
4199 asection **opd_sym_section;
4200
4201 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
4202 opd_sym_section = get_opd_info (rsec);
4203 if (opd_sym_section != NULL)
4204 {
4205 if (!rsec->gc_mark)
4206 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
4207
4208 rsec = opd_sym_section[sym->st_value / 24];
4209 }
4210 }
4211
4212 return rsec;
4213 }
4214
4215 /* Update the .got, .plt. and dynamic reloc reference counts for the
4216 section being removed. */
4217
4218 static bfd_boolean
4219 ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
4220 asection *sec, const Elf_Internal_Rela *relocs)
4221 {
4222 struct ppc_link_hash_table *htab;
4223 Elf_Internal_Shdr *symtab_hdr;
4224 struct elf_link_hash_entry **sym_hashes;
4225 struct got_entry **local_got_ents;
4226 const Elf_Internal_Rela *rel, *relend;
4227
4228 if ((sec->flags & SEC_ALLOC) == 0)
4229 return TRUE;
4230
4231 elf_section_data (sec)->local_dynrel = NULL;
4232
4233 htab = ppc_hash_table (info);
4234 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4235 sym_hashes = elf_sym_hashes (abfd);
4236 local_got_ents = elf_local_got_ents (abfd);
4237
4238 relend = relocs + sec->reloc_count;
4239 for (rel = relocs; rel < relend; rel++)
4240 {
4241 unsigned long r_symndx;
4242 enum elf_ppc64_reloc_type r_type;
4243 struct elf_link_hash_entry *h = NULL;
4244 char tls_type = 0;
4245
4246 r_symndx = ELF64_R_SYM (rel->r_info);
4247 r_type = ELF64_R_TYPE (rel->r_info);
4248 if (r_symndx >= symtab_hdr->sh_info)
4249 {
4250 struct ppc_link_hash_entry *eh;
4251 struct ppc_dyn_relocs **pp;
4252 struct ppc_dyn_relocs *p;
4253
4254 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4255 eh = (struct ppc_link_hash_entry *) h;
4256
4257 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4258 if (p->sec == sec)
4259 {
4260 /* Everything must go for SEC. */
4261 *pp = p->next;
4262 break;
4263 }
4264 }
4265
4266 switch (r_type)
4267 {
4268 case R_PPC64_GOT_TLSLD16:
4269 case R_PPC64_GOT_TLSLD16_LO:
4270 case R_PPC64_GOT_TLSLD16_HI:
4271 case R_PPC64_GOT_TLSLD16_HA:
4272 ppc64_tlsld_got (abfd)->refcount -= 1;
4273 tls_type = TLS_TLS | TLS_LD;
4274 goto dogot;
4275
4276 case R_PPC64_GOT_TLSGD16:
4277 case R_PPC64_GOT_TLSGD16_LO:
4278 case R_PPC64_GOT_TLSGD16_HI:
4279 case R_PPC64_GOT_TLSGD16_HA:
4280 tls_type = TLS_TLS | TLS_GD;
4281 goto dogot;
4282
4283 case R_PPC64_GOT_TPREL16_DS:
4284 case R_PPC64_GOT_TPREL16_LO_DS:
4285 case R_PPC64_GOT_TPREL16_HI:
4286 case R_PPC64_GOT_TPREL16_HA:
4287 tls_type = TLS_TLS | TLS_TPREL;
4288 goto dogot;
4289
4290 case R_PPC64_GOT_DTPREL16_DS:
4291 case R_PPC64_GOT_DTPREL16_LO_DS:
4292 case R_PPC64_GOT_DTPREL16_HI:
4293 case R_PPC64_GOT_DTPREL16_HA:
4294 tls_type = TLS_TLS | TLS_DTPREL;
4295 goto dogot;
4296
4297 case R_PPC64_GOT16:
4298 case R_PPC64_GOT16_DS:
4299 case R_PPC64_GOT16_HA:
4300 case R_PPC64_GOT16_HI:
4301 case R_PPC64_GOT16_LO:
4302 case R_PPC64_GOT16_LO_DS:
4303 dogot:
4304 {
4305 struct got_entry *ent;
4306
4307 if (h != NULL)
4308 ent = h->got.glist;
4309 else
4310 ent = local_got_ents[r_symndx];
4311
4312 for (; ent != NULL; ent = ent->next)
4313 if (ent->addend == rel->r_addend
4314 && ent->owner == abfd
4315 && ent->tls_type == tls_type)
4316 break;
4317 if (ent == NULL)
4318 abort ();
4319 if (ent->got.refcount > 0)
4320 ent->got.refcount -= 1;
4321 }
4322 break;
4323
4324 case R_PPC64_PLT16_HA:
4325 case R_PPC64_PLT16_HI:
4326 case R_PPC64_PLT16_LO:
4327 case R_PPC64_PLT32:
4328 case R_PPC64_PLT64:
4329 case R_PPC64_REL14:
4330 case R_PPC64_REL14_BRNTAKEN:
4331 case R_PPC64_REL14_BRTAKEN:
4332 case R_PPC64_REL24:
4333 if (h != NULL)
4334 {
4335 struct plt_entry *ent;
4336
4337 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4338 if (ent->addend == rel->r_addend)
4339 break;
4340 if (ent == NULL)
4341 abort ();
4342 if (ent->plt.refcount > 0)
4343 ent->plt.refcount -= 1;
4344 }
4345 break;
4346
4347 default:
4348 break;
4349 }
4350 }
4351 return TRUE;
4352 }
4353
4354 /* Called via elf_link_hash_traverse to transfer dynamic linking
4355 information on function code symbol entries to their corresponding
4356 function descriptor symbol entries. */
4357 static bfd_boolean
4358 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
4359 {
4360 struct bfd_link_info *info;
4361 struct ppc_link_hash_table *htab;
4362 struct plt_entry *ent;
4363 struct ppc_link_hash_entry *fh;
4364 struct ppc_link_hash_entry *fdh;
4365 bfd_boolean force_local;
4366
4367 fh = (struct ppc_link_hash_entry *) h;
4368 if (fh->elf.root.type == bfd_link_hash_indirect)
4369 return TRUE;
4370
4371 if (fh->elf.root.type == bfd_link_hash_warning)
4372 fh = (struct ppc_link_hash_entry *) fh->elf.root.u.i.link;
4373
4374 info = inf;
4375 htab = ppc_hash_table (info);
4376
4377 /* If this is a function code symbol, transfer dynamic linking
4378 information to the function descriptor symbol. */
4379 if (!fh->is_func)
4380 return TRUE;
4381
4382 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
4383 if (ent->plt.refcount > 0)
4384 break;
4385 if (ent == NULL
4386 || fh->elf.root.root.string[0] != '.'
4387 || fh->elf.root.root.string[1] == '\0')
4388 return TRUE;
4389
4390 /* Find the corresponding function descriptor symbol. Create it
4391 as undefined if necessary. */
4392
4393 fdh = get_fdh (fh, htab);
4394 if (fdh != NULL)
4395 while (fdh->elf.root.type == bfd_link_hash_indirect
4396 || fdh->elf.root.type == bfd_link_hash_warning)
4397 fdh = (struct ppc_link_hash_entry *) fdh->elf.root.u.i.link;
4398
4399 if (fdh == NULL
4400 && info->shared
4401 && (fh->elf.root.type == bfd_link_hash_undefined
4402 || fh->elf.root.type == bfd_link_hash_undefweak))
4403 {
4404 bfd *abfd;
4405 asymbol *newsym;
4406 struct bfd_link_hash_entry *bh;
4407
4408 abfd = fh->elf.root.u.undef.abfd;
4409 newsym = bfd_make_empty_symbol (abfd);
4410 newsym->name = fh->elf.root.root.string + 1;
4411 newsym->section = bfd_und_section_ptr;
4412 newsym->value = 0;
4413 newsym->flags = BSF_OBJECT;
4414 if (fh->elf.root.type == bfd_link_hash_undefweak)
4415 newsym->flags |= BSF_WEAK;
4416
4417 bh = &fdh->elf.root;
4418 if ( !(_bfd_generic_link_add_one_symbol
4419 (info, abfd, newsym->name, newsym->flags,
4420 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
4421 {
4422 return FALSE;
4423 }
4424 fdh = (struct ppc_link_hash_entry *) bh;
4425 fdh->elf.elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
4426 fdh->elf.size = 24;
4427 fdh->elf.type = STT_OBJECT;
4428 }
4429
4430 if (fdh != NULL
4431 && (fdh->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4432 && (info->shared
4433 || (fdh->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4434 || (fdh->elf.elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
4435 || (fdh->elf.root.type == bfd_link_hash_undefweak
4436 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
4437 {
4438 if (fdh->elf.dynindx == -1)
4439 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
4440 return FALSE;
4441 fdh->elf.elf_link_hash_flags
4442 |= (fh->elf.elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
4443 | ELF_LINK_HASH_REF_DYNAMIC
4444 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4445 | ELF_LINK_NON_GOT_REF));
4446 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
4447 {
4448 fdh->elf.plt.plist = fh->elf.plt.plist;
4449 fdh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4450 }
4451 fdh->is_func_descriptor = 1;
4452 fdh->oh = fh;
4453 fh->oh = fdh;
4454 }
4455
4456 /* Now that the info is on the function descriptor, clear the
4457 function code sym info. Any function code syms for which we
4458 don't have a definition in a regular file, we force local.
4459 This prevents a shared library from exporting syms that have
4460 been imported from another library. Function code syms that
4461 are really in the library we must leave global to prevent the
4462 linker dragging in a definition from a static library. */
4463 force_local
4464 = (info->shared
4465 && ((fh->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
4466 || fdh == NULL
4467 || (fdh->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
4468 || (fdh->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0));
4469 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
4470
4471 return TRUE;
4472 }
4473
4474 #define MIN_SAVE_FPR 14
4475 #define MAX_SAVE_FPR 31
4476
4477 /* Called near the start of bfd_elf_size_dynamic_sections. We use
4478 this hook to a) provide some gcc support functions, and b) transfer
4479 dynamic linking information gathered so far on function code symbol
4480 entries, to their corresponding function descriptor symbol entries. */
4481 static bfd_boolean
4482 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
4483 struct bfd_link_info *info)
4484 {
4485 struct ppc_link_hash_table *htab;
4486 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4487 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4488 unsigned int i;
4489 struct elf_link_hash_entry *h;
4490 bfd_byte *p;
4491 char sym[10];
4492
4493 htab = ppc_hash_table (info);
4494
4495 if (htab->sfpr == NULL)
4496 /* We don't have any relocs. */
4497 return TRUE;
4498
4499 /* First provide any missing ._savef* and ._restf* functions. */
4500 memcpy (sym, "._savef14", 10);
4501 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4502 {
4503 sym[7] = i / 10 + '0';
4504 sym[8] = i % 10 + '0';
4505 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4506 if (h != NULL
4507 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4508 {
4509 if (lowest_savef > i)
4510 lowest_savef = i;
4511 h->root.type = bfd_link_hash_defined;
4512 h->root.u.def.section = htab->sfpr;
4513 h->root.u.def.value = (i - lowest_savef) * 4;
4514 h->type = STT_FUNC;
4515 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4516 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
4517 }
4518 }
4519
4520 memcpy (sym, "._restf14", 10);
4521 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4522 {
4523 sym[7] = i / 10 + '0';
4524 sym[8] = i % 10 + '0';
4525 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
4526 if (h != NULL
4527 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4528 {
4529 if (lowest_restf > i)
4530 lowest_restf = i;
4531 h->root.type = bfd_link_hash_defined;
4532 h->root.u.def.section = htab->sfpr;
4533 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4534 + (i - lowest_restf) * 4);
4535 h->type = STT_FUNC;
4536 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4537 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
4538 }
4539 }
4540
4541 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
4542
4543 htab->sfpr->size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4544 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4545
4546 if (htab->sfpr->size == 0)
4547 {
4548 _bfd_strip_section_from_output (info, htab->sfpr);
4549 return TRUE;
4550 }
4551
4552 p = bfd_alloc (htab->elf.dynobj, htab->sfpr->size);
4553 if (p == NULL)
4554 return FALSE;
4555 htab->sfpr->contents = p;
4556
4557 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4558 {
4559 unsigned int fpr = i << 21;
4560 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4561 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4562 p += 4;
4563 }
4564 if (lowest_savef <= MAX_SAVE_FPR)
4565 {
4566 bfd_put_32 (htab->elf.dynobj, BLR, p);
4567 p += 4;
4568 }
4569
4570 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4571 {
4572 unsigned int fpr = i << 21;
4573 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4574 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
4575 p += 4;
4576 }
4577 if (lowest_restf <= MAX_SAVE_FPR)
4578 bfd_put_32 (htab->elf.dynobj, BLR, p);
4579
4580 return TRUE;
4581 }
4582
4583 /* Adjust a symbol defined by a dynamic object and referenced by a
4584 regular object. The current definition is in some section of the
4585 dynamic object, but we're not including those sections. We have to
4586 change the definition to something the rest of the link can
4587 understand. */
4588
4589 static bfd_boolean
4590 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4591 struct elf_link_hash_entry *h)
4592 {
4593 struct ppc_link_hash_table *htab;
4594 asection *s;
4595 unsigned int power_of_two;
4596
4597 htab = ppc_hash_table (info);
4598
4599 /* Deal with function syms. */
4600 if (h->type == STT_FUNC
4601 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4602 {
4603 /* Clear procedure linkage table information for any symbol that
4604 won't need a .plt entry. */
4605 struct plt_entry *ent;
4606 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4607 if (ent->plt.refcount > 0)
4608 break;
4609 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
4610 || ent == NULL
4611 || SYMBOL_CALLS_LOCAL (info, h)
4612 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4613 && h->root.type == bfd_link_hash_undefweak))
4614 {
4615 h->plt.plist = NULL;
4616 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4617 }
4618 }
4619 else
4620 h->plt.plist = NULL;
4621
4622 /* If this is a weak symbol, and there is a real definition, the
4623 processor independent code will have arranged for us to see the
4624 real definition first, and we can just use the same value. */
4625 if (h->weakdef != NULL)
4626 {
4627 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4628 || h->weakdef->root.type == bfd_link_hash_defweak);
4629 h->root.u.def.section = h->weakdef->root.u.def.section;
4630 h->root.u.def.value = h->weakdef->root.u.def.value;
4631 if (ELIMINATE_COPY_RELOCS)
4632 h->elf_link_hash_flags
4633 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
4634 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
4635 return TRUE;
4636 }
4637
4638 /* If we are creating a shared library, we must presume that the
4639 only references to the symbol are via the global offset table.
4640 For such cases we need not do anything here; the relocations will
4641 be handled correctly by relocate_section. */
4642 if (info->shared)
4643 return TRUE;
4644
4645 /* If there are no references to this symbol that do not use the
4646 GOT, we don't need to generate a copy reloc. */
4647 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
4648 return TRUE;
4649
4650 if (ELIMINATE_COPY_RELOCS)
4651 {
4652 struct ppc_link_hash_entry * eh;
4653 struct ppc_dyn_relocs *p;
4654
4655 eh = (struct ppc_link_hash_entry *) h;
4656 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4657 {
4658 s = p->sec->output_section;
4659 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4660 break;
4661 }
4662
4663 /* If we didn't find any dynamic relocs in read-only sections, then
4664 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4665 if (p == NULL)
4666 {
4667 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
4668 return TRUE;
4669 }
4670 }
4671
4672 if (h->plt.plist != NULL)
4673 {
4674 /* We should never get here, but unfortunately there are versions
4675 of gcc out there that improperly (for this ABI) put initialized
4676 function pointers, vtable refs and suchlike in read-only
4677 sections. Allow them to proceed, but warn that this might
4678 break at runtime. */
4679 (*_bfd_error_handler)
4680 (_("copy reloc against `%s' requires lazy plt linking; "
4681 "avoid setting LD_BIND_NOW=1 or upgrade gcc"),
4682 h->root.root.string);
4683 }
4684
4685 /* This is a reference to a symbol defined by a dynamic object which
4686 is not a function. */
4687
4688 /* We must allocate the symbol in our .dynbss section, which will
4689 become part of the .bss section of the executable. There will be
4690 an entry for this symbol in the .dynsym section. The dynamic
4691 object will contain position independent code, so all references
4692 from the dynamic object to this symbol will go through the global
4693 offset table. The dynamic linker will use the .dynsym entry to
4694 determine the address it must put in the global offset table, so
4695 both the dynamic object and the regular object will refer to the
4696 same memory location for the variable. */
4697
4698 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4699 to copy the initial value out of the dynamic object and into the
4700 runtime process image. We need to remember the offset into the
4701 .rela.bss section we are going to use. */
4702 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4703 {
4704 htab->relbss->size += sizeof (Elf64_External_Rela);
4705 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4706 }
4707
4708 /* We need to figure out the alignment required for this symbol. I
4709 have no idea how ELF linkers handle this. */
4710 power_of_two = bfd_log2 (h->size);
4711 if (power_of_two > 4)
4712 power_of_two = 4;
4713
4714 /* Apply the required alignment. */
4715 s = htab->dynbss;
4716 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
4717 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
4718 {
4719 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
4720 return FALSE;
4721 }
4722
4723 /* Define the symbol as being at this point in the section. */
4724 h->root.u.def.section = s;
4725 h->root.u.def.value = s->size;
4726
4727 /* Increment the section size to make room for the symbol. */
4728 s->size += h->size;
4729
4730 return TRUE;
4731 }
4732
4733 /* If given a function descriptor symbol, hide both the function code
4734 sym and the descriptor. */
4735 static void
4736 ppc64_elf_hide_symbol (struct bfd_link_info *info,
4737 struct elf_link_hash_entry *h,
4738 bfd_boolean force_local)
4739 {
4740 struct ppc_link_hash_entry *eh;
4741 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4742
4743 eh = (struct ppc_link_hash_entry *) h;
4744 if (eh->is_func_descriptor)
4745 {
4746 struct ppc_link_hash_entry *fh = eh->oh;
4747
4748 if (fh == NULL)
4749 {
4750 const char *p, *q;
4751 struct ppc_link_hash_table *htab;
4752 char save;
4753
4754 /* We aren't supposed to use alloca in BFD because on
4755 systems which do not have alloca the version in libiberty
4756 calls xmalloc, which might cause the program to crash
4757 when it runs out of memory. This function doesn't have a
4758 return status, so there's no way to gracefully return an
4759 error. So cheat. We know that string[-1] can be safely
4760 accessed; It's either a string in an ELF string table,
4761 or allocated in an objalloc structure. */
4762
4763 p = eh->elf.root.root.string - 1;
4764 save = *p;
4765 *(char *) p = '.';
4766 htab = ppc_hash_table (info);
4767 fh = (struct ppc_link_hash_entry *)
4768 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4769 *(char *) p = save;
4770
4771 /* Unfortunately, if it so happens that the string we were
4772 looking for was allocated immediately before this string,
4773 then we overwrote the string terminator. That's the only
4774 reason the lookup should fail. */
4775 if (fh == NULL)
4776 {
4777 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
4778 while (q >= eh->elf.root.root.string && *q == *p)
4779 --q, --p;
4780 if (q < eh->elf.root.root.string && *p == '.')
4781 fh = (struct ppc_link_hash_entry *)
4782 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
4783 }
4784 if (fh != NULL)
4785 {
4786 eh->oh = fh;
4787 fh->oh = eh;
4788 }
4789 }
4790 if (fh != NULL)
4791 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
4792 }
4793 }
4794
4795 static bfd_boolean
4796 get_sym_h (struct elf_link_hash_entry **hp,
4797 Elf_Internal_Sym **symp,
4798 asection **symsecp,
4799 char **tls_maskp,
4800 Elf_Internal_Sym **locsymsp,
4801 unsigned long r_symndx,
4802 bfd *ibfd)
4803 {
4804 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4805
4806 if (r_symndx >= symtab_hdr->sh_info)
4807 {
4808 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4809 struct elf_link_hash_entry *h;
4810
4811 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4812 while (h->root.type == bfd_link_hash_indirect
4813 || h->root.type == bfd_link_hash_warning)
4814 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4815
4816 if (hp != NULL)
4817 *hp = h;
4818
4819 if (symp != NULL)
4820 *symp = NULL;
4821
4822 if (symsecp != NULL)
4823 {
4824 asection *symsec = NULL;
4825 if (h->root.type == bfd_link_hash_defined
4826 || h->root.type == bfd_link_hash_defweak)
4827 symsec = h->root.u.def.section;
4828 *symsecp = symsec;
4829 }
4830
4831 if (tls_maskp != NULL)
4832 {
4833 struct ppc_link_hash_entry *eh;
4834
4835 eh = (struct ppc_link_hash_entry *) h;
4836 *tls_maskp = &eh->tls_mask;
4837 }
4838 }
4839 else
4840 {
4841 Elf_Internal_Sym *sym;
4842 Elf_Internal_Sym *locsyms = *locsymsp;
4843
4844 if (locsyms == NULL)
4845 {
4846 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4847 if (locsyms == NULL)
4848 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4849 symtab_hdr->sh_info,
4850 0, NULL, NULL, NULL);
4851 if (locsyms == NULL)
4852 return FALSE;
4853 *locsymsp = locsyms;
4854 }
4855 sym = locsyms + r_symndx;
4856
4857 if (hp != NULL)
4858 *hp = NULL;
4859
4860 if (symp != NULL)
4861 *symp = sym;
4862
4863 if (symsecp != NULL)
4864 {
4865 asection *symsec = NULL;
4866 if ((sym->st_shndx != SHN_UNDEF
4867 && sym->st_shndx < SHN_LORESERVE)
4868 || sym->st_shndx > SHN_HIRESERVE)
4869 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4870 *symsecp = symsec;
4871 }
4872
4873 if (tls_maskp != NULL)
4874 {
4875 struct got_entry **lgot_ents;
4876 char *tls_mask;
4877
4878 tls_mask = NULL;
4879 lgot_ents = elf_local_got_ents (ibfd);
4880 if (lgot_ents != NULL)
4881 {
4882 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
4883 tls_mask = &lgot_masks[r_symndx];
4884 }
4885 *tls_maskp = tls_mask;
4886 }
4887 }
4888 return TRUE;
4889 }
4890
4891 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
4892 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
4893 type suitable for optimization, and 1 otherwise. */
4894
4895 static int
4896 get_tls_mask (char **tls_maskp, unsigned long *toc_symndx,
4897 Elf_Internal_Sym **locsymsp,
4898 const Elf_Internal_Rela *rel, bfd *ibfd)
4899 {
4900 unsigned long r_symndx;
4901 int next_r;
4902 struct elf_link_hash_entry *h;
4903 Elf_Internal_Sym *sym;
4904 asection *sec;
4905 bfd_vma off;
4906
4907 r_symndx = ELF64_R_SYM (rel->r_info);
4908 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
4909 return 0;
4910
4911 if ((*tls_maskp != NULL && **tls_maskp != 0)
4912 || sec == NULL
4913 || ppc64_elf_section_data (sec)->t_symndx == NULL)
4914 return 1;
4915
4916 /* Look inside a TOC section too. */
4917 if (h != NULL)
4918 {
4919 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4920 off = h->root.u.def.value;
4921 }
4922 else
4923 off = sym->st_value;
4924 off += rel->r_addend;
4925 BFD_ASSERT (off % 8 == 0);
4926 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
4927 next_r = ppc64_elf_section_data (sec)->t_symndx[off / 8 + 1];
4928 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
4929 return 0;
4930 if (toc_symndx != NULL)
4931 *toc_symndx = r_symndx;
4932 if ((h == NULL
4933 || ((h->root.type == bfd_link_hash_defined
4934 || h->root.type == bfd_link_hash_defweak)
4935 && !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
4936 && (next_r == -1 || next_r == -2))
4937 return 1 - next_r;
4938 return 1;
4939 }
4940
4941 /* Adjust all global syms defined in opd sections. In gcc generated
4942 code these will already have been done, but I suppose we have to
4943 cater for all sorts of hand written assembly. */
4944
4945 static bfd_boolean
4946 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
4947 {
4948 struct ppc_link_hash_entry *eh;
4949 asection *sym_sec;
4950 long *opd_adjust;
4951
4952 if (h->root.type == bfd_link_hash_indirect)
4953 return TRUE;
4954
4955 if (h->root.type == bfd_link_hash_warning)
4956 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4957
4958 if (h->root.type != bfd_link_hash_defined
4959 && h->root.type != bfd_link_hash_defweak)
4960 return TRUE;
4961
4962 eh = (struct ppc_link_hash_entry *) h;
4963 if (eh->adjust_done)
4964 return TRUE;
4965
4966 sym_sec = eh->elf.root.u.def.section;
4967 opd_adjust = get_opd_info (sym_sec);
4968 if (opd_adjust != NULL)
4969 {
4970 long adjust = opd_adjust[eh->elf.root.u.def.value / 24];
4971 if (adjust == -1)
4972 {
4973 /* This entry has been deleted. */
4974 eh->elf.root.u.def.value = 0;
4975 eh->elf.root.u.def.section = &bfd_abs_section;
4976 }
4977 else
4978 eh->elf.root.u.def.value += adjust;
4979 eh->adjust_done = 1;
4980 }
4981 return TRUE;
4982 }
4983
4984 /* Remove unused Official Procedure Descriptor entries. Currently we
4985 only remove those associated with functions in discarded link-once
4986 sections, or weakly defined functions that have been overridden. It
4987 would be possible to remove many more entries for statically linked
4988 applications. */
4989
4990 bfd_boolean
4991 ppc64_elf_edit_opd (bfd *obfd, struct bfd_link_info *info)
4992 {
4993 bfd *ibfd;
4994 bfd_boolean some_edited = FALSE;
4995
4996 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4997 {
4998 asection *sec;
4999 Elf_Internal_Rela *relstart, *rel, *relend;
5000 Elf_Internal_Shdr *symtab_hdr;
5001 Elf_Internal_Sym *local_syms;
5002 struct elf_link_hash_entry **sym_hashes;
5003 bfd_vma offset;
5004 bfd_size_type amt;
5005 long *opd_adjust;
5006 bfd_boolean need_edit;
5007
5008 sec = bfd_get_section_by_name (ibfd, ".opd");
5009 if (sec == NULL)
5010 continue;
5011
5012 amt = sec->size * sizeof (long) / 24;
5013 opd_adjust = get_opd_info (sec);
5014 if (opd_adjust == NULL)
5015 {
5016 /* Must be a ld -r link. ie. check_relocs hasn't been
5017 called. */
5018 opd_adjust = bfd_zalloc (obfd, amt);
5019 ppc64_elf_section_data (sec)->opd.adjust = opd_adjust;
5020 }
5021 memset (opd_adjust, 0, amt);
5022
5023 if (sec->output_section == bfd_abs_section_ptr)
5024 continue;
5025
5026 /* Look through the section relocs. */
5027 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
5028 continue;
5029
5030 local_syms = NULL;
5031 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5032 sym_hashes = elf_sym_hashes (ibfd);
5033
5034 /* Read the relocations. */
5035 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5036 info->keep_memory);
5037 if (relstart == NULL)
5038 return FALSE;
5039
5040 /* First run through the relocs to check they are sane, and to
5041 determine whether we need to edit this opd section. */
5042 need_edit = FALSE;
5043 offset = 0;
5044 relend = relstart + sec->reloc_count;
5045 for (rel = relstart; rel < relend; )
5046 {
5047 enum elf_ppc64_reloc_type r_type;
5048 unsigned long r_symndx;
5049 asection *sym_sec;
5050 struct elf_link_hash_entry *h;
5051 Elf_Internal_Sym *sym;
5052
5053 /* .opd contains a regular array of 24 byte entries. We're
5054 only interested in the reloc pointing to a function entry
5055 point. */
5056 if (rel->r_offset != offset
5057 || rel + 1 >= relend
5058 || (rel + 1)->r_offset != offset + 8)
5059 {
5060 /* If someone messes with .opd alignment then after a
5061 "ld -r" we might have padding in the middle of .opd.
5062 Also, there's nothing to prevent someone putting
5063 something silly in .opd with the assembler. No .opd
5064 optimization for them! */
5065 (*_bfd_error_handler)
5066 (_("%s: .opd is not a regular array of opd entries"),
5067 bfd_archive_filename (ibfd));
5068 need_edit = FALSE;
5069 break;
5070 }
5071
5072 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
5073 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
5074 {
5075 (*_bfd_error_handler)
5076 (_("%s: unexpected reloc type %u in .opd section"),
5077 bfd_archive_filename (ibfd), r_type);
5078 need_edit = FALSE;
5079 break;
5080 }
5081
5082 r_symndx = ELF64_R_SYM (rel->r_info);
5083 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
5084 r_symndx, ibfd))
5085 goto error_ret;
5086
5087 if (sym_sec == NULL || sym_sec->owner == NULL)
5088 {
5089 const char *sym_name;
5090 if (h != NULL)
5091 sym_name = h->root.root.string;
5092 else
5093 sym_name = bfd_elf_local_sym_name (ibfd, sym);
5094
5095 (*_bfd_error_handler)
5096 (_("%s: undefined sym `%s' in .opd section"),
5097 bfd_archive_filename (ibfd),
5098 sym_name);
5099 need_edit = FALSE;
5100 break;
5101 }
5102
5103 /* opd entries are always for functions defined in the
5104 current input bfd. If the symbol isn't defined in the
5105 input bfd, then we won't be using the function in this
5106 bfd; It must be defined in a linkonce section in another
5107 bfd, or is weak. It's also possible that we are
5108 discarding the function due to a linker script /DISCARD/,
5109 which we test for via the output_section. */
5110 if (sym_sec->owner != ibfd
5111 || sym_sec->output_section == bfd_abs_section_ptr)
5112 need_edit = TRUE;
5113
5114 offset += 24;
5115 rel += 2;
5116 /* Allow for the possibility of a reloc on the third word. */
5117 if (rel < relend
5118 && rel->r_offset == offset - 8)
5119 rel += 1;
5120 }
5121
5122 if (need_edit)
5123 {
5124 Elf_Internal_Rela *write_rel;
5125 bfd_byte *rptr, *wptr;
5126 bfd_boolean skip;
5127
5128 /* This seems a waste of time as input .opd sections are all
5129 zeros as generated by gcc, but I suppose there's no reason
5130 this will always be so. We might start putting something in
5131 the third word of .opd entries. */
5132 if ((sec->flags & SEC_IN_MEMORY) == 0)
5133 {
5134 bfd_byte *loc;
5135 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
5136 {
5137 if (loc != NULL)
5138 free (loc);
5139 error_ret:
5140 if (local_syms != NULL
5141 && symtab_hdr->contents != (unsigned char *) local_syms)
5142 free (local_syms);
5143 if (elf_section_data (sec)->relocs != relstart)
5144 free (relstart);
5145 return FALSE;
5146 }
5147 sec->contents = loc;
5148 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
5149 }
5150
5151 elf_section_data (sec)->relocs = relstart;
5152
5153 wptr = sec->contents;
5154 rptr = sec->contents;
5155 write_rel = relstart;
5156 skip = FALSE;
5157 offset = 0;
5158 for (rel = relstart; rel < relend; rel++)
5159 {
5160 unsigned long r_symndx;
5161 asection *sym_sec;
5162 struct elf_link_hash_entry *h;
5163 Elf_Internal_Sym *sym;
5164
5165 r_symndx = ELF64_R_SYM (rel->r_info);
5166 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
5167 r_symndx, ibfd))
5168 goto error_ret;
5169
5170 if (rel->r_offset == offset)
5171 {
5172 struct ppc_link_hash_entry *fdh = NULL;
5173 if (h != NULL
5174 && h->root.root.string[0] == '.')
5175 fdh = get_fdh ((struct ppc_link_hash_entry *) h,
5176 ppc_hash_table (info));
5177
5178 skip = (sym_sec->owner != ibfd
5179 || sym_sec->output_section == bfd_abs_section_ptr);
5180 if (skip)
5181 {
5182 if (fdh != NULL && sym_sec->owner == ibfd)
5183 {
5184 /* Arrange for the function descriptor sym
5185 to be dropped. */
5186 fdh->elf.root.u.def.value = 0;
5187 fdh->elf.root.u.def.section = sym_sec;
5188 }
5189 opd_adjust[rel->r_offset / 24] = -1;
5190 }
5191 else
5192 {
5193 /* We'll be keeping this opd entry. */
5194
5195 if (fdh != NULL)
5196 {
5197 /* Redefine the function descriptor symbol to
5198 this location in the opd section. It is
5199 necessary to update the value here rather
5200 than using an array of adjustments as we do
5201 for local symbols, because various places
5202 in the generic ELF code use the value
5203 stored in u.def.value. */
5204 fdh->elf.root.u.def.value = wptr - sec->contents;
5205 fdh->adjust_done = 1;
5206 }
5207
5208 /* Local syms are a bit tricky. We could
5209 tweak them as they can be cached, but
5210 we'd need to look through the local syms
5211 for the function descriptor sym which we
5212 don't have at the moment. So keep an
5213 array of adjustments. */
5214 opd_adjust[rel->r_offset / 24] = wptr - rptr;
5215
5216 if (wptr != rptr)
5217 memcpy (wptr, rptr, 24);
5218 wptr += 24;
5219 }
5220 rptr += 24;
5221 offset += 24;
5222 }
5223
5224 if (skip)
5225 {
5226 BFD_ASSERT (MUST_BE_DYN_RELOC (ELF64_R_TYPE (rel->r_info)));
5227 if (info->shared)
5228 {
5229 /* We won't be needing dynamic relocs here. */
5230 struct ppc_dyn_relocs **pp;
5231 struct ppc_dyn_relocs *p;
5232
5233 if (h != NULL)
5234 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
5235 else if (sym_sec != NULL)
5236 pp = ((struct ppc_dyn_relocs **)
5237 &elf_section_data (sym_sec)->local_dynrel);
5238 else
5239 pp = ((struct ppc_dyn_relocs **)
5240 &elf_section_data (sec)->local_dynrel);
5241 while ((p = *pp) != NULL)
5242 {
5243 if (p->sec == sec)
5244 {
5245 p->count -= 1;
5246 if (p->count == 0)
5247 *pp = p->next;
5248 break;
5249 }
5250 pp = &p->next;
5251 }
5252 }
5253 }
5254 else
5255 {
5256 /* We need to adjust any reloc offsets to point to the
5257 new opd entries. While we're at it, we may as well
5258 remove redundant relocs. */
5259 rel->r_offset += wptr - rptr;
5260 if (write_rel != rel)
5261 memcpy (write_rel, rel, sizeof (*rel));
5262 ++write_rel;
5263 }
5264 }
5265
5266 sec->size = wptr - sec->contents;
5267 sec->reloc_count = write_rel - relstart;
5268 /* Fudge the size too, as this is used later in
5269 elf_bfd_final_link if we are emitting relocs. */
5270 elf_section_data (sec)->rel_hdr.sh_size
5271 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5272 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
5273 some_edited = TRUE;
5274 }
5275 else if (elf_section_data (sec)->relocs != relstart)
5276 free (relstart);
5277
5278 if (local_syms != NULL
5279 && symtab_hdr->contents != (unsigned char *) local_syms)
5280 {
5281 if (!info->keep_memory)
5282 free (local_syms);
5283 else
5284 symtab_hdr->contents = (unsigned char *) local_syms;
5285 }
5286 }
5287
5288 if (some_edited)
5289 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
5290
5291 return TRUE;
5292 }
5293
5294 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
5295
5296 asection *
5297 ppc64_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
5298 {
5299 struct ppc_link_hash_table *htab;
5300
5301 htab = ppc_hash_table (info);
5302 if (htab->tls_get_addr != NULL)
5303 {
5304 struct elf_link_hash_entry *h = htab->tls_get_addr;
5305
5306 while (h->root.type == bfd_link_hash_indirect
5307 || h->root.type == bfd_link_hash_warning)
5308 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5309
5310 htab->tls_get_addr = h;
5311 }
5312
5313 return _bfd_elf_tls_setup (obfd, info);
5314 }
5315
5316 /* Run through all the TLS relocs looking for optimization
5317 opportunities. The linker has been hacked (see ppc64elf.em) to do
5318 a preliminary section layout so that we know the TLS segment
5319 offsets. We can't optimize earlier because some optimizations need
5320 to know the tp offset, and we need to optimize before allocating
5321 dynamic relocations. */
5322
5323 bfd_boolean
5324 ppc64_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
5325 {
5326 bfd *ibfd;
5327 asection *sec;
5328 struct ppc_link_hash_table *htab;
5329
5330 if (info->relocatable || info->shared)
5331 return TRUE;
5332
5333 htab = ppc_hash_table (info);
5334 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5335 {
5336 Elf_Internal_Sym *locsyms = NULL;
5337
5338 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5339 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5340 {
5341 Elf_Internal_Rela *relstart, *rel, *relend;
5342 int expecting_tls_get_addr;
5343
5344 /* Read the relocations. */
5345 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5346 info->keep_memory);
5347 if (relstart == NULL)
5348 return FALSE;
5349
5350 expecting_tls_get_addr = 0;
5351 relend = relstart + sec->reloc_count;
5352 for (rel = relstart; rel < relend; rel++)
5353 {
5354 enum elf_ppc64_reloc_type r_type;
5355 unsigned long r_symndx;
5356 struct elf_link_hash_entry *h;
5357 Elf_Internal_Sym *sym;
5358 asection *sym_sec;
5359 char *tls_mask;
5360 char tls_set, tls_clear, tls_type = 0;
5361 bfd_vma value;
5362 bfd_boolean ok_tprel, is_local;
5363
5364 r_symndx = ELF64_R_SYM (rel->r_info);
5365 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
5366 r_symndx, ibfd))
5367 {
5368 err_free_rel:
5369 if (elf_section_data (sec)->relocs != relstart)
5370 free (relstart);
5371 if (locsyms != NULL
5372 && (elf_tdata (ibfd)->symtab_hdr.contents
5373 != (unsigned char *) locsyms))
5374 free (locsyms);
5375 return FALSE;
5376 }
5377
5378 if (h != NULL)
5379 {
5380 if (h->root.type != bfd_link_hash_defined
5381 && h->root.type != bfd_link_hash_defweak)
5382 continue;
5383 value = h->root.u.def.value;
5384 }
5385 else
5386 /* Symbols referenced by TLS relocs must be of type
5387 STT_TLS. So no need for .opd local sym adjust. */
5388 value = sym->st_value;
5389
5390 ok_tprel = FALSE;
5391 is_local = FALSE;
5392 if (h == NULL
5393 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
5394 {
5395 is_local = TRUE;
5396 value += sym_sec->output_offset;
5397 value += sym_sec->output_section->vma;
5398 value -= htab->elf.tls_sec->vma;
5399 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5400 < (bfd_vma) 1 << 32);
5401 }
5402
5403 r_type = ELF64_R_TYPE (rel->r_info);
5404 switch (r_type)
5405 {
5406 case R_PPC64_GOT_TLSLD16:
5407 case R_PPC64_GOT_TLSLD16_LO:
5408 case R_PPC64_GOT_TLSLD16_HI:
5409 case R_PPC64_GOT_TLSLD16_HA:
5410 /* These relocs should never be against a symbol
5411 defined in a shared lib. Leave them alone if
5412 that turns out to be the case. */
5413 ppc64_tlsld_got (ibfd)->refcount -= 1;
5414 if (!is_local)
5415 continue;
5416
5417 /* LD -> LE */
5418 tls_set = 0;
5419 tls_clear = TLS_LD;
5420 tls_type = TLS_TLS | TLS_LD;
5421 expecting_tls_get_addr = 1;
5422 break;
5423
5424 case R_PPC64_GOT_TLSGD16:
5425 case R_PPC64_GOT_TLSGD16_LO:
5426 case R_PPC64_GOT_TLSGD16_HI:
5427 case R_PPC64_GOT_TLSGD16_HA:
5428 if (ok_tprel)
5429 /* GD -> LE */
5430 tls_set = 0;
5431 else
5432 /* GD -> IE */
5433 tls_set = TLS_TLS | TLS_TPRELGD;
5434 tls_clear = TLS_GD;
5435 tls_type = TLS_TLS | TLS_GD;
5436 expecting_tls_get_addr = 1;
5437 break;
5438
5439 case R_PPC64_GOT_TPREL16_DS:
5440 case R_PPC64_GOT_TPREL16_LO_DS:
5441 case R_PPC64_GOT_TPREL16_HI:
5442 case R_PPC64_GOT_TPREL16_HA:
5443 expecting_tls_get_addr = 0;
5444 if (ok_tprel)
5445 {
5446 /* IE -> LE */
5447 tls_set = 0;
5448 tls_clear = TLS_TPREL;
5449 tls_type = TLS_TLS | TLS_TPREL;
5450 break;
5451 }
5452 else
5453 continue;
5454
5455 case R_PPC64_REL14:
5456 case R_PPC64_REL14_BRTAKEN:
5457 case R_PPC64_REL14_BRNTAKEN:
5458 case R_PPC64_REL24:
5459 if (h != NULL
5460 && h == htab->tls_get_addr)
5461 {
5462 if (!expecting_tls_get_addr
5463 && rel != relstart
5464 && ((ELF64_R_TYPE (rel[-1].r_info)
5465 == R_PPC64_TOC16)
5466 || (ELF64_R_TYPE (rel[-1].r_info)
5467 == R_PPC64_TOC16_LO)))
5468 {
5469 /* Check for toc tls entries. */
5470 char *toc_tls;
5471 int retval;
5472
5473 retval = get_tls_mask (&toc_tls, NULL, &locsyms,
5474 rel - 1, ibfd);
5475 if (retval == 0)
5476 goto err_free_rel;
5477 if (toc_tls != NULL)
5478 expecting_tls_get_addr = retval > 1;
5479 }
5480
5481 if (expecting_tls_get_addr)
5482 {
5483 struct plt_entry *ent;
5484 for (ent = h->plt.plist; ent; ent = ent->next)
5485 if (ent->addend == 0)
5486 {
5487 if (ent->plt.refcount > 0)
5488 ent->plt.refcount -= 1;
5489 break;
5490 }
5491 }
5492 }
5493 expecting_tls_get_addr = 0;
5494 continue;
5495
5496 case R_PPC64_TPREL64:
5497 expecting_tls_get_addr = 0;
5498 if (ok_tprel)
5499 {
5500 /* IE -> LE */
5501 tls_set = TLS_EXPLICIT;
5502 tls_clear = TLS_TPREL;
5503 break;
5504 }
5505 else
5506 continue;
5507
5508 case R_PPC64_DTPMOD64:
5509 expecting_tls_get_addr = 0;
5510 if (rel + 1 < relend
5511 && (rel[1].r_info
5512 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5513 && rel[1].r_offset == rel->r_offset + 8)
5514 {
5515 if (ok_tprel)
5516 /* GD -> LE */
5517 tls_set = TLS_EXPLICIT | TLS_GD;
5518 else
5519 /* GD -> IE */
5520 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
5521 tls_clear = TLS_GD;
5522 }
5523 else
5524 {
5525 if (!is_local)
5526 continue;
5527
5528 /* LD -> LE */
5529 tls_set = TLS_EXPLICIT;
5530 tls_clear = TLS_LD;
5531 }
5532 break;
5533
5534 default:
5535 expecting_tls_get_addr = 0;
5536 continue;
5537 }
5538
5539 if ((tls_set & TLS_EXPLICIT) == 0)
5540 {
5541 struct got_entry *ent;
5542
5543 /* Adjust got entry for this reloc. */
5544 if (h != NULL)
5545 ent = h->got.glist;
5546 else
5547 ent = elf_local_got_ents (ibfd)[r_symndx];
5548
5549 for (; ent != NULL; ent = ent->next)
5550 if (ent->addend == rel->r_addend
5551 && ent->owner == ibfd
5552 && ent->tls_type == tls_type)
5553 break;
5554 if (ent == NULL)
5555 abort ();
5556
5557 if (tls_set == 0)
5558 {
5559 /* We managed to get rid of a got entry. */
5560 if (ent->got.refcount > 0)
5561 ent->got.refcount -= 1;
5562 }
5563 }
5564 else if (h != NULL)
5565 {
5566 struct ppc_link_hash_entry * eh;
5567 struct ppc_dyn_relocs **pp;
5568 struct ppc_dyn_relocs *p;
5569
5570 /* Adjust dynamic relocs. */
5571 eh = (struct ppc_link_hash_entry *) h;
5572 for (pp = &eh->dyn_relocs;
5573 (p = *pp) != NULL;
5574 pp = &p->next)
5575 if (p->sec == sec)
5576 {
5577 /* If we got rid of a DTPMOD/DTPREL reloc
5578 pair then we'll lose one or two dyn
5579 relocs. */
5580 if (tls_set == (TLS_EXPLICIT | TLS_GD))
5581 p->count -= 1;
5582 p->count -= 1;
5583 if (p->count == 0)
5584 *pp = p->next;
5585 break;
5586 }
5587 }
5588
5589 *tls_mask |= tls_set;
5590 *tls_mask &= ~tls_clear;
5591 }
5592
5593 if (elf_section_data (sec)->relocs != relstart)
5594 free (relstart);
5595 }
5596
5597 if (locsyms != NULL
5598 && (elf_tdata (ibfd)->symtab_hdr.contents
5599 != (unsigned char *) locsyms))
5600 {
5601 if (!info->keep_memory)
5602 free (locsyms);
5603 else
5604 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
5605 }
5606 }
5607 return TRUE;
5608 }
5609
5610 /* Allocate space in .plt, .got and associated reloc sections for
5611 dynamic relocs. */
5612
5613 static bfd_boolean
5614 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5615 {
5616 struct bfd_link_info *info;
5617 struct ppc_link_hash_table *htab;
5618 asection *s;
5619 struct ppc_link_hash_entry *eh;
5620 struct ppc_dyn_relocs *p;
5621 struct got_entry *gent;
5622
5623 if (h->root.type == bfd_link_hash_indirect)
5624 return TRUE;
5625
5626 if (h->root.type == bfd_link_hash_warning)
5627 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5628
5629 info = (struct bfd_link_info *) inf;
5630 htab = ppc_hash_table (info);
5631
5632 if (htab->elf.dynamic_sections_created
5633 && h->dynindx != -1
5634 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
5635 {
5636 struct plt_entry *pent;
5637 bfd_boolean doneone = FALSE;
5638 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5639 if (pent->plt.refcount > 0)
5640 {
5641 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5642
5643 /* If this is the first .plt entry, make room for the special
5644 first entry. */
5645 s = htab->plt;
5646 if (s->size == 0)
5647 s->size += PLT_INITIAL_ENTRY_SIZE;
5648
5649 pent->plt.offset = s->size;
5650
5651 /* Make room for this entry. */
5652 s->size += PLT_ENTRY_SIZE;
5653
5654 /* Make room for the .glink code. */
5655 s = htab->glink;
5656 if (s->size == 0)
5657 s->size += GLINK_CALL_STUB_SIZE;
5658 /* We need bigger stubs past index 32767. */
5659 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5660 s->size += 4;
5661 s->size += 2*4;
5662
5663 /* We also need to make an entry in the .rela.plt section. */
5664 s = htab->relplt;
5665 s->size += sizeof (Elf64_External_Rela);
5666 doneone = TRUE;
5667 }
5668 else
5669 pent->plt.offset = (bfd_vma) -1;
5670 if (!doneone)
5671 {
5672 h->plt.plist = NULL;
5673 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5674 }
5675 }
5676 else
5677 {
5678 h->plt.plist = NULL;
5679 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5680 }
5681
5682 eh = (struct ppc_link_hash_entry *) h;
5683 /* Run through the TLS GD got entries first if we're changing them
5684 to TPREL. */
5685 if ((eh->tls_mask & TLS_TPRELGD) != 0)
5686 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5687 if (gent->got.refcount > 0
5688 && (gent->tls_type & TLS_GD) != 0)
5689 {
5690 /* This was a GD entry that has been converted to TPREL. If
5691 there happens to be a TPREL entry we can use that one. */
5692 struct got_entry *ent;
5693 for (ent = h->got.glist; ent != NULL; ent = ent->next)
5694 if (ent->got.refcount > 0
5695 && (ent->tls_type & TLS_TPREL) != 0
5696 && ent->addend == gent->addend
5697 && ent->owner == gent->owner)
5698 {
5699 gent->got.refcount = 0;
5700 break;
5701 }
5702
5703 /* If not, then we'll be using our own TPREL entry. */
5704 if (gent->got.refcount != 0)
5705 gent->tls_type = TLS_TLS | TLS_TPREL;
5706 }
5707
5708 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5709 if (gent->got.refcount > 0)
5710 {
5711 bfd_boolean dyn;
5712
5713 /* Make sure this symbol is output as a dynamic symbol.
5714 Undefined weak syms won't yet be marked as dynamic,
5715 nor will all TLS symbols. */
5716 if (h->dynindx == -1
5717 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5718 {
5719 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5720 return FALSE;
5721 }
5722
5723 if ((gent->tls_type & TLS_LD) != 0
5724 && !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
5725 {
5726 gent->got.offset = ppc64_tlsld_got (gent->owner)->offset;
5727 continue;
5728 }
5729
5730 s = ppc64_elf_tdata (gent->owner)->got;
5731 gent->got.offset = s->size;
5732 s->size
5733 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
5734 dyn = htab->elf.dynamic_sections_created;
5735 if ((info->shared
5736 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
5737 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
5738 || h->root.type != bfd_link_hash_undefweak))
5739 ppc64_elf_tdata (gent->owner)->relgot->size
5740 += (gent->tls_type & eh->tls_mask & TLS_GD
5741 ? 2 * sizeof (Elf64_External_Rela)
5742 : sizeof (Elf64_External_Rela));
5743 }
5744 else
5745 gent->got.offset = (bfd_vma) -1;
5746
5747 if (eh->dyn_relocs == NULL)
5748 return TRUE;
5749
5750 /* In the shared -Bsymbolic case, discard space allocated for
5751 dynamic pc-relative relocs against symbols which turn out to be
5752 defined in regular objects. For the normal shared case, discard
5753 space for relocs that have become local due to symbol visibility
5754 changes. */
5755
5756 if (info->shared)
5757 {
5758 /* Relocs that use pc_count are those that appear on a call insn,
5759 or certain REL relocs (see MUST_BE_DYN_RELOC) that can be
5760 generated via assembly. We want calls to protected symbols to
5761 resolve directly to the function rather than going via the plt.
5762 If people want function pointer comparisons to work as expected
5763 then they should avoid writing weird assembly. */
5764 if (SYMBOL_CALLS_LOCAL (info, h))
5765 {
5766 struct ppc_dyn_relocs **pp;
5767
5768 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5769 {
5770 p->count -= p->pc_count;
5771 p->pc_count = 0;
5772 if (p->count == 0)
5773 *pp = p->next;
5774 else
5775 pp = &p->next;
5776 }
5777 }
5778
5779 /* Also discard relocs on undefined weak syms with non-default
5780 visibility. */
5781 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5782 && h->root.type == bfd_link_hash_undefweak)
5783 eh->dyn_relocs = NULL;
5784 }
5785 else if (ELIMINATE_COPY_RELOCS)
5786 {
5787 /* For the non-shared case, discard space for relocs against
5788 symbols which turn out to need copy relocs or are not
5789 dynamic. */
5790
5791 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
5792 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5793 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5794 {
5795 /* Make sure this symbol is output as a dynamic symbol.
5796 Undefined weak syms won't yet be marked as dynamic. */
5797 if (h->dynindx == -1
5798 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5799 {
5800 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5801 return FALSE;
5802 }
5803
5804 /* If that succeeded, we know we'll be keeping all the
5805 relocs. */
5806 if (h->dynindx != -1)
5807 goto keep;
5808 }
5809
5810 eh->dyn_relocs = NULL;
5811
5812 keep: ;
5813 }
5814
5815 /* Finally, allocate space. */
5816 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5817 {
5818 asection *sreloc = elf_section_data (p->sec)->sreloc;
5819 sreloc->size += p->count * sizeof (Elf64_External_Rela);
5820 }
5821
5822 return TRUE;
5823 }
5824
5825 /* Find any dynamic relocs that apply to read-only sections. */
5826
5827 static bfd_boolean
5828 readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5829 {
5830 struct ppc_link_hash_entry *eh;
5831 struct ppc_dyn_relocs *p;
5832
5833 if (h->root.type == bfd_link_hash_warning)
5834 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5835
5836 eh = (struct ppc_link_hash_entry *) h;
5837 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5838 {
5839 asection *s = p->sec->output_section;
5840
5841 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5842 {
5843 struct bfd_link_info *info = inf;
5844
5845 info->flags |= DF_TEXTREL;
5846
5847 /* Not an error, just cut short the traversal. */
5848 return FALSE;
5849 }
5850 }
5851 return TRUE;
5852 }
5853
5854 /* Set the sizes of the dynamic sections. */
5855
5856 static bfd_boolean
5857 ppc64_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
5858 struct bfd_link_info *info)
5859 {
5860 struct ppc_link_hash_table *htab;
5861 bfd *dynobj;
5862 asection *s;
5863 bfd_boolean relocs;
5864 bfd *ibfd;
5865
5866 htab = ppc_hash_table (info);
5867 dynobj = htab->elf.dynobj;
5868 if (dynobj == NULL)
5869 abort ();
5870
5871 if (htab->elf.dynamic_sections_created)
5872 {
5873 /* Set the contents of the .interp section to the interpreter. */
5874 if (info->executable)
5875 {
5876 s = bfd_get_section_by_name (dynobj, ".interp");
5877 if (s == NULL)
5878 abort ();
5879 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5880 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5881 }
5882 }
5883
5884 /* Set up .got offsets for local syms, and space for local dynamic
5885 relocs. */
5886 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5887 {
5888 struct got_entry **lgot_ents;
5889 struct got_entry **end_lgot_ents;
5890 char *lgot_masks;
5891 bfd_size_type locsymcount;
5892 Elf_Internal_Shdr *symtab_hdr;
5893 asection *srel;
5894
5895 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5896 continue;
5897
5898 if (ppc64_tlsld_got (ibfd)->refcount > 0)
5899 {
5900 s = ppc64_elf_tdata (ibfd)->got;
5901 ppc64_tlsld_got (ibfd)->offset = s->size;
5902 s->size += 16;
5903 if (info->shared)
5904 {
5905 srel = ppc64_elf_tdata (ibfd)->relgot;
5906 srel->size += sizeof (Elf64_External_Rela);
5907 }
5908 }
5909 else
5910 ppc64_tlsld_got (ibfd)->offset = (bfd_vma) -1;
5911
5912 for (s = ibfd->sections; s != NULL; s = s->next)
5913 {
5914 struct ppc_dyn_relocs *p;
5915
5916 for (p = *((struct ppc_dyn_relocs **)
5917 &elf_section_data (s)->local_dynrel);
5918 p != NULL;
5919 p = p->next)
5920 {
5921 if (!bfd_is_abs_section (p->sec)
5922 && bfd_is_abs_section (p->sec->output_section))
5923 {
5924 /* Input section has been discarded, either because
5925 it is a copy of a linkonce section or due to
5926 linker script /DISCARD/, so we'll be discarding
5927 the relocs too. */
5928 }
5929 else if (p->count != 0)
5930 {
5931 srel = elf_section_data (p->sec)->sreloc;
5932 srel->size += p->count * sizeof (Elf64_External_Rela);
5933 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5934 info->flags |= DF_TEXTREL;
5935 }
5936 }
5937 }
5938
5939 lgot_ents = elf_local_got_ents (ibfd);
5940 if (!lgot_ents)
5941 continue;
5942
5943 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5944 locsymcount = symtab_hdr->sh_info;
5945 end_lgot_ents = lgot_ents + locsymcount;
5946 lgot_masks = (char *) end_lgot_ents;
5947 s = ppc64_elf_tdata (ibfd)->got;
5948 srel = ppc64_elf_tdata (ibfd)->relgot;
5949 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
5950 {
5951 struct got_entry *ent;
5952
5953 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5954 if (ent->got.refcount > 0)
5955 {
5956 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
5957 {
5958 if (ppc64_tlsld_got (ibfd)->offset == (bfd_vma) -1)
5959 {
5960 ppc64_tlsld_got (ibfd)->offset = s->size;
5961 s->size += 16;
5962 if (info->shared)
5963 srel->size += sizeof (Elf64_External_Rela);
5964 }
5965 ent->got.offset = ppc64_tlsld_got (ibfd)->offset;
5966 }
5967 else
5968 {
5969 ent->got.offset = s->size;
5970 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
5971 {
5972 s->size += 16;
5973 if (info->shared)
5974 srel->size += 2 * sizeof (Elf64_External_Rela);
5975 }
5976 else
5977 {
5978 s->size += 8;
5979 if (info->shared)
5980 srel->size += sizeof (Elf64_External_Rela);
5981 }
5982 }
5983 }
5984 else
5985 ent->got.offset = (bfd_vma) -1;
5986 }
5987 }
5988
5989 /* Allocate global sym .plt and .got entries, and space for global
5990 sym dynamic relocs. */
5991 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
5992
5993 /* We now have determined the sizes of the various dynamic sections.
5994 Allocate memory for them. */
5995 relocs = FALSE;
5996 for (s = dynobj->sections; s != NULL; s = s->next)
5997 {
5998 if ((s->flags & SEC_LINKER_CREATED) == 0)
5999 continue;
6000
6001 if (s == htab->brlt || s == htab->relbrlt)
6002 /* These haven't been allocated yet; don't strip. */
6003 continue;
6004 else if (s == htab->got
6005 || s == htab->plt
6006 || s == htab->glink)
6007 {
6008 /* Strip this section if we don't need it; see the
6009 comment below. */
6010 }
6011 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
6012 {
6013 if (s->size == 0)
6014 {
6015 /* If we don't need this section, strip it from the
6016 output file. This is mostly to handle .rela.bss and
6017 .rela.plt. We must create both sections in
6018 create_dynamic_sections, because they must be created
6019 before the linker maps input sections to output
6020 sections. The linker does that before
6021 adjust_dynamic_symbol is called, and it is that
6022 function which decides whether anything needs to go
6023 into these sections. */
6024 }
6025 else
6026 {
6027 if (s != htab->relplt)
6028 relocs = TRUE;
6029
6030 /* We use the reloc_count field as a counter if we need
6031 to copy relocs into the output file. */
6032 s->reloc_count = 0;
6033 }
6034 }
6035 else
6036 {
6037 /* It's not one of our sections, so don't allocate space. */
6038 continue;
6039 }
6040
6041 if (s->size == 0)
6042 {
6043 _bfd_strip_section_from_output (info, s);
6044 continue;
6045 }
6046
6047 /* .plt is in the bss section. We don't initialise it. */
6048 if (s == htab->plt)
6049 continue;
6050
6051 /* Allocate memory for the section contents. We use bfd_zalloc
6052 here in case unused entries are not reclaimed before the
6053 section's contents are written out. This should not happen,
6054 but this way if it does we get a R_PPC64_NONE reloc in .rela
6055 sections instead of garbage.
6056 We also rely on the section contents being zero when writing
6057 the GOT. */
6058 s->contents = bfd_zalloc (dynobj, s->size);
6059 if (s->contents == NULL)
6060 return FALSE;
6061 }
6062
6063 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6064 {
6065 s = ppc64_elf_tdata (ibfd)->got;
6066 if (s != NULL && s != htab->got)
6067 {
6068 if (s->size == 0)
6069 _bfd_strip_section_from_output (info, s);
6070 else
6071 {
6072 s->contents = bfd_zalloc (ibfd, s->size);
6073 if (s->contents == NULL)
6074 return FALSE;
6075 }
6076 }
6077 s = ppc64_elf_tdata (ibfd)->relgot;
6078 if (s != NULL)
6079 {
6080 if (s->size == 0)
6081 _bfd_strip_section_from_output (info, s);
6082 else
6083 {
6084 s->contents = bfd_zalloc (ibfd, s->size);
6085 if (s->contents == NULL)
6086 return FALSE;
6087 relocs = TRUE;
6088 s->reloc_count = 0;
6089 }
6090 }
6091 }
6092
6093 if (htab->elf.dynamic_sections_created)
6094 {
6095 /* Add some entries to the .dynamic section. We fill in the
6096 values later, in ppc64_elf_finish_dynamic_sections, but we
6097 must add the entries now so that we get the correct size for
6098 the .dynamic section. The DT_DEBUG entry is filled in by the
6099 dynamic linker and used by the debugger. */
6100 #define add_dynamic_entry(TAG, VAL) \
6101 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
6102
6103 if (info->executable)
6104 {
6105 if (!add_dynamic_entry (DT_DEBUG, 0))
6106 return FALSE;
6107 }
6108
6109 if (htab->plt != NULL && htab->plt->size != 0)
6110 {
6111 if (!add_dynamic_entry (DT_PLTGOT, 0)
6112 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6113 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6114 || !add_dynamic_entry (DT_JMPREL, 0)
6115 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
6116 return FALSE;
6117 }
6118
6119 if (NO_OPD_RELOCS)
6120 {
6121 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
6122 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
6123 return FALSE;
6124 }
6125
6126 if (relocs)
6127 {
6128 if (!add_dynamic_entry (DT_RELA, 0)
6129 || !add_dynamic_entry (DT_RELASZ, 0)
6130 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
6131 return FALSE;
6132
6133 /* If any dynamic relocs apply to a read-only section,
6134 then we need a DT_TEXTREL entry. */
6135 if ((info->flags & DF_TEXTREL) == 0)
6136 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
6137
6138 if ((info->flags & DF_TEXTREL) != 0)
6139 {
6140 if (!add_dynamic_entry (DT_TEXTREL, 0))
6141 return FALSE;
6142 }
6143 }
6144 }
6145 #undef add_dynamic_entry
6146
6147 return TRUE;
6148 }
6149
6150 /* Determine the type of stub needed, if any, for a call. */
6151
6152 static inline enum ppc_stub_type
6153 ppc_type_of_stub (asection *input_sec,
6154 const Elf_Internal_Rela *rel,
6155 struct ppc_link_hash_entry **hash,
6156 bfd_vma destination)
6157 {
6158 struct ppc_link_hash_entry *h = *hash;
6159 bfd_vma location;
6160 bfd_vma branch_offset;
6161 bfd_vma max_branch_offset;
6162 enum elf_ppc64_reloc_type r_type;
6163
6164 if (h != NULL)
6165 {
6166 if (h->oh != NULL
6167 && h->oh->elf.dynindx != -1)
6168 {
6169 struct plt_entry *ent;
6170 for (ent = h->oh->elf.plt.plist; ent != NULL; ent = ent->next)
6171 if (ent->addend == rel->r_addend
6172 && ent->plt.offset != (bfd_vma) -1)
6173 {
6174 *hash = h->oh;
6175 return ppc_stub_plt_call;
6176 }
6177 }
6178
6179 if (!(h->elf.root.type == bfd_link_hash_defined
6180 || h->elf.root.type == bfd_link_hash_defweak)
6181 || h->elf.root.u.def.section->output_section == NULL)
6182 return ppc_stub_none;
6183 }
6184
6185 /* Determine where the call point is. */
6186 location = (input_sec->output_offset
6187 + input_sec->output_section->vma
6188 + rel->r_offset);
6189
6190 branch_offset = destination - location;
6191 r_type = ELF64_R_TYPE (rel->r_info);
6192
6193 /* Determine if a long branch stub is needed. */
6194 max_branch_offset = 1 << 25;
6195 if (r_type != R_PPC64_REL24)
6196 max_branch_offset = 1 << 15;
6197
6198 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
6199 /* We need a stub. Figure out whether a long_branch or plt_branch
6200 is needed later. */
6201 return ppc_stub_long_branch;
6202
6203 return ppc_stub_none;
6204 }
6205
6206 /* Build a .plt call stub. */
6207
6208 static inline bfd_byte *
6209 build_plt_stub (bfd *obfd, bfd_byte *p, int offset)
6210 {
6211 #define PPC_LO(v) ((v) & 0xffff)
6212 #define PPC_HI(v) (((v) >> 16) & 0xffff)
6213 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
6214
6215 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
6216 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
6217 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6218 if (PPC_HA (offset + 8) != PPC_HA (offset))
6219 bfd_put_32 (obfd, ADDIS_R12_R12 | 1, p), p += 4;
6220 offset += 8;
6221 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
6222 if (PPC_HA (offset + 8) != PPC_HA (offset))
6223 bfd_put_32 (obfd, ADDIS_R12_R12 | 1, p), p += 4;
6224 offset += 8;
6225 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6226 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6227 bfd_put_32 (obfd, BCTR, p), p += 4;
6228 return p;
6229 }
6230
6231 static bfd_boolean
6232 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
6233 {
6234 struct ppc_stub_hash_entry *stub_entry;
6235 struct ppc_branch_hash_entry *br_entry;
6236 struct bfd_link_info *info;
6237 struct ppc_link_hash_table *htab;
6238 bfd_byte *loc;
6239 bfd_byte *p;
6240 unsigned int indx;
6241 struct plt_entry *ent;
6242 bfd_vma off;
6243 int size;
6244
6245 /* Massage our args to the form they really have. */
6246 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6247 info = in_arg;
6248
6249 htab = ppc_hash_table (info);
6250
6251 /* Make a note of the offset within the stubs for this entry. */
6252 stub_entry->stub_offset = stub_entry->stub_sec->size;
6253 loc = stub_entry->stub_sec->contents + stub_entry->stub_offset;
6254
6255 htab->stub_count[stub_entry->stub_type - 1] += 1;
6256 switch (stub_entry->stub_type)
6257 {
6258 case ppc_stub_long_branch:
6259 case ppc_stub_long_branch_r2off:
6260 /* Branches are relative. This is where we are going to. */
6261 off = (stub_entry->target_value
6262 + stub_entry->target_section->output_offset
6263 + stub_entry->target_section->output_section->vma);
6264
6265 /* And this is where we are coming from. */
6266 off -= (stub_entry->stub_offset
6267 + stub_entry->stub_sec->output_offset
6268 + stub_entry->stub_sec->output_section->vma);
6269
6270 if (stub_entry->stub_type != ppc_stub_long_branch_r2off)
6271 size = 4;
6272 else
6273 {
6274 bfd_vma r2off;
6275
6276 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
6277 - htab->stub_group[stub_entry->id_sec->id].toc_off);
6278 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
6279 loc += 4;
6280 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
6281 loc += 4;
6282 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
6283 loc += 4;
6284 off -= 12;
6285 size = 16;
6286 }
6287 bfd_put_32 (htab->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
6288
6289 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
6290 break;
6291
6292 case ppc_stub_plt_branch:
6293 case ppc_stub_plt_branch_r2off:
6294 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6295 stub_entry->root.string + 9,
6296 FALSE, FALSE);
6297 if (br_entry == NULL)
6298 {
6299 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6300 stub_entry->root.string + 9);
6301 htab->stub_error = TRUE;
6302 return FALSE;
6303 }
6304
6305 off = (stub_entry->target_value
6306 + stub_entry->target_section->output_offset
6307 + stub_entry->target_section->output_section->vma);
6308
6309 bfd_put_64 (htab->brlt->owner, off,
6310 htab->brlt->contents + br_entry->offset);
6311
6312 if (info->shared)
6313 {
6314 /* Create a reloc for the branch lookup table entry. */
6315 Elf_Internal_Rela rela;
6316 bfd_byte *rl;
6317
6318 rela.r_offset = (br_entry->offset
6319 + htab->brlt->output_offset
6320 + htab->brlt->output_section->vma);
6321 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6322 rela.r_addend = off;
6323
6324 rl = htab->relbrlt->contents;
6325 rl += htab->relbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6326 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
6327 }
6328
6329 off = (br_entry->offset
6330 + htab->brlt->output_offset
6331 + htab->brlt->output_section->vma
6332 - elf_gp (htab->brlt->output_section->owner)
6333 - htab->stub_group[stub_entry->id_sec->id].toc_off);
6334
6335 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
6336 {
6337 (*_bfd_error_handler)
6338 (_("linkage table error against `%s'"),
6339 stub_entry->root.string);
6340 bfd_set_error (bfd_error_bad_value);
6341 htab->stub_error = TRUE;
6342 return FALSE;
6343 }
6344
6345 indx = off;
6346 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
6347 {
6348 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
6349 loc += 4;
6350 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
6351 size = 16;
6352 }
6353 else
6354 {
6355 bfd_vma r2off;
6356
6357 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
6358 - htab->stub_group[stub_entry->id_sec->id].toc_off);
6359 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
6360 loc += 4;
6361 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
6362 loc += 4;
6363 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
6364 loc += 4;
6365 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
6366 loc += 4;
6367 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
6368 size = 28;
6369 }
6370 loc += 4;
6371 bfd_put_32 (htab->stub_bfd, MTCTR_R11, loc);
6372 loc += 4;
6373 bfd_put_32 (htab->stub_bfd, BCTR, loc);
6374 break;
6375
6376 case ppc_stub_plt_call:
6377 /* Do the best we can for shared libraries built without
6378 exporting ".foo" for each "foo". This can happen when symbol
6379 versioning scripts strip all bar a subset of symbols. */
6380 if (stub_entry->h->oh->elf.root.type != bfd_link_hash_defined
6381 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defweak)
6382 {
6383 /* Point the symbol at the stub. There may be multiple stubs,
6384 we don't really care; The main thing is to make this sym
6385 defined somewhere. Maybe defining the symbol in the stub
6386 section is a silly idea. If we didn't do this, htab->top_id
6387 could disappear. */
6388 stub_entry->h->oh->elf.root.type = bfd_link_hash_defined;
6389 stub_entry->h->oh->elf.root.u.def.section = stub_entry->stub_sec;
6390 stub_entry->h->oh->elf.root.u.def.value = stub_entry->stub_offset;
6391 }
6392
6393 /* Now build the stub. */
6394 off = (bfd_vma) -1;
6395 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6396 if (ent->addend == stub_entry->addend)
6397 {
6398 off = ent->plt.offset;
6399 break;
6400 }
6401 if (off >= (bfd_vma) -2)
6402 abort ();
6403
6404 off &= ~ (bfd_vma) 1;
6405 off += (htab->plt->output_offset
6406 + htab->plt->output_section->vma
6407 - elf_gp (htab->plt->output_section->owner)
6408 - htab->stub_group[stub_entry->id_sec->id].toc_off);
6409
6410 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
6411 {
6412 (*_bfd_error_handler)
6413 (_("linkage table error against `%s'"),
6414 stub_entry->h->elf.root.root.string);
6415 bfd_set_error (bfd_error_bad_value);
6416 htab->stub_error = TRUE;
6417 return FALSE;
6418 }
6419
6420 p = build_plt_stub (htab->stub_bfd, loc, off);
6421 size = p - loc;
6422 break;
6423
6424 default:
6425 BFD_FAIL ();
6426 return FALSE;
6427 }
6428
6429 stub_entry->stub_sec->size += size;
6430
6431 if (htab->emit_stub_syms
6432 && !(stub_entry->stub_type == ppc_stub_plt_call
6433 && stub_entry->h->oh->elf.root.type == bfd_link_hash_defined
6434 && stub_entry->h->oh->elf.root.u.def.section == stub_entry->stub_sec
6435 && stub_entry->h->oh->elf.root.u.def.value == stub_entry->stub_offset))
6436 {
6437 struct elf_link_hash_entry *h;
6438 h = elf_link_hash_lookup (&htab->elf, stub_entry->root.string,
6439 TRUE, FALSE, FALSE);
6440 if (h == NULL)
6441 return FALSE;
6442 if (h->root.type == bfd_link_hash_new)
6443 {
6444 h->root.type = bfd_link_hash_defined;
6445 h->root.u.def.section = stub_entry->stub_sec;
6446 h->root.u.def.value = stub_entry->stub_offset;
6447 h->elf_link_hash_flags = (ELF_LINK_HASH_REF_REGULAR
6448 | ELF_LINK_HASH_DEF_REGULAR
6449 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
6450 | ELF_LINK_FORCED_LOCAL);
6451 }
6452 }
6453
6454 return TRUE;
6455 }
6456
6457 /* As above, but don't actually build the stub. Just bump offset so
6458 we know stub section sizes, and select plt_branch stubs where
6459 long_branch stubs won't do. */
6460
6461 static bfd_boolean
6462 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
6463 {
6464 struct ppc_stub_hash_entry *stub_entry;
6465 struct bfd_link_info *info;
6466 struct ppc_link_hash_table *htab;
6467 bfd_vma off;
6468 int size;
6469
6470 /* Massage our args to the form they really have. */
6471 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6472 info = in_arg;
6473
6474 htab = ppc_hash_table (info);
6475
6476 if (stub_entry->stub_type == ppc_stub_plt_call)
6477 {
6478 struct plt_entry *ent;
6479 off = (bfd_vma) -1;
6480 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6481 if (ent->addend == stub_entry->addend)
6482 {
6483 off = ent->plt.offset & ~(bfd_vma) 1;
6484 break;
6485 }
6486 if (off >= (bfd_vma) -2)
6487 abort ();
6488 off += (htab->plt->output_offset
6489 + htab->plt->output_section->vma
6490 - elf_gp (htab->plt->output_section->owner)
6491 - htab->stub_group[stub_entry->id_sec->id].toc_off);
6492
6493 size = PLT_CALL_STUB_SIZE;
6494 if (PPC_HA (off + 16) != PPC_HA (off))
6495 size += 4;
6496 }
6497 else
6498 {
6499 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
6500 variants. */
6501 off = (stub_entry->target_value
6502 + stub_entry->target_section->output_offset
6503 + stub_entry->target_section->output_section->vma);
6504 off -= (stub_entry->stub_sec->size
6505 + stub_entry->stub_sec->output_offset
6506 + stub_entry->stub_sec->output_section->vma);
6507
6508 /* Reset the stub type from the plt variant in case we now
6509 can reach with a shorter stub. */
6510 if (stub_entry->stub_type >= ppc_stub_plt_branch)
6511 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
6512
6513 size = 4;
6514 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
6515 {
6516 off -= 12;
6517 size = 16;
6518 }
6519
6520 /* If the branch offset if too big, use a ppc_stub_plt_branch. */
6521 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6522 {
6523 struct ppc_branch_hash_entry *br_entry;
6524
6525 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6526 stub_entry->root.string + 9,
6527 TRUE, FALSE);
6528 if (br_entry == NULL)
6529 {
6530 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6531 stub_entry->root.string + 9);
6532 htab->stub_error = TRUE;
6533 return FALSE;
6534 }
6535
6536 if (br_entry->iter != htab->stub_iteration)
6537 {
6538 br_entry->iter = htab->stub_iteration;
6539 br_entry->offset = htab->brlt->size;
6540 htab->brlt->size += 8;
6541
6542 if (info->shared)
6543 htab->relbrlt->size += sizeof (Elf64_External_Rela);
6544 }
6545
6546 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
6547 size = 16;
6548 if (stub_entry->stub_type != ppc_stub_plt_branch)
6549 size = 28;
6550 }
6551 }
6552
6553 stub_entry->stub_sec->size += size;
6554 return TRUE;
6555 }
6556
6557 /* Set up various things so that we can make a list of input sections
6558 for each output section included in the link. Returns -1 on error,
6559 0 when no stubs will be needed, and 1 on success. */
6560
6561 int
6562 ppc64_elf_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
6563 {
6564 bfd *input_bfd;
6565 int top_id, top_index, id;
6566 asection *section;
6567 asection **input_list;
6568 bfd_size_type amt;
6569 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6570
6571 if (htab->brlt == NULL)
6572 return 0;
6573
6574 /* Find the top input section id. */
6575 for (input_bfd = info->input_bfds, top_id = 3;
6576 input_bfd != NULL;
6577 input_bfd = input_bfd->link_next)
6578 {
6579 for (section = input_bfd->sections;
6580 section != NULL;
6581 section = section->next)
6582 {
6583 if (top_id < section->id)
6584 top_id = section->id;
6585 }
6586 }
6587
6588 htab->top_id = top_id;
6589 amt = sizeof (struct map_stub) * (top_id + 1);
6590 htab->stub_group = bfd_zmalloc (amt);
6591 if (htab->stub_group == NULL)
6592 return -1;
6593
6594 /* Set toc_off for com, und, abs and ind sections. */
6595 for (id = 0; id < 3; id++)
6596 htab->stub_group[id].toc_off = TOC_BASE_OFF;
6597
6598 elf_gp (output_bfd) = htab->toc_curr = ppc64_elf_toc (output_bfd);
6599
6600 /* We can't use output_bfd->section_count here to find the top output
6601 section index as some sections may have been removed, and
6602 _bfd_strip_section_from_output doesn't renumber the indices. */
6603 for (section = output_bfd->sections, top_index = 0;
6604 section != NULL;
6605 section = section->next)
6606 {
6607 if (top_index < section->index)
6608 top_index = section->index;
6609 }
6610
6611 htab->top_index = top_index;
6612 amt = sizeof (asection *) * (top_index + 1);
6613 input_list = bfd_zmalloc (amt);
6614 htab->input_list = input_list;
6615 if (input_list == NULL)
6616 return -1;
6617
6618 return 1;
6619 }
6620
6621 /* The linker repeatedly calls this function for each TOC input section
6622 and linker generated GOT section. Group input bfds such that the toc
6623 within a group is less than 64k in size. Will break with cute linker
6624 scripts that play games with dot in the output toc section. */
6625
6626 void
6627 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
6628 {
6629 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6630
6631 if (!htab->no_multi_toc)
6632 {
6633 bfd_vma addr = isec->output_offset + isec->output_section->vma;
6634 bfd_vma off = addr - htab->toc_curr;
6635 if (off + isec->size > 0x10000)
6636 {
6637 htab->toc_curr = addr;
6638 htab->multi_toc_needed = 1;
6639 }
6640 elf_gp (isec->owner) = (htab->toc_curr
6641 - elf_gp (isec->output_section->owner)
6642 + TOC_BASE_OFF);
6643 }
6644 }
6645
6646 /* Called after the last call to the above function. */
6647
6648 void
6649 ppc64_elf_reinit_toc (bfd *output_bfd ATTRIBUTE_UNUSED,
6650 struct bfd_link_info *info)
6651 {
6652 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6653
6654 /* toc_curr tracks the TOC offset used for code sections below in
6655 ppc64_elf_next_input_section. Start off at 0x8000. */
6656 htab->toc_curr = TOC_BASE_OFF;
6657 }
6658
6659 /* No toc references were found in ISEC. If the code in ISEC makes no
6660 calls, then there's no need to use toc adjusting stubs when branching
6661 into ISEC. Actually, indirect calls from ISEC are OK as they will
6662 load r2. */
6663
6664 static int
6665 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
6666 {
6667 bfd_byte *contents;
6668 bfd_size_type i;
6669 int ret;
6670 int branch_ok;
6671
6672 /* We know none of our code bearing sections will need toc stubs. */
6673 if ((isec->flags & SEC_LINKER_CREATED) != 0)
6674 return 0;
6675
6676 if (isec->size == 0)
6677 return 0;
6678
6679 /* Hack for linux kernel. .fixup contains branches, but only back to
6680 the function that hit an exception. */
6681 branch_ok = strcmp (isec->name, ".fixup") == 0;
6682
6683 contents = elf_section_data (isec)->this_hdr.contents;
6684 if (contents == NULL)
6685 {
6686 if (!bfd_malloc_and_get_section (isec->owner, isec, &contents))
6687 {
6688 if (contents != NULL)
6689 free (contents);
6690 return -1;
6691 }
6692 if (info->keep_memory)
6693 elf_section_data (isec)->this_hdr.contents = contents;
6694 }
6695
6696 /* Code scan, because we don't necessarily have relocs on calls to
6697 static functions. */
6698 ret = 0;
6699 for (i = 0; i < isec->size; i += 4)
6700 {
6701 unsigned long insn = bfd_get_32 (isec->owner, contents + i);
6702 /* Is this a branch? */
6703 if ((insn & (0x3f << 26)) == (18 << 26)
6704 /* If branch and link, it's a function call. */
6705 && ((insn & 1) != 0
6706 /* Sibling calls use a plain branch. I don't know a way
6707 of deciding whether a branch is really a sibling call. */
6708 || !branch_ok))
6709 {
6710 ret = 1;
6711 break;
6712 }
6713 }
6714
6715 if (elf_section_data (isec)->this_hdr.contents != contents)
6716 free (contents);
6717 return ret;
6718 }
6719
6720 /* The linker repeatedly calls this function for each input section,
6721 in the order that input sections are linked into output sections.
6722 Build lists of input sections to determine groupings between which
6723 we may insert linker stubs. */
6724
6725 bfd_boolean
6726 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
6727 {
6728 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6729 int ret;
6730
6731 if ((isec->output_section->flags & SEC_CODE) != 0
6732 && isec->output_section->index <= htab->top_index)
6733 {
6734 asection **list = htab->input_list + isec->output_section->index;
6735 /* Steal the link_sec pointer for our list. */
6736 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6737 /* This happens to make the list in reverse order,
6738 which is what we want. */
6739 PREV_SEC (isec) = *list;
6740 *list = isec;
6741 }
6742
6743 /* If a code section has a function that uses the TOC then we need
6744 to use the right TOC (obviously). Also, make sure that .opd gets
6745 the correct TOC value for R_PPC64_TOC relocs that don't have or
6746 can't find their function symbol (shouldn't ever happen now). */
6747 if (isec->has_gp_reloc || (isec->flags & SEC_CODE) == 0)
6748 {
6749 if (elf_gp (isec->owner) != 0)
6750 htab->toc_curr = elf_gp (isec->owner);
6751 }
6752 else if ((ret = toc_adjusting_stub_needed (info, isec)) < 0)
6753 return FALSE;
6754 else
6755 isec->has_gp_reloc = ret;
6756
6757 /* Functions that don't use the TOC can belong in any TOC group.
6758 Use the last TOC base. This happens to make _init and _fini
6759 pasting work. */
6760 htab->stub_group[isec->id].toc_off = htab->toc_curr;
6761 return TRUE;
6762 }
6763
6764 /* See whether we can group stub sections together. Grouping stub
6765 sections may result in fewer stubs. More importantly, we need to
6766 put all .init* and .fini* stubs at the beginning of the .init or
6767 .fini output sections respectively, because glibc splits the
6768 _init and _fini functions into multiple parts. Putting a stub in
6769 the middle of a function is not a good idea. */
6770
6771 static void
6772 group_sections (struct ppc_link_hash_table *htab,
6773 bfd_size_type stub_group_size,
6774 bfd_boolean stubs_always_before_branch)
6775 {
6776 asection **list = htab->input_list + htab->top_index;
6777 do
6778 {
6779 asection *tail = *list;
6780 while (tail != NULL)
6781 {
6782 asection *curr;
6783 asection *prev;
6784 bfd_size_type total;
6785 bfd_boolean big_sec;
6786 bfd_vma curr_toc;
6787
6788 curr = tail;
6789 total = tail->size;
6790 big_sec = total >= stub_group_size;
6791 curr_toc = htab->stub_group[tail->id].toc_off;
6792
6793 while ((prev = PREV_SEC (curr)) != NULL
6794 && ((total += curr->output_offset - prev->output_offset)
6795 < stub_group_size)
6796 && htab->stub_group[prev->id].toc_off == curr_toc)
6797 curr = prev;
6798
6799 /* OK, the size from the start of CURR to the end is less
6800 than stub_group_size and thus can be handled by one stub
6801 section. (or the tail section is itself larger than
6802 stub_group_size, in which case we may be toast.) We
6803 should really be keeping track of the total size of stubs
6804 added here, as stubs contribute to the final output
6805 section size. That's a little tricky, and this way will
6806 only break if stubs added make the total size more than
6807 2^25, ie. for the default stub_group_size, if stubs total
6808 more than 2097152 bytes, or nearly 75000 plt call stubs. */
6809 do
6810 {
6811 prev = PREV_SEC (tail);
6812 /* Set up this stub group. */
6813 htab->stub_group[tail->id].link_sec = curr;
6814 }
6815 while (tail != curr && (tail = prev) != NULL);
6816
6817 /* But wait, there's more! Input sections up to stub_group_size
6818 bytes before the stub section can be handled by it too.
6819 Don't do this if we have a really large section after the
6820 stubs, as adding more stubs increases the chance that
6821 branches may not reach into the stub section. */
6822 if (!stubs_always_before_branch && !big_sec)
6823 {
6824 total = 0;
6825 while (prev != NULL
6826 && ((total += tail->output_offset - prev->output_offset)
6827 < stub_group_size)
6828 && htab->stub_group[prev->id].toc_off == curr_toc)
6829 {
6830 tail = prev;
6831 prev = PREV_SEC (tail);
6832 htab->stub_group[tail->id].link_sec = curr;
6833 }
6834 }
6835 tail = prev;
6836 }
6837 }
6838 while (list-- != htab->input_list);
6839 free (htab->input_list);
6840 #undef PREV_SEC
6841 }
6842
6843 /* Determine and set the size of the stub section for a final link.
6844
6845 The basic idea here is to examine all the relocations looking for
6846 PC-relative calls to a target that is unreachable with a "bl"
6847 instruction. */
6848
6849 bfd_boolean
6850 ppc64_elf_size_stubs (bfd *output_bfd,
6851 struct bfd_link_info *info,
6852 bfd_signed_vma group_size,
6853 asection *(*add_stub_section) (const char *, asection *),
6854 void (*layout_sections_again) (void))
6855 {
6856 bfd_size_type stub_group_size;
6857 bfd_boolean stubs_always_before_branch;
6858 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6859
6860 /* Stash our params away. */
6861 htab->add_stub_section = add_stub_section;
6862 htab->layout_sections_again = layout_sections_again;
6863 stubs_always_before_branch = group_size < 0;
6864 if (group_size < 0)
6865 stub_group_size = -group_size;
6866 else
6867 stub_group_size = group_size;
6868 if (stub_group_size == 1)
6869 {
6870 /* Default values. */
6871 if (stubs_always_before_branch)
6872 {
6873 stub_group_size = 0x1e00000;
6874 if (htab->has_14bit_branch)
6875 stub_group_size = 0x7800;
6876 }
6877 else
6878 {
6879 stub_group_size = 0x1c00000;
6880 if (htab->has_14bit_branch)
6881 stub_group_size = 0x7000;
6882 }
6883 }
6884
6885 group_sections (htab, stub_group_size, stubs_always_before_branch);
6886
6887 while (1)
6888 {
6889 bfd *input_bfd;
6890 unsigned int bfd_indx;
6891 asection *stub_sec;
6892 bfd_boolean stub_changed;
6893
6894 htab->stub_iteration += 1;
6895 stub_changed = FALSE;
6896
6897 for (input_bfd = info->input_bfds, bfd_indx = 0;
6898 input_bfd != NULL;
6899 input_bfd = input_bfd->link_next, bfd_indx++)
6900 {
6901 Elf_Internal_Shdr *symtab_hdr;
6902 asection *section;
6903 Elf_Internal_Sym *local_syms = NULL;
6904
6905 /* We'll need the symbol table in a second. */
6906 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6907 if (symtab_hdr->sh_info == 0)
6908 continue;
6909
6910 /* Walk over each section attached to the input bfd. */
6911 for (section = input_bfd->sections;
6912 section != NULL;
6913 section = section->next)
6914 {
6915 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
6916
6917 /* If there aren't any relocs, then there's nothing more
6918 to do. */
6919 if ((section->flags & SEC_RELOC) == 0
6920 || section->reloc_count == 0)
6921 continue;
6922
6923 /* If this section is a link-once section that will be
6924 discarded, then don't create any stubs. */
6925 if (section->output_section == NULL
6926 || section->output_section->owner != output_bfd)
6927 continue;
6928
6929 /* Get the relocs. */
6930 internal_relocs
6931 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
6932 info->keep_memory);
6933 if (internal_relocs == NULL)
6934 goto error_ret_free_local;
6935
6936 /* Now examine each relocation. */
6937 irela = internal_relocs;
6938 irelaend = irela + section->reloc_count;
6939 for (; irela < irelaend; irela++)
6940 {
6941 enum elf_ppc64_reloc_type r_type;
6942 unsigned int r_indx;
6943 enum ppc_stub_type stub_type;
6944 struct ppc_stub_hash_entry *stub_entry;
6945 asection *sym_sec;
6946 bfd_vma sym_value;
6947 bfd_vma destination;
6948 bfd_boolean ok_dest;
6949 struct ppc_link_hash_entry *hash;
6950 struct elf_link_hash_entry *h;
6951 Elf_Internal_Sym *sym;
6952 char *stub_name;
6953 const asection *id_sec;
6954
6955 r_type = ELF64_R_TYPE (irela->r_info);
6956 r_indx = ELF64_R_SYM (irela->r_info);
6957
6958 if (r_type >= R_PPC64_max)
6959 {
6960 bfd_set_error (bfd_error_bad_value);
6961 goto error_ret_free_internal;
6962 }
6963
6964 /* Only look for stubs on branch instructions. */
6965 if (r_type != R_PPC64_REL24
6966 && r_type != R_PPC64_REL14
6967 && r_type != R_PPC64_REL14_BRTAKEN
6968 && r_type != R_PPC64_REL14_BRNTAKEN)
6969 continue;
6970
6971 /* Now determine the call target, its name, value,
6972 section. */
6973 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6974 r_indx, input_bfd))
6975 goto error_ret_free_internal;
6976 hash = (struct ppc_link_hash_entry *) h;
6977
6978 ok_dest = FALSE;
6979 if (hash == NULL)
6980 {
6981 /* It's a local symbol. */
6982 sym_value = sym->st_value;
6983 ok_dest = TRUE;
6984 }
6985 else
6986 {
6987 /* It's an external symbol. */
6988 sym_value = 0;
6989 if (hash->elf.root.type == bfd_link_hash_defined
6990 || hash->elf.root.type == bfd_link_hash_defweak)
6991 {
6992 sym_value = hash->elf.root.u.def.value;
6993 if (sym_sec->output_section != NULL)
6994 ok_dest = TRUE;
6995 }
6996 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6997 ;
6998 else if (hash->elf.root.type == bfd_link_hash_undefined)
6999 ;
7000 else
7001 {
7002 bfd_set_error (bfd_error_bad_value);
7003 goto error_ret_free_internal;
7004 }
7005 }
7006
7007 destination = 0;
7008 if (ok_dest)
7009 {
7010 sym_value += irela->r_addend;
7011 destination = (sym_value
7012 + sym_sec->output_offset
7013 + sym_sec->output_section->vma);
7014 }
7015
7016 /* Determine what (if any) linker stub is needed. */
7017 stub_type = ppc_type_of_stub (section, irela, &hash,
7018 destination);
7019
7020 if (stub_type != ppc_stub_plt_call)
7021 {
7022 /* Check whether we need a TOC adjusting stub.
7023 Since the linker pastes together pieces from
7024 different object files when creating the
7025 _init and _fini functions, it may be that a
7026 call to what looks like a local sym is in
7027 fact a call needing a TOC adjustment. */
7028 if (sym_sec != NULL
7029 && sym_sec->output_section != NULL
7030 && (htab->stub_group[sym_sec->id].toc_off
7031 != htab->stub_group[section->id].toc_off)
7032 && sym_sec->has_gp_reloc
7033 && section->has_gp_reloc)
7034 stub_type = ppc_stub_long_branch_r2off;
7035 }
7036
7037 if (stub_type == ppc_stub_none)
7038 continue;
7039
7040 /* __tls_get_addr calls might be eliminated. */
7041 if (stub_type != ppc_stub_plt_call
7042 && hash != NULL
7043 && &hash->elf == htab->tls_get_addr
7044 && section->has_tls_reloc
7045 && irela != internal_relocs)
7046 {
7047 /* Get tls info. */
7048 char *tls_mask;
7049
7050 if (!get_tls_mask (&tls_mask, NULL, &local_syms,
7051 irela - 1, input_bfd))
7052 goto error_ret_free_internal;
7053 if (*tls_mask != 0)
7054 continue;
7055 }
7056
7057 /* Support for grouping stub sections. */
7058 id_sec = htab->stub_group[section->id].link_sec;
7059
7060 /* Get the name of this stub. */
7061 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
7062 if (!stub_name)
7063 goto error_ret_free_internal;
7064
7065 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
7066 stub_name, FALSE, FALSE);
7067 if (stub_entry != NULL)
7068 {
7069 /* The proper stub has already been created. */
7070 free (stub_name);
7071 continue;
7072 }
7073
7074 stub_entry = ppc_add_stub (stub_name, section, htab);
7075 if (stub_entry == NULL)
7076 {
7077 free (stub_name);
7078 error_ret_free_internal:
7079 if (elf_section_data (section)->relocs == NULL)
7080 free (internal_relocs);
7081 error_ret_free_local:
7082 if (local_syms != NULL
7083 && (symtab_hdr->contents
7084 != (unsigned char *) local_syms))
7085 free (local_syms);
7086 return FALSE;
7087 }
7088
7089 stub_entry->stub_type = stub_type;
7090 stub_entry->target_value = sym_value;
7091 stub_entry->target_section = sym_sec;
7092 stub_entry->h = hash;
7093 stub_entry->addend = irela->r_addend;
7094 stub_changed = TRUE;
7095 }
7096
7097 /* We're done with the internal relocs, free them. */
7098 if (elf_section_data (section)->relocs != internal_relocs)
7099 free (internal_relocs);
7100 }
7101
7102 if (local_syms != NULL
7103 && symtab_hdr->contents != (unsigned char *) local_syms)
7104 {
7105 if (!info->keep_memory)
7106 free (local_syms);
7107 else
7108 symtab_hdr->contents = (unsigned char *) local_syms;
7109 }
7110 }
7111
7112 if (!stub_changed)
7113 break;
7114
7115 /* OK, we've added some stubs. Find out the new size of the
7116 stub sections. */
7117 for (stub_sec = htab->stub_bfd->sections;
7118 stub_sec != NULL;
7119 stub_sec = stub_sec->next)
7120 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
7121 stub_sec->size = 0;
7122
7123 htab->brlt->size = 0;
7124 if (info->shared)
7125 htab->relbrlt->size = 0;
7126
7127 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
7128
7129 /* Ask the linker to do its stuff. */
7130 (*htab->layout_sections_again) ();
7131 }
7132
7133 /* It would be nice to strip .branch_lt from the output if the
7134 section is empty, but it's too late. If we strip sections here,
7135 the dynamic symbol table is corrupted since the section symbol
7136 for the stripped section isn't written. */
7137
7138 return TRUE;
7139 }
7140
7141 /* Called after we have determined section placement. If sections
7142 move, we'll be called again. Provide a value for TOCstart. */
7143
7144 bfd_vma
7145 ppc64_elf_toc (bfd *obfd)
7146 {
7147 asection *s;
7148 bfd_vma TOCstart;
7149
7150 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
7151 order. The TOC starts where the first of these sections starts. */
7152 s = bfd_get_section_by_name (obfd, ".got");
7153 if (s == NULL)
7154 s = bfd_get_section_by_name (obfd, ".toc");
7155 if (s == NULL)
7156 s = bfd_get_section_by_name (obfd, ".tocbss");
7157 if (s == NULL)
7158 s = bfd_get_section_by_name (obfd, ".plt");
7159 if (s == NULL)
7160 {
7161 /* This may happen for
7162 o references to TOC base (SYM@toc / TOC[tc0]) without a
7163 .toc directive
7164 o bad linker script
7165 o --gc-sections and empty TOC sections
7166
7167 FIXME: Warn user? */
7168
7169 /* Look for a likely section. We probably won't even be
7170 using TOCstart. */
7171 for (s = obfd->sections; s != NULL; s = s->next)
7172 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
7173 == (SEC_ALLOC | SEC_SMALL_DATA))
7174 break;
7175 if (s == NULL)
7176 for (s = obfd->sections; s != NULL; s = s->next)
7177 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
7178 == (SEC_ALLOC | SEC_SMALL_DATA))
7179 break;
7180 if (s == NULL)
7181 for (s = obfd->sections; s != NULL; s = s->next)
7182 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
7183 break;
7184 if (s == NULL)
7185 for (s = obfd->sections; s != NULL; s = s->next)
7186 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
7187 break;
7188 }
7189
7190 TOCstart = 0;
7191 if (s != NULL)
7192 TOCstart = s->output_section->vma + s->output_offset;
7193
7194 return TOCstart;
7195 }
7196
7197 /* Build all the stubs associated with the current output file.
7198 The stubs are kept in a hash table attached to the main linker
7199 hash table. This function is called via gldelf64ppc_finish. */
7200
7201 bfd_boolean
7202 ppc64_elf_build_stubs (bfd_boolean emit_stub_syms,
7203 struct bfd_link_info *info,
7204 char **stats)
7205 {
7206 struct ppc_link_hash_table *htab = ppc_hash_table (info);
7207 asection *stub_sec;
7208 bfd_byte *p;
7209 int stub_sec_count = 0;
7210
7211 htab->emit_stub_syms = emit_stub_syms;
7212
7213 /* Allocate memory to hold the linker stubs. */
7214 for (stub_sec = htab->stub_bfd->sections;
7215 stub_sec != NULL;
7216 stub_sec = stub_sec->next)
7217 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
7218 && stub_sec->size != 0)
7219 {
7220 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
7221 if (stub_sec->contents == NULL)
7222 return FALSE;
7223 /* We want to check that built size is the same as calculated
7224 size. rawsize is a convenient location to use. */
7225 stub_sec->rawsize = stub_sec->size;
7226 stub_sec->size = 0;
7227 }
7228
7229 if (htab->plt != NULL)
7230 {
7231 unsigned int indx;
7232 bfd_vma plt0;
7233
7234 /* Build the .glink plt call stub. */
7235 plt0 = (htab->plt->output_section->vma
7236 + htab->plt->output_offset
7237 - (htab->glink->output_section->vma
7238 + htab->glink->output_offset
7239 + GLINK_CALL_STUB_SIZE));
7240 if (plt0 + 0x80008000 > 0xffffffff)
7241 {
7242 (*_bfd_error_handler) (_(".glink and .plt too far apart"));
7243 bfd_set_error (bfd_error_bad_value);
7244 return FALSE;
7245 }
7246
7247 if (htab->emit_stub_syms)
7248 {
7249 struct elf_link_hash_entry *h;
7250 h = elf_link_hash_lookup (&htab->elf, "__glink", TRUE, FALSE, FALSE);
7251 if (h == NULL)
7252 return FALSE;
7253 if (h->root.type == bfd_link_hash_new)
7254 {
7255 h->root.type = bfd_link_hash_defined;
7256 h->root.u.def.section = htab->glink;
7257 h->root.u.def.value = 0;
7258 h->elf_link_hash_flags = (ELF_LINK_HASH_REF_REGULAR
7259 | ELF_LINK_HASH_DEF_REGULAR
7260 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
7261 | ELF_LINK_FORCED_LOCAL);
7262 }
7263 }
7264 p = htab->glink->contents;
7265 bfd_put_32 (htab->glink->owner, MFCTR_R12, p);
7266 p += 4;
7267 bfd_put_32 (htab->glink->owner, SLDI_R11_R0_3, p);
7268 p += 4;
7269 bfd_put_32 (htab->glink->owner, ADDIC_R2_R0_32K, p);
7270 p += 4;
7271 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
7272 p += 4;
7273 bfd_put_32 (htab->glink->owner, SRADI_R2_R2_63, p);
7274 p += 4;
7275 bfd_put_32 (htab->glink->owner, SLDI_R11_R0_2, p);
7276 p += 4;
7277 bfd_put_32 (htab->glink->owner, AND_R2_R2_R11, p);
7278 p += 4;
7279 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
7280 p += 4;
7281 bfd_put_32 (htab->glink->owner, ADD_R12_R12_R2, p);
7282 p += 4;
7283 bfd_put_32 (htab->glink->owner, ADDIS_R12_R12 | PPC_HA (plt0), p);
7284 p += 4;
7285 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | PPC_LO (plt0), p);
7286 p += 4;
7287 bfd_put_32 (htab->glink->owner, ADDI_R12_R12 | PPC_LO (plt0), p);
7288 p += 4;
7289 bfd_put_32 (htab->glink->owner, LD_R2_0R12 | 8, p);
7290 p += 4;
7291 bfd_put_32 (htab->glink->owner, MTCTR_R11, p);
7292 p += 4;
7293 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | 16, p);
7294 p += 4;
7295 bfd_put_32 (htab->glink->owner, BCTR, p);
7296 p += 4;
7297
7298 /* Build the .glink lazy link call stubs. */
7299 indx = 0;
7300 while (p < htab->glink->contents + htab->glink->size)
7301 {
7302 if (indx < 0x8000)
7303 {
7304 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
7305 p += 4;
7306 }
7307 else
7308 {
7309 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
7310 p += 4;
7311 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
7312 p += 4;
7313 }
7314 bfd_put_32 (htab->glink->owner,
7315 B_DOT | ((htab->glink->contents - p) & 0x3fffffc), p);
7316 indx++;
7317 p += 4;
7318 }
7319 htab->glink->rawsize = p - htab->glink->contents;
7320 }
7321
7322 if (htab->brlt->size != 0)
7323 {
7324 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
7325 htab->brlt->size);
7326 if (htab->brlt->contents == NULL)
7327 return FALSE;
7328 }
7329 if (info->shared && htab->relbrlt->size != 0)
7330 {
7331 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
7332 htab->relbrlt->size);
7333 if (htab->relbrlt->contents == NULL)
7334 return FALSE;
7335 }
7336
7337 /* Build the stubs as directed by the stub hash table. */
7338 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
7339
7340 for (stub_sec = htab->stub_bfd->sections;
7341 stub_sec != NULL;
7342 stub_sec = stub_sec->next)
7343 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
7344 {
7345 stub_sec_count += 1;
7346 if (stub_sec->rawsize != stub_sec->size)
7347 break;
7348 }
7349
7350 if (stub_sec != NULL
7351 || htab->glink->rawsize != htab->glink->size)
7352 {
7353 htab->stub_error = TRUE;
7354 (*_bfd_error_handler) (_("stubs don't match calculated size"));
7355 }
7356
7357 if (htab->stub_error)
7358 return FALSE;
7359
7360 if (stats != NULL)
7361 {
7362 *stats = bfd_malloc (500);
7363 if (*stats == NULL)
7364 return FALSE;
7365
7366 sprintf (*stats, _("linker stubs in %u groups\n"
7367 " branch %lu\n"
7368 " toc adjust %lu\n"
7369 " long branch %lu\n"
7370 " long toc adj %lu\n"
7371 " plt call %lu"),
7372 stub_sec_count,
7373 htab->stub_count[ppc_stub_long_branch - 1],
7374 htab->stub_count[ppc_stub_long_branch_r2off - 1],
7375 htab->stub_count[ppc_stub_plt_branch - 1],
7376 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
7377 htab->stub_count[ppc_stub_plt_call - 1]);
7378 }
7379 return TRUE;
7380 }
7381
7382 /* The RELOCATE_SECTION function is called by the ELF backend linker
7383 to handle the relocations for a section.
7384
7385 The relocs are always passed as Rela structures; if the section
7386 actually uses Rel structures, the r_addend field will always be
7387 zero.
7388
7389 This function is responsible for adjust the section contents as
7390 necessary, and (if using Rela relocs and generating a
7391 relocatable output file) adjusting the reloc addend as
7392 necessary.
7393
7394 This function does not have to worry about setting the reloc
7395 address or the reloc symbol index.
7396
7397 LOCAL_SYMS is a pointer to the swapped in local symbols.
7398
7399 LOCAL_SECTIONS is an array giving the section in the input file
7400 corresponding to the st_shndx field of each local symbol.
7401
7402 The global hash table entry for the global symbols can be found
7403 via elf_sym_hashes (input_bfd).
7404
7405 When generating relocatable output, this function must handle
7406 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7407 going to be the section symbol corresponding to the output
7408 section, which means that the addend must be adjusted
7409 accordingly. */
7410
7411 static bfd_boolean
7412 ppc64_elf_relocate_section (bfd *output_bfd,
7413 struct bfd_link_info *info,
7414 bfd *input_bfd,
7415 asection *input_section,
7416 bfd_byte *contents,
7417 Elf_Internal_Rela *relocs,
7418 Elf_Internal_Sym *local_syms,
7419 asection **local_sections)
7420 {
7421 struct ppc_link_hash_table *htab;
7422 Elf_Internal_Shdr *symtab_hdr;
7423 struct elf_link_hash_entry **sym_hashes;
7424 Elf_Internal_Rela *rel;
7425 Elf_Internal_Rela *relend;
7426 Elf_Internal_Rela outrel;
7427 bfd_byte *loc;
7428 struct got_entry **local_got_ents;
7429 bfd_vma TOCstart;
7430 bfd_boolean ret = TRUE;
7431 bfd_boolean is_opd;
7432 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
7433 bfd_boolean is_power4 = FALSE;
7434
7435 if (info->relocatable)
7436 return TRUE;
7437
7438 /* Initialize howto table if needed. */
7439 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
7440 ppc_howto_init ();
7441
7442 htab = ppc_hash_table (info);
7443 local_got_ents = elf_local_got_ents (input_bfd);
7444 TOCstart = elf_gp (output_bfd);
7445 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7446 sym_hashes = elf_sym_hashes (input_bfd);
7447 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
7448
7449 rel = relocs;
7450 relend = relocs + input_section->reloc_count;
7451 for (; rel < relend; rel++)
7452 {
7453 enum elf_ppc64_reloc_type r_type;
7454 bfd_vma addend;
7455 bfd_reloc_status_type r;
7456 Elf_Internal_Sym *sym;
7457 asection *sec;
7458 struct elf_link_hash_entry *h;
7459 struct elf_link_hash_entry *fdh;
7460 const char *sym_name;
7461 unsigned long r_symndx, toc_symndx;
7462 char tls_mask, tls_gd, tls_type;
7463 char sym_type;
7464 bfd_vma relocation;
7465 bfd_boolean unresolved_reloc;
7466 bfd_boolean warned;
7467 unsigned long insn, mask;
7468 struct ppc_stub_hash_entry *stub_entry;
7469 bfd_vma max_br_offset;
7470 bfd_vma from;
7471
7472 r_type = ELF64_R_TYPE (rel->r_info);
7473 r_symndx = ELF64_R_SYM (rel->r_info);
7474
7475 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
7476 symbol of the previous ADDR64 reloc. The symbol gives us the
7477 proper TOC base to use. */
7478 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
7479 && rel != relocs
7480 && ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_ADDR64
7481 && is_opd)
7482 r_symndx = ELF64_R_SYM (rel[-1].r_info);
7483
7484 sym = NULL;
7485 sec = NULL;
7486 h = NULL;
7487 sym_name = NULL;
7488 unresolved_reloc = FALSE;
7489 warned = FALSE;
7490
7491 if (r_symndx < symtab_hdr->sh_info)
7492 {
7493 /* It's a local symbol. */
7494 long *opd_adjust;
7495
7496 sym = local_syms + r_symndx;
7497 sec = local_sections[r_symndx];
7498 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
7499 sym_type = ELF64_ST_TYPE (sym->st_info);
7500 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
7501 opd_adjust = get_opd_info (sec);
7502 if (opd_adjust != NULL)
7503 {
7504 long adjust = opd_adjust[(sym->st_value + rel->r_addend) / 24];
7505 if (adjust == -1)
7506 relocation = 0;
7507 else
7508 relocation += adjust;
7509 }
7510 }
7511 else
7512 {
7513 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7514 r_symndx, symtab_hdr, sym_hashes,
7515 h, sec, relocation,
7516 unresolved_reloc, warned);
7517 sym_name = h->root.root.string;
7518 sym_type = h->type;
7519 }
7520
7521 /* TLS optimizations. Replace instruction sequences and relocs
7522 based on information we collected in tls_optimize. We edit
7523 RELOCS so that --emit-relocs will output something sensible
7524 for the final instruction stream. */
7525 tls_mask = 0;
7526 tls_gd = 0;
7527 toc_symndx = 0;
7528 if (IS_PPC64_TLS_RELOC (r_type))
7529 {
7530 if (h != NULL)
7531 tls_mask = ((struct ppc_link_hash_entry *) h)->tls_mask;
7532 else if (local_got_ents != NULL)
7533 {
7534 char *lgot_masks;
7535 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
7536 tls_mask = lgot_masks[r_symndx];
7537 }
7538 if (tls_mask == 0 && r_type == R_PPC64_TLS)
7539 {
7540 /* Check for toc tls entries. */
7541 char *toc_tls;
7542
7543 if (!get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
7544 rel, input_bfd))
7545 return FALSE;
7546
7547 if (toc_tls)
7548 tls_mask = *toc_tls;
7549 }
7550 }
7551
7552 /* Check that tls relocs are used with tls syms, and non-tls
7553 relocs are used with non-tls syms. */
7554 if (r_symndx != 0
7555 && r_type != R_PPC64_NONE
7556 && (h == NULL
7557 || h->root.type == bfd_link_hash_defined
7558 || h->root.type == bfd_link_hash_defweak)
7559 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
7560 {
7561 if (r_type == R_PPC64_TLS && tls_mask != 0)
7562 /* R_PPC64_TLS is OK against a symbol in the TOC. */
7563 ;
7564 else
7565 (*_bfd_error_handler)
7566 (sym_type == STT_TLS
7567 ? _("%s(%s+0x%lx): %s used with TLS symbol %s")
7568 : _("%s(%s+0x%lx): %s used with non-TLS symbol %s"),
7569 bfd_archive_filename (input_bfd),
7570 input_section->name,
7571 (long) rel->r_offset,
7572 ppc64_elf_howto_table[r_type]->name,
7573 sym_name);
7574 }
7575
7576 /* Ensure reloc mapping code below stays sane. */
7577 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7578 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7579 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7580 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7581 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7582 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7583 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7584 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7585 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7586 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7587 abort ();
7588
7589 switch (r_type)
7590 {
7591 default:
7592 break;
7593
7594 case R_PPC64_TOC16:
7595 case R_PPC64_TOC16_LO:
7596 case R_PPC64_TOC16_DS:
7597 case R_PPC64_TOC16_LO_DS:
7598 {
7599 /* Check for toc tls entries. */
7600 char *toc_tls;
7601 int retval;
7602
7603 retval = get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
7604 rel, input_bfd);
7605 if (retval == 0)
7606 return FALSE;
7607
7608 if (toc_tls)
7609 {
7610 tls_mask = *toc_tls;
7611 if (r_type == R_PPC64_TOC16_DS
7612 || r_type == R_PPC64_TOC16_LO_DS)
7613 {
7614 if (tls_mask != 0
7615 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
7616 goto toctprel;
7617 }
7618 else
7619 {
7620 /* If we found a GD reloc pair, then we might be
7621 doing a GD->IE transition. */
7622 if (retval == 2)
7623 {
7624 tls_gd = TLS_TPRELGD;
7625 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7626 goto tls_get_addr_check;
7627 }
7628 else if (retval == 3)
7629 {
7630 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7631 goto tls_get_addr_check;
7632 }
7633 }
7634 }
7635 }
7636 break;
7637
7638 case R_PPC64_GOT_TPREL16_DS:
7639 case R_PPC64_GOT_TPREL16_LO_DS:
7640 if (tls_mask != 0
7641 && (tls_mask & TLS_TPREL) == 0)
7642 {
7643 toctprel:
7644 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7645 insn &= 31 << 21;
7646 insn |= 0x3c0d0000; /* addis 0,13,0 */
7647 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7648 r_type = R_PPC64_TPREL16_HA;
7649 if (toc_symndx != 0)
7650 {
7651 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
7652 /* We changed the symbol. Start over in order to
7653 get h, sym, sec etc. right. */
7654 rel--;
7655 continue;
7656 }
7657 else
7658 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7659 }
7660 break;
7661
7662 case R_PPC64_TLS:
7663 if (tls_mask != 0
7664 && (tls_mask & TLS_TPREL) == 0)
7665 {
7666 bfd_vma rtra;
7667 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7668 if ((insn & ((0x3f << 26) | (31 << 11)))
7669 == ((31 << 26) | (13 << 11)))
7670 rtra = insn & ((1 << 26) - (1 << 16));
7671 else if ((insn & ((0x3f << 26) | (31 << 16)))
7672 == ((31 << 26) | (13 << 16)))
7673 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7674 else
7675 abort ();
7676 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7677 /* add -> addi. */
7678 insn = 14 << 26;
7679 else if ((insn & (31 << 1)) == 23 << 1
7680 && ((insn & (31 << 6)) < 14 << 6
7681 || ((insn & (31 << 6)) >= 16 << 6
7682 && (insn & (31 << 6)) < 24 << 6)))
7683 /* load and store indexed -> dform. */
7684 insn = (32 | ((insn >> 6) & 31)) << 26;
7685 else if ((insn & (31 << 1)) == 21 << 1
7686 && (insn & (0x1a << 6)) == 0)
7687 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7688 insn = (((58 | ((insn >> 6) & 4)) << 26)
7689 | ((insn >> 6) & 1));
7690 else if ((insn & (31 << 1)) == 21 << 1
7691 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7692 /* lwax -> lwa. */
7693 insn = (58 << 26) | 2;
7694 else
7695 abort ();
7696 insn |= rtra;
7697 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7698 /* Was PPC64_TLS which sits on insn boundary, now
7699 PPC64_TPREL16_LO which is at insn+2. */
7700 rel->r_offset += 2;
7701 r_type = R_PPC64_TPREL16_LO;
7702 if (toc_symndx != 0)
7703 {
7704 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
7705 /* We changed the symbol. Start over in order to
7706 get h, sym, sec etc. right. */
7707 rel--;
7708 continue;
7709 }
7710 else
7711 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7712 }
7713 break;
7714
7715 case R_PPC64_GOT_TLSGD16_HI:
7716 case R_PPC64_GOT_TLSGD16_HA:
7717 tls_gd = TLS_TPRELGD;
7718 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7719 goto tls_gdld_hi;
7720 break;
7721
7722 case R_PPC64_GOT_TLSLD16_HI:
7723 case R_PPC64_GOT_TLSLD16_HA:
7724 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7725 {
7726 tls_gdld_hi:
7727 if ((tls_mask & tls_gd) != 0)
7728 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7729 + R_PPC64_GOT_TPREL16_DS);
7730 else
7731 {
7732 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7733 rel->r_offset -= 2;
7734 r_type = R_PPC64_NONE;
7735 }
7736 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7737 }
7738 break;
7739
7740 case R_PPC64_GOT_TLSGD16:
7741 case R_PPC64_GOT_TLSGD16_LO:
7742 tls_gd = TLS_TPRELGD;
7743 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7744 goto tls_get_addr_check;
7745 break;
7746
7747 case R_PPC64_GOT_TLSLD16:
7748 case R_PPC64_GOT_TLSLD16_LO:
7749 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7750 {
7751 tls_get_addr_check:
7752 if (rel + 1 < relend)
7753 {
7754 enum elf_ppc64_reloc_type r_type2;
7755 unsigned long r_symndx2;
7756 struct elf_link_hash_entry *h2;
7757 bfd_vma insn1, insn2, insn3;
7758 bfd_vma offset;
7759
7760 /* The next instruction should be a call to
7761 __tls_get_addr. Peek at the reloc to be sure. */
7762 r_type2 = ELF64_R_TYPE (rel[1].r_info);
7763 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
7764 if (r_symndx2 < symtab_hdr->sh_info
7765 || (r_type2 != R_PPC64_REL14
7766 && r_type2 != R_PPC64_REL14_BRTAKEN
7767 && r_type2 != R_PPC64_REL14_BRNTAKEN
7768 && r_type2 != R_PPC64_REL24))
7769 break;
7770
7771 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
7772 while (h2->root.type == bfd_link_hash_indirect
7773 || h2->root.type == bfd_link_hash_warning)
7774 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
7775 if (h2 == NULL || h2 != htab->tls_get_addr)
7776 break;
7777
7778 /* OK, it checks out. Replace the call. */
7779 offset = rel[1].r_offset;
7780 insn1 = bfd_get_32 (output_bfd,
7781 contents + rel->r_offset - 2);
7782 insn3 = bfd_get_32 (output_bfd,
7783 contents + offset + 4);
7784 if ((tls_mask & tls_gd) != 0)
7785 {
7786 /* IE */
7787 insn1 &= (1 << 26) - (1 << 2);
7788 insn1 |= 58 << 26; /* ld */
7789 insn2 = 0x7c636a14; /* add 3,3,13 */
7790 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
7791 if ((tls_mask & TLS_EXPLICIT) == 0)
7792 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7793 + R_PPC64_GOT_TPREL16_DS);
7794 else
7795 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7796 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7797 }
7798 else
7799 {
7800 /* LE */
7801 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7802 insn2 = 0x38630000; /* addi 3,3,0 */
7803 if (tls_gd == 0)
7804 {
7805 /* Was an LD reloc. */
7806 r_symndx = 0;
7807 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
7808 rel[1].r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
7809 }
7810 else if (toc_symndx != 0)
7811 r_symndx = toc_symndx;
7812 r_type = R_PPC64_TPREL16_HA;
7813 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7814 rel[1].r_info = ELF64_R_INFO (r_symndx,
7815 R_PPC64_TPREL16_LO);
7816 rel[1].r_offset += 2;
7817 }
7818 if (insn3 == NOP
7819 || insn3 == CROR_151515 || insn3 == CROR_313131)
7820 {
7821 insn3 = insn2;
7822 insn2 = NOP;
7823 rel[1].r_offset += 4;
7824 }
7825 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
7826 bfd_put_32 (output_bfd, insn2, contents + offset);
7827 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7828 if (tls_gd == 0 || toc_symndx != 0)
7829 {
7830 /* We changed the symbol. Start over in order
7831 to get h, sym, sec etc. right. */
7832 rel--;
7833 continue;
7834 }
7835 }
7836 }
7837 break;
7838
7839 case R_PPC64_DTPMOD64:
7840 if (rel + 1 < relend
7841 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
7842 && rel[1].r_offset == rel->r_offset + 8)
7843 {
7844 if ((tls_mask & TLS_GD) == 0)
7845 {
7846 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
7847 if ((tls_mask & TLS_TPRELGD) != 0)
7848 r_type = R_PPC64_TPREL64;
7849 else
7850 {
7851 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
7852 r_type = R_PPC64_NONE;
7853 }
7854 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7855 }
7856 }
7857 else
7858 {
7859 if ((tls_mask & TLS_LD) == 0)
7860 {
7861 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
7862 r_type = R_PPC64_NONE;
7863 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7864 }
7865 }
7866 break;
7867
7868 case R_PPC64_TPREL64:
7869 if ((tls_mask & TLS_TPREL) == 0)
7870 {
7871 r_type = R_PPC64_NONE;
7872 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7873 }
7874 break;
7875 }
7876
7877 /* Handle other relocations that tweak non-addend part of insn. */
7878 insn = 0;
7879 max_br_offset = 1 << 25;
7880 addend = rel->r_addend;
7881 switch (r_type)
7882 {
7883 default:
7884 break;
7885
7886 /* Branch taken prediction relocations. */
7887 case R_PPC64_ADDR14_BRTAKEN:
7888 case R_PPC64_REL14_BRTAKEN:
7889 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7890 /* Fall thru. */
7891
7892 /* Branch not taken prediction relocations. */
7893 case R_PPC64_ADDR14_BRNTAKEN:
7894 case R_PPC64_REL14_BRNTAKEN:
7895 insn |= bfd_get_32 (output_bfd,
7896 contents + rel->r_offset) & ~(0x01 << 21);
7897 /* Fall thru. */
7898
7899 case R_PPC64_REL14:
7900 max_br_offset = 1 << 15;
7901 /* Fall thru. */
7902
7903 case R_PPC64_REL24:
7904 /* Calls to functions with a different TOC, such as calls to
7905 shared objects, need to alter the TOC pointer. This is
7906 done using a linkage stub. A REL24 branching to these
7907 linkage stubs needs to be followed by a nop, as the nop
7908 will be replaced with an instruction to restore the TOC
7909 base pointer. */
7910 stub_entry = NULL;
7911 if (((h != NULL
7912 && (fdh = &((struct ppc_link_hash_entry *) h)->oh->elf) != NULL
7913 && fdh->plt.plist != NULL)
7914 || ((fdh = h, sec) != NULL
7915 && sec->output_section != NULL
7916 && sec->id <= htab->top_id
7917 && (htab->stub_group[sec->id].toc_off
7918 != htab->stub_group[input_section->id].toc_off)))
7919 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7920 rel, htab)) != NULL
7921 && (stub_entry->stub_type == ppc_stub_plt_call
7922 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
7923 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
7924 {
7925 bfd_boolean can_plt_call = FALSE;
7926
7927 if (rel->r_offset + 8 <= input_section->size)
7928 {
7929 unsigned long nop;
7930 nop = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
7931 if (nop == NOP
7932 || nop == CROR_151515 || nop == CROR_313131)
7933 {
7934 bfd_put_32 (input_bfd, LD_R2_40R1,
7935 contents + rel->r_offset + 4);
7936 can_plt_call = TRUE;
7937 }
7938 }
7939
7940 if (!can_plt_call)
7941 {
7942 if (stub_entry->stub_type == ppc_stub_plt_call)
7943 {
7944 /* If this is a plain branch rather than a branch
7945 and link, don't require a nop. */
7946 unsigned long br;
7947 br = bfd_get_32 (input_bfd, contents + rel->r_offset);
7948 if ((br & 1) == 0)
7949 can_plt_call = TRUE;
7950 }
7951 else if (h != NULL
7952 && strcmp (h->root.root.string,
7953 ".__libc_start_main") == 0)
7954 {
7955 /* Allow crt1 branch to go via a toc adjusting stub. */
7956 can_plt_call = TRUE;
7957 }
7958 else
7959 {
7960 if (strcmp (input_section->output_section->name,
7961 ".init") == 0
7962 || strcmp (input_section->output_section->name,
7963 ".fini") == 0)
7964 (*_bfd_error_handler)
7965 (_("%s(%s+0x%lx): automatic multiple TOCs "
7966 "not supported using your crt files; "
7967 "recompile with -mminimal-toc or upgrade gcc"),
7968 bfd_archive_filename (input_bfd),
7969 input_section->name,
7970 (long) rel->r_offset);
7971 else
7972 (*_bfd_error_handler)
7973 (_("%s(%s+0x%lx): sibling call optimization to `%s' "
7974 "does not allow automatic multiple TOCs; "
7975 "recompile with -mminimal-toc or "
7976 "-fno-optimize-sibling-calls, "
7977 "or make `%s' extern"),
7978 bfd_archive_filename (input_bfd),
7979 input_section->name,
7980 (long) rel->r_offset,
7981 sym_name,
7982 sym_name);
7983 bfd_set_error (bfd_error_bad_value);
7984 ret = FALSE;
7985 }
7986 }
7987
7988 if (can_plt_call
7989 && stub_entry->stub_type == ppc_stub_plt_call)
7990 unresolved_reloc = FALSE;
7991 }
7992
7993 /* If the branch is out of reach we ought to have a long
7994 branch stub. */
7995 from = (rel->r_offset
7996 + input_section->output_offset
7997 + input_section->output_section->vma);
7998
7999 if (stub_entry == NULL
8000 && (relocation + rel->r_addend - from + max_br_offset
8001 >= 2 * max_br_offset)
8002 && r_type != R_PPC64_ADDR14_BRTAKEN
8003 && r_type != R_PPC64_ADDR14_BRNTAKEN)
8004 stub_entry = ppc_get_stub_entry (input_section, sec, h, rel, htab);
8005
8006 if (stub_entry != NULL)
8007 {
8008 /* Munge up the value and addend so that we call the stub
8009 rather than the procedure directly. */
8010 relocation = (stub_entry->stub_offset
8011 + stub_entry->stub_sec->output_offset
8012 + stub_entry->stub_sec->output_section->vma);
8013 addend = 0;
8014 }
8015
8016 if (insn != 0)
8017 {
8018 if (is_power4)
8019 {
8020 /* Set 'a' bit. This is 0b00010 in BO field for branch
8021 on CR(BI) insns (BO == 001at or 011at), and 0b01000
8022 for branch on CTR insns (BO == 1a00t or 1a01t). */
8023 if ((insn & (0x14 << 21)) == (0x04 << 21))
8024 insn |= 0x02 << 21;
8025 else if ((insn & (0x14 << 21)) == (0x10 << 21))
8026 insn |= 0x08 << 21;
8027 else
8028 break;
8029 }
8030 else
8031 {
8032 /* Invert 'y' bit if not the default. */
8033 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8034 insn ^= 0x01 << 21;
8035 }
8036
8037 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
8038 }
8039
8040 /* NOP out calls to undefined weak functions.
8041 We can thus call a weak function without first
8042 checking whether the function is defined. */
8043 else if (h != NULL
8044 && h->root.type == bfd_link_hash_undefweak
8045 && r_type == R_PPC64_REL24
8046 && relocation == 0
8047 && rel->r_addend == 0)
8048 {
8049 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
8050 continue;
8051 }
8052 break;
8053 }
8054
8055 /* Set `addend'. */
8056 tls_type = 0;
8057 switch (r_type)
8058 {
8059 default:
8060 (*_bfd_error_handler)
8061 (_("%s: unknown relocation type %d for symbol %s"),
8062 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
8063
8064 bfd_set_error (bfd_error_bad_value);
8065 ret = FALSE;
8066 continue;
8067
8068 case R_PPC64_NONE:
8069 case R_PPC64_TLS:
8070 case R_PPC64_GNU_VTINHERIT:
8071 case R_PPC64_GNU_VTENTRY:
8072 continue;
8073
8074 /* GOT16 relocations. Like an ADDR16 using the symbol's
8075 address in the GOT as relocation value instead of the
8076 symbol's value itself. Also, create a GOT entry for the
8077 symbol and put the symbol value there. */
8078 case R_PPC64_GOT_TLSGD16:
8079 case R_PPC64_GOT_TLSGD16_LO:
8080 case R_PPC64_GOT_TLSGD16_HI:
8081 case R_PPC64_GOT_TLSGD16_HA:
8082 tls_type = TLS_TLS | TLS_GD;
8083 goto dogot;
8084
8085 case R_PPC64_GOT_TLSLD16:
8086 case R_PPC64_GOT_TLSLD16_LO:
8087 case R_PPC64_GOT_TLSLD16_HI:
8088 case R_PPC64_GOT_TLSLD16_HA:
8089 tls_type = TLS_TLS | TLS_LD;
8090 goto dogot;
8091
8092 case R_PPC64_GOT_TPREL16_DS:
8093 case R_PPC64_GOT_TPREL16_LO_DS:
8094 case R_PPC64_GOT_TPREL16_HI:
8095 case R_PPC64_GOT_TPREL16_HA:
8096 tls_type = TLS_TLS | TLS_TPREL;
8097 goto dogot;
8098
8099 case R_PPC64_GOT_DTPREL16_DS:
8100 case R_PPC64_GOT_DTPREL16_LO_DS:
8101 case R_PPC64_GOT_DTPREL16_HI:
8102 case R_PPC64_GOT_DTPREL16_HA:
8103 tls_type = TLS_TLS | TLS_DTPREL;
8104 goto dogot;
8105
8106 case R_PPC64_GOT16:
8107 case R_PPC64_GOT16_LO:
8108 case R_PPC64_GOT16_HI:
8109 case R_PPC64_GOT16_HA:
8110 case R_PPC64_GOT16_DS:
8111 case R_PPC64_GOT16_LO_DS:
8112 dogot:
8113 {
8114 /* Relocation is to the entry for this symbol in the global
8115 offset table. */
8116 asection *got;
8117 bfd_vma *offp;
8118 bfd_vma off;
8119 unsigned long indx = 0;
8120
8121 if (tls_type == (TLS_TLS | TLS_LD)
8122 && (h == NULL
8123 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
8124 offp = &ppc64_tlsld_got (input_bfd)->offset;
8125 else
8126 {
8127 struct got_entry *ent;
8128
8129 if (h != NULL)
8130 {
8131 bfd_boolean dyn = htab->elf.dynamic_sections_created;
8132 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
8133 || (info->shared
8134 && SYMBOL_REFERENCES_LOCAL (info, h)))
8135 /* This is actually a static link, or it is a
8136 -Bsymbolic link and the symbol is defined
8137 locally, or the symbol was forced to be local
8138 because of a version file. */
8139 ;
8140 else
8141 {
8142 indx = h->dynindx;
8143 unresolved_reloc = FALSE;
8144 }
8145 ent = h->got.glist;
8146 }
8147 else
8148 {
8149 if (local_got_ents == NULL)
8150 abort ();
8151 ent = local_got_ents[r_symndx];
8152 }
8153
8154 for (; ent != NULL; ent = ent->next)
8155 if (ent->addend == rel->r_addend
8156 && ent->owner == input_bfd
8157 && ent->tls_type == tls_type)
8158 break;
8159 if (ent == NULL)
8160 abort ();
8161 offp = &ent->got.offset;
8162 }
8163
8164 got = ppc64_elf_tdata (input_bfd)->got;
8165 if (got == NULL)
8166 abort ();
8167
8168 /* The offset must always be a multiple of 8. We use the
8169 least significant bit to record whether we have already
8170 processed this entry. */
8171 off = *offp;
8172 if ((off & 1) != 0)
8173 off &= ~1;
8174 else
8175 {
8176 /* Generate relocs for the dynamic linker, except in
8177 the case of TLSLD where we'll use one entry per
8178 module. */
8179 asection *relgot = ppc64_elf_tdata (input_bfd)->relgot;
8180
8181 *offp = off | 1;
8182 if ((info->shared || indx != 0)
8183 && (h == NULL
8184 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
8185 || h->root.type != bfd_link_hash_undefweak))
8186 {
8187 outrel.r_offset = (got->output_section->vma
8188 + got->output_offset
8189 + off);
8190 outrel.r_addend = rel->r_addend;
8191 if (tls_type & (TLS_LD | TLS_GD))
8192 {
8193 outrel.r_addend = 0;
8194 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
8195 if (tls_type == (TLS_TLS | TLS_GD))
8196 {
8197 loc = relgot->contents;
8198 loc += (relgot->reloc_count++
8199 * sizeof (Elf64_External_Rela));
8200 bfd_elf64_swap_reloca_out (output_bfd,
8201 &outrel, loc);
8202 outrel.r_offset += 8;
8203 outrel.r_addend = rel->r_addend;
8204 outrel.r_info
8205 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
8206 }
8207 }
8208 else if (tls_type == (TLS_TLS | TLS_DTPREL))
8209 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
8210 else if (tls_type == (TLS_TLS | TLS_TPREL))
8211 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
8212 else if (indx == 0)
8213 {
8214 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
8215
8216 /* Write the .got section contents for the sake
8217 of prelink. */
8218 loc = got->contents + off;
8219 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
8220 loc);
8221 }
8222 else
8223 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
8224
8225 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
8226 {
8227 outrel.r_addend += relocation;
8228 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
8229 outrel.r_addend -= htab->elf.tls_sec->vma;
8230 }
8231 loc = relgot->contents;
8232 loc += (relgot->reloc_count++
8233 * sizeof (Elf64_External_Rela));
8234 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
8235 }
8236
8237 /* Init the .got section contents here if we're not
8238 emitting a reloc. */
8239 else
8240 {
8241 relocation += rel->r_addend;
8242 if (tls_type == (TLS_TLS | TLS_LD))
8243 relocation = 1;
8244 else if (tls_type != 0)
8245 {
8246 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
8247 if (tls_type == (TLS_TLS | TLS_TPREL))
8248 relocation += DTP_OFFSET - TP_OFFSET;
8249
8250 if (tls_type == (TLS_TLS | TLS_GD))
8251 {
8252 bfd_put_64 (output_bfd, relocation,
8253 got->contents + off + 8);
8254 relocation = 1;
8255 }
8256 }
8257
8258 bfd_put_64 (output_bfd, relocation,
8259 got->contents + off);
8260 }
8261 }
8262
8263 if (off >= (bfd_vma) -2)
8264 abort ();
8265
8266 relocation = got->output_offset + off;
8267
8268 /* TOC base (r2) is TOC start plus 0x8000. */
8269 addend = -TOC_BASE_OFF;
8270 }
8271 break;
8272
8273 case R_PPC64_PLT16_HA:
8274 case R_PPC64_PLT16_HI:
8275 case R_PPC64_PLT16_LO:
8276 case R_PPC64_PLT32:
8277 case R_PPC64_PLT64:
8278 /* Relocation is to the entry for this symbol in the
8279 procedure linkage table. */
8280
8281 /* Resolve a PLT reloc against a local symbol directly,
8282 without using the procedure linkage table. */
8283 if (h == NULL)
8284 break;
8285
8286 /* It's possible that we didn't make a PLT entry for this
8287 symbol. This happens when statically linking PIC code,
8288 or when using -Bsymbolic. Go find a match if there is a
8289 PLT entry. */
8290 if (htab->plt != NULL)
8291 {
8292 struct plt_entry *ent;
8293 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8294 if (ent->addend == rel->r_addend
8295 && ent->plt.offset != (bfd_vma) -1)
8296 {
8297 relocation = (htab->plt->output_section->vma
8298 + htab->plt->output_offset
8299 + ent->plt.offset);
8300 unresolved_reloc = FALSE;
8301 }
8302 }
8303 break;
8304
8305 case R_PPC64_TOC:
8306 /* Relocation value is TOC base. */
8307 relocation = TOCstart;
8308 if (r_symndx == 0)
8309 relocation += htab->stub_group[input_section->id].toc_off;
8310 else if (unresolved_reloc)
8311 ;
8312 else if (sec != NULL && sec->id <= htab->top_id)
8313 relocation += htab->stub_group[sec->id].toc_off;
8314 else
8315 unresolved_reloc = TRUE;
8316 goto dodyn2;
8317
8318 /* TOC16 relocs. We want the offset relative to the TOC base,
8319 which is the address of the start of the TOC plus 0x8000.
8320 The TOC consists of sections .got, .toc, .tocbss, and .plt,
8321 in this order. */
8322 case R_PPC64_TOC16:
8323 case R_PPC64_TOC16_LO:
8324 case R_PPC64_TOC16_HI:
8325 case R_PPC64_TOC16_DS:
8326 case R_PPC64_TOC16_LO_DS:
8327 case R_PPC64_TOC16_HA:
8328 addend -= TOCstart + htab->stub_group[input_section->id].toc_off;
8329 break;
8330
8331 /* Relocate against the beginning of the section. */
8332 case R_PPC64_SECTOFF:
8333 case R_PPC64_SECTOFF_LO:
8334 case R_PPC64_SECTOFF_HI:
8335 case R_PPC64_SECTOFF_DS:
8336 case R_PPC64_SECTOFF_LO_DS:
8337 case R_PPC64_SECTOFF_HA:
8338 if (sec != NULL)
8339 addend -= sec->output_section->vma;
8340 break;
8341
8342 case R_PPC64_REL14:
8343 case R_PPC64_REL14_BRNTAKEN:
8344 case R_PPC64_REL14_BRTAKEN:
8345 case R_PPC64_REL24:
8346 break;
8347
8348 case R_PPC64_TPREL16:
8349 case R_PPC64_TPREL16_LO:
8350 case R_PPC64_TPREL16_HI:
8351 case R_PPC64_TPREL16_HA:
8352 case R_PPC64_TPREL16_DS:
8353 case R_PPC64_TPREL16_LO_DS:
8354 case R_PPC64_TPREL16_HIGHER:
8355 case R_PPC64_TPREL16_HIGHERA:
8356 case R_PPC64_TPREL16_HIGHEST:
8357 case R_PPC64_TPREL16_HIGHESTA:
8358 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8359 if (info->shared)
8360 /* The TPREL16 relocs shouldn't really be used in shared
8361 libs as they will result in DT_TEXTREL being set, but
8362 support them anyway. */
8363 goto dodyn;
8364 break;
8365
8366 case R_PPC64_DTPREL16:
8367 case R_PPC64_DTPREL16_LO:
8368 case R_PPC64_DTPREL16_HI:
8369 case R_PPC64_DTPREL16_HA:
8370 case R_PPC64_DTPREL16_DS:
8371 case R_PPC64_DTPREL16_LO_DS:
8372 case R_PPC64_DTPREL16_HIGHER:
8373 case R_PPC64_DTPREL16_HIGHERA:
8374 case R_PPC64_DTPREL16_HIGHEST:
8375 case R_PPC64_DTPREL16_HIGHESTA:
8376 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8377 break;
8378
8379 case R_PPC64_DTPMOD64:
8380 relocation = 1;
8381 addend = 0;
8382 goto dodyn;
8383
8384 case R_PPC64_TPREL64:
8385 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8386 goto dodyn;
8387
8388 case R_PPC64_DTPREL64:
8389 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8390 /* Fall thru */
8391
8392 /* Relocations that may need to be propagated if this is a
8393 dynamic object. */
8394 case R_PPC64_REL30:
8395 case R_PPC64_REL32:
8396 case R_PPC64_REL64:
8397 case R_PPC64_ADDR14:
8398 case R_PPC64_ADDR14_BRNTAKEN:
8399 case R_PPC64_ADDR14_BRTAKEN:
8400 case R_PPC64_ADDR16:
8401 case R_PPC64_ADDR16_DS:
8402 case R_PPC64_ADDR16_HA:
8403 case R_PPC64_ADDR16_HI:
8404 case R_PPC64_ADDR16_HIGHER:
8405 case R_PPC64_ADDR16_HIGHERA:
8406 case R_PPC64_ADDR16_HIGHEST:
8407 case R_PPC64_ADDR16_HIGHESTA:
8408 case R_PPC64_ADDR16_LO:
8409 case R_PPC64_ADDR16_LO_DS:
8410 case R_PPC64_ADDR24:
8411 case R_PPC64_ADDR32:
8412 case R_PPC64_ADDR64:
8413 case R_PPC64_UADDR16:
8414 case R_PPC64_UADDR32:
8415 case R_PPC64_UADDR64:
8416 /* r_symndx will be zero only for relocs against symbols
8417 from removed linkonce sections, or sections discarded by
8418 a linker script. */
8419 dodyn:
8420 if (r_symndx == 0)
8421 break;
8422 /* Fall thru. */
8423
8424 dodyn2:
8425 if ((input_section->flags & SEC_ALLOC) == 0)
8426 break;
8427
8428 if (NO_OPD_RELOCS && is_opd)
8429 break;
8430
8431 if ((info->shared
8432 && (h == NULL
8433 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
8434 || h->root.type != bfd_link_hash_undefweak)
8435 && (MUST_BE_DYN_RELOC (r_type)
8436 || !SYMBOL_CALLS_LOCAL (info, h)))
8437 || (ELIMINATE_COPY_RELOCS
8438 && !info->shared
8439 && h != NULL
8440 && h->dynindx != -1
8441 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
8442 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
8443 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
8444 {
8445 Elf_Internal_Rela outrel;
8446 bfd_boolean skip, relocate;
8447 asection *sreloc;
8448 bfd_byte *loc;
8449 bfd_vma out_off;
8450
8451 /* When generating a dynamic object, these relocations
8452 are copied into the output file to be resolved at run
8453 time. */
8454
8455 skip = FALSE;
8456 relocate = FALSE;
8457
8458 out_off = _bfd_elf_section_offset (output_bfd, info,
8459 input_section, rel->r_offset);
8460 if (out_off == (bfd_vma) -1)
8461 skip = TRUE;
8462 else if (out_off == (bfd_vma) -2)
8463 skip = TRUE, relocate = TRUE;
8464 out_off += (input_section->output_section->vma
8465 + input_section->output_offset);
8466 outrel.r_offset = out_off;
8467 outrel.r_addend = rel->r_addend;
8468
8469 /* Optimize unaligned reloc use. */
8470 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
8471 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
8472 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
8473 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
8474 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
8475 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
8476 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
8477 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
8478 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
8479
8480 if (skip)
8481 memset (&outrel, 0, sizeof outrel);
8482 else if (!SYMBOL_REFERENCES_LOCAL (info, h)
8483 && !is_opd
8484 && r_type != R_PPC64_TOC)
8485 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
8486 else
8487 {
8488 /* This symbol is local, or marked to become local,
8489 or this is an opd section reloc which must point
8490 at a local function. */
8491 outrel.r_addend += relocation;
8492 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
8493 {
8494 if (is_opd && h != NULL)
8495 {
8496 /* Lie about opd entries. This case occurs
8497 when building shared libraries and we
8498 reference a function in another shared
8499 lib. The same thing happens for a weak
8500 definition in an application that's
8501 overridden by a strong definition in a
8502 shared lib. (I believe this is a generic
8503 bug in binutils handling of weak syms.)
8504 In these cases we won't use the opd
8505 entry in this lib. */
8506 unresolved_reloc = FALSE;
8507 }
8508 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8509
8510 /* We need to relocate .opd contents for ld.so.
8511 Prelink also wants simple and consistent rules
8512 for relocs. This make all RELATIVE relocs have
8513 *r_offset equal to r_addend. */
8514 relocate = TRUE;
8515 }
8516 else
8517 {
8518 long indx = 0;
8519
8520 if (bfd_is_abs_section (sec))
8521 ;
8522 else if (sec == NULL || sec->owner == NULL)
8523 {
8524 bfd_set_error (bfd_error_bad_value);
8525 return FALSE;
8526 }
8527 else
8528 {
8529 asection *osec;
8530
8531 osec = sec->output_section;
8532 indx = elf_section_data (osec)->dynindx;
8533
8534 /* We are turning this relocation into one
8535 against a section symbol, so subtract out
8536 the output section's address but not the
8537 offset of the input section in the output
8538 section. */
8539 outrel.r_addend -= osec->vma;
8540 }
8541
8542 outrel.r_info = ELF64_R_INFO (indx, r_type);
8543 }
8544 }
8545
8546 sreloc = elf_section_data (input_section)->sreloc;
8547 if (sreloc == NULL)
8548 abort ();
8549
8550 loc = sreloc->contents;
8551 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
8552 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
8553
8554 /* If this reloc is against an external symbol, it will
8555 be computed at runtime, so there's no need to do
8556 anything now. However, for the sake of prelink ensure
8557 that the section contents are a known value. */
8558 if (! relocate)
8559 {
8560 unresolved_reloc = FALSE;
8561 /* The value chosen here is quite arbitrary as ld.so
8562 ignores section contents except for the special
8563 case of .opd where the contents might be accessed
8564 before relocation. Choose zero, as that won't
8565 cause reloc overflow. */
8566 relocation = 0;
8567 addend = 0;
8568 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
8569 to improve backward compatibility with older
8570 versions of ld. */
8571 if (r_type == R_PPC64_ADDR64)
8572 addend = outrel.r_addend;
8573 /* Adjust pc_relative relocs to have zero in *r_offset. */
8574 else if (ppc64_elf_howto_table[r_type]->pc_relative)
8575 addend = (input_section->output_section->vma
8576 + input_section->output_offset
8577 + rel->r_offset);
8578 }
8579 }
8580 break;
8581
8582 case R_PPC64_COPY:
8583 case R_PPC64_GLOB_DAT:
8584 case R_PPC64_JMP_SLOT:
8585 case R_PPC64_RELATIVE:
8586 /* We shouldn't ever see these dynamic relocs in relocatable
8587 files. */
8588 /* Fall through. */
8589
8590 case R_PPC64_PLTGOT16:
8591 case R_PPC64_PLTGOT16_DS:
8592 case R_PPC64_PLTGOT16_HA:
8593 case R_PPC64_PLTGOT16_HI:
8594 case R_PPC64_PLTGOT16_LO:
8595 case R_PPC64_PLTGOT16_LO_DS:
8596 case R_PPC64_PLTREL32:
8597 case R_PPC64_PLTREL64:
8598 /* These ones haven't been implemented yet. */
8599
8600 (*_bfd_error_handler)
8601 (_("%s: relocation %s is not supported for symbol %s."),
8602 bfd_archive_filename (input_bfd),
8603 ppc64_elf_howto_table[r_type]->name, sym_name);
8604
8605 bfd_set_error (bfd_error_invalid_operation);
8606 ret = FALSE;
8607 continue;
8608 }
8609
8610 /* Do any further special processing. */
8611 switch (r_type)
8612 {
8613 default:
8614 break;
8615
8616 case R_PPC64_ADDR16_HA:
8617 case R_PPC64_ADDR16_HIGHERA:
8618 case R_PPC64_ADDR16_HIGHESTA:
8619 case R_PPC64_GOT16_HA:
8620 case R_PPC64_PLTGOT16_HA:
8621 case R_PPC64_PLT16_HA:
8622 case R_PPC64_TOC16_HA:
8623 case R_PPC64_SECTOFF_HA:
8624 case R_PPC64_TPREL16_HA:
8625 case R_PPC64_DTPREL16_HA:
8626 case R_PPC64_GOT_TLSGD16_HA:
8627 case R_PPC64_GOT_TLSLD16_HA:
8628 case R_PPC64_GOT_TPREL16_HA:
8629 case R_PPC64_GOT_DTPREL16_HA:
8630 case R_PPC64_TPREL16_HIGHER:
8631 case R_PPC64_TPREL16_HIGHERA:
8632 case R_PPC64_TPREL16_HIGHEST:
8633 case R_PPC64_TPREL16_HIGHESTA:
8634 case R_PPC64_DTPREL16_HIGHER:
8635 case R_PPC64_DTPREL16_HIGHERA:
8636 case R_PPC64_DTPREL16_HIGHEST:
8637 case R_PPC64_DTPREL16_HIGHESTA:
8638 /* It's just possible that this symbol is a weak symbol
8639 that's not actually defined anywhere. In that case,
8640 'sec' would be NULL, and we should leave the symbol
8641 alone (it will be set to zero elsewhere in the link). */
8642 if (sec != NULL)
8643 /* Add 0x10000 if sign bit in 0:15 is set.
8644 Bits 0:15 are not used. */
8645 addend += 0x8000;
8646 break;
8647
8648 case R_PPC64_ADDR16_DS:
8649 case R_PPC64_ADDR16_LO_DS:
8650 case R_PPC64_GOT16_DS:
8651 case R_PPC64_GOT16_LO_DS:
8652 case R_PPC64_PLT16_LO_DS:
8653 case R_PPC64_SECTOFF_DS:
8654 case R_PPC64_SECTOFF_LO_DS:
8655 case R_PPC64_TOC16_DS:
8656 case R_PPC64_TOC16_LO_DS:
8657 case R_PPC64_PLTGOT16_DS:
8658 case R_PPC64_PLTGOT16_LO_DS:
8659 case R_PPC64_GOT_TPREL16_DS:
8660 case R_PPC64_GOT_TPREL16_LO_DS:
8661 case R_PPC64_GOT_DTPREL16_DS:
8662 case R_PPC64_GOT_DTPREL16_LO_DS:
8663 case R_PPC64_TPREL16_DS:
8664 case R_PPC64_TPREL16_LO_DS:
8665 case R_PPC64_DTPREL16_DS:
8666 case R_PPC64_DTPREL16_LO_DS:
8667 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
8668 mask = 3;
8669 /* If this reloc is against an lq insn, then the value must be
8670 a multiple of 16. This is somewhat of a hack, but the
8671 "correct" way to do this by defining _DQ forms of all the
8672 _DS relocs bloats all reloc switches in this file. It
8673 doesn't seem to make much sense to use any of these relocs
8674 in data, so testing the insn should be safe. */
8675 if ((insn & (0x3f << 26)) == (56u << 26))
8676 mask = 15;
8677 if (((relocation + addend) & mask) != 0)
8678 {
8679 (*_bfd_error_handler)
8680 (_("%s: error: relocation %s not a multiple of %d"),
8681 bfd_archive_filename (input_bfd),
8682 ppc64_elf_howto_table[r_type]->name,
8683 mask + 1);
8684 bfd_set_error (bfd_error_bad_value);
8685 ret = FALSE;
8686 continue;
8687 }
8688 break;
8689 }
8690
8691 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
8692 because such sections are not SEC_ALLOC and thus ld.so will
8693 not process them. */
8694 if (unresolved_reloc
8695 && !((input_section->flags & SEC_DEBUGGING) != 0
8696 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
8697 {
8698 (*_bfd_error_handler)
8699 (_("%s(%s+0x%lx): unresolvable %s relocation against symbol `%s'"),
8700 bfd_archive_filename (input_bfd),
8701 bfd_get_section_name (input_bfd, input_section),
8702 (long) rel->r_offset,
8703 ppc64_elf_howto_table[(int) r_type]->name,
8704 h->root.root.string);
8705 ret = FALSE;
8706 }
8707
8708 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
8709 input_bfd,
8710 input_section,
8711 contents,
8712 rel->r_offset,
8713 relocation,
8714 addend);
8715
8716 if (r != bfd_reloc_ok)
8717 {
8718 if (sym_name == NULL)
8719 sym_name = "(null)";
8720 if (r == bfd_reloc_overflow)
8721 {
8722 if (warned)
8723 continue;
8724 if (h != NULL
8725 && h->root.type == bfd_link_hash_undefweak
8726 && ppc64_elf_howto_table[r_type]->pc_relative)
8727 {
8728 /* Assume this is a call protected by other code that
8729 detects the symbol is undefined. If this is the case,
8730 we can safely ignore the overflow. If not, the
8731 program is hosed anyway, and a little warning isn't
8732 going to help. */
8733
8734 continue;
8735 }
8736
8737 if (!((*info->callbacks->reloc_overflow)
8738 (info, sym_name, ppc64_elf_howto_table[r_type]->name,
8739 rel->r_addend, input_bfd, input_section, rel->r_offset)))
8740 return FALSE;
8741 }
8742 else
8743 {
8744 (*_bfd_error_handler)
8745 (_("%s(%s+0x%lx): %s reloc against `%s': error %d"),
8746 bfd_archive_filename (input_bfd),
8747 bfd_get_section_name (input_bfd, input_section),
8748 (long) rel->r_offset,
8749 ppc64_elf_howto_table[r_type]->name,
8750 sym_name,
8751 (int) r);
8752 ret = FALSE;
8753 }
8754 }
8755 }
8756
8757 return ret;
8758 }
8759
8760 /* Adjust the value of any local symbols in opd sections. */
8761
8762 static bfd_boolean
8763 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
8764 const char *name ATTRIBUTE_UNUSED,
8765 Elf_Internal_Sym *elfsym,
8766 asection *input_sec,
8767 struct elf_link_hash_entry *h)
8768 {
8769 long *opd_adjust, adjust;
8770 bfd_vma value;
8771
8772 if (h != NULL)
8773 return TRUE;
8774
8775 opd_adjust = get_opd_info (input_sec);
8776 if (opd_adjust == NULL)
8777 return TRUE;
8778
8779 value = elfsym->st_value - input_sec->output_offset;
8780 if (!info->relocatable)
8781 value -= input_sec->output_section->vma;
8782
8783 adjust = opd_adjust[value / 24];
8784 if (adjust == -1)
8785 elfsym->st_value = 0;
8786 else
8787 elfsym->st_value += adjust;
8788 return TRUE;
8789 }
8790
8791 /* Finish up dynamic symbol handling. We set the contents of various
8792 dynamic sections here. */
8793
8794 static bfd_boolean
8795 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
8796 struct bfd_link_info *info,
8797 struct elf_link_hash_entry *h,
8798 Elf_Internal_Sym *sym)
8799 {
8800 struct ppc_link_hash_table *htab;
8801 bfd *dynobj;
8802
8803 htab = ppc_hash_table (info);
8804 dynobj = htab->elf.dynobj;
8805
8806 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
8807 {
8808 struct plt_entry *ent;
8809 Elf_Internal_Rela rela;
8810 bfd_byte *loc;
8811
8812 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8813 if (ent->plt.offset != (bfd_vma) -1)
8814 {
8815 /* This symbol has an entry in the procedure linkage
8816 table. Set it up. */
8817
8818 if (htab->plt == NULL
8819 || htab->relplt == NULL
8820 || htab->glink == NULL)
8821 abort ();
8822
8823 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8824 fill in the PLT entry. */
8825 rela.r_offset = (htab->plt->output_section->vma
8826 + htab->plt->output_offset
8827 + ent->plt.offset);
8828 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8829 rela.r_addend = ent->addend;
8830
8831 loc = htab->relplt->contents;
8832 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8833 * sizeof (Elf64_External_Rela));
8834 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8835 }
8836 }
8837
8838 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8839 {
8840 Elf_Internal_Rela rela;
8841 bfd_byte *loc;
8842
8843 /* This symbol needs a copy reloc. Set it up. */
8844
8845 if (h->dynindx == -1
8846 || (h->root.type != bfd_link_hash_defined
8847 && h->root.type != bfd_link_hash_defweak)
8848 || htab->relbss == NULL)
8849 abort ();
8850
8851 rela.r_offset = (h->root.u.def.value
8852 + h->root.u.def.section->output_section->vma
8853 + h->root.u.def.section->output_offset);
8854 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8855 rela.r_addend = 0;
8856 loc = htab->relbss->contents;
8857 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
8858 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8859 }
8860
8861 /* Mark some specially defined symbols as absolute. */
8862 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8863 sym->st_shndx = SHN_ABS;
8864
8865 return TRUE;
8866 }
8867
8868 /* Used to decide how to sort relocs in an optimal manner for the
8869 dynamic linker, before writing them out. */
8870
8871 static enum elf_reloc_type_class
8872 ppc64_elf_reloc_type_class (const Elf_Internal_Rela *rela)
8873 {
8874 enum elf_ppc64_reloc_type r_type;
8875
8876 r_type = ELF64_R_TYPE (rela->r_info);
8877 switch (r_type)
8878 {
8879 case R_PPC64_RELATIVE:
8880 return reloc_class_relative;
8881 case R_PPC64_JMP_SLOT:
8882 return reloc_class_plt;
8883 case R_PPC64_COPY:
8884 return reloc_class_copy;
8885 default:
8886 return reloc_class_normal;
8887 }
8888 }
8889
8890 /* Finish up the dynamic sections. */
8891
8892 static bfd_boolean
8893 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
8894 struct bfd_link_info *info)
8895 {
8896 struct ppc_link_hash_table *htab;
8897 bfd *dynobj;
8898 asection *sdyn;
8899
8900 htab = ppc_hash_table (info);
8901 dynobj = htab->elf.dynobj;
8902 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8903
8904 if (htab->elf.dynamic_sections_created)
8905 {
8906 Elf64_External_Dyn *dyncon, *dynconend;
8907
8908 if (sdyn == NULL || htab->got == NULL)
8909 abort ();
8910
8911 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8912 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
8913 for (; dyncon < dynconend; dyncon++)
8914 {
8915 Elf_Internal_Dyn dyn;
8916 asection *s;
8917
8918 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8919
8920 switch (dyn.d_tag)
8921 {
8922 default:
8923 continue;
8924
8925 case DT_PPC64_GLINK:
8926 s = htab->glink;
8927 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8928 /* We stupidly defined DT_PPC64_GLINK to be the start
8929 of glink rather than the first entry point, which is
8930 what ld.so needs, and now have a bigger stub to
8931 support automatic multiple TOCs. */
8932 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 32;
8933 break;
8934
8935 case DT_PPC64_OPD:
8936 s = bfd_get_section_by_name (output_bfd, ".opd");
8937 if (s == NULL)
8938 continue;
8939 dyn.d_un.d_ptr = s->vma;
8940 break;
8941
8942 case DT_PPC64_OPDSZ:
8943 s = bfd_get_section_by_name (output_bfd, ".opd");
8944 if (s == NULL)
8945 continue;
8946 dyn.d_un.d_val = s->size;
8947 break;
8948
8949 case DT_PLTGOT:
8950 s = htab->plt;
8951 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8952 break;
8953
8954 case DT_JMPREL:
8955 s = htab->relplt;
8956 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
8957 break;
8958
8959 case DT_PLTRELSZ:
8960 dyn.d_un.d_val = htab->relplt->size;
8961 break;
8962
8963 case DT_RELASZ:
8964 /* Don't count procedure linkage table relocs in the
8965 overall reloc count. */
8966 s = htab->relplt;
8967 if (s == NULL)
8968 continue;
8969 dyn.d_un.d_val -= s->size;
8970 break;
8971
8972 case DT_RELA:
8973 /* We may not be using the standard ELF linker script.
8974 If .rela.plt is the first .rela section, we adjust
8975 DT_RELA to not include it. */
8976 s = htab->relplt;
8977 if (s == NULL)
8978 continue;
8979 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8980 continue;
8981 dyn.d_un.d_ptr += s->size;
8982 break;
8983 }
8984
8985 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
8986 }
8987 }
8988
8989 if (htab->got != NULL && htab->got->size != 0)
8990 {
8991 /* Fill in the first entry in the global offset table.
8992 We use it to hold the link-time TOCbase. */
8993 bfd_put_64 (output_bfd,
8994 elf_gp (output_bfd) + TOC_BASE_OFF,
8995 htab->got->contents);
8996
8997 /* Set .got entry size. */
8998 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 8;
8999 }
9000
9001 if (htab->plt != NULL && htab->plt->size != 0)
9002 {
9003 /* Set .plt entry size. */
9004 elf_section_data (htab->plt->output_section)->this_hdr.sh_entsize
9005 = PLT_ENTRY_SIZE;
9006 }
9007
9008 /* We need to handle writing out multiple GOT sections ourselves,
9009 since we didn't add them to DYNOBJ. */
9010 while ((dynobj = dynobj->link_next) != NULL)
9011 {
9012 asection *s;
9013 s = ppc64_elf_tdata (dynobj)->got;
9014 if (s != NULL
9015 && s->size != 0
9016 && s->output_section != bfd_abs_section_ptr
9017 && !bfd_set_section_contents (output_bfd, s->output_section,
9018 s->contents, s->output_offset,
9019 s->size))
9020 return FALSE;
9021 s = ppc64_elf_tdata (dynobj)->relgot;
9022 if (s != NULL
9023 && s->size != 0
9024 && s->output_section != bfd_abs_section_ptr
9025 && !bfd_set_section_contents (output_bfd, s->output_section,
9026 s->contents, s->output_offset,
9027 s->size))
9028 return FALSE;
9029 }
9030
9031 return TRUE;
9032 }
9033
9034 #include "elf64-target.h"